| 27 de diciembre |
| A
Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs |
| APT
Reports and OPSEC Evolution, or: These are not the APT reports you are
looking for |
| Avoiding
kernel panic: Europe’s biggest fails in digital policy-making |
| Beyond your
cable modem |
| Console Hacking |
| Datahavens
from HavenCo to Today |
| Hacking
EU funding for a decentralizing FOSS project |
| Hardware-Trojaner
in Security-Chips |
| How
the Great Firewall discovers hidden circumvention servers |
| Internet
Landscapes |
| Key-logger,
Video, Mouse |
| Keynote |
| Lifting
the Fog on Red Star OS |
| My
Robot Will Crush You With Its Soft Delicate Hands! |
| Netzpolitik
in der Schweiz |
| New
memory corruption attacks: why can't we have nice things? |
| NSA-Untersuchungsausschuss:
Zwischen Aufklärungswillen und Mauern aus Schweigen |
| Opening Event |
| PLC-Blaster |
| PQCHacks |
| Public
Library/Memory of the World |
| rad1o++ |
| REXUS/BEXUS
- Rocket and Balloon Experiments for University Students |
| Running
your own 3G/3.5G network |
| Shooting
lasers into space – for science! |
| Shopshifting |
| So
you want to build a satellite? |
| The
exhaust emissions scandal („Dieselgate“) |
| The
Great Train Cyber Robbery |
| The mummy
unwrapped |
| The
Ultimate Amiga 500 Talk |
| Thunderstrike 2 |
| Towards
(reasonably) trustworthy x86 laptops |
| What
does Big Brother see, while he is watching? |
| What
is the value of anonymous communication? |
| When
hardware must „just work“ |
| Windows
drivers attack surface |
28 de diciembre |
| (Un)Sicherheit
von App-basierten TAN-Verfahren im Onlinebanking |
| All
Our Shared Spectrum Are Belong to Us |
| apertus° AXIOM |
| CloudABI |
| Cyber all
the Wassenaars |
| Das Zahnrad
aus Fleisch |
| Dissecting VoLTE
|
| Ecuador:
how an authoritarian government is fooling the entire world |
| Ein
Abgrund von Landesverrat |
| Evolution
of Brain-Computer Interfaces |
| G’scheitern |
| goto fail; |
| Hardsploit:
A Metasploit-like tool for hardware hacking |
| Household,
Totalitarianism and Cyberspace |
| How
hackers grind an MMORPG: by taking it apart! |
| Iridium Update |
| Jahresrückblick
des CCC |
| Jugend hackt
2015 |
| Lessons
learned: Freifunk für Geflüchtete |
| Let's
Encrypt -- What launching a free CA looks like |
| Lightning Talks
Day 2 |
| Logjam:
Diffie-Hellman, discrete logs, the NSA, and you |
| Maker
Spaces in Favelas - Lecture |
| Mobile
Censorship in Iran |
| Net
Neutrality in Europe |
| One
year of securitarian drift in France |
| Plunge
into Proxy Politics |
| Profiling
(In)justice |
| Quantenphysik
und Kosmologie |
| Quantum
Cryptography |
| Rowhammer.js:
Root privileges for web apps? |
| Sanitizing PCAPs
|
| Sicherheit
von 125kHz Transpondern am Beispiel Hitag S |
| Software
and business method patents: call for action |
| The Perl Jam 2 |
| The
state of Internet Censorship |
| Unpatchable |
| Verified
Firewall Ruleset Verification |
| Wie
Jugendschutzprogramme nicht nur die Jugend schädigen |
29 de diciembre |
| "Fluxus
cannot save the world." |
| #GOIBlocks
- Technical observations about recent internet censorship in India |
| (In)Security
of Embedded Devices' Firmware - Fast and Furious at Large Scale |
| „Nach
bestem Wissen und Gewissen“ – Floskeln in der Politik |
| 20
OSCILLATORS IN 20 MINUTES |
| 3D printing
on the moon |
| A Dozen
Years of Shellphish |
| Beyond Anti
Evil Maid |
| Building
and Breaking Wireless Security |
| Check your
privileges! |
| Computational
Meta-Psychology |
| Craft,
leisure, and end-user innovation |
| Crypto
ist Abwehr, IFG ist Angriff! |
| De-anonymizing
Programmers |
| Fnord-Jahresrückblick
|
| Free
Software and Hardware bring National Sovereignty |
| Gibberish
Detection 102 |
| Graphs, Drones
& Phones |
| Intelexit |
| Internet Cube |
| libusb:
Maintainer fail |
| Lightning Talks
Day 3 |
| Media
Coverage and the Public in the Surveillance Society |
| Methodisch
inkorrekt! |
| Neither
Snow Nor Rain Nor MITM… The State of Email Security in 2015 |
| On
Computing Numbers, with an Application to Problems of our Society |
| Österreich:
Der Kampf gegen unkontrollierte Massenüberwachung |
| Prediction and
Control |
| QRtistry |
| re_cycle |
| Reversing
UEFI by execution |
| Safe Harbor |
| Say
hi to your new boss: How algorithms might soon control our lives. |
| State of the Onion
|
| Stromtankstellen
– eine neue öffentliche Infrastruktur |
| Technology
and Mass Atrocity Prevention |
| Ten
years after ‚We Lost The War‘ |
| The
architecture of a street level panopticon |
| The
plain simple reality of entropy |
| the
possibility of an army |
| The Price Of
Dissent |
| Tor
onion services: more useful than you think |
| Trust
us and our business will expand! |
| Vehicle2Vehicle
Communication based on IEEE 802.11p |
30 de diciembre |
| “I
feel like a criminal and I have to be god at the same time” |
| A New Kid on
the Block |
| Breaking
Honeypots for Fun and Profit |
| CHINTERNET ART |
| Collect
It All: Open Source Intelligence (OSINT) for Everyone |
| Compileroptimierungen
für Forth im Microcontroller |
| Crypto Wars Part
II |
| Grundrechte
gelten nicht im Weltall! |
| Hacker Jeopardy |
| Katastrophe
und Kommunikation |
| Maritime
Robotics |
| Microsofts
Windows 10 Botnet |
| Predicting
Crime in a Big Data World |
| Replication
Prohibited |
| Security
Nightmares 0x10 |
| Sin in
the time of Technology |
| The
Magic World of Searchable Symmetric Encryption |
| Top X*
usability obstacles |
| When
algorithms fail in our personal lives |
| Wie
man einen Blackout verursacht |
| Wireless
Drivers: Freedom considered harmful? |
Comentarios
Publicar un comentario