Search for "12" returned 5164 results

Welcome Pattern - Theorie und Praxis
40 min

Welcome Pattern - Theorie und Praxis

(Eine Gemeinschaftsproduktion der Haecksen, der…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Freedom needs fighters!
60 min

Freedom needs fighters!

Wie die GFF mit strategischen Klagen für Freiheitsrechte…

Was schützt eigentlich der Datenschutz?
62 min

Was schützt eigentlich der Datenschutz?

Warum DatenschützerInnen aufhören müssen von individueller…

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows