Version mkdir
Events by track
Security
Title | Track | Speakers | |
---|---|---|---|
15 Jahre deutsche Telematikinfrastruktur (TI)
Seit spätestens 2005 wird in Deutschland an der Einführung der Telematik... |
Security | ||
A Deep Dive Into Unconstrained Code Execution on Siemens S7 PLCs
A deep dive investigation into Siemens S7 PLCs bootloader and ADONIS... |
Security | ||
All wireless communication stacks are equally broken
Wireless connectivity is an integral part of almost any modern device. These... |
Security | ||
A systematic evaluation of OpenBSD's mitigations
OpenBSD markets itself as a secure operating system, but doesn't provide much... |
Security | ||
Boot2root
The Achilles heel of [your secure device] is the secure boot chain. In this... |
Security | ||
Breaking Microsoft Edge Extensions Security Policies
Browsers are the ones who handle our sensitive information. We entirely rely... |
Security | ||
Cryptography demystified
This talk will explain the basic building blocks of cryptography in a manner... |
Security | ||
Das nützlich-unbedenklich Spektrum
Eine Software ist unbedenklich, wenn man sie auf ungefilterte Daten aus einem... |
Security | ||
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
Ruckus Networks is a company selling wired and wireless networking equipment... |
Security | ||
Email Authentication for Penetration Testers
Forget look-alike domains, typosquatting and homograph attacks. In this talk... |
Security | ||
"Hacker hin oder her": Die elektronische Patientenakte kommt!
Herzstück der digitalen Gesundheitsversorgung für 73 Millionen Versicherte... |
Security | ||
Hacking Sony PlayStation Blu-ray Drives
Xbox 360 video game console had a number of widely known hacks for firmware... |
Security | ||
Hacking (with) a TPM
Trusted Platform Modules (TPMs) are nowadays included in all consumer-grade... |
Security | ||
Harry Potter and the Not-So-Smart Proxy War
In this talk we will take a look at the 'Vault 7' Protego documents, which... |
Security | ||
High-assurance crypto software
Software bugs and timing leaks have destroyed the security of every... |
Security | ||
Hirne Hacken
Die überwältigende Mehrheit der erfolgreichen Hacks in freier Wildbahn setzen... |
Security | ||
How to Break PDFs
PDF is the most widely used standard for office documents. Supported by many... |
Security | ||
I am system: breaking the security boundary in windows OS.
Nowadays, Windows is still the most popular OS used in the world. It's very... |
Security | ||
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
Low-power, single-purpose embedded devices (e.g., routers and IoT devices)... |
Security | ||
Intel Management Engine deep dive
Reverse engineering a system on a chip from sparse documentation and... |
Security | ||
It's not safe on the streets... especially for your 3DS!
The 3DS is reaching end of life but has not revealed all its weaknesses yet.... |
Security | ||
KTRW: The journey to build a debuggable iPhone
Development-fused iPhones with hardware debugging features like JTAG are out... |
Security | ||
Leaving legacy behind
Is the way we run services these days sustainable? The trusted computing base... |
Security | ||
Messenger Hacking: Remotely Compromising an iPhone through iMessage
So called “0-click” exploits, in which no user interaction is required to... |
Security | ||
No source, no problem! High speed binary fuzzing
Modern grey-box fuzzers are the most effective way of finding bugs in complex... |
Security | ||
On the insecure nature of turbine control systems in power generation
A deep dive into power generation process, industrial solutions and their... |
Security | ||
Plundervolt: Flipping Bits from Software without Rowhammer
We present the next step after Rowhammer, a new software-based fault attack... |
Security | ||
(Post-Quantum) Isogeny Cryptography
There are countless post-quantum buzzwords to list: lattices, codes,... |
Security | ||
Practical Cache Attacks from the Network and Bad Cat Puns
Our research shows that network-based cache side-channel attacks are a... |
Security | ||
Provable Insecurity
Cryptographic hash functions are everywhere, yet modeling the characteristics... |
Security | ||
SELECT code_execution FROM * USING SQLite;
SQLite is one of the most deployed software in the world. However, from a... |
Security | ||
SigOver + alpha
As Long-Term Evolution (LTE) communication is based on over-the-air... |
Security | ||
Tales of old: untethering iOS 11
This talk is about running unsigned code at boot on iOS 11. I will... |
Security | ||
TamaGo - bare metal Go framework for ARM SoCs.
TamaGo is an Open Source operating environment framework which aims to allow... |
Security | ||
The Great Escape of ESXi
VMware ESXi is an enterprise-class, bare-metal hypervisor developed by VMware... |
Security | ||
The Inside Story: There are Apps in Apps and Here is How to Break Them
With the rapid development of mobile internet, apps become more and more... |
Security | ||
The One Weird Trick SecureROM Hates
Checkm8 is an unfixable vulnerability present in hundreds of millions of... |
Security | ||
The sustainability of safety, security and privacy
What sort of tools and methodologies should you use to write software for a... |
Security | ||
Uncover, Understand, Own - Regaining Control Over Your AMD CPU
The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your... |
Security | ||
Vehicle immobilization revisited
Modern road vehicles are fitted with an electronic immobilization system,... |
Security | ||
What's left for private messaging?
It is easier to chat online securely today than it ever has been. Widespread... |
Security | ||
ZombieLoad Attack
The ZombieLoad attack exploits a vulnerability of most Intel CPUs, which... |
Security |
CCC
Title | Track | Speakers | |
---|---|---|---|
36C3 Infrastructure Review
36C3 is run by teams of volunteers. In this event, they will provide some... |
CCC | ||
Closing Ceremony (de)
|
CCC | ||
Der dezentrale Jahresrückblick des CCC
|
CCC | ||
Jahresrückblick der Haecksen
In diesem Vortrag nehmen wir euch mit auf eine Reise durch das Haecksenjahr... |
CCC | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Opening Ceremony
Welcome! |
CCC | ||
Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
Die Intensität des Kampfes um die Freiheit im digitalen Raum lässt auch in... |
CCC | ||
The Case for Scale in Cyber Security
The impact of scale in our field has been enormous and it has transformed the... |
CCC | ||
Welcome Pattern - Theorie und Praxis
In diesem Beitrag stellen wir die von der tuwat Gruppe Bildung erarbeiteten... |
CCC |
Ethics, Society & Politics
Title | Track | Speakers | |
---|---|---|---|
5G & Net Neutrality
Three and a half years after Europe enshrined net neutrality in law, the... |
Ethics, Society & Politics | ||
BahnMining - Pünktlichkeit ist eine Zier
Seit Anfang 2019 hat David <i>jeden</i> einzelnen Halt <i>jeder</i> einzelnen... |
Ethics, Society & Politics | ||
Confessions of a future terrorist
We will examine the European Commission’s proposal for a regulation on... |
Ethics, Society & Politics | ||
Content take-downs: Who cleans the internet?
The quest towards a “cleaner” internet continues – with “censorship machines”... |
Ethics, Society & Politics | ||
Das Mauern muss weg
Mit immer neuen Gesetzen gewinnt die Exekutive in Deutschland an Macht und... |
Ethics, Society & Politics | ||
Der netzpolitische Jahresrückblick
IT-Sicherheitsgesetz 2.0, Staatstrojaner für den Verfassungsschutz,... |
Ethics, Society & Politics | ||
Die Affäre Hannibal
Sie sollen den Staat schützen, sind aber selbst eine Gefahr: Soldaten und... |
Ethics, Society & Politics | ||
Die Zukunft grenzüberschreitenden Datenzugriffs und politischer Verfolgung
In Brüssel wird über eine Verordnung verhandelt, die es allen EU-Staaten... |
Ethics, Society & Politics | ||
Digitalisierte Migrationskontrolle
Die sogenannten digitalen Assistenzsysteme des BAMF, „intelligente Grenzen“... |
Ethics, Society & Politics | ||
Extinction Rebellion
Extinction Rebellion (XR) ist eine global agierende, schnell wachsende,... |
Ethics, Society & Politics | ||
FinFisher, See You in Court!
Die GFF hat gemeinsam mit Reporter ohne Grenzen (ROG), dem European Center... |
Ethics, Society & Politics | ||
Fridays for Future (de)
Der Diskurs hat sich von Klimaschutz als Aufgabe von Individuen hinzu einer... |
Ethics, Society & Politics | ||
Geheimdienstliche Massenüberwachung vs. Menschenrechte
Der Europäische Menschenrechtsgerichtshof beschäftigt sich nun schon seit... |
Ethics, Society & Politics | ||
Gerechtigkeit 4.0
In den gegenwärtigen Debatten um die Digitalisierung werden systemische und... |
Ethics, Society & Politics | ||
Hackerparagraph § 202c StGB // Reality Check
Der Hackerparagraph § 202c StGB ist seit August 2007 in Kraft. Das... |
Ethics, Society & Politics | ||
Hacking the Media: Geflüchtete schmuggeln, Nazis torten, Pässe fälschen
Ein lustiger Rückblick über die Aktionen des Peng Kollektivs. |
Ethics, Society & Politics | ||
How (not) to build autonomous robots
Over the past 2 years we've been building delivery robots - at first thought... |
Ethics, Society & Politics | ||
Human Rights at a Global Crossroads
An update on the circumstances of Mr Snowden and the Snowden Refugees will be... |
Ethics, Society & Politics | ||
Inside the Fake Like Factories
This talk investigates the business of fake likes and fake accounts: In a... |
Ethics, Society & Politics | ||
It’s alive! – Nach den Protesten gegen die Polizeigesetze ist vor den Protesten gegen die autoritäre Wende
Das Jahr 2018 stand ganz im Zeichen der bundesweiten Proteste gegen die... |
Ethics, Society & Politics | ||
Katastrophe und Kommunikation am Beispiel Nord-Ost-Syrien
Katastrophen, Krisen & Kriege lassen sich heute live mitverfolgen. Wir... |
Ethics, Society & Politics | ||
Let’s play Infokrieg
Manche Spiele will man gewinnen, andere will man einfach nur spielen. Bei... |
Ethics, Society & Politics | ||
No Body's Business But Mine, a dive into Menstruation Apps
In September 2019, Privacy International released exclusive research on the... |
Ethics, Society & Politics | ||
#NoPNR – Let’s kill the next Data Retention Law
The talk will address how passenger name records (PNR) of flight passengers... |
Ethics, Society & Politics | ||
No roborders, no nation, or: smile for a European surveillance propagation
Robots, Satellites and biometrical traps - more than a Billion Euro will be... |
Ethics, Society & Politics | ||
Polizei-Datenbanken und Minderheiten: Staatliche Stigmatisierung und Diskriminierung von Sinti und Roma
Für Sinti*zze und Roma*nja gehören Anfeindungen zum Alltag. Auch bei... |
Ethics, Society & Politics | ||
Reflections on the New Reverse Engineering Law
Individuals conducting reverse engineering for research purposes face several... |
Ethics, Society & Politics | ||
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
The talk explains and illustrates the procedural and technical details of the... |
Ethics, Society & Politics | ||
The Case Against WikiLeaks: a direct threat to our community
The unprecedented charges against Julian Assange and WikiLeaks constitute the... |
Ethics, Society & Politics | ||
The ecosystem is moving
Considerations for distributed and decentralized technologies from the... |
Ethics, Society & Politics | ||
The Eye on the Nile
What happens when we come across a surveillance operation targeting Egypt’s... |
Ethics, Society & Politics | ||
The KGB Hack: 30 Years Later
This spring marked the 30th anniversary of the public uncovering of the... |
Ethics, Society & Politics | ||
Unpacking the compromises of Aadhaar, and other digital identities inspired by it
Aadhaar is India's national biometric identity database, with over one... |
Ethics, Society & Politics | ||
Vom Ich zum Wir
Ein von Zeit Online entwickeltes Tool macht es möglich, die Plenarprotokolle... |
Ethics, Society & Politics | ||
Von Menschen radikalisiert: Über Rassismus im Internet
Seit Jahren wird über den Einfluss des Internets auf die Gesellschaft... |
Ethics, Society & Politics | ||
Was hat die PSD2 je für uns getan?
Seit dem 14. November ist die letzte Schonfrist zur Umsetzung der... |
Ethics, Society & Politics | ||
Was tun bevor es brennt - wie gründe ich eigentlich einen Betriebsrat?
Aktiv werden zur rechten Zeit - Stand up for Your Right! Betriebsrat -... |
Ethics, Society & Politics | ||
Weichenstellung
Wir müssen jetzt entscheiden, in welcher digitalen Welt wir leben wollen. |
Ethics, Society & Politics | ||
What the World can learn from Hongkong
The people of Hong Kong have been using unique tactics, novel uses of... |
Ethics, Society & Politics |
Art & Culture
Title | Track | Speakers | |
---|---|---|---|
Algorithm | Diversion
Before media art has emerged, traditional art and dance are already applying... |
Art & Culture | ||
Art against Facebook
There is graffiti in the ruins of the feed and the event-info-capital is... |
Art & Culture | ||
Die Mittelmeer-Monologe
Von Menschen, die den riskanten Weg übers Mittelmeer auf sich nehmen, in der... |
Art & Culture | ||
From Managerial Feudalism to the Revolt of the Caring Classes
One apparent paradox of the digitisation of work is that while productivity... |
Art & Culture | ||
Hackers & makers changing music technology
I will explore the ways in which music is influenced by making and hacking,... |
Art & Culture | ||
Hack_Curio
Hacking and hackers can be hard to visualize. In the popular imagination, the... |
Art & Culture | ||
Listening Back Browser Add-On Tranlates Cookies Into Sound
‘Listening Back’ is an add-on for the Chrome and Firefox browsers that... |
Art & Culture | ||
Mensch - Kunst – Maschine
Kann künstliche Intelligenz Kunst erzeugen? Können Menschen von künstlich... |
Art & Culture | ||
p2panda
Festivals and events are organized by a small group of deciders. But what... |
Art & Culture | ||
Speaking Fiction To Power
Louise Ashcroft will talk through strategies and tactics she uses to ‘hack’... |
Art & Culture | ||
The Internet of rubbish things and bodies
Once you start looking at electronic trash you see it everywhere: in laptops... |
Art & Culture | ||
Wohnungsbot: An Automation-Drama in Three Acts
At the center of Clemens Schöll's latest art project is the "Wohnungsbot"... |
Art & Culture |
Science
Title | Track | Speakers | |
---|---|---|---|
An ultrashort history of ultrafast imaging
Did you ever wonder what happens in the time period it takes light to cross... |
Science | ||
Aus dem Schimpfwörterbuch der neuen Rechten
Der Vortrag gibt auf der Basis umfangreicher korpuslinguistischer Analysen... |
Science | ||
Boeing 737MAX: Automated Crashes
Everybody knows about the Boeing 737 MAX crashes and the type's continued... |
Science | ||
Climate Modelling
When climate activists say you should listen to the science they... |
Science | ||
Der Pfad von 4G zu 5G
Mit 4G wurde gegenüber früheren Mobilfunktechnologien das Air-Interface... |
Science | ||
Energiespeicher von heute für die Energie von morgen
Wir verlassen uns in unserem Alltag permanent auf die Verfügbarkeit von... |
Science | ||
Grow your own planet
This year the Nobel prize in physics was awarded to three astronomers... |
Science | ||
Kritikalität von Rohstoffen - wann platzt die Bombe?
Einführung in das Forschungsfeld der Kritikalitätsanalysen. Anhand der... |
Science | ||
Mathematical diseases in climate models and how to cure them
Making climate predictions is extremely difficult because climate models... |
Science | ||
Megatons to Megawatts
Can nuclear warheads be used as energy sources instead of exhausting... |
Science | ||
Nutzung öffentlicher Klimadaten
'In meiner Jugend war mehr Schnee!' oder 'Früher war es auch schon heiß!'... |
Science | ||
Protecting the Wild
Conservation genomic approaches are crucial for establishing long-term... |
Science | ||
Psychedelic Medicine - Hacking Psychiatry?!
Psychedelic research constitutes a challenge to the current paradigm of ... |
Science | ||
Quantum Computing: Are we there yet?
Five years ago I spoke about my work in quantum computing, building and... |
Science | ||
Science for future?
This talk is to show the current state of the discussion on climate change... |
Science | ||
The Large Hadron Collider Infrastructure Talk
The Large Hadron Collider (LHC) is the biggest particle accelerator on Earth.... |
Science | ||
The search for anonymous data
Data is core to the digital economy. Scandals such as Cambridge Analytica,... |
Science | ||
Thrust is not an Option: How to get to Mars really slow
<p>In this talk we will see how chaos can be used to find very peculiar... |
Science | ||
Wandel im Braunkohlerevier: Lithium-Ionen-Batterierecycling
Weltweit verlaufen die Entwicklungstrends des Markthochlaufs der... |
Science |
Hardware & Making
Title | Track | Speakers | |
---|---|---|---|
Aufbau eines Sensornetzes für die Messung von Stickstoffdioxid
Ausgehend von den behördlichen Messnetz für Stickoxide soll der Aufbau einer... |
Hardware & Making | ||
Build you own Quantum Computer @ Home - 99% of discount - Hacker Style !
Quantum technologies are often only over-hyped showed as threat for... |
Hardware & Making | ||
HAL - The Open-Source Hardware Analyzer
Since the Snowden revelations the fear of stealthy hardware manipulations is... |
Hardware & Making | ||
How to Design Highly Reliable Digital Electronics
There's a variety of places - on Earth and beyond - that pose challenging... |
Hardware & Making | ||
LibreSilicon's Standard Cell Library (de)
(en) We make Standard Cells for LibreSilicon available, which are open source... |
Hardware & Making | ||
Linux on Open Source Hardware with Open Source chip design
Want to run Linux on open hardware? This talk will explore Open Source... |
Hardware & Making | ||
#mifail oder: Mit Gigaset wäre das nicht passiert!
Seit 2018 betreibt Eventphone ein neues Telefonsystem auf den chaosnahen... |
Hardware & Making | ||
Open Source is Insufficient to Solve Trust Problems in Hardware
While open source is necessary for trustable hardware, it is far from... |
Hardware & Making | ||
phyphox: Using smartphone sensors for physics experiments
Modern smartphones offer a whole range of sensors like magnetometers,... |
Hardware & Making | ||
SIM card technology from A-Z
Billions of subscribers use SIM cards in their phones. Yet, outside a... |
Hardware & Making | ||
The Ultimate Acorn Archimedes talk
This talk will cover everything about the Acorn Archimedes, a British... |
Hardware & Making | ||
TrustZone-M(eh): Breaking ARMv8-M's security
Most modern embedded devices have something to protect: Whether it's... |
Hardware & Making | ||
Understanding millions of gates
Reverse Engineering of integrated circuits is often seen as something only... |
Hardware & Making | ||
Warum 3D-gedruckte Kleidung NICHT die Zukunft ist
3D-gedruckte Kleidungsstücke finden sich mittlerweile auf immer mehr... |
Hardware & Making | ||
Warum die Card10 kein Medizinprodukt ist
Es soll grundlegend erklärt werden, nach welchen Kriterien Medizinprodukte... |
Hardware & Making | ||
Wifibroadcast
This talk is about modifying cheap wifi dongles to realize true... |
Hardware & Making |
Entertainment
Title | Track | Speakers | |
---|---|---|---|
Chaos Communication Slam
Chaos meets Poetry Slam. Der humoristische Dichterwettstreit mit... |
Entertainment | ||
Das Bits&Bäume-Sporangium
So wie Farnpflanzen ihre Sporen aus der Kapsel mit bis zu 10m/s heraus in die... |
Entertainment | ||
Hacker Jeopardy
The Hacker Jeopardy is a quiz show. |
Entertainment | ||
Hebocon
Let's build funny robots and let them fight each other as long as we are... |
Entertainment | ||
Open Code Verlesung
Kommet zusammen Ihr Jüngerinnen der Bits und Bytes und hörtet die frohe Kunde... |
Entertainment | ||
Security Nightmares 0x14
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Was werden die... |
Entertainment |
Resilience & Sustainability
Title | Track | Speakers | |
---|---|---|---|
Connected Mobility hacken: digital.bike.23
Was haben E-Bikes mit Connected Mobility zu tun? Und ist so was wie LineageOS... |
Resilience & Sustainability | ||
Creating Resilient and Sustainable Mobile Phones
Civil society depends on the continuing ability of citizens to communicate... |
Resilience & Sustainability | ||
Degrowth is coming - be ready to repair
Der Diskurs um die "Digitalisierung" kann vor allem eines: Verheißen. Roboter... |
Resilience & Sustainability | ||
Der Deep Learning Hype
Deep Learning ist von einem Dead End zur ultimativen Lösung aller Machine... |
Resilience & Sustainability | ||
Fairtronics
Electronic gadgets come not just with an ecological footprint, but also a... |
Resilience & Sustainability | ||
Framing digital industry into planetary limits and transition policies
A lecture on the environmental impacts of digital industry today and how to... |
Resilience & Sustainability | ||
Getting software right with properties, generated tests, and proofs
How do we write software that works - or rather, how do we ensure it's... |
Resilience & Sustainability | ||
HUMUS sapiens
<p>HUMUS sapiens represents a compilation of soil explorations emerging from... |
Resilience & Sustainability | ||
Infrastructures in a horizontal farmers community
We will analyze the approach to tecnology (decisional method, mesh network... |
Resilience & Sustainability | ||
NGI Zero: A treasure trove of IT innovation
<p>The <a href="https://ngi.eu">Next Generation Internet</a> initiative is... |
Resilience & Sustainability | ||
Offene Sensordaten für Jedermann - Ein Citizen Science Projekt basierend auf Open Source und Open Hardware
Der Talk soll die Geschichte der senseBox von Beginn bis jetzt wiedergeben.... |
Resilience & Sustainability | ||
On the Edge of Human-Data Interaction with the Databox
In this talk I will report on Databox, the focus of a UK-based research... |
Resilience & Sustainability | ||
Reducing Carbon in the Digital Realm
In this talk, you'll learn about the environmental impact of the digital... |
Resilience & Sustainability | ||
Server Infrastructure for Global Rebellion
In this talk Julian will outline his work as sysadmin, systems and security... |
Resilience & Sustainability | ||
The Planet Friendly Web
Wo beginnt unsere Verantwortung bei der Gestaltung und Entwicklung einer... |
Resilience & Sustainability | ||
Verkehrswende selber hacken
Der Talk wird eine wilde Fahrt, vorbei an umfallenden Rollern, etwas Kunst... |
Resilience & Sustainability | ||
Wie klimafreundlich ist Software?
Das Umweltbundesamt hat in 2012 mit der Forschung der Umweltrelevanz von... |
Resilience & Sustainability |