Search for "28" returned 4264 results

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

Stromtankstellen – eine neue öffentliche Infrastruktur
60 min

Stromtankstellen – eine neue öffentliche Infrastruktur

Was kann das? Wie kann ich das nutzen? Wo besteht…

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

Memsad
61 min

Memsad

why clearing memory is hard.

It Always Feels Like the Five Eyes Are Watching You
64 min

It Always Feels Like the Five Eyes Are Watching You

Five Eyes’ Quest For Security Has Given Us Widespread…

Digitale Bildung in der Schule
33 min

Digitale Bildung in der Schule

5.-Klässlerinnen, die über die Millisekunden für einen…

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Art against Facebook
40 min

Art against Facebook

Graffiti in the ruins of the feed and the…