Search for "tim" returned 6509 results

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

ARMore: Pushing Love Back Into Binaries
38 min

ARMore: Pushing Love Back Into Binaries

Aarch64 binary rewriting adventures but mostly pains

All Our Shared Spectrum Are Belong to Us
30 min

All Our Shared Spectrum Are Belong to Us

Visualizing WLAN Channel Usage on OpenWRT

Maker Spaces in Favelas - Lecture
46 min

Maker Spaces in Favelas - Lecture

Engaging social innovation and social innovators

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Holography of Wi-Fi radiation
61 min

Holography of Wi-Fi radiation

Can we see the stray radiation of wireless devices? And…

The Nibbletronic
20 min

The Nibbletronic

A DIY MIDI Controller and a New UI for Wind Instruments

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Der 33 Jahrerückblick
26 min

Der 33 Jahrerückblick

Technology and Politics in Congress Talks, from 1984 to now

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.