Search for "Max" returned 4750 results

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

About Gamma-Ray Bursts And Boats
61 min

About Gamma-Ray Bursts And Boats

What We (Don't) Know About the Most Energetic Events in the…

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Develop Secure Software - The DevGuard Project
59 min

Develop Secure Software - The DevGuard Project

OSS Security von Entwicklern für Entwickler

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized