Search for "Matteo" returned 677 results
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
44 min
Replication Prohibited
3D printed key attacks
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
62 min
Kyber and Post-Quantum Crypto
How does it work?
61 min
Copywrongs 2.0
We must prevent EU copyright reform from breaking the…
61 min
An Elevator to the Moon (and back)
Space Transportation and the Extraterrestrial Imperative
63 min
Building Custom Pinball Machines
What you need and how it works. An experiences report
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
61 min
Now I sprinkle thee with crypto dust
Internet reengineering session
60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…
61 min
Correcting copywrongs
European copyright reform is finally on the horizon
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
55 min