Quick Overview: For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ...
Def Con 33 Post Quantum - Detailed Overview & Context
For more than five years, firewall vendors have been under persistent, cyclical struggle against a well-resourced and relentless ... This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ... This video featuring NIST's Matthew Scholl emphasizes how NIST is working with the brightest minds in government, academia, ... The accelerating evolution of technology, specifically AI, has created a "meta-system" so complex and intertwined with all domains ... When Liberty Safe was found to have provided safe unlock codes to authorities, it made us wonder; how was it even possible for ... "How NOT to Perform a Covert Entry Assessment" is a no B.S. discussion that covers what not to do during covert entry ...
This video contains the recording of my mainstage talk at What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national ... Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ... What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ... For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...