S32E01 |
Opening Event
|
December 27, 2015
|
60
|
|
S32E02 |
Keynote
|
December 27, 2015
|
60
|
|
S32E03 |
What is the value of anonymous communication?
|
December 27, 2015
|
60
|
|
S32E04 |
The mummy unwrapped
|
December 27, 2015
|
60
|
|
S32E05 |
Hacking EU funding for a decentralizing FOSS project
|
December 27, 2015
|
60
|
|
S32E06 |
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
|
December 27, 2015
|
60
|
|
S32E07 |
Towards (reasonably) trustworthy x86 laptops
|
December 27, 2015
|
60
|
|
S32E08 |
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
|
December 27, 2015
|
60
|
|
S32E09 |
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
|
December 27, 2015
|
60
|
|
S32E10 |
The exhaust emissions scandal („Dieselgate“)
|
December 27, 2015
|
60
|
|
S32E11 |
rad1o++
|
December 27, 2015
|
60
|
|
S32E12 |
Internet Landscapes
|
December 27, 2015
|
60
|
|
S32E13 |
PLC-Blaster
|
December 27, 2015
|
60
|
|
S32E14 |
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
|
December 27, 2015
|
60
|
|
S32E15 |
Hardware-Trojaner in Security-Chips
|
December 27, 2015
|
60
|
|
S32E16 |
Netzpolitik in der Schweiz 2015/16
|
December 27, 2015
|
60
|
|
S32E17 |
Lifting the Fog on Red Star OS
|
December 27, 2015
|
60
|
|
S32E18 |
How the Great Firewall discovers hidden circumvention servers
|
December 27, 2015
|
60
|
|
S32E19 |
Windows drivers attack surface
|
December 27, 2015
|
60
|
|
S32E20 |
Key-logger, Video, Mouse
|
December 27, 2015
|
60
|
|
S32E21 |
Public Library/Memory of the World
|
December 27, 2015
|
60
|
|
S32E22 |
The Great Train Cyber Robbery
|
December 27, 2015
|
60
|
|
S32E23 |
Beyond your cable modem
|
December 27, 2015
|
60
|
|
S32E24 |
What does Big Brother see, while he is watching?
|
December 27, 2015
|
60
|
|
S32E25 |
The Ultimate Amiga 500 Talk
|
December 27, 2015
|
60
|
|
S32E26 |
Thunderstrike 2
|
December 27, 2015
|
60
|
|
S32E27 |
Running your own 3G/3.5G network
|
December 27, 2015
|
60
|
|
S32E28 |
Datahavens from HavenCo to Today
|
December 27, 2015
|
60
|
|
S32E29 |
So you want to build a satellite?
|
December 27, 2015
|
60
|
|
S32E30 |
When hardware must „just work“
|
December 27, 2015
|
60
|
|
S32E31 |
Shopshifting
|
December 27, 2015
|
60
|
|
S32E32 |
New memory corruption attacks: why can't we have nice things?
|
December 27, 2015
|
60
|
|
S32E33 |
Shooting lasers into space – for science!
|
December 27, 2015
|
60
|
|
S32E34 |
PQCHacks
|
December 27, 2015
|
60
|
|
S32E35 |
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
|
December 27, 2015
|
60
|
|
S32E36 |
Console Hacking
|
December 27, 2015
|
60
|
|
S32E37 |
My Robot Will Crush You With Its Soft Delicate Hands!
|
December 27, 2015
|
60
|
|
S32E38 |
Die Asyl-Dialoge / The Asylum Dialogues
|
December 28, 2015
|
60
|
|
S32E39 |
Jahresrückblick des CCC
|
December 28, 2015
|
60
|
|
S32E40 |
The state of Internet Censorship
|
December 28, 2015
|
60
|
|
S32E41 |
Household, Totalitarianism and Cyberspace
|
December 28, 2015
|
60
|
|
S32E42 |
Maker Spaces in Favelas - Lecture
|
December 28, 2015
|
60
|
|
S32E43 |
Net Neutrality in Europe
|
December 28, 2015
|
60
|
|
S32E44 |
Lightning Talks Day 2
|
December 28, 2015
|
60
|
|
S32E45 |
CloudABI
|
December 28, 2015
|
60
|
|
S32E46 |
Buffering sucks!
|
December 28, 2015
|
60
|
|
S32E47 |
Cyber all the Wassenaars
|
December 28, 2015
|
60
|
|
S32E48 |
Jugend hackt 2015
|
December 28, 2015
|
60
|
|
S32E49 |
Software and business method patents: call for action
|
December 28, 2015
|
60
|
|
S32E50 |
Ein Abgrund von Landesverrat
|
December 28, 2015
|
60
|
|
S32E51 |
Sicherheit von 125kHz Transpondern am Beispiel Hitag S
|
December 28, 2015
|
60
|
|
S32E52 |
Evolution of Brain-Computer Interfaces
|
December 28, 2015
|
60
|
|
S32E53 |
Profiling (In)justice
|
December 28, 2015
|
60
|
|
S32E54 |
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
|
December 28, 2015
|
60
|
|
S32E55 |
Lessons learned: Freifunk für Geflüchtete
|
December 28, 2015
|
60
|
|
S32E56 |
apertus° AXIOM
|
December 28, 2015
|
60
|
|
S32E57 |
Plunge into Proxy Politics
|
December 28, 2015
|
60
|
|
S32E58 |
One year of securitarian drift in France
|
December 28, 2015
|
60
|
|
S32E59 |
All Our Shared Spectrum Are Belong to Us
|
December 28, 2015
|
60
|
|
S32E60 |
Verified Firewall Ruleset Verification
|
December 28, 2015
|
60
|
|
S32E61 |
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
|
December 28, 2015
|
60
|
|
S32E62 |
Rowhammer.js: Root privileges for web apps?
|
December 28, 2015
|
60
|
|
S32E63 |
G’scheitern
|
December 28, 2015
|
60
|
|
S32E64 |
Vector retrogaming
|
December 28, 2015
|
60
|
|
S32E65 |
Mobile Censorship in Iran
|
December 28, 2015
|
60
|
|
S32E66 |
Let's Encrypt -- What launching a free CA looks like
|
December 28, 2015
|
60
|
|
S32E67 |
Ecuador: how an authoritarian government is fooling the entire world
|
December 28, 2015
|
60
|
|
S32E68 |
Ling - High level system programming
|
December 28, 2015
|
60
|
|
S32E69 |
The Perl Jam 2
|
December 28, 2015
|
60
|
|
S32E70 |
Quantum Cryptography
|
December 28, 2015
|
60
|
|
S32E71 |
Das Zahnrad aus Fleisch
|
December 28, 2015
|
60
|
|
S32E72 |
Hardsploit: A Metasploit-like tool for hardware hacking
|
December 28, 2015
|
60
|
|
S32E73 |
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
|
December 28, 2015
|
60
|
|
S32E74 |
Dissecting VoLTE
|
December 28, 2015
|
60
|
|
S32E75 |
How hackers grind an MMORPG: by taking it apart!
|
December 28, 2015
|
60
|
|
S32E76 |
Quantenphysik und Kosmologie
|
December 28, 2015
|
60
|
|
S32E77 |
Iridium Update
|
December 28, 2015
|
60
|
|
S32E78 |
goto fail;
|
December 28, 2015
|
60
|
|
S32E79 |
Unpatchable
|
December 28, 2015
|
60
|
|
S32E80 |
Sanitizing PCAPs
|
December 28, 2015
|
60
|
|
S32E81 |
Fnord-Jahresrückblick
|
December 29, 2015
|
60
|
|
S32E82 |
Methodisch inkorrekt!
|
December 29, 2015
|
60
|
|
S32E83 |
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
|
December 29, 2015
|
60
|
|
S32E84 |
Beyond Anti Evil Maid
|
December 29, 2015
|
60
|
|
S32E85 |
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
|
December 29, 2015
|
60
|
|
S32E86 |
re_cycle
|
December 29, 2015
|
60
|
|
S32E87 |
Tor onion services: more useful than you think
|
December 29, 2015
|
60
|
|
S32E88 |
Computational Meta-Psychology
|
December 29, 2015
|
60
|
|
S32E89 |
Lightning Talks Day 3
|
December 29, 2015
|
60
|
|
S32E90 |
Graphs, Drones & Phones
|
December 29, 2015
|
60
|
|
S32E91 |
State of the Onion
|
December 29, 2015
|
60
|
|
S32E92 |
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
|
December 29, 2015
|
60
|
|
S32E93 |
'Fluxus cannot save the world.'
|
December 29, 2015
|
60
|
|
S32E94 |
Say hi to your new boss: How algorithms might soon control our lives.
|
December 29, 2015
|
60
|
|
S32E95 |
Check your privileges!
|
December 29, 2015
|
60
|
|
S32E96 |
Vehicle2Vehicle Communication based on IEEE 802.11p
|
December 29, 2015
|
60
|
|
S32E97 |
Gibberish Detection 102
|
December 29, 2015
|
60
|
|
S32E98 |
Safe Harbor
|
December 29, 2015
|
60
|
|
S32E99 |
The Price Of Dissent
|
December 29, 2015
|
60
|
|
S32E100 |
De-anonymizing Programmers
|
December 29, 2015
|
60
|
|
S32E101 |
A Dozen Years of Shellphish
|
December 29, 2015
|
60
|
|
S32E102 |
Ten years after ‚We Lost The War‘
|
December 29, 2015
|
60
|
|
S32E103 |
Prediction and Control
|
December 29, 2015
|
60
|
|
S32E104 |
The architecture of a street level panopticon
|
December 29, 2015
|
60
|
|
S32E105 |
3D printing on the moon
|
December 29, 2015
|
60
|
|
S32E106 |
QRtistry
|
December 29, 2015
|
60
|
|
S32E107 |
Reversing UEFI by execution
|
December 29, 2015
|
60
|
|
S32E108 |
20 OSCILLATORS IN 20 MINUTES
|
December 29, 2015
|
60
|
|
S32E109 |
Media Coverage and the Public in the Surveillance Society
|
December 29, 2015
|
60
|
|
S32E110 |
Intelexit
|
December 29, 2015
|
60
|
|
S32E111 |
The plain simple reality of entropy
|
December 29, 2015
|
60
|
|
S32E112 |
Free Software and Hardware bring National Sovereignty
|
December 29, 2015
|
60
|
|
S32E113 |
Trust us and our business will expand!
|
December 29, 2015
|
60
|
|
S32E114 |
Crypto ist Abwehr, IFG ist Angriff!
|
December 29, 2015
|
60
|
|
S32E115 |
Internet Cube
|
December 29, 2015
|
60
|
|
S32E116 |
Craft, leisure, and end-user innovation
|
December 29, 2015
|
60
|
|
S32E117 |
the possibility of an army
|
December 29, 2015
|
60
|
|
S32E118 |
Building and Breaking Wireless Security
|
December 29, 2015
|
60
|
|
S32E119 |
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
|
December 29, 2015
|
60
|
|
S32E120 |
Stromtankstellen – eine neue öffentliche Infrastruktur
|
December 29, 2015
|
60
|
|
S32E121 |
On Computing Numbers, with an Application to Problems of our Society
|
December 29, 2015
|
60
|
|
S32E122 |
Maritime Robotics
|
December 29, 2015
|
60
|
|
S32E123 |
libusb: Maintainer fail
|
December 29, 2015
|
60
|
|
S32E124 |
Technology and Mass Atrocity Prevention
|
December 29, 2015
|
60
|
|
S32E125 |
#GOIBlocks - Technical observations about recent internet censorship in India
|
December 29, 2015
|
60
|
|
S32E126 |
Hacker Jeopardy
|
December 30, 2015
|
60
|
|
S32E127 |
Grundrechte gelten nicht im Weltall!
|
December 30, 2015
|
60
|
|
S32E128 |
“I feel like a criminal and I have to be god at the same time”
|
December 30, 2015
|
60
|
|
S32E129 |
Replication Prohibited
|
December 30, 2015
|
60
|
|
S32E130 |
The Magic World of Searchable Symmetric Encryption
|
December 30, 2015
|
60
|
|
S32E131 |
Katastrophe und Kommunikation
|
December 30, 2015
|
60
|
|
S32E132 |
Crypto Wars Part II
|
December 30, 2015
|
60
|
|
S32E133 |
Top X* usability obstacles
|
December 30, 2015
|
60
|
|
S32E134 |
Lightning Talks Day 4
|
December 30, 2015
|
60
|
|
S32E135 |
A New Kid on the Block
|
December 30, 2015
|
60
|
|
S32E136 |
DDoS mitigation EPIC FAIL collection
|
December 30, 2015
|
60
|
|
S32E137 |
When algorithms fail in our personal lives
|
December 30, 2015
|
60
|
|
S32E138 |
How to contribute to make open hardware happen
|
December 30, 2015
|
60
|
|
S32E139 |
Breaking Honeypots for Fun and Profit
|
December 30, 2015
|
60
|
|
S32E140 |
How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).
|
December 30, 2015
|
60
|
|
S32E141 |
Wie man einen Blackout verursacht
|
December 30, 2015
|
60
|
|
S32E142 |
CHINTERNET ART
|
December 30, 2015
|
60
|
|
S32E143 |
Predicting Crime in a Big Data World
|
December 30, 2015
|
60
|
|
S32E144 |
Sin in the time of Technology
|
December 30, 2015
|
60
|
|
S32E145 |
Microsofts Windows 10 Botnet
|
December 30, 2015
|
60
|
|
S32E146 |
Compileroptimierungen für Forth im Microcontroller
|
December 30, 2015
|
60
|
|
S32E147 |
Security Nightmares 0x10
|
December 30, 2015
|
60
|
|
S32E148 |
Collect It All: Open Source Intelligence (OSINT) for Everyone
|
December 30, 2015
|
60
|
|
S32E149 |
Wireless Drivers: Freedom considered harmful?
|
December 30, 2015
|
60
|
|
S32E150 |
32C3 Infrastructure Review
|
December 30, 2015
|
60
|
|
S32E151 |
Closing Event
|
December 30, 2015
|
60
|
|
S32E152 |
State of the Internat AS201701 - Freifunk Rheinland e.V. Backbone
season finale
|
January 12, 2016
|
60
|
|