Search for "【"m" returned 11767 results
57 min
"Fluxus cannot save the world."
What hacking has to do with avantgarde art of the 1960ies…
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
60 min
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
Politische Phrasologie – warum man aus dem ganzen Zeug, das…
128 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 32C3
43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP
56 min
Iridium Update
more than just pagers
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
60 min
Das Zahnrad aus Fleisch
Expeditionen ins Kommentierreich
60 min
The Perl Jam 2
The Camel Strikes Back
60 min
Quantum Cryptography
from key distribution to position-based cryptography
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
34 min
Ling - High level system programming
modular and precise resource management
30 min