Search for "19" returned 4468 results

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Ecuador: how an authoritarian government is fooling the entire world
51 min

Ecuador: how an authoritarian government is fooling the entire world

Guess what? The Government of Rafael Correa actually is…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

Social Cooling - big data’s unintended side effect
34 min

Social Cooling - big data’s unintended side effect

How the reputation economy is creating data-driven…

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography