48 min
The silent march of the multinational GMO soy industry and…
92 min
Or: about what we will laugh next year
48 min
Reverse Engineering von 3D-Dateiformaten
44 min
If technology is the solution, politicians are the problem
66 min
Pan-european activism for patching a "pirated" law
94 min
Oder: worüber wir nächstes Jahr lachen werden
61 min
Creating a rogue CA Certificate
62 min
Past, present, and future
57 min
Rückblick über eine bewegte Zeit
82 min
First look at the security of NFC mobile phones
60 min
Endlich wird jeder zum "Trusted Citizen"
66 min
The Digital Enhanced Cordless Telecommunications standard
48 min
Enhancing the value of privacy in todays students view
48 min
Hide and Seek in A. Flash
38 min
How to get useable information out of your honeypot
61 min
Everything about the C64 in 64 Minutes
103 min
Die ultimative Hacker-Quizshow
52 min
How RepRap and physical compilers will change the world as…
33 min
with msp430static, solder, and syringe
44 min
Building an anonymous Internet within the Internet
46 min
Turning data into line noise and back
102 min
The ultimative Hacker-Quizshow
45 min
Social networks based on XMPP
65 min
Why cryptography might not fix the issue of transparent…
70 min
Politikersprache zwischen Orwell und Online
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
60 min
Exploiting the weather with unpowered aircraft
67 min
An overview of holographic techniques
35 min
A clever or ingenious device or expedient; adroit…
125 min
Die Themen des CCC im Jahr 2008
59 min
Optimism towards a future where there is "Nothing to hide"
50 min
We help in seeing teh Fnords
39 min
Formica: a cheap, open research platform
63 min
Overview of Current Keylogger Threats
61 min
Not your mother's XSS bugs
65 min
Behind the scenes of the new light installation
58 min
Storage and Access of Pornographic Information
56 min
Dissecting contemporary cellphone hardware
51 min
Doing music with microcontrollers
55 min
Dawn of the high-throughput DNA sequencing era
63 min
Symbian Exploit and Shellcode Development
56 min
Is implementation the enemy of design?
50 min
Wir helfen Euch, die Fnords zu sehen
57 min
The time is now to make anything you can imagine
30 min
Accepting the Partial Disclosure Challenge
28 min
Alternative and mobile power for all your little toys
44 min
State of the Art in Wearable Computing
65 min
Some cases of terrorism around the world that are not…
47 min
Ein audiovisuelles Live-Feature
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
55 min
Festplattenbeschlagnahme in neuem Licht
44 min
Global-scale Incident Response and Responders
58 min
More security-critical behaviour in Europe!
60 min
Why the idea of data protection slowly turns out to be…
50 min
PowerLineCommunications has now their open source tool
58 min
Tampering the Tamper-Proof
65 min
What we did so far. What will happen in the future.
52 min
Forderungen nach dem Jahr der Datenverbrechen
58 min
Pwning Apple's Mobile Internet Device
51 min
Ein Idylle aus der Analogsteinzeit der Überwachung
50 min
Open source BIOS replacement with a radical approach to…
49 min
Developing rules for autonomous systems
61 min
Bestandsaufnahme und Auswirkungen
58 min
Recovering keys and other secrets after power off
49 min
The Hackerspace's Junior Academy