Search for "292" returned 2187 results

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

From Maxwell to antenna arrays
53 min

From Maxwell to antenna arrays

How 150 year old equations still help to communicate

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Traue keinem Scan, den du nicht selbst gefälscht hast
63 min

Traue keinem Scan, den du nicht selbst gefälscht hast

"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…