Search for "David" returned 316 results

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

A Tale of Two Leaks:
31 min

A Tale of Two Leaks:

How Hackers Breached the Great Firewall of China

Media Coverage and the Public in the Surveillance Society
60 min

Media Coverage and the Public in the Surveillance Society

Findings from a Research Project on Digital Surveillance…

Chaos Communication Chemistry
41 min

Chaos Communication Chemistry

DNA security systems based on molecular randomness

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Hello World!
57 min

Hello World!

How to make art after Snowden?

Routerzwang und Funkabschottung
60 min

Routerzwang und Funkabschottung

Was Aktivisten davon lernen können

The KGB Hack: 30 Years Later
47 min

The KGB Hack: 30 Years Later

Looking back at the perhaps most dramatic instance of…

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time