Search for "Evan Roth"
How you can communicate, free running style, using nothing…
Doing something cool with minimum time.
The science it takes to build a multi-threaded, clustered…
Collecting host, docker and container logs centrally
Bitcoin: Privacy and Censorship Resistance Beyond the Web
Can we see the stray radiation of wireless devices? And…
Fun with lattices in cryptography and cryptanalysis
Forcing the Netherlands to publicly debate privacy and the…
Extending capability-based security models to achieve…
Vulnerabilities in the EMV Protocol