home
talks
press
bio
contact
Login
Subscribe
security | technology | startups
Subscribe now
Login
Featured
DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions
The Bar Fight Risk Taxonomy
Information Asymmetry and the 1950s Nuclear Bounty
To err is human - Kerckhoffs' Principle in Software Transparency
Sep
19
My office setup - Part 3 (US edition)
3 min read
Sep
18
DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions
34 min read
Aug
24
cje + The RSnake Show!
2 min read
Aug
08
My #hackersummercamp 2023 moves
1 min read
Jun
22
KEYNOTE: Release the Hounds, Part 2
1 min read
Load more