Search for "15" returned 4928 results

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

The Internet in Cuba: A Story of Community Resilience
58 min

The Internet in Cuba: A Story of Community Resilience

Get a unique tour of some of the world’s most unusual…

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Telescope Making
69 min

Telescope Making

How to make your own telescope

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities