Search for "Sven" returned 1989 results

103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

55 min
Cyber Necromancy
Reverse Engineering Dead Protocols

55 min
Attribution revolution
Turning copyright upside-down with metadata

58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…

61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets

24 min
The Four Wars
Terror, whistleblowers, drugs, internet

53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild

66 min
31C3 Keynote
A New Dawn

43 min
WTF DJI, UAV CTF?!
A hacker's view at commercial drone security

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

33 min
Interplanetary Colonization
the state at the beginning of the 21st Century

57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle

33 min
Global Civil Society Under Attack
Reports from the Frontlines

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

49 min