Search for "Victor Toso" returned 173 results

61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption

30 min
On Computing Numbers, with an Application to Problems of our Society
Journalism ♥ Computer Science

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

64 min
Cory Doctorow – Fireside Chat
Reading and Q&A

61 min
How to Hack Your Way to Space
Bringing the Hacker Mindset to the Space Ecosphere - The…

42 min
Union Busting
What is it and why you should care

55 min
Cat & Mouse: Evading the Censors in 2018
Preserving access to the open Internet with circumvention…

60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits

53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…

56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…

63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…

38 min
Unpacking the compromises of Aadhaar, and other digital identities inspired by it
Governments around the world are implementing digital…

48 min
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
How to bring student experiments into space.

60 min
Concepts for global TSCM
getting out of surveillance state mode

58 min