Search for "Kemo" returned 674 results
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online
60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
63 min
Reproducible Builds
Moving Beyond Single Points of Failure for Software…
58 min
The Ultimate Acorn Archimedes talk
Everything about the Archimedes computer (with zero…
58 min
Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…
61 min
Vacuum robot security and privacy
prevent your robot from sucking your data
61 min