Search for "xif" returned 1978 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Reality Check! Basel/Lagos?? In virtual reality?
56 min

Reality Check! Basel/Lagos?? In virtual reality?

An African tale of art, culture and technology

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

Script Your Car!
58 min

Script Your Car!

Using existing hardware platforms to integrate python into…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

Make the Internet Neutral Again
31 min

Make the Internet Neutral Again

Let's put the new EU Net Neutrality rules to work

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…