Search for "841" returned 1866 results

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Rhetorische Selbstsabotage: Was eigentlich passiert, wenn wir reden
56 min

Rhetorische Selbstsabotage: Was eigentlich passiert, wenn wir reden

Einige Gedanken über Stimme und wie wir sagen können, was…

Connected Mobility hacken: digital.bike.23
50 min

Connected Mobility hacken: digital.bike.23

Von E-Bikes in der Connected Mobility zur Entstehung eines…

The mummy unwrapped
56 min

The mummy unwrapped

Cultural Commons durch Kunstraub

Das FlipDot-Projekt
42 min

Das FlipDot-Projekt

Spaß mit mechanischer Anzeige

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

How medicine discovered sex
54 min

How medicine discovered sex

Introduction to sex- and gender-sensitive medicine

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows