2024-02-09 | Oleg Afonin Apple iCloud services reversed inside out | 53:58 | 0 | |
|
2024-02-09 | Aleksandr Matrosov and Eugene Rodionov Reconstructing Gapz Position Independent Code Analysis Probl | 59:33 | 2 | |
|
2024-02-09 | todd macdermid encrypted p2p and voip with cutlass | 52:14 | 2 | |
|
2024-02-09 | adam shostack anonymous blogging submission | 56:32 | 1 | Vlog |
|
2024-02-09 | andrew griffiths binary protection schemes | 30:23 | 2 | |
|
2024-02-09 | cedric blancher attacking wifi with traffic injection | 1:04:56 | 2 | |
|
2024-02-09 | fravia wizard searching the commercial web for fun and knowledge | 56:39 | 0 | |
|
2024-02-09 | jack whitsitt visual analysis 2d does it better in color | 33:56 | 1 | |
|
2024-02-09 | jonathan levin the dark side of winsock | 50:20 | 0 | |
|
2024-02-09 | kathy wang using honeyclients to discover new attacks | 1:07:40 | 0 | |
|
2024-02-09 | matt shelton passive asset detection system | 53:25 | 0 | |
|
2024-02-09 | pedram amini process stalking run time visual rce | 38:36 | 0 | |
|
2024-02-09 | reverse engineering panel | 47:09 | 2 | |
|
2024-02-09 | ryan russell and nicolas brulez malware analysis | 1:04:40 | 0 | |
|
2024-02-09 | ryan russell keynote | 43:46 | 0 | |
|
2024-02-09 | spoonm recent shell code developments | 52:08 | 2 | |
|
2024-02-09 | thorsten schneider hardening registration number protection schemes agains reverse engineering with | 41:33 | 2 | |
|
2024-02-09 | Michael Sutton Fuzzing 512kb | 51:29 | 2 | |
|
2024-02-09 | Woodmann Legality of RCE 512kb | 51:28 | 0 | |
|
2024-02-09 | Pedram Amini PaiMei 512kb | 1:10:17 | 0 | |
|
2024-02-09 | Sharon Conheady Social Engineering for penetration testers avi xvid 512kb | 53:40 | 0 | |
|
2024-02-09 | Alex Ionescu Subverting Windows2003SP1 kernel integrity protection 512kb | 34:12 | 1 | |
|
2024-02-09 | Spoonm IDARub 512kb | 54:02 | 0 | |
|
2024-02-09 | Alexander Stirov Reverse Engineering Microsoft Binaries 512kb | 1:02:29 | 0 | |
|
2024-02-09 | Ted Unangst Secure development with static analysis 512kb | 57:26 | 1 | |
|
2024-02-09 | Anthony De Almeida Lopes Jack Louis A plateform independant multicavity nop virus 512kb | 46:02 | 1 | |
|
2024-02-09 | Bunnie Dissassembling and patching hardware 512kb | 1:13:24 | 0 | |
|
2024-02-09 | Chris Abad Advancements In Anonymous e Annoyance 512kb | 53:00 | 0 | |
|
2024-02-09 | David Hulton Breaking wifi faster 512kb | 53:44 | 0 | |
|
2024-02-09 | Dennis Cox Insiders View Network security devices 512kb | 42:34 | 0 | |
|
2024-02-09 | Fabrice Desclaux Kostya Kortchinsky Vanilla Skype part1 512kb | 53:00 | 0 | |
|
2024-02-09 | Fabrice Desclaux Kostya Kortchinsky Vanilla Skype part2 512kb | 1:02:39 | 0 | |
|
2024-02-09 | Fravia Reversing our searching habits 512kb | 53:27 | 1 | |
|
2024-02-09 | Joe Stewart OllyBonE 512kb | 45:13 | 0 | |
|
2024-02-09 | Luis Miras FixBugsInBinaries xvid 512kb | 37:55 | 0 | |
|
2024-02-09 | Mathieu Desnoyers LTT LinuxTraceToolkit 512kb | 25:41 | 1 | |
|
2024-02-09 | Pierre Marc Bureau How I learned Reverse Engineering with Storm | 47:04 | 2 | |
|
2024-02-09 | Tiller Beauchamp RE Trace Applied Reverse Engineering on OS X | 49:36 | 1 | |
|
2024-02-09 | Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part1 | 48:25 | 1 | |
|
2024-02-09 | Sebastien Doucet 64 bit Imports Rebuilding and Unpacking Part2 | 48:25 | 0 | |
|
2024-02-09 | Aaron Portnoy and Ali Rizvi Santiago Reverse Engineering Dynamic Languages a Focus on Python | 36:21 | 5 | |
|
2024-02-09 | Alexander Sotirov Blackbox Reversing Of XSS Filters | 1:11:04 | 1 | |
|
2024-02-09 | Sharon Conheady and Alex Bayly Social Engineering for the Socially Inept | 53:29 | 2 | |
|
2024-02-08 | Instant big data targeting | 1:19:43 | 2 | |
|
2024-02-08 | Lightning talks Alexander Czadilek and Christof Tschohl, epicenter works | 10:40 | 1 | |
|
2024-02-08 | Lightning talks Ali Lange, Center for Democracy & Technology | 6:56 | 0 | Vlog |
|
2024-02-08 | Lightning talks Arne Hintz, Cardiff University | 7:56 | 0 | |
|
2024-02-08 | Lightning talks Eva Lievens, Ghent University | 11:23 | 0 | |
|
2024-02-08 | Lightning talks Katarzyna Szymielewicz, Panoptykon | 10:28 | 2 | |
|
2024-02-08 | Lightning talks Kirsten Fiedler, EDRi | 5:41 | 0 | |
|
2024-02-08 | Lightning talks Theresia Reinhold | 9:35 | 0 | |
|
2024-02-08 | Owning the web together | 1:21:06 | 0 | |
|
2024-02-08 | Surveillance tech export and human rights law | 1:28:06 | 0 | |
|
2024-02-08 | The Internet of Things, security, and privacy | 1:14:32 | 2 | |
|
2024-02-08 | Welcome | 6:08 | 0 | |
|
2024-02-08 | Closing | 2:24 | 0 | |
|
2024-02-08 | Digital Privacy low and high hanging fruits | 1:30:26 | 0 | |
|
2024-02-07 | Welcome | 4:28 | 1 | |
|
2024-02-07 | EDPS Civil Society Summit 2018 | 1:31:51 | 0 | |
|
2024-02-07 | From old filter bubbles to political microtargeting | 1:24:19 | 0 | |
|
2024-02-07 | Investigating algorithmic systems Algorithm auditing | 1:11:50 | 0 | |
|
2024-02-07 | Strip searching the internet upload filters | 1:09:28 | 0 | |
|
2024-02-07 | The use of AI by public authorities | 1:20:05 | 0 | |
|
2024-02-07 | The battle for the Net The year we fight back | 29:28 | 1 | |
|
2024-02-07 | Voss & Beckedahl Lass uns reden | 44:42 | 0 | |
|
2024-02-07 | The digital identity revolution great hopes or deep concerns | 1:01:26 | 1 | |
|
2024-02-07 | Thomas Lohninger Mit 5G wird Milch und Honig fließen | 26:44 | 0 | |
|
2024-02-07 | Barbara Wimmer Jobchancen adé Wenn der Computer nein sagt | 28:48 | 0 | |
|
2024-02-07 | Best of DSGVO Armageddon | 57:32 | 1 | |
|
2024-02-07 | Beyond Black Mirror China's Social Credit System | 1:05:26 | 1 | |
|
2024-02-07 | Caroline Sinders AI is More Than Math | 44:56 | 3 | |
|
2024-02-07 | Cory Doctorow It's monopolies, not surveillance | 1:01:14 | 2 | |
|
2024-02-07 | Eben Moglen Why Freedom of Thought Requires Attention | 59:48 | 0 | |
|
2024-02-07 | Elisabeth Niekrenz Terrorfilter Die geplanten EU Terror Content Verordnung | 32:04 | 1 | |
|
2024-02-07 | Frank Rieger Cyberwar, hybride Kriegführung, Desinformation | 55:16 | 0 | Guide |
|
2024-02-07 | Ingo Dachwitz Microtargeting und Manipulation | 33:14 | 0 | |
|
2024-02-07 | Katharina Nocun Stream me if you can Analysis of my Netflix data | 31:44 | 3 | |
|
2024-02-07 | Margrethe Vestager Fairness and Competitiveness in a Digitised World | 1:00:22 | 3 | |
|
2024-02-07 | Markus Beckedahl tl dr Digital war mal besser | 51:34 | 1 | |
|
2024-02-07 | Martin Kretschmer European copyright reform Is it possible | 51:45 | 0 | |
|
2024-02-07 | The impact of surveillance on today’s kids tomorrow’s human rights activists | 1:27:14 | 0 | |
|
2024-02-07 | Access requests as a tool for activism | 1:13:09 | 0 | |
|
2024-02-07 | Activism and digital infrastructures | 1:01:44 | 0 | |
|
2024-02-07 | Actually, In Google We Trust A ‘Deconstructing’ Conversation on Russian Internet | 1:12:31 | 0 | |
|
2024-02-07 | Defending digital civic space how to counter digital threats against civil society | 1:17:34 | 0 | Guide |
|
2024-02-07 | Internet for All Silenced and Harassed No More | 1:08:12 | 0 | |
|
2024-02-07 | Stories of Activism | 45:44 | 0 | |
|
2024-02-07 | The EDPS Civil Society Summit | 1:59:38 | 0 | |
|
2024-02-07 | Centring social injustice, de centring tech The case of the Dutch child benefits scandal | 44:11 | 0 | |
|
2024-02-07 | Connecting algorithmic harm throughout the criminal legal cycle | 1:01:25 | 0 | |
|
2024-02-07 | Drawing a red line in the sand On bans, risks and the EU AI Act | 1:06:07 | 1 | |
|
2024-02-07 | EDPS Civil Society Summit 2022 | 59:04 | 0 | |
|
2024-02-07 | How it started how it is going Status of Digital Rights half way to the next EU elections | 59:15 | 0 | |
|
2024-02-07 | Ministry of Microsoft Public data in private hands | 55:40 | 1 | |
|
2024-02-07 | Regulating surveillance ads across the Atlantic | 1:10:15 | 0 | |
|
2024-02-07 | Regulating tech sector transgressions in the EU | 1:01:56 | 0 | |
|
2024-02-07 | Regulation vs Governance | 53:36 | 0 | |
|
2024-02-07 | Stop Data Retention now and forever | 55:52 | 0 | |
|
2024-02-07 | Surveillance tech as misclassification 2 0 for the gig economy | 1:00:37 | 0 | |
|
2024-02-07 | The DSA, its future enforcement and the protection of fundamental rights | 1:00:45 | 0 | |
|