Enigma 2016/Enigma 2016 Videos/NSA TAO Chief on Disrupting Nation State Hackers.mp4 84.5 MB
Enigma 2019/Enigma 2019 Presentations/Building Identity for an Open Perimeter - enigma2019_slides_dharamshi.pdf 80.2 MB
Enigma 2016/Enigma 2016 Videos/Panopticlick - Fingerprinting Your Web Presence.mp4 70.6 MB
Enigma 2020/Enigma 2020 Presentations/Platform Data Privacy and Security Strategies for Public Interest Research - enigma2020_slides_buccini.pdf 64.0 MB
Enigma 2016/Enigma 2016 Videos/Protecting High Risk Users.mp4 63.1 MB
Enigma 2016/Enigma 2016 Presentations/A Million Hit Points and Infinite Charisma How Games Can Fix Computer Security Education - enigma_slides_peterson.pdf 62.5 MB
Enigma 2021/Enigma 2021 Videos/I Thought I Was Being Strong with a Complicated Person - The Tales.mp4 16.7 MB
Enigma 2021/Enigma 2021 Videos/Quantifying Memory Unsafety and Reactions to It.mp4 16.5 MB
Enigma 2018/Enigma 2018 Videos/Protecting Firefox Data with Content Signatures.mp4 16.1 MB
Enigma 2021/Enigma 2021 Videos/No Data, No Problem-Giving Nuclear Inspectors Better Tools without Revealing.mp4 15.9 MB
Enigma 2021/Enigma 2021 Videos/Gone, But Not - Forgotten -Technical & Practical Challenges In Operationalizing.mp4 15.9 MB
Enigma 2021/Enigma 2021 Videos/A Quest for the Physics of Cyberspace.mp4 15.9 MB
Enigma 2019/Enigma 2019 Videos/Where Is the Web Closed.mp4 15.8 MB
Enigma 2017/Enigma 2017 Presentations/Understanding and Designing for End User Security Expectations - enigma17_slides_roesner.pdf 15.6 MB
Enigma 2016/Enigma 2016 Presentations/Server-side Second Factors A Statistical Approach to Measuring User Authenticity - enigma16_slides_freeman.pdf 15.5 MB
Enigma 2020/Enigma 2020 Videos/Adventures with Cybercrime Toolkits Insights for Pragmatic Defense.mp4 12.4 MB
Enigma 2021/Enigma 2021 Videos/The Full Stack Problem of Election Security.mp4 12.1 MB
Enigma 2020/Enigma 2020 Videos/Reservist Model Distributed Approach to Scaling Incident Response.mp4 11.8 MB
Enigma 2017/Enigma 2017 Presentations/Deviation from the Norms The Necessity and Challenges of a Norms-based Approach to Digital Offense - enigma_slides_limbago.pdf 10.3 MB
Enigma 2018/Enigma 2018 Presentations/Protecting Financial Stability against Cyber Threats Proposal for an International Agreement - enigma18_maurer_0.pdf 10.2 MB
Enigma 2018/Enigma 2018 Presentations/Privacy at Instagram - enigma18_slides_jiang.pdf 7.2 MB
Enigma 2019/Enigma 2019 Presentations/Hardware Security Modules The Ultimate Black Boxes - enigma2019_slides_lackey.pdf 7.2 MB
Enigma 2018/Enigma 2018 Presentations/Social Cybersecurity Reshaping Security through an Empirical Understanding of Human Social Behavior - enigma18_das.pdf 7.1 MB
Enigma 2020/Enigma 2020 Presentations/Privacy at Speed Privacy by Design for Agile Development at Uber - enigma2020_slides_bozdag.pdf 4.5 MB
Enigma 2017/Enigma 2017 Presentations/Security for Vulnerable Populations-On the Interplay of Weapons of Influence and Life Domains - enigma2017_slides_oliveira.pdf 4.4 MB
Enigma 2018/Enigma 2018 Presentations/We Gave You This Internet, Now Play by Our Rules - enigma18_slides_gebhart.pdf 4.3 MB
Enigma 2017/Enigma 2017 Presentations/Why Philanthropy Is Critical for Cybersecurity - enigma_slides_sugarman.pdf 3.0 MB
Enigma 2016/Enigma 2016 Presentations/Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites - enigma_slides_sullivan.pdf 3.0 MB
Enigma 2018/Enigma 2018 Presentations/The Impact of Third-party Code on Android App Security - enigma18_derr.pdf 2.0 MB
Enigma 2016/Enigma 2016 Presentations/Verification, Auditing, and Evidence If We Didn’t Notice Anything Wrong, Is the Election Outcome Right - enigma_slides_teague.pdf 2.0 MB
Enigma 2017/Enigma 2017 Presentations/Drawing the Foul Operation of a DDoS Honeypot - enigma17_slides_menscher.pdf 1.6 MB
Enigma 2017/Enigma 2017 Presentations/Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud Slides - enigma_haken_slides.pdf 1.5 MB
Enigma 2016/Enigma 2016 Presentations/Social Media Self-Defense A Guide to Stopping Stalkers - enigma16_slides_armageddon.pdf 1.4 MB
Enigma 2017/Enigma 2017 Presentations/Inside MOAR TLS How We Think about Encouraging External HTTPS Adoption on the Web - enigma_slides_schechter.pdf 1.3 MB
Enigma 2016/Enigma 2016 Presentations/ToStaticHTML for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both - enigma16_slides_heiderich.pdf 134.1 kB
Enigma 2019/Enigma 2019 Videos/User Agent 2.0 - What Can the Browser Do for the User.eng.srt 67.7 kB
Enigma 2018/Enigma 2018 Videos/Modern Mind Control - Public Opinion Manipulation in Our Online World.eng.srt 67.4 kB
Enigma 2019/Enigma 2019 Videos/Mr. Lord Goes to Washington, or Applying Security outside the Tech World.eng.srt 67.1 kB
Enigma 2018/Enigma 2018 Videos/Hats off to DevSecOps.eng.srt 66.9 kB
Enigma 2018/Enigma 2018 Videos/Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertain'ty.eng.srt 66.2 kB
Enigma 2018/Enigma 2018 Videos/The Future of Cyber-Autonomy.eng.srt 66.2 kB
Enigma 2018/Enigma 2018 Videos/Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.eng.srt 65.7 kB
Enigma 2016/Enigma 2016 Presentations/Keys Under Doormats Mandating Insecurity by Requiring Government Access to All Data and Communications - enigma_2016_slides_rivest.pdf 65.4 kB