Search for "Ann" returned 11355 results

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

Shutdown
9 min

Shutdown

Time to review the conference days and say goodbye

The Data must flow
39 min

The Data must flow

Ansprüche auf Datenzugang und wer da so drauf zugreifen kann

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

Adding Salt to AutoYaST
28 min

Adding Salt to AutoYaST

Integration between AutoYaST and Configuration Management…

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software

"How I met your pointer"
55 min

"How I met your pointer"

Hijacking client software for fuzz and profit

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

Ein Jahr Serverless
47 min

Ein Jahr Serverless

The good, the bad and the ugly

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

Logging containers
36 min

Logging containers

Collecting host, docker and container logs centrally

DG74: Bitcoin
73 min

DG74: Bitcoin

Privacy and Censorship Resistance Beyond the Web

Physical Security
58 min

Physical Security

The Good, the Bad and the Ugly

Digital Signal Processors
49 min

Digital Signal Processors

What? Why? And how to get started

Fine tuning log routing
31 min

Fine tuning log routing

How sequence and creating name-value pairs can help you

gpg4libre - OpenPGP signing & encryption in LibreOffice
54 min

gpg4libre - OpenPGP signing & encryption in LibreOffice

Transparently and securely use your existing keys to sign…

Cosmic Connectivity
46 min

Cosmic Connectivity

Starlink, Satellite Swarms, and the Hackers' Final Frontier

Edible Soft Robotics
29 min

Edible Soft Robotics

An exploration of candy as an engineered material

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Mapping Doomsday
42 min

Mapping Doomsday

Using OSINT to monitor and predict environmental conflicts