Search for "Elke Manz" returned 1056 results

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Regulating Autonomous Weapons
25 min

Regulating Autonomous Weapons

The time travelling android isn’t even our biggest problem

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

WTFrance
31 min

WTFrance

Decrypting French encryption law

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

From Maxwell to antenna arrays
53 min

From Maxwell to antenna arrays

How 150 year old equations still help to communicate

Tightening the Net in Iran
47 min

Tightening the Net in Iran

The Situation of Censorship and Surveillance in Iran, and…

Free Electron Lasers
59 min

Free Electron Lasers

...or why we need 17 billion Volts to make a picture.

Media Coverage and the Public in the Surveillance Society
60 min

Media Coverage and the Public in the Surveillance Society

Findings from a Research Project on Digital Surveillance…

Avoiding kernel panic: Europe’s biggest fails in digital policy-making
61 min

Avoiding kernel panic: Europe’s biggest fails in digital policy-making

How the institutions fuck up, and how we fuck it up as well

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

Corona-Warn-App
41 min

Corona-Warn-App

Behind the scenes: Invisible, yet important

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Hacking how we see
58 min

Hacking how we see

A way to fix lazy eye?

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…