Search for "15" returned 4784 results

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Console Hacking
72 min

Console Hacking

Breaking the 3DS

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it