Search for "olf" returned 7527 results

Are Whistleblowers safer today than they were at OHM2013?
64 min

Are Whistleblowers safer today than they were at OHM2013?

Current case studies of whistleblowing in Europe, and how…

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

The Magical Secrecy Tour
30 min

The Magical Secrecy Tour

A Bus Trip into the Surveillance Culture of Berlin One Year…

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

A practical prototyping primer
30 min

A practical prototyping primer

A rather unstructured selection of things I wished I knew…

Terrorist All-Stars
65 min

Terrorist All-Stars

Some cases of terrorism around the world that are not…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Little Services, Big Risks
34 min

Little Services, Big Risks

Extending capability-based security models to achieve…

Law Enforcement Are Hacking the Planet
31 min

Law Enforcement Are Hacking the Planet

How the FBI and local cops are hacking computers outside of…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Introduction to Satellite Communications
71 min

Introduction to Satellite Communications

the joy and challange of operating satellite communication…

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Conquering Large Numbers at the LHC
41 min

Conquering Large Numbers at the LHC

From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…

Parkour communications
36 min

Parkour communications

How you can communicate, free running style, using nothing…

X.25 (in)security in 2006: having phun with it
111 min

X.25 (in)security in 2006: having phun with it

Actual present, next future & field experiences analysis of…

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

Art against Facebook
40 min

Art against Facebook

Graffiti in the ruins of the feed and the…

Weaponizing Cultural Viruses
68 min

Weaponizing Cultural Viruses

A Manual For Engaged Memetic Resistance on The Front Lines…

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…