ETHPragueConf 2025

Killing with Keyboards – How Your Digital Footprint Can Be Weaponized
05-27, 12:30–12:55 (CET), Seed

Killing with Keyboards explores real-world scenarios where digital traces—social media posts, blockchain transactions, leaked metadata—become vulnerabilities exploited by hackers, corporations, and state actors. Learn how adversaries think, how data leaks occur, and how to fortify your online presence against those who weaponize information.


Some key takeways:

Your digital footprint is a weapon—against you. Every post, comment, and transaction creates a breadcrumb trail that can be exploited. Understanding how these traces accumulate is the first step to defending yourself.

Attackers don’t need to hack your system if they can hack you. Social engineering, open-source intelligence (OSINT), and metadata leaks are often more effective than brute-force technical exploits.

Small leaks lead to big consequences. A single offhand forum post, a book review, or an outdated profile can be the missing puzzle piece that links your online alias to your real identity.

The adversary isn’t always who you expect. From state actors to financially motivated cybercriminals, your threat model depends on who has a reason to target you—and what they can gain.

Security is a process, not a product. No tool or technology alone will keep you safe. True security comes from understanding how attacks unfold and developing habits that minimize exposure.

I’m a security researcher known for publishing live analyses of major hacks and uncovering countless vulnerabilities during my time at Hacken. Beyond research, my hands-on experience with projects has given me a deep understanding of the operational challenges non-technical founders face when securing their assets. This unique blend of technical expertise and real-world insight now allows me to bridge the gap between cutting-edge security threats and practical defense strategies.