conference logo

sigint13

Home Network Horror Stories

Home Network Horror Stories

Embedded device security nightmares

Embedded device security nightmares

How  to wiretap the Cloud without anybody noticing

How to wiretap the Cloud without anybody noticing

VM32: A CPU simulator for demonstrational purposes of virtualization technologies

VM32: A CPU simulator for demonstrational purposes of virtualization technologies

Independents unite! Inside the freelancers’ movement

Independents unite! Inside the freelancers’ movement

Besser leben für Geeks

Besser leben für Geeks

The DRM Of Pacman

The DRM Of Pacman

Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone

Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone

„Revolution in Military Affairs“ -- Why computer professionals should be concerned

„Revolution in Military Affairs“ -- Why computer professionals should be concerned

UI Redressing Attacks on Android Devices

UI Redressing Attacks on Android Devices

Benutze Krake mit Gerät

Benutze Krake mit Gerät

Aufbau freier Netze

Aufbau freier Netze

Internet-Meme: Geschichte und Forschungsstand

Internet-Meme: Geschichte und Forschungsstand

The Politics of Surveillance: Understanding the National Security Agency

The Politics of Surveillance: Understanding the National Security Agency

Adblocker an, Schranke runter, Paywall hoch?

Adblocker an, Schranke runter, Paywall hoch?

EU Data Protection Reform

EU Data Protection Reform

Ruby is Magic!

Ruby is Magic!

„Information wants to be free" versus „Privacy as the right to be left alone"

„Information wants to be free" versus „Privacy as the right to be left alone"

Transcending Places

Transcending Places

Der Kampf um die Netzneutralität

Der Kampf um die Netzneutralität

Gute Arbeit

Gute Arbeit

Through the Google Glass and what Malice Found There

Through the Google Glass and what Malice Found There

DocPatch: Entdecke unsere Verfassung!

DocPatch: Entdecke unsere Verfassung!

Pressfreedom, Surveillance and International Campaigning

Pressfreedom, Surveillance and International Campaigning

I/O Capture Treiber Framework

I/O Capture Treiber Framework

Transparenzgesetz - Quo Vadis?

Transparenzgesetz - Quo Vadis?

Game of Drones I + II

Game of Drones I + II

E-Mobility as a Privacy Game Changer

E-Mobility as a Privacy Game Changer

Web security 101 (or: how to hack security conferences)

Web security 101 (or: how to hack security conferences)

The step into Cyborgism

The step into Cyborgism

Parabolic Plane Flights – Research in Weightlessness

Parabolic Plane Flights – Research in Weightlessness

Nearly Everything That Matters is a Side Effect

Nearly Everything That Matters is a Side Effect

Funkzellenabfrage

Funkzellenabfrage

C.R.O.P. – Combined Regenerative Organic-food Production

C.R.O.P. – Combined Regenerative Organic-food Production

Remote Exploits für die Briefwahl in Deutschland

Remote Exploits für die Briefwahl in Deutschland

Analog Computing

Analog Computing

Why we fight (each other)

Why we fight (each other)

Cisco in the Sky with Diamonds

Cisco in the Sky with Diamonds

Introduction to Bitcoin

Introduction to Bitcoin

It's my party and I crypt if I want to

It's my party and I crypt if I want to

hpfriends: real-time social data-sharing

hpfriends: real-time social data-sharing

Offshoreleaks - the how and why of a global investigation

Offshoreleaks - the how and why of a global investigation

Cuckoo Sandbox - malware beware

Cuckoo Sandbox - malware beware

Q&A with Nadim on CryptoCat

Q&A with Nadim on CryptoCat

Car immobilizer hacking

Car immobilizer hacking

Let's tear down these walls

Let's tear down these walls

Making music with a C compiler

Making music with a C compiler

Automatisierte Videoüberwachung

Automatisierte Videoüberwachung

Programming FPGAs with PSHDL

Programming FPGAs with PSHDL

Lightning Talks - Day 2

Lightning Talks - Day 2

SDR, GSM/OpenBTS

SDR, GSM/OpenBTS