33C3 Slides

Code is on GitHub

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

10:00

12:00

14:00

16:00

18:00

20:00

22:00

0:00

Irren ist staatlich
The DROWN Attack
Einführung zu Blockchains
On the Security and Privacy of Modern Single Sign-On in the Web
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
Exploiting PHP7 unserialize
Welcome to the Anthropocene?
The Universe Is, Like, Seriously Huge
Gone in 60 Milliseconds
SpinalHDL : An alternative hardware description language
International exchange of tax information
Downgrading iOS: From past to present
Berechnete Welt
Pegasus internals
Software Defined Emissions
Syrian Archive
Make Wi-Fi fast again
SpiegelMining – Reverse Engineering von Spiegel-Online
Formal Verification of Verilog HDL with Yosys-SMTBMC
The Nibbletronic
Lasers in the sky (with asteroids)
Check Your Police Record!
Interplanetary Colonization
Decoding the LoRa PHY
Console Hacking 2016
Wheel of Fortune
Space making/space shaping
Fnord-Jahresrückblick
Searchwing - Mit Drohnen leben retten
Where in the World Is Carmen Sandiego?
Geolocation methods in mobile networks
Shut Up and Take My Money!
Making Technology Inclusive Through Papercraft and Sound
Surveilling the surveillers
A Data Point Walks Into a Bar
Building Custom Pinball Machines
Untrusting the CPU
Law Enforcement Are Hacking the Planet
Lockpicking in the IoT
Methodisch inkorrekt!
Eine kleine Geschichte der Parlamentsschlägerei
Memory Deduplication: The Curse that Keeps on Giving
Routerzwang und Funkabschottung
A Story of Discrimination and Unfairness
Intercoms Hacking
The Ultimate Game Boy Talk
No USB? No problem.
What's It Doing Now?
Build your own NSA
Die Sprache der Populisten
What We Can Learn about Creativity from 3D Printing
Privatisierung der Rechtsdurchsetzung
Code BROWN in the Air
What could possibly go wrong with <insert x86 instruction here>?
Dissecting HDMI
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
A look into the Mobile Messaging Black Box
The Transhumanist Paradox
State of Internet Censorship 2016
Tapping into the core
Liberté, Égalité, Fraternité... and privacy ?!
Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
Make the Internet Neutral Again
How physicists analyze massive data: LHC + brain + ROOT = Higgs
Lightning Talks Day 2
Lightning Talks Day 3
Lightning Talks Day 4
Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
Visiting The Bear Den
radare demystified
Technologien für und wider Digitale Souveränität
How do we know our PRNGs work properly?
Edible Soft Robotics
Million Dollar Dissidents and the Rest of Us
Nicht öffentlich.
3 Years After Snowden: Is Germany fighting State Surveillance?
How Do I Crack Satellite and Cable Pay TV?
Dieselgate – A year later
Saving the World with (Vegan) Science
Stopping law enforcement hacking
Hochsicherheits-Generalschlüssel Marke Eigenbau
Virtual Secure Boot
Woolim – Lifting the Fog on DPRK’s Latest Tablet PC
Dissecting modern (3G/4G) cellular modems
A New Dark Age
Everything you always wanted to know about Certificate Transparency
In Search of Evidence-Based IT-Security
The Economic Consequences of Internet Censorship
Haft für Whistleblower?
The 12 Networking Truths
Predicting and Abusing WPA2/802.11 Group Keys
Ethics in the data society
Genetic Codes and what they tell us – and everyone else
Beyond Virtual and Augmented Reality
Copywrongs 2.0
PUFs, protection, privacy, PRNGs
The woman behind your WiFi
Es sind die kleinen Dinge im Leben
Retail Surveillance / Retail Countersurveillance
33C3 Infrastructure Review
Eavesdropping on the Dark Cosmos
Rebel Cities
Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule
Hacking collective as a laboratory
Netzpolitik in der Schweiz 2016
Der 33 Jahrerückblick
Hebocon
On Smart Cities, Smart Energy, And Dumb Security
ATMs how to break them to stop the fraud
Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur
Understanding the Snooper’s Charter
Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
Netzpolitik in Österreich
The Fight for Encryption in 2016
Bootstraping a slightly more secure laptop
A world without blockchain
Hacking Reality
The High Priests of the Digital Age
The Zcash anonymous cryptocurrency
Talking Behind Your Back
Building a high throughput low-latency PCIe based SDR
Nintendo Hacking 2016
Deploying TLS 1.3: the great, the good and the bad
Hacking the World
Machine Dreams
Kampf dem Abmahnunwesen
Shining some light on the Amazon Dash button
Reverse engineering Outernet
CCC-Jahresrückblick 2016
Community
The Moon and European Space Exploration
An Elevator to the Moon (and back)
Keys of Fury
From Server Farm to Data Table
Security Nightmares 0x11
Corporate surveillance, digital tracking, big data & privacy
The Untold Story of Edward Snowden’s Escape from Hong Kong
Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern
The Clash of Digitalizations
Anthropology for kids - What is privacy?
The Global Assassination Grid
33C3 Closing Ceremony
33C3 Opening Ceremony
No Love for the US Gov.
Durchmarsch von Rechts
DIE NSU-MONOLOGE / NSU-MONOLOGLARI
JODI - Apache is functioning normally
Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
Methodisch inkorrekt! Stream
Fnord-Jahresrückblick: Stream

Day 1

Day 2

Day 3

Day 4

Saal 1

Saal 2

Saal 6

Saal G

Saal 1

Saal 2

Saal 6

Saal G

Saal 1

Saal 2

Saal 6

Saal G

Saal 1

Saal 2

Saal 6

Saal G