Search for "Ralf Lang" returned 599 results

60 min
Concepts for global TSCM
getting out of surveillance state mode

57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…

58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…

33 min
Beyond Virtual and Augmented Reality
From Superhuman Sports to Amplifying Human Senses

60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…

44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…

32 min
History and implications of DRM
From tractors to Web standards

53 min
Surveilling the surveillers
About military RF communication surveillance and other…

58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data

46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy

61 min