Search for "ths" returned 9236 results

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

SmartMeter
59 min

SmartMeter

A technological overview of the German roll-out

Remote Attestation in MicroOS
35 min

Remote Attestation in MicroOS

Measuring the health of our system with a TPM

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

DNF vs ZYpp: Fight!
32 min

DNF vs ZYpp: Fight!

A comparison of the two major RPM package managers

Regulating Autonomous Weapons
25 min

Regulating Autonomous Weapons

The time travelling android isn’t even our biggest problem

Social cooling
33 min

Social cooling

How the reputation economy is turning us into conformists

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Uyuni: introduction, last year's updates and future
25 min

Uyuni: introduction, last year's updates and future

What is Uyuni? - What's been going on the last year? -…

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

LibreRouter demo
40 min

LibreRouter demo

Lessons learned developing open source hardware for the…

Legacy Crypto Never Dies
44 min

Legacy Crypto Never Dies

Cracking DES nearly 20 years after the EFF DES Cracker

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Oil Into Digits
48 min

Oil Into Digits

A short exploration of the relation between energy and…

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

Wireless Drivers: Freedom considered harmful?
51 min

Wireless Drivers: Freedom considered harmful?

An OpenWrt perspective on the development of Linux 802.11…

Generating uniqueness
45 min

Generating uniqueness

How generative art pushes the boundaries of intellectual…