Seite 1 von 1

Der Chaos Computer Club 2017 in Leipzig (34C3)!

Verfasst: Sa 30. Dez 2017, 21:28
von darktwillight
Der Chaos Computer Club 2017 in Leipzig (34C3)!

Die Video Beiträge :

Code: Alles auswählen

Dude, you broke the Future! 
Antipatterns und Missverständnisse in der Softwareentwicklung
Eröffnung: tuwat
Die Lauschprogramme der Geheimdienste
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Social Bots, Fake News und Filterblasen
The Ultimate Apollo Guidance Computer Talk
Die fabelhafte Welt des Mobilebankings
QualityLand
Relativitätstheorie für blutige Anfänger
Demystifying Network Cards
Gamified Control?
Methodisch inkorrekt!
Jahresrückblick des CCC 2017
Internet of Fails
Uncovering British spies’ web of sockpuppet social media personas
Everything you want to know about x86 microcode, but might have been afraid to ask
Free Electron Lasers
hacking disaster
Beeinflussung durch Künstliche Intelligenz
Inside Intel Management Engine
Der PC-Wahl-Hack
All Computers Are Beschlagnahmt
Ecstasy 10x yellow Twitter 120mg Mdma
How to drift with any car
Hacker Jeopardy
Pointing Fingers at 'The Media'
Taxation
Trügerische Sicherheit
How risky is the software you use?
Watching the changing Earth
Tiger, Drucker und ein Mahnmal
Der netzpolitische Wetterbericht
WTFrance
Digitale Bildung in der Schule
Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
Deep Learning Blindspots
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
Doping your Fitbit
DPRK Consumer Technology
cryptocurrencies, smart contracts, etc.: revolutionary tech?
LatticeHacks
Die Sprache der Überwacher
KRACKing WPA2 by Forcing Nonce Reuse
1-day exploit development for Cisco IOS
Tightening the Net in Iran
Science is broken
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
iOS kernel exploitation archaeology
Intel ME: Myths and reality
Home Distilling
Schnaps Hacking
The Work of Art in the Age of Digital Assassination
Bildung auf dem Weg ins Neuland
Die göttliche Informatik / The divine Computer Science
Reverse engineering FPGAs
Growing Up Software Development
Access To Bodies
Financial surveillance
How can you trust formally verified software?
Are all BSDs created equally?
Opening Closed Systems with GlitchKit
Forensic Architecture
Lets break modern binary code obfuscation
Protecting Your Privacy at the Border
Mietshäusersyndikat: den Immobilienmarkt hacken
Mobile Data Interception from the Interconnection Link
Resilienced Kryptographie
Low Cost Non-Invasive Biomedical Imaging
Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware…
End-to-end formal ISA verification of RISC-V processors with riscv-formal
May contain DTraces of FreeBSD
BGP and the Rule of Custom
Console Security - Switch
Holography of Wi-Fi radiation
Social Cooling - big data’s unintended side effect
Electromagnetic Threats for Information Security
Ein Festival der Demokratie
Designing PCBs with code
Netzpolitik in der Schweiz
 und noch viele mehr  :wink: 
https://media.ccc.de/c/34c3