Events for tag "27c3"

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

Ich sehe nicht, dass wir nicht zustimmen werden
63 min

Ich sehe nicht, dass wir nicht zustimmen werden

Die Sprache des politischen Verrats und seiner…

Safety on the Open Sea
59 min

Safety on the Open Sea

Safe navigation with the aid of an open sea chart.

Von Zensursula über Censilia hin zum Kindernet
60 min

Von Zensursula über Censilia hin zum Kindernet

Jahresrückblick rund um Internet-Sperren,…

Logikschaltungen ohne Elektronik
35 min

Logikschaltungen ohne Elektronik

logische Schaltungen mit Pneumatik

USB and libusb
56 min

USB and libusb

So much more than a serial port with power

File -> Print -> Electronics
51 min

File -> Print -> Electronics

A new circuit board printer will liberate you from the…

"The Concert"
56 min

"The Concert"

a disconcerting moment for free culture

Ignorance and Peace Narratives in Cyberspace
30 min

Ignorance and Peace Narratives in Cyberspace

Cloud Computing, Assessment, and Fools like Me.

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

Eins, zwei, drei - alle sind dabei
62 min

Eins, zwei, drei - alle sind dabei

Von der Volkszählung zum Bundesmelderegister

The importance of resisting Excessive Government Surveillance
56 min

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations…

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

International Cyber Jurisdiction
59 min

International Cyber Jurisdiction

Kill Switching” Cyberspace, Cyber Criminal Prosecution &…

How the Internet sees you
58 min

How the Internet sees you

demonstrating what activities most ISPs see you doing on…

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

Wikileaks und mehr
41 min

Wikileaks und mehr

Eine Whistleblowerperspektive auf Leaking-Plattformen

Netzmedienrecht, Lobbyismus und Korruption
52 min

Netzmedienrecht, Lobbyismus und Korruption

Wie wirkt die Lobby von Medienkonzernen?

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Three jobs that journalists will do in 2050
60 min

Three jobs that journalists will do in 2050

Why future media may be more powerful (and more subversive)…

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

AllColoursAreBeautiful
35 min

AllColoursAreBeautiful

interactive light installation inspired by blinkenlights

Cognitive Psychology for Hackers
65 min

Cognitive Psychology for Hackers

Bugs, exploits, and occasional patches

Digitale Spaltung per Gesetz
41 min

Digitale Spaltung per Gesetz

Das Internet und geschaffene soziale Ungleichheit im Alltag…

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

IMMI, from concept to reality
56 min

IMMI, from concept to reality

The Icelandic Modern Media Initiative and our need for a…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Copyright Enforcement Vs. Freedoms
55 min

Copyright Enforcement Vs. Freedoms

ACTA, IPRED3 and other upcoming battles of the crusade…

From robot to robot
47 min

From robot to robot

Restoring creativity in school pupils using robotics

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Hacker Jeopardy
134 min

Hacker Jeopardy

Number guessing for geeks

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

Desktop on the Linux... (and BSD, of course)
55 min

Desktop on the Linux... (and BSD, of course)

you're doing it confused? weird? strange? wrong?

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

Spinning the electronic Wheel
63 min

Spinning the electronic Wheel

Still the bicycles for the 21th century

Friede sei mit Euren Daten
54 min

Friede sei mit Euren Daten

Ein datenschutzrechtlicher Ausflug in ein kirchliches…

Fnord-Jahresrückblick 2010
83 min

Fnord-Jahresrückblick 2010

von Atomausstieg bis Zwangsintegration

Adventures in Mapping Afghanistan Elections
52 min

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

Pentanews Game Show
64 min

Pentanews Game Show

Your opponents will be riddled as well

Is the SSLiverse a safe place?
58 min

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…