Vídeos de Chaos Computer Club edición 32

Como cada año, del 27 al 30 de diciembre (establecido desde el año 2005) se celebra en Alemania una de las mejores conferencias sobre seguridad/hacking del mundo.
Este año el Chaos Computer Club celebra su 32 edición “Gated Communities”. Cómo siempre el panel de charlas es bastante amplio e impresionante.
Aunque aún no están todos los vídeos disponibles, ya podemos ir disfrutando de los que se han publicado:
- Plunge into Proxy Politics
- "Fluxus cannot save the world."
- #GOIBlocks - Technical observations about recent internet censorship in India
- (In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
- (Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
- 20 OSCILLATORS IN 20 MINUTES
- 3D printing on the moon
- A Dozen Years of Shellphish
- A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
- A New Kid on the Block
- APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
- All Our Shared Spectrum Are Belong to Us
- Avoiding kernel panic: Europe’s biggest fails in digital policy-making
- Beyond Anti Evil Maid
- Beyond your cable modem
- Breaking Honeypots for Fun and Profit
- Building and Breaking Wireless Security
- CHINTERNET ART
- Check your privileges!
- CloudABI
- Collect It All: Open Source Intelligence (OSINT) for Everyone
- Compileroptimierungen für Forth im Microcontroller
- Computational Meta-Psychology
- Console Hacking
- Craft, leisure, and end-user innovation
- Crypto Wars Part II
- Crypto ist Abwehr, IFG ist Angriff!
- Cyber all the Wassenaars
- Das Zahnrad aus Fleisch
- Datahavens from HavenCo to Today
- De-anonymizing Programmers
- Dissecting VoLTE
- Ecuador: how an authoritarian government is fooling the entire world
- Ein Abgrund von Landesverrat
- Evolution of Brain-Computer Interfaces
- Fnord-Jahresrückblick
- Free Software and Hardware bring National Sovereignty
- Gibberish Detection 102
- Graphs, Drones & Phones
- Grundrechte gelten nicht im Weltall!
- G’scheitern
- Hacker Jeopardy
- Hacking EU funding for a decentralizing FOSS project
- Hardsploit: A Metasploit-like tool for hardware hacking
- Hardware-Trojaner in Security-Chips
- Household, Totalitarianism and Cyberspace
- How hackers grind an MMORPG: by taking it apart!
- How the Great Firewall discovers hidden circumvention servers
- Intelexit
- Internet Cube
- Internet Landscapes
- Iridium Update
- Jahresrückblick des CCC
- Jugend hackt 2015
- Katastrophe und Kommunikation
- Key-logger, Video, Mouse
- Keynote
- Lessons learned: Freifunk für Geflüchtete
- Let's Encrypt -- What launching a free CA looks like
- Lifting the Fog on Red Star OS
- Lightning Talks Day 2
- Lightning Talks Day 3
- Ling - High level system programming
- Logjam: Diffie-Hellman, discrete logs, the NSA, and you
- Maker Spaces in Favelas - Lecture
- Maritime Robotics
- Media Coverage and the Public in the Surveillance Society
- Methodisch inkorrekt!
- Microsofts Windows 10 Botnet
- Mobile Censorship in Iran
- My Robot Will Crush You With Its Soft Delicate Hands!
- NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
- Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
- Net Neutrality in Europe
- Netzpolitik in der Schweiz
- New memory corruption attacks: why can't we have nice things?
- On Computing Numbers, with an Application to Problems of our Society
- One year of securitarian drift in France
- Opening Event
- PLC-Blaster
- PQCHacks
- Predicting Crime in a Big Data World
- Prediction and Control
- Profiling (In)justice
- Public Library/Memory of the World
- QRtistry
- Quantenphysik und Kosmologie
- Quantum Cryptography
- REXUS/BEXUS - Rocket and Balloon Experiments for University Students
- Replication Prohibited
- Reversing UEFI by execution
- Rowhammer.js: Root privileges for web apps?
- Running your own 3G/3.5G network
- Safe Harbor
- Sanitizing PCAPs
- Say hi to your new boss: How algorithms might soon control our lives.
- Security Nightmares 0x10
- Shooting lasers into space – for science!
- Shopshifting
- Sicherheit von 125kHz Transpondern am Beispiel Hitag S
- Sin in the time of Technology
- So you want to build a satellite?
- Software and business method patents: call for action
- State of the Onion
- Stromtankstellen – eine neue öffentliche Infrastruktur
- Technology and Mass Atrocity Prevention
- Ten years after ‚We Lost The War‘
- The Great Train Cyber Robbery
- The Magic World of Searchable Symmetric Encryption
- The Perl Jam 2
- The Price Of Dissent
- The Ultimate Amiga 500 Talk
- The architecture of a street level panopticon
- The exhaust emissions scandal („Dieselgate“)
- The mummy unwrapped
- The plain simple reality of entropy
- The state of Internet Censorship
- Thunderstrike 2
- Top X* usability obstacles
- Tor onion services: more useful than you think
- Towards (reasonably) trustworthy x86 laptops
- Trust us and our business will expand!
- Unpatchable
- Vector retrogaming
- Vehicle2Vehicle Communication based on IEEE 802.11p
- Verified Firewall Ruleset Verification
- What does Big Brother see, while he is watching?
- What is the value of anonymous communication?
- When algorithms fail in our personal lives
- When hardware must „just work“
- Wie Jugendschutzprogramme nicht nur die Jugend schädigen
- Wie man einen Blackout verursacht
- Windows drivers attack surface
- Wireless Drivers: Freedom considered harmful?
- apertus° AXIOM
- goto fail;
- libusb: Maintainer fail
- rad1o++
- re_cycle
- the possibility of an army
- Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
- “I feel like a criminal and I have to be god at the same time”
- „Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec