This workshop will analyze the information an investigator (or thief) may obtain by intercepting internet traffic, a mobile phone or stealing a computer. You will learn what a digital forensics and ne...
Events - hackers' corner
Online censorship is very subjective. Depending on the ISP you use, the state in which you live or even the office where you work, some portions of the Internet can be blocked. Technologies of corpora...
Open source intelligence is a technique for consulting free sources automatically (search engines, online databases, social networks) in order to look for evidence and correlations of information.
The world of intercepts (by telephone or online) is often not fully understood. How do intercepts work and what are the risks for civil liberties, especially for those dealing with information such as...
Several groups of journalists, or informal groups created for informational and political purposes, use tools of anonymous whistleblowing. As became clear after the success of WikiLeaks and the subseq...
Anonymous whistleblowing: how to receive information from anonymous sources via web
Starting a platform for digital whistleblowing is far from simple. More and more international media are gearing up to provide an anonymous and interactive web "letterbox" with which journalistic sour...