Filter posts by:
Weeping Angel: The latest surveillance tool, that can turn your smart TV into a bug TV

Weeping Angel: The latest surveillance tool, that can turn your smart TV into a bug TV

  Earlier this year, a revelation by Wikileaks called Vault7 refueled the privacy debate concerning intrusive media (Hacker News; The Verge, 2017). The series released documents on CIA activity between 2013 and 2016, showing how the intelligence agency gained access...
Are your nude pictures save in the cloud?

Are your nude pictures save in the cloud?

How safe are the files you keep in your cloud? We live in a world where more and more things are being saved at distance servers, and we can access them only thru an internet access. How can we...
The Cloud: The Cost of Digital Comfort

The Cloud: The Cost of Digital Comfort

Last week’s Internet sensation, the leakage of compromising pictures of approximately hundred (mostly female) celebrities, has evoked different reactions that can be divided into three categories: Excitement about the exposure, Indignation about the violation of privacy, and Fear for...
Hacking the Digital: Fingerprint Secured Touch ID from Apple

Hacking the Digital: Fingerprint Secured Touch ID from Apple

The iPhone 5S is a revised version of its predecessor, the iPhone 5, and was unveiled to the general public last month on September 20th. Aside from various improvements and new available features, Apple’s new fingerprint-based identity sensor, Touch...
Syria: Cracking down on digital dissidents

Syria: Cracking down on digital dissidents

For Syrian dissidents, social networking sites are essential for bypassing traditional media and communication channels. But in doing so, online activists might all too easily fall prey to the government’s digital surveillance. Social networking services like Facebook, Twitter and...
Edial Dekker, CEO of Gidsy: from hacking to collaborative consumption

Edial Dekker, CEO of Gidsy: from hacking to collaborative consumption

In yesterday’s class we discussed the development of free software and open source. A major shift has been taking place, albeit in a slow pace, from proprietary software to a more open and free form. This change is described...
you will _KNOW how_ : interview with Nancy Mauro-Flude

you will _KNOW how_ : interview with Nancy Mauro-Flude

I first encountered the work of Tasmanian performance artist and media researcher Nancy Mauro-Flude during The Art of Hacking exhibition opening at the Netherlands Media Art Institute (NIMk) on September 9, 2011. Mauro-Flude’s Error_in_Time(V.T_3), a poetic coding performance featuring...
Book Review: KINGPIN by Kevin Poulsen

Book Review: KINGPIN by Kevin Poulsen

If you like police stories with persecution, infiltration and investigation KINGPIN may be just the right book for you. Written by Kevin Poulsen, it is an exciting story of the rise of  one hacker to the control of the...

Swift Access at the Cost of Swift Access: Diginotar

On the tenth of July 2011, the Dutch web security company Diginotar was hacked by (supposedly) a student from Iran. He was able to corrupt the so called SSL certificates and break into Gmail accounts and government websites. Nine...

Hacking the Bogota Book Fair

I knew that especially Camilo was up to something, though I wasn’t quite sure what it was yet; something with tiles and hacking the Bogota book fair, but the how or what remained in the dark. So driven by...
The Future of Hacking

The Future of Hacking

Data theft, child pornography, spying on governments and spreading destructive computer viruses. When thinking of the term 'hacking', we usually think of internet crime, computer breakdowns and some geeks sitting in front of their laptop looking for a fresh...