Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
69,489,897 results
I found a way to evade the PSTN surveillance infrastructure when making a phone call. Just a little foresight and a little tech and a ...
68,127 views
2 months ago
Taken from JRE #1368 w/Edward Snowden: https://youtu.be/efs3QRr8LWw.
17,989,988 views
4 years ago
A secure mobile operating system is built on top of a complicated software stack whose every single building block is isolated to ...
192,394 views
1 year ago
The ultimate guide showing how to make Android as secure, private, and anonymous as you need it to be. This video covers ...
243,452 views
3 years ago
In this lecture, Professor Zeldovich discusses the Android platform and its security design. License: Creative Commons BY-NC-SA ...
34,856 views
7 years ago
Services & Products Mentioned ✓ Efani (Secure SIM service): https://efani.com/allthingssecured ✓ Faraday Bag: ...
68,299 views
Streamed 11 months ago
There are privacy and security threats tied to the use of the Cell Phone SIM Card. What does that little chip do? Learn about the ...
81,724 views
2 years ago
Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be ...
39,280 views
9 hours ago
This week on the Lock and Code podcast, we speak with Joseph Cox about the FBI's successful backdoor into the phone startup ...
271 views
1 day ago
#security #phone BIBLIOGRAPHY AND FURTHER READING: https://www.androidpolice.com/hermit-government-spyware/ ...
62,060 views
It's no secret: passwords are not enough. Google has been on the forefront of a password revolution with FIDO, WebAuthn, and ...
10,841 views
5 years ago
the soaking wet streets of Guildford absolutely loved it... so much fun, albeit cut short... watch me live next time: fb.me/SUATISM ...
9,285 views
Fellow Patriots & Freedom Lovers, I was peacefully exercising my Constitutional rights at the Montgomery County Building In ...
591,928 views
TechDays Finland 2012 Kimmo Bergius.
65 views
12 years ago
Mobile phones often have your 'whole life' on them, with all sorts of valuable data, banking apps etc. As such, they are a massive ...
63 views
6 months ago
Gunnar Alendal, a PhD candidate at NTNU in Norway, talks about the acquisition bottleneck in digital forensics, different phases ...
350 views
Have you ever wondered if your cryptocurrency is secure? Mark Kreitzman, VP of Efani, and Lisa Francoeur, CRO of Crypto Tutors ...
461 views
Securing mobiles phones has become a top priority for mobile operators as increasing sophistication and processing power are ...
1,668 views
Security Onion Conference 2016 Eric Conrad - @eric_conrad "C2 Phone Home: Leveraging Security Onion to Identify Command ...
8,348 views
73 views
Streamed 2 years ago