Search for "15" returned 4954 results
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
67 min
The Maker movement meets patent law
How many windows are open in the patent fortress
39 min
Hacking the Czech Parliament via SMS
A parliamentary drama of 223 actors
61 min
Weichenstellung
In welcher digitalen Welt werden wir leben?
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…
32 min
Das Transparenzportal Hamburg
Inhalt und Umsetzung
60 min
Prediction and Control
Watching Algorithms
32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…
59 min
Die Sprache der Populisten
Wie politische "Gewissheiten" sprachlich konstruiert werden
61 min
Zamir Transnational Network und Zagreb Dairy
Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)
45 min
To Protect And Infect
The militarization of the Internet
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
61 min