Search for "ty5E" returned 708 results

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Wifibroadcast
42 min

Wifibroadcast

How to convert standard wifi dongles into digital broadcast…

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Wohnungsbot: An Automation-Drama in Three Acts
40 min

Wohnungsbot: An Automation-Drama in Three Acts

A media-art project which automates the search for flats in…

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Financial surveillance
59 min

Financial surveillance

Exposing the global banking watchlist