Last week, I taught my fourth one-day Tech class at DEFCON. DEFCON, as some of you may know, is one of the premiere hacker/cybersecurity conferences.| KB6NU's Ham Radio Blog
The Open Source Security Foundation (OpenSSF) marked a strong presence at two cornerstone cybersecurity events, Black Hat USA 2025 and DEF CON 33, engaging with security leaders, showcasing our initiatives, and fostering collaboration to advance open source security.| openssf.org
A recap of the Meshtastic DEF CON deployment, including a vulnerability demonstration and the project's response.| meshtastic.org
Watch Promptfoo catch LLM exploits live at Black Hat USA and DEF CON 33. Booth 4712, Arsenal Labs demos, CEO deep-dive, and a pool-side open bar.| Promptfoo Blog
Today's links| Pluralistic: Daily links from Cory Doctorow
Follow us on Twitter (X) @Hackread - Facebook @ /Hackread| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Today's links| Pluralistic: Daily links from Cory Doctorow
TL;DR: Don't build a burner device. Probably this is not the risk you are looking for. Introduction Every year before DEF CON people starts to give advice to attendees to bring "burner devices" to DEF CON. Some people also start to create long lists on how to build burner devices, especially laptops. But the deeper we look into the topic, the more confusing it gets. Why are we doing this? Why are we recommending this? Are we focusing on the right things? What is a "burner device" used for? ...| Jump ESP, jump!
(Update: The talk recording is now up on YouTube, latest links to related content in this tweet)| /dev/alias – Hack. Dev. Transcend.