Search for "13" returned 4960 results

The Transhumanist Paradox
33 min

The Transhumanist Paradox

Deciding between technological utopias in a liberal state

Mietshäusersyndikat: den Immobilienmarkt hacken
30 min

Mietshäusersyndikat: den Immobilienmarkt hacken

Wie man ein Haus kaufen kann ohne es zu besitzen

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration

Mit Kunst die Gesellschaft hacken
67 min

Mit Kunst die Gesellschaft hacken

Das Zentrum für politische Schönheit

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques