Search for "13" returned 4825 results

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Es sind die kleinen Dinge im Leben II
29 min

Es sind die kleinen Dinge im Leben II

was alles geht und wie man anfängt, mit Mikroskopen

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Trackography
31 min

Trackography

You never read alone

Make Wi-Fi fast again
57 min

Make Wi-Fi fast again

Eine kleine Einführung in den 802.11ac Standard

Opening Event
26 min

Opening Event

35C3: Refreshing Memories

Intelexit
60 min

Intelexit

Calling secret service agents to quit their jobs

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

G10, BND-Gesetz und der effektive Schutz vor Grundrechten
58 min

G10, BND-Gesetz und der effektive Schutz vor Grundrechten

Die strategische Fernmeldeüberwachung des BND vor dem…

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction