Search for ".dol" returned 2575 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Trackography
31 min

Trackography

You never read alone

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Internet Cube
60 min

Internet Cube

Let's Build together a Free, Neutral and Decentralized…

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Social Cooling - big data’s unintended side effect
34 min

Social Cooling - big data’s unintended side effect

How the reputation economy is creating data-driven…