Search for "big data"

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Ecstasy 10x yellow Twitter 120mg Mdma
29 min

Ecstasy 10x yellow Twitter 120mg Mdma

Shipped from Germany for 0.1412554 Bitcoins

The Ultimate Amiga 500 Talk
53 min

The Ultimate Amiga 500 Talk

Amiga Hardware Design And Programming

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

Planes and Ships and Saving Lives
56 min

Planes and Ships and Saving Lives

How soft and hardware can play a key role in saving lives…

DevOps but for artworks in museums
61 min

DevOps but for artworks in museums

A look into pipelines ending in museums and not in the cloud

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system