Search for "Jon" returned 9471 results

What your phone won’t tell you
38 min

What your phone won’t tell you

Uncovering fake base stations on iOS devices

All Our Shared Spectrum Are Belong to Us
30 min

All Our Shared Spectrum Are Belong to Us

Visualizing WLAN Channel Usage on OpenWRT

To Make Hearts Bleed
57 min

To Make Hearts Bleed

A Native Developer's Account On SSL

rechtsbelehrung.com
83 min

rechtsbelehrung.com

Recht autonom - Geschäftsfähigkeit und Haftung von KIs,…

The Past in the Cloud
47 min

The Past in the Cloud

Wie man auch morgen noch die Software von gestern hacken…

SDR - Fluch, Segen, Möglichkeiten
83 min

SDR - Fluch, Segen, Möglichkeiten

Der Einsatz von SDR-Technik aus Sicht des Technikers,…

The importance of resisting Excessive Government Surveillance
56 min

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations…

Homegrown Interactive Tables
45 min

Homegrown Interactive Tables

Any Technology Sufficiently Advanced is Indistinguishable…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Towards automatic end to end mail encryption
98 min

Towards automatic end to end mail encryption

mail encryption overview and hands-on Autocrypt sessions

Pirate Radio
43 min

Pirate Radio

Running a Station and Staying on the Air

People, Profiles and Trust
38 min

People, Profiles and Trust

On interpersonal trust in web-mediated social spaces

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

WSIS - An Overview
90 min

WSIS - An Overview

The World Summit on the Information Society Revisited

Let's talk about Desktop Linux Platform Issues
60 min

Let's talk about Desktop Linux Platform Issues

What's holding back Linux on the desktop?

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

Signal Intelligence und Electronic Warfare
46 min

Signal Intelligence und Electronic Warfare

Wie man nach Hause telefoniert, ohne von einer Rakete…

Identitäts-Kriege: vom Ende menschlicher Gesellschaftsform
47 min

Identitäts-Kriege: vom Ende menschlicher Gesellschaftsform

Wie das Netz die Identitäts-Zuordnungen zersetzt, von denen…