Search for "wose" returned 848 results

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Apple's iPhone 15: Under the C
36 min

Apple's iPhone 15: Under the C

Hardware hacking tooling for the new iPhone generation

Hello World!
57 min

Hello World!

How to make art after Snowden?

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

Honey, let's hack the kitchen:
38 min

Honey, let's hack the kitchen:

Attacks on critical and not-so-critical cyber physical…