
39 min
c3Power Monitoring CCCamp 19
Strom in Bits und Bytes visualisiert

41 min
Fighting back against Libra - Decentralizing Facebook Connect
Nym Anonymous Authentication Credentials

36 min
Visualization of networks using physics
How algorithms inspired by the laws of physics can create…

34 min
Making video games in a weekend
The why and how of game jams

31 min
Die Zukunft hat zwei Wellen
Ein Blick auf die Zukunft der Freifunk-Hardware (und was…

38 min
"Service Point" The Display
A tale of four generations

44 min
Why Nobody cares, and only You can save the World
Technology, Intuitions & Moral Expertise

39 min
schleuderpackung 2.0
TeXnische Aspekte und Umsetzung in der DS-Redaktion

47 min
Power-to-X
How to make (nearly) everything from electricity.

48 min
Wisdom of OS
An Inquiry into the Limits of the Possible

46 min
Little Big Data
Spurensuche in elektronischen Teilnehmerverzeichnissen

27 min
Cyborg Foundation
Transpecies Society

48 min
Architecture of secure IoT devices
Security by design

45 min
Privacy: An Unequally Distributed Resource
A Study of Privacy as Privilege in Our World

43 min
From DC to RF...starting where?
An analog engineer dives into RF circuits

35 min
From the Sputnik 'Beep' to messages from Pluto
Signals from Space 101

41 min
Solare Brennstoffe - Wasserstoff aus Sonnenlicht
Solarzellen können nicht nur Strom erzeugen

39 min
Technopolice: calling out so-called "Safe Cities"
Decentralising the fight against automated surveillance in…

50 min
Ethikrichtlinien für Künstliche Intelligenz? Wie wär's mit Gesetzen?
Wie die Industrie mit Debatten um "ethische KI" Zeit kauft

41 min
Deaths per TWh
The Price of Energy and Reducing CO2 Emissions

30 min
Love, CyBorgs, Art and Open Source – an artistic approach on how to stay golden
How to educate society through the language of art

42 min
Fast Global Internet Scanning - Challenges and new Approaches
Or how to become your own ISP

46 min
Taking Bluetooth lockpicking to the next level
...or the 37th floor of a Hotel

51 min
#Fusionbleibt
Wie das Fusion Festival sich erfolgreich gegen anlasslose…

62 min
#Defensive statt #Offensive am Beispiel von KRITIS
aka Ethik rekalibrieren

43 min
Participatory art event tools, co-creation and silk road networks
Collide, connect, cartography

41 min
Was tun gegen Digitale Gewalt gegen Frauen
"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen"…

45 min
75 Jahre Journalismus im WWW
the untold stories

47 min
Introduction to Mix Networks and Katzenpost
a new anonymity movement

30 min
Mit dem Getränkeautomaten in die Cloud
Über die (Un-)Sicherheit eines Bezahlsystems

42 min
Mapping Doomsday
Using OSINT to monitor and predict environmental conflicts

43 min
Updates from the Onion
The Road to Mobile Tor and Improved Censorship Circumvention

46 min
Nachhaltige Blockchains
statt Digital und Dreckig

46 min
IT-Sicherheit in vernetzten Gebäuden
Was kann man noch retten, wenn langlebigen Strukturen…

40 min
Domain computers have accounts, too!
Owning machines through relaying and delegation

42 min
Zombie Apocalypse vs. International Health Regulations
Introducing a very important piece of international law and…

37 min
Exposing Systems of Power and Injustice
5 Years of Disruption Network Lab

43 min
Hambacher Forst #hambibleibt
Vom Widerstand gegen Braunkohletagebaue, die…

45 min
Tales from Hardware Security Research
From Research over Vulnerability Discovery to Public…

45 min
River Crab, Harmony and Euphemism
A Peek at Chinese Online Culture under the Censorship

108 min
Achtung, Datenpannen!
Die große Datenschutz- und DSGVO-Show

49 min
Automated security testing for Software Developers who dont know security!
secure your apps and servers through continuous integration

46 min
Beyond the Pile of Knobs
Redesigning NoScript’s UX

44 min
Caught in the Net
The Impact of Anti-Extremism Content Regulation on Human…

44 min
500.000 Recalled Pacemakers, 2 Billion $ Stock Value Loss
The Story Behind

44 min
TAPS Transport Services API
Retiring the BSD Socket API

34 min
Fangespielen mit IMSI-Catchern
Warum IMSI Catcher schlecht "Verstecken" spielen

39 min
Die 5G-Überwachungsstandards
Cops Gegen Telekoms im ETSI

45 min
A mobile phone that respects your freedom
Experiences and lessons learned from 2 years of development…

43 min
Anykernels meet fuzzing
how to make NetBSD a better software for you and me

43 min
On bendy inflatables and travelling techno
Or, making hackercamp installations for cheap

46 min
The Limits of General Purpose SDR devices
Why an SDR board like a USRP or LimeSDR is not a cellular…

32 min
spispy: SPI flash device emulation
Open source tools for flash emulation and research

86 min
20 Jahre Camp
die Evolution des Chaos Communication Camps

43 min
DoH or Don't
The dilemma of DNS privacy protocols

45 min
Reporting from Brussels: The state of Digital Rights
How is our fight impacted by the new EU political landscape?

51 min
Make Your Tech and Wear It Too
Stories from an e-textile tailor

43 min
Hacking Containers and Kubernetes
Exploiting and protecting containers with a few lines of…

43 min
The Great British Drone Panic
Asking for better standards of official investigation and…

41 min
Introduction to (home) network security.
A beginner-friendly guide to network segmentation for…

33 min