Search for "llm" returned 319 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Hacking the Climate
40 min

Hacking the Climate

Mit Climate Engineering raus aus der Klimakrise?

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Projekt Hannah
61 min

Projekt Hannah

Ein open-source Hardware- und Software-Design für…

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework