Search for "12" returned 5164 results

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Was schützt eigentlich der Datenschutz?
62 min

Was schützt eigentlich der Datenschutz?

Warum DatenschützerInnen aufhören müssen von individueller…

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Desperately Seeking Susy
60 min

Desperately Seeking Susy

A farewell to a bold proposal?

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

The Tor Network
62 min

The Tor Network

We're living in interesting times

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…