Search for "841" returned 1866 results

Trackography
31 min

Trackography

You never read alone

CounterStrike
46 min

CounterStrike

Lawful Interception

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Wohnungsbot: An Automation-Drama in Three Acts
40 min

Wohnungsbot: An Automation-Drama in Three Acts

A media-art project which automates the search for flats in…

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Einführung in Smartphone Malware Forensik
62 min

Einführung in Smartphone Malware Forensik

Wie man Stalkerware und Staatstrojaner auf Smartphones…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.