Search for "30" returned 4245 results
47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…
54 min
Do You Think That's Funny?
Art Practice under the Regime of Anti-Terror Legislation
58 min
Überwachen und Sprache
How to do things with words
61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
63 min
Reconstructing narratives
transparency in the service of justice
62 min
Netzpolitik in der Schweiz 2016
Grundrechte per Volksentscheid versenken
42 min
Wifibroadcast
How to convert standard wifi dongles into digital broadcast…
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows
58 min
Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…
60 min
net neutrality: days of future past?
Taking stock after two years of net neutrality in the…
63 min
Kritikalität von Rohstoffen - wann platzt die Bombe?
Ein nicht nuklearer Blick auf das Ende der Welt
42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…
60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
51 min