27C3 - Version 1.6.3

27th Chaos Communication Congress
We come in peace

Schedule Day 2

Saal 1 Saal 2 Saal 3
Saal 1 Saal 2 Saal 3
11:30

File -> Print -> Electronics

A new circuit board printer will liberate you from the Arduino-Industrial Complex

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a fistful of dollars - and how the community can benefit from this

Wikileaks und mehr

Eine Whistleblowerperspektive auf Leaking-Plattformen

11:45
12:00
12:15
12:30
12:45

Reverse Engineering the MOS 6502 CPU

3510 transistors in 60 minutes

Lightning Talks - Day 2

4 minutes of fame

13:00

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

13:15
13:30
13:45

Node.js as a networking tool

14:00

Wideband GSM Sniffing

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault Isolation

14:15
14:30

Logikschaltungen ohne Elektronik

logische Schaltungen mit Pneumatik

14:45
15:00
15:15
15:30
15:45
16:00

Part-Time Scientists

One year of Rocket Science!

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

A short political history of acoustics

For whom, and to do what, the science of sound was developed in the 17th century

16:15
16:30
16:45
17:00
17:15

Building Custom Disassemblers

Instruction Set Reverse Engineering

Literarischer Abend

Netzmedienrecht, Lobbyismus und Korruption

Wie wirkt die Lobby von Medienkonzernen?

17:30
17:45
18:00
18:15
18:30

"The Concert"

a disconcerting moment for free culture

Defense is not dead

Why we will have more secure computers - tomorrow

Techniken zur Identifizierung von Netzwerk-Protokollen

18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30

High-speed high-security cryptography: encrypting and authenticating the whole Internet

The Baseband Apocalypse

all your baseband are belong to us

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on Airplanes

20:45
21:00
21:15
21:30
21:45

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

Data Recovery Techniques

Fun with Hard Drives

22:00
22:15
22:30
22:45
23:00

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations of our right to privacy

Secure communications below the hearing threshold

Improved approaches for auditive steganography

The Hidden Nemesis

Backdooring Embedded Controllers

23:15
23:30
23:45
00:00
00:15

Stanislaw Lem - Der enttäuschte Weltverbesserer

Ein audiovisuelles Live-Feature

00:30
00:45
01:00