Search for "t"
Taking a look at a covert CIA virtual fencing solution
Hardware attacks on the latest generation of ARM Cortex-M…
Reducing the attack surface with pure embedded Go.
How to understand the environmental impact of the digital…
A security study of turbine control systems in power…
How thousands of Facebook, You Tube and Instagram pages…
Looking back at the perhaps most dramatic instance of…
From Unanimity to Anonymity
A review of the best art & tech projects from 2019. With a…
Exploring a new attack surface on the 3DS
Everything about the Archimedes computer (with zero…
How Betrusted Aims to Close the Hardware TOCTOU Gap
Wann können wir im Team mehr erreichen und wie viele sind…
style-agnostic tricks and techniques of all eras
Technology, Intuitions & Moral Expertise
A tale of four generations
How to make (nearly) everything from electricity.
How to educate society through the language of art
The Price of Energy and Reducing CO2 Emissions
Decentralising the fight against automated surveillance in…
...or the 37th floor of a Hotel
Owning machines through relaying and delegation