Search for "glow" returned 1304 results

60 min
Quantum Cryptography
from key distribution to position-based cryptography

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online

63 min
Reconstructing narratives
transparency in the service of justice

55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…

55 min
Fuzzing the phone in the iPhone
D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…

60 min
Shopshifting
The potential for payment system abuse

43 min
unexpected coffee
a dive into industrial coffee machines

64 min
On the Security and Privacy of Modern Single Sign-On in the Web
(Not Only) Attacks on OAuth and OpenID Connect

31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?

53 min
Surveilling the surveillers
About military RF communication surveillance and other…

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows

40 min
Psychedelic Medicine - Hacking Psychiatry?!
Psychedelic Therapy as a fundamentally new approach to…

60 min