Search for "18" returned 4658 results

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Social Cooling - big data’s unintended side effect
34 min

Social Cooling - big data’s unintended side effect

How the reputation economy is creating data-driven…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Avoiding kernel panic: Europe’s biggest fails in digital policy-making
61 min

Avoiding kernel panic: Europe’s biggest fails in digital policy-making

How the institutions fuck up, and how we fuck it up as well

Programming FPGAs with PSHDL
61 min

Programming FPGAs with PSHDL

Let's create the Arduino for FPGAs

Hacking how we see
58 min

Hacking how we see

A way to fix lazy eye?

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2