If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
I somehow can't stop myself from talking about emoji at conferences. And I don't even use those things that much. Well, I don't use them that much for what they're for. I generally put them in places where they are unexpected and watch stuff break.
However, I don't only want to be "that emoji person", so for this talk, I want to start with some info about emoji, and some developments that have happened since my [talk at this year's GPN](https://media.ccc.de/v/gpn20-6-breaking-things-with-emoji-), but then move on to some more advanced topics like SQL injections, XSS and buffer overflows. All of that explained on a somewhat surface level so that people who don't know much about hacking can still follow and get some value out of the talk.