Search for "Seth Hardy" returned 899 results

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Hello World!
57 min

Hello World!

How to make art after Snowden?

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

No USB? No problem.
57 min

No USB? No problem.

How to write an open source bit-bang low-speed USB stack…

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Hacking as Artistic Practice
33 min

Hacking as Artistic Practice

!Mediengruppe Bitnik about their recent works

Magic Lantern
64 min

Magic Lantern

Free Software on Your Camera

Netzpolitik in der Schweiz 2016
62 min

Netzpolitik in der Schweiz 2016

Grundrechte per Volksentscheid versenken

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…