Search for "Thesix"
prev
next
57 min
Perceptions of hackers and hacktivists on their…
63 min
Can Artificial Intelligence become conscious?
54 min
Art Practice under the Regime of Anti-Terror Legislation
58 min
Hacking City-Wide Access Control Systems
58 min
Possible paths from today's ghastly hackery to what…
59 min
Understanding the architecture of a quantum processor
61 min
How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…
46 min
Analyzing & Breaking Exploit Mitigations and Secure Random…
55 min
The future of space exploration
31 min
From Hacker Culture to the Software of the Future
47 min
Neutrino Astronomy with Hyper-Kamiokande
32 min
Overview on Current Efforts - We Need Moar H4x0rs?!
58 min
Export controls and exploit regulations: braindead and…
67 min
How many windows are open in the patent fortress
49 min
Activity Recognition for the Mind
54 min
Introduction to sex- and gender-sensitive medicine
53 min
Tools for Fooling the "Black Box"
36 min
Analyzing Embedded OS Random Number Generators
58 min
Breaking PDF Encryption and PDF Signatures
57 min
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
50 min
An open-hardware bipedal walking machine
prev
next