Search for "c-atre" returned 3715 results

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Axoloti
29 min

Axoloti

DIY audio signal processing

WTFrance
31 min

WTFrance

Decrypting French encryption law

Schnaps Hacking
38 min

Schnaps Hacking

from apple to schnaps -- a complete diy-toolchain

One year of securitarian drift in France
27 min

One year of securitarian drift in France

From the Bill on Intelligence to the State of Emergency

The Transhumanist Paradox
33 min

The Transhumanist Paradox

Deciding between technological utopias in a liberal state

BBSs and early Internet access in the 1990ies
61 min

BBSs and early Internet access in the 1990ies

Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Structuring open hardware projects
33 min

Structuring open hardware projects

experiences from the “i3 Berlin” 3D printer project with…

CounterStrike
46 min

CounterStrike

Lawful Interception

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

The Pirate Cinema
29 min

The Pirate Cinema

Creating mash-up movies by hidden activity and geography of…

Community
62 min

Community

Social Life & Life in the early 21st century

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice