Search for "24" returned 4352 results

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Desperately Seeking Susy
60 min

Desperately Seeking Susy

A farewell to a bold proposal?

Access To Bodies
31 min

Access To Bodies

Ein Leitfaden für post-humane Computer- und…

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Transhuman Expression
62 min

Transhuman Expression

Interdisciplinary research in Painting and Robotics. with…

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

Die Drohnenkriege
66 min

Die Drohnenkriege

Kriegsführung der Zukunft?

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities