// // 0:20:00
Milliways
milliways. The village at the end of the universe.
Contacts
habitat members
village projects
village rooms
- Milliways 160
- Milliways Workshop Dome 50
village events
-
-
// // 2:00:00
In this workshop you’ll learn some of the fundamental techniques of network hacking and how you can use them to find com...
-
// // 0:45:00
De.fac2 is a Common Criteria (CC) and FIDO certified FIDO U2F Java Card applet developed and certified by Federal Office...
-
// // 0:20:00
-
// // 0:45:00
The Mobile Rocket Base (MORABA), a department of DLR's Space Operations and Astronaut Training, allows scientists to con...
-
// // 1:00:00
-
// // 1:30:00
**Important:** You need to bring a Notebook with KiCad 7.x including the symbol- and footprint libraries installed. It d...
-
// // 0:45:00
Music brings us together. Vibrant colors captivate us. The flow3r is an electronic instrument - it turns touch and gestu...
-
// // 2:00:00
-
// // 0:45:00
This talk is a primer in modern cryptographic best practices, supporting them by examples of recent breaks and vulnerabi...
-
// // 2:00:00
Was müssen wir tun, damit Ihr bei einer Museumbahn mitmacht? Eine offene Diskussionsrunde um den Überlapp zwischen Museu...
-
// // 0:45:00
At Camp2019 some ingenuitive hackers from Milliways and a handful of other villages took the modding tools of OFF GRID a...
-
// // 0:20:00
-
// // 2:00:00
Are you fascinated by space and want to learn how to receive data from satellites and weather probes? Join Jeffery from ...
-
// // 0:20:00
-
// // 0:45:00
Born from building and tearing down a bunch of fibre for CCC event networks: a pocket tool to help quickly troubleshoot ...
-
// // 0:45:00
We will cover the following topics: - Introduction to social engineering - Using OSINT to collect initial inform...
-
// // 2:00:00
I have participated in Capture-The-Flag events an unhealthy amount of time in the last few years and would now like to p...
-
// // 0:45:00
1. Introduction 2. Speedy (free) delivery! 3. Other Vendors? 4. Escalation 5. Can I Bring a Friend? 6. But what abo...
-
// // 0:45:00
In the context of the CCC, we usually do our vulnerability disclosures responsibly. So we ensure that a vulnerability is...
-
// // 0:45:00
The EU's plans for chat-control, which in the European Commission's draft remain limited to finding material of sexual e...
-
// // 0:45:00
In the first part, we focus on companies that fail to eliminate security issues. In the second part, we address access ...
-
// // 0:45:00
-
// // 0:45:00
CCCasperl und Pezi finden einen kaputten `Leihroller` im Wald und beschliessen das Ding zu zerlegen. Sie finden dabei...
-
// // 1:00:00
Hack the Planet.
-
// // 0:20:00
Sniffing into network traffic can be really interesting. It can help you understand complex systems better, double-check...
-
// // 0:45:00
Apple systems can be quite obscure and archaic considering how popular and ubiquitous their devices are. Learning more a...
-
// // 2:00:00
External attack surface mapping is an important capability to have in the toolkit for everyone working on internet secur...
-
// // 0:45:00
This talk will discuss cellular basebands and FirmWire, our open-source platform for baseband firmware. The platform all...
-
// // 0:45:00
-
// // 0:45:00
The talk is structured in two parts, a theoretic part which explains various types of OPRFs, their properties and where ...
-
// // 1:51:00
This workshop is about r2wars: two programs are executed simultaneously in shared memory (more about this in the worksho...
-
// // 0:45:00
-
// // 0:45:00
This talk discusses ethical boundaries, the existence and lack of them, but also the grey areas in between. The spark fo...
-
// // 0:20:00
Social engineering and education techniques may look like the same thing from afar. They are not. This talk is about wha...
-
// // 2:00:00
External attack surface mapping is an important capability to have in the toolkit for everyone working on internet secur...
-
// // 0:45:00
A discussion on the evolution of digital resistance, from direct action hacking to whistleblowing. How can hacktivists s...
-
// // 0:45:00
-
// // 3:00:00
We had a great little congress in december, organized by people from xHain, Milliways, c-base, Digitale Gesellschaft and...
-
// // 0:20:00
”Listen Morty, I hate to break it to you, but what people call a build system is just a bunch of rules that compel compu...
-
// // 0:45:00
Apple's iCloud Private Relay is a novel Internet privacy service allowing users to securely and privately browse the Int...
-
// // 0:45:00
Working with some of the biggest OEMs and Tier 1 suppliers on pre-production vehicles gave us an understanding and exper...
-
// // 0:45:00
-
// // 0:20:00
This presentation will have two parts: A brief introduction to how magnetic tape works and is used in a data center, fol...
-
// // 2:00:00
ReconFTW (https://github.com/six2dez/reconftw) is a comprehensive tool that covers a wide range of reconnaissance and ex...
-
// // 0:20:00
This talk will include a hardware overview of various Cisco Meraki Ethernet switch models (past and present). We will lo...
-
// // 0:20:00
We like show an overview, on how reinforcement learning can be integrated into the penetration testing process to gain a...
-
// // 0:45:00
-
// // 0:45:00
-
// // 2:00:00
At CCCamp2019 some ingenuitive hackers from Milliways and a handful of other villages embarked on using the modding tool...
-
// // 0:45:00
Overview 1. Introduction to DoS attacks 2. Introduction to SLP 3. How is the attack working 4. Observations in the ...
-
// // 0:45:00
-
// // 0:45:00
-
// // 2:00:00
At CCCamp2019 some ingenuitive hackers from Milliways and a handful of other villages embarked on using the modding tool...
-
// // 0:45:00
Ein deutsches Unternehmen aus Meerbusch in Nordrhein-Westfalen war zusammen mit dem iranischen Internetunternehmen Arvan...
-
// // 3:00:00
-
// // 0:45:00
This talk gives you an overview of debugging ARM Cortex-M microcontrollers with a focus on the *practical* configuration...
-
// // 0:20:00
In 2015, someone was wrong on the Internet. To prove a point, I started teaching people how to prototype electronics. By...
-
// // 0:20:00
Nachhaltige Kryptographische Sicherheit stellt insbesondere für stromsparende Hardware eine Reihe von Herausforderungen ...
-
// // 0:45:00
-
// // 2:00:00
Yes, but not official.
-
// // 0:45:00
This talk will be about my journey of doing on-the-go Game Development on a SteamDeck using FOSS tools such as Godot4, B...
-
// // 0:45:00
-
// // 0:20:00
-
// // 0:20:00
-
// // 1:30:00
CANCELED
-
// // 0:20:00
-
// // 0:45:00
-
// // 0:45:00
I will give a quick introduction into the Bosch MEMS technology and sensors. Next I want to show some very basic steps ...