Search for "11" returned 4579 results
58 min
Baseband Exploitation in 2013
Hexagon challenges
55 min
White-Box Cryptography
Survey
58 min
When hardware must „just work“
An inside look at x86 CPU design
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
60 min
Concepts for global TSCM
getting out of surveillance state mode
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
135 min
Jahresrückblick des CCC 2018
Refreshing Memories
13 min
OpenQA - review jobs and file bug report
OpenSUSE job review/bug report
33 min
Watching the changing Earth
warning: gravity ahead
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
53 min
When algorithms fail in our personal lives
Social media break up coordinator
60 min
Best of Informationsfreiheit
Transparenz mit der Brechstange
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
58 min
Virtual Machine Introspection
From the Outside Looking In
69 min