Search for "fake" returned 2758 results

Adventures in Reverse Engineering Broadcom NIC Firmware
60 min

Adventures in Reverse Engineering Broadcom NIC Firmware

Unlocking a system with 100% open source firmware

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Going Deep Underground to Watch the Stars
47 min

Going Deep Underground to Watch the Stars

Neutrino Astronomy with Hyper-Kamiokande

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

WTFrance
31 min

WTFrance

Decrypting French encryption law

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…

The eXperimental Robot Project
50 min

The eXperimental Robot Project

An open-hardware bipedal walking machine

The Clash of Digitalizations
31 min

The Clash of Digitalizations

The Devolution of Arab Men from Humans to Digital Fodder

Forensic Architecture
43 min

Forensic Architecture

Forensic Architecture is an independent research agency…

Decentralized energy production: green future or cybersecurity nightmare?
39 min

Decentralized energy production: green future or cybersecurity nightmare?

The cybersecurity dark side of solar energy when clouds are…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities