Skip to content
  • About Us
  • Contact Us
  • PGP Key
  • Add anything here or just remove it...
Oak Lawn 2600Oak Lawn 2600
  • Home
  • Updates
  • Links
  • RSS
  • News
  • Join Discord!

DEFCONConference

This is the official DEF CON YouTube channel.
What is DEF CON? Check out https://www.defcon.org/

We'll be posting videos and pictures from past conferences here, starting with DEF CON 20 and working backwards. If you have a DEF CON related video you want us to include in this channel please email us / fb / tweet and we'll get it added.

Please remember, all content is copyright DEF CON Communications, Inc. You can share it for educational purposes, but you can not make _any_ money from doing so. If you do that would be a violation of the copyright as well as the spirit of DEF CON.

DEFCONConference
It was the summer of 2016, and like everyone else, I was out playing Pokémon Go. Except my rural location barely spawned anything interesting. Naturally, I dove into the game's code, reverse engineered its protocol, and built a custom Pokémon scanner.

But the story doesn't end there. One day, a switch was flipped, enabling a fancy new anti-cheating feature that locked out any custom implementations.

In this talk, I'll begin by exploring how mobile games like Pokémon Go handle communication through specialized protocols—and how I replicated that behavior to build a scanner. Then, I'll walk you through a 4-day hacking marathon where I teamed up with a group of like-minded enthusiasts to overcome the anti-cheating mechanism that nearly broke our scanners.

We'll examine how mobile games attempt to thwart such applications, unraveling the anti-cheating mechanism that was deployed by Pokemon Go. We'll explore how we managed, through obfuscated cryptographic functions, unexpected use of smartphone peripherals and hidden protobuf definitions, to break the anti-cheating system and release a publicly available API for the game's protocol.

Almost a decade later, the full story is ready to be told. Join me for an inside look at the anti-cheating mechanisms of online mobile games—and how to hack them.
DEF CON 33 - Breakin 'Em All – Overcoming Pokemon Go's Anti Cheat Mechanism - Tal Skverer
Risk-limiting audits (RLAs) limit the "risk" of certifying that the wrong candidates won. There are RLA methods for almost every type of political election in the US, including plurality, multiwinner plurality, supermajority, and instant-runoff voting. The latest RLA methods make it practical to audit every contest in every election, even in large jurisdictions with hundreds of contests. RLAs can "tie a bow around" a well-run election that uses trustworthy, organized methods to record and store votes. They cannot magically make a poorly run election trustworthy any more than fastening your seatbelt after an accident will prevent injury. Applying RLA procedures to an untrustworthy vote record is "security theater" that does not limit the risk of certifying the wrong winners.
DEF CON 33 Voting Village - Risk Limiting Audits: What They Are and Aren't - Philip Stark
DEF CON 33 - Voting Village - It's Not Safe Yet: Online Voting in Practice - Michael Specter
End-to-End-Verifiability (E2E-V) is a cryptographic paradigm that, as applied to voting systems, allows voters to independently verify that their votes were cast as intended, guaranteeing that votes were recorded as cast, and tallied as recorded. As such, it is being promoted to public officers and elected officials at the county and state levels as the “magic bullet” allowing for secure voting over the internet. This talk  will present, in a relatively low-tech way, that E2E-V is irrelevant to some attacks – both to servers outside the cryptographic “loop,” and particularly to client-side systems. E2E-V-equipped voting systems are primarily vulnerable to client-side malware, which would still be free to alter or sabotage voting applications and devices.

   The talk will present opinions from E2E-V. These perspectives are juxtaposed against opinions and rhetoric from the commercial promoters of internet voting systems, disputing the propositions of those promoters.
DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John Odum
Using the Dominion touchscreen BMD debuted at Voting Village 2023, we will discuss and demonstrate in real-time how technically simple "hacks" to the ballot displayed on the voter’s touchscreen can directly impact the vote count, or alternatively impact the voter’s decisions. These simple “hacks” to the election definition (with no need to inject malware) include the manipulation of display of candidate choices, silent removal of candidates from the display, and using false instructions on the touchscreen to intentionally misinform voters regarding candidates or ballot questions. Furthermore, attempting to determine/recover from such hacks on the election outcomes can range from difficult to impossible. In addition to discussing the tactics and potential impacts, we will illuminate underlying system design decisions which enabled such hacks to be technically simple, feasible, and easily executable. The knowledge and tools used/discussed were obtained through public means and public websites, available to an unlimited number of people. This talk will focus on the general methodology and ease of the vote manipulation, the range of impacts, the feasibility and scalability. Immediately following the on-stage presentation, a deeper dive into the technical aspects will occur in the adjacent Voting Village lab room.
DEF CON 33 Voting Village - Dominion ICX Simple Hacks Daunting Recoveries - Springall, Davis, Marks
During World War II, the predecessor to the CIA, the Office of Strategic Services, developed a framework for the French Resistance to identify vulnerabilities in key German defenses and infrastructure. The framework, titled “CARVER” applies the following designations to enumerated components of complex systems: Criticality, Accessibility, Recepurability, Vulnerability, Effect, Recognizability. The same framework, viewed through a security framework, will highlight a system’s strengths or weaknesses, depending on the analyst’s tasking. This panel will examine voting systems in the context of the CARVER framework.
DEF CON 33 - Voting Village - CARVER Vuln Analysis & US Voting System - Moore, Young, Baggett
Load More...

Louis Rossmann

Contact:
youtube@rossmanngroup.com - Louis reads this.
For cases where a company has taken part in anti-consumer practices, PLEASE ADD TO https://consumerrights.wiki !

I started as a studio repair technician at Avatar & started a Macbook component level logic board repair business. This channel shows repair & data recovery work & shows how to perform these repairs step by step. There are many things that make it hard to fix things now; willful actions from manufacturers to limit access to parts & schematics. I talked about this to try and spark mainstream recognition of the "Right to Repair" movement.

Restrictions placed on repair were just a canary-in the-coal-mine for many of the anti-ownership, anti-consumer practices that would become common in every industry, which I discuss & try to push back against every day.

If you need data recovery: rossmanngroup.com For macbook board repair advice: boards.rossmanngroup.com

Louis Rossmann
https://consumerrights.wiki
walking
https://store.rossmanngroup.com/screen-cleaning-kit.html
https://consumerrights.wiki/w/Ford_ad_patent
Cars with ads should be covered under lemon law: change my mind
https://consumerrights.wiki/w/NDAA_has_military_right_to_repair_stripped_from_it_in_favor_of_data_as_a_service

https://www.youtube.com/watch?v=C0LmjzXV7IA
https://youtu.be/NQ6jMi5UPNY
https://youtu.be/nNg4PG2kayU
Mike Rogers & Adam Smith turn our military into a DRM filled EA video game 🤦
https://consumerrights.wiki
Sunday walk
https://consumerrights.wiki
collecting data to diagnose issues with a device that we killed...
https://www.youtube.com/watch?v=BX6nUwDeHps
https://www.youtube.com/watch?v=mUmEEvx5MM0
https://www.gofundme.com/f/help-glucks-gym-defend-against-vulcan-strengths-lawsuit
Vulcan Strength sues youtube reviewer over a bad review. Stop doing this...
Load More...

Steve Lehto

I am a Michigan attorney who has practiced in the fields of Lemon Law and Consumer Protection for 33 years. I have written extensively on a variety of topics and taught both law and history. Lehto's Law is the reincarnation of a talk show I hosted for a decade on the radio in Michigan. I have also written some books, mainly involving cars and Michigan history.

For Lehto's Law T-Shirts, visit: https://www.zazzle.com/store/lehtoslaw

If you wish to send correspondence to me via the US Postal service, please use this address:

P.O. Box 168
Atlas MI 48411

For sponsorship inquiries, email: lehtoslaw@adhesivemedia.com

Website: http://www.lehtoslaw.com

Steve Lehto
Check out the FlexiSpot Power Lift Recliner XL6: https://bit.ly/4qrFRmR 
Use the code YTBXL650 to get $50 off, and don’t miss FlexiSpot’s Black Friday Sale — up to 80% off!
Shop Owner Accused of Using Customer’s Car As Loaner
A proposed bill in New York would outlaw MOST car option subscriptions - but the bill still needs some fine-tuning.
https://www.lehtoslaw.com
Proposed State Law Would Ban Most Car Option Subscriptions
Police say they found 249 underage drinkers at one bar in AZ in one night; they ticketed or cited most of them and made a few arrests.
https://www.lehtoslaw.com
Over 200 Arrests Made in One Night at One Bar In Arizona
This is a direct response to Louis Rossman's suggestion that this might constitute a lemon situation. And I AGREE with him. Here is his video:
https://youtu.be/Gw3KRfy9vQY
Could an Obnoxious Screen Ad on Your New Car Make it A Lemon?
The judge's obsession with Elvis went a bit too far, with him even offering to play Elvis music when witnesses were sworn in.
https://www.lehtoslaw.com
Judge in Trouble for Dressing Like Elvis in Court - and More
And there will be an announcement.
https://www.lehtoslaw.com
LIVE on a Sunny Sunday!
Load More...

Black Hat

Black Hat is the most technical and relevant information security event series in the world. For more than 25 years, Black Hat Briefings have provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

Black Hat
Black Hat Europe returns to the Excel in London with a four-day program this December 8-11, 2025. The event will open with two-and four-day options of specialized cybersecurity Trainings, with courses of all skill levels.
The two-day main conference on December 10 & 11 boasts Briefings featuring the latest in research, developments, and trends in cybersecurity, along with dozens of open-source tool demos in Arsenal, a robust Business Hall, networking, and social events, and much more.
View Pass Options » https://www.blackhat.com/eu-25/registration.html
Black Hat Europe 2025 | Secure Your Pass | 1 min
Cybersecurity has an identity problem. Managing the complexities of identity in a corporate environment never gets easier.

As we enter the world of Agentic AI, each "Agent" will also have its own identity, and attributes that may identify it as an agent of the company it represents – or be fakes that attackers use to socially engineer victims in a new range of attacks. Traditional cybersecurity frameworks aren't prepared for Agentic AI, identity, and access management, and companies lack policies to define how to authenticate, authorize, or audit AI Agents. Without clear identity frameworks and standards for Agentic AI, we run the risk that AI Agents will exceed intended scope, be difficult to audit, and without clear threat models, enable unintended attacks or exploits. Employees will also create Shadow AI Agents, even if well intended, that may act autonomously, access sensitive data, trigger workflows, and connect with third-party systems all in the name of "getting the job done".

Attackers are going to take advantage of this chaos. Security teams will have to identify and combat this activity. We have an opportunity to solve some of the systemic problems now, before Agentic AI becomes prolific. Standards bodies are engaging, and startups are offering ideas. In this discussion, we will explore ideas and solutions to the Agentic AI crisis, and the risks to organizations and governments alike when internal accidents or external attacks strike.

By:
Cristin Flynn Goodwin  |  Founder and Managing Partner, Advanced Cyber Law

Full Abstract Available:
https://www.blackhat.com/sector/2025/briefings/schedule/?#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591
Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving
Cybersecurity has always been built on rules — some that save us, and some that nearly ruin us. A few have held true for decades, like "your users are the weakest link." Others, like "change your passwords every month," aged badly and left us chasing the wrong problems. Rules reflect the world in which they were written, and the world keeps moving. In this session, I'll revisit the rules we lived by in the 2000s, reveal which ones still matter, which ones failed us, and what new rules we'll need to survive the future.

By:
HD Moore  |  Founder, runZero

Full Abstract Available:
https://www.blackhat.com/sector/2025/briefings/schedule/index.html#keynote-the-once-and-future-rules-of-cybersecurity-49596
Keynote: The Once and Future Rules of Cybersecurity
Since 1997, Black Hat has been the global stage for cutting-edge cybersecurity. With events across the US, Europe, Asia, the Middle East & Africa, and Canada, we bring together top minds to share the latest research, trends, and innovations.

Whether you're a seasoned pro, a rising talent, or a tech innovator—Black Hat delivers:
• Expert-led Briefings & Trainings, handpicked by our independent Black Hat Review Board
• Networking with thousands of security professionals
• The latest Arsenal tools in our Business Hall
• Career connections & exclusive Summits

Join the community shaping cybersecurity’s next chapter.
🔗 blackhat.com

#BlackHat #Cybersecurity #Cybersecurity #TechConference #BHEU #BHUSA #BHASIA #Sectorca #BlackHatTrainings
Black Hat | Connect. Learn. Lead in Cybersecurity
The Border Gateway Protocol (BGP) is the core routing protocol on the Internet, but it lacks security mechanisms. At the same time, the democratization of access has transformed the Internet into the default platform, where global services and communications happen. As a result, routing security quickly became an issue of great economic and national security concern. The US Federal Communications Commission and the White House Office of the National Cyber Director formally recognized the urgent need to invest more on protecting Internet routing, and standardize efficient security protocols.

The Resource Public Key Infrastructure (RPKI) protocol is rapidly becoming the global standard for enforcing Internet routing security for BGP. It currently covers over 50% of IPv4 and IPv6 prefixes and has been deployed by at least 27% of networks in the world, including major Tier-1 providers. However, RPKI is not secure by design. Research on its robustness and security properties has shown that despite the minimal public facing interfaces, RPKI suffers from widespread crash-inducing vulnerabilities and exploitable protocol loopholes. Attacks on RPKI have been well-documented over the years, including previous Black Hat talks. Now that RPKI is poised to go global, with the potential of being included into strict security regulations, it is time to reconsider the current vulnerable deployments and improve their robustness.

In this work, we introduce Byzantine RPKI (ByzRP), a secure, robust, and distributed intermediate RPKI service that provides a stable output for all RPKI clients worldwide, while being able to completely bypass stalling and denial-of-service attacks on the RPKI infrastructure, with no downtime and service failure. We also offer a secure live ByzRP deployment for all interested parties worldwide to test it and eventually incorporate it into their networks.

By:
Donika Mirdita  |  Security Researcher, Technical University Darmstadt | ATHENE
Jens Frieß  |  Security Researcher, Technical University Darmstadt | ATHENE
Haya Schulmann  |  Professor, Goethe University Frankfurt | ATHENE
Michael Waidner  |  Professor, Technical University Darmstadt | ATHENE | Fraunhofer SIT

Full Abstract and Presentation Materials Available:
https://www.blackhat.com/asia-25/briefings/schedule/#the-byzrp-solution-a-global-operational-shield-for-rpki-validators-44176
The ByzRP Solution: A Global Operational Shield for RPKI Validators
In this talk, we present the first open source implementation of HID SEOS communication protocol over RFID. HID SEOS is a credential technology designed to provide enhanced security, flexibility, and convenience for access control and identity management applications. It's currently the leading access control solution for HID Global and is widely used in corporate, educational, healthcare, and government settings.

The documentation for this card technology is not publicly available so no previous open source implementation exists.
We will demonstrate how it works and give insights in our process of making this project happen. The source code has been incorporated into the Proxmark3 project.

By:
 Iceman  |  Co-Founder, AuroraSec, RRG
Adam (evildaemond) Foster  |  Senior Penetration Tester, Onestep Group

Full Abstract and Presentation Materials:
https://www.blackhat.com/asia-25/briefings/schedule/#dismantling-the-seos-protocol-44583
Dismantling the SEOS Protocol
Load More...

TechLead

Ex-Google / Meta tech lead, app entrepreneur, software engineer. ☕️ 👌

TechLead
Ex-Google / ex-Meta TechLead exposes the dark truth of H1B visa abuse. Clip from my new livestream:
https://pump.fun/coin/4xobQBtd2wpYh6dCGTbAJKb9yBuiexUs3FGA95QVpump
https://x.com/techleadhd/

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
H-1B VISA ABUSE: The Dark Truth of Tech (as an ex-Google software engineer)
Ex-Google TechLead on coding in the attention economy, status game, and abundance mindset. 
- EtherFi 3% Crypto Card: https://www.ether.fi/refer/87b2b9c7

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.n
Why Programming Will Make You POOR (Coding in 2025)
Ex-Google TechLead on why working more isn't the answer. Video links:
- EtherFi 3% Crypto Card: https://www.ether.fi/refer/87b2b9c7
- Robinhood crypto, get a free stock: https://join.robinhood.com/patrics3834

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
Why WORK won't make you RICH (Bitcoin, Ethereum, Market Update)
Ex-Google TechLead gets out of tech. Limited Time: 2% crypto deposit match on Robinhood app. Get a free stock 🎁: https://join.robinhood.com/patrics3834

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
Get Out of Tech. IT'S OVER.
Earn yield on Bitcoin. Own assets, borrow fiat.
🚀 Bitcoin 2025 Conference in Las Vegas (May 27 - 29), use code "TECHLEAD" for 10% OFF. https://tickets.b.tc/event/bitcoin-2025?promoCodeTask=apply&promoCodeInput=TECHLEAD (ticket prices go up soon, RSVP early)

Coinbase (get $20 free): https://coinbase.com/join/AG8JM99
Robinhood (get a free stock): https://join.robinhood.com/patrics3834
(Not an ad, not sponsored. These are just my referral links if you want a free sign-up bonus.)

💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd
Bitcoin Yield: How to earn passive income, borrow against Bitcoin.
It's not about if you own Bitcoin, it's about how much. Crypto & how to get rich in 2025. Not financial advice.

💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd
How much Bitcoin should you own? | STATE OF CRYPTO 2025.
Load More...

Eli the Computer Guy

Eli the Computer Guy
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Google AI Sovereign Cloud Used by NATO - Alibaba is Bad Because It's Chinese
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Hamas Used Social Media to Track 100,000 IDF Soldiers - Loose Twerks Sink Ships
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
AI RAM Consumption Destroying Tech Industry - SK Hynix Increasing Production 8 Fold Is Not Enough
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Chinese Bitcoin Miners Threat to US National Security - Bitmain Rigs Have SSH
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Dutch Nexperia Refuses to Deal with Chinese Wingtech - China Does Not Deserve Rule of Law
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Dutch ASML Offered to Spy on China for USA - Western Hypocrisy Knows No Limits
Load More...

Channel2600

The official video channel of 2600: The Hacker Quarterly

Channel2600
A post-show stream designed to take listener phone calls off-air and online. The show itself airs from 7 to 8 pm ET on WBAI 99.5 FM in New York City. www.2600.com/offthehook
Off The Hook Overtime 2025-11-26
KFC removes hacker ad campaign, ESPN radio station says it's signal was hacked, Emma Best of DDoSecrets joins the panel to discuss the release of Jeffrey Epstein emails.
Off The Hook - Wed, 26 Nov 2025 19:00:00 EST
Alex is in Buenos Ares, listener mail, new studio hardware, listener phone calls, controversy at St John's over HOPE, phone problems, Cloudflare outage.
Off The Hook - Wed, 19 Nov 2025 19:00:00 EST
A post-show stream designed to take listener phone calls off-air and online. The show itself airs from 7 to 8 pm ET on WBAI 99.5 FM in New York City. www.2600.com/offthehook
Off The Hook Overtime 2025-11-12
Far-right UK activist cleared of charges for refusing to give police PIN to his phone, students using Google Docs as chat clients, Cody Kociemba joins the panel to discuss his No Longer Evil project to revive old Nest thermostats.
Off The Hook - Wed, 12 Nov 2025 19:00:00 EST
A post-show stream designed to take listener phone calls off-air and online. The show itself airs from 7 to 8 pm ET on WBAI 99.5 FM in New York City. www.2600.com/offthehook
Off The Hook Overtime 2025-11-05
Load More...

Jack Rhysider

I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.

Check out our clips channel @DarknetDiariesClips.

I am NOT on Telegram.

Jack Rhysider
Tanya Janca's worldview changed suddenly when she realized how easy it was for hackers to crack her applications. From that point on, she vowed to be both a developer AND a hacker, and to spread the gospel of application security to other programmers.

But when she took a job with the Canadian government, nothing could prepare her for the looming threats.

Visit https://darknetdiaries.com/episode/165/ for a list of sources, full transcripts, and to listen to all episodes.
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens of co‑conspirators, stacks of stolen plastic, and a lifestyle built on chaos.

Meet Nathan Michael, leader of Oak Cliff Swipers.

Visit https://darknetdiaries.com/episode/164/ for a list of sources, full transcripts, and to listen to all episodes.
"I was addicted to making money." Confessions of a Chronic Card Skimmer 💳 Ep. 164: Oak Cliff Swipers
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine.

Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes.
He Was Arrested as a Russian Hacker, But The Truth Is Far Scarier ☠ Darknet Diaries Ep. 163: Ola
Before he even graduated high school, Hieu Minh Ngo had stolen 100,000 credit cards. But that was just the beginning of his hacking career. When he stumbled into the terrifying (and perfectly legal) world of data brokers, he built a pipeline for identity theft on a massive scale.

But why are these companies even allowed to exist? And who are they selling all our personal data to, anyway? What Hieu uncovered might change how your look at the world.

Visit https://darknetdiaries.com/episode/162/ for a list of sources, full transcripts, and to listen to all episodes.
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops 🚨 Ep. 162: Hieu
What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG."

Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes.
You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG
Greg Linares (AKA Laughing Mantis) shares his hunts for Zero Day exploits, the triple(?) agent working at Microsoft, how he became the youngest hacker ever arrested in Arizona, and that time a client hired him to steal human DNA.

Follow Greg on Twitter: https://x.com/Laughing_Mantis.

Visit https://darknetdiaries.com/episode/160 for a list of sources, full transcripts, and to listen to all episodes.
They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg
Load More...

EFForg

The Electronic Frontier Foundation is dedicated to ensuring that technology supports freedom, justice, and innovation for all the people of the world. Founded in 1990, we champion Internet privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development for the public good.

EFForg
The audio companion to EFF's EFFector newsletter for November 2025. To read EFFector with links to full articles, visit https://eff.org/effector/37/17.

Become an EFF member today! You can join for as little as $5/month when you sign up at https://eff.org/effect.
EFFector 37.17 | ✋ Get A Warrant
San Jose’s ALPR surveillance program is especially invasive so EFF and the ACLU of Northern California have filed suit on behalf of our clients, SIREN and CAIR California, to protect the privacy of the millions of people who drive on the roads of San Jose.

Allowing these warrantless searches is unconstitutional and this program must be stopped.
Hey San Jose Police -- get a warrant!
Generative AI is like a Rorschach test for anxieties about technology–be they privacy, replacement of workers, bias and discrimination, surveillance, or intellectual property. Our panelists discuss how to address complex questions and risks in AI while protecting civil liberties and human rights online. Details coming soon!
This Title Was Written by a Human
Surveillance isn’t “out there” anymore—it’s on our streets. Help EFF fight surveillance today.
The audio companion to EFF's EFFector newsletter for November 2025. To read EFFector with links to full articles, visit https://eff.org/effector/37/16.

Become an EFF member today! You can join for as little as $5/month when you sign up at https://eff.org/effect.
EFFector 37.16 | 🔔 Ring's Face Scan Plan
In this episode, we speak with Preeti Chhibber, a writer who comes from a place that many of us do: being a fan. She has taken her interests and skills-often honed online-from nontraditional writing to more traditional publishing. As creatures of the internet, we also talk about how we can all be better consumers of online information.
Gate Crashing | Episode 2: From DIY to Publishing | Preeti Chhibber
Load More...
Location
4606 W. 103rd St. Ste B Oak Lawn, IL 60453 (708) 668-4909
Newsletter

Latest Updates
  • 08
    Jun
    Log | 2600.06.06.2025 No Comments on Log | 2600.06.06.2025
  • 09
    May
    Log | 2600.05.02.2025 No Comments on Log | 2600.05.02.2025
  • 05
    Apr
    Log | 2600.04.04.2025 No Comments on Log | 2600.04.04.2025
  • 08
    Mar
    Log | 03.07.2025 – Build a Mesh Off-Grid Communicator No Comments on Log | 03.07.2025 – Build a Mesh Off-Grid Communicator
  • Blog
Copyright 2025 © Oak Lawn 2600, All Rights Reserved.
  • Home
  • Updates
  • Links
  • RSS
  • News
  • Join Discord!
  • About Us
  • Contact Us
  • PGP Key
  • -