Version BAD NETWORK/FIREWALL

Events

CCC

  Title Track Speakers
Event small
33C3 Closing Ceremony
CCC
Event small
33C3 Infrastructure Review
NOC, POC, VOC and QOC show interesting facts and figures as an excuse to...
CCC
Event small
33C3 Opening Ceremony
CCC
Pesthoernchenfrei
CCC-Jahresrückblick 2016
Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club...
CCC
Event small
Kampf dem Abmahnunwesen
Im Spannungsfeld zwischen der Vorderfront der Computertechnik und einem...
CCC
Ynmibw c
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Ynmibw c
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Ynmibw c
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Buepf tux
Netzpolitik in der Schweiz 2016
Ein Überblick zur netzpolitischen Situation in der Schweiz. Wir geben einen...
CCC
Ew logo farbe l
Netzpolitik in Österreich
Die Netzpolitik der österreichischen Bundesregierung hat sich im Jahr 2016...
CCC
Event small
Security Nightmares 0x11
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
CCC
Cms logo
Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule
Die Lebenswelt von Kindern und Jugendlichen sowie die der Schulen könnte in...
CCC

Ethics, Society & Politics

  Title Track Speakers
Event small
3 Years After Snowden: Is Germany fighting State Surveillance?
Germany has a good reputation for strong data protection. It also features...
Ethics, Society & Politics
Icon 1294811 640
A world without blockchain
Instant money transfer, globally without borders and 24/7. That’s one of the...
Ethics, Society & Politics
Logo
Berechnete Welt
Wer all unsere Daten der Gegenwart mit selbstlernenden Algorithmen auswertet,...
Ethics, Society & Politics
Logo
Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
Auf der Hoaxmap werden seit vergangenem Februar Gerüchte über Geflüchtete und...
Ethics, Society & Politics
Event small
Check Your Police Record!
Polizeibehörden und Geheimdienste sammeln Daten der Bürger – mehr als je...
Ethics, Society & Politics
Brace2big
Copywrongs 2.0
EU copyright reform plans threaten freedom of expression: Commissioner...
Ethics, Society & Politics
Event small
Corporate surveillance, digital tracking, big data & privacy
Today virtually everything we do is monitored in some way. The collection,...
Ethics, Society & Politics
33c3 vortrag logo 2
Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
Ziel des Vortrages ist es, einen Überblick über die neuen aus der...
Ethics, Society & Politics
Event small
Der 33 Jahrerückblick
The proper relationship of technology and politics have been the subject of...
Ethics, Society & Politics
Event small
Dieselgate – A year later
At 32C3 we gave an overview on the organizational and technical aspects of...
Ethics, Society & Politics
Event small
Die Sprache der Populisten
Mit dem Erstarken der Rechtspopulisten (nicht nur in Deutschland) werden...
Ethics, Society & Politics
Event small
Durchmarsch von Rechts
Seit einigen Jahren formieren sich am rechten Rand der Gesellschaft...
Ethics, Society & Politics
Event small
Ethics in the data society
This talk presents the idea that ethics as logic that can be programmed into...
Ethics, Society & Politics
C3
Geolocation methods in mobile networks
This talk presents the results of the technical analysis for the German...
Ethics, Society & Politics
Event small
Hacking the World
In this lecture I wish to reflect on the maturation of the security and...
Ethics, Society & Politics
Event small
Haft für Whistleblower?
Der neue Straftatbestand der Datenhehlerei gem. § 202d StGB kriminalisiert...
Ethics, Society & Politics
Event small
International exchange of tax information
The Common Reporting Standard is a multinational agreement signed by more...
Ethics, Society & Politics
Event small
Irren ist staatlich
Dieses Jahr feiert das Informationsfreiheitsgesetz (IFG) seinen zehnten...
Ethics, Society & Politics
Event small
Law Enforcement Are Hacking the Planet
In early 2015, the Federal Bureau of Investigation hacked computers in...
Ethics, Society & Politics
Logo nl
Liberté, Égalité, Fraternité... and privacy ?!
France is under a state of emergency since November 2015. Several laws and a...
Ethics, Society & Politics
Dream machine cutout
Machine Dreams
Artificial Intelligence provides a conceptual framework to understand mind...
Ethics, Society & Politics
Savedtheinternet
Make the Internet Neutral Again
After three years the EU has for the first time new Net Neutrality rules....
Ethics, Society & Politics
Event small
Million Dollar Dissidents and the Rest of Us
In August 2016, Apple issued updates to iOS and macOS that patched three...
Ethics, Society & Politics
Event small
No Love for the US Gov.
Lauri Love has never set foot in the United States, yet he is facing a...
Ethics, Society & Politics
Event small
Privatisierung der Rechtsdurchsetzung
2016 drehte der Anti-Terror-Kampf in der EU auf. Nicht nur im Rahmen der...
Ethics, Society & Politics
Img 3259
Rebel Cities
Cities are emerging as a space for local action and local change but also as...
Ethics, Society & Politics
Rz lego techy quad
Routerzwang und Funkabschottung
Nach drei Jahren wurde endlich die nutzerunfreundliche Praxis des...
Ethics, Society & Politics
Event small
Software Defined Emissions
A technical talk on how to reverse-engineer electronic control units in order...
Ethics, Society & Politics
Spiegelmining logo ccc
SpiegelMining – Reverse Engineering von Spiegel-Online
Seit Mitte 2014 hat David fast 100.000 Artikel von Spiegel-Online...
Ethics, Society & Politics
Sick 2016
State of Internet Censorship 2016
2016 has been marked by major shifts in political policy towards the Internet...
Ethics, Society & Politics
Event small
Stopping law enforcement hacking
We didn’t win the second crypto wars. Governments merely made a strategic...
Ethics, Society & Politics
Tsa2
Syrian Archive
Journalists and human rights groups need to find and use verified visual...
Ethics, Society & Politics
Event small
Technologien für und wider Digitale Souveränität
''Technologien für und wider Digitale Souveränität'' Die weltweite...
Ethics, Society & Politics
Event small
The Economic Consequences of Internet Censorship
Internet censorship today is widespread, both by governments and by private...
Ethics, Society & Politics
Encryptionlogo
The Fight for Encryption in 2016
Both strong end-to-end communications encryption and device encryption are...
Ethics, Society & Politics
Event small
The Global Assassination Grid
As they say in the Air Force, ‚No comms no bombs‘, – A technician’s insight...
Ethics, Society & Politics
Event small
The High Priests of the Digital Age
The High Priests of the Digital Age Are Working Behind Your Back to Make You...
Ethics, Society & Politics
Event small
The Transhumanist Paradox
How does a pluralist society – a society built to accommodate our...
Ethics, Society & Politics
Event small
The Untold Story of Edward Snowden’s Escape from Hong Kong
On June 9, 2013, Edward Snowden revealed massive civil rights abuses by the...
Ethics, Society & Politics
Event small
Understanding the Snooper’s Charter
The ‚Investigative Powers Bill‘ is about to become law in the UK. Its...
Ethics, Society & Politics
Logo
Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
Wie würdigen verschiedene Tech-Communities das ehrenamtliche Engagement ihrer...
Ethics, Society & Politics
Event small
Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
Der Vortrag stellt die in Deutschland zulässigen Überwachungsmaßnahmen des...
Ethics, Society & Politics
Event small
Woolim – Lifting the Fog on DPRK’s Latest Tablet PC
Last year we have been talking about DPRK’s operating system Red Star OS and...
Ethics, Society & Politics

Art & Culture

  Title Track Speakers
Event small
A Data Point Walks Into a Bar
tl;dr: Mother Teresa said "If I look at the mass I will never act. If I look...
Art & Culture
Event small
A New Dark Age
James Bridle is a British writer and artist living in Greece. His work...
Art & Culture
1   960
Anthropology for kids - What is privacy?
I would like to present my project called Anthropology for kids and a...
Art & Culture
Event small
Community
Mitch Altman (born December 22, 1956) is a San Francisco-based hacker and...
Art & Culture
Event small
DIE NSU-MONOLOGE / NSU-MONOLOGLARI
Der Kampf der Hinterbliebenen um die Wahrheit --- Geride kalanların...
Art & Culture
Event small
From Server Farm to Data Table
Early digital computers were the size of rooms. While the devices have...
Art & Culture
Event small
Hacking Reality
Inspired by a long history of bold reality hacks this talk considers the...
Art & Culture
Event small
JODI - Apache is functioning normally
Joan Heemskerk and Dirk Paesmans, collectively known as JODI, are rightfully...
Art & Culture
Logo
Keys of Fury
Keys Of Fury is a brutalist storytelling about technology and keystrokes...
Art & Culture
50mu
Retail Surveillance / Retail Countersurveillance
From geo-magnetic tracking for smartphones to facial recognition for email...
Art & Culture
Event small
Surveilling the surveillers
In the last years, technology-savvy artists and technologists have taken over...
Art & Culture
Talk
The 12 Networking Truths
In *The 12 Networking Truths* Swedish artist Jonas Lund will discuss how he...
Art & Culture
Event small
The Clash of Digitalizations
This talk discusses the representation of Arab males in video games and the...
Art & Culture
Event small
Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern
Art & Culture

Security

  Title Track Speakers
Untitled
A look into the Mobile Messaging Black Box
Most of us use mobile messaging every day. We use certain apps that we chose...
Security
Event small
ATMs how to break them to stop the fraud
How to stop the ATMs fraud? How to protect ATMs from attacks such as black...
Security
28070128343 d6c0b5497c k
Bootstraping a slightly more secure laptop
Heads is an open source custom firmware and OS configuration for laptops and...
Security
Event small
Build your own NSA
When thinking about surveillance, everyone worries about government agencies...
Security
Event small
Code BROWN in the Air
The talk is about the paging system, an old technology in the 90's, used in...
Security
Event small
Console Hacking 2016
Last year, we demonstrated Linux running on the PS4 in a lightning talk -...
Security
Screen shot 2016 09 29 at 12.19.54 pm
Decoding the LoRa PHY
LoRa is an emerging Low Power Wide Area Network, a new class of wireless...
Security
Event small
Deploying TLS 1.3: the great, the good and the bad
Transport Layer Security (TLS) 1.3 is almost here. The protocol that protects...
Security
Event small
Dissecting modern (3G/4G) cellular modems
Let's have a detailed look at some modern 3G/4G cellular modems and see what...
Security
Logo2
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
Input/Output is the mechanisms through which embedded systems interact and...
Security
Event small
Downgrading iOS: From past to present
This talk is about the iOS secure boot chain and how it changed throughout...
Security
Blockchain small
Einführung zu Blockchains
Blockchain ist die Technologie welche moderne Kryptowährungen ermöglicht. In...
Security
Event small
Everything you always wanted to know about Certificate Transparency
Certificate transparency - what is it, and what can be done with it?
Security
Event small
Exploiting PHP7 unserialize
PHP-7 is a new version of the most prevalent server-side language in use...
Security
687474703a2f2f692e696d6775722e636f6d2f6f65506e484a6e2e6a7067
Gone in 60 Milliseconds
<p>More and more businesses are moving away from monolithic servers and...
Security
Event small
How Do I Crack Satellite and Cable Pay TV?
Follow the steps taken to crack a conditional access and scrambling system...
Security
Event small
How do we know our PRNGs work properly?
Pseudo-random number generators (PRNGs) are critical pieces of...
Security
Logointercom
Intercoms Hacking
<p>To break into a building, several methods have already been discussed,...
Security
Memdedup logo
Memory Deduplication: The Curse that Keeps on Giving
We are 4 security researchers who have collectively worked on 3 different...
Security
Game over 1
Nintendo Hacking 2016
This talk will give a unique insight of what happens when consoles have been...
Security
Event small
On Smart Cities, Smart Energy, And Dumb Security
Smart City is an abstract concept everyone talks about but no one knows what...
Security
Event small
On the Security and Privacy of Modern Single Sign-On in the Web
<p>Many web sites allow users to log in with their Facebook or Google...
Security
15319353 1203772349660451 127043702 n
Pegasus internals
This talk will take an in-depth look at the technical capabilities and...
Security
Icon
Predicting and Abusing WPA2/802.11 Group Keys
We analyze the generation and management of WPA2 group keys. These keys...
Security
R2big
radare demystified
radare is a libre framework and a set of tools to ease several tasks related...
Security
Event small
Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
The 2016 U.S. presidential election was preceded by unprecedented...
Security
Cube flat money square
Shut Up and Take My Money!
FinTechs increasingly cut the ground from under long-established banks’ feet....
Security
Dog
Talking Behind Your Back
In the last two years, the marketing industry started to show a fast...
Security
Event small
Tapping into the core
Engaging universally available deep debug functionality of modern Intel...
Security
Drown logo
The DROWN Attack
We present DROWN, a novel cross-protocol attack on TLS that uses a server...
Security
Event small
Untrusting the CPU
It is a sad fact of reality that we can no longer trust our CPUs to only run...
Security
Event small
Virtual Secure Boot
Over the last two years secure boot support for virtual machines was added to...
Security
Event small
Visiting The Bear Den
Sednit, a.k.a Fancy Bear/APT28/Sofacy, is a group of attackers operating...
Security
Event small
What could possibly go wrong with <insert x86 instruction here>?
Hardware is often considered as an abstract layer that behaves correctly,...
Security
Tarot wheel of fortune
Wheel of Fortune
Secure random number generators play a crucial role in the wider security...
Security
Event small
Where in the World Is Carmen Sandiego?
Travel booking systems are among the oldest global IT infrastructures, and...
Security
Event small
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
In this talk we will explore and present various IPv6 scanning techniques...
Security

Space

  Title Track Speakers
Space elevator square
An Elevator to the Moon (and back)
Why is it so hard to go to the Moon? The curse of Newtonian Mechanics and...
Space
Photo
Eavesdropping on the Dark Cosmos
Imagine, there is this huge data center but your user privileges allow you to...
Space
640px spacecolony1
Interplanetary Colonization
The long term survival of the human species requires that we become an...
Space
Event small
Lasers in the sky (with asteroids)
At 32C3 we shot lasers into space... now it's lasers in space! We look at...
Space
Moon
The Moon and European Space Exploration
Since the early successes of moon missions in the Sixtie, mankind has moved...
Space
Hudf
The Universe Is, Like, Seriously Huge
Astronomers struggle to accurately measure distances in the vastness of the...
Space

Science

  Title Track Speakers
Bias
A Story of Discrimination and Unfairness
Artificial intelligence and machine learning are in a period of astounding...
Science
Slice
Beyond Virtual and Augmented Reality
With recent development in capture technology, preserving one's’ daily...
Science
Logo talk 33c3
Es sind die kleinen Dinge im Leben
Jeder weiß ungefähr was ein Mikroskop ist und vielleicht hat man auch mal...
Science
Event small
Genetic Codes and what they tell us – and everyone else
The genome – the final frontier – or just a complex mess of letters?...
Science
Event small
Hacking collective as a laboratory
Talk presents findings from sociological investigation on hacking...
Science
Logo full 350
How physicists analyze massive data: LHC + brain + ROOT = Higgs
Physicists are not computer scientists. But at CERN and worldwide, they need...
Science
Event small
In Search of Evidence-Based IT-Security
Applied IT security is largely a science-free field. The IT-Security industry...
Science
Event small
PUFs, protection, privacy, PRNGs
A physically unclonable function, or PUF, is some physical structure with...
Science
Event small
Saving the World with (Vegan) Science
Describing the science behind new high tech vegan foods which will replace...
Science
Rundgaenge001 detail thump
Space making/space shaping
What are the politics and aesthetics of mapping? An introduction how...
Science
Secret communication system
The woman behind your WiFi
Used in cell phone technology, bluetooth devices, and WiFi, Frequency Hopping...
Science
Zcash
The Zcash anonymous cryptocurrency
Zcash is the third iteration of an extension to the Bitcoin protocol that...
Science
Event small
Welcome to the Anthropocene?
The Anthropocene is widely understood to mean the current <em>&quot;period of...
Science
Screen shot 2016 09 28 at 11.29.27
What's It Doing Now?
Legend has it that most airline pilots will at one time have uttered the...
Science
Bildschirmfoto 2016 09 28 um 15.05.17
What We Can Learn about Creativity from 3D Printing
For the past three years we studied the world’s largest 3D printing community...
Science

Hardware & Making

  Title Track Speakers
Xtrx in hands
Building a high throughput low-latency PCIe based SDR
Software Defined Radios (SDRs) became a mainstream tool for wireless...
Hardware & Making
4412754
Building Custom Pinball Machines
How to build a pinball machine? We introduce you to all basics and explain...
Hardware & Making
Event small
Dissecting HDMI
Ever wondered what is actually happening when a speaker can't get their...
Hardware & Making
Image
Edible Soft Robotics
As a soft roboticist I am constantly searching for inspiration for novel soft...
Hardware & Making
Event small
Formal Verification of Verilog HDL with Yosys-SMTBMC
Yosys is a free and open source Verilog synthesis tool and more. It gained...
Hardware & Making
Event small
Hochsicherheits-Generalschlüssel Marke Eigenbau
Die Verfügbarkeit preiswerter Maschinentechnik und Open Source CAD-Software...
Hardware & Making
Event small
Lockpicking in the IoT
"Smart" devices using BTLE, a mobile phone and the Internet are becoming more...
Hardware & Making
Event small
Make Wi-Fi fast again
Mit steigendem Datenaufkommen und einer immer größer werdenden Zahl von...
Hardware & Making
Event small
Making Technology Inclusive Through Papercraft and Sound
The participation of women in computer education is low; undergraduate...
Hardware & Making
Event small
No USB? No problem.
How to get USB running on an ARM microcontroller that has no built in USB...
Hardware & Making
Event small
Reverse engineering Outernet
<a href="https://outernet.is">Outernet</a> is a company whose goal is to ease...
Hardware & Making
14726308 1208926132479694 5138167602106859520 n
Searchwing - Mit Drohnen leben retten
Refugees are dying in the Mediterranean Sea. Thousands of them. We are...
Hardware & Making
Messowires
Shining some light on the Amazon Dash button
This talk will explore the hard- and software of the Amazon Dash button.
Hardware & Making
Logo3
SpinalHDL : An alternative hardware description language
Since too long we use VHDL and Verilog to describe hardware. SpinalHDL is an...
Hardware & Making
Nibbletronic
The Nibbletronic
The NibbleTronic is a MIDI wind controller that features a novel user...
Hardware & Making
Screen shot 2016 09 29 at 7.31.41 am
The Ultimate Game Boy Talk
The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more...
Hardware & Making

Entertainment

  Title Track Speakers
Brawl
Eine kleine Geschichte der Parlamentsschlägerei
Der Vortrag gibt einen Abriss über die Geschichte der Parlamentsschlägerei,...
Entertainment
Logo
Fnord-Jahresrückblick
Wenn mal wieder der Zensor pinkeln war, wenn DAMIT ja wohl NIEMAND rechnen...
Entertainment
Event small
Fnord-Jahresrückblick: Stream
Entertainment
Hebocon logo
Hebocon
Join with your derpy bot to fight your nemesis! Push it off the table or...
Entertainment
Logopodcast
Methodisch inkorrekt!
Wer hat diese Jungs wieder reingelassen?! Nicolas Wöhrl und Reinhard Remfort...
Entertainment
Event small
Methodisch inkorrekt! Stream
Entertainment
Event small
Nicht öffentlich.
Der NSA-Untersuchungsausschuss im Bundestag soll aufklären, was die NSA in...
Entertainment

Archived page - Impressum/Datenschutz