Search for "m-1-k-3" returned 9403 results

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Is the SSLiverse a safe place?
58 min

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

The importance of resisting Excessive Government Surveillance
56 min

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations…

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

File -> Print -> Electronics
51 min

File -> Print -> Electronics

A new circuit board printer will liberate you from the…

"The Concert"
56 min

"The Concert"

a disconcerting moment for free culture

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

AllColoursAreBeautiful
35 min

AllColoursAreBeautiful

interactive light installation inspired by blinkenlights

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Spinning the electronic Wheel
63 min

Spinning the electronic Wheel

Still the bicycles for the 21th century