Search for "Erik" returned 185 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Ist die Demokratie noch zu retten?
42 min

Ist die Demokratie noch zu retten?

Politikwissenschaftliche Demokratieforschung in der Krise

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

Rückkanal bei der Podcasterei:
82 min

Rückkanal bei der Podcasterei:

Twitter ist tot, Es lebe das Fediverse?!