Search for "olf" returned 7202 results
94 min
How to generate a network protocol stack
Practical application of writing software generators
30 min
Shut Up and Take My Money!
The Red Pill of N26 Security
46 min
Secure Instant Messaging
Suppression of secure communications by governments
33 min
Portuguese Electoral System Autopsy
Taking political advantage of rounding errors
46 min
Proof by Erasure
The Life of John von Neumann
60 min
Concepts for global TSCM
getting out of surveillance state mode
54 min
Keykeriki V2
Practical Exploitation of Modern Wireless Devices
62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
50 min
Design Noir
The seedy underbelly of electronic engineering
64 min
Covert Communication in a Dark Network
A major new version of freenet
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
63 min