Search for "Erik E."

G’scheitern
60 min

G’scheitern

The art of failure taught by improv theatre

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online