Search for "Kat" returned 5493 results
30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…
38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain
61 min
Uncaging Microchips
Techniques for Chip Preparation
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
62 min
A New Kid on the Block
Conditions for a Successful Market Entry of Decentralized…
60 min
Unpatchable
Living with a vulnerable implanted device
32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…
31 min
BGP and the Rule of Custom
How the internet self-governs without international law
30 min
Information Control and Strategic Violence
How governments use censorship and surveillance as part of…
58 min
CHINTERNET ART
Creativity, Archives & Digital Media from the Chinese…
32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
45 min
To Protect And Infect
The militarization of the Internet
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
61 min