Search for "16" returned 4652 results

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

Archäologische Studien im Datenmüll
41 min

Archäologische Studien im Datenmüll

Welche Daten speichert Amazon über uns?

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

0en & 1en auf dem Acker
30 min

0en & 1en auf dem Acker

Was die Sensor & Automatisierungstechnik in der…

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

BGP and the Rule of Custom
31 min

BGP and the Rule of Custom

How the internet self-governs without international law

How does the Internet work?
50 min

How does the Internet work?

An explanation of Inter-Net and everyday protocols

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized