Search for "Max" returned 4592 results

Little Services, Big Risks
34 min

Little Services, Big Risks

Extending capability-based security models to achieve…

SatNOGS: Crowd-sourced satellite operations
28 min

SatNOGS: Crowd-sourced satellite operations

Satellite Open Ground Station Network

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities