Search for "Ike" returned 2691 results
35 min
Wallet Security
How (not) to protect private keys
31 min
Living Drones
From war pigeons in 1914 to cyborg moths in 2014
37 min
Information Biology - Investigating the information flow in living systems
From cells to dynamic models of biochemical pathways and …
60 min
Profiling (In)justice
Disaggregating Data by Race and Ethnicity to Curb…
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
43 min
#NoPNR – Let’s kill the next Data Retention Law
How to Stop the Dubious Use of Passenger Name Records by…
39 min
Web-based Cryptojacking in the Wild
When your browser is mining coins for other people
30 min
Automatically Subtitling the C3
How speech processing helps the CCC subtitle project, and…
66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research
47 min
Jailbreaking iOS
From past to present
60 min
So you want to build a satellite?
How hard can it be? An introduction into CubeSat development
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
60 min
Low Cost High Speed Photography
Using microcontrollers to capture the blink of an eye for…
62 min
A New Kid on the Block
Conditions for a Successful Market Entry of Decentralized…
60 min
Dieselgate – A year later
env stinks || exit
37 min