Search for "26" returned 4166 results

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Fnord News Show
117 min

Fnord News Show

Wir helfen Euch die Fnords zu sehen.

Trust us and our business will expand!
22 min

Trust us and our business will expand!

Net-activism strategies against fake web companies