Search for "Germany)" returned 1001 results
44 min
So you're interested in social engineering?
The very first steps
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
59 min
Chatkontrolle - Es ist noch nicht vorbei!
Eine Tragödie in X Akten
32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…
58 min
Confessions of a future terrorist
A rough guide to over-regulating free speech with…
30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches
55 min
Cyber Necromancy
Reverse Engineering Dead Protocols
29 min
Hacking collective as a laboratory
Hackers' knowledge studied by sociologist of science
42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
54 min
How (not) to build autonomous robots
Fables from building a startup in Silicon Valley
59 min
Top X* usability obstacles
*(will be specified later based on usability test with…
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
42 min
A world without blockchain
How (inter)national money transfers works
54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox
32 min