Search for "374" returned 1991 results

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Verhalten bei Hausdurchsuchungen
61 min

Verhalten bei Hausdurchsuchungen

Praktische Hinweise für den Kontakt mit der Staatsmacht

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Security Nightmares 0x14
70 min

Security Nightmares 0x14

Was Sie schon immer nicht über darüber wissen wollten wer…

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems