System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
mp4
SD quality
mp3
webm
SD quality
opus
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
mp4
SD quality
mp3
webm
SD quality
opus
browse
conferences
camp-NL
why2025
Hacking
What Hackers Yearn 2025
Hacking
Full playlist:
Video
/
Audio
https://why2025.org/
name
duration
date
view count
25 min
📧 Your own Mailserver - 2025 Edition
Hacking
Andromeda
25 min
2025-08-10
939
simonmicro
54 min
WHY2025 Infrastructure Review
Hacking
Brachium
54 min
2025-08-11
844
Arjan Koopen
52 min
Stealth Web Scraping Techniques for OSINT
Hacking
Cassiopeia
52 min
2025-08-09
816
Soukaina Cherrabi
and
François GRANIER
51 min
0click Enterprise compromise – thank you, AI!
Hacking
Delphinus
51 min
2025-08-09
713
Inbar Raz
29 min
Synology Disk Station Manager (DSM) - the good, the bad and the ugly
Hacking
Cassiopeia
29 min
2025-08-10
651
Mischa Rick van Geelen
43 min
Kubernetes from Scratch, The Hard Way
Hacking
Delphinus
43 min
2025-08-10
511
Alain van Hoof
25 min
Horus Scenario 2.0
Hacking
Andromeda
25 min
2025-08-09
507
Willem Westerhof
67 min
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
Hacking
Andromeda
67 min
2025-08-11
497
Kirils Solovjovs
and
Iceman
38 min
Can we trust the Zero in Zero trust?
Hacking
Delphinus
38 min
2025-08-12
496
Thomas Fricke
40 min
Escaping a misleading "sandbox": breaking the WebAssembly-JavaScript barrier
Hacking
Cassiopeia
40 min
2025-08-11
496
Thomas Rinsma
47 min
Hack the Grid. Disclosing vulnerabilities to help prevent blackouts
Hacking
Andromeda
47 min
2025-08-10
429
Chris van 't Hof
,
Frank Breedijk
and
Wietse Boonstra
50 min
How (not) to configure your domainname [internet.nl]
Hacking
Cassiopeia
50 min
2025-08-11
412
Benjamin W. Broersma
41 min
Flipping Bits: Your Credentials Are Certainly Mine
Hacking
Andromeda
41 min
2025-08-11
393
STÖK
and
joohoi
44 min
Low Energy to High Energy: Hacking nearby EV-chargers over Bluetooth
Hacking
Andromeda
44 min
2025-08-10
373
Daan Keuper
and
Thijs Alkemade
34 min
Pentesting Passkeys
Hacking
Brachium
34 min
2025-08-10
337
Matthijs Melissen
48 min
The Well Is Poisoned — Now What Shall We Drink?
Hacking
Andromeda
48 min
2025-08-12
336
Martin Hamilton
33 min
Die Hardcoded: Unlocking Yealink's (weakest) secrets
Hacking
Cassiopeia
33 min
2025-08-11
287
Jeroen Hermans
and
Stefan Gloor
47 min
From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
Hacking
Andromeda
47 min
2025-08-09
278
Daan Keuper
and
Thijs Alkemade
48 min
The WHY, the How, the What. An assessment of TETRA End-to-end
Hacking
Andromeda
48 min
2025-08-11
271
Wouter Bokslag
and
Carlo Meijer
52 min
Quantum cryptography and its certification against attacks
Hacking
Brachium
52 min
2025-08-10
269
Vadim Makarov
51 min
USB: the most successful interface that also brings power
Hacking
Brachium
51 min
2025-08-11
229
Ondřej Caletka
48 min
From barking to Meow: mature pentesting
Hacking
Delphinus
48 min
2025-08-11
205
Mischa Rick van Geelen
and
Brenno de Winter
26 min
A step towards infinite storage?
Hacking
Brachium
26 min
2025-08-09
185
Jesus Zen Droïd
48 min
A journey into reverse engineering arcade PCBs for video game preservation via FPGA…
Hacking
Cassiopeia
48 min
2025-08-11
178
Solal Jacob
49 min
Automate yourself out of supply chain hell
Hacking
Brachium
49 min
2025-08-11
173
cy
49 min
EntrySign: create your own x86 microcode for fun and profit
Hacking
Andromeda
49 min
2025-08-10
172
Nspace
and
spq
49 min
Getting Started: Reading Bosch Sensor Data on the Badge with MicroPython
Hacking
Andromeda
49 min
2025-08-11
164
Harald Koenig
43 min
Building Bitchat: Offline first protocols and E2E Encrypted Social Apps with Nostr,…
Hacking
Delphinus
43 min
2025-08-11
159
rabble
26 min
Embrace Chaos! How Game Randomizers Work
Hacking
Cassiopeia
26 min
2025-08-10
149
Nikki
18 min
Race conditions, transactions and free parking
Hacking
Cassiopeia
18 min
2025-08-10
144
Benjamin W. Broersma
26 min
Knock knock who's there 2.0, the subtle art of (physical) port knocking
Hacking
Delphinus
26 min
2025-08-10
136
Jeroen Hermans
43 min
Rush hour rodeo and traffic cam selfies
Hacking
Andromeda
43 min
2025-08-12
135
Willem Westerhof
22 min
A Journey Through Boring Telco Data Leaks
Hacking
Andromeda
22 min
2025-08-11
127
kantorkel
52 min
Packets Over Any Wire: Alternative Networking Mediums for Hackers
Hacking
Delphinus
52 min
2025-08-10
121
Robert Sheehy
44 min
Crypto(graphy) 101
Hacking
Cassiopeia
44 min
2025-08-11
119
Dirk Maij
22 min
Time Lord's adventures: abusing time on Linux systems
Hacking
Cassiopeia
22 min
2025-08-12
116
Daniels Heincis
39 min
Hacking the Aeotec Smart Hub: The little hub that could
Hacking
Delphinus
39 min
2025-08-11
114
Daan Keuper
and
Thijs Alkemade
29 min
I donated a kidney (and maybe you can too)
Hacking
Cassiopeia
29 min
2025-08-10
110
Peetz0r
47 min
The shadow of Operational technologies: A journey into the OT security
Hacking
Delphinus
47 min
2025-08-09
108
Davide "Skullb0y" Pala
43 min
About Time
Hacking
Cassiopeia
43 min
2025-08-12
103
pcwizz
39 min
Hacked in translation: Giving an Abandoned IoT Device a New Life
Hacking
Cassiopeia
39 min
2025-08-12
98
Artem Makarov
48 min
How election software can fail
Hacking
Brachium
48 min
2025-08-12
90
Benjamin W. Broersma
45 min
Towards digital sovereignty with cloud federation: how to break the dominance of the…
Hacking
Brachium
45 min
2025-08-12
82
Wido
41 min
AiTM panels and sellers
Hacking
Andromeda
41 min
2025-08-11
52
rik van duijn
and
Wesley Neelen
27 min
Scaling up victim notification, because crededential theft is scaling up too...
Hacking
Andromeda
27 min
2025-08-12
41
Frank Breedijk