When IoT attacks: hacking a Linux-powered rifle |
DEF CON 23
|
When IoT Attacks: Hacking a Linux-Powered Rifle |
Black Hat USA 2015
|
CLOSING KEYNOTE: Bringing Security and Privacy to Where the Wild Things Are |
HITBSecConf2015 – Amsterdam
|
2012 in review: Tor and the censorship arms race |
44CON 2012
|