Search for "28" returned 4264 results

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Union Busting
42 min

Union Busting

What is it and why you should care

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Angry weather ?
58 min

Angry weather ?

How human-induced climate change affects weather (& how we…

Ein Abgrund von Landesverrat
60 min

Ein Abgrund von Landesverrat

Wie es dazu kam und was daraus zu lernen ist

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Paypals War on Terror
58 min

Paypals War on Terror

A Historical Re-Enactment of the PayPal14

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words