Search for person "Werner Van Belle"
prev
next
58 min
I measured 60% of the DNS, and I found this
60 min
Advanced Rowhammer exploitation on cloud, desktop, and…
53 min
NLNet sponsored (open hardware) trusted boot module
60 min
Geheimdienste kontrolliert man am besten, indem man ihre…
62 min
Interconnecting Web browsers using WebRTC
61 min
How the institutions fuck up, and how we fuck it up as well
45 min
Human-computer-synchronizations
28 min
or how we learned to stop worrying and love the NSA
58 min
Export controls and exploit regulations: braindead and…
29 min
Several failure modes of the hacker scene
61 min
Internet reengineering session
58 min
An overview of a mobile telephony market and how a…
56 min
Integrierte Open Source Webanalyse
55 min
The key elements of policy hacking
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
51 min
A look at the security of 3rd party iOS applications
73 min
expanding the attack surface and then some
55 min
Wie mit der Verwendung von Einmalschlüsseln ein…
63 min
An overview of stuff that "Malware Joe" puts into his…
prev
next