(Recordings)
(Recording torrents)
Line 54: Line 54:
 
</pre>
 
</pre>
  
Current output:
+
Output, as of 2014-01-10T18:30Z <small>(hint: some torrent clients can swallow this list as is)</small>:
 
<pre>
 
<pre>
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
Line 60: Line 60:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
Line 67: Line 68:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
Line 72: Line 74:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
Line 80: Line 86:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
Line 110: Line 123:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
Line 117: Line 131:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
Line 133: Line 149:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
Line 139: Line 157:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
Line 147: Line 166:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
Line 154: Line 174:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
Line 163: Line 186:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
</pre>
 
</pre>

Revision as of 19:35, 10 January 2014

Recordings

The recordings are or will be available in different video- and audio-formats. Additional to the formats provided last year we publish WebM (video) and Opus (audio-only).

The first recordings has been published. The others will follow in the next days.

If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.

  • de-en means the talk was held in german and translated into english.
  • en-de means the talk was held in english and translated into german.


Official recordings are available at:

We don't fill external video services like YouTube or Vimeo ourselves. This is done by users and not to be considered as official CCC channel.

If you upload one of our recordings, please

  • ensure that you provide all metadata especially the correct title, speaker names, licence and language.
  • disable ads for this video
  • If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
  • check regularly if new subtitles are available and add them to both uploads

Recording torrents

how to get them as BTsync User

  • Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
  • ensure you use the current version (1.2.84) as the different versions are not compatible with each other
  • get at least 65 GB of free disk space
  • add a folder with following hash
    • BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
  • all MP4 (HD + HQ) files get downloaded to your device automatically

how to get them as a l33t h4x0r

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do 
 echo "$x".torrent;
done

how to get new torrent files not present in local directory

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done

Output, as of 2014-01-10T18:30Z (hint: some torrent clients can swallow this list as is):

http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5214-en-The_Gospel_of_IRMA__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5420-de-en-calcpw_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5423-en-The_Tor_Network_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5499-en-X_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5509-de-en-IFGINT_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent

Streamdumps

For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.

Just to be clear: The CFP defines CC BY 3.0 as licence for the recordings. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.

unofficial YouTube Livestream & Recording Saal 1

Caching-Time: 12h
Direct-Recording is activated.
DVR activated.

Photos