Search for "T Arrow" returned 177 results

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

The Critical Making Movement
60 min

The Critical Making Movement

How using critical thinking in technological practice can…

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

Financial surveillance
59 min

Financial surveillance

Exposing the global banking watchlist

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications