top | item 46392094

(no title)

tmsbrg | 2 months ago

Some talks which sound really brilliant. I love [0] exploiting a memory leak for years before it's fixed. Also [1] I'm really curious about the custom crypto used in Chinese apps. Oh and curious about the found [2] GPG vulnerabilities. I think some of the politics ones are actually also very interesting. Looking forward to the streams.

[0] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/... [1] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/... [2] https://fahrplan.events.ccc.de/congress/2025/fahrplan/event/...

discuss

order

belter|2 months ago

The first one is indeed fascinating...almost deserving of its HN post :-)

It has been submitted six times in the last 10 months, with a grand total of 1 comment...I though this site had Hacker in the title...

https://hn.algolia.com/?q=https%3A%2F%2Fgfw.report%2Fpublica...

immibis|2 months ago

Common misconception. HN uses "hacker" as in "the people who do the work that makes Y Combinator rich" rather than "someone who plays with technology". HN hackers are contrasted with CEOs and so on - people whose job is not the on-the-ground work.