Encrypting Matrix Building a universal end to end encrypted communication ecosystem with Matrix and

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=I1UzDWs98xY



Duration: 51:52
0 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-05From Shopping Baskets to Structural Patterns
2022-06-05Footprinting for security auditors
2022-06-05Get the most out of your security logs using syslog ng
2022-06-05Diving into the KiCad source code
2022-06-05From pipelines to graphs Escape the tyranny of the shell’s linear pipelines with dgsh
2022-06-05filetainers in Pure Perl
2022-06-05gobpf utilizing eBPF from Go
2022-06-05FLOSS Tools for High Level Synthesis Integrating the FPGA into the Operating System
2022-06-05Get designers involved in your open source project 💻 🎨 = 🙂 how we do it at Nextcloud
2022-06-05filenecting End Users and Developers With the Requirements Bazaar
2022-06-05Encrypting Matrix Building a universal end to end encrypted communication ecosystem with Matrix and
2022-06-05Diversity User Research and Women in Open Source Becoming a Better Listener and Women in Open Sourc
2022-06-05Goal Rush Creating a game with Monogame and other open source software
2022-06-05From Gtk to Qt An Strange Journey, part 2 The continuation of the original talk from Dirk Hohndel
2022-06-05German weather data with R
2022-06-05Firefox The Puppet Show Automating Firefox with WebDriver using Selenium and GeckoDriver
2022-06-05Embedding Main'taining SpiderMonkey in a large scale project
2022-06-05filefig Management Community Awesome, Awful or Apathetic
2022-06-05From 0 to 6 GHz in 30 minutes Bootstrapping your SDR experience Start from scratch today, hack the
2022-06-05Go lighting talks Lighting talks about Go
2022-06-05Distributions from the view of a package



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering