Search for "Twi"

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

What's It Doing Now?
32 min

What's It Doing Now?

The Role of Automation Dependency in Aviation Accidents

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…