Search for "Ivan March"
next
46 min
--Gaining code execution using a malicious SQLite database
54 min
The history and costs of government exceptional access
19 min
unlocking the potential of e-mail and the web
64 min
The Role of Stylometry in Privacy
58 min
Ein Computerwurm für PLCs
63 min
Algorithms define your priorities. Who else besides you can…
33 min
!Mediengruppe Bitnik about their recent works
63 min
Whistleblowers and the Cases of The Snowden Refugees and…
next