Search for "sECuRE"

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

How to Hack Your Way to Space
61 min

How to Hack Your Way to Space

Bringing the Hacker Mindset to the Space Ecosphere - The…

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…