Search for "ultimate" returned 108 results
47 min
Tightening the Net in Iran
The Situation of Censorship and Surveillance in Iran, and…
32 min
Coding your body
How to decipher the messages of your body
60 min
Inside the Fake Like Factories
How thousands of Facebook, You Tube and Instagram pages…
56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…
31 min
The Clash of Digitalizations
The Devolution of Arab Men from Humans to Digital Fodder
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
61 min
Programming FPGAs with PSHDL
Let's create the Arduino for FPGAs
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
42 min
Union Busting
What is it and why you should care
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
51 min
How to contribute to make open hardware happen
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…
60 min