![Console Hacking 2008: Wii Fail](https://static.media.ccc.de/media/congress/2008/25c3-2799-en-console_hacking_2008_wii_fail.jpg)
56 min
Console Hacking 2008: Wii Fail
Is implementation the enemy of design?
![The Ultimate Commodore 64 Talk](https://static.media.ccc.de/media/congress/2008/25c3-2874-en-the_ultimate_commodore_64_talk.jpg)
61 min
The Ultimate Commodore 64 Talk
Everything about the C64 in 64 Minutes
![MD5 considered harmful today](https://static.media.ccc.de/media/congress/2008/25c3-3023-en-making_the_theoretical_possible.jpg)
61 min
MD5 considered harmful today
Creating a rogue CA Certificate
![Handschellen hacken](https://static.media.ccc.de/media/congress/2008/25c3-2963-de-handschellen_hacken.jpg)
61 min
Handschellen hacken
Essentielles Grundwissen für alle, die nichts zu verbergen…
![Der Hackerparagraph 202c StGB](https://static.media.ccc.de/media/congress/2008/25c3-3028-de-der_hackerparagraph_202c_stgb.jpg)
61 min
Der Hackerparagraph 202c StGB
Bestandsaufnahme und Auswirkungen
![Security Nightmares 2009](https://static.media.ccc.de/media/congress/2008/25c3-3021-de-security_nightmares_2009.jpg)
94 min
Security Nightmares 2009
Oder: worüber wir nächstes Jahr lachen werden
![Messing Around with Garage Doors](https://static.media.ccc.de/media/congress/2008/25c3-3030-en-messing_around_with_garage_doors.jpg)
76 min
Messing Around with Garage Doors
Breaking Remote Keyless Entry Systems with Power Analysis
![Advanced memory forensics: The Cold Boot Attacks](https://static.media.ccc.de/media/congress/2008/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.jpg)
58 min
Advanced memory forensics: The Cold Boot Attacks
Recovering keys and other secrets after power off
![FAIFA: A first open source PLC tool](https://static.media.ccc.de/media/congress/2008/25c3-2901-en-faifa_a_first_open_source_plc_tool.jpg)
50 min
FAIFA: A first open source PLC tool
PowerLineCommunications has now their open source tool
![Cracking the MSP430 BSL](https://static.media.ccc.de/media/congress/2008/25c3-2839-en-cracking_the_msp430_bsl.jpg)
37 min
Cracking the MSP430 BSL
Part Two
![Anatomy of smartphone hardware](https://static.media.ccc.de/media/congress/2008/25c3-3008-en-anatomy_of_smartphone_hardware.jpg)
56 min
Anatomy of smartphone hardware
Dissecting contemporary cellphone hardware
![Hacking the iPhone](https://static.media.ccc.de/media/congress/2008/25c3-2976-en-hacking_the_iphone.jpg)
58 min
Hacking the iPhone
Pwning Apple's Mobile Internet Device
![Full-Disk-Encryption Crash-Course](https://static.media.ccc.de/media/congress/2008/25c3-2882-en-full-disk-encryption_crash-course.jpg)
48 min
Full-Disk-Encryption Crash-Course
Everything to hide
![Blinkenlights Stereoscope](https://static.media.ccc.de/media/congress/2008/25c3-2934-en-blinkenlights_stereoscope.jpg)
65 min
Blinkenlights Stereoscope
Behind the scenes of the new light installation
![OnionCat – A Tor-based Anonymous VPN](https://static.media.ccc.de/media/congress/2008/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.jpg)
44 min
OnionCat – A Tor-based Anonymous VPN
Building an anonymous Internet within the Internet
![Cisco IOS attack and defense](https://static.media.ccc.de/media/congress/2008/25c3-2816-en-cisco_ios_attack_and_defense.jpg)
66 min
Cisco IOS attack and defense
The State of the Art
![Attacking NFC mobile phones](https://static.media.ccc.de/media/congress/2008/25c3-2639-en-attacking_nfc_mobile_phones.jpg)
82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones
![TCP Denial of Service Vulnerabilities](https://static.media.ccc.de/media/congress/2008/25c3-2909-en-tcp_denial_of_service_vulnerabilities.jpg)
30 min
TCP Denial of Service Vulnerabilities
Accepting the Partial Disclosure Challenge
![Banking Malware 101](https://static.media.ccc.de/media/congress/2008/25c3-3020-en-banking_malware_101.jpg)
63 min
Banking Malware 101
Overview of Current Keylogger Threats
![An introduction to new stream cipher designs](https://static.media.ccc.de/media/congress/2008/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.jpg)
46 min
An introduction to new stream cipher designs
Turning data into line noise and back
![Security and anonymity vulnerabilities in Tor](https://static.media.ccc.de/media/congress/2008/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.jpg)
62 min
Security and anonymity vulnerabilities in Tor
Past, present, and future
![coreboot: Beyond The Final Frontier](https://static.media.ccc.de/media/congress/2008/25c3-2970-en-coreboot_beyond_the_final_frontier.jpg)
50 min
coreboot: Beyond The Final Frontier
Open source BIOS replacement with a radical approach to…
![Predictable RNG in the vulnerable Debian OpenSSL package](https://static.media.ccc.de/media/congress/2008/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.jpg)
50 min
Predictable RNG in the vulnerable Debian OpenSSL package
the What and the How
![Security Failures in Smart Card Payment Systems](https://static.media.ccc.de/media/congress/2008/25c3-2953-en-security_failures_in_smart_card_payment_systems.jpg)
58 min
Security Failures in Smart Card Payment Systems
Tampering the Tamper-Proof
![Tricks: makes you smile](https://static.media.ccc.de/media/congress/2008/25c3-2992-en-tricks_makes_you_smile.jpg)
35 min
Tricks: makes you smile
A clever or ingenious device or expedient; adroit…
![Attacking Rich Internet Applications](https://static.media.ccc.de/media/congress/2008/25c3-2893-en-attacking_rich_internet_applications.jpg)
61 min
Attacking Rich Internet Applications
Not your mother's XSS bugs
![Exploiting Symbian](https://static.media.ccc.de/media/congress/2008/25c3-2832-en-exploiting_symbian.jpg)
63 min
Exploiting Symbian
Symbian Exploit and Shellcode Development
![Vertex Hacking](https://static.media.ccc.de/media/congress/2008/25c3-2942-de-vertex_hacking.jpg)
48 min
Vertex Hacking
Reverse Engineering von 3D-Dateiformaten
![SWF and the Malware Tragedy](https://static.media.ccc.de/media/congress/2008/25c3-2596-en-swf_and_the_malware_tragedy.jpg)
48 min
SWF and the Malware Tragedy
Hide and Seek in A. Flash
![Short Attention Span Security](https://static.media.ccc.de/media/congress/2008/25c3-2734-en-short_attention_span_security.jpg)
53 min
Short Attention Span Security
A little of everything
![Security Nightmares 2009 (English interpretation)](https://static.media.ccc.de/media/congress/2008/25c3-3058-en-security_nightmares_2009_english_interpretation.jpg)
92 min
Security Nightmares 2009 (English interpretation)
Or: about what we will laugh next year
![Squeezing Attack Traces](https://static.media.ccc.de/media/congress/2008/25c3-3002-en-squeezing_attack_traces.jpg)
38 min