Search for "sECuRE"

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

CounterStrike
46 min

CounterStrike

Lawful Interception

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows