Search for "Max" returned 4697 results

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

What's It Doing Now?
32 min

What's It Doing Now?

The Role of Automation Dependency in Aviation Accidents

Develop Secure Software - The DevGuard Project
59 min

Develop Secure Software - The DevGuard Project

OSS Security von Entwicklern für Entwickler

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

What is Good Technology?
55 min

What is Good Technology?

Answers & practical guidelines for engineers.