1. COVER The Athens Affair How some extremely smart hackers pulled off the most audacious cell-network break-in ever By VASSILIS PREVELAKIS, DIOMIDIS SPINELLIS / JULY 2007…
1. WikipediaLeaks 2. 3. To bring important information to the publicJulian AssangeWHAT IS WIKILEAKS GOAL? 4. HOW IT WORKS Leaks are submitted anonymously WikiLeaks…
1. A DIGITAL LIFE E-GUIDE Keeping Things Private Online 2. Ever had your status update read by more people than you intended? Did your last embarrassing search query pop…
Slide 1Measuring Infringement of IPR IPO Report Summary Findings A Review of existing methods and recommendations for new robust methodologies September 2013 Slide 2 CONTENT…
1. COUNTER CRAFTHow can we expand the definition of craft toinclude artists less visible? From theillicit to the marginal, how can exploringthese craft practices help us…
1. This is the third year he’s done a GSMpresentation Did a live demo on stage showing how tosniff, crack, and impersonate a phone A5/1 is dead AND improperly…
1. Open Rights Group Censorship Monitoring Project www.blocked.org.uk Richard King [email protected] @graphiclunarkid 2. Background ● Concerns about children…
1. TOR, I2P, FREENET… FOR WHAT? 2. DEANONYMIZATOR … THE END OF ANONYMITY ON ANONYMOUS NETWORKS Denis Makrushin (@difezza), Maria Garnaeva Global Research and Analysis…