38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker Share: Download MP3 Similar Tracks DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini DEFCONConference 38C3 - Waiter, There's An LLM In My Search! media.ccc.de researcher accidentally finds 0-day affecting his entire internet service provider Low Level Computer Scientist Explains One Concept in 5 Levels of Difficulty | WIRED WIRED The Most Destructive Hack Ever Used: NotPetya Cybernews But what are Hamming codes? The origin of error correction 3Blue1Brown 38C3 - From Critical Making via unmaking towards (un)making media.ccc.de Hacking a Microprocessor - Reverse Engineer shows you how it's done RECESSIM TWISTED: The dramatic history of twisted-pair Ethernet The Serial Port 38C3 - The master key media.ccc.de How to Extract Malicious Shellcode Using a Debugger (Malware Analysis) Anuj Soni How do Graphics Cards Work? Exploring GPU Architecture Branch Education Bluetooth Classic & BLE with ESP32 DroneBot Workshop I installed Linux (so should you) PewDiePie Transformers (how LLMs work) explained visually | DL5 3Blue1Brown I Bought 25 Million Computer Viruses - VX Underground Malware HDD Linus Tech Tips Harvard Professor Explains Algorithms in 5 Levels of Difficulty | WIRED WIRED Colossus - The Greatest Secret in the History of Computing The Centre for Computing History Why Don’t Railroads Need Expansion Joints? Veritasium I've never seen ANYTHING like this before... Temple OS Linus Tech Tips