Search for "30" returned 4245 results

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Why do we need an open food information platform
39 min

Why do we need an open food information platform

We want all data about food to be linked and public

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Deconstructing a Socialist Lawnmower
56 min

Deconstructing a Socialist Lawnmower

Obsolete Technologies + Critical Material Studies in Media…

Designing PCBs with code
21 min

Designing PCBs with code

Is designing circuits with code instead of CAD the future…

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)