Search for "xif" returned 1978 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

The Price Of Dissent
62 min

The Price Of Dissent

The surveillance state & modern day COINTELPRO tactics

BGP and the Rule of Custom
31 min

BGP and the Rule of Custom

How the internet self-governs without international law