Search for "AKO" returned 1178 results
57 min
The Precariat: A Disruptive Class for Disruptive Times.
Why and How the Precariat will define the Global…
43 min
Speaking Fiction To Power
Strategies and tactics to ‘hack’ public spaces and social…
66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research
49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?
58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…
61 min
Nintendo Hacking 2016
Game Over
62 min
Netzpolitik in der Schweiz 2016
Grundrechte per Volksentscheid versenken
31 min
Nerds in the news
Spending a year coding in a newsroom
59 min
Security of the IC Backside
The future of IC analysis
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP
31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions
57 min