conference logo

27C3: We Come In Peace

27c3

Reverse Engineering the MOS 6502 CPU
51 min

Reverse Engineering the MOS 6502 CPU

3510 transistors in 60 minutes

How the Internet sees you
58 min

How the Internet sees you

demonstrating what activities most ISPs see you doing on…

Console Hacking 2010
44 min

Console Hacking 2010

PS3 Epic Fail

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

Fnord-Jahresrückblick 2010
83 min

Fnord-Jahresrückblick 2010

von Atomausstieg bis Zwangsintegration

Hacker Jeopardy
134 min

Hacker Jeopardy

Number guessing for geeks

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

Desktop on the Linux... (and BSD, of course)
55 min

Desktop on the Linux... (and BSD, of course)

you're doing it confused? weird? strange? wrong?

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

The importance of resisting Excessive Government Surveillance
56 min

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations…

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Running your own GSM stack on a phone
61 min

Running your own GSM stack on a phone

Introducing Project OsmocomBB

USB and libusb
56 min

USB and libusb

So much more than a serial port with power

Ich sehe nicht, dass wir nicht zustimmen werden
63 min

Ich sehe nicht, dass wir nicht zustimmen werden

Die Sprache des politischen Verrats und seiner…

Android geolocation using GSM network
63 min

Android geolocation using GSM network

"Where was Waldroid?"

Netzmedienrecht, Lobbyismus und Korruption
52 min

Netzmedienrecht, Lobbyismus und Korruption

Wie wirkt die Lobby von Medienkonzernen?

Logikschaltungen ohne Elektronik
35 min

Logikschaltungen ohne Elektronik

logische Schaltungen mit Pneumatik

Cognitive Psychology for Hackers
65 min

Cognitive Psychology for Hackers

Bugs, exploits, and occasional patches

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

27C3 Keynote
39 min

27C3 Keynote

We come in Peace

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

DIY synthesizers and sound generators
24 min

DIY synthesizers and sound generators

Where does the sound come from?

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

AllColoursAreBeautiful
35 min

AllColoursAreBeautiful

interactive light installation inspired by blinkenlights

"The Concert"
56 min

"The Concert"

a disconcerting moment for free culture

Data Recovery Techniques
60 min

Data Recovery Techniques

Fun with Hard Drives

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

Whistleblowing
59 min

Whistleblowing

Licht ins Dunkel!

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth
64 min

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth

The political philosophy of the Internet

Pentanews Game Show
64 min

Pentanews Game Show

Your opponents will be riddled as well

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Is the SSLiverse a safe place?
58 min

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Friede sei mit Euren Daten
54 min

Friede sei mit Euren Daten

Ein datenschutzrechtlicher Ausflug in ein kirchliches…

Part-Time Scientists
59 min

Part-Time Scientists

One year of Rocket Science!

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Radio der Zukunft
78 min

Radio der Zukunft

Was kommt nach dem analogen Radio?

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Safety on the Open Sea
59 min

Safety on the Open Sea

Safe navigation with the aid of an open sea chart.

Rootkits and Trojans on Your SAP Landscape
76 min

Rootkits and Trojans on Your SAP Landscape

SAP Security and the Enterprise

Adventures in Mapping Afghanistan Elections
52 min

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

File -> Print -> Electronics
51 min

File -> Print -> Electronics

A new circuit board printer will liberate you from the…

Hacker Jeopardy (english translation)
134 min

Hacker Jeopardy (english translation)

Number guessing for geeks

Von Zensursula über Censilia hin zum Kindernet
60 min

Von Zensursula über Censilia hin zum Kindernet

Jahresrückblick rund um Internet-Sperren,…

Wikileaks und mehr
41 min

Wikileaks und mehr

Eine Whistleblowerperspektive auf Leaking-Plattformen

Eins, zwei, drei - alle sind dabei
62 min

Eins, zwei, drei - alle sind dabei

Von der Volkszählung zum Bundesmelderegister

Digitale Spaltung per Gesetz
41 min

Digitale Spaltung per Gesetz

Das Internet und geschaffene soziale Ungleichheit im Alltag…

Spinning the electronic Wheel
63 min

Spinning the electronic Wheel

Still the bicycles for the 21th century

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

International Cyber Jurisdiction
59 min

International Cyber Jurisdiction

Kill Switching” Cyberspace, Cyber Criminal Prosecution &…

Fnord-Jahresrückblick 2010 (english translation)
83 min

Fnord-Jahresrückblick 2010 (english translation)

von Atomausstieg bis Zwangsintegration

Three jobs that journalists will do in 2050
60 min

Three jobs that journalists will do in 2050

Why future media may be more powerful (and more subversive)…

Lightning Talks - Day 4
121 min

Lightning Talks - Day 4

where is my community?

Secure communications below the hearing threshold
57 min

Secure communications below the hearing threshold

Improved approaches for auditive steganography

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

IMMI, from concept to reality
56 min

IMMI, from concept to reality

The Icelandic Modern Media Initiative and our need for a…

Lightning Talks - Day 3
72 min

Lightning Talks - Day 3

where is my community?

Lightning Talks - Day 2
49 min

Lightning Talks - Day 2

4 minutes of fame

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

Copyright Enforcement Vs. Freedoms
55 min

Copyright Enforcement Vs. Freedoms

ACTA, IPRED3 and other upcoming battles of the crusade…

From robot to robot
47 min

From robot to robot

Restoring creativity in school pupils using robotics

Ignorance and Peace Narratives in Cyberspace
30 min

Ignorance and Peace Narratives in Cyberspace

Cloud Computing, Assessment, and Fools like Me.