Search for "Jakob" returned 123 results

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research