Search for "Sven" returned 2173 results

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Ecocide and (green) colonialism in Sápmi
42 min

Ecocide and (green) colonialism in Sápmi

Data centers on indigenous land in Northern Europe

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Infrastructure of a migratory bird
41 min

Infrastructure of a migratory bird

Technology and autonomy in more-than-human networks

The Ultimate SPC700 Talk
59 min

The Ultimate SPC700 Talk

The hardware behind the music of Super Mario World, Chrono…

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

Sendezentrum: Who Killed The Internet?
46 min

Sendezentrum: Who Killed The Internet?

And a promising alternative for Public Communication and…

Scientific Literacy 101
59 min

Scientific Literacy 101

Let's understand how the scientific system works

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Celeste
22 min

Celeste

Bringing an Indie Classic to Picosystem

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

How to teach programming to your loved ones
59 min

How to teach programming to your loved ones

Enabling students over example-driven teaching

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches