Search for "Jella" returned 83 results

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

46 min
Free Software
Software Design For The Environment

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Lifting the Fog on Red Star OS
A deep dive into the surveillance features of North Korea's…

61 min
AlphaFold – how machine learning changed structural biology forever (or not?)
Getting first-hand insights into the impact of machine…

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

60 min
Mein Bot, der Kombattant
Operative Kommunikation im digitalen Informationskrieg

40 min
Psychedelic Medicine - Hacking Psychiatry?!
Psychedelic Therapy as a fundamentally new approach to…

113 min