Search for "Sven" returned 1989 results

59 min
The Surveillance State limited by acts of courage and conscience
An update on the fate of the Snowden Refugees

20 min
Mastering the Maze
Unleashing Reinforcement Learning in Penetration Testing…

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

21 min
Bootloader Crimes
Building disposable Windows VMs

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

40 min
Never Forgetti
a didactic live-gaming performance about dying women across…

29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less

30 min
“Nabovarme” opensource heating infrastructure in Christiania
Freetown Christiania´s digitally controlled/surveyed…

64 min
Magic Lantern
Free Software on Your Camera

39 min
Fuzzing the TCP/IP stack
beyond the trivial

41 min
Why Railway Is Safe But Not Secure
Security Of Railway Communication Protocols

45 min
Tech(no)fixes beware!
Spotting (digital) tech fictions as replacement for social…

45 min
A geometry engine from first principles
the first three years of a six month project.

61 min