Search for "20" returned 4645 results
39 min
Hacking the Czech Parliament via SMS
A parliamentary drama of 223 actors
35 min
YOUR DATA MIRROR
Wie die Macht der Daten die Demokratie untergräbt
42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…
54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox
55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…
16 min
Decent Patterns
an Open UX Library for Decentralisation
29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
31 min
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Wie es kommt, dass technischer Fortschritt den Nutzern…
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer
28 min
SatNOGS: Crowd-sourced satellite operations
Satellite Open Ground Station Network
31 min