Search for "28" returned 4262 results
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
51 min
How to contribute to make open hardware happen
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
67 min
The Maker movement meets patent law
How many windows are open in the patent fortress
60 min
Die verborgene Seite des Mobilfunks
HF-Störquellen im Uplink
60 min
Prediction and Control
Watching Algorithms
68 min
#afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
Über kreative Organisation, poltische Aktionen und das…
27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency
26 min
Technomonopolies
How technology is used to subvert and circumvent…
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…
43 min