Search for "30" returned 4245 results
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
40 min
Psychedelic Medicine - Hacking Psychiatry?!
Psychedelic Therapy as a fundamentally new approach to…
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
59 min
Security of the IC Backside
The future of IC analysis
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
60 min
Quantum Cryptography
from key distribution to position-based cryptography
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom
39 min
DISNOVATION.ORG
Disobedient Innovation
25 min
»Hard Drive Punch«
Destroying data as a performative act
33 min