Search for "ICAN"

Playing defence is complicated
51 min

Playing defence is complicated

What goes into playing defence and what can be holding you…

Counter-lobbying in the EU Parliament
60 min

Counter-lobbying in the EU Parliament

How citizens can hack the legislative process to protect…

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

Copyfighters
33 min

Copyfighters

How can we make sure that young people's voices are heard…

4+2+1 Jahre BigBrotherAwards Deutschland
52 min

4+2+1 Jahre BigBrotherAwards Deutschland

Eine Lesung aus dem Buch "Schwarzbuch Datenschutz"

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

We don't trust voting computers
138 min

We don't trust voting computers

The story of the dutch campaign against black-box voting to…

A Probabilistic Trust Model for GnuPG
55 min

A Probabilistic Trust Model for GnuPG

A new way of evaluating a PGP web of trust by using a…

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

Drones
50 min

Drones

Autonomous flying vehicles

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

Mobile devices and openSUSE, is it posible?
30 min

Mobile devices and openSUSE, is it posible?

It is time to check if we can use a mobile device with a…

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Web-App-Encryption
63 min

Web-App-Encryption

Is your data secure by default? How Django can be used to…

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen