Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Nächste Überarbeitung | Vorhergehende Überarbeitung | ||
project:videoabende [06.02.2013 20:59] – angelegt ebrnd | project:videoabende [28.06.2015 13:23] (aktuell) – [30C3] wolfgang | ||
---|---|---|---|
Zeile 1: | Zeile 1: | ||
- | ====== | + | ====== |
- | Wir wollen uns Freitags | + | Ab und zu, vor der Hacknight, oder an einem Seminarabend mit nichtverfügbarem Seminar, oder mal so Freitags, werden |
- | ===== Ablauf ===== | + | Liste der Vorträge, schon angeschaute sind durchgestrichen. |
- | Es wird ein Vortrag gezeigt, danach ist je nach Stimmung eine lockere Diskussionsrunde oder generelles Quatschen angesagt. | + | ==== 31C3 ==== |
- | ===== Programm ===== | + | ==== 30C3 ==== |
- | (noch festzulegen) | + | Wo Links fehlen: siehe [[https:// |
- | Vorschläge bitte per Mail an [[chaos@ebrnd.de|eBrnd]], oder direkt | + | * Triggering Deep Vulnerabilities Using Symbolic Execution |
+ | * lasers in space | ||
+ | * 10 Years of Fun with Embedded Devices | ||
+ | * Seidenstraße | ||
+ | * Electronic Bank Robberies | ||
+ | * Long Distance Quantum Communication | ||
+ | * Überwachen und Sprache | ||
+ | * Der tiefe Staat | ||
+ | * Reverse engineering of CHIASMUS from GSTOOL | ||
+ | * IFGINT | ||
+ | * Basics of Digital Wireless Communication | ||
+ | * Kryptographie nach Snowden | ||
+ | * [[https:// | ||
+ | * The GNU Name System | ||
+ | * An introduction to Firmware Analysis | ||
+ | * Magic Lantern | ||
+ | * Rock' em Graphic Cards | ||
+ | * Policing the Romantic Crowd | ||
+ | * < | ||
+ | * Hardening hardware and choosing a #goodBIOS | ||
+ | * < | ||
+ | * Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array | ||
+ | * Console Hacking 2013 | ||
+ | * < | ||
+ | * < | ||
+ | * Firmware Fat Camp | ||
+ | * Sim Gishel | ||
+ | * Fast Internet-wide Scanning and its Security Applications | ||
+ | * Hello World! | ||
+ | * We only have one earth | ||
+ | * EUDataP: State of the Union | ||
+ | * Open source experimental incubator build up | ||
+ | * < | ||
+ | * Hacking as Artistic Practice | ||
+ | * SCADA StrangeLove 2 | ||
+ | * Plants & Machines | ||
+ | * Turing Complete User | ||
+ | * HbbTV Security | ||
+ | * Programming FPGAs with PSHDL | ||
+ | * Revisiting & | ||
+ | * Bug class genocide | ||
+ | * Y U NO ISP, taking back the Net | ||
+ | * [[https:// | ||
+ | * The ArduGuitar | ||
+ | * Towards an affordable brain-computer-interface | ||
+ | * #SOPA, #NSA, and the New Internet & | ||
+ | * Nerds in the news | ||
+ | * How to Build a Mind | ||
+ | * Europe, the USA and Identity Ecosystems | ||
+ | * RFID Treehouse of Horror | ||
+ | * Recht auf Remix | ||
+ | * White-Box Cryptography | ||
+ | * calc.pw | ||
+ | * Structuring open hardware projects | ||
+ | * 2 Takte später | ||
+ | * ID Cards in China: Your Worst Nightmare | ||
+ | * Drones | ||
+ | * Android DDI | ||
+ | * Lightning Talks, Day 3 | ||
+ | * Building a safe NFC ticketing system | ||
+ | * [[https:// | ||
+ | * Perfect Paul | ||
+ | * Introduction to Processor Design | ||
+ | * < | ||
+ | * Art of the Exploit: An Introduction to Critical Engineering | ||
+ | * Disclosure DOs, Disclosure DON' | ||
+ | * < | ||
+ | * India' | ||
+ | * FPGA 101 | ||
+ | * Against Metadata | ||
+ | * < | ||
+ | * My journey into FM-RDS | ||
+ | * The Pirate Cinema | ||
+ | * WarGames in memory | ||
+ | * Reverse engineering the Wii U Gamepad | ||
+ | * Lightning Talks, Day 2 | ||
+ | * Technomonopolies | ||
+ | * Making machines that make | ||
+ | * X Security | ||
+ | * Virtually Impossible: The Reality Of Virtualization Security | ||
+ | * Backdoors, Government Hacking and The Next Crypto Wars | ||
+ | * Trezor: Bitcoin hardware wallet | ||
+ | * < | ||
+ | * < | ||
+ | * Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit | ||
+ | * Keine Anhaltspunkte für flächendeckende Überwachung | ||
+ | * Mobile network attack evolution | ||
+ | * The Tor Network | ||
+ | * < | ||
+ | * The Gospel of IRMA | ||
+ | * Hacking the Czech Parliament via SMS | ||
+ | * World War II Hackers | ||
+ | * Extracting keys from FPGAs, OTP Tokens and Door Locks | ||
+ | * Das FlipDot-Projekt | ||
+ | * < | ||
+ | * Die Drohnenkriege | ||
+ | * Warum die Digitale Revolution des Lernens gescheitert ist. | ||
+ | * THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE | ||
+ | * Infrastructure Review | ||
+ | * Human Rights and Technology | ||
+ | * Dead Man Edition | ||
+ | * Attacking HomeMatic | ||
+ | * Through a PRISM, Darkly | ||
+ | * The philosophy of hacking | ||
+ | * 30C3_-_5713_-_en_-_saal_2_-_201312301130_-_to_protect_and_infect_part_2_-_jacob | ||
+ | * Concepts for global TSCM | ||
+ | * < | ||
+ | * Opening Event | ||
+ | * < | ||
+ | * BREACH in Agda | ||
+ | * Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware | ||
+ | * Beyond the Tech: Building Internet Freedom Tools for Real People | ||
+ | * Lightning Talks, Day 4 | ||
+ | * The good, the bad, and the ugly - Linux Kernel patches | ||
+ | * Data Mining for Good | ||
+ | * < | ||
+ | * 07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade | ||
+ | * Baseband Exploitation in 2013 | ||
+ | * < | ||
+ | * Glass Hacks | ||
+ | * Hardware Attacks, Advanced ARM Exploitation, | ||
+ | * < | ||
+ | * < | ||
+ | * The Year in Crypto | ||
+ | * 25 Jahre Chipkarten-Angriffe | ||
+ | * Security of the IC Backside | ||
+ | * Seeing The Secret State: Six Landscapes | ||
+ | * The Exploration and Exploitation of an SD Memory Card | ||
+ | * < | ||
+ | * Sysadmins of the world, unite! | ||
+ | * CounterStrike | ||
+ | * Thwarting Evil Maid Attacks | ||
+ | * Do You Think That's Funny? | ||
+ | * < | ||
- | Bisher eingegangene Vorschläge (in keiner besonderen Reihenfolge): | + | ==== 29C3 ==== |
+ | Wo Links fehlen: siehe [[https:// | ||
* Faire IT | * Faire IT | ||
* MR-808 – Marvin und der Blues | * MR-808 – Marvin und der Blues | ||
Zeile 32: | Zeile 166: | ||
* 29c3-5179-de-en-hacking_philosophy | * 29c3-5179-de-en-hacking_philosophy | ||
* 29c3-5270-de-en-hanussens_mindreading | * 29c3-5270-de-en-hanussens_mindreading | ||
- | * Hacker-Jeopardy | ||
- | Natürlich wurden auch Lightning Talks vorgeschlagen. Die sind aber weniger zum am-Stück-ansehen geeignet. Fühlt sich jemand berufen, die mal alle durchzusehen und einen 45 bis 90-Minütigen Best-Of-Zusammenschnitt anzufertigen? | + | ==== sonstige Videos/ |
+ | |||
+ | * TPB/AFK (Dokumentarfilm über Pirate Bay) | ||
+ | * A Scanner Darkly |