Search for "Udo Vetter" returned 1119 results

91 min
What the World can learn from Hongkong
From Unanimity to Anonymity

53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

41 min
Framing digital industry into planetary limits and transition policies
The environmental costs of digital industry and pathways to…

55 min
The DROWN Attack
Breaking TLS using SSLv2

47 min
The KGB Hack: 30 Years Later
Looking back at the perhaps most dramatic instance of…

32 min
Technology and Mass Atrocity Prevention
Overview on Current Efforts - We Need Moar H4x0rs?!

49 min
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism

44 min
Replication Prohibited
3D printed key attacks

49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?

60 min
Media Coverage and the Public in the Surveillance Society
Findings from a Research Project on Digital Surveillance…

59 min