Search for "Kat" returned 5493 results
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
60 min
Crypto Wars Part II
The Empires Strike Back
62 min
A New Kid on the Block
Conditions for a Successful Market Entry of Decentralized…
58 min
Virtual Machine Introspection
From the Outside Looking In
31 min
BGP and the Rule of Custom
How the internet self-governs without international law
30 min
Information Control and Strategic Violence
How governments use censorship and surveillance as part of…
43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
60 min