Search for "28" returned 4262 results
46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
51 min
Wireless Drivers: Freedom considered harmful?
An OpenWrt perspective on the development of Linux 802.11…
20 min
The Nibbletronic
A DIY MIDI Controller and a New UI for Wind Instruments
59 min
Security of the IC Backside
The future of IC analysis
59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP
40 min
Wohnungsbot: An Automation-Drama in Three Acts
A media-art project which automates the search for flats in…
60 min
Quantum Cryptography
from key distribution to position-based cryptography
61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
56 min