Search for "12" returned 5162 results
43 min
#NoPNR – Let’s kill the next Data Retention Law
How to Stop the Dubious Use of Passenger Name Records by…
61 min
Email authentication for penetration testers
When SPF is not enough
55 min
Vehicle immobilization revisited
Uncovering and assessing a second authentication mechanism…
29 min
2 Takte später
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene
56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…
43 min
The Mars Rover On-board Computer
How Curiosity's Onboard Computer works, and what you can…
44 min
Genom-Editierung mit CRISPR/Cas
“Eine neue Hoffnung” oder “Angriff der Klonkrieger”?
26 min
Technomonopolies
How technology is used to subvert and circumvent…
27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency
60 min
Durchmarsch von Rechts
…und was wir dagegen tun können
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
31 min
Mr Beam goes Kickstarter
Lessons learned from crowdfunding a hardware project
60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…
36 min
Sim Gishel
A singing and dancing robot build to take part in casting…
63 min
Dissecting HDMI
Developing open, FPGA-based capture hardware for conference…
39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist
38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain
95 min