Problem Hacking عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Artwork

1
ich&wir – der Jugendpodcast von SOS-Kinderdorf

SOS-Kinderdorf; Host: Jolina Ledl

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Willkommen bei ich&wir – schön, dass du hier bist. Liebe, Familie, Geld, Glück, Sinn, Freundschaft, Gesundheit … und was bewegt dich? ich&wir, der Jugendpodcast von SOS-Kinderdorf, ist dein digitales Zuhause, wo wir offen sprechen ohne Tabus und ohne Scham. Triff zusammen mit Host Jolina Ledl und dem Team von ich&wir spannende junge Menschen, die alle eine Sache gemeinsam haben: Sie sind unfassbar mutig und sprechen über ihre ganz persönlichen Geschichten. Sie teilen ihre Erfahrungen und ber ...
  continue reading
 
Artwork

1
Beyond Business Cast

Eric Demuth und Christian Wolf

icon
Unsubscribe
icon
icon
Unsubscribe
icon
هفتگی
 
Beyond Business Cast – mit Eric Demuth (Bitpanda) und Christian Wolf (More Nutrition) reden Klartext über das, was sie wirklich bewegt – Unternehmertum, Investments, Innovationen und gesellschaftliche Entwicklungen. Ehrlich, direkt, ohne Bullshit. Dazu holen sie sich regelmäßig spannende Gäste aus Wirtschaft, Sport und Politik, um gemeinsam tief in aktuelle Trends und entscheidende Themen einzutauchen. Impressum und verantwortlich für den Inhalt: https://www.socialgrowthstudio.de/impressum
  continue reading
 
Artwork

1
Jetzt mal ganz in Ruhe

Studio Feynstein

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه+
 
Noch ein Klima-Podcast? Ja, aber „Jetzt mal ganz in Ruhe“! Die beiden Physiker Michael und Johannes gehen zusammen mit Moderator Jens den Geheimnissen des Klimas und der Energiewende auf den Grund – und zwar ganz ruhig, sachlich und für alle verständlich. Ohne erhobenen Zeigefinger, politisches Hick-Hack und Schuldzuweisungen. Und bei aller Ernsthaftigkeit des Themas vor allem: fröhlich. Denn komplexe Zusammenhänge zu verstehen und physikalische Aha-Momente zu erleben macht Spaß. Und der bes ...
  continue reading
 
Loading …
show series
 
Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty?This talk features a journey back through time as we look at bridges and integrations that have bee…
  continue reading
 
Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty?This talk features a journey back through time as we look at bridges and integrations that have bee…
  continue reading
 
Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty?This talk features a journey back through time as we look at bridges and integrations that have bee…
  continue reading
 
The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models…
  continue reading
 
The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models…
  continue reading
 
The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models…
  continue reading
 
Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer…
  continue reading
 
Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer…
  continue reading
 
Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer…
  continue reading
 
Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll …
  continue reading
 
Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll …
  continue reading
 
Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll …
  continue reading
 
This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropri…
  continue reading
 
This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropri…
  continue reading
 
[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix clientIn this talk, we’ll share how we migrated NeoBoard’s real-time …
  continue reading
 
[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix clientIn this talk, we’ll share how we migrated NeoBoard’s real-time …
  continue reading
 
This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropri…
  continue reading
 
[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix clientIn this talk, we’ll share how we migrated NeoBoard’s real-time …
  continue reading
 
At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data.Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chos…
  continue reading
 
At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data.Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chos…
  continue reading
 
At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data.Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chos…
  continue reading
 
Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadeq…
  continue reading
 
Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadeq…
  continue reading
 
Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadeq…
  continue reading
 
In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc.The session will cover:- Wh…
  continue reading
 
Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experience…
  continue reading
 
In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc.The session will cover:- Wh…
  continue reading
 
Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experience…
  continue reading
 
In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc.The session will cover:- Wh…
  continue reading
 
Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experience…
  continue reading
 
fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores.What makes this solution unique is the deep integration of the identity and…
  continue reading
 
fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores.What makes this solution unique is the deep integration of the identity and…
  continue reading
 
fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores.What makes this solution unique is the deep integration of the identity and…
  continue reading
 
NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project.…
  continue reading
 
Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent intro…
  continue reading
 
NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project.…
  continue reading
 
NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project.…
  continue reading
 
Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent intro…
  continue reading
 
Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent intro…
  continue reading
 
Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by dig…
  continue reading
 
Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by dig…
  continue reading
 
Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by dig…
  continue reading
 
Most modern software applications give total trust to the service provider. End-to-end encrypted (E2EE) services are different: the service provider is a gateway, and the real trust is with other people.This is unfamiliar, and can make using E2EE confusing. When you add in federation (meaning lots of different service providers) and a diverse set o…
  continue reading
 
We will provide you with the latest updates on Element X mobile apps, as well the plan to sunset our classic Element apps. This includes both the current state, as well as a look into what to expect during the next couple of months and details about specific features like threads and spaces that many people are looking forward to on Element X. In t…
  continue reading
 
Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos!Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun.We will also see how other providers like jit…
  continue reading
 
Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos!Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun.We will also see how other providers like jit…
  continue reading
 
Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos!Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun.We will also see how other providers like jit…
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش