Search for "358" returned 2013 results

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

Mensch - Kunst – Maschine
62 min

Mensch - Kunst – Maschine

Mit künstlicher Intelligenz zu neuer Kunst zum…