Search for "Udo Vetter" returned 1119 results

60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)

60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

30 min
On Computing Numbers, with an Application to Problems of our Society
Journalism ♥ Computer Science

56 min
Iridium Update
more than just pagers

61 min
Vacuum robot security and privacy
prevent your robot from sucking your data

57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics

59 min
Provable Security
How I learned to stop worrying and love the backdoor

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

62 min
Let's Encrypt
A Free Robotic Certificate Authority

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

33 min
Turing Complete User
What can be done to protect the term, the notion and the…

42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years

46 min
Free Software
Software Design For The Environment

60 min
Windows drivers attack surface
some 'new' insights

72 min