3 years ago0 viewsDEFCONtechnologysecurityuncertainA presentation on hardware security discussing how to access hidden CPU features and their impact on user control and privacy.