Search for "25" returned 4410 results

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Financial surveillance
59 min

Financial surveillance

Exposing the global banking watchlist

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition

Die Häuser denen, die darin wohnen!
41 min

Die Häuser denen, die darin wohnen!

Langfristig bezahlbares, gemeinsames „Mieteigentum“…

Computational Meta-Psychology
61 min

Computational Meta-Psychology

An Artificial Intelligence exploration into the creation of…

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Structuring open hardware projects
33 min

Structuring open hardware projects

experiences from the “i3 Berlin” 3D printer project with…

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet