Search for "15" returned 4947 results
54 min
World War II Hackers
Stalin's best men, armed with paper and pen
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
30 min
The ArduGuitar
An Arduino Powered Electric Guitar
29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…
58 min
Überwachen und Sprache
How to do things with words
53 min
Cryptography demystified
An introduction without maths
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
58 min
Baseband Exploitation in 2013
Hexagon challenges
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
60 min
Concepts for global TSCM
getting out of surveillance state mode
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
55 min
White-Box Cryptography
Survey
38 min
Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
open source DIY brain-computer-interfaces | technology and…
32 min
library operating systems
reject the default reality^W abstractions and substitute…
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
58 min