m (removed SNT mirror from the list)
 
(24 intermediate revisions by 7 users not shown)
Line 2: Line 2:
 
== Recordings ==
 
== Recordings ==
  
The recordings are or will be available in different video- and audio-formats. Additional to the formats provided last year we publish WebM (video) and Opus (audio-only).
+
The recordings are available in different video- and audio-formats. See [http://events.ccc.de/2014/01/14/30c3-recordings-all-formats-released/ the blog post] for more information.
 +
 
 +
All recordings have been published now.
 +
 
 +
If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.
 +
* de-en means the talk was held in german and translated into english.
 +
* en-de means the talk was held in english and translated into german.  
  
The first recordings has been publish the others will follow in the next days.
 
  
 
Official recordings are available at:
 
Official recordings are available at:
* http://media.ccc.de/browse/congress/2013 (Web interface with thumbnails and player)
+
* http://media.ccc.de/browse/congress/2013/ (Web interface with thumbnails and player)
* http://cdn.media.ccc.de/congress/2013 (multiple hosts, CDN)
+
* http://cdn.media.ccc.de/congress/2013/ (multiple hosts ≥ 8, CDN)
 +
** append <code>?mirrorlist</code> to a filename to see all mirrors of that file
 +
** please report bugs and success stories on [[Static_Talk:Documentation#CDN|the discussion page]]
 
* ftp://mirror.fem-net.de/CCC/30C3/
 
* ftp://mirror.fem-net.de/CCC/30C3/
 
* http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, [http://www.speedpartner.de SpeedPartner GmbH])
 
* http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, [http://www.speedpartner.de SpeedPartner GmbH])
 
* http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
 
* http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
 
* http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
 
* http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
* http://ftp.snt.utwente.nl/pub/misc/30c3/ (10Gbit/s, IPv4/IPv6, http/ftp/rsync)
 
 
* http://mirror.mag.lab.sh/pub/ftp.ccc.de/congress/30C3/ (DFN, also offers ftp and rsync)
 
* http://mirror.mag.lab.sh/pub/ftp.ccc.de/congress/30C3/ (DFN, also offers ftp and rsync)
 
* ftp://mirror.wormhole.eu/30C3/ ([https://planetcyborg.de planet cyborg], ~1GBit/sec, IPv4/IPv6, http/ftp)
 
* ftp://mirror.wormhole.eu/30C3/ ([https://planetcyborg.de planet cyborg], ~1GBit/sec, IPv4/IPv6, http/ftp)
Line 21: Line 27:
 
If you upload one of our recordings, please  
 
If you upload one of our recordings, please  
 
* ensure that you provide all metadata especially the correct title, speaker names, licence and language.
 
* ensure that you provide all metadata especially the correct title, speaker names, licence and language.
 +
* disable ads for this video
 
* If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
 
* If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
 
* check regularly if new subtitles are available and add them to both uploads
 
* check regularly if new subtitles are available and add them to both uploads
  
 
== Recording torrents ==
 
== Recording torrents ==
 +
 +
===  how to get them as BTsync User ===
 +
 +
* Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
 +
* ensure you use the current version (1.2.82) as the different versions are not compatible with each other
 +
* get at least 65 GB of free disk space
 +
* add a folder with following hash
 +
** BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
 +
* all MP4 (HD + HQ) files get downloaded to your device automatically
 +
 +
=== how to get them as a l33t h4x0r ===
 
<pre>
 
<pre>
 
for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do  
 
for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do  
 
  echo "$x".torrent;
 
  echo "$x".torrent;
 
done
 
done
 +
</pre>
 +
==== how to get new torrent files not present in local directory ====
 +
<pre>
 +
for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done
 
</pre>
 
</pre>
  
Current output:
+
Output, as of 2014-01-16T16:10Z <small>(hint: some torrent clients can swallow this list as is)</small>:
 
<pre>
 
<pre>
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
Line 37: Line 59:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
Line 44: Line 67:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
Line 49: Line 73:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
Line 57: Line 85:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
Line 79: Line 114:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
Line 87: Line 123:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
Line 94: Line 131:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-en-Fnord_News_Show_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
Line 108: Line 148:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
Line 116: Line 159:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
Line 124: Line 168:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
Line 131: Line 176:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
Line 140: Line 188:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
</pre>
 
</pre>
Line 149: Line 199:
  
 
For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.  
 
For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.  
 +
 +
Just to be clear: The [http://events.ccc.de/2013/07/18/30c3-call-for-participation-en/ CFP] defines CC BY 3.0 as licence for the '''recordings'''. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.
  
 
* http://wtf1.muling.lu (HTTP, FTP, RSYNC & Torrents, Mirror: http://wtf.muling.lu)
 
* http://wtf1.muling.lu (HTTP, FTP, RSYNC & Torrents, Mirror: http://wtf.muling.lu)
Line 156: Line 208:
 
* Add your URLs here
 
* Add your URLs here
  
=== unofficial YouTube Livestream & Recording ===
+
=== unofficial YouTube Livestream & Recording Saal 1===
  
 
  Caching-Time: 12h
 
  Caching-Time: 12h
Line 162: Line 214:
 
  DVR activated.
 
  DVR activated.
  
====Saal 1====
 
 
* Day 1: http://www.youtube.com/watch?v=qqk4ItPjU5g
 
* Day 1: http://www.youtube.com/watch?v=qqk4ItPjU5g
 
* Day 2: http://www.youtube.com/watch?v=0lE7E6wGq3o
 
* Day 2: http://www.youtube.com/watch?v=0lE7E6wGq3o
* Day 3: http://www.youtube.com/watch?v=vzVbwNoK7eE, (ab 18 Uhr) http://www.youtube.com/watch?v=8Wu7_PfHNSU
+
* Day 3: http://www.youtube.com/watch?v=vzVbwNoK7eE, [http://www.youtube.com/watch?v=8Wu7_PfHNSU ab 18 Uhr]
 
* Day 4: http://www.youtube.com/watch?v=d6tdq603z20
 
* Day 4: http://www.youtube.com/watch?v=d6tdq603z20
  
Line 172: Line 223:
 
* [https://commons.wikimedia.org/wiki/Category:30C3 Wikimedia Commons]
 
* [https://commons.wikimedia.org/wiki/Category:30C3 Wikimedia Commons]
 
* [https://secure.flickr.com/search/?q=30c3 Flickr Search]
 
* [https://secure.flickr.com/search/?q=30c3 Flickr Search]
 +
** [http://www.flickr.com/groups/2418976@N25/ Flickr Group]

Latest revision as of 14:45, 22 May 2016

Recordings

The recordings are available in different video- and audio-formats. See the blog post for more information.

All recordings have been published now.

If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.

  • de-en means the talk was held in german and translated into english.
  • en-de means the talk was held in english and translated into german.


Official recordings are available at:

We don't fill external video services like YouTube or Vimeo ourselves. This is done by users and not to be considered as official CCC channel.

If you upload one of our recordings, please

  • ensure that you provide all metadata especially the correct title, speaker names, licence and language.
  • disable ads for this video
  • If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
  • check regularly if new subtitles are available and add them to both uploads

Recording torrents

how to get them as BTsync User

  • Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
  • ensure you use the current version (1.2.82) as the different versions are not compatible with each other
  • get at least 65 GB of free disk space
  • add a folder with following hash
    • BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
  • all MP4 (HD + HQ) files get downloaded to your device automatically

how to get them as a l33t h4x0r

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do 
 echo "$x".torrent;
done

how to get new torrent files not present in local directory

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done

Output, as of 2014-01-16T16:10Z (hint: some torrent clients can swallow this list as is):

http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5214-en-The_Gospel_of_IRMA__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5420-de-en-calcpw_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5423-en-The_Tor_Network_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-en-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5499-en-X_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5509-de-en-IFGINT_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent

Streamdumps

For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.

Just to be clear: The CFP defines CC BY 3.0 as licence for the recordings. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.

unofficial YouTube Livestream & Recording Saal 1

Caching-Time: 12h
Direct-Recording is activated.
DVR activated.

Photos