Search for "157" returned 2502 results

Wie man einen Blackout verursacht
62 min

Wie man einen Blackout verursacht

und warum das gar nicht so einfach ist.

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

SymbiFlow - Finally the GCC of FPGAs!
62 min

SymbiFlow - Finally the GCC of FPGAs!

A fully FOSS, Verilog to bitstream, timing driven, cross…

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

Maker Spaces in Favelas - Lecture
46 min

Maker Spaces in Favelas - Lecture

Engaging social innovation and social innovators

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system

Security Nightmares 0x14
70 min

Security Nightmares 0x14

Was Sie schon immer nicht über darüber wissen wollten wer…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

It Always Feels Like the Five Eyes Are Watching You
64 min

It Always Feels Like the Five Eyes Are Watching You

Five Eyes’ Quest For Security Has Given Us Widespread…

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

Chaos Communication Slam
101 min

Chaos Communication Slam

Technische Liebesgedichte & Horrorgeschichten im…

Uncertain Concern
58 min

Uncertain Concern

How Undocumented Immigrants in the US Navigate Technology

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Netzpolitik in der Schweiz 2016
62 min

Netzpolitik in der Schweiz 2016

Grundrechte per Volksentscheid versenken

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…