32C3 Slides

Code is on GitHub

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

Crypto ist Abwehr, IFG ist Angriff!
Craft, leisure, and end-user innovation
Building and Breaking Wireless Security
The Perl Jam 2
Beyond your cable modem
Ecuador: how an authoritarian government is fooling the entire world
Ein Abgrund von Landesverrat
G’scheitern
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
The state of Internet Censorship
Hardware-Trojaner in Security-Chips
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
Hacker Jeopardy
rad1o++
Iridium Update
Shooting lasers into space – for science!
New memory corruption attacks: why can't we have nice things?
Vehicle2Vehicle Communication based on IEEE 802.11p
Sicherheit von 125kHz Transpondern am Beispiel Hitag S
When hardware must „just work“
Lifting the Fog on Red Star OS
Key-logger, Video, Mouse
Verified Firewall Ruleset Verification
How the Great Firewall discovers hidden circumvention servers
Rowhammer.js: Root privileges for web apps?
Stromtankstellen – eine neue öffentliche Infrastruktur
Netzpolitik in der Schweiz
“I feel like a criminal and I have to be god at the same time”
What does Big Brother see, while he is watching?
PQCHacks
CHINTERNET ART
A Dozen Years of Shellphish
Trust us and our business will expand!
Methodisch inkorrekt!
Grundrechte gelten nicht im Weltall!
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
PLC-Blaster
Lessons learned: Freifunk für Geflüchtete
CloudABI
Thunderstrike 2
Vector retrogaming
Console Hacking
Gibberish Detection 102
Reversing UEFI by execution
Free Software and Hardware bring National Sovereignty
Das Zahnrad aus Fleisch
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
Graphs, Drones & Phones
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
#GOIBlocks - Technical observations about recent internet censorship in India
Profiling (In)justice
Maritime Robotics
Unpatchable
Breaking Honeypots for Fun and Profit
Public Library/Memory of the World
Cyber all the Wassenaars
Fnord-Jahresrückblick
Software and business method patents: call for action
Check your privileges!
Sin in the time of Technology
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
Microsofts Windows 10 Botnet
Sanitizing PCAPs
Hacking EU funding for a decentralizing FOSS project
Quantum Cryptography
Jahresrückblick des CCC
State of the Onion
QRtistry
All Our Shared Spectrum Are Belong to Us
re_cycle
Tor onion services: more useful than you think
Wie man einen Blackout verursacht
What is the value of anonymous communication?
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
The exhaust emissions scandal („Dieselgate“)
The Magic World of Searchable Symmetric Encryption
3D printing on the moon
Collect It All: Open Source Intelligence (OSINT) for Everyone
So you want to build a satellite?
Household, Totalitarianism and Cyberspace
Beyond Anti Evil Maid
Towards (reasonably) trustworthy x86 laptops
apertus° AXIOM
Top X* usability obstacles
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
Ling - High level system programming
Shopshifting
How to contribute to make open hardware happen
The architecture of a street level panopticon
Wireless Drivers: Freedom considered harmful?
Crypto Wars Part II
Net Neutrality in Europe
Media Coverage and the Public in the Surveillance Society
My Robot Will Crush You With Its Soft Delicate Hands!
Technology and Mass Atrocity Prevention
Internet Cube
A New Kid on the Block
Running your own 3G/3.5G network
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
Evolution of Brain-Computer Interfaces
On Computing Numbers, with an Application to Problems of our Society
"Fluxus cannot save the world."
One year of securitarian drift in France
Intelexit
Datahavens from HavenCo to Today
Replication Prohibited
goto fail;
The plain simple reality of entropy
The Price Of Dissent
Prediction and Control
Predicting Crime in a Big Data World
The Ultimate Amiga 500 Talk
Say hi to your new boss: How algorithms might soon control our lives.
Computational Meta-Psychology
The Great Train Cyber Robbery
De-anonymizing Programmers
How hackers grind an MMORPG: by taking it apart!
Hardsploit: A Metasploit-like tool for hardware hacking
When algorithms fail in our personal lives
Ten years after ‚We Lost The War‘
Dissecting VoLTE
Windows drivers attack surface
Safe Harbor
the possibility of an army
Compileroptimierungen für Forth im Microcontroller
DDoS mitigation EPIC FAIL collection
Quantenphysik und Kosmologie
Let's Encrypt -- What launching a free CA looks like
Mobile Censorship in Iran
Buffering sucks!
Internet Landscapes
Maker Spaces in Favelas - Lecture
The mummy unwrapped
Security Nightmares 0x10
libusb: Maintainer fail
20 OSCILLATORS IN 20 MINUTES
Opening Event
Closing Event
32C3 Infrastructure Review
Lightning Talks Day 2
Lightning Talks Day 3
Lightning Talks Day 4
How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).
Jugend hackt 2015
Keynote
Die Asyl-Dialoge / The Asylum Dialogues
Katastrophe und Kommunikation
Plunge into Proxy Politics
Methodisch inkorrekt! (Live-Stream)

Day 1

Day 2

Day 3

Day 4

Hall 1

Hall 2

Hall 6

Hall G

Hall 1

Hall 2

Hall 6

Hall G

Hall 1

Hall 2

Hall 6

Hall G

Hall 1

Hall 2

Hall 6

Hall G