Search for "W. Heck" returned 1207 results

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets

Decent Patterns
16 min

Decent Patterns

an Open UX Library for Decentralisation

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Traue keinem Scan, den du nicht selbst gefälscht hast
63 min

Traue keinem Scan, den du nicht selbst gefälscht hast

"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

Pick and Pain.
49 min

Pick and Pain.

Oder: Wie oft man innerhalb eines Projektes scheitern kann.

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge