Telephone networks form the oldest large scale network that has grown totouch over 7 billion people. Telephony is now merging many compl... | Continue reading
Project IceStorm provides the first end-to-end open source FPGA toolchain, was originally presented at 32c3, and only targetted Lattice i... | Continue reading
This lecture tells the story of Internet infrastructure transformations in Crimea, the peninsula disputed between Russia and Ukraine betw... | Continue reading
Recent attacks against elections in the U.S. and Europe demonstrate that nation-state attackers are becoming more aggressive, even as cam... | Continue reading
Technology is the solution: What is the problem? This seems to be the motto. Algorithms may be about to control our free speech while t... | Continue reading
Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In th... | Continue reading
Microcode runs in most modern CPUs and translates the outer instruction set (e.g. x86) into a simpler form (usually a RISC architecture).... | Continue reading
CRISPR/Cas hat die Genforschung revolutioniert und könnte bald in großem Stil gentechnisch eingesetzt werden. Aber was ist CRISPR und wie... | Continue reading
In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural,... | Continue reading
We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?But c... | Continue reading
The combination of the ongoing technological revolution, globalisation and what are usually called 'neo-liberal' economic policies has ge... | Continue reading
Voicemail systems can be compromised by leveraging old weaknesses and top of current technology. The impact goes way beyond having your m... | Continue reading
Sigfox is an emerging low-power wide-area network (LP-WAN) technology for IoT devices, comparable t... | Continue reading
In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P gossiping protocol, and how it can be transformative for so... | Continue reading
Six years ago the idea behind CensoredPlanet started, that is now launched at censoredplanet.org. We had a simple (yet essential) guiding... | Continue reading
We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us ev... | Continue reading
Restricting access to knowledge and science is not beneficial for society. So why are scientific results still locked up behind paywalls?... | Continue reading
While a lot of projects are currently developing their own processors, mostly as open source in Verilog, VHDL or even Chisel, we miss the... | Continue reading
Since a few months we have a new version of TLS, the most important encryption protocol on the Internet. From the vulnerabilities that cr... | Continue reading
The Chinese Social Credit System (SCS) has been discussed a lot in Western media. However, we do not know currently how the system that i... | Continue reading
Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine is deployed widely and exclusively in the DPRK, and h... | Continue reading
TL;DR: Stop making "Desktop Linux" a moving target by agreeing on a minimal baseline that third-party application can take for granted to... | Continue reading
Modern processors are amazing devices: small, fast, low power and getting better with every generation.But the most amazing things about... | Continue reading
The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more closely resembles machines from the early 1980s, like the Co... | Continue reading
Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect da... | Continue reading
The military use of Drones has profoundly changed warfare and is a central aspect of the globalized war on terror. The public debate incl... | Continue reading
As they say in the Air Force, ‚No comms no bombs‘, – A technician’s insight into the invisible networks governing military drones and th... | Continue reading