Search for "M" returned 11771 results
60 min
Living with the lasersaur
Experiences with the open source laser cutter
42 min
Let's Encrypt
A Certificate Authority To Encrypt the Entire Web
59 min
Detecting echoes from the dawn of time
Nifty technologies behind the world's most sensitive…
30 min
Satellite Imagery in Agriculture
Questioning privacy, data protection, and autonomy in the…
30 min
The quest for artificial general intelligence
beyond the Turing test
52 min
TLS interception considered harmful
How Man-in-the-Middle filtering solutions harm the security…
58 min
How to Destroy a Laptop with Top Secrets
How did GCHQ do it to the Guardian's copy of Snowden's…
45 min
Fueling the Revolution
Personal production of bio-fuels
56 min
Helping the Helpless
Targeted threats to civil society
27 min
Experimental Fermentation Institutes Network (EFIN)
fermenting together for better future
28 min
Hardware attacks: hacking chips on the (very) cheap
How to retrieve secret keys without going bankrupt
60 min
A Hackers Approach To Building Electric Guitars
Let's do everything except the pots by ourselves
26 min
for women in "${tech[@]}"; do
Let's talk, share and learn from each other.
28 min
Gotta Block’em all
Creating a usable tool against online trackers
26 min
Data and discrimination: representing marginalised communities in data
The right to be counted, or the right to be left alone?
27 min
Analogue Mission Simulations
Wait what? Why not digital?
69 min
The hills are alive with the sound of hacking ... don't wake the monkeys!
The State of the Hack in India. A place to be^W hack in the…
54 min
Staatstrojaner in Karlsruhe
Anhörung zur verdeckten Infiltration von IT-Systemen
46 min
Bugged Files
Is Your Document Telling on You?
30 min
A Torifying Tale
Our experiences of building and running Tor servers
21 min
Goethe in my Mind
Computer haben Gefühle, wir helfen ihnen, sie auszudrücken
30 min
A practical prototyping primer
A rather unstructured selection of things I wished I knew…
36 min