Search for "16" returned 4519 results
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
63 min
Dissecting HDMI
Developing open, FPGA-based capture hardware for conference…
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
42 min
Hackerparagraph § 202c StGB // Reality Check
Cybercrime-Ermittlungen: Vorsicht vor der Polizei! Oder:…
63 min
Through a PRISM, Darkly
Everything we know about NSA spying
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
Baseband Exploitation in 2013
Hexagon challenges
60 min
Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern
Berufe aus vergangenen Zeiten
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
60 min
Concepts for global TSCM
getting out of surveillance state mode
57 min
Protecting the Wild
Conservation Genomics between Taxonomy, Big Data,…
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
30 min