Search for "Aiko " returned 71 results

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

All cops are broadcasting
63 min

All cops are broadcasting

TETRA unlocked after decades in the shadows

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database