Search for "Math"

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

G10, BND-Gesetz und der effektive Schutz vor Grundrechten
58 min

G10, BND-Gesetz und der effektive Schutz vor Grundrechten

Die strategische Fernmeldeüberwachung des BND vor dem…

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

No USB? No problem.
57 min

No USB? No problem.

How to write an open source bit-bang low-speed USB stack…

This Is Not A Game
63 min

This Is Not A Game

Eine kurze Geschichte von Q als Mindfuck-Spiel

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Making homebrew for your very own Vector Super Computer
39 min

Making homebrew for your very own Vector Super Computer

Adventures running a NEC Vector Engine for fun and ...…

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols