Search for "ths" returned 8600 results
32 min
DNF vs ZYpp: Fight!
A comparison of the two major RPM package managers
25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem
33 min
Social cooling
How the reputation economy is turning us into conformists
30 min
NexMon - Make Wi-Fi hacking on smartphones great again!
Reverse engineering of the Nexus 5 Wi-Fi chip
66 min
Podjournalism
The Role of Podcasting in Critical and Investigative…
82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones
61 min
DevOps but for artworks in museums
A look into pipelines ending in museums and not in the cloud
37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…
31 min
openSUSE ALP prototype on AWS, experimental, but fun!
Experiences, challenges and how SUSE NeuVector came into…
38 min
Rowhammer exploit
Viability of the Rowhammer Attack when ECC memory is used
40 min
LibreRouter demo
Lessons learned developing open source hardware for the…
44 min
Legacy Crypto Never Dies
Cracking DES nearly 20 years after the EFF DES Cracker
29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…
48 min
Oil Into Digits
A short exploration of the relation between energy and…
45 min
Implementation of MITM Attack on HDCP-Secured Links
A non-copyright circumventing application of the HDCP…
68 min
"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
Thoughts on the Automation and its Human interfaces on…
51 min
Wireless Drivers: Freedom considered harmful?
An OpenWrt perspective on the development of Linux 802.11…
56 min
Blackbox JTAG Reverse Engineering
Discovering what the hardware architects try to hide from…
52 min
No Body's Business But Mine, a dive into Menstruation Apps
The Not-So Secret Data Sharing Practices Of Menstruation…
41 min
Framing digital industry into planetary limits and transition policies
The environmental costs of digital industry and pathways to…
16 min
What can you do with a self-hosted alternative to Office365, Google Apps and others
A small selection of the nearly 200 apps for Nextcloud
34 min
Roadrunner: Securing services with LetsEncrypt
Why you should no longer be afraid of using TLS
32 min
library operating systems
reject the default reality^W abstractions and substitute…
33 min