33C3: works for me

Full playlist: Video / Audio
SpiegelMining – Reverse Engineering von Spiegel-Online
58 min

SpiegelMining – Reverse Engineering von Spiegel-Online

Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

Fnord-Jahresrückblick
99 min

Fnord-Jahresrückblick

Wir helfen euch, die Fnords zu sehen!

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Where in the World Is Carmen Sandiego?
59 min

Where in the World Is Carmen Sandiego?

Becoming a secret travel agent

Die Sprache der Populisten
59 min

Die Sprache der Populisten

Wie politische "Gewissheiten" sprachlich konstruiert werden

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Security Nightmares 0x11
70 min

Security Nightmares 0x11

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

Nicht öffentlich.
65 min

Nicht öffentlich.

Ein Geheimdienst als Zeuge. Szenen aus dem…

Nintendo Hacking 2016
61 min

Nintendo Hacking 2016

Game Over

Machine Dreams
62 min

Machine Dreams

Dreaming Machines

Dieselgate – A year later
60 min

Dieselgate – A year later

env stinks || exit

Copywrongs 2.0
61 min

Copywrongs 2.0

We must prevent EU copyright reform from breaking the…

Software Defined Emissions
60 min

Software Defined Emissions

A hacker’s review of Dieselgate

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

33C3 Opening Ceremony
15 min

33C3 Opening Ceremony

Check Your Police Record!
60 min

Check Your Police Record!

Polizeiliche Datenbanken und was man über seinen Auskunfts-…

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

The Untold Story of Edward Snowden’s Escape from Hong Kong
65 min

The Untold Story of Edward Snowden’s Escape from Hong Kong

and How You Can Help the Refugees Who Saved His Life

33C3 Infrastructure Review
62 min

33C3 Infrastructure Review

The usual extremely factual look behind the scenes of this…

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Eine kleine Geschichte der Parlamentsschlägerei
26 min

Eine kleine Geschichte der Parlamentsschlägerei

Schlagende Argumente, fliegende Fäuste

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Es sind die kleinen Dinge im Leben
60 min

Es sind die kleinen Dinge im Leben

von Mikroskopen, Wahrnehmung und warum das kaum jemanden…

Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
34 min

Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken

Wie mit Gerüchten über Geflüchtete im Netz Stimmung gemacht…

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Make Wi-Fi fast again
57 min

Make Wi-Fi fast again

Eine kleine Einführung in den 802.11ac Standard

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

The Moon and European Space Exploration
32 min

The Moon and European Space Exploration

Refocusing on the moon as a platform for future deep space…

Irren ist staatlich
60 min

Irren ist staatlich

10 Jahre Informationsfreiheitsgesetz

radare demystified
62 min

radare demystified

after 1.0

A Data Point Walks Into a Bar
32 min

A Data Point Walks Into a Bar

How cold data can make you feel things.

Dissecting HDMI
63 min

Dissecting HDMI

Developing open, FPGA-based capture hardware for conference…

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
46 min

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet

Finding interesting targets in 128bit of entropy

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

Corporate surveillance, digital tracking, big data &amp; privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

The Transhumanist Paradox
33 min

The Transhumanist Paradox

Deciding between technological utopias in a liberal state

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

Hacking the World
26 min

Hacking the World

The struggle for security for all.

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Der 33 Jahrerückblick
26 min

Der 33 Jahrerückblick

Technology and Politics in Congress Talks, from 1984 to now

Kampf dem Abmahnunwesen
33 min

Kampf dem Abmahnunwesen

Wider die automatisierte Rechtsdurchsetzung

Durchmarsch von Rechts
60 min

Durchmarsch von Rechts

…und was wir dagegen tun können

Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
60 min

Warum in die Ferne schweifen, wenn das Ausland liegt so nah?

Erinnerungen aus dem virtuellen Ausland in Frankfurt,…

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative

Law Enforcement Are Hacking the Planet
31 min

Law Enforcement Are Hacking the Planet

How the FBI and local cops are hacking computers outside of…

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

Making Technology Inclusive Through Papercraft and Sound
56 min

Making Technology Inclusive Through Papercraft and Sound

Introducing the Love to Code Platform

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

Memory Deduplication: The Curse that Keeps on Giving
59 min

Memory Deduplication: The Curse that Keeps on Giving

A tale of 3 different memory deduplication based…

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Privatisierung der Rechtsdurchsetzung
60 min

Privatisierung der Rechtsdurchsetzung

Was der Anti-Terror-Kampf von der Urheberrechtsdurchsetzung…

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

Beyond Virtual and Augmented Reality
33 min

Beyond Virtual and Augmented Reality

From Superhuman Sports to Amplifying Human Senses

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

No USB? No problem.
57 min

No USB? No problem.

How to write an open source bit-bang low-speed USB stack…

Routerzwang und Funkabschottung
60 min

Routerzwang und Funkabschottung

Was Aktivisten davon lernen können

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Eavesdropping on the Dark Cosmos
33 min

Eavesdropping on the Dark Cosmos

Dark Matter and Gravitational Waves

Edible Soft Robotics
29 min

Edible Soft Robotics

An exploration of candy as an engineered material

Lightning Talks Day 4
109 min

Lightning Talks Day 4

Lightning Talks

The woman behind your WiFi
31 min

The woman behind your WiFi

Hedy Lamarr: Frequency Hopping in Hollywood

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

The Clash of Digitalizations
31 min

The Clash of Digitalizations

The Devolution of Arab Men from Humans to Digital Fodder

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

On the Security and Privacy of Modern Single Sign-On in the Web
64 min

On the Security and Privacy of Modern Single Sign-On in the Web

(Not Only) Attacks on OAuth and OpenID Connect

Hebocon
23 min

Hebocon

A sumo style robot battle for intentionally crappy robots!

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

A Story of Discrimination and Unfairness
60 min

A Story of Discrimination and Unfairness

Prejudice in Word Embeddings

What&#39;s It Doing Now?
32 min

What's It Doing Now?

The Role of Automation Dependency in Aviation Accidents

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

Lightning Talks Day 2
120 min

Lightning Talks Day 2

Lightning Talks

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
32 min

Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur

Wie Wertschätzung in (Tech-)Communities gelingen kann

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Space making/space shaping
33 min

Space making/space shaping

How mapping creates space, shapes cities and our view of…

Netzpolitik in Österreich
61 min

Netzpolitik in Österreich

Ein Jahresrückblick aus dem Land der Datenberge

Ethics in the data society
35 min

Ethics in the data society

Power and politics in the development of the driverless car

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Make the Internet Neutral Again
31 min

Make the Internet Neutral Again

Let's put the new EU Net Neutrality rules to work

Lightning Talks Day 3
122 min

Lightning Talks Day 3

Lightning Talks

Community
62 min

Community

Social Life & Life in the early 21st century

The Nibbletronic
20 min

The Nibbletronic

A DIY MIDI Controller and a New UI for Wind Instruments

Haft für Whistleblower?
34 min

Haft für Whistleblower?

Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. §…

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

Welcome to the Anthropocene?
28 min

Welcome to the Anthropocene?

(Did) We Accidentally a New Geological Epoch(?)

Netzpolitik in der Schweiz 2016
62 min

Netzpolitik in der Schweiz 2016

Grundrechte per Volksentscheid versenken

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Hacking collective as a laboratory
29 min

Hacking collective as a laboratory

Hackers' knowledge studied by sociologist of science