Search for "26" returned 4318 results

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

Forensic Architecture
43 min

Forensic Architecture

Forensic Architecture is an independent research agency…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Hirne Hacken
43 min

Hirne Hacken

Menschliche Faktoren der IT-Sicherheit

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Let’s play Infokrieg
46 min

Let’s play Infokrieg

Wie die radikale Rechte (ihre) Politik gamifiziert

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Access To Bodies
31 min

Access To Bodies

Ein Leitfaden für post-humane Computer- und…

2 Takte später
29 min

2 Takte später

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…