The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to mai... | Continue reading
In this talk we will take a look at the 'Vault 7' Protego documents, which have received very little attention so far, and challenge the ... | Continue reading
A lecture on the environmental impacts of digital industry today and how to think about and design digital tools with limited energy and ... | Continue reading
Robots, Satellites and biometrical traps - more than a Billion Euro will be spent in 2021 for what they call "Border Security." The Europ... | Continue reading
‘Listening Back’ is an add-on for the Chrome and Firefox browsers that sonifies internet cookies in real time as one browses online. By t... | Continue reading
Individuals conducting reverse engineering for research purposes face several legal issues arising from IP and competition law. The legis... | Continue reading
What sort of tools and methodologies should you use to write software for a car that will go on sale in 2023, if you have to support secu... | Continue reading
Can nuclear warheads be used as energy sources instead of exhausting resources? And if, how does this even work? Concerns during the co... | Continue reading
Xbox 360 video game console had a number of widely known hacks for firmware of its optical disc drives. However, it was never the case wi... | Continue reading
Civil society depends on the continuing ability of citizens to communicate with one another, without fear of interference, deprivation or... | Continue reading
Development-fused iPhones with hardware debugging features like JTAG are out of reach for many security researchers. This talk takes you ... | Continue reading
The unprecedented charges against Julian Assange and WikiLeaks constitute the most significant threat to the First Amendment in the 21st ... | Continue reading
TamaGo is an Open Source operating environment framework which aims to allow deployment of firmware for embedded ARM devices by using 0% ... | Continue reading
Considerations for distributed and decentralized technologies from the perspective of a product that many would like to see decentralize.... | Continue reading
The talk explains and illustrates the procedural and technical details of the surveillance in and around the Ecuadorian embassy in London... | Continue reading
PDF is the most widely used standard for office documents. Supported by many desktop applications, email gateways and web services soluti... | Continue reading
The Large Hadron Collider (LHC) is the biggest particle accelerator on Earth. It was built to study matter in more detail than ever befor... | Continue reading
When climate activists say you should listen to the science they usuallyrefer to reports by the Intergovernmental Panel on Climate Chang... | Continue reading
The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your AMD processor and runs undocumented, proprietary firmware pr... | Continue reading
Our research shows that network-based cache side-channel attacks are a realistic threat. Cache attacks have been traditionally used to le... | Continue reading
A deep dive into power generation process, industrial solutions and their security implications. Flavoured with vulnerabilities, penetrat... | Continue reading
There's a variety of places - on Earth and beyond - that pose challenging conditions to the ever-shrinking digital circuits of today. Mak... | Continue reading
The 3DS is reaching end of life but has not revealed all its weaknesses yet. This talk will go through the process of reverse engineering... | Continue reading
One apparent paradox of the digitisation of work is that while productivity in manufacturing is skyrocketing, productivity in caring prof... | Continue reading
Most modern embedded devices have something to protect: Whether it's cryptographic keys for your bitcoins, the password to your WiFi, ... | Continue reading
Did you ever wonder what happens in the time period it takes light to cross the diameter of your hair? This is the femtosecond, a million... | Continue reading
This talk is to show the current state of the discussion on climate change and the necessary and possible changes from a scientific perpe... | Continue reading
So called “0-click” exploits, in which no user interaction is required to compromise a mobile device, have become a highly interesting to... | Continue reading
Reverse engineering a system on a chip from sparse documentation and binaries, developing an emulator from it and gathering the knowledge... | Continue reading
This spring marked the 30th anniversary of the public uncovering of the so-called KGB Hack, bringing with it a number of new articles rem... | Continue reading
The impact of scale in our field has been enormous and it has transformed the tools, the jobs and the face of the Infosec community. In t... | Continue reading
Hacking and hackers can be hard to visualize. In the popular imagination, the figure alternates between a menacing, hooded figure or some... | Continue reading
Making climate predictions is extremely difficult because climate models cannot simulate every cloud particle in the atmosphere and every... | Continue reading
This talk investigates the business of fake likes and fake accounts: In a world, where the number of followers, likes, shares and views a... | Continue reading
This talk is about running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up... | Continue reading
There are countless post-quantum buzzwords to list: lattices, codes, multivariate polynomial systems, supersingular elliptic curve isogen... | Continue reading
While open source is necessary for trustable hardware, it is far from sufficient. This is because “hashing” hardware – verifying its cons... | Continue reading
This talk will cover everything about the Acorn Archimedes, a British computer first released in 1987 and (slightly) famous for being the... | Continue reading
It is easier to chat online securely today than it ever has been. Widespread adoption of signal, wire, and the private mode of WhatsApp h... | Continue reading
Is the way we run services these days sustainable? The trusted computing base -- the lines of code where, if a flaw is discovered, jeopar... | Continue reading
Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January2011 and September 2011. Bluecoat tested out a Tor handshake fi... | Continue reading
Let's bring the UNIX concept of Home Directories into the 21st century.The concept of home directories on Linux/UNIX has little changed... | Continue reading
Current search engines such as censys or shodan give everyone an insight into the global Internet. Unfortunately, they don't provide a co... | Continue reading
Companies are now selling the ability to track your phone number whereever you go. With a precision of up to 50 meters, detailed movement... | Continue reading
With Foreign Data Wrappers (FDW) you can access remote objects from SQL databases. This feature is part of the SQL/MED (SQL Management of... | Continue reading
Motivation and challenges building a mobile phone that respects your freedom, privacy and digital rights - and is hackable. This talk wil... | Continue reading
Motivation and challenges building a mobile phone that respects your freedom, privacy and digital rights - and is hackable. This talk wil... | Continue reading