22C3: Private Investigations

Full playlist: Video / Audio
We lost the war
73 min

We lost the war

Welcome to the world of tomorrow

Bluetooth Hacking - The State of The Art
93 min

Bluetooth Hacking - The State of The Art

A roundup and live demonstrations of all currently known…

"Xbox" and "Xbox 360" Hacking
113 min

"Xbox" and "Xbox 360" Hacking

17 Mistakes Microsoft Made in the Xbox Security System &…

Fnord Jahresrückblick
38 min

Fnord Jahresrückblick

Was wirklich geschah

Esperanto, die internationale Sprache
44 min

Esperanto, die internationale Sprache

Eine gut strukturierte Sprache für Geeks und die EU

Literarisches Code-Quartett
59 min

Literarisches Code-Quartett

The good, the bad, and the ugly

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Quantum Entanglement
38 min

Quantum Entanglement

An introduction

Security Nightmares 2006
64 min

Security Nightmares 2006

Oder: worüber wir nächstes Jahr lachen werden

Hacker Jeopardy
107 min

Hacker Jeopardy

The one and only hacker quizshow

Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded?
167 min

Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded?

Eine unendliche Geschichte - Kapitel: Die Sümpfe der…

Hacking into TomTom Go
52 min

Hacking into TomTom Go

Reverse-Engineering des Embedded-Linux-Navigationssystems

Paper-Prototyping Workshop
46 min

Paper-Prototyping Workshop

Eine Usability-Methode

Black Ops Of TCP/IP 2005.5
60 min

Black Ops Of TCP/IP 2005.5

New Explorations: Large Graphs, Larger Threats

Atmel AVR für Dummies
46 min

Atmel AVR für Dummies

Was ist denn nun eigentlich so ein 'Interrupt'?

Logical Language Lojban
59 min

Logical Language Lojban

A Hackers' /Spoken/ Language?!

22C3: Private Investigations
58 min

22C3: Private Investigations

Opening Show and Keynote Speech

Entschwörungstheorie
69 min

Entschwörungstheorie

Verschwörungstheoretiker sind hinter mir her!

I See Airplanes!
51 min

I See Airplanes!

How to build your own radar system

PyPy - the new Python implementation on the block
61 min

PyPy - the new Python implementation on the block

Language/VM R&D, whole program type inference, translation…

Hacking CCTV
56 min

Hacking CCTV

Watching the watchers, having fun with cctv cameras, making…

Military intelligence for terrorists(tm)
52 min

Military intelligence for terrorists(tm)

A lamer's introduction to retrieving "sensitive"…

Geometrie ohne Punkte, Geraden & Ebenen
67 min

Geometrie ohne Punkte, Geraden & Ebenen

Buckminster Fullers Theorie und Praxis einer Wissenschaft…

Personal experiences bringing technology and new media to disaster areas
52 min

Personal experiences bringing technology and new media to disaster areas

Experiences from Iraq and post Katrina New Orleans

22C3 Closing Event
44 min

22C3 Closing Event

Famous last words

Anonymität im Internet
56 min

Anonymität im Internet

Rechtliche und technische Aspekte

3G Investigations
52 min

3G Investigations

Scanning your GPRS/UMTS IP network for fun and profit

Erste Hilfe für Nerds und Geeks
53 min

Erste Hilfe für Nerds und Geeks

Wie überlebe ich (ohne nennenswerten Schäden) einen…

Internet Voting in Estonia
54 min

Internet Voting in Estonia

First-ever pan-national official occasion.

RFID - overview of protocols, librfid implementation and passive sniffing
47 min

RFID - overview of protocols, librfid implementation and passive sniffing

ISO14443, ISO15693, their GPL librfid implementation and…

A way to fuzzy democracy
62 min

A way to fuzzy democracy

Using modern communication to transform the way we make…

Private investigations in searching
53 min

Private investigations in searching

How to find any book (and many other roadkills) on the…

EvoCell - free software for evolving cellular automata
59 min

EvoCell - free software for evolving cellular automata

Exploring the huge space of possible cellular automata by…

Intrusion Detection Systems
51 min

Intrusion Detection Systems

Elevated to the Next Level

Applied Machine Learning
49 min

Applied Machine Learning

Brief Introduction into Machine Learning followed by…

Lyrical I
46 min

Lyrical I

Abschluss des CCC-Poesie-Wettbewerbs

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more

CCC Jahresrückblick
43 min

CCC Jahresrückblick

Ein Überblick über die Aktivitäten des Clubs 2005

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

COMPLETE Hard Disk Encryption with FreeBSD
66 min

COMPLETE Hard Disk Encryption with FreeBSD

Learn how to effectively protect not only your data but…

Covert Communication in a Dark Network
64 min

Covert Communication in a Dark Network

A major new version of freenet

Free Software and Anarchism
54 min

Free Software and Anarchism

does this compute?

Community mesh networking
54 min

Community mesh networking

Ubiquitous wireless mesh clouds with olsrd from olsr.org

Sicherheit vs. Überwachung
57 min

Sicherheit vs. Überwachung

Videoüberwachung am Beispiel des Congressgebäudes

Finding and Preventing Buffer Overflows
45 min

Finding and Preventing Buffer Overflows

An overview of static and dynamic approaches

Hosting a Hacking Challenge - CTF-style
45 min

Hosting a Hacking Challenge - CTF-style

Background information on CIPHER, an international…

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Old Skewl Hacking - InfraRed updated
49 min

Old Skewl Hacking - InfraRed updated

MMIrDA - Major Malfunction's InfraRed Discovery Application

Open Source, EU funding and Agile Methods
58 min

Open Source, EU funding and Agile Methods

Sprint methodology in funded OSS projects

Anonymous Data Broadcasting by Misuse of Satellite ISPs
43 min

Anonymous Data Broadcasting by Misuse of Satellite ISPs

An open-source project to develop a tool for broadband…

GNU/Linux für Blinde und Sehbehinderte
53 min

GNU/Linux für Blinde und Sehbehinderte

Erfahrungen aus der Praxis

Lightning Talks Day 1
43 min

Lightning Talks Day 1

Nine five minutes talks by various speakers

Vulnerability markets
59 min

Vulnerability markets

What is the economic value of a zero-day exploit?

A guided tour to European IT lobbying
64 min

A guided tour to European IT lobbying

An investigation into intransparency

Towards the first Free Software GSM Phone
56 min

Towards the first Free Software GSM Phone

Reverse Engineering the Motorola EZX (A768,A780,E680)…

Sony BMGs digitaler Hausfriedensbruch
56 min

Sony BMGs digitaler Hausfriedensbruch

Über die Durchsetzung industrieller Interessen um jeden…

Learning cryptography through handcyphers
35 min

Learning cryptography through handcyphers

Shaping a digital future with ancient wisdom

Wargames - Hacker Spielen
63 min

Wargames - Hacker Spielen

Männliche Identitätskonstruktion und spielerische…

Die BioP-II-Studie des BSI
53 min

Die BioP-II-Studie des BSI

Biometrische Feldtests in Europa

Lawful Interception in VoIP networks
49 min

Lawful Interception in VoIP networks

Old Laws and New Technology the German Way

Writing better code (in Dylan)
59 min

Writing better code (in Dylan)

Fast development of object-oriented functional programs

Hexenbesen und heiliger Gral
49 min

Hexenbesen und heiliger Gral

Vorläufige und subjektive Gedanken zur inhaltlichen…

The truth about Nanotechnology
53 min

The truth about Nanotechnology

A concise introduction to what NT is, what it can't do yet…

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

Access to Knowledge
49 min

Access to Knowledge

Copyright, Patents and Politics at the World Intellectual…

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

The Cell Processor
64 min

The Cell Processor

Computing of Tomorrow or Yesterday

Was ist technisches Wissen?
65 min

Was ist technisches Wissen?

Philosophische Grundlagen technischer Wissenschaften

Videoüberwachung an deutschen Hochschulen
50 min

Videoüberwachung an deutschen Hochschulen

oder: "Über meine Maßnahmen gebe ich keine Auskunft"

The Realtime Podcast
61 min

The Realtime Podcast

Everything you need to know about Podcasting

Autodafé: An Act of Software Torture
38 min

Autodafé: An Act of Software Torture

Presentation of an innovative buffer overflow uncovering…

Honeymonkeys
46 min

Honeymonkeys

Chasing hackers with a bunch of monkeys

The very early Computer Game History
53 min

The very early Computer Game History

How the games have become the first digital mass product

Hacking health
47 min

Hacking health

Electronic Patient Records in The Netherlands

Urheberrecht
53 min

Urheberrecht

Fakten, Mythen, Geschichte(n) und mögliche Zukünfte

Digital Identity and the Ghost in the Machine
52 min

Digital Identity and the Ghost in the Machine

"Once I Was Lost But Now I've Been Found"

Bad TRIPs
54 min

Bad TRIPs

What the WTO Treaty did in Hongkong and what that means for…

On working memory and mental imagery
60 min

On working memory and mental imagery

How does the brain learn to think?

Hashing Trusted Computing
58 min

Hashing Trusted Computing

Der aktuelle Stand

WarTracking
53 min

WarTracking

Satellite Tracking, harvesting and security

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

Lightning Talks Day 4
49 min

Lightning Talks Day 4

Nine five minutes talks by various speakers

Changing Realities
58 min

Changing Realities

Innovation, user-creation, activism and entrepreneurship in…

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

Lightning Talks Day 3
65 min

Lightning Talks Day 3

Nine five minutes talks by various speakers

Cybercrime Convention
57 min

Cybercrime Convention

Hacking on its way to become a criminal act?

muXTCP
50 min

muXTCP

Writing your own flexible Userland TCP/IP Stack - Ninja…

e-Voting: The silent decline of public control
59 min

e-Voting: The silent decline of public control

Why German voting machines do not meet the requirements of…

The Future of Virtualization
55 min

The Future of Virtualization

The "anyOS" paradigm and its implications through…

Technological art off the trodden tracks
55 min

Technological art off the trodden tracks

Artists (mis)using technology

WSIS - The Review
56 min

WSIS - The Review

Hacking a Dictatorship

Rückschau auf die BigBrotherAwards 2005
48 min

Rückschau auf die BigBrotherAwards 2005

Datenkraken beim Kragen packen

Corp vs. Corp
56 min

Corp vs. Corp

Profiling Modern Espionage

Collateral Damage
54 min

Collateral Damage

Consequences of Spam and Virus Filtering for the E-Mail…

Fair Code
54 min

Fair Code

Free/Open Source Software and the Digital Divide

The grey commons
60 min

The grey commons

Strategic considerations in the copyfight.

Lightning Talks Day 2
37 min

Lightning Talks Day 2

Nine five minutes talks by various speakers

The Web according to W3C
55 min

The Web according to W3C

How to turn your idea into a standard

Software Patenting
47 min

Software Patenting

Adequate means of protection for software.

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

Terminator Genes and GURT - Biological Restrictions Management
42 min

Terminator Genes and GURT - Biological Restrictions Management

Five Years after the announcement of a quasi moratorium

VoIP 2005 - Regulierte Revolution
59 min

VoIP 2005 - Regulierte Revolution

Ansätze für die Regulierung von VoIP und NGN im vergangenen…

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

W3C on Mobile, CSS, Multimodal and more
54 min

W3C on Mobile, CSS, Multimodal and more

A look at the upcoming standards by W3C

Recent Developments in EU Data Retention proposals
52 min

Recent Developments in EU Data Retention proposals

Commission vs. Council - the lesser of two evils?

Message generation at the info layer
27 min

Message generation at the info layer

Basic introduction in coding on unvirtual realities.

Privaterra - Report from the field
53 min

Privaterra - Report from the field

IT Security and Human Rights organizations - The needs, the…

The Right Track
58 min

The Right Track

A new approach to copyright in the digital world