Search for "Andy" returned 7488 results
63 min
The Case Against WikiLeaks: a direct threat to our community
How to understand this historic challenge and what we can…
34 min
re:claimID
A GNUnet Application for Self-sovereign, Decentralised…
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
48 min
DRM comes to European digital TV
How the DVB project is locking down TV standards and…
59 min
Understanding buffer overflow exploitation
The fascinating interplay of CPU, stack, C-compiler and…
42 min
Zombie Apocalypse vs. International Health Regulations
Introducing a very important piece of international law and…
60 min
IoT ethics
what I found out using my home and body as a test lab
64 min
Are Whistleblowers safer today than they were at OHM2013?
Current case studies of whistleblowing in Europe, and how…
70 min
coreboot: Adding support for a system near you
Working with the open source BIOS replacement and getting a…
103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…
53 min
A Case Against C++
Why C++ is bad for the environment, causes global warming…
55 min
The Computer Science behind a modern distributed data store
The science it takes to build a multi-threaded, clustered…
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
52 min
Funkerspuk
radio politics in the USA and Germany in the first half of…
57 min
The Precariat: A Disruptive Class for Disruptive Times.
Why and How the Precariat will define the Global…
63 min
Pushing the frontiers of Information Extraction:
A Strategy for for Identifying Calls for Action in Texts…
65 min
Cryptographic key recovery from Linux memory dumps
Does dm-crypt and cryptoloop provide expected security when…
52 min
A 10GE monitoring system
Hacking a 10 Gigabit Intrusion detection and prevention…
56 min