no way to compare when less than two revisions

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.


Vorhergehende Überarbeitung
Letzte Überarbeitung
project:videoabende [08.01.2014 00:01] – [30C3] q-rai
Zeile 1: Zeile 1:
 +====== Congress-Vortrags Videoabende ======
 +
 +Ab und zu, vor der Hacknight, oder an einem Seminarabend mit nichtverfügbarem Seminar, oder mal so Freitags, werden im Raum Mitschnitte der Vorträge vom Chaos Communication Congress (evtl. auch von anderen Vorträgen) angeschaut.
 +
 +Liste der Vorträge, schon angeschaute sind durchgestrichen.
 +
 +==== 30C3 ====
 +
 +Wo Links fehlen: siehe [[https://events.ccc.de/congress/2013/Fahrplan/events.html|30C3-Fahrplan]]
 +
 +  *  Triggering Deep Vulnerabilities Using Symbolic Execution
 +  *  lasers in space
 +  *  10 Years of Fun with Embedded Devices
 +  *  Seidenstraße
 +  *  Electronic Bank Robberies
 +  *  Long Distance Quantum Communication
 +  *  Überwachen und Sprache
 +  *  Der tiefe Staat
 +  *  Reverse engineering of CHIASMUS from GSTOOL
 +  *  IFGINT
 +  *  Basics of Digital Wireless Communication
 +  *  Kryptographie nach Snowden
 +  * [[https://events.ccc.de/congress/2013/Fahrplan/events/5360.html|Script Your Car]]
 +  *  The GNU Name System
 +  *  An introduction to Firmware Analysis
 +  *  Magic Lantern
 +  *  Rock' em Graphic Cards
 +  *  Policing the Romantic Crowd
 +  *  <del>30c3 Keynote</del>
 +  *  Hardening hardware and choosing a #goodBIOS
 +  *  <del>Toward a Cognitive &quot;Quantified Self&quot;</del> 
 +  *  Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array
 +  *  Console Hacking 2013
 +  *  <del>Der Kampf um Netzneutralität</del>
 +  *  <del>Forbidden Fruit</del>
 +  *  Firmware Fat Camp
 +  *  Sim Gishel
 +  *  Fast Internet-wide Scanning and its Security Applications
 +  *  Hello World!
 +  *  We only have one earth
 +  *  EUDataP: State of the Union
 +  *  Open source experimental incubator build up
 +  *  <del>[[https://events.ccc.de/congress/2013/Fahrplan/events/5305.html|Breaking Baryons]]</del>
 +  *  Hacking as Artistic Practice
 +  *  SCADA StrangeLove 2
 +  *  Plants &amp; Machines
 +  *  Turing Complete User
 +  *  HbbTV Security
 +  *  Programming FPGAs with PSHDL
 +  *  Revisiting &quot;Trusting Trust&quot; for binary toolchains
 +  *  Bug class genocide
 +  *  Y U NO ISP, taking back the Net   
 +  *  [[https://events.ccc.de/congress/2013/Fahrplan/events/5463.html|Hillybilly Tracking of Low Earth Orbit]]
 +  *  The ArduGuitar
 +  *  Towards an affordable brain-computer-interface
 +  *  #SOPA, #NSA, and the New Internet &quot;Lobby&quot;
 +  *  Nerds in the news
 +  *  How to Build a Mind
 +  *  Europe, the USA and Identity Ecosystems
 +  *  RFID Treehouse of Horror
 +  *  Recht auf Remix
 +  *  White-Box Cryptography
 +  *  calc.pw
 +  *  Structuring open hardware projects
 +  *  2 Takte später
 +  *  ID Cards in China: Your Worst Nightmare
 +  *  Drones
 +  *  Android DDI
 +  *  Lightning Talks, Day 3
 +  *  Building a safe NFC ticketing system
 +  *  [[https://events.ccc.de/congress/2013/Fahrplan/events/5416.html|Desperately Seeking Susy]]
 +  *  Perfect Paul
 +  *  Introduction to Processor Design
 +  *  <del>Calafou, postcapitalist ecoindustrial community</del>
 +  *  Art of the Exploit: An Introduction to Critical Engineering
 +  *  Disclosure DOs, Disclosure DON'Ts
 +  *  <del>Bullshit made in Germany</del>
 +  *  India's Surveillance State
 +  *  FPGA 101
 +  *  Against Metadata
 +  *  <del>Anonymity and Privacy in Public Space and on the Internet</del>
 +  *  My journey into FM-RDS
 +  *  The Pirate Cinema
 +  *  WarGames in memory
 +  *  Reverse engineering the Wii U Gamepad
 +  *  Lightning Talks, Day 2
 +  *  Technomonopolies
 +  *  Making machines that make
 +  *  X Security
 +  *  Virtually Impossible: The Reality Of Virtualization Security
 +  *  Backdoors, Government Hacking and The Next Crypto Wars
 +  *  Trezor: Bitcoin hardware wallet
 +  *  <del>Jahresrückblick des CCC</del>
 +  *  <del>Mind-Hacking mit Psychedelika</del>
 +  *  Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit 
 +  *  Keine Anhaltspunkte für flächendeckende Überwachung
 +  *  Mobile network attack evolution
 +  *  The Tor Network
 +  *  <del>[[https://events.ccc.de/congress/2013/Fahrplan/events/5491.html|No Neutral Ground in a Burning World]]</del>
 +  *  The Gospel of IRMA 
 +  *  Hacking the Czech Parliament via SMS
 +  *  World War II Hackers
 +  *  Extracting keys from FPGAs, OTP Tokens and Door Locks
 +  *  Das FlipDot-Projekt
 +  * <del>[[https://events.ccc.de/congress/2013/Fahrplan/events/5289.html|Coding Your Body]]</del>
 +  *  Die Drohnenkriege
 +  *  Warum die Digitale Revolution des Lernens gescheitert ist.
 +  *  THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE
 +  *  Infrastructure Review
 +  *  Human Rights and Technology
 +  *  Dead Man Edition
 +  *  Attacking HomeMatic
 +  *  Through a PRISM, Darkly
 +  *  The philosophy of hacking
 +  *  30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob
 +  *  Concepts for global TSCM
 +  *  <del>Amtliche Datenschützer: Kontrolleure oder Papiertiger?</del>
 +  *  Opening Event
 +  *  <del>The Internet (Doesn't) Need Another Security Guide</del>
 +  *  BREACH in Agda
 +  *  Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
 +  *  Beyond the Tech: Building Internet Freedom Tools for Real People
 +  *  Lightning Talks, Day 4
 +  *  The good, the bad, and the ugly - Linux Kernel patches
 +  *  Data Mining for Good
 +  *  <del>[[https://events.ccc.de/congress/2013/Fahrplan/events/5295.html|The Four Wars]]</del>
 +  *  07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
 +  *  Baseband Exploitation in 2013
 +  *  <del>Hacker Jeopardy</del>
 +  *  Glass Hacks
 +  *  Hardware Attacks, Advanced ARM Exploitation, and Android Hacking
 +  *  <del>Security Nightmares</del>
 +  *  <del>Fnord News Show</del>
 +  *  The Year in Crypto
 +  *  25 Jahre Chipkarten-Angriffe
 +  *  Security of the IC Backside
 +  *  Seeing The Secret State: Six Landscapes
 +  *  The Exploration and Exploitation of an SD Memory Card
 +  *  <del>Even More Tamagotchis Were Harmed in the Making of this Presentation</del>
 +  *  Sysadmins of the world, unite!
 +  *  CounterStrike
 +  *  Thwarting Evil Maid Attacks
 +  *  Do You Think That's Funny?
 +  *  <del>Closing Event</del>
 +
 +==== 29C3 ====
 +
 +Wo Links fehlen: siehe [[https://events.ccc.de/congress/2012/Fahrplan/events.de.html|29C3-Fahrplan]]
 +  * Faire IT
 +  * MR-808 – Marvin und der Blues
 +  * Sprache, Ungleichheit, Unfreiheit
 +  * Sharing Access
 +  * NSU V-Leute System
 +  * Die Wahrheit, was wirklich …
 +  * FactHacks
 +  * Hashflooding
 +  * 29c3-5024-en-hackers_as_a_highrisk_population !!
 +  * 29c3-5280-en-miilions_of_lesson_learned_on_elec (teilweise)
 +  * 29c3-5077-en-ethics_in_security_research
 +  * 29c3-5121-de-en-sind_faire_computer_moeglich
 +  * 29c3-5127-de-siechtum_und_sterben_der_aerztlich..
 +  * 29c3-5134-en-new_human_interfaces_for_music
 +  * 29c3-5138-en-romantichackers
 +  * 29c3-5179-de-en-hacking_philosophy
 +  * 29c3-5270-de-en-hanussens_mindreading
 +
 +==== sonstige Videos/Filme ====
 +
 +  * TPB/AFK (Dokumentarfilm über Pirate Bay)
 +  * A Scanner Darkly
  
project/videoabende.txt · Zuletzt geändert: 28.06.2015 13:23 von wolfgang
Falls nicht anders bezeichnet, ist der Inhalt dieses Wikis unter der folgenden Lizenz veröffentlicht: CC Attribution-Noncommercial-Share Alike 4.0 International
Recent changes RSS feed Driven by DokuWiki