Search for "Ben" returned 8731 results

63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem

40 min
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy

45 min
ESXi Beast
Exploiting VMWARE ESXi Binary Protocols Using CANAPE

56 min
USB and libusb
So much more than a serial port with power

36 min
Having fun with RTP
„Who is speaking???“

50 min
Fnord News Show (English interpretation)
We help in seeing teh Fnords

41 min
DC+, The Protocol
Technical defense against data retention law

58 min
Linguistic Hacking
How to know what a text in an unknown language is about?

43 min
Nintendo DS
Introduction and hacking

34 min
Lying To The Neighbours
Nasty effects with tracker-less BitTorrent

76 min
Messing Around with Garage Doors
Breaking Remote Keyless Entry Systems with Power Analysis

50 min
Design Noir
The seedy underbelly of electronic engineering

58 min
Reverse Engineering a real-world RFID payment system
Corporations enabling citizens to print digital money

61 min
Running your own GSM stack on a phone
Introducing Project OsmocomBB

50 min
Predictable RNG in the vulnerable Debian OpenSSL package
the What and the How

86 min
Certified programming with dependent types
Because the future of defense is liberal application of math

44 min
Port Scanning improved
New ideas for old practices

61 min