Search for "Thde" returned 8451 results

shutdown
12 min

shutdown

Closing event of the conference.

"What's in a name?"
49 min

"What's in a name?"

#nymwars and the public sphere

Desperate House-Hackers
56 min

Desperate House-Hackers

How to Hack the Pfandsystem

FIDO2
48 min

FIDO2

the superior Multi Factor Authentication Framework

A Tale of Two Leaks:
31 min

A Tale of Two Leaks:

How Hackers Breached the Great Firewall of China

OPENCOIL – A Roaming Speedshow
87 min

OPENCOIL – A Roaming Speedshow

or the fine art of appropriating inductive charging pads in…

Patterns in Chaos:
60 min

Patterns in Chaos:

How Data Visualisation Helps To See the Invisible

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

Counter-Development
63 min

Counter-Development

The Accessibility of Technology as an Addendum to…

FeTAp 611 unplugged
34 min

FeTAp 611 unplugged

Taking a rotary dial phone to the mobile age

What I Learned from Loab: AI as a creative adversary
36 min

What I Learned from Loab: AI as a creative adversary

The artist behind the viral cryptid "Loab" reflects on her…

Climate Modelling
46 min

Climate Modelling

The Science Behind Climate Reports

Using BPF in Kubernetes
23 min

Using BPF in Kubernetes

Linux superpowers in the cloud

shutdown
7 min

shutdown

Closing event of the conference.

Domain Driven Design & NoSQL
39 min

Domain Driven Design & NoSQL

Escaping the Tower of Babel

WarGames in memory
56 min

WarGames in memory

what is the winning move?

Corona-Warn-App
41 min

Corona-Warn-App

Behind the scenes: Invisible, yet important

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Lightning Talks
17 min

Lightning Talks

Submit Your Talks at the Venue

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon