Search for ">Y<" returned 10982 results

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Krypto für die Zukunft
31 min

Krypto für die Zukunft

Verteidigung gegen Dunkle Künste

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Serenität – Anleitung zum Glücklichsein
45 min

Serenität – Anleitung zum Glücklichsein

Das Duo 'read & delete' präsentiert radikale philosophische…

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Why is GPG &quot;damn near unusable&quot;?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist