Search for "cbass" returned 381 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

The Ghost in the Machine
62 min

The Ghost in the Machine

An Artificial Intelligence Perspective on the Soul

Community
62 min

Community

Social Life & Life in the early 21st century

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

WarGames in memory
56 min

WarGames in memory

what is the winning move?

How to Build a Mind
55 min

How to Build a Mind

Artificial Intelligence Reloaded

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

How to contribute to make open hardware happen
51 min

How to contribute to make open hardware happen

Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…