Version 1.5.9e last one standing
Veranstaltungen
Titel | Track | Referenten | |
---|---|---|---|
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
At Fort George "Orwell" Meade, home of the NSA and the US Defense Information... |
Ethics, Society & Politics | ||
10 Years of Fun with Embedded Devices
A review of the 10 year history of the OpenWrt project, current events, and... |
Hardware & Making | ||
25 Jahre Chipkarten-Angriffe
Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre... |
Security & Safety | ||
2 Takte später
Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S)... |
Ethics, Society & Politics | ||
30c3 Keynote
|
CCC | ||
30c3 Keynote
via videolink. |
CCC | ||
Acid Pauli!!!!!!
|
Music |
|
|
Against Metadata
Using case studies of documentary film, Freedom of Information Law document... |
Art & Beauty | ||
Amtliche Datenschützer: Kontrolleure oder Papiertiger?
In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der... |
Ethics, Society & Politics | ||
Android DDI
As application security becomes more important on Android we need better... |
Security & Safety | ||
An introduction to Firmware Analysis
This talk gives an introduction to firmware analysis: It starts with how to... |
Security & Safety | ||
Anonymity and Privacy in Public Space and on the Internet
How is it possible to participate in a social event anonymously? How can we... |
Art & Beauty | ||
Art of the Exploit: An Introduction to Critical Engineering
In this lecture Julian will introduce projects and interventions made by... |
Art & Beauty | ||
Attacking HomeMatic
HomeMatic is a good working, inexpensive and quickly spreading home... |
Security & Safety | ||
Backdoors, Government Hacking and The Next Crypto Wars
Law enforcement agencies claim they are "going dark". Encryption technologies... |
Ethics, Society & Politics | ||
Barbnerdy
BarbNerdy is not only nerdy in finding great music all over the places, she... |
Entertainment |
|
|
Baseband Exploitation in 2013
Exploitation of baseband vulnerabilities has become significantly harder on... |
Security & Safety | ||
Basics of Digital Wireless Communication
The aim of this talk is to give an understandable insight into wireless... |
Hardware & Making | ||
Überwachen und Sprache
Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch... |
Science & Engineering | ||
Beyond the Tech: Building Internet Freedom Tools for Real People
Few hackers will disagree that users are not given enough consideration when... |
Science & Engineering | ||
"Big Data und der Dual Use"
|
DLF | ||
"Braucht die Informatik Hacker"
|
DLF | ||
BREACH in Agda
Software engineering is in a unsustainable state: software is mainly... |
Science & Engineering | ||
Breaking Baryons
A light-hearted presentation about many aspects of particle accelerators like... |
Science & Engineering | ||
Bug class genocide
Violation of memory safety is still a major source of vulnerabilities in... |
Security & Safety | ||
Building a safe NFC ticketing system
NFC technology is becoming more and more relevant in our lives. One of its... |
Hardware & Making | ||
Bullshit made in Germany
Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch... |
Ethics, Society & Politics | ||
Caayari
A Butoh Dance raising from the raw material portraying the mitology of Mate! |
Entertainment | ||
Calafou, postcapitalist ecoindustrial community
Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around... |
Science & Engineering | ||
calc.pw
Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter... |
Hardware & Making | ||
Carsten Stäcker (Frequenzberater)
|
Music |
|
|
Chaos Collective
|
Other |
|
|
Closing Event
|
CCC | ||
Closing Event
|
CCC |
|
|
Coding your body
The average movement habits of a clichè hacker are legendary. Cowering for... |
Science & Engineering | ||
Concepts for global TSCM
After studying the various levels of activities that come together in... |
Ethics, Society & Politics | ||
Console Hacking 2013
About a year ago Nintendo released their latest video gaming console, the Wii... |
Security & Safety | ||
CounterStrike
Lawful Interception is a monitoring access for law enforcement agencies, but... |
Security & Safety | ||
Das FlipDot-Projekt
Inbetriebnahme alter Flip-Dot-Anzeigemodule eines Autobahn-Parkleitsystems... |
Hardware & Making | ||
Data Mining for Good
For over thirty years, human rights groups in Guatemala have carefully... |
Ethics, Society & Politics | ||
"Datenschutz aus Brüssel - Wer will denn das?"
|
DLF | ||
Dead Man Edition
Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z.... |
Ethics, Society & Politics | ||
Decoder
DATE TBC! DECODER is a legendary German film from 1984, based on the... |
Entertainment | ||
deo&z-man (mafiosibros.)
|
Music |
|
|
Der Kampf um Netzneutralität
Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die... |
Ethics, Society & Politics | ||
Der tiefe Staat
Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der... |
Ethics, Society & Politics | ||
Desperately Seeking Susy
Supersymmetry has been particle theorists' favorite toy for several decades.... |
Science & Engineering | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk - Das 30C3-Interview mit ...
|
DLF | ||
Deutschlandfunk Live
|
DLF | ||
Deutschlandfunk Live
|
DLF | ||
Deutschlandfunk Live
|
DLF | ||
Die Bundesrepublik – das am meisten überwachte Land in Europa
Seit Monaten hält uns die NS-Affäre in Atem. Immer neue Abhörmaßnahmen und... |
Science & Engineering | ||
Die Drohnenkriege
Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen... |
Ethics, Society & Politics | ||
Die Lange Nacht der Hacker
|
DLF | ||
Disclosure DOs, Disclosure DON'Ts
This talk will focus on responsible disclosure best and worst practices from... |
Ethics, Society & Politics | ||
Dj Bimmel (U-site, Fusion, ROT)
|
Music |
|
|
Dj DeineMaid
|
Music |
|
|
Dj DeineMaid
|
Music |
|
|
DJ Elbe (Elfenmaschine)
|
Music |
|
|
dj-spock
|
Music |
|
|
Don Shtone (Sven Dohse)
|
Music |
|
|
Do You Think That's Funny?
This lecture shall give a first person account of how circumstances have... |
Art & Beauty | ||
Drones
During the last 10 years the technology that was formerly only available to... |
Science & Engineering | ||
Electronic Bank Robberies
This talk will discuss a case in which criminals compromised and robbed an... |
Security & Safety | ||
ENKIs vergessene Kinder
Die Enki ist ein Raumschiff, dass ungefähr 15.000 Menschen fasst und auf der... |
Entertainment | ||
EUDataP: State of the Union
Jan Phillip Albrecht is rapporteur of the European Parliament for the EU's... |
Ethics, Society & Politics | ||
Europe, the USA and Identity Ecosystems
Talk introducing NSTIC and COM 238, i.e. the current digital identity policy... |
Ethics, Society & Politics | ||
Even More Tamagotchis Were Harmed in the Making of this Presentation
You might remember Tamagotchi virtual pets from the 1990's. These toys are... |
Hardware & Making | ||
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-channel analysis (SCA) and related methods exploit physical... |
Security & Safety | ||
Fannie Mae (Universum Alltona)
|
Music |
|
|
Fast Internet-wide Scanning and its Security Applications
Internet-wide network scanning has powerful security applications, including... |
Security & Safety | ||
Firmware Fat Camp
We present a collection of techniques which aim to automagically remove... |
Security & Safety | ||
Fnord News Show
Im Format einer lockeren Abendshow werden wir die Highlights des Jahres... |
Entertainment | ||
Fnord News Show
Im Format einer lockeren Abendshow werden wir die Highlights des Jahres... |
Entertainment | ||
Forbidden Fruit
Various dietary restrictions are historically associated with human culture... |
Art & Beauty | ||
FPGA 101
In this talk I want to show you around in the mysterious world of Field... |
Hardware & Making | ||
Fukami
|
Music |
|
|
Gammler und Kundan Lal
|
Music |
|
|
gaya kloud
|
Entertainment |
|
|
gaya kloud
|
Entertainment |
|
|
Glass Hacks
A one hour technical lecture that covers everything from machine learning and... |
Science & Engineering | ||
Googlequiz
Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit... |
Entertainment | ||
Hacker Jeopardy
The Hacker Jeopardy is a quiz show. |
Entertainment | ||
Hacking as Artistic Practice
!Mediengruppe Bitnik are contemporary artists. In their talk they will show... |
Art & Beauty | ||
Hacking the Czech Parliament via SMS
The Czech art collective Ztohoven' project “Moral Reform” was accomplished in... |
Ethics, Society & Politics | ||
Hardening hardware and choosing a #goodBIOS
A commodity laptop is analyzed to identify exposed attack surfaces and is... |
Security & Safety | ||
Hardware Attacks, Advanced ARM Exploitation, and Android Hacking
In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon... |
Security & Safety | ||
Harre Künast (click 808)
|
Music |
|
|
HbbTV Security
HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is... |
Security & Safety | ||
Hello World!
USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum... |
Art & Beauty | ||
Hillbilly Tracking of Low Earth Orbit
Satellites in Low Earth Orbit have tons of nifty signals, but they move... |
Science & Engineering | ||
Holle Lang
|
Music |
|
|
How to Build a Mind
A foray into the present, future and ideas of Artificial Intelligence. Are we... |
Science & Engineering | ||
Human Rights and Technology
This talk aims to shed some light on recent human rights violations in the... |
Ethics, Society & Politics | ||
ID Cards in China: Your Worst Nightmare
Imagine getting pulled over for running a stop sign and learning for the... |
Ethics, Society & Politics | ||
IFGINT
Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger... |
Ethics, Society & Politics | ||
India's Surveillance State
India is currently implementing some of the scariest surveillance schemes in... |
Ethics, Society & Politics | ||
Infrastructure Review
|
CCC | ||
Introduction to Processor Design
This lecture gives an introduction to processor design. It is mostly... |
Hardware & Making | ||
Jahresrückblick des CCC
Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick... |
CCC | ||
Jahresrückblick des CCC
Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick... |
CCC | ||
Jay Pauli (Grünanlage / Alte Liebe)
|
Music |
|
|
Jonas Wahrlich (e.minor, Plux, Der Hut)
|
Music |
|
|
Keine Anhaltspunkte für flächendeckende Überwachung
Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze Zeit in... |
Ethics, Society & Politics | ||
Kraftfuttermischwerk
|
Entertainment |
|
|
Kryptographie nach Snowden
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit... |
Security & Safety | ||
lasers in space
This talk will give an introduction on lasers and space and it will show the... |
Science & Engineering | ||
Life Without Life
From the mind of teenager, this short story briefly recounts the tale of an... |
Entertainment | ||
Lightning Talks, Day 2
|
Other | ||
Lightning Talks, Day 3
|
Other | ||
Lightning Talks, Day 4
|
Other | ||
live! Akustik Nord (Jojo Heizmann)
|
Music |
|
|
live! At the space office (Universum Alltona)
|
Music |
|
|
live! Ben Con Cello
|
Music |
|
|
!live Frau Malonda
|
Music |
|
|
live! Gongkonzert Klanghaus Media Audionic
|
Music |
|
|
live! Gongkonzert Klanghaus Media Audionic
|
Music |
|
|
live! Gongkonzert Klanghaus Media Audionic & Eternal Drum
|
Music |
|
|
!live Gongkonzert Klanghaus Media Audionic & Klavier Anka & Eternal Drum
|
Music |
|
|
live! jɛloʊ // Rotzige Beatz
|
Music |
|
|
live! Neal White
|
Music |
|
|
live! Tonfang (Universum Alltona)
|
Music |
|
|
live! Woodrow Wilson (Krautrock)
|
Music |
|
|
Long Distance Quantum Communication
This talk should introduce the general 30c3 participant with several... |
Science & Engineering | ||
Magic Lantern
We present Magic Lantern, a free open software add-on for Canon DSLR cameras,... |
Hardware & Making | ||
Making machines that make
Making a new control system for a machine is often a slow and tedious task.... |
Hardware & Making | ||
Marco Morelle & Philipp Wolgast
|
Music |
|
|
Marc Schneider (Panorama Bar)
|
Music |
|
|
Maulwolf DJs (Renken&Rothstein)
|
Music |
|
|
Mind-Hacking mit Psychedelika
Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches... |
Science & Engineering | ||
Mobile network attack evolution
Mobile networks should protect users on several fronts: Calls need to be... |
Security & Safety | ||
Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array
Software-Defined Radio (SDR) has increased in popularity in recent years due... |
Hardware & Making | ||
My journey into FM-RDS
How I discovered mysterious hidden signals on a public radio channel and... |
Hardware & Making | ||
Na Nu? Ein Gnu!
|
Music |
|
|
Nerds in the news
Knight-Mozilla OpenNews sends coders into news organisations on a ten-month... |
Ethics, Society & Politics | ||
Nie Low
Hello hello, Mein Name ist Niloufar Behradi-Ohnacker und lege unter den... |
Entertainment |
|
|
No Neutral Ground in a Burning World
The news of the past few years is one small ripple in what is a great wave of... |
Ethics, Society & Politics | ||
Opening Event
Introductory event to say hello to everybody, give a brief overview of the... |
CCC | ||
Open source experimental incubator build up
This is a call for participation in a project aimed to build up an open... |
Hardware & Making | ||
Peer Gregorius (Nation of Gondwana)
|
Music |
|
|
Perfect Paul
The facial hacking research presented in this lecture/ performance exploits a... |
Art & Beauty | ||
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
In this work we present a stealthy malware that exploits dedicated hardware... |
Security & Safety | ||
Plants & Machines
Did you ever feel the need to be in charge of your environment? We did . A... |
Hardware & Making | ||
Policing the Romantic Crowd
This talk considers the use of new technology to police large crowds in the... |
Ethics, Society & Politics | ||
Programming FPGAs with PSHDL
Learning to program an FPGA is time consuming. Not just do you need to... |
Hardware & Making | ||
RatKat
|
Music |
|
|
Recht auf Remix
Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon... |
Ethics, Society & Politics | ||
Reverse engineering of CHIASMUS from GSTOOL
We reverse-engineered one implementation of the non-public CHIASMUS cipher... |
Security & Safety | ||
Reverse engineering the Wii U Gamepad
A year ago in November 2012, Nintendo released their latest home video game... |
Hardware & Making | ||
Revisiting "Trusting Trust" for binary toolchains
Ken Thompson's classic "Reflections on Trusting Trust" examined the impacts... |
Science & Engineering | ||
RFID Treehouse of Horror
In this lecture, we present a black-box analysis of an electronic... |
Security & Safety | ||
Roamin'Roman
|
Music |
|
|
Robo Klein & John Ohrt (Universum Alltona)
|
Music |
|
|
Rock' em Graphic Cards
This talks introduces programming concepts and languages for parallel... |
Hardware & Making | ||
SCADA StrangeLove 2
SCADA StrangeLove team will present their research on ICS systems for the... |
Security & Safety | ||
Script Your Car!
Almost all higher-end cars come with very beefy in-car entertainment... |
Hardware & Making | ||
Security Nightmares
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
Entertainment | ||
Security Nightmares
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
Entertainment |
|
|
Security of the IC Backside
In the chain of trust of most secure schemes is an electronic chip that holds... |
Security & Safety | ||
Seeing The Secret State: Six Landscapes
Although people around the world are becoming increasingly aware of the... |
Art & Beauty | ||
Seidenstraße
Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit... |
Art & Beauty | ||
Sim Gishel
Sim Gishel is a multimedia robot. He sings and dances on request. He will try... |
Art & Beauty | ||
"Smartes Heim - Glück allein"
|
DLF | ||
#SOPA, #NSA, and the New Internet "Lobby"
The movement against SOPA in the US was the largest protest in online... |
Ethics, Society & Politics | ||
Structuring open hardware projects
Every successful open hardware project needs a solid organization structure... |
Hardware & Making | ||
Superdefekt (MFOC)
|
Music |
|
|
Sysadmins of the world, unite!
<p>Finally, the world is aware of the threat of mass surveillance and... |
Ethics, Society & Politics | ||
Tasmo
|
Entertainment |
|
|
Technomonopolies
We all know monopolies are bad. We even have laws against them that sometimes... |
Ethics, Society & Politics | ||
The ArduGuitar
The <a href="http://www.arduguitar.org">ArduGuitar</a> is an electric guitar... |
Hardware & Making | ||
THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE
23rd of December 2008 was a sad day in India for civil liberties. On this... |
Ethics, Society & Politics | ||
The Exploration and Exploitation of an SD Memory Card
All “managed FLASH” devices, such as SD, microSD, and SSD, contain an... |
Hardware & Making | ||
The Four Wars
Based on her own experiences as an Intelligence Officer for MI5 (the UK... |
Ethics, Society & Politics | ||
The GNU Name System
DNS, DNSSEC and the X.509 CA system leak private information about users to... |
Security & Safety | ||
The good, the bad, and the ugly - Linux Kernel patches
Companies are often blamed for not working upstream. Surprisingly, the... |
Hardware & Making | ||
The Gospel of IRMA
Attribute Based Credentials (ABC) allow users to prove certain properties... |
Security & Safety | ||
The Internet (Doesn't) Need Another Security Guide
As Internet privacy/security professionals and amateur enthusiasts, we are... |
Science & Engineering | ||
The philosophy of hacking
Modern society's use of technology as an instrument for domination is deeply... |
Art & Beauty | ||
The Pirate Cinema
"The Pirate Cinema" reveals Peer-to-Peer information flows. It is a... |
Art & Beauty | ||
The Tor Network
Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network... |
Ethics, Society & Politics | ||
The Year in Crypto
This was a busy year for crypto. TLS was broken. And then broken... |
Security & Safety | ||
Through a PRISM, Darkly
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying... |
Ethics, Society & Politics | ||
Thwarting Evil Maid Attacks
Increasingly, users and their computing hardware are exposed a range of... |
Security & Safety | ||
Tobi Lampe (Pokerflat) b2b Vinzenco
|
Music |
|
|
To Protect And Infect
2013 will be remembered as the year that the Internet lost its innocence for... |
Security & Safety | ||
To Protect And Infect, Part 2
|
Security & Safety | ||
Toward a Cognitive "Quantified Self"
The talk gives an overview about our work of quantifying knowledge... |
Science & Engineering | ||
Towards an affordable brain-computer-interface
The brain can be understood as a highly specialized information processing... |
Science & Engineering | ||
Trezor: Bitcoin hardware wallet
TREZOR is a hardware wallet for Bitcoin. We identified security of the end... |
Hardware & Making | ||
Triggering Deep Vulnerabilities Using Symbolic Execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of... |
Security & Safety | ||
Turing Complete User
With the disappearance of the computer, something else is silently becoming... |
Art & Beauty | ||
vin cent
|
Entertainment |
|
|
Virtually Impossible: The Reality Of Virtualization Security
This talk will demonstrate why it is virtually impossible to secure virtual... |
Security & Safety | ||
V wie Verfassungsschutz
Wer ist eigentlich dieser "Verfassungsschutz", was tut er und brauchen wir... |
Entertainment | ||
WarGames in memory
Memory corruption has been around forever but is still one of the most... |
Security & Safety | ||
Warum die Digitale Revolution des Lernens gescheitert ist.
Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes,... |
Ethics, Society & Politics | ||
We only have one earth
An abundant number of existential risks threatens humanity. Many of those... |
Science & Engineering | ||
When Words Dance
Held at the end of the conference, this performance will embody my personal... |
Entertainment | ||
White-Box Cryptography
The goal of white-box cryptography is to protect cryptographic keys in a... |
Security & Safety | ||
Workshop "Hacking Radio"
|
DLF | ||
Workshop "Hacking Radio"
|
DLF | ||
Workshop "Hacking Radio"
|
DLF | ||
World War II Hackers
The use of encryption to secure sensitive data from unauthorized eyes is as... |
Ethics, Society & Politics | ||
X-Dream
|
Music |
|
|
X Security
For the past year, I've been looking at the implementation of X.org code.... |
Security & Safety | ||
Y U NO ISP, taking back the Net
Building and running an ISP is not that difficult. It's hard to say how many... |
Hardware & Making | ||
Zeitgeist
|
Music |
|
|
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
»Lange Schlüssel sind sicherer als kurze.« »RSA und/oder AES sind einfach zu... |
Security & Safety |