Search for "Ben H." returned 5853 results
60 min
Beyond your cable modem
How not to do DOCSIS networks
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
61 min
Copywrongs 2.0
We must prevent EU copyright reform from breaking the…
87 min
DNS privacy and security
Chaos Colloquium #1
56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…
61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications
55 min
Managing and Monitoring Ceph with the Ceph Dashboard
Introduction / Overview and Demo
35 min
Wallet Security
How (not) to protect private keys
60 min
Simulating Universes
What Virtual Universes Can Tell Us About Our Own
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
57 min
Eating in the Anthropocene
Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
58 min
Baseband Exploitation in 2013
Hexagon challenges
37 min
Code BROWN in the Air
A systemic update of sensitive information that you sniff…
37 min
DON’T PANIC
bytes, blocks, bugs
36 min