51 min
An OpenWrt perspective on the development of Linux 802.11…
60 min
How social media companies are creating a global morality…
62 min
und warum das gar nicht so einfach ist.
58 min
Creativity, Archives & Digital Media from the Chinese…
51 min
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
53 min
Social media break up coordinator
59 min
*(will be specified later based on usability test with…
62 min
Conditions for a Successful Market Entry of Decentralized…
58 min
A brief introduction to search over encrypted data
57 min
Perceptions of hackers and hacktivists on their…
69 min
Die absurdesten Szenen aus dem…
32 min
Overview on Current Efforts - We Need Moar H4x0rs?!
27 min
Hackers, I call thee to our Oceans!
30 min
How I failed to run an open source project
60 min
Geheimdienste kontrolliert man am besten, indem man ihre…
29 min
Wireless Physical Layer Security & More...
30 min
Journalism ♥ Computer Science
60 min
Was kann das? Wie kann ich das nutzen? Wo besteht…
32 min
How hacking is conceived in social science research
60 min
phone verified accounts bringing the Hessian army back to…
60 min
Let's Build together a Free, Neutral and Decentralized…
22 min
Net-activism strategies against fake web companies
60 min
Or how I learned to stop worrying and love urandom
60 min
Calling secret service agents to quit their jobs
28 min
One can create art and beauty with … pixels
60 min
Findings from a Research Project on Digital Surveillance…
61 min
The future does not look much brighter than ten years ago.…
55 min
The future of space exploration
61 min
How drones, IMSI Catchers, and cameras are shaping our…
62 min
The surveillance state & modern day COINTELPRO tactics
57 min
From DEFCON to the DARPA Cyber Grand Challenge
59 min
Large Scale Authorship Attribution from Executable Binaries…
60 min
How to drop more of your privileges to reduce attack…
59 min
Discrimination and ethics in the data-driven society
57 min
What hacking has to do with avantgarde art of the 1960ies…
61 min
An Artificial Intelligence exploration into the creation of…
55 min
The role of social-graphs for Drones in the War on Terror.
47 min
Trash the prints, print the trash
60 min
Making it easier to avoid low-level compromise, and why…
60 min
Politische Phrasologie – warum man aus dem ganzen Zeug, das…
128 min
Die Wissenschaftsgala vom 32C3
43 min
Fun and games until someone uses IPv6 or TCP
60 min
Living with a vulnerable implanted device
63 min
exploring two decades of transport layer insecurity
54 min
An introduction to reverse engineering network protocols
61 min
Eine Einführung für blutige Anfänger
49 min
Exploiting Free Data Channels and Security Problems
60 min
Expeditionen ins Kommentierreich
59 min
A complete toolbox for IoT security
60 min
from key distribution to position-based cryptography
51 min
Guess what? The Government of Rafael Correa actually is…
34 min
modular and precise resource management
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
60 min
The art of failure taught by improv theatre
32 min
Math, Functional Programming, Theorem Proving, and an…
27 min
From the Bill on Intelligence to the State of Emergency
30 min
Visualizing WLAN Channel Usage on OpenWRT
60 min
1 Jahr Freifunk in Südhessen
30 min
The first Open Source Cinema Camera
60 min
Wie es dazu kam und was daraus zu lernen ist
35 min
The future of Neuro-Headsets and concepts towards…
60 min
Disaggregating Data by Race and Ethnicity to Curb…
61 min
Projektvorstellungen der JunghackerInnen
58 min
Export controls and exploit regulations: braindead and…
60 min
An attempt of calculating the economic cost of buffering.
62 min
Pure capability-based security for UNIX
46 min
Engaging social innovation and social innovators
56 min
Philosophical Perspectives on Privacy Drawing on the…
60 min
How advanced threat actors learn and change with innovation…
60 min
How to design and fabricate soft robots using everyday…
60 min
A gentle introduction to post-quantum cryptography
58 min
An inside look at x86 CPU design
60 min
The potential for payment system abuse
60 min
How hard can it be? An introduction into CubeSat development
60 min
How not to do DOCSIS networks
60 min
Uncovering images from the secret Stasi archives.
53 min
Amiga Hardware Design And Programming
62 min
Access to knowledge for every member of society
49 min
How to turn your KVM into a raging key-logging monster
60 min
A deep dive into the surveillance features of North Korea's…
60 min
NDG, BÜPF und wie wir uns dagegen wehren
60 min
Eine Reise auf die dunkle Seite
65 min
Take a deep breath into pollution trickery
58 min
Ein Computerwurm für PLCs
48 min
How to bring student experiments into space.
61 min
How the institutions fuck up, and how we fuck it up as well
56 min
Cultural Commons durch Kunstraub
59 min
Understanding and adapting EU legal guidelines from a FOSS…