Search for "Lia Strenge" returned 222 results

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Hacking as Artistic Practice
33 min

Hacking as Artistic Practice

!Mediengruppe Bitnik about their recent works

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

One year of securitarian drift in France
27 min

One year of securitarian drift in France

From the Bill on Intelligence to the State of Emergency

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…