Search for "31c3" returned 2410 results

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

IFG – Mit freundlichen Grüßen
33 min

IFG – Mit freundlichen Grüßen

Neue Energie für die Informationsfreiheit

Mit Kunst die Gesellschaft hacken
67 min

Mit Kunst die Gesellschaft hacken

Das Zentrum für politische Schönheit

SS7: Locate. Track. Manipulate.
60 min

SS7: Locate. Track. Manipulate.

You have a tracking device in your pocket

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities