Search for "30" returned 4239 results

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
59 min

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Ein Streifzug durch die Fehler in der Kryptografie

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

The Price Of Dissent
62 min

The Price Of Dissent

The surveillance state & modern day COINTELPRO tactics

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks