Search for "Aiko " returned 72 results
53 min
Cryptography demystified
An introduction without maths
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…
61 min
Email authentication for penetration testers
When SPF is not enough
44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks
58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures
46 min