Search for "29" returned 4233 results

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
59 min

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Ein Streifzug durch die Fehler in der Kryptografie

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Wireless Drivers: Freedom considered harmful?
51 min

Wireless Drivers: Freedom considered harmful?

An OpenWrt perspective on the development of Linux 802.11…