(Recordings: Trailing slashes are important!)
m (removed SNT mirror from the list)
 
(18 intermediate revisions by 5 users not shown)
Line 2: Line 2:
 
== Recordings ==
 
== Recordings ==
  
The recordings are or will be available in different video- and audio-formats. Additional to the formats provided last year we publish WebM (video) and Opus (audio-only).
+
The recordings are available in different video- and audio-formats. See [http://events.ccc.de/2014/01/14/30c3-recordings-all-formats-released/ the blog post] for more information.
 +
 
 +
All recordings have been published now.
 +
 
 +
If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.
 +
* de-en means the talk was held in german and translated into english.
 +
* en-de means the talk was held in english and translated into german.  
  
The first recordings has been publish the others will follow in the next days.
 
  
 
Official recordings are available at:
 
Official recordings are available at:
 
* http://media.ccc.de/browse/congress/2013/ (Web interface with thumbnails and player)
 
* http://media.ccc.de/browse/congress/2013/ (Web interface with thumbnails and player)
* http://cdn.media.ccc.de/congress/2013/ (multiple hosts, CDN)
+
* http://cdn.media.ccc.de/congress/2013/ (multiple hosts ≥ 8, CDN)
 +
** append <code>?mirrorlist</code> to a filename to see all mirrors of that file
 +
** please report bugs and success stories on [[Static_Talk:Documentation#CDN|the discussion page]]
 
* ftp://mirror.fem-net.de/CCC/30C3/
 
* ftp://mirror.fem-net.de/CCC/30C3/
 
* http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, [http://www.speedpartner.de SpeedPartner GmbH])
 
* http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, [http://www.speedpartner.de SpeedPartner GmbH])
 
* http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
 
* http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
 
* http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
 
* http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
* http://ftp.snt.utwente.nl/pub/misc/30c3/ (10Gbit/s, IPv4/IPv6, http/ftp/rsync)
 
 
* http://mirror.mag.lab.sh/pub/ftp.ccc.de/congress/30C3/ (DFN, also offers ftp and rsync)
 
* http://mirror.mag.lab.sh/pub/ftp.ccc.de/congress/30C3/ (DFN, also offers ftp and rsync)
 
* ftp://mirror.wormhole.eu/30C3/ ([https://planetcyborg.de planet cyborg], ~1GBit/sec, IPv4/IPv6, http/ftp)
 
* ftp://mirror.wormhole.eu/30C3/ ([https://planetcyborg.de planet cyborg], ~1GBit/sec, IPv4/IPv6, http/ftp)
Line 26: Line 32:
  
 
== Recording torrents ==
 
== Recording torrents ==
 +
 +
===  how to get them as BTsync User ===
 +
 +
* Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
 +
* ensure you use the current version (1.2.82) as the different versions are not compatible with each other
 +
* get at least 65 GB of free disk space
 +
* add a folder with following hash
 +
** BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
 +
* all MP4 (HD + HQ) files get downloaded to your device automatically
  
 
=== how to get them as a l33t h4x0r ===
 
=== how to get them as a l33t h4x0r ===
Line 32: Line 47:
 
  echo "$x".torrent;
 
  echo "$x".torrent;
 
done
 
done
 +
</pre>
 +
==== how to get new torrent files not present in local directory ====
 +
<pre>
 +
for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done
 
</pre>
 
</pre>
  
Current output:
+
Output, as of 2014-01-16T16:10Z <small>(hint: some torrent clients can swallow this list as is)</small>:
 
<pre>
 
<pre>
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
Line 40: Line 59:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
Line 47: Line 67:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
Line 52: Line 73:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
Line 60: Line 85:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
Line 82: Line 114:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
Line 90: Line 123:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
Line 97: Line 131:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-en-Fnord_News_Show_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
Line 111: Line 148:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
Line 119: Line 159:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
Line 127: Line 168:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
Line 134: Line 176:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
Line 143: Line 188:
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
 +
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent
 
</pre>
 
</pre>
 
=== Everyone else ===
 
 
???
 
  
 
== Streamdumps ==
 
== Streamdumps ==
  
 
For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.  
 
For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.  
 +
 +
Just to be clear: The [http://events.ccc.de/2013/07/18/30c3-call-for-participation-en/ CFP] defines CC BY 3.0 as licence for the '''recordings'''. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.
  
 
* http://wtf1.muling.lu (HTTP, FTP, RSYNC & Torrents, Mirror: http://wtf.muling.lu)
 
* http://wtf1.muling.lu (HTTP, FTP, RSYNC & Torrents, Mirror: http://wtf.muling.lu)
Line 163: Line 208:
 
* Add your URLs here
 
* Add your URLs here
  
=== unofficial YouTube Livestream & Recording ===
+
=== unofficial YouTube Livestream & Recording Saal 1===
  
 
  Caching-Time: 12h
 
  Caching-Time: 12h
Line 169: Line 214:
 
  DVR activated.
 
  DVR activated.
  
====Saal 1====
 
 
* Day 1: http://www.youtube.com/watch?v=qqk4ItPjU5g
 
* Day 1: http://www.youtube.com/watch?v=qqk4ItPjU5g
 
* Day 2: http://www.youtube.com/watch?v=0lE7E6wGq3o
 
* Day 2: http://www.youtube.com/watch?v=0lE7E6wGq3o

Latest revision as of 13:45, 22 May 2016

Recordings

The recordings are available in different video- and audio-formats. See the blog post for more information.

All recordings have been published now.

If a filename contains multiple language marks like de-en the video contains two audio tracks: native room audio and a translation.

  • de-en means the talk was held in german and translated into english.
  • en-de means the talk was held in english and translated into german.


Official recordings are available at:

We don't fill external video services like YouTube or Vimeo ourselves. This is done by users and not to be considered as official CCC channel.

If you upload one of our recordings, please

  • ensure that you provide all metadata especially the correct title, speaker names, licence and language.
  • disable ads for this video
  • If a file has multiple audio tracks, make sure the viewer can switch between both languages. This could mean that you have to upload the video twice.
  • check regularly if new subtitles are available and add them to both uploads

Recording torrents

how to get them as BTsync User

  • Download and install Bit Torrent Sync from http://www.bittorrent.com/sync
  • ensure you use the current version (1.2.82) as the different versions are not compatible with each other
  • get at least 65 GB of free disk space
  • add a folder with following hash
    • BTSync BFLM4MK4XYTBVSL47ZUE4IDSSHR5Q57FW (MP4)
  • all MP4 (HD + HQ) files get downloaded to your device automatically

how to get them as a l33t h4x0r

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do 
 echo "$x".torrent;
done

how to get new torrent files not present in local directory

for x in `lynx http://cdn.media.ccc.de/congress/2013/mp4/ --dump | grep "http" | grep  "30c3" | cut -c 7-`; do if [ ! -e "$( echo $x.torrent|sed -e 's,.*2013/mp4/,,')" ]; then wget "$x".torrent; fi; done

Output, as of 2014-01-16T16:10Z (hint: some torrent clients can swallow this list as is):

http://cdn.media.ccc.de/congress/2013/mp4/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5185-en-FPGA_101_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5192-en-Android_DDI_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5214-en-The_Gospel_of_IRMA__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5223-en-WarGames_in_memory_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5289-en-Coding_your_body_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5295-en-de-The_Four_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5304-en-CounterStrike_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5305-en-Breaking_Baryons_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5311-en-lasers_in_space_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5319-en-Technomonopolies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5339-en-de-The_Year_in_Crypto_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5360-en-Script_Your_Car__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5394-BREACH_in_Agda_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5398-en-HbbTV_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5406-en-Drones_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5412-en-Bug_class_genocide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5413-de-en-Security_Nightmares_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5420-de-en-calcpw_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5423-en-The_Tor_Network_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5437-en-Plants_Machines_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5439-en-To_Protect_And_Infect_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5453-en-Against_Metadata_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5490-de-en-Fnord_News_Show_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5499-en-X_Security_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5509-de-en-IFGINT_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5537-en-Glass_Hacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5547-en-Turing_Complete_User_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5554-en-Magic_Lantern_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5577-de-en-Hacker_Jeopardy_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5587-en-Making_machines_that_make_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5595-en-The_ArduGuitar_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5605-en-Opening_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5606-de-en-Closing_Event_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5609-en-Infrastructure_Review_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5610-de-Seidenstrasse_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5611-en-Hello_World__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5614-en-Perfect_Paul_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5622-en-de-30c3_Keynote_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hq.mp4.torrent
http://cdn.media.ccc.de/congress/2013/mp4/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4.torrent

Streamdumps

For the time between the talk and the released recording, some people store the live streams and provide these files for other users. If you upload stream dumps to video services like Youtube or Vimeo please remove them after a official recording was released.

Just to be clear: The CFP defines CC BY 3.0 as licence for the recordings. This does not cover the streams and thereby also not the streamdumps. This means the streamdumps are NOT covered by a creative commons licence.

unofficial YouTube Livestream & Recording Saal 1

Caching-Time: 12h
Direct-Recording is activated.
DVR activated.

Photos