Search for "Shane" returned 1308 results

Ein Abgrund von Landesverrat
60 min

Ein Abgrund von Landesverrat

Wie es dazu kam und was daraus zu lernen ist

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Hello World!
57 min

Hello World!

How to make art after Snowden?

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Space Ops 101
62 min

Space Ops 101

An introduction to Spacecraft Operations

Software Defined Emissions
60 min

Software Defined Emissions

A hacker’s review of Dieselgate

CounterStrike
46 min

CounterStrike

Lawful Interception

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux