Search for "15" returned 4954 results

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

0en & 1en auf dem Acker
30 min

0en & 1en auf dem Acker

Was die Sensor & Automatisierungstechnik in der…

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

BGP and the Rule of Custom
31 min

BGP and the Rule of Custom

How the internet self-governs without international law

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…