27C3 Keynote
Abschlussveranstaltung
A Critical Overview of 10 years of Privacy Enhancing Technologies
Adventures in analyzing Stuxnet
Adventures in Mapping Afghanistan Elections
The story of 3 Ushahidi mapping and reporting projects.
A framework for automated architecture-independent gadget search
AllColoursAreBeautiful
Analyzing a modern cryptographic RFID system
Android geolocation using GSM network
A short political history of acoustics
Automatic Identification of Cryptographic Primitives in Software
Building Custom Disassemblers
CCC-Jahresrückblick 2010
Chip and PIN is Broken
Code deobfuscation by optimization
Cognitive Psychology for Hackers
Console Hacking 2010
Contemporary Profiling of Web Users
Copyright Enforcement Vs. Freedoms
Cybernetics for the Masses
Data Analysis in Terabit Ethernet Traffic
Data Recovery Techniques
Data Retention in the EU five years after the Directive
Defense is not dead
Desktop on the Linux… (and BSD, of course)
„Die gesamte Technik ist sicher“
Digitale Spaltung per Gesetz
Distributed FPGA Number Crunching For The Masses
DIY synthesizers and sound generators
Eins, zwei, drei - alle sind dabei
File -> Print -> Electronics
Fnord-Jahresrückblick 2010
Friede sei mit Euren Daten
From robot to robot
FrozenCache
Hacker Jeopardy
Hackers and Computer Science
Hacking iButtons
hacking smart phones
Having fun with RTP
High-speed high-security cryptography: encrypting and authenticating the whole Internet
How the Internet sees you
Ich sehe nicht, dass wir nicht zustimmen werden
I Control Your Code
Ignorance and Peace Narratives in Cyberspace
IMMI, from concept to reality
INDECT - an EU-Surveillance Project
International Cyber Jurisdiction
Is the SSLiverse a safe place?
JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
Lightning Talks - Day 2
Lightning Talks - Day 3
Lightning Talks - Day 4
Literarischer Abend
Logikschaltungen ohne Elektronik
Lying To The Neighbours
Netzmedienrecht, Lobbyismus und Korruption
Netzneutralität und QoS - ein Widerspruch?
News Key Recovery Attacks on RC4/WEP
Node.js as a networking tool
-
Part-Time Scientists
Pentanews Game Show
Radio der Zukunft
Recent advances in IPv6 insecurities
Reverse Engineering a real-world RFID payment system
Reverse Engineering the MOS 6502 CPU
Rootkits and Trojans on Your SAP Landscape
Running your own GSM stack on a phone
Safety on the Open Sea
Secure communications below the hearing threshold
Security Nightmares
SIP home gateways under fire
SMS-o-Death
Spinning the electronic Wheel
„Spoilers, Reverse Green, DECEL!“ or „What's it doing now?“
Stanislaw Lem - Der enttäuschte Weltverbesserer
Techniken zur Identifizierung von Netzwerk-Protokollen
Terrorists Win - Exploiting Telecommunications Data Retention?
The Baseband Apocalypse
„The Concert“
The Hidden Nemesis
The importance of resisting Excessive Government Surveillance
Three jobs that journalists will do in 2050
Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth
USB and libusb
Von Zensursula über Censilia hin zum Kindernet
Whistleblowing
Wideband GSM Sniffing
Wikileaks und mehr
Your Infrastructure Will Kill You
Zero-sized heap allocations vulnerability analysis