Search for "20" returned 4812 results

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

Projekt Hannah
61 min

Projekt Hannah

Ein open-source Hardware- und Software-Design für…

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Beeinflussung durch Künstliche Intelligenz
61 min

Beeinflussung durch Künstliche Intelligenz

Über die Banalität der Beeinflussung und das Leben mit…

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Trügerische Sicherheit
61 min

Trügerische Sicherheit

Wie die Überwachung unsere Sicherheit gefährdet

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back