Search for "Mo" returned 9725 results

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Write your own K8s operator
48 min

Write your own K8s operator

Using the Operator SDK to develop custom K8s operators

Tor de-anonymization techniques
61 min

Tor de-anonymization techniques

How people have lost their anonymity? Let's study…

Dinge, die man nicht mit Git tun sollte
55 min

Dinge, die man nicht mit Git tun sollte

Dinge, die vielleicht nicht (ganz) so optimal sind...

Transactional Updates - deep dive
33 min

Transactional Updates - deep dive

How to update your systems without breaking them

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Teaching machines new tricks
53 min

Teaching machines new tricks

Machine learning: Silver bullet or route to evil?

Enlightenment? What is it? Why should you use it?
30 min

Enlightenment? What is it? Why should you use it?

An Introduction to the most used Linux Desktop*

Cyberpeace and Datalove
64 min

Cyberpeace and Datalove

How do we counter the memes of control?

Intelexit
60 min

Intelexit

Calling secret service agents to quit their jobs

Stuff you don't see - every day
52 min

Stuff you don't see - every day

GNU Radio Internals - how to use the Framework

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data