Search for "Udo Vetter" returned 1176 results

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Dissecting HDMI
63 min

Dissecting HDMI

Developing open, FPGA-based capture hardware for conference…

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Gamified Control?
39 min

Gamified Control?

China's Social Credit Systems

Iridium Update
56 min

Iridium Update

more than just pagers

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Nerds in the news
31 min

Nerds in the news

Spending a year coding in a newsroom

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research