Search for "Leli"

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
58 min

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn

E-ID, E-Voting, Netzsperren und andere netzpolitische…

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Weil „be excellent to each other” nicht reicht
61 min

Weil „be excellent to each other” nicht reicht

Über die Strukturen im Hintergrund: Awareness-Team und…

Methodisch inkorrekt!
128 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 32C3

MicroPython – Python for Microcontrollers
41 min

MicroPython – Python for Microcontrollers

How high-level scripting languages make your hardware…

37C3 Infrastructure Review
71 min

37C3 Infrastructure Review

Teams presenting how they helped making this awesome event

Flutter
48 min

Flutter

performant cross platform development using modern…