Search for "Jossi" returned 44 results

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

All cops are broadcasting
63 min

All cops are broadcasting

TETRA unlocked after decades in the shadows

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…