Search for "Leli" returned 79 results
44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
60 min
Das Zahnrad aus Fleisch
Expeditionen ins Kommentierreich
36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…
58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures
62 min
Kyber and Post-Quantum Crypto
How does it work?
61 min
Email authentication for penetration testers
When SPF is not enough
63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows
53 min
Cryptography demystified
An introduction without maths
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
58 min