Recordings

The recordings are available in different video- and audio-formats. See the blog post for more information.

All recordings have been published now.

If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.

  • de-en means the talk was held in german and translated into english.
  • en-de means the talk was held in english and translated into german.


Official recordings are available at:

We don't fill external video services like YouTube or Vimeo ourselves. This is done by users and not to be considered as official CCC channel.

If you upload one of our recordings, please

  • ensure that you provide all metadata especially the correct title, speaker names, licence and language.
  • disable ads for this video
  • If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
  • check regularly if new subtitles are available and add them to both uploads

Recording torrents

how to get them as BTsync User

  • Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
  • ensure you use the current version (1.2.82) as the different versions are not compatible with each other
  • get at least 65 GB of free disk space
  • add a folder with following hash
    • BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
  • all MP4 (HD + HQ) files get downloaded to your device automatically

how to get them as a l33t h4x0r

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do 
 echo "$x".torrent;
done

how to get new torrent files not present in local directory

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done

Output, as of 2014-01-16T16:10Z (hint: some torrent clients can swallow this list as is):

http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5214-en-The_Gospel_of_IRMA__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5420-de-en-calcpw_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5423-en-The_Tor_Network_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-en-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5499-en-X_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5509-de-en-IFGINT_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent

Streamdumps

For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.

Just to be clear: The CFP defines CC BY 3.0 as licence for the recordings. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.

unofficial YouTube Livestream & Recording Saal 1

Caching-Time: 12h
Direct-Recording is activated.
DVR activated.

Photos

Archived page - Impressum/Datenschutz