Search for "Lia Strenge" returned 228 results
60 min
What does Big Brother see, while he is watching?
Uncovering images from the secret Stasi archives.
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
66 min
31C3 Keynote
A New Dawn
63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…
60 min
Let's reverse engineer the Universe
exploring the dark
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
56 min
phyphox: Using smartphone sensors for physics experiments
An open source project for education, research and tinkering
43 min
If It Ain't Broken, Do Fix It
Building Modern Cryptography
27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency
55 min
The DROWN Attack
Breaking TLS using SSLv2
42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…
58 min
The Ultimate Acorn Archimedes talk
Everything about the Archimedes computer (with zero…
26 min
Technomonopolies
How technology is used to subvert and circumvent…
59 min
Provable Security
How I learned to stop worrying and love the backdoor
30 min
libusb: Maintainer fail
How I failed to run an open source project
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
49 min