Let’s make electronics more circular through hardware as a service

Let’s make electronics more circular through hardware as a serviceThe electronics industry generates a huge amount of negative external... | Continue reading


@media.ccc.de | 1 year ago

Rocking the Web Bloat: Modern Gopher, Gemini and the Small Internet

The web is a mess, bloated with data-gathering trackers, predatory UX, massive resource loads, and it is absorbing everything it touches.... | Continue reading


@media.ccc.de | 1 year ago

Electric Vehicles Are Going to Suck; Here's Why [video]

Electric vehicles present a real opportunity to take a step towards better designed, more reliable, and sustainable transport. Instead, e... | Continue reading


@media.ccc.de | 1 year ago

The tooling ecosystem that adds joy to KiCad

A number of people have built wonderful and useful tools to make the life of KiCad users easier. cpresser and Kliment are here to give yo... | Continue reading


@media.ccc.de | 1 year ago

How do GPS/Galileo work and how the galmon.eu monitors it

The whole world depends on Global Navigation Satellite Systems like GPS, Galileo, BeiDou and GLONASS. The technology behind these systems... | Continue reading


@media.ccc.de | 1 year ago

Signal: You Were the Chosen One

This is a rant about how moving ecosystems are not a good reason for centralizing a crucial service, how stickers are no substitute for a... | Continue reading


@media.ccc.de | 1 year ago

Practical bruteforce of military grade AES-1024

Sony, SanDisk, and Lexar provide encryption software for their USB keys, hard drives, and other storage products. The software is already... | Continue reading


@media.ccc.de | 2 years ago

How international money transfers work

Instant money transfer, globally without borders and 24/7. That’s one of the promises of Bitcoin. But how does national and international... | Continue reading


@media.ccc.de | 2 years ago

When WikiLeaks bumped into the CIA: Operation Kudo exposed [video]

This talk is about the experience of the Wikileaks project when it bumped into a small problem with the CIA. While it builds up on my las... | Continue reading


@media.ccc.de | 2 years ago

Console Hacking 2016 [video]

Last year, we demonstrated Linux running on the PS4 in a lightning talk - presented on the PS4 itself. But how did we do it? In a departu... | Continue reading


@media.ccc.de | 2 years ago

Fight for your Right to Fileshare (2004) [video]

Current copyright law has only one answer to p2p filesharers: sue them. A much better model not only for users but for authors as well, i... | Continue reading


@media.ccc.de | 3 years ago

Linux Networking – eBPF, XDP, DPDK, VPP – What does all that mean? [video]

This talk will give an overview about Linux networking features and performances as well as comparing different approaches and where they... | Continue reading


@media.ccc.de | 3 years ago

Dissecting modern (3G/4G) cellular modems (2016)

Let's have a detailed look at some modern 3G/4G cellular modems and see what we can find out about their internals using undocumented deb... | Continue reading


@media.ccc.de | 3 years ago

The Indifference Engine: An Ecological Characterization of Bitcoin

"As Bitcoin surpasses previous price records and re-enters mainstream consciousness following several wilderness years, the twelve-year-o... | Continue reading


@media.ccc.de | 3 years ago

All Programming Language Suck? Just Build Your Own [Racket]

All languages have warts, wats, defects, and things that are just plain bad taste. Unless, of course, it's your language. Usuall... | Continue reading


@media.ccc.de | 3 years ago

RC3 talk: How to survive in spacecraft

If you pop out into space, you die. No oxygen to breathe, no ambient pressure makes your bodily fluids boil, UV radiation burns your skin... | Continue reading


@media.ccc.de | 3 years ago

How to Identify Police Surveillance at Protests and Large Gatherings

The Electronic Frontier Foundation’s Kurt Opsahl with show you how to identify surveillance technologies that law enforcement may use at ... | Continue reading


@media.ccc.de | 3 years ago

The Elephant in the Background: Empowering Users Against Browser Fingerprinting

This talk will be about FPMON, a browser extension that shows you where, when and which browser fingerprinting method is applied against ... | Continue reading


@media.ccc.de | 3 years ago

CIA vs. WikiLeaks: Intimiditation surveillance and tactics observed/experienced

In this talk, I aim to report and show a collection of observations, physical, visual and other evidence of the last years incidents that... | Continue reading


@media.ccc.de | 3 years ago

Media.ccc.de – Remote Chaos Experience

Continue reading


@media.ccc.de | 3 years ago

Pixel Art Workshop

Continue reading


@media.ccc.de | 3 years ago

Hacking German Elections [video]

After the first unsuccessful deployment of voting machines in Germany about ten years ago, elements of electronic voting have reached ele... | Continue reading


@media.ccc.de | 3 years ago

Cory Doctorow CCC: What the cyberoptimists got wrong – and what to do about it

They stole our future. Let's take it back.Here at the end of the world, it's time to take stock. Is technology a force for good? Can it... | Continue reading


@media.ccc.de | 3 years ago

Media.ccc.de – Arch Conf 2020

Continue reading


@media.ccc.de | 3 years ago

The programming architecture of Babbage's Analytical Engine

The mathematician and inventor Charles Babbage wrote 26 programs between 1836 and 1841 for the unfinished "Analytical Engine" (AE). The c... | Continue reading


@media.ccc.de | 3 years ago

The Virtual Machine Architecture of “Infernal Runner”

In 1991, the famous game "Another World" was published for the Commodore Amiga. It achieved cult status mainly for its visionary art styl... | Continue reading


@media.ccc.de | 3 years ago

Tell no-one: A century of secret deals between the NSA and the telecom industry

For nearly one hundred years, the NSA and its predecessors have been engaging in secret, illegal deals with the American telecom industry... | Continue reading


@media.ccc.de | 3 years ago

Everything about a Yugoslavian microcomputer – Galaksija – from 1980

Galaksija was to be in Yugoslavia what Commodore and Sinclair were in the west. Whether it succeeded or not, its deceptively simple desig... | Continue reading


@media.ccc.de | 3 years ago

Preserving Arcade Games

Old-school arcade games were so protected that hacking is the only way to preserve them before all boards are dead, and the games are lost. | Continue reading


@media.ccc.de | 3 years ago

“Yes We Can't ” – On Kleptography and Cryptovirology (2009)

In this talk I will survey some of the results (with Adam Young) on Cryptovirology (the art of employing public key cryptography maliciou... | Continue reading


@media.ccc.de | 4 years ago

BahnMining: Data mining the German rail system

Seit Anfang 2019 hat David jeden einzelnen Halt jeder einzelnen Zugfahrt auf jedem einzelnen Fernbahnhof in ganz Deu... | Continue reading


@media.ccc.de | 4 years ago

From Managerial Feudalism to the Revolt of the Caring Classes

One apparent paradox of the digitisation of work is that while productivity in manufacturing is skyrocketing, productivity in caring prof... | Continue reading


@media.ccc.de | 4 years ago

How to Stop the Dubious Use of Passenger Name Records by Law Enforcement [video]

The talk will address how passenger name records (PNR) of flight passengers are currently used by law enforcement throughout the European... | Continue reading


@media.ccc.de | 4 years ago

Select Code_execution from * Using SQLite; – Talk at 36C3

SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the nar... | Continue reading


@media.ccc.de | 4 years ago

Quantum Computing: Are We There Yet?

Five years ago I spoke about my work in quantum computing, building and running a tiny two qubit processor. A few weeks ago, Google annou... | Continue reading


@media.ccc.de | 4 years ago

NGI Zero: A treasure trove of IT innovation [video]

The Next Generation Internet initiative is the first concerted effort in Europe to put significant public... | Continue reading


@media.ccc.de | 4 years ago

Server Infrastructure for Global Extinction Rebellion [video]

In this talk Julian will outline his work as sysadmin, systems and security architect for the climate and environmental defense movement ... | Continue reading


@media.ccc.de | 4 years ago

Finfisher Verklagen

Die GFF hat gemeinsam mit Reporter ohne Grenzen (ROG), dem European Center for Constitutional and Human Rights (ECCHR) und netzpolitik.or... | Continue reading


@media.ccc.de | 4 years ago

The exhaust emissions scandal („Dieselgate“)

Analysis of the emission scandal shaking the German automotive industry from a procedural, organizational and technical level. Includes i... | Continue reading


@media.ccc.de | 4 years ago

Boeing 737MAX: Automated Crashes [video]

Everybody knows about the Boeing 737 MAX crashes and the type's continued grounding. I will try to give some technical background informa... | Continue reading


@media.ccc.de | 4 years ago

36C3 Resource Exhaustion

Continue reading


@media.ccc.de | 4 years ago

SIM Card Technology from A-Z

Billions of subscribers use SIM cards in their phones. Yet, outside a relatively small circle, information about SIM card technology is n... | Continue reading


@media.ccc.de | 4 years ago

Build You Own Quantum Computer Home

Quantum technologies are often only over-hyped showed as threat for cybersecurity … But they also offer some opportunities to enhance the... | Continue reading


@media.ccc.de | 4 years ago

High-assurance crypto software – djb and Tanja Lange

Software bugs and timing leaks have destroyed the security of every Chromebook ECDSA "built-in security key" before June 2019, ECDSA keys... | Continue reading


@media.ccc.de | 4 years ago

A systematic evaluation of OpenBSD's mitigations

OpenBSD markets itself as a secure operating system, but doesn't provide much evidences to back this claim. The goal of this talk is to e... | Continue reading


@media.ccc.de | 4 years ago

Human Rights at a Global Crossroads – Robert Tibbo and Edward Snowden [video]

An update on the circumstances of Mr Snowden and the Snowden Refugees will be provided at the 36C3 event and venue in December 2019. Ther... | Continue reading


@media.ccc.de | 4 years ago

How to convert standard WiFi dongles into digital broadcast transmitters [video]

This talk is about modifying cheap wifi dongles to realize true unidirectional broadcast transmissions that can transport digital data li... | Continue reading


@media.ccc.de | 4 years ago

SigOver+alpha: Signal overshadowing attack on LTE and its applications [video]

As Long-Term Evolution (LTE) communication is based on over-the-air signaling, a legitimate signal can potentially be counterfeited by a ... | Continue reading


@media.ccc.de | 4 years ago