31C3: a new dawn

Full playlist: Video / Audio
10 Jahre OpenStreetMap
54 min

10 Jahre OpenStreetMap

Wir leben noch und zwar sehr gut.

31C3 Closing Event
18 min

31C3 Closing Event

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…

Axoloti
29 min

Axoloti

DIY audio signal processing

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Das Transparenzportal Hamburg
32 min

Das Transparenzportal Hamburg

Inhalt und Umsetzung

Die Krise der Bilder ist die Krise der Politik
58 min

Die Krise der Bilder ist die Krise der Politik

Die Krise der Politik ist die Krise der Bilder

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Erste Stunden der Zweisamkeit
67 min

Erste Stunden der Zweisamkeit

Jahresupdate zur GEMA-Alternative C3S

ES GIBT VIEL ZU TUN - HAU'N WIR AB.
64 min

ES GIBT VIEL ZU TUN - HAU'N WIR AB.

[Die Untersuchung]

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC
59 min

Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…

A Lawful Method for Converting Closed IP into Open IP

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Fnord News Show
117 min

Fnord News Show

Wir helfen Euch die Fnords zu sehen.

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

From Maxwell to antenna arrays
53 min

From Maxwell to antenna arrays

How 150 year old equations still help to communicate

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Global Civil Society Under Attack
33 min

Global Civil Society Under Attack

Reports from the Frontlines

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
29 min

Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed

The untold story of what really happened, how it was…

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

IFG – Mit freundlichen Grüßen
33 min

IFG – Mit freundlichen Grüßen

Neue Energie für die Informationsfreiheit

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

Internet of toilets
35 min

Internet of toilets

Trends in the sanitarian territory

Krypto für die Zukunft
31 min

Krypto für die Zukunft

Verteidigung gegen Dunkle Künste

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Mit Kunst die Gesellschaft hacken
67 min

Mit Kunst die Gesellschaft hacken

Das Zentrum für politische Schönheit

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits

Paypals War on Terror
58 min

Paypals War on Terror

A Historical Re-Enactment of the PayPal14

Premiere: We love surveillance
10 min

Premiere: We love surveillance

#7reasons

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Serenität – Anleitung zum Glücklichsein
45 min

Serenität – Anleitung zum Glücklichsein

Das Duo 'read & delete' präsentiert radikale philosophische…

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

Source Code and Cross-Domain Authorship Attribution
64 min

Source Code and Cross-Domain Authorship Attribution

The Role of Stylometry in Privacy

Space Hacker
62 min

Space Hacker

Uploading rover...

SS7: Locate. Track. Manipulate.
60 min

SS7: Locate. Track. Manipulate.

You have a tracking device in your pocket

State of the Onion
72 min

State of the Onion

Neuland

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Telescope Making
69 min

Telescope Making

How to make your own telescope

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

The eXperimental Robot Project
50 min

The eXperimental Robot Project

An open-hardware bipedal walking machine

The Invisible Committee Returns with "Fuck Off Google"
61 min

The Invisible Committee Returns with "Fuck Off Google"

Cybernetics, Anti-Terrorism, and the ongoing case against…

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

The Magical Secrecy Tour
30 min

The Magical Secrecy Tour

A Bus Trip into the Surveillance Culture of Berlin One Year…

The Maker movement meets patent law
67 min

The Maker movement meets patent law

How many windows are open in the patent fortress

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

The Time is Right
95 min

The Time is Right

Ein Science-Fiction-Theaterstück

Towards General Purpose Reconfigurable Computing on Novena
59 min

Towards General Purpose Reconfigurable Computing on Novena

FPGAs for Everybody with Novena

Trackography
31 min

Trackography

You never read alone

Traue keinem Scan, den du nicht selbst gefälscht hast
63 min

Traue keinem Scan, den du nicht selbst gefälscht hast

"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Virtual Machine Introspection
58 min

Virtual Machine Introspection

From the Outside Looking In

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Why do we need an open food information platform
39 min

Why do we need an open food information platform

We want all data about food to be linked and public

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

„Wir beteiligen uns aktiv an den Diskussionen“
62 min

„Wir beteiligen uns aktiv an den Diskussionen“

Die digitale „Agenda“ der Bundesregierung aus inhaltlicher,…