Events for tag "30c3"
29 min
On Freedom of Facial Expression
36 min
A singing and dancing robot build to take part in casting…
60 min
Welcome to the 30th Chaos Communication Congress
55 min
Artificial Intelligence Reloaded
33 min
What can be done to protect the term, the notion and the…
58 min
Physically Unclonable Functions for Hardware Tamper…
60 min
On the Awesomeness of Particle Accelerators and Colliders
66 min
Kriegsführung der Zukunft?
46 min
introduction to software radio principles
63 min
Everything we know about NSA spying
90 min
Damit Sie auch morgen schlecht von Ihrem Computer träumen.…
28 min
Erkenntnisse aus Informationsfreiheitsanfragen - Hacks,…
147 min
Zahlenraten für Geeks [Number guessing for geeks]
58 min
How to do things with words
40 min
Techniques - Tools - Tricks
56 min
what is the winning move?
46 min
rapid prototyping of digital fabrication and…
57 min
How to make art after Snowden?
26 min
Food replicating Robots from Open Source Technologies
26 min
Twisting time and space to explore the unknown
65 min
Eine Einführung in die Wirkungsweise psychedelischer…
47 min
Repurposing an Inmarsat Dish
62 min
Creating Internet Privacy and Security Resources That Don't…
62 min
Building a space for grassroots sustainable technology…
45 min
Deep program analysis without the headache
58 min
Hacking City-Wide Access Control Systems
61 min
Let's create the Arduino for FPGAs
47 min
Dynamic Dalvik Instrumentation of Android Applications and…
55 min
Attribute Based Credentials in Practice
47 min
Applying science to eliminate 100% of buffer overflows
29 min
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene
54 min
Stalin's best men, armed with paper and pen
45 min
The militarization of the Internet
59 min
Ein Streifzug durch die Fehler in der Kryptografie
61 min
Auf dem Weg zu fairer Elektronik am Beispiel der Elkos …
60 min
A farewell to a bold proposal?
30 min
Passwortgenerierung mit Arduino [Generating passwords with…
26 min
How technology is used to subvert and circumvent…
56 min
Introduction to Heterogeneous Parallel Programming
66 min
Die Diskussion um NSA, PRISM, Tempora sprachlich und…
24 min
Terror, whistleblowers, drugs, internet
49 min
Security notions, proofs and attacks using dependently…
32 min
How to decipher the messages of your body
36 min
Concepts and components for intercontinal communication…
64 min
Free Software on Your Camera
42 min
Embedded Security Using Binary Autotomy
60 min
getting out of surveillance state mode
51 min
A Decentralized PKI For Social Movements
29 min
Creating mash-up movies by hidden activity and geography of…
31 min
Spending a year coding in a newsroom
41 min
Side-Channel (and other) Attacks in Practice
26 min
Using random sampling, entity resolution, communications…
30 min
An Arduino Powered Electric Guitar
54 min
Art Practice under the Regime of Anti-Terror Legislation
33 min
!Mediengruppe Bitnik about their recent works
33 min
experiences from the “i3 Berlin” 3D printer project with…
47 min
Clean boot every boot - rejecting persistence of malicious…
60 min
So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim…
117 min
Der schonungslose Realitätsabgleich mit…
32 min
"A New Hope" or "The Empire Strikes Back"?
60 min
Fun and frightening uses of always-on camera enabled…
56 min
Stealing Money from ATMs with Malware
59 min
The future of IC analysis
39 min
A parliamentary drama of 223 actors
45 min
OMG - my Smart TV got pr0wn3d
54 min
Wer kontrolliert das Netz?
58 min
Using existing hardware platforms to integrate python into…
48 min
How OpenWrt evolved from a WRT54G firmware to an universal…
71 min
Presentation of MOC/NOC/VOC/SOC/*OC
62 min
The militarization of the Internet
30 min
Contemplations on the essence of hacking and its…
49 min
Activity Recognition for the Mind
42 min
Spaß mit mechanischer Anzeige
61 min
Von der Historie zur Zukunft
60 min
Autonomous flying vehicles, where are we and where are we…
33 min
call for participation in project and product development
62 min
We're living in interesting times
39 min
In China Your ID Card Knows Everything
44 min
Pragmatic Advice for Security Researchers
57 min
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
58 min
Reporting on the secret trial of Chelsea Manning
64 min
A case for expansionistic space policy
54 min
Making awesome stuff with FPGAs
38 min
Velocipedes and Face Recognition