Search for "sECuRE"
prev
next
45 min
Digital Identity Systems in the EU & around the world
32 min
A long way to a vibrant future
22 min
On Fitbit Firmware Modifications and Data Extraction
58 min
Intimiditation surveillance and other tactics observed and…
58 min
How Undocumented Immigrants in the US Navigate Technology
30 min
IT security is largely a science-free field. This needs to…
38 min
Dissecting the radio protocol of Sigfox, the global…
61 min
Survey of Network Anonymisation Techniques
49 min
Security notions, proofs and attacks using dependently…
60 min
getting out of surveillance state mode
25 min
Destroying data as a performative act
49 min
How to turn your KVM into a raging key-logging monster
prev
next