Search for "andi" returned 7451 results

X.25 (in)security in 2006: having phun with it
111 min

X.25 (in)security in 2006: having phun with it

Actual present, next future & field experiences analysis of…

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

The Great British Drone Panic
43 min

The Great British Drone Panic

Asking for better standards of official investigation and…

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

Let's stop EU copyright expansion
74 min

Let's stop EU copyright expansion

If you like untaxed links and unsurveilled uploads, you…

IMMI, from concept to reality
56 min

IMMI, from concept to reality

The Icelandic Modern Media Initiative and our need for a…

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

The Pirate Cinema
29 min

The Pirate Cinema

Creating mash-up movies by hidden activity and geography of…

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

Chaos Communication Chemistry
41 min

Chaos Communication Chemistry

DNA security systems based on molecular randomness

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Fnord News Show
117 min

Fnord News Show

Der schonungslose Realitätsabgleich mit…

Wohnungsbot: An Automation-Drama in Three Acts
40 min

Wohnungsbot: An Automation-Drama in Three Acts

A media-art project which automates the search for flats in…

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…