Search for "MRQ" returned 177 results

26 min
Technomonopolies
How technology is used to subvert and circumvent…

42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy

53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild

46 min
CounterStrike
Lawful Interception

31 min
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Wie es kommt, dass technischer Fortschritt den Nutzern…

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

33 min
Turing Complete User
What can be done to protect the term, the notion and the…

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

60 min
Boeing 737MAX: Automated Crashes
Underestimating the dangers of designing a protection system

59 min
Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist

60 min
Beyond your cable modem
How not to do DOCSIS networks

60 min
Are machines feminine?
exploring the relations between design and perception of…

51 min