Search for "nook" returned 1986 results
62 min
To Protect And Infect, Part 2
The militarization of the Internet
63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
36 min
Modchips of the State
Hardware implants in the supply-chain
58 min
Virtual Machine Introspection
From the Outside Looking In
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer
43 min
How Facebook tracks you on Android
(even if you don’t have a Facebook account)
63 min
Through a PRISM, Darkly
Everything we know about NSA spying
40 min
Boiling Mind
Analysing the link between audience physiology and…
26 min
Data Mining for Good
Using random sampling, entity resolution, communications…
41 min
MicroPython – Python for Microcontrollers
How high-level scripting languages make your hardware…
31 min
JODI - Apache is functioning normally
A net.art collective since 1995. Understanding the browser…
50 min