
33 min
Antipatterns und Missverständnisse in der Softwareentwicklung
Eine Geschichte voller Missverständnisse

115 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 34C3

52 min
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Warum das Laden eines Elektroautos unsicher ist

66 min
Social Bots, Fake News und Filterblasen
Therapiestunde mit einem Datenjournalisten und vielen…

56 min
Console Security - Switch
Homebrew on the Horizon

31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?

59 min
Internet of Fails
Where IoT has gone wrong

32 min
Relativitätstheorie für blutige Anfänger
Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?

39 min
Gamified Control?
China's Social Credit Systems

31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers

120 min
Hacker Jeopardy
Zahlenraten für Geeks

57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…

61 min
QualityLand
Lesung

61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…

59 min
All Computers Are Beschlagnahmt
Zum Verbot von Indymedia linksunten

60 min
Tiger, Drucker und ein Mahnmal
Neues vom Zentrum für Politische Schönheit

22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction

51 min
How to drift with any car
(without your mom yelling at you)

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

35 min
hacking disaster
mit Krisenintervention den Kapitalismus hacken

55 min
Der PC-Wahl-Hack
Analyse einer Wahlsoftware

29 min
Ecstasy 10x yellow Twitter 120mg Mdma
Shipped from Germany for 0.1412554 Bitcoins

61 min
Trügerische Sicherheit
Wie die Überwachung unsere Sicherheit gefährdet

30 min
Mietshäusersyndikat: den Immobilienmarkt hacken
Wie man ein Haus kaufen kann ohne es zu besitzen

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

33 min
Digitale Bildung in der Schule
5.-Klässlerinnen, die über die Millisekunden für einen…

30 min
Schreibtisch-Hooligans
Informationsfreiheit trotz CSU

31 min
DPRK Consumer Technology
Facts to fight lore

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

46 min
34C3 Abschluss
#tuwat

59 min
Pointing Fingers at 'The Media'
The Bundestagswahl 2017 and Rise of the AfD

32 min
Die Sprache der Überwacher
Wie in Österreich über Sicherheit und Überwachung…

58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…

65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis

107 min
Nougatbytes 11₂
Die geekige Wort- & Bilderrätselspielshau ist zuЯück

56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…

29 min
Der netzpolitische Wetterbericht
Wird es Regen geben? Ein Ausblick auf die neue…

34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…

57 min
34C3 Infrastructure Review
How does the CCC run a conference?

30 min
Science is broken
How much can we trust science in light failed replications,…

33 min
Watching the changing Earth
warning: gravity ahead

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

61 min
Die göttliche Informatik
Die Informatik löst formale (mathematisch modellierte)…

58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…

59 min
Financial surveillance
Exposing the global banking watchlist

60 min
Lets break modern binary code obfuscation
A semantics based approach

50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…

30 min
0en & 1en auf dem Acker
Was die Sensor & Automatisierungstechnik in der…

61 min
Ein Festival der Demokratie
Von Technik, Kollaborationen und Erreichtem zum G20-Gipfel…

61 min
BBSs and early Internet access in the 1990ies
Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain

60 min
MQA - A clever stealth DRM-Trojan
A critical look on a new audio Format

66 min
The Snowden Refugees under Surveillance in Hong Kong
A Rapidly Emerging Police State and Imminent Deportation to…

44 min
ASLR on the line
Practical cache attacks on the MMU

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

61 min
Holography of Wi-Fi radiation
Can we see the stray radiation of wireless devices? And…

31 min
Running GSM mobile phone on SDR
SDR PHY for OsmocomBB

29 min
Es sind die kleinen Dinge im Leben II
was alles geht und wie man anfängt, mit Mikroskopen

31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future

26 min
Humans as software extensions
Will You Be My Plugin?

61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques

47 min
Tightening the Net in Iran
The Situation of Censorship and Surveillance in Iran, and…

62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and what…

35 min
Low Cost Non-Invasive Biomedical Imaging
An Open Electrical Impedance Tomography Project

31 min
BGP and the Rule of Custom
How the internet self-governs without international law

48 min
Treibhausgasemissionen einschätzen
Wieviel CO2 macht <...>? Ungefähr?

21 min
Designing PCBs with code
Is designing circuits with code instead of CAD the future…

55 min
Lobby-Schlacht um die ePrivacy-Verordnung
Die EU hat die Wahl: Schutz von Menschen oder von…

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

29 min
Blinkenrocket!
How to make a community project fly

43 min
Forensic Architecture
Forensic Architecture is an independent research agency…

31 min
Access To Bodies
Ein Leitfaden für post-humane Computer- und…

33 min
UPSat - the first open source satellite
Going to space the libre way

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

32 min
Fuck Dutch mass-surveillance: let's have a referendum!
Forcing the Netherlands to publicly debate privacy and the…

58 min
Open Source Estrogen
From molecular colonization to molecular collaboration

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

33 min
Robot Music
The Robots Play Our Music and What Do We Do?

47 min
Netzpolitik in der Schweiz
Die aktuellen Auseinandersetzungen über digitale…

32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?

25 min
Saving the World with Space Solar Power
or is it just PEWPEW?!

46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…

32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…

27 min
Italy's surveillance toolbox
Research on Monitoring Italian Government Surveillance…

31 min
openPower - the current state of commercial openness in CPU development
is there no such thing as open hardware?

56 min
Deconstructing a Socialist Lawnmower
Obsolete Technologies + Critical Material Studies in Media…

32 min
History and implications of DRM
From tractors to Web standards

32 min
library operating systems
reject the default reality^W abstractions and substitute…

31 min
Extended DNA Analysis
Political pressure for DNA-based facial composites

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem

43 min
This is NOT a proposal about mass surveillance!
Analysing the terminology of the UK’s Snooper’s Charter

32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized

28 min
SatNOGS: Crowd-sourced satellite operations
Satellite Open Ground Station Network

31 min
TrustZone is not enough
Hijacking debug components for embedded security

35 min
Simulating the future of the global agro-food system
Cybernetic models analyze scenarios of interactions between…

30 min
Electroedibles
Open Source Hardware for Smart Candies

61 min
Zamir Transnational Network und Zagreb Dairy
Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)

30 min
“Nabovarme” opensource heating infrastructure in Christiania
Freetown Christiania´s digitally controlled/surveyed…

32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…

30 min
OONI: Let's Fight Internet Censorship, Together!
The Open Observatory of Network Interference

32 min
Visceral Systems
Approaches to working with sound and network data…

63 min
Don't stop 'til you feel it
Artistic interventions in climate change

58 min
Uncertain Concern
How Undocumented Immigrants in the US Navigate Technology

33 min