Search for "Jossi" returned 34 results

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

All cops are broadcasting
63 min

All cops are broadcasting

TETRA unlocked after decades in the shadows

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths