Chloé Messdaghi
We Deserve Rights
#1about 3 minutes
The legal risks facing ethical security researchers
Good-faith hackers face prosecution and fear due to a lack of legal protections for their work in securing systems.
#2about 1 minute
Defining the difference between a hacker and an attacker
The key distinction between a hacker who protects and an attacker who exploits is their intent, not their skillset.
#3about 4 minutes
A case study of a bug bounty program gone wrong
A security researcher who reported a bug to DJI was threatened with a lawsuit, highlighting the risks of poorly managed disclosure programs.
#4about 9 minutes
How social constructs and fear shape public perception
Media portrayals create socially constructed beliefs that trigger fear-based responses towards hackers, which can be overcome with personal stories.
#5about 7 minutes
Practical ways to correct media misrepresentation of hackers
Combat negative stereotypes by kindly correcting inaccurate terminology and imagery used by journalists and marketers.
#6about 5 minutes
The dangers of the Computer Fraud and Abuse Act (CFAA)
The vague and outdated CFAA is misused by companies to prosecute ethical hackers, as tragically exemplified by the case of Aaron Swartz.
#7about 1 minute
How to advocate for legislative change and reform
Individuals can drive legislative reform by voting, identifying their local representatives, and collaborating with advocacy groups to schedule meetings.
#8about 3 minutes
Best practices for vulnerability disclosure policies
Companies can build trust and improve security by creating clear vulnerability disclosure policies with defined scope, simple language, and a dedicated contact.
#9about 2 minutes
A final call to action for the community
Change starts with individual awareness and action, such as supporting advocacy organizations and sharing personal stories to challenge stereotypes.
#10about 8 minutes
Q&A on reclaiming the term hacker and corporate lobbying
The community prefers the term "hacker" to reclaim its identity, while corporate lobbying from tech companies actively prevents reforms to the CFAA.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Amazon Web Services (AWS)
Cloud Architecture
+1
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
04:17 MIN
Playing a game of real or fake tech headlines
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:17 MIN
Europe's push for digital independence from US tech
WeAreDevelopers LIVE – AI, Freelancing, Keeping Up with Tech and More
06:33 MIN
The security challenges of building AI browser agents
AI in the Open and in Browsers - Tarek Ziadé
01:02 MIN
AI lawsuits, code flagging, and self-driving subscriptions
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
Featured Partners
Related Videos
Security Pitfalls for Software Engineers
Jasmin Azemović
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
Outsmarting the System: What Game Cheaters Can Teach Us About Cyber Security
John Romero
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
Mackenzie Jackson
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
How GitHub secures open source
Joseph Katsioloudes
Hacking AI - how attackers impose their will on AI
Mirko Ross
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

TryHackMe
Charing Cross, United Kingdom
Remote
£34K
Intermediate
PHP
Bash
Python
+1



Deloitte Ag
Basel, Switzerland


Deloitte Ag
Zürich, Switzerland


freiheit.com
freiheit.com
Hamburg, Germany
Remote
Unix
Azure
Docker
Terraform
+4

whitelisthackers GmbH
Bamberg, Germany
Remote