Search for "B@lu" returned 3436 results

How to contribute to make open hardware happen
51 min

How to contribute to make open hardware happen

Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Calafou, postcapitalist ecoindustrial community
62 min

Calafou, postcapitalist ecoindustrial community

Building a space for grassroots sustainable technology…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

The Ghost in the Machine
62 min

The Ghost in the Machine

An Artificial Intelligence Perspective on the Soul

Community
62 min

Community

Social Life & Life in the early 21st century

The architecture of a street level panopticon
61 min

The architecture of a street level panopticon

How drones, IMSI Catchers, and cameras are shaping our…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…