Important topics on privacy, surveillance and breaches
I am sharing some important topics on privacy, surveillance and breaches. With this said, here are influential, eye‑opening and technical talks on these major topics.
Thanks to the congresses, researchers, journalists, cryptographers and engineers exposing mass‑surveillance systems, breaking down data‑broker markets, reverse‑engineering intelligence tools, and showcasing how everyday digital systems leak sensitive data.
How to Hide in Plain Sight: Next-Level Digital Privacy
From the source page:
In this powerful, hands-on session, Ivan breaks down real, practical steps you can take to reclaim your privacy without breaking the bank. Learn about private phones, burner VoIP numbers, anonymous payment options, privacy-focused email, and even ways to keep home and vehicle ownership more discreet.
Live, Die, Repeat – The Fight Against Data Retention
A breakdown of EU‑wide data retention attempts, ECJ rulings, and the political push to re‑introduce mass metadata logging. A must‑watch for anyone following European digital rights.
AI Agent, AI Spy
A 39C3 talk discusses AI agents incorporated into the OS and other aspects with AI.
Blackbox Palantir
39C3 talk discusses the Blackbox Palantir and how the data automation works and where the risks are.
Databroker Files – Wie uns Apps & Datenhändler der Massenüberwachung ausliefern
One of the most shocking privacy talks in years - again. Researchers purchased **billions** of mobile location records from data brokers — revealing movements of soldiers, intelligence agents, and government officials.
Digital ID to be compulsory for all UK adults under government plans | BBC News
Digital ID shall be necessary to work in UK. This is against the right for an offline life. Even oppositions believe that these plans are for control power of the state.
Just a 5 min video I have found.
EU Digital Identity Systems – Reality Check & Techniques for Better Privacy
A deep cryptographic and architectural analysis of the EU’s eIDAS digital identity framework — and why it risks becoming a pan‑European tracking system if implemented poorly.
Konnte bisher noch nie gehackt werden“: Die elektronische Patientenakte kommt
38C3, eine Fortsetzung von 36C3 - [„Hacker hin oder her“: Die elektronische Patientenakte kommt!](https://media.ccc.de/v/36c3-10595-hacker_hin_oder_her_die_elektronische_patientenakte_kommt) A brutal teardown of Germany’s electronic patient record system and the potential data breaches discuessed. Now the medical file is rolled out with opt-out. This talk reveals real‑world attack vectors, architectural flaws, and systemic weaknesses in medical data infrastructure.
Snowden: They Are Watching You
Snowden needs no introduction.
A legendary talk summarizing the NSA revelations. Still one of the most important privacy talks ever given, covering metadata collection, global interception, and intelligence services.
What is deep inspection / TLS inspection for packet sniffing?
A rare, technical, insider‑level explanation of how XKeyscore works, including selectors, metadata extraction, and global interception pipelines.
Cellphone Surveillance Explained - Stingray/IMSI Catchers
How attackers — police for example — track phones using fake base stations. Covers GSM/UMTS/LTE weaknesses and real‑world interception.