
58 min
How to Destroy a Laptop with Top Secrets
How did GCHQ do it to the Guardian's copy of Snowden's…

31 min
Update: Vor Windows10 Update Warnung
Update (Patch) Debakel

55 min
How to make your software build reproducibly
Get a verifiable path from source to binary

46 min
Bugged Files
Is Your Document Telling on You?

28 min
Hardware attacks: hacking chips on the (very) cheap
How to retrieve secret keys without going bankrupt

48 min
Advanced interconnect attacks
Chasing GRX and SS7 vulns

30 min
Privacy Badger
Stop being tracked online

42 min
Let's Encrypt
A Certificate Authority To Encrypt the Entire Web

29 min
Jumping the Paywall
How to freely share research without being arrested

52 min
TLS interception considered harmful
How Man-in-the-Middle filtering solutions harm the security…

56 min