Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Vorhergehende ÜberarbeitungNächste Überarbeitung | |||
— | project:27c3_videos [05.03.2011 19:49] – ebrnd | ||
---|---|---|---|
Zeile 1: | Zeile 1: | ||
+ | Plan: " | ||
+ | * Vorschlag: Wir schauen ein Paar Mal Samstags bevor die Open HackNight losgeht je einen Vortrag. | ||
+ | |||
+ | * Ich hab jetzt alle durchnummeriert - nun kann jeder die Nummern der Vorträge aufschreiben, | ||
+ | * Nähere Infos zu den einzelnen Vorträgen unter https:// | ||
+ | |||
+ | * Btw, ich weiß nicht ob es möglich ist, wirklich von allen hier aufgelisteten Veranstaltungen Videomitschnitte zu kriegen. Aber mal schauen was geht ;) | ||
+ | |||
+ | * Mit Diskussionsveranstaltung danach? So damit die Gäste nicht nur Konsumenten sind. --- contradictioned | ||
+ | * halte ich für eine gute Idee --- eB | ||
+ | |||
+ | ===== Liste der Vorträge ===== | ||
+ | * 1. - 27C3 Keynote | ||
+ | * 2. - Abschlussveranstaltung | ||
+ | * 3. - A Critical Overview of 10 years of Privacy Enhancing Technologies | ||
+ | * 4. - Adventures in analyzing Stuxnet | ||
+ | * 5. - Adventures in Mapping Afghanistan Elections | ||
+ | * 6. - The story of 3 Ushahidi mapping and reporting projects. | ||
+ | * 7. - A framework for automated architecture-independent gadget search | ||
+ | * 8. - All Colours Are Beautiful | ||
+ | * 9. - Analyzing a modern cryptographic RFID system | ||
+ | * 10. - Android geolocation using GSM network | ||
+ | * 11. - A short political history of acoustics | ||
+ | * 12. - Automatic Identification of Cryptographic Primitives in Software | ||
+ | * 13. - Building Custom Disassemblers | ||
+ | * 14. - CCC-Jahresrückblick 2010 | ||
+ | * 15. - Chip and PIN is Broken | ||
+ | * 16. - Code deobfuscation by optimization | ||
+ | * 17. - Cognitive Psychology for Hackers | ||
+ | * 18. - Console Hacking 2010 | ||
+ | * 19. - Contemporary Profiling of Web Users | ||
+ | * 20. - Copyright Enforcement Vs. Freedoms | ||
+ | * 21. - Cybernetics for the Masses | ||
+ | * 22. - Data Analysis in Terabit Ethernet Traffic | ||
+ | * 23. - Data Recovery Techniques | ||
+ | * 24. - Data Retention in the EU five years after the Directive | ||
+ | * 25. - Defense is not dead | ||
+ | * 26. - Desktop on the Linux... (and BSD, of course) | ||
+ | * 27. - "Die gesamte Technik ist sicher" | ||
+ | * 28. - Digitale Spaltung per Gesetz | ||
+ | * 29. - Distributed FPGA Number Crunching For The Masses | ||
+ | * 30. - DIY synthesizers and sound generators | ||
+ | * 31. - Eins, zwei, drei - alle sind dabei | ||
+ | * 32. - File -> Print -> Electronics | ||
+ | * 33. - Fnord-Jahresrückblick 2010 | ||
+ | * 34. - Friede sei mit Euren Daten | ||
+ | * 35. - From robot to robot | ||
+ | * 36. - Frozen Cache | ||
+ | * 37. - Hacker Jeopardy | ||
+ | * 38. - Hackers and Computer Science | ||
+ | * 39. - Hacking iButtons | ||
+ | * 40. - hacking smart phones | ||
+ | * 41. - Having fun with RTP | ||
+ | * 42. - High-speed high-security cryptography: | ||
+ | * 43. - How the Internet sees you | ||
+ | * 44. - Ich sehe nicht, dass wir nicht zustimmen werden | ||
+ | * 45. - I Control Your Code | ||
+ | * 46. - Ignorance and Peace Narratives in Cyberspace | ||
+ | * 47. - IMMI, from concept to reality | ||
+ | * 48. - INDECT - an EU-Surveillance Project | ||
+ | * 49. - International Cyber Jurisdiction | ||
+ | * 50. - Is the SSLiverse a safe place? | ||
+ | * 51. - JTAG/ | ||
+ | * 52. - Lightning Talks - Day 2 | ||
+ | * 53. - Lightning Talks - Day 3 | ||
+ | * 54. - Lightning Talks - Day 4 | ||
+ | * 55. - Literarischer Abend | ||
+ | * 56. - Logikschaltungen ohne Elektronik | ||
+ | * 57. - Lying To The Neighbours | ||
+ | * 58. - Netzmedienrecht, | ||
+ | * 59. - Netzneutralität und QoS - ein Widerspruch? | ||
+ | * 60. - News Key Recovery Attacks on RC4/WEP | ||
+ | * 61. - Node.js as a networking tool | ||
+ | * 62. - OMG WTF PDF | ||
+ | * 63. - Part-Time Scientists | ||
+ | * 64. - Pentanews Game Show | ||
+ | * 65. - Radio der Zukunft | ||
+ | * 66. - Recent advances in IPv6 insecurities | ||
+ | * 67. - Reverse Engineering a real-world RFID payment system | ||
+ | * 68. - Reverse Engineering the MOS 6502 CPU | ||
+ | * 69. - Rootkits and Trojans on Your SAP Landscape | ||
+ | * 70. - Running your own GSM stack on a phone | ||
+ | * 71. - Safety on the Open Sea | ||
+ | * 72. - Secure communications below the hearing threshold | ||
+ | * 73. - Security Nightmares | ||
+ | * 74. - SIP home gateways under fire | ||
+ | * 75. - SMS-o-Death | ||
+ | * 76. - Spinning the electronic Wheel | ||
+ | * 77. - " | ||
+ | * 78. - Stanislaw Lem - Der enttäuschte Weltverbesserer | ||
+ | * 79. - Techniken zur Identifizierung von Netzwerk-Protokollen | ||
+ | * 80. - Terrorists Win - Exploiting Telecommunications Data Retention? | ||
+ | * 81. - The Baseband Apocalypse | ||
+ | * 82. - "The Concert" | ||
+ | * 83. - The Hidden Nemesis | ||
+ | * 84. - The importance of resisting Excessive Government Surveillance | ||
+ | * 85. - Three jobs that journalists will do in 2050 | ||
+ | * 86. - Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth | ||
+ | * 87. - USB and libusb | ||
+ | * 88. - Von Zensursula über Censilia hin zum Kindernet | ||
+ | * 89. - Whistleblowing | ||
+ | * 90. - Wideband GSM Sniffing | ||
+ | * 91. - Wikileaks und mehr | ||
+ | * 92. - Your Infrastructure Will Kill You | ||
+ | * 93. - Zero-sized heap allocations vulnerability analysis | ||
+ | |||
+ | ===== Voting ===== | ||
+ | * paalsteek: 1, 2, 8, 10, 11, 14, 22, 26, 31, 32, 33, 62, 66, 70, 71, 73, 76 | ||
+ | * `: 4, 12, 14, 22, 23, 25, 27, 33, 36, 37, 42, 43, 44, 45, 50, 57, 60, 61, 62, 66, 73, 79, 83, 93 | ||
+ | * q-rai: 1, 2, 3, 8, 14, 15, 17, 18, 19, 21, 27, 31, 33, 35, 37, 41, 43, 59, 62, 63, 64, 65, 76, 78, 87 |