Search for "26" returned 4319 results

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Forensic Architecture
43 min

Forensic Architecture

Forensic Architecture is an independent research agency…

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Let’s play Infokrieg
46 min

Let’s play Infokrieg

Wie die radikale Rechte (ihre) Politik gamifiziert

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

2 Takte später
29 min

2 Takte später

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…