conference logo

23C3: Who can you trust?

23c3

Full playlist: Video / Audio
The worst part of censorship is XXXXX
60 min

The worst part of censorship is XXXXX

Investigating large-scale Internet content filtering

Sie haben das Recht zu schweigen
71 min

Sie haben das Recht zu schweigen

Durchsuchung, Beschlagnahme, Vernehmung - Strategien für…

Fnord Jahresrückblick
61 min

Fnord Jahresrückblick

Wir helfen Euch, die Fnords zu sehen

Schlossöffnung bei der Staatssicherheit der DDR
51 min

Schlossöffnung bei der Staatssicherheit der DDR

Werkzeuge und Vorgehen der STASI

Drones
50 min

Drones

Autonomous flying vehicles

To live outside the law you gotta be honest
54 min

To live outside the law you gotta be honest

Ist nicht jedes Passwort eine Manifestation des Mißtrauens?

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

Hacker Jeopardy
107 min

Hacker Jeopardy

The one and only hacker quizshow

Security Nightmares 2007
72 min

Security Nightmares 2007

Oder: worüber wir nächstes Jahr lachen werden

Digitale Bildforensik
74 min

Digitale Bildforensik

Spuren in Digitalfotos

Body hacking
65 min

Body hacking

Functional body modification

Console Hacking 2006
50 min

Console Hacking 2006

Xbox 360, Playstation 3, Wii

Chaos und Kritische Theorie
47 min

Chaos und Kritische Theorie

Adorno, Wilson und Diskordianismus

Inside VMware
68 min

Inside VMware

How VMware, VirtualPC and Parallels actually work

Unlocking FileVault
54 min

Unlocking FileVault

An analysis of Apple's encrypted disk storage system

How to implement bignum arithmetic
47 min

How to implement bignum arithmetic

A short look at my pet project implementation

Pornography and Technology
40 min

Pornography and Technology

a love affair

A not so smart card
47 min

A not so smart card

How bad security decisions can ruin a debit card design

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Who can you trust?
64 min

Who can you trust?

Opening Ceremony and Keynote

Nintendo DS
43 min

Nintendo DS

Introduction and hacking

Kritik an den Illuminaten zwischen 1787 und 2006
51 min

Kritik an den Illuminaten zwischen 1787 und 2006

Der Stand der Auseinandersetzung zwischen Discordiern und…

Hacking fingerprint recognition systems
60 min

Hacking fingerprint recognition systems

Kann ich dir ein Bier ausgeben?

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

An Introduction to Traffic Analysis
60 min

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

Analysis of a strong Random Number Generator
95 min

Analysis of a strong Random Number Generator

by anatomizing Linux' CPRNG

A Probabilistic Trust Model for GnuPG
55 min

A Probabilistic Trust Model for GnuPG

A new way of evaluating a PGP web of trust by using a…

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes

4+2+1 Jahre BigBrotherAwards Deutschland
52 min

4+2+1 Jahre BigBrotherAwards Deutschland

Eine Lesung aus dem Buch "Schwarzbuch Datenschutz"

CCC Jahresrückblick
59 min

CCC Jahresrückblick

Ein Überblick über die Aktivitäten des Clubs 2006

TV-B-Gone
61 min

TV-B-Gone

Better Living Through Inventing

Ego Striptease - Ich zeig dir, wer du bist
60 min

Ego Striptease - Ich zeig dir, wer du bist

Blogs, flickr, etc: warum machen wir es ihnen so einfach?

Tracking von Personen in Videoszenen
64 min

Tracking von Personen in Videoszenen

Wie trackt man automatisch sich bewegende Objekte?

Go - Das Spiel für die Menschen
58 min

Go - Das Spiel für die Menschen

Auch für Computer? - Nicht beim Go!

DVB-T - From Pixeldata to COFDM Transmission
58 min

DVB-T - From Pixeldata to COFDM Transmission

How to build a complete FPGA-based DVB-T transmitter

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

Vehicular Communication and VANETs
62 min

Vehicular Communication and VANETs

The future and security of communicating vehicles

Elektronische Reisedokumente
56 min

Elektronische Reisedokumente

Neue Entwicklungen beim ePass

sFlow
48 min

sFlow

I can feel your traffic

Warum wir uns so gerne überwachen lassen…
62 min

Warum wir uns so gerne überwachen lassen…

Erhellendes aus Philosophie und Soziologie zur Klärung des…

Kollaboratives Wissensmanagement im Bildungsbereich
61 min

Kollaboratives Wissensmanagement im Bildungsbereich

Die Zitierfähigkeit von Wiki-Wissen

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

Closing Ceremony
31 min

Closing Ceremony

Who did you trust?

Hackerspaces
56 min

Hackerspaces

How we built ours - How you can build yours

How to squeeze more performance out of your wifi
58 min

How to squeeze more performance out of your wifi

Cross-layer optimization strategies for long-range IEEE…

We don't trust voting computers
138 min

We don't trust voting computers

The story of the dutch campaign against black-box voting to…

Ethernet mit Mikrocontrollern
49 min

Ethernet mit Mikrocontrollern

Wie funktioniert TCP mit 2kb RAM?

Introduction to matrix programming: trance codes
45 min

Introduction to matrix programming: trance codes

How to recognize trance coded communication patterns

Nerds und Geeks zwischen Stereotyp und Subkultur
53 min

Nerds und Geeks zwischen Stereotyp und Subkultur

Eine kulturanthropologische Untersuchung

Design and Implementation of an object-oriented, secure TCP/IP Stack
61 min

Design and Implementation of an object-oriented, secure TCP/IP Stack

Ethereal^W Wireshark without remote exploits - a proof of…

MMORPGs
58 min

MMORPGs

The state and future of the World of Warcraft

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Software Protection and the TPM
68 min

Software Protection and the TPM

The Mac OS X Story

Culture Jamming & Discordianism
51 min

Culture Jamming & Discordianism

Illegal Art & Religious Bricolage

Unusual bugs
66 min

Unusual bugs

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

SIP Security
62 min

SIP Security

Status Quo and Future Issues

Revenge of the Female Nerds
53 min

Revenge of the Female Nerds

Busting Myths about Why Women Can't Be Technical

Güter und Personen "tracken" - Lokalisierung im Pizzamann-Universum
63 min

Güter und Personen "tracken" - Lokalisierung im Pizzamann-Universum

Technische Mittel und soziale Aspekte des "Tracking &…

OpenPCD / OpenPICC
79 min

OpenPCD / OpenPICC

Free RFID reader and emulator

Hacking a Country: FOSS in India
61 min

Hacking a Country: FOSS in India

An Overview Free and Open Source Software efforts and…

DRM comes to European digital TV
48 min

DRM comes to European digital TV

How the DVB project is locking down TV standards and…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

The Grim Meathook Future
98 min

The Grim Meathook Future

How The Tech Culture Can Maintain Relevance In The 21st…

Funkerspuk
52 min

Funkerspuk

radio politics in the USA and Germany in the first half of…

Open Source Machine Translation
44 min

Open Source Machine Translation

From tools, to tricks, to projects: build a translation…

Freie Software - Eine Chance für Afrika?
46 min

Freie Software - Eine Chance für Afrika?

Ein Erfahrungsbericht aus Malawi

CSRF, the Intranet and You
61 min

CSRF, the Intranet and You

Causes, Attacks and Countermeasures

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Java wird Groovy
50 min

Java wird Groovy

Eine Einführung in die neue, dynamische Sprache für das…

JSON RPC
62 min

JSON RPC

Cross Site Scripting and Client Side Web Services

Project Sputnik
135 min

Project Sputnik

Realtime in-building location tracking at the 23C3

Trust Your Eyes
36 min

Trust Your Eyes

Grundlagen der Visualisierung und wie man mit…

The Rise and Fall of Open Source
46 min

The Rise and Fall of Open Source

The Million Eyeball Principle and forkbombs

Fuzzing in the corporate world
53 min

Fuzzing in the corporate world

The use of fuzzing in the corporate world over the years…

Das neue gesetzliche Verbot des Hackings
64 min

Das neue gesetzliche Verbot des Hackings

Praktische Auswirkungen des neuen Strafrechtes, das in…

Data Retention Update
68 min

Data Retention Update

News and Perspectives on Implementation and Opposition

Transparency and Privacy
63 min

Transparency and Privacy

The 7 Laws of Identity and the Identity Metasystem

Rootkits as Reversing Tools
63 min

Rootkits as Reversing Tools

An Anonymous Talk

Know Your Citizens
57 min

Know Your Citizens

State Authorities' Access to Sensitive Information

The Story of The Hacker Foundation
62 min

The Story of The Hacker Foundation

Challenges of Organizing a Foundation for Hackers in the USA

Juristische Fragen um die Mitbenutzung fremder WLANs
54 min

Juristische Fragen um die Mitbenutzung fremder WLANs

Zivilrechtliche und strafrechtliche Haftung

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Homegrown Interactive Tables
45 min

Homegrown Interactive Tables

Any Technology Sufficiently Advanced is Indistinguishable…

Mining Search Queries
49 min

Mining Search Queries

How to discover additional knowledge in the AOL query logs

Information Operations
76 min

Information Operations

Sector-Oriented Analysis of the Potential Impact and…

Counter-Development
63 min

Counter-Development

The Accessibility of Technology as an Addendum to…

The gift of sharing
48 min

The gift of sharing

A critical approach to the notion of gift economy within…

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

Tap the Electronic Frontier Foundation
97 min

Tap the Electronic Frontier Foundation

EFF staffers answer your questions!

Dying Giraffe Recordings: A non-evil recordlabel
56 min

Dying Giraffe Recordings: A non-evil recordlabel

Using the power of creative commons to create an…

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…