Search for "floX"

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Taming the Chaos: Can we build systems that actually work?
58 min

Taming the Chaos: Can we build systems that actually work?

Possible paths from today's ghastly hackery to what…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Self-cannibalizing AI
53 min

Self-cannibalizing AI

Artistic Strategies to expose generative text-to-image…

KOALitionsvertragsAnalyse
38 min

KOALitionsvertragsAnalyse

Mit Tools & Methoden dem Vertrag auf den Zahn fühlen

Writing secure software
46 min

Writing secure software

using my blog as example

Please Identify Yourself!
45 min

Please Identify Yourself!

Digital Identity Systems in the EU & around the world