Search for "Isa" returned 9777 results

Contain yourselves
43 min

Contain yourselves

The Way We Build Systems is (Still) Wrong

Remote Exploits für die Briefwahl in Deutschland
51 min

Remote Exploits für die Briefwahl in Deutschland

Seit der Abschaffung der Sicherungsmechanismen ist die…

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Homegrown Interactive Tables
45 min

Homegrown Interactive Tables

Any Technology Sufficiently Advanced is Indistinguishable…

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Arguments Against Surveillance
64 min

Arguments Against Surveillance

'Cos "I Don't Like It" Is Not Enough!

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

Cybernetic Cannibalism
62 min

Cybernetic Cannibalism

Why is Brazil the country of the future?

Union Busting
42 min

Union Busting

What is it and why you should care

Continuous Integration using Travis and Docker
17 min

Continuous Integration using Travis and Docker

There is no excuse for NOT using continuous integration

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

A modern manifest of cyberspace
40 min

A modern manifest of cyberspace

The internet is dead, long live the internet

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

Social Cooling - big data’s unintended side effect
34 min

Social Cooling - big data’s unintended side effect

How the reputation economy is creating data-driven…

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Funkerspuk
52 min

Funkerspuk

radio politics in the USA and Germany in the first half of…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

CCC Office, die neue Software
53 min

CCC Office, die neue Software

Was ist der Stand, was kann die neue Software und was wird…

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used