Search for "AKAy" returned 1785 results
65 min
The Untold Story of Edward Snowden’s Escape from Hong Kong
and How You Can Help the Refugees Who Saved His Life
58 min
PLC-Blaster
Ein Computerwurm für PLCs
61 min
Trügerische Sicherheit
Wie die Überwachung unsere Sicherheit gefährdet
50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
51 min
How to contribute to make open hardware happen
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy
60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite
46 min
CounterStrike
Lawful Interception
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
57 min
Kryptographie nach Snowden
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
74 min
Die EU im Krisenmodus
Was bedeutet das für die Zukunft
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
61 min