Search for "11" returned 4574 results

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Trackography
31 min

Trackography

You never read alone

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Simulating Universes
60 min

Simulating Universes

What Virtual Universes Can Tell Us About Our Own

0en & 1en auf dem Acker
30 min

0en & 1en auf dem Acker

Was die Sensor & Automatisierungstechnik in der…

Internet, the Business Side
62 min

Internet, the Business Side

a try to explain the ecosystem

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy