Search for "csk" returned 1354 results
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
55 min
Attribution revolution
Turning copyright upside-down with metadata
51 min
The GNU Name System
A Decentralized PKI For Social Movements
62 min
The Tor Network
We're living in interesting times
59 min
Provable Security
How I learned to stop worrying and love the backdoor
36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition
58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
34 min
Scuttlebutt
The decentralized P2P gossip protocol
43 min
Speaking Fiction To Power
Strategies and tactics to ‘hack’ public spaces and social…
35 min
Evolution of Brain-Computer Interfaces
The future of Neuro-Headsets and concepts towards…
32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized
31 min
Berechnete Welt
Unsere Daten, die Zukunft und die zerstörte Demokratie
25 min
Keys of Fury
Type In Beyond the Scrolling Horizon
38 min
The Planet Friendly Web
Warum unser Web nachhaltiger werden muss und wie wir das…
67 min
The Maker movement meets patent law
How many windows are open in the patent fortress
61 min