Search for "LAC team" returned 769 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Copywrongs 2.0
61 min

Copywrongs 2.0

We must prevent EU copyright reform from breaking the…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

51 Ways to Spell the Image Giraffe:
38 min

51 Ways to Spell the Image Giraffe:

The Hidden Politics of Token Languages in Generative AI

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Infrastructure of a migratory bird
41 min

Infrastructure of a migratory bird

Technology and autonomy in more-than-human networks

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…