Search for "olf" returned 7516 results

Think big or care for yourself
32 min

Think big or care for yourself

On the obstacles to think of emergent technologies in the…

Skynet Starter Kit
58 min

Skynet Starter Kit

From Embodied AI Jailbreak to Remote Takeover of Humanoid…

Free Software and Platform Regulation
42 min

Free Software and Platform Regulation

The impact of the Digital Market Act on Free Software

DevOps for GNOME with Flatpak
21 min

DevOps for GNOME with Flatpak

And how we improved our contributors experience and…

Designing PCBs with code
21 min

Designing PCBs with code

Is designing circuits with code instead of CAD the future…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

postmarketOS - Digital Independence in Your Pocket
51 min

postmarketOS - Digital Independence in Your Pocket

How we can get back control of our phones

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Our daily job: hacking the law
55 min

Our daily job: hacking the law

The key elements of policy hacking

KDE4
56 min

KDE4

The Dawn of a new Desktop

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

Drums
58 min

Drums

A comparative review of different options

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Avionics
57 min

Avionics

Design and implementation of flight electronics

borgbackup
66 min

borgbackup

the holy grail of backup software?

peer to peer communism vs the client-server state
40 min

peer to peer communism vs the client-server state

The Political Economy of Network Topologies

Software Patenting
47 min

Software Patenting

Adequate means of protection for software.

How to generate a network protocol stack
94 min

How to generate a network protocol stack

Practical application of writing software generators

nettools
21 min

nettools

A collection of network configuration libraries

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security