Search for "sECuRE" returned 800 results

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Advanced Hexagon Diag
66 min

Advanced Hexagon Diag

Harnessing diagnostics for baseband vulnerability research

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor