Search for "Seth Hardy" returned 828 results

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

How to Hack Your Way to Space
61 min

How to Hack Your Way to Space

Bringing the Hacker Mindset to the Space Ecosphere - The…

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

FIDO2
48 min

FIDO2

the superior Multi Factor Authentication Framework

Computational Meta-Psychology
61 min

Computational Meta-Psychology

An Artificial Intelligence exploration into the creation of…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?