Search for "Twi"

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Opencoil
56 min

Opencoil

PART II: disrupting disruption

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Unlocking the Road Ahead: Automotive Digital Forensics
36 min

Unlocking the Road Ahead: Automotive Digital Forensics

A deep dive into an underrepresented research area

Place & route on silicon
38 min

Place & route on silicon

A gentle introduction to place & route algorithms for…

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Hello World!
57 min

Hello World!

How to make art after Snowden?

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Deconstructing a Socialist Lawnmower
56 min

Deconstructing a Socialist Lawnmower

Obsolete Technologies + Critical Material Studies in Media…

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…