Version mkdir
Schedule – 2019-12-28
Ada | Borg | Clarke | Dijkstra | Eliza | |
---|---|---|---|---|---|
11:00 |
|||||
Die Luftschnittstelle und das Core im Wandel der Zahlen
(de)
|
A security study of turbine control systems in power generation
(en)
|
Wie gründe ich einen Betriebsrat, bevor die Kacke dampft?
(de)
|
|||
12:00 |
|||||
Signal overshadowing attack on LTE and its applications
(en)
|
How to understand the environmental impact of the digital products you build, and take measurable steps to “green your stack”
(en)
|
Reducing the attack surface with pure embedded Go.
(en)
|
Featuring the shortest movies and the largest lasers
(en)
|
||
13:00 |
|||||
14:00 |
|||||
Wie lange kann es so weitergehen?
(de)
|
Können wir Software bauen, die nützlich /und/ unbedenklich ist?
(de)
|
Attacks against privacy-preserving systems
(en)
|
Hardware attacks on the latest generation of ARM Cortex-M processors.
(en)
|
E-ID, E-Voting, Netzsperren und andere netzpolitische Schauplätze
(de)
|
|
15:00 |
|||||
16:00 |
|||||
Challenges for distributed and decentralized technology from the perspective of Signal development
(en)
|
Psychedelic Therapy as a fundamentally new approach to mental health issues
(en)
|
Schule schwänzen für das Klima
(de)
|
|||
17:00 |
|||||
Cybercrime-Ermittlungen: Vorsicht vor der Polizei! Oder: Nicht im falschen Forum posten
(de)
|
Jahresrückblick 2019
(de)
|
||||
18:00 |
|||||
Taking a look at a covert CIA virtual fencing solution
(en)
|
The environmental costs of digital industry and pathways to sustainability
(en)
|
|
|||
19:00 |
|||||
Break Isolation and Sandbox in the Instant Apps
(en)
|
The Sound of Surveillance
(en)
|
||||
20:00 |
|||||
Military warheads as a source of nuclear fuel
(de)
|
How to understand this historic challenge and what we can do to defend ourselves
(en)
|
Mediterranean Migration Monologues
(de)
|
|||
21:00 |
|||||
22:00 |
|||||
Be prepared for the coming Digital Winter. And play Impossible Mission.
(en)
|
A rough guide to over-regulating free speech with anti-terrorist measures
(en)
|
||||
23:00 |
|||||
Leaking Your Recent Memory Operations on Intel CPUs
(en)
|
Uncovering and assessing a second authentication mechanism in modern vehicle immobilization systems
(en)
|
3 different RCE vulnerabilities on Ruckus Wireless access points devices.
(en)
|
|
||
00:00 |
|||||
01:00 |
|||||
02:00 |
|||||
03:00 |
|||||