This workshop is for journalists who wish to learn how to receive material from anonymous sources. During the workshop, the Hermes Study Centre will be at your disposal to enable you to test a part...
Events - hackers' corner
The business model of online media, which appears during user navigation as a seemingly innocent banner between intelligence and legal gaps, is causing a flow of data towards foreign nations. This d...
The romantic art of penetrating into systems, the collective perception of the Hacker, the innovation process: all elements to be redefined. The landscape has changed and much of it is due to a stre...
Where have the harmless and fun Nabaztag bunnies gone? The Internet of Things, born ten years ago in SCADA and home automation, has found its ideal terrain thanks to the phenomenon of smartphones, a...
During the Wired Next Festival 2014 - the event mostly remembered for the blitz of taxi drivers against Uber Italy - it was explained, in a few hours, how a newsroom can be equipped with a new edito...
Internet infrastructure, computer devices, and the daily operations of users have infrastructural weaknesses. These vulnerabilities influence everything; the communication with readers/users, the ma...
In 2013 the Snowden revelations showed how digital communication can’t be considered safe by journalists dealing with whistleblowers and sources and underlined the need for better and stronger too...
There’s a lot of talk nowadays about the deepweb, but what is it exactly? And what would you find once you got there? The deepweb is definitely more than just the famous Silkroad or similar websi...