Search for "CAGE" returned 2619 results

56 min
Deconstructing a Socialist Lawnmower
Obsolete Technologies + Critical Material Studies in Media…

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

45 min
Tech(no)fixes beware!
Spotting (digital) tech fictions as replacement for social…

25 min
Keys of Fury
Type In Beyond the Scrolling Horizon

41 min
Locked up science
Tearing down paywalls in scholarly communication

57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…

31 min
Mr Beam goes Kickstarter
Lessons learned from crowdfunding a hardware project

13 min
c3 MorningShow
Tag 2

62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and what…

60 min
Quantum Cryptography
from key distribution to position-based cryptography

60 min