conference logo

33C3: works for me

33c3

Full playlist: Video / Audio
Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

Security Nightmares 0x11
70 min

Security Nightmares 0x11

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

33C3 Infrastructure Review
62 min

33C3 Infrastructure Review

The usual extremely factual look behind the scenes of this…

Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
60 min

Warum in die Ferne schweifen, wenn das Ausland liegt so nah?

Erinnerungen aus dem virtuellen Ausland in Frankfurt,…

Privatisierung der Rechtsdurchsetzung
60 min

Privatisierung der Rechtsdurchsetzung

Was der Anti-Terror-Kampf von der Urheberrechtsdurchsetzung…

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

The Transhumanist Paradox
33 min

The Transhumanist Paradox

Deciding between technological utopias in a liberal state

Retail Surveillance / Retail Countersurveillance
33 min

Retail Surveillance / Retail Countersurveillance

50 most unwanted retail surveillance technologies / 50 most…

Lightning Talks Day 4
109 min

Lightning Talks Day 4

Lightning Talks

Beyond Virtual and Augmented Reality
33 min

Beyond Virtual and Augmented Reality

From Superhuman Sports to Amplifying Human Senses

Community
62 min

Community

Social Life & Life in the early 21st century

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Ethics in the data society
35 min

Ethics in the data society

Power and politics in the development of the driverless car

Hebocon
23 min

Hebocon

A sumo style robot battle for intentionally crappy robots!

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Eavesdropping on the Dark Cosmos
33 min

Eavesdropping on the Dark Cosmos

Dark Matter and Gravitational Waves

Edible Soft Robotics
29 min

Edible Soft Robotics

An exploration of candy as an engineered material

Hacking collective as a laboratory
29 min

Hacking collective as a laboratory

Hackers' knowledge studied by sociologist of science

Irren ist staatlich
60 min

Irren ist staatlich

10 Jahre Informationsfreiheitsgesetz

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

The Moon and European Space Exploration
32 min

The Moon and European Space Exploration

Refocusing on the moon as a platform for future deep space…

Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
32 min

Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur

Wie Wertschätzung in (Tech-)Communities gelingen kann

The woman behind your WiFi
31 min

The woman behind your WiFi

Hedy Lamarr: Frequency Hopping in Hollywood

Berechnete Welt
31 min

Berechnete Welt

Unsere Daten, die Zukunft und die zerstörte Demokratie

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative

Dissecting HDMI
63 min

Dissecting HDMI

Developing open, FPGA-based capture hardware for conference…

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

Machine Dreams
62 min

Machine Dreams

Dreaming Machines

Making Technology Inclusive Through Papercraft and Sound
56 min

Making Technology Inclusive Through Papercraft and Sound

Introducing the Love to Code Platform

Lightning Talks Day 3
122 min

Lightning Talks Day 3

Lightning Talks

Memory Deduplication: The Curse that Keeps on Giving
59 min

Memory Deduplication: The Curse that Keeps on Giving

A tale of 3 different memory deduplication based…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

radare demystified
62 min

radare demystified

after 1.0

Fnord-Jahresrückblick
99 min

Fnord-Jahresrückblick

Wir helfen euch, die Fnords zu sehen!

Eine kleine Geschichte der Parlamentsschlägerei
26 min

Eine kleine Geschichte der Parlamentsschlägerei

Schlagende Argumente, fliegende Fäuste

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

Durchmarsch von Rechts
60 min

Durchmarsch von Rechts

…und was wir dagegen tun können

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

SpiegelMining – Reverse Engineering von Spiegel-Online
58 min

SpiegelMining – Reverse Engineering von Spiegel-Online

Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

The Untold Story of Edward Snowden’s Escape from Hong Kong
65 min

The Untold Story of Edward Snowden’s Escape from Hong Kong

and How You Can Help the Refugees Who Saved His Life

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

On the Security and Privacy of Modern Single Sign-On in the Web
64 min

On the Security and Privacy of Modern Single Sign-On in the Web

(Not Only) Attacks on OAuth and OpenID Connect

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Copywrongs 2.0
61 min

Copywrongs 2.0

We must prevent EU copyright reform from breaking the…

No USB? No problem.
57 min

No USB? No problem.

How to write an open source bit-bang low-speed USB stack…

Die Sprache der Populisten
59 min

Die Sprache der Populisten

Wie politische "Gewissheiten" sprachlich konstruiert werden

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

Haft für Whistleblower?
34 min

Haft für Whistleblower?

Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. §…

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Welcome to the Anthropocene?
28 min

Welcome to the Anthropocene?

(Did) We Accidentally a New Geological Epoch(?)

Hacking the World
26 min

Hacking the World

The struggle for security for all.

Lightning Talks Day 2
120 min

Lightning Talks Day 2

Lightning Talks

The Clash of Digitalizations
31 min

The Clash of Digitalizations

The Devolution of Arab Men from Humans to Digital Fodder

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Es sind die kleinen Dinge im Leben
60 min

Es sind die kleinen Dinge im Leben

von Mikroskopen, Wahrnehmung und warum das kaum jemanden…

Der 33 Jahrerückblick
26 min

Der 33 Jahrerückblick

Technology and Politics in Congress Talks, from 1984 to now

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Nicht öffentlich.
65 min

Nicht öffentlich.

Ein Geheimdienst als Zeuge. Szenen aus dem…

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
46 min

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet

Finding interesting targets in 128bit of entropy

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Where in the World Is Carmen Sandiego?
59 min

Where in the World Is Carmen Sandiego?

Becoming a secret travel agent

Netzpolitik in Österreich
61 min

Netzpolitik in Österreich

Ein Jahresrückblick aus dem Land der Datenberge

Netzpolitik in der Schweiz 2016
62 min

Netzpolitik in der Schweiz 2016

Grundrechte per Volksentscheid versenken

Make Wi-Fi fast again
57 min

Make Wi-Fi fast again

Eine kleine Einführung in den 802.11ac Standard

Nintendo Hacking 2016
61 min

Nintendo Hacking 2016

Game Over

Software Defined Emissions
60 min

Software Defined Emissions

A hacker’s review of Dieselgate

Dieselgate – A year later
60 min

Dieselgate – A year later

env stinks || exit

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
34 min

Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken

Wie mit Gerüchten über Geflüchtete im Netz Stimmung gemacht…

What's It Doing Now?
32 min

What's It Doing Now?

The Role of Automation Dependency in Aviation Accidents

Make the Internet Neutral Again
31 min

Make the Internet Neutral Again

Let's put the new EU Net Neutrality rules to work

A Data Point Walks Into a Bar
32 min

A Data Point Walks Into a Bar

How cold data can make you feel things.

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Routerzwang und Funkabschottung
60 min

Routerzwang und Funkabschottung

Was Aktivisten davon lernen können

Kampf dem Abmahnunwesen
33 min

Kampf dem Abmahnunwesen

Wider die automatisierte Rechtsdurchsetzung

A Story of Discrimination and Unfairness
60 min

A Story of Discrimination and Unfairness

Prejudice in Word Embeddings

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

Space making/space shaping
33 min

Space making/space shaping

How mapping creates space, shapes cities and our view of…

Check Your Police Record!
60 min

Check Your Police Record!

Polizeiliche Datenbanken und was man über seinen Auskunfts-…

The Nibbletronic
20 min

The Nibbletronic

A DIY MIDI Controller and a New UI for Wind Instruments

Law Enforcement Are Hacking the Planet
31 min

Law Enforcement Are Hacking the Planet

How the FBI and local cops are hacking computers outside of…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

33C3 Opening Ceremony
15 min

33C3 Opening Ceremony