Search for "Adam Wight"

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Climate Modelling
46 min

Climate Modelling

The Science Behind Climate Reports

Afro TECH
30 min

Afro TECH

Afrofuturism, Telling tales of speculative futures

Let’s play Infokrieg
46 min

Let’s play Infokrieg

Wie die radikale Rechte (ihre) Politik gamifiziert

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

What de.fac2?
29 min

What de.fac2?

Attacking an opensource U2F device in 30 minutes or less

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

Opencoil
56 min

Opencoil

PART II: disrupting disruption