
Sign up to save your podcasts
Or
Every time I release or use a "hacking" tool, I question the ethics of it. It is on me to determine if it will be maliciously used or is it just a tool? Should we care about how our tools are used? Should we build in safe guards? What about large issues like encryption and adding backdoors to it? Lots to unpack.
Come, chat, and hack on!
DISCORD Invite - https://discord.gg/jCNdNPKygP
👉 Subscribe to Hacker Hangouts - https://www.youtube.com/channel/UCGbGO7Ccpi21gi0xqGwHSyQ?sub_confirmation=1
👉 Subscribe to Alex Chaveriat- https://www.youtube.com/channel/UCbHYwhbarpO6vXgbIYmcXnQ?sub_confirmation=1
🤘Twitter:
https://twitter.com/alexchaveriat
https://twitter.com/Gater_Byte
https://twitter.com/gregory_price
https://twitter.com/GuloGuloDesu
Every time I release or use a "hacking" tool, I question the ethics of it. It is on me to determine if it will be maliciously used or is it just a tool? Should we care about how our tools are used? Should we build in safe guards? What about large issues like encryption and adding backdoors to it? Lots to unpack.
Come, chat, and hack on!
DISCORD Invite - https://discord.gg/jCNdNPKygP
👉 Subscribe to Hacker Hangouts - https://www.youtube.com/channel/UCGbGO7Ccpi21gi0xqGwHSyQ?sub_confirmation=1
👉 Subscribe to Alex Chaveriat- https://www.youtube.com/channel/UCbHYwhbarpO6vXgbIYmcXnQ?sub_confirmation=1
🤘Twitter:
https://twitter.com/alexchaveriat
https://twitter.com/Gater_Byte
https://twitter.com/gregory_price
https://twitter.com/GuloGuloDesu