Search for "Aiko " returned 70 results
53 min
Cryptography demystified
An introduction without maths
63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…
44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures
40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
38 min