Search for "floX"

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

Writing secure software
46 min

Writing secure software

using my blog as example

Please Identify Yourself!
45 min

Please Identify Yourself!

Digital Identity Systems in the EU & around the world

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Console Security - Switch
56 min

Console Security - Switch

Homebrew on the Horizon

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Die Krise der Bilder ist die Krise der Politik
58 min

Die Krise der Bilder ist die Krise der Politik

Die Krise der Politik ist die Krise der Bilder