Material del 32nd Chaos Communication Congress (32c3)

Hablaros del Chaos Computer Club (aka CCC) es hablaros de la historia viva del hacking, la mayor asociación de hackers de Europa que fue fundada en Berlín el 12 de septiembre de 1981. 

Desde 1984 entre nochebuena y nochevieja organizan el Chaos Communication Congress y en su 32 edición de 2015 volvían a celebrarlo en Hamburgo bajo el lema "Gated Communities". 

Durante los días del congreso, desde bien temprano y hasta madrugada se impartieron numerosas charlas (en inglés y en alemán) y talleres que no os podéis perder:

27 de diciembre
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs 
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for 
Avoiding kernel panic: Europe’s biggest fails in digital policy-making 
Beyond your cable modem 
Console Hacking 
Datahavens from HavenCo to Today 
Hacking EU funding for a decentralizing FOSS project 
Hardware-Trojaner in Security-Chips 
How the Great Firewall discovers hidden circumvention servers 
Internet Landscapes 
Key-logger, Video, Mouse 
Lifting the Fog on Red Star OS 
My Robot Will Crush You With Its Soft Delicate Hands! 
Netzpolitik in der Schweiz 
New memory corruption attacks: why can't we have nice things? 
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen 
Opening Event 
Public Library/Memory of the World 
REXUS/BEXUS - Rocket and Balloon Experiments for University Students 
Running your own 3G/3.5G network 
Shooting lasers into space – for science! 
So you want to build a satellite? 
The exhaust emissions scandal („Dieselgate“) 
The Great Train Cyber Robbery 
The mummy unwrapped 
The Ultimate Amiga 500 Talk 
Thunderstrike 2 
Towards (reasonably) trustworthy x86 laptops 
What does Big Brother see, while he is watching? 
What is the value of anonymous communication? 
When hardware must „just work“ 
Windows drivers attack surface  

28 de diciembre
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking 
All Our Shared Spectrum Are Belong to Us 
apertus° AXIOM 
Cyber all the Wassenaars 
Das Zahnrad aus Fleisch 
Dissecting VoLTE  
Ecuador: how an authoritarian government is fooling the entire world 
Ein Abgrund von Landesverrat  
Evolution of Brain-Computer Interfaces 
goto fail;  
Hardsploit: A Metasploit-like tool for hardware hacking  
Household, Totalitarianism and Cyberspace 
How hackers grind an MMORPG: by taking it apart!  
Iridium Update 
Jahresrückblick des CCC 
Jugend hackt 2015 
Lessons learned: Freifunk für Geflüchtete  
Let's Encrypt -- What launching a free CA looks like 
Lightning Talks Day 2  
Logjam: Diffie-Hellman, discrete logs, the NSA, and you  
Maker Spaces in Favelas - Lecture 
Mobile Censorship in Iran 
Net Neutrality in Europe 
One year of securitarian drift in France 
Plunge into Proxy Politics 
Profiling (In)justice 
Quantenphysik und Kosmologie  
Quantum Cryptography  
Rowhammer.js: Root privileges for web apps? 
Sanitizing PCAPs  
Sicherheit von 125kHz Transpondern am Beispiel Hitag S 
Software and business method patents: call for action 
The Perl Jam 2  
The state of Internet Censorship 
Verified Firewall Ruleset Verification 
Wie Jugendschutzprogramme nicht nur die Jugend schädigen 

29 de diciembre
"Fluxus cannot save the world."  
#GOIBlocks - Technical observations about recent internet censorship in India 
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale 
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik  
3D printing on the moon  
A Dozen Years of Shellphish  
Beyond Anti Evil Maid 
Building and Breaking Wireless Security 
Check your privileges!  
Computational Meta-Psychology 
Craft, leisure, and end-user innovation 
Crypto ist Abwehr, IFG ist Angriff! 
De-anonymizing Programmers 
Free Software and Hardware bring National Sovereignty 
Gibberish Detection 102 
Graphs, Drones & Phones  
Internet Cube  
libusb: Maintainer fail 
Lightning Talks Day 3  
Media Coverage and the Public in the Surveillance Society  
Methodisch inkorrekt! 
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 
On Computing Numbers, with an Application to Problems of our Society 
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung 
Prediction and Control  
Reversing UEFI by execution 
Safe Harbor  
Say hi to your new boss: How algorithms might soon control our lives.  
State of the Onion  
Stromtankstellen – eine neue öffentliche Infrastruktur 
Technology and Mass Atrocity Prevention 
Ten years after ‚We Lost The War‘  
The architecture of a street level panopticon  
The plain simple reality of entropy 
the possibility of an army  
The Price Of Dissent  
Tor onion services: more useful than you think  
Trust us and our business will expand! 
Vehicle2Vehicle Communication based on IEEE 802.11p  

30 de diciembre
“I feel like a criminal and I have to be god at the same time” 
A New Kid on the Block 
Breaking Honeypots for Fun and Profit 
Collect It All: Open Source Intelligence (OSINT) for Everyone 
Compileroptimierungen für Forth im Microcontroller 
Crypto Wars Part II 
Grundrechte gelten nicht im Weltall! 
Hacker Jeopardy 
Katastrophe und Kommunikation 
Maritime Robotics 
Microsofts Windows 10 Botnet 
Predicting Crime in a Big Data World 
Replication Prohibited 
Security Nightmares 0x10 
Sin in the time of Technology 
The Magic World of Searchable Symmetric Encryption 
Top X* usability obstacles 
When algorithms fail in our personal lives 
Wie man einen Blackout verursacht 
Wireless Drivers: Freedom considered harmful?