Search for "25" returned 4560 results

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Firmware Fat Camp
42 min

Firmware Fat Camp

Embedded Security Using Binary Autotomy

SymbiFlow - Finally the GCC of FPGAs!
62 min

SymbiFlow - Finally the GCC of FPGAs!

A fully FOSS, Verilog to bitstream, timing driven, cross…

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Maritime Robotics
27 min

Maritime Robotics

Hackers, I call thee to our Oceans!

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata