Search for "31" returned 4168 results
60 min
Routerzwang und Funkabschottung
Was Aktivisten davon lernen können
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
59 min
Security of the IC Backside
The future of IC analysis
60 min
Quantum Cryptography
from key distribution to position-based cryptography
61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away
60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
25 min
»Hard Drive Punch«
Destroying data as a performative act
40 min
Wohnungsbot: An Automation-Drama in Three Acts
A media-art project which automates the search for flats in…
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
60 min
Buffering sucks!
An attempt of calculating the economic cost of buffering.
29 min