Search for "Ana" returned 9835 results

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

"What's in a name?"
49 min

"What's in a name?"

#nymwars and the public sphere

A Hacker’s Utopia
64 min

A Hacker’s Utopia

What's There and What's Missing

22C3: Private Investigations
58 min

22C3: Private Investigations

Opening Show and Keynote Speech

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Greenhouse Gas Emission Data
39 min

Greenhouse Gas Emission Data

Public, difficult to access, and not always correct

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

DevOps for GNOME with Flatpak
21 min

DevOps for GNOME with Flatpak

And how we improved our contributors experience and…

osc2 - The modern osc
20 min

osc2 - The modern osc

Development status and how to contribute

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Hacker Jeopardy
107 min

Hacker Jeopardy

The one and only hacker quizshow

From watercolors to mechs:
25 min

From watercolors to mechs:

Stylized rendering and asset pipelines in Godot

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…

Build a Fake Phone, Find Real Bugs
41 min

Build a Fake Phone, Find Real Bugs

Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU

Information Biology - Investigating the information flow in living systems
37 min

Information Biology - Investigating the information flow in living systems

From cells to dynamic models of biochemical pathways and …

Tightening the Net in Iran
47 min

Tightening the Net in Iran

The Situation of Censorship and Surveillance in Iran, and…

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

We do Privacy by Design
42 min

We do Privacy by Design

Best practices and real-life examples

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy