Search for "213" returned 2697 results
128 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 32C3
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
58 min
G10, BND-Gesetz und der effektive Schutz vor Grundrechten
Die strategische Fernmeldeüberwachung des BND vor dem…
54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
31 min
Living Drones
From war pigeons in 1914 to cyborg moths in 2014
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
60 min
Concepts for global TSCM
getting out of surveillance state mode
38 min