Search for "Mitch" returned 1191 results

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

30 min
Information Control and Strategic Violence
How governments use censorship and surveillance as part of…

42 min
A world without blockchain
How (inter)national money transfers works

46 min
Basics of Digital Wireless Communication
introduction to software radio principles

39 min
Venenerkennung hacken
Vom Fall der letzten Bastion biometrischer Systeme

56 min
Reality Check! Basel/Lagos?? In virtual reality?
An African tale of art, culture and technology

40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

61 min
Uncaging Microchips
Techniques for Chip Preparation

61 min
Quantum Computing: Are we there yet?
An introduction to quantum computing and a review of the…

40 min
Wohnungsbot: An Automation-Drama in Three Acts
A media-art project which automates the search for flats in…

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

43 min
Microtargeting und Manipulation
Von Cambridge Analytica zur EU-Wahl

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

42 min