Search for "fake"
prev
next
55 min
Get a verifiable path from source to binary
30 min
The Red Pill of N26 Security
38 min
EU plans to swipe our freedom of expression under the carpet
26 min
Using decentralized tools
69 min
"Use your faults, use your defects, then your're gonna be a…
119 min
Ein Blick hinter die Kulissen
30 min
The making of HowNormalAmI.eu
51 min
Stories from an e-textile tailor
30 min
Reverse engineering of the Nexus 5 Wi-Fi chip
49 min
… or the joy of disposing of 5 tons of refrigerators
51 min
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
prev
next