Search for "Paul Wouters"

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers

Our Time in a Product Review Cabal
41 min

Our Time in a Product Review Cabal

And the malware and backdoors that came with it.

The Internet in Cuba: A Story of Community Resilience
58 min

The Internet in Cuba: A Story of Community Resilience

Get a unique tour of some of the world’s most unusual…

All Our Shared Spectrum Are Belong to Us
30 min

All Our Shared Spectrum Are Belong to Us

Visualizing WLAN Channel Usage on OpenWRT

Holography of Wi-Fi radiation
61 min

Holography of Wi-Fi radiation

Can we see the stray radiation of wireless devices? And…

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice