Search for "Seth Hardy" returned 826 results
35 min
Ethics in the data society
Power and politics in the development of the driverless car
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
62 min
The Ghost in the Machine
An Artificial Intelligence Perspective on the Soul
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
62 min
Tell no-one
A century of secret deals between the NSA and the telecom…
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
25 min
»Hard Drive Punch«
Destroying data as a performative act
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
54 min
Kernel Tracing With eBPF
Unlocking God Mode on Linux
33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…
56 min
Viva la Vita Vida
Hacking the most secure handheld console
31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
59 min