Search for ">Y<" returned 10967 results

SHA2017 Closing
29 min

SHA2017 Closing

Five days of hacking, this is what happened. You wouldn't…

The Fenrir Project
34 min

The Fenrir Project

Fixing Authentication and Transport protocols

Parkour communications
36 min

Parkour communications

How you can communicate, free running style, using nothing…

FaceDancer 2.0
61 min

FaceDancer 2.0

easy USB hacking, sniffing, and spoofing

Hack-a-ble
56 min

Hack-a-ble

Hacking BLE Smart Devices

Hackerspaces Jedi
25 min

Hackerspaces Jedi

Everything is interconnected - but how?

NSFW: Di[CENSORED]s for privacy
28 min

NSFW: Di[CENSORED]s for privacy

Why not give hackers and agencies something to look at . .

Biometric ID cards by the billion
57 min

Biometric ID cards by the billion

Experiences with Aadhaar in India, or what possibly could…

Life Needs Internet
44 min

Life Needs Internet

Documenting digital culture through handwritten letters

MISP threat sharing platform
49 min

MISP threat sharing platform

The MISP threat sharing platform is a free and open source…

&quot;Information. What are they looking at?&quot;
17 min

"Information. What are they looking at?"

A documentary on privacy for the broad audience.

Ask your candidates and let everyone know about it
41 min

Ask your candidates and let everyone know about it

How to make use of democratic elections for your own purpose

Responsible Disclosure; How to make your school a safer place.
24 min

Responsible Disclosure; How to make your school a safer place.

Story of a 15 year old hacker in collaboration with his…

Ethics in Technology
60 min

Ethics in Technology

Internet Measurements' Ethical Dilemmas and RIPE Atlas

Silent Protest
26 min

Silent Protest

DIY wearable protest network

Regulating Law Enforcement use of Trojans
49 min

Regulating Law Enforcement use of Trojans

Implementing a Law to juridically, operationally and…

Gems are truly outrageous
30 min

Gems are truly outrageous

Combining 3D printing and crystallisation techniques

Playing defence is complicated
51 min

Playing defence is complicated

What goes into playing defence and what can be holding you…

Weaponized Social
35 min

Weaponized Social

Understanding and tools to mitigate network-scale violences