Search for "13" returned 4820 results

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Trügerische Sicherheit
61 min

Trügerische Sicherheit

Wie die Überwachung unsere Sicherheit gefährdet

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

CounterStrike
46 min

CounterStrike

Lawful Interception

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Es sind die kleinen Dinge im Leben II
29 min

Es sind die kleinen Dinge im Leben II

was alles geht und wie man anfängt, mit Mikroskopen

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging