Search for "Twi"

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Hebocon
36 min

Hebocon

The sumo robot fight for the technically ungifted

Desperately Seeking Susy
60 min

Desperately Seeking Susy

A farewell to a bold proposal?

Psychedelic Medicine - Hacking Psychiatry?!
40 min

Psychedelic Medicine - Hacking Psychiatry?!

Psychedelic Therapy as a fundamentally new approach to…

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

BBSs and early Internet access in the 1990ies
61 min

BBSs and early Internet access in the 1990ies

Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography