Events for tag "Security & Hacking"
You have a tracking device in your pocket
A gentle introduction to elliptic-curve cryptography
How did GCHQ do it to the Guardian's copy of Snowden's…
Moving Beyond Single Points of Failure for Software…
How to retrieve secret keys without going bankrupt
Gefahren von Kameras für (biometrische)…
Is Your Document Telling on You?
Get a verifiable path from source to binary
From the Outside Looking In
A Certificate Authority To Encrypt the Entire Web
Und nichts (Secure) Bootet mehr?
Automatic detection of key-reuse vulnerabilities
Internet reengineering session
The untold story of what really happened, how it was…
Do you care about Matroshka processors?
How to freely share research without being arrested
How Man-in-the-Middle filtering solutions harm the security…
Targeted threats to civil society
Stop being tracked online
Piecing together the missing bits
Techniques for Chip Preparation
A Journey to Coax Out Chips' Inner Secrets
A Deep Technical Analysis
What went wrong, how the Internet reacted, what we can…
New Bleichenbacher Side Channels and Attacks
Industrial System Ownership
Reverse Engineering Dead Protocols
Chasing GRX and SS7 vulns
... or how we battle the daemons of memory safety