Search for "cy"
prev
next
28 min
Why auditing proprietary protocols matters
57 min
Experiences with Aadhaar in India, or what possibly could…
25 min
A FLOSS bike computer with Rust
29 min
Hintergründe und Handlungsoptionen
55 min
UFOS, MAGIC, MIND CONTROL, ELECTRONIC WARFARE, AI, AND THE…
19 min
Green Coding & Measuring the Environmental Impacts of IT
48 min
the superior Multi Factor Authentication Framework
30 min
The Red Pill of N26 Security
54 min
Fixing the Multi-million dollar mistake
prev
next