Search for "677" returned 1827 results

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

OONI: Let's Fight Internet Censorship, Together!
30 min

OONI: Let's Fight Internet Censorship, Together!

The Open Observatory of Network Interference

Afro TECH
30 min

Afro TECH

Afrofuturism, Telling tales of speculative futures

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle