Search for "26" returned 4314 results

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

The KGB Hack: 30 Years Later
47 min

The KGB Hack: 30 Years Later

Looking back at the perhaps most dramatic instance of…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches