Search for "sudden6"

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

The Internet of rubbish things and bodies
52 min

The Internet of rubbish things and bodies

A review of the best art & tech projects from 2019. With a…

SatNOGS: Crowd-sourced satellite operations
28 min

SatNOGS: Crowd-sourced satellite operations

Satellite Open Ground Station Network

libusb: Maintainer fail
30 min

libusb: Maintainer fail

How I failed to run an open source project

A New Kid on the Block
62 min

A New Kid on the Block

Conditions for a Successful Market Entry of Decentralized…

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

How medicine discovered sex
54 min

How medicine discovered sex

Introduction to sex- and gender-sensitive medicine

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

The Internet in Cuba: A Story of Community Resilience
58 min

The Internet in Cuba: A Story of Community Resilience

Get a unique tour of some of the world’s most unusual…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…