Triggering Deep Vulnerabilities Using Symbolic Execution
lasers in space
10 Years of Fun with Embedded Devices
Seidenstraße
Electronic Bank Robberies
Long Distance Quantum Communication
Überwachen und Sprache
Der tiefe Staat
Reverse engineering of CHIASMUS from GSTOOL
IFGINT
Basics of Digital Wireless Communication
Kryptographie nach Snowden
-
The GNU Name System
An introduction to Firmware Analysis
Magic Lantern
Rock' em Graphic Cards
Policing the Romantic Crowd
30c3 Keynote
Hardening hardware and choosing a #goodBIOS
Toward a Cognitive "Quantified Self"
Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array
Console Hacking 2013
Der Kampf um Netzneutralität
Forbidden Fruit
Firmware Fat Camp
Sim Gishel
Fast Internet-wide Scanning and its Security Applications
Hello World!
We only have one earth
EUDataP: State of the Union
Open source experimental incubator build up
-
Hacking as Artistic Practice
SCADA StrangeLove 2
Plants & Machines
Turing Complete User
HbbTV Security
Programming FPGAs with PSHDL
Revisiting "Trusting Trust" for binary toolchains
Bug class genocide
Y U NO ISP, taking back the Net
-
The ArduGuitar
Towards an affordable brain-computer-interface
#SOPA, #NSA, and the New Internet "Lobby"
Nerds in the news
How to Build a Mind
Europe, the USA and Identity Ecosystems
RFID Treehouse of Horror
Recht auf Remix
White-Box Cryptography
calc.pw
Structuring open hardware projects
2 Takte später
ID Cards in China: Your Worst Nightmare
Drones
Android DDI
Lightning Talks, Day 3
Building a safe NFC ticketing system
-
Perfect Paul
Introduction to Processor Design
Calafou, postcapitalist ecoindustrial community
Art of the Exploit: An Introduction to Critical Engineering
Disclosure DOs, Disclosure DON'Ts
Bullshit made in Germany
India's Surveillance State
FPGA 101
Against Metadata
Anonymity and Privacy in Public Space and on the Internet
My journey into FM-RDS
The Pirate Cinema
WarGames in memory
Reverse engineering the Wii U Gamepad
Lightning Talks, Day 2
Technomonopolies
Making machines that make
X Security
Virtually Impossible: The Reality Of Virtualization Security
Backdoors, Government Hacking and The Next Crypto Wars
Trezor: Bitcoin hardware wallet
Jahresrückblick des CCC
Mind-Hacking mit Psychedelika
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
Keine Anhaltspunkte für flächendeckende Überwachung
Mobile network attack evolution
The Tor Network
-
The Gospel of IRMA
Hacking the Czech Parliament via SMS
World War II Hackers
Extracting keys from FPGAs, OTP Tokens and Door Locks
Das FlipDot-Projekt
-
Die Drohnenkriege
Warum die Digitale Revolution des Lernens gescheitert ist.
THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE
Infrastructure Review
Human Rights and Technology
Dead Man Edition
Attacking HomeMatic
Through a PRISM, Darkly
The philosophy of hacking
30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob
Concepts for global TSCM
Amtliche Datenschützer: Kontrolleure oder Papiertiger?
Opening Event
The Internet (Doesn't) Need Another Security Guide
BREACH in Agda
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
Beyond the Tech: Building Internet Freedom Tools for Real People
Lightning Talks, Day 4
The good, the bad, and the ugly - Linux Kernel patches
Data Mining for Good
-
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Baseband Exploitation in 2013
Hacker Jeopardy
Glass Hacks
Hardware Attacks, Advanced ARM Exploitation, and Android Hacking
Security Nightmares
Fnord News Show
The Year in Crypto
25 Jahre Chipkarten-Angriffe
Security of the IC Backside
Seeing The Secret State: Six Landscapes
The Exploration and Exploitation of an SD Memory Card
Even More Tamagotchis Were Harmed in the Making of this Presentation
Sysadmins of the world, unite!
CounterStrike
Thwarting Evil Maid Attacks
Do You Think That's Funny?
Closing Event