Search for "Sven" returned 2036 results

62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…

55 min
Cyber Necromancy
Reverse Engineering Dead Protocols

60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age

55 min
Attribution revolution
Turning copyright upside-down with metadata

103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

59 min
The Surveillance State limited by acts of courage and conscience
An update on the fate of the Snowden Refugees

44 min
Lützerath Lebt! Einblicke in den Widerstand
Für globale Klimagerechtigkeit kämpfen

54 min
Do You Think That's Funny?
Art Practice under the Regime of Anti-Terror Legislation

26 min
Plants & Machines
Food replicating Robots from Open Source Technologies

62 min
Internet, the Business Side
a try to explain the ecosystem

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

53 min
Self-cannibalizing AI
Artistic Strategies to expose generative text-to-image…

47 min
All cops are broadcasting
Obtaining the secret TETRA primitives after decades in the…

33 min
Global Civil Society Under Attack
Reports from the Frontlines

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

66 min