Channel Avatar

MCH2022 @UCHmPMdU0O9P_W6I1hNyvBIQ@youtube.com

None subscribers - no pronouns set

MCH2022 was a nonprofit outdoor hacker camp taking place in


05:46
MCH2022 Aftermovie - May Contain Hackers
46:22
2022 - Ethics does not belong on the wall! Ethical framework for the use of location data
42:29
2022 - Digital Civil Disobedience
48:42
2022 - Sensor.Community - Global Open Environmental Data Platform
47:34
2022 - Rocking the Web Bloat: Modern Gopher, Gemini and the Small Internet
24:37
2022 - Introducing CSIRT.global: if you love the internet, we need your help
49:00
2022 - SSH Configuration, Intermediate Level
49:29
2022 - Censoring the internet & how to bypass it
47:17
2022 - How to Secure the Software Supply Chain
30:10
2022 - Where did all the parts go - the 202x component availability trashfire
33:41
2022 - Introduction to MQTT, Node-RED & Tasmota
43:02
2022 - hack your brain
58:22
2022 - Infrastructure review
22:37
2022 - Knock knock, who’s there? Is your door locked? Are you sure?
49:27
2022 - How do GPS/Galileo really work & how the galmon.eu monitors all navigation satellites
30:40
2022 - What can AI learn from your face? The making of HowNormalAmI.eu
17:47
2022 - ⚠️ May Contain Hackers 2022 Closing
30:15
2022 - No Permissions Needed!
53:40
2022 - Lightning Talks Tuesday
18:38
2022 - The MCH2022 Design
28:27
2022 - Cryptography is easy, but no magic. Use it. Wisely.
43:16
2022 - Computing within Limits
26:06
2022 - Guardians of the Dutch healthcare
33:35
2022 - What to do when someone close to you takes their life and you are not Tech-Savvy
44:16
2022 - Badge talk
44:02
2022 - OpenKAT: Looking at security with cat eyes
49:07
2022 - A CISO approach to pentesting; why so many reports are never used
48:49
2022 - A Smart Light Hacking Journey
01:32:12
2022 - Hope : It is too late to be pessimistic (about climate change)
50:49
2022 - macOS local security: escaping the sandbox and bypassing TCC
49:01
2022 - Scanning and reporting vulnerabilities for the whole IPv4 space. How the Dutch Institute for
49:24
2022 - Nuggets of Shannon Information Theory
44:57
2022 - Cyber crises and what you can do to face the challenge
01:02:12
2022 - Lightning Talks Monday
51:12
2022 - Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry System
50:59
2022 - Plotting the Pandemic... or Any Other Catastrophe-Movie
01:24:25
2022 - The War in Ukraine: Cyberfront
48:29
2022 - TASBot OoT ACE: How to get the Triforce on an N64 via controller input
36:57
2022 - PolyCoin - A game played across MCH - How it works and what is inside it
01:19:49
2022 - Lightning Talks Sunday
46:44
2022 - Repair for Future
01:59:26
2022 - Climate Crisis: The gravity of the situation. What is going on?
49:20
2022 - Successfully building and programming sound field control systems
31:05
2022 - Reproducible Builds for Trustworthy Binaries
27:05
2022 - illumos SmartOS, specialized Type 1 Hypervisor
42:42
2022 - Payment terminals as general purpose (game-)computers
45:25
2022 - Single Sign-On: A Hacker's Perspective
35:19
2022 - Threat modeling mechanical locking systems, by analyzing puzzles?
42:53
2022 - First Privacy, Now Safety: An Anthology of Tales from the Front Lines of Cyber Physical Secu
39:00
2022 - drand: publicly verifiable randomness explained
51:00
2022 - Tech didn’t cause misinformation, and it won’t solve it (by itself)
41:44
2022 - Audio networks and their security implications
45:26
2022 - How to sneak past the Blue Team of your nightmares
51:29
2022 - Intro to OSINT and Geolocation
49:18
2022 - Meta-Press.es : Decentralized search engine for press reviews
51:47
2022 - All you never wanted to know about the Banking System and why it keeps crashing Economics.
51:26
2022 - Fault Injection on a modern multicore System on Chip
48:07
2022 - An Ontology Of Electronic Waste
35:04
2022 - Live streaming 360° video with your own infrastructure
50:12
2022 - Gigatron - creating a hobby kit