Version Voltron

Events by track

CCC

  title track speakers
35C3 Infrastructure Review
35C3 is run by teams of volunteers. In this event, they will provide some...
CCC
All Creatures Welcome
"All Creatures Welcome sketches a utopian image of society in the digital...
CCC
Closing Event
Hier hört es auf.
CCC
Jahresrückblick des CCC 2018
Biometrische Videoüberwachung, Hausdurchsuchungen, Polizeiaufgabengesetze,...
CCC
Kickstart the Chaos: Hackerspace gründen für Anfänger
Laut Mythos wurde der CCC nur zu einem Verein, weil als einzige andere...
CCC
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Opening Event
Hier geht es los.
CCC
Security Nightmares 0x13
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
CCC
Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen
Digitale Formen von Gewalt gegen Frauen sind keine eigenständigen Phänomene,...
CCC
Verhalten bei Hausdurchsuchungen
Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner...
CCC

Science

  title track speakers
A Blockchain Picture Book
Where is the blockchain, how long is it, and what does it have to do with...
Science
Augmented Reality: Bridging the gap between the physical and the digital world
There has been a lot of talk about Virtual Reality (VR), but still there are...
Science
Conquering Large Numbers at the LHC
We are going to outline the ingredients necessary to perform measurements at...
Science
Die dreckige Empirie
Kann man empirischen Studien trauen oder nicht? Wie kann ich gute Studien von...
Science
Die verborgene Seite des Mobilfunks
Der Vortrag beleuchtet die Einflüsse auf den geheimnisvollen Teil des...
Science
Genom-Editierung mit CRISPR/Cas
CRISPR/Cas hat die Genforschung revolutioniert und könnte bald in großem Stil...
Science
Going Deep Underground to Watch the Stars
Neutrinos are “ghost-like” elementary particles that can literally go through...
Science
Hacking Ecology
As humans have a large negative impact on ecosystems all around the globe, we...
Science
Hacking how we see
We mostly see with the mind, and the mind is flexible. For the four hundred...
Science
Hacking the Human Microbiome
The human microbiome is a diverse community of bacteria that lives inside us....
Science
How medicine discovered sex
Men with osteoporosis or depression, women with heart attacks - these are...
Science
Information Biology - Investigating the information flow in living systems
How to apply Shannon's information theory to biology.
Science
Inside the Fake Science Factories
This talk investigates fake science factories; international twilight...
Science
Introduction to Deep Learning
This talk will teach you the fundamentals of machine learning and give you a...
Science
Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
Vor 5.7 Milliarden Jahren emittierte der Blazar TXS0506+056 eine große Menge...
Science
Let's reverse engineer the Universe
There is four times more dark matter and over fifteen times more dark energy...
Science
Quantum Mechanics
An (almost) self-contained introduction to the basic ideas of quantum...
Science
Simulating Universes
In this talk I want to present the computational undertakings in the field of...
Science
Space Ops 101
After launching a spacecraft into orbit the actual work for mission control...
Science
SuperMUC-NG
Der nationale Höchstleistungsrechner SuperMUC-NG unterstützt die öffentliche...
Science
Transmission Control Protocol
TCP/IP is the most widely used protocol on the Internet for transmitting...
Science

Security

  title track speakers
A Christmas Carol - The Spectres of the Past, Present, and Future
With the beginning of last year, two major security vulnerabilities have been...
Security
A deep dive into the world of DOS viruses
It is now 27 years since MS-DOS 5.0 was released. During its day there was...
Security
All Your Gesundheitsakten Are Belong To Us
Plötzlich geht alles ganz schnell: Online-Behandlungen und elektronische...
Security
Attacking Chrome IPC
In this talk, I discuss how to reliably find bugs in the Chrome IPC system...
Security
Attacking end-to-end email encryption
In this talk, I’ll present several attacks that leak the plaintext of OpenPGP...
Security
Circumventing video identification using augmented reality
Video identification is the process of establishing the identity of a person...
Security
Compromising online accounts by cracking voicemail systems
Voicemail systems can be compromised by leveraging old weaknesses and top of...
Security
Dissecting Broadcom Bluetooth
Broadcom's Bluetooth firmware on popular devices – such as Nexus 5, Nexus 6P,...
Security
Domain Name System
Whenever you enter a name into your computer, it resolves it to a numerical...
Security
Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
Schon Wladimir Wladimirowitsch Putin wusste: "Hacker, das sind freie...
Security
Enclosure-PUF
We are presenting an innovative technology, which allows verifying the...
Security
Exploring fraud in telephony networks
Telephone networks form the oldest large scale network that has grown...
Security
First Sednit UEFI Rootkit Unveiled
UEFI rootkits have been researched and discussed heavily in the past few...
Security
From Zero to Zero Day
In this talk I will share my story of how in a little over a year, a high...
Security
Inside the AMD Microcode ROM
Microcode runs in most modern CPUs and translates the outer instruction set...
Security
In Soviet Russia Smart Card Hacks You
The classic spy movie hacking sequence: The spy inserts a magic smart card...
Security
Internet of Dongs
With great pleasure comes great responsibility. A responsibility, which is...
Security
Jailbreaking iOS
This talk aims to give a general overview of iOS Jailbreaking by starting at...
Security
Kernel Tracing With eBPF
Have you ever wanted to trace all syscalls or dump all IPC traffic across a...
Security
Memsad
This presentation will start off with a simple problem (how do you clear...
Security
Modchips of the State
Hardware implants and supply chain attacks have been in the news recently,...
Security
Modern Windows Userspace Exploitation
In this talk we will go through the different mitigations in Windows 10 and...
Security
Provable Security
Modern cryptography is based on security-proofs. We will demonstrate how...
Security
SD-WAN a New Hop
The software defined wide-area network is technology based on SDN approach...
Security
Self-encrypting deception
<p>We have analyzed the hardware full-disk encryption implementation of...
Security
SiliVaccine: North Korea's Weapon of Mass Detection
Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine is...
Security
Smart Home - Smart Hack
GERMAN: Mehr als 10.000 unterschiedliche Device-Hersteller aus aller Welt...
Security
Sneaking In Network Security
Highly compartmentalized network segmentation is a long-held goal of most...
Security
The Layman's Guide to Zero-Day Engineering
There's a certain allure to zero-day exploits. At the apex of the security...
Security
The Rocky Road to TLS 1.3 and better Internet Encryption
Since a few months we have a new version of TLS, the most important...
Security
The year in post-quantum crypto
The world is finally catching on to the urgency of deploying...
Security
Truly cardless: Jackpotting an ATM using auxiliary devices.
Pursuit of “good customers’ experience“ not only leads to new customers, but...
Security
Venenerkennung hacken
Die Venenerkennung ist eine der letzten Bastionen biometrischer Systeme, die...
Security
Viva la Vita Vida
Since its release in 2012, the PlayStation Vita has remained one of the most...
Security
wallet.fail
In this presentation we will take a look at how to break the most popular...
Security
Wallet Security
There are multiple different ways to store cryptocurrency secret keys. This...
Security
Web-based Cryptojacking in the Wild
A cryptojacking website abuses the computing resources of its visitors to...
Security
What The Fax?!
We all know what FAX is, and for some strange reason most of us need to use...
Security
What the flag is CTF?
Every year since 2011 on the 28C3 we organize a Capture the Flag contest for...
Security

Resilience

  title track speakers
A farewell to soul-crushing code
A major part of software development is maintenance, i.e. tinkering with...
Resilience
Analyze the Facebook algorithm and reclaim data sovereignty
Facebook monopoly is an issue, but looking for replacements it is not enough....
Resilience
Cat & Mouse: Evading the Censors in 2018
The deepening of global Internet infrastructure comes accompanied with an...
Resilience
Censored Planet: a Global Censorship Observatory
Six years ago the idea behind CensoredPlanet started, that is now launched at...
Resilience
How does the Internet work?
This Foundations talk explains the systems and protocols that make up the...
Resilience
Matrix, the current status and year to date
Matrix is an open standard for communication over the Internet. I will talk...
Resilience
No evidence of communication and morality in protocols: Off-the-Record protocol version 4
OTRv4 is the newest version of the Off-The-Record protocol. It is a protocol...
Resilience
Planes and Ships and Saving Lives
The death rate at Europes seaborder reached a historical record: One out of...
Resilience
Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
Moderne Medizintechnik ist teuer und wenn sie kaputt geht, dann kann man sie...
Resilience
Repair-Cafés
Die Repaircafé-Bewegung rollt über unser Land herein. Wie können wir uns...
Resilience
Safe and Secure Drivers in High-Level Languages
Drivers are usually written in C for historical reasons, this can be bad if...
Resilience
Scuttlebutt
In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P...
Resilience
Sense without sight: a crash course on #BlindNavigation
Learn to see the world without your eyes. Wonder what it's like to navigate...
Resilience
Taming the Chaos: Can we build systems that actually work?
We rely on mainstream computer engineering every day, but it's insanely...
Resilience
The foodsaving grassroots movement
When you're fighting for a cause, you need tools that reflect your values....
Resilience
Wind: Off-Grid Services for Everyday People
The internet has become essential services, and offline methods of sharing...
Resilience

Ethics, Society & Politics

  title track speakers
#afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
Im Mai 2018 initiierte Reclaim Club Culture (RCC) in Berlin einen Protest...
Ethics, Society & Politics
Archäologische Studien im Datenmüll
Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten...
Ethics, Society & Politics
A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation
This lecture tells the story of Internet infrastructure transformations in...
Ethics, Society & Politics
Best of Informationsfreiheit
Mit (u. a.): Rainer Rehak, Anna Biselli, Andre Meister, ... Was für die...
Ethics, Society & Politics
Chaos im Fernsehrat
Seit Juli 2016 darf ich – nominiert unter anderem vom CCC – den Bereich...
Ethics, Society & Politics
Citzens or subjects? The battle to control our bodies, speech and communications
Technology is the solution: What is the problem? This seems to be the motto....
Ethics, Society & Politics
Computer, die über Asyl (mit)entscheiden
Welchen Dialekt spricht eine Geflüchtete aus Syrien? Was verrät das Handy...
Ethics, Society & Politics
Court in the Akten
Private Unternehmen müssen nicht so transparent sein wie Behörden - selbst...
Ethics, Society & Politics
(Cyber-)Stalking: Wenn Grenzen verschwimmen
<p>Von unerwünschten Nachrichten über Bedrohungen bis hin zum Intimizid....
Ethics, Society & Politics
"Das ist mir nicht erinnerlich." − Der NSU-Komplex heute
Sieben Jahre lang musste den Behörden jedes Stück der versprochenen...
Ethics, Society & Politics
Datenschutz für Neulandbürger
Der Datenschutz ist als erst relativ frisch erkämpftes Abwehrrecht von...
Ethics, Society & Politics
Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht
Für Journalisten bieten soziale Netzwerke eine Vielzahl von Quellen und...
Ethics, Society & Politics
Die EU und ihre Institutionen
Ein kurzer Grundlagenabriss über die Institution der Europäischen Union,...
Ethics, Society & Politics
Die Häuser denen, die darin wohnen!
Wir wenden uns gegen Gentrifizierung, Luxussanierung und Spekulation mit...
Ethics, Society & Politics
Election Cybersecurity Progress Report
Recent attacks against elections in the U.S. and Europe demonstrate that...
Ethics, Society & Politics
Electronic Evicence in Criminal Matters
The lecture will give an introduction into the "EC Proposal for a Regulation...
Ethics, Society & Politics
Explaining Online US Political Advertising
Over the summer Facebook, Google, and Twitter have started making transparent...
Ethics, Society & Politics
Feminist Perspectives
A variety of initiatives aims at encouraging female engagement in the hacker...
Ethics, Society & Politics
Freedom needs fighters!
Der Talk gibt einen Überblick über die Arbeit der Gesellschaft für...
Ethics, Society & Politics
Frontex: Der europäische Grenzgeheimdienst
Die EU-Grenzagentur Frontex nimmt eine Reihe neuer Überwachungsmethoden im...
Ethics, Society & Politics
Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
Polizei und Geheimdienste sammeln per "Funkzellenabfrage" Tag für Tag...
Ethics, Society & Politics
G10, BND-Gesetz und der effektive Schutz vor Grundrechten
Der Vortrag behandelt die Klage des Internetknotens DE-CIX gegen die...
Ethics, Society & Politics
Hackerethik - eine Einführung
Die Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen...
Ethics, Society & Politics
How Facebook tracks you on Android
<p>In this talk, we’re looking at third party tracking on Android. We’ve...
Ethics, Society & Politics
Internet, the Business Side
Net neutrality, a big buzzword in the last years. It is not only a buzzword?...
Ethics, Society & Politics
It Always Feels Like the Five Eyes Are Watching You
This talk will discuss all about the Five Eyes, the espionage alliance...
Ethics, Society & Politics
Locked up science
Restricting access to knowledge and science is not beneficial for society. So...
Ethics, Society & Politics
Mehr schlecht als Recht: Grauzone Sicherheitsforschung
Reverse Engineering zum Aufspüren von Schwachstellen ist gängige Praxis. Umso...
Ethics, Society & Politics
Meine Abenteuer im EU-Parlament
Bei der Europawahl 2014 wurde ich als Spitzenkandidat der Partei für Arbeit,...
Ethics, Society & Politics
Microtargeting und Manipulation
Die Möglichkeiten des Microtargetings, aber auch der Desinformation mit Hilfe...
Ethics, Society & Politics
Mind the Trap: Die Netzpolitik der AfD im Bundestag
Die AfD-Bundestagsfraktion wird in der Öffentlichkeit vor allem mit ihren...
Ethics, Society & Politics
Netzpolitischer Wetterbericht 2018
Das Jahr 2018 bietete wieder zahlreiche Beispiele für einen netzpolitischen...
Ethics, Society & Politics
Polizeigesetze
Heimatminister Horst Seehofer und seine Amtskollegen in den Ländern erweitern...
Ethics, Society & Politics
Russia vs. Telegram: technical notes on the battle
It's time to highlight facts and epic fails that were observed on the wire...
Ethics, Society & Politics
Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
Datenreichtum, E-Voting, Massenüberwachung und andere netzpolitische...
Ethics, Society & Politics
Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
In Österreich regiert seit einem Jahr eine Koalition aus der...
Ethics, Society & Politics
The Precariat: A Disruptive Class for Disruptive Times.
The combination of the ongoing technological revolution, globalisation and...
Ethics, Society & Politics
"The" Social Credit System
The Chinese Social Credit System (SCS) has been discussed a lot in Western...
Ethics, Society & Politics
The Surveillance State limited by acts of courage and conscience
An update on the circumstances of the Snowden Refugees will be provided at...
Ethics, Society & Politics
Updates von der europäischen Außengrenze
Als Organisation für Menschenrechtsbeobachtungen geben wir Euch einen...
Ethics, Society & Politics
Was schützt eigentlich der Datenschutz?
Beim Datenschutz geht es mitnichten um Privatsphäre, um das eigene...
Ethics, Society & Politics
What is Good Technology?
The last years, we all have felt the impact of applying technologies like...
Ethics, Society & Politics

Art & Culture

  title track speakers
Afroroutes: Africa Elsewhere
Let's think "Beyond Slavery": Afroroutes is a one-of-a-kind VR experience...
Art & Culture
A la recherche de l'information perdue
Performance lecture by Cornelia Sollfrank that makes a (techno-)feminist...
Art & Culture
Are machines feminine?
Why do navigation systems have feminine voices? We know Tay, Eliza, Siri not...
Art & Culture
A WebPage in Three Acts
A Web Page in Three Acts is a live coding performance which combines...
Art & Culture
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism - a short history of radical...
Art & Culture
DISNOVATION.ORG
Through the hacking of surveillance techniques, machine learning, and...
Art & Culture
Media Disruption Led By The Blind
Visual culture dominates our societies, every day encouraging and rewarding...
Art & Culture
Mondnacht
"Mondnacht" von Stanislav Lem. Das berühmte SF Rundfunk-Hörspiel als Lesung...
Art & Culture
Never Forgetti
Art & Culture
Radical Digital Painting
Radical Digital Painting groups and presents several ideas and artifacts...
Art & Culture
Reality Check! Basel/Lagos?? In virtual reality?
This talk will share the experience of a leading African extended reality lab...
Art & Culture
Tactical Embodiment
During her talk “Tactical Embodiment,” artist and activist Angela Washko will...
Art & Culture
Theater und Quantenzeitalter
Seit 2010 ist die Sehnsucht des Schauspiel Dortmund, ein gegenwärtiges und...
Art & Culture
The Enemy
The Enemy brings you face-to-face with combatants from three conflict zones:...
Art & Culture
The Ghost in the Machine
Artificial Intelligence gives us a uniquely fascinating and clear perspective...
Art & Culture
The good, the strange and the ugly in 2018 art &tech
What's been good, exciting, spooky and challenging in art and...
Art & Culture
The Urban Organism
This talk will engage the practises and protocols of hacking in the context...
Art & Culture
Transhuman Expression
The meeting point of art and science as a place of inspiration, exchange of...
Art & Culture

Hardware & Making

  title track speakers
Artistic PCB Design and Fabrication
When a electrical device needs to be a piece of art or used as a mechanical...
Hardware & Making
Butterbrotdosen-Smartphone
Ich möchte euch zeigen, wie ich mir aus einem Raspberry PI ein Smartphone...
Hardware & Making
Digital Airwaves
Encoding or decoding random radio-waveforms doesn't need incredible expensive...
Hardware & Making
How to teach programming to your loved ones
Teaching beginners how to program is often <i>hard</i>. We love building...
Hardware & Making
Hunting the Sigfox: Wireless IoT Network Security
<a href="https://www.sigfox.com/">Sigfox</a> is an emerging low-power...
Hardware & Making
LibreSilicon
While a lot of projects are currently developing their own processors, mostly...
Hardware & Making
MicroPython – Python for Microcontrollers
MicroPython is a lean and efficient implementation of the Python 3...
Hardware & Making
Modeling and Simulation of Physical Systems for Hobbyists
This is a foundations talk about modeling and simulation as tools for...
Hardware & Making
Open Source Firmware
Open Source firmware ist ein Begriff seit 1999 wo LinuxBIOS (coreboot) und...
Hardware & Making
Open Source Orgelbau
Spaß und ein kleines Bisschen Wissenschaft mit 3D-gedruckten Orgelteilen
Hardware & Making
Projekt Hannah
Um das Entwickeln von eigenen Laufrobotern zu erleichtern, brauchen wir...
Hardware & Making
Snakes and Rabbits - How CCC shaped an open hardware success
<p> This talk will present a historical narrative of the background behind...
Hardware & Making
SymbiFlow - Finally the GCC of FPGAs!
The <a href="http://symbiflow.github.io">SymbiFlow project</a> aims to be the...
Hardware & Making
The Critical Making Movement
Critical Thinking + Making = Critical Making. Around the world, academics and...
Hardware & Making
The Mars Rover On-board Computer
Mars Rover Curiosity is one of the most sophisticated pieces of hardware ever...
Hardware & Making
The nextpnr FOSS FPGA place-and-route tool
Project IceStorm provides the first end-to-end open source FPGA toolchain,...
Hardware & Making

Entertainment

  title track speakers
Chaos Communication Slam
Chaos meets Poetry Slam. Der humoristische Dichterwettstreit mit...
Entertainment
Freude ist nur ein Mangel an Information
Nico Semsrott hat in Zeiten des globalen Rechtsrucks den überflüssigsten Job...
Entertainment
Hebocon
We let the technically ungifted build robots and to fight each other for the...
Entertainment

Archived page - Impressum/Datenschutz