Events for tag "camp19"

c3Power Monitoring CCCamp 19
39 min

c3Power Monitoring CCCamp 19

Strom in Bits und Bytes visualisiert

Knoten 101
33 min

Knoten 101

Can you knot or can you not ?

The Limits of General Purpose SDR devices
46 min

The Limits of General Purpose SDR devices

Why an SDR board like a USRP or LimeSDR is not a cellular…

Hacking Containers and Kubernetes
43 min

Hacking Containers and Kubernetes

Exploiting and protecting containers with a few lines of…

Fangespielen mit IMSI-Catchern
34 min

Fangespielen mit IMSI-Catchern

Warum IMSI Catcher schlecht "Verstecken" spielen

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

Anykernels meet fuzzing
43 min

Anykernels meet fuzzing

how to make NetBSD a better software for you and me

A mobile phone that respects your freedom
45 min

A mobile phone that respects your freedom

Experiences and lessons learned from 2 years of development…

The Great British Drone Panic
43 min

The Great British Drone Panic

Asking for better standards of official investigation and…

From DC to RF...starting where?
43 min

From DC to RF...starting where?

An analog engineer dives into RF circuits

Mit dem Getränkeautomaten in die Cloud
30 min

Mit dem Getränkeautomaten in die Cloud

Über die (Un-)Sicherheit eines Bezahlsystems

OpenCodes
35 min

OpenCodes

Hacker im Museum

Die Zukunft hat zwei Wellen
31 min

Die Zukunft hat zwei Wellen

Ein Blick auf die Zukunft der Freifunk-Hardware (und was…

Deaths per TWh
41 min

Deaths per TWh

The Price of Energy and Reducing CO2 Emissions

Solare Brennstoffe - Wasserstoff aus Sonnenlicht
41 min

Solare Brennstoffe - Wasserstoff aus Sonnenlicht

Solarzellen können nicht nur Strom erzeugen

IT-Sicherheit in vernetzten Gebäuden
46 min

IT-Sicherheit in vernetzten Gebäuden

Was kann man noch retten, wenn langlebigen Strukturen…

Make Your Tech and Wear It Too
51 min

Make Your Tech and Wear It Too

Stories from an e-textile tailor

Was tun gegen Digitale Gewalt gegen Frauen
41 min

Was tun gegen Digitale Gewalt gegen Frauen

"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen"…

Domain computers have accounts, too!
40 min

Domain computers have accounts, too!

Owning machines through relaying and delegation

#Fusionbleibt
51 min

#Fusionbleibt

Wie das Fusion Festival sich erfolgreich gegen anlasslose…

Privacy: An Unequally Distributed Resource
45 min

Privacy: An Unequally Distributed Resource

A Study of Privacy as Privilege in Our World

On bendy inflatables and travelling techno
43 min

On bendy inflatables and travelling techno

Or, making hackercamp installations for cheap

Cyborg Foundation
27 min

Cyborg Foundation

Transpecies Society

Power-to-X
47 min

Power-to-X

How to make (nearly) everything from electricity.

Mapping Doomsday
42 min

Mapping Doomsday

Using OSINT to monitor and predict environmental conflicts

Automated security testing for Software Developers who dont know security!
49 min

Automated security testing for Software Developers who dont know security!

secure your apps and servers through continuous integration

Caught in the Net
44 min

Caught in the Net

The Impact of Anti-Extremism Content Regulation on Human…

20 Jahre Camp
86 min

20 Jahre Camp

die Evolution des Chaos Communication Camps

spispy: SPI flash device emulation
32 min

spispy: SPI flash device emulation

Open source tools for flash emulation and research

Nachhaltige Blockchains
46 min

Nachhaltige Blockchains

statt Digital und Dreckig

Tales from Hardware Security Research
45 min

Tales from Hardware Security Research

From Research over Vulnerability Discovery to Public…

River Crab, Harmony and Euphemism
45 min

River Crab, Harmony and Euphemism

A Peek at Chinese Online Culture under the Censorship

Achtung, Datenpannen!
108 min

Achtung, Datenpannen!

Die große Datenschutz- und DSGVO-Show

DoH or Don't
43 min

DoH or Don't

The dilemma of DNS privacy protocols

Little Big Data
46 min

Little Big Data

Spurensuche in elektronischen Teilnehmerverzeichnissen

schleuderpackung 2.0
39 min

schleuderpackung 2.0

TeXnische Aspekte und Umsetzung in der DS-Redaktion

Updates from the Onion
43 min

Updates from the Onion

The Road to Mobile Tor and Improved Censorship Circumvention

Visualization of networks using physics
36 min

Visualization of networks using physics

How algorithms inspired by the laws of physics can create…

Wisdom of OS
48 min

Wisdom of OS

An Inquiry into the Limits of the Possible

Zombie Apocalypse vs. International Health Regulations
42 min

Zombie Apocalypse vs. International Health Regulations

Introducing a very important piece of international law and…

Technopolice: calling out so-called "Safe Cities"
39 min

Technopolice: calling out so-called "Safe Cities"

Decentralising the fight against automated surveillance in…