Search for "27" returned 4139 results

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

Die göttliche Informatik
61 min

Die göttliche Informatik

Die Informatik löst formale (mathematisch modellierte)…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

0en & 1en auf dem Acker
30 min

0en & 1en auf dem Acker

Was die Sensor & Automatisierungstechnik in der…

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

calc.pw
30 min

calc.pw

Passwortgenerierung mit Arduino [Generating passwords with…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

BGP and the Rule of Custom
31 min

BGP and the Rule of Custom

How the internet self-governs without international law

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…