conference logo

sigint13

The DRM Of Pacman

The DRM Of Pacman

Besser leben für Geeks

Besser leben für Geeks

Home Network Horror Stories

Home Network Horror Stories

UI Redressing Attacks on Android Devices

UI Redressing Attacks on Android Devices

Embedded device security nightmares

Embedded device security nightmares

How  to wiretap the Cloud without anybody noticing

How to wiretap the Cloud without anybody noticing

Adblocker an, Schranke runter, Paywall hoch?

Adblocker an, Schranke runter, Paywall hoch?

Benutze Krake mit Gerät

Benutze Krake mit Gerät

EU Data Protection Reform

EU Data Protection Reform

The Politics of Surveillance: Understanding the National Security Agency

The Politics of Surveillance: Understanding the National Security Agency

Internet-Meme: Geschichte und Forschungsstand

Internet-Meme: Geschichte und Forschungsstand

Through the Google Glass and what Malice Found There

Through the Google Glass and what Malice Found There

Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone

Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone

Der Kampf um die Netzneutralität

Der Kampf um die Netzneutralität

Ruby is Magic!

Ruby is Magic!

DocPatch: Entdecke unsere Verfassung!

DocPatch: Entdecke unsere Verfassung!

Aufbau freier Netze

Aufbau freier Netze

„Information wants to be free" versus „Privacy as the right to be left alone"

„Information wants to be free" versus „Privacy as the right to be left alone"

Gute Arbeit

Gute Arbeit

Independents unite! Inside the freelancers’ movement

Independents unite! Inside the freelancers’ movement

Transparenzgesetz - Quo Vadis?

Transparenzgesetz - Quo Vadis?

Parabolic Plane Flights – Research in Weightlessness

Parabolic Plane Flights – Research in Weightlessness

I/O Capture Treiber Framework

I/O Capture Treiber Framework

E-Mobility as a Privacy Game Changer

E-Mobility as a Privacy Game Changer

Pressfreedom, Surveillance and International Campaigning

Pressfreedom, Surveillance and International Campaigning

Remote Exploits für die Briefwahl in Deutschland

Remote Exploits für die Briefwahl in Deutschland

Game of Drones I + II

Game of Drones I + II

Analog Computing

Analog Computing

C.R.O.P. – Combined Regenerative Organic-food Production

C.R.O.P. – Combined Regenerative Organic-food Production

Funkzellenabfrage

Funkzellenabfrage

Transcending Places

Transcending Places

Web security 101 (or: how to hack security conferences)

Web security 101 (or: how to hack security conferences)

The step into Cyborgism

The step into Cyborgism

„Revolution in Military Affairs“ -- Why computer professionals should be concerned

„Revolution in Military Affairs“ -- Why computer professionals should be concerned

Nearly Everything That Matters is a Side Effect

Nearly Everything That Matters is a Side Effect

It's my party and I crypt if I want to

It's my party and I crypt if I want to

VM32: A CPU simulator for demonstrational purposes of virtualization technologies

VM32: A CPU simulator for demonstrational purposes of virtualization technologies

Introduction to Bitcoin

Introduction to Bitcoin

Offshoreleaks - the how and why of a global investigation

Offshoreleaks - the how and why of a global investigation

Cuckoo Sandbox - malware beware

Cuckoo Sandbox - malware beware

Cisco in the Sky with Diamonds

Cisco in the Sky with Diamonds

Let's tear down these walls

Let's tear down these walls

Why we fight (each other)

Why we fight (each other)

hpfriends: real-time social data-sharing

hpfriends: real-time social data-sharing

Automatisierte Videoüberwachung

Automatisierte Videoüberwachung

Lightning Talks - Day 2

Lightning Talks - Day 2

Making music with a C compiler

Making music with a C compiler

Car immobilizer hacking

Car immobilizer hacking

SDR, GSM/OpenBTS

SDR, GSM/OpenBTS

Programming FPGAs with PSHDL

Programming FPGAs with PSHDL

Q&A with Nadim on CryptoCat

Q&A with Nadim on CryptoCat