Search for "Ray" returned 3357 results

Regulating Law Enforcement use of Trojans
49 min

Regulating Law Enforcement use of Trojans

Implementing a Law to juridically, operationally and…

Attacking IoT Telemetry
70 min

Attacking IoT Telemetry

A study of weaknesses in the pipeline of rapidly advancing…

Analog Computing
39 min

Analog Computing

High performance/low power computing based on the analog…

34C3 Infrastructure Review
57 min

34C3 Infrastructure Review

How does the CCC run a conference?

Hacking in China
57 min

Hacking in China

What China has to offer

Dropwizard
32 min

Dropwizard

Framework für Microservices

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Extended DNA Analysis
31 min

Extended DNA Analysis

Political pressure for DNA-based facial composites

Cyborg Foundation
27 min

Cyborg Foundation

Transpecies Society

Micro Services
59 min

Micro Services

Vertical thinking for a simple architecture!

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation