Search for "265" returned 2185 results

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Archäologische Studien im Datenmüll
41 min

Archäologische Studien im Datenmüll

Welche Daten speichert Amazon über uns?

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…