65 min
Take a deep breath into pollution trickery
61 min
Eine Einführung für blutige Anfänger
62 min
und warum das gar nicht so einfach ist.
69 min
Die absurdesten Szenen aus dem…
128 min
Die Wissenschaftsgala vom 32C3
60 min
How not to do DOCSIS networks
61 min
The future does not look much brighter than ten years ago.…
60 min
Uncovering images from the secret Stasi archives.
62 min
Conditions for a Successful Market Entry of Decentralized…
60 min
Wie es dazu kam und was daraus zu lernen ist
61 min
An Artificial Intelligence exploration into the creation of…
60 min
Politische Phrasologie – warum man aus dem ganzen Zeug, das…
60 min
A deep dive into the surveillance features of North Korea's…
60 min
The potential for payment system abuse
57 min
What hacking has to do with avantgarde art of the 1960ies…
60 min
How to drop more of your privileges to reduce attack…
29 min
Wireless Physical Layer Security & More...
55 min
The future of space exploration
51 min
Guess what? The Government of Rafael Correa actually is…
60 min
Eine Reise auf die dunkle Seite
60 min
Expeditionen ins Kommentierreich
54 min
An introduction to reverse engineering network protocols
59 min
A complete toolbox for IoT security
61 min
How the institutions fuck up, and how we fuck it up as well
60 min
Living with a vulnerable implanted device
62 min
The surveillance state & modern day COINTELPRO tactics
60 min
Making it easier to avoid low-level compromise, and why…
58 min
Ein Computerwurm für PLCs
53 min
Amiga Hardware Design And Programming
60 min
How hard can it be? An introduction into CubeSat development
60 min
1 Jahr Freifunk in Südhessen
59 min
Large Scale Authorship Attribution from Executable Binaries…
35 min
The future of Neuro-Headsets and concepts towards…
60 min
How advanced threat actors learn and change with innovation…
30 min
How I failed to run an open source project
58 min
Creativity, Archives & Digital Media from the Chinese…
49 min
How to turn your KVM into a raging key-logging monster
30 min
Visualizing WLAN Channel Usage on OpenWRT
60 min
from key distribution to position-based cryptography
58 min
An inside look at x86 CPU design
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
55 min
The role of social-graphs for Drones in the War on Terror.
60 min
Was kann das? Wie kann ich das nutzen? Wo besteht…
60 min
How to design and fabricate soft robots using everyday…
60 min
The art of failure taught by improv theatre
61 min
How drones, IMSI Catchers, and cameras are shaping our…
27 min
From the Bill on Intelligence to the State of Emergency
51 min
An OpenWrt perspective on the development of Linux 802.11…
60 min
An attempt of calculating the economic cost of buffering.
59 min
Discrimination and ethics in the data-driven society
27 min
Hackers, I call thee to our Oceans!
57 min
From DEFCON to the DARPA Cyber Grand Challenge
60 min
Or how I learned to stop worrying and love urandom
49 min
Exploiting Free Data Channels and Security Problems
58 min
A brief introduction to search over encrypted data
60 min
Geheimdienste kontrolliert man am besten, indem man ihre…
30 min
The first Open Source Cinema Camera
59 min
*(will be specified later based on usability test with…
59 min
Understanding and adapting EU legal guidelines from a FOSS…
60 min
A gentle introduction to post-quantum cryptography
61 min
Projektvorstellungen der JunghackerInnen
63 min
exploring two decades of transport layer insecurity
60 min
Let's Build together a Free, Neutral and Decentralized…
47 min
Trash the prints, print the trash
60 min
phone verified accounts bringing the Hessian army back to…
28 min
One can create art and beauty with … pixels
53 min
Social media break up coordinator
62 min
Pure capability-based security for UNIX
43 min
Fun and games until someone uses IPv6 or TCP
34 min
modular and precise resource management
60 min
Disaggregating Data by Race and Ethnicity to Curb…
60 min
NDG, BÜPF und wie wir uns dagegen wehren
56 min
Cultural Commons durch Kunstraub
56 min
Philosophical Perspectives on Privacy Drawing on the…
60 min
Calling secret service agents to quit their jobs
32 min
Math, Functional Programming, Theorem Proving, and an…
60 min
How social media companies are creating a global morality…
22 min
Net-activism strategies against fake web companies
51 min
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
48 min
How to bring student experiments into space.
57 min
Perceptions of hackers and hacktivists on their…
32 min
Overview on Current Efforts - We Need Moar H4x0rs?!
30 min
Journalism ♥ Computer Science
58 min
Export controls and exploit regulations: braindead and…
46 min
Engaging social innovation and social innovators
60 min
Findings from a Research Project on Digital Surveillance…
62 min
Access to knowledge for every member of society
32 min
How hacking is conceived in social science research