Search for "Seth Hardy" returned 828 results
58 min
When hardware must „just work“
An inside look at x86 CPU design
33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…
61 min
How to Hack Your Way to Space
Bringing the Hacker Mindset to the Space Ecosphere - The…
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…
53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…
61 min
Safe and Secure Drivers in High-Level Languages
How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…
59 min
Visiting The Bear Den
A Journey in the Land of (Cyber-)Espionage
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
58 min
Baseband Exploitation in 2013
Hexagon challenges
47 min
Jailbreaking iOS
From past to present
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
54 min