Search for "26" returned 4293 results
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
46 min
Let’s play Infokrieg
Wie die radikale Rechte (ihre) Politik gamifiziert
44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks
43 min
Forensic Architecture
Forensic Architecture is an independent research agency…
46 min
Basics of Digital Wireless Communication
introduction to software radio principles
39 min
The Eye on the Nile
Egypt's Civil Society Under Attack
56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…
33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…
66 min
The Snowden Refugees under Surveillance in Hong Kong
A Rapidly Emerging Police State and Imminent Deportation to…
29 min
2 Takte später
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene
30 min
Syrian Archive
Preserving documentation of human rights violations
32 min
Fuck Dutch mass-surveillance: let's have a referendum!
Forcing the Netherlands to publicly debate privacy and the…
34 min
Ling - High level system programming
modular and precise resource management
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
32 min
The Moon and European Space Exploration
Refocusing on the moon as a platform for future deep space…
60 min
Beyond your cable modem
How not to do DOCSIS networks
60 min