Last active
November 28, 2018 09:52
-
-
Save toto/19a66e911eda44766bfd to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Opening Event (5604) | |
2. Keynote (5056) | |
3. Fnord-Jahresrückblick (5036) | |
4. Methodisch inkorrekt! (4994) | |
5. Ten years after ‚We Lost The War‘ (4820) | |
6. (Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking (4039) | |
7. NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen (4030) | |
8. Safe Harbor (3866) | |
9. Building and Breaking Wireless Security (3799) | |
10. The exhaust emissions scandal („Dieselgate“) (3719) | |
11. Grundrechte gelten nicht im Weltall! (3590) | |
12. Jahresrückblick des CCC (3578) | |
13. Security Nightmares 0x10 (3437) | |
14. Shopshifting (3412) | |
15. Check your privileges! (3338) | |
16. Not Safe For Work (3249) | |
17. „Nach bestem Wissen und Gewissen“ – Floskeln in der Politik (3157) | |
18. Say hi to your new boss: How algorithms might soon control our lives. (3071) | |
19. Beyond your cable modem (3039) | |
20. Thunderstrike 2 (2928) | |
21. Let's Encrypt -- What launching a free CA looks like (2899) | |
22. Hardware-Trojaner in Security-Chips (2887) | |
23. The Great Train Cyber Robbery (2786) | |
24. Ein Abgrund von Landesverrat (2736) | |
25. Hacker Jeopardy (2725) | |
26. Quantenphysik und Kosmologie (2687) | |
27. Freak Show (2675) | |
28. Wie man einen Blackout verursacht (2636) | |
29. Crypto ist Abwehr, IFG ist Angriff! (2587) | |
30. What does Big Brother see, while he is watching? (2542) | |
31. The plain simple reality of entropy (2485) | |
32. How the Great Firewall discovers hidden circumvention servers (2482) | |
33. Das Zahnrad aus Fleisch (2449) | |
34. Internet Cube (2448) | |
35. Crypto Wars Part II (2395) | |
36. State of the Onion (2366) | |
37. Stromtankstellen – eine neue öffentliche Infrastruktur (2348) | |
38. rad1o++ (2341) | |
39. Intelexit (2338) | |
40. Logjam: Diffie-Hellman, discrete logs, the NSA, and you (2327) | |
41. Iridium Update (2323) | |
42. goto fail; (2312) | |
43. When hardware must „just work“ (2286) | |
44. Rowhammer.js: Root privileges for web apps? (2274) | |
45. Internet Landscapes (2274) | |
46. The Price Of Dissent (2267) | |
47. De-anonymizing Programmers (2251) | |
48. Towards (reasonably) trustworthy x86 laptops (2244) | |
49. Prediction and Control (2179) | |
50. Microsofts Windows 10 Botnet (2163) | |
51. Running your own 3G/3.5G network (2137) | |
52. Wie Jugendschutzprogramme nicht nur die Jugend schädigen (2112) | |
53. Tor onion services: more useful than you think (2110) | |
54. Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 (2099) | |
55. What is the value of anonymous communication? (2075) | |
56. Console Hacking (2066) | |
57. Lifting the Fog on Red Star OS (2038) | |
58. Maritime Robotics (2022) | |
59. 20 OSCILLATORS IN 20 MINUTES (2008) | |
60. The Perl Jam 2 (1986) | |
61. DDoS mitigation EPIC FAIL collection (1981) | |
62. Unpatchable (1966) | |
63. PQCHacks (1931) | |
64. Closing Event (1923) | |
65. QRtistry (1891) | |
66. libusb: Maintainer fail (1882) | |
67. PLC-Blaster (1864) | |
68. The architecture of a street level panopticon (1852) | |
69. Sicherheit von 125kHz Transpondern am Beispiel Hitag S (1835) | |
70. Vehicle2Vehicle Communication based on IEEE 802.11p (1822) | |
71. G’scheitern (1821) | |
72. Key-logger, Video, Mouse (1813) | |
73. Computational Meta-Psychology (1794) | |
74. Quantum Cryptography (1757) | |
75. When algorithms fail in our personal lives (1686) | |
76. On Computing Numbers, with an Application to Problems of our Society (1682) | |
77. Lessons learned: Freifunk für Geflüchtete (1641) | |
78. How hackers grind an MMORPG: by taking it apart! (1628) | |
79. All Our Shared Spectrum Are Belong to Us (1621) | |
80. Craft, leisure, and end-user innovation (1616) | |
81. Buffering sucks! (1616) | |
82. Österreich: Der Kampf gegen unkontrollierte Massenüberwachung (1592) | |
83. Reversing UEFI by execution (1589) | |
84. Katastrophe und Kommunikation (1584) | |
85. Media Coverage and the Public in the Surveillance Society (1581) | |
86. Breaking Honeypots for Fun and Profit (1579) | |
87. “I feel like a criminal and I have to be god at the same time” (1560) | |
88. 32C3 Infrastructure Review (1558) | |
89. Jugend hackt 2015 (1532) | |
90. Realitätsabgleich (1494) | |
91. Predicting Crime in a Big Data World (1492) | |
92. Logbuch:Netzpolitik (1483) | |
93. the possibility of an army (1459) | |
94. Evolution of Brain-Computer Interfaces (1452) | |
95. Replication Prohibited (1449) | |
96. 3D printing on the moon (1446) | |
97. Windows drivers attack surface (1431) | |
98. The state of Internet Censorship (1420) | |
99. Shooting lasers into space – for science! (1404) | |
100. A Dozen Years of Shellphish (1393) | |
101. One year of securitarian drift in France (1377) | |
102. Vector retrogaming (1376) | |
103. Top X* usability obstacles (1374) | |
104. (In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale (1336) | |
105. So you want to build a satellite? (1325) | |
106. Gibberish Detection 102 (1303) | |
107. My Robot Will Crush You With Its Soft Delicate Hands! (1301) | |
108. APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for (1292) | |
109. Dissecting VoLTE (1288) | |
110. The Ultimate Amiga 500 Talk (1285) | |
111. Graphs, Drones & Phones (1274) | |
112. A New Kid on the Block (1267) | |
113. Cyber all the Wassenaars (1239) | |
114. New memory corruption attacks: why can't we have nice things? (1236) | |
115. Free Software and Hardware bring National Sovereignty (1231) | |
116. Lightning Talks Day 2 (1225) | |
117. Datahavens from HavenCo to Today (1217) | |
118. Avoiding kernel panic: Europe’s biggest fails in digital policy-making (1217) | |
119. Verified Firewall Ruleset Verification (1209) | |
120. The Magic World of Searchable Symmetric Encryption (1195) | |
121. Beyond Anti Evil Maid (1177) | |
122. Die Asyl-Dialoge / The Asylum Dialogues (1174) | |
123. Net Neutrality in Europe (1163) | |
124. [email protected] (1146) | |
125. Public Library/Memory of the World (1099) | |
126. Trust us and our business will expand! (1091) | |
127. Sin in the time of Technology (1081) | |
128. The mummy unwrapped (1061) | |
129. Ecuador: how an authoritarian government is fooling the entire world (1055) | |
130. First Contact: Sendegate & Podcast-PatInnen (1033) | |
131. apertus° AXIOM (1028) | |
132. Household, Totalitarianism and Cyberspace (979) | |
133. CloudABI (977) | |
134. Mobile Censorship in Iran (972) | |
135. A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs (956) | |
136. Ling - High level system programming (945) | |
137. Technology and Mass Atrocity Prevention (935) | |
138. Genusscast: Live auf der Bühne mit Limonade (931) | |
139. Netzpolitik in der Schweiz (924) | |
140. re_cycle (918) | |
141. Collect It All: Open Source Intelligence (OSINT) for Everyone (918) | |
142. WMR on 32c3 (915) | |
143. "Fluxus cannot save the world." (907) | |
144. Technische Aufklärung live (905) | |
145. Sanitizing PCAPs (903) | |
146. Hacking EU funding for a decentralizing FOSS project (902) | |
147. Der Weisheit (884) | |
148. REXUS/BEXUS - Rocket and Balloon Experiments for University Students (832) | |
149. How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse). (832) | |
150. Lila Podcast (828) | |
151. Lightning Talks Day 3 (804) | |
152. Profiling (In)justice (787) | |
153. Software and business method patents: call for action (776) | |
154. Die Sendegate-Technikschau: Technik zeigen, ausprobieren, Spaß haben (715) | |
155. Nerd Emissionen (704) | |
156. Plunge into Proxy Politics (693) | |
157. anyca.st live - The Final Saufdown (642) | |
158. Wireless Drivers: Freedom considered harmful? (609) | |
159. CHINTERNET ART (600) | |
160. Lightning Talks Day 4 (597) | |
161. How to contribute to make open hardware happen (582) | |
162. Kulturpessimisten vs. The InSnider (565) | |
163. Compileroptimierungen für Forth im Microcontroller (529) | |
164. Übertragung "Methodisch Inkorrekt" (528) | |
165. #GOIBlocks - Technical observations about recent internet censorship in India (518) | |
166. Soziopod Jahresrückblick (505) | |
167. The InSnider: #32c3 – Mein erstes Mal Congress (477) | |
168. Maker Spaces in Favelas - Lecture (476) | |
169. Puerto Patida (427) | |
170. Ultraschall - der leichte Einstieg ins HighEnd Podcasting (403) | |
171. Fernostwärts (358) | |
172. Die goldene Zehn (345) | |
173. Unser Podcast soll schöner werden (326) | |
174. Jugend hackt 2015 - Projektvorstellungen (323) | |
175. Methodisch inkorrekt! (Live-Stream) (304) | |
176. Podcast-Experimente (253) | |
177. ABCoholics (246) | |
178. Geekstammtisch - Nerdkunde - Bits of Berlin Rudelpodcast (233) | |
179. Gruppentherapie (218) | |
180. Binärgewitter (197) | |
181. PodcastpatInnen (179) | |
182. Kooperation vom PodcastMeetUpHH mit Metercast, Lauschpod, open-dev u.v.m. (168) | |
183. Komfortrauschen (154) | |
184. import_this.de (150) | |
185. Sendungsbewusstsein (138) | |
186. aethermonolog (109) | |
187. Podlabor (106) | |
188. RadioOSM (100) | |
189. Radio Tux (94) | |
190. Freifunk Münster Podcast (61) | |
191. kern.punkto (51) | |
192. Rust Podcast (4) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment