Search for "Kemo" returned 639 results
60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online
61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets
37 min
Listening Back Browser Add-On Tranlates Cookies Into Sound
The Sound of Surveillance
58 min
The Ultimate Acorn Archimedes talk
Everything about the Archimedes computer (with zero…
58 min
Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…
62 min
HUMUS sapiens
Open Soil Research
49 min
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism
50 min
Connected Mobility hacken: digital.bike.23
Von E-Bikes in der Connected Mobility zur Entstehung eines…
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
55 min