27C3: We Come In Peace

Full playlist: Video / Audio
27C3 Keynote
39 min

27C3 Keynote

We come in Peace

Adventures in Mapping Afghanistan Elections
52 min

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

AllColoursAreBeautiful
35 min

AllColoursAreBeautiful

interactive light installation inspired by blinkenlights

Android geolocation using GSM network
63 min

Android geolocation using GSM network

"Where was Waldroid?"

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Cognitive Psychology for Hackers
65 min

Cognitive Psychology for Hackers

Bugs, exploits, and occasional patches

Console Hacking 2010
44 min

Console Hacking 2010

PS3 Epic Fail

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

Copyright Enforcement Vs. Freedoms
55 min

Copyright Enforcement Vs. Freedoms

ACTA, IPRED3 and other upcoming battles of the crusade…

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Data Recovery Techniques
60 min

Data Recovery Techniques

Fun with Hard Drives

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

Desktop on the Linux... (and BSD, of course)
55 min

Desktop on the Linux... (and BSD, of course)

you're doing it confused? weird? strange? wrong?

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

Digitale Spaltung per Gesetz
41 min

Digitale Spaltung per Gesetz

Das Internet und geschaffene soziale Ungleichheit im Alltag…

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

DIY synthesizers and sound generators
24 min

DIY synthesizers and sound generators

Where does the sound come from?

Eins, zwei, drei - alle sind dabei
62 min

Eins, zwei, drei - alle sind dabei

Von der Volkszählung zum Bundesmelderegister

File -> Print -> Electronics
51 min

File -> Print -> Electronics

A new circuit board printer will liberate you from the…

Fnord-Jahresrückblick 2010
83 min

Fnord-Jahresrückblick 2010

von Atomausstieg bis Zwangsintegration

Fnord-Jahresrückblick 2010 (english translation)
83 min

Fnord-Jahresrückblick 2010 (english translation)

von Atomausstieg bis Zwangsintegration

Friede sei mit Euren Daten
54 min

Friede sei mit Euren Daten

Ein datenschutzrechtlicher Ausflug in ein kirchliches…

From robot to robot
47 min

From robot to robot

Restoring creativity in school pupils using robotics

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

Hacker Jeopardy
134 min

Hacker Jeopardy

Number guessing for geeks

Hacker Jeopardy (english translation)
134 min

Hacker Jeopardy (english translation)

Number guessing for geeks

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

How the Internet sees you
58 min

How the Internet sees you

demonstrating what activities most ISPs see you doing on…

Ich sehe nicht, dass wir nicht zustimmen werden
63 min

Ich sehe nicht, dass wir nicht zustimmen werden

Die Sprache des politischen Verrats und seiner…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Ignorance and Peace Narratives in Cyberspace
30 min

Ignorance and Peace Narratives in Cyberspace

Cloud Computing, Assessment, and Fools like Me.

IMMI, from concept to reality
56 min

IMMI, from concept to reality

The Icelandic Modern Media Initiative and our need for a…

International Cyber Jurisdiction
59 min

International Cyber Jurisdiction

Kill Switching” Cyberspace, Cyber Criminal Prosecution &…

Is the SSLiverse a safe place?
58 min

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Lightning Talks - Day 2
49 min

Lightning Talks - Day 2

4 minutes of fame

Lightning Talks - Day 3
72 min

Lightning Talks - Day 3

where is my community?

Lightning Talks - Day 4
121 min

Lightning Talks - Day 4

where is my community?

Logikschaltungen ohne Elektronik
35 min

Logikschaltungen ohne Elektronik

logische Schaltungen mit Pneumatik

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Netzmedienrecht, Lobbyismus und Korruption
52 min

Netzmedienrecht, Lobbyismus und Korruption

Wie wirkt die Lobby von Medienkonzernen?

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

Part-Time Scientists
59 min

Part-Time Scientists

One year of Rocket Science!

Pentanews Game Show
64 min

Pentanews Game Show

Your opponents will be riddled as well

Radio der Zukunft
78 min

Radio der Zukunft

Was kommt nach dem analogen Radio?

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Reverse Engineering the MOS 6502 CPU
51 min

Reverse Engineering the MOS 6502 CPU

3510 transistors in 60 minutes

Rootkits and Trojans on Your SAP Landscape
76 min

Rootkits and Trojans on Your SAP Landscape

SAP Security and the Enterprise

Running your own GSM stack on a phone
61 min

Running your own GSM stack on a phone

Introducing Project OsmocomBB

Safety on the Open Sea
59 min

Safety on the Open Sea

Safe navigation with the aid of an open sea chart.

Secure communications below the hearing threshold
57 min

Secure communications below the hearing threshold

Improved approaches for auditive steganography

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Spinning the electronic Wheel
63 min

Spinning the electronic Wheel

Still the bicycles for the 21th century

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

"The Concert"
56 min

"The Concert"

a disconcerting moment for free culture

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

The importance of resisting Excessive Government Surveillance
56 min

The importance of resisting Excessive Government Surveillance

Join me in exposing and challenging the constant violations…

Three jobs that journalists will do in 2050
60 min

Three jobs that journalists will do in 2050

Why future media may be more powerful (and more subversive)…

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth
64 min

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth

The political philosophy of the Internet

USB and libusb
56 min

USB and libusb

So much more than a serial port with power

Von Zensursula über Censilia hin zum Kindernet
60 min

Von Zensursula über Censilia hin zum Kindernet

Jahresrückblick rund um Internet-Sperren,…

Whistleblowing
59 min

Whistleblowing

Licht ins Dunkel!

Wikileaks und mehr
41 min

Wikileaks und mehr

Eine Whistleblowerperspektive auf Leaking-Plattformen

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…