Search for "Phil" returned 54 results

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

46 min
Digital Airwaves
Software Defined Radio Basics and some Modulation Theory

60 min
Inside the Fake Like Factories
How thousands of Facebook, You Tube and Instagram pages…

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

57 min
Hello World!
How to make art after Snowden?

61 min
BBSs and early Internet access in the 1990ies
Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

61 min
Vacuum robot security and privacy
prevent your robot from sucking your data

37 min
Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
Massenüberwachung, Netzsperren und andere netzpolitische…

56 min