Search for "Jim" returned 5091 results

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Designing PCBs with code
21 min

Designing PCBs with code

Is designing circuits with code instead of CAD the future…

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

Schnaps Hacking
38 min

Schnaps Hacking

from apple to schnaps -- a complete diy-toolchain

Perfect Paul
29 min

Perfect Paul

On Freedom of Facial Expression

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Afroroutes: Africa Elsewhere
38 min

Afroroutes: Africa Elsewhere

VR experience "Beyond Slavery"

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

Evolution of Brain-Computer Interfaces
35 min

Evolution of Brain-Computer Interfaces

The future of Neuro-Headsets and concepts towards…

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…