Chaos Communication Camp 2007

Full playlist: Video
A Case Against C++
53 min

A Case Against C++

Why C++ is bad for the environment, causes global warming…

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

B.A.T.M.A.N. - Better Approach to Mobile Ad-Hoc Networking
60 min

B.A.T.M.A.N. - Better Approach to Mobile Ad-Hoc Networking

New routing algorithm and daemon for wireless community…

UAVs, Drohnen, Quadrocopter
32 min

UAVs, Drohnen, Quadrocopter

md4-200, md4-1000 (hoffentlich), Opensource-Quadrocopter…

Antivirus (In)Security
62 min

Antivirus (In)Security

Bugs in Antivirus Software

Breaking WEP in less than 60 Seconds
48 min

Breaking WEP in less than 60 Seconds

the next level

Practical RFID Attacks
65 min

Practical RFID Attacks

writing, sniffing & emulating 13.56MHz RFID tags with…

Swedish analysis of Nazi crypto TTYs
54 min

Swedish analysis of Nazi crypto TTYs

How Beurling et al. broke the Siemens & Halske T52 crypto…

Was Du heute (legal) gegen die Stasi 2.0 tun kannst
69 min

Was Du heute (legal) gegen die Stasi 2.0 tun kannst

Widerstand ist nicht zwecklos, wenn er schlau und…

Tits & Bits
46 min

Tits & Bits

pr0n 2.0

21st Century digital Bikes
53 min

21st Century digital Bikes

No Gas, No Fee or Tax, No Driver License, what's possible…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

Fun with NFC Mobile Phones
47 min

Fun with NFC Mobile Phones

Near Field Communication

GPS-Trackers
48 min

GPS-Trackers

How they track you when your mobile is switched off

monochrom's Taugshow #12
119 min

monochrom's Taugshow #12

A joyful bucket full of good clean fanaticism, crisis,…

GNU Radio & the Universal Software Radio Peripheral
44 min

GNU Radio & the Universal Software Radio Peripheral

Current Capabilities and Future Directions

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software

Arguments Against Surveillance
64 min

Arguments Against Surveillance

'Cos "I Don't Like It" Is Not Enough!

How to (really) forget your secret crypto key
34 min

How to (really) forget your secret crypto key

What you always wanted to know about Flash memory - but…

Drohnen züchten
36 min

Drohnen züchten

UAVs und andere spannende Dinge

Hardware Hacking for Software Geeks
98 min

Hardware Hacking for Software Geeks

Essential Tips and Tricks

Hack Your Brain
55 min

Hack Your Brain

Using Sound & Light Machines to achieve desired states of…

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…

Inside Sputnik & OpenBeacon - Smart Dust for the Masses
46 min

Inside Sputnik & OpenBeacon - Smart Dust for the Masses

a hackers guide into homebrewn 2.4GHz hardware & peripherals

Hacking on the Nanoscale
41 min

Hacking on the Nanoscale

Dual Beam Devices for Rapid Prototyping and Reverse…

Estonia and information warfare
71 min

Estonia and information warfare

What really happened in Estonia, and what does it mean to…

Proof by Erasure
46 min

Proof by Erasure

The Life of John von Neumann

The School of Hacking Art
51 min

The School of Hacking Art

Is it possible? 10 years experience from the first man who…

Dungeons and Hyperlinks
59 min

Dungeons and Hyperlinks

Electronic Literature and Digital Narratives from Text…

Geocaching and Alternate Reality Games
58 min

Geocaching and Alternate Reality Games

Play Simulations of Future Problems

Hacking Space
37 min

Hacking Space

Cheap access to Space using lighter then air methods

People, Profiles and Trust
38 min

People, Profiles and Trust

On interpersonal trust in web-mediated social spaces

Enabling Innovation in Europe
33 min

Enabling Innovation in Europe

Hacker Spaces, Startups, and a new approach to social…

Terrorists and the Internet
41 min

Terrorists and the Internet

A Justification for Stricter Laws?

ZERT: VML, ANI and Third-party Patches
65 min

ZERT: VML, ANI and Third-party Patches

Assembly - lots of it.

News on Colliding Hashes
31 min

News on Colliding Hashes

The ball is rolling: One of the biggest challenges in…

Hacking the Bionic Man
47 min

Hacking the Bionic Man

Science fiction or security in 2040?

Life & Complexity
56 min

Life & Complexity

Organisation, information and optimisation in real and…

Rebellious Communication and the Federal Flood
47 min

Rebellious Communication and the Federal Flood

My experience and the role of bloggers, podcasters, and…

WIPO Broadcasting Treaty
47 min

WIPO Broadcasting Treaty

Lobbying on an International Scale

Online Search
79 min

Online Search

A Necessary Investigation Instrument?