Search for "Hedi" returned 103 results

36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

62 min