Search for "wose" returned 908 results

A Tale of Two Leaks:
31 min

A Tale of Two Leaks:

How Hackers Breached the Great Firewall of China

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

The Four Wars
24 min

The Four Wars

Terror, whistleblowers, drugs, internet

Fuzzing the phone in the iPhone
55 min

Fuzzing the phone in the iPhone

D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

Access To Bodies
31 min

Access To Bodies

Ein Leitfaden für post-humane Computer- und…

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

The Precariat: A Disruptive Class for Disruptive Times.
57 min

The Precariat: A Disruptive Class for Disruptive Times.

Why and How the Precariat will define the Global…

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…