Search for "Matt Hardy" returned 231 results

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

Against Metadata
26 min

Against Metadata

Twisting time and space to explore the unknown

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
52 min

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit

Warum das Laden eines Elektroautos unsicher ist

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future