Search for "crypto" returned 403 results
64 min
On the Security and Privacy of Modern Single Sign-On in the Web
(Not Only) Attacks on OAuth and OpenID Connect
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications
66 min
Hacking Diversity: The Politics of Inclusion in Open Technology Cultures
Christina Dunbar-Hester
46 min
Let’s play Infokrieg
Wie die radikale Rechte (ihre) Politik gamifiziert
66 min
Keine Anhaltspunkte für flächendeckende Überwachung
Die Diskussion um NSA, PRISM, Tempora sprachlich und…
113 min
Das Bits&Bäume-Sporangium
8 Mikrokosmen, 8 Expert*innen, je 8 Minuten zu…
55 min
What is Good Technology?
Answers & practical guidelines for engineers.
49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?
28 min
Long war tactics
or how we learned to stop worrying and love the NSA
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
51 min
Digital Identity and Digital Euro
what is the EU up to now?
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
31 min