Chaos Communication Camp 2019

Security

Full playlist: Video / Audio
Fighting back against Libra - Decentralizing Facebook Connect
41 min

Fighting back against Libra - Decentralizing Facebook Connect

Nym Anonymous Authentication Credentials

Architecture of secure IoT devices
48 min

Architecture of secure IoT devices

Security by design

Taking Bluetooth lockpicking to the next level
46 min

Taking Bluetooth lockpicking to the next level

...or the 37th floor of a Hotel

Mit dem Getränkeautomaten in die Cloud
30 min

Mit dem Getränkeautomaten in die Cloud

Über die (Un-)Sicherheit eines Bezahlsystems

Introduction to Mix Networks and Katzenpost
47 min

Introduction to Mix Networks and Katzenpost

a new anonymity movement

IT-Sicherheit in vernetzten Gebäuden
46 min

IT-Sicherheit in vernetzten Gebäuden

Was kann man noch retten, wenn langlebigen Strukturen…

Domain computers have accounts, too!
40 min

Domain computers have accounts, too!

Owning machines through relaying and delegation

Updates from the Onion
43 min

Updates from the Onion

The Road to Mobile Tor and Improved Censorship Circumvention

Tales from Hardware Security Research
45 min

Tales from Hardware Security Research

From Research over Vulnerability Discovery to Public…

Automated security testing for Software Developers who dont know security!
49 min

Automated security testing for Software Developers who dont know security!

secure your apps and servers through continuous integration

Beyond the Pile of Knobs
46 min

Beyond the Pile of Knobs

Redesigning NoScript’s UX

Anykernels meet fuzzing
43 min

Anykernels meet fuzzing

how to make NetBSD a better software for you and me

TAPS Transport Services API
44 min

TAPS Transport Services API

Retiring the BSD Socket API

DoH or Don't
43 min

DoH or Don't

The dilemma of DNS privacy protocols

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

Hacking Containers and Kubernetes
43 min

Hacking Containers and Kubernetes

Exploiting and protecting containers with a few lines of…