Search for "Naman Jain" returned 113 results
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
58 min
Angry weather ?
How human-induced climate change affects weather (& how we…
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
61 min
Email authentication for penetration testers
When SPF is not enough
53 min
Cryptography demystified
An introduction without maths
32 min
The Case for Scale in Cyber Security
Security Track Keynote
62 min
Kyber and Post-Quantum Crypto
How does it work?
60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist
44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…
61 min