Search for "jk" returned 2226 results

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Electroedibles
30 min

Electroedibles

Open Source Hardware for Smart Candies

Locked up science
41 min

Locked up science

Tearing down paywalls in scholarly communication

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology