Search for "sECuRE"

Please Identify Yourself!
45 min

Please Identify Yourself!

Digital Identity Systems in the EU & around the world

Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Uncertain Concern
58 min

Uncertain Concern

How Undocumented Immigrants in the US Navigate Technology

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Iridium Update
56 min

Iridium Update

more than just pagers

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster