Explores Privacy Pass, a method to bypass internet challenges anonymously, discussing key concepts and addressing performance and scalability concerns.
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Explores bug-finding, verification, and the use of learning-aided approaches in program reasoning, showcasing examples like the Heartbleed bug and differential Bayesian reasoning.