Search for "mel" returned 2374 results

122 min
Lightning Talks Day 3
Lightning Talks

44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks

29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…

59 min
Talking Behind Your Back
On the Privacy & Security of the Ultrasound Tracking…

32 min
A Data Point Walks Into a Bar
How cold data can make you feel things.

63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

62 min
33C3 Infrastructure Review
The usual extremely factual look behind the scenes of this…

33 min
Gone in 60 Milliseconds
Intrusion and Exfiltration in Server-less Architectures

60 min
Privatisierung der Rechtsdurchsetzung
Was der Anti-Terror-Kampf von der Urheberrechtsdurchsetzung…

61 min
Copywrongs 2.0
We must prevent EU copyright reform from breaking the…

36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy

36 min
Wheel of Fortune
Analyzing Embedded OS Random Number Generators

34 min
Haft für Whistleblower?
Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. §…

33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…

29 min
Edible Soft Robotics
An exploration of candy as an engineered material

40 min
Intercoms Hacking
Call the frontdoor to install your backdoors

53 min