Explore the security implications of HTTP/2 in this 38-minute Black Hat conference talk. Delve beyond existing research to uncover critical implementation flaws and RFC imperfections in the protocol. Learn about HTTP/2 request smuggling techniques, examine case studies involving major platforms like Netflix and Amazon, and understand key differences from HTTP/1. Discover new exploit primitives, visualization techniques, and practical considerations for working with HTTP/2. Gain insights into potential vulnerabilities and hotfixes as presented by security researcher James Kettle.