Search for "xian"

Nintendo hacking 2023: 2008
42 min

Nintendo hacking 2023: 2008

Finishing off the Nintendo DSi

What I Learned from Loab: AI as a creative adversary
36 min

What I Learned from Loab: AI as a creative adversary

The artist behind the viral cryptid "Loab" reflects on her…

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Fnord-Jahresrückblick-Rückblick
109 min

Fnord-Jahresrückblick-Rückblick

20 Jahre Fnord-Jahresrückblick!

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database