Back.. at the root of all ‘evil’…

It’s quite strange how I begun dealing with information security.. First as a kid solving every kind of buzzwords and crosswords, then as a student solving complex crypto-equations, then experimenting break-ins for fun… Reading stories about hackers, academic papers and books by people I had the chance to meet and live with during my M.Sc. […]

Continue reading →