Search for "Jean" returned 1417 results

69 min
Telescope Making
How to make your own telescope

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

50 min
The eXperimental Robot Project
An open-hardware bipedal walking machine

38 min
Policing the Romantic Crowd
Velocipedes and Face Recognition

64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

24 min
The Four Wars
Terror, whistleblowers, drugs, internet

33 min
The Transhumanist Paradox
Deciding between technological utopias in a liberal state

61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…

56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

33 min
Turing Complete User
What can be done to protect the term, the notion and the…

62 min
Kyber and Post-Quantum Crypto
How does it work?

38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain

36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition

42 min