Chaos Communication Camp 2015

Security & Hacking

Full playlist: Video / Audio
How to Destroy a Laptop with Top Secrets
58 min

How to Destroy a Laptop with Top Secrets

How did GCHQ do it to the Guardian's copy of Snowden's…

Update: Vor Windows10 Update Warnung
31 min

Update: Vor Windows10 Update Warnung

Update (Patch) Debakel

How to make your software build reproducibly
55 min

How to make your software build reproducibly

Get a verifiable path from source to binary

Bugged Files
46 min

Bugged Files

Is Your Document Telling on You?

Hardware attacks: hacking chips on the (very) cheap
28 min

Hardware attacks: hacking chips on the (very) cheap

How to retrieve secret keys without going bankrupt

Advanced interconnect attacks
48 min

Advanced interconnect attacks

Chasing GRX and SS7 vulns

Privacy Badger
30 min

Privacy Badger

Stop being tracked online

Let's Encrypt
42 min

Let's Encrypt

A Certificate Authority To Encrypt the Entire Web

Jumping the Paywall
29 min

Jumping the Paywall

How to freely share research without being arrested

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

Helping the Helpless
56 min

Helping the Helpless

Targeted threats to civil society