What the World Can Learn from Hongkong

The people of Hong Kong have been using unique tactics, novel uses of technology, and a constantly adapting toolset in their fight to mai... | Continue reading


@media.ccc.de | 4 years ago

Harry Potter and the Not-So-Smart Proxy War (CIA Virtual Fencing) [video]

In this talk we will take a look at the 'Vault 7' Protego documents, which have received very little attention so far, and challenge the ... | Continue reading


@media.ccc.de | 4 years ago

Framing digital industry into planetary limits and transition policies [video]

A lecture on the environmental impacts of digital industry today and how to think about and design digital tools with limited energy and ... | Continue reading


@media.ccc.de | 4 years ago

No roborders, no nation, or: smile for a European surveillance propagation

Robots, Satellites and biometrical traps - more than a Billion Euro will be spent in 2021 for what they call "Border Security." The Europ... | Continue reading


@media.ccc.de | 4 years ago

Listening Back Browser Add-On Tranlates Cookies into Sound [video]

‘Listening Back’ is an add-on for the Chrome and Firefox browsers that sonifies internet cookies in real time as one browses online. By t... | Continue reading


@media.ccc.de | 4 years ago

Reflections on the New Reverse Engineering Law [video]

Individuals conducting reverse engineering for research purposes face several legal issues arising from IP and competition law. The legis... | Continue reading


@media.ccc.de | 4 years ago

The sustainability of safety, security and privacy [video]

What sort of tools and methodologies should you use to write software for a car that will go on sale in 2023, if you have to support secu... | Continue reading


@media.ccc.de | 4 years ago

Megatons to Megawatts: Military warheads as a source of nuclear fuel [video]

Can nuclear warheads be used as energy sources instead of exhausting resources? And if, how does this even work? Concerns during the co... | Continue reading


@media.ccc.de | 4 years ago

Hacking Sony PlayStation Blu-ray Drives [video]

Xbox 360 video game console had a number of widely known hacks for firmware of its optical disc drives. However, it was never the case wi... | Continue reading


@media.ccc.de | 4 years ago

Creating Resilient and Sustainable Mobile Phones [video]

Civil society depends on the continuing ability of citizens to communicate with one another, without fear of interference, deprivation or... | Continue reading


@media.ccc.de | 4 years ago

KTRW: The journey to build a debuggable iPhone [video]

Development-fused iPhones with hardware debugging features like JTAG are out of reach for many security researchers. This talk takes you ... | Continue reading


@media.ccc.de | 4 years ago

The Case Against WikiLeaks: a direct threat to our community

The unprecedented charges against Julian Assange and WikiLeaks constitute the most significant threat to the First Amendment in the 21st ... | Continue reading


@media.ccc.de | 4 years ago

TamaGo – Bare Metal Go Framework for ARM SoCs

TamaGo is an Open Source operating environment framework which aims to allow deployment of firmware for embedded ARM devices by using 0% ... | Continue reading


@media.ccc.de | 4 years ago

The Ecosystem Is Moving

Considerations for distributed and decentralized technologies from the perspective of a product that many would like to see decentralize.... | Continue reading


@media.ccc.de | 4 years ago

Technical aspects of the surveillance around the Ecuadorian embassy in London

The talk explains and illustrates the procedural and technical details of the surveillance in and around the Ecuadorian embassy in London... | Continue reading


@media.ccc.de | 4 years ago

How to Break PDFs [video]

PDF is the most widely used standard for office documents. Supported by many desktop applications, email gateways and web services soluti... | Continue reading


@media.ccc.de | 4 years ago

The Large Hadron Collider Infrastructure Talk [video]

The Large Hadron Collider (LHC) is the biggest particle accelerator on Earth. It was built to study matter in more detail than ever befor... | Continue reading


@media.ccc.de | 4 years ago

Climate Modelling: The Science Behind Climate Reports

When climate activists say you should listen to the science they usuallyrefer to reports by the Intergovernmental Panel on Climate Chang... | Continue reading


@media.ccc.de | 4 years ago

Uncover, Understand, Own – Regaining Control over Your AMD CPU [video]

The AMD Platform Security Processor (PSP) is a dedicated ARM CPU inside your AMD processor and runs undocumented, proprietary firmware pr... | Continue reading


@media.ccc.de | 4 years ago

Practical Cache Attacks from the Network and Bad Cat Puns [video]

Our research shows that network-based cache side-channel attacks are a realistic threat. Cache attacks have been traditionally used to le... | Continue reading


@media.ccc.de | 4 years ago

On the insecure nature of turbine control systems in power generation [video]

A deep dive into power generation process, industrial solutions and their security implications. Flavoured with vulnerabilities, penetrat... | Continue reading


@media.ccc.de | 4 years ago

How to Design Highly Reliable Digital Electronics [video]

There's a variety of places - on Earth and beyond - that pose challenging conditions to the ever-shrinking digital circuits of today. Mak... | Continue reading


@media.ccc.de | 4 years ago

36C3 Talk:It's not safe on the streets especially for your 3DS

The 3DS is reaching end of life but has not revealed all its weaknesses yet. This talk will go through the process of reverse engineering... | Continue reading


@media.ccc.de | 4 years ago

From Managerial Feudalism to the Revolt of the Caring Classes [video]

One apparent paradox of the digitisation of work is that while productivity in manufacturing is skyrocketing, productivity in caring prof... | Continue reading


@media.ccc.de | 4 years ago

TrustZone-M(eh): Breaking ARMv8-M's security [video]

Most modern embedded devices have something to protect: Whether it's cryptographic keys for your bitcoins, the password to your WiFi, ... | Continue reading


@media.ccc.de | 4 years ago

An ultrashort history of ultrafast imaging [video]

Did you ever wonder what happens in the time period it takes light to cross the diameter of your hair? This is the femtosecond, a million... | Continue reading


@media.ccc.de | 4 years ago

What we can and need to change to keep climate change low – the scientist view

This talk is to show the current state of the discussion on climate change and the necessary and possible changes from a scientific perpe... | Continue reading


@media.ccc.de | 4 years ago

Remotely Compromising an iPhone Through iMessage

So called “0-click” exploits, in which no user interaction is required to compromise a mobile device, have become a highly interesting to... | Continue reading


@media.ccc.de | 4 years ago

Intel Management Engine deep dive [video]

Reverse engineering a system on a chip from sparse documentation and binaries, developing an emulator from it and gathering the knowledge... | Continue reading


@media.ccc.de | 4 years ago

The KGB Hack: 30 Years Later

This spring marked the 30th anniversary of the public uncovering of the so-called KGB Hack, bringing with it a number of new articles rem... | Continue reading


@media.ccc.de | 4 years ago

The Case for Scale in Cyber Security [video]

The impact of scale in our field has been enormous and it has transformed the tools, the jobs and the face of the Infosec community. In t... | Continue reading


@media.ccc.de | 4 years ago

Hack_Curio: Decoding the Cultures of Hacking One Video at a Time [video]

Hacking and hackers can be hard to visualize. In the popular imagination, the figure alternates between a menacing, hooded figure or some... | Continue reading


@media.ccc.de | 4 years ago

Mathematical diseases in climate models and how to cure them

Making climate predictions is extremely difficult because climate models cannot simulate every cloud particle in the atmosphere and every... | Continue reading


@media.ccc.de | 4 years ago

Inside The Fake Like Factories

This talk investigates the business of fake likes and fake accounts: In a world, where the number of followers, likes, shares and views a... | Continue reading


@media.ccc.de | 4 years ago

Tales of Old: Untethering iOS 11

This talk is about running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up... | Continue reading


@media.ccc.de | 4 years ago

(Post-Quantum) Isogeny Cryptography

There are countless post-quantum buzzwords to list: lattices, codes, multivariate polynomial systems, supersingular elliptic curve isogen... | Continue reading


@media.ccc.de | 4 years ago

Open Source Is Insufficient to Solve Trust Problems in Hardware

While open source is necessary for trustable hardware, it is far from sufficient. This is because “hashing” hardware – verifying its cons... | Continue reading


@media.ccc.de | 4 years ago

The Ultimate Acorn Archimedes talk

This talk will cover everything about the Acorn Archimedes, a British computer first released in 1987 and (slightly) famous for being the... | Continue reading


@media.ccc.de | 4 years ago

What's left for private messaging? [video]

It is easier to chat online securely today than it ever has been. Widespread adoption of signal, wire, and the private mode of WhatsApp h... | Continue reading


@media.ccc.de | 4 years ago

36C3 Talk: Reducing carbon footprint of network services with MirageOS

Is the way we run services these days sustainable? The trusted computing base -- the lines of code where, if a flaw is discovered, jeopar... | Continue reading


@media.ccc.de | 4 years ago

Governments have tried to block Tor (2011)

Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January2011 and September 2011. Bluecoat tested out a Tor handshake fi... | Continue reading


@media.ccc.de | 4 years ago

State of the Map 2019 – recordings from the largest OpenStreetMap conference

Continue reading


@media.ccc.de | 4 years ago

Reinventing Home Directories

Let's bring the UNIX concept of Home Directories into the 21st century.The concept of home directories on Linux/UNIX has little changed... | Continue reading


@media.ccc.de | 4 years ago

Fast Global Internet Scanning – Challenges and New Approaches

Current search engines such as censys or shodan give everyone an insight into the global Internet. Unfortunately, they don't provide a co... | Continue reading


@media.ccc.de | 4 years ago

SS7: You have a tracking device in your pocket (2014) [video]

Companies are now selling the ability to track your phone number whereever you go. With a precision of up to 50 meters, detailed movement... | Continue reading


@media.ccc.de | 4 years ago

Fun with Foreign Data Wrappers (FDW) and PostgreSQL

With Foreign Data Wrappers (FDW) you can access remote objects from SQL databases. This feature is part of the SQL/MED (SQL Management of... | Continue reading


@media.ccc.de | 4 years ago

Purism CTO Presents “A Mobile Phone That Respects Your Freedom” at CCCamp[video]

Motivation and challenges building a mobile phone that respects your freedom, privacy and digital rights - and is hackable. This talk wil... | Continue reading


@media.ccc.de | 4 years ago

How to build a open phone that respects your freedom. CCCamp2019

Motivation and challenges building a mobile phone that respects your freedom, privacy and digital rights - and is hackable. This talk wil... | Continue reading


@media.ccc.de | 4 years ago