Search results
Born in the shadow of World War II, in the city of Los Angeles, Walt’s journey began innocently during visits to his grandparents’ home. At the age of four, his Grandma Mamy, a seamstress, would secretly dress him in a purple chiffon dress. She made him feel special in that dress.
3 days ago · Who Am I Movie Review: Based on the novel “Ko Aham” by Ashok Jamnani, a philosophy student considers existential questions that lead him on an introspective quest. Bhavitavya, a philosophy...
A sort of wikifreaks noir cyber-thriller involving hacker geeks high on Ritalin, a sour female spy with a malfunctioning uterus, multiple hacker wars that may have confounded even Julian Assange ...
Jan 31, 2023 · Review: Set on the banks of river Narmada, ‘Who Am I’ opens with a static shot of a young pandit taking a dip into the placid waters of India’s iconic river. It sets the tone for an unhurried screenplay with a slow-moving narrative that unfolds a surprise or two, along the way and many moments of patiently waiting for things to happen.
- Shireesh Khemariya
- Ronak Kotecha
Recognized by CIA agent Morgan (Ron Smerczak), Whoami learns covert operatives have sent assassins to eliminate him, and the martial arts footwork gets fancy with Whoami heading to Rotterdam in hopes of recovering his memory.
Feb 26, 2021 · Who Am I Ending, Explained. Pratik Handore. February 26, 2021. ‘Who Am I: No System Is Safe’ is a German techno-thriller film directed by Baran bo Odar. It tells an intricately woven tale of a hacker who gets entangled in a plot of murder and seeks to clear his name. The film is notable for its visual depiction of technical aspects of hacking.
People also ask
Who Am I based on a true story?
What is 'who Am I' about?
What happens at the end of 'who Am I'?
What does Benjamin learn from 'who Am I'?
Who is a good actor for Swamiji?
The more appealing, sugar coated solution is WHOAMI, a whip-smart, stylish film with a plot that manages to ground its action in some tech information that pays more than just lip service to the reality of cyber crime.