Vídeos del Chaos Communication Congress (33c3)
Aunque el congreso sobre hacking/seguridad, Chaos Communication Congress todavía no ha terminado, los vídeos de las charlas que ya se han dado están disponibles. En los momentos de escribir estas líneas, estos son los vídeos disponibles:
- 33C3 Closing Ceremony
- Security Nightmares 0x11
- Surveilling the surveillers
- 33C3 Infrastructure Review
- Virtual Secure Boot
- The Ultimate Game Boy Talk
- Privatisierung der Rechtsdurchsetzung
- Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
- Understanding the Snooper’s Charter
- Rebel Cities
- The Transhumanist Paradox
- Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
- Genetic Codes and what they tell us – and everyone else
- Retail Surveillance / Retail Countersurveillance
- Lightning Talks Day 4
- The High Priests of the Digital Age
- Beyond Virtual and Augmented Reality
- Community
- The Economic Consequences of Internet Censorship
- Methodisch inkorrekt!
- Ethics in the data society
- Hebocon
- The Zcash anonymous cryptocurrency
- The Universe Is, Like, Seriously Huge
- Edible Soft Robotics
- Eavesdropping on the Dark Cosmos
- PUFs, protection, privacy, PRNGs
- The 12 Networking Truths
- What We Can Learn about Creativity from 3D Printing
- Hacking collective as a laboratory
- Lasers in the sky (with asteroids)
- Irren ist staatlich
- Interplanetary Colonization
- From Server Farm to Data Table
- Saving the World with (Vegan) Science
- The Moon and European Space Exploration
- Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
- Berechnete Welt
- The woman behind your WiFi
- An Elevator to the Moon (and back)
- Hochsicherheits-Generalschlüssel Marke Eigenbau
- Decoding the LoRa PHY
- No Love for the US Gov.
- Technologien für und wider Digitale Souveränität
- Talking Behind Your Back
- Dissecting HDMI
- A New Dark Age
- Making Technology Inclusive Through Papercraft and Sound
- Building Custom Pinball Machines
- Machine Dreams
- Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by…
- Dissecting modern (3G/4G) cellular modems
- Liberté, Égalité, Fraternité... and privacy ?!
- On Smart Cities, Smart Energy, And Dumb Security
- Memory Deduplication: The Curse that Keeps on Giving
- Lightning Talks Day 3
- Corporate surveillance, digital tracking, big data & privacy
- Million Dollar Dissidents and the Rest of Us
- radare demystified
- How do we know our PRNGs work properly?
- Fnord-Jahresrückblick
- Eine kleine Geschichte der Parlamentsschlägerei
- Code BROWN in the Air
- ATMs how to break them to stop the fraud
- Durchmarsch von Rechts
- Shining some light on the Amazon Dash button
- SpinalHDL : An alternative hardware description language
- SpiegelMining – Reverse Engineering von Spiegel-Online
- Intercoms Hacking
- Build your own NSA
- Downgrading iOS: From past to present
- The Untold Story of Edward Snowden’s Escape from Hong Kong
- Stopping law enforcement hacking
- On the Security and Privacy of Modern Single Sign-On in the Web
- A world without blockchain
- Formal Verification of Verilog HDL with Yosys-SMTBMC
- Searchwing - Mit Drohnen leben retten
- Einführung zu Blockchains
- 3 Years After Snowden: Is Germany fighting State Surveillance?
- Die Sprache der Populisten
- Hacking Reality
- Copywrongs 2.0
- No USB? No problem.
- Haft für Whistleblower?
- Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern
- Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
- In Search of Evidence-Based IT-Security
- Gone in 60 Milliseconds
- Wheel of Fortune
- Tapping into the core
- Welcome to the Anthropocene?
- Hacking the World
- Lightning Talks Day 2
- The Clash of Digitalizations
- Syrian Archive
- How physicists analyze massive data: LHC + brain + ROOT = Higgs
- Es sind die kleinen Dinge im Leben
- Der 33 Jahrerückblick
- A look into the Mobile Messaging Black Box
- International exchange of tax information
- Nicht öffentlich.
- Woolim – Lifting the Fog on DPRK’s Latest Tablet PC
- Console Hacking 2016
- You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
- Visiting The Bear Den
- Netzpolitik in Österreich
- Lockpicking in the IoT
- Deploying TLS 1.3: the great, the good and the bad
- Where in the World Is Carmen Sandiego?
- Netzpolitik in der Schweiz 2016
- Nintendo Hacking 2016
- Make Wi-Fi fast again
- Software Defined Emissions
- Dieselgate – A year later
- Keys of Fury
- Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
- What's It Doing Now?
- Make the Internet Neutral Again
- Untrusting the CPU
- A Data Point Walks Into a Bar
- Routerzwang und Funkabschottung
- Pegasus internals
- Geolocation methods in mobile networks
- A Story of Discrimination and Unfairness
- Anthropology for kids - What is privacy?
- Shut Up and Take My Money!
- Kampf dem Abmahnunwesen
- Space making/space shaping
- Check Your Police Record!
- Law Enforcement Are Hacking the Planet
- The Nibbletronic
- The DROWN Attack
- Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule
- Predicting and Abusing WPA2/802.11 Group Keys
- Bootstraping a slightly more secure laptop
- How Do I Crack Satellite and Cable Pay TV?
- Building a high throughput low-latency PCIe based SDR
- The Fight for Encryption in 2016
- Exploiting PHP7 unserialize
- Reverse engineering Outernet
- What could possibly go wrong with ?
- Everything you always wanted to know about Certificate Transparency
- The Global Assassination Grid
- 33C3 Opening Ceremony
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec