Search for "Andi Rüther" returned 665 results

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

33 min
Turing Complete User
What can be done to protect the term, the notion and the…

32 min
The Moon and European Space Exploration
Refocusing on the moon as a platform for future deep space…

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

53 min
When algorithms fail in our personal lives
Social media break up coordinator

52 min
Leaving legacy behind
Reducing carbon footprint of network services with MirageOS…

54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?

60 min
Let's reverse engineer the Universe
exploring the dark

60 min
G’scheitern
The art of failure taught by improv theatre

60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

91 min
What the World can learn from Hongkong
From Unanimity to Anonymity

62 min
The Tor Network
We're living in interesting times

51 min
The GNU Name System
A Decentralized PKI For Social Movements

55 min
Attribution revolution
Turning copyright upside-down with metadata

60 min