Search for "marc" returned 970 results

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Writing secure software
46 min

Writing secure software

using my blog as example

LabIX
43 min

LabIX

Creating an Internet Exchange in your local Hackerspace

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Saving the World with Space Solar Power
25 min

Saving the World with Space Solar Power

or is it just PEWPEW?!

All cops are broadcasting
63 min

All cops are broadcasting

TETRA unlocked after decades in the shadows

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Synthetic Sentience
63 min

Synthetic Sentience

Can Artificial Intelligence become conscious?

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

How to teach programming to your loved ones
59 min

How to teach programming to your loved ones

Enabling students over example-driven teaching