conference logo

27c3

27C3: We Come In Peace

Reverse Engineering the MOS 6502 CPU

Reverse Engineering the MOS 6502 CPU

Chip and PIN is Broken

Chip and PIN is Broken

Pentanews Game Show

Pentanews Game Show

High-speed high-security cryptography: encrypting and authenticating the whole Internet

High-speed high-security cryptography: encrypting and authenticating the whole Internet

CCC-Jahresrückblick 2010

CCC-Jahresrückblick 2010

Ich sehe nicht, dass wir nicht zustimmen werden

Ich sehe nicht, dass wir nicht zustimmen werden

Hackers and Computer Science

Hackers and Computer Science

The importance of resisting Excessive Government Surveillance

The importance of resisting Excessive Government Surveillance

Cognitive Psychology for Hackers

Cognitive Psychology for Hackers

Fnord-Jahresrückblick 2010

Fnord-Jahresrückblick 2010

Desktop on the Linux... (and BSD, of course)

Desktop on the Linux... (and BSD, of course)

FrozenCache

FrozenCache

27C3 Keynote

27C3 Keynote

IMMI, from concept to reality

IMMI, from concept to reality

"Die gesamte Technik ist sicher"

"Die gesamte Technik ist sicher"

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

Hacker Jeopardy (english translation)

Hacker Jeopardy (english translation)

Adventures in Mapping Afghanistan Elections

Adventures in Mapping Afghanistan Elections

SIP home gateways under fire

SIP home gateways under fire

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

A short political history of acoustics

A short political history of acoustics

Wikileaks und mehr

Wikileaks und mehr

Closing Event

Closing Event

Wideband GSM Sniffing

Wideband GSM Sniffing

File -> Print -> Electronics

File -> Print -> Electronics

Your Infrastructure Will Kill You

Your Infrastructure Will Kill You

Radio der Zukunft

Radio der Zukunft

SMS-o-Death

SMS-o-Death

Part-Time Scientists

Part-Time Scientists

Techniken zur Identifizierung von Netzwerk-Protokollen

Techniken zur Identifizierung von Netzwerk-Protokollen

Lying To The Neighbours

Lying To The Neighbours

Data Retention in the EU five years after the Directive

Data Retention in the EU five years after the Directive

Lightning Talks - Day 4

Lightning Talks - Day 4

Hacking iButtons

Hacking iButtons

Analyzing a modern cryptographic RFID system

Analyzing a modern cryptographic RFID system

Secure communications below the hearing threshold

Secure communications below the hearing threshold

Is the SSLiverse a safe place?

Is the SSLiverse a safe place?

Data Recovery Techniques

Data Recovery Techniques

OpenLeaks

OpenLeaks

Terrorists Win - Exploiting Telecommunications Data Retention?

Terrorists Win - Exploiting Telecommunications Data Retention?

Lightning Talks - Day 3

Lightning Talks - Day 3

News Key Recovery Attacks on RC4/WEP

News Key Recovery Attacks on RC4/WEP

Hacker Jeopardy

Hacker Jeopardy

International Cyber Jurisdiction

International Cyber Jurisdiction

The Baseband Apocalypse

The Baseband Apocalypse

I Control Your Code

I Control Your Code

Cybernetics for the Masses

Cybernetics for the Masses

Automatic Identification of Cryptographic Primitives in Software

Automatic Identification of Cryptographic Primitives in Software

Having fun with RTP

Having fun with RTP

Spinning the electronic Wheel

Spinning the electronic Wheel

Logikschaltungen ohne Elektronik

Logikschaltungen ohne Elektronik

Contemporary Profiling of Web Users

Contemporary Profiling of Web Users

Rootkits and Trojans on Your SAP Landscape

Rootkits and Trojans on Your SAP Landscape

Distributed FPGA Number Crunching For The Masses

Distributed FPGA Number Crunching For The Masses

Eins, zwei, drei - alle sind dabei

Eins, zwei, drei - alle sind dabei

From robot to robot

From robot to robot

Whistleblowing

Whistleblowing

Reverse Engineering a real-world RFID payment system

Reverse Engineering a real-world RFID payment system

Netzmedienrecht, Lobbyismus und Korruption

Netzmedienrecht, Lobbyismus und Korruption

Recent advances in IPv6 insecurities

Recent advances in IPv6 insecurities

Copyright Enforcement Vs. Freedoms

Copyright Enforcement Vs. Freedoms

Zero-sized heap allocations vulnerability analysis

Zero-sized heap allocations vulnerability analysis

"The Concert"

"The Concert"

Literarischer Abend

Literarischer Abend

How the Internet sees you

How the Internet sees you

AllColoursAreBeautiful

AllColoursAreBeautiful

Android geolocation using GSM network

Android geolocation using GSM network

Von Zensursula über Censilia hin zum Kindernet

Von Zensursula über Censilia hin zum Kindernet

Adventures in analyzing Stuxnet

Adventures in analyzing Stuxnet

INDECT - an EU-Surveillance Project

INDECT - an EU-Surveillance Project

Console Hacking 2010

Console Hacking 2010

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth

Fnord-Jahresrückblick 2010 (english translation)

Fnord-Jahresrückblick 2010 (english translation)

Lightning Talks - Day 2

Lightning Talks - Day 2

DIY synthesizers and sound generators

DIY synthesizers and sound generators

Security Nightmares

Security Nightmares

Ignorance and Peace Narratives in Cyberspace

Ignorance and Peace Narratives in Cyberspace

OMG WTF PDF

OMG WTF PDF

hacking smart phones

hacking smart phones

A framework for automated architecture-independent gadget search

A framework for automated architecture-independent gadget search

Running your own GSM stack on a phone

Running your own GSM stack on a phone

Three jobs that journalists will do in 2050

Three jobs that journalists will do in 2050

Data Analysis in Terabit Ethernet Traffic

Data Analysis in Terabit Ethernet Traffic

The Hidden Nemesis

The Hidden Nemesis

Node.js as a networking tool

Node.js as a networking tool

Friede sei mit Euren Daten

Friede sei mit Euren Daten

Defense is not dead

Defense is not dead

Code deobfuscation by optimization

Code deobfuscation by optimization

Digitale Spaltung per Gesetz

Digitale Spaltung per Gesetz

A Critical Overview of 10 years of Privacy Enhancing Technologies

A Critical Overview of 10 years of Privacy Enhancing Technologies

Safety on the Open Sea

Safety on the Open Sea

Netzneutralität und QoS - ein Widerspruch?

Netzneutralität und QoS - ein Widerspruch?

USB and libusb

USB and libusb