• About

  • Contact

back up
  • About

  • Contact

Honeypot

<< afterglow : Berlin

In computing, a honeypot is used by security researchers to attract attacks in the wild. It is deliberately left insecure. We like to think of our personal electronic devices as secure. But recent revelations have shown, that they might be just as open as a honeypot. All your devices are belong to whom?

Project Website

contributors
Robert Boehnke

@ceterum_censeo

Johan Uhle

@freenerd

Gray Area

THANKS TO OUR MAIN SPONSOR

© ARTHACKDAY 2022 - AN INDEPENDENT EVENT DRIVEN BY CO-ORGANIZERS AND ART SPACES AROUND THE WORLD. - CODE OF CONDUCT