У нас вы можете посмотреть бесплатно 004 Security Source Code Audit of Mullvad VPN by X41 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Topic VPNs are an increasingly popular method of private browsing. How do you know that the one you're using is secure? Get the inside scoop on the processes, findings, and impact of security work performed on a top VPN service. Markus Vervier and Eric Sesterhenn present on X41 D-Sec's security audit of Mullvad, a Swedish, open source based, privacy-focused VPN. Read the audit report here: https://x41-dsec.de/static/reports/X4... Speaker Bio Markus Vervier is Head of Research and Managing Director at X41 D-Sec GmbH. Software security is his main focus of work. During the last 15 years of professional experience in offensive IT security he worked as a penetration tester and security consultant and was doing active security research. He has Extensive experience in the field of code-review, reverse engineering, and vulnerability analysis of applications on various platforms and architectures;- reverse engineering and security analysis of embedded firmware for mobile devices (Android device baseband firmware); discovery of the first vulnerabilities in the Signal Private Messenger: https://pwnaccelerator.github.io/2016... . He worked as a speaker at OffensiveCon 2023, BruCon 2023, hack.lu 2023, Infiltrate, HITBSECCONF, and Troopers security conferences about offensive security topics such as baseband reverse engineering and application security; memory corruption vulnerability in libOTR: https://x41-dsec.de/lab/advisories/x4.... Eric Sesterhenn is working as an IT Security consultant for more than 15 years, working mostly in the areas of penetration testing and source code auditing. He has identified vulnerabilities in various software projects including the Linux kernel, BIND9 and X.org and analysis of complex software applications and infrastructures and extensive experience in code reviewing, penetration testing, and vulnerability analysis;- speaker at DEF CON, beVX 2018 and 35c3 about smartcard driver security: https://www.x41-dsec.de/lab/blog/smar... . He worked as a speaker at Nullcon 2018 about security issues in IoT OS: https://archive.nullcon.net/website/g... Get Involved Looking to join our next meetup? Follow our lu.ma calendar https://lu.ma/ostif-meetups for up-to-date links and information on our community discussions Follow us on social media LinkedIn: / ostif X: https://x.com/OSTIFofficial Bluesky: ostifofficial.bsky.social Mastodon: @ ostifofficial Our website has consistent updates on our work, security audits, and opportunities to help contribute to open source security efforts at ostif.org