Search for "Jason" returned 204 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Opencoil
56 min

Opencoil

PART II: disrupting disruption

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

The Price Of Dissent
62 min

The Price Of Dissent

The surveillance state & modern day COINTELPRO tactics

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority