Search for "jodel" returned 915 results
54 min
How (not) to build autonomous robots
Fables from building a startup in Silicon Valley
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
60 min
Concepts for global TSCM
getting out of surveillance state mode
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
58 min
Baseband Exploitation in 2013
Hexagon challenges
51 min
Wireless Drivers: Freedom considered harmful?
An OpenWrt perspective on the development of Linux 802.11…
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
59 min
TamaGo - bare metal Go framework for ARM SoCs.
Reducing the attack surface with pure embedded Go.
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age
59 min
Hacking EU funding for a decentralizing FOSS project
Understanding and adapting EU legal guidelines from a FOSS…
63 min
Don't stop 'til you feel it
Artistic interventions in climate change
58 min
RFID Treehouse of Horror
Hacking City-Wide Access Control Systems
60 min
The Fight for Encryption in 2016
Crypto fight in the Wake of Apple v. FBI
63 min