Search for "36c3" returned 2362 results

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

T-Minus Zero
38 min

T-Minus Zero

The first days in the life of the "Flying Laptop" satellite

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…