Events for tag "28c3"

Echtes Netz
59 min

Echtes Netz

Kampagne für Netzneutralität

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

NOC Review
34 min

NOC Review

NOC Review about the Camp 2011 and the 28C3

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Der Staatstrojaner
128 min

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

The coming war on general computation
54 min

The coming war on general computation

The copyright war was just the beginning

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Quantum of Science
59 min

Quantum of Science

How quantum information differs from classical

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

Towards a Single Secure European Cyberspace?
53 min

Towards a Single Secure European Cyberspace?

What the European Union wants. What the hackerdom can do..

Eating in the Anthropocene
57 min

Eating in the Anthropocene

Transgenic Fish, Mutagenic Grapefruits and Space Potatoes

Politik hacken
57 min

Politik hacken

Kleine Anleitung zur Nutzung von Sicherheitslücken…

KinectFusion
66 min

KinectFusion

Real-time 3D Reconstruction and Interaction Using a Moving…

BuggedPlanet
51 min

BuggedPlanet

Surveillance Industry & Country's Actings

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

Hacker Jeopardy
116 min

Hacker Jeopardy

Number guessing for geeks

What is in a name?
64 min

What is in a name?

Identity-Regimes from 1500 to the 2000s

NPC - Nerds’ Pissing Contest
100 min

NPC - Nerds’ Pissing Contest

Mein Ruby ist besser als dein urxvt!

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

The movements against state-controlled Internet in Turkey
62 min

The movements against state-controlled Internet in Turkey

A short account of its history and future challenges

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Pentanews Game Show 2k11/3
107 min

Pentanews Game Show 2k11/3

42 new questions, new jokers, same concept, more fun than…

The best of The oXcars
53 min

The best of The oXcars

the greatest free/Libre culture show of all times

Datenvieh oder Daten-Fee
67 min

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Can trains be hacked?
64 min

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

Counterlobbying EU institutions
58 min

Counterlobbying EU institutions

How to attempt to counter the influence of industry…

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

Almighty DNA?
59 min

Almighty DNA?

Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat

Sachsen dreht frei
56 min

Sachsen dreht frei

On- und Offline-Überwachung: Weil sie es können

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Does Hacktivism Matter?
49 min

Does Hacktivism Matter?

How the Btx hack changed computer law-making in Germany

Not your Grandfathers moon landing
59 min

Not your Grandfathers moon landing

Hell yeah, it's Rocket Science 3.1415926535897932384626!

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
57 min

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast…

Introducing Osmo-GMR
55 min

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Frag den Staat
28 min

Frag den Staat

Praktische Informationsfreiheit

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

CCC Camp 2011 Video Impressions
43 min

CCC Camp 2011 Video Impressions

Reviving a nice summer dream

Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…