Search for "16164" returned 550 results

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

CHINTERNET ART
58 min

CHINTERNET ART

Creativity, Archives & Digital Media from the Chinese…

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

The Internet in Cuba: A Story of Community Resilience
58 min

The Internet in Cuba: A Story of Community Resilience

Get a unique tour of some of the world’s most unusual…

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Public Library/Memory of the World
62 min

Public Library/Memory of the World

Access to knowledge for every member of society

Die dreckige Empirie
61 min

Die dreckige Empirie

Kann man empirischen Studien trauen?

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…