conference logo

31C3: a new dawn

31c3

Premiere: We love surveillance
10 min

Premiere: We love surveillance

#7reasons

31C3 Closing Event
18 min

31C3 Closing Event

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
29 min

Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed

The untold story of what really happened, how it was…

Axoloti
29 min

Axoloti

DIY audio signal processing

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

The Magical Secrecy Tour
30 min

The Magical Secrecy Tour

A Bus Trip into the Surveillance Culture of Berlin One Year…

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…

Krypto für die Zukunft
31 min

Krypto für die Zukunft

Verteidigung gegen Dunkle Künste

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

Trackography
31 min

Trackography

You never read alone

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

Das Transparenzportal Hamburg
32 min

Das Transparenzportal Hamburg

Inhalt und Umsetzung

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

IFG – Mit freundlichen Grüßen
33 min

IFG – Mit freundlichen Grüßen

Neue Energie für die Informationsfreiheit

Global Civil Society Under Attack
33 min

Global Civil Society Under Attack

Reports from the Frontlines

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

Internet of toilets
35 min

Internet of toilets

Trends in the sanitarian territory

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

Why do we need an open food information platform
39 min

Why do we need an open food information platform

We want all data about food to be linked and public

Serenität – Anleitung zum Glücklichsein
45 min

Serenität – Anleitung zum Glücklichsein

Das Duo 'read & delete' präsentiert radikale philosophische…

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…

The eXperimental Robot Project
50 min

The eXperimental Robot Project

An open-hardware bipedal walking machine

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

From Maxwell to antenna arrays
53 min

From Maxwell to antenna arrays

How 150 year old equations still help to communicate

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

10 Jahre OpenStreetMap
54 min

10 Jahre OpenStreetMap

Wir leben noch und zwar sehr gut.

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Die Krise der Bilder ist die Krise der Politik
58 min

Die Krise der Bilder ist die Krise der Politik

Die Krise der Politik ist die Krise der Bilder

Virtual Machine Introspection
58 min

Virtual Machine Introspection

From the Outside Looking In

Paypals War on Terror
58 min

Paypals War on Terror

A Historical Re-Enactment of the PayPal14

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Towards General Purpose Reconfigurable Computing on Novena
59 min

Towards General Purpose Reconfigurable Computing on Novena

FPGAs for Everybody with Novena

Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC
59 min

Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…

A Lawful Method for Converting Closed IP into Open IP

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

SS7: Locate. Track. Manipulate.
60 min

SS7: Locate. Track. Manipulate.

You have a tracking device in your pocket

The Invisible Committee Returns with "Fuck Off Google"
61 min

The Invisible Committee Returns with "Fuck Off Google"

Cybernetics, Anti-Terrorism, and the ongoing case against…

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

Space Hacker
62 min

Space Hacker

Uploading rover...

„Wir beteiligen uns aktiv an den Diskussionen“
62 min

„Wir beteiligen uns aktiv an den Diskussionen“

Die digitale „Agenda“ der Bundesregierung aus inhaltlicher,…

Traue keinem Scan, den du nicht selbst gefälscht hast
63 min

Traue keinem Scan, den du nicht selbst gefälscht hast

"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Source Code and Cross-Domain Authorship Attribution
64 min

Source Code and Cross-Domain Authorship Attribution

The Role of Stylometry in Privacy

ES GIBT VIEL ZU TUN - HAU'N WIR AB.
64 min

ES GIBT VIEL ZU TUN - HAU'N WIR AB.

[Die Untersuchung]

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

The Maker movement meets patent law
67 min

The Maker movement meets patent law

How many windows are open in the patent fortress

Erste Stunden der Zweisamkeit
67 min

Erste Stunden der Zweisamkeit

Jahresupdate zur GEMA-Alternative C3S

Mit Kunst die Gesellschaft hacken
67 min

Mit Kunst die Gesellschaft hacken

Das Zentrum für politische Schönheit

Telescope Making
69 min

Telescope Making

How to make your own telescope

State of the Onion
72 min

State of the Onion

Neuland

The Time is Right
95 min

The Time is Right

Ein Science-Fiction-Theaterstück

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Fnord News Show
117 min

Fnord News Show

Wir helfen Euch die Fnords zu sehen.