Search for "Bea" returned 6111 results

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

Software Defined Emissions
60 min

Software Defined Emissions

A hacker’s review of Dieselgate

A New Kid on the Block
62 min

A New Kid on the Block

Conditions for a Successful Market Entry of Decentralized…