Search for "264" returned 2201 results

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

G10, BND-Gesetz und der effektive Schutz vor Grundrechten
58 min

G10, BND-Gesetz und der effektive Schutz vor Grundrechten

Die strategische Fernmeldeüberwachung des BND vor dem…

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

Beeinflussung durch Künstliche Intelligenz
61 min

Beeinflussung durch Künstliche Intelligenz

Über die Banalität der Beeinflussung und das Leben mit…

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

The Critical Making Movement
60 min

The Critical Making Movement

How using critical thinking in technological practice can…