Search for "35" returned 4052 results
58 min
Confessions of a future terrorist
A rough guide to over-regulating free speech with…
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
61 min
Die göttliche Informatik
Die Informatik löst formale (mathematisch modellierte)…
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
60 min
Das Zahnrad aus Fleisch
Expeditionen ins Kommentierreich
50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…
36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition
58 min
Virtual Machine Introspection
From the Outside Looking In
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
51 min
Funky File Formats
Advanced binary tricks
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
61 min