Search for "Sven" returned 1989 results

Comparison of WAN IGP protocols
103 min

Comparison of WAN IGP protocols

RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets

The Four Wars
24 min

The Four Wars

Terror, whistleblowers, drugs, internet

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics