Search for "26" returned 4166 results

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Access To Bodies
31 min

Access To Bodies

Ein Leitfaden für post-humane Computer- und…

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Paypals War on Terror
58 min

Paypals War on Terror

A Historical Re-Enactment of the PayPal14

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Hacking how we see
58 min

Hacking how we see

A way to fix lazy eye?

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity