Search for "Takt" returned 1939 results

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Hacking how we see
58 min

Hacking how we see

A way to fix lazy eye?

Modeling and Simulation of Physical Systems for Hobbyists
38 min

Modeling and Simulation of Physical Systems for Hobbyists

Essential Tools for Developing, Testing and Debugging…

Hacking as Artistic Practice
33 min

Hacking as Artistic Practice

!Mediengruppe Bitnik about their recent works

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting