Search for "fh"

re_cycle
47 min

re_cycle

Trash the prints, print the trash

Hacking the Czech Parliament via SMS
39 min

Hacking the Czech Parliament via SMS

A parliamentary drama of 223 actors

SiliVaccine: North Korea's Weapon of Mass Detection
52 min

SiliVaccine: North Korea's Weapon of Mass Detection

How I Learned to Stop Worrying and Love the Backdoor

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Der Pfad von 4G zu 5G
60 min

Der Pfad von 4G zu 5G

Die Luftschnittstelle und das Core im Wandel der Zahlen

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…