Search for "20" returned 4649 results
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
25 min
»Hard Drive Punch«
Destroying data as a performative act
56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks
51 min
How to contribute to make open hardware happen
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…
30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
58 min