Search for "AKO" returned 1178 results
22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction
57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle
49 min
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism
63 min
Reconstructing narratives
transparency in the service of justice
39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist
43 min
WTF DJI, UAV CTF?!
A hacker's view at commercial drone security
34 min
Scuttlebutt
The decentralized P2P gossip protocol
59 min
The Surveillance State limited by acts of courage and conscience
An update on the fate of the Snowden Refugees
62 min
Was schützt eigentlich der Datenschutz?
Warum DatenschützerInnen aufhören müssen von individueller…
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
53 min
From Maxwell to antenna arrays
How 150 year old equations still help to communicate
44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers
58 min