Search for "35" returned 4052 results

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Die göttliche Informatik
61 min

Die göttliche Informatik

Die Informatik löst formale (mathematisch modellierte)…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

Die Krise der Bilder ist die Krise der Politik
58 min

Die Krise der Bilder ist die Krise der Politik

Die Krise der Politik ist die Krise der Bilder

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Das Zahnrad aus Fleisch
60 min

Das Zahnrad aus Fleisch

Expeditionen ins Kommentierreich

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…