Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Beide Seiten der vorigen RevisionVorhergehende ÜberarbeitungNächste Überarbeitung | Vorhergehende Überarbeitung | ||
project:videoabende [07.01.2014 22:55] – Links repariert schmofu | project:videoabende [28.06.2015 13:23] (aktuell) – [30C3] wolfgang | ||
---|---|---|---|
Zeile 4: | Zeile 4: | ||
Liste der Vorträge, schon angeschaute sind durchgestrichen. | Liste der Vorträge, schon angeschaute sind durchgestrichen. | ||
+ | |||
+ | ==== 31C3 ==== | ||
==== 30C3 ==== | ==== 30C3 ==== | ||
Zeile 27: | Zeile 29: | ||
* Rock' em Graphic Cards | * Rock' em Graphic Cards | ||
* Policing the Romantic Crowd | * Policing the Romantic Crowd | ||
- | * 30c3 Keynote | + | * |
* Hardening hardware and choosing a #goodBIOS | * Hardening hardware and choosing a #goodBIOS | ||
- | * Toward a Cognitive & | + | * |
* Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array | * Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array | ||
* Console Hacking 2013 | * Console Hacking 2013 | ||
- | * Der Kampf um Netzneutralität | + | * |
- | * Forbidden Fruit | + | * |
* Firmware Fat Camp | * Firmware Fat Camp | ||
* Sim Gishel | * Sim Gishel | ||
Zeile 72: | Zeile 74: | ||
* Perfect Paul | * Perfect Paul | ||
* Introduction to Processor Design | * Introduction to Processor Design | ||
- | * Calafou, postcapitalist ecoindustrial community | + | * |
* Art of the Exploit: An Introduction to Critical Engineering | * Art of the Exploit: An Introduction to Critical Engineering | ||
* Disclosure DOs, Disclosure DON'Ts | * Disclosure DOs, Disclosure DON'Ts | ||
Zeile 79: | Zeile 81: | ||
* FPGA 101 | * FPGA 101 | ||
* Against Metadata | * Against Metadata | ||
- | * Anonymity and Privacy in Public Space and on the Internet | + | * |
* My journey into FM-RDS | * My journey into FM-RDS | ||
* The Pirate Cinema | * The Pirate Cinema | ||
Zeile 91: | Zeile 93: | ||
* Backdoors, Government Hacking and The Next Crypto Wars | * Backdoors, Government Hacking and The Next Crypto Wars | ||
* Trezor: Bitcoin hardware wallet | * Trezor: Bitcoin hardware wallet | ||
- | * Jahresrückblick des CCC | + | * |
- | * Mind-Hacking mit Psychedelika | + | * |
* Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit | * Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit | ||
* Keine Anhaltspunkte für flächendeckende Überwachung | * Keine Anhaltspunkte für flächendeckende Überwachung | ||
Zeile 103: | Zeile 105: | ||
* Extracting keys from FPGAs, OTP Tokens and Door Locks | * Extracting keys from FPGAs, OTP Tokens and Door Locks | ||
* Das FlipDot-Projekt | * Das FlipDot-Projekt | ||
- | * [[https:// | + | * <del>[[https:// |
* Die Drohnenkriege | * Die Drohnenkriege | ||
* Warum die Digitale Revolution des Lernens gescheitert ist. | * Warum die Digitale Revolution des Lernens gescheitert ist. | ||
Zeile 117: | Zeile 119: | ||
* < | * < | ||
* Opening Event | * Opening Event | ||
- | * The Internet (Doesn' | + | * |
* BREACH in Agda | * BREACH in Agda | ||
* Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware | * Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware | ||
Zeile 127: | Zeile 129: | ||
* 07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade | * 07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade | ||
* Baseband Exploitation in 2013 | * Baseband Exploitation in 2013 | ||
- | * Hacker Jeopardy | + | * |
* Glass Hacks | * Glass Hacks | ||
* Hardware Attacks, Advanced ARM Exploitation, | * Hardware Attacks, Advanced ARM Exploitation, | ||
* < | * < | ||
- | * Fnord News Show | + | * |
* The Year in Crypto | * The Year in Crypto | ||
* 25 Jahre Chipkarten-Angriffe | * 25 Jahre Chipkarten-Angriffe | ||
Zeile 137: | Zeile 139: | ||
* Seeing The Secret State: Six Landscapes | * Seeing The Secret State: Six Landscapes | ||
* The Exploration and Exploitation of an SD Memory Card | * The Exploration and Exploitation of an SD Memory Card | ||
- | * Even More Tamagotchis Were Harmed in the Making of this Presentation | + | * |
* Sysadmins of the world, unite! | * Sysadmins of the world, unite! | ||
* CounterStrike | * CounterStrike | ||
* Thwarting Evil Maid Attacks | * Thwarting Evil Maid Attacks | ||
* Do You Think That's Funny? | * Do You Think That's Funny? | ||
- | * Closing Event | + | * |
==== 29C3 ==== | ==== 29C3 ==== |