Hablaros del Chaos Computer Club (aka CCC) es hablaros de la historia viva del hacking, la mayor asociación de hackers de Europa que fue fundada en Berlín el 12 de septiembre de 1981.
Desde 1984 entre nochebuena y nochevieja organizan el Chaos Communication Congress y en su 32 edición de 2015 volvían a celebrarlo en Hamburgo bajo el lema "Gated Communities".
Durante los días del congreso, desde bien temprano y hasta madrugada se impartieron numerosas charlas (en inglés y en alemán) y talleres que no os podéis perder:
27 de diciembre |
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs |
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for |
Avoiding kernel panic: Europe’s biggest fails in digital policy-making |
Beyond your cable modem |
Console Hacking |
Datahavens from HavenCo to Today |
Hacking EU funding for a decentralizing FOSS project |
Hardware-Trojaner in Security-Chips |
How the Great Firewall discovers hidden circumvention servers |
Internet Landscapes |
Key-logger, Video, Mouse |
Keynote |
Lifting the Fog on Red Star OS |
My Robot Will Crush You With Its Soft Delicate Hands! |
Netzpolitik in der Schweiz |
New memory corruption attacks: why can't we have nice things? |
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen |
Opening Event |
PLC-Blaster |
PQCHacks |
Public Library/Memory of the World |
rad1o++ |
REXUS/BEXUS - Rocket and Balloon Experiments for University Students |
Running your own 3G/3.5G network |
Shooting lasers into space – for science! |
Shopshifting |
So you want to build a satellite? |
The exhaust emissions scandal („Dieselgate“) |
The Great Train Cyber Robbery |
The mummy unwrapped |
The Ultimate Amiga 500 Talk |
Thunderstrike 2 |
Towards (reasonably) trustworthy x86 laptops |
What does Big Brother see, while he is watching? |
What is the value of anonymous communication? |
When hardware must „just work“ |
Windows drivers attack surface |
28 de diciembre |
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking |
All Our Shared Spectrum Are Belong to Us |
apertus° AXIOM |
CloudABI |
Cyber all the Wassenaars |
Das Zahnrad aus Fleisch |
Dissecting VoLTE |
Ecuador: how an authoritarian government is fooling the entire world |
Ein Abgrund von Landesverrat |
Evolution of Brain-Computer Interfaces |
G’scheitern |
goto fail; |
Hardsploit: A Metasploit-like tool for hardware hacking |
Household, Totalitarianism and Cyberspace |
How hackers grind an MMORPG: by taking it apart! |
Iridium Update |
Jahresrückblick des CCC |
Jugend hackt 2015 |
Lessons learned: Freifunk für Geflüchtete |
Let's Encrypt -- What launching a free CA looks like |
Lightning Talks Day 2 |
Logjam: Diffie-Hellman, discrete logs, the NSA, and you |
Maker Spaces in Favelas - Lecture |
Mobile Censorship in Iran |
Net Neutrality in Europe |
One year of securitarian drift in France |
Plunge into Proxy Politics |
Profiling (In)justice |
Quantenphysik und Kosmologie |
Quantum Cryptography |
Rowhammer.js: Root privileges for web apps? |
Sanitizing PCAPs |
Sicherheit von 125kHz Transpondern am Beispiel Hitag S |
Software and business method patents: call for action |
The Perl Jam 2 |
The state of Internet Censorship |
Unpatchable |
Verified Firewall Ruleset Verification |
Wie Jugendschutzprogramme nicht nur die Jugend schädigen |
29 de diciembre |
"Fluxus cannot save the world." |
#GOIBlocks - Technical observations about recent internet censorship in India |
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale |
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik |
20 OSCILLATORS IN 20 MINUTES |
3D printing on the moon |
A Dozen Years of Shellphish |
Beyond Anti Evil Maid |
Building and Breaking Wireless Security |
Check your privileges! |
Computational Meta-Psychology |
Craft, leisure, and end-user innovation |
Crypto ist Abwehr, IFG ist Angriff! |
De-anonymizing Programmers |
Fnord-Jahresrückblick |
Free Software and Hardware bring National Sovereignty |
Gibberish Detection 102 |
Graphs, Drones & Phones |
Intelexit |
Internet Cube |
libusb: Maintainer fail |
Lightning Talks Day 3 |
Media Coverage and the Public in the Surveillance Society |
Methodisch inkorrekt! |
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 |
On Computing Numbers, with an Application to Problems of our Society |
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung |
Prediction and Control |
QRtistry |
re_cycle |
Reversing UEFI by execution |
Safe Harbor |
Say hi to your new boss: How algorithms might soon control our lives. |
State of the Onion |
Stromtankstellen – eine neue öffentliche Infrastruktur |
Technology and Mass Atrocity Prevention |
Ten years after ‚We Lost The War‘ |
The architecture of a street level panopticon |
The plain simple reality of entropy |
the possibility of an army |
The Price Of Dissent |
Tor onion services: more useful than you think |
Trust us and our business will expand! |
Vehicle2Vehicle Communication based on IEEE 802.11p |
30 de diciembre |
“I feel like a criminal and I have to be god at the same time” |
A New Kid on the Block |
Breaking Honeypots for Fun and Profit |
CHINTERNET ART |
Collect It All: Open Source Intelligence (OSINT) for Everyone |
Compileroptimierungen für Forth im Microcontroller |
Crypto Wars Part II |
Grundrechte gelten nicht im Weltall! |
Hacker Jeopardy |
Katastrophe und Kommunikation |
Maritime Robotics |
Microsofts Windows 10 Botnet |
Predicting Crime in a Big Data World |
Replication Prohibited |
Security Nightmares 0x10 |
Sin in the time of Technology |
The Magic World of Searchable Symmetric Encryption |
Top X* usability obstacles |
When algorithms fail in our personal lives |
Wie man einen Blackout verursacht |
Wireless Drivers: Freedom considered harmful? |
Fuente: https://media.ccc.de/c/32c3?sort=date
Via: www.hackplayers.com