![We lost the war](https://static.media.ccc.de/media/congress/2005/22C3-920-en-we_lost_the_war.jpg)
73 min
We lost the war
Welcome to the world of tomorrow
![Bluetooth Hacking - The State of The Art](https://static.media.ccc.de/media/congress/2005/22C3-536-en-bluetooth_hacking.jpg)
93 min
Bluetooth Hacking - The State of The Art
A roundup and live demonstrations of all currently known…
!["Xbox" and "Xbox 360" Hacking](https://static.media.ccc.de/media/congress/2005/22C3-559-en-xbox_hacking.jpg)
113 min
"Xbox" and "Xbox 360" Hacking
17 Mistakes Microsoft Made in the Xbox Security System &…
![Fnord Jahresrückblick](https://static.media.ccc.de/media/congress/2005/22C3-601-de-fnord_jahresrueckblick.jpg)
38 min
Fnord Jahresrückblick
Was wirklich geschah
![Esperanto, die internationale Sprache](https://static.media.ccc.de/media/congress/2005/22C3-503-de-esperanto.jpg)
44 min
Esperanto, die internationale Sprache
Eine gut strukturierte Sprache für Geeks und die EU
![Literarisches Code-Quartett](https://static.media.ccc.de/media/congress/2005/22C3-598-de-literarisches_code_quartett.jpg)
59 min
Literarisches Code-Quartett
The good, the bad, and the ugly
![Understanding buffer overflow exploitation](https://static.media.ccc.de/media/congress/2005/22C3-571-en-understanding_buffer_overflow_exploitation.jpg)
59 min
Understanding buffer overflow exploitation
The fascinating interplay of CPU, stack, C-compiler and…
![Quantum Entanglement](https://static.media.ccc.de/media/congress/2005/22C3-1077-en-quantum_entanglement.jpg)
38 min
Quantum Entanglement
An introduction
![Security Nightmares 2006](https://static.media.ccc.de/media/congress/2005/22C3-600-de-security_nightmares.jpg)
64 min
Security Nightmares 2006
Oder: worüber wir nächstes Jahr lachen werden
![Hacker Jeopardy](https://static.media.ccc.de/media/congress/2005/22C3-789-en-hacker_jeopardy.jpg)
107 min
Hacker Jeopardy
The one and only hacker quizshow
![Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded?](https://static.media.ccc.de/media/congress/2005/22C3-546-de-gesundheitskarte.jpg)
167 min
Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded?
Eine unendliche Geschichte - Kapitel: Die Sümpfe der…
![Hacking into TomTom Go](https://static.media.ccc.de/media/congress/2005/22C3-603-de-hacking_tomtom_go.jpg)
52 min
Hacking into TomTom Go
Reverse-Engineering des Embedded-Linux-Navigationssystems
![Paper-Prototyping Workshop](https://static.media.ccc.de/media/congress/2005/22C3-498-de-paper_prototyping_workshop.jpg)
46 min
Paper-Prototyping Workshop
Eine Usability-Methode
![Atmel AVR für Dummies](https://static.media.ccc.de/media/congress/2005/22C3-482-de-atmel_avr_for_dummies.jpg)
46 min
Atmel AVR für Dummies
Was ist denn nun eigentlich so ein 'Interrupt'?
![Black Ops Of TCP/IP 2005.5](https://static.media.ccc.de/media/congress/2005/22C3-1108-en-black_ops_of_tcp_ip.jpg)
60 min
Black Ops Of TCP/IP 2005.5
New Explorations: Large Graphs, Larger Threats
![Logical Language Lojban](https://static.media.ccc.de/media/congress/2005/22C3-569-en-lojban.jpg)
59 min
Logical Language Lojban
A Hackers' /Spoken/ Language?!
![22C3: Private Investigations](https://static.media.ccc.de/media/congress/2005/22C3-390-en-private_investigations.jpg)
58 min
22C3: Private Investigations
Opening Show and Keynote Speech
![Entschwörungstheorie](https://static.media.ccc.de/media/congress/2005/22C3-426-de-entschwoerungstheorie.jpg)
69 min
Entschwörungstheorie
Verschwörungstheoretiker sind hinter mir her!
![I See Airplanes!](https://static.media.ccc.de/media/congress/2005/22C3-543-en-i_see_airplanes.jpg)
51 min
I See Airplanes!
How to build your own radar system
![PyPy - the new Python implementation on the block](https://static.media.ccc.de/media/congress/2005/22C3-586-en-pypy.jpg)
61 min
PyPy - the new Python implementation on the block
Language/VM R&D, whole program type inference, translation…
![Hacking CCTV](https://static.media.ccc.de/media/congress/2005/22C3-605-de-hacking_cctv.jpg)
56 min
Hacking CCTV
Watching the watchers, having fun with cctv cameras, making…
![Military intelligence for terrorists(tm)](https://static.media.ccc.de/media/congress/2005/22C3-513-en-military_intelligence.jpg)
52 min
Military intelligence for terrorists(tm)
A lamer's introduction to retrieving "sensitive"…
![Geometrie ohne Punkte, Geraden & Ebenen](https://static.media.ccc.de/media/congress/2005/22C3-520-de-geometrie_ohne_punkte.jpg)
67 min
Geometrie ohne Punkte, Geraden & Ebenen
Buckminster Fullers Theorie und Praxis einer Wissenschaft…
![Personal experiences bringing technology and new media to disaster areas](https://static.media.ccc.de/media/congress/2005/22C3-478-en-desaster_areas.jpg)
52 min
Personal experiences bringing technology and new media to disaster areas
Experiences from Iraq and post Katrina New Orleans
![22C3 Closing Event](https://static.media.ccc.de/media/congress/2005/22C3-776-en-closing_event.jpg)
44 min
22C3 Closing Event
Famous last words
![Anonymität im Internet](https://static.media.ccc.de/media/congress/2005/22C3-785-de-anon_tor_jap.jpg)
56 min
Anonymität im Internet
Rechtliche und technische Aspekte
![3G Investigations](https://static.media.ccc.de/media/congress/2005/22C3-567-en-3g_investigations.jpg)
52 min
3G Investigations
Scanning your GPRS/UMTS IP network for fun and profit
![Erste Hilfe für Nerds und Geeks](https://static.media.ccc.de/media/congress/2005/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.jpg)
53 min
Erste Hilfe für Nerds und Geeks
Wie überlebe ich (ohne nennenswerten Schäden) einen…
![RFID - overview of protocols, librfid implementation and passive sniffing](https://static.media.ccc.de/media/congress/2005/22C3-769-en-rfid_protocols.jpg)
47 min
RFID - overview of protocols, librfid implementation and passive sniffing
ISO14443, ISO15693, their GPL librfid implementation and…
![Internet Voting in Estonia](https://static.media.ccc.de/media/congress/2005/22C3-1098-en-internet_voting_in_estonia.jpg)
54 min
Internet Voting in Estonia
First-ever pan-national official occasion.
![Private investigations in searching](https://static.media.ccc.de/media/congress/2005/22C3-408-en-private_investigations_in_searching.jpg)
53 min
Private investigations in searching
How to find any book (and many other roadkills) on the…
![WiFi Long Shots](https://static.media.ccc.de/media/congress/2005/22C3-1078-en-wifi_long_shots.jpg)
52 min
WiFi Long Shots
Wireless connections of 20km and more
![A way to fuzzy democracy](https://static.media.ccc.de/media/congress/2005/22C3-572-en-fuzzy_democracy.jpg)
62 min
A way to fuzzy democracy
Using modern communication to transform the way we make…
![CCC Jahresrückblick](https://static.media.ccc.de/media/congress/2005/22C3-483-de-ccc_jahresrueckblick.jpg)
43 min
CCC Jahresrückblick
Ein Überblick über die Aktivitäten des Clubs 2005
![Intrusion Detection Systems](https://static.media.ccc.de/media/congress/2005/22C3-561-en-intrusion_detection_systems.jpg)
51 min
Intrusion Detection Systems
Elevated to the Next Level
![EvoCell - free software for evolving cellular automata](https://static.media.ccc.de/media/congress/2005/22C3-407-en-evocell.jpg)
59 min
EvoCell - free software for evolving cellular automata
Exploring the huge space of possible cellular automata by…
![Applied Machine Learning](https://static.media.ccc.de/media/congress/2005/22C3-544-en-applied_machine_learning.jpg)
49 min
Applied Machine Learning
Brief Introduction into Machine Learning followed by…
![Syscall proxying fun and applications](https://static.media.ccc.de/media/congress/2005/22C3-553-en-syscall_proxying.jpg)
49 min
Syscall proxying fun and applications
Introduction to syscall proxying and applications for in…
![COMPLETE Hard Disk Encryption with FreeBSD](https://static.media.ccc.de/media/congress/2005/22C3-1139-en-complete_harddisk_encryption_with_freebsd.jpg)
66 min
COMPLETE Hard Disk Encryption with FreeBSD
Learn how to effectively protect not only your data but…
![Community mesh networking](https://static.media.ccc.de/media/congress/2005/22C3-1103-en-community_mesh_networking.jpg)
54 min
Community mesh networking
Ubiquitous wireless mesh clouds with olsrd from olsr.org
![Sicherheit vs. Überwachung](https://static.media.ccc.de/media/congress/2005/22C3-1148-de-sicherheitueberwachung.jpg)
57 min
Sicherheit vs. Überwachung
Videoüberwachung am Beispiel des Congressgebäudes
![Covert Communication in a Dark Network](https://static.media.ccc.de/media/congress/2005/22C3-492-en-freenet_new_version.jpg)
64 min
Covert Communication in a Dark Network
A major new version of freenet
![Free Software and Anarchism](https://static.media.ccc.de/media/congress/2005/22C3-517-en-free_software_and_anarchism.jpg)
54 min
Free Software and Anarchism
does this compute?
![Finding and Preventing Buffer Overflows](https://static.media.ccc.de/media/congress/2005/22C3-556-en-preventing_buffer_overflows.jpg)
45 min
Finding and Preventing Buffer Overflows
An overview of static and dynamic approaches
![Hosting a Hacking Challenge - CTF-style](https://static.media.ccc.de/media/congress/2005/22C3-428-en-hacking_challenge.jpg)
45 min
Hosting a Hacking Challenge - CTF-style
Background information on CIPHER, an international…
![Advanced Buffer Overflow Methods [or] Smack the Stack](https://static.media.ccc.de/media/congress/2005/22C3-491-en-advanced_buffer_overflow_methods.jpg)
11 min
Advanced Buffer Overflow Methods [or] Smack the Stack
Cracking the VA-Patch
![Old Skewl Hacking - InfraRed updated](https://static.media.ccc.de/media/congress/2005/22C3-535-en-old_skewl_hacking.jpg)
49 min
Old Skewl Hacking - InfraRed updated
MMIrDA - Major Malfunction's InfraRed Discovery Application
![Anonymous Data Broadcasting by Misuse of Satellite ISPs](https://static.media.ccc.de/media/congress/2005/22C3-589-en-anonymous_data_broadcasting.jpg)
43 min
Anonymous Data Broadcasting by Misuse of Satellite ISPs
An open-source project to develop a tool for broadband…
![Open Source, EU funding and Agile Methods](https://static.media.ccc.de/media/congress/2005/22C3-585-en-agile_business_and_eu_funding.jpg)
58 min
Open Source, EU funding and Agile Methods
Sprint methodology in funded OSS projects
![GNU/Linux für Blinde und Sehbehinderte](https://static.media.ccc.de/media/congress/2005/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.jpg)
53 min
GNU/Linux für Blinde und Sehbehinderte
Erfahrungen aus der Praxis
![Lightning Talks Day 1](https://static.media.ccc.de/media/congress/2005/22C3-911-en-lightning_talk_day_1.jpg)
43 min
Lightning Talks Day 1
Nine five minutes talks by various speakers
![Towards the first Free Software GSM Phone](https://static.media.ccc.de/media/congress/2005/22C3-768-en-free_software_gsm_phone.jpg)
56 min
Towards the first Free Software GSM Phone
Reverse Engineering the Motorola EZX (A768,A780,E680)…
![Sony BMGs digitaler Hausfriedensbruch](https://static.media.ccc.de/media/congress/2005/22C3-1132-de-sony_rootkit.jpg)
56 min
Sony BMGs digitaler Hausfriedensbruch
Über die Durchsetzung industrieller Interessen um jeden…
![A guided tour to European IT lobbying](https://static.media.ccc.de/media/congress/2005/22C3-591-en-european_it_lobbying.jpg)
64 min
A guided tour to European IT lobbying
An investigation into intransparency
![Vulnerability markets](https://static.media.ccc.de/media/congress/2005/22C3-801-en-vulnerability_markets.jpg)
59 min
Vulnerability markets
What is the economic value of a zero-day exploit?
![Learning cryptography through handcyphers](https://static.media.ccc.de/media/congress/2005/22C3-469-en-learning_cryptography.jpg)
35 min
Learning cryptography through handcyphers
Shaping a digital future with ancient wisdom
![Die BioP-II-Studie des BSI](https://static.media.ccc.de/media/congress/2005/22C3-1094-de-biop_2_studie.jpg)
53 min
Die BioP-II-Studie des BSI
Biometrische Feldtests in Europa
![Have you hugged your Mac today?](https://static.media.ccc.de/media/congress/2005/22C3-867-de-have_you_hugged_your_mac_today.jpg)
46 min
Have you hugged your Mac today?
Ein audiovisuelles Live-Feature
![Wargames - Hacker Spielen](https://static.media.ccc.de/media/congress/2005/22C3-427-de-wargames_hacker_spielen.jpg)
63 min
Wargames - Hacker Spielen
Männliche Identitätskonstruktion und spielerische…
![Lawful Interception in VoIP networks](https://static.media.ccc.de/media/congress/2005/22C3-468-en-lawful_interception_of_voip_networks.jpg)
49 min
Lawful Interception in VoIP networks
Old Laws and New Technology the German Way
![Writing better code (in Dylan)](https://static.media.ccc.de/media/congress/2005/22C3-800-en-better_code.jpg)
59 min
Writing better code (in Dylan)
Fast development of object-oriented functional programs
![Hexenbesen und heiliger Gral](https://static.media.ccc.de/media/congress/2005/22C3-1111-de-hexenbesen_und_heiliger_gral.jpg)
49 min
Hexenbesen und heiliger Gral
Vorläufige und subjektive Gedanken zur inhaltlichen…
![Covert channels in TCP/IP: attack and defence](https://static.media.ccc.de/media/congress/2005/22C3-798-en-tcpip_covert_channels.jpg)
42 min
Covert channels in TCP/IP: attack and defence
Creation and detection of IP steganography for covert…
![The truth about Nanotechnology](https://static.media.ccc.de/media/congress/2005/22C3-336-en-nanotechnology.jpg)
53 min
The truth about Nanotechnology
A concise introduction to what NT is, what it can't do yet…
![VoIPhreaking](https://static.media.ccc.de/media/congress/2005/22C3-565-en-voiphreaking.jpg)
49 min
VoIPhreaking
Introduction to SIP Hacking
![Blackberry: call to arms, some provided](https://static.media.ccc.de/media/congress/2005/22C3-596-en-blackberry.jpg)
53 min
Blackberry: call to arms, some provided
Teach yourself upper management in 22 days
![Access to Knowledge](https://static.media.ccc.de/media/congress/2005/22C3-499-en-access_to_knowledge.jpg)
49 min
Access to Knowledge
Copyright, Patents and Politics at the World Intellectual…
![Peer-to-peer under the hood](https://static.media.ccc.de/media/congress/2005/22C3-461-en-peer_to_peer_under_the_hood.jpg)
47 min
Peer-to-peer under the hood
An in-depth look at p2p algorithmics
![The Realtime Podcast](https://static.media.ccc.de/media/congress/2005/22C3-1147-en-the_realtime_podcast.jpg)
61 min
The Realtime Podcast
Everything you need to know about Podcasting
![The Cell Processor](https://static.media.ccc.de/media/congress/2005/22C3-519-en-the_cell_processor.jpg)
64 min
The Cell Processor
Computing of Tomorrow or Yesterday
![Was ist technisches Wissen?](https://static.media.ccc.de/media/congress/2005/22C3-516-de-was_ist_technisches_wissen.jpg)
65 min
Was ist technisches Wissen?
Philosophische Grundlagen technischer Wissenschaften
![Videoüberwachung an deutschen Hochschulen](https://static.media.ccc.de/media/congress/2005/22C3-511-de-videoueberwachung_hochschulen.jpg)
50 min
Videoüberwachung an deutschen Hochschulen
oder: "Über meine Maßnahmen gebe ich keine Auskunft"
![Honeymonkeys](https://static.media.ccc.de/media/congress/2005/22C3-871-en-honeymonkeys.jpg)
46 min
Honeymonkeys
Chasing hackers with a bunch of monkeys
![The very early Computer Game History](https://static.media.ccc.de/media/congress/2005/22C3-424-en-the_very_early_computer_game_history.jpg)
53 min
The very early Computer Game History
How the games have become the first digital mass product
![Autodafé: An Act of Software Torture](https://static.media.ccc.de/media/congress/2005/22C3-606-en-autodafe.jpg)
38 min
Autodafé: An Act of Software Torture
Presentation of an innovative buffer overflow uncovering…
![Hacking health](https://static.media.ccc.de/media/congress/2005/22C3-489-en-hacking_health.jpg)
47 min
Hacking health
Electronic Patient Records in The Netherlands
![Digital Identity and the Ghost in the Machine](https://static.media.ccc.de/media/congress/2005/22C3-549-en-digital_identity.jpg)
52 min
Digital Identity and the Ghost in the Machine
"Once I Was Lost But Now I've Been Found"
![Urheberrecht](https://static.media.ccc.de/media/congress/2005/22C3-782-de-urheberrecht.jpg)
53 min
Urheberrecht
Fakten, Mythen, Geschichte(n) und mögliche Zukünfte
![On working memory and mental imagery](https://static.media.ccc.de/media/congress/2005/22C3-464-en-working_memory_mental_imagery.jpg)
60 min
On working memory and mental imagery
How does the brain learn to think?
![Hashing Trusted Computing](https://static.media.ccc.de/media/congress/2005/22C3-495-de-hash_trust_compute.jpg)
58 min
Hashing Trusted Computing
Der aktuelle Stand
![WarTracking](https://static.media.ccc.de/media/congress/2005/22C3-580-en-wartracking.jpg)
53 min
WarTracking
Satellite Tracking, harvesting and security
![Secure Code](https://static.media.ccc.de/media/congress/2005/22C3-530-en-seccode.jpg)
57 min
Secure Code
Why developing Secure Software is like playing Marble…
![Lightning Talks Day 4](https://static.media.ccc.de/media/congress/2005/22C3-915-en-lightning_talk_day_4.jpg)
49 min
Lightning Talks Day 4
Nine five minutes talks by various speakers
![Lightning Talks Day 3](https://static.media.ccc.de/media/congress/2005/22C3-913-en-lightning_talk_day_3.jpg)
65 min
Lightning Talks Day 3
Nine five minutes talks by various speakers
![Changing Realities](https://static.media.ccc.de/media/congress/2005/22C3-931-en-changing_realities.jpg)
58 min
Changing Realities
Innovation, user-creation, activism and entrepreneurship in…
![The Realtime thing](https://static.media.ccc.de/media/congress/2005/22C3-575-en-the_realtime_thing.jpg)
44 min
The Realtime thing
What the heck is realtime - and what to do with it
![Corp vs. Corp](https://static.media.ccc.de/media/congress/2005/22C3-423-en-corp_vs_corp.jpg)
56 min
Corp vs. Corp
Profiling Modern Espionage
![Cybercrime Convention](https://static.media.ccc.de/media/congress/2005/22C3-405-en-cybercrime_convention.jpg)
57 min
Cybercrime Convention
Hacking on its way to become a criminal act?
![e-Voting: The silent decline of public control](https://static.media.ccc.de/media/congress/2005/22C3-1134-en-the_silent_decline_of_public_control.jpg)
59 min
e-Voting: The silent decline of public control
Why German voting machines do not meet the requirements of…
![The Future of Virtualization](https://static.media.ccc.de/media/congress/2005/22C3-788-en-the_future_of_virtualization.jpg)
55 min
The Future of Virtualization
The "anyOS" paradigm and its implications through…
![Technological art off the trodden tracks](https://static.media.ccc.de/media/congress/2005/22C3-1085-en-technological_art.jpg)
55 min
Technological art off the trodden tracks
Artists (mis)using technology
![WSIS - The Review](https://static.media.ccc.de/media/congress/2005/22C3-470-en-wsis_review.jpg)
56 min
WSIS - The Review
Hacking a Dictatorship
![Rückschau auf die BigBrotherAwards 2005](https://static.media.ccc.de/media/congress/2005/22C3-791-de-big_brother_awards.jpg)
48 min
Rückschau auf die BigBrotherAwards 2005
Datenkraken beim Kragen packen
![Collateral Damage](https://static.media.ccc.de/media/congress/2005/22C3-505-en-collateral_damage.jpg)
54 min
Collateral Damage
Consequences of Spam and Virus Filtering for the E-Mail…
![The grey commons](https://static.media.ccc.de/media/congress/2005/22C3-1101-en-the_grey_commons.jpg)
60 min
The grey commons
Strategic considerations in the copyfight.
![Search Engines - Oracles of the Information Society](https://static.media.ccc.de/media/congress/2005/22C3-1104-en-search_oracle_society.jpg)
56 min
Search Engines - Oracles of the Information Society
The Saga continues: Search Engines, Technology, Politics,…
![Lightning Talks Day 2](https://static.media.ccc.de/media/congress/2005/22C3-912-en-lightning_talk_day_2.jpg)
37 min
Lightning Talks Day 2
Nine five minutes talks by various speakers
![Software Patenting](https://static.media.ccc.de/media/congress/2005/22C3-593-en-software_patenting.jpg)
47 min
Software Patenting
Adequate means of protection for software.
![The Web according to W3C](https://static.media.ccc.de/media/congress/2005/22C3-429-en-w3c_web.jpg)
55 min
The Web according to W3C
How to turn your idea into a standard
![Hacking Data Retention](https://static.media.ccc.de/media/congress/2005/22C3-466-en-hacking_data_retention.jpg)
49 min
Hacking Data Retention
How bureaucrats fail to fight terror
![Terminator Genes and GURT - Biological Restrictions Management](https://static.media.ccc.de/media/congress/2005/22C3-828-en-terminator_genes_and_gurt.jpg)
42 min
Terminator Genes and GURT - Biological Restrictions Management
Five Years after the announcement of a quasi moratorium
![VoIP 2005 - Regulierte Revolution](https://static.media.ccc.de/media/congress/2005/22C3-577-de-voip_2005_regulierte_revolution.jpg)
59 min
VoIP 2005 - Regulierte Revolution
Ansätze für die Regulierung von VoIP und NGN im vergangenen…
![Exploring Protocols and Services on Internet Connected Embedded Devices](https://static.media.ccc.de/media/congress/2005/22C3-602-en-protocols_services_embedded_devices.jpg)
60 min
Exploring Protocols and Services on Internet Connected Embedded Devices
Looking for Insecurities
![Hopalong Casualty](https://static.media.ccc.de/media/congress/2005/22C3-531-en-hopalong_casualty.jpg)
45 min
Hopalong Casualty
On automated video analysis of human behaviour
![W3C on Mobile, CSS, Multimodal and more](https://static.media.ccc.de/media/congress/2005/22C3-933-en-w3c_mobil_css_multimodal.jpg)
54 min
W3C on Mobile, CSS, Multimodal and more
A look at the upcoming standards by W3C
![Recent Developments in EU Data Retention proposals](https://static.media.ccc.de/media/congress/2005/22C3-568-en-eu_data_retention_proposals.jpg)
52 min
Recent Developments in EU Data Retention proposals
Commission vs. Council - the lesser of two evils?
![Privaterra - Report from the field](https://static.media.ccc.de/media/congress/2005/22C3-473-en-privaterra.jpg)
53 min
Privaterra - Report from the field
IT Security and Human Rights organizations - The needs, the…
![Message generation at the info layer](https://static.media.ccc.de/media/congress/2005/22C3-1102-en-message_generation_at_the_info_layer.jpg)
27 min
Message generation at the info layer
Basic introduction in coding on unvirtual realities.
![The Right Track](https://static.media.ccc.de/media/congress/2005/22C3-562-en-the_right_track.jpg)
58 min