Search for "nook" returned 1989 results
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
60 min
Lets break modern binary code obfuscation
A semantics based approach
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
69 min
Telescope Making
How to make your own telescope
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…
59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.
33 min
Watching the changing Earth
warning: gravity ahead
59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
60 min
Windows drivers attack surface
some 'new' insights
39 min
Gamified Control?
China's Social Credit Systems
62 min
Transhuman Expression
Interdisciplinary research in Painting and Robotics. with…
43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…
60 min
Software Defined Emissions
A hacker’s review of Dieselgate
41 min