Search

Megatons to Megawatts
59 min

Megatons to Megawatts

Military warheads as a source of nuclear fuel

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Psychedelic Medicine - Hacking Psychiatry?!
40 min

Psychedelic Medicine - Hacking Psychiatry?!

Psychedelic Therapy as a fundamentally new approach to…

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
58 min

Schweiz: Netzpolitik zwischen Bodensee und Matterhorn

E-ID, E-Voting, Netzsperren und andere netzpolitische…

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Reducing Carbon in the Digital Realm
61 min

Reducing Carbon in the Digital Realm

How to understand the environmental impact of the digital…

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Der Pfad von 4G zu 5G
60 min

Der Pfad von 4G zu 5G

Die Luftschnittstelle und das Core im Wandel der Zahlen

Hacker Jeopardy
115 min

Hacker Jeopardy

Zahlenraten für Geeks

Hack_Curio
58 min

Hack_Curio

Decoding The Cultures of Hacking One Video at a Time

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database