Search for "Jakob"

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…