System
Light
Dark
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for 35c3
webm
SD quality
srt
mp4
SD quality
opus
mp3
pdf
vtt
News
RSS, last 100
Podcast feed of the last two years
SD quality
Podcast audio feed of the last year
Podcast archive feed, everything older than two years
SD quality
Podcast feeds for 35c3
webm
SD quality
srt
mp4
SD quality
opus
mp3
pdf
vtt
browse
congress
2018
playlist
Playlist "35C3: Refreshing Memories"
Video Player
▶
Closing Event
Court in the Akten
Kickstart the Chaos: Hacker...
Open Source Orgelbau
How Facebook tracks you on ...
Dissecting Broadcom Bluetooth
All Creatures Welcome
Never Forgetti
Let's reverse engineer the ...
Cat & Mouse: Evading the Ce...
Augmented Reality: Bridging...
In Soviet Russia Smart Card...
Kernel Tracing With eBPF
Netzpolitischer Wetterberic...
Microtargeting und Manipula...
Are machines feminine?
Tactical Embodiment
Hacking how we see
Radical Digital Painting
A Blockchain Picture Book
What the flag is CTF?
Chaos Communication Slam
Hebocon
Österreich: Überwachungssta...
Repair-Cafés
#afdwegbassen: Protest, (Cl...
Simulating Universes
Desinformation und Fake News
Circumventing video identif...
Internet of Dongs
Analyze the Facebook algori...
Electronic Evicence in Crim...
Domain Name System
The foodsaving grassroots m...
Funkzellenabfrage: Die allt...
Hacking the Human Microbiome
Du kannst alles hacken – du...
No evidence of communicatio...
Media Disruption Led By The...
A WebPage in Three Acts
Butterbrotdosen-Smartphone
Modeling and Simulation of ...
The Mars Rover On-board Com...
Attacking Chrome IPC
Memsad
SuperMUC-NG
The Critical Making Movement
Freedom needs fighters!
Not quite Free and Open Source
Web-based Cryptojacking in ...
Die Häuser denen, die darin...
Truly cardless: Jackpotting...
Enclosure-PUF
Mehr schlecht als Recht: Gr...
Safe and Secure Drivers in ...
Russia vs. Telegram: techni...
Matrix, the current status ...
Kosmische Teilchenbeschleun...
Planes and Ships and Saving...
Viva la Vita Vida
Self-encrypting deception
Archäologische Studien im D...
Best of Informationsfreiheit
Transhuman Expression
Die verborgene Seite des Mo...
MicroPython – Python for Mi...
Internet, the Business Side
Provable Security
Die dreckige Empirie
From Zero to Zero Day
What is Good Technology?
Die EU und ihre Institutionen
A deep dive into the world ...
The year in post-quantum cr...
The Layman's Guide to Zero-...
C2X: The television will no...
The Ghost in the Machine
DISNOVATION.ORG
Wallet Security
Jailbreaking iOS
The Surveillance State limi...
Snakes and Rabbits - How CC...
Schweiz: Netzpolitik zwisch...
Attacking end-to-end email ...
A Christmas Carol - The Spe...
Smart Home - Smart Hack
How medicine discovered sex
Jahresrückblick des CCC 2018
Theater und Quantenzeitalter
Feminist Perspectives
Computer, die über Asyl (mi...
Was schützt eigentlich der ...
The good, the strange and t...
Projekt Hannah
Verhalten bei Hausdurchsuch...
Wind: Off-Grid Services for...
How to teach programming to...
Explaining Online US Politi...
The Urban Organism
Reality Check! Basel/Lagos?...
SymbiFlow - Finally the GCC...
The nextpnr FOSS FPGA place...
Modern Windows Userspace Ex...
Inside the Fake Science Fac...
Exploring fraud in telephon...
A farewell to soul-crushing...
SD-WAN a New Hop
Freude ist nur ein Mangel a...
"The" Social Credit System
A la recherche de l'informa...
Hacking Ecology
It Always Feels Like the Fi...
Venenerkennung hacken
Inside the AMD Microcode ROM
Polizeigesetze
Modchips of the State
Open Source Firmware
Quantum Mechanics
Genom-Editierung mit CRISPR...
G10, BND-Gesetz und der eff...
Chaos im Fernsehrat
A Routing Interregnum: Inte...
What The Fax?!
"Das ist mir nicht erinnerl...
wallet.fail
Transmission Control Protocol
Citzens or subjects? The ba...
Hackerethik - eine Einführung
Afroroutes: Africa Elsewhere
Space Ops 101
Digital Airwaves
Compromising online account...
How does the Internet work?
Introduction to Deep Learning
Stalking, Spy Apps, Doxing:...
Information Biology - Inves...
Hunting the Sigfox: Wireles...
Scuttlebutt
Censored Planet: a Global C...
Taming the Chaos: Can we bu...
(Cyber-)Stalking: Wenn Gren...
Updates von der europäische...
Datenschutz für Neulandbürger
SiliVaccine: North Korea's ...
Frontex: Der europäische Gr...
First Sednit UEFI Rootkit U...
Election Cybersecurity Prog...
LibreSilicon
Going Deep Underground to W...
Mind the Trap: Die Netzpoli...
Artistic PCB Design and Fab...
The Rocky Road to TLS 1.3 a...
Locked up science
The Precariat: A Disruptive...
Opening Event
15
30
00:00
00:00
|
00:00
Use Up/Down Arrow keys to increase or decrease volume.
1.00x
2.00x
1.50x
1.25x
1.00x
0.75x
Closing Event
rufus
and
rixx
Hier hört es auf.