Search for "578" returned 1911 results

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Maker Spaces in Favelas - Lecture
46 min

Maker Spaces in Favelas - Lecture

Engaging social innovation and social innovators

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

Free Electron Lasers
59 min

Free Electron Lasers

...or why we need 17 billion Volts to make a picture.

MicroPython – Python for Microcontrollers
41 min

MicroPython – Python for Microcontrollers

How high-level scripting languages make your hardware…