Search for "Andi Rüther" returned 665 results

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

The Moon and European Space Exploration
32 min

The Moon and European Space Exploration

Refocusing on the moon as a platform for future deep space…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

G’scheitern
60 min

G’scheitern

The art of failure taught by improv theatre

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

The Tor Network
62 min

The Tor Network

We're living in interesting times

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.