Search for "Tim Sutton" returned 305 results

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

43 min
#NoPNR – Let’s kill the next Data Retention Law
How to Stop the Dubious Use of Passenger Name Records by…

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

29 min
Ecstasy 10x yellow Twitter 120mg Mdma
Shipped from Germany for 0.1412554 Bitcoins

61 min
Vacuum robot security and privacy
prevent your robot from sucking your data

58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data

51 min
How to drift with any car
(without your mom yelling at you)

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…

33 min
Structuring open hardware projects
experiences from the “i3 Berlin” 3D printer project with…

29 min
The Urban Organism
Hacking [in] Hong Kong

41 min