Search for "Sec" returned 2527 results

60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

36 min
Apple's iPhone 15: Under the C
Hardware hacking tooling for the new iPhone generation

37 min
Digitale Rohstoffe erhalten sich anders
Über Ampeln und den Erhalt eines Rohstoffes namens Software

53 min
Self-cannibalizing AI
Artistic Strategies to expose generative text-to-image…

58 min
Firebird Open Source Database Quick Start
Why Firebird is a powerful alternative database system

44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…

41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…

40 min
Fuzz Everything, Everywhere, All at Once
Advanced QEMU-based fuzzing

71 min
37C3 Infrastructure Review
Teams presenting how they helped making this awesome event

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

41 min
Demoscene now and then
The demoscene is an underground computer art culture.

31 min
Extended DNA Analysis
Political pressure for DNA-based facial composites

46 min