System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for 32c3
webm
SD quality
opus
mp3
mp4
SD quality
srt
vtt
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for 32c3
webm
SD quality
opus
mp3
mp4
SD quality
srt
vtt
browse
congress
2015
playlist
Playlist "32C3: gated communities"
Video Player
▶
Hacker Jeopardy
Free Software and Hardware ...
Crypto ist Abwehr, IFG ist ...
Grundrechte gelten nicht im...
#GOIBlocks - Technical obse...
Methodisch inkorrekt!
libusb: Maintainer fail
Stromtankstellen – eine neu...
Running your own 3G/3.5G ne...
Maritime Robotics
Technology and Mass Atrocit...
Craft, leisure, and end-use...
On Computing Numbers, with ...
Österreich: Der Kampf gegen...
Building and Breaking Wirel...
QRtistry
Internet Cube
the possibility of an army
20 OSCILLATORS IN 20 MINUTES
Intelexit
Media Coverage and the Publ...
The plain simple reality of...
Trust us and our business w...
Reversing UEFI by execution
The architecture of a stree...
3D printing on the moon
Ten years after ‚We Lost Th...
Prediction and Control
Vehicle2Vehicle Communicati...
Unpatchable
A Dozen Years of Shellphish
The Price Of Dissent
De-anonymizing Programmers
Safe Harbor
Lightning Talks Day 3
Check your privileges!
Say hi to your new boss: Ho...
Gibberish Detection 102
"Fluxus cannot save the wor...
State of the Onion
Neither Snow Nor Rain Nor M...
Computational Meta-Psychology
Tor onion services: more us...
How hackers grind an MMORPG...
Graphs, Drones & Phones
„Nach bestem Wissen und Gew...
(In)Security of Embedded De...
re_cycle
Beyond Anti Evil Maid
goto fail;
Fnord-Jahresrückblick
Wie Jugendschutzprogramme n...
Lessons learned: Freifunk f...
Lightning Talks Day 2
(Un)Sicherheit von App-basi...
Sanitizing PCAPs
Iridium Update
Quantenphysik und Kosmologie
Hardsploit: A Metasploit-li...
Quantum Cryptography
The Perl Jam 2
Das Zahnrad aus Fleisch
Dissecting VoLTE
Logjam: Diffie-Hellman, dis...
Rowhammer.js: Root privileg...
Verified Firewall Ruleset V...
One year of securitarian dr...
All Our Shared Spectrum Are...
apertus° AXIOM
Plunge into Proxy Politics
Evolution of Brain-Computer...
Cyber all the Wassenaars
Jugend hackt 2015
Ling - High level system pr...
Ecuador: how an authoritari...
Let's Encrypt -- What launc...
G’scheitern
Mobile Censorship in Iran
Vector retrogaming
Ein Abgrund von Landesverrat
Profiling (In)justice
Sicherheit von 125kHz Trans...
Software and business metho...
CloudABI
Net Neutrality in Europe
Shooting lasers into space ...
Household, Totalitarianism ...
New memory corruption attac...
Console Hacking
APT Reports and OPSEC Evolu...
Shopshifting
PQCHacks
My Robot Will Crush You Wit...
When hardware must „just work“
Public Library/Memory of th...
Datahavens from HavenCo to ...
So you want to build a sate...
Thunderstrike 2
What does Big Brother see, ...
Beyond your cable modem
How the Great Firewall disc...
The Great Train Cyber Robbery
The Ultimate Amiga 500 Talk
Windows drivers attack surface
Netzpolitik in der Schweiz
Lifting the Fog on Red Star OS
Key-logger, Video, Mouse
A Free and Open Source Veri...
Hardware-Trojaner in Securi...
Internet Landscapes
PLC-Blaster
The exhaust emissions scand...
rad1o++
Avoiding kernel panic: Euro...
Towards (reasonably) trustw...
REXUS/BEXUS - Rocket and Ba...
NSA-Untersuchungsausschuss:...
Hacking EU funding for a de...
32C3 Keynote
32C3 Opening Event
15
30
00:00
00:00
|
00:00
Use Up/Down Arrow keys to increase or decrease volume.
1.00x
2.00x
1.50x
1.25x
1.00x
0.75x
Hacker Jeopardy
Sec
and
ray
The Hacker Jeopardy is a quiz show.