Search for "Jella" returned 83 results

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Psychedelic Medicine - Hacking Psychiatry?!
40 min

Psychedelic Medicine - Hacking Psychiatry?!

Psychedelic Therapy as a fundamentally new approach to…