Search for "wsa" returned 5281 results

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Haft für Whistleblower?
34 min

Haft für Whistleblower?

Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. §…

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Iridium Update
56 min

Iridium Update

more than just pagers

5G & Net Neutrality
42 min

5G & Net Neutrality

Status of the Net Neutrality Reform in Europe

Trackography
31 min

Trackography

You never read alone

Planes and Ships and Saving Lives
56 min

Planes and Ships and Saving Lives

How soft and hardware can play a key role in saving lives…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter