Search for "rEJl" returned 1474 results

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

How to build a submarine and survive
59 min

How to build a submarine and survive

Wie wir mit begrenzten Mitteln ein U-Boot gebaut haben und…

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Internet, the Business Side
62 min

Internet, the Business Side

a try to explain the ecosystem

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

Psychedelic Medicine - Hacking Psychiatry?!
40 min

Psychedelic Medicine - Hacking Psychiatry?!

Psychedelic Therapy as a fundamentally new approach to…

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX