Search for "16" returned 4678 results

CHINTERNET ART
58 min

CHINTERNET ART

Creativity, Archives & Digital Media from the Chinese…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Opening
12 min

Opening

Die offizielle Eröffnung des Chaos.

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
58 min

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten

Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Calafou, postcapitalist ecoindustrial community
62 min

Calafou, postcapitalist ecoindustrial community

Building a space for grassroots sustainable technology…

The Maker movement meets patent law
67 min

The Maker movement meets patent law

How many windows are open in the patent fortress

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety