Search for person "Jeroen van der Ham" returned 117 results

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

61 min
X Security
It's worse than it looks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

38 min
Der Inhalt dieses Vortrags ist in deinem Land leider nicht verfügbar.
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…

60 min
What is WhiteIT and what does it aim for?
Why you probably want to be concerned about it and similiar…

51 min
iOS application security
A look at the security of 3rd party iOS applications

58 min
How the Internet sees you
demonstrating what activities most ISPs see you doing on…

73 min
hacking smart phones
expanding the attack surface and then some

44 min
Why technology sucks
If technology is the solution, politicians are the problem

53 min