Search for "York University" returned 454 results

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…

Firmware Fat Camp
42 min

Firmware Fat Camp

Embedded Security Using Binary Autotomy

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics