conference logo

29c3

29C3: Not my department

Let Me Answer That for You

Let Me Answer That for You

Sprache, Ungleichheit und Unfreiheit

Sprache, Ungleichheit und Unfreiheit

Analytical Summary of the BlackHole Exploit Kit

Analytical Summary of the BlackHole Exploit Kit

Fnord-Jahresrückblick

Fnord-Jahresrückblick

29C3 GSM: Cell phone network review

29C3 GSM: Cell phone network review

Open Source Schlüssel und Schlösser

Open Source Schlüssel und Schlösser

Writing a Thumbdrive from Scratch

Writing a Thumbdrive from Scratch

Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime

Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime

What accessibility has to do with security

What accessibility has to do with security

Re-igniting the Crypto Wars on the Web

Re-igniting the Crypto Wars on the Web

Hacker Jeopardy

Hacker Jeopardy

Tactical Tech - Bridging the Gap

Tactical Tech - Bridging the Gap

SmartMeter

SmartMeter

Opening Event

Opening Event

The Ethics of Activist DDOS Actions

The Ethics of Activist DDOS Actions

New Human Interfaces for Music

New Human Interfaces for Music

The Care and Feeding of Weird Machines Found in Executable Metadata

The Care and Feeding of Weird Machines Found in Executable Metadata

Der Mord fällt aus

Der Mord fällt aus

Further hacks on the Calypso platform

Further hacks on the Calypso platform

On Breaking SAML

On Breaking SAML

Hacking Cisco Phones

Hacking Cisco Phones

Best of ... Verfassungsschutz

Best of ... Verfassungsschutz

chmod o+rw bundestag

chmod o+rw bundestag

Defeating Windows memory forensics

Defeating Windows memory forensics

(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung

(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung

"How I met your pointer"

"How I met your pointer"

Die Antiterrordatei

Die Antiterrordatei

Romantic Hackers

Romantic Hackers

Men who stare at bits

Men who stare at bits

Security Evaluation of Russian GOST Cipher

Security Evaluation of Russian GOST Cipher

The Tor software ecosystem

The Tor software ecosystem

Security Nightmares

Security Nightmares

We are all lawmakers!

We are all lawmakers!

Lightning Talks 3

Lightning Talks 3

The future of protocol reversing and simulation applied on ZeroAccess botnet

The future of protocol reversing and simulation applied on ZeroAccess botnet

CVE-2011-3402 Technical Analysis

CVE-2011-3402 Technical Analysis

EveryCook

EveryCook

Small footprint inspection techniques for Android

Small footprint inspection techniques for Android

The Grand EU Data Protection Reform

The Grand EU Data Protection Reform

Closing Event

Closing Event

Safecast: DIY and citizen-sensing of radiation

Safecast: DIY and citizen-sensing of radiation

Defend your Freedoms Online: It's Political, Stupid!

Defend your Freedoms Online: It's Political, Stupid!

CCC-Jahresrückblick

CCC-Jahresrückblick

Trojaner-Blindflug

Trojaner-Blindflug

Proximax, Telex, Flashproxy oder Tor Bridges

Proximax, Telex, Flashproxy oder Tor Bridges

Zur Lage der Information

Zur Lage der Information

Not my department

Not my department

Hackers As A High-Risk Population

Hackers As A High-Risk Population

Meine Kleidung funkt

Meine Kleidung funkt

Netzaktivisten! Ist das alles, was wir drauf haben?

Netzaktivisten! Ist das alles, was wir drauf haben?

Hash-flooding DoS reloaded: attacks and defenses

Hash-flooding DoS reloaded: attacks and defenses

Hacking Philosophy

Hacking Philosophy

Was ist, was kann, was soll Gender Studies Informatik?

Was ist, was kann, was soll Gender Studies Informatik?

Many Tamagotchis Were Harmed in the Making of this Presentation

Many Tamagotchis Were Harmed in the Making of this Presentation

Privatisierung der Rechtsdurchsetzung

Privatisierung der Rechtsdurchsetzung

Milking the Digital Cash Cow

Milking the Digital Cash Cow

INDECT, Verhaltenserkennung & Co

INDECT, Verhaltenserkennung & Co

IFG: Chance oder Bürgerbluff?

IFG: Chance oder Bürgerbluff?

Our daily job: hacking the law

Our daily job: hacking the law

Privacy and the Car of the Future

Privacy and the Car of the Future

Securing the Campaign

Securing the Campaign

Millions of Lessons Learned on Electronic Napkins

Millions of Lessons Learned on Electronic Napkins

Cyberpeace statt Cyberwar

Cyberpeace statt Cyberwar

Long live the protocoletariat!

Long live the protocoletariat!

Lightning Talks 2

Lightning Talks 2

Setting mobile phones free

Setting mobile phones free

NOC Review

NOC Review

Marvin und der Blues

Marvin und der Blues

FactHacks

FactHacks

Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze

Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze

The ultimate Galaksija talk

The ultimate Galaksija talk

Certificate Authority Collapse

Certificate Authority Collapse

Nougatbytes 10

Nougatbytes 10

Low-Cost Chip Microprobing

Low-Cost Chip Microprobing

Time is NOT on your Side

Time is NOT on your Side

SCADA Strangelove

SCADA Strangelove

ESXi Beast

ESXi Beast

Hinter den Kulissen: Der NSU und das V-Leute-System

Hinter den Kulissen: Der NSU und das V-Leute-System

OMG! OER!

OMG! OER!

Russia’s Surveillance State

Russia’s Surveillance State

Pflanzenhacken richtig

Pflanzenhacken richtig

Page Fault Liberation Army or Gained in Translation

Page Fault Liberation Army or Gained in Translation

Lightning Talks 1

Lightning Talks 1

Sind faire Computer möglich?

Sind faire Computer möglich?

Hanussen's mindreading

Hanussen's mindreading

Stabilitätsanker & Wachstumslokomotive

Stabilitätsanker & Wachstumslokomotive

Ethics in Security Research

Ethics in Security Research

An Overview of Secure Name Resolution

An Overview of Secure Name Resolution

Let Me Answer That for You

Let Me Answer That for You

White IT, Clean IT & CEO Coalition

White IT, Clean IT & CEO Coalition

Meldegesetz

Meldegesetz

A Rambling Walk Through an EMV Transaction

A Rambling Walk Through an EMV Transaction