Search for "Elli"

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Hacker Jeopardy
95 min

Hacker Jeopardy

Zahlenraten für Geeks

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Rettet uns die KI?
42 min

Rettet uns die KI?

Über die Zukunft der digitalen Inklusion

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Art against Facebook
40 min

Art against Facebook

Graffiti in the ruins of the feed and the…

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Fnord-Jahresrückblick-Rückblick
109 min

Fnord-Jahresrückblick-Rückblick

20 Jahre Fnord-Jahresrückblick!