Search for "Adam Wight"
next
35 min
How (not) to protect private keys
58 min
Ein Computerwurm für PLCs
41 min
And the malware and backdoors that came with it.
47 min
Repurposing an Inmarsat Dish
45 min
Digital Identity Systems in the EU & around the world
65 min
Up and to the right: All the statistics about this event…
61 min
How Astronomy Knew 6 Planets, Then Found 20 More, Then Went…
58 min
Open-Source investigating Tareq Ben Zeyad Brigade and their…
61 min
How to understand the environmental impact of the digital…
61 min
Internet reengineering session
55 min
A gentle introduction to elliptic-curve cryptography
33 min
50 most unwanted retail surveillance technologies / 50 most…
next