
27 min
Cyborg Foundation
Transpecies Society

30 min
Love, CyBorgs, Art and Open Source – an artistic approach on how to stay golden
How to educate society through the language of art

30 min
Mit dem Getränkeautomaten in die Cloud
Über die (Un-)Sicherheit eines Bezahlsystems

31 min
Die Zukunft hat zwei Wellen
Ein Blick auf die Zukunft der Freifunk-Hardware (und was…

32 min
spispy: SPI flash device emulation
Open source tools for flash emulation and research

33 min
Knoten 101
Can you knot or can you not ?

34 min
Fangespielen mit IMSI-Catchern
Warum IMSI Catcher schlecht "Verstecken" spielen

34 min
Making video games in a weekend
The why and how of game jams

35 min
From the Sputnik 'Beep' to messages from Pluto
Signals from Space 101

36 min
Visualization of networks using physics
How algorithms inspired by the laws of physics can create…

37 min
Exposing Systems of Power and Injustice
5 Years of Disruption Network Lab

38 min
"Service Point" The Display
A tale of four generations

39 min
schleuderpackung 2.0
TeXnische Aspekte und Umsetzung in der DS-Redaktion

39 min
Technopolice: calling out so-called "Safe Cities"
Decentralising the fight against automated surveillance in…

39 min
c3Power Monitoring CCCamp 19
Strom in Bits und Bytes visualisiert

39 min
Die 5G-Überwachungsstandards
Cops Gegen Telekoms im ETSI

40 min
Domain computers have accounts, too!
Owning machines through relaying and delegation

41 min
Introduction to (home) network security.
A beginner-friendly guide to network segmentation for…

41 min
Fighting back against Libra - Decentralizing Facebook Connect
Nym Anonymous Authentication Credentials

41 min
Deaths per TWh
The Price of Energy and Reducing CO2 Emissions

41 min
Was tun gegen Digitale Gewalt gegen Frauen
"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen"…

41 min
Solare Brennstoffe - Wasserstoff aus Sonnenlicht
Solarzellen können nicht nur Strom erzeugen

42 min
Fast Global Internet Scanning - Challenges and new Approaches
Or how to become your own ISP

42 min
Zombie Apocalypse vs. International Health Regulations
Introducing a very important piece of international law and…

42 min
Mapping Doomsday
Using OSINT to monitor and predict environmental conflicts

43 min
DoH or Don't
The dilemma of DNS privacy protocols

43 min
Hacking Containers and Kubernetes
Exploiting and protecting containers with a few lines of…

43 min
Hambacher Forst #hambibleibt
Vom Widerstand gegen Braunkohletagebaue, die…

43 min
The Great British Drone Panic
Asking for better standards of official investigation and…

43 min
From DC to RF...starting where?
An analog engineer dives into RF circuits

43 min
On bendy inflatables and travelling techno
Or, making hackercamp installations for cheap

43 min
Updates from the Onion
The Road to Mobile Tor and Improved Censorship Circumvention

43 min
Participatory art event tools, co-creation and silk road networks
Collide, connect, cartography

43 min
Anykernels meet fuzzing
how to make NetBSD a better software for you and me

44 min
500.000 Recalled Pacemakers, 2 Billion $ Stock Value Loss
The Story Behind

44 min
TAPS Transport Services API
Retiring the BSD Socket API

44 min
Why Nobody cares, and only You can save the World
Technology, Intuitions & Moral Expertise

44 min
Caught in the Net
The Impact of Anti-Extremism Content Regulation on Human…

45 min
A mobile phone that respects your freedom
Experiences and lessons learned from 2 years of development…

45 min
75 Jahre Journalismus im WWW
the untold stories

45 min
Privacy: An Unequally Distributed Resource
A Study of Privacy as Privilege in Our World

45 min
River Crab, Harmony and Euphemism
A Peek at Chinese Online Culture under the Censorship

45 min
Reporting from Brussels: The state of Digital Rights
How is our fight impacted by the new EU political landscape?

45 min
Tales from Hardware Security Research
From Research over Vulnerability Discovery to Public…

46 min
Taking Bluetooth lockpicking to the next level
...or the 37th floor of a Hotel

46 min
Little Big Data
Spurensuche in elektronischen Teilnehmerverzeichnissen

46 min
The Limits of General Purpose SDR devices
Why an SDR board like a USRP or LimeSDR is not a cellular…

46 min
IT-Sicherheit in vernetzten Gebäuden
Was kann man noch retten, wenn langlebigen Strukturen…

46 min
Nachhaltige Blockchains
statt Digital und Dreckig

46 min
Beyond the Pile of Knobs
Redesigning NoScript’s UX

47 min
Introduction to Mix Networks and Katzenpost
a new anonymity movement

47 min
Power-to-X
How to make (nearly) everything from electricity.

48 min
Architecture of secure IoT devices
Security by design

48 min
Wisdom of OS
An Inquiry into the Limits of the Possible

49 min
Automated security testing for Software Developers who dont know security!
secure your apps and servers through continuous integration

50 min
Ethikrichtlinien für Künstliche Intelligenz? Wie wär's mit Gesetzen?
Wie die Industrie mit Debatten um "ethische KI" Zeit kauft

51 min
#Fusionbleibt
Wie das Fusion Festival sich erfolgreich gegen anlasslose…

51 min
Make Your Tech and Wear It Too
Stories from an e-textile tailor

53 min
Blockchain: Proof of ignorance
With liberty and justice for some! ...a rant.

58 min
Logbuch:Netzpolitik 311
I love you but I have chosen Datenschutz

62 min
#Defensive statt #Offensive am Beispiel von KRITIS
aka Ethik rekalibrieren

86 min
20 Jahre Camp
die Evolution des Chaos Communication Camps

108 min