Important topics on privacy, surveillance and breaches
I am sharing some important topics on privacy, surveillance, and breaches. To highlight these issues, here are some influential, eye-opening, and technical talks.
Thanks to the congresses, researchers, journalists, cryptographers, and engineers who exposed massâsurveillance systems, broke down dataâbroker markets, reverse-engineered intelligence tools, and showcased how everyday digital systems leak sensitive data.
How to Hide in Plain Sight: Next-Level Digital Privacy
From the source page:
In this powerful, hands-on session, Ivan breaks down real, practical steps you can take to reclaim your privacy without breaking the bank. Learn about private phones, burner VoIP numbers, anonymous payment options, privacy-focused email, and even ways to keep home and vehicle ownership more discreet.
Live, Die, Repeat â The Fight Against Data Retention
A breakdown of EUâwide data retention attempts, ECJ rulings, and the political push to reintroduce mass metadata logging. A mustâwatch for anyone following European digital rights.
AI Agent, AI Spy
A 39C3 talk discusses AI agents incorporated into the OS and other aspects with AI.
Blackbox Palantir
39C3 talk discusses the Blackbox Palantir and how the data automation works and where the risks are.
Databroker Files â Wie uns Apps & DatenhĂ€ndler der MassenĂŒberwachung ausliefern
One of the most shocking privacy talks in years - again. Researchers purchased **billions** of mobile location records from data brokers â revealing movements of soldiers, intelligence agents, and government officials.
Digital ID to be compulsory for all UK adults under government plans | BBC News
Digital ID shall be necessary to work in the UK. This is against the right to an offline life. Even the opposition believes that these plans are for the control of the state's power.
Just a 5 min video I have found.
EU Digital Identity Systems â Reality Check & Techniques for Better Privacy
A deep cryptographic and architectural analysis of the EUâs eIDAS digital identity framework â and why it risks becoming a panâEuropean tracking system if implemented poorly.
Konnte bisher noch nie gehackt werdenâ: Die elektronische Patientenakte kommt
38C3, eine Fortsetzung von 36C3 - [âHacker hin oder herâ: Die elektronische Patientenakte kommt!](https://media.ccc.de/v/36c3-10595-hacker_hin_oder_her_die_elektronische_patientenakte_kommt) A brutal teardown of Germanyâs electronic patient record system and the potential data breaches are discussed. Now the medical file is rolled out with opt-out. This talk reveals realâworld attack vectors, architectural flaws, and systemic weaknesses in medical data infrastructure.
Snowden: They Are Watching You
Snowden needs no introduction.
A legendary talk summarizing the NSA revelations. Still one of the most important privacy talks ever given, covering metadata collection, global interception, and intelligence services.
What is deep inspection / TLS inspection for packet sniffing?
A rare, technical, insiderâlevel explanation of how XKeyscore works, including selectors, metadata extraction, and global interception pipelines.
Cellphone Surveillance Explained - Stingray/IMSI Catchers
How attackers â police for example â track phones using fake base stations. Covers GSM/UMTS/LTE weaknesses and realâworld interception.