Events for tag "34c3"
35 min
Simulating the future of the global agro-food system
Cybernetic models analyze scenarios of interactions between…
59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.
35 min
hacking disaster
mit Krisenintervention den Kapitalismus hacken
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
28 min
Home Distilling
Theory and practice of moonshining and legal distilling
58 min
Uncertain Concern
How Undocumented Immigrants in the US Navigate Technology
61 min
Zamir Transnational Network und Zagreb Dairy
Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)
32 min
Die Sprache der Überwacher
Wie in Österreich über Sicherheit und Überwachung…
44 min
ASLR on the line
Practical cache attacks on the MMU
31 min
Extended DNA Analysis
Political pressure for DNA-based facial composites
33 min
Digitale Bildung in der Schule
5.-Klässlerinnen, die über die Millisekunden für einen…
30 min
Electroedibles
Open Source Hardware for Smart Candies
65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis
32 min
Relativitätstheorie für blutige Anfänger
Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?
32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?
32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized
33 min
Robot Music
The Robots Play Our Music and What Do We Do?
31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
31 min
BGP and the Rule of Custom
How the internet self-governs without international law
25 min
Saving the World with Space Solar Power
or is it just PEWPEW?!
47 min
Netzpolitik in der Schweiz
Die aktuellen Auseinandersetzungen über digitale…
22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction
55 min
Der PC-Wahl-Hack
Analyse einer Wahlsoftware
26 min
Humans as software extensions
Will You Be My Plugin?
61 min
BBSs and early Internet access in the 1990ies
Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN
33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…
45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways
30 min
0en & 1en auf dem Acker
Was die Sensor & Automatisierungstechnik in der…
56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…
47 min
Tightening the Net in Iran
The Situation of Censorship and Surveillance in Iran, and…
31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future
30 min
OONI: Let's Fight Internet Censorship, Together!
The Open Observatory of Network Interference
32 min
library operating systems
reject the default reality^W abstractions and substitute…
61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…
50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…
32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
29 min
Der netzpolitische Wetterbericht
Wird es Regen geben? Ein Ausblick auf die neue…
46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging
59 min
Internet of Fails
Where IoT has gone wrong
32 min
Visceral Systems
Approaches to working with sound and network data…
59 min
Pointing Fingers at 'The Media'
The Bundestagswahl 2017 and Rise of the AfD
42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…
32 min
History and implications of DRM
From tractors to Web standards
58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…
61 min
QualityLand
Lesung
62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and what…
57 min
34C3 Infrastructure Review
How does the CCC run a conference?
46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…
31 min
TrustZone is not enough
Hijacking debug components for embedded security
33 min
Watching the changing Earth
warning: gravity ahead
34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…
29 min
Blinkenrocket!
How to make a community project fly
30 min
“Nabovarme” opensource heating infrastructure in Christiania
Freetown Christiania´s digitally controlled/surveyed…
59 min
All Computers Are Beschlagnahmt
Zum Verbot von Indymedia linksunten
63 min
Don't stop 'til you feel it
Artistic interventions in climate change
53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"
43 min
This is NOT a proposal about mass surveillance!
Analysing the terminology of the UK’s Snooper’s Charter
21 min
Designing PCBs with code
Is designing circuits with code instead of CAD the future…
39 min
Gamified Control?
China's Social Credit Systems
31 min
DPRK Consumer Technology
Facts to fight lore
120 min
Hacker Jeopardy
Zahlenraten für Geeks
25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem
29 min
Es sind die kleinen Dinge im Leben II
was alles geht und wie man anfängt, mit Mikroskopen
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
56 min
Deconstructing a Socialist Lawnmower
Obsolete Technologies + Critical Material Studies in Media…
30 min
Science is broken
How much can we trust science in light failed replications,…
46 min
34C3 Abschluss
#tuwat
66 min
The Snowden Refugees under Surveillance in Hong Kong
A Rapidly Emerging Police State and Imminent Deportation to…
30 min
Schreibtisch-Hooligans
Informationsfreiheit trotz CSU
56 min
Console Security - Switch
Homebrew on the Horizon
66 min
Social Bots, Fake News und Filterblasen
Therapiestunde mit einem Datenjournalisten und vielen…
31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?
59 min
Financial surveillance
Exposing the global banking watchlist
61 min
Die göttliche Informatik
Die Informatik löst formale (mathematisch modellierte)…
30 min
Mietshäusersyndikat: den Immobilienmarkt hacken
Wie man ein Haus kaufen kann ohne es zu besitzen
31 min
Access To Bodies
Ein Leitfaden für post-humane Computer- und…
52 min
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Warum das Laden eines Elektroautos unsicher ist
60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…
61 min
Ein Festival der Demokratie
Von Technik, Kollaborationen und Erreichtem zum G20-Gipfel…
31 min
Running GSM mobile phone on SDR
SDR PHY for OsmocomBB
58 min
Open Source Estrogen
From molecular colonization to molecular collaboration
61 min
Trügerische Sicherheit
Wie die Überwachung unsere Sicherheit gefährdet
33 min
UPSat - the first open source satellite
Going to space the libre way
29 min
Ecstasy 10x yellow Twitter 120mg Mdma
Shipped from Germany for 0.1412554 Bitcoins
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
55 min
Lobby-Schlacht um die ePrivacy-Verordnung
Die EU hat die Wahl: Schutz von Menschen oder von…
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
28 min
SatNOGS: Crowd-sourced satellite operations
Satellite Open Ground Station Network
27 min
Italy's surveillance toolbox
Research on Monitoring Italian Government Surveillance…
51 min
How to drift with any car
(without your mom yelling at you)
33 min
Antipatterns und Missverständnisse in der Softwareentwicklung
Eine Geschichte voller Missverständnisse
48 min
Treibhausgasemissionen einschätzen
Wieviel CO2 macht <...>? Ungefähr?
32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…
58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!
60 min
Lets break modern binary code obfuscation
A semantics based approach
38 min
Schnaps Hacking
from apple to schnaps -- a complete diy-toolchain
32 min
Fuck Dutch mass-surveillance: let's have a referendum!
Forcing the Netherlands to publicly debate privacy and the…
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
107 min
Nougatbytes 11₂
Die geekige Wort- & Bilderrätselspielshau ist zuЯück
43 min
Forensic Architecture
Forensic Architecture is an independent research agency…
61 min
Holography of Wi-Fi radiation
Can we see the stray radiation of wireless devices? And…
35 min
Low Cost Non-Invasive Biomedical Imaging
An Open Electrical Impedance Tomography Project
60 min
Tiger, Drucker und ein Mahnmal
Neues vom Zentrum für Politische Schönheit
115 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 34C3
31 min