29C3 - Version 1.9

F/a{hr-p).l//a,n
2.9/C-3

Programm Day 2

Saal 1 Saal 4 Saal 6 Saal 17
Saal 1 Saal 4 Saal 6 Saal 17
11:00

Deutschlandfunk @ 29C3

Interviews, Talkrunden, Kennenlernen

11:15
11:30

We are all lawmakers!

How to further transparency by law – the Hamburg example and beyond

Meldegesetz

Was aus dem 57-Sekunden-Gesetz wurde

EveryCook

Cooking gets digital

11:45
12:00
12:15
12:30
12:45

Certificate Authority Collapse

Will the EU Succeed in Regulating HTTPS?

Lightning Talks 1

5 Minutes of Fame

(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung

13:00
13:15

Romantic Hackers

Keats, Wordsworth and Total Surveillance

13:30
13:45
14:00

Trojaner-Blindflug

Spionage-Software von Staats wegen

Tactical Tech - Bridging the Gap

14:15
14:30

OMG! OER!

How big business fights open education in Poland, and how open education fights back!

14:45
15:00
15:15
15:30
15:45
16:00

Was ist, was kann, was soll Gender Studies Informatik?

Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze

Stand gestern, heute und morgen

16:15
16:30

Live-Sendung »Forschung Aktuell«

Deutschlandfunk @ 29C3

16:45
17:00

Deutschlandfunk @ 29C3

Interviews, Talkrunden, Kennenlernen

17:15

Der Mord fällt aus

Ein Werkstattbericht der GEMA-Alternative C3S

Many Tamagotchis Were Harmed in the Making of this Presentation

The Tor software ecosystem

17:30
17:45
18:00
18:15
18:30

FactHacks

RSA factorization in the real world

SmartMeter

A technological overview of the German roll-out

IFG: Chance oder Bürgerbluff?

Informationsfreiheit in Deutschland. Ein Sachstand.

18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30

Hackers As A High-Risk Population

Harm Reduction Methodology

Defeating Windows memory forensics

"How I met your pointer"

Hijacking client software for fuzz and profit

20:45
21:00
21:15
21:30
21:45

Safecast: DIY and citizen-sensing of radiation

Empowering citizen in the wake of Fukushima triple-meltdown disaster

Let Me Answer That for You

adventures in mobile paging

Meine Kleidung funkt

Tracking von Menschen durch in Kleidung integrierte RFID-Chips

22:00
22:15
22:30
22:45
23:00

Hacker Jeopardy

Zahlenraten für Geeks

ESXi Beast

Exploiting VMWARE ESXi Binary Protocols Using CANAPE

Stylometry and Online Underground Markets

23:15
23:30
23:45
00:00
00:15

Hanussen's mindreading

Experiments of the historical psychic

00:30
00:45
01:00
Archived page - Impressum/Datenschutz