Killing with Keyboards – How Your Digital Footprint Can Be Weaponized

Killing with Keyboards explores real-world scenarios where digital traces—social media posts, blockchain transactions, leaked metadata—become vulnerabilities exploited by hackers, corporations, and state actors. Learn how adversaries think, how data leaks occur, and how to fortify your online presence against those who weaponize information.

Some key takeways:

Your digital footprint is a weapon—against you. Every post, comment, and transaction creates a breadcrumb trail that can be exploited. Understanding how these traces accumulate is the first step to defending yourself.

Attackers don’t need to hack your system if they can hack you. Social engineering, open-source intelligence (OSINT), and metadata leaks are often more effective than brute-force technical exploits.

Small leaks lead to big consequences. A single offhand forum post, a book review, or an outdated profile can be the missing puzzle piece that links your online alias to your real identity.

The adversary isn’t always who you expect. From state actors to financially motivated cybercriminals, your threat model depends on who has a reason to target you—and what they can gain.

Security is a process, not a product. No tool or technology alone will keep you safe. True security comes from understanding how attacks unfold and developing habits that minimize exposure.


Description

Killing with Keyboards explores real-world scenarios where digital traces—social media posts, blockchain transactions, leaked metadata—become vulnerabilities exploited by hackers, corporations, and state actors. Learn how adversaries think, how data leaks occur, and how to fortify your online presence against those who weaponize information.

Start time

May 27, 2025 - 12:30pm