Search for "feh" returned 1834 results
42 min
Mapping Doomsday
Using OSINT to monitor and predict environmental conflicts
41 min
Locked up science
Tearing down paywalls in scholarly communication
31 min
TrustZone is not enough
Hijacking debug components for embedded security
62 min
Kyber and Post-Quantum Crypto
How does it work?
45 min
A mobile phone that respects your freedom
Experiences and lessons learned from 2 years of development…
40 min
The Great Escape of ESXi
Breaking Out of a Sandboxed Virtual Machine
47 min
OWASP Raider
a novel framework for manipulating HTTP processes of…
41 min
Build a Fake Phone, Find Real Bugs
Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
67 min
Watching the Watchers - How Surveillance Companies track you using Mobile Networks
Real life experiences from the Location Tracking Wars
53 min