Search for "Lia Strenge" returned 223 results

66 min
31C3 Keynote
A New Dawn

63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

41 min
Our Time in a Product Review Cabal
And the malware and backdoors that came with it.

60 min
What does Big Brother see, while he is watching?
Uncovering images from the secret Stasi archives.

60 min
Let's reverse engineer the Universe
exploring the dark

42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…

57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge

55 min
The DROWN Attack
Breaking TLS using SSLv2

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency

56 min
phyphox: Using smartphone sensors for physics experiments
An open source project for education, research and tinkering

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

26 min
Technomonopolies
How technology is used to subvert and circumvent…

64 min
3 Years After Snowden: Is Germany fighting State Surveillance?
A Closer Look at the Political Reactions to Mass…

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

59 min