Search for "Mitch" returned 1175 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Coding your body
32 min

Coding your body

How to decipher the messages of your body

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Reality Check! Basel/Lagos?? In virtual reality?
56 min

Reality Check! Basel/Lagos?? In virtual reality?

An African tale of art, culture and technology

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Venenerkennung hacken
39 min

Venenerkennung hacken

Vom Fall der letzten Bastion biometrischer Systeme

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

Maker Spaces in Favelas - Lecture
46 min

Maker Spaces in Favelas - Lecture

Engaging social innovation and social innovators

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.