Version 1.5b Castle in the Sky
Events
Title | Track | Speakers | |
---|---|---|---|
20 OSCILLATORS IN 20 MINUTES
20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical... |
Art & Culture | ||
32C3 Infrastructure Review
The traditional review event with presentations from various teams at... |
CCC | ||
3D printing on the moon
3D printers are almost everywhere, but not on the moon yet. We want to change... |
Hardware & Making | ||
A Dozen Years of Shellphish
How we built an automatic exploitation system and qualified for the DARPA... |
Security | ||
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and... |
Hardware & Making | ||
All Our Shared Spectrum Are Belong to Us
"Signal level is high but throughput is low" is a common experience in WLAN... |
Hardware & Making | ||
A New Kid on the Block
The leading social networks are the powerful new gatekeepers of the digital... |
Ethics, Society & Politics | ||
apertus° AXIOM
AXIOM is the first professional, extendable, affordable and modular cinema... |
Hardware & Making | ||
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
With the advancement of defensive security and the constant release of... |
Security | ||
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
In recent years, NGOs have been struggling to defend civil rights in... |
Ethics, Society & Politics | ||
Beyond Anti Evil Maid
In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many... |
Security | ||
Beyond your cable modem
Did you ever want to have access to a few hundred thousand network end... |
Security | ||
Breaking Honeypots for Fun and Profit
We will detect, bypass, and abuse honeypot technologies and solutions,... |
Security | ||
Buffering sucks!
Buffering sucks! Why we see regular buffering when watching online video.... |
Ethics, Society & Politics | ||
Building and Breaking Wireless Security
This talk gives an overview on state-of-the-art wireless security concepts:... |
Security | ||
Check your privileges!
After defensive programming techniques and before attack method mitigations,... |
Security | ||
CHINTERNET ART
Since my move to China in 2012 I have actively engaged in the local art... |
Art & Culture | ||
Closing Event
|
CCC | ||
CloudABI
CloudABI is an alternative runtime environment for UNIX-like operating... |
Security | ||
Collect It All: Open Source Intelligence (OSINT) for Everyone
Governments post reports and data about their operations. Journalists publish... |
Ethics, Society & Politics | ||
Compileroptimierungen für Forth im Microcontroller
Wie lassen sich Konstantenfaltung und ein Registerallokator für einen... |
Hardware & Making | ||
Computational Meta-Psychology
Computational theories of the mind seem to be ideally suited to explain... |
Science | ||
Console Hacking
In 2011 the Nintendo 3DS was released. Today it is the most popular... |
Security | ||
Craft, leisure, and end-user innovation
Hacking receives growing attention among social scientists during the last... |
Science | ||
Crypto ist Abwehr, IFG ist Angriff!
Die Landesverrat-Affäre um netzpolitik.org hat gezeigt, wie wichtig es ist,... |
Ethics, Society & Politics | ||
Crypto Wars Part II
Governments around the world are seeking to put a stop to secure end-to-end... |
Ethics, Society & Politics | ||
Cyber all the Wassenaars
Transposition of the Wassenaar Arrangement, which now also covers export... |
Ethics, Society & Politics | ||
Das Zahnrad aus Fleisch
Kommentierendes im Internet ist neuerdings bedroht. Der unflätige... |
Ethics, Society & Politics | ||
Datahavens from HavenCo to Today
Datahavens have long been discussed as a solution to user security and... |
Failosophy | ||
DDoS mitigation EPIC FAIL collection
For the past 3 years I have been delivering a custom-tailored DDoS attacks... |
Failosophy | ||
De-anonymizing Programmers
Last year I presented research showing how to de-anonymize programmers based... |
Security | ||
Die Asyl-Dialoge / The Asylum Dialogues
Die ASYL-DIALOGE erzählen von Begegnungen, die Menschen verändern, von... |
Ethics, Society & Politics | ||
Dissecting VoLTE
Newly adopted VoLTE requires changes in all associated parties, such as 3GPP... |
Security | ||
Ecuador: how an authoritarian government is fooling the entire world
The Ecuadorian government received international visibility when in 2012 it... |
Ethics, Society & Politics | ||
Ein Abgrund von Landesverrat
Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei... |
Ethics, Society & Politics | ||
Evolution of Brain-Computer Interfaces
This talk is a brief recap into EEG / BCI for hackers, makers, researchers,... |
Hardware & Making | ||
"Fluxus cannot save the world."
The Fluxus movement came about in the early 1960ies and the talk will discuss... |
Art & Culture | ||
Fnord-Jahresrückblick
Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von... |
Entertainment | ||
Free Software and Hardware bring National Sovereignty
Free software and hardware are essential to sovereignty among developing... |
Ethics, Society & Politics | ||
Gibberish Detection 102
DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism... |
Security | ||
#GOIBlocks - Technical observations about recent internet censorship in India
On 17th December 2014, the Government of India's Ministry of Communications... |
Ethics, Society & Politics | ||
goto fail;
Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol... |
Failosophy | ||
Graphs, Drones & Phones
The military use of Drones has profoundly changed warfare and is a central... |
Ethics, Society & Politics | ||
Grundrechte gelten nicht im Weltall!
In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des... |
Ethics, Society & Politics | ||
G’scheitern
„Never ever say no, act your first thought and learn to love mistakes“ –... |
Failosophy | ||
Hacker Jeopardy
The Hacker Jeopardy is a quiz show. |
Entertainment | ||
Hacking EU funding for a decentralizing FOSS project
FOSS and hacker culture meeting the EU buereaucracy. What can possibly come... |
Ethics, Society & Politics | ||
Hardware-Trojaner in Security-Chips
Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die... |
Security | ||
Household, Totalitarianism and Cyberspace
In my talk I am 1) discussing philosophical concepts of privacy, especially... |
Science | ||
How hackers grind an MMORPG: by taking it apart!
When an online game no longer captivates interest, what do you do? Grind on... |
Security | ||
How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).
In the dark days of October 2014 an unprecedented Ebola epidemic wrecked... |
Ethics, Society & Politics | ||
How the Great Firewall discovers hidden circumvention servers
Several years ago, the Great Firewall of China was silently upgraded to find... |
Science | ||
How to contribute to make open hardware happen
What to do if you are neither a hardware- nor a software expert and want to... |
Hardware & Making | ||
“I feel like a criminal and I have to be god at the same time”
News reports and political speeches are currently replete with references to... |
Science | ||
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
Embedded systems are omnipresent in our everyday life and are becoming ... |
Security | ||
Intelexit
Giant billboard vans, drone-operated leaflet drops over an NSA building and... |
Ethics, Society & Politics | ||
Internet Cube
Two years after the invitation to build your own iSP at 30C3, I'd like to... |
Hardware & Making | ||
Internet Landscapes
In Internet Landscapes, Evan Roth with discuss his work as it relates to... |
Art & Culture | ||
Iridium Update
Listening to satellites and decoding is fun. We show interesting stuff we... |
Hardware & Making | ||
Jahresrückblick des CCC
Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club... |
CCC | ||
Jugend hackt 2015
Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit... |
CCC | ||
julien.moinard@opale-security.com
It is clear that something is needed to help the security community to... |
Hardware & Making | ||
Katastrophe und Kommunikation
Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte... |
Ethics, Society & Politics | ||
Key-logger, Video, Mouse
Key-Loggers are cool, really cool. It seems, however, that every conceivable... |
Security | ||
Keynote
|
CCC | ||
Lessons learned: Freifunk für Geflüchtete
Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit... |
Ethics, Society & Politics | ||
Let's Encrypt -- What launching a free CA looks like
Let's Encrypt is a new free and automated certificate authority, that... |
Ethics, Society & Politics | ||
libusb: Maintainer fail
In 2010 I was asked by the second maintainer in a row to take over as new... |
Failosophy | ||
Lifting the Fog on Red Star OS
Angae means "Fog" in Korean. The term is widely used in parts of custom code... |
Ethics, Society & Politics | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Ling - High level system programming
In this presentation I will present the experimental language Ling. We shall... |
Science | ||
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
Earlier this year, we discovered that Diffie-Hellman key exchange –... |
Security | ||
Maker Spaces in Favelas - Lecture
There are two lines of research in the world about decreasing poverty in... |
Hardware & Making | ||
Maritime Robotics
This talk will have a look at maritime related robots and projects. It is not... |
Hardware & Making | ||
Media Coverage and the Public in the Surveillance Society
How have the media reported the Snowden revelations? Does the public care... |
Science | ||
Methodisch inkorrekt!
Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle... |
Entertainment | ||
Methodisch inkorrekt! (Live-Stream)
### LIVE-STREAM ### Nicolas Wöhrl und Reinhard Remfort sprechen über... |
Entertainment |
|
|
Microsofts Windows 10 Botnet
Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von... |
Security | ||
Mobile Censorship in Iran
As Internet users increasingly connect to the Internet through smartphones,... |
Ethics, Society & Politics | ||
My Robot Will Crush You With Its Soft Delicate Hands!
In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take... |
Hardware & Making | ||
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil... |
Ethics, Society & Politics | ||
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
Is your email being sent in the clear? While PGP and S/MIME provide... |
Security | ||
Net Neutrality in Europe
After two years the fight for net neutrality in Europe about the Telecom... |
Ethics, Society & Politics | ||
Netzpolitik in der Schweiz
2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn... |
CCC | ||
New memory corruption attacks: why can't we have nice things?
Memory corruption is an ongoing problem and in past years we have both... |
Security | ||
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
Im März 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt,... |
Ethics, Society & Politics | ||
On Computing Numbers, with an Application to Problems of our Society
Journalists, while structurally and economically under threat, are bringing... |
Ethics, Society & Politics | ||
One year of securitarian drift in France
Earlier this year, following the tragic events of early January in Paris, the... |
Ethics, Society & Politics | ||
Opening Event
|
CCC | ||
PLC-Blaster
Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann... |
Security | ||
Plunge into Proxy Politics
During this lecture presentation, Boaz Levin and Vera Tollmann, co-founders... |
Art & Culture | ||
PQCHacks
<p>Last year your friend Karen joined the alternative music scene and sent... |
Security | ||
Predicting Crime in a Big Data World
Yearly, the world is inundated with news about government data collection... |
Ethics, Society & Politics | ||
Prediction and Control
Mass quantities of data are being incorporated into predictive systems in an... |
Ethics, Society & Politics | ||
Profiling (In)justice
This talk will focus on the potential ability of data disaggregated by race... |
Ethics, Society & Politics | ||
Public Library/Memory of the World
Public Library is the synergy of two efforts. First, it makes the case for... |
Art & Culture | ||
QRtistry
QR codes have rapidly overtaken rival 2D bar code symbologies and are... |
Art & Culture | ||
Quantenphysik und Kosmologie
Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig... |
Science | ||
Quantum Cryptography
I will entertain the audience with a science talk about quantum cryptography,... |
Science | ||
rad1o++
News about the rad1o half a year later – cool stuff that happened, and why... |
Hardware & Making | ||
Replication Prohibited
Physical keys and locks are one of the oldest security mechanisms still... |
Hardware & Making | ||
Reversing UEFI by execution
This talk will be an overview of how to reverse-engineer Unified Extensible... |
Security | ||
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
The REXUS/BEXUS programme allows students from universities and higher... |
Science | ||
re_cycle
How can be 3d printing a dual use technology? Print more things, produce less... |
Hardware & Making | ||
Rowhammer.js: Root privileges for web apps?
"Insanity: doing the same thing over and over again and expecting different... |
Security | ||
Running your own 3G/3.5G network
Seven years after presenting „running your own GSM network“, we are back... |
Security | ||
Safe Harbor
Introduction and consequences of the CJEU's "Safe Harbor" ruling, to ... |
Ethics, Society & Politics | ||
Sanitizing PCAPs
Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able... |
Security | ||
Say hi to your new boss: How algorithms might soon control our lives.
Algorithms and „big data“ penetrate many aspects of our lives today. In the... |
Science | ||
Security Nightmares 0x10
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
CCC | ||
Shooting lasers into space – for science!
Light of astronomical objects gets distorted as it passes earth’s atmosphere.... |
Science | ||
Shopshifting
Payment systems are old and have – unlike card protocols – seen little... |
Security | ||
Sicherheit von 125kHz Transpondern am Beispiel Hitag S
Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt.... |
Security | ||
Sin in the time of Technology
Technology companies now hold an unprecedented ability to shape the world... |
Ethics, Society & Politics | ||
Software and business method patents: call for action
Ten years after the rejection of the European software patent directive by... |
Ethics, Society & Politics | ||
So you want to build a satellite?
CubeSat are small standardized satellites typically flown as secondary and... |
Hardware & Making | ||
State of the Onion
Major changes are underway in the Tor Project, the Tor Network, and the Tor... |
Ethics, Society & Politics | ||
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein... |
Ethics, Society & Politics | ||
Stromtankstellen – eine neue öffentliche Infrastruktur
Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen.... |
Hardware & Making | ||
Technology and Mass Atrocity Prevention
This lecture will give an overview on how technology can help and is helping... |
Ethics, Society & Politics | ||
Ten years after ‚We Lost The War‘
The talk „We Lost The War“ was presented at Congress ten years ago, causing... |
Ethics, Society & Politics | ||
The architecture of a street level panopticon
Street level surveillance technology, such as surveillance cameras and iris... |
Ethics, Society & Politics | ||
The exhaust emissions scandal („Dieselgate“)
Analysis of the emission scandal shaking the German automotive industry from... |
Ethics, Society & Politics | ||
The Great Train Cyber Robbery
For years SCADA StrangeLove team speaks about vulnerabilities in Industrial... |
Security | ||
The Magic World of Searchable Symmetric Encryption
In the last couple of years, cloud and web services have become more and more... |
Science | ||
The mummy unwrapped
Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete... |
Art & Culture | ||
The Perl Jam 2
tl;dr EXPLOIT ALL THE PERL. AGAIN. After last year’s Perl crackdown, I... |
Security | ||
The plain simple reality of entropy
Entropy, the randomness used in many critical cryptography processes... |
Security | ||
the possibility of an army
Using follower bombing as art performances, the artists Constant Dullaart... |
Art & Culture | ||
The Price Of Dissent
CAGE exists to highlight abuses of the War on Terror. It has uncovered many... |
Ethics, Society & Politics | ||
The state of Internet Censorship
The techniques to control access to the Internet, and the ability to bring... |
Ethics, Society & Politics | ||
The Ultimate Amiga 500 Talk
The Amiga was one of the most powerful and wide srpead computers in the late... |
Hardware & Making | ||
Thunderstrike 2
Last year at 31c3 we disclosed <a... |
Security | ||
Top X* usability obstacles
What do you want? Did you build your web/app for humans or NSA robots? Let's... |
Failosophy | ||
Tor onion services: more useful than you think
We'll update you on what's going on with Tor onion services, aka Tor hidden... |
Security | ||
Towards (reasonably) trustworthy x86 laptops
Can we build trustworthy client systems on x86 hardware? What are the main... |
Security | ||
Trust us and our business will expand!
The lecture outlines strategies by the "Artist against 419" online community... |
Art & Culture | ||
Unpatchable
Gradually we are all becoming more and more dependent on machines, we will be... |
Security | ||
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und... |
Security | ||
Vector retrogaming
In this talk I'll show how to build an open source vector gaming system with... |
Hardware & Making | ||
Vehicle2Vehicle Communication based on IEEE 802.11p
This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the... |
Hardware & Making | ||
Verified Firewall Ruleset Verification
We develop a tool to verify Linux netfilter/iptables firewalls rulesets.... |
Science | ||
What does Big Brother see, while he is watching?
In the past years there has been a lot of discussion on the topic of state... |
Art & Culture | ||
What is the value of anonymous communication?
What does the fact that Tor users can’t edit wikipedia mean for the quality... |
Science | ||
When algorithms fail in our personal lives
„Social Media Break Up Coordinator“ is a performance art piece and lecture... |
Art & Culture | ||
When hardware must „just work“
Software design and testing is hard, but what happens when each bug fix can... |
Failosophy | ||
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch... |
Ethics, Society & Politics | ||
Wie man einen Blackout verursacht
Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der... |
Science | ||
Windows drivers attack surface
This presentation covers windows kernel driver security issues. It'll discuss... |
Security | ||
Wireless Drivers: Freedom considered harmful?
A review/rant about the progress that free software wireless drivers... |
Hardware & Making |