Search for "20c3" returned 3829 results
63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem
45 min
ESXi Beast
Exploiting VMWARE ESXi Binary Protocols Using CANAPE
36 min
Having fun with RTP
„Who is speaking???“
41 min
DC+, The Protocol
Technical defense against data retention law
58 min
Linguistic Hacking
How to know what a text in an unknown language is about?
45 min
Homegrown Interactive Tables
Any Technology Sufficiently Advanced is Indistinguishable…
50 min
Predictable RNG in the vulnerable Debian OpenSSL package
the What and the How
50 min
To be or I2P
An introduction into anonymous communication with I2P
65 min
Blinkenlights Stereoscope
Behind the scenes of the new light installation
52 min
The engineering part of social engineering
Why just lying your way in won't get you anywhere
57 min
C64-DTV Hacking
Revisiting the legendary computer in a joystick
52 min
Recent Developments in EU Data Retention proposals
Commission vs. Council - the lesser of two evils?
57 min
Sicherheit vs. Überwachung
Videoüberwachung am Beispiel des Congressgebäudes
54 min
Time is NOT on your Side
Mitigating Timing Side Channels on the Web
63 min
Spinning the electronic Wheel
Still the bicycles for the 21th century
68 min
The future of protocol reversing and simulation applied on ZeroAccess botnet
Mapping your enemy Botnet with Netzob
61 min
CSRF, the Intranet and You
Causes, Attacks and Countermeasures
59 min
Grundlagen der sicheren Programmierung
Typische Sicherheitslücken
54 min
W3C on Mobile, CSS, Multimodal and more
A look at the upcoming standards by W3C
40 min
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy
49 min