Search for person "Peter van Eijk" returned 262 results

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

38 min
Der Inhalt dieses Vortrags ist in deinem Land leider nicht verfügbar.
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…

64 min
Sovereign Keys
A proposal for fixing attacks on CAs and DNSSEC

51 min
iOS application security
A look at the security of 3rd party iOS applications

56 min
USB and libusb
So much more than a serial port with power

60 min
Data Recovery Techniques
Fun with Hard Drives

73 min
hacking smart phones
expanding the attack surface and then some

58 min
Is the SSLiverse a safe place?
An update on EFF's SSL Observatory project

70 min
coreboot: Adding support for a system near you
Working with the open source BIOS replacement and getting a…

78 min
Radio der Zukunft
Was kommt nach dem analogen Radio?

83 min
Software-Patente. Nicht schon wieder!
Es geht wieder los. Diesmal ist es aber vielleicht das…

50 min
coreboot: Beyond The Final Frontier
Open source BIOS replacement with a radical approach to…

44 min
Why technology sucks
If technology is the solution, politicians are the problem

63 min
Rechtsfragen freier Geodaten-Projekte
Ungelöste Fragen und Fallstricke

57 min
C64-DTV Hacking
Revisiting the legendary computer in a joystick

53 min
Crouching Powerpoint, Hidden Trojan
An analysis of targeted attacks from 2005 to 2007

42 min