Search for "csk" returned 1278 results

49 min
Pick and Pain.
Oder: Wie oft man innerhalb eines Projektes scheitern kann.

56 min
Running your own 3G/3.5G network
OpenBSC reloaded

42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

101 min
Security Nightmares
Damit Sie auch morgen schlecht von Ihrem Computer träumen.

62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…

65 min
The Untold Story of Edward Snowden’s Escape from Hong Kong
and How You Can Help the Refugees Who Saved His Life

62 min
Space Hacker
Uploading rover...

40 min
The Great Escape of ESXi
Breaking Out of a Sandboxed Virtual Machine

60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…

32 min