30C3

Der Kampf um Netzneutralität
audio-only version available, too

Der Kampf um Netzneutralität

Markus Beckedahl, Thomas Lohninger
2013-12-28 (53min)

Firmware Fat Camp
audio-only version available, too

Firmware Fat Camp

angcui
2013-12-28 (42min)

Even More Tamagotchis Were Harmed in the Making of this Presentation
audio-only version available, too

Even More Tamagotchis Were Harmed in the Making of this Presentation

Natalie Silvanovich
2014-01-03 (45min)

BREACH in Agda
audio-only version available, too

BREACH in Agda

Nicolas Pouillard
2013-12-31 (40min)

The Exploration and Exploitation of an SD Memory Card
audio-only version available, too

The Exploration and Exploitation of an SD Memory Card

bunnie, Xobs
2014-01-03 (59min)

Fast Internet-wide Scanning and its Security Applications
audio-only version available, too

Fast Internet-wide Scanning and its Security Applications

J. Alex Halderman
2013-12-28 (62min)

World War II Hackers
audio-only version available, too

World War II Hackers

Anja Drephal
2013-12-31 (54min)

Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array
audio-only version available, too

Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array

Andrew Reiter (arr,awr)
2013-12-28 (58min)

Programming FPGAs with PSHDL
audio-only version available, too

Programming FPGAs with PSHDL

Karsten Becker
2013-12-28 (61min)

SCADA StrangeLove 2
audio-only version available, too

SCADA StrangeLove 2

repdet, sgordey
2013-12-28 (41min)

Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
audio-only version available, too

Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware

Patrick Stewin
2013-12-31 (54min)

Making machines that make
audio-only version available, too

Making machines that make

Nadya Peek
2013-12-29 (46min)

Keine Anhaltspunkte für flächendeckende Überwachung
audio-only version available, too

Keine Anhaltspunkte für flächendeckende Überwachung

Martin Haase/maha, khamacher
2013-12-31 (65min)

Bullshit made in Germany
audio-only version available, too

Bullshit made in Germany

Linus Neumann
2013-12-29 (60min)

CounterStrike
audio-only version available, too

CounterStrike

FX
2014-01-03 (46min)

Thwarting Evil Maid Attacks
audio-only version available, too

Thwarting Evil Maid Attacks

Eric Michaud, Ryan Lackey
2014-01-03 (58min)

The ArduGuitar
audio-only version available, too

The ArduGuitar

gratefulfrog
2013-12-28 (29min)

Extracting keys from FPGAs, OTP Tokens and Door Locks
audio-only version available, too

Extracting keys from FPGAs, OTP Tokens and Door Locks

David
2013-12-31 (41min)

The Four Wars
audio-only version available, too

The Four Wars

Annie Machon
2014-01-01 (23min)

Security Nightmares

Security Nightmares

frank, Ron
2014-01-01 (90min)

To Protect And Infect
audio-only version available, too

To Protect And Infect

Claudio Guarnieri, Morgan Marquis-Boire
2014-01-13 (45min)

Do You Think That's Funny?
audio-only version available, too

Do You Think That's Funny?

lizvlx
2014-01-03 (53min)

Hardening hardware and choosing a #goodBIOS
audio-only version available, too

Hardening hardware and choosing a #goodBIOS

Peter Stuge
2013-12-28 (47min)

Kryptographie nach Snowden
audio-only version available, too

Kryptographie nach Snowden

ruedi
2013-12-28 (57min)

The good, the bad, and the ugly - Linux Kernel patches
audio-only version available, too

The good, the bad, and the ugly - Linux Kernel patches

wsa
2013-12-31 (28min)

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
audio-only version available, too

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Alexa O'Brien
2014-01-01 (57min)

My journey into FM-RDS
audio-only version available, too

My journey into FM-RDS

Oona Räisänen
2013-12-29 (36min)

Mind-Hacking mit Psychedelika
audio-only version available, too

Mind-Hacking mit Psychedelika

Julia Aksënova
2013-12-29 (65min)

Revisiting "Trusting Trust" for binary toolchains
audio-only version available, too

Revisiting "Trusting Trust" for binary toolchains

sergeybratus, Julian Bangert, bx
2013-12-28 (60min)

Data Mining for Good
audio-only version available, too

Data Mining for Good

Patrick
2013-12-31 (26min)

Beyond the Tech: Building Internet Freedom Tools for Real People
audio-only version available, too

Beyond the Tech: Building Internet Freedom Tools for Real People

Michael Brennan
2013-12-31 (62min)

Hardware Attacks, Advanced ARM Exploitation, and Android Hacking
audio-only version available, too

Hardware Attacks, Advanced ARM Exploitation, and Android Hacking

Stephen A. Ridley
2014-01-01 (56min)

Calafou, postcapitalist ecoindustrial community
audio-only version available, too

Calafou, postcapitalist ecoindustrial community

acracia
2013-12-29 (62min)

Magic Lantern
audio-only version available, too

Magic Lantern

Michael Zöller
2013-12-28 (63min)

Mobile network attack evolution
audio-only version available, too

Mobile network attack evolution

Karsten Nohl, Luca Melette
2013-12-31 (49min)

WarGames in memory
audio-only version available, too

WarGames in memory

gannimo
2013-12-29 (55min)

ID Cards in China: Your Worst Nightmare
audio-only version available, too

ID Cards in China: Your Worst Nightmare

Kate Krauss
2013-12-29 (39min)

Hello World!
audio-only version available, too

Hello World!

Aram Bartholl
2013-12-28 (57min)

Bug class genocide
audio-only version available, too

Bug class genocide

Andreas Bogk
2013-12-28 (46min)

Dead Man Edition
audio-only version available, too

Dead Man Edition

Sebastian Jekutsch
2013-12-31 (61min)

To Protect And Infect, Part 2
audio-only version available, too

To Protect And Infect, Part 2

Jacob
2014-01-01 (62min)

India's Surveillance State
audio-only version available, too

India's Surveillance State

Maria Xynou
2013-12-29 (51min)

Lightning Talks, Day 3
audio-only version available, too

Lightning Talks, Day 3

nickfarr
2013-12-29 (157min)

Building a safe NFC ticketing system
audio-only version available, too

Building a safe NFC ticketing system

bughardy, Eagle1753
2013-12-29 (30min)

Attacking HomeMatic
audio-only version available, too

Attacking HomeMatic

sathya, Malli
2013-12-31 (59min)

Seidenstraße
audio-only version available, too

Seidenstraße

*m, Jeff Mann, frank, Diani Barreto
2013-12-28 (48min)

How to Build a Mind
audio-only version available, too

How to Build a Mind

Joscha
2013-12-29 (55min)

Hillbilly Tracking of Low Earth Orbit
audio-only version available, too

Hillbilly Tracking of Low Earth Orbit

Travis Goodspeed
2013-12-28 (46min)

Anonymity and Privacy in Public Space and on the Internet
audio-only version available, too

Anonymity and Privacy in Public Space and on the Internet

aluburka
2013-12-29 (10min)

We only have one earth
audio-only version available, too

We only have one earth

Drahflow
2013-12-28 (64min)

Überwachen und Sprache
audio-only version available, too

Überwachen und Sprache

josch
2013-12-28 (58min)

X Security
audio-only version available, too

X Security

Ilja van Sprundel
2013-12-29 (60min)

Hacker Jeopardy
audio-only version available, too

Hacker Jeopardy

Sec, Ray
2014-01-01 (147min)

Console Hacking 2013
audio-only version available, too

Console Hacking 2013

sven, marcan, Nicholas Allegra (comex)
2013-12-28 (58min)

#SOPA, #NSA, and the New Internet "Lobby"
audio-only version available, too

#SOPA, #NSA, and the New Internet "Lobby"

Elizabeth Stark
2013-12-29 (35min)

Human Rights and Technology
audio-only version available, too

Human Rights and Technology

Seb
2013-12-31 (32min)

Technomonopolies
audio-only version available, too

Technomonopolies

rysiek
2013-12-29 (26min)

Y U NO ISP, taking back the Net
audio-only version available, too

Y U NO ISP, taking back the Net

taziden
2013-12-28 (31min)

Sysadmins of the world, unite!
audio-only version available, too

Sysadmins of the world, unite!

Julian Assange, Jacob
2014-01-03 (31min)

Europe, the USA and Identity Ecosystems
audio-only version available, too

Europe, the USA and Identity Ecosystems

NoisyNarrowBandDevice
2013-12-29 (62min)

Triggering Deep Vulnerabilities Using Symbolic Execution
audio-only version available, too

Triggering Deep Vulnerabilities Using Symbolic Execution

gannimo
2013-12-28 (45min)

Der tiefe Staat
audio-only version available, too

Der tiefe Staat

Andreas Lehner
2013-12-28 (59min)

Backdoors, Government Hacking and The Next Crypto Wars
audio-only version available, too

Backdoors, Government Hacking and The Next Crypto Wars

Christopher Soghoian
2013-12-29 (44min)

Drones
audio-only version available, too

Drones

Piotr Esden-Tempski
2013-12-29 (60min)

THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE
audio-only version available, too

THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE

houndbee
2013-12-31 (62min)

White-Box Cryptography
audio-only version available, too

White-Box Cryptography

Dmitry Khovratovich
2013-12-29 (55min)

Perfect Paul
audio-only version available, too

Perfect Paul

artelse
2013-12-29 (28min)

The Internet (Doesn't) Need Another Security Guide
audio-only version available, too

The Internet (Doesn't) Need Another Security Guide

evacide
2013-12-31 (61min)

Forbidden Fruit
audio-only version available, too

Forbidden Fruit

Joe Davis
2013-12-28 (58min)

HbbTV Security
audio-only version available, too

HbbTV Security

Martin Herfurt
2013-12-28 (44min)

The GNU Name System
audio-only version available, too

The GNU Name System

grothoff
2013-12-28 (51min)

Die Drohnenkriege
audio-only version available, too

Die Drohnenkriege

Norbert Schepers
2013-12-31 (65min)

Open source experimental incubator build up
audio-only version available, too

Open source experimental incubator build up

Frantisek Algoldor Apfelbeck
2013-12-28 (33min)

The Tor Network
audio-only version available, too

The Tor Network

Jacob, arma
2013-12-31 (62min)

Jahresrückblick des CCC
audio-only version available, too

Jahresrückblick des CCC

Constanze Kurz, frank, Linus Neumann
2013-12-29 (108min)

Seeing The Secret State: Six Landscapes
audio-only version available, too

Seeing The Secret State: Six Landscapes

Trevor Paglen
2014-01-01 (48min)

Introduction to Processor Design
audio-only version available, too

Introduction to Processor Design

byterazor
2013-12-29 (61min)

Towards an affordable brain-computer-interface
audio-only version available, too

Towards an affordable brain-computer-interface

Dominic, Anne
2013-12-29 (57min)

lasers in space
audio-only version available, too

lasers in space

anja
2013-12-28 (29min)

Android DDI
audio-only version available, too

Android DDI

Collin Mulliner
2013-12-29 (47min)

Infrastructure Review
audio-only version available, too

Infrastructure Review

kay, Peter Stuge, florolf, Sebastian, *m
2014-01-06 (71min)

Through a PRISM, Darkly
audio-only version available, too

Through a PRISM, Darkly

Kurt Opsahl
2013-12-31 (63min)

IFGINT
audio-only version available, too

IFGINT

Stefan Wehrmeyer
2013-12-28 (28min)

Concepts for global TSCM
audio-only version available, too

Concepts for global TSCM

andy
2013-12-31 (60min)

10 Years of Fun with Embedded Devices
audio-only version available, too

10 Years of Fun with Embedded Devices

nbd
2013-12-28 (47min)

Electronic Bank Robberies
audio-only version available, too

Electronic Bank Robberies

tw, sb
2013-12-28 (56min)

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
audio-only version available, too

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

qbi
2013-12-29 (59min)

Reverse engineering of CHIASMUS from GSTOOL
audio-only version available, too

Reverse engineering of CHIASMUS from GSTOOL

Jan Schejbal
2013-12-28 (48min)

Desperately Seeking Susy
audio-only version available, too

Desperately Seeking Susy

atdotde
2013-12-29 (60min)

Lightning Talks, Day 4
audio-only version available, too

Lightning Talks, Day 4

nickfarr
2013-12-31 (152min)

Turing Complete User
audio-only version available, too

Turing Complete User

olia lialina
2013-12-28 (33min)

Opening Event
audio-only version available, too

Opening Event

Tim Pritlove
2013-12-31 (11min)

EUDataP: State of the Union
audio-only version available, too

EUDataP: State of the Union

Jan Philipp Albrecht
2013-12-28 (72min)

Disclosure DOs, Disclosure DON'Ts
audio-only version available, too

Disclosure DOs, Disclosure DON'Ts

Nate Cardozo
2013-12-29 (43min)

Script Your Car!
audio-only version available, too

Script Your Car!

Felix "tmbinc" Domke
2013-12-28 (58min)

Against Metadata
audio-only version available, too

Against Metadata

Robert M Ochshorn
2013-12-29 (25min)

The philosophy of hacking
audio-only version available, too

The philosophy of hacking

groente
2013-12-31 (29min)

Security of the IC Backside
audio-only version available, too

Security of the IC Backside

nedos
2014-01-01 (58min)

Reverse engineering the Wii U Gamepad
audio-only version available, too

Reverse engineering the Wii U Gamepad

delroth
2013-12-29 (55min)

Fnord News Show

Fnord News Show

frank, Fefe
2014-01-01 (117min)

RFID Treehouse of Horror
audio-only version available, too

RFID Treehouse of Horror

Adrian Dabrowski
2013-12-29 (58min)

25 Jahre Chipkarten-Angriffe
audio-only version available, too

25 Jahre Chipkarten-Angriffe

Peter Laackmann, Marcus Janke
2014-01-01 (60min)

Sim Gishel
audio-only version available, too

Sim Gishel

Karl Heinz Jeron
2013-12-28 (36min)

The Year in Crypto
audio-only version available, too

The Year in Crypto

Nadia Heninger, djb, Tanja Lange
2014-01-01 (59min)

Breaking Baryons
audio-only version available, too

Breaking Baryons

Michael Büker
2013-12-28 (60min)

Structuring open hardware projects
audio-only version available, too

Structuring open hardware projects

Bram de Vries, Morris Winkler
2013-12-29 (32min)

Recht auf Remix
audio-only version available, too

Recht auf Remix

Leonhard Dobusch
2013-12-29 (59min)

Art of the Exploit: An Introduction to Critical Engineering
audio-only version available, too

Art of the Exploit: An Introduction to Critical Engineering

Julian Oliver
2013-12-29 (58min)

Amtliche Datenschützer: Kontrolleure oder Papiertiger?
audio-only version available, too

Amtliche Datenschützer: Kontrolleure oder Papiertiger?

Peter Schaar
2013-12-31 (78min)

Coding your body
audio-only version available, too

Coding your body

Sophie Hiltner
2013-12-31 (32min)

Virtually Impossible: The Reality Of Virtualization Security
audio-only version available, too

Virtually Impossible: The Reality Of Virtualization Security

Gal Diskin
2013-12-29 (59min)

Closing Event
audio-only version available, too

Closing Event

ths
2014-01-03 (50min)

Nerds in the news
audio-only version available, too

Nerds in the news

Friedrich Lindenberg
2013-12-29 (30min)

The Gospel of IRMA
audio-only version available, too

The Gospel of IRMA

Jaap-Henk Hoepman
2013-12-31 (55min)

No Neutral Ground in a Burning World
audio-only version available, too

No Neutral Ground in a Burning World

Quinn Norton, Eleanor Saitta
2013-12-31 (45min)

Glass Hacks
audio-only version available, too

Glass Hacks

Stephen Balaban
2014-01-01 (60min)

Policing the Romantic Crowd
audio-only version available, too

Policing the Romantic Crowd

MaTu
2013-12-28 (38min)

Lightning Talks, Day 2
audio-only version available, too

Lightning Talks, Day 2

nickfarr
2013-12-29 (123min)

Rock' em Graphic Cards
audio-only version available, too

Rock' em Graphic Cards

mel/ Agnes Meyder
2013-12-28 (55min)

Trezor: Bitcoin hardware wallet
audio-only version available, too

Trezor: Bitcoin hardware wallet

Pavol "stick" Rusnak
2013-12-29 (26min)

30c3 Keynote
audio-only version available, too

30c3 Keynote

Glenn Greenwald, frank
2013-12-28 (55min)

2 Takte später
audio-only version available, too

2 Takte später

m.eik, bruder
2013-12-29 (28min)

Toward a Cognitive "Quantified Self"
audio-only version available, too

Toward a Cognitive "Quantified Self"

Kai
2013-12-28 (49min)

The Pirate Cinema
audio-only version available, too

The Pirate Cinema

Nicolas Maigret, Brendan Howell
2013-12-29 (29min)

Plants & Machines
audio-only version available, too

Plants & Machines

mrv, bbuegler
2013-12-28 (26min)

An introduction to Firmware Analysis
audio-only version available, too

An introduction to Firmware Analysis

Stefan Widmann
2013-12-28 (39min)

Baseband Exploitation in 2013
audio-only version available, too

Baseband Exploitation in 2013

RPW, esizkur
2014-01-01 (58min)

Hacking the Czech Parliament via SMS
audio-only version available, too

Hacking the Czech Parliament via SMS

Ztohoven
2013-12-31 (39min)

Long Distance Quantum Communication
audio-only version available, too

Long Distance Quantum Communication

C B
2013-12-28 (36min)

Warum die Digitale Revolution des Lernens gescheitert ist.
audio-only version available, too

Warum die Digitale Revolution des Lernens gescheitert ist.

Jöran Muuß-Merholz
2013-12-31 (60min)

Hacking as Artistic Practice
audio-only version available, too

Hacking as Artistic Practice

!Mediengruppe Bitnik, !Mediengruppe Bitnik
2014-01-06 (32min)

calc.pw
audio-only version available, too

calc.pw

Kenneth Newwood
2013-12-29 (30min)

Basics of Digital Wireless Communication
audio-only version available, too

Basics of Digital Wireless Communication

Clemens Hopfer
2013-12-28 (46min)

Das FlipDot-Projekt
audio-only version available, too

Das FlipDot-Projekt

RFguy
2013-12-31 (41min)

FPGA 101
audio-only version available, too

FPGA 101

Karsten Becker
2013-12-29 (54min)