Search for "13" returned 4823 results

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Hacking how we see
58 min

Hacking how we see

A way to fix lazy eye?

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

Ecuador: how an authoritarian government is fooling the entire world
51 min

Ecuador: how an authoritarian government is fooling the entire world

Guess what? The Government of Rafael Correa actually is…

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…