Search for "Benks"

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

Social Cooling - big data’s unintended side effect
34 min

Social Cooling - big data’s unintended side effect

How the reputation economy is creating data-driven…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

LibreSilicon
60 min

LibreSilicon

Decentralizing semiconductor manufacturing

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

SS7: Locate. Track. Manipulate.
60 min

SS7: Locate. Track. Manipulate.

You have a tracking device in your pocket

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Scientific Literacy 101
59 min

Scientific Literacy 101

Let's understand how the scientific system works

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…