Search for ".yof" returned 7510 results
46 min
Proof by Erasure
The Life of John von Neumann
60 min
Concepts for global TSCM
getting out of surveillance state mode
54 min
Keykeriki V2
Practical Exploitation of Modern Wireless Devices
62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
50 min
Design Noir
The seedy underbelly of electronic engineering
64 min
Covert Communication in a Dark Network
A major new version of freenet
63 min
Reconstructing narratives
transparency in the service of justice
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
21 min