Events for tag "34c3"
32 min
...and dehumanize ourselves in the process?
43 min
Analysing the terminology of the UK’s Snooper’s Charter
57 min
How does the CCC run a conference?
61 min
Von Technik, Kollaborationen und Erreichtem zum G20-Gipfel…
60 min
'Liberating' Firmware from Closed Devices with Open Source…
45 min
Hacking industrial control gateways
42 min
Dissecting FPGAs from bottom up, extracting schematics and…
61 min
Über die Banalität der Beeinflussung und das Leben mit…
28 min
Theory and practice of moonshining and legal distilling
31 min
How the internet self-governs without international law
33 min
Going to space the libre way
66 min
A Rapidly Emerging Police State and Imminent Deportation to…
61 min
Die Informatik löst formale (mathematisch modellierte)…
56 min
Obsolete Technologies + Critical Material Studies in Media…
31 min
Resilient P2P Messaging for Everyone
31 min
Walter Höllerer bei WikiPedia
32 min
Forcing the Netherlands to publicly debate privacy and the…
63 min
Artistic interventions in climate change
29 min
Shipped from Germany for 0.1412554 Bitcoins
59 min
The Bundestagswahl 2017 and Rise of the AfD
32 min
A decentralized Public Key Infrastructure that supports…
61 min
Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)
31 min
Why is my vacuum as powerful as my smartphone?
27 min
Research on Monitoring Italian Government Surveillance…
30 min
Afrofuturism, Telling tales of speculative futures
46 min
Analyzing & Breaking Exploit Mitigations and Secure Random…
39 min
China's Social Credit Systems
43 min
Forensic Architecture is an independent research agency…
32 min
How search and rescue in the mediterranean was criminalized
35 min
An Open Electrical Impedance Tomography Project
35 min
mit Krisenintervention den Kapitalismus hacken
32 min
Approaches to working with sound and network data…
60 min
Neues vom Zentrum für Politische Schönheit
57 min
An introduction into reverse-engineering x86 microcode and…
58 min
How Undocumented Immigrants in the US Navigate Technology
33 min
Rosa Menkman investigates video compression, feedback, and…
30 min
How much can we trust science in light failed replications,…
58 min
An Exploration of NFC Transactions and Explanation How…
62 min
An introduction to the basics of climate research and what…
51 min
An AES encrypted radio system
33 min
5.-Klässlerinnen, die über die Millisekunden für einen…
33 min
The Robots Play Our Music and What Do We Do?
30 min
Open Source Hardware for Smart Candies
55 min
Analyse einer Wahlsoftware
47 min
Die aktuellen Auseinandersetzungen über digitale…
30 min
Was die Sensor & Automatisierungstechnik in der…
30 min
Freetown Christiania´s digitally controlled/surveyed…
48 min
Wieviel CO2 macht <...>? Ungefähr?
51 min
(without your mom yelling at you)
29 min
was alles geht und wie man anfängt, mit Mikroskopen
58 min
CITL: Quantitative, Comparable Software Risk Reporting
31 min
Political pressure for DNA-based facial composites
59 min
Shamir secret sharing: How it works and how to implement it
60 min
A critical look on a new audio Format
31 min
is there no such thing as open hardware?
61 min
Survey of Network Anonymisation Techniques
25 min
The time travelling android isn’t even our biggest problem
58 min
Traveling with Digital Devices in the Golden Age of…
34 min
How the reputation economy is creating data-driven…
31 min
Hijacking debug components for embedded security
31 min
From Hacker Culture to the Software of the Future
32 min
Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?
60 min
A semantics based approach
65 min
Fun with lattices in cryptography and cryptanalysis
107 min
Die geekige Wort- & Bilderrätselspielshau ist zuЯück
115 min
Die Wissenschaftsgala vom 34C3
58 min
A survey of BSD kernel vulnerabilities.
32 min
Wie in Österreich über Sicherheit und Überwachung…
30 min
Informationsfreiheit trotz CSU
61 min
Wie die Überwachung unsere Sicherheit gefährdet
66 min
Therapiestunde mit einem Datenjournalisten und vielen…
58 min
Get a unique tour of some of the world’s most unusual…
55 min
Die EU hat die Wahl: Schutz von Menschen oder von…
47 min
The Situation of Censorship and Surveillance in Iran, and…
30 min
The Open Observatory of Network Interference
28 min
Satellite Open Ground Station Network
21 min
Is designing circuits with code instead of CAD the future…
32 min
reject the default reality^W abstractions and substitute…
46 min
Strong metadata protection for asynchronous messaging
52 min
Warum das Laden eines Elektroautos unsicher ist
55 min
Towards an open source binary firmware analysis framework
31 min
Decrypting French encryption law
29 min
Wird es Regen geben? Ein Ausblick auf die neue…
33 min
Eine Geschichte voller Missverständnisse
49 min
Ways to Chaos in Digital and Analogue Electronics
59 min
Exposing the global banking watchlist
58 min
From molecular colonization to molecular collaboration
31 min
Things you always wanted to know about NIC drivers
59 min
Zum Verbot von Indymedia linksunten
22 min
On Fitbit Firmware Modifications and Data Extraction
32 min
From tractors to Web standards
59 min
...or why we need 17 billion Volts to make a picture.
30 min
Wie man ein Haus kaufen kann ohne es zu besitzen
56 min
A journey on how to fix broken proprietary hardware by…
53 min
Tools for Fooling the "Black Box"
29 min
How to make a community project fly
32 min
On the obstacles to think of emergent technologies in the…
50 min
Overview of how the state censored and how it got…
31 min
Ein Leitfaden für post-humane Computer- und…
44 min
Practical cache attacks on the MMU
61 min
Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN
35 min
Cybernetic models analyze scenarios of interactions between…
61 min
Can we see the stray radiation of wireless devices? And…
38 min
from apple to schnaps -- a complete diy-toolchain