Search for "19" returned 4609 results

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…