Search for "nOlr" returned 169 results
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
54 min
Do You Think That's Funny?
Art Practice under the Regime of Anti-Terror Legislation
32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized
54 min
A la recherche de l'information perdue
some technofeminist reflections on Wikileaks
10 min
Premiere: We love surveillance
#7reasons
103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…
37 min
Privacy by Design
Collecting data in a socially responsible manner without…
41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…
21 min
Nerds touching grass
Let’s start a bio-hackspace-revolution
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy
43 min
If It Ain't Broken, Do Fix It
Building Modern Cryptography
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
64 min
Cory Doctorow – Fireside Chat
Reading and Q&A
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
43 min