2 Takte später

Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S)... Ethics, Society & Politics m.eik

bruder

Against Metadata

Using case studies of documentary film, Freedom of Information Law document... Art & Beauty Robert M Ochshorn

Android DDI

As application security becomes more important on Android we need better... Security & Safety Collin Mulliner

An introduction to Firmware Analysis

This talk gives an introduction to firmware analysis: It starts with how to... Security & Safety Stefan Widmann

Attacking HomeMatic

HomeMatic is a good working, inexpensive and quickly spreading home... Security & Safety sathya

Malli

Barbnerdy

BarbNerdy is not only nerdy in finding great music all over the places, she... Entertainment

Basics of Digital Wireless Communication

The aim of this talk is to give an understandable insight into wireless... Hardware & Making Clemens Hopfer

Überwachen und Sprache

Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch... Science & Engineering josch

BREACH in Agda

Software engineering is in a unsustainable state: software is mainly... Science & Engineering Nicolas Pouillard

Breaking Baryons

A light-hearted presentation about many aspects of particle accelerators like... Science & Engineering Michael Büker

Bug class genocide

Violation of memory safety is still a major source of vulnerabilities in... Security & Safety Andreas Bogk

Bullshit made in Germany

Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch... Ethics, Society & Politics Linus Neumann

Caayari

A Butoh Dance raising from the raw material portraying the mitology of Mate! Entertainment oinfiltrado23@googlemail.com

Calafou, postcapitalist ecoindustrial community

Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around... Science & Engineering acracia

calc.pw

Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter... Hardware & Making Kenneth Newwood

Coding your body

The average movement habits of a clichè hacker are legendary. Cowering for... Science & Engineering Sophie Hiltner

Concepts for global TSCM

After studying the various levels of activities that come together in... Ethics, Society & Politics andy

CounterStrike

Lawful Interception is a monitoring access for law enforcement agencies, but... Security & Safety FX

Das FlipDot-Projekt

Inbetriebnahme alter Flip-Dot-Anzeigemodule eines Autobahn-Parkleitsystems... Hardware & Making RFguy

Data Mining for Good

For over thirty years, human rights groups in Guatemala have carefully... Ethics, Society & Politics Patrick

Dead Man Edition

Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z.... Ethics, Society & Politics Sebastian Jekutsch

Decoder

DATE TBC! DECODER is a legendary German film from 1984, based on the... Entertainment Klaus Maeck

Der tiefe Staat

Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der... Ethics, Society & Politics Andreas Lehner

Desperately Seeking Susy

Supersymmetry has been particle theorists' favorite toy for several decades.... Science & Engineering atdotde

Die Drohnenkriege

Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen... Ethics, Society & Politics Norbert Schepers

Disclosure DOs, Disclosure DON'Ts

This talk will focus on responsible disclosure best and worst practices from... Ethics, Society & Politics Nate Cardozo

Do You Think That's Funny?

This lecture shall give a first person account of how circumstances have... Art & Beauty lizvlx

Drones

During the last 10 years the technology that was formerly only available to... Science & Engineering Piotr Esden-Tempski

Electronic Bank Robberies

This talk will discuss a case in which criminals compromised and robbed an... Security & Safety tw

sb

ENKIs vergessene Kinder

Die Enki ist ein Raumschiff, dass ungefähr 15.000 Menschen fasst und auf der... Entertainment monoxyd

Firmware Fat Camp

We present a collection of techniques which aim to automagically remove... Security & Safety angcui

Fnord News Show

Im Format einer lockeren Abendshow werden wir die Highlights des Jahres... Entertainment Fefe

frank

Fnord News Show

Im Format einer lockeren Abendshow werden wir die Highlights des Jahres... Entertainment frank

Fefe

Forbidden Fruit

Various dietary restrictions are historically associated with human culture... Art & Beauty Joe Davis

FPGA 101

In this talk I want to show you around in the mysterious world of Field... Hardware & Making Karsten Becker

Glass Hacks

A one hour technical lecture that covers everything from machine learning and... Science & Engineering Stephen Balaban

Googlequiz

Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit... Entertainment Jöran Muuß-Merholz

Gestatten

it4n6

Hacker Jeopardy

The Hacker Jeopardy is a quiz show. Entertainment Sec

Ray

HbbTV Security

HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is... Security & Safety Martin Herfurt

Hello World!

USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum... Art & Beauty Aram Bartholl

How to Build a Mind

A foray into the present, future and ideas of Artificial Intelligence. Are we... Science & Engineering Joscha

Human Rights and Technology

This talk aims to shed some light on recent human rights violations in the... Ethics, Society & Politics Seb

IFGINT

Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger... Ethics, Society & Politics Stefan Wehrmeyer

India's Surveillance State

India is currently implementing some of the scariest surveillance schemes in... Ethics, Society & Politics Maria Xynou

Introduction to Processor Design

This lecture gives an introduction to processor design. It is mostly... Hardware & Making byterazor

Kryptographie nach Snowden

Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit... Security & Safety ruedi

lasers in space

This talk will give an introduction on lasers and space and it will show the... Science & Engineering anja

Life Without Life

From the mind of teenager, this short story briefly recounts the tale of an... Entertainment Raja Oueis

Long Distance Quantum Communication

This talk should introduce the general 30c3 participant with several... Science & Engineering C B

Magic Lantern

We present Magic Lantern, a free open software add-on for Canon DSLR cameras,... Hardware & Making Michael Zöller

Making machines that make

Making a new control system for a machine is often a slow and tedious task.... Hardware & Making Nadya Peek

My journey into FM-RDS

How I discovered mysterious hidden signals on a public radio channel and... Hardware & Making Oona Räisänen

Nerds in the news

Knight-Mozilla OpenNews sends coders into news organisations on a ten-month... Ethics, Society & Politics Friedrich Lindenberg

Nie Low

Hello hello, Mein Name ist Niloufar Behradi-Ohnacker und lege unter den... Entertainment

Opening Event

Introductory event to say hello to everybody, give a brief overview of the... CCC Tim Pritlove

Open source experimental incubator build up

This is a call for participation in a project aimed to build up an open... Hardware & Making Frantisek Algoldor Apfelbeck

Perfect Paul

The facial hacking research presented in this lecture/ performance exploits a... Art & Beauty artelse

Plants & Machines

Did you ever feel the need to be in charge of your environment? We did . A... Hardware & Making mrv

bbuegler

Policing the Romantic Crowd

This talk considers the use of new technology to police large crowds in the... Ethics, Society & Politics MaTu

Programming FPGAs with PSHDL

Learning to program an FPGA is time consuming. Not just do you need to... Hardware & Making Karsten Becker

Recht auf Remix

Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon... Ethics, Society & Politics Leonhard Dobusch

RFID Treehouse of Horror

In this lecture, we present a black-box analysis of an electronic... Security & Safety Adrian Dabrowski

SCADA StrangeLove 2

SCADA StrangeLove team will present their research on ICS systems for the... Security & Safety repdet

sgordey

Security Nightmares

Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... Entertainment frank

Ron

Security Nightmares

Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... Entertainment

Security of the IC Backside

In the chain of trust of most secure schemes is an electronic chip that holds... Security & Safety nedos

Sim Gishel

Sim Gishel is a multimedia robot. He sings and dances on request. He will try... Art & Beauty Karl Heinz Jeron

Technomonopolies

We all know monopolies are bad. We even have laws against them that sometimes... Ethics, Society & Politics rysiek

The ArduGuitar

The <a href="http://www.arduguitar.org">ArduGuitar</a> is an electric guitar... Hardware & Making gratefulfrog

The Four Wars

Based on her own experiences as an Intelligence Officer for MI5 (the UK... Ethics, Society & Politics Annie Machon

The GNU Name System

DNS, DNSSEC and the X.509 CA system leak private information about users to... Security & Safety grothoff

The philosophy of hacking

Modern society's use of technology as an instrument for domination is deeply... Art & Beauty groente

The Tor Network

Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network... Ethics, Society & Politics Jacob

arma

Through a PRISM, Darkly

From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying... Ethics, Society & Politics Kurt Opsahl

Toward a Cognitive "Quantified Self"

The talk gives an overview about our work of quantifying knowledge... Science & Engineering Kai

Towards an affordable brain-computer-interface

The brain can be understood as a highly specialized information processing... Science & Engineering Dominic

Anne

Turing Complete User

With the disappearance of the computer, something else is silently becoming... Art & Beauty olia lialina

WarGames in memory

Memory corruption has been around forever but is still one of the most... Security & Safety gannimo

We only have one earth

An abundant number of existential risks threatens humanity. Many of those... Science & Engineering Drahflow

When Words Dance

Held at the end of the conference, this performance will embody my personal... Entertainment Sara Sibai

White-Box Cryptography

The goal of white-box cryptography is to protect cryptographic keys in a... Security & Safety Dmitry Khovratovich

World War II Hackers

The use of encryption to secure sensitive data from unauthorized eyes is as... Ethics, Society & Politics Anja Drephal