Maximizing Vulnerability Impact: Security Research as Direct Action
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore a thought-provoking case study on using security research as a method of direct action in this 47-minute conference talk. Delve into the practice of responsible disclosure in vulnerability handling and its impact on public debates. Examine two specific examples, the ID-Wallet and the Bonify case, to understand scenarios where maximizing a vulnerability's impact through social media can be effective while maintaining safety for most parties involved. Learn about the potential trade-offs between responsible disclosure and using security research for direct action, and consider the ethical implications of different approaches to vulnerability disclosure in the context of cybersecurity and public policy.
Syllabus
Jens Spahns credit score is "very good" - english translation
Taught by
media.ccc.de
Related Courses
Ethics in Information SecurityLinkedIn Learning Tech on the Go: Ethics in Cybersecurity
LinkedIn Learning Advanced Android Studio Hacking - Part 3
SecurityFWD via YouTube Running Away from Security - Web App Vulnerabilities and OSINT Collide
YouTube IoT Goes Nuclear - Creating a Zigbee Chain Reaction
IEEE via YouTube