Search for person "Jeroen van der Ham"
prev
next
55 min
The key elements of policy hacking
62 min
Auditing Boot Loaders by Example
58 min
I measured 60% of the DNS, and I found this
45 min
Human-computer-synchronizations
60 min
Why you probably want to be concerned about it and similiar…
53 min
NLNet sponsored (open hardware) trusted boot module
58 min
Export controls and exploit regulations: braindead and…
prev
next