Search for "35" returned 4052 results
72 min
State of the Onion
Neuland
49 min
Creating Resilient and Sustainable Mobile Phones
Be prepared for the coming Digital Winter. And play…
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
60 min
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
Politische Phrasologie – warum man aus dem ganzen Zeug, das…
50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…
36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition
38 min
Hunting the Sigfox: Wireless IoT Network Security
Dissecting the radio protocol of Sigfox, the global…
58 min
Virtual Machine Introspection
From the Outside Looking In
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
61 min
Ten years after ‚We Lost The War‘
The future does not look much brighter than ten years ago.…
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
51 min
Funky File Formats
Advanced binary tricks
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
61 min