Search for "11" returned 4565 results

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition

Opening
12 min

Opening

Die offizielle Eröffnung des Chaos.

Finfisher verklagen
59 min

Finfisher verklagen

Rechtsbrüche beim Export von Überwachungssoftware

BBSs and early Internet access in the 1990ies
61 min

BBSs and early Internet access in the 1990ies

Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…