Search for "32c2"
prev
next
60 min
The potential for payment system abuse
60 min
phone verified accounts bringing the Hessian army back to…
60 min
A deep dive into the surveillance features of North Korea's…
62 min
Pure capability-based security for UNIX
60 min
Calling secret service agents to quit their jobs
30 min
Visualizing WLAN Channel Usage on OpenWRT
58 min
A brief introduction to search over encrypted data
22 min
Net-activism strategies against fake web companies
60 min
1 Jahr Freifunk in Südhessen
60 min
How to design and fabricate soft robots using everyday…
60 min
A gentle introduction to post-quantum cryptography
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
59 min
*(will be specified later based on usability test with…
60 min
Let's Build together a Free, Neutral and Decentralized…
51 min
Guess what? The Government of Rafael Correa actually is…
30 min
The first Open Source Cinema Camera
58 min
An inside look at x86 CPU design
60 min
Making it easier to avoid low-level compromise, and why…
63 min
exploring two decades of transport layer insecurity
62 min
The surveillance state & modern day COINTELPRO tactics
prev
next