conference logo

25C3: nothing to hide

25c3

Full playlist: Video / Audio
The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Fnord News Show
50 min

Fnord News Show

Wir helfen Euch, die Fnords zu sehen

Neusprech im Überwachungsstaat
70 min

Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

Hacker Jeopardy
103 min

Hacker Jeopardy

Die ultimative Hacker-Quizshow

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Der elektronische Personalausweis
60 min

Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

Wikileaks
58 min

Wikileaks

Wikileaks vs. the World

Pflanzenhacken
54 min

Pflanzenhacken

Züchten 2.0

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Flying for free
60 min

Flying for free

Exploiting the weather with unpowered aircraft

Der Hackerparagraph 202c StGB
61 min

Der Hackerparagraph 202c StGB

Bestandsaufnahme und Auswirkungen

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Building an international movement: hackerspaces.org
65 min

Building an international movement: hackerspaces.org

What we did so far. What will happen in the future.

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Das Grundrecht auf digitale Intimsphäre
55 min

Das Grundrecht auf digitale Intimsphäre

Festplattenbeschlagnahme in neuem Licht

Cisco IOS attack and defense
66 min

Cisco IOS attack and defense

The State of the Art

Full-Disk-Encryption Crash-Course
48 min

Full-Disk-Encryption Crash-Course

Everything to hide

Jahresrückblick
125 min

Jahresrückblick

Die Themen des CCC im Jahr 2008

Beyond Asimov - Laws for Robots
49 min

Beyond Asimov - Laws for Robots

Developing rules for autonomous systems

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Fnord News Show (English interpretation)
50 min

Fnord News Show (English interpretation)

We help in seeing teh Fnords

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

An introduction to new stream cipher designs
46 min

An introduction to new stream cipher designs

Turning data into line noise and back

About Cyborgs and Gargoyles
44 min

About Cyborgs and Gargoyles

State of the Art in Wearable Computing

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Scalable Swarm Robotics
39 min

Scalable Swarm Robotics

Formica: a cheap, open research platform

Erich Mühsams Tagebücher in der Festungshaft
51 min

Erich Mühsams Tagebücher in der Festungshaft

Ein Idylle aus der Analogsteinzeit der Überwachung

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Attacking Rich Internet Applications
61 min

Attacking Rich Internet Applications

Not your mother's XSS bugs

All your base(s) are belong to us
55 min

All your base(s) are belong to us

Dawn of the high-throughput DNA sequencing era

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

Embracing Post-Privacy
59 min

Embracing Post-Privacy

Optimism towards a future where there is "Nothing to hide"

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Soviet Unterzoegersdorf
71 min

Soviet Unterzoegersdorf

A Nation In Transit

Hacker Jeopardy (English interpretation)
102 min

Hacker Jeopardy (English interpretation)

The ultimative Hacker-Quizshow

Terrorist All-Stars
65 min

Terrorist All-Stars

Some cases of terrorism around the world that are not…

U23
49 min

U23

The Hackerspace's Junior Academy

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

Solar-powering your Geek Gear
28 min

Solar-powering your Geek Gear

Alternative and mobile power for all your little toys

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Short Attention Span Security
53 min

Short Attention Span Security

A little of everything

Security Nightmares 2009 (English interpretation)
92 min

Security Nightmares 2009 (English interpretation)

Or: about what we will laugh next year

La Quadrature du Net - Campaigning on Telecoms Package
66 min

La Quadrature du Net - Campaigning on Telecoms Package

Pan-european activism for patching a "pirated" law

Zehn Big Brother Awards in .at
57 min

Zehn Big Brother Awards in .at

Rückblick über eine bewegte Zeit

Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You
48 min

Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You

The silent march of the multinational GMO soy industry and…

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

Just Estonia and Georgia?
44 min

Just Estonia and Georgia?

Global-scale Incident Response and Responders

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

Lightning Talks Day4
61 min

Lightning Talks Day4

4 minutes of fame

Privacy in the social semantic web
45 min

Privacy in the social semantic web

Social networks based on XMPP

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

The Trust Situation
60 min

The Trust Situation

Why the idea of data protection slowly turns out to be…

Lightning Talks Day2
51 min

Lightning Talks Day2

4 minutes of fame