Events for tag "25c3"

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

The Trust Situation
60 min

The Trust Situation

Why the idea of data protection slowly turns out to be…

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Just Estonia and Georgia?
44 min

Just Estonia and Georgia?

Global-scale Incident Response and Responders

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Solar-powering your Geek Gear
28 min

Solar-powering your Geek Gear

Alternative and mobile power for all your little toys

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Flying for free
60 min

Flying for free

Exploiting the weather with unpowered aircraft

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Embracing Post-Privacy
59 min

Embracing Post-Privacy

Optimism towards a future where there is "Nothing to hide"

Der elektronische Personalausweis
60 min

Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

About Cyborgs and Gargoyles
44 min

About Cyborgs and Gargoyles

State of the Art in Wearable Computing

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

All your base(s) are belong to us
55 min

All your base(s) are belong to us

Dawn of the high-throughput DNA sequencing era

Zehn Big Brother Awards in .at
57 min

Zehn Big Brother Awards in .at

Rückblick über eine bewegte Zeit

Scalable Swarm Robotics
39 min

Scalable Swarm Robotics

Formica: a cheap, open research platform

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Hacker Jeopardy
103 min

Hacker Jeopardy

Die ultimative Hacker-Quizshow

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Erich Mühsams Tagebücher in der Festungshaft
51 min

Erich Mühsams Tagebücher in der Festungshaft

Ein Idylle aus der Analogsteinzeit der Überwachung

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

Wikileaks
58 min

Wikileaks

Wikileaks vs. the World

Terrorist All-Stars
65 min

Terrorist All-Stars

Some cases of terrorism around the world that are not…

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Fnord News Show
50 min

Fnord News Show

Wir helfen Euch, die Fnords zu sehen

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

U23
49 min

U23

The Hackerspace's Junior Academy

Beyond Asimov - Laws for Robots
49 min

Beyond Asimov - Laws for Robots

Developing rules for autonomous systems

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

Neusprech im Überwachungsstaat
70 min

Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online