Search for person "Andy Mueller-Maguhn"
next![Unlocked! Recovering files taken hostage by ransomware](https://static.media.ccc.de/media/congress/2023/11903-e9c56ad8-612e-4d2e-ab2b-2c5196b49196.jpg)
40 min
Unlocked! Recovering files taken hostage by ransomware
Decrypting files hijacked by the "second most used…
![CIA vs. Wikileaks](https://static.media.ccc.de/media/events/rc3/11512-52f30691-75bc-4759-94a5-ce2225c1e849.jpg)
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
![Technical aspects of the surveillance in and around the Ecuadorian embassy in London](https://static.media.ccc.de/media/congress/2019/11247-hd.jpg)
64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks
![Kernel Tracing With eBPF](https://static.media.ccc.de/media/congress/2018/9532-hd.jpg)
54 min
Kernel Tracing With eBPF
Unlocking God Mode on Linux
![Towards a more secure operating system without sacrificing usability](https://static.media.ccc.de/media/events/froscon/2017/2039-hd.jpg)
57 min
Towards a more secure operating system without sacrificing usability
aka the GNOME challenge:
![How Alice and Bob meet if they don't like onions](https://static.media.ccc.de/media/congress/2017/9104-hd.jpg)
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
![CyberMorning Show](https://static.media.ccc.de/media/events/gpn/gpn17/8580-hd.jpg)
136 min