Search for "glow" returned 1304 results

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy

42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…

58 min
Baseband Exploitation in 2013
Hexagon challenges

60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie

43 min
Speaking Fiction To Power
Strategies and tactics to ‘hack’ public spaces and social…

56 min
Deconstructing a Socialist Lawnmower
Obsolete Technologies + Critical Material Studies in Media…

33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…

31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work

37 min
The foodsaving grassroots movement
How cooperative online structures can facilitate…

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming

33 min