Vídeos de la 31C3
Si os habéis perdido alguna de las charlas de la pasada 31C3, aquí tenéis la lista de las mismas:
- ECCHacks
- Beyond PNR: Exploring airline systems
- Correcting copywrongs
- 31C3 Keynote
- Krypto für die Zukunft
- Thunderstrike: EFI bootkits for Apple MacBooks
- Telescope Making
- Jugend hackt
- 3D Casting Aluminum
- Cyber Necromancy
- Why is GPG "damn near unusable"?
- Attribution revolution
- 31C3 Opening Event
- How I Learned to Stop Reinventing and Love the Wheels
- AMD x86 SMU firmware analysis
- »Hard Drive Punch«
- Why are computers so @#!*, and what can we do about it?
- Global Civil Society Under Attack
- Lightning Talks Day 3
- SS7: Locate. Track. Manipulate.
- Let's Encrypt
- The Magical Secrecy Tour
- Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC
- Let’s build our own personalized open textile production line
- ES GIBT VIEL ZU TUN - HAU'N WIR AB.
- Mining for Bugs with Graph Database Queries
- Tor: Hidden Services and Deanonymisation
- Practical EMV PIN interception and fraud detection
- Personal Tracking Devices and Online Identity
- Safer playing with lasers
- SCADA StrangeLove: Too Smart Grid in da Cloud
- Inside Field Station Berlin Teufelsberg
- Diamonds are a quantum computer’s best friend
- Fnord News Show
- The Perl Jam: Exploiting a 20 Year-old Vulnerability
- Trustworthy secure modular operating system engineering
- Too Many Cooks - Exploiting the Internet-of-TR-069-Things
- Internet of toilets
- Tell no-one
- Mein Bot, der Kombattant
- Now I sprinkle thee with crypto dust
- The Only Thing We Know About Cyberspace Is That Its 640x480
- Living Drones
- Eye Wear Computing
- Security Analysis of Estonia's Internet Voting System
- From Computation to Consciousness
- Das Transparenzportal Hamburg
- 10 Jahre OpenStreetMap
- Damn Vulnerable Chemical Process
- Information Control and Strategic Violence
- Axoloti
- (In)Security of Mobile Banking
- Forging the USB armory
- Mr Beam goes Kickstarter
- Security Analysis of a Full-Body X-Ray Scanner
- What Ever Happened to Nuclear Weapons?
- Iridium Pager Hacking
- „Wir beteiligen uns aktiv an den Diskussionen“
- The Cloud Conspiracy 2008-2014
- Trackography
- DP5: PIR for Privacy-preserving Presence
- Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
- CAESAR and NORX
- Paypals War on Terror
- Snowden Effect vs. Privacy Paradox
- Reproducible Builds
- The Machine To Be Another
- Towards General Purpose Reconfigurable Computing on Novena
- Jahresrückblick des CCC
- NSA Points of Presence in AT
- Source Code and Cross-Domain Authorship Attribution
- Virtual Machine Introspection
- Security Nightmares
- SS7map : mapping vulnerability of the international mobile roaming infrastructure
- Serenität – Anleitung zum Glücklichsein
- Ich sehe, also bin ich ... Du
- Space Hacker
- Higher-Dimensional Geometry and Fractals
- Mit Kunst die Gesellschaft hacken
- The case of Chelsea Manning
- Why do we need an open food information platform
- Traue keinem Scan, den du nicht selbst gefälscht hast
- Lightning Talks Day 4
- Automatically Subtitling the C3
- GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
- Programming with dependent types in Idris
- Privacy and Consumer Markets
- Agri-tech and the Arts: From Barns to D-Space
- Revisiting SSL/TLS Implementations
- Let's build a quantum computer!
- Reconstructing narratives
- Doing right by sources, done right
- 31C3 Infrastructure Review
- Vor Windows 8 wird gewarnt
- Glitching For n00bs
- Uncaging Microchips
- Low Cost High Speed Photography
- Funky File Formats
- Hacking Ethics in Education
- net neutrality: days of future past?
- "Exploit" in theater
- Freedom in your computer and in the net
- 31C3 Closing Event
- Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States
- Crypto Tales from the Trenches
- Lightning Talks Day 2
- Computer Science in the DPRK
- Switches Get Stitches
- Rocket science – how hard can it be?
- MegaCode to facility gates
- From Maxwell to antenna arrays
- Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer
- Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
- State of the Onion
- The eXperimental Robot Project
- The rise and fall of Internet voting in Norway
- Code Pointer Integrity
- EMET 5.1 - Armor or Curtain?
- IFG – Mit freundlichen Grüßen
- Superheroes Still Need Phoneboxes
- The Invisible Committee Returns with "Fuck Off Google"
- osmo-gmr: What's up with sat-phones ?
- The Matter of Heartbleed
- Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
- Mobile self-defense
- The automobile as massive data gathering source and the consequences for individual privacy
- Die Krise der Bilder ist die Krise der Politik
- Preserving arcade games
- UNHash - Methods for better password cracking
- The Maker movement meets patent law
- Long war tactics
- Infocalypse now: P0wning stuff is not enough
- The Time is Right
- Finding the Weak Crypto Needle in a Byte Haystack
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec