Search for "olf" returned 7202 results

How to generate a network protocol stack
94 min

How to generate a network protocol stack

Practical application of writing software generators

nettools
21 min

nettools

A collection of network configuration libraries

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

Portuguese Electoral System Autopsy
33 min

Portuguese Electoral System Autopsy

Taking political advantage of rounding errors

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Keykeriki V2
54 min

Keykeriki V2

Practical Exploitation of Modern Wireless Devices

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Design Noir
50 min

Design Noir

The seedy underbelly of electronic engineering

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice