30C3

Full playlist: Video / Audio
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

10 Years of Fun with Embedded Devices
48 min

10 Years of Fun with Embedded Devices

How OpenWrt evolved from a WRT54G firmware to an universal…

25 Jahre Chipkarten-Angriffe
61 min

25 Jahre Chipkarten-Angriffe

Von der Historie zur Zukunft

2 Takte später
29 min

2 Takte später

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

30C3 Infrastructure Review
71 min

30C3 Infrastructure Review

Presentation of MOC/NOC/VOC/SOC/*OC

30C3 Keynote
55 min

30C3 Keynote

30C3 Opening Event
60 min

30C3 Opening Event

Welcome to the 30th Chaos Communication Congress

Against Metadata
26 min

Against Metadata

Twisting time and space to explore the unknown

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Attacking HomeMatic
59 min

Attacking HomeMatic

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

Bullshit made in Germany
60 min

Bullshit made in Germany

So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim…

Calafou, postcapitalist ecoindustrial community
62 min

Calafou, postcapitalist ecoindustrial community

Building a space for grassroots sustainable technology…

calc.pw
30 min

calc.pw

Passwortgenerierung mit Arduino [Generating passwords with…

Closing Event
51 min

Closing Event

Coding your body
32 min

Coding your body

How to decipher the messages of your body

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

CounterStrike
46 min

CounterStrike

Lawful Interception

Das FlipDot-Projekt
42 min

Das FlipDot-Projekt

Spaß mit mechanischer Anzeige

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

Dead Man Edition
61 min

Dead Man Edition

Auf dem Weg zu fairer Elektronik am Beispiel der Elkos …

Der Kampf um Netzneutralität
54 min

Der Kampf um Netzneutralität

Wer kontrolliert das Netz?

Desperately Seeking Susy
60 min

Desperately Seeking Susy

A farewell to a bold proposal?

Die Drohnenkriege
66 min

Die Drohnenkriege

Kriegsführung der Zukunft?

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Firmware Fat Camp
42 min

Firmware Fat Camp

Embedded Security Using Binary Autotomy

Fnord News Show
117 min

Fnord News Show

Der schonungslose Realitätsabgleich mit…

FPGA 101
54 min

FPGA 101

Making awesome stuff with FPGAs

Glass Hacks
60 min

Glass Hacks

Fun and frightening uses of always-on camera enabled…

Hacker Jeopardy
147 min

Hacker Jeopardy

Zahlenraten für Geeks [Number guessing for geeks]

Hacking as Artistic Practice
33 min

Hacking as Artistic Practice

!Mediengruppe Bitnik about their recent works

Hacking the Czech Parliament via SMS
39 min

Hacking the Czech Parliament via SMS

A parliamentary drama of 223 actors

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

HbbTV Security
45 min

HbbTV Security

OMG - my Smart TV got pr0wn3d

Hello World!
57 min

Hello World!

How to make art after Snowden?

Hillbilly Tracking of Low Earth Orbit
47 min

Hillbilly Tracking of Low Earth Orbit

Repurposing an Inmarsat Dish

How to Build a Mind
55 min

How to Build a Mind

Artificial Intelligence Reloaded

Human Rights and Technology
32 min

Human Rights and Technology

"A New Hope" or "The Empire Strikes Back"?

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

IFGINT
28 min

IFGINT

Erkenntnisse aus Informationsfreiheitsanfragen - Hacks,…

Keine Anhaltspunkte für flächendeckende Überwachung
66 min

Keine Anhaltspunkte für flächendeckende Überwachung

Die Diskussion um NSA, PRISM, Tempora sprachlich und…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

lasers in space
29 min

lasers in space

more than just pew pew!

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

Magic Lantern
64 min

Magic Lantern

Free Software on Your Camera

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…

Nerds in the news
31 min

Nerds in the news

Spending a year coding in a newsroom

Open source experimental incubator build up
33 min

Open source experimental incubator build up

call for participation in project and product development

Perfect Paul
29 min

Perfect Paul

On Freedom of Facial Expression

Plants & Machines
26 min

Plants & Machines

Food replicating Robots from Open Source Technologies

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition

Programming FPGAs with PSHDL
61 min

Programming FPGAs with PSHDL

Let's create the Arduino for FPGAs

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Rock' em Graphic Cards
56 min

Rock' em Graphic Cards

Introduction to Heterogeneous Parallel Programming

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Script Your Car!
58 min

Script Your Car!

Using existing hardware platforms to integrate python into…

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Seidenstraße
48 min

Seidenstraße

The Making of…

Sim Gishel
36 min

Sim Gishel

A singing and dancing robot build to take part in casting…

Structuring open hardware projects
33 min

Structuring open hardware projects

experiences from the “i3 Berlin” 3D printer project with…

Sysadmins of the world, unite!
31 min

Sysadmins of the world, unite!

a call to resistance

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

The Four Wars
24 min

The Four Wars

Terror, whistleblowers, drugs, internet

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

The philosophy of hacking
30 min

The philosophy of hacking

Contemplations on the essence of hacking and its…

The Pirate Cinema
29 min

The Pirate Cinema

Creating mash-up movies by hidden activity and geography of…

The Tor Network
62 min

The Tor Network

We're living in interesting times

Through a PRISM, Darkly
63 min

Through a PRISM, Darkly

Everything we know about NSA spying

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

WarGames in memory
56 min

WarGames in memory

what is the winning move?

We only have one earth
64 min

We only have one earth

A case for expansionistic space policy

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

X Security
61 min

X Security

It's worse than it looks

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
59 min

Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit

Ein Streifzug durch die Fehler in der Kryptografie