Search for "Saud Al-Zaid" returned 1113 results
31 min
Sysadmins of the world, unite!
a call to resistance
60 min
Wind: Off-Grid Services for Everyday People
Integrating nearby and offline connectivity with the…
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
35 min
Understanding millions of gates
Introduction to IC reverse engineering for…
59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
57 min
"Fluxus cannot save the world."
What hacking has to do with avantgarde art of the 1960ies…
36 min
Modchips of the State
Hardware implants in the supply-chain
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
32 min
Verified Firewall Ruleset Verification
Math, Functional Programming, Theorem Proving, and an…
61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets
38 min