Search for "566" returned 1937 results
54 min
World War II Hackers
Stalin's best men, armed with paper and pen
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
58 min
When hardware must „just work“
An inside look at x86 CPU design
61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…
63 min
Reconstructing narratives
transparency in the service of justice
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
58 min
Baseband Exploitation in 2013
Hexagon challenges
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
60 min
Concepts for global TSCM
getting out of surveillance state mode
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
60 min