Search for "jk" returned 2226 results

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Advanced Hexagon Diag
66 min

Advanced Hexagon Diag

Harnessing diagnostics for baseband vulnerability research

Axoloti
29 min

Axoloti

DIY audio signal processing

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

How to teach programming to your loved ones
59 min

How to teach programming to your loved ones

Enabling students over example-driven teaching

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor

Infrastructures in a horizontal farmers community
40 min

Infrastructures in a horizontal farmers community

Human agreements, comunication infrastructures, services in…

Sin in the time of Technology
60 min

Sin in the time of Technology

How social media companies are creating a global morality…