conference logo

26c3

26C3: Here be Dragons

our darknet and its bright spots

our darknet and its bright spots

cat /proc/sys/net/ipv4/fuckups

cat /proc/sys/net/ipv4/fuckups

A part time scientists' perspective of getting to the moon

A part time scientists' perspective of getting to the moon

Computer.Spiele.Politik.

Computer.Spiele.Politik.

coreboot: Adding support for a system near you

coreboot: Adding support for a system near you

Fnord-Jahresrückblick 2009

Fnord-Jahresrückblick 2009

UNBILD – Pictures and Non-Pictures

UNBILD – Pictures and Non-Pictures

Stream: Security Nightmares

Stream: Security Nightmares

Milkymist

Milkymist

Wofür offenes Internet?

Wofür offenes Internet?

Here Be Electric Dragons

Here Be Electric Dragons

Die Ereignisse des 12.9. und ihre Folgen

Die Ereignisse des 12.9. und ihre Folgen

“Yes We Can’t!” - on kleptography and cryptovirology

“Yes We Can’t!” - on kleptography and cryptovirology

secuBT

secuBT

Liquid Democracy

Liquid Democracy

Black Ops Of PKI

Black Ops Of PKI

Here be dragons

Here be dragons

A Hacker’s Utopia

A Hacker’s Utopia

Vier Fäuste für ein Halleluja

Vier Fäuste für ein Halleluja

After the Hype

After the Hype

Defending the Poor

Defending the Poor

Advanced microcontroller programming

Advanced microcontroller programming

ETSI-Vorratsdatenspeicherung 2009

ETSI-Vorratsdatenspeicherung 2009

Tor and censorship: lessons learned

Tor and censorship: lessons learned

Photography and the Art of Doing it Wrong

Photography and the Art of Doing it Wrong

Chaos-Familien-Duell

Chaos-Familien-Duell

Technik des neuen ePA

Technik des neuen ePA

Exciting Tales of Journalists Getting Spied on, Arrested and Deported

Exciting Tales of Journalists Getting Spied on, Arrested and Deported

Security Nightmares

Security Nightmares

Peanut Butter and Plastic: Industrial Revolution

Peanut Butter and Plastic: Industrial Revolution

GSM: SRSLY?

GSM: SRSLY?

Stream: Fnord-Jahresrückblick 2009

Stream: Fnord-Jahresrückblick 2009

Hacking the universe

Hacking the universe

Location tracking does scale up

Location tracking does scale up

DDoS/botnet mitigation & hosting online communities

DDoS/botnet mitigation & hosting online communities

Wikipedia - Wegen Irrelevanz gelöscht

Wikipedia - Wegen Irrelevanz gelöscht

CKAN: apt-get for the Debian of Data

CKAN: apt-get for the Debian of Data

I, Internet

I, Internet

Europäische Biometriestrategien

Europäische Biometriestrategien

Hacker Jeopardy

Hacker Jeopardy

Lightning Talks - Day 1

Lightning Talks - Day 1

Wolpertinger. Ein verteilter Portscanner.

Wolpertinger. Ein verteilter Portscanner.

Exposing Crypto Bugs through reverse engineering

Exposing Crypto Bugs through reverse engineering

Lightning Talks - Day 2

Lightning Talks - Day 2

Lightning Talks - Day 4

Lightning Talks - Day 4

Die Schlacht um die Vorratsdatenspeicherung

Die Schlacht um die Vorratsdatenspeicherung

Privacy & Stylometry

Privacy & Stylometry

Homewreckery

Homewreckery

Legic Prime: Obscurity in Depth

Legic Prime: Obscurity in Depth

Reverse-Engineering DisplayLink devices

Reverse-Engineering DisplayLink devices

How you can build an eavesdropper for a quantum cryptosystem

How you can build an eavesdropper for a quantum cryptosystem

Nougatbytes - Ein Wortspiel, bunt und in stereo

Nougatbytes - Ein Wortspiel, bunt und in stereo

Understanding Telecommunication Interception: Intelligence Support Systems

Understanding Telecommunication Interception: Intelligence Support Systems

WikiLeaks Release 1.0

WikiLeaks Release 1.0

Why Germany Succeeded Where America Has Failed in Achieving Meaningful Voting Computer Changes

Why Germany Succeeded Where America Has Failed in Achieving Meaningful Voting Computer Changes

Finding the key in the haystack

Finding the key in the haystack

Conlanging 101

Conlanging 101

Leyen-Rhetorik

Leyen-Rhetorik

"Haste ma'n netblock?"

"Haste ma'n netblock?"

Playing with the Built City

Playing with the Built City

Die Verwaltung rüstet auf - der digitale Steuerbürger

Die Verwaltung rüstet auf - der digitale Steuerbürger

Die neokonservativen Thinktanks in der BRD

Die neokonservativen Thinktanks in der BRD

Lightning Talks - Day 3

Lightning Talks - Day 3

Das Recht am eigenen Bild und das Ende der "Street Photography"

Das Recht am eigenen Bild und das Ende der "Street Photography"

Fußgängernavigation mit Augmented Reality

Fußgängernavigation mit Augmented Reality

CCC-Jahresrückblick

CCC-Jahresrückblick

Das Zugangserschwerungsgesetz

Das Zugangserschwerungsgesetz

Fuzzing the Phone in your Phone

Fuzzing the Phone in your Phone

Der Hackerparagraph beim Bundesverfassungsgericht

Der Hackerparagraph beim Bundesverfassungsgericht

Eine Zensur findet statt

Eine Zensur findet statt

Why Net Neutrality Matters?

Why Net Neutrality Matters?

Blackbox JTAG Reverse Engineering

Blackbox JTAG Reverse Engineering

The Lost Cosmonauts

The Lost Cosmonauts

Internetsperren

Internetsperren

SCCP hacking, attacking the SS7 & SIGTRAN applications one step further and mapping the phone system

SCCP hacking, attacking the SS7 & SIGTRAN applications one step further and mapping the phone system

Im Herz der Bestie

Im Herz der Bestie

Building a Debugger

Building a Debugger

Privacy-Enhanced Event Scheduling

Privacy-Enhanced Event Scheduling

Vom Kreationismus zum Kollektivismus

Vom Kreationismus zum Kollektivismus

Playing with the GSM RF Interface

Playing with the GSM RF Interface

Weaponizing Cultural Viruses

Weaponizing Cultural Viruses

Wireless power transfer

Wireless power transfer

Closing Event

Closing Event

Cybernetic Cannibalism

Cybernetic Cannibalism

DECT (part II)

DECT (part II)

Using OpenBSC for fuzzing of GSM handsets

Using OpenBSC for fuzzing of GSM handsets