Search for "Loic"
prev
next
62 min
Building the First Monero Hardware Wallet
43 min
How to Stop the Dubious Use of Passenger Name Records by…
36 min
Hardware implants in the supply-chain
38 min
Estimating the costs of algorithms for attacks and defense…
35 min
Taking a look at a covert CIA virtual fencing solution
36 min
Hardware hacking tooling for the new iPhone generation
41 min
A Dive into Reverse Engineering and Understanding the iPod…
60 min
A dive into the foundations of hardware reverse engineering…
46 min
--Gaining code execution using a malicious SQLite database
42 min
Dissecting FPGAs from bottom up, extracting schematics and…
prev
next