Search for "John" returned 1046 results

The good, the strange and the ugly in 2018 art &tech
55 min

The good, the strange and the ugly in 2018 art &tech

On art, AI, hormones hacking and other prospects of a…

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Das Zahnrad aus Fleisch
60 min

Das Zahnrad aus Fleisch

Expeditionen ins Kommentierreich

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Mit, gegen oder jenseits von Politik?
66 min

Mit, gegen oder jenseits von Politik?

Eine Reflexion über den paradoxen anarchistischen…

Welcome Pattern - Theorie und Praxis
40 min

Welcome Pattern - Theorie und Praxis

(Eine Gemeinschaftsproduktion der Haecksen, der…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…