Ethics in Security Research

Recently, several research papers in the area of computer security were published that may or may not be considered unethical. Looking at these borderline cases is relevant as today’s research […]
On Breaking SAML

Be Whoever You Want to Be The Security Assertion Markup Language (SAML) is a widely adopted language for making security statements about subjects. It is a critical component for the […]
The Future of Protocol Reversing
Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]
FactHacks
RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]
Chaos: Opening Event
The Chaos Computer Club e. V. (CCC) is Europe’s largest association of hackers. For more than thirty years we are providing information about technical and societal issues, such as surveillance, […]
The Grand EU Data Protection Reform
The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]