Search for "Sven" returned 2036 results

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

61 min
"The" Social Credit System
Why It's Both Better and Worse Than We can Imagine

33 min
The Transhumanist Paradox
Deciding between technological utopias in a liberal state

61 min
Uncaging Microchips
Techniques for Chip Preparation

39 min
The Eye on the Nile
Egypt's Civil Society Under Attack

32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…

30 min
The ArduGuitar
An Arduino Powered Electric Guitar

42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks

64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

55 min