Let’s make electronics more circular through hardware as a serviceThe electronics industry generates a huge amount of negative external... | Continue reading
The web is a mess, bloated with data-gathering trackers, predatory UX, massive resource loads, and it is absorbing everything it touches.... | Continue reading
Electric vehicles present a real opportunity to take a step towards better designed, more reliable, and sustainable transport. Instead, e... | Continue reading
A number of people have built wonderful and useful tools to make the life of KiCad users easier. cpresser and Kliment are here to give yo... | Continue reading
The whole world depends on Global Navigation Satellite Systems like GPS, Galileo, BeiDou and GLONASS. The technology behind these systems... | Continue reading
This is a rant about how moving ecosystems are not a good reason for centralizing a crucial service, how stickers are no substitute for a... | Continue reading
Sony, SanDisk, and Lexar provide encryption software for their USB keys, hard drives, and other storage products. The software is already... | Continue reading
Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international... | Continue reading
This talk is about the experience of the Wikileaks project when it bumped into a small problem with the CIA. While it builds up on my las... | Continue reading
Last year, we demonstrated Linux running on the PS4 in a lightning talk - presented on the PS4 itself. But how did we do it? In a departu... | Continue reading
Current copyright law has only one answer to p2p filesharers: sue them. A much better model not only for users but for authors as well, i... | Continue reading
This talk will give an overview about Linux networking features and performances as well as comparing different approaches and where they... | Continue reading
Let's have a detailed look at some modern 3G/4G cellular modems and see what we can find out about their internals using undocumented deb... | Continue reading
"As Bitcoin surpasses previous price records and re-enters mainstream consciousness following several wilderness years, the twelve-year-o... | Continue reading
All languages have warts, wats, defects, and things that are just plain bad taste. Unless, of course, it's your language. Usuall... | Continue reading
If you pop out into space, you die. No oxygen to breathe, no ambient pressure makes your bodily fluids boil, UV radiation burns your skin... | Continue reading
The Electronic Frontier Foundation’s Kurt Opsahl with show you how to identify surveillance technologies that law enforcement may use at ... | Continue reading
This talk will be about FPMON, a browser extension that shows you where, when and which browser fingerprinting method is applied against ... | Continue reading
In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that... | Continue reading
After the first unsuccessful deployment of voting machines in Germany about ten years ago, elements of electronic voting have reached ele... | Continue reading
They stole our future. Let's take it back.Here at the end of the world, it's time to take stock. Is technology a force for good? Can it... | Continue reading
The mathematician and inventor Charles Babbage wrote 26 programs between 1836 and 1841 for the unfinished "Analytical Engine" (AE). The c... | Continue reading
In 1991, the famous game "Another World" was published for the Commodore Amiga. It achieved cult status mainly for its visionary art styl... | Continue reading
For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry... | Continue reading
Galaksija was to be in Yugoslavia what Commodore and Sinclair were in the west. Whether it succeeded or not, its deceptively simple desig... | Continue reading
Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost. | Continue reading
In this talk I will survey some of the results (with Adam Young) on Cryptovirology (the art of employing public key cryptography maliciou... | Continue reading
Seit Anfang 2019 hat David jeden einzelnen Halt jeder einzelnen Zugfahrt auf jedem einzelnen Fernbahnhof in ganz Deu... | Continue reading
One apparent paradox of the digitisation of work is that while productivity in manufacturing is skyrocketing, productivity in caring prof... | Continue reading
The talk will address how passenger name records (PNR) of flight passengers are currently used by law enforcement throughout the European... | Continue reading
SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the nar... | Continue reading
Five years ago I spoke about my work in quantum computing, building and running a tiny two qubit processor. A few weeks ago, Google annou... | Continue reading
The Next Generation Internet initiative is the first concerted effort in Europe to put significant public... | Continue reading
In this talk Julian will outline his work as sysadmin, systems and security architect for the climate and environmental defense movement ... | Continue reading
Die GFF hat gemeinsam mit Reporter ohne Grenzen (ROG), dem European Center for Constitutional and Human Rights (ECCHR) und netzpolitik.or... | Continue reading
Analysis of the emission scandal shaking the German automotive industry from a procedural, organizational and technical level. Includes i... | Continue reading
Everybody knows about the Boeing 737 MAX crashes and the type's continued grounding. I will try to give some technical background informa... | Continue reading
Billions of subscribers use SIM cards in their phones. Yet, outside a relatively small circle, information about SIM card technology is n... | Continue reading
Quantum technologies are often only over-hyped showed as threat for cybersecurity … But they also offer some opportunities to enhance the... | Continue reading
Software bugs and timing leaks have destroyed the security of every Chromebook ECDSA "built-in security key" before June 2019, ECDSA keys... | Continue reading
OpenBSD markets itself as a secure operating system, but doesn't provide much evidences to back this claim. The goal of this talk is to e... | Continue reading
An update on the circumstances of Mr Snowden and the Snowden Refugees will be provided at the 36C3 event and venue in December 2019. Ther... | Continue reading
This talk is about modifying cheap wifi dongles to realize true unidirectional broadcast transmissions that can transport digital data li... | Continue reading
As Long-Term Evolution (LTE) communication is based on over-the-air signaling, a legitimate signal can potentially be counterfeited by a ... | Continue reading