conference logo

30c3

30C3

Drones

Drones

Attacking HomeMatic

Attacking HomeMatic

Hardening hardware and choosing a #goodBIOS

Hardening hardware and choosing a #goodBIOS

Lightning Talks, Day 3

Lightning Talks, Day 3

Baseband Exploitation in 2013

Baseband Exploitation in 2013

Die Drohnenkriege

Die Drohnenkriege

Introduction to Processor Design

Introduction to Processor Design

Y U NO ISP, taking back the Net

Y U NO ISP, taking back the Net

CounterStrike

CounterStrike

Triggering Deep Vulnerabilities Using Symbolic Execution

Triggering Deep Vulnerabilities Using Symbolic Execution

25 Jahre Chipkarten-Angriffe

25 Jahre Chipkarten-Angriffe

THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE

THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE

Basics of Digital Wireless Communication

Basics of Digital Wireless Communication

Seeing The Secret State: Six Landscapes

Seeing The Secret State: Six Landscapes

How to Build a Mind

How to Build a Mind

To Protect And Infect, Part 2

To Protect And Infect, Part 2

Script Your Car!

Script Your Car!

Reverse engineering the Wii U Gamepad

Reverse engineering the Wii U Gamepad

Keine Anhaltspunkte für flächendeckende Überwachung

Keine Anhaltspunkte für flächendeckende Überwachung

BREACH in Agda

BREACH in Agda

Jahresrückblick des CCC

Jahresrückblick des CCC

World War II Hackers

World War II Hackers

Glass Hacks

Glass Hacks

The Internet (Doesn't) Need Another Security Guide

The Internet (Doesn't) Need Another Security Guide

No Neutral Ground in a Burning World

No Neutral Ground in a Burning World

#SOPA, #NSA, and the New Internet "Lobby"

#SOPA, #NSA, and the New Internet "Lobby"

White-Box Cryptography

White-Box Cryptography

Toward a Cognitive "Quantified Self"

Toward a Cognitive "Quantified Self"

Coding your body

Coding your body

Fast Internet-wide Scanning and its Security Applications

Fast Internet-wide Scanning and its Security Applications

IFGINT

IFGINT

To Protect And Infect

To Protect And Infect

Kryptographie nach Snowden

Kryptographie nach Snowden

FPGA 101

FPGA 101

HbbTV Security

HbbTV Security

Mind-Hacking mit Psychedelika

Mind-Hacking mit Psychedelika

Making machines that make

Making machines that make

Hillbilly Tracking of Low Earth Orbit

Hillbilly Tracking of Low Earth Orbit

Anonymity and Privacy in Public Space and on the Internet

Anonymity and Privacy in Public Space and on the Internet

Seidenstraße

Seidenstraße

Policing the Romantic Crowd

Policing the Romantic Crowd

Console Hacking 2013

Console Hacking 2013

The GNU Name System

The GNU Name System

Überwachen und Sprache

Überwachen und Sprache

Building a safe NFC ticketing system

Building a safe NFC ticketing system

The good, the bad, and the ugly - Linux Kernel patches

The good, the bad, and the ugly - Linux Kernel patches

Lightning Talks, Day 4

Lightning Talks, Day 4

The ArduGuitar

The ArduGuitar

Even More Tamagotchis Were Harmed in the Making of this Presentation

Even More Tamagotchis Were Harmed in the Making of this Presentation

Breaking Baryons

Breaking Baryons

The Year in Crypto

The Year in Crypto

Structuring open hardware projects

Structuring open hardware projects

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Thwarting Evil Maid Attacks

Thwarting Evil Maid Attacks

Magic Lantern

Magic Lantern

30c3 Keynote

30c3 Keynote

Mobile network attack evolution

Mobile network attack evolution

Data Mining for Good

Data Mining for Good

RFID Treehouse of Horror

RFID Treehouse of Horror

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Art of the Exploit: An Introduction to Critical Engineering

Art of the Exploit: An Introduction to Critical Engineering

SCADA StrangeLove 2

SCADA StrangeLove 2

Disclosure DOs, Disclosure DON'Ts

Disclosure DOs, Disclosure DON'Ts

Firmware Fat Camp

Firmware Fat Camp

Closing Event

Closing Event

Against Metadata

Against Metadata

The Gospel of IRMA

The Gospel of IRMA

Concepts for global TSCM

Concepts for global TSCM

Sysadmins of the world, unite!

Sysadmins of the world, unite!

Beyond the Tech: Building Internet Freedom Tools for Real People

Beyond the Tech: Building Internet Freedom Tools for Real People

India's Surveillance State

India's Surveillance State

Das FlipDot-Projekt

Das FlipDot-Projekt

An introduction to Firmware Analysis

An introduction to Firmware Analysis

Dead Man Edition

Dead Man Edition

Hacker Jeopardy

Hacker Jeopardy

Lightning Talks, Day 2

Lightning Talks, Day 2

Rock' em Graphic Cards

Rock' em Graphic Cards

Opening Event

Opening Event

Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array

Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array

We only have one earth

We only have one earth

ID Cards in China: Your Worst Nightmare

ID Cards in China: Your Worst Nightmare

Human Rights and Technology

Human Rights and Technology

WarGames in memory

WarGames in memory

Open source experimental incubator build up

Open source experimental incubator build up

Perfect Paul

Perfect Paul

Plants & Machines

Plants & Machines

Europe, the USA and Identity Ecosystems

Europe, the USA and Identity Ecosystems

Recht auf Remix

Recht auf Remix

Do You Think That's Funny?

Do You Think That's Funny?

Backdoors, Government Hacking and The Next Crypto Wars

Backdoors, Government Hacking and The Next Crypto Wars

Calafou, postcapitalist ecoindustrial community

Calafou, postcapitalist ecoindustrial community

The Four Wars

The Four Wars

Programming FPGAs with PSHDL

Programming FPGAs with PSHDL

Extracting keys from FPGAs, OTP Tokens and Door Locks

Extracting keys from FPGAs, OTP Tokens and Door Locks

Reverse engineering of CHIASMUS from GSTOOL

Reverse engineering of CHIASMUS from GSTOOL

Technomonopolies

Technomonopolies

lasers in space

lasers in space

My journey into FM-RDS

My journey into FM-RDS

Forbidden Fruit

Forbidden Fruit

Nerds in the news

Nerds in the news

The philosophy of hacking

The philosophy of hacking

Virtually Impossible: The Reality Of Virtualization Security

Virtually Impossible: The Reality Of Virtualization Security

Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware

Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware

Warum die Digitale Revolution des Lernens gescheitert ist.

Warum die Digitale Revolution des Lernens gescheitert ist.

Turing Complete User

Turing Complete User

Infrastructure Review

Infrastructure Review

Electronic Bank Robberies

Electronic Bank Robberies

Hardware Attacks, Advanced ARM Exploitation, and Android Hacking

Hardware Attacks, Advanced ARM Exploitation, and Android Hacking

Der Kampf um Netzneutralität

Der Kampf um Netzneutralität

Hacking as Artistic Practice

Hacking as Artistic Practice

The Pirate Cinema

The Pirate Cinema

10 Years of Fun with Embedded Devices

10 Years of Fun with Embedded Devices

Hello World!

Hello World!

Trezor: Bitcoin hardware wallet

Trezor: Bitcoin hardware wallet

Desperately Seeking Susy

Desperately Seeking Susy

Through a PRISM, Darkly

Through a PRISM, Darkly

EUDataP: State of the Union

EUDataP: State of the Union

Towards an affordable brain-computer-interface

Towards an affordable brain-computer-interface

Revisiting "Trusting Trust" for binary toolchains

Revisiting "Trusting Trust" for binary toolchains

calc.pw

calc.pw

2 Takte später

2 Takte später

The Tor Network

The Tor Network

Security Nightmares

Security Nightmares

Android DDI

Android DDI

Amtliche Datenschützer: Kontrolleure oder Papiertiger?

Amtliche Datenschützer: Kontrolleure oder Papiertiger?

Security of the IC Backside

Security of the IC Backside

Bug class genocide

Bug class genocide

Hacking the Czech Parliament via SMS

Hacking the Czech Parliament via SMS

Long Distance Quantum Communication

Long Distance Quantum Communication

Sim Gishel

Sim Gishel

Der tiefe Staat

Der tiefe Staat

X Security

X Security

Fnord News Show

Fnord News Show

Bullshit made in Germany

Bullshit made in Germany

The Exploration and Exploitation of an SD Memory Card

The Exploration and Exploitation of an SD Memory Card