27C3 - Version 1.6.3
27th Chaos Communication Congress
We come in peace
Schedule Day 3
| Saal 1 | Saal 2 | Saal 3 | |
|---|---|---|---|
| Saal 1 | Saal 2 | Saal 3 | |
| 11:30 |
A Critical Overview of 10 years of Privacy Enhancing Technologies |
||
| 11:45 | |||
| 12:00 | |||
| 12:15 | |||
| 12:30 |
Terrorists Win - Exploiting Telecommunications Data Retention? |
||
| 12:45 | |||
| 13:00 | |||
| 13:15 | |||
| 13:30 | |||
| 13:45 | |||
| 14:00 | |||
| 14:15 | |||
| 14:30 | |||
| 14:45 | |||
| 15:00 | |||
| 15:15 | |||
| 15:30 | |||
| 15:45 | |||
| 16:00 | |||
| 16:15 | |||
| 16:30 | |||
| 16:45 | |||
| 17:00 | |||
| 17:15 |
The Icelandic Modern Media Initiative and our need for a well-regulated flow of information |
||
| 17:30 | |||
| 17:45 | |||
| 18:00 | |||
| 18:15 | |||
| 18:30 | |||
| 18:45 | |||
| 19:00 | |||
| 19:15 | |||
| 19:30 | |||
| 19:45 | |||
| 20:00 | |||
| 20:15 | |||
| 20:30 |
Das Internet und geschaffene soziale Ungleichheit im Alltag von Erwerbslosen |
||
| 20:45 | |||
| 21:00 | |||
| 21:15 | |||
| 21:30 | |||
| 21:45 |
Zero-sized heap allocations vulnerability analysis Applications of theorem proving for securing the windows kernel |
||
| 22:00 | |||
| 22:15 | |||
| 22:30 | |||
| 22:45 | |||
| 23:00 |
Hacker Jeopardy (english translation) |
Mitigating cold-boot attacks for Full-Disk-Encryption software |
|
| 23:15 | |||
| 23:30 | |||
| 23:45 | |||
| 00:00 | |||
| 00:15 | |||
| 00:30 | |||
| 00:45 |