Search for "mh" returned 2881 results

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Plants & Machines
26 min

Plants & Machines

Food replicating Robots from Open Source Technologies

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

How to contribute to make open hardware happen
51 min

How to contribute to make open hardware happen

Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…