Search for "356" returned 2024 results
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
51 min
Haecksen gegen Cyberstalking
Ein Bericht vom Anti-Stalking Projekt
31 min
The Economic Consequences of Internet Censorship
Why Censorship is a Bad Idea for Everyone
60 min
Irren ist staatlich
10 Jahre Informationsfreiheitsgesetz
147 min
Hacker Jeopardy
Zahlenraten für Geeks [Number guessing for geeks]
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
62 min
Kyber and Post-Quantum Crypto
How does it work?
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
58 min