Building Decentralized Social Virtual Reality using WebXR on your browser

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=2YWL9BoXobw



Duration: 24:51
19 views
0


FOSDEM 2020 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-07-13filetinuous Delivery starts with Continuous Infrastructure
2022-07-13FaaS You Like It Create Serverless Functions & Run Anywhere
2022-07-13Extending the lifetime of smartphones with Replicant, a fully free Android distribution
2022-07-10Developing from the field Shifting design processes and roles between makers and practitioners arou…
2022-07-10Building Homebridge with the Yocto Project
2022-07-10CPU performance analysis for MySQL using Hot Cold Flame Graph
2022-07-10Docker Security considerations & Incident Analysis
2022-07-10Deterministic debugging with Delve And the state of Delve
2022-07-10DeskConnD Secure, cross platform IPC on the network Zeroconf WAMP = Cross platform IPC
2022-07-10coverity and oss fuzz issue solving common patterns for solving reported issues
2022-07-10Building Decentralized Social Virtual Reality using WebXR on your browser
2022-07-10Choosing The Right Deployment Strategy
2022-07-10Do you really see what’s happening on your NFV infrastructure and what can you do about it
2022-07-08Correlation analysis in automated testing
2022-07-08Designing to change it all Designing processes and designing some products on the way
2022-07-08DEBATE Does FOSS need sustainability
2022-07-08Designing Hardware, Journey from Novice to Not Bad Reflections from the OpenElectronicsLab
2022-07-08Check Yourself Before You Wreck Yourself Auditing and Improving the Performance of Boomerang
2022-07-08Building Confidence & Overcoming Insecurity The ultimate software supply chain self help guide
2022-07-08Cooperative Perception in Future Cars using GNU Radio
2022-07-08Designing functional objects with functional objects OpenSCAD Past, present and or future



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering