Version 1.5b Castle in the Sky
Events
| Title | Track | Speakers | |
|---|---|---|---|
![]()  | 
20 OSCILLATORS IN 20 MINUTES 
 20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical...  | 
Art & Culture | |
![]()  | 
32C3 Infrastructure Review
 The traditional review event with presentations from various teams at...  | 
CCC | |
![]()  | 
3D printing on the moon
 3D printers are almost everywhere, but not on the moon yet. We want to change...  | 
Hardware & Making | |
![]()  | 
A Dozen Years of Shellphish
 How we built an automatic exploitation system and qualified for the DARPA...  | 
Security | |
![]()  | 
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
 Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and...  | 
Hardware & Making | |
![]()  | 
All Our Shared Spectrum Are Belong to Us
 "Signal level is high but throughput is low" is a common experience in WLAN...  | 
Hardware & Making | |
![]()  | 
A New Kid on the Block
 The leading social networks are the powerful new gatekeepers of the digital...  | 
Ethics, Society & Politics | |
![]()  | 
apertus° AXIOM
 AXIOM is the first professional, extendable, affordable and modular cinema...  | 
Hardware & Making | |
![]()  | 
APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for
 With the advancement of defensive security and the constant release of...  | 
Security | |
![]()  | 
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
 In recent years, NGOs have been struggling to defend civil rights in...  | 
Ethics, Society & Politics | |
![]()  | 
Beyond Anti Evil Maid
 In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many...  | 
Security | |
![]()  | 
Beyond your cable modem
 Did you ever want to have access to a few hundred thousand network end...  | 
Security | |
![]()  | 
Breaking Honeypots for Fun and Profit
 We will detect, bypass, and abuse honeypot technologies and solutions,...  | 
Security | |
![]()  | 
Buffering sucks!
 Buffering sucks! Why we see regular buffering when watching online video....  | 
Ethics, Society & Politics | |
![]()  | 
Building and Breaking Wireless Security
 This talk gives an overview on state-of-the-art wireless security concepts:...  | 
Security | |
![]()  | 
Check your privileges!
 After defensive programming techniques and before attack method mitigations,...  | 
Security | |
![]()  | 
CHINTERNET ART
 Since my move to China in 2012 I have actively engaged in the local art...  | 
Art & Culture | |
![]()  | 
Closing Event
 | 
CCC | |
![]()  | 
CloudABI
 CloudABI is an alternative runtime environment for UNIX-like operating...  | 
Security | |
![]()  | 
Collect It All: Open Source Intelligence (OSINT) for Everyone
 Governments post reports and data about their operations. Journalists publish...  | 
Ethics, Society & Politics | |
![]()  | 
Compileroptimierungen für Forth im Microcontroller
 Wie lassen sich Konstantenfaltung und ein Registerallokator für einen...  | 
Hardware & Making | |
![]()  | 
Computational Meta-Psychology
 Computational theories of the mind seem to be ideally suited to explain...  | 
Science | |
![]()  | 
Console Hacking
 In 2011 the Nintendo 3DS was released. Today it is the most popular...  | 
Security | |
![]()  | 
Craft, leisure, and end-user innovation
 Hacking receives growing attention among social scientists during the last...  | 
Science | |
![]()  | 
Crypto ist Abwehr, IFG ist Angriff!
 Die Landesverrat-Affäre um netzpolitik.org hat gezeigt, wie wichtig es ist,...  | 
Ethics, Society & Politics | |
![]()  | 
Crypto Wars Part II
 Governments around the world are seeking to put a stop to secure end-to-end...  | 
Ethics, Society & Politics | |
![]()  | 
Cyber all the Wassenaars
 Transposition of the Wassenaar Arrangement, which now also covers export...  | 
Ethics, Society & Politics | |
![]()  | 
Das Zahnrad aus Fleisch
 Kommentierendes im Internet ist neuerdings bedroht. Der unflätige...  | 
Ethics, Society & Politics | |
![]()  | 
Datahavens from HavenCo to Today
 Datahavens have long been discussed as a solution to user security and...  | 
Failosophy | |
![]()  | 
DDoS mitigation EPIC FAIL collection
 For the past 3 years I have been delivering a custom-tailored DDoS attacks...  | 
Failosophy | |
![]()  | 
De-anonymizing Programmers
 Last year I presented research showing how to de-anonymize programmers based...  | 
Security | |
![]()  | 
Die Asyl-Dialoge / The Asylum Dialogues
 Die ASYL-DIALOGE erzählen von Begegnungen, die Menschen verändern, von...  | 
Ethics, Society & Politics | |
![]()  | 
Dissecting VoLTE
 Newly adopted VoLTE requires changes in all associated parties, such as 3GPP...  | 
Security | |
![]()  | 
Ecuador: how an authoritarian government is fooling the entire world
 The Ecuadorian government received international visibility when in 2012 it...  | 
Ethics, Society & Politics | |
![]()  | 
Ein Abgrund von Landesverrat
 Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei...  | 
Ethics, Society & Politics | |
![]()  | 
Evolution of Brain-Computer Interfaces
 This talk is a brief recap into EEG / BCI for hackers, makers, researchers,...  | 
Hardware & Making | |
![]()  | 
"Fluxus cannot save the world."
 The Fluxus movement came about in the early 1960ies and the talk will discuss...  | 
Art & Culture | |
![]()  | 
Fnord-Jahresrückblick
 Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von...  | 
Entertainment | |
![]()  | 
Free Software and Hardware bring National Sovereignty
 Free software and hardware are essential to sovereignty among developing...  | 
Ethics, Society & Politics | |
![]()  | 
Gibberish Detection 102
 DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism...  | 
Security | |
![]()  | 
#GOIBlocks - Technical observations about recent internet censorship in India
 On 17th December 2014, the Government of India's Ministry of Communications...  | 
Ethics, Society & Politics | |
![]()  | 
goto fail;
 Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol...  | 
Failosophy | |
![]()  | 
Graphs, Drones & Phones
 The military use of Drones has profoundly changed warfare and is a central...  | 
Ethics, Society & Politics | |
![]()  | 
Grundrechte gelten nicht im Weltall!
 In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des...  | 
Ethics, Society & Politics | |
![]()  | 
G’scheitern
 „Never ever say no, act your first thought and learn to love mistakes“ –...  | 
Failosophy | |
![]()  | 
Hacker Jeopardy
 The Hacker Jeopardy is a quiz show.  | 
Entertainment | |
![]()  | 
Hacking EU funding for a decentralizing FOSS project
 FOSS and hacker culture meeting the EU buereaucracy. What can possibly come...  | 
Ethics, Society & Politics | |
![]()  | 
Hardware-Trojaner in Security-Chips
 Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die...  | 
Security | |
![]()  | 
Household, Totalitarianism and Cyberspace
 In my talk I am 1) discussing philosophical concepts of privacy, especially...  | 
Science | |
![]()  | 
How hackers grind an MMORPG: by taking it apart!
 When an online game no longer captivates interest, what do you do? Grind on...  | 
Security | |
![]()  | 
How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).
 In the dark days of October 2014 an unprecedented Ebola epidemic wrecked...  | 
Ethics, Society & Politics | |
![]()  | 
How the Great Firewall discovers hidden circumvention servers
 Several years ago, the Great Firewall of China was silently upgraded to find...  | 
Science | |
![]()  | 
How to contribute to make open hardware happen
 What to do if you are neither a hardware- nor a software expert and want to...  | 
Hardware & Making | |
![]()  | 
“I feel like a criminal and I have to be god at the same time”
 News reports and political speeches are currently replete with references to...  | 
Science | |
![]()  | 
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
 Embedded systems are omnipresent in our everyday life and are becoming ...  | 
Security | |
![]()  | 
Intelexit
 Giant billboard vans, drone-operated leaflet drops over an NSA building and...  | 
Ethics, Society & Politics | |
![]()  | 
Internet Cube
 Two years after the invitation to build your own iSP at 30C3, I'd like to...  | 
Hardware & Making | |
![]()  | 
Internet Landscapes
 In Internet Landscapes, Evan Roth with discuss his work as it relates to...  | 
Art & Culture | |
![]()  | 
Iridium Update 
 Listening to satellites and decoding is fun. We show interesting stuff we...  | 
Hardware & Making | |
![]()  | 
Jahresrückblick des CCC
 Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club...  | 
CCC | |
![]()  | 
Jugend hackt 2015
 Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit...  | 
CCC | |
![]()  | 
julien.moinard@opale-security.com
 It is clear that something is needed to help the security community to...  | 
Hardware & Making | |
![]()  | 
Katastrophe und Kommunikation
 Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte...  | 
Ethics, Society & Politics | |
![]()  | 
Key-logger, Video, Mouse
 Key-Loggers are cool, really cool. It seems, however, that every conceivable...  | 
Security | |
![]()  | 
Keynote
 | 
CCC | |
![]()  | 
Lessons learned: Freifunk für Geflüchtete
 Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit...  | 
Ethics, Society & Politics | |
![]()  | 
Let's Encrypt -- What launching a free CA looks like
 Let's Encrypt is a new free and automated certificate authority, that...  | 
Ethics, Society & Politics | |
![]()  | 
libusb: Maintainer fail
 In 2010 I was asked by the second maintainer in a row to take over as new...  | 
Failosophy | |
![]()  | 
Lifting the Fog on Red Star OS
 Angae means "Fog" in Korean. The term is widely used in parts of custom code...  | 
Ethics, Society & Politics | |
| 
Lightning Talks Day 2
 Lightning Talks are short lectures (almost) any congress participant may...  | 
CCC | ||
| 
Lightning Talks Day 3
 Lightning Talks are short lectures (almost) any congress participant may...  | 
CCC | ||
| 
Lightning Talks Day 4
 Lightning Talks are short lectures (almost) any congress participant may...  | 
CCC | ||
![]()  | 
Ling - High level system programming
 In this presentation I will present the experimental language Ling. We shall...  | 
Science | |
![]()  | 
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
 Earlier this year, we discovered that Diffie-Hellman key exchange –...  | 
Security | |
![]()  | 
Maker Spaces in Favelas - Lecture
 There are two lines of research in the world about decreasing poverty in...  | 
Hardware & Making | |
![]()  | 
Maritime Robotics
 This talk will have a look at maritime related robots and projects. It is not...  | 
Hardware & Making | |
![]()  | 
Media Coverage and the Public in the Surveillance Society
 How have the media reported the Snowden revelations? Does the public care...  | 
Science | |
![]()  | 
Methodisch inkorrekt!
 Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle...  | 
Entertainment | |
![]()  | 
Methodisch inkorrekt! (Live-Stream)
 ### LIVE-STREAM ### Nicolas Wöhrl und Reinhard Remfort sprechen über...  | 
Entertainment | 
 | 
![]()  | 
Microsofts Windows 10 Botnet
 Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von...  | 
Security | |
![]()  | 
Mobile Censorship in Iran
 As Internet users increasingly connect to the Internet through smartphones,...  | 
Ethics, Society & Politics | |
![]()  | 
My Robot Will Crush You With Its Soft Delicate Hands!
 In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take...  | 
Hardware & Making | |
![]()  | 
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
 In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil...  | 
Ethics, Society & Politics | |
![]()  | 
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
 Is your email being sent in the clear? While PGP and S/MIME provide...  | 
Security | |
![]()  | 
Net Neutrality in Europe
 After two years the fight for net neutrality in Europe about the Telecom...  | 
Ethics, Society & Politics | |
![]()  | 
Netzpolitik in der Schweiz
 2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn...  | 
CCC | |
![]()  | 
New memory corruption attacks: why can't we have nice things?
 Memory corruption is an ongoing problem and in past years we have both...  | 
Security | |
| 
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
 Im März 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt,...  | 
Ethics, Society & Politics | ||
![]()  | 
On Computing Numbers, with an Application to Problems of our Society
 Journalists, while structurally and economically under threat, are bringing...  | 
Ethics, Society & Politics | |
![]()  | 
One year of securitarian drift in France
 Earlier this year, following the tragic events of early January in Paris, the...  | 
Ethics, Society & Politics | |
![]()  | 
Opening Event
 | 
CCC | |
![]()  | 
PLC-Blaster
 Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann...  | 
Security | |
![]()  | 
 Plunge into Proxy Politics
 During this lecture presentation, Boaz Levin and Vera Tollmann, co-founders...  | 
Art & Culture | |
![]()  | 
PQCHacks
 <p>Last year your friend Karen joined the alternative music scene and sent...  | 
Security | |
![]()  | 
Predicting Crime in a Big Data World
 Yearly, the world is inundated with news about government data collection...  | 
Ethics, Society & Politics | |
![]()  | 
Prediction and Control
 Mass quantities of data are being incorporated into predictive systems in an...  | 
Ethics, Society & Politics | |
![]()  | 
Profiling (In)justice
 This talk will focus on the potential ability of data disaggregated by race...  | 
Ethics, Society & Politics | |
![]()  | 
Public Library/Memory of the World
 Public Library is the synergy of two efforts. First, it makes the case for...  | 
Art & Culture | |
![]()  | 
QRtistry
 QR codes have rapidly overtaken rival 2D bar code symbologies and are...  | 
Art & Culture | |
![]()  | 
Quantenphysik und  Kosmologie
 Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig...  | 
Science | |
![]()  | 
Quantum Cryptography
 I will entertain the audience with a science talk about quantum cryptography,...  | 
Science | |
![]()  | 
rad1o++
 News about the rad1o half a year later – cool stuff that happened, and why...  | 
Hardware & Making | |
![]()  | 
Replication Prohibited
 Physical keys and locks are one of the oldest security mechanisms still...  | 
Hardware & Making | |
![]()  | 
Reversing UEFI by execution
 This talk will be an overview of how to reverse-engineer Unified Extensible...  | 
Security | |
![]()  | 
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
 The REXUS/BEXUS programme allows students from universities and higher...  | 
Science | |
![]()  | 
re_cycle
 How can be 3d printing a dual use technology? Print more things, produce less...  | 
Hardware & Making | |
![]()  | 
Rowhammer.js: Root privileges for web apps?
 "Insanity: doing the same thing over and over again and expecting different...  | 
Security | |
![]()  | 
Running your own 3G/3.5G network
 Seven years after presenting „running your own GSM network“, we are back...  | 
Security | |
![]()  | 
Safe Harbor
 Introduction and consequences of the CJEU's "Safe Harbor" ruling, to ...  | 
Ethics, Society & Politics | |
![]()  | 
Sanitizing PCAPs
 Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able...  | 
Security | |
![]()  | 
Say hi to your new boss: How algorithms might soon control our lives.
 Algorithms and „big data“ penetrate many aspects of our lives today. In the...  | 
Science | |
![]()  | 
Security Nightmares 0x10
 Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...  | 
CCC | |
![]()  | 
Shooting lasers into space – for science!
 Light of astronomical objects gets distorted as it passes earth’s atmosphere....  | 
Science | |
![]()  | 
Shopshifting
 Payment systems are old and have – unlike card protocols – seen little...  | 
Security | |
![]()  | 
Sicherheit von 125kHz Transpondern  am Beispiel Hitag S
 Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt....  | 
Security | |
![]()  | 
Sin in the time of Technology
 Technology companies now hold an unprecedented ability to shape the world...  | 
Ethics, Society & Politics | |
![]()  | 
Software and business method patents: call for action
 Ten years after the rejection of the European software patent directive by...  | 
Ethics, Society & Politics | |
![]()  | 
So you want to build a satellite?
 CubeSat are small standardized satellites typically flown as secondary and...  | 
Hardware & Making | |
![]()  | 
State of the Onion
 Major changes are underway in the Tor Project, the Tor Network, and the Tor...  | 
Ethics, Society & Politics | |
![]()  | 
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
 Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein...  | 
Ethics, Society & Politics | |
![]()  | 
Stromtankstellen – eine neue öffentliche Infrastruktur
 Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen....  | 
Hardware & Making | |
![]()  | 
Technology and Mass Atrocity Prevention
 This lecture will give an overview on how technology can help and is helping...  | 
Ethics, Society & Politics | |
![]()  | 
Ten years after ‚We Lost The War‘
 The talk „We Lost The War“ was presented at Congress ten years ago, causing...  | 
Ethics, Society & Politics | |
![]()  | 
The architecture of a street level panopticon
 Street level surveillance technology, such as surveillance cameras and iris...  | 
Ethics, Society & Politics | |
![]()  | 
The exhaust emissions scandal („Dieselgate“)
 Analysis of the emission scandal shaking the German automotive industry from...  | 
Ethics, Society & Politics | |
![]()  | 
The Great Train Cyber Robbery
 For years SCADA StrangeLove team speaks about vulnerabilities in Industrial...  | 
Security | |
![]()  | 
The Magic World of Searchable Symmetric Encryption
 In the last couple of years, cloud and web services have become more and more...  | 
Science | |
![]()  | 
The mummy unwrapped
 Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete...  | 
Art & Culture | |
![]()  | 
The Perl Jam 2
 tl;dr EXPLOIT ALL THE PERL. AGAIN. After last year’s Perl crackdown, I...  | 
Security | |
![]()  | 
The plain simple reality of entropy
 Entropy, the randomness used in many critical cryptography processes...  | 
Security | |
![]()  | 
the possibility of an army
 Using follower bombing as art performances, the artists Constant Dullaart...  | 
Art & Culture | |
![]()  | 
The Price Of Dissent
 CAGE exists to highlight abuses of the War on Terror. It has uncovered many...  | 
Ethics, Society & Politics | |
![]()  | 
The state of Internet Censorship
 The techniques to control access to the Internet, and the ability to bring...  | 
Ethics, Society & Politics | |
![]()  | 
The Ultimate Amiga 500 Talk
 The Amiga was one of the most powerful and wide srpead computers in the late...  | 
Hardware & Making | |
![]()  | 
Thunderstrike 2
 Last year at 31c3 we disclosed <a...  | 
Security | |
![]()  | 
Top X* usability obstacles
 What do you want? Did you build your web/app for humans or NSA robots? Let's...  | 
Failosophy | |
![]()  | 
Tor onion services: more useful than you think
 We'll update you on what's going on with Tor onion services, aka Tor hidden...  | 
Security | |
![]()  | 
Towards (reasonably) trustworthy x86 laptops
 Can we build trustworthy client systems on x86 hardware? What are the main...  | 
Security | |
![]()  | 
Trust us and our business will expand!
 The lecture outlines strategies by the "Artist against 419" online community...  | 
Art & Culture | |
![]()  | 
Unpatchable
 Gradually we are all becoming more and more dependent on machines, we will be...  | 
Security | |
![]()  | 
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
 Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und...  | 
Security | |
![]()  | 
Vector retrogaming
 In this talk I'll show how to build an open source vector gaming system with...  | 
Hardware & Making | |
![]()  | 
Vehicle2Vehicle Communication based on IEEE 802.11p
 This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the...  | 
Hardware & Making | |
![]()  | 
Verified Firewall Ruleset Verification
 We develop a tool to verify Linux netfilter/iptables firewalls rulesets....  | 
Science | |
![]()  | 
What does Big Brother see, while he is watching?
 In the past years there has been a lot of discussion on the topic of state...  | 
Art & Culture | |
![]()  | 
What is the value of anonymous communication?
 What does the fact that Tor users can’t edit wikipedia mean for the quality...  | 
Science | |
![]()  | 
When  algorithms fail in our personal lives
 „Social Media Break Up Coordinator“ is a performance art piece and lecture...  | 
Art & Culture | |
![]()  | 
When hardware must „just work“
 Software design and testing is hard, but what happens when each bug fix can...  | 
Failosophy | |
![]()  | 
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
 Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch...  | 
Ethics, Society & Politics | |
![]()  | 
Wie man einen Blackout verursacht 
 Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der...  | 
Science | |
![]()  | 
Windows drivers attack surface
 This presentation covers windows kernel driver security issues. It'll discuss...  | 
Security | |
![]()  | 
Wireless Drivers: Freedom considered harmful?
 A review/rant about the progress that free software wireless drivers...  | 
Hardware & Making | 






























































