27 de diciembre |
A
Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs |
APT
Reports and OPSEC Evolution, or: These are not the APT reports you are
looking for |
Avoiding
kernel panic: Europe’s biggest fails in digital policy-making |
Beyond your
cable modem |
Console Hacking |
Datahavens
from HavenCo to Today |
Hacking
EU funding for a decentralizing FOSS project |
Hardware-Trojaner
in Security-Chips |
How
the Great Firewall discovers hidden circumvention servers |
Internet
Landscapes |
Key-logger,
Video, Mouse |
Keynote |
Lifting
the Fog on Red Star OS |
My
Robot Will Crush You With Its Soft Delicate Hands! |
Netzpolitik
in der Schweiz |
New
memory corruption attacks: why can't we have nice things? |
NSA-Untersuchungsausschuss:
Zwischen Aufklärungswillen und Mauern aus Schweigen |
Opening Event |
PLC-Blaster |
PQCHacks |
Public
Library/Memory of the World |
rad1o++ |
REXUS/BEXUS
- Rocket and Balloon Experiments for University Students |
Running
your own 3G/3.5G network |
Shooting
lasers into space – for science! |
Shopshifting |
So
you want to build a satellite? |
The
exhaust emissions scandal („Dieselgate“) |
The
Great Train Cyber Robbery |
The mummy
unwrapped |
The
Ultimate Amiga 500 Talk |
Thunderstrike 2 |
Towards
(reasonably) trustworthy x86 laptops |
What
does Big Brother see, while he is watching? |
What
is the value of anonymous communication? |
When
hardware must „just work“ |
Windows
drivers attack surface |
28 de diciembre |
(Un)Sicherheit
von App-basierten TAN-Verfahren im Onlinebanking |
All
Our Shared Spectrum Are Belong to Us |
apertus° AXIOM |
CloudABI |
Cyber all
the Wassenaars |
Das Zahnrad
aus Fleisch |
Dissecting VoLTE
|
Ecuador:
how an authoritarian government is fooling the entire world |
Ein
Abgrund von Landesverrat |
Evolution
of Brain-Computer Interfaces |
G’scheitern |
goto fail; |
Hardsploit:
A Metasploit-like tool for hardware hacking |
Household,
Totalitarianism and Cyberspace |
How
hackers grind an MMORPG: by taking it apart! |
Iridium Update |
Jahresrückblick
des CCC |
Jugend hackt
2015 |
Lessons
learned: Freifunk für Geflüchtete |
Let's
Encrypt -- What launching a free CA looks like |
Lightning Talks
Day 2 |
Logjam:
Diffie-Hellman, discrete logs, the NSA, and you |
Maker
Spaces in Favelas - Lecture |
Mobile
Censorship in Iran |
Net
Neutrality in Europe |
One
year of securitarian drift in France |
Plunge
into Proxy Politics |
Profiling
(In)justice |
Quantenphysik
und Kosmologie |
Quantum
Cryptography |
Rowhammer.js:
Root privileges for web apps? |
Sanitizing PCAPs
|
Sicherheit
von 125kHz Transpondern am Beispiel Hitag S |
Software
and business method patents: call for action |
The Perl Jam 2 |
The
state of Internet Censorship |
Unpatchable |
Verified
Firewall Ruleset Verification |
Wie
Jugendschutzprogramme nicht nur die Jugend schädigen |
29 de diciembre |
"Fluxus
cannot save the world." |
#GOIBlocks
- Technical observations about recent internet censorship in India |
(In)Security
of Embedded Devices' Firmware - Fast and Furious at Large Scale |
„Nach
bestem Wissen und Gewissen“ – Floskeln in der Politik |
20
OSCILLATORS IN 20 MINUTES |
3D printing
on the moon |
A Dozen
Years of Shellphish |
Beyond Anti
Evil Maid |
Building
and Breaking Wireless Security |
Check your
privileges! |
Computational
Meta-Psychology |
Craft,
leisure, and end-user innovation |
Crypto
ist Abwehr, IFG ist Angriff! |
De-anonymizing
Programmers |
Fnord-Jahresrückblick
|
Free
Software and Hardware bring National Sovereignty |
Gibberish
Detection 102 |
Graphs, Drones
& Phones |
Intelexit |
Internet Cube |
libusb:
Maintainer fail |
Lightning Talks
Day 3 |
Media
Coverage and the Public in the Surveillance Society |
Methodisch
inkorrekt! |
Neither
Snow Nor Rain Nor MITM… The State of Email Security in 2015 |
On
Computing Numbers, with an Application to Problems of our Society |
Österreich:
Der Kampf gegen unkontrollierte Massenüberwachung |
Prediction and
Control |
QRtistry |
re_cycle |
Reversing
UEFI by execution |
Safe Harbor |
Say
hi to your new boss: How algorithms might soon control our lives. |
State of the Onion
|
Stromtankstellen
– eine neue öffentliche Infrastruktur |
Technology
and Mass Atrocity Prevention |
Ten
years after ‚We Lost The War‘ |
The
architecture of a street level panopticon |
The
plain simple reality of entropy |
the
possibility of an army |
The Price Of
Dissent |
Tor
onion services: more useful than you think |
Trust
us and our business will expand! |
Vehicle2Vehicle
Communication based on IEEE 802.11p |
30 de diciembre |
“I
feel like a criminal and I have to be god at the same time” |
A New Kid on
the Block |
Breaking
Honeypots for Fun and Profit |
CHINTERNET ART |
Collect
It All: Open Source Intelligence (OSINT) for Everyone |
Compileroptimierungen
für Forth im Microcontroller |
Crypto Wars Part
II |
Grundrechte
gelten nicht im Weltall! |
Hacker Jeopardy |
Katastrophe
und Kommunikation |
Maritime
Robotics |
Microsofts
Windows 10 Botnet |
Predicting
Crime in a Big Data World |
Replication
Prohibited |
Security
Nightmares 0x10 |
Sin in
the time of Technology |
The
Magic World of Searchable Symmetric Encryption |
Top X*
usability obstacles |
When
algorithms fail in our personal lives |
Wie
man einen Blackout verursacht |
Wireless
Drivers: Freedom considered harmful? |
Comentarios
Publicar un comentario