Search for "sap" returned 2887 results
58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers
38 min
All Sorted by Machines of Loving Grace?
"AI", Cybernetics, and Fascism and how to Intervene
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
41 min
Ten Years of Rowhammer:
A Retrospect (and Path to the Future)
29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…
50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…
61 min
The architecture of a street level panopticon
How drones, IMSI Catchers, and cameras are shaping our…
62 min
Internet, the Business Side
a try to explain the ecosystem
61 min