Search for "30" returned 4245 results
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
60 min
Crypto Wars Part II
The Empires Strike Back
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
20 min
The Nibbletronic
A DIY MIDI Controller and a New UI for Wind Instruments
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
59 min
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
Ein Streifzug durch die Fehler in der Kryptografie
34 min
Ling - High level system programming
modular and precise resource management
60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
62 min
Let's Encrypt
A Free Robotic Certificate Authority
58 min