Search for "sECuRE" returned 715 results

54 min
What Price the Upload Filter?
The history and costs of government exceptional access

63 min
Reproducible Builds
Moving Beyond Single Points of Failure for Software…

57 min
Kryptographie nach Snowden
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

38 min
Turning Chromebooks into regular laptops
With the power of open source!

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

58 min
Virtual Machine Introspection
From the Outside Looking In

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy

21 min
Bootloader Crimes
Building disposable Windows VMs

55 min
SigOver + alpha
Signal overshadowing attack on LTE and its applications

39 min
Should e-voting experience of Estonia be copied?
Observer report of 2023 parliamentary elections

46 min
CounterStrike
Lawful Interception

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

35 min