Search for "Mark" returned 1118 results

43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…

32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs

13 min
Urbanes Grün - Digital?!
Neue Perspektiven durch die niedrigschwellige Erschließung…

66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research

54 min
A la recherche de l'information perdue
some technofeminist reflections on Wikileaks

29 min
2 Takte später
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…

60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…

38 min
Hunting the Sigfox: Wireless IoT Network Security
Dissecting the radio protocol of Sigfox, the global…

31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future

61 min
Uncaging Microchips
Techniques for Chip Preparation

60 min