Search for "Lia Strenge" returned 222 results

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…

60 min
What does Big Brother see, while he is watching?
Uncovering images from the secret Stasi archives.

66 min
31C3 Keynote
A New Dawn

42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…

55 min
The DROWN Attack
Breaking TLS using SSLv2

60 min
Let's reverse engineer the Universe
exploring the dark

33 min
Hacking as Artistic Practice
!Mediengruppe Bitnik about their recent works

57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency

64 min
3 Years After Snowden: Is Germany fighting State Surveillance?
A Closer Look at the Political Reactions to Mass…

56 min
phyphox: Using smartphone sensors for physics experiments
An open source project for education, research and tinkering

26 min
Technomonopolies
How technology is used to subvert and circumvent…

54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?

58 min
The Ultimate Acorn Archimedes talk
Everything about the Archimedes computer (with zero…

60 min