Search for "31122" returned 571 results
58 min
When hardware must „just work“
An inside look at x86 CPU design
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
60 min
Concepts for global TSCM
getting out of surveillance state mode
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
58 min
Baseband Exploitation in 2013
Hexagon challenges
55 min
White-Box Cryptography
Survey
58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
60 min
Best of Informationsfreiheit
Transparenz mit der Brechstange
58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
53 min
When algorithms fail in our personal lives
Social media break up coordinator
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
54 min
10 Jahre OpenStreetMap
Wir leben noch und zwar sehr gut.
69 min
Telescope Making
How to make your own telescope
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
58 min
Virtual Machine Introspection
From the Outside Looking In
57 min