Events for tag "27c3"
58 min
An update on EFF's SSL Observatory project
68 min
Thoughts on the Automation and its Human interfaces on…
65 min
Applications of theorem proving for securing the windows…
60 min
Why the time is now to get active
50 min
Solutions for monitoring and lawful interception within a…
56 min
Join me in exposing and challenging the constant violations…
54 min
Ein datenschutzrechtlicher Ausflug in ein kirchliches…
65 min
Bugs, exploits, and occasional patches
83 min
von Atomausstieg bis Zwangsintegration
59 min
Safe navigation with the aid of an open sea chart.
60 min
Jahresrückblick rund um Internet-Sperren,…
56 min
So much more than a serial port with power
54 min
On Using Anonymizers and Still Get Fucked
51 min
3510 transistors in 60 minutes
56 min
The Icelandic Modern Media Initiative and our need for a…
66 min
all your baseband are belong to us
34 min
Nasty effects with tracker-less BitTorrent
47 min
Restoring creativity in school pupils using robotics
30 min
Cloud Computing, Assessment, and Fools like Me.
76 min
SAP Security and the Enterprise
25 min
Source routing attacks applied to SIP
78 min
Was kommt nach dem analogen Radio?
73 min
expanding the attack surface and then some
56 min
How we obtained the equivalent power of a Deep Crack for a…
56 min
a disconcerting moment for free culture
64 min
Your opponents will be riddled as well
58 min
demonstrating what activities most ISPs see you doing on…
64 min
The political philosophy of the Internet
56 min
a dump of simple tools for embedded analysis at many layers
62 min
Attack Vectors Through the Eyes of Software-based Fault…
41 min
Eine Whistleblowerperspektive auf Leaking-Plattformen
59 min
One year of Rocket Science!
51 min
A new circuit board printer will liberate you from the…
64 min
Why we will have more secure computers - tomorrow
58 min
Corporations enabling citizens to print digital money
41 min
Das Internet und geschaffene soziale Ungleichheit im Alltag…
83 min
von Atomausstieg bis Zwangsintegration
60 min
Why future media may be more powerful (and more subversive)…
63 min
Still the bicycles for the 21th century
57 min
Improved approaches for auditive steganography
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
49 min
For whom, and to do what, the science of sound was…
61 min
From analyzing to attacking mobile phones on a large scale.
63 min
Die Sprache des politischen Verrats und seiner…
55 min
you're doing it confused? weird? strange? wrong?
57 min
What you didn't know about Acrobat
55 min
ACTA, IPRED3 and other upcoming battles of the crusade…
35 min
logische Schaltungen mit Pneumatik
24 min
Where does the sound come from?
57 min
Vulnerabilities in the EMV Protocol
59 min
Kill Switching” Cyberspace, Cyber Criminal Prosecution &…
35 min
interactive light installation inspired by blinkenlights
47 min
Backdooring Embedded Controllers
61 min
Introducing Project OsmocomBB
52 min
Wie wirkt die Lobby von Medienkonzernen?
62 min
Von der Volkszählung zum Bundesmelderegister
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
52 min
The story of 3 Ushahidi mapping and reporting projects.
39 min
implants, sensory extension and silicon - all for you!