Version BAD NETWORK/FIREWALL
Events
CCC
Title | Track | Speakers | |
---|---|---|---|
33C3 Closing Ceremony
|
CCC | ||
33C3 Infrastructure Review
NOC, POC, VOC and QOC show interesting facts and figures as an excuse to... |
CCC | ||
33C3 Opening Ceremony
|
CCC | ||
CCC-Jahresrückblick 2016
Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club... |
CCC | ||
Kampf dem Abmahnunwesen
Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem... |
CCC | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Netzpolitik in der Schweiz 2016
Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen... |
CCC | ||
Netzpolitik in Österreich
Die Netzpolitik der österreichischen Bundesregierung hat sich im Jahr 2016... |
CCC | ||
Security Nightmares 0x11
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
CCC | ||
Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule
Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in... |
CCC |
Ethics, Society & Politics
Title | Track | Speakers | |
---|---|---|---|
3 Years After Snowden: Is Germany fighting State Surveillance?
Germany has a good reputation for strong data protection. It also features... |
Ethics, Society & Politics | ||
A world without blockchain
Instant money transfer, globally without borders and 24/7. That’s one of the... |
Ethics, Society & Politics | ||
Berechnete Welt
Wer all unsere Daten der Gegenwart mit selbstlernenden Algorithmen auswertet,... |
Ethics, Society & Politics | ||
Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und... |
Ethics, Society & Politics | ||
Check Your Police Record!
Polizeibehörden und Geheimdienste sammeln Daten der Bürger – mehr als je... |
Ethics, Society & Politics | ||
Copywrongs 2.0
EU copyright reform plans threaten freedom of expression: Commissioner... |
Ethics, Society & Politics | ||
Corporate surveillance, digital tracking, big data & privacy
Today virtually everything we do is monitored in some way. The collection,... |
Ethics, Society & Politics | ||
Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
Ziel des Vortrages ist es, einen Überblick über die neuen aus der... |
Ethics, Society & Politics | ||
Der 33 Jahrerückblick
The proper relationship of technology and politics have been the subject of... |
Ethics, Society & Politics | ||
Dieselgate – A year later
At 32C3 we gave an overview on the organizational and technical aspects of... |
Ethics, Society & Politics | ||
Die Sprache der Populisten
Mit dem Erstarken der Rechtspopulisten (nicht nur in Deutschland) werden... |
Ethics, Society & Politics | ||
Durchmarsch von Rechts
Seit einigen Jahren formieren sich am rechten Rand der Gesellschaft... |
Ethics, Society & Politics | ||
Ethics in the data society
This talk presents the idea that ethics as logic that can be programmed into... |
Ethics, Society & Politics | ||
Geolocation methods in mobile networks
This talk presents the results of the technical analysis for the German... |
Ethics, Society & Politics | ||
Hacking the World
In this lecture I wish to reflect on the maturation of the security and... |
Ethics, Society & Politics | ||
Haft für Whistleblower?
Der neue Straftatbestand der Datenhehlerei gem. § 202d StGB kriminalisiert... |
Ethics, Society & Politics | ||
International exchange of tax information
The Common Reporting Standard is a multinational agreement signed by more... |
Ethics, Society & Politics | ||
Irren ist staatlich
Dieses Jahr feiert das Informationsfreiheitsgesetz (IFG) seinen zehnten... |
Ethics, Society & Politics | ||
Law Enforcement Are Hacking the Planet
In early 2015, the Federal Bureau of Investigation hacked computers in... |
Ethics, Society & Politics | ||
Liberté, Égalité, Fraternité... and privacy ?!
France is under a state of emergency since November 2015. Several laws and a... |
Ethics, Society & Politics | ||
Machine Dreams
Artificial Intelligence provides a conceptual framework to understand mind... |
Ethics, Society & Politics | ||
Make the Internet Neutral Again
After three years the EU has for the first time new Net Neutrality rules.... |
Ethics, Society & Politics | ||
Million Dollar Dissidents and the Rest of Us
In August 2016, Apple issued updates to iOS and macOS that patched three... |
Ethics, Society & Politics | ||
No Love for the US Gov.
Lauri Love has never set foot in the United States, yet he is facing a... |
Ethics, Society & Politics | ||
Privatisierung der Rechtsdurchsetzung
2016 drehte der Anti-Terror-Kampf in der EU auf. Nicht nur im Rahmen der... |
Ethics, Society & Politics | ||
Rebel Cities
Cities are emerging as a space for local action and local change but also as... |
Ethics, Society & Politics | ||
Routerzwang und Funkabschottung
Nach drei Jahren wurde endlich die nutzerunfreundliche Praxis des... |
Ethics, Society & Politics | ||
Software Defined Emissions
A technical talk on how to reverse-engineer electronic control units in order... |
Ethics, Society & Politics | ||
SpiegelMining – Reverse Engineering von Spiegel-Online
Seit Mitte 2014 hat David fast 100.000 Artikel von Spiegel-Online... |
Ethics, Society & Politics | ||
State of Internet Censorship 2016
2016 has been marked by major shifts in political policy towards the Internet... |
Ethics, Society & Politics | ||
Stopping law enforcement hacking
We didn’t win the second crypto wars. Governments merely made a strategic... |
Ethics, Society & Politics | ||
Syrian Archive
Journalists and human rights groups need to find and use verified visual... |
Ethics, Society & Politics | ||
Technologien für und wider Digitale Souveränität
''Technologien für und wider Digitale Souveränität'' Die weltweite... |
Ethics, Society & Politics | ||
The Economic Consequences of Internet Censorship
Internet censorship today is widespread, both by governments and by private... |
Ethics, Society & Politics | ||
The Fight for Encryption in 2016
Both strong end-to-end communications encryption and device encryption are... |
Ethics, Society & Politics | ||
The Global Assassination Grid
As they say in the Air Force, ‚No comms no bombs‘, – A technician’s insight... |
Ethics, Society & Politics | ||
The High Priests of the Digital Age
The High Priests of the Digital Age Are Working Behind Your Back to Make You... |
Ethics, Society & Politics | ||
The Transhumanist Paradox
How does a pluralist society – a society built to accommodate our... |
Ethics, Society & Politics | ||
The Untold Story of Edward Snowden’s Escape from Hong Kong
On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the... |
Ethics, Society & Politics | ||
Understanding the Snooper’s Charter
The ‚Investigative Powers Bill‘ is about to become law in the UK. Its... |
Ethics, Society & Politics | ||
Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
Wie würdigen verschiedene Tech-Communities das ehrenamtliche Engagement ihrer... |
Ethics, Society & Politics | ||
Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
Der Vortrag stellt die in Deutschland zulässigen Überwachungsmaßnahmen des... |
Ethics, Society & Politics | ||
Woolim – Lifting the Fog on DPRK’s Latest Tablet PC
Last year we have been talking about DPRK’s operating system Red Star OS and... |
Ethics, Society & Politics |
Art & Culture
Title | Track | Speakers | |
---|---|---|---|
A Data Point Walks Into a Bar
tl;dr: Mother Teresa said "If I look at the mass I will never act. If I look... |
Art & Culture | ||
A New Dark Age
James Bridle is a British writer and artist living in Greece. His work... |
Art & Culture | ||
Anthropology for kids - What is privacy?
I would like to present my project called Anthropology for kids and a... |
Art & Culture | ||
Community
Mitch Altman (born December 22, 1956) is a San Francisco-based hacker and... |
Art & Culture | ||
DIE NSU-MONOLOGE / NSU-MONOLOGLARI
Der Kampf der Hinterbliebenen um die Wahrheit --- Geride kalanların... |
Art & Culture | ||
From Server Farm to Data Table
Early digital computers were the size of rooms. While the devices have... |
Art & Culture | ||
Hacking Reality
Inspired by a long history of bold reality hacks this talk considers the... |
Art & Culture | ||
JODI - Apache is functioning normally
Joan Heemskerk and Dirk Paesmans, collectively known as JODI, are rightfully... |
Art & Culture | ||
Keys of Fury
Keys Of Fury is a brutalist storytelling about technology and keystrokes... |
Art & Culture | ||
Retail Surveillance / Retail Countersurveillance
From geo-magnetic tracking for smartphones to facial recognition for email... |
Art & Culture | ||
Surveilling the surveillers
In the last years, technology-savvy artists and technologists have taken over... |
Art & Culture | ||
The 12 Networking Truths
In *The 12 Networking Truths* Swedish artist Jonas Lund will discuss how he... |
Art & Culture | ||
The Clash of Digitalizations
This talk discusses the representation of Arab males in video games and the... |
Art & Culture | ||
Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern
|
Art & Culture |
Security
Title | Track | Speakers | |
---|---|---|---|
A look into the Mobile Messaging Black Box
Most of us use mobile messaging every day. We use certain apps that we chose... |
Security | ||
ATMs how to break them to stop the fraud
How to stop the ATMs fraud? How to protect ATMs from attacks such as black... |
Security | ||
Bootstraping a slightly more secure laptop
Heads is an open source custom firmware and OS configuration for laptops and... |
Security | ||
Build your own NSA
When thinking about surveillance, everyone worries about government agencies... |
Security | ||
Code BROWN in the Air
The talk is about the paging system, an old technology in the 90's, used in... |
Security | ||
Console Hacking 2016
Last year, we demonstrated Linux running on the PS4 in a lightning talk -... |
Security | ||
Decoding the LoRa PHY
LoRa is an emerging Low Power Wide Area Network, a new class of wireless... |
Security | ||
Deploying TLS 1.3: the great, the good and the bad
Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects... |
Security | ||
Dissecting modern (3G/4G) cellular modems
Let's have a detailed look at some modern 3G/4G cellular modems and see what... |
Security | ||
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
Input/Output is the mechanisms through which embedded systems interact and... |
Security | ||
Downgrading iOS: From past to present
This talk is about the iOS secure boot chain and how it changed throughout... |
Security | ||
Einführung zu Blockchains
Blockchain ist die Technologie welche moderne Kryptowährungen ermöglicht. In... |
Security | ||
Everything you always wanted to know about Certificate Transparency
Certificate transparency - what is it, and what can be done with it? |
Security | ||
Exploiting PHP7 unserialize
PHP-7 is a new version of the most prevalent server-side language in use... |
Security | ||
Gone in 60 Milliseconds
<p>More and more businesses are moving away from monolithic servers and... |
Security | ||
How Do I Crack Satellite and Cable Pay TV?
Follow the steps taken to crack a conditional access and scrambling system... |
Security | ||
How do we know our PRNGs work properly?
Pseudo-random number generators (PRNGs) are critical pieces of... |
Security | ||
Intercoms Hacking
<p>To break into a building, several methods have already been discussed,... |
Security | ||
Memory Deduplication: The Curse that Keeps on Giving
We are 4 security researchers who have collectively worked on 3 different... |
Security | ||
Nintendo Hacking 2016
This talk will give a unique insight of what happens when consoles have been... |
Security | ||
On Smart Cities, Smart Energy, And Dumb Security
Smart City is an abstract concept everyone talks about but no one knows what... |
Security | ||
On the Security and Privacy of Modern Single Sign-On in the Web
<p>Many web sites allow users to log in with their Facebook or Google... |
Security | ||
Pegasus internals
This talk will take an in-depth look at the technical capabilities and... |
Security | ||
Predicting and Abusing WPA2/802.11 Group Keys
We analyze the generation and management of WPA2 group keys. These keys... |
Security | ||
radare demystified
radare is a libre framework and a set of tools to ease several tasks related... |
Security | ||
Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
The 2016 U.S. presidential election was preceded by unprecedented... |
Security | ||
Shut Up and Take My Money!
FinTechs increasingly cut the ground from under long-established banks’ feet.... |
Security | ||
Talking Behind Your Back
In the last two years, the marketing industry started to show a fast... |
Security | ||
Tapping into the core
Engaging universally available deep debug functionality of modern Intel... |
Security | ||
The DROWN Attack
We present DROWN, a novel cross-protocol attack on TLS that uses a server... |
Security | ||
Untrusting the CPU
It is a sad fact of reality that we can no longer trust our CPUs to only run... |
Security | ||
Virtual Secure Boot
Over the last two years secure boot support for virtual machines was added to... |
Security | ||
Visiting The Bear Den
Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers operating... |
Security | ||
What could possibly go wrong with <insert x86 instruction here>?
Hardware is often considered as an abstract layer that behaves correctly,... |
Security | ||
Wheel of Fortune
Secure random number generators play a crucial role in the wider security... |
Security | ||
Where in the World Is Carmen Sandiego?
Travel booking systems are among the oldest global IT infrastructures, and... |
Security | ||
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
In this talk we will explore and present various IPv6 scanning techniques... |
Security |
Space
Title | Track | Speakers | |
---|---|---|---|
An Elevator to the Moon (and back)
Why is it so hard to go to the Moon? The curse of Newtonian Mechanics and... |
Space | ||
Eavesdropping on the Dark Cosmos
Imagine, there is this huge data center but your user privileges allow you to... |
Space | ||
Interplanetary Colonization
The long term survival of the human species requires that we become an... |
Space | ||
Lasers in the sky (with asteroids)
At 32C3 we shot lasers into space... now it's lasers in space! We look at... |
Space | ||
The Moon and European Space Exploration
Since the early successes of moon missions in the Sixtie, mankind has moved... |
Space | ||
The Universe Is, Like, Seriously Huge
Astronomers struggle to accurately measure distances in the vastness of the... |
Space |
Science
Title | Track | Speakers | |
---|---|---|---|
A Story of Discrimination and Unfairness
Artificial intelligence and machine learning are in a period of astounding... |
Science | ||
Beyond Virtual and Augmented Reality
With recent development in capture technology, preserving one's’ daily... |
Science | ||
Es sind die kleinen Dinge im Leben
Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal... |
Science | ||
Genetic Codes and what they tell us – and everyone else
The genome – the final frontier – or just a complex mess of letters?... |
Science | ||
Hacking collective as a laboratory
Talk presents findings from sociological investigation on hacking... |
Science | ||
How physicists analyze massive data: LHC + brain + ROOT = Higgs
Physicists are not computer scientists. But at CERN and worldwide, they need... |
Science | ||
In Search of Evidence-Based IT-Security
Applied IT security is largely a science-free field. The IT-Security industry... |
Science | ||
PUFs, protection, privacy, PRNGs
A physically unclonable function, or PUF, is some physical structure with... |
Science | ||
Saving the World with (Vegan) Science
Describing the science behind new high tech vegan foods which will replace... |
Science | ||
Space making/space shaping
What are the politics and aesthetics of mapping? An introduction how... |
Science | ||
The woman behind your WiFi
Used in cell phone technology, bluetooth devices, and WiFi, Frequency Hopping... |
Science | ||
The Zcash anonymous cryptocurrency
Zcash is the third iteration of an extension to the Bitcoin protocol that... |
Science | ||
Welcome to the Anthropocene?
The Anthropocene is widely understood to mean the current <em>"period of... |
Science | ||
What's It Doing Now?
Legend has it that most airline pilots will at one time have uttered the... |
Science | ||
What We Can Learn about Creativity from 3D Printing
For the past three years we studied the world’s largest 3D printing community... |
Science |
Hardware & Making
Title | Track | Speakers | |
---|---|---|---|
Building a high throughput low-latency PCIe based SDR
Software Defined Radios (SDRs) became a mainstream tool for wireless... |
Hardware & Making | ||
Building Custom Pinball Machines
How to build a pinball machine? We introduce you to all basics and explain... |
Hardware & Making | ||
Dissecting HDMI
Ever wondered what is actually happening when a speaker can't get their... |
Hardware & Making | ||
Edible Soft Robotics
As a soft roboticist I am constantly searching for inspiration for novel soft... |
Hardware & Making | ||
Formal Verification of Verilog HDL with Yosys-SMTBMC
Yosys is a free and open source Verilog synthesis tool and more. It gained... |
Hardware & Making | ||
Hochsicherheits-Generalschlüssel Marke Eigenbau
Die Verfügbarkeit preiswerter Maschinentechnik und Open Source CAD-Software... |
Hardware & Making | ||
Lockpicking in the IoT
"Smart" devices using BTLE, a mobile phone and the Internet are becoming more... |
Hardware & Making | ||
Make Wi-Fi fast again
Mit steigendem Datenaufkommen und einer immer größer werdenden Zahl von... |
Hardware & Making | ||
Making Technology Inclusive Through Papercraft and Sound
The participation of women in computer education is low; undergraduate... |
Hardware & Making | ||
No USB? No problem.
How to get USB running on an ARM microcontroller that has no built in USB... |
Hardware & Making | ||
Reverse engineering Outernet
<a href="https://outernet.is">Outernet</a> is a company whose goal is to ease... |
Hardware & Making | ||
Searchwing - Mit Drohnen leben retten
Refugees are dying in the Mediterranean Sea. Thousands of them. We are... |
Hardware & Making | ||
Shining some light on the Amazon Dash button
This talk will explore the hard- and software of the Amazon Dash button. |
Hardware & Making | ||
SpinalHDL : An alternative hardware description language
Since too long we use VHDL and Verilog to describe hardware. SpinalHDL is an... |
Hardware & Making | ||
The Nibbletronic
The NibbleTronic is a MIDI wind controller that features a novel user... |
Hardware & Making | ||
The Ultimate Game Boy Talk
The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more... |
Hardware & Making |
Entertainment
Title | Track | Speakers | |
---|---|---|---|
Eine kleine Geschichte der Parlamentsschlägerei
Der Vortrag gibt einen Abriss über die Geschichte der Parlamentsschlägerei,... |
Entertainment | ||
Fnord-Jahresrückblick
Wenn mal wieder der Zensor pinkeln war, wenn DAMIT ja wohl NIEMAND rechnen... |
Entertainment | ||
Fnord-Jahresrückblick: Stream
|
Entertainment |
|
|
Hebocon
Join with your derpy bot to fight your nemesis! Push it off the table or... |
Entertainment | ||
Methodisch inkorrekt!
Wer hat diese Jungs wieder reingelassen?! Nicolas Wöhrl und Reinhard Remfort... |
Entertainment | ||
Methodisch inkorrekt! Stream
|
Entertainment |
|
|
Nicht öffentlich.
Der NSA-Untersuchungsausschuss im Bundestag soll aufklären, was die NSA in... |
Entertainment |