Search for "cy" returned 5995 results
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
46 min
Basics of Digital Wireless Communication
introduction to software radio principles
46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy
25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
63 min
Reconstructing narratives
transparency in the service of justice
28 min
Home Distilling
Theory and practice of moonshining and legal distilling
33 min
Beyond Virtual and Augmented Reality
From Superhuman Sports to Amplifying Human Senses
43 min
This is NOT a proposal about mass surveillance!
Analysing the terminology of the UK’s Snooper’s Charter
42 min
openSUSE MicroOS
A new distro for a new age
30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer
55 min
SigOver + alpha
Signal overshadowing attack on LTE and its applications
53 min
The Ultimate Amiga 500 Talk
Amiga Hardware Design And Programming
32 min
Visceral Systems
Approaches to working with sound and network data…
61 min
The architecture of a street level panopticon
How drones, IMSI Catchers, and cameras are shaping our…
30 min