Stefan Marsiske - What would hackers use? part1

  • 816 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
816
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
12
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. what would hackers use stef September 5, 2010
  • 2. cleanternet.v1 1 cleanternet.v
  • 3. Links http://wikileaks.org/ http://www.laquadrature.net/wiki/ http://euwiki.org/index.php?title=ACTA%2Fdiffs% 2FChapter2%2FSection4&diff=3707&oldid=3706 http://en.swpat.org/wiki/Software_patents_wiki: _home_page http://werebuild.eu/wiki/index.php/ http://pad.telecomix.org/bridgecamp2 http://gplv3.fsf.org/comments/gplv3-draft-2.html https://lqdn.co-ment.com/text/ZUEwpvJ9mmd/view/
  • 4. Links cont'd http://www.status.net / http://identi.ca/stf http://www.public-software-group.org/liquid_ feedback_testing/issue/show/37.html http://www.europarl.europa.eu/activities/ introduction/home.do?language=en http://euwiki.org/Tratten/oeil/Stage_reached_in_ procedure http://politicalmemory.eu/ http://littlesis.org/person/19856/Kira_Alvarez http://longstrings.soup.io/
  • 5. Credits Gutenberg & His Printing Press / CCBYNC by camelot2302 Open 19 / CCBYND by loop_oh INSULAR Technologies / CCBYSANC by pablosanz Cisco 7936 IP Conference Station / CCBY by Andres Rueda guckes.soup.io/post/19675231/Have-you-read-my-blog-yet Irssi IRC client with a Userlist and Highlight Window / CCBY by nixternal Live video streaming / CCBYSANC by Pigsaw