Search for "Kylli Ek"
44 min
Tech unexeptionalism and the monopolization of every…
37 min
Don't ask what you can do for TPMs, Ask what TPMs can do…
40 min
Techniques - Tools - Tricks
32 min
Automatic detection of key-reuse vulnerabilities
60 min
...or why adding BTLE to a device sometimes isn't smart at…
53 min
An introduction without maths
44 min
teaching a new dog old tricks
58 min
Breaking PDF Encryption and PDF Signatures
44 min
Lesung des öffentlichen Sourcecodes
29 min
Technical Teardown of the Pegasus malware and Trident…
46 min
--Gaining code execution using a malicious SQLite database
59 min
A complete toolbox for IoT security