Version 1.7 a new dawn
Events
Title | Track | Speakers | |
---|---|---|---|
10 Jahre OpenStreetMap
Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in den letzten drei... |
Hardware & Making | ||
31C3 Closing Event
|
CCC | ||
31C3 Infrastructure Review
|
CCC | ||
31C3 Keynote
The 31C3 Keynote |
CCC | ||
31C3 Opening Event
|
CCC | ||
3D Casting Aluminum
We use microwaves to cast aluminum from 3D printed objects. This gives us the... |
Hardware & Making | ||
Agri-tech and the Arts: From Barns to D-Space
What do the arts and literature have to contribute to urgent debates about... |
Ethics, Society & Politics | ||
AMD x86 SMU firmware analysis
You definitely should care. The aim of this talk is to provide insight to the... |
Security & Hacking | ||
Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer
On modern Intel based computers there exists two powerful and protected code... |
Security & Hacking | ||
Attribution revolution
Re-using works licensed under Creative Commons seems pretty simple, but it... |
Art & Culture | ||
Automatically Subtitling the C3
Transcribing a talk comes relatively easy to fast typists, whereas turning a... |
Science | ||
Axoloti
Axoloti is an integrated platform for digital audio: its graphical editor is... |
Hardware & Making | ||
Beyond PNR: Exploring airline systems
Ever wondered what the cryptic <code>QNY27R</code> on your airline reservaton... |
Security & Hacking | ||
CAESAR and NORX
"Nearly all of the symmetric encryption modes you learned about in school,... |
Science | ||
Citizenfour
"Citizenfour" is Laura Poitras' documentary and a closeup view about blowing... |
Entertainment | ||
Code Pointer Integrity
Programs are full of bugs, leading to vulnerabilities. We'll discuss power... |
Security & Hacking | ||
Computer Science in the DPRK
This talk will reflect on teaching Computer Science in Pyongyang over the... |
Ethics, Society & Politics | ||
Correcting copywrongs
After years of debate, EU copyright law is finally being revisited. The... |
Ethics, Society & Politics | ||
Crypto Tales from the Trenches
Julia Angwin, Jack Gillum, and Laura Poitras will tell us stories about how... |
Security & Hacking | ||
Cyber Necromancy
Reverse engineering is not all binaries and byte-code. The black art also... |
Security & Hacking | ||
Damn Vulnerable Chemical Process
So you want to author a next Stuxnet (or even cooler than that). Here is the... |
Hardware & Making | ||
Das Transparenzportal Hamburg
Im Vortrag wird die technische Umsetzung des Transparenzportals Hamburg... |
Ethics, Society & Politics | ||
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlorhühnchen zu... |
Ethics, Society & Politics | ||
Diamonds are a quantum computer’s best friend
The next revolution in data processing is Quantum computing. This talk is an... |
Science | ||
Die Krise der Bilder ist die Krise der Politik
Im Rahmen meiner Forschungsarbeit "Das Bild im digitalen Wandel" beschätige... |
Art & Culture | ||
Doing right by sources, done right
Whistleblowing is becoming a progressively popular topic and ways to... |
Ethics, Society & Politics | ||
DP5: PIR for Privacy-preserving Presence
In the wake of the Snowden revelations and the explicit targetting of address... |
Security & Hacking | ||
ECCHacks
This talk will explain how to work with elliptic curves constructively to... |
Security & Hacking | ||
EMET 5.1 - Armor or Curtain?
EMET (Enhanced Mitigation Experience Toolkit) is an application which can be... |
Security & Hacking | ||
ES GIBT VIEL ZU TUN - HAU'N WIR AB.
Eine Mietwohnung ist seit circa 20 Jahren verlassen, ihr Bewohner nicht... |
Art & Culture | ||
"Exploit" in theater
3 theater projects that illustrate the false "California Ideology" and ask us... |
Art & Culture | ||
Eye Wear Computing
The talk gives an overview about the emerging field of smart glasses and how... |
Science | ||
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC
We introduce Fernvale, a reverse-engineered, open hardware and software... |
Hardware & Making | ||
Finding the Weak Crypto Needle in a Byte Haystack
Using the same stream cipher key twice is known to be a Very Bad Idea, but... |
Security & Hacking | ||
Fnord News Show
Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des... |
Entertainment | ||
Fnord News Show (Stream)
Im Format einer lockeren Abendshow werden wir die Nachrichten-Highlights des... |
Entertainment | ||
Forging the USB armory
The presentation will cover the journey that we have taken to develop the USB... |
Hardware & Making | ||
Freedom in your computer and in the net
For freedom in your own computer, the software must be free. For freedom on... |
Ethics, Society & Politics | ||
From Computation to Consciousness
How can the physical universe give rise to a mind? I suggest to replace this... |
Science | ||
From Maxwell to antenna arrays
Maxwell's equations are four differential equations which form the... |
Science | ||
Funky File Formats
Binary tricks to evade identification, detection, to exploit encryption and... |
Security & Hacking | ||
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Alternativen, die... |
Science | ||
Glitching For n00bs
Despite claims of its obsolescence, electrical glitching can be a viable... |
Security & Hacking | ||
Global Civil Society Under Attack
An update to our Reports from the Frontlines talk at OHM 2013, we will... |
Ethics, Society & Politics | ||
Googlequiz – 2015er Edition
Beim Googlequiz spielen max. 7 Teams mit je max. 7 Spielern gegeneinander.... |
Entertainment | ||
Hacking Ethics in Education
Ethics in Computer Science is now finally gaining some well deserved... |
Ethics, Society & Politics | ||
»Hard Drive Punch«
In general data is stored on technically sensitive systems and can easily be... |
Art & Culture | ||
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
Two weeks after the Heartbleed bug was announced, CloudFlare patched the... |
Security & Hacking | ||
Higher-Dimensional Geometry and Fractals
Extending the common 3-space-to-2-space projections to 4D and higher and how... |
Science | ||
How I Learned to Stop Reinventing and Love the Wheels
An introduction to the Robot Operating System (ROS) for the home/hackerspace... |
Hardware & Making | ||
Ich sehe, also bin ich ... Du
Bei der Passworteingabe über die Schultern schauen? Die Mateflasche klauen,... |
Security & Hacking | ||
IFG – Mit freundlichen Grüßen
Die interessantesten IFG-Geschichten des Jahres mit Anfragen und Ablehnungen,... |
Ethics, Society & Politics | ||
Infocalypse now: P0wning stuff is not enough
This speech about how the hacker scene is failing its own ideals and what... |
Ethics, Society & Politics | ||
Information Control and Strategic Violence
Simple access to social media and cell phone has widely been accepted as a... |
Science | ||
(In)Security of Mobile Banking
This talk presents a deep analysis of banking mobile apps available in the... |
Security & Hacking | ||
Inside Field Station Berlin Teufelsberg
Of all the NSA's Cold War listening posts, their intelligence facility on top... |
Ethics, Society & Politics | ||
Internet of toilets
A toilet is a toilet is a toilet ... was a toilet. Nowadays hackers discover... |
Hardware & Making | ||
Iridium Pager Hacking
The chronicles of reversing the Iridium pager system. |
Hardware & Making | ||
Jahresrückblick des CCC
Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir einen Blick... |
CCC | ||
Jugend hackt
Im September 2014 fand die Veranstaltung Jugend hackt statt: Ein Wochenende... |
Hardware & Making | ||
Krypto für die Zukunft
(K)ein kleiner Rant über Elliptische Kurven, Quantencomputer, Bitcoins und... |
Science | ||
Let's build a quantum computer!
I will explain why quantum computing is interesting, how it works and what... |
Science | ||
Let’s build our own personalized open textile production line
The talk is about our project to develop software and hardware tools for a... |
Hardware & Making | ||
Let's Encrypt
As we've called for widespread use of HTTPS, the cost and complexity of the... |
Ethics, Society & Politics | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
Other | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
Other | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
Other | ||
Living Drones
During World War I, homing pigeons were used to carry messages and take... |
Science | ||
Long war tactics
Referring to the seminal talk Dymaxion gave at the closing of the NoisySquare... |
Ethics, Society & Politics | ||
Low Cost High Speed Photography
Capturing the splash of a water balloon, the snap of a mouse trap or the... |
Hardware & Making | ||
MegaCode to facility gates
How do garage gate remotes work? It turns out the ones from MegaCode simply... |
Hardware & Making | ||
Mein Bot, der Kombattant
Der Vortrag bietet eine sprachwissenschaftlich informierte Perspektive auf... |
Science | ||
Mining for Bugs with Graph Database Queries
While graph databases are primarily known as the backbone of the modern... |
Security & Hacking | ||
Mit Kunst die Gesellschaft hacken
Ein Mahnmal gegen die Vereinten Nationen, 25.000 Euro Kopfgeld auf... |
Ethics, Society & Politics | ||
Mobile self-defense
We know that mobile networks can — and do — attack us on many fronts. As this... |
Security & Hacking | ||
Mr Beam goes Kickstarter
Mr Beam was started as a hobby project aiming to get more experience in 3D... |
Hardware & Making | ||
net neutrality: days of future past?
Our talk will highlight the current debates surrounding net neutrality in... |
Ethics, Society & Politics | ||
Now I sprinkle thee with crypto dust
When the Internet was designed, it was thought to be meadows full of daisies.... |
Security & Hacking | ||
NSA Points of Presence in AT
- Station VIENNA in der US-Botschaft 1090 Wien - VIENNA ANNEX beim... |
Ethics, Society & Politics | ||
Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
leading hackers and researchers from the worldwide hackerspace,... |
Hardware & Making | ||
osmo-gmr: What's up with sat-phones ?
At 28C3 we introduced the very first steps of the osmo-gmr projects. During... |
Security & Hacking | ||
Paypals War on Terror
We are the PayPal 14. For the last several years we've been restricted in... |
Ethics, Society & Politics | ||
Personal Tracking Devices and Online Identity
In the post-NSA world it is important to understand the magnitude of our... |
Ethics, Society & Politics | ||
Practical EMV PIN interception and fraud detection
This talks follows our previous EMV research uncovering new findings as well... |
Security & Hacking | ||
Premiere: We love surveillance
Premiere of the English version of the shortfilm "We love surveillance". |
Ethics, Society & Politics | ||
Preserving arcade games
Old-school arcade games were so protected that hacking is the only way to... |
Security & Hacking | ||
Privacy and Consumer Markets
The internet may be the nervous system of the 21st century, but its main... |
Ethics, Society & Politics | ||
Programming with dependent types in Idris
Idris is a relatively young research programming languages that attempts to... |
Science | ||
Reconstructing narratives
Surveillance, cryptography, terrorism, malware, economic espionage,... |
Ethics, Society & Politics | ||
Reproducible Builds
Software build reproducibility is the ability to use independent build... |
Security & Hacking | ||
Revisiting SSL/TLS Implementations
We present four new Bleichenbacher side channels, and three successful... |
Security & Hacking | ||
Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States
Rocket Kitten is an advanced APT set of campaigns, with a twist -... |
Security & Hacking | ||
Rocket science – how hard can it be?
Three years have elapsed since the call for a "Hacker Space Program" during... |
Science | ||
Safer playing with lasers
How to play with lasers without injuring Yourself and others and how to... |
Hardware & Making | ||
SCADA StrangeLove: Too Smart Grid in da Cloud
For two years SCADA StrangeLove speaks about Industrial Control Systems and... |
Security & Hacking | ||
Security Analysis of a Full-Body X-Ray Scanner
Full-body scanners, also known as "naked scanners", are used in airports and... |
Security & Hacking | ||
Security Analysis of Estonia's Internet Voting System
Estonia is the only country in the world that relies on Internet voting in a... |
Ethics, Society & Politics | ||
Security Nightmares
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
Entertainment | ||
Security Nightmares (Stream)
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
Entertainment | ||
Serenität – Anleitung zum Glücklichsein
Die radikalen philosophischen Texte von Elektra W. haben das Ziel - seien wir... |
Art & Culture | ||
Snowden Effect vs. Privacy Paradox
"Vertrauen ist gut - Kontrolle ist besser." Dieses Idiom gilt mehr denn je,... |
Ethics, Society & Politics | ||
Source Code and Cross-Domain Authorship Attribution
Stylometry is the study of linguistic style found in text. Stylometry existed... |
Science | ||
Space Hacker
At the 26C3 we first presented our vision of sending a rover to the moon.... |
Science | ||
SS7: Locate. Track. Manipulate.
Companies are now selling the ability to track your phone number whereever... |
Security & Hacking | ||
SS7map : mapping vulnerability of the international mobile roaming infrastructure
SS7 has been shown repeatedly as an insecure protocol: spoofing, faking,... |
Security & Hacking | ||
State of the Onion
The current state of the Tor network and community, covering important... |
Ethics, Society & Politics | ||
Superheroes Still Need Phoneboxes
This talk asks how we might plan for the continuation of a privacy sustaining... |
Art & Culture | ||
Switches Get Stitches
This talk will introduce you to Industrial Ethernet Switches and their... |
Security & Hacking | ||
Telescope Making
In this talk an introduction to amateur telescope making (ATM) will be... |
Hardware & Making | ||
Tell no-one
For nearly one hundred years, the NSA and its predecessors have been engaging... |
Ethics, Society & Politics | ||
The automobile as massive data gathering source and the consequences for individual privacy
We report about a LOAD e. V. study regarding data collection of cars, future... |
Ethics, Society & Politics | ||
The case of Chelsea Manning
A discussion with U.S. Army private Chelsea Manning's attorneys Nanny... |
Ethics, Society & Politics | ||
The Cloud Conspiracy 2008-2014
In 2011 I started trying to warn EU institutions about what we now call... |
Ethics, Society & Politics | ||
The eXperimental Robot Project
The talk is on the eXperimental Robot Project (XRP), a project to develop an... |
Hardware & Making | ||
The Invisible Committee Returns with "Fuck Off Google"
“There will be people who resist adopting and using technology, people who... |
Ethics, Society & Politics | ||
The Machine To Be Another
The Machine To Be Another is an open-source interactive system designed to... |
Art & Culture | ||
The Magical Secrecy Tour
June 5, 2014 marked one year since leaks by NSA whistleblower Edward Snowden... |
Art & Culture | ||
The Maker movement meets patent law
The Maker movement and patent law are like two planets moving on the orbit of... |
Hardware & Making | ||
The Matter of Heartbleed
The Heartbleed vulnerability took the Internet by surprise in April of this... |
Security & Hacking | ||
The Only Thing We Know About Cyberspace Is That Its 640x480
Since 10 years I write about Vernacular Web and Digital Folklore, about early... |
Art & Culture | ||
The Perl Jam: Exploiting a 20 Year-old Vulnerability
tl;dr EXPLOIT ALL THE PERL. We chained several of Perl’s ridiculous syntax... |
Security & Hacking | ||
The rise and fall of Internet voting in Norway
In the parliamentary elections of September 2013, more than 250 000... |
Ethics, Society & Politics | ||
The Time is Right
Das c-atre collectivdrama präsentiert THE TIME IS RIGHT, ein... |
Entertainment | ||
Thunderstrike: EFI bootkits for Apple MacBooks
In this presentation we demonstrate Thunderstrike, a vulnerability that... |
Security & Hacking | ||
Too Many Cooks - Exploiting the Internet-of-TR-069-Things
TL;DR We unravel the story of a bug that would become one of the most... |
Security & Hacking | ||
Tor: Hidden Services and Deanonymisation
This talk presents the results from what we believe to be one of the largest... |
Security & Hacking | ||
Towards General Purpose Reconfigurable Computing on Novena
The Novena open source laptop contains a FPGA, but free software support for... |
Hardware & Making | ||
Trackography
Have you ever wondered who is watching while you are reading your favourite... |
Ethics, Society & Politics | ||
Traue keinem Scan, den du nicht selbst gefälscht hast
Kopierer, die spontan Zahlen im Dokument verändern: Im August 2013 kam... |
Ethics, Society & Politics | ||
Trustworthy secure modular operating system engineering
We present Mirage OS, a modular library operating system developed from... |
Science | ||
Uncaging Microchips
An entertaining, thrilling and educational journey through the world of chip... |
Security & Hacking | ||
UNHash - Methods for better password cracking
This talk will show a new method for password cracking called UNHash. UNHash... |
Security & Hacking | ||
Virtual Machine Introspection
New methods and approaches for securing cloud environments are becoming... |
Security & Hacking | ||
Vor Windows 8 wird gewarnt
Im Vortrag sollen technische und gesellschaftliche Konsequenzen der von... |
Security & Hacking | ||
What Ever Happened to Nuclear Weapons?
An overview of 70 years of nuclear weapons, focusing on some of the... |
Ethics, Society & Politics | ||
Why are computers so @#!*, and what can we do about it?
Computers have become ubiquitous and essential, but they remain massively... |
Science | ||
Why do we need an open food information platform
We from EveryCook are building an open source computerized cooking device. At... |
Hardware & Making | ||
Why is GPG "damn near unusable"?
GPG has been correctly described as "damn near unusable". Why is this so?... |
Science | ||
„Wir beteiligen uns aktiv an den Diskussionen“
Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgestellt, die als... |
Ethics, Society & Politics |