Search for "Sven" returned 2036 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

"The" Social Credit System
61 min

"The" Social Credit System

Why It's Both Better and Worse Than We can Imagine

The Transhumanist Paradox
33 min

The Transhumanist Paradox

Deciding between technological utopias in a liberal state

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Think big or care for yourself
32 min

Think big or care for yourself

On the obstacles to think of emergent technologies in the…

LabIX
43 min

LabIX

Creating an Internet Exchange in your local Hackerspace

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

It Always Feels Like the Five Eyes Are Watching You
64 min

It Always Feels Like the Five Eyes Are Watching You

Five Eyes’ Quest For Security Has Given Us Widespread…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration