Search for "36c3" returned 2362 results
67 min
Erste Stunden der Zweisamkeit
Jahresupdate zur GEMA-Alternative C3S
63 min
Reconstructing narratives
transparency in the service of justice
33 min
Computer Science in the DPRK
A view into technology on the other side of the world
28 min
Long war tactics
or how we learned to stop worrying and love the NSA
38 min
T-Minus Zero
The first days in the life of the "Flying Laptop" satellite
132 min
Lightning Talks - Day 2
4 minutes of fame
37 min
Reverse-Engineering DisplayLink devices
USB to DVI for Hackers
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
32 min
Das Transparenzportal Hamburg
Inhalt und Umsetzung
34 min
Snowden Effect vs. Privacy Paradox
Einstellungen und Internetnutzungsverhalten im Kontext des…
60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age
31 min
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Wie es kommt, dass technischer Fortschritt den Nutzern…
31 min
Krypto für die Zukunft
Verteidigung gegen Dunkle Künste
31 min
Living Drones
From war pigeons in 1914 to cyborg moths in 2014
39 min