Chaotic Congress Cinema Mannheim: Unterschied zwischen den Versionen
Silsha (Diskussion | Beiträge) |
|||
Zeile 56: | Zeile 56: | ||
=== Noch nicht vorgeführte Vorträge === | === Noch nicht vorgeführte Vorträge === | ||
{| class="wikitable" | {| class="wikitable" valign="top" | ||
!Titel | !Titel | ||
!Referent | !Referent | ||
!Zusammenfassung | !Zusammenfassung | ||
!Dauer | |||
!Sprache | !Sprache | ||
!Interessenten | !Interessenten | ||
|- | |- | ||
| [http://events.ccc.de/congress/2011/Fahrplan/events/4816.en.html 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles] | | [http://events.ccc.de/congress/2011/Fahrplan/events/4816.en.html 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles] | ||
| Bicyclemark | | Bicyclemark | ||
| 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. | | 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 72: | Zeile 74: | ||
| Travis Goodspeed | | Travis Goodspeed | ||
| 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 | | 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 78: | Zeile 81: | ||
| Robin Upton | | Robin Upton | ||
| A Brief History of Plutocracy | | A Brief History of Plutocracy | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 84: | Zeile 88: | ||
| Susanne Schultz, Uta Wagenmann | | Susanne Schultz, Uta Wagenmann | ||
| Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat | | Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 90: | Zeile 95: | ||
| Martin Wundram | | Martin Wundram | ||
| Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors | | Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors | ||
| 00H30M00S | |||
| German | | German | ||
| | | | ||
Zeile 96: | Zeile 102: | ||
| Bruhns, FX of Phenoelit, greg | | Bruhns, FX of Phenoelit, greg | ||
| Apple vs. Google Client Platforms- How you end up being the Victim. | | Apple vs. Google Client Platforms- How you end up being the Victim. | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 102: | Zeile 109: | ||
| Wes Faler | | Wes Faler | ||
| Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science | | Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 108: | Zeile 116: | ||
| Ninja / The Dreams | | Ninja / The Dreams | ||
| Behind the scenes of a C64 demo | | Behind the scenes of a C64 demo | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 114: | Zeile 123: | ||
| Helga Velroyen | | Helga Velroyen | ||
| Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology | | Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 120: | Zeile 130: | ||
| Kay Hamacher, Stefan Katzenbeisser | | Kay Hamacher, Stefan Katzenbeisser | ||
| Bitcoin - An Analysis | | Bitcoin - An Analysis | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 126: | Zeile 137: | ||
| Dan Kaminsky | | Dan Kaminsky | ||
| Black Ops of TCP/IP 2011 | | Black Ops of TCP/IP 2011 | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 132: | Zeile 144: | ||
| Andy Müller-Maguhn | | Andy Müller-Maguhn | ||
| BuggedPlanet- Surveillance Industry & Country's Actings | | BuggedPlanet- Surveillance Industry & Country's Actings | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 138: | Zeile 151: | ||
| Andreas -horn- Hornig, hadez | | Andreas -horn- Hornig, hadez | ||
| Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! | | Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 144: | Zeile 158: | ||
| Zoran Zaric | | Zoran Zaric | ||
| bup: Git for backups | | bup: Git for backups | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 150: | Zeile 165: | ||
| Stefan Katzenbeisser | | Stefan Katzenbeisser | ||
| Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen | | Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 156: | Zeile 172: | ||
| | | | ||
| CCC Camp 2011 Video Impressions- Reviving a nice summer dream | | CCC Camp 2011 Video Impressions- Reviving a nice summer dream | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 162: | Zeile 179: | ||
| Harald Welte | | Harald Welte | ||
| Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified | | Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 168: | Zeile 186: | ||
| Brenno de Winter | | Brenno de Winter | ||
| Changing techno-optimists by shaking up the bureaucrats | | Changing techno-optimists by shaking up the bureaucrats | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 174: | Zeile 193: | ||
| Ruben Bloemgarten | | Ruben Bloemgarten | ||
| ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime | | ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 180: | Zeile 200: | ||
| Frank Rieger | | Frank Rieger | ||
| Closing Event | | Closing Event | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 186: | Zeile 207: | ||
| Christian Bahls - MOGiS e.V., Jérémie Zimmermann | | Christian Bahls - MOGiS e.V., Jérémie Zimmermann | ||
| Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet | | Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 192: | Zeile 214: | ||
| Bastian Greshake, Philipp Bayer | | Bastian Greshake, Philipp Bayer | ||
| Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults | | Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 198: | Zeile 221: | ||
| Stefan Burschka | | Stefan Burschka | ||
| Datamining for Hackers- Encrypted Traffic Mining | | Datamining for Hackers- Encrypted Traffic Mining | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 204: | Zeile 228: | ||
| Yuval Adam | | Yuval Adam | ||
| Data Mining the Israeli Census- Insights into a publicly available registry | | Data Mining the Israeli Census- Insights into a publicly available registry | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 210: | Zeile 235: | ||
| Rene Meissner | | Rene Meissner | ||
| Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? | | Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 216: | Zeile 242: | ||
| klobs | | klobs | ||
| DC+, The Protocol- Technical defense against data retention law | | DC+, The Protocol- Technical defense against data retention law | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 222: | Zeile 249: | ||
| Michael Brennan, Rachel Greenstadt | | Michael Brennan, Rachel Greenstadt | ||
| Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry | | Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 228: | Zeile 256: | ||
| Karsten Nohl, Luca Melette | | Karsten Nohl, Luca Melette | ||
| Defending mobile phones | | Defending mobile phones | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 234: | Zeile 263: | ||
| Josephine Fischer, Tobias Naumann | | Josephine Fischer, Tobias Naumann | ||
| Demokratie auf Sächsisch | | Demokratie auf Sächsisch | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 240: | Zeile 270: | ||
| 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer | | 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer | ||
| Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation | | Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation | ||
| 02H15M00S | |||
| German | | German | ||
| | | | ||
Zeile 246: | Zeile 277: | ||
| maha/Martin Haase | | maha/Martin Haase | ||
| Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik | | Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 252: | Zeile 284: | ||
| Kai Denker | | Kai Denker | ||
| Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany | | Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 258: | Zeile 291: | ||
| Fabian Mihailowitsch | | Fabian Mihailowitsch | ||
| Don't scan, just ask- A new approach of identifying vulnerable web applications | | Don't scan, just ask- A new approach of identifying vulnerable web applications | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 264: | Zeile 298: | ||
| Cathrine Kramer, Zack Denfeld | | Cathrine Kramer, Zack Denfeld | ||
| Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes | | Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 270: | Zeile 305: | ||
| Falk Lüke, Markus Beckedahl | | Falk Lüke, Markus Beckedahl | ||
| Echtes Netz - Kampagne für Netzneutralität | | Echtes Netz - Kampagne für Netzneutralität | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 276: | Zeile 312: | ||
| Alexander alech Klink, Julian | zeri | | Alexander alech Klink, Julian | zeri | ||
| Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) | | Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 282: | Zeile 319: | ||
| Alexander Koch | | Alexander Koch | ||
| Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 | | Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 288: | Zeile 326: | ||
| Peio Popov | | Peio Popov | ||
| Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better | | Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 294: | Zeile 333: | ||
| Andreas Krisch | | Andreas Krisch | ||
| EU-Datenschutz und das Internet der Dinge | | EU-Datenschutz und das Internet der Dinge | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 300: | Zeile 340: | ||
| Andreas Krisch | | Andreas Krisch | ||
| EU-Datenschutz und das Internet der Dinge (english translation) | | EU-Datenschutz und das Internet der Dinge (english translation) | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 306: | Zeile 347: | ||
| Wes Faler | | Wes Faler | ||
| Evolving custom communication protocols- Hell Yeah, it's rocket science | | Evolving custom communication protocols- Hell Yeah, it's rocket science | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 312: | Zeile 354: | ||
| Felix von Leitner, Frank Rieger | | Felix von Leitner, Frank Rieger | ||
| Fnord-Jahresrückblick- von Atomendlager bis Zensus | | Fnord-Jahresrückblick- von Atomendlager bis Zensus | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 318: | Zeile 361: | ||
| Stefan Wehrmeyer | | Stefan Wehrmeyer | ||
| Frag den Staat- Praktische Informationsfreiheit | | Frag den Staat- Praktische Informationsfreiheit | ||
| 00H30M00S | |||
| German | | German | ||
| | | | ||
Zeile 324: | Zeile 368: | ||
| Reporters Without Borders | | Reporters Without Borders | ||
| From Press Freedom to the Freedom of information- Why every citizen should be concerned | | From Press Freedom to the Freedom of information- Why every citizen should be concerned | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 330: | Zeile 375: | ||
| Ray, Stefan 'Sec' Zehl | | Ray, Stefan 'Sec' Zehl | ||
| Hacker Jeopardy- Number guessing for geeks | | Hacker Jeopardy- Number guessing for geeks | ||
| 02H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 336: | Zeile 382: | ||
| | | | ||
| Hacker Jeopardy Translation | | Hacker Jeopardy Translation | ||
| 01H45M00S | |||
| English | | English | ||
| | | | ||
Zeile 342: | Zeile 389: | ||
| Andrei Costin | | Andrei Costin | ||
| Hacking MFPs- Part2 - PostScript: Um, you've been hacked | | Hacking MFPs- Part2 - PostScript: Um, you've been hacked | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 348: | Zeile 396: | ||
| Jacob Appelbaum, Roger Dingledine | | Jacob Appelbaum, Roger Dingledine | ||
| How governments have tried to block Tor | | How governments have tried to block Tor | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 354: | Zeile 403: | ||
| bunnie | | bunnie | ||
| Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key | | Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 360: | Zeile 410: | ||
| Sylvain Munaut | | Sylvain Munaut | ||
| Introducing Osmo-GMR- Building a sniffer for the GMR satphones | | Introducing Osmo-GMR- Building a sniffer for the GMR satphones | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 366: | Zeile 417: | ||
| Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger | | Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger | ||
| Jahresrückblick | | Jahresrückblick | ||
| 02H15M00S | |||
| German | | German | ||
| | | | ||
Zeile 372: | Zeile 424: | ||
| David Kim | | David Kim | ||
| KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera | | KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 378: | Zeile 431: | ||
| Nick Farr | | Nick Farr | ||
| Lightning Talks Day 2 | | Lightning Talks Day 2 | ||
| 02H15M00S | |||
| English | | English | ||
| | | | ||
Zeile 384: | Zeile 438: | ||
| Nick Farr | | Nick Farr | ||
| Lightning Talks Day 3- Pecha Kucha Round! | | Lightning Talks Day 3- Pecha Kucha Round! | ||
| 02H15M00S | |||
| English | | English | ||
| | | | ||
Zeile 390: | Zeile 445: | ||
| Nick Farr | | Nick Farr | ||
| Lightning Talks Day 4 | | Lightning Talks Day 4 | ||
| 02H15M00S | |||
| English | | English | ||
| | | | ||
Zeile 396: | Zeile 452: | ||
| Redbeard | | Redbeard | ||
| Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century | | Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 402: | Zeile 459: | ||
| Evgeny Morozov | | Evgeny Morozov | ||
| Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | | Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 408: | Zeile 466: | ||
| Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger | | Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger | ||
| "Neue Leichtigkeit"- when unconditional artistic freedom happens | | "Neue Leichtigkeit"- when unconditional artistic freedom happens | ||
| 01H30M00S | |||
| German | | German | ||
| | | | ||
Zeile 414: | Zeile 473: | ||
| Jesse Ou, Rich | | Jesse Ou, Rich | ||
| New Ways I'm Going to Hack Your Web App | | New Ways I'm Going to Hack Your Web App | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 420: | Zeile 480: | ||
| Kay, Will Hargrave | | Kay, Will Hargrave | ||
| NOC Review- NOC Review about the Camp 2011 and 28C3 | | NOC Review- NOC Review about the Camp 2011 and 28C3 | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 426: | Zeile 487: | ||
| Karsten Becker, Robert Böhme | | Karsten Becker, Robert Böhme | ||
| Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! | | Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 432: | Zeile 494: | ||
| Benjamin Kellermann, klobs | | Benjamin Kellermann, klobs | ||
| NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! | | NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 438: | Zeile 501: | ||
| pt | | pt | ||
| Ooops I hacked my PBX- Why auditing proprietary protocols matters | | Ooops I hacked my PBX- Why auditing proprietary protocols matters | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 444: | Zeile 508: | ||
| Tom Hargreaves | | Tom Hargreaves | ||
| Open source music: Tracking 2.0 | | Open source music: Tracking 2.0 | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 450: | Zeile 515: | ||
| Alien8, _john, klobs | | Alien8, _john, klobs | ||
| Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! | | Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! | ||
| 01H00M00S | |||
| English | | English | ||
| | |||
|- | |||
| [http://events.ccc.de/congress/2011/Fahrplan/events/4804.en.html Politik hacken] | |||
| Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger | |||
| Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation | |||
| 01H00M00S | |||
| German | |||
| | | | ||
|- | |- | ||
Zeile 456: | Zeile 529: | ||
| endrazine | | endrazine | ||
| Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes | | Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 462: | Zeile 536: | ||
| Gunnar Thöle, Jörg Dürre | | Gunnar Thöle, Jörg Dürre | ||
| Power gadgets with your own electricity- escape the basement and make the sun work for you | | Power gadgets with your own electricity- escape the basement and make the sun work for you | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 468: | Zeile 543: | ||
| Ang Cui, Jonathan Voris | | Ang Cui, Jonathan Voris | ||
| Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware | | Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 474: | Zeile 550: | ||
| Conrad Lee | | Conrad Lee | ||
| Privacy Invasion or Innovative Science?- Academia, social media data, and privacy | | Privacy Invasion or Innovative Science?- Academia, social media data, and privacy | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 480: | Zeile 557: | ||
| Christian Kleineidam, MetaMind Evolution | | Christian Kleineidam, MetaMind Evolution | ||
| Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers | | Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 486: | Zeile 564: | ||
| Robert Helling | | Robert Helling | ||
| Quantum of Science- How quantum information differs from classical | | Quantum of Science- How quantum information differs from classical | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 492: | Zeile 571: | ||
| lilafisch, Stefan 'Sec' Zehl | | lilafisch, Stefan 'Sec' Zehl | ||
| r0ket++- The CCC-Badge | | r0ket++- The CCC-Badge | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 498: | Zeile 578: | ||
| Kay Hamacher | | Kay Hamacher | ||
| Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | | Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 504: | Zeile 585: | ||
| Guillaume Delugré | | Guillaume Delugré | ||
| Reverse-engineering a Qualcomm baseband | | Reverse-engineering a Qualcomm baseband | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 510: | Zeile 592: | ||
| Drew Fisher | | Drew Fisher | ||
| Reverse Engineering USB Devices | | Reverse Engineering USB Devices | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 516: | Zeile 599: | ||
| Artur Janc | | Artur Janc | ||
| Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. | | Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 522: | Zeile 606: | ||
| Anne Roth | | Anne Roth | ||
| Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können | | Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 528: | Zeile 613: | ||
| Teague, Tiffany Rad | | Teague, Tiffany Rad | ||
| SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs | | SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 534: | Zeile 620: | ||
| Chris Kubecka | | Chris Kubecka | ||
| Security Log Visualization with a Correlation Engine- What's inside your network? | | Security Log Visualization with a Correlation Engine- What's inside your network? | ||
| 00H30M00S | |||
| English | | English | ||
| | | | ||
Zeile 540: | Zeile 627: | ||
| Frank Rieger, Ron | | Frank Rieger, Ron | ||
| Security Nightmares | | Security Nightmares | ||
| 01H00M00S | |||
| German | | German | ||
| | | | ||
Zeile 546: | Zeile 634: | ||
| Dario Carluccio, Stephan Brinkhaus | | Dario Carluccio, Stephan Brinkhaus | ||
| Smart Hacking For Privacy | | Smart Hacking For Privacy | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 552: | Zeile 641: | ||
| Peter Eckersley | | Peter Eckersley | ||
| Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC | | Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 558: | Zeile 648: | ||
| Mathias Payer | | Mathias Payer | ||
| String Oriented Programming- Circumventing ASLR, DEP, and Other Guards | | String Oriented Programming- Circumventing ASLR, DEP, and Other Guards | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 564: | Zeile 655: | ||
| Eric Filiol, Seun Omosowon | | Eric Filiol, Seun Omosowon | ||
| Taking control over the Tor network | | Taking control over the Tor network | ||
| 01H15M00S | |||
| English | | English | ||
| | | | ||
Zeile 570: | Zeile 662: | ||
| Sven Oliver ('SvOlli') Moll | | Sven Oliver ('SvOlli') Moll | ||
| The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs | | The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 576: | Zeile 669: | ||
| Simona Xnet | | Simona Xnet | ||
| The best of The oXcars- the greatest free/Libre culture show of all times | | The best of The oXcars- the greatest free/Libre culture show of all times | ||
| 01H00M00S | |||
| English | |||
| | |||
|- | |||
| [http://events.ccc.de/congress/2011/Fahrplan/events/4848.en.html The coming war on general computation] | |||
| Cory Doctorow | |||
| The coming war on general computation- The copyright war was just the beginning | |||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 582: | Zeile 683: | ||
| Aluc | | Aluc | ||
| The engineering part of social engineering- Why just lying your way in won't get you anywhere | | The engineering part of social engineering- Why just lying your way in won't get you anywhere | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 588: | Zeile 690: | ||
| Jean-Jacques Quisquater, Renaud Devaliere | | Jean-Jacques Quisquater, Renaud Devaliere | ||
| The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems | | The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 594: | Zeile 697: | ||
| Caspar Clemens Mierau | | Caspar Clemens Mierau | ||
| The Hack will not be televised?- Hacker in Movies | | The Hack will not be televised?- Hacker in Movies | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 600: | Zeile 704: | ||
| Bar, seda | | Bar, seda | ||
| The movements against state-controlled Internet in Turkey- A short account of its history and future challenges | | The movements against state-controlled Internet in Turkey- A short account of its history and future challenges | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 606: | Zeile 711: | ||
| Meredith L. Patterson, Sergey | | Meredith L. Patterson, Sergey | ||
| The Science of Insecurity | | The Science of Insecurity | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 612: | Zeile 718: | ||
| Sebastian Schinzel | | Sebastian Schinzel | ||
| Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web | | Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 618: | Zeile 725: | ||
| Suso Baleato | | Suso Baleato | ||
| Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. | | Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 624: | Zeile 732: | ||
| tilo | | tilo | ||
| TRESOR: Festplatten sicher verschlüsseln | | TRESOR: Festplatten sicher verschlüsseln | ||
| 00H30M00S | |||
| German | | German | ||
| | | | ||
Zeile 630: | Zeile 739: | ||
| Christoph Engemann | | Christoph Engemann | ||
| What is in a name?- Identity-Regimes from 1500 to the 2000s | | What is in a name?- Identity-Regimes from 1500 to the 2000s | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 636: | Zeile 746: | ||
| Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft | | Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft | ||
| What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. | | What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. | ||
| 01H00M00S | |||
| English | | English | ||
| | | | ||
Zeile 642: | Zeile 753: | ||
| Herr Urbach, willowbl00 | | Herr Urbach, willowbl00 | ||
| Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response | | Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response | ||
| 01H00M00S | |||
| English | | English | ||
| | | |
Version vom 10. April 2012, 05:20 Uhr
Chaotic Congress Cinema Mannheim Status: upcoming [box doku] | |
---|---|
Beschreibung | Geselliges konsumieren von 28C3 Vorträgen |
Ansprechpartner | Unicorn, blabber, silsha |
Tag und Uhrzeit | Donnerstag um ~20:00 Uhr |
Rhythmus | Wöchentlich |
Preis | Kostenlos |
Dieses Event wurde massiv von dem gleichnamigen Event des Attraktor in Hamburg inspiriert.
Chaotic Congress Cinema Mannheim
Jede Woche donnerstags findet gegen 20 Uhr im RaumZeitLabor Mannheim das Chaotic Congress Cinema Mannheim (kurz: CCC Mannheim) statt. In geselliger Runde werden jeweils zwei Vorträge, die auf dem 28C3 aufgezeichnet wurden, vorgeführt.
Der Eintritt ist kostenlos und jeder ist willkommen. Getränke, Popcorn, Pizza und Junkfood kann käuflich erworben werden.
Der freundliche Hackerspace von nebenan freut sich auf euren Besuch!
Programmgestaltung
Die Vorträge die vorgeführt werden, werden von den Gastgebern Unicorn, blabber und silsha bestimmt. Aus sicherer Quelle ist aber bekannt, dass die Beiden durch gutes Zureden und/oder Matezufuhr beeinflussbar sind. Ausserdem könnt ihr euch, falls euch ein bestimmter Vortrag interessiert, als Interessent in der unteren Tabelle eintragen.
Die Chancen das diese Einträge bei der Programmgestaltung berücksichtigt werden stehen ziemlich gut.
Das Programm für Donnerstag wird jeweils bei der vorangehenden Offene RaumZeitLaborierung und über die Mailingliste bekanntgegeben.
Upcoming
Als nächstes werden folgende Mitschnitte vorgeführt.
Titel | Referent | Zusammenfassung | Sprache |
---|---|---|---|
Politik hacken | Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger | Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation | German |
The coming war on general computation | Cory Doctorow | The coming war on general computation- The copyright war was just the beginning | English |
Noch nicht vorgeführte Vorträge
Titel | Referent | Zusammenfassung | Dauer | Sprache | Interessenten |
---|---|---|---|---|---|
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles | Bicyclemark | 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. | 01H00M00S | English | |
802.11 Packets in Packets | Travis Goodspeed | 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 | 01H00M00S | English | |
A Brief History of Plutocracy | Robin Upton | A Brief History of Plutocracy | 00H30M00S | English | |
Almighty DNA? | Susanne Schultz, Uta Wagenmann | Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat | 01H00M00S | German | |
Antiforensik | Martin Wundram | Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors | 00H30M00S | German | |
Apple vs. Google Client Platforms | Bruhns, FX of Phenoelit, greg | Apple vs. Google Client Platforms- How you end up being the Victim. | 01H00M00S | English | |
Automatic Algorithm Invention with a GPU | Wes Faler | Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science | 01H00M00S | English | |
Behind the scenes of a C64 demo | Ninja / The Dreams | Behind the scenes of a C64 demo | 01H00M00S | English | |
Bionic Ears | Helga Velroyen | Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology | 01H00M00S | English | |
Bitcoin - An Analysis | Kay Hamacher, Stefan Katzenbeisser | Bitcoin - An Analysis | 01H00M00S | English | |
Black Ops of TCP/IP 2011 | Dan Kaminsky | Black Ops of TCP/IP 2011 | 01H00M00S | English | |
BuggedPlanet | Andy Müller-Maguhn | BuggedPlanet- Surveillance Industry & Country's Actings | 01H00M00S | English | |
Building a Distributed Satellite Ground Station Network - A Call To Arms | Andreas -horn- Hornig, hadez | Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! | 01H00M00S | English | |
bup: Git for backups | Zoran Zaric | bup: Git for backups | 00H30M00S | English | |
Can trains be hacked? | Stefan Katzenbeisser | Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen | 01H00M00S | German | |
CCC Camp 2011 Video Impressions | CCC Camp 2011 Video Impressions- Reviving a nice summer dream | 01H00M00S | English | ||
Cellular protocol stacks for Internet | Harald Welte | Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified | 01H00M00S | English | |
Changing techno-optimists by shaking up the bureaucrats | Brenno de Winter | Changing techno-optimists by shaking up the bureaucrats | 01H00M00S | English | |
ChokePointProject - Quis custodiet ipsos custodes? | Ruben Bloemgarten | ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime | 00H30M00S | English | |
Closing Event | Frank Rieger | Closing Event | 00H30M00S | English | |
Counterlobbying EU institutions | Christian Bahls - MOGiS e.V., Jérémie Zimmermann | Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet | 01H00M00S | English | |
Crowdsourcing Genome Wide Association Studies | Bastian Greshake, Philipp Bayer | Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults | 01H00M00S | English | |
Datamining for Hackers | Stefan Burschka | Datamining for Hackers- Encrypted Traffic Mining | 01H00M00S | English | |
Data Mining the Israeli Census | Yuval Adam | Data Mining the Israeli Census- Insights into a publicly available registry | 00H30M00S | English | |
Datenvieh oder Daten-Fee | Rene Meissner | Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? | 01H00M00S | German | |
DC+, The Protocol | klobs | DC+, The Protocol- Technical defense against data retention law | 01H00M00S | English | |
Deceiving Authorship Detection | Michael Brennan, Rachel Greenstadt | Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry | 01H00M00S | English | |
Defending mobile phones | Karsten Nohl, Luca Melette | Defending mobile phones | 01H00M00S | English | |
Demokratie auf Sächsisch | Josephine Fischer, Tobias Naumann | Demokratie auf Sächsisch | 01H00M00S | German | |
Der Staatstrojaner | 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer | Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation | 02H15M00S | German | |
Die Koalition setzt sich aber aktiv und ernsthaft dafür ein | maha/Martin Haase | Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik | 01H00M00S | German | |
Does Hacktivism Matter? | Kai Denker | Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany | 01H00M00S | English | |
Don't scan, just ask | Fabian Mihailowitsch | Don't scan, just ask- A new approach of identifying vulnerable web applications | 00H30M00S | English | |
Eating in the Anthropocene | Cathrine Kramer, Zack Denfeld | Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes | 01H00M00S | English | |
Echtes Netz | Falk Lüke, Markus Beckedahl | Echtes Netz - Kampagne für Netzneutralität | 01H00M00S | German | |
Effective Denial of Service attacks against web application platforms | zeri | Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) | 01H00M00S | English | |
Ein Mittelsmannangriff auf ein digitales Signiergerät | Alexander Koch | Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 | 01H00M00S | German | |
Electronic money: The road to Bitcoin and a glimpse forward | Peio Popov | Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better | 01H00M00S | English | |
EU-Datenschutz und das Internet der Dinge | Andreas Krisch | EU-Datenschutz und das Internet der Dinge | 01H00M00S | German | |
EU-Datenschutz und das Internet der Dinge (english translation) | Andreas Krisch | EU-Datenschutz und das Internet der Dinge (english translation) | 01H00M00S | German | |
Evolving custom communication protocols | Wes Faler | Evolving custom communication protocols- Hell Yeah, it's rocket science | 01H00M00S | English | |
Fnord-Jahresrückblick | Felix von Leitner, Frank Rieger | Fnord-Jahresrückblick- von Atomendlager bis Zensus | 01H00M00S | German | |
Frag den Staat | Stefan Wehrmeyer | Frag den Staat- Praktische Informationsfreiheit | 00H30M00S | German | |
From Press Freedom to the Freedom of information | Reporters Without Borders | From Press Freedom to the Freedom of information- Why every citizen should be concerned | 01H00M00S | English | |
Hacker Jeopardy | Ray, Stefan 'Sec' Zehl | Hacker Jeopardy- Number guessing for geeks | 02H00M00S | German | |
Hacker Jeopardy Translation | Hacker Jeopardy Translation | 01H45M00S | English | ||
Hacking MFPs | Andrei Costin | Hacking MFPs- Part2 - PostScript: Um, you've been hacked | 01H00M00S | English | |
How governments have tried to block Tor | Jacob Appelbaum, Roger Dingledine | How governments have tried to block Tor | 01H00M00S | English | |
Implementation of MITM Attack on HDCP-Secured Links | bunnie | Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key | 01H00M00S | English | |
Introducing Osmo-GMR | Sylvain Munaut | Introducing Osmo-GMR- Building a sniffer for the GMR satphones | 01H00M00S | English | |
Jahresrückblick | Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger | Jahresrückblick | 02H15M00S | German | |
KinectFusion | David Kim | KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera | 01H00M00S | English | |
Lightning Talks Day 2 | Nick Farr | Lightning Talks Day 2 | 02H15M00S | English | |
Lightning Talks Day 3 | Nick Farr | Lightning Talks Day 3- Pecha Kucha Round! | 02H15M00S | English | |
Lightning Talks Day 4 | Nick Farr | Lightning Talks Day 4 | 02H15M00S | English | |
Macro dragnets: Why trawl the river when you can do the whole ocean | Redbeard | Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century | 01H00M00S | English | |
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | Evgeny Morozov | Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | 01H00M00S | English | |
"Neue Leichtigkeit" | Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger | "Neue Leichtigkeit"- when unconditional artistic freedom happens | 01H30M00S | German | |
New Ways I'm Going to Hack Your Web App | Jesse Ou, Rich | New Ways I'm Going to Hack Your Web App | 01H00M00S | English | |
NOC Review | Kay, Will Hargrave | NOC Review- NOC Review about the Camp 2011 and 28C3 | 00H30M00S | English | |
Not your Grandfathers moon landing | Karsten Becker, Robert Böhme | Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! | 01H00M00S | English | |
NPC - Nerds Pissing Contest | Benjamin Kellermann, klobs | NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! | 01H00M00S | German | |
Ooops I hacked my PBX | pt | Ooops I hacked my PBX- Why auditing proprietary protocols matters | 00H30M00S | English | |
Open source music: Tracking 2.0 | Tom Hargreaves | Open source music: Tracking 2.0 | 00H30M00S | English | |
Pentanews Game Show 2k11/3 | Alien8, _john, klobs | Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! | 01H00M00S | English | |
Politik hacken | Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger | Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation | 01H00M00S | German | |
Post Memory Corruption Memory Analysis | endrazine | Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes | 01H00M00S | English | |
Power gadgets with your own electricity | Gunnar Thöle, Jörg Dürre | Power gadgets with your own electricity- escape the basement and make the sun work for you | 01H00M00S | English | |
Print Me If You Dare | Ang Cui, Jonathan Voris | Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware | 01H00M00S | English | |
Privacy Invasion or Innovative Science? | Conrad Lee | Privacy Invasion or Innovative Science?- Academia, social media data, and privacy | 01H00M00S | English | |
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking | Christian Kleineidam, MetaMind Evolution | Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers | 01H00M00S | English | |
Quantum of Science | Robert Helling | Quantum of Science- How quantum information differs from classical | 01H00M00S | English | |
r0ket++ | lilafisch, Stefan 'Sec' Zehl | r0ket++- The CCC-Badge | 01H00M00S | English | |
Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | Kay Hamacher | Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | 01H00M00S | English | |
Reverse-engineering a Qualcomm baseband | Guillaume Delugré | Reverse-engineering a Qualcomm baseband | 01H00M00S | English | |
Reverse Engineering USB Devices | Drew Fisher | Reverse Engineering USB Devices | 00H30M00S | English | |
Rootkits in your Web application | Artur Janc | Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. | 01H00M00S | English | |
Sachsen dreht frei | Anne Roth | Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können | 01H00M00S | German | |
SCADA and PLC Vulnerabilities in Correctional Facilities | Teague, Tiffany Rad | SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs | 01H00M00S | English | |
Security Log Visualization with a Correlation Engine | Chris Kubecka | Security Log Visualization with a Correlation Engine- What's inside your network? | 00H30M00S | English | |
Security Nightmares | Frank Rieger, Ron | Security Nightmares | 01H00M00S | German | |
Smart Hacking For Privacy | Dario Carluccio, Stephan Brinkhaus | Smart Hacking For Privacy | 01H00M00S | English | |
Sovereign Keys | Peter Eckersley | Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC | 01H00M00S | English | |
String Oriented Programming | Mathias Payer | String Oriented Programming- Circumventing ASLR, DEP, and Other Guards | 01H00M00S | English | |
Taking control over the Tor network | Eric Filiol, Seun Omosowon | Taking control over the Tor network | 01H15M00S | English | |
The Atari 2600 Video Computer System: The Ultimate Talk | Sven Oliver ('SvOlli') Moll | The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs | 01H00M00S | English | |
The best of The oXcars | Simona Xnet | The best of The oXcars- the greatest free/Libre culture show of all times | 01H00M00S | English | |
The coming war on general computation | Cory Doctorow | The coming war on general computation- The copyright war was just the beginning | 01H00M00S | English | |
The engineering part of social engineering | Aluc | The engineering part of social engineering- Why just lying your way in won't get you anywhere | 01H00M00S | English | |
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? | Jean-Jacques Quisquater, Renaud Devaliere | The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems | 01H00M00S | English | |
The Hack will not be televised? | Caspar Clemens Mierau | The Hack will not be televised?- Hacker in Movies | 01H00M00S | English | |
The movements against state-controlled Internet in Turkey | Bar, seda | The movements against state-controlled Internet in Turkey- A short account of its history and future challenges | 01H00M00S | English | |
The Science of Insecurity | Meredith L. Patterson, Sergey | The Science of Insecurity | 01H00M00S | English | |
Time is on my Side | Sebastian Schinzel | Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web | 01H00M00S | English | |
Towards a Single Secure European Cyberspace? | Suso Baleato | Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. | 01H00M00S | English | |
TRESOR: Festplatten sicher verschlüsseln | tilo | TRESOR: Festplatten sicher verschlüsseln | 00H30M00S | German | |
What is in a name? | Christoph Engemann | What is in a name?- Identity-Regimes from 1500 to the 2000s | 01H00M00S | English | |
What is WhiteIT and what does it aim for? | Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft | What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. | 01H00M00S | English | |
Your Disaster/Crisis/Revolution just got Pwned | Herr Urbach, willowbl00 | Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response | 01H00M00S | English |
Bereits vorgeführte Vorträge
noch keine
Sonstiges
Die Vortragstabelle wurde per XSLT aus dieser Datei erstellt.