Search for "Christian Heck"
prev
next
60 min
from key distribution to position-based cryptography
58 min
Physically Unclonable Functions for Hardware Tamper…
39 min
When your browser is mining coins for other people
51 min
An AES encrypted radio system
45 min
Spotting (digital) tech fictions as replacement for social…
63 min
Whistleblowers and the Cases of The Snowden Refugees and…
45 min
The militarization of the Internet
69 min
How to make your own telescope
46 min
Engaging social innovation and social innovators
53 min
Uncovering Nation-State Mobile Espionage in the Wild
53 min
Tools for Fooling the "Black Box"
59 min
A complete toolbox for IoT security
59 min
A Lawful Method for Converting Closed IP into Open IP
57 min
What hacking has to do with avantgarde art of the 1960ies…
prev
next