Search for "C B" returned 9732 results

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

How to Destroy a Laptop with Top Secrets
58 min

How to Destroy a Laptop with Top Secrets

How did GCHQ do it to the Guardian's copy of Snowden's…

Fueling the Revolution
45 min

Fueling the Revolution

Personal production of bio-fuels

Helping the Helpless
56 min

Helping the Helpless

Targeted threats to civil society

A Hackers Approach To Building Electric Guitars
60 min

A Hackers Approach To Building Electric Guitars

Let's do everything except the pots by ourselves

for women in "${tech[@]}"; do
26 min

for women in "${tech[@]}"; do

Let's talk, share and learn from each other.

Gotta Block’em all
28 min

Gotta Block’em all

Creating a usable tool against online trackers

The hills are alive with the sound of hacking ... don't wake the monkeys!
69 min

The hills are alive with the sound of hacking ... don't wake the monkeys!

The State of the Hack in India. A place to be^W hack in the…

A Torifying Tale
30 min

A Torifying Tale

Our experiences of building and running Tor servers

A practical prototyping primer
30 min

A practical prototyping primer

A rather unstructured selection of things I wished I knew…

Digital Musical Instruments
34 min

Digital Musical Instruments

Evolution and design of new interfaces for musical…

Building your First Combat Robot
24 min

Building your First Combat Robot

Nothing shows pride like letting others destroy what you’ve…

Crypto Dawn
40 min

Crypto Dawn

A To Do list for Cyptographic Research and Implementations

What's the catch?
63 min

What's the catch?

Funding open source with money from corporations and…

Terraforming Planet Earth
58 min

Terraforming Planet Earth

Practical terraforming technologies for regenerating soils…