Chaos Communication Congress

  • : 2011
  • : 1118
  • : 0
  • Documentary Game show News Reality Talk show

:

.

30
30x1
Opening Event (#5605)
Episode overview
27, 2013
Speaker: Tim Pritlove Welcome to the 30th Chaos Communication Congress Introductory event to say hello to everybody, give a brief overview of the event's features and look into history and future alike
30x2
Do You Think That's Funny? (#5376)
Episode overview
27, 2013
Speaker: lizvlx Art Practice under the Regime of Anti-Terror Legislation This lecture shall give a first person account of how circumstances have dramatically changed for actionist .. show full overview
30x3
An introduction to Firmware Analysis (#5477)
Episode overview
27, 2013
Speaker: Stefan Widmann Techniques - Tools - Tricks This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from .. show full overview
30x4
Seidenstraße (#5610)
Episode overview
27, 2013
Speakers: *m, Jeff Mann, frank, Diani Barreto The Making of… Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch .. show full overview
30x5
Der tiefe Staat (#5415)
Episode overview
27, 2013
Speaker: Andreas Lehner Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.
30x6
Überwachen und Sprache (#5377)
Episode overview
27, 2013
Speaker: josch How to do things with words Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung, .. show full overview
30x7
Keine Anhaltspunkte für flächendeckende Überwachung (#5281)
Episode overview
27, 2013
Speakers: Martin Haase/maha, khamacherDie Diskussion um NSA, PRISM, Tempora sprachlich und logisch aufgearbeitet Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze .. show full overview
30x8
Reverse engineering of CHIASMUS from GSTOOL (#5307)
Episode overview
27, 2013
Speaker: Jan Schejbal It hurts. We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt .. show full overview
30x9
10 Years of Fun with Embedded Devices (#5497)
Episode overview
27, 2013
Speaker: nbd How OpenWrt evolved from a WRT54G firmware to an universal Embedded Linux OS A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.
30x10
Triggering Deep Vulnerabilities Using Symbolic Execution (#5224)
Episode overview
27, 2013
Speaker: gannimo Deep program analysis without the headache Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic .. show full overview
30x11
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade (#5634)
Episode overview
27, 2013
Speaker:Alexa O'Brien Reporting on the secret trial of Chelsea Manning At Fort George "Orwell" Meade, home of the NSA and the US Defense Information School, managing the message of .. show full overview
30x12
Electronic Bank Robberies (#5476)
Episode overview
27, 2013
Speakers: tw, sb Stealing Money from ATMs with Malware This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted .. show full overview
30x13
Rock' em Graphic Cards (#5298)
Episode overview
27, 2013
Speaker: mel/ Agnes Meyder Introduction to Heterogeneous Parallel Programming This talks introduces programming concepts and languages for parallel programming on accelerator cards.
30x14
IFGINT (#5509)
Episode overview
27, 2013
Speaker: Stefan Wehrmeyer Erkenntnisse aus Informationsfreiheitsanfragen - Hacks, Bugs, Workarounds Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger .. show full overview
30x15
lasers in space (#5311)
Episode overview
27, 2013
Speaker: anja more than just pew pew! This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.
30x16
Mobile network attack evolution (#5449)
Episode overview
27, 2013
Speakers: Karsten Nohl, Luca Melette Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from .. show full overview
30x17
Kryptographie nach Snowden (#5337)
Episode overview
27, 2013
Speaker: ruedi Was tun nach der mittelmäßigen Kryptographie-Apokalypse? Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt .. show full overview
30x18
Basics of Digital Wireless Communication (#5527)
Episode overview
27, 2013
Speaker: Clemens Hopfer introduction to software radio principles The aim of this talk is to give an understandable insight into wireless communication, using existing systems as .. show full overview
30x19
Policing the Romantic Crowd (#5447)
Episode overview
27, 2013
Speaker: MaTu Velocipedes and Face Recognition This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern .. show full overview
30x20
Bug class genocide (#5412)
Episode overview
27, 2013
Speaker: Andreas Bogk Applying science to eliminate 100% of buffer overflows Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk .. show full overview
30x21
Hardening hardware and choosing a #goodBIOS (#5529)
Episode overview
27, 2013
Speaker: Peter Stuge Clean boot every boot - rejecting persistence of malicious software and tripping up the evil maid A commodity laptop is analyzed to identify exposed attack .. show full overview
30x22
Long Distance Quantum Communication (#5536)
Episode overview
27, 2013
Speaker: C B Concepts and components for intercontinal communication with single photons. This talk should introduce the general 30c3 participant with several components of long distance quantum communication.
30x23
Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array (#5142)
Episode overview
27, 2013
Speaker: Andrew Reiter (arr,awr) Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One .. show full overview
30x24
30c3 Keynote (#5711)
Episode overview
27, 2013
Speakers: Glenn Greenwald, frank
30x25
The Tor Network (#5423)
Episode overview
27, 2013
Speakers: Jacob, arma We're living in interesting times Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
30x26
Console Hacking 2013 (#5290)
Episode overview
27, 2013
Speaker: sven, marcan, Nicholas Allegra (comex) WiiU About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the .. show full overview
30x27
Forbidden Fruit (#5613)
Episode overview
27, 2013
Speaker: Joe Davis Vortrag: Forbidden Fruit Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.
30x28
Toward a Cognitive Quantified Self (#5387)
Episode overview
27, 2013
Speaker: Kai Activity Recognition for the Mind The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading. .. show full overview
30x29
Baseband Exploitation in 2013 (#5618)
Episode overview
27, 2013
Speaker: RPW, esizkur Hexagon challenges Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share .. show full overview
30x30
Der Kampf um Netzneutralität (#5348)
Episode overview
27, 2013
Speaker: Markus Beckedahl, Thomas Lohninger Wer kontrolliert das Netz? Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit .. show full overview
30x31
World War II Hackers (#5474)
Episode overview
27, 2013
Speaker: Anja Drephal Stalin's best men, armed with paper and pen The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself. .. show full overview
30x32
The GNU Name System (#5212)
Episode overview
27, 2013
Speaker: grothoff A Decentralized PKI For Social Movements DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate .. show full overview
30x33
No Neutral Ground in a Burning World (#5491)
Episode overview
27, 2013
Speakers: Quinn Norton, Eleanor Saitta The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations. If you .. show full overview
30x34
HbbTV Security (#5398)
Episode overview
27, 2013
Speaker: Martin Herfurt OMG - my Smart TV got pr0wn3d 10789556_m HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV .. show full overview
30x35
Breaking Baryons (#5305)
Episode overview
27, 2013
Speaker: Michael Büker On the Awesomeness of Particle Accelerators and Colliders A light-hearted presentation about many aspects of particle accelerators like the LHC and their .. show full overview
30x36
Firmware Fat Camp (#5356)
Episode overview
27, 2013
Speaker: angcui Embedded Security Using Binary Autotomy We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware .. show full overview
30x37
Hacker Jeopardy (#5577)
Episode overview
28, 2013
Speakers: Sec, Ray Number guessing for geeks The Hacker Jeopardy is a quiz show.
30x38
Sim Gishel (#5544)
Episode overview
28, 2013
Speaker: Karl Heinz Jeron A singing and dancing robot build to take part in casting shows Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.
30x39
The Gospel of IRMA (#5214)
Episode overview
28, 2013
Speaker: Jaap-Henk Hoepman Attribute Based Credentials in Practice Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race, .. show full overview
30x40
Hello World! (#5611)
Episode overview
28, 2013
Speaker: Aram Bartholl How to make art after Snowden? USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive .. show full overview
30x41
BREACH in Agda (#5394)
Episode overview
28, 2013
Speaker: Nicolas Pouillard Security notions, proofs and attacks using dependently typed functional programming Software engineering is in a unsustainable state: software is mainly .. show full overview
30x42
We only have one earth (#5468)
Episode overview
28, 2013
Speaker: Drahflow A case for expansionistic space policy An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already .. show full overview
30x43
Glass Hacks (#5537)
Episode overview
28, 2013
Speaker Stephen Balaban Fun and frightening uses of always-on camera enabled wearable computers A one hour technical lecture that covers everything from machine learning and AI to .. show full overview
30x44
Fast Internet-wide Scanning and its Security Applications (#5533)
Episode overview
28, 2013
Speaker: J. Alex Halderman Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden .. show full overview
30x45
Lightning Talks, Day 2 (#5562)
Episode overview
28, 2013
Speaker: nickfarr
30x46
Extracting keys from FPGAs, OTP Tokens and Door Locks (#5417)
Episode overview
28, 2013
Speaker: David Side-Channel (and other) Attacks in Practice Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to .. show full overview
30x47
Hillbilly Tracking of Low Earth Orbit (#5463)
Episode overview
28, 2013
Speaker: Travis Goodspeed Repurposing an Inmarsat Dish Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track .. show full overview
30x48
EUDataP: State of the Union (#5601)
Episode overview
28, 2013
Speaker: Jan Philipp Albrecht Jan Phillip Albrecht is rapporteur of the European Parliament for the EU's General Data Protection Regulation as well as for the EU-US data protection framework agreement.
30x49
Magic Lantern (#5554)
Episode overview
28, 2013
Speaker: Michael Zöller Free Software on Your Camera We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly .. show full overview
30x50
Die Bundesrepublik – das am meisten überwachte Land in Europa (#5612)
Episode overview
28, 2013
Speaker: Josef Foschepoth Historische Grundlagen und notwendige Konsequenzen Seit Monaten hält uns die NS-Affäre in Atem. Immer neue Abhörmaßnahmen und geheimdienstliche Praktiken .. show full overview
30x51
Script Your Car! (#5360)
Episode overview
28, 2013
Speaker: Felix "tmbinc" Domke Using existing hardware platforms to integrate python into your dashboard Almost all higher-end cars come with very beefy in-car entertainment .. show full overview
30x52
My journey into FM-RDS (#5588)
Episode overview
28, 2013
Speaker: Oona Räisänen How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.
30x53
Against Metadata (#5453)
Episode overview
28, 2013
Speaker: Robert M Ochshorn Twisting time and space to explore the unknown Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a .. show full overview
30x54
The Pirate Cinema (#5607)
Episode overview
28, 2013
Speakers: Nicolas Maigret, Brendan Howell Creating mash-up movies by hidden activity and geography of Peer-to-Peer file sharing "The Pirate Cinema" reveals Peer-to-Peer information .. show full overview
30x55
Hardware Attacks, Advanced ARM Exploitation, and Android Hacking (#5193)
Episode overview
28, 2013
Speaker: Stephen A. Ridley In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical .. show full overview
30x56
FPGA 101 (#5185)
Episode overview
28, 2013
Speaker: Karsten Becker Making awesome stuff with FPGAs In this talk I want to show you around in the mysterious world of Field Programmable Gate Arrays, or short FPGAs. The aim .. show full overview
30x57
Turing Complete User (#5547)
Episode overview
28, 2013
Speaker: olia lialina What can be done to protect the term, the notion and the existence of the Users? With the disappearance of the computer, something else is silently becoming .. show full overview
30x58
Open source experimental incubator build up (#5566)
Episode overview
28, 2013
Speaker: Frantisek Algoldor Apfelbeck call for participation in project and product development This is a call for participation in a project aimed to build up an open source based .. show full overview
30x59
The Year in Crypto (#5339)
Episode overview
28, 2013
Speaker: Nadia Heninger, djb, Tanja Lange This was a busy year for crypto. TLS was broken. And then broken again. Discrete logs were computed. And then computed again. Is the .. show full overview
30x60
V wie Verfassungsschutz (#5591)
Episode overview
28, 2013
Speakers: Talke Blase, Asta Nechajute, Felix Höfner ,Mona Mucke Wer ist eigentlich dieser "Verfassungsschutz", was tut er und brauchen wir ihn überhaupt? Laut Angaben des .. show full overview
30x61
Introduction to Processor Design (#5443)
Episode overview
28, 2013
Speaker: byterazor This lecture gives an introduction to processor design. It is mostly interesting for people new to processor design and does not cover high performance pipelined .. show full overview
30x62
Hacking as Artistic Practice (#5425)
Episode overview
28, 2013
Speaker: !Mediengruppe Bitnik !Mediengruppe Bitnik about their recent works !Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work, .. show full overview
30x63
25 Jahre Chipkarten-Angriffe (#5548)
Episode overview
28, 2013
Speaker: Peter Laackmann, Marcus Janke Von der Historie zur Zukunft Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in .. show full overview
30x64
Revisiting Trusting Trust for binary toolchains
Episode overview
28, 2013
Speakers: sergeybratus, Julian Bangert, bx Ken Thompson's classic "Reflections on Trusting Trust" examined the impacts of planted build chain bugs, from an example of a compiler .. show full overview
30x65
Bullshit made in Germany (#5210)
Episode overview
28, 2013
Speaker: Linus Neumann So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim BND! Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail .. show full overview
30x66
Desperately Seeking Susy (#5416)
Episode overview
28, 2013
Speaker: atdotde A farewell to a bold proposal? Supersymmetry has been particle theorists' favorite toy for several decades. It predicts a yet unobserved symmetry of nature and .. show full overview
30x67
Security of the IC Backside (#5459)
Episode overview
28, 2013
Speaker: nedos The future of IC analysis In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ .. show full overview
30x68
Art of the Exploit: An Introduction to Critical Engineering (#5440)
Episode overview
28, 2013
Speaker: Julian Oliver In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and .. show full overview
30x69
Programming FPGAs with PSHDL (#5186)
Episode overview
28, 2013
Speaker: Karsten Becker Let's create the Arduino for FPGAs Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but .. show full overview
30x70
The good, the bad, and the ugly - Linux Kernel patches (#5446)
Episode overview
28, 2013
Speaker: wsa Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better, .. show full overview
30x71
Plants & Machines (#5437)
Episode overview
28, 2013
Speaker: mrv, bbuegler Food replicating Robots from Open Source Technologies Did you ever feel the need to be in charge of your environment? We did . A detailed story of our .. show full overview
30x72
Seeing The Secret State: Six Landscapes (#5604)
Episode overview
28, 2013
Speaker: Trevor Paglen Although people around the world are becoming increasingly aware of the United States' global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.
30x73
SCADA StrangeLove 2 (#5582)
Episode overview
28, 2013
Speakers: Gleb Gritsai, Sergey Gordeychik We already know SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current .. show full overview
30x74
Disclosure DOs, Disclosure DON'Ts (#5361)
Episode overview
28, 2013
Speaker: Nate Cardozo Pragmatic Advice for Security Researchers This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives. .. show full overview
30x75
Technomonopolies (#5319)
Episode overview
28, 2013
Speaker: rysiek How technology is used to subvert and circumvent anti-monopoly laws We all know monopolies are bad. We even have laws against them that sometimes get enforced. .. show full overview
30x78
Perfect Paul (#5614)
Episode overview
28, 2013
Speaker: artelse On Freedom of Facial Expression The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system .. show full overview
30x102
X Security (#5499)
Episode overview
28, 2013
Speaker: Ilja van Sprundel It's worse than it looks For the past year, I've been looking at the implementation of X.org code. both client and server. During this presentation, I'll give an overview of the good, the bad and the ugly.
30x76
Jahresrückblick des CCC (#5608)
Episode overview
29, 2013
Speakers: Constanze Kurz, frank, Linus Neumann Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.
30x77
Googlequiz (#5465)
Episode overview
29, 2013
Speaker: Jöran Muuß-Merholz, Gestatten, it4n6 2013er Edition Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit dem Googlequiz lässt sich das ausbauen. .. show full overview
30x79
Making machines that make (#5587)
Episode overview
29, 2013
Speaker: Nadya Peek rapid prototyping of digital fabrication and instrumentation machines Making a new control system for a machine is often a slow and tedious task. Maybe you .. show full overview
30x80
Europe, the USA and Identity Ecosystems (#5483)
Episode overview
29, 2013
Speaker: Christoph Engemann Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.
30x81
India's Surveillance State (#5552)
Episode overview
29, 2013
Speaker: Maria Xynou India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India's surveillance industry, its UID .. show full overview
30x82
Y U NO ISP, taking back the Net (#5391)
Episode overview
29, 2013
Speaker: taziden Building and running an ISP is not that difficult. It's hard to say how many people are connected to the Internet by such weird structures, but we know that they are .. show full overview
30x83
Building a safe NFC ticketing system (#5479)
Episode overview
29, 2013
Speakers: bughardy, Eagle1753 NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad .. show full overview
30x84
Drones (#5406)
Episode overview
29, 2013
Speaker: Piotr Esden-Tempski Autonomous flying vehicles, where are we and where are we going? During the last 10 years the technology that was formerly only available to the .. show full overview
30x85
ID Cards in China: Your Worst Nightmare (#5543)
Episode overview
29, 2013
Speaker: Kate Krauss In China Your ID Card Knows Everything Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are .. show full overview
30x86
Lightning Talks, Day 3 (#5563)
Episode overview
29, 2013
Speaker: nickfarr
30x87
Structuring open hardware projects (#5594)
Episode overview
29, 2013
Speakers: Bram de Vries, Morris Winkler experiences from the “i3 Berlin” 3D printer project with Blender and Github Every successful open hardware project needs a solid .. show full overview
30x88
calc.pw (#5420)
Episode overview
29, 2013
Speaker: Kenneth Newwood Passwortgenerierung mit Arduino [Generating passwords with Arduino] Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem .. show full overview
30x89
The Exploration and Exploitation of an SD Memory Card (#5294)
Episode overview
29, 2013
Speakers: bunnie, Xobs All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of .. show full overview
30x90
RFID Treehouse of Horror (#5334)
Episode overview
29, 2013
Speaker: Adrian Dabrowski Hacking City-Wide Access Control Systems In this lecture, we present a black-box analysis of an electronic contact-less system that has been .. show full overview
30x91
The ArduGuitar (#5595)
Episode overview
29, 2013
Speaker: gratefulfrog An Arduino Powered Electric Guitar The ArduGuitar is an electric guitar with no physical controls, i.e. no buttons or knobs to adjust volume, tone or to .. show full overview
30x92
Android DDI (#5192)
Episode overview
29, 2013
Speaker: Collin Mulliner Dynamic Dalvik Instrumentation of Android Applications and the Android Framework As application security becomes more important on Android we need better .. show full overview
30x93
How to Build a Mind (#5526)
Episode overview
29, 2013
Speaker: Joscha Artificial Intelligence Reloaded A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial .. show full overview
30x94
#SOPA, #NSA, and the New Internet (#5475)
Episode overview
29, 2013
Speaker: Elizabeth Stark The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.
30x95
Towards an affordable brain-computer-interface (#5395)
Episode overview
29, 2013
Speakers: Dominic, Anne The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it's not too absurd to try to .. show full overview
30x96
Nerds in the news (#5494)
Episode overview
29, 2013
Speaker: Friedrich Lindenberg Spending a year coding in a newsroom Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for .. show full overview
30x97
Even More Tamagotchis Were Harmed in the Making of this Presentation (#5279)
Episode overview
29, 2013
Speaker: Natalie Silvanovich You might remember Tamagotchi virtual pets from the 1990's. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts .. show full overview
30x98
White-Box Cryptography (#5590)
Episode overview
29, 2013
Speaker: Dmitry Khovratovich Survey The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the .. show full overview
30x99
Recht auf Remix (#5433)
Episode overview
29, 2013
Speaker: Leonhard Dobusch Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen .. show full overview
30x100
Data Mining for Good (#5405)
Episode overview
29, 2013
Speaker: Patrick Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala For .. show full overview
30x101
2 Takte später (#5469)
Episode overview
29, 2013
Speakers: m.eik, bruder 30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung .. show full overview
30x103
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware (#5380)
Episode overview
29, 2013
Speaker: Patrick Stewin In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is .. show full overview
30x104
Calafou, postcapitalist ecoindustrial community (#5571)
Episode overview
29, 2013
Speaker: acracia Building a space for grassroots sustainable technology development near Barcelona Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around .. show full overview
30x105
Anonymity and Privacy in Public Space and on the Internet (#5500)
Episode overview
29, 2013
Speaker: aluburka How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real .. show full overview
30x106
The Four Wars (#5295)
Episode overview
29, 2013
Speaker: Annie Machon Terror, whistleblowers, drugs, internet Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a .. show full overview
30x107
The Internet (Doesn't) Need Another Security Guide (#5538)
Episode overview
29, 2013
Speaker: evacide Creating Internet Privacy and Security Resources That Don't Suck As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give .. show full overview
30x108
Reverse engineering the Wii U Gamepad (#5322)
Episode overview
29, 2013
Speaker: delroth, shuffle2 A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very .. show full overview
30x109
WarGames in memory (#5223)
Episode overview
29, 2013
Speaker: gannimo what is the winning move? Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past .. show full overview
30x110
To Protect And Infect (#5439)
Episode overview
29, 2013
Speakers: Claudio Guarnieri, Morgan Marquis-Boire The militarization of the Internet 2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as .. show full overview
30x111
Mind-Hacking mit Psychedelika (#5619)
Episode overview
29, 2013
Speaker: Julia Aksënova Eine Einführung in die Wirkungsweise psychedelischer Substanzen Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches .. show full overview
30x112
Backdoors, Government Hacking and The Next Crypto Wars (#5478)
Episode overview
29, 2013
Speaker: Christopher Soghoian Backdoors, Government Hacking and The Next Crypto Wars Law enforcement agencies claim they are "going dark". Encryption technologies have finally been .. show full overview
30x113
Virtually Impossible: The Reality Of Virtualization Security (#5445)
Episode overview
29, 2013
Speaker: Gal Diskin Errata FTW This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an .. show full overview
30x114
Trezor: Bitcoin hardware wallet (#5545)
Episode overview
29, 2013
Speaker: Pavol "stick" Rusnak TREZOR is a hardware wallet for Bitcoin. We identified security of the end users' computer as one of the main problems that block Bitcoin mass adoption.
30x115
Sysadmins of the world, unite! (#5397)
Episode overview
29, 2013
Speakers: Julian Assange, Jacob a call to resistance Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that .. show full overview
30x116
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit (#5502)
Episode overview
29, 2013
Speaker: qbi Ein Streifzug durch die Fehler in der Kryptografie »Lange Schlüssel sind sicherer als kurze.« »RSA und/oder AES sind einfach zu implementieren.« »Für Zufallszahlen .. show full overview
30x117
Die Drohnenkriege (#5532)
Episode overview
29, 2013
Speaker: Norbert Schepers Kriegsführung der Zukunft? Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der .. show full overview
30x118
Das FlipDot-Projekt (#5426)
Episode overview
29, 2013
Speaker: RFguy Spaß mit mechanischer Anzeige Inbetriebnahme alter Flip-Dot-Anzeigemodule eines Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse Engineering des .. show full overview
30x119
CounterStrike (#5304)
Episode overview
29, 2013
Speaker: FX Lawful Interception Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs. .. show full overview
30x120
Fnord News Show (#5490)
Episode overview
29, 2013
Speakers: frank, Fefe Der schonungslose Realitätsabgleich mit Birzarrometer-Rekalibrierung Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die .. show full overview
30x121
Decoder (#5712)
Episode overview
29, 2013
Speaker: Klaus Maeck DECODER is a legendary German film from 1984, based on the themes of William S. Burroughs. Burroughs himself acts in a key scene in the film, along with F.M. Einheit, Christiane F., Genesis P. Orridge a.o.
30x122
Hacking the Czech Parliament via SMS (#5593)
Episode overview
30, 2013
Speaker: Ztohoven A parliamentary drama of 223 actors Moralni_reforma1-462x349 The Czech art collective Ztohoven' project “Moral Reform” was accomplished in collaboration with web .. show full overview
30x123
To Protect And Infect, Part 2 (#5713)
Episode overview
30, 2013
Speaker: Jacob The militarization of the Internet
30x124
Beyond the Tech: Building Internet Freedom Tools for Real People (#5550)
Episode overview
30, 2013
Speaker: Michael Brennan Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and .. show full overview
30x125
Coding your body (#5289)
Episode overview
30, 2013
Speaker: Sophie Hiltner How to decipher the messages of your body The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware .. show full overview
30x126
Thwarting Evil Maid Attacks (#5600)
Episode overview
30, 2013
Speakers: Eric Michaud, Ryan Lackey Physically Unclonable Functions for Hardware Tamper Detection Increasingly, users and their computing hardware are exposed a range of software .. show full overview
30x127
Warum die Digitale Revolution des Lernens gescheitert ist. (#5467)
Episode overview
30, 2013
Speaker: Jöran Muuß-Merholz Fünf Desillusionen Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.
30x128
Lightning Talks, Day 4 (#5564)
Episode overview
30, 2013
Speaker: nickfarr
30x129
The philosophy of hacking (#5278)
Episode overview
30, 2013
Speaker: groente Contemplations on the essence of hacking and its implications on hacker ethics Modern society's use of technology as an instrument for domination is deeply .. show full overview
30x130
Human Rights and Technology (#5539)
Episode overview
30, 2013
Speaker: Seb "A New Hope" or "The Empire Strikes Back"? This talk aims to shed some light on recent human rights violations in the context of the use of digital information and .. show full overview
30x131
Through a PRISM, Darkly (#5255)
Episode overview
30, 2013
Speaker: Kurt Opsahl Everything we know about NSA spying From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and .. show full overview
30x132
THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE (#5421)
Episode overview
30, 2013
Speaker: Kaustubh Srikanth 23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the "The Information Technology (Amendment) Act" .. show full overview
30x133
Infrastructure Review (#5609)
Episode overview
30, 2013
Speakers: kay, Peter Stuge, florolf, Sebastian, *m, Andi Presentation of MOC/NOC/VOC/SOC/*OC
30x134
Amtliche Datenschützer: Kontrolleure oder Papiertiger? (#5623)
Episode overview
30, 2013
Speaker: Peter Schaar In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr .. show full overview
30x135
Concepts for global TSCM (#5495)
Episode overview
30, 2013
Speaker: andy getting out of surveillance state mode After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of .. show full overview
30x136
Attacking HomeMatic (#5444)
Episode overview
30, 2013
Speaker: sathya, Malli HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless .. show full overview
30x137
Dead Man Edition (#5293)
Episode overview
30, 2013
Speaker: Sebastian Jekutsch Auf dem Weg zu fairer Elektronik am Beispiel der Elkos Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem .. show full overview
30x138
Security Nightmares (#5413)
Episode overview
30, 2013
Speakers: frank, Ron Damit Sie auch morgen schlecht von Ihrem Computer träumen. Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
30x139
Closing Event (#5606)
Episode overview
30, 2013
Speaker: ths