Search for "20" returned 4812 results
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
61 min
Now I sprinkle thee with crypto dust
Internet reengineering session
61 min
Projekt Hannah
Ein open-source Hardware- und Software-Design für…
58 min
The Ultimate Acorn Archimedes talk
Everything about the Archimedes computer (with zero…
61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
61 min
Trügerische Sicherheit
Wie die Überwachung unsere Sicherheit gefährdet
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
60 min