Search for "wose" returned 845 results
40 min
What is this? A machine learning model for ants?
How to shrink deep learning models, and why you would want…
31 min
Access To Bodies
Ein Leitfaden für post-humane Computer- und…
32 min
History and implications of DRM
From tractors to Web standards
63 min
Hacking German Elections
Insecure Electronic Vote Counting - How It Returned and Why…
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
57 min
The Precariat: A Disruptive Class for Disruptive Times.
Why and How the Precariat will define the Global…
44 min
Why Nobody cares, and only You can save the World
Technology, Intuitions & Moral Expertise
56 min
Viva la Vita Vida
Hacking the most secure handheld console
57 min
Hello World!
How to make art after Snowden?
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
36 min
Apple's iPhone 15: Under the C
Hardware hacking tooling for the new iPhone generation
60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…
38 min
Honey, let's hack the kitchen:
Attacks on critical and not-so-critical cyber physical…
37 min