Search for "nook" returned 1986 results

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Through a PRISM, Darkly
63 min

Through a PRISM, Darkly

Everything we know about NSA spying

Boiling Mind
40 min

Boiling Mind

Analysing the link between audience physiology and…

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

MicroPython – Python for Microcontrollers
41 min

MicroPython – Python for Microcontrollers

How high-level scripting languages make your hardware…

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

The eXperimental Robot Project
50 min

The eXperimental Robot Project

An open-hardware bipedal walking machine

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography