Search for "149" returned 2418 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Fnord News Show
117 min

Fnord News Show

Der schonungslose Realitätsabgleich mit…

Simulating Universes
60 min

Simulating Universes

What Virtual Universes Can Tell Us About Our Own

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

Low Cost Non-Invasive Biomedical Imaging
35 min

Low Cost Non-Invasive Biomedical Imaging

An Open Electrical Impedance Tomography Project

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI