Events for tag "SHA2017"
156 min
The legendary workshop that teaches you how network really…
28 min
Why not give hackers and agencies something to look at . .
29 min
Five days of hacking, this is what happened. You wouldn't…
30 min
When reality beats science fiction
44 min
Cracking DES nearly 20 years after the EFF DES Cracker
59 min
Mind-sets, state-of-the-art methods and practices according…
48 min
Do you know what you can do with Firefox for frontend…
26 min
DIY wearable protest network
53 min
ensuring civil rights in the digital era
58 min
I measured 60% of the DNS, and I found this
43 min
facebook.tracking.exposed
53 min
NLNet sponsored (open hardware) trusted boot module
49 min
Implementing a Law to juridically, operationally and…
57 min
What it means to profit from privacy-friendly, open-source…
23 min
World radio spectrum domination through silicon control
38 min
Fun with onboard maritime systems
18 min
How Universities in the US collaborate with the United…
62 min
Hunting down a criminal call center
36 min
Bringing an electronic project to market in kit form
61 min
Independent One-Click Payments!
64 min
Current case studies of whistleblowing in Europe, and how…
30 min
Combining 3D printing and crystallisation techniques
27 min
In what ways can laws influence the security of society.
45 min
“Code Our Glance” and beta “CodeKlavier”
47 min
act up on decentralization
59 min
Perspective from the inside
47 min
A cryptographically secure social network platform
81 min
Towards a future of autonomous wireless electronics without…
41 min
How to make use of democratic elections for your own purpose
59 min
The government is here to help
60 min
Identity and Agency In the Age of Algorithms
25 min
Eventpad: the Sublime editor for network traffic
37 min
Why MissingMaps saves lives, and how to help
51 min
An authentication protocol that offers security, privacy…
58 min
Theories of Governance for a Distributed Machine Vision…
52 min
It's all fun and games until reality starts kicking you in…
32 min
empower kids and provide tools for them to be more secure…
36 min
How you can communicate, free running style, using nothing…
23 min
Heaven is imperfect by design
50 min
Bypassing Secure Boot using Fault Injection
40 min
How to re-enact a 1982 network art performance
33 min
How can we make sure that young people's voices are heard…
57 min
It's not only Hollywood who is out of ideas
56 min
From Napster to Bitcoin to Ethereum to Statebox: saving the…
60 min
Advanced Rowhammer exploitation on cloud, desktop, and…
74 min
If you like untaxed links and unsurveilled uploads, you…
34 min
New paradigm in handling personal (health) data
51 min
What goes into playing defence and what can be holding you…
48 min
Retro-gaming on open hardware
58 min
(mis)adventures in generative art
141 min
TEETH, Hippis from Hell, Them F*cking Robots
50 min
towards edible network infrastructures
61 min
Easy to use automatic encryption for the masses
40 min
Free and open source software has far too many security…
41 min
Have we silently lost the battle against software patents…
21 min
Ethics, colonialism, technological optimism and the reality…
61 min
How people have lost their anonymity? Let's study…
49 min
The MISP threat sharing platform is a free and open source…
17 min
A documentary on privacy for the broad audience.
24 min
Story of a 15 year old hacker in collaboration with his…
54 min
How all the infra teams made SHA2017 possible
28 min
Modern Day American Hobo-ism
40 min
The ultimate Hackerspace; From Panopticon-prison to…
53 min
Checkpoint on the road towards inevitable
50 min
Not only hackers do Security, Privacy and Hacking. Want to…
44 min
Documenting digital culture through handwritten letters
46 min
THE ALGORITHMIC PUBLIC SPHERE AND YOU
60 min
Internet Measurements' Ethical Dilemmas and RIPE Atlas
39 min
How the Internet is impacting organizing and dissent in…
55 min
Implementation, hazards and updates on use of RNGs in…
64 min
experimental, educational and commercial fermentation…
29 min
are you not curious now? ;)
52 min
Doing well is good enough
62 min
Adventures in LED Lighting
39 min
Keeping Secrets On Remote Machines
48 min
FLOSS, NGOs, Activists, Journalists, and the Pareto…
36 min
Using TOR for securing Smart Homes from prying eyes
34 min
Fixing Authentication and Transport protocols
38 min
How to build alternative controllers
60 min
Managing Neurodiversity with Cognitive Empathy
33 min
How the reputation economy is turning us into conformists
63 min
how your digital doppelganger has been exploiting you all…
61 min
Surprise: it is fully digital!
56 min
Hacking BLE Smart Devices
61 min
Hacking your brain, and other body parts. Debunking myths…
61 min
easy USB hacking, sniffing, and spoofing
68 min
How to read brainwaves using cheap toys
25 min
Everything is interconnected - but how?
35 min
Understanding and tools to mitigate network-scale violences
57 min
Experiences with Aadhaar in India, or what possibly could…