Search for "15" returned 4947 results

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

calc.pw
30 min

calc.pw

Passwortgenerierung mit Arduino [Generating passwords with…

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design