Search for "olf" returned 7527 results

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Building knodium.com with Scheme
60 min

Building knodium.com with Scheme

First-hand experience report of a business application…

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

The good, the strange and the ugly in 2018 art &tech
55 min

The good, the strange and the ugly in 2018 art &tech

On art, AI, hormones hacking and other prospects of a…

OPENCOIL – A Roaming Speedshow
87 min

OPENCOIL – A Roaming Speedshow

or the fine art of appropriating inductive charging pads in…

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Don't Fear the Reboot
35 min

Don't Fear the Reboot

Embracing an Immutable-Friendly Mindset

The Trust Situation
60 min

The Trust Situation

Why the idea of data protection slowly turns out to be…

(Web) Search on  Linux driven sites
48 min

(Web) Search on Linux driven sites

High speed search with SPHINX or MNOGO for huge amounts of…

The ecosystem is moving
43 min

The ecosystem is moving

Challenges for distributed and decentralized technology…

A mobile phone that respects your freedom
45 min

A mobile phone that respects your freedom

Experiences and lessons learned from 2 years of development…

Italy's surveillance toolbox
27 min

Italy's surveillance toolbox

Research on Monitoring Italian Government Surveillance…

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

How to Destroy a Laptop with Top Secrets
58 min

How to Destroy a Laptop with Top Secrets

How did GCHQ do it to the Guardian's copy of Snowden's…

We don't trust voting computers
138 min

We don't trust voting computers

The story of the dutch campaign against black-box voting to…

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…