m (how to get them as BTsync User)
(Recording torrents)
Line 54: Line 54:
 
</pre>
 
</pre>
  
Output, as of 2014-01-10T18:30Z <small>(hint: some torrent clients can swallow this list as is)</small>:
+
Output, as of 2014-01-13T11:40Z <small>(hint: some torrent clients can swallow this list as is)</small>:
 
<pre>
 
<pre>
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
Line 115: Line 115:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
Line 147: Line 148:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent

Revision as of 12:41, 13 January 2014

Recordings

The recordings are or will be available in different video- and audio-formats. Additional to the formats provided last year we publish WebM (video) and Opus (audio-only).

The first recordings has been published. The others will follow in the next days.

If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.

  • de-en means the talk was held in german and translated into english.
  • en-de means the talk was held in english and translated into german.


Official recordings are available at:

We don't fill external video services like YouTube or Vimeo ourselves. This is done by users and not to be considered as official CCC channel.

If you upload one of our recordings, please

  • ensure that you provide all metadata especially the correct title, speaker names, licence and language.
  • disable ads for this video
  • If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
  • check regularly if new subtitles are available and add them to both uploads

Recording torrents

how to get them as BTsync User

  • Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
  • ensure you use the current version (1.2.82) as the different versions are not compatible with each other
  • get at least 65 GB of free disk space
  • add a folder with following hash
    • BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
  • all MP4 (HD + HQ) files get downloaded to your device automatically

how to get them as a l33t h4x0r

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do 
 echo "$x".torrent;
done

how to get new torrent files not present in local directory

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done

Output, as of 2014-01-13T11:40Z (hint: some torrent clients can swallow this list as is):

http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5214-en-The_Gospel_of_IRMA__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5420-de-en-calcpw_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5423-en-The_Tor_Network_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5499-en-X_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5509-de-en-IFGINT_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent

Streamdumps

For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.

Just to be clear: The CFP defines CC BY 3.0 as licence for the recordings. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.

unofficial YouTube Livestream & Recording Saal 1

Caching-Time: 12h
Direct-Recording is activated.
DVR activated.

Photos