
63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

117 min
Fnord News Show
Wir helfen Euch die Fnords zu sehen.

60 min
SS7: Locate. Track. Manipulate.
You have a tracking device in your pocket

33 min
Computer Science in the DPRK
A view into technology on the other side of the world

67 min
Mit Kunst die Gesellschaft hacken
Das Zentrum für politische Schönheit

60 min
Ich sehe, also bin ich ... Du
Gefahren von Kameras für (biometrische)…

55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…

63 min
Reconstructing narratives
transparency in the service of justice

60 min
Vor Windows 8 wird gewarnt
Und nichts (Secure) Bootet mehr?

101 min
Security Nightmares
Damit Sie auch morgen schlecht von Ihrem Computer träumen.

72 min
State of the Onion
Neuland

61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away

59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor

62 min
„Wir beteiligen uns aktiv an den Diskussionen“
Die digitale „Agenda“ der Bundesregierung aus inhaltlicher,…

59 min
NSA Points of Presence in AT
Vortrag mit aktuellen Fotos aus luftigen Perspektiven

60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…

35 min
Internet of toilets
Trends in the sanitarian territory

51 min
Funky File Formats
Advanced binary tricks

66 min
31C3 Keynote
A New Dawn

31 min
Krypto für die Zukunft
Verteidigung gegen Dunkle Künste

62 min
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Der Protest gegen TTIP und CETA

54 min
10 Jahre OpenStreetMap
Wir leben noch und zwar sehr gut.

25 min
»Hard Drive Punch«
Destroying data as a performative act

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist

61 min
Uncaging Microchips
Techniques for Chip Preparation

65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets

34 min
Snowden Effect vs. Privacy Paradox
Einstellungen und Internetnutzungsverhalten im Kontext des…

58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder

31 min
GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
Wie es kommt, dass technischer Fortschritt den Nutzern…

62 min
Let's Encrypt
A Free Robotic Certificate Authority

62 min
Tell no-one
A century of secret deals between the NSA and the telecom…

61 min
Correcting copywrongs
European copyright reform is finally on the horizon

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

55 min
Cyber Necromancy
Reverse Engineering Dead Protocols

33 min
IFG – Mit freundlichen Grüßen
Neue Energie für die Informationsfreiheit

64 min
ES GIBT VIEL ZU TUN - HAU'N WIR AB.
[Die Untersuchung]

58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets

60 min
Low Cost High Speed Photography
Using microcontrollers to capture the blink of an eye for…

61 min
The Invisible Committee Returns with "Fuck Off Google"
Cybernetics, Anti-Terrorism, and the ongoing case against…

61 min
Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States
A Deep Technical Analysis

54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?

60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…

30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer

61 min
Damn Vulnerable Chemical Process
Exploitation in a new media

60 min
The Only Thing We Know About Cyberspace Is That Its 640x480
One Terabyte of Kilobyte Age

50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…

45 min
Serenität – Anleitung zum Glücklichsein
Das Duo 'read & delete' präsentiert radikale philosophische…

55 min
Attribution revolution
Turning copyright upside-down with metadata

58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14

55 min
3D Casting Aluminum
Too Much Fun with Microwaves

60 min
Mein Bot, der Kombattant
Operative Kommunikation im digitalen Informationskrieg

30 min
Automatically Subtitling the C3
How speech processing helps the CCC subtitle project, and…

58 min
Switches Get Stitches
Industrial System Ownership

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

31 min
Mr Beam goes Kickstarter
Lessons learned from crowdfunding a hardware project

55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

63 min
Reproducible Builds
Moving Beyond Single Points of Failure for Software…

67 min
Erste Stunden der Zweisamkeit
Jahresupdate zur GEMA-Alternative C3S

10 min
Premiere: We love surveillance
#7reasons

62 min
Space Hacker
Uploading rover...

69 min
Telescope Making
How to make your own telescope

58 min
Virtual Machine Introspection
From the Outside Looking In

53 min
From Maxwell to antenna arrays
How 150 year old equations still help to communicate

31 min
Trackography
You never read alone

39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist

67 min
The Maker movement meets patent law
How many windows are open in the patent fortress

57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics

30 min
Information Control and Strategic Violence
How governments use censorship and surveillance as part of…

38 min
Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
open source DIY brain-computer-interfaces | technology and…

39 min
Why do we need an open food information platform
We want all data about food to be linked and public

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
net neutrality: days of future past?
Taking stock after two years of net neutrality in the…

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

31 min
Living Drones
From war pigeons in 1914 to cyborg moths in 2014

59 min
Towards General Purpose Reconfigurable Computing on Novena
FPGAs for Everybody with Novena

95 min
The Time is Right
Ein Science-Fiction-Theaterstück

32 min
Eye Wear Computing
Augmenting the Human Mind

33 min
Global Civil Society Under Attack
Reports from the Frontlines

32 min
Das Transparenzportal Hamburg
Inhalt und Umsetzung

60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation

30 min
The Magical Secrecy Tour
A Bus Trip into the Surveillance Culture of Berlin One Year…

62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…

30 min
Privacy and Consumer Markets
Reversing the Surveillance Business Model

61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption

50 min
The eXperimental Robot Project
An open-hardware bipedal walking machine

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

30 min