
30 min
0en & 1en auf dem Acker
Was die Sensor & Automatisierungstechnik in der…

46 min
34C3 Abschluss
#tuwat

57 min
34C3 Infrastructure Review
How does the CCC run a conference?

31 min
Access To Bodies
Ein Leitfaden für post-humane Computer- und…

62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and what…

59 min
All Computers Are Beschlagnahmt
Zum Verbot von Indymedia linksunten

33 min
Antipatterns und Missverständnisse in der Softwareentwicklung
Eine Geschichte voller Missverständnisse

58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.

44 min
ASLR on the line
Practical cache attacks on the MMU

61 min
BBSs and early Internet access in the 1990ies
Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN

61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…

31 min
BGP and the Rule of Custom
How the internet self-governs without international law

29 min
Blinkenrocket!
How to make a community project fly

56 min
Console Security - Switch
Homebrew on the Horizon

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…

56 min
Deconstructing a Socialist Lawnmower
Obsolete Technologies + Critical Material Studies in Media…

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers

29 min
Der netzpolitische Wetterbericht
Wird es Regen geben? Ein Ausblick auf die neue…

55 min
Der PC-Wahl-Hack
Analyse einer Wahlsoftware

21 min
Designing PCBs with code
Is designing circuits with code instead of CAD the future…

61 min
Die göttliche Informatik
Die Informatik löst formale (mathematisch modellierte)…

32 min
Die Sprache der Überwacher
Wie in Österreich über Sicherheit und Überwachung…

33 min
Digitale Bildung in der Schule
5.-Klässlerinnen, die über die Millisekunden für einen…

63 min
Don't stop 'til you feel it
Artistic interventions in climate change

22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction

31 min
DPRK Consumer Technology
Facts to fight lore

29 min
Ecstasy 10x yellow Twitter 120mg Mdma
Shipped from Germany for 0.1412554 Bitcoins

61 min
Ein Festival der Demokratie
Von Technik, Kollaborationen und Erreichtem zum G20-Gipfel…

30 min
Electroedibles
Open Source Hardware for Smart Candies

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…

29 min
Es sind die kleinen Dinge im Leben II
was alles geht und wie man anfängt, mit Mikroskopen

57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…

31 min
Extended DNA Analysis
Political pressure for DNA-based facial composites

59 min
Financial surveillance
Exposing the global banking watchlist

43 min
Forensic Architecture
Forensic Architecture is an independent research agency…

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

32 min
Fuck Dutch mass-surveillance: let's have a referendum!
Forcing the Netherlands to publicly debate privacy and the…

39 min
Gamified Control?
China's Social Credit Systems

31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future

120 min
Hacker Jeopardy
Zahlenraten für Geeks

35 min
hacking disaster
mit Krisenintervention den Kapitalismus hacken

32 min
History and implications of DRM
From tractors to Web standards

61 min
Holography of Wi-Fi radiation
Can we see the stray radiation of wireless devices? And…

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

51 min
How to drift with any car
(without your mom yelling at you)

26 min
Humans as software extensions
Will You Be My Plugin?

33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…

50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…

59 min
Internet of Fails
Where IoT has gone wrong

27 min
Italy's surveillance toolbox
Research on Monitoring Italian Government Surveillance…

52 min
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Warum das Laden eines Elektroautos unsicher ist

65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis

60 min
Lets break modern binary code obfuscation
A semantics based approach

32 min
library operating systems
reject the default reality^W abstractions and substitute…

55 min
Lobby-Schlacht um die ePrivacy-Verordnung
Die EU hat die Wahl: Schutz von Menschen oder von…

35 min
Low Cost Non-Invasive Biomedical Imaging
An Open Electrical Impedance Tomography Project

115 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 34C3

30 min
Mietshäusersyndikat: den Immobilienmarkt hacken
Wie man ein Haus kaufen kann ohne es zu besitzen

32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…

60 min
MQA - A clever stealth DRM-Trojan
A critical look on a new audio Format

30 min
“Nabovarme” opensource heating infrastructure in Christiania
Freetown Christiania´s digitally controlled/surveyed…

47 min
Netzpolitik in der Schweiz
Die aktuellen Auseinandersetzungen über digitale…

107 min
Nougatbytes 11₂
Die geekige Wort- & Bilderrätselspielshau ist zuЯück

30 min
OONI: Let's Fight Internet Censorship, Together!
The Open Observatory of Network Interference

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

31 min
openPower - the current state of commercial openness in CPU development
is there no such thing as open hardware?

58 min
Open Source Estrogen
From molecular colonization to molecular collaboration

59 min
Pointing Fingers at 'The Media'
The Bundestagswahl 2017 and Rise of the AfD

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…

61 min
QualityLand
Lesung

25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem

32 min
Relativitätstheorie für blutige Anfänger
Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

33 min
Robot Music
The Robots Play Our Music and What Do We Do?

31 min
Running GSM mobile phone on SDR
SDR PHY for OsmocomBB

28 min
SatNOGS: Crowd-sourced satellite operations
Satellite Open Ground Station Network

25 min
Saving the World with Space Solar Power
or is it just PEWPEW?!

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain

30 min
Schreibtisch-Hooligans
Informationsfreiheit trotz CSU

30 min
Science is broken
How much can we trust science in light failed replications,…

35 min
Simulating the future of the global agro-food system
Cybernetic models analyze scenarios of interactions between…

66 min
Social Bots, Fake News und Filterblasen
Therapiestunde mit einem Datenjournalisten und vielen…

34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…

46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…

58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…

32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized

66 min
The Snowden Refugees under Surveillance in Hong Kong
A Rapidly Emerging Police State and Imminent Deportation to…

32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…

43 min
This is NOT a proposal about mass surveillance!
Analysing the terminology of the UK’s Snooper’s Charter

60 min
Tiger, Drucker und ein Mahnmal
Neues vom Zentrum für Politische Schönheit

47 min
Tightening the Net in Iran
The Situation of Censorship and Surveillance in Iran, and…

48 min
Treibhausgasemissionen einschätzen
Wieviel CO2 macht <...>? Ungefähr?

61 min
Trügerische Sicherheit
Wie die Überwachung unsere Sicherheit gefährdet

31 min
TrustZone is not enough
Hijacking debug components for embedded security

58 min
Uncertain Concern
How Undocumented Immigrants in the US Navigate Technology

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?

33 min
UPSat - the first open source satellite
Going to space the libre way

32 min
Visceral Systems
Approaches to working with sound and network data…

33 min
Watching the changing Earth
warning: gravity ahead

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?

61 min