Search for "Elli"

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Hacker Jeopardy
95 min

Hacker Jeopardy

Zahlenraten für Geeks

Rettet uns die KI?
42 min

Rettet uns die KI?

Über die Zukunft der digitalen Inklusion

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

Art against Facebook
40 min

Art against Facebook

Graffiti in the ruins of the feed and the…

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache