Search for "629" returned 1893 results

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

Never Forgetti
40 min

Never Forgetti

a didactic live-gaming performance about dying women across…

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…

Das Zahnrad aus Fleisch
60 min

Das Zahnrad aus Fleisch

Expeditionen ins Kommentierreich

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…