45 min
A mobile phone that respects your freedom
Experiences and lessons learned from 2 years of development…
86 min
20 Jahre Camp
die Evolution des Chaos Communication Camps
108 min
Achtung, Datenpannen!
Die große Datenschutz- und DSGVO-Show
58 min
Logbuch:Netzpolitik 311
I love you but I have chosen Datenschutz
41 min
Introduction to (home) network security.
A beginner-friendly guide to network segmentation for…
43 min
Hacking Containers and Kubernetes
Exploiting and protecting containers with a few lines of…
34 min
Fangespielen mit IMSI-Catchern
Warum IMSI Catcher schlecht "Verstecken" spielen
39 min
Die 5G-Überwachungsstandards
Cops Gegen Telekoms im ETSI
30 min
Mit dem Getränkeautomaten in die Cloud
Über die (Un-)Sicherheit eines Bezahlsystems
46 min
The Limits of General Purpose SDR devices
Why an SDR board like a USRP or LimeSDR is not a cellular…
46 min
Taking Bluetooth lockpicking to the next level
...or the 37th floor of a Hotel
46 min
IT-Sicherheit in vernetzten Gebäuden
Was kann man noch retten, wenn langlebigen Strukturen…
43 min
The Great British Drone Panic
Asking for better standards of official investigation and…
43 min
DoH or Don't
The dilemma of DNS privacy protocols
46 min
Little Big Data
Spurensuche in elektronischen Teilnehmerverzeichnissen
41 min
Deaths per TWh
The Price of Energy and Reducing CO2 Emissions
33 min
Knoten 101
Can you knot or can you not ?
47 min
Power-to-X
How to make (nearly) everything from electricity.
39 min
c3Power Monitoring CCCamp 19
Strom in Bits und Bytes visualisiert
32 min
spispy: SPI flash device emulation
Open source tools for flash emulation and research
51 min
#Fusionbleibt
Wie das Fusion Festival sich erfolgreich gegen anlasslose…
53 min
Blockchain: Proof of ignorance
With liberty and justice for some! ...a rant.
51 min
Make Your Tech and Wear It Too
Stories from an e-textile tailor
31 min
Die Zukunft hat zwei Wellen
Ein Blick auf die Zukunft der Freifunk-Hardware (und was…
43 min
Hambacher Forst #hambibleibt
Vom Widerstand gegen Braunkohletagebaue, die…
62 min
#Defensive statt #Offensive am Beispiel von KRITIS
aka Ethik rekalibrieren
50 min
Ethikrichtlinien für Künstliche Intelligenz? Wie wär's mit Gesetzen?
Wie die Industrie mit Debatten um "ethische KI" Zeit kauft
40 min
Domain computers have accounts, too!
Owning machines through relaying and delegation
44 min
500.000 Recalled Pacemakers, 2 Billion $ Stock Value Loss
The Story Behind
47 min
Introduction to Mix Networks and Katzenpost
a new anonymity movement
34 min
Making video games in a weekend
The why and how of game jams
42 min
Fast Global Internet Scanning - Challenges and new Approaches
Or how to become your own ISP
46 min
Nachhaltige Blockchains
statt Digital und Dreckig
41 min
Solare Brennstoffe - Wasserstoff aus Sonnenlicht
Solarzellen können nicht nur Strom erzeugen
45 min
Tales from Hardware Security Research
From Research over Vulnerability Discovery to Public…
49 min
Automated security testing for Software Developers who dont know security!
secure your apps and servers through continuous integration
45 min
75 Jahre Journalismus im WWW
the untold stories
43 min
From DC to RF...starting where?
An analog engineer dives into RF circuits
43 min
Updates from the Onion
The Road to Mobile Tor and Improved Censorship Circumvention
43 min
On bendy inflatables and travelling techno
Or, making hackercamp installations for cheap
35 min
From the Sputnik 'Beep' to messages from Pluto
Signals from Space 101
42 min
Mapping Doomsday
Using OSINT to monitor and predict environmental conflicts
48 min
Architecture of secure IoT devices
Security by design
38 min
"Service Point" The Display
A tale of four generations
43 min
Anykernels meet fuzzing
how to make NetBSD a better software for you and me
41 min
Was tun gegen Digitale Gewalt gegen Frauen
"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen"…
46 min
Beyond the Pile of Knobs
Redesigning NoScript’s UX
39 min
schleuderpackung 2.0
TeXnische Aspekte und Umsetzung in der DS-Redaktion
41 min
Fighting back against Libra - Decentralizing Facebook Connect
Nym Anonymous Authentication Credentials
42 min
Zombie Apocalypse vs. International Health Regulations
Introducing a very important piece of international law and…
44 min
Why Nobody cares, and only You can save the World
Technology, Intuitions & Moral Expertise
45 min
River Crab, Harmony and Euphemism
A Peek at Chinese Online Culture under the Censorship
36 min
Visualization of networks using physics
How algorithms inspired by the laws of physics can create…
27 min
Cyborg Foundation
Transpecies Society
45 min
Reporting from Brussels: The state of Digital Rights
How is our fight impacted by the new EU political landscape?
48 min
Wisdom of OS
An Inquiry into the Limits of the Possible
39 min
Technopolice: calling out so-called "Safe Cities"
Decentralising the fight against automated surveillance in…
43 min
Participatory art event tools, co-creation and silk road networks
Collide, connect, cartography
44 min
TAPS Transport Services API
Retiring the BSD Socket API
45 min
Privacy: An Unequally Distributed Resource
A Study of Privacy as Privilege in Our World
44 min
Caught in the Net
The Impact of Anti-Extremism Content Regulation on Human…
30 min
Love, CyBorgs, Art and Open Source – an artistic approach on how to stay golden
How to educate society through the language of art
37 min