Search for "25" returned 4419 results
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
30 min
Electroedibles
Open Source Hardware for Smart Candies
48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…
59 min
Die Sprache der Populisten
Wie politische "Gewissheiten" sprachlich konstruiert werden
33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…
30 min
OONI: Let's Fight Internet Censorship, Together!
The Open Observatory of Network Interference
33 min
Hacking as Artistic Practice
!Mediengruppe Bitnik about their recent works
30 min
libusb: Maintainer fail
How I failed to run an open source project
36 min
Sim Gishel
A singing and dancing robot build to take part in casting…
40 min
Intercoms Hacking
Call the frontdoor to install your backdoors
29 min
Edible Soft Robotics
An exploration of candy as an engineered material
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
33 min