Media Summary: At the Black Hat USA 2025 conference in Las Vegas, we announced the discovery of 9 zero-day Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. This webinar took place on Wednesday 24 June 2020. Since the first networks were implemented more than 20 years ago, ...

Tetra Vulnerability Tetra Burst Computerphile - Detailed Analysis & Overview

At the Black Hat USA 2025 conference in Las Vegas, we announced the discovery of 9 zero-day Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works. This webinar took place on Wednesday 24 June 2020. Since the first networks were implemented more than 20 years ago, ... In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the ... Midnight Blue, a specialist security consulting firm, announced today the discovery of 5 zero-day An oldie but a goodie, Dr Mike Pound revisits the Log-Jam attack. Original Log Jam paper: Thanks to ...

In this talk we will discuss the radio jailbreaking journey that ... Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ... How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ...

Photo Gallery

TETRA Vulnerability (TETRA:BURST) - Computerphile
TETRA HACKED! Over 100 Countries Exposed
New TETRA keystream recovery attack - Demo of ETSI's fix failing to mitigate CVE-2022-24401
Oblivious Transfer - Computerphile
38C3 - TETRA Algorithm set B - Can glue mend the burst?
Webinar: TETRA to 2035 and beyond – an overview of the continuing enhancement of the TETRA standard
DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue
Demo: TETRA TEA1 backdoor vulnerability (CVE-2022-24402)
Demo: TETRA decryption oracle vulnerability (CVE-2022-24401)
LogJam Attack - Computerphile
All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows
Power LED Attack - Computerphile
View Detailed Profile
TETRA Vulnerability (TETRA:BURST) - Computerphile

TETRA Vulnerability (TETRA:BURST) - Computerphile

The 'secure'

TETRA HACKED! Over 100 Countries Exposed

TETRA HACKED! Over 100 Countries Exposed

*Story 1 -

New TETRA keystream recovery attack - Demo of ETSI's fix failing to mitigate CVE-2022-24401

New TETRA keystream recovery attack - Demo of ETSI's fix failing to mitigate CVE-2022-24401

At the Black Hat USA 2025 conference in Las Vegas, we announced the discovery of 9 zero-day

Oblivious Transfer - Computerphile

Oblivious Transfer - Computerphile

Share part of a secret without knowing which part? Dr Tim Muller explains how Oblivious Transfer works.

38C3 - TETRA Algorithm set B - Can glue mend the burst?

38C3 - TETRA Algorithm set B - Can glue mend the burst?

In August 2023, we published the

Webinar: TETRA to 2035 and beyond – an overview of the continuing enhancement of the TETRA standard

Webinar: TETRA to 2035 and beyond – an overview of the continuing enhancement of the TETRA standard

This webinar took place on Wednesday 24 June 2020. Since the first networks were implemented more than 20 years ago, ...

DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue

DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue

In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the ...

Demo: TETRA TEA1 backdoor vulnerability (CVE-2022-24402)

Demo: TETRA TEA1 backdoor vulnerability (CVE-2022-24402)

Midnight Blue, a specialist security consulting firm, announced today the discovery of 5 zero-day

Demo: TETRA decryption oracle vulnerability (CVE-2022-24401)

Demo: TETRA decryption oracle vulnerability (CVE-2022-24401)

Midnight Blue, a specialist security consulting firm, announced today the discovery of 5 zero-day

LogJam Attack - Computerphile

LogJam Attack - Computerphile

An oldie but a goodie, Dr Mike Pound revisits the Log-Jam attack. Original Log Jam paper: https://bit.ly/C_LogJamPaper Thanks to ...

All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows

All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows

https://media.ccc.de/v/camp2023-57100-all_cops_are_broadcasting In this talk we will discuss the radio jailbreaking journey that ...

Power LED Attack - Computerphile

Power LED Attack - Computerphile

Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ...

Demo: TETRA decryption oracle vulnerability (CVE-2022-24401)

Demo: TETRA decryption oracle vulnerability (CVE-2022-24401)

Midnight Blue, a specialist security consulting firm, announced today the discovery of 5 zero-day

Decoding A Local TETRA Repeater With SDR# And TETRA Demodulator Plug-in (Terrestrial Trunked Radio)

Decoding A Local TETRA Repeater With SDR# And TETRA Demodulator Plug-in (Terrestrial Trunked Radio)

TETRA

TETRA End-to-end encryption (E2EE) voice injection demo

TETRA End-to-end encryption (E2EE) voice injection demo

At the Black Hat USA 2025 conference in Las Vegas, we announced the discovery of 9 zero-day

TETRA Air interface and E2E encryption

TETRA Air interface and E2E encryption

Full

Defining Harm for Ai Systems - Computerphile

Defining Harm for Ai Systems - Computerphile

How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ...