Search for "Germany) " returned 1001 results
44 min
So you're interested in social engineering?
The very first steps
58 min
Confessions of a future terrorist
A rough guide to over-regulating free speech with…
32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…
55 min
Cyber Necromancy
Reverse Engineering Dead Protocols
30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches
59 min
Chatkontrolle - Es ist noch nicht vorbei!
Eine Tragödie in X Akten
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
29 min
Hacking collective as a laboratory
Hackers' knowledge studied by sociologist of science
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
54 min
How (not) to build autonomous robots
Fables from building a startup in Silicon Valley
42 min
A world without blockchain
How (inter)national money transfers works
54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox
59 min
Top X* usability obstacles
*(will be specified later based on usability test with…
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
32 min