Search for "Bea" returned 6099 results

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Human Rights and Technology
32 min

Human Rights and Technology

"A New Hope" or "The Empire Strikes Back"?

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Hacking collective as a laboratory
29 min

Hacking collective as a laboratory

Hackers' knowledge studied by sociologist of science

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Space Hacker
62 min

Space Hacker

Uploading rover...