Vídeos Del Chaos Communication Congress 34
Nada mejor que empezar el año con material de primera calidad. El Chaos Communication Congress, como de costumbre a celebrado su cita con el hacking mundial entre el 27 y el 30 de diciembre. Si tienes algo de tiempo libre, aquí tienes dónde entretenerte.
- Antipatterns und Missverständnisse in der Softwareentwicklung
- Dude, you broke the Future!
- Eröffnung: tuwat
- Die Lauschprogramme der Geheimdienste
- Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
- Social Bots, Fake News und Filterblasen
- QualityLand
- Methodisch inkorrekt!
- The Ultimate Apollo Guidance Computer Talk
- Die fabelhafte Welt des Mobilebankings
- Internet of Fails
- Relativitätstheorie für blutige Anfänger
- Jahresrückblick des CCC 2017
- Security Nightmares 0x12
- Gamified Control?
- Demystifying Network Cards
- Everything you want to know about x86 microcode, but might have been afraid to ask
- Uncovering British spies’ web of sockpuppet social media personas
- Console Security - Switch
- Free Electron Lasers
- hacking disaster
- Beeinflussung durch Künstliche Intelligenz
- Der PC-Wahl-Hack
- All Computers Are Beschlagnahmt
- Inside Intel Management Engine
- Tiger, Drucker und ein Mahnmal
- Hacker Jeopardy
- How to drift with any car
- Doping your Fitbit
- Are all BSDs created equally?
- Ecstasy 10x yellow Twitter 120mg Mdma
- Pointing Fingers at ‘The Media’
- Trügerische Sicherheit
- DPRK Consumer Technology
- Taxation
- Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
- Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
- 34C3 Abschluss
- Digitale Bildung in der Schule
- Watching the changing Earth
- Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware…
- How risky is the software you use?
- cryptocurrencies, smart contracts, etc.: revolutionary tech?
- Der netzpolitische Wetterbericht
- Mietshäusersyndikat: den Immobilienmarkt hacken
- Deep Learning Blindspots
- Die Sprache der Überwacher
- WTFrance
- eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
- LatticeHacks
- Science is broken
- 1-day exploit development for Cisco IOS
- KRACKing WPA2 by Forcing Nonce Reuse
- Intel ME: Myths and reality
- Schreibtisch-Hooligans
- Protecting Your Privacy at the Border
- Tightening the Net in Iran
- Bildung auf dem Weg ins Neuland
- Schnaps Hacking
- Nougatbytes 11₂
- Die göttliche Informatik / The divine Computer Science
- Home Distilling
- iOS kernel exploitation archaeology
- Decoding Contactless (Card) Payments
- Reverse engineering FPGAs
- The Work of Art in the Age of Digital Assassination
- SCADA - Gateway to (s)hell
- Resilienced Kryptographie
- Financial surveillance
- Growing Up Software Development
- How can you trust formally verified software?
- Opening Closed Systems with GlitchKit
- The Snowden Refugees under Surveillance in Hong Kong
- Ein Festival der Demokratie
- Lets break modern binary code obfuscation
- Access To Bodies
- Holography of Wi-Fi radiation
- Designing PCBs with code
- Social Cooling - big data’s unintended side effect
- Forensic Architecture
- Mobile Data Interception from the Interconnection Link
- BGP and the Rule of Custom
- How Alice and Bob meet if they don’t like onions
- Low Cost Non-Invasive Biomedical Imaging
- 0en & 1en auf dem Acker
- BBSs and early Internet access in the 1990ies
- The making of a chip
- Bringing Linux back to server boot ROMs with NERF and Heads
- Es sind die kleinen Dinge im Leben II
- May contain DTraces of FreeBSD
- End-to-end formal ISA verification of RISC-V processors with riscv-formal
- Electromagnetic Threats for Information Security
- BootStomp: On the Security of Bootloaders in Mobile Devices
- Netzpolitik in der Schweiz
- UPSat - the first open source satellite
- Squeezing a key through a carry bit
- Fuck Dutch mass-surveillance: let’s have a referendum!
- Internet censorship in the Catalan referendum
- Robot Music
- Running GSM mobile phone on SDR
- Treibhausgasemissionen einschätzen
- Lobby-Schlacht um die ePrivacy-Verordnung
- Catch me if you can: Internet Activism in Saudi Arabia
- Defeating (Not)Petya’s Cryptography
- Lightning Talks Day 2
- Why Do We Anthropomorphize Computers?…
- A hacker’s guide to Climate Change - What do we know and how do we know it?
- Blinkenrocket!
- Drones of Power: Airborne Wind Energy
- Inside Android’s SafetyNet Attestation: Attack and Defense
- The Noise Protocol Framework
- Briar
- Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons
- Saving the World with Space Solar Power
- We should share our secrets
- WHWP
- Privacy Shield - Lipstick on a Pig?
- Humans as software extensions
- Net Neutraliy Enforcement in the EU
- MQA - A clever stealth DRM-Trojan
- The Internet in Cuba: A Story of Community Resilience
- avatar²
- ASLR on the line
- Implementing an LLVM based Dynamic Binary Instrumentation framework
- Policing in the age of data exploitation
- Lightning Talks Day 3
- Practical Mix Network Design
- Regulating Autonomous Weapons
- Open Source Estrogen
- History and implications of DRM
- Lightning Talks Day 4
- Taking a scalpel to QNX
- The seizure of the Iuventa
- SatNOGS: Crowd-sourced satellite operations
- Afro TECH
- Extended DNA Analysis
- Uncovering vulnerabilities in Hoermann BiSecur
- Making Experts Makers and Makers Experts
- Microarchitectural Attacks on Trusted Execution Environments
- Deconstructing a Socialist Lawnmower
- Italy’s surveillance toolbox
- openPower - the current state of commercial openness in CPU development
- Hardening Open Source Development
- This is NOT a proposal about mass surveillance!
- Library operating systems
- Think big or care for yourself
- Algorithmic science evaluation and power structure: the discourse on strategic citation…
- Type confusion: discovery, abuse, and protection
- “Nabovarme” opensource heating infrastructure in Christiania
- Visceral Systems
- TrustZone is not enough
- Electroedibles
- Modern key distribution with ClaimChain
- Simulating the future of the global agro-food system
- Zamir Transnational Network und Zagreb Dairy
- Public FPGA based DMA Attacking
- OONI: Let’s Fight Internet Censorship, Together!
- Tracking Transience
- Organisational Structures for Sustainable Free Software Development
- 34C3 Infrastructure Review
- Ensuring Climate Data Remains Public
- Uncertain Concern
- institutions for Resolution Disputes
- Don’t stop ‘til you feel it
- International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen…
- Closing the loop: Reconnecting social-technologial dynamics to Earth System science
- On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving…
Via: feedproxy.google.com
Vídeos Del Chaos Communication Congress 34
Reviewed by Zion3R
on
9:56
Rating: