Version 1.5b Castle in the Sky

Events

  Title Track Speakers
20 osc 20 min
20 OSCILLATORS IN 20 MINUTES
20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
32C3 Infrastructure Review
The traditional review event with presentations from various teams at...
CCC
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
3D printing on the moon
3D printers are almost everywhere, but not on the moon yet. We want to change...
Hardware & Making
Shellphish head
A Dozen Years of Shellphish
How we built an automatic exploitation system and qualified for the DARPA...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
All Our Shared Spectrum Are Belong to Us
"Signal level is high but throughput is low" is a common experience in WLAN...
Hardware & Making
Kattascha nerd
A New Kid on the Block
The leading social networks are the powerful new gatekeepers of the digital...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
apertus° AXIOM
AXIOM is the first professional, extendable, affordable and modular cinema...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
With the advancement of defensive security and the constant release of...
Security
32c3 talk
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
In recent years, NGOs have been struggling to defend civil rights in...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Beyond Anti Evil Maid
In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Beyond your cable modem
Did you ever want to have access to a few hundred thousand network end...
Security
Kcqsrifm
Breaking Honeypots for Fun and Profit
We will detect, bypass, and abuse honeypot technologies and solutions,...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Buffering sucks!
Buffering sucks! Why we see regular buffering when watching online video....
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Building and Breaking Wireless Security
This talk gives an overview on state-of-the-art wireless security concepts:...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Check your privileges!
After defensive programming techniques and before attack method mitigations,...
Security
Wechat logo 01
CHINTERNET ART
Since my move to China in 2012 I have actively engaged in the local art...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Closing Event
CCC
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
CloudABI
CloudABI is an alternative runtime environment for UNIX-like operating...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Collect It All: Open Source Intelligence (OSINT) for Everyone
Governments post reports and data about their operations. Journalists publish...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Compileroptimierungen für Forth im Microcontroller
Wie lassen sich Konstantenfaltung und ein Registerallokator für einen...
Hardware & Making
Cosmic clockwork core mechanics by mandelwerk d50bpj2
Computational Meta-Psychology
Computational theories of the mind seem to be ideally suited to explain...
Science
3dbrew2
Console Hacking
In 2011 the Nintendo 3DS was released. Today it is the most popular...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Craft, leisure, and end-user innovation
Hacking receives growing attention among social scientists during the last...
Science
Fds 5
Crypto ist Abwehr, IFG ist Angriff!
Die Landesverrat-Affäre um netzpolitik.org hat gezeigt, wie wichtig es ist,...
Ethics, Society & Politics
Coder cat cat
Crypto Wars Part II
Governments around the world are seeking to put a stop to secure end-to-end...
Ethics, Society & Politics
Sand
Cyber all the Wassenaars
Transposition of the Wassenaar Arrangement, which now also covers export...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Das Zahnrad aus Fleisch
Kommentierendes im Internet ist neuerdings bedroht. Der unflätige...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Datahavens from HavenCo to Today
Datahavens have long been discussed as a solution to user security and...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
DDoS mitigation EPIC FAIL collection
For the past 3 years I have been delivering a custom-tailored DDoS attacks...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
De-anonymizing Programmers
Last year I presented research showing how to de-anonymize programmers based...
Security
Asyl dialoge premiere foto 15
Die Asyl-Dialoge / The Asylum Dialogues
Die ASYL-DIALOGE erzählen von Begegnungen, die Menschen verändern, von...
Ethics, Society & Politics
11896496 10204301040837794 7127389902016444054 o
Dissecting VoLTE
Newly adopted VoLTE requires changes in all associated parties, such as 3GPP...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Ecuador: how an authoritarian government is fooling the entire world
The Ecuadorian government received international visibility when in 2012 it...
Ethics, Society & Politics
Maulkorb whistleblower 300x300
Ein Abgrund von Landesverrat
Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei...
Ethics, Society & Politics
32bcievo
Evolution of Brain-Computer Interfaces
This talk is a brief recap into EEG / BCI for hackers, makers, researchers,...
Hardware & Making
Futurefluxus poster explained cculturesvienna
"Fluxus cannot save the world."
The Fluxus movement came about in the early 1960ies and the talk will discuss...
Art & Culture
Bobdobbs2jpg
Fnord-Jahresrückblick
Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von...
Entertainment
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Free Software and Hardware bring National Sovereignty
Free software and hardware are essential to sovereignty among developing...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Gibberish Detection 102
DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
#GOIBlocks - Technical observations about recent internet censorship in India
On 17th December 2014, the Government of India's Ministry of Communications...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
goto fail;
Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Graphs, Drones & Phones
The military use of Drones has profoundly changed warfare and is a central...
Ethics, Society & Politics
Alles
Grundrechte gelten nicht im Weltall!
In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des...
Ethics, Society & Politics
Gscheitern
G’scheitern
„Never ever say no, act your first thought and learn to love mistakes“ –...
Failosophy
1567
Hacker Jeopardy
The Hacker Jeopardy is a quiz show.
Entertainment
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Hacking EU funding for a decentralizing FOSS project
FOSS and hacker culture meeting the EU buereaucracy. What can possibly come...
Ethics, Society & Politics
Plmj logo vortrag quadr 500px
Hardware-Trojaner in Security-Chips
Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Household, Totalitarianism and Cyberspace
In my talk I am 1) discussing philosophical concepts of privacy, especially...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
How hackers grind an MMORPG: by taking it apart!
When an online game no longer captivates interest, what do you do? Grind on...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).
In the dark days of October 2014 an unprecedented Ebola epidemic wrecked...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
How the Great Firewall discovers hidden circumvention servers
Several years ago, the Great Firewall of China was silently upgraded to find...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
How to contribute to make open hardware happen
What to do if you are neither a hardware- nor a software expert and want to...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
“I feel like a criminal and I have to be god at the same time”
News reports and political speeches are currently replete with references to...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
Embedded systems are omnipresent in our everyday life and are becoming ...
Security
Intelexit twitter profilepic
Intelexit
Giant billboard vans, drone-operated leaflet drops over an NSA building and...
Ethics, Society & Politics
Internetcube poster a3
Internet Cube
Two years after the invitation to build your own iSP at 30C3, I'd like to...
Hardware & Making
P1230031
Internet Landscapes
In Internet Landscapes, Evan Roth with discuss his work as it relates to...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Iridium Update
Listening to satellites and decoding is fun. We show interesting stuff we...
Hardware & Making
Pesthoernchen weihnacht 250x250
Jahresrückblick des CCC
Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club...
CCC
Logo claim
Jugend hackt 2015
Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit...
CCC
Op
julien.moinard@opale-security.com
It is clear that something is needed to help the security community to...
Hardware & Making
Cadus logo rgb web
Katastrophe und Kommunikation
Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte...
Ethics, Society & Politics
Kvm
Key-logger, Video, Mouse
Key-Loggers are cool, really cool. It seems, however, that every conceivable...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Keynote
CCC
Footer skyline
Lessons learned: Freifunk für Geflüchtete
Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit...
Ethics, Society & Politics
Le banner1
Let's Encrypt -- What launching a free CA looks like
Let's Encrypt is a new free and automated certificate authority, that...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
libusb: Maintainer fail
In 2010 I was asked by the second maintainer in a row to take over as new...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Lifting the Fog on Red Star OS
Angae means "Fog" in Korean. The term is widely used in parts of custom code...
Ethics, Society & Politics
Fd 30c0
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Fd 30c0
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Fd 30c0
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Ling - High level system programming
In this presentation I will present the experimental language Ling. We shall...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
Earlier this year, we discovered that Diffie-Hellman key exchange –...
Security
Caos focado logo
Maker Spaces in Favelas - Lecture
There are two lines of research in the world about decreasing poverty in...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Maritime Robotics
This talk will have a look at maritime related robots and projects. It is not...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Media Coverage and the Public in the Surveillance Society
How have the media reported the Snowden revelations? Does the public care...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Methodisch inkorrekt!
Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle...
Entertainment
Methodisch inkorrekt original
Methodisch inkorrekt! (Live-Stream)
### LIVE-STREAM ### Nicolas Wöhrl und Reinhard Remfort sprechen über...
Entertainment
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Microsofts Windows 10 Botnet
Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Mobile Censorship in Iran
As Internet users increasingly connect to the Internet through smartphones,...
Ethics, Society & Politics
Sr illo 01
My Robot Will Crush You With Its Soft Delicate Hands!
In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take...
Hardware & Making
Event 5181 128x128
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
Is your email being sent in the clear? While PGP and S/MIME provide...
Security
Savetheinternet banner wide
Net Neutrality in Europe
After two years the fight for net neutrality in Europe about the Telecom...
Ethics, Society & Politics
Ccc ch
Netzpolitik in der Schweiz
2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn...
CCC
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
New memory corruption attacks: why can't we have nice things?
Memory corruption is an ongoing problem and in past years we have both...
Security
Nsaua europasaal 20151105
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
Im März 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt,...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
On Computing Numbers, with an Application to Problems of our Society
Journalists, while structurally and economically under threat, are bringing...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
One year of securitarian drift in France
Earlier this year, following the tragic events of early January in Paris, the...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Opening Event
CCC
Blaster logo
PLC-Blaster
Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann...
Security
Rcpp gif
Plunge into Proxy Politics
During this lecture presentation, Boaz Levin and Vera Tollmann, co-founders...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
PQCHacks
<p>Last year your friend Karen joined the alternative music scene and sent...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Predicting Crime in a Big Data World
Yearly, the world is inundated with news about government data collection...
Ethics, Society & Politics
Algowatch
Prediction and Control
Mass quantities of data are being incorporated into predictive systems in an...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Profiling (In)justice
This talk will focus on the potential ability of data disaggregated by race...
Ethics, Society & Politics
Lsb
Public Library/Memory of the World
Public Library is the synergy of two efforts. First, it makes the case for...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
QRtistry
QR codes have rapidly overtaken rival 2D bar code symbologies and are...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Quantenphysik und Kosmologie
Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Quantum Cryptography
I will entertain the audience with a science talk about quantum cryptography,...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
rad1o++
News about the rad1o half a year later – cool stuff that happened, and why...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Replication Prohibited
Physical keys and locks are one of the oldest security mechanisms still...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Reversing UEFI by execution
This talk will be an overview of how to reverse-engineer Unified Extensible...
Security
Rb logov2
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
The REXUS/BEXUS programme allows students from universities and higher...
Science
20150930 190142 hdr copy
re_cycle
How can be 3d printing a dual use technology? Print more things, produce less...
Hardware & Making
Rowhammerjs logo
Rowhammer.js: Root privileges for web apps?
"Insanity: doing the same thing over and over again and expecting different...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Running your own 3G/3.5G network
Seven years after presenting „running your own GSM network“, we are back...
Security
8wxbfz6h
Safe Harbor
Introduction and consequences of the CJEU's "Safe Harbor" ruling, to ...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Sanitizing PCAPs
Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Say hi to your new boss: How algorithms might soon control our lives.
Algorithms and „big data“ penetrate many aspects of our lives today. In the...
Science
Dhit10
Security Nightmares 0x10
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
CCC
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Shooting lasers into space – for science!
Light of astronomical objects gets distorted as it passes earth’s atmosphere....
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Shopshifting
Payment systems are old and have – unlike card protocols – seen little...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Sicherheit von 125kHz Transpondern am Beispiel Hitag S
Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt....
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Sin in the time of Technology
Technology companies now hold an unprecedented ability to shape the world...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Software and business method patents: call for action
Ten years after the rejection of the European software patent directive by...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
So you want to build a satellite?
CubeSat are small standardized satellites typically flown as secondary and...
Hardware & Making
Tor logo
State of the Onion
Major changes are underway in the Tor Project, the Tor Network, and the Tor...
Ethics, Society & Politics
Screen shot 2015 09 30 at 23.39.45
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein...
Ethics, Society & Politics
2015 11 19 22.57.13
Stromtankstellen – eine neue öffentliche Infrastruktur
Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen....
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Technology and Mass Atrocity Prevention
This lecture will give an overview on how technology can help and is helping...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Ten years after ‚We Lost The War‘
The talk „We Lost The War“ was presented at Congress ten years ago, causing...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
The architecture of a street level panopticon
Street level surveillance technology, such as surveillance cameras and iris...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
The exhaust emissions scandal („Dieselgate“)
Analysis of the emission scandal shaking the German automotive industry from...
Ethics, Society & Politics
Ezgif 557547965
The Great Train Cyber Robbery
For years SCADA StrangeLove team speaks about vulnerabilities in Industrial...
Security
Magic mask
The Magic World of Searchable Symmetric Encryption
In the last couple of years, cloud and web services have become more and more...
Science
Theothernefertiti installationview102
The mummy unwrapped
Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete...
Art & Culture
Perljam
The Perl Jam 2
tl;dr EXPLOIT ALL THE PERL. AGAIN. After last year’s Perl crackdown, I...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
The plain simple reality of entropy
Entropy, the randomness used in many critical cryptography processes...
Security
Miter
the possibility of an army
Using follower bombing as art performances, the artists Constant Dullaart...
Art & Culture
Cage logo l tw
The Price Of Dissent
CAGE exists to highlight abuses of the War on Terror. It has uncovered many...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
The state of Internet Censorship
The techniques to control access to the Internet, and the ability to bring...
Ethics, Society & Politics
Amigaworkbench
The Ultimate Amiga 500 Talk
The Amiga was one of the most powerful and wide srpead computers in the late...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Thunderstrike 2
Last year at 31c3 we disclosed <a...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Top X* usability obstacles
What do you want? Did you build your web/app for humans or NSA robots? Let's...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Tor onion services: more useful than you think
We'll update you on what's going on with Tor onion services, aka Tor hidden...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Towards (reasonably) trustworthy x86 laptops
Can we build trustworthy client systems on x86 hardware? What are the main...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Trust us and our business will expand!
The lecture outlines strategies by the "Artist against 419" online community...
Art & Culture
Heart circuitboard
Unpatchable
Gradually we are all becoming more and more dependent on machines, we will be...
Security
Logo
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und...
Security
21785257252 63deb9a155 o
Vector retrogaming
In this talk I'll show how to build an open source vector gaming system with...
Hardware & Making
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Vehicle2Vehicle Communication based on IEEE 802.11p
This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the...
Hardware & Making
Isabelle
Verified Firewall Ruleset Verification
We develop a tool to verify Linux netfilter/iptables firewalls rulesets....
Science
Simon menner logo
What does Big Brother see, while he is watching?
In the past years there has been a lot of discussion on the topic of state...
Art & Culture
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
What is the value of anonymous communication?
What does the fact that Tor users can’t edit wikipedia mean for the quality...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
When algorithms fail in our personal lives
„Social Media Break Up Coordinator“ is a performance art piece and lecture...
Art & Culture
Central processing unit md
When hardware must „just work“
Software design and testing is hard, but what happens when each bug fix can...
Failosophy
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch...
Ethics, Society & Politics
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Wie man einen Blackout verursacht
Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der...
Science
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Windows drivers attack surface
This presentation covers windows kernel driver security issues. It'll discuss...
Security
Event small e109fac6e5b92655bc5f7dddf41ff2eb77aadc01696b4e6b572a3979e8e902f3
Wireless Drivers: Freedom considered harmful?
A review/rant about the progress that free software wireless drivers...
Hardware & Making

Archived page - Impressum/Datenschutz