Search for "W. Heck" returned 1207 results

55 min
Attribution revolution
Turning copyright upside-down with metadata

60 min
Wind: Off-Grid Services for Everyday People
Integrating nearby and offline connectivity with the…

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data

37 min
Inside the AMD Microcode ROM
(Ab)Using AMD Microcode for fun and security

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets

16 min
Decent Patterns
an Open UX Library for Decentralisation

40 min
Intercoms Hacking
Call the frontdoor to install your backdoors

36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy

51 min
The GNU Name System
A Decentralized PKI For Social Movements

41 min
SCADA StrangeLove 2
We already know

58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

49 min
Pick and Pain.
Oder: Wie oft man innerhalb eines Projektes scheitern kann.

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

57 min