Search for "anna"

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

We do Privacy by Design
42 min

We do Privacy by Design

Best practices and real-life examples

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

Uncertain Concern
58 min

Uncertain Concern

How Undocumented Immigrants in the US Navigate Technology

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Lightning Talks II
31 min

Lightning Talks II

DeepVGI - Einsatz von Lowcost-Lidarsystemen für die…

Internet of Fails
59 min

Internet of Fails

Where IoT has gone wrong

Grow your own planet
61 min

Grow your own planet

How simulations help us understand the Universe

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…