Plan: „Videoabend(e)“ organisieren auf denen Videos der Vorträge vom 27c3 gezeigt werden. Jeder darf kommen, wir könnten auch Essen organisieren, etc.

Liste der Vorträge

  • 1. - 27C3 Keynote
  • 2. - Abschlussveranstaltung
  • 3. - A Critical Overview of 10 years of Privacy Enhancing Technologies
  • 4. - Adventures in analyzing Stuxnet
  • 5. - Adventures in Mapping Afghanistan Elections
  • 6. - The story of 3 Ushahidi mapping and reporting projects.
  • 7. - A framework for automated architecture-independent gadget search
  • 8. - All Colours Are Beautiful
  • 9. - Analyzing a modern cryptographic RFID system
  • 10. - Android geolocation using GSM network
  • 11. - A short political history of acoustics
  • 12. - Automatic Identification of Cryptographic Primitives in Software
  • 13. - Building Custom Disassemblers
  • 14. - CCC-Jahresrückblick 2010
  • 15. - Chip and PIN is Broken
  • 16. - Code deobfuscation by optimization
  • 17. - Cognitive Psychology for Hackers
  • 18. - Console Hacking 2010
  • 19. - Contemporary Profiling of Web Users
  • 20. - Copyright Enforcement Vs. Freedoms
  • 21. - Cybernetics for the Masses
  • 22. - Data Analysis in Terabit Ethernet Traffic
  • 23. - Data Recovery Techniques
  • 24. - Data Retention in the EU five years after the Directive
  • 25. - Defense is not dead
  • 26. - Desktop on the Linux… (and BSD, of course)
  • 27. - „Die gesamte Technik ist sicher“
  • 28. - Digitale Spaltung per Gesetz
  • 29. - Distributed FPGA Number Crunching For The Masses
  • 30. - DIY synthesizers and sound generators
  • 31. - Eins, zwei, drei - alle sind dabei
  • 32. - File → Print → Electronics
  • 33. - Fnord-Jahresrückblick 2010
  • 34. - Friede sei mit Euren Daten
  • 35. - From robot to robot
  • 36. - Frozen Cache
  • 37. - Hacker Jeopardy
  • 38. - Hackers and Computer Science
  • 39. - Hacking iButtons
  • 40. - hacking smart phones
  • 41. - Having fun with RTP
  • 42. - High-speed high-security cryptography: encrypting and authenticating the whole Internet
  • 43. - How the Internet sees you
  • 44. - Ich sehe nicht, dass wir nicht zustimmen werden
  • 45. - I Control Your Code
  • 46. - Ignorance and Peace Narratives in Cyberspace
  • 47. - IMMI, from concept to reality
  • 48. - INDECT - an EU-Surveillance Project
  • 49. - International Cyber Jurisdiction
  • 50. - Is the SSLiverse a safe place?
  • 51. - JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
  • 52. - Lightning Talks - Day 2
  • 53. - Lightning Talks - Day 3
  • 54. - Lightning Talks - Day 4
  • 55. - Literarischer Abend
  • 56. - Logikschaltungen ohne Elektronik
  • 57. - Lying To The Neighbours
  • 58. - Netzmedienrecht, Lobbyismus und Korruption
  • 59. - Netzneutralität und QoS - ein Widerspruch?
  • 60. - News Key Recovery Attacks on RC4/WEP
  • 61. - Node.js as a networking tool
  • 62. - OMG WTF PDF
  • 63. - Part-Time Scientists
  • 64. - Pentanews Game Show
  • 65. - Radio der Zukunft
  • 66. - Recent advances in IPv6 insecurities
  • 67. - Reverse Engineering a real-world RFID payment system
  • 68. - Reverse Engineering the MOS 6502 CPU
  • 69. - Rootkits and Trojans on Your SAP Landscape
  • 70. - Running your own GSM stack on a phone
  • 71. - Safety on the Open Sea
  • 72. - Secure communications below the hearing threshold
  • 73. - Security Nightmares
  • 74. - SIP home gateways under fire
  • 75. - SMS-o-Death
  • 76. - Spinning the electronic Wheel
  • 77. - „Spoilers, Reverse Green, DECEL!“ or „What's it doing now?“
  • 78. - Stanislaw Lem - Der enttäuschte Weltverbesserer
  • 79. - Techniken zur Identifizierung von Netzwerk-Protokollen
  • 80. - Terrorists Win - Exploiting Telecommunications Data Retention?
  • 81. - The Baseband Apocalypse
  • 82. - „The Concert“
  • 83. - The Hidden Nemesis
  • 84. - The importance of resisting Excessive Government Surveillance
  • 85. - Three jobs that journalists will do in 2050
  • 86. - Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth
  • 87. - USB and libusb
  • 88. - Von Zensursula über Censilia hin zum Kindernet
  • 89. - Whistleblowing
  • 90. - Wideband GSM Sniffing
  • 91. - Wikileaks und mehr
  • 92. - Your Infrastructure Will Kill You
  • 93. - Zero-sized heap allocations vulnerability analysis

Voting

  • paalsteek: 1, 2, 8, 10, 11, 14, 22, 26, 31, 32, 33, 62, 66, 70, 71, 73, 76
  • `: 4, 12, 14, 22, 23, 25, 27, 33, 36, 37, 42, 43, 44, 45, 50, 57, 60, 61, 62, 66, 73, 79, 83, 93
  • q-rai: 1, 2, 3, 8, 14, 15, 17, 18, 19, 21, 27, 31, 33, 35, 37, 41, 43, 59, 62, 63, 64, 65, 76, 78, 87
project/27c3_videos.txt · Zuletzt geändert: 14.01.2013 15:56 von 127.0.0.1
Falls nicht anders bezeichnet, ist der Inhalt dieses Wikis unter der folgenden Lizenz veröffentlicht: CC Attribution-Noncommercial-Share Alike 4.0 International
Recent changes RSS feed Driven by DokuWiki