Search for "Finn" returned 1932 results

41 min
Back in the Driver's Seat
Recovering Critical Data from Tesla Autopilot Using Voltage…

42 min
Hacking the Nintendo Game & Watch
Your princess is AES encrypted in another castle

60 min
Shopshifting
The potential for payment system abuse

35 min
Internet of toilets
Trends in the sanitarian territory

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

61 min
Breaking "DRM" in Polish trains
Reverse engineering a train to analyze a suspicious…

58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

39 min
Should e-voting experience of Estonia be copied?
Observer report of 2023 parliamentary elections

42 min
Union Busting
What is it and why you should care

65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

29 min
The Urban Organism
Hacking [in] Hong Kong

50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…

56 min