Search for "265" returned 2199 results

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

G10, BND-Gesetz und der effektive Schutz vor Grundrechten
58 min

G10, BND-Gesetz und der effektive Schutz vor Grundrechten

Die strategische Fernmeldeüberwachung des BND vor dem…

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Beeinflussung durch Künstliche Intelligenz
61 min

Beeinflussung durch Künstliche Intelligenz

Über die Banalität der Beeinflussung und das Leben mit…

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

The Tor Network
62 min

The Tor Network

We're living in interesting times

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Transhuman Expression
62 min

Transhuman Expression

Interdisciplinary research in Painting and Robotics. with…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Desperately Seeking Susy
60 min

Desperately Seeking Susy

A farewell to a bold proposal?

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Die Drohnenkriege
66 min

Die Drohnenkriege

Kriegsführung der Zukunft?