Search for "Max" returned 4591 results
63 min
The Case Against WikiLeaks: a direct threat to our community
How to understand this historic challenge and what we can…
29 min
The Pirate Cinema
Creating mash-up movies by hidden activity and geography of…
31 min
BGP and the Rule of Custom
How the internet self-governs without international law
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide
47 min
Jailbreaking iOS
From past to present
61 min
AlphaFold – how machine learning changed structural biology forever (or not?)
Getting first-hand insights into the impact of machine…
62 min
Tell no-one
A century of secret deals between the NSA and the telecom…
50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…
61 min
Net Neutrality in Europe
alea iacta est
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
39 min