51 min
An OpenWrt perspective on the development of Linux 802.11…
60 min
How social media companies are creating a global morality…
58 min
Creativity, Archives & Digital Media from the Chinese…
62 min
und warum das gar nicht so einfach ist.
51 min
Mooltipass, Openpandora/Pyra and Novena/Senoko: how I…
53 min
Social media break up coordinator
59 min
*(will be specified later based on usability test with…
62 min
Conditions for a Successful Market Entry of Decentralized…
58 min
A brief introduction to search over encrypted data
57 min
Perceptions of hackers and hacktivists on their…
69 min
Die absurdesten Szenen aus dem…
27 min
Hackers, I call thee to our Oceans!
30 min
How I failed to run an open source project
32 min
Overview on Current Efforts - We Need Moar H4x0rs?!
60 min
Was kann das? Wie kann ich das nutzen? Wo besteht…
30 min
Journalism ♥ Computer Science
29 min
Wireless Physical Layer Security & More...
60 min
Geheimdienste kontrolliert man am besten, indem man ihre…
32 min
How hacking is conceived in social science research
60 min
Let's Build together a Free, Neutral and Decentralized…
60 min
phone verified accounts bringing the Hessian army back to…
22 min
Net-activism strategies against fake web companies
60 min
Calling secret service agents to quit their jobs
60 min
Or how I learned to stop worrying and love urandom
28 min
One can create art and beauty with … pixels
60 min
Findings from a Research Project on Digital Surveillance…
61 min
The future does not look much brighter than ten years ago.…
61 min
How drones, IMSI Catchers, and cameras are shaping our…
55 min
The future of space exploration
59 min
Large Scale Authorship Attribution from Executable Binaries…
57 min
From DEFCON to the DARPA Cyber Grand Challenge
62 min
The surveillance state & modern day COINTELPRO tactics
60 min
How to drop more of your privileges to reduce attack…
59 min
Discrimination and ethics in the data-driven society
57 min
What hacking has to do with avantgarde art of the 1960ies…
55 min
The role of social-graphs for Drones in the War on Terror.
61 min
An Artificial Intelligence exploration into the creation of…
47 min
Trash the prints, print the trash
60 min
Politische Phrasologie – warum man aus dem ganzen Zeug, das…
60 min
Making it easier to avoid low-level compromise, and why…
128 min
Die Wissenschaftsgala vom 32C3
60 min
Living with a vulnerable implanted device
43 min
Fun and games until someone uses IPv6 or TCP
63 min
exploring two decades of transport layer insecurity
54 min
An introduction to reverse engineering network protocols
49 min
Exploiting Free Data Channels and Security Problems
61 min
Eine Einführung für blutige Anfänger
60 min
Expeditionen ins Kommentierreich
60 min
from key distribution to position-based cryptography
59 min
A complete toolbox for IoT security
51 min
Guess what? The Government of Rafael Correa actually is…
34 min
modular and precise resource management
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
60 min
The art of failure taught by improv theatre
27 min
From the Bill on Intelligence to the State of Emergency
30 min
Visualizing WLAN Channel Usage on OpenWRT
32 min
Math, Functional Programming, Theorem Proving, and an…
60 min
1 Jahr Freifunk in Südhessen
30 min
The first Open Source Cinema Camera
60 min
Disaggregating Data by Race and Ethnicity to Curb…
60 min
Wie es dazu kam und was daraus zu lernen ist
35 min
The future of Neuro-Headsets and concepts towards…
61 min
Projektvorstellungen der JunghackerInnen
58 min
Export controls and exploit regulations: braindead and…
60 min
An attempt of calculating the economic cost of buffering.
62 min
Pure capability-based security for UNIX
46 min
Engaging social innovation and social innovators
56 min
Philosophical Perspectives on Privacy Drawing on the…
60 min
How to design and fabricate soft robots using everyday…
60 min
How advanced threat actors learn and change with innovation…
60 min
A gentle introduction to post-quantum cryptography
60 min
The potential for payment system abuse
58 min
An inside look at x86 CPU design
60 min
How hard can it be? An introduction into CubeSat development
60 min
How not to do DOCSIS networks
60 min
Uncovering images from the secret Stasi archives.
53 min
Amiga Hardware Design And Programming
62 min
Access to knowledge for every member of society
49 min
How to turn your KVM into a raging key-logging monster
60 min
A deep dive into the surveillance features of North Korea's…
60 min
NDG, BÜPF und wie wir uns dagegen wehren
60 min
Eine Reise auf die dunkle Seite
65 min
Take a deep breath into pollution trickery
58 min
Ein Computerwurm für PLCs
61 min
How the institutions fuck up, and how we fuck it up as well
48 min
How to bring student experiments into space.
56 min
Cultural Commons durch Kunstraub
59 min
Understanding and adapting EU legal guidelines from a FOSS…