Exploring fraud in telephony networks

Telephone networks form the oldest large scale network that has grown totouch over 7 billion people. Telephony is now merging many compl... | Continue reading


@media.ccc.de | 5 years ago

The nextpnr FOSS FPGA place-and-route tool

Project IceStorm provides the first end-to-end open source FPGA toolchain, was originally presented at 32c3, and only targetted Lattice i... | Continue reading


@media.ccc.de | 5 years ago

Internet infrastructure transition in Crimea after Russian annexation

This lecture tells the story of Internet infrastructure transformations in Crimea, the peninsula disputed between Russia and Ukraine betw... | Continue reading


@media.ccc.de | 5 years ago

Election Cybersecurity Progress Report – Will the U.S. be ready for 2020?

Recent attacks against elections in the U.S. and Europe demonstrate that nation-state attackers are becoming more aggressive, even as cam... | Continue reading


@media.ccc.de | 5 years ago

Citzens or subjects? The battle to control our bodies, speech and communications

Technology is the solution: What is the problem? This seems to be the motto. Algorithms may be about to control our free speech while t... | Continue reading


@media.ccc.de | 5 years ago

Modchips of the State Hardware implants in the supply-chain

Hardware implants and supply chain attacks have been in the news recently, but how feasible are they and what can we do about them? In th... | Continue reading


@media.ccc.de | 5 years ago

Inside the AMD Microcode ROM

Microcode runs in most modern CPUs and translates the outer instruction set (e.g. x86) into a simpler form (usually a RISC architecture).... | Continue reading


@media.ccc.de | 5 years ago

Genome Editing with CRISPR/Cas[video]

CRISPR/Cas hat die Genforschung revolutioniert und könnte bald in großem Stil gentechnisch eingesetzt werden. Aber was ist CRISPR und wie... | Continue reading


@media.ccc.de | 5 years ago

Hacking the most popular cryptocurrency hardware wallets

In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectural,... | Continue reading


@media.ccc.de | 5 years ago

Hacking your network using a fax

We all know what FAX is, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018, right?But c... | Continue reading


@media.ccc.de | 5 years ago

The Precariat: A Disruptive Class for Disruptive Times

The combination of the ongoing technological revolution, globalisation and what are usually called 'neo-liberal' economic policies has ge... | Continue reading


@media.ccc.de | 5 years ago

Compromising online accounts by cracking voicemail systems

Voicemail systems can be compromised by leveraging old weaknesses and top of current technology. The impact goes way beyond having your m... | Continue reading


@media.ccc.de | 5 years ago

Hunting the Sigfox: Wireless IoT Network Security

Sigfox is an emerging low-power wide-area network (LP-WAN) technology for IoT devices, comparable t... | Continue reading


@media.ccc.de | 5 years ago

Scuttlebutt the decentralized P2P gossip protocol

In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P gossiping protocol, and how it can be transformative for so... | Continue reading


@media.ccc.de | 5 years ago

Censored Planet: A Global Censorship Observatory

Six years ago the idea behind CensoredPlanet started, that is now launched at censoredplanet.org. We had a simple (yet essential) guiding... | Continue reading


@media.ccc.de | 5 years ago

Taming the Chaos: Can we build systems that actually work?

We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us ev... | Continue reading


@media.ccc.de | 5 years ago

Tearing down paywalls in scholarly communication

Restricting access to knowledge and science is not beneficial for society. So why are scientific results still locked up behind paywalls?... | Continue reading


@media.ccc.de | 5 years ago

LibreSilicon: Decentralizing semiconductor manufacturing

While a lot of projects are currently developing their own processors, mostly as open source in Verilog, VHDL or even Chisel, we miss the... | Continue reading


@media.ccc.de | 5 years ago

The Rocky Road to TLS 1.3 and Better Internet Encryption

Since a few months we have a new version of TLS, the most important encryption protocol on the Internet. From the vulnerabilities that cr... | Continue reading


@media.ccc.de | 5 years ago

The Social Credit System

The Chinese Social Credit System (SCS) has been discussed a lot in Western media. However, we do not know currently how the system that i... | Continue reading


@media.ccc.de | 5 years ago

SiliVaccine: North Korea's Weapon of Mass Detection

Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine is deployed widely and exclusively in the DPRK, and h... | Continue reading


@media.ccc.de | 5 years ago

Desktop Linux Platform Issues

TL;DR: Stop making "Desktop Linux" a moving target by agreeing on a minimal baseline that third-party application can take for granted to... | Continue reading


@media.ccc.de | 5 years ago

What makes processors fail – and how to prevent it

Modern processors are amazing devices: small, fast, low power and getting better with every generation.But the most amazing things about... | Continue reading


@media.ccc.de | 5 years ago

33C3: The Ultimate Game Boy Talk

The 8-bit Game Boy was sold between 1989 and 2003, but its architecture more closely resembles machines from the early 1980s, like the Co... | Continue reading


@media.ccc.de | 5 years ago

Predicting Crime in a Big Data World

Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect da... | Continue reading


@media.ccc.de | 5 years ago

Graphs, Drones and Phones: Social-Graphs for Drones in the War on Terror

The military use of Drones has profoundly changed warfare and is a central aspect of the globalized war on terror. The public debate incl... | Continue reading


@media.ccc.de | 5 years ago

The Assassination Grid: The Infrastructure and People Behind Drone Killings

As they say in the Air Force, ‚No comms no bombs‘, – A technician’s insight into the invisible networks governing military drones and th... | Continue reading


@media.ccc.de | 5 years ago