| VID |
Title |
H.264 |
MP3 |
OGG |
| 3952 |
Running your own GSM stack on a phone |
mp4 |
mp3 |
ogg |
| 3957 |
Recent advances in IPv6 insecurities |
mp4 |
mp3 |
ogg |
| 3983 |
Hackers and Computer Science |
mp4 |
mp3 |
ogg |
| 4003 |
Cybernetics for the Masses |
mp4 |
mp3 |
ogg |
| 4006 |
DIY synthesizers and sound generators |
mp4 |
- |
- |
| 4011 |
JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques |
mp4 |
- |
- |
| 4017 |
Desktop on the Linux... (and BSD, of course) |
mp4 |
- |
- |
| 4018 |
FrozenCache |
mp4 |
- |
- |
| 4036 |
Reverse Engineering a real-world RFID payment system |
mp4 |
- |
- |
| 4046 |
AllColoursAreBeautiful |
mp4 |
mp3 |
ogg |
| 4055 |
Terrorists Win - Exploiting Telecommunications Data Retention? |
mp4 |
- |
- |
| 4057 |
Adventures in Mapping Afghanistan Elections |
mp4 |
- |
- |
| 4060 |
SMS-o-Death |
mp4 |
- |
- |
| 4061 |
Building Custom Disassemblers |
mp4 |
mp3 |
ogg |
| 4067 |
Data Analysis in Terabit Ethernet Traffic |
mp4 |
mp3 |
ogg |
| 4070 |
Fnord-Jahresrückblick 2010 |
mp4 |
mp3 |
ogg |
| 4073 |
Logikschaltungen ohne Elektronik |
mp4 |
mp3 |
ogg |
| 4081 |
Netzmedienrecht, Lobbyismus und Korruption |
mp4 |
- |
- |
| 4082 |
Rootkits and Trojans on Your SAP Landscape |
mp4 |
- |
- |
| 4084 |
Ignorance and Peace Narratives in Cyberspace |
mp4 |
- |
- |
| 4085 |
Digitale Spaltung per Gesetz |
mp4 |
mp3 |
ogg |
| 4087 |
Console Hacking 2010 |
mp4 |
- |
- |
| 4089 |
Ich sehe nicht, dass wir nicht zustimmen werden |
mp4 |
mp3 |
ogg |
| 4090 |
The Baseband Apocalypse |
mp4 |
- |
- |
| 4094 |
Netzneutralität und QoS - ein Widerspruch? |
mp4 |
mp3 |
ogg |
| 4096 |
Code deobfuscation by optimization |
mp4 |
- |
- |
| 4097 |
Techniken zur Identifizierung von Netzwerk-Protokollen |
mp4 |
- |
- |
| 4098 |
Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth |
mp4 |
mp3 |
ogg |
| 4099 |
File -> Print -> Electronics |
mp4 |
- |
- |
| 4103 |
Copyright Enforcement Vs. Freedoms |
mp4 |
mp3 |
ogg |
| 4111 |
Eins, zwei, drei - alle sind dabei |
mp4 |
- |
- |
| 4114 |
Analyzing a modern cryptographic RFID system |
mp4 |
mp3 |
ogg |
| 4121 |
Is the SSLiverse a safe place? |
mp4 |
- |
- |
| 4123 |
Defense is not dead |
mp4 |
- |
- |
| 4124 |
Three jobs that journalists will do in 2050 |
mp4 |
mp3 |
ogg |
| 4125 |
Spinning the electronic Wheel |
mp4 |
- |
- |
| 4138 |
Secure communications below the hearing threshold |
mp4 |
- |
- |
| 4140 |
Contemporary Profiling of Web Users |
mp4 |
mp3 |
ogg |
| 4141 |
Hacker Jeopardy |
mp4 |
- |
- |
| 4142 |
Node.js as a networking tool |
mp4 |
mp3 |
ogg |
| 4143 |
Part-Time Scientists |
mp4 |
- |
- |
| 4144 |
A short political history of acoustics |
mp4 |
- |
- |
| 4145 |
"Spoilers, Reverse Green, DECEL!" or "What's it doing now?" |
mp4 |
mp3 |
ogg |
| 4149 |
I Control Your Code |
mp4 |
- |
- |
| 4151 |
Android geolocation using GSM network |
mp4 |
- |
- |
| 4159 |
Reverse Engineering the MOS 6502 CPU |
mp4 |
- |
- |
| 4160 |
Automatic Identification of Cryptographic Primitives in Software |
mp4 |
mp3 |
ogg |
| 4164 |
Friede sei mit Euren Daten |
mp4 |
mp3 |
ogg |
| 4168 |
A framework for automated architecture-independent gadget search |
mp4 |
mp3 |
ogg |
| 4174 |
The Hidden Nemesis |
mp4 |
- |
- |
| 4175 |
From robot to robot |
mp4 |
mp3 |
ogg |
| 4176 |
Hacking iButtons |
mp4 |
mp3 |
ogg |
| 4181 |
SIP home gateways under fire |
mp4 |
- |
- |
| 4183 |
Safety on the Open Sea |
mp4 |
- |
- |
| 4184 |
Stanislaw Lem - Der enttäuschte Weltverbesserer |
mp4 |
mp3 |
ogg |
| 4185 |
Whistleblowing |
mp4 |
mp3 |
ogg |
| 4187 |
Your Infrastructure Will Kill You |
mp4 |
- |
- |
| 4190 |
Data Retention in the EU five years after the Directive |
mp4 |
mp3 |
ogg |
| 4193 |
Having fun with RTP |
mp4 |
mp3 |
ogg |
| 4195 |
Literarischer Abend |
mp4 |
- |
- |
| 4201 |
"The Concert" |
mp4 |
mp3 |
ogg |
| 4203 |
Distributed FPGA Number Crunching For The Masses |
mp4 |
- |
- |
| 4206 |
IMMI, from concept to reality |
mp4 |
- |
- |
| 4208 |
Wideband GSM Sniffing |
mp4 |
- |
- |
| 4209 |
Zero-sized heap allocations vulnerability analysis |
mp4 |
mp3 |
ogg |
| 4210 |
Lying To The Neighbours |
mp4 |
mp3 |
ogg |
| 4211 |
Chip and PIN is Broken |
mp4 |
mp3 |
ogg |
| 4221 |
OMG WTF PDF |
mp4 |
mp3 |
ogg |
| 4230 |
Security Nightmares |
mp4 |
mp3 |
ogg |
| 4231 |
Data Recovery Techniques |
mp4 |
mp3 |
ogg |
| 4234 |
USB and libusb |
mp4 |
mp3 |
ogg |
| 4236 |
International Cyber Jurisdiction |
mp4 |
mp3 |
ogg |
| 4237 |
INDECT - an EU-Surveillance Project |
mp4 |
mp3 |
ogg |
| 4239 |
Lightning Talks - Day 3 |
mp4 |
mp3 |
ogg |
| 4244 |
A Critical Overview of 10 years of Privacy Enhancing Technologies |
mp4 |
mp3 |
ogg |
| 4245 |
Adventures in analyzing Stuxnet |
mp4 |
mp3 |
ogg |
| 4252 |
Von Zensursula über Censilia hin zum Kindernet |
mp4 |
mp3 |
ogg |
| 4253 |
Pentanews Game Show |
mp4 |
mp3 |
ogg |
| 4261 |
News Key Recovery Attacks on RC4/WEP |
mp4 |
mp3 |
ogg |
| 4263 |
The importance of resisting Excessive Government Surveillance |
mp4 |
mp3 |
ogg |
| 4265 |
hacking smart phones |
mp4 |
mp3 |
ogg |
| 4276 |
Cognitive Psychology for Hackers |
mp4 |
mp3 |
ogg |
| 4295 |
High-speed high-security cryptography: encrypting and authenticating the whole Internet |
mp4 |
mp3 |
ogg |
| 4296 |
Lightning Talks - Day 2 |
mp4 |
mp3 |
ogg |
| 4297 |
"Die gesamte Technik ist sicher" |
mp4 |
mp3 |
ogg |
| 4298 |
CCC-Jahresrückblick 2010 |
mp4 |
mp3 |
ogg |
| 4299 |
Abschlussveranstaltung |
mp4 |
mp3 |
ogg |
| 4300 |
Lightning Talks - Day 4 |
mp4 |
mp3 |
ogg |
| 4301 |
How the Internet sees you |
mp4 |
mp3 |
ogg |
| 4302 |
27C3 Keynote |
mp4 |
mp3 |
ogg |
| 4326 |
Radio der Zukunft |
mp4 |
mp3 |
ogg |
| 4333 |
Hacker Jeopardy (english translation) |
mp4 |
mp3 |
ogg |
| 4334 |
Fnord-Jahresrückblick 2010 (english translation) |
mp4 |
mp3 |
ogg |
| 4338 |
Wikileaks und mehr |
mp4 |
mp3 |
ogg |
| 4339 |
OpenLeaks |
mp4 |
mp3 |
ogg |