Governments, corporations, and random opportunists don’t always need backdoors or malware to get what they want—often, we hand it to them ourselves. A stray forum post, a forgotten Git commit, or a reused username can be enough to map out networks, unmask identities, or even shut things down before they start.
This talk dives into how online traces are used against activists, organizers, and anyone who’d rather not be an easy target. We’ll look at real-world cases (some famous, some not) where tiny digital breadcrumbs led to arrests, infiltration, or worse. More importantly, we’ll talk about what can be done to minimize risk while still staying connected and effective.
I’ve spent years analyzing security failures, tracking live hacks, and breaking things for a living. This is about sharing what I’ve learned – practical knowledge for those who need it.