27C3 - Version 1.6.3
27th Chaos Communication Congress
We come in peace
Programm Day 3
Saal 1 | Saal 2 | Saal 3 | |
---|---|---|---|
Saal 1 | Saal 2 | Saal 3 | |
11:30 |
A Critical Overview of 10 years of Privacy Enhancing Technologies |
||
11:45 | |||
12:00 | |||
12:15 | |||
12:30 |
Terrorists Win - Exploiting Telecommunications Data Retention? |
||
12:45 | |||
13:00 | |||
13:15 | |||
13:30 | |||
13:45 | |||
14:00 | |||
14:15 | |||
14:30 | |||
14:45 | |||
15:00 | |||
15:15 | |||
15:30 | |||
15:45 | |||
16:00 | |||
16:15 | |||
16:30 | |||
16:45 | |||
17:00 | |||
17:15 |
The Icelandic Modern Media Initiative and our need for a well-regulated flow of information |
||
17:30 | |||
17:45 | |||
18:00 | |||
18:15 | |||
18:30 | |||
18:45 | |||
19:00 | |||
19:15 | |||
19:30 | |||
19:45 | |||
20:00 | |||
20:15 | |||
20:30 |
Das Internet und geschaffene soziale Ungleichheit im Alltag von Erwerbslosen |
||
20:45 | |||
21:00 | |||
21:15 | |||
21:30 | |||
21:45 |
Zero-sized heap allocations vulnerability analysis Applications of theorem proving for securing the windows kernel |
||
22:00 | |||
22:15 | |||
22:30 | |||
22:45 | |||
23:00 |
Hacker Jeopardy (english translation) |
Mitigating cold-boot attacks for Full-Disk-Encryption software |
|
23:15 | |||
23:30 | |||
23:45 | |||
00:00 | |||
00:15 | |||
00:30 | |||
00:45 |