System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
mp3
webm
SD quality
mp4
SD quality
opus
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for WHY2025
mp3
webm
SD quality
mp4
SD quality
opus
browse
conferences
camp-NL
why2025
Hacking
What Hackers Yearn 2025
Hacking
Full playlist:
Video
/
Audio
https://why2025.org/
name
duration
date
view count
25 min
📧 Your own Mailserver - 2025 Edition
Hacking
Andromeda
25 min
2025-08-10
1.0k
simonmicro
54 min
WHY2025 Infrastructure Review
Hacking
Brachium
54 min
2025-08-11
890
Arjan Koopen
52 min
Stealth Web Scraping Techniques for OSINT
Hacking
Cassiopeia
52 min
2025-08-09
881
Soukaina Cherrabi
and
François GRANIER
51 min
0click Enterprise compromise – thank you, AI!
Hacking
Delphinus
51 min
2025-08-09
779
Inbar Raz
29 min
Synology Disk Station Manager (DSM) - the good, the bad and the ugly
Hacking
Cassiopeia
29 min
2025-08-10
679
Mischa Rick van Geelen
43 min
Kubernetes from Scratch, The Hard Way
Hacking
Delphinus
43 min
2025-08-10
542
Alain van Hoof
50 min
How (not) to configure your domainname [internet.nl]
Hacking
Cassiopeia
50 min
2025-08-11
541
Benjamin W. Broersma
67 min
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations
Hacking
Andromeda
67 min
2025-08-11
531
Kirils Solovjovs
and
Iceman
25 min
Horus Scenario 2.0
Hacking
Andromeda
25 min
2025-08-09
522
Willem Westerhof
40 min
Escaping a misleading "sandbox": breaking the WebAssembly-JavaScript barrier
Hacking
Cassiopeia
40 min
2025-08-11
515
Thomas Rinsma
38 min
Can we trust the Zero in Zero trust?
Hacking
Delphinus
38 min
2025-08-12
515
Thomas Fricke
47 min
Hack the Grid. Disclosing vulnerabilities to help prevent blackouts
Hacking
Andromeda
47 min
2025-08-10
470
Chris van 't Hof
,
Frank Breedijk
and
Wietse Boonstra
48 min
The Well Is Poisoned — Now What Shall We Drink?
Hacking
Andromeda
48 min
2025-08-12
424
Martin Hamilton
44 min
Low Energy to High Energy: Hacking nearby EV-chargers over Bluetooth
Hacking
Andromeda
44 min
2025-08-10
408
Daan Keuper
and
Thijs Alkemade
41 min
Flipping Bits: Your Credentials Are Certainly Mine
Hacking
Andromeda
41 min
2025-08-11
402
STÖK
and
joohoi
34 min
Pentesting Passkeys
Hacking
Brachium
34 min
2025-08-10
366
Matthijs Melissen
48 min
The WHY, the How, the What. An assessment of TETRA End-to-end
Hacking
Andromeda
48 min
2025-08-11
356
Wouter Bokslag
and
Carlo Meijer
33 min
Die Hardcoded: Unlocking Yealink's (weakest) secrets
Hacking
Cassiopeia
33 min
2025-08-11
316
Jeroen Hermans
and
Stefan Gloor
47 min
From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
Hacking
Andromeda
47 min
2025-08-09
293
Daan Keuper
and
Thijs Alkemade
52 min
Quantum cryptography and its certification against attacks
Hacking
Brachium
52 min
2025-08-10
289
Vadim Makarov
51 min
USB: the most successful interface that also brings power
Hacking
Brachium
51 min
2025-08-11
233
Ondřej Caletka
48 min
From barking to Meow: mature pentesting
Hacking
Delphinus
48 min
2025-08-11
227
Mischa Rick van Geelen
and
Brenno de Winter
49 min
EntrySign: create your own x86 microcode for fun and profit
Hacking
Andromeda
49 min
2025-08-10
219
Nspace
and
spq
48 min
A journey into reverse engineering arcade PCBs for video game preservation via FPGA…
Hacking
Cassiopeia
48 min
2025-08-11
201
Solal Jacob
18 min
Race conditions, transactions and free parking
Hacking
Cassiopeia
18 min
2025-08-10
192
Benjamin W. Broersma
26 min
A step towards infinite storage?
Hacking
Brachium
26 min
2025-08-09
189
Jesus Zen Droïd
49 min
Automate yourself out of supply chain hell
Hacking
Brachium
49 min
2025-08-11
184
cy
43 min
Building Bitchat: Offline first protocols and E2E Encrypted Social Apps with Nostr,…
Hacking
Delphinus
43 min
2025-08-11
179
rabble
49 min
Getting Started: Reading Bosch Sensor Data on the Badge with MicroPython
Hacking
Andromeda
49 min
2025-08-11
178
Harald Koenig
52 min
Packets Over Any Wire: Alternative Networking Mediums for Hackers
Hacking
Delphinus
52 min
2025-08-10
167
Robert Sheehy
26 min
Embrace Chaos! How Game Randomizers Work
Hacking
Cassiopeia
26 min
2025-08-10
154
Nikki
43 min
Rush hour rodeo and traffic cam selfies
Hacking
Andromeda
43 min
2025-08-12
141
Willem Westerhof
26 min
Knock knock who's there 2.0, the subtle art of (physical) port knocking
Hacking
Delphinus
26 min
2025-08-10
140
Jeroen Hermans
22 min
A Journey Through Boring Telco Data Leaks
Hacking
Andromeda
22 min
2025-08-11
133
kantorkel
44 min
Crypto(graphy) 101
Hacking
Cassiopeia
44 min
2025-08-11
125
Dirk Maij
39 min
Hacking the Aeotec Smart Hub: The little hub that could
Hacking
Delphinus
39 min
2025-08-11
122
Daan Keuper
and
Thijs Alkemade
22 min
Time Lord's adventures: abusing time on Linux systems
Hacking
Cassiopeia
22 min
2025-08-12
122
Daniels Heincis
43 min
About Time
Hacking
Cassiopeia
43 min
2025-08-12
121
pcwizz
47 min
The shadow of Operational technologies: A journey into the OT security
Hacking
Delphinus
47 min
2025-08-09
116
Davide "Skullb0y" Pala
29 min
I donated a kidney (and maybe you can too)
Hacking
Cassiopeia
29 min
2025-08-10
114
Peetz0r
48 min
How election software can fail
Hacking
Brachium
48 min
2025-08-12
110
Benjamin W. Broersma
39 min
Hacked in translation: Giving an Abandoned IoT Device a New Life
Hacking
Cassiopeia
39 min
2025-08-12
98
Artem Makarov
45 min
Towards digital sovereignty with cloud federation: how to break the dominance of the…
Hacking
Brachium
45 min
2025-08-12
92
Wido
41 min
AiTM panels and sellers
Hacking
Andromeda
41 min
2025-08-11
56
rik van duijn
and
Wesley Neelen
27 min
Scaling up victim notification, because crededential theft is scaling up too...
Hacking
Andromeda
27 min
2025-08-12
51
Frank Breedijk