Version 1.7 a new dawn

Events

  Title Track Speakers
Event_small
10 Jahre OpenStreetMap
Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in den letzten drei...
Hardware & Making
31c3-logomulti-rgb-black
31C3 Closing Event
CCC
Event_small
31C3 Infrastructure Review
CCC
Event_small
31C3 Keynote
The 31C3 Keynote
CCC
31c3-logomulti-rgb-black
31C3 Opening Event
CCC
Fosscar
3D Casting Aluminum
We use microwaves to cast aluminum from 3D printed objects. This gives us the...
Hardware & Making
31c3_logo
Agri-tech and the Arts: From Barns to D-Space
What do the arts and literature have to contribute to urgent debates about...
Ethics, Society & Politics
Matryoschka1
AMD x86 SMU firmware analysis
You definitely should care. The aim of this talk is to provide insight to the...
Security & Hacking
Event_small
Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer
On modern Intel based computers there exists two powerful and protected code...
Security & Hacking
Commonsmachinery_humphrey_tin_lightbackground
Attribution revolution
Re-using works licensed under Creative Commons seems pretty simple, but it...
Art & Culture
Event_small
Automatically Subtitling the C3
Transcribing a talk comes relatively easy to fast typists, whereas turning a...
Science
Logo_big
Axoloti
Axoloti is an integrated platform for digital audio: its graphical editor is...
Hardware & Making
Icon
Beyond PNR: Exploring airline systems
Ever wondered what the cryptic <code>QNY27R</code> on your airline reservaton...
Security & Hacking
Event_small
CAESAR and NORX
"Nearly all of the symmetric encryption modes you learned about in school,...
Science
Event_small
Citizenfour
"Citizenfour" is Laura Poitras' documentary and a closeup view about blowing...
Entertainment
Event_small
Code Pointer Integrity
Programs are full of bugs, leading to vulnerabilities. We'll discuss power...
Security & Hacking
Kp-logo
Computer Science in the DPRK
This talk will reflect on teaching Computer Science in Pyongyang over the...
Ethics, Society & Politics
Event_small
Correcting copywrongs
After years of debate, EU copyright law is finally being revisited. The...
Ethics, Society & Politics
Event_small
Crypto Tales from the Trenches
Julia Angwin, Jack Gillum, and Laura Poitras will tell us stories about how...
Security & Hacking
Event_small
Cyber Necromancy
Reverse engineering is not all binaries and byte-code. The black art also...
Security & Hacking
10450972_10204071640849770_1943615773103067999_n
Damn Vulnerable Chemical Process
So you want to author a next Stuxnet (or even cooler than that). Here is the...
Hardware & Making
Event_small
Das Transparenzportal Hamburg
Im Vortrag wird die technische Umsetzung des Transparenzportals Hamburg...
Ethics, Society & Politics
Event_small
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu...
Ethics, Society & Politics
Diamant_kopie
Diamonds are a quantum computer’s best friend
The next revolution in data processing is Quantum computing. This talk is an...
Science
Event_small
Die Krise der Bilder ist die Krise der Politik
Im Rahmen meiner Forschungsarbeit "Das Bild im digitalen Wandel" beschätige...
Art & Culture
1378049_10152484535072968_5355775931050917737_n
Doing right by sources, done right
Whistleblowing is becoming a progressively popular topic and ways to...
Ethics, Society & Politics
Event_small
DP5: PIR for Privacy-preserving Presence
In the wake of the Snowden revelations and the explicit targetting of address...
Security & Hacking
20080915-just-picture
ECCHacks
This talk will explain how to work with elliptic curves constructively to...
Security & Hacking
Event_small
EMET 5.1 - Armor or Curtain?
EMET (Enhanced Mitigation Experience Toolkit) is an application which can be...
Security & Hacking
Kameramodul_geshoppt_hk_final_kopie
ES GIBT VIEL ZU TUN - HAU'N WIR AB.
Eine Mietwohnung ist seit circa 20 Jahren verlassen, ihr Bewohner nicht...
Art & Culture
Anonymousp__f1_info_nicolasduc.com--640x420
"Exploit" in theater
3 theater projects that illustrate the false "California Ideology" and ask us...
Art & Culture
Wearing
Eye Wear Computing
The talk gives an overview about the emerging field of smart glasses and how...
Science
Event_small
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC
We introduce Fernvale, a reverse-engineered, open hardware and software...
Hardware & Making
Event_small
Finding the Weak Crypto Needle in a Byte Haystack
Using the same stream cipher key twice is known to be a Very Bad Idea, but...
Security & Hacking
Event_small
Fnord News Show
Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des...
Entertainment
Event_small
Fnord News Show (Stream)
Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des...
Entertainment
Usbarmory_web
Forging the USB armory
The presentation will cover the journey that we have taken to develop the USB...
Hardware & Making
Event_small
Freedom in your computer and in the net
For freedom in your own computer, the software must be free. For freedom on...
Ethics, Society & Politics
Digitalbrain_01
From Computation to Consciousness
How can the physical universe give rise to a mind? I suggest to replace this...
Science
Brazil_3
From Maxwell to antenna arrays
Maxwell's equations are four differential equations which form the...
Science
Icon
Funky File Formats
Binary tricks to evade identification, detection, to exploit encryption and...
Security & Hacking
Metagiflogo
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Alternativen, die...
Science
Glitch-logo
Glitching For n00bs
Despite claims of its obsolescence, electrical glitching can be a viable...
Security & Hacking
Event_small
Global Civil Society Under Attack
An update to our Reports from the Frontlines talk at OHM 2013, we will...
Ethics, Society & Politics
Gquiz2_kopie
Googlequiz – 2015er Edition
Beim Googlequiz spielen max. 7 Teams mit je max. 7 Spielern gegeneinander....
Entertainment
Snelogo
Hacking Ethics in Education
Ethics in Computer Science is now finally gaining some well deserved...
Ethics, Society & Politics
Byod
»Hard Drive Punch«
In general data is stored on technically sensitive systems and can easily be...
Art & Culture
Event_small
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
Two weeks after the Heartbleed bug was announced, CloudFlare patched the...
Security & Hacking
4-cube-black-white
Higher-Dimensional Geometry and Fractals
Extending the common 3-space-to-2-space projections to 4D and higher and how...
Science
Logo
How I Learned to Stop Reinventing and Love the Wheels
An introduction to the Robot Operating System (ROS) for the home/hackerspace...
Hardware & Making
Event_small
Ich sehe, also bin ich ... Du
Bei der Passworteingabe über die Schultern schauen? Die Mateflasche klauen,...
Security & Hacking
Palme1
IFG – Mit freundlichen Grüßen
Die interessantesten IFG-Geschichten des Jahres mit Anfragen und Ablehnungen,...
Ethics, Society & Politics
Event_small
Infocalypse now: P0wning stuff is not enough
This speech about how the hacker scene is failing its own ideals and what...
Ethics, Society & Politics
Event_small
Information Control and Strategic Violence
Simple access to social media and cell phone has widely been accepted as a...
Science
Event_small
(In)Security of Mobile Banking
This talk presents a deep analysis of banking mobile apps available in the...
Security & Hacking
Pastedgraphic-1
Inside Field Station Berlin Teufelsberg
Of all the NSA's Cold War listening posts, their intelligence facility on top...
Ethics, Society & Politics
Explicit
Internet of toilets
A toilet is a toilet is a toilet ... was a toilet. Nowadays hackers discover...
Hardware & Making
Event_small
Iridium Pager Hacking
The chronicles of reversing the Iridium pager system.
Hardware & Making
Pesthoernchen_weihnacht_250x250
Jahresrückblick des CCC
Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir einen Blick...
CCC
Event_small
Jugend hackt
Im September 2014 fand die Veranstaltung Jugend hackt statt: Ein Wochenende...
Hardware & Making
Event_small
Krypto für die Zukunft
(K)ein kleiner Rant über Elliptische Kurven, Quantencomputer, Bitcoins und...
Science
2qubit_chip_full
Let's build a quantum computer!
I will explain why quantum computing is interesting, how it works and what...
Science
Hongphucdang
Let’s build our own personalized open textile production line
The talk is about our project to develop software and hardware tools for a...
Hardware & Making
Event_small
Let's Encrypt
As we've called for widespread use of HTTPS, the cost and complexity of the...
Ethics, Society & Politics
Fd_30c0
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may...
Other
Event_small
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may...
Other
Event_small
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may...
Other
Pigeon_camera
Living Drones
During World War I, homing pigeons were used to carry messages and take...
Science
Event_small
Long war tactics
Referring to the seminal talk Dymaxion gave at the closing of the NoisySquare...
Ethics, Society & Politics
Event_small
Low Cost High Speed Photography
Capturing the splash of a water balloon, the snap of a mouse trap or the...
Hardware & Making
Avatar
MegaCode to facility gates
How do garage gate remotes work? It turns out the ones from MegaCode simply...
Hardware & Making
Event_small
Mein Bot, der Kombattant
Der Vortrag bietet eine sprachwissenschaftlich informierte Perspektive auf...
Science
Joern-logo
Mining for Bugs with Graph Database Queries
While graph databases are primarily known as the backbone of the modern...
Security & Hacking
Event_small
Mit Kunst die Gesellschaft hacken
Ein Mahnmal gegen die Vereinten Nationen, 25.000 Euro Kopfgeld auf...
Ethics, Society & Politics
High_res_icon
Mobile self-defense
We know that mobile networks can — and do — attack us on many fronts. As this...
Security & Hacking
Mr-red_400
Mr Beam goes Kickstarter
Mr Beam was started as a hobby project aiming to get more experience in 3D...
Hardware & Making
Savetheinternet_monopoly
net neutrality: days of future past?
Our talk will highlight the current debates surrounding net neutrality in...
Ethics, Society & Politics
Capture
Now I sprinkle thee with crypto dust
When the Internet was designed, it was thought to be meadows full of daisies....
Security & Hacking
Cc_by_sa3_0_sebastian_hoch
NSA Points of Presence in AT
- Station VIENNA in der US-Botschaft 1090 Wien - VIENNA ANNEX beim...
Ethics, Society & Politics
Openbci-yin-yang-gnu-03
Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
leading hackers and researchers from the worldwide hackerspace,...
Hardware & Making
Thurayasatellite2_hr
osmo-gmr: What's up with sat-phones ?
At 28C3 we introduced the very first steps of the osmo-gmr projects. During...
Security & Hacking
Event_small
Paypals War on Terror
We are the PayPal 14. For the last several years we've been restricted in...
Ethics, Society & Politics
Logo
Personal Tracking Devices and Online Identity
In the post-NSA world it is important to understand the magnitude of our...
Ethics, Society & Politics
Cc
Practical EMV PIN interception and fraud detection
This talks follows our previous EMV research uncovering new findings as well...
Security & Hacking
Wls_square_01
Premiere: We love surveillance
Premiere of the English version of the shortfilm "We love surveillance".
Ethics, Society & Politics
Cab6
Preserving arcade games
Old-school arcade games were so protected that hacking is the only way to...
Security & Hacking
Event_small
Privacy and Consumer Markets
The internet may be the nervous system of the 21st century, but its main...
Ethics, Society & Politics
Idris
Programming with dependent types in Idris
Idris is a relatively young research programming languages that attempts to...
Science
Event_small
Reconstructing narratives
Surveillance, cryptography, terrorism, malware, economic espionage,...
Ethics, Society & Politics
Tor-logo
Reproducible Builds
Software build reproducibility is the ability to use independent build...
Security & Hacking
Logo
Revisiting SSL/TLS Implementations
We present four new Bleichenbacher side channels, and three successful...
Security & Hacking
Event_small
Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States
Rocket Kitten is an advanced APT set of campaigns, with a twist -...
Security & Hacking
Arguna4_tower
Rocket science – how hard can it be?
Three years have elapsed since the call for a "Hacker Space Program" during...
Science
Scary_laser.svg.hi
Safer playing with lasers
How to play with lasers without injuring Yourself and others and how to...
Hardware & Making
Screen_shot_2014-08-06_at_10.16.36
SCADA StrangeLove: Too Smart Grid in da Cloud
For two years SCADA StrangeLove speaks about Industrial Control Systems and...
Security & Hacking
Scanner-combined
Security Analysis of a Full-Body X-Ray Scanner
Full-body scanners, also known as "naked scanners", are used in airports and...
Security & Hacking
Est2011idcard
Security Analysis of Estonia's Internet Voting System
Estonia is the only country in the world that relies on Internet voting in a...
Ethics, Society & Politics
Event_small
Security Nightmares
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
Entertainment
Event_small
Security Nightmares (Stream)
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
Entertainment
Read-and-delete
Serenität – Anleitung zum Glücklichsein
Die radikalen philosophischen Texte von Elektra W. haben das Ziel - seien wir...
Art & Culture
Presents_by_balakov-d31qp0c_kopie
Snowden Effect vs. Privacy Paradox
"Vertrauen ist gut - Kontrolle ist besser." Dieses Idiom gilt mehr denn je,...
Ethics, Society & Politics
Psal_logo
Source Code and Cross-Domain Authorship Attribution
Stylometry is the study of linguistic style found in text. Stylometry existed...
Science
Preview.png
Space Hacker
At the 26C3 we first presented our vision of sending a rover to the moon....
Science
Event_small
SS7: Locate. Track. Manipulate.
Companies are now selling the ability to track your phone number whereever...
Security & Hacking
Event_small
SS7map : mapping vulnerability of the international mobile roaming infrastructure
SS7 has been shown repeatedly as an insecure protocol: spoofing, faking,...
Security & Hacking
Event_small
State of the Onion
The current state of the Tor network and community, covering important...
Ethics, Society & Politics
Ben-dalton-giant_wurzburg_display_-_window_effect
Superheroes Still Need Phoneboxes
This talk asks how we might plan for the continuation of a privacy sustaining...
Art & Culture
Event_small
Switches Get Stitches
This talk will introduce you to Industrial Ethernet Switches and their...
Security & Hacking
Logo_talk
Telescope Making
In this talk an introduction to amateur telescope making (ATM) will be...
Hardware & Making
Event_small
Tell no-one
For nearly one hundred years, the NSA and its predecessors have been engaging...
Ethics, Society & Politics
Event_small
The automobile as massive data gathering source and the consequences for individual privacy
We report about a LOAD e. V. study regarding data collection of cars, future...
Ethics, Society & Politics
Event_small
The case of Chelsea Manning
A discussion with U.S. Army private Chelsea Manning's attorneys Nanny...
Ethics, Society & Politics
Event_small
The Cloud Conspiracy 2008-2014
In 2011 I started trying to warn EU institutions about what we now call...
Ethics, Society & Politics
Robot_cropped
The eXperimental Robot Project
The talk is on the eXperimental Robot Project (XRP), a project to develop an...
Hardware & Making
Event_small
The Invisible Committee Returns with "Fuck Off Google"
“There will be people who resist adopting and using technology, people who...
Ethics, Society & Politics
Logotrans
The Machine To Be Another
The Machine To Be Another is an open-source interactive system designed to...
Art & Culture
Event_small
The Magical Secrecy Tour
June 5, 2014 marked one year since leaks by NSA whistleblower Edward Snowden...
Art & Culture
Logo_vf_lukaszewicz
The Maker movement meets patent law
The Maker movement and patent law are like two planets moving on the orbit of...
Hardware & Making
Heartbleed
The Matter of Heartbleed
The Heartbleed vulnerability took the Internet by surprise in April of this...
Security & Hacking
Tumblr_mlxvlrfahz1rlkewbo1_1280
The Only Thing We Know About Cyberspace Is That Its 640x480
Since 10 years I write about Vernacular Web and Digital Folklore, about early...
Art & Culture
Event_small
The Perl Jam: Exploiting a 20 Year-old Vulnerability
tl;dr EXPLOIT ALL THE PERL. We chained several of Perl’s ridiculous syntax...
Security & Hacking
Test
The rise and fall of Internet voting in Norway
In the parliamentary elections of September 2013, more than 250 000...
Ethics, Society & Politics
Event_small
The Time is Right
Das c-atre collectivdrama präsentiert THE TIME IS RIGHT, ein...
Entertainment
Spiflash2
Thunderstrike: EFI bootkits for Apple MacBooks
In this presentation we demonstrate Thunderstrike, a vulnerability that...
Security & Hacking
Misfortune-cookie
Too Many Cooks - Exploiting the Internet-of-TR-069-Things
TL;DR We unravel the story of a bug that would become one of the most...
Security & Hacking
Event_small
Tor: Hidden Services and Deanonymisation
This talk presents the results from what we believe to be one of the largest...
Security & Hacking
Event_small
Towards General Purpose Reconfigurable Computing on Novena
The Novena open source laptop contains a FPGA, but free software support for...
Hardware & Making
Newspaperblueback
Trackography
Have you ever wondered who is watching while you are reading your favourite...
Ethics, Society & Politics
Manglednumbersmarked2
Traue keinem Scan, den du nicht selbst gefälscht hast
Kopierer, die spontan Zahlen im Dokument verändern: Im August 2013 kam...
Ethics, Society & Politics
Mirleft
Trustworthy secure modular operating system engineering
We present Mirage OS, a modular library operating system developed from...
Science
Schweissbrenner_logo_fuer_frab_quadratisch_500pixel
Uncaging Microchips
An entertaining, thrilling and educational journey through the world of chip...
Security & Hacking
Event_small
UNHash - Methods for better password cracking
This talk will show a new method for password cracking called UNHash. UNHash...
Security & Hacking
Event_small
Virtual Machine Introspection
New methods and approaches for securing cloud environments are becoming...
Security & Hacking
Restricted-boots-566x1024
Vor Windows 8 wird gewarnt
Im Vortrag sollen technische und gesellschaftliche Konsequenzen der von...
Security & Hacking
Operation_upshot-knothole_-_badger_001
What Ever Happened to Nuclear Weapons?
An overview of 70 years of nuclear weapons, focusing on some of the...
Ethics, Society & Politics
Event_small
Why are computers so @#!*, and what can we do about it?
Computers have become ubiquitous and essential, but they remain massively...
Science
Logo_square
Why do we need an open food information platform
We from EveryCook are building an open source computerized cooking device. At...
Hardware & Making
Untitled_presentation_(1)
Why is GPG "damn near unusable"?
GPG has been correctly described as "damn near unusable". Why is this so?...
Science
Digitaleagenda
„Wir beteiligen uns aktiv an den Diskussionen“
Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgestellt, die als...
Ethics, Society & Politics