Search for "Jim" returned 5093 results

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Holography of Wi-Fi radiation
61 min

Holography of Wi-Fi radiation

Can we see the stray radiation of wireless devices? And…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

The nextpnr FOSS FPGA place-and-route tool
46 min

The nextpnr FOSS FPGA place-and-route tool

the next step forward in open source FPGA tools

"The" Social Credit System
61 min

"The" Social Credit System

Why It's Both Better and Worse Than We can Imagine

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

CounterStrike
46 min

CounterStrike

Lawful Interception

How medicine discovered sex
54 min

How medicine discovered sex

Introduction to sex- and gender-sensitive medicine

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device