Vídeos de la 30c3
Durante el pasado fin de semana (viernes a lunes) se celebró en Alemania, Hamburgo la ya veterana CCC, Chaos Communication Congress, que celebraba su 30 edición. Como viene ocurriendo desde hace unos años, todas las charlas se emitían en vivo a través de internet e incluso podías seguirla por teléfono.
Si te perdiste alguna de las charlas o simplemente quieres volver a ver alguna de las que seguiste, ya puedes descargarte los vídeos. Además del sitio oficial, tienes otras alternativas como:
- http://cdn.media.ccc.de/congress/2013 (multiple hosts, CDN)
- ftp://mirror.fem-net.de/CCC/30C3/
- http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, SpeedPartner GmbH)
- http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
- http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
- http://ftp.snt.utwente.nl/pub/misc/30c3/ (10Gbit/s, IPv4/IPv6, http/ftp/rsync)
Aquí os dejo un listado con los enlaces al FTP oficial de todas las charlas publicadas:
- 30c3_Keynote_h264-hd.mp4
- Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4
- FPGA_101_h264-hq.mp4
- Programming_FPGAs_with_PSHDL_h264-hq.mp4
- Android_DDI_h264-hq.mp4
- en-Bullshit_made_in_Germany_h264-hq.mp4
- The_GNU_Name_System_h264-hq.mp4
- The_Gospel_of_IRMA__h264-hq.mp4
- WarGames_in_memory_h264-hq.mp4
- Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4
- de-Through_a_PRISM_Darkly_h264-hq.mp4
- The_philosophy_of_hacking_h264-hq.mp4
- en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4
- Coding_your_body_h264-hq.mp4
- Console_Hacking_2013_h264-hq.mp4
- en-Dead_Man_Edition_h264-hq.mp4
- de-Dead_Man_Edition_h264-hq.mp4
- de-Rock_em_Graphic_Cards_h264-hq.mp4
- Breaking_Baryons_h264-hq.mp4
- Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4
- lasers_in_space_h264-hq.mp4
- Technomonopolies_h264-hq.mp4
- Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4
- RFID_Treehouse_of_Horror_h264-hq.mp4
- en-Kryptographie_nach_Snowden_h264-hq.mp4
- en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4
- Firmware_Fat_Camp_h264-hq.mp4
- Script_Your_Car__h264-hq.mp4
- Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4
- en-UEberwachen_und_Sprache_h264-hq.mp4
- Toward_a_Cognitive_Quantified_Self__h264-hq.mp4
- de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4
- Towards_an_affordable_brain-computer-interface_h264-hq.mp4
- HbbTV_Security_h264-hq.mp4
- Data_Mining_for_Good_h264-hq.mp4
- Drones_h264-hq.mp4
- Bug_class_genocide_h264-hq.mp4
- en-Der_tiefe_Staat_h264-hq.mp4
- de-Desperately_Seeking_Susy_h264-hq.mp4
- Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4
- en-calcpw_h264-hq.mp4
- THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4
- The_Tor_Network_h264-hq.mp4
- Hacking_as_Artistic_Practice_h264-hq.mp4
- en-Das_FlipDot-Projekt_h264-hq.mp4
- en-Recht_auf_Remix_h264-hq.mp4
- Plants_Machines_h264-hq.mp4
- de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4
- Introduction_to_Processor_Design_h264-hq.mp4
- Attacking_HomeMatic_h264-hq.mp4
- Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4
- The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4
- Policing_the_Romantic_Crowd_h264-hq.mp4
- Mobile_network_attack_evolution_h264-hq.mp4
- Against_Metadata_h264-hq.mp4
- Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4
- en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4
- We_only_have_one_earth_h264-hq.mp4
- en-2_Takte_spaeter_h264-hq.mp4
- World_War_II_Hackers_h264-hq.mp4
- _SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4
- Electronic_Bank_Robberies_h264-hq.mp4
- de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4
- Building_a_safe_NFC_ticketing_system_h264-hq.mp4
- Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4
- de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4
- Nerds_in_the_news_h264-hq.mp4
- Concepts_for_global_TSCM_h264-hq.mp4
- 10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4
- X_Security_h264-hq.mp4
- Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4
- en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4
- en-IFGINT_h264-hq.mp4
- How_to_Build_a_Mind_h264-hq.mp4
- Basics_of_Digital_Wireless_Communication_h264-hq.mp4
- Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4
- Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4
- Long_Distance_Quantum_Communication_h264-hq.mp4
- Human_Rights_and_Technology_h264-hq.mp4
- Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4
- de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4
- en-Sim_Gishel_h264-hq.mp4
- Trezor_Bitcoin_hardware_wallet_h264-hq.mp4
- Turing_Complete_User_h264-hq.mp4
- Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4
- India_s_Surveillance_State_h264-hq.mp4
- Magic_Lantern_h264-hq.mp4
- de-Lightning_Talks_Day_2_h264-hq.mp4
- de-Lightning_Talks_Day_3_h264-hq.mp4
- de-Lightning_Talks_Day_4_h264-hq.mp4
- Open_source_experimental_incubator_build_up_h264-hq.mp4
- Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4
- SCADA_StrangeLove_2_h264-hq.mp4
- Making_machines_that_make_h264-hq.mp4
- de-My_journey_into_FM-RDS_h264-hq.mp4
- White-Box_Cryptography_h264-hq.mp4
- Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4
- Structuring_open_hardware_projects_h264-hq.mp4
- The_ArduGuitar_h264-hq.mp4
- de-EUDataP_State_of_the_Union_h264-hq.mp4
- Opening_Event_h264-hq.mp4
- The_Pirate_Cinema_h264-hq.mp4
- en-Jahresrueckblick_des_CCC_h264-hq.mp4
- Infrastructure_Review_h264-hq.mp4
- Seidenstrasse_h264-hq.mp4
- Hello_World__h264-hq.mp4
- Forbidden_Fruit_h264-hq.mp4
- Perfect_Paul_h264-hq.mp4
- en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4
- de-30c3_Keynote_h264-hq.mp4
- en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4
- de-To_Protect_And_Infect_Part_2_h264-hq.mp4
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec