Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
7,909 results
This talk will cover my Hack Week 22 attempts to turn a small, cheap ARM board into a USB security key running a mainline Linux ...
87 views
10 months ago
Rob N ☆ http://linux.conf.au/schedule/presentation/160/ Universal-second factor devices are the new hotness in the two-factor ...
15,865 views
7 years ago
In this video I show you how to install and verify TailsOS safely. 0:00 What is tails? 1:41 Installing Tails from different host OS's ...
399,075 views
9 months ago
Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication and has ...
2,611 views
6 years ago
The Making of a Secure Open Source Password Keeper From the Electronics to the High Level Software... by Mathieu Stephan At: ...
576 views
Heads is an open source custom firmware and OS configuration for laptops and servers that aims to provide slightly better ...
9,237 views
Yuriy Ackermann https://kiwi.pycon.org/schedule/presentation/111/ Today main 2FA solutions are OTP(TOTP, HOTP), RSA keys ...
2,068 views
Secure, frictionless, easy to implement – choose all three! This session will cover best practices and introduce technologies ...
43,009 views
Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...
99,867 views
5 years ago
It's time to renew another widely-mentioned-but-rarely-used tool from the privacy community: the Nitrokey. Many mention it, but ...
4,173 views
11 months ago
Sharing Shmoocon 2017 videos on YouTube. Hopefully to help reduce some load on Internet Archive, and because now I can ...
1,382 views
Encrypting sensitive data at rest has always been a good idea, especially when storing it on small, portable devices like external ...
347 views
1 year ago
How (not) to protect private keys There are multiple different ways to store cryptocurrency secret keys. This talk will investigate ...
1,735 views
Description.
4,757 views
8 years ago
At DEF CON 30 I talked about a project I've been working on with a couple of friends for the past few month: The Tamarin Cable!
61,381 views
But what happens if we lose our security key? We compared 12 procedures for account recovery in the case of passwordless ...
283 views
2 years ago
If we are going to use Rasbian Jessie Lite to host applications like Home Assistant, MQTT, RSync, we need to secure it beyond ...
4,783 views
One of the keys to success on the mobile web is providing an easy-to-use but still secure auth solution. The challenge, however, is ...
9,665 views
Security by design This talk will present a secure IoT architecture by design, incorporating secure boot (such as HAB of iMx6), ...
3,236 views
4 years ago
There's a whole lot of device driver code out there that works so long as the device stays plugged in. But some devices, such as ...
446 views