Search for "20c3" returned 3824 results
65 min
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent…
64 min
The Cell Processor
Computing of Tomorrow or Yesterday
63 min
Exploiting Symbian
Symbian Exploit and Shellcode Development
53 min
Towards a Single Secure European Cyberspace?
What the European Union wants. What the hackerdom can do..
60 min
Flying for free
Exploiting the weather with unpowered aircraft
73 min
hacking smart phones
expanding the attack surface and then some
52 min
Personal experiences bringing technology and new media to disaster areas
Experiences from Iraq and post Katrina New Orleans
64 min
Sovereign Keys
A proposal for fixing attacks on CAs and DNSSEC
47 min
Small footprint inspection techniques for Android
Reverse engineering on Android platforms
61 min
SMS-o-Death
From analyzing to attacking mobile phones on a large scale.
63 min
Power gadgets with your own electricity
escape the basement and make the sun work for you
82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones
64 min
Europäische Biometriestrategien
Die Automatisierung von Personenidentifizierung an der…
49 min
Lawful Interception in VoIP networks
Old Laws and New Technology the German Way
67 min
Life is a Holodeck!
An overview of holographic techniques
61 min
Defend your Freedoms Online: It's Political, Stupid!
A Positive agenda against the next ACTA, SOPA, and such
68 min
Weaponizing Cultural Viruses
A Manual For Engaged Memetic Resistance on The Front Lines…
71 min
Defending the Poor
Preventing Flash Exploits
83 min
Fnord-Jahresrückblick 2010 (english translation)
von Atomausstieg bis Zwangsintegration
55 min
FrozenCache
Mitigating cold-boot attacks for Full-Disk-Encryption…
53 min