MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

Chaos Computer Club - Congress

磁力链接/BT种子名称

Chaos Computer Club - Congress

磁力链接/BT种子简介

种子哈希:c7a3ffcf322ebcadedbfd1bc45642eb7db81ba16
文件大小: 324.92G
已经下载:173次
下载速度:极快
收录时间:2023-12-17
最近下载:2025-08-10

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:C7A3FFCF322EBCADEDBFD1BC45642EB7DB81BA16
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

mitsarin f1 ftr wvr6-d069 椎名もも gzy 梦实香苗被闺蜜陷害沦为肉便器 fds snos-080 faketaxi jennifer nsfs398 学生 sm大神 满园春色 elamigos mimk-257 fsdss 776 赫连 芋圆呀呀 fns-185 tease and please eva generosi 1080p 赵邦贺 深情小k ipz-373 sow spawning plan shelena 女校长 玩偶姐姐 threesixtyp 麻倉憂

文件列表

  • 30C3 - 2013/video/30c3-5577-de-en-Hacker_Jeopardy_h264-hd.mp4 1.3 GB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Libre_Hardware_Panel.mp4 1.0 GB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Summary_and_Political_Attack_Vectors-carlo_von_lynX.mp4 882.7 MB
  • 33C3 - 2016/Methodisch inkorrekt! (33c3) - english translation.mp4 859.0 MB
  • 30C3 - 2013/video/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hd.mp4 824.6 MB
  • 30C3 - 2013/video/30c3-5413-de-en-Security_Nightmares_h264-hd.mp4 793.2 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Jacob_Appelbaum-Pond.mp4 753.2 MB
  • 29C3 - 2012/video/29c3-5309-de-en-hacker_jeopardy_h264.mp4 750.2 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh_Routing-Panel-cjdns_freifunk_GNUnet_net2o.mp4 735.5 MB
  • 30C3 - 2013/video/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hd.mp4 718.8 MB
  • 31C3 - 2014/video/31c3-6563-en-Lightning_Talks_Day_2_hd.mp4 709.3 MB
  • 27C3 - 2010/video/27c3-4141-de-hacker_jeopardy.mp4 696.2 MB
  • 27C3 - 2010/video/27c3-4333-en-hacker_jeopardy_translation.mp4 695.5 MB
  • 33C3 - 2016/Methodisch inkorrekt! (33c3).mp4 688.1 MB
  • 28C3 - 2011/video/28c3-4832-de-neue_leichtigkeit_h264.mp4 628.4 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_In_Depth-Alessandro_Di_Federico-SNAKE.mp4 621.3 MB
  • 26C3 - 2009/video/26c3-3645-en-lightning_talks_-_day_4.mp4 619.2 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Routing-Panel_I2P_GNUnet_Tor_secushare.mp4 618.8 MB
  • 26C3 - 2009/video/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4 614.1 MB
  • 26C3 - 2009/video/26c3-3644-de-lightning_talks_-_day_3.mp4 598.9 MB
  • 26C3 - 2009/video/26c3-3642-en-lightning_talks_-_day_2.mp4 581.8 MB
  • 33C3 - 2016/CCC-JahresrUckblick 2016 (33c3) - traduction française.mp4 569.7 MB
  • 31C3 - 2014/video/31c3-6580-en-de-Lightning_Talks_Day_4_hd.mp4 567.5 MB
  • 26C3 - 2009/video/26c3-3668-en-hacker_jeopardy.mp4 561.0 MB
  • 26C3 - 2009/video/26c3-3669-de-hacker_jeopardy.mp4 556.5 MB
  • 26C3 - 2009/video/26c3-3550-de-chaos-familien-duell.mp4 519.0 MB
  • 26C3 - 2009/video/26c3-3563-en-lightning_talks_-_day_1.mp4 518.9 MB
  • 30C3 - 2013/video/30c3-5490-de-en-Fnord_News_Show_h264-hd.mp4 514.9 MB
  • 31C3 - 2014/video/31c3-6543-de-en-The_Time_is_Right_hd.mp4 502.7 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh-Caleb_J_Delisle-cjdns-Hyperboria.mp4 479.5 MB
  • 27C3 - 2010/video/27c3-4300-en-lightning_talks_d4.mp4 478.2 MB
  • 27C3 - 2010/video/27c3-4239-en-lightning_talks_d3.mp4 477.0 MB
  • 31C3 - 2014/video/31c3-6572-de-en-Security_Nightmares_hd.mp4 470.8 MB
  • 28C3 - 2011/video/28c3-4907-en-lightning_talks_day_4_h264.mp4 467.9 MB
  • 30C3 - 2013/video/30c3-5606-de-en-Closing_Event_h264-hd.mp4 451.2 MB
  • 26C3 - 2009/video/26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4 450.4 MB
  • 34C3 - 2017/34C3 - Methodisch inkorrekt! - english translation.mp4 448.8 MB
  • 34C3 - 2017/34C3 - Methodisch inkorrekt!.mp4 448.3 MB
  • 30C3 - 2013/video/30c3-5622-en-de-30c3_Keynote_h264-hd.mp4 443.3 MB
  • 31C3 - 2014/video/31c3-6583-de-en-Jahresrueckblick_des_CCC_hd.mp4 437.7 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Alessandro_Di_Federico-Friendship_Establishment.mp4 436.1 MB
  • 28C3 - 2011/video/28c3-4905-en-lightning_talks_day_2_h264.mp4 434.9 MB
  • 27C3 - 2010/video/27c3-4145-en-spoilers_human_interfaces_airplanes.mp4 428.8 MB
  • 26C3 - 2009/video/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4 428.6 MB
  • 27C3 - 2010/video/27c3-4183-en-safety_on_open_sea.mp4 427.9 MB
  • 28C3 - 2011/video/28c3-4934-en-hacker_jeopardy_translation_h264.mp4 427.7 MB
  • 31C3 - 2014/video/31c3-6043-en-de-The_Maker_movement_meets_patent_law_hd.mp4 423.5 MB
  • 31C3 - 2014/video/31c3-6291-en-Doing_right_by_sources_done_right_hd.mp4 421.0 MB
  • 30C3 - 2013/video/30c3-5537-en-Glass_Hacks_h264-hd.mp4 420.5 MB
  • 34C3 - 2017/34C3 - Hacker Jeopardy - english translation.mp4 418.1 MB
  • 33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3) - traduction française.mp4 416.6 MB
  • 27C3 - 2010/video/27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4 412.7 MB
  • 30C3 - 2013/video/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hd.mp4 412.4 MB
  • 27C3 - 2010/video/27c3-4265-en-hacking_smart_phones.mp4 405.8 MB
  • 31C3 - 2014/video/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_hd.mp4 405.8 MB
  • 27C3 - 2010/video/27c3-4090-en-baseband_apocalypse.mp4 403.3 MB
  • 27C3 - 2010/video/27c3-4276-en-cognitive_psychology_for_hackers.mp4 403.3 MB
  • 28C3 - 2011/video/28c3-4775-de-hacker_jeopardy_h264.mp4 401.8 MB
  • 33C3 - 2016/CCC-JahresrUckblick 2016 (33c3) - english translation.mp4 400.9 MB
  • 33C3 - 2016/CCC-JahresrUckblick 2016 (33c3).mp4 400.3 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Jan_Borchardt-Open_Source_Design.mp4 397.1 MB
  • 30C3 - 2013/video/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hd.mp4 396.0 MB
  • 33C3 - 2016/No Love for the US Gov. (33c3) - deutsche Ubersetzung.mp4 395.3 MB
  • 33C3 - 2016/No Love for the US Gov. (33c3) - traduction française.mp4 394.6 MB
  • 27C3 - 2010/video/27c3-4298-de-ccc_jahresrueckblick_2010.mp4 394.6 MB
  • 34C3 - 2017/34C3 - Hacker Jeopardy - SchwizerdUUtschi Ubersetzig.mp4 394.2 MB
  • 33C3 - 2016/No Love for the US Gov. (33c3).mp4 394.0 MB
  • 34C3 - 2017/34C3 - Hacker Jeopardy.mp4 393.5 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Bernstein_Lange_Schwabe-NaCl_and_TweetNaCl.mp4 393.2 MB
  • 25C3 - 2008/video/25c3-3024-de-jahresrueckblick.mp4 393.0 MB
  • 27C3 - 2010/video/27c3-4121-en-is_the_ssliverse_a_safe_place.mp4 391.3 MB
  • 27C3 - 2010/video/27c3-4094-de-netzneutralitaet_und_qos.mp4 387.4 MB
  • 27C3 - 2010/video/27c3-4237-en-indect_eu_surveillance_project.mp4 386.0 MB
  • 26C3 - 2009/video/26c3-3690-de-ccc-jahresrckblick.mp4 385.6 MB
  • 28C3 - 2011/video/28c3-4932-de-camp_review_2011_h264.mp4 383.6 MB
  • 33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3) - english translati.mp4 382.3 MB
  • 31C3 - 2014/video/31c3-6602-en-de-The_case_of_Chelsea_Manning_hd.mp4 378.4 MB
  • 26C3 - 2009/video/26c3-3687-de-security_nightmares.mp4 377.2 MB
  • 26C3 - 2009/video/26c3-3725-en-stream_security_nightmares.mp4 376.7 MB
  • 28C3 - 2011/video/28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264.mp4 376.0 MB
  • 26C3 - 2009/video/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4 375.3 MB
  • 27C3 - 2010/video/27c3-4123-en-defense_is_not_dead.mp4 373.4 MB
  • 31C3 - 2014/video/31c3-6579-en-de-Lightning_Talks_Day_3_hd.mp4 371.0 MB
  • 28C3 - 2011/video/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.mp4 368.3 MB
  • 33C3 - 2016/Untrusting the CPU (33c3).mp4 367.7 MB
  • 33C3 - 2016/Untrusting the CPU (33c3) - deutsche Ubersetzung.mp4 367.5 MB
  • 33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3).mp4 366.3 MB
  • 33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3) - english translation.mp4 365.7 MB
  • 27C3 - 2010/video/27c3-4236-en-international_cyber_jurisdiction.mp4 363.1 MB
  • 31C3 - 2014/video/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_hd.mp4 360.8 MB
  • 27C3 - 2010/video/27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4 359.6 MB
  • 30C3 - 2013/video/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hd.mp4 359.1 MB
  • 33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3) - deutsche Ubersetzung.mp4 357.8 MB
  • 27C3 - 2010/video/27c3-4187-en-your_infrastructure_will_kill_you.mp4 357.1 MB
  • 33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3).mp4 356.6 MB
  • 27C3 - 2010/video/27c3-4326-de-radio_der_zukunft.mp4 356.6 MB
  • 32C3 - 2015/video/32c3-7525-de-en-Quantenphysik_und_Kosmologie_hd.mp4 355.5 MB
  • 31C3 - 2014/video/31c3-6109-de-en-Fnord_News_Show_hd.mp4 355.1 MB
  • 32C3 - 2015/video/32c3-7221-de-Methodisch_inkorrekt_hd.mp4 353.2 MB
  • 33C3 - 2016/33C3 Infrastructure Review (33c3) - deutsche Ubersetzung.mp4 350.9 MB
  • 31C3 - 2014/video/31c3-6251-en-de-State_of_the_Onion_hd.mp4 348.8 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Brennan_Novak-mailpile_UX.mp4 348.8 MB
  • 26C3 - 2009/video/26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4 348.2 MB
  • 27C3 - 2010/video/27c3-4125-de-spinning_the_electronic_wheel.mp4 347.8 MB
  • 27C3 - 2010/video/27c3-4195-de-literarischer_abend.mp4 347.5 MB
  • 31C3 - 2014/video/31c3-5956-en-Cyber_Necromancy_hd.mp4 346.3 MB
  • 26C3 - 2009/video/26c3-3658-en-black_ops_of_pki.mp4 346.2 MB
  • 31C3 - 2014/video/31c3-6214-en-de-Attribution_revolution_hd.mp4 346.1 MB
  • 27C3 - 2010/video/27c3-4339-en-openleaks.mp4 345.9 MB
  • 26C3 - 2009/video/26c3-3613-de-fnord-jahresrckblick_2009.mp4 345.1 MB
  • 28C3 - 2011/video/28c3-4908-de-jahresrueckblick_2011_h264.mp4 343.2 MB
  • 27C3 - 2010/video/27c3-4011-en-embedded_reverse_engineering.mp4 343.1 MB
  • 27C3 - 2010/video/27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4 342.6 MB
  • 27C3 - 2010/video/27c3-4231-en-datenrettung_fun_with_hard_drives.mp4 341.0 MB
  • 27C3 - 2010/video/27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4 340.5 MB
  • 31C3 - 2014/video/31c3-6103-en-AMD_x86_SMU_firmware_analysis_hd.mp4 339.5 MB
  • 30C3 - 2013/video/30c3-5423-en-The_Tor_Network_h264-hd.mp4 336.5 MB
  • 33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3).mp4 335.2 MB
  • 27C3 - 2010/video/27c3-4151-en-android_geolocation_using_gsm_network.mp4 335.1 MB
  • 29C3 - 2012/video/29c3-5338-en-enemies_of_the_state_h264.mp4 332.5 MB
  • 31C3 - 2014/video/31c3-6563-en-de-Lightning_Talks_Day_2_hd.mp4 331.6 MB
  • 30C3 - 2013/video/30c3-5406-en-Drones_h264-hd.mp4 330.8 MB
  • 28C3 - 2011/video/28c3-4935-en-eu_datenschutz_internet_der_dinge_h264.mp4 329.9 MB
  • 28C3 - 2011/video/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4 329.1 MB
  • 32C3 - 2015/video/32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_hd.mp4 326.9 MB
  • 32C3 - 2015/video/32c3-7306-de-en-Jahresrueckblick_des_CCC_hd.mp4 326.4 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Julian_Kirsch-Knock.mp4 326.2 MB
  • 33C3 - 2016/Liberté, Égalité, Fraternité... and privacy ! (33c3).mp4 325.9 MB
  • 33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3).mp4 325.5 MB
  • 25C3 - 2008/video/25c3-2958-de-hacker_jeopardy.mp4 325.4 MB
  • 27C3 - 2010/video/27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4 325.0 MB
  • 26C3 - 2009/video/26c3-3520-en-conlanging_101.mp4 324.3 MB
  • 33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3) - english translation.mp4 324.0 MB
  • 30C3 - 2013/video/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hd.mp4 323.9 MB
  • 25C3 - 2008/video/25c3-3057-en-hacker_jeopardy_english_interpretation.mp4 322.9 MB
  • 27C3 - 2010/video/27c3-4082-en-sap_landscape.mp4 319.3 MB
  • 27C3 - 2010/video/27c3-4176-de-hacking_ibuttons.mp4 318.3 MB
  • 29C3 - 2012/video/29c3-5379-de-en-jahresrueckblick2012_h264.mp4 315.2 MB
  • 33C3 - 2016/Die Sprache der Populisten (33c3) - english translation.mp4 314.2 MB
  • 26C3 - 2009/video/26c3-3711-de-computerspielepolitik.mp4 314.2 MB
  • 26C3 - 2009/video/26c3-3494-de-defending_the_poor.mp4 314.0 MB
  • 27C3 - 2010/video/27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4 313.6 MB
  • 27C3 - 2010/video/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4 313.1 MB
  • 27C3 - 2010/video/27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4 312.8 MB
  • 27C3 - 2010/video/27c3-4296-en-lightning_days_d2.mp4 312.6 MB
  • 27C3 - 2010/video/27c3-4263-en-resisting_excessive_government_surveillance.mp4 312.5 MB
  • 34C3 - 2017/34C3 - JahresrUckblick des CCC 2017 - traduction francaise.mp4 312.5 MB
  • 26C3 - 2009/video/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4 310.4 MB
  • 30C3 - 2013/video/30c3-5499-en-X_Security_h264-hd.mp4 309.8 MB
  • 30C3 - 2013/video/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hd.mp4 308.4 MB
  • 32C3 - 2015/video/32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_hd.mp4 306.7 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 4 - Ubersetzung Translation.mp4 305.3 MB
  • 26C3 - 2009/video/26c3-3654-en-gsm_srsly.mp4 304.5 MB
  • 29C3 - 2012/video/29c3-5383-en-lightning_talks_2_h264.mp4 304.4 MB
  • 28C3 - 2011/video/28c3-4721-en-pentanews_game_show_2k11_h264.mp4 304.2 MB
  • 27C3 - 2010/video/27c3-4070-de-fnord_jahresrueckblick.mp4 303.0 MB
  • 27C3 - 2010/video/27c3-4334-en-fnord_jahresrueckblick.mp4 302.9 MB
  • 29C3 - 2012/video/29c3-5037-de-en-nougatbytes10_h264.mp4 302.2 MB
  • 26C3 - 2009/video/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4 298.5 MB
  • 34C3 - 2017/34C3 - JahresrUckblick des CCC 2017.mp4 298.2 MB
  • 34C3 - 2017/34C3 - JahresrUckblick des CCC 2017 - english translation.mp4 298.2 MB
  • 26C3 - 2009/video/26c3-3570-en-weaponizing_cultural_viruses.mp4 297.1 MB
  • 25C3 - 2008/video/25c3-3021-de-security_nightmares_2009.mp4 296.9 MB
  • 27C3 - 2010/video/27c3-4253-en-pentanews_game_show.mp4 296.2 MB
  • 31C3 - 2014/video/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_hd.mp4 294.6 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 4.mp4 293.1 MB
  • 31C3 - 2014/video/31c3-5931-en-de-Telescope_Making_hd.mp4 292.4 MB
  • 25C3 - 2008/video/25c3-3058-en-security_nightmares_2009_english_interpretation.mp4 292.2 MB
  • 32C3 - 2015/video/32c3-7152-de-en-gsw-Hacker_Jeopardy_hd.mp4 291.8 MB
  • 28C3 - 2011/video/28c3-4722-de-dick_size_war_for_nerds_h264.mp4 291.6 MB
  • 32C3 - 2015/video/32c3-7421-en-de-Fluxus_cannot_save_the_world_hd.mp4 291.4 MB
  • 31C3 - 2014/video/31c3-6397-en-de-Lets_Encrypt_hd.mp4 291.0 MB
  • 27C3 - 2010/video/27c3-4160-en-automatic_identification_cryptographic_primitives.mp4 289.7 MB
  • 26C3 - 2009/video/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4 289.5 MB
  • 30C3 - 2013/video/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4 287.7 MB
  • 31C3 - 2014/video/31c3-6261-en-de-Lets_build_a_quantum_computer_hd.mp4 285.9 MB
  • 26C3 - 2009/video/26c3-3590-de-europische_biometriestrategien.mp4 285.1 MB
  • 30C3 - 2013/video/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4 284.9 MB
  • 31C3 - 2014/video/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_hd.mp4 284.0 MB
  • 33C3 - 2016/Community (33c3) - deutsche Ubersetzung.mp4 283.9 MB
  • 33C3 - 2016/Community (33c3).mp4 283.5 MB
  • 27C3 - 2010/video/27c3-4234-en-usb_and_libusb.mp4 283.2 MB
  • 27C3 - 2010/video/27c3-4164-de-friede_sei_mit_euren_daten.mp4 283.0 MB
  • 31C3 - 2014/video/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_hd.mp4 282.2 MB
  • 26C3 - 2009/video/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4 282.0 MB
  • 27C3 - 2010/video/27c3-4144-en-short_political_history_of_acoustics.mp4 281.7 MB
  • 28C3 - 2011/video/28c3-4937-en-security_nightmares_h264.mp4 281.3 MB
  • 29C3 - 2012/video/29c3-5384-en-lightning_talks_3_h264.mp4 281.3 MB
  • 27C3 - 2010/video/27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4 281.2 MB
  • 31C3 - 2014/video/31c3-6571-en-31C3_Keynote_hd.mp4 280.2 MB
  • 26C3 - 2009/video/26c3-3540-en-a_hackers_utopia.mp4 280.1 MB
  • 33C3 - 2016/33C3 Closing Ceremony (33c3) - english translation.mp4 280.1 MB
  • 32C3 - 2015/video/32c3-7283-en-de-Software_and_business_method_patents_call_for_action_hd.mp4 279.7 MB
  • 27C3 - 2010/video/27c3-4230-de-security_nightmares.mp4 279.5 MB
  • 31C3 - 2014/video/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_hd.mp4 279.4 MB
  • 26C3 - 2009/video/26c3-3554-de-tor_and_censorship_lessons_learned.mp4 278.5 MB
  • 26C3 - 2009/video/26c3-3567-en-wikileaks_release_10.mp4 277.6 MB
  • 30C3 - 2013/video/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hd.mp4 277.6 MB
  • 31C3 - 2014/video/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_hd.mp4 277.5 MB
  • 27C3 - 2010/video/27c3-4149-en-i_control_your_code.mp4 277.4 MB
  • 26C3 - 2009/video/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4 277.2 MB
  • 26C3 - 2009/video/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4 277.0 MB
  • 27C3 - 2010/video/27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4 276.8 MB
  • 27C3 - 2010/video/27c3-4018-en-frozencache.mp4 276.5 MB
  • 26C3 - 2009/video/26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4 276.5 MB
  • 31C3 - 2014/video/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_hd.mp4 276.2 MB
  • 26C3 - 2009/video/26c3-3592-de-cybernetic_cannibalism.mp4 276.2 MB
  • 26C3 - 2009/video/26c3-3464-de-liquid_democracy.mp4 276.0 MB
  • 27C3 - 2010/video/27c3-4085-de-digitale_spaltung_per_gesetz.mp4 276.0 MB
  • 27C3 - 2010/video/27c3-3957-en-ipv6_insecurities.mp4 275.5 MB
  • 26C3 - 2009/video/26c3-3709-en-legic_prime_obscurity_in_depth.mp4 274.8 MB
  • 34C3 - 2017/34C3 - The Snowden Refugees under Surveillance in Hong Kong - deutsche Ubersetzung.mp4 273.4 MB
  • 34C3 - 2017/34C3 - The Snowden Refugees under Surveillance in Hong Kong - traduction francaise.mp4 273.2 MB
  • 31C3 - 2014/video/31c3-6377-en-de-Paypals_War_on_Terror_hd.mp4 271.9 MB
  • 27C3 - 2010/video/27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4 271.6 MB
  • 30C3 - 2013/video/30c3-5587-en-Making_machines_that_make_h264-hd.mp4 271.6 MB
  • 27C3 - 2010/video/27c3-4017-en-desktop_on_the_linux.mp4 271.0 MB
  • 26C3 - 2009/video/26c3-3266-de-hacking_the_universe.mp4 270.7 MB
  • 26C3 - 2009/video/26c3-3648-en-dect_part_ii.mp4 270.2 MB
  • 26C3 - 2009/video/26c3-3481-de-leyen-rhetorik.mp4 269.6 MB
  • 32C3 - 2015/video/32c3-7443-en-de-The_Price_Of_Dissent_hd.mp4 269.0 MB
  • 30C3 - 2013/video/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hd.mp4 268.8 MB
  • 28C3 - 2011/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4 268.2 MB
  • 26C3 - 2009/video/26c3-3713-de-unbild__pictures_and_non-pictures.mp4 267.8 MB
  • 27C3 - 2010/video/27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4 267.8 MB
  • 28C3 - 2011/video/28c3-4788-de-datenvieh_oder_daten_fee_h264.mp4 267.4 MB
  • 28C3 - 2011/video/28c3-4898-de-security_nightmares_h264.mp4 267.3 MB
  • 34C3 - 2017/34C3 - Nougatbytes 11 - english translation.mp4 266.4 MB
  • 26C3 - 2009/video/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4 266.3 MB
  • 31C3 - 2014/video/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_hd.mp4 265.3 MB
  • 30C3 - 2013/video/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hd.mp4 265.2 MB
  • 28C3 - 2011/video/28c3-4928-en-kinectfusion_h264.mp4 265.2 MB
  • 31C3 - 2014/video/31c3-5943-en-de-Low_Cost_High_Speed_Photography_hd.mp4 265.0 MB
  • 26C3 - 2009/video/26c3-3573-en-playing_with_the_built_city.mp4 264.9 MB
  • 30C3 - 2013/video/30c3-5295-en-de-The_Four_Wars_h264-hd.mp4 264.4 MB
  • 27C3 - 2010/video/27c3-4244-en-critical_overview_of_10_years_pet.mp4 264.2 MB
  • 27C3 - 2010/video/27c3-4061-en-building_custom_disassemblers.mp4 264.1 MB
  • 26C3 - 2009/video/26c3-3547-en-after_the_hype.mp4 263.9 MB
  • 31C3 - 2014/video/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_hd.mp4 263.9 MB
  • 26C3 - 2009/video/26c3-3696-en-wireless_power_transfer.mp4 263.7 MB
  • 26C3 - 2009/video/26c3-3510-de-technik_des_neuen_epa.mp4 263.4 MB
  • 26C3 - 2009/video/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4 262.1 MB
  • 26C3 - 2009/video/26c3-3452-en-here_be_electric_dragons.mp4 262.1 MB
  • 26C3 - 2009/video/26c3-3657-en-optimised_to_fail.mp4 261.9 MB
  • 31C3 - 2014/video/31c3-6240-en-Reproducible_Builds_hd.mp4 261.3 MB
  • 26C3 - 2009/video/26c3-3600-de-location_tracking_does_scale_up.mp4 260.5 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Monero Hardware Development.mp4 260.2 MB
  • 26C3 - 2009/video/26c3-3577-de-privacy-enhanced_event_scheduling.mp4 260.1 MB
  • 30C3 - 2013/video/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hd.mp4 259.8 MB
  • 31C3 - 2014/video/31c3-6255-de-en-10_Jahre_OpenStreetMap_hd.mp4 259.7 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh-Bart_Polot-GNUnet_Wireless_Mesh_DHT.mp4 259.4 MB
  • 28C3 - 2011/video/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.mp4 259.3 MB
  • 25C3 - 2008/video/25c3-2639-en-attacking_nfc_mobile_phones.mp4 258.6 MB
  • 26C3 - 2009/video/26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4 258.5 MB
  • 27C3 - 2010/video/27c3-4338-de-wikileaks_und_mehr.mp4 257.4 MB
  • 26C3 - 2009/video/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4 256.9 MB
  • 27C3 - 2010/video/27c3-4297-de-die_gesamte_technik_ist_sicher.mp4 256.7 MB
  • 26C3 - 2009/video/26c3-3495-de-das_zugangserschwerungsgesetz.mp4 256.2 MB
  • 29C3 - 2012/video/29c3-5244-de-en-security_nightmares2012_h264.mp4 256.2 MB
  • 27C3 - 2010/video/27c3-4190-en-data_retention_in_the_eu.mp4 256.0 MB
  • 26C3 - 2009/video/26c3-3468-de-privacy_amp_stylometry.mp4 255.7 MB
  • 32C3 - 2015/video/32c3-7558-en-de-Lightning_Talks_Day_2_hd.mp4 255.5 MB
  • 27C3 - 2010/video/27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4 255.0 MB
  • 29C3 - 2012/video/29c3-5316-en-lightningtalks1_h264.mp4 254.4 MB
  • 31C3 - 2014/video/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_hd.mp4 254.0 MB
  • 26C3 - 2009/video/26c3-3501-en-why_net_neutrality_matters.mp4 253.0 MB
  • 25C3 - 2008/video/25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4 252.1 MB
  • 30C3 - 2013/video/30c3-5295-en-The_Four_Wars_h264-hd.mp4 251.9 MB
  • 28C3 - 2011/video/28c3-4913-de-almighty_dna_and_beyond_h264.mp4 251.9 MB
  • 31C3 - 2014/video/31c3-6350-en-Correcting_copywrongs_hd.mp4 251.3 MB
  • 34C3 - 2017/34C3 - Nougatbytes 11.mp4 251.1 MB
  • 26C3 - 2009/video/26c3-3515-en-secubt.mp4 251.0 MB
  • 27C3 - 2010/video/27c3-4174-en-the_hidden_nemesis.mp4 251.0 MB
  • 34C3 - 2017/34C3 - Don't stop 'til you feel it - deutsche Ubersetzung.mp4 250.9 MB
  • 33C3 - 2016/The Global Assassination Grid - traduction française (33c3).mp4 250.4 MB
  • 29C3 - 2012/video/29c3-5282-de-en-rfidkleidung_h264.mp4 249.7 MB
  • 34C3 - 2017/34C3 - Don't stop 'til you feel it.mp4 249.5 MB
  • 26C3 - 2009/video/26c3-3670-en-blackbox_jtag_reverse_engineering.mp4 249.2 MB
  • 26C3 - 2009/video/26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4 248.9 MB
  • 27C3 - 2010/video/27c3-4301-en-flow_analysis_of_internet_activities.mp4 248.7 MB
  • 32C3 - 2015/video/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_hd.mp4 248.3 MB
  • 33C3 - 2016/Kampf dem Abmahnunwesen (33c3) - english translation.mp4 248.1 MB
  • 27C3 - 2010/video/27c3-4140-en-contemporary_profiling_of_web_users.mp4 247.7 MB
  • 28C3 - 2011/video/28c3-4660-en-post_memory_corruption_memory_analysis_h264.mp4 247.4 MB
  • 25C3 - 2008/video/25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4 246.9 MB
  • 28C3 - 2011/video/28c3-4581-en-taking_control_over_the_tor_network_h264.mp4 246.2 MB
  • 28C3 - 2011/video/28c3-4748-en-the_best_of_the_oxcars_h264.mp4 245.9 MB
  • 33C3 - 2016/Fnord-JahresrUckblick (33c3) - english translation.mp4 245.8 MB
  • 33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3).mp4 245.1 MB
  • 26C3 - 2009/video/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4 245.1 MB
  • 26C3 - 2009/video/26c3-3490-en-building_a_debugger.mp4 243.7 MB
  • 33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3) - traduction française.mp4 243.3 MB
  • 26C3 - 2009/video/26c3-3509-de-wofr_offenes_internet.mp4 242.7 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Jon_Solworth-Ethos_Operating_System.mp4 242.0 MB
  • 27C3 - 2010/video/27c3-4175-en-from_robot_to_robot.mp4 241.7 MB
  • 28C3 - 2011/video/28c3-4768-en-eating_in_the_anthropocene_h264.mp4 241.5 MB
  • 29C3 - 2012/video/29c3-5380-de-en-staatstrojaner2012_h264.mp4 240.8 MB
  • 33C3 - 2016/Building Custom Pinball Machines (33c3) - deutsche Ubersetzung.mp4 240.4 MB
  • 25C3 - 2008/video/25c3-3030-en-messing_around_with_garage_doors.mp4 240.4 MB
  • 28C3 - 2011/video/28c3-4811-en-rootkits_in_your_web_application_h264.mp4 240.1 MB
  • 26C3 - 2009/video/26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4 238.8 MB
  • 32C3 - 2015/video/32c3-7559-en-de-Lightning_Talks_Day_3_hd.mp4 238.6 MB
  • 28C3 - 2011/video/28c3-4700-en-what_is_whiteit_h264.mp4 238.3 MB
  • 26C3 - 2009/video/26c3-3523-de-eine_zensur_findet_statt.mp4 238.2 MB
  • 28C3 - 2011/video/28c3-4754-en-smart_hacking_for_privacy_h264.mp4 237.3 MB
  • 33C3 - 2016/Durchmarsch von Rechts (33c3) - english translation.mp4 236.5 MB
  • 31C3 - 2014/video/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_hd.mp4 236.2 MB
  • 28C3 - 2011/video/28c3-4777-en-r0ket_h264.mp4 236.0 MB
  • 26C3 - 2009/video/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4 235.8 MB
  • 29C3 - 2012/video/29c3-5198-en-de-fnord_jahresrueckblick2012_h264.mp4 235.7 MB
  • 33C3 - 2016/Warum in die Ferne schweifen, wenn das Ausland liegt so nah (33c3) - english translation.mp4 235.1 MB
  • 28C3 - 2011/video/28c3-4799-de-can_trains_be_hacked_h264.mp4 234.7 MB
  • 34C3 - 2017/34C3 - Tracking Transience - deutsche Ubersetzung.mp4 234.4 MB
  • 34C3 - 2017/34C3 - Tracking Transience.mp4 234.0 MB
  • 27C3 - 2010/video/27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4 233.6 MB
  • 29C3 - 2012/video/29c3-5419-de-podcaster_workshop_h264.mp4 232.9 MB
  • 33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3) - deutsche Uberse.mp4 232.8 MB
  • 32C3 - 2015/video/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_hd.mp4 232.1 MB
  • 26C3 - 2009/video/26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4 231.8 MB
  • 27C3 - 2010/video/27c3-4184-de-stanislaw_lem_weltverbesserer.mp4 231.4 MB
  • 33C3 - 2016/State of Internet Censorship 2016 (33c3) - deutsche Ubersetzung.mp4 231.1 MB
  • 27C3 - 2010/video/27c3-4208-en-wideband_gsm_sniffing.mp4 231.0 MB
  • 33C3 - 2016/Nicht öffentlich. (33c3) - traduction française.mp4 230.6 MB
  • 28C3 - 2011/video/28c3-4713-en-what_is_in_a_name_h264.mp4 230.6 MB
  • 33C3 - 2016/33C3 Infrastructure Review (33c3).mp4 230.6 MB
  • 33C3 - 2016/Nicht öffentlich. (33c3) - english translation.mp4 230.5 MB
  • 28C3 - 2011/video/28c3-4802-en-towards_a_single_secure_european_cyberspace_h264.mp4 230.3 MB
  • 33C3 - 2016/Copywrongs 2.0 (33c3) - traduction française.mp4 230.1 MB
  • 33C3 - 2016/An Elevator to the Moon (and back) (33c3) - deutsche Ubersetzung.mp4 230.0 MB
  • 33C3 - 2016/Copywrongs 2.0 (33c3) - deutsche Ubersetzung.mp4 229.3 MB
  • 26C3 - 2009/video/26c3-3504-en-our_darknet_and_its_bright_spots.mp4 229.3 MB
  • 26C3 - 2009/video/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4 229.2 MB
  • 26C3 - 2009/video/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4 229.0 MB
  • 28C3 - 2011/video/28c3-4936-en-fnord_jahresrueckblick_h264.mp4 228.9 MB
  • 26C3 - 2009/video/26c3-3685-de-im_herz_der_bestie.mp4 228.8 MB
  • 34C3 - 2017/34C3 - Pointing Fingers at 'The Media' - deutsche Ubersetzung.mp4 228.7 MB
  • 28C3 - 2011/video/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4 228.7 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Bart_Polot-GNU_Telephony.mp4 227.6 MB
  • 28C3 - 2011/video/28c3-4930-en-black_ops_of_tcpip_2011_h264.mp4 227.6 MB
  • 26C3 - 2009/video/26c3-3672-de-advanced_microcontroller_programming.mp4 227.4 MB
  • 29C3 - 2012/video/29c3-5285-de-en-men_who_stare_at_bits_h264.mp4 227.4 MB
  • 25C3 - 2008/video/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4 227.3 MB
  • 31C3 - 2014/video/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_hd.mp4 227.3 MB
  • 27C3 - 2010/video/27c3-4103-en-copyright_enforcement_versus_freedoms.mp4 227.3 MB
  • 31C3 - 2014/video/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_hd.mp4 226.4 MB
  • 28C3 - 2011/video/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4 226.0 MB
  • 31C3 - 2014/video/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_hd.mp4 225.2 MB
  • 25C3 - 2008/video/25c3-2773-en-soviet_unterzoegersdorf.mp4 225.0 MB
  • 32C3 - 2015/video/32c3-7280-en-de-Cyber_all_the_Wassenaars_hd.mp4 223.5 MB
  • 34C3 - 2017/34C3 - Lobby-Schlacht um die ePrivacy-Verordnung.mp4 222.8 MB
  • 27C3 - 2010/video/27c3-4206-en-immi_from_concept_to_reality.mp4 222.5 MB
  • 34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection - deutsche Ubersetzun.mp4 222.4 MB
  • 34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection - La traduccion espan.mp4 222.0 MB
  • 34C3 - 2017/34C3 - Pointing Fingers at 'The Media'.mp4 221.9 MB
  • 26C3 - 2009/video/26c3-3631-en-finding_the_key_in_the_haystack.mp4 221.8 MB
  • 28C3 - 2011/video/28c3-4640-en-time_is_on_my_side_h264.mp4 221.6 MB
  • 30C3 - 2013/video/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hd.mp4 220.9 MB
  • 29C3 - 2012/video/29c3-5262-de-en-anderthalb_jahre_fragdenstaat_h264.mp4 220.9 MB
  • 25C3 - 2008/video/25c3-2860-de-neusprech_im_berwachungsstaat.mp4 220.8 MB
  • 27C3 - 2010/video/27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4 220.2 MB
  • 33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3) - deutsche Ubersetzung.mp4 219.8 MB
  • 33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3).mp4 219.2 MB
  • 32C3 - 2015/video/32c3-7540-en-de-Maker_Spaces_in_Favelas_-_Lecture_hd.mp4 219.1 MB
  • 30C3 - 2013/video/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4 219.0 MB
  • 32C3 - 2015/video/32c3-7403-en-de-A_New_Kid_on_the_Block_hd.mp4 218.9 MB
  • 27C3 - 2010/video/27c3-4003-en-cybernetics_for_the_masses.mp4 218.4 MB
  • 32C3 - 2015/video/32c3-7560-en-de-Lightning_Talks_Day_4_hd.mp4 218.0 MB
  • 26C3 - 2009/video/26c3-3700-de-here_be_dragons.mp4 217.8 MB
  • 34C3 - 2017/34C3 - Die Lauschprogramme der Geheimdienste.mp4 216.6 MB
  • 26C3 - 2009/video/26c3-3710-en-the_lost_cosmonauts.mp4 216.5 MB
  • 28C3 - 2011/video/28c3-4866-de-fnord_jahresrueckblick_h264.mp4 215.9 MB
  • 26C3 - 2009/video/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4 215.4 MB
  • 32C3 - 2015/video/32c3-7546-de-en-Security_Nightmares_0x10_hd.mp4 215.3 MB
  • 28C3 - 2011/video/28c3-4821-en-not_your_grandfathers_moon_landing_h264.mp4 215.1 MB
  • 31C3 - 2014/video/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_hd.mp4 214.9 MB
  • 28C3 - 2011/video/28c3-4856-en-the_engineering_part_of_social_engineering_h264.mp4 214.0 MB
  • 29C3 - 2012/video/29c3-5179-de-en-hacking_philosophy_h264.mp4 213.8 MB
  • 33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3) - deutsche Ubersetzung.mp4 212.6 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Scalability-Gabor_Toth-Secure-Share-Multicasting-for-GNUnet.mp4 212.5 MB
  • 25C3 - 2008/video/25c3-3016-en-life_is_a_holodeck.mp4 212.3 MB
  • 28C3 - 2011/video/28c3-4780-en-print_me_if_you_dare_h264.mp4 212.1 MB
  • 33C3 - 2016/Build your own NSA (33c3) - traduction française.mp4 211.9 MB
  • 33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3).mp4 211.8 MB
  • 34C3 - 2017/34C3 - QualityLand - english translation.mp4 211.0 MB
  • 31C3 - 2014/video/31c3-5997-en-Preserving_arcade_games_hd.mp4 210.9 MB
  • 25C3 - 2008/video/25c3-2937-en-dect.mp4 210.5 MB
  • 33C3 - 2016/Die Sprache der Populisten (33c3).mp4 210.5 MB
  • 34C3 - 2017/34C3 - QualityLand.mp4 210.4 MB
  • 33C3 - 2016/Die Sprache der Populisten (33c3) - traduction française.mp4 210.4 MB
  • 28C3 - 2011/video/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.mp4 209.8 MB
  • 20C3 - 2003/video/20C3-600-RFID.mp4 209.2 MB
  • 25C3 - 2008/video/25c3-2816-en-cisco_ios_attack_and_defense.mp4 208.8 MB
  • 27C3 - 2010/video/27c3-4096-en-code_deobfuscation_by_optimization.mp4 208.5 MB
  • 28C3 - 2011/video/28c3-4749-en-does_hacktivism_matter_h264.mp4 208.4 MB
  • 28C3 - 2011/video/28c3-4706-en-power_gadgets_with_your_own_electricity_h264.mp4 208.1 MB
  • 33C3 - 2016/Build your own NSA (33c3) - english translation.mp4 207.8 MB
  • 31C3 - 2014/video/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_hd.mp4 207.1 MB
  • 32C3 - 2015/video/32c3-7154-en-de-Iridium_Update_hd.mp4 207.0 MB
  • 32C3 - 2015/video/32c3-7260-en-de-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for_hd.mp4 206.8 MB
  • 25C3 - 2008/video/25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4 206.8 MB
  • 34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection.mp4 206.7 MB
  • 25C3 - 2008/video/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4 206.7 MB
  • 33C3 - 2016/Build your own NSA (33c3).mp4 206.7 MB
  • 27C3 - 2010/video/27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4 206.5 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Simon_Levermann-Tox_Telephony.mp4 206.1 MB
  • 30C3 - 2013/video/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hd.mp4 205.6 MB
  • 29C3 - 2012/video/29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_h264.mp4 205.4 MB
  • 26C3 - 2009/video/26c3-3608-en-playing_with_the_gsm_rf_interface.mp4 205.3 MB
  • 31C3 - 2014/video/31c3-6253-en-de-Computer_Science_in_the_DPRK_hd.mp4 205.2 MB
  • 25C3 - 2008/video/25c3-2991-en-terrorist_all-stars.mp4 205.1 MB
  • 32C3 - 2015/video/32c3-7562-de-en-Jugend_hackt_2015_hd.mp4 205.0 MB
  • 25C3 - 2008/video/25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4 205.0 MB
  • 28C3 - 2011/video/28c3-4668-en-electronic_money_h264.mp4 204.9 MB
  • 28C3 - 2011/video/28c3-4669-en-bionic_ears_h264.mp4 204.9 MB
  • 25C3 - 2008/video/25c3-2934-en-blinkenlights_stereoscope.mp4 204.3 MB
  • 25C3 - 2008/video/25c3-2863-en-climate_change_-_state_of_the_science.mp4 204.1 MB
  • 32C3 - 2015/video/32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_hd.mp4 203.9 MB
  • 26C3 - 2009/video/26c3-3594-de-internetsperren.mp4 203.9 MB
  • 28C3 - 2011/video/28c3-4675-de-politik_neusprech_2011_h264.mp4 203.9 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Honigdachs-Podcast LIVE.mp4 202.8 MB
  • 29C3 - 2012/video/29c3-5266-de-en-proximax_telex_flashproxy_h264.mp4 202.6 MB
  • 28C3 - 2011/video/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264.mp4 202.4 MB
  • 33C3 - 2016/Do as I Say not as I Do Stealth Modification of Programmable Logic Controllers I O by Pin Control A.mp4 202.1 MB
  • 29C3 - 2012/video/29c3-5283-de-en-whiteit_cleanit_ceocoalition_h264.mp4 201.9 MB
  • 31C3 - 2014/video/31c3-6142-en-de-Space_Hacker_hd.mp4 201.7 MB
  • 32C3 - 2015/video/32c3-7307-en-de-State_of_the_Onion_hd.mp4 201.7 MB
  • 32C3 - 2015/video/32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_hd.mp4 201.5 MB
  • 34C3 - 2017/34C3 - We should share our secrets - deutsche Ubersetzung.mp4 200.9 MB
  • 34C3 - 2017/34C3 - We should share our secrets - traduction francaise.mp4 200.7 MB
  • 34C3 - 2017/34C3 - We should share our secrets.mp4 200.2 MB
  • 34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen - english translation.mp4 200.0 MB
  • 34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen - traduction francaise.mp4 199.6 MB
  • 29C3 - 2012/video/29c3-5401-de-en-der_mord_faellt_aus_h264.mp4 199.5 MB
  • 32C3 - 2015/video/32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_hd.mp4 199.1 MB
  • 31C3 - 2014/video/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_hd.mp4 198.7 MB
  • 31C3 - 2014/video/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_hd.mp4 198.7 MB
  • 25C3 - 2008/video/25c3-3020-en-banking_malware_101.mp4 198.6 MB
  • 33C3 - 2016/33C3 Closing Ceremony (33c3) - traduction française.mp4 198.2 MB
  • 25C3 - 2008/video/25c3-2832-en-exploiting_symbian.mp4 197.7 MB
  • 26C3 - 2009/video/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4 197.4 MB
  • 26C3 - 2009/video/26c3-3302-en-i_internet.mp4 197.0 MB
  • 33C3 - 2016/33C3 Closing Ceremony (33c3).mp4 196.9 MB
  • 27C3 - 2010/video/27c3-4143-en-parttimescientists.mp4 196.7 MB
  • 27C3 - 2010/video/27c3-4245-en-adventures_in_analyzing_stuxnet.mp4 196.1 MB
  • 33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3) - english translation.mp4 196.0 MB
  • 31C3 - 2014/video/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_hd.mp4 195.7 MB
  • 28C3 - 2011/video/28c3-4755-en-counterlobbying_eu_institutions_h264.mp4 195.6 MB
  • 21C3 - 2004/video/159 State of Emergent Democracy.mp4 195.0 MB
  • 25C3 - 2008/video/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4 195.0 MB
  • 27C3 - 2010/video/27c3-4073-de-logikschaltungen_ohne_elektronik.mp4 194.9 MB
  • 29C3 - 2012/video/29c3-5397-de-en-indect_verhaltenserkennung_h264.mp4 194.9 MB
  • 25C3 - 2008/video/25c3-3023-en-making_the_theoretical_possible.mp4 194.8 MB
  • 29C3 - 2012/video/29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_h264.mp4 194.8 MB
  • 31C3 - 2014/video/31c3-6600-en-de-Tell_no-one_hd.mp4 194.4 MB
  • 29C3 - 2012/video/29c3-5270-de-en-hanussens_mindreading_h264.mp4 194.3 MB
  • 32C3 - 2015/video/32c3-7570-en-de-Plunge_into_Proxy_Politics_hd.mp4 193.8 MB
  • 31C3 - 2014/video/31c3-6122-en-de-Mobile_self-defense_hd.mp4 193.7 MB
  • 25C3 - 2008/video/25c3-2893-en-attacking_rich_internet_applications.mp4 193.6 MB
  • 31C3 - 2014/video/31c3-6299-en-de-Trackography_hd.mp4 193.6 MB
  • 25C3 - 2008/video/25c3-2963-de-handschellen_hacken.mp4 193.3 MB
  • 25C3 - 2008/video/25c3-3028-de-der_hackerparagraph_202c_stgb.mp4 193.3 MB
  • 25C3 - 2008/video/25c3-2973-en-lightning_talks_day4.mp4 193.0 MB
  • 26C3 - 2009/video/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4 192.8 MB
  • 33C3 - 2016/Lightning Talks Day 2 (33c3) - deutsche Ubersetzung.mp4 192.7 MB
  • 23C3 - 2006/video/23C3-1683-de-powerpoint_karaoke.mp4 192.4 MB
  • 27C3 - 2010/video/27c3-4211-en-chip_and_pin_is_broken.mp4 191.9 MB
  • 25C3 - 2008/video/25c3-2665-en-the_trust_situation.mp4 191.9 MB
  • 25C3 - 2008/video/25c3-2874-en-the_ultimate_commodore_64_talk.mp4 191.9 MB
  • 29C3 - 2012/video/29c3-5382-de-en-antiterrordatei_h264.mp4 191.4 MB
  • 25C3 - 2008/video/25c3-2940-en-flying_for_free.mp4 190.9 MB
  • 25C3 - 2008/video/25c3-2895-de-der_elektronische_personalausweis.mp4 190.8 MB
  • 33C3 - 2016/Lightning Talks Day 2 (33c3).mp4 190.8 MB
  • 33C3 - 2016/Lightning Talks Day 3 (33c3).mp4 190.5 MB
  • 28C3 - 2011/video/28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.mp4 190.1 MB
  • 28C3 - 2011/video/28c3-4732-en-datamining_for_hackers_h264.mp4 189.9 MB
  • 32C3 - 2015/video/32c3-7561-en-de-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse_hd.mp4 189.7 MB
  • 33C3 - 2016/Lightning Talks Day 3 (33c3) - deutsche Ubersetzung.mp4 188.9 MB
  • 25C3 - 2008/video/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4 188.8 MB
  • 34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen.mp4 188.8 MB
  • 27C3 - 2010/video/27c3-4295-en-high_speed_high_security_cryptography.mp4 188.3 MB
  • 30C3 - 2013/video/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4 188.2 MB
  • 30C3 - 2013/video/30c3-5304-en-CounterStrike_h264-hd.mp4 188.1 MB
  • 32C3 - 2015/video/32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_hd.mp4 188.0 MB
  • 27C3 - 2010/video/27c3-4210-en-lying_to_the_neighbours.mp4 187.7 MB
  • 30C3 - 2013/video/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hd.mp4 186.9 MB
  • 28C3 - 2011/video/28c3-4648-en-quantum_of_science_h264.mp4 186.6 MB
  • 32C3 - 2015/video/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_hd.mp4 186.6 MB
  • 25C3 - 2008/video/25c3-3047-en-lightning_talks_day3_morning.mp4 186.5 MB
  • 27C3 - 2010/video/27c3-4060-en-attacking_mobile_phones.mp4 186.3 MB
  • 29C3 - 2012/video/29c3-5287-de-en-hinter_den_kulissen_nsu_h264.mp4 186.3 MB
  • 25C3 - 2008/video/25c3-2979-en-embracing_post-privacy.mp4 186.3 MB
  • 33C3 - 2016/Dissecting HDMI (33c3) - deutsche Ubersetzung.mp4 185.8 MB
  • 25C3 - 2008/video/25c3-2899-en-mining_social_contacts_with_active_rfid.mp4 185.5 MB
  • 27C3 - 2010/video/27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4 185.4 MB
  • 31C3 - 2014/video/31c3-6573-en-de-From_Computation_to_Consciousness_hd.mp4 185.3 MB
  • 33C3 - 2016/Dissecting HDMI (33c3) - traduction française.mp4 185.2 MB
  • 29C3 - 2012/video/29c3-5306-en-the_tor_software_ecosystem_h264.mp4 185.2 MB
  • 30C3 - 2013/video/30c3-5439-en-To_Protect_And_Infect_h264-hd.mp4 184.8 MB
  • 34C3 - 2017/34C3 - Tiger, Drucker und ein Mahnmal (2).mp4 184.6 MB
  • 25C3 - 2008/video/25c3-2980-en-the_infinite_library.mp4 184.6 MB
  • 25C3 - 2008/video/25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4 184.6 MB
  • 25C3 - 2008/video/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4 184.5 MB
  • 32C3 - 2015/video/32c3-7130-en-de-The_Perl_Jam_2_hd.mp4 184.5 MB
  • 34C3 - 2017/34C3 - Tiger, Drucker und ein Mahnmal.mp4 184.5 MB
  • 26C3 - 2009/video/26c3-3596-de-cat_procsysnetipv4fuckups.mp4 184.4 MB
  • 30C3 - 2013/video/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hd.mp4 184.4 MB
  • 31C3 - 2014/video/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_hd.mp4 184.3 MB
  • 26C3 - 2009/video/26c3-3350-en-milkymist.mp4 184.2 MB
  • 25C3 - 2008/video/25c3-2916-en-wikileaks.mp4 184.1 MB
  • 33C3 - 2016/Lightning Talks Day 4 (33c3) - deutsche Ubersetzung.mp4 183.9 MB
  • 26C3 - 2009/video/26c3-3664-en-homewreckery.mp4 183.8 MB
  • 30C3 - 2013/video/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4 183.8 MB
  • 25C3 - 2008/video/25c3-2669-en-collapsing_the_european_security_architecture.mp4 183.7 MB
  • 27C3 - 2010/video/27c3-4142-en-nodejs_as_a_networking_tool.mp4 183.5 MB
  • 25C3 - 2008/video/25c3-2976-en-hacking_the_iphone.mp4 183.4 MB
  • 29C3 - 2012/video/29c3-5102-de-en-digiges_h264.mp4 182.8 MB
  • 29C3 - 2012/video/29c3-5289-de-en-meldegesetz_h264.mp4 182.8 MB
  • 34C3 - 2017/34C3 - Bildung auf dem Weg ins Neuland - english translation.mp4 182.6 MB
  • 33C3 - 2016/JODI - Apache is functioning normally (33c3) - deutsche Ubersetzung.mp4 182.1 MB
  • 19C3 - 2002/video/19C3-491-distributed-computing.mp4 182.0 MB
  • 34C3 - 2017/34C3 - Internet of Fails - La traduccion espanola.mp4 182.0 MB
  • 29C3 - 2012/video/29c3-5121-de-en-sind_faire_computer_moeglich_h264.mp4 181.7 MB
  • 33C3 - 2016/JODI - Apache is functioning normally (33c3).mp4 181.7 MB
  • 29C3 - 2012/video/29c3-5336-de-en-sprache_ungleichheit_unfreiheit_h264.mp4 181.6 MB
  • 28C3 - 2011/video/28c3-4766-en-802_11_packets_in_packets_h264.mp4 181.6 MB
  • 30C3 - 2013/video/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hd.mp4 181.4 MB
  • 29C3 - 2012/video/29c3-5274-en-grand_eu_data_protection_reform_h264.mp4 181.4 MB
  • 31C3 - 2014/video/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_hd.mp4 181.4 MB
  • 25C3 - 2008/video/25c3-2975-de-zehn_big_brother_awards_in_at.mp4 180.9 MB
  • 28C3 - 2011/video/28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.mp4 180.8 MB
  • 28C3 - 2011/video/28c3-4781-en-deceiving_authorship_detection_h264.mp4 180.8 MB
  • 28C3 - 2011/video/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264.mp4 180.7 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - net2o GUI, realtime mixnet and ethical micropayment with efficient BlockChain.mp4 180.2 MB
  • 26C3 - 2009/video/26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4 180.2 MB
  • 27C3 - 2010/video/27c3-4046-en-all_colours_are_beautiful.mp4 180.0 MB
  • 25C3 - 2008/video/25c3-3008-en-anatomy_of_smartphone_hardware.mp4 179.8 MB
  • 25C3 - 2008/video/25c3-3015-en-rapid_prototype_your_life.mp4 179.5 MB
  • 32C3 - 2015/video/32c3-7368-en-de-Shopshifting_hd.mp4 179.4 MB
  • 31C3 - 2014/video/31c3-6137-en-de-CAESAR_and_NORX_hd.mp4 179.3 MB
  • 26C3 - 2009/video/26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4 179.3 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Ethereum AMA.mp4 179.2 MB
  • 32C3 - 2015/video/32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_hd.mp4 179.2 MB
  • 28C3 - 2011/video/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.mp4 178.5 MB
  • 31C3 - 2014/video/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_hd.mp4 178.5 MB
  • 33C3 - 2016/Lightning Talks Day 4 (33c3).mp4 178.4 MB
  • 27C3 - 2010/video/27c3-4168-en-automated_architecture_independent_gadget_search.mp4 178.1 MB
  • 27C3 - 2010/video/27c3-4302-en-27c3_keynote_we_come_in_peace.mp4 178.1 MB
  • 32C3 - 2015/video/32c3-7565-en-Keynote_hd.mp4 177.9 MB
  • 23C3 - 2006/video/23C3-1566-en-openpcd_openpicc.mp4 177.9 MB
  • 25C3 - 2008/video/25c3-2799-en-console_hacking_2008_wii_fail.mp4 177.8 MB
  • 31C3 - 2014/video/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_hd.mp4 177.5 MB
  • 32C3 - 2015/video/32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_hd.mp4 177.4 MB
  • 33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3) - deutsche Ubersetzung.mp4 177.3 MB
  • 33C3 - 2016/The Ultimate Game Boy Talk (33c3) - deutsche Ubersetzung.mp4 176.9 MB
  • 33C3 - 2016/The Ultimate Game Boy Talk (33c3) - traduction française.mp4 176.9 MB
  • 32C3 - 2015/video/32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_hd.mp4 176.8 MB
  • 33C3 - 2016/Hebocon (33c3).mp4 176.7 MB
  • 33C3 - 2016/Hebocon (33c3) - deutsche Ubersetzung.mp4 176.7 MB
  • 32C3 - 2015/video/32c3-7279-en-de-Public_Library_Memory_of_the_World_hd.mp4 176.3 MB
  • 33C3 - 2016/radare demystified (33c3) - traduction française.mp4 176.2 MB
  • 33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3) - traduction française.mp4 175.9 MB
  • 26C3 - 2009/video/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4 175.8 MB
  • 28C3 - 2011/video/28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.mp4 175.7 MB
  • 33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3).mp4 175.7 MB
  • 33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3) - deutsche Ubersetzung.mp4 175.5 MB
  • 33C3 - 2016/radare demystified (33c3) - deutsche Ubersetzung.mp4 175.4 MB
  • 32C3 - 2015/video/32c3-7216-en-de-CHINTERNET_ART_hd.mp4 175.0 MB
  • 29C3 - 2012/video/29c3-5308-de-en-open_source_schluessel_und_schloesser_h264.mp4 174.7 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Magic Internet Money.mp4 174.6 MB
  • 32C3 - 2015/video/32c3-7555-en-de-32C3_Infrastructure_Review_hd.mp4 174.4 MB
  • 31C3 - 2014/video/31c3-6258-en-Reconstructing_narratives_hd.mp4 174.3 MB
  • 33C3 - 2016/Hochsicherheits-GeneralschlUssel Marke Eigenbau (33c3) - english translation.mp4 174.1 MB
  • 25C3 - 2008/video/25c3-3044-en-all_your_bases_are_belong_to_us.mp4 174.0 MB
  • 33C3 - 2016/The Global Assassination Grid (33c3).mp4 173.9 MB
  • 28C3 - 2011/video/28c3-4848-en-the_coming_war_on_general_computation_h264.mp4 173.9 MB
  • 33C3 - 2016/The Global Assassination Grid - deutsche Ubersetzung (33c3).mp4 173.9 MB
  • 25C3 - 2008/video/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4 173.8 MB
  • 34C3 - 2017/34C3 - On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso (2).mp4 173.5 MB
  • 31C3 - 2014/video/31c3-6249-en-de-SS7_Locate_Track_Manipulate_hd.mp4 173.2 MB
  • 27C3 - 2010/video/27c3-4221-en-omg_wtf_pdf.mp4 173.1 MB
  • 28C3 - 2011/video/28c3-4798-en-sovereign_keys_h264.mp4 172.7 MB
  • 34C3 - 2017/34C3 - On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso.mp4 172.7 MB
  • 25C3 - 2008/video/25c3-3053-en-lightning_talks_day3_-_evening.mp4 172.5 MB
  • 32C3 - 2015/video/32c3-7341-en-de-So_you_want_to_build_a_satellite_hd.mp4 172.4 MB
  • 23C3 - 2006/video/23C3-1759-de-schlossoeffnung_staatssicherheit.mp4 172.4 MB
  • 34C3 - 2017/34C3 - Open Source Estrogen - deutsche Ubersetzung.mp4 172.4 MB
  • 33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3) - La traducción española.mp4 172.1 MB
  • 31C3 - 2014/video/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_hd.mp4 171.8 MB
  • 33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3) - deutsche Ubersetzung.mp4 171.3 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Die Programmiersprache Forth.mp4 171.3 MB
  • 23C3 - 2006/video/23C3-1567-en-hacker_jeopardy.mp4 171.0 MB
  • 25C3 - 2008/video/25c3-2952-de-pflanzenhacken.mp4 170.8 MB
  • 30C3 - 2013/video/30c3-5192-en-Android_DDI_h264-hd.mp4 170.3 MB
  • 31C3 - 2014/video/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_hd.mp4 170.3 MB
  • 25C3 - 2008/video/25c3-3032-en-analyzing_rfid_security.mp4 170.2 MB
  • 28C3 - 2011/video/28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264.mp4 170.2 MB
  • 33C3 - 2016/Warum in die Ferne schweifen, wenn das Ausland liegt so nah (33c3).mp4 170.0 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Namecoin as a Decentralized Alternative to Certificate Authorities for TLS.mp4 169.7 MB
  • 22C3 - 2005/video/22C3-546-de-gesundheitskarte.mp4 169.5 MB
  • 30C3 - 2013/video/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4 169.5 MB
  • 32C3 - 2015/video/32c3-7273-en-Unpatchable_hd.mp4 169.1 MB
  • 31C3 - 2014/video/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_hd.mp4 168.9 MB
  • 29C3 - 2012/video/29c3-5395-en-howto_hack_the_law_h264.mp4 168.9 MB
  • 25C3 - 2008/video/25c3-2734-en-short_attention_span_security.mp4 168.8 MB
  • 27C3 - 2010/video/27c3-4099-en-file_print_electronics.mp4 168.7 MB
  • 33C3 - 2016/Fnord-JahresrUckblick (33c3).mp4 168.6 MB
  • 34C3 - 2017/34C3 - Internet of Fails.mp4 168.4 MB
  • 31C3 - 2014/video/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_hd.mp4 168.2 MB
  • 34C3 - 2017/34C3 - Internet of Fails - deutsche Ubersetzung.mp4 168.1 MB
  • 27C3 - 2010/video/27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4 167.4 MB
  • 30C3 - 2013/video/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4 167.3 MB
  • 34C3 - 2017/34C3 - Bildung auf dem Weg ins Neuland.mp4 167.2 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Nextcloud End to End Encryption.mp4 167.0 MB
  • 28C3 - 2011/video/28c3-4804-de-politik_hacken_h264.mp4 166.8 MB
  • 25C3 - 2008/video/25c3-2814-de-datenpannen.mp4 166.7 MB
  • 33C3 - 2016/Fnord-JahresrUckblick (33c3) - SchwizerdUUtschi Ubersetzig.mp4 166.7 MB
  • 32C3 - 2015/video/32c3-7218-en-de-A_Dozen_Years_of_Shellphish_hd.mp4 166.3 MB
  • 32C3 - 2015/video/32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_hd.mp4 166.2 MB
  • 27C3 - 2010/video/27c3-4261-en-key_recovery_attacks_rc4.mp4 166.2 MB
  • 28C3 - 2011/video/28c3-4688-en-introducing_osmo_gmr_h264.mp4 166.1 MB
  • 21C3 - 2004/video/013 The Art of Fingerprinting.mp4 166.0 MB
  • 32C3 - 2015/video/32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think_hd.mp4 165.3 MB
  • 33C3 - 2016/Durchmarsch von Rechts (33c3).mp4 165.1 MB
  • 28C3 - 2011/video/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.mp4 165.1 MB
  • 33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3).mp4 164.8 MB
  • 29C3 - 2012/video/29c3-5256-en-the_future_of_protocol_reversing_and_simulation_h264.mp4 164.8 MB
  • 33C3 - 2016/Building Custom Pinball Machines (33c3).mp4 164.6 MB
  • 28C3 - 2011/video/28c3-4736-en-defending_mobile_phones_h264.mp4 164.0 MB
  • 31C3 - 2014/video/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_hd.mp4 163.7 MB
  • 28C3 - 2011/video/28c3-4876-de-die_spinnen_die_sachsen_h264.mp4 163.4 MB
  • 29C3 - 2012/video/29c3-5299-de-en-best_of_verfassungsschutz_h264.mp4 163.4 MB
  • 32C3 - 2015/video/32c3-7321-en-de-re_cycle_hd.mp4 163.4 MB
  • 33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3).mp4 163.3 MB
  • 25C3 - 2008/video/25c3-2781-en-objects_as_software_the_coming_revolution.mp4 163.0 MB
  • 26C3 - 2009/video/26c3-3353-de-reverse-engineering_displaylink_devices.mp4 162.9 MB
  • 25C3 - 2008/video/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4 162.5 MB
  • 28C3 - 2011/video/28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.mp4 162.4 MB
  • 33C3 - 2016/Copywrongs 2.0 (33c3).mp4 162.4 MB
  • 33C3 - 2016/Netzpolitik in Österreich (33c3) - english translation.mp4 162.3 MB
  • 34C3 - 2017/34C3 - Open Source Estrogen.mp4 161.6 MB
  • 32C3 - 2015/video/32c3-7277-en-de-Breaking_Honeypots_for_Fun_and_Profit_hd.mp4 161.6 MB
  • 28C3 - 2011/video/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4 161.4 MB
  • 25C3 - 2008/video/25c3-3048-en-lightning_talks_day2.mp4 161.4 MB
  • 33C3 - 2016/Make Wi-Fi fast again (33c3) - english translation.mp4 161.2 MB
  • 33C3 - 2016/Von Alpakas, Hasenbären und Einhörnern - Uber Anerkennungskultur (33c3).mp4 161.0 MB
  • 33C3 - 2016/Von Alpakas, Hasenbären und Einhörnern - Uber Anerkennungskultur (33c3) - english translation.mp4 160.9 MB
  • 31C3 - 2014/video/31c3-6050-en-Code_Pointer_Integrity_hd.mp4 160.9 MB
  • 25C3 - 2008/video/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4 160.8 MB
  • 31C3 - 2014/video/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_hd.mp4 160.8 MB
  • 34C3 - 2017/34C3 - Beeinflussung durch KUnstliche Intelligenz - english translation.mp4 160.8 MB
  • 33C3 - 2016/Nicht öffentlich. (33c3).mp4 160.8 MB
  • 31C3 - 2014/video/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_hd.mp4 160.7 MB
  • 25C3 - 2008/video/25c3-2843-en-algorithmic_music_in_a_box.mp4 160.6 MB
  • 31C3 - 2014/video/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_hd.mp4 160.3 MB
  • 30C3 - 2013/video/30c3-5339-en-de-The_Year_in_Crypto_h264-hd.mp4 160.1 MB
  • 31C3 - 2014/video/31c3-6321-en-de-The_Matter_of_Heartbleed_hd.mp4 160.1 MB
  • 34C3 - 2017/34C3 - Resilienced Kryptographie - english translation.mp4 159.9 MB
  • 31C3 - 2014/video/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_hd.mp4 159.8 MB
  • 32C3 - 2015/video/32c3-7259-en-de-Graphs_Drones_Phones_hd.mp4 159.4 MB
  • 23C3 - 2006/video/23C3-1419-de-java_wird_groovy.mp4 159.2 MB
  • 25C3 - 2008/video/25c3-2970-en-coreboot_beyond_the_final_frontier.mp4 159.1 MB
  • 31C3 - 2014/video/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_hd.mp4 159.1 MB
  • 34C3 - 2017/34C3 - Protecting Your Privacy at the Border - deutsche Ubersetzung.mp4 159.0 MB
  • 32C3 - 2015/video/32c3-7282-de-en-Fnord-Jahresrueckblick_hd.mp4 158.9 MB
  • 31C3 - 2014/video/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_hd.mp4 158.8 MB
  • 25C3 - 2008/video/25c3-2812-de-fnord_news_show.mp4 158.7 MB
  • 34C3 - 2017/34C3 - Lets break modern binary code obfuscation - deutsche Ubersetzung.mp4 158.6 MB
  • 34C3 - 2017/34C3 - Lets break modern binary code obfuscation.mp4 158.5 MB
  • 25C3 - 2008/video/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4 158.4 MB
  • 25C3 - 2008/video/25c3-3056-en-fnord_news_show_english_interpretation.mp4 158.4 MB
  • 33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3) - La traducción española.mp4 158.3 MB
  • 33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3) - english translation.mp4 158.2 MB
  • 29C3 - 2012/video/29c3-5368-de-en-ifg_chance_oder_buergerbluff_h264.mp4 158.0 MB
  • 21C3 - 2004/video/105 Honeypot Forensics.mp4 158.0 MB
  • 23C3 - 2006/video/23C3-1444-en-tor_and_china.mp4 157.9 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-carlo_von_lynX-UX_cannot_fix_technology.mp4 157.9 MB
  • 25C3 - 2008/video/25c3-2999-en-closing_ceremony.mp4 157.8 MB
  • 34C3 - 2017/34C3 - Opening Closed Systems with GlitchKit - deutsche Ubersetzung.mp4 157.5 MB
  • 29C3 - 2012/video/29c3-5177-en-securing_the_campaign_h264.mp4 157.3 MB
  • 25C3 - 2008/video/25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4 157.2 MB
  • 28C3 - 2011/video/28c3-4897-en-keynote_h264.mp4 157.1 MB
  • 27C3 - 2010/video/27c3-4193-en-having_fun_with_rtp.mp4 157.0 MB
  • 25C3 - 2008/video/25c3-2827-de-u23.mp4 157.0 MB
  • 28C3 - 2011/video/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.mp4 156.9 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 3.mp4 156.8 MB
  • 27C3 - 2010/video/27c3-4159-en-reverse_engineering_mos_6502.mp4 156.7 MB
  • 27C3 - 2010/video/27c3-3983-en-hackers_and_computer_science.mp4 156.5 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 3 - deutsche Ubersetzung - YouTube.mp4 156.3 MB
  • 29C3 - 2012/video/29c3-5230-en-stylometry_and_online_underground_markets_h264.mp4 156.2 MB
  • 33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3).mp4 156.1 MB
  • 33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3) - SchwizerdUUtschi Ubersetzig.mp4 155.9 MB
  • 30C3 - 2013/video/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4 155.7 MB
  • 29C3 - 2012/video/29c3-5333-en-gsm_cell_phone_network_review_h264.mp4 155.6 MB
  • 34C3 - 2017/34C3 - How risky is the software you use.mp4 155.5 MB
  • 33C3 - 2016/ATMs how to break them to stop the fraud (33c3) - deutsche Ubersetzung.mp4 155.4 MB
  • 32C3 - 2015/video/32c3-7336-en-de-3D_printing_on_the_moon_hd.mp4 155.2 MB
  • 25C3 - 2008/video/25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4 155.2 MB
  • 28C3 - 2011/video/28c3-4818-en-evolving_custom_communication_protocols_h264.mp4 155.0 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Monerujo - Android Monero Wallet.mp4 154.8 MB
  • 33C3 - 2016/State of Internet Censorship 2016 (33c3).mp4 154.7 MB
  • 31C3 - 2014/video/31c3-6547-en-de-Exploit_in_theater_sd.mp4 154.6 MB
  • 28C3 - 2011/video/28c3-4916-en-buggedplanet_h264.mp4 154.1 MB
  • 29C3 - 2012/video/29c3-5402-en-russias_surveillance_state_h264.mp4 153.9 MB
  • 34C3 - 2017/34C3 - Deconstructing a Socialist Lawnmower.mp4 153.7 MB
  • 24C3 - 2007/video/24c3-2402-en-lightning_talks_2007_day_4_high.mp4 153.7 MB
  • 34C3 - 2017/34C3 - Deconstructing a Socialist Lawnmower - deutsche Ubersetzung.mp4 153.3 MB
  • 25C3 - 2008/video/25c3-2942-de-vertex_hacking.mp4 153.3 MB
  • 28C3 - 2011/video/28c3-4763-en-the_science_of_insecurity_h264.mp4 153.1 MB
  • 28C3 - 2011/video/28c3-4710-en-the_future_of_cryptology_h264.mp4 153.1 MB
  • 29C3 - 2012/video/29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_h264.mp4 152.7 MB
  • 29C3 - 2012/video/29c3-5305-en-long_live_the_protocoletariat_h264.mp4 152.6 MB
  • 25C3 - 2008/video/25c3-2997-en-locating_mobile_phones_using_ss7.mp4 152.6 MB
  • 25C3 - 2008/video/25c3-2596-en-swf_and_the_malware_tragedy.mp4 152.4 MB
  • 29C3 - 2012/video/29c3-5160-en-transparenzgesetz_hh_h264.mp4 152.1 MB
  • 31C3 - 2014/video/31c3-6297-en-de-Virtual_Machine_Introspection_hd.mp4 152.1 MB
  • 31C3 - 2014/video/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_hd.mp4 151.9 MB
  • 34C3 - 2017/34C3 - Beeinflussung durch KUnstliche Intelligenz.mp4 151.8 MB
  • 25C3 - 2008/video/25c3-2872-en-the_privacy_workshop_project.mp4 151.8 MB
  • 29C3 - 2012/video/29c3-5134-en-new_human_interfaces_for_music_h264.mp4 151.6 MB
  • 31C3 - 2014/video/31c3-6369-en-ECCHacks_hd.mp4 151.4 MB
  • 25C3 - 2008/video/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4 151.4 MB
  • 25C3 - 2008/video/25c3-2882-en-full-disk-encryption_crash-course.mp4 151.3 MB
  • 26C3 - 2009/video/26c3-3717-en-closing_event.mp4 151.2 MB
  • 28C3 - 2011/video/28c3-4738-de-echtes_netz_h264.mp4 150.5 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 3 (2).mp4 150.4 MB
  • 29C3 - 2012/video/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264.mp4 150.2 MB
  • 28C3 - 2011/video/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.mp4 150.2 MB
  • 34C3 - 2017/34C3 - Resilienced Kryptographie - YouTube.mp4 150.2 MB
  • 25C3 - 2008/video/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4 149.9 MB
  • 34C3 - 2017/34C3 - Free Electron Lasers - deutsche Ubersetzung.mp4 149.8 MB
  • 31C3 - 2014/video/31c3-6460-en-de-Eye_Wear_Computing_hd.mp4 149.8 MB
  • 33C3 - 2016/Stopping law enforcement hacking (33c3) - english translation.mp4 149.7 MB
  • 32C3 - 2015/video/32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_hd.mp4 149.6 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Eigenes HackLab bauen!.mp4 149.1 MB
  • 33C3 - 2016/No USB No problem. (33c3) - deutsche Ubersetzung.mp4 149.1 MB
  • 27C3 - 2010/video/27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4 149.0 MB
  • 33C3 - 2016/The High Priests of the Digital Age (33c3) - traduction française.mp4 148.8 MB
  • 32C3 - 2015/video/32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_hd.mp4 148.8 MB
  • 34C3 - 2017/34C3 - Opening Closed Systems with GlitchKit.mp4 148.1 MB
  • 33C3 - 2016/The High Priests of the Digital Age (33c3) - deutsche Ubersetzung.mp4 148.1 MB
  • 32C3 - 2015/video/32c3-7538-en-Internet_Landscapes_hd.mp4 148.1 MB
  • 31C3 - 2014/video/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_hd.mp4 147.8 MB
  • 21C3 - 2004/video/053 Enforcing the GNU GPL.mp4 147.8 MB
  • 29C3 - 2012/video/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264.mp4 147.8 MB
  • 29C3 - 2012/video/29c3-5216-en-let_me_answer_that_for_you_h264.mp4 147.8 MB
  • 33C3 - 2016/ATMs how to break them to stop the fraud (33c3).mp4 147.5 MB
  • 31C3 - 2014/video/31c3-6295-de-en-Krypto_fuer_die_Zukunft_hd.mp4 147.5 MB
  • 25C3 - 2008/video/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4 147.1 MB
  • 19C3 - 2002/video/19C3-411-patent-party.mp4 146.9 MB
  • 32C3 - 2015/video/32c3-7567-de-en-Katastrophe_und_Kommunikation_hd.mp4 146.8 MB
  • 29C3 - 2012/video/29c3-5024-en-hackers_as_a_highrisk_population_h264.mp4 146.6 MB
  • 29C3 - 2012/video/29c3-5396-de-en-gender_studies_informatik_h264.mp4 146.5 MB
  • 32C3 - 2015/video/32c3-7386-en-de-Crypto_Wars_Part_II_hd.mp4 146.3 MB
  • 30C3 - 2013/video/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4 146.2 MB
  • 29C3 - 2012/video/29c3-5112-en-isps_black_box_h264.mp4 146.1 MB
  • 29C3 - 2012/video/29c3-5319-en-certificate_authority_collapse_h264.mp4 145.9 MB
  • 31C3 - 2014/video/31c3-5960-en-Revisiting_SSL_TLS_Implementations_hd.mp4 145.8 MB
  • 31C3 - 2014/video/31c3-6596-en-de-The_Magical_Secrecy_Tour_hd.mp4 145.7 MB
  • 29C3 - 2012/video/29c3-5124-en-low_cost_chip_microprobing_h264.mp4 145.3 MB
  • 28C3 - 2011/video/28c3-4813-en-macro_dragnets_h264.mp4 145.1 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Scalable and privacy-respectful distributed systems - Our chance to avoid cloud co.mp4 145.0 MB
  • 28C3 - 2011/video/28c3-4871-en-hacking_mfps_h264.mp4 144.4 MB
  • 34C3 - 2017/34C3 - Der PC-Wahl-Hack - english translation.mp4 144.4 MB
  • 34C3 - 2017/34C3 - Uncertain Concern - deutsche Ubersetzung.mp4 144.3 MB
  • 33C3 - 2016/How do we know our PRNGs work properly (33c3).mp4 144.2 MB
  • 32C3 - 2015/video/32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_hd.mp4 144.2 MB
  • 29C3 - 2012/video/29c3-5323-de-en-pflanzenhacken_richtig_h264.mp4 144.1 MB
  • 25C3 - 2008/video/25c3-2873-en-privacy_in_the_social_semantic_web.mp4 144.0 MB
  • 23C3 - 2006/video/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp4 144.0 MB
  • 34C3 - 2017/34C3 - Uncertain Concern - La traduccion espanola.mp4 143.9 MB
  • 28C3 - 2011/video/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.mp4 143.4 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 2 - deutsche Ubersetzung.mp4 143.2 MB
  • 31C3 - 2014/video/31c3-6499-en-Glitching_For_n00bs_hd.mp4 143.0 MB
  • 31C3 - 2014/video/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_hd.mp4 142.9 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 2 - traduction francaise.mp4 142.8 MB
  • 29C3 - 2012/video/29c3-5239-en-smart_meter_h264.mp4 142.7 MB
  • 29C3 - 2012/video/29c3-5237-en-a_rambling_walk_through_an_emv_transaction_h264.mp4 142.6 MB
  • 26C3 - 2009/video/26c3-3688-de-haste_man_netblock.mp4 142.6 MB
  • 31C3 - 2014/video/31c3-6559-de-en-Jugend_hackt_sd.mp4 142.5 MB
  • 34C3 - 2017/34C3 - Free Electron Lasers.mp4 141.7 MB
  • 29C3 - 2012/video/29c3-5393-en-milking_the_digital_cash_cow_h264.mp4 141.5 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Bisq - A decentralized bitcoin exchange.mp4 141.3 MB
  • 25C3 - 2008/video/25c3-2896-en-chip_reverse_engineering.mp4 141.2 MB
  • 32C3 - 2015/video/32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_hd.mp4 141.2 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - SecureDrop.mp4 141.2 MB
  • 31C3 - 2014/video/31c3-6275-en-de-Living_Drones_hd.mp4 141.2 MB
  • 25C3 - 2008/video/25c3-3007-en-running_your_own_gsm_network.mp4 141.0 MB
  • 32C3 - 2015/video/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4 140.9 MB
  • 34C3 - 2017/34C3 - cryptocurrencies, smart contracts, etc. revolutionary tech - deutsche Ubersetzung.mp4 140.9 MB
  • 31C3 - 2014/video/31c3-6084-en-Uncaging_Microchips_hd.mp4 140.8 MB
  • 25C3 - 2008/video/25c3-3004-en-why_technology_sucks.mp4 140.8 MB
  • 32C3 - 2015/video/32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_hd.mp4 140.7 MB
  • 25C3 - 2008/video/25c3-2892-en-about_cyborgs_and_gargoyles_.mp4 140.7 MB
  • 31C3 - 2014/video/31c3-5930-en-de-Funky_File_Formats_hd.mp4 140.6 MB
  • 25C3 - 2008/video/25c3-2988-en-just_estonia_and_georgia.mp4 140.2 MB
  • 30C3 - 2013/video/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4 140.2 MB
  • 25C3 - 2008/video/25c3-2845-en-rf_fingerprinting_of_rfid.mp4 140.1 MB
  • 34C3 - 2017/34C3 - cryptocurrencies, smart contracts, etc. revolutionary tech.mp4 140.0 MB
  • 34C3 - 2017/34C3 - Treibhausgasemissionen einschätzen - english translation.mp4 140.0 MB
  • 31C3 - 2014/video/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_hd.mp4 139.9 MB
  • 33C3 - 2016/Console Hacking 2016 (33c3) - deutsche Ubersetzung.mp4 139.9 MB
  • 33C3 - 2016/The Transhumanist Paradox (33c3) - deutsche Ubersetzung.mp4 139.9 MB
  • 33C3 - 2016/Console Hacking 2016 (33c3) - traduction française.mp4 139.8 MB
  • 31C3 - 2014/video/31c3-6385-en-de-The_Machine_To_Be_Another_hd.mp4 139.6 MB
  • 28C3 - 2011/video/28c3-4746-en-bitcoin_an_analysis_h264.mp4 139.5 MB
  • 32C3 - 2015/video/32c3-7483-en-de-Computational_Meta-Psychology_hd.mp4 138.9 MB
  • 32C3 - 2015/video/32c3-7438-en-de-goto_fail_hd.mp4 138.8 MB
  • 33C3 - 2016/EinfUhrung zu Blockchains (33c3) - traduction française.mp4 138.5 MB
  • 30C3 - 2013/video/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4 138.4 MB
  • 33C3 - 2016/Talking Behind Your Back (33c3).mp4 138.4 MB
  • 30C3 - 2013/video/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hd.mp4 138.3 MB
  • 25C3 - 2008/video/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4 138.3 MB
  • 28C3 - 2011/video/28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.mp4 138.3 MB
  • 20C3 - 2003/video/20C3-611-Hacker_Jeopardy.mp4 138.2 MB
  • 23C3 - 2006/video/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp4 138.2 MB
  • 32C3 - 2015/video/32c3-7291-de-en-Microsofts_Windows_10_Botnet_hd.mp4 137.8 MB
  • 33C3 - 2016/A world without blockchain (33c3) - deutsche Ubersetzung.mp4 137.8 MB
  • 23C3 - 2006/video/23C3-1760-en-on_free.mp4 137.8 MB
  • 29C3 - 2012/video/29c3-5180-de-en-marvin_und_der_blues_h264.mp4 137.6 MB
  • 33C3 - 2016/EinfUhrung zu Blockchains (33c3) - english translation.mp4 137.5 MB
  • 33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3) - traduction française.mp4 137.4 MB
  • 34C3 - 2017/34C3 - Lightning Talks Day 2.mp4 137.4 MB
  • 34C3 - 2017/34C3 - Policing in the age of data exploitation - deutsche Ubersetzung - YouTube.mp4 137.2 MB
  • 33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3) - deutsche Ubersetzung.mp4 137.0 MB
  • 33C3 - 2016/Making Technology Inclusive Through Papercraft and Sound (33c3) - deutsche Ubersetzung.mp4 136.6 MB
  • 21C3 - 2004/video/141 Pirate Radio.mp4 136.5 MB
  • 29C3 - 2012/video/29c3-5152-en-hashflooding_dos_reloaded_h264.mp4 136.2 MB
  • 33C3 - 2016/Making Technology Inclusive Through Papercraft and Sound (33c3).mp4 136.0 MB
  • 34C3 - 2017/34C3 - Uncertain Concern.mp4 136.0 MB
  • 31C3 - 2014/video/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_hd.mp4 136.0 MB
  • 33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3) - traduction française.mp4 135.9 MB
  • 33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3) - deutsche Ubersetzung.mp4 135.9 MB
  • 34C3 - 2017/34C3 - Der PC-Wahl-Hack.mp4 135.7 MB
  • 33C3 - 2016/The Fight for Encryption in 2016 (33c3) - deutsche Ubersetzung.mp4 135.5 MB
  • 32C3 - 2015/video/32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_hd.mp4 135.5 MB
  • 23C3 - 2006/video/23C3-1596-en-openxpki.mp4 135.3 MB
  • 32C3 - 2015/video/32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_hd.mp4 135.2 MB
  • 29C3 - 2012/video/29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_h264.mp4 134.6 MB
  • 34C3 - 2017/34C3 - Treibhausgasemissionen einschätzen.mp4 134.2 MB
  • 29C3 - 2012/video/29c3-5219-en-how_i_met_your_pointer_h264.mp4 134.2 MB
  • 32C3 - 2015/video/32c3-7340-en-de-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone_hd.mp4 134.0 MB
  • 30C3 - 2013/video/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4 133.8 MB
  • 34C3 - 2017/34C3 - Protecting Your Privacy at the Border.mp4 133.8 MB
  • 33C3 - 2016/Beyond Virtual and Augmented Reality (33c3) - La traducción española.mp4 133.7 MB
  • 33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3).mp4 133.5 MB
  • 33C3 - 2016/Beyond Virtual and Augmented Reality (33c3) - deutsche Ubersetzung.mp4 133.5 MB
  • 33C3 - 2016/The Moon and European Space Exploration (33c3).mp4 133.4 MB
  • 33C3 - 2016/The Moon and European Space Exploration (33c3) - traduction française.mp4 133.4 MB
  • 33C3 - 2016/The Moon and European Space Exploration (33c3) - deutsche Ubersetzung.mp4 133.4 MB
  • 33C3 - 2016/Machine Dreams (33c3) - traduction française.mp4 133.3 MB
  • 23C3 - 2006/audio/23C3-1517-en-lightning_talks_day_4.mp3 133.3 MB
  • 27C3 - 2010/video/27c3-4087-en-console_hacking_2010.mp4 133.0 MB
  • 33C3 - 2016/Beyond Virtual and Augmented Reality (33c3).mp4 132.7 MB
  • 33C3 - 2016/Check Your Police Record! (33c3) - english translation.mp4 132.7 MB
  • 34C3 - 2017/34C3 - institutions for Resolution Disputes.mp4 132.6 MB
  • 34C3 - 2017/34C3 - institutions for Resolution Disputes - deutsche Ubersetzung.mp4 132.6 MB
  • 32C3 - 2015/video/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_hd.mp4 132.6 MB
  • 28C3 - 2011/video/28c3-4759-en-open_source_music_tracking_2_0_h264.mp4 132.5 MB
  • 32C3 - 2015/video/32c3-7294-en-de-Sanitizing_PCAPs_hd.mp4 132.4 MB
  • 33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3) - deutsche Ubersetzung.mp4 131.8 MB
  • 23C3 - 2006/video/23C3-1616-de-nerds_und_geeks.mp4 131.8 MB
  • 33C3 - 2016/Routerzwang und Funkabschottung (33c3) - english translation.mp4 131.8 MB
  • 32C3 - 2015/video/32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_hd.mp4 131.6 MB
  • 23C3 - 2006/video/23C3-1256-en-who_can_you_trust.mp4 131.6 MB
  • 28C3 - 2011/video/28c3-4676-en-apple_vs_google_client_platforms_h264.mp4 131.4 MB
  • 28C3 - 2011/video/28c3-4740-de-frag_den_staat_h264.mp4 131.3 MB
  • 30C3 - 2013/video/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4 131.2 MB
  • 33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3) - traduction française.mp4 131.2 MB
  • 29C3 - 2012/video/29c3-5275-en-facthacks_h264.mp4 130.7 MB
  • 33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3) - deutsche Ubersetzung.mp4 130.5 MB
  • 33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3) - traduction française.mp4 130.4 MB
  • 23C3 - 2006/video/23C3-1433-en-design_a_decent_user_interface.mp4 130.3 MB
  • 28C3 - 2011/video/28c3-4817-en-string_oriented_programming_h264.mp4 130.3 MB
  • 31C3 - 2014/video/31c3-6463-en-Damn_Vulnerable_Chemical_Process_hd.mp4 130.1 MB
  • 34C3 - 2017/34C3 - Decoding Contactless (Card) Payments - deutsche Ubersetzung.mp4 130.1 MB
  • 23C3 - 2006/audio/23C3-1736-en-project_sputnik.mp3 130.0 MB
  • 33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3).mp4 129.8 MB
  • 28C3 - 2011/video/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4 129.7 MB
  • 27C3 - 2010/video/27c3-4181-en-sip_home_gateways_under_fire.mp4 129.7 MB
  • 29C3 - 2012/video/29c3-5221-de-en-cyberwar_statt_cyberwar_h264.mp4 129.6 MB
  • 34C3 - 2017/34C3 - Die göttliche Informatik The divine Computer Science - La traduccion espanola.mp4 129.5 MB
  • 34C3 - 2017/34C3 - The divine Computer Science - english translation.mp4 129.4 MB
  • 33C3 - 2016/Understanding the Snooper’s Charter (33c3) - deutsche Ubersetzung.mp4 129.1 MB
  • 32C3 - 2015/video/32c3-7171-en-de-When_hardware_must_just_work_hd.mp4 129.0 MB
  • 34C3 - 2017/34C3 - Dude, you broke the Future! - traduction francaise.mp4 129.0 MB
  • 30C3 - 2013/video/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4 129.0 MB
  • 29C3 - 2012/video/29c3-5159-en-defend_freedoms_online_h264.mp4 128.9 MB
  • 34C3 - 2017/34C3 - 34C3 Infrastructure Review - traduction francaise.mp4 128.9 MB
  • 23C3 - 2006/video/23C3-1452-de-critical_theory_and_chaos.mp4 128.8 MB
  • 32C3 - 2015/video/32c3-7387-en-de-Net_Neutrality_in_Europe_hd.mp4 128.8 MB
  • 23C3 - 2006/video/23C3-1724-en-transparency_and_privacy.mp4 128.6 MB
  • 34C3 - 2017/34C3 - Are all BSDs created equally - deutsche Ubersetzung.mp4 128.4 MB
  • 33C3 - 2016/Formal Verification of Verilog HDL with Yosys-SMTBMC (33c3) - deutsche Ubersetzung.mp4 127.9 MB
  • 29C3 - 2012/video/29c3-5195-en-executable_metadata_h264.mp4 127.9 MB
  • 30C3 - 2013/video/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4 127.8 MB
  • 34C3 - 2017/34C3 - Policing in the age of data exploitation.mp4 127.8 MB
  • 32C3 - 2015/video/32c3-7153-en-de-rad1o_hd.mp4 127.7 MB
  • 33C3 - 2016/Formal Verification of Verilog HDL with Yosys-SMTBMC (33c3).mp4 127.5 MB
  • 31C3 - 2014/video/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_hd.mp4 127.4 MB
  • 32C3 - 2015/video/32c3-7517-en-de-the_possibility_of_an_army_hd.mp4 127.3 MB
  • 34C3 - 2017/34C3 - Ein Festival der Demokratie - english translation.mp4 127.2 MB
  • 32C3 - 2015/video/32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_hd.mp4 127.1 MB
  • 28C3 - 2011/video/28c3-4723-en-dc_plus_the_protocol_h264.mp4 126.9 MB
  • 31C3 - 2014/video/31c3-6361-en-From_Maxwell_to_antenna_arrays_hd.mp4 126.7 MB
  • 31C3 - 2014/video/31c3-6417-en-3D_Casting_Aluminum_hd.mp4 126.7 MB
  • 23C3 - 2006/video/23C3-1608-en-vehicular_communication_and_vanets.mp4 126.5 MB
  • 20C3 - 2003/video/20C3-609-Security_Nightmares_III.mp4 126.4 MB
  • 33C3 - 2016/A world without blockchain (33c3).mp4 126.3 MB
  • 28C3 - 2011/video/28c3-4927-en-noc_review_28c3_camp_h264.mp4 126.3 MB
  • 32C3 - 2015/video/32c3-7210-en-de-PQCHacks_hd.mp4 126.0 MB
  • 32C3 - 2015/video/32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_hd.mp4 125.7 MB
  • 34C3 - 2017/34C3 - Forensic Architecture - La traduccion espanola.mp4 125.7 MB
  • 31C3 - 2014/video/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_hd.mp4 125.6 MB
  • 34C3 - 2017/34C3 - A hacker's guide to Climate Change - What do we know and how do we know it.mp4 125.5 MB
  • 28C3 - 2011/video/28c3-4826-en-a_brief_history_of_plutocracy_h264.mp4 125.2 MB
  • 34C3 - 2017/34C3 - A hacker's guide to Climate Change - What do we know and how do we know it - deutsche Ubers.mp4 125.0 MB
  • 20C3 - 2003/video/20C3-542-Trusted_or_Treacherous.mp4 124.9 MB
  • 31C3 - 2014/video/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_hd.mp4 124.7 MB
  • 29C3 - 2012/video/29c3-5146-en-an_overview_of_secure_name_resolution_h264.mp4 124.3 MB
  • 23C3 - 2006/video/23C3-1381-en-stealth_malware.mp4 124.3 MB
  • 31C3 - 2014/video/31c3-6162-en-Programming_with_dependent_types_in_Idris_hd.mp4 124.2 MB
  • 29C3 - 2012/video/29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_h264.mp4 124.2 MB
  • 23C3 - 2006/video/23C3-1721-en-software_protection_and_the_tpm.mp4 124.2 MB
  • 34C3 - 2017/34C3 - Are all BSDs created equally.mp4 124.0 MB
  • 28C3 - 2011/video/28c3-4869-de-tresor_h264.mp4 123.6 MB
  • 32C3 - 2015/video/32c3-7165-en-de-Vehicle2Vehicle_Communication_based_on_IEEE_80211p_hd.mp4 123.5 MB
  • 31C3 - 2014/video/31c3-6530-en-In_Security_of_Mobile_Banking_hd.mp4 123.5 MB
  • 21C3 - 2004/video/027 Biometrie in Ausweisdokumenten.mp4 123.4 MB
  • 30C3 - 2013/video/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4 123.4 MB
  • 25C3 - 2008/video/25c3-2890-en-scalable_swarm_robotics.mp4 123.4 MB
  • 29C3 - 2012/video/29c3-5225-en-security_evaluation_of_russian_gost_cipher_h264.mp4 123.2 MB
  • 29C3 - 2012/video/29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_h264.mp4 123.1 MB
  • 34C3 - 2017/34C3 - How to drift with any car - La traduccion espanola.mp4 123.1 MB
  • 32C3 - 2015/video/32c3-7343-en-de-Beyond_Anti_Evil_Maid_hd.mp4 123.0 MB
  • 34C3 - 2017/34C3 - The making of a chip - deutsche Ubersetzung.mp4 122.9 MB
  • 33C3 - 2016/Reverse engineering Outernet (33c3) - deutsche Ubersetzung.mp4 122.9 MB
  • 34C3 - 2017/34C3 - How to drift with any car - deutsche Ubersetzung.mp4 122.8 MB
  • 29C3 - 2012/video/29c3-5417-en-cve_2011_3402_analysis_h264.mp4 122.7 MB
  • 34C3 - 2017/34C3 - Electroedibles - deutsche Ubersetzung.mp4 122.7 MB
  • 33C3 - 2016/Hacking collective as a laboratory (33c3) - deutsche Ubersetzung.mp4 122.6 MB
  • 20C3 - 2003/video/20C3-589-AN.ON_and_the_future_of_anonymizers.mp4 122.4 MB
  • 34C3 - 2017/34C3 - Ein Festival der Demokratie.mp4 122.3 MB
  • 34C3 - 2017/34C3 - Electroedibles.mp4 122.3 MB
  • 24C3 - 2007/video/24c3-2352-de-hacker_jeopardy_high.mp4 122.2 MB
  • 34C3 - 2017/34C3 - Electromagnetic Threats for Information Security - deutsche Ubersetzung.mp4 121.9 MB
  • 21C3 - 2004/video/063 Edit This Page.mp4 121.6 MB
  • 34C3 - 2017/34C3 - Relativitätstheorie fUr blutige Anfänger - english translation.mp4 121.6 MB
  • 34C3 - 2017/34C3 - 34C3 Infrastructure Review - deutsche Ubersetzung.mp4 121.5 MB
  • 34C3 - 2017/34C3 - 34C3 Infrastructure Review.mp4 121.5 MB
  • 32C3 - 2015/video/32c3-7324-en-de-What_is_the_value_of_anonymous_communication_hd.mp4 121.4 MB
  • 32C3 - 2015/video/32c3-7243-en-de-Gibberish_Detection_102_hd.mp4 121.4 MB
  • 34C3 - 2017/34C3 - Decoding Contactless (Card) Payments.mp4 121.3 MB
  • 34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask - deutsch.mp4 121.3 MB
  • 34C3 - 2017/34C3 - Electromagnetic Threats for Information Security.mp4 121.2 MB
  • 33C3 - 2016/Reverse engineering Outernet (33c3).mp4 121.2 MB
  • 33C3 - 2016/Hacking collective as a laboratory (33c3).mp4 121.2 MB
  • 34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask - traduct.mp4 121.0 MB
  • 30C3 - 2013/video/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4 120.9 MB
  • 30C3 - 2013/video/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4 120.6 MB
  • 21C3 - 2004/video/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.mp4 120.5 MB
  • 34C3 - 2017/34C3 - Dude, you broke the Future!.mp4 120.4 MB
  • 34C3 - 2017/34C3 - Microarchitectural Attacks on Trusted Execution Environments.mp4 120.3 MB
  • 34C3 - 2017/34C3 - Dude, you broke the Future! - deutsche Ubersetzung.mp4 120.2 MB
  • 34C3 - 2017/34C3 - Microarchitectural Attacks on Trusted Execution Environments - deutsche Ubersetzung.mp4 120.2 MB
  • 31C3 - 2014/video/31c3-6595-en-de-Hard_Drive_Punch_hd.mp4 120.1 MB
  • 32C3 - 2015/video/32c3-7356-en-de-Top_X_usability_obstacles_hd.mp4 119.9 MB
  • 33C3 - 2016/Wheel of Fortune (33c3) - deutsche Ubersetzung.mp4 119.7 MB
  • 32C3 - 2015/video/32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_hd.mp4 119.7 MB
  • 32C3 - 2015/video/32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_hd.mp4 119.5 MB
  • 30C3 - 2013/video/30c3-5214-en-The_Gospel_of_IRMA__h264-hd.mp4 119.3 MB
  • 29C3 - 2012/video/29c3-5265-en-page_fault_liberation_army_h264.mp4 119.2 MB
  • 25C3 - 2008/video/25c3-3002-en-squeezing_attack_traces.mp4 119.2 MB
  • 32C3 - 2015/video/32c3-7143-en-de-The_state_of_Internet_Censorship_hd.mp4 119.1 MB
  • 31C3 - 2014/video/31c3-6234-en-The_eXperimental_Robot_Project_hd.mp4 119.0 MB
  • 34C3 - 2017/34C3 - The divine Computer Science.mp4 119.0 MB
  • 33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3).mp4 118.9 MB
  • 19C3 - 2002/video/19C3-366-tcpa.mp4 118.8 MB
  • 33C3 - 2016/Keys of Fury (33c3) - deutsche Ubersetzung.mp4 118.4 MB
  • 34C3 - 2017/34C3 - Security Nightmares 0x12.mp4 118.4 MB
  • 33C3 - 2016/Keys of Fury (33c3).mp4 118.4 MB
  • 33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3) - traduction française.mp4 118.3 MB
  • 31C3 - 2014/video/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_hd.mp4 118.2 MB
  • 31C3 - 2014/video/31c3-6406-en-Long_war_tactics_hd.mp4 118.2 MB
  • 23C3 - 2006/video/23C3-1514-en-lightning_talks_day_1.mp4 118.1 MB
  • 34C3 - 2017/34C3 - Security Nightmares 0x12 - english translation.mp4 118.0 MB
  • 21C3 - 2004/video/134 Secure Instant Messaging.mp4 117.6 MB
  • 33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3) - deutsche Ubersetzung.mp4 117.6 MB
  • 34C3 - 2017/34C3 - Forensic Architecture.mp4 117.6 MB
  • 23C3 - 2006/video/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp4 117.6 MB
  • 25C3 - 2008/video/25c3-2839-en-cracking_the_msp430_bsl.mp4 117.4 MB
  • 32C3 - 2015/video/32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_hd.mp4 117.2 MB
  • 34C3 - 2017/34C3 - Forensic Architecture - deutsche Ubersetzung.mp4 117.0 MB
  • 29C3 - 2012/video/29c3-5059-en-scada_strangelove_h264.mp4 116.9 MB
  • 23C3 - 2006/video/23C3-1605-de-digitale_bildforensik.mp4 116.9 MB
  • 33C3 - 2016/Security Nightmares 0x11 (33c3).mp4 116.8 MB
  • 29C3 - 2012/video/29c3-5385-en-not_my_department_h264.mp4 116.7 MB
  • 33C3 - 2016/radare demystified (33c3).mp4 116.5 MB
  • 30C3 - 2013/video/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4 116.4 MB
  • 25C3 - 2008/video/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4 116.3 MB
  • 33C3 - 2016/Shining some light on the Amazon Dash button (33c3) - deutsche Ubersetzung.mp4 116.1 MB
  • 30C3 - 2013/video/30c3-5609-en-Infrastructure_Review_h264-hq.mp4 116.0 MB
  • 34C3 - 2017/34C3 - Relativitätstheorie fUr blutige Anfänger.mp4 115.9 MB
  • 34C3 - 2017/34C3 - How to drift with any car.mp4 115.6 MB
  • 32C3 - 2015/video/32c3-7240-en-de-Console_Hacking_hd.mp4 115.5 MB
  • 30C3 - 2013/video/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4 115.5 MB
  • 33C3 - 2016/The Ultimate Game Boy Talk (33c3).mp4 115.4 MB
  • 32C3 - 2015/video/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_hd.mp4 115.3 MB
  • 34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask.mp4 115.2 MB
  • 29C3 - 2012/video/29c3-5208-en-accessibility_and_security_h264.mp4 114.8 MB
  • 34C3 - 2017/34C3 - The making of a chip.mp4 114.8 MB
  • 29C3 - 2012/video/29c3-5181-de-die_wahrheit_was_wirklich_passierte_h264.mp4 114.7 MB
  • 28C3 - 2011/video/28c3-4760-en-chokepointproject_h264.mp4 114.6 MB
  • 32C3 - 2015/video/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_hd.mp4 114.5 MB
  • 33C3 - 2016/Where in the World Is Carmen Sandiego (33c3) - deutsche Ubersetzung.mp4 114.4 MB
  • 33C3 - 2016/Security Nightmares 0x11 (33c3) - english translation.mp4 114.3 MB
  • 33C3 - 2016/Shining some light on the Amazon Dash button (33c3) - traduction française.mp4 114.3 MB
  • 32C3 - 2015/video/32c3-7305-en-de-Quantum_Cryptography_hd.mp4 114.1 MB
  • 33C3 - 2016/Where in the World Is Carmen Sandiego (33c3).mp4 114.1 MB
  • 27C3 - 2010/video/27c3-4006-en-diy_synthesizers_and_sound_generators.mp4 114.0 MB
  • 29C3 - 2012/video/29c3-5085-en-everycook_h264.mp4 113.9 MB
  • 33C3 - 2016/Wheel of Fortune (33c3).mp4 113.8 MB
  • 30C3 - 2013/video/30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4 113.7 MB
  • 34C3 - 2017/34C3 - Console Security - Switch - deutsche Ubersetzung.mp4 113.7 MB
  • 23C3 - 2006/video/23C3-1688-en-rootkits_as_reversing_tools.mp4 113.5 MB
  • 23C3 - 2006/video/23C3-1457-en-credit_card_security.mp4 113.5 MB
  • 22C3 - 2005/video/22C3-559-en-xbox_hacking.mp4 113.5 MB
  • 23C3 - 2006/video/23C3-1520-en-counter_development.mp4 113.5 MB
  • 29C3 - 2012/video/29c3-5400-en-hacking_cisco_phones_h264.mp4 113.2 MB
  • 25C3 - 2008/video/25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4 113.2 MB
  • 34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography - traduction francaise.mp4 113.2 MB
  • 33C3 - 2016/Rebel Cities (33c3) - traduction française.mp4 113.0 MB
  • 34C3 - 2017/34C3 - Type confusion discovery, abuse, and protection - deutsche Ubersetzung.mp4 113.0 MB
  • 34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography - deutsche Ubersetzung.mp4 112.9 MB
  • 23C3 - 2006/video/23C3-1733-en-bluetooth_hacking_revisited.mp4 112.8 MB
  • 23C3 - 2006/video/23C3-1663-de-tracking_goods_and_tracing_people.mp4 112.8 MB
  • 33C3 - 2016/Rebel Cities (33c3) - deutsche Ubersetzung.mp4 112.7 MB
  • 34C3 - 2017/34C3 - Console Security - Switch.mp4 112.6 MB
  • 33C3 - 2016/The woman behind your WiFi (33c3) - traduction française.mp4 112.6 MB
  • 33C3 - 2016/Rebel Cities (33c3).mp4 112.5 MB
  • 31C3 - 2014/video/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_sd.mp4 112.3 MB
  • 30C3 - 2013/video/30c3-5611-en-Hello_World__h264-hq.mp4 112.3 MB
  • 34C3 - 2017/34C3 - All Computers Are Beschlagnahmt - english translation.mp4 111.9 MB
  • 33C3 - 2016/The woman behind your WiFi (33c3) - deutsche Ubersetzung.mp4 111.9 MB
  • 34C3 - 2017/34C3 - Fuck Dutch mass-surveillance let's have a referendum! - deutsche Ubersetzung.mp4 111.8 MB
  • 29C3 - 2012/video/29c3-5301-en-defeating_windows_memory_forensics_h264.mp4 111.8 MB
  • 25C3 - 2008/video/25c3-2992-en-tricks_makes_you_smile.mp4 111.7 MB
  • 23C3 - 2006/video/23C3-1454-en-natural_language_database_interface.mp4 111.7 MB
  • 23C3 - 2006/video/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp4 111.7 MB
  • 34C3 - 2017/34C3 - All Computers Are Beschlagnahmt.mp4 111.5 MB
  • 33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - traduction f.mp4 111.5 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Einführung in den OpenStreetMap Online-Editor iD.mp4 111.5 MB
  • 33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - english tran.mp4 111.3 MB
  • 32C3 - 2015/video/32c3-7284-en-de-Check_your_privileges_hd.mp4 111.2 MB
  • 31C3 - 2014/video/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4 111.1 MB
  • 33C3 - 2016/The woman behind your WiFi (33c3).mp4 111.0 MB
  • 34C3 - 2017/34C3 - Zamir Transnational Network und Zagreb Dairy.mp4 110.9 MB
  • 30C3 - 2013/video/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4 110.8 MB
  • 28C3 - 2011/video/28c3-4712-en-mining_your_geotags_h264.mp4 110.8 MB
  • 34C3 - 2017/34C3 - Zamir Transnational Network und Zagreb Dairy - english translation.mp4 110.8 MB
  • 23C3 - 2006/video/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp4 110.7 MB
  • 23C3 - 2006/video/23C3-1708-en-tv_b_gone.mp4 110.7 MB
  • 34C3 - 2017/34C3 - Ladeinfrastruktur fUr Elektroautos Ausbau statt Sicherheit - english translation.mp4 110.6 MB
  • 34C3 - 2017/34C3 - Ladeinfrastruktur fUr Elektroautos Ausbau statt Sicherheit.mp4 110.6 MB
  • 23C3 - 2006/video/23C3-1516-en-lightning_talks_day_3.mp4 110.3 MB
  • 23C3 - 2006/video/23C3-1423-en-we_dont_trust_voting_computers.mp4 110.2 MB
  • 19C3 - 2002/video/19C3-382-quantenkryptographie.mp4 110.2 MB
  • 34C3 - 2017/34C3 - Inside Intel Management Engine.mp4 110.1 MB
  • 29C3 - 2012/video/29c3-5398-en-closing_event2012_h264.mp4 109.7 MB
  • 31C3 - 2014/video/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_hd.mp4 109.6 MB
  • 30C3 - 2013/video/30c3-5610-de-Seidenstrasse_h264-hq.mp4 109.6 MB
  • 34C3 - 2017/34C3 - Inside Intel Management Engine - deutsche Ubersetzung.mp4 109.5 MB
  • 20C3 - 2003/video/20C3-568-Data_mining_and_intelligence_software.mp4 109.5 MB
  • 31C3 - 2014/video/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_sd.mp4 109.4 MB
  • 29C3 - 2012/video/29c3-5095-en-privacy_and_the_car_of_the_future_h264.mp4 108.8 MB
  • 23C3 - 2006/video/23C3-1502-en-the_gift_of_sharing.mp4 108.7 MB
  • 32C3 - 2015/video/32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_hd.mp4 108.5 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Privacy-Oriented Distributed Networking for an Ethical Internet - including 50 sub.mp4 108.4 MB
  • 22C3 - 2005/video/22C3-789-en-hacker_jeopardy.mp4 108.3 MB
  • 33C3 - 2016/Space making space shaping (33c3).mp4 108.3 MB
  • 34C3 - 2017/34C3 - Type confusion discovery, abuse, and protection.mp4 108.2 MB
  • 33C3 - 2016/Space making space shaping (33c3) - english translation.mp4 108.2 MB
  • 23C3 - 2006/video/23C3-1622-en-void_the_warranty.mp4 107.9 MB
  • 34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography.mp4 107.9 MB
  • 23C3 - 2006/video/23C3-1679-de-ueberwachungsdruck.mp4 107.8 MB
  • 23C3 - 2006/video/23C3-1487-de-ccc_jahresrueckblick.mp4 107.7 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Worldviews Hacking Abstractions.mp4 107.7 MB
  • 33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3).mp4 107.7 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - On Scripting.mp4 107.7 MB
  • 33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3) - deutsche Ubers.mp4 107.6 MB
  • 20C3 - 2003/video/20C3-653-Device_hacking_with_JTAG.mp4 107.6 MB
  • 33C3 - 2016/Bootstraping a slightly more secure laptop (33c3).mp4 107.4 MB
  • 30C3 - 2013/video/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4 107.2 MB
  • 30C3 - 2013/video/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4 107.2 MB
  • 19C3 - 2002/video/19C3-399-xbox-linux.mp4 107.1 MB
  • 34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience - deutsche Ubersetzung.mp4 107.1 MB
  • 34C3 - 2017/34C3 - Abschluss - traduction francaise.mp4 106.9 MB
  • 31C3 - 2014/video/31c3-6170-en-net_neutrality_days_of_future_past_hd.mp4 106.9 MB
  • 22C3 - 2005/video/22C3-537-en-fuzzing.mp4 106.9 MB
  • 23C3 - 2006/video/23C3-1758-en-fuzzing_corporate_world.mp4 106.9 MB
  • 34C3 - 2017/34C3 - Fuck Dutch mass-surveillance let's have a referendum!.mp4 106.9 MB
  • 32C3 - 2015/video/32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_hd.mp4 106.8 MB
  • 33C3 - 2016/Bootstraping a slightly more secure laptop (33c3) - traduction française.mp4 106.6 MB
  • 22C3 - 2005/video/22C3-790-de-nerds_kochen.mp4 106.6 MB
  • 33C3 - 2016/Bootstraping a slightly more secure laptop (33c3) - deutsche Ubersetzung.mp4 106.4 MB
  • 34C3 - 2017/34C3 - Inside Android’s SafetyNet Attestation Attack and Defense - deutsche Ubersetzung.mp4 106.1 MB
  • 23C3 - 2006/video/23C3-1738-en-mmorpgs.mp4 106.0 MB
  • 34C3 - 2017/34C3 - Inside Android’s SafetyNet Attestation Attack and Defense.mp4 105.8 MB
  • 32C3 - 2015/video/32c3-7449-en-de-Prediction_and_Control_hd.mp4 105.8 MB
  • 19C3 - 2002/video/19C3-443-how-to-find-anything-on-the-web.mp4 105.5 MB
  • 23C3 - 2006/video/23C3-1257-en-podjournalism.mp4 105.5 MB
  • 25C3 - 2008/video/25c3-2681-en-repurposing_the_ti_ez430u.mp4 105.4 MB
  • 23C3 - 2006/video/23C3-1456-en-unusual_bugs.mp4 104.9 MB
  • 23C3 - 2006/video/23C3-1685-de-go_menschen.mp4 104.9 MB
  • 32C3 - 2015/video/32c3-7342-en-Household_Totalitarianism_and_Cyberspace_hd.mp4 104.8 MB
  • 34C3 - 2017/34C3 - Tightening the Net in Iran - deutsche Ubersetzung.mp4 104.7 MB
  • 34C3 - 2017/34C3 - Implementing an LLVM based Dynamic Binary Instrumentation framework - deutsche Ubersetzung.mp4 104.7 MB
  • 34C3 - 2017/34C3 - Making Experts Makers and Makers Experts - deutsche Ubersetzung.mp4 104.5 MB
  • 34C3 - 2017/34C3 - Making Experts Makers and Makers Experts.mp4 104.5 MB
  • 34C3 - 2017/34C3 - Implementing an LLVM based Dynamic Binary Instrumentation framework.mp4 104.4 MB
  • 30C3 - 2013/video/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4 104.4 MB
  • 34C3 - 2017/34C3 - Making Experts Makers and Makers Experts - La traduccion espanola.mp4 104.3 MB
  • 34C3 - 2017/34C3 - SCADA - Gateway to (s)hell.mp4 104.2 MB
  • 29C3 - 2012/video/29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_h264.mp4 104.2 MB
  • 31C3 - 2014/video/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_hd.mp4 104.2 MB
  • 34C3 - 2017/34C3 - Financial surveillance - deutsche Ubersetzung.mp4 103.9 MB
  • 34C3 - 2017/34C3 - Financial surveillance - traduction francaise.mp4 103.8 MB
  • 30C3 - 2013/video/30c3-5554-en-Magic_Lantern_h264-hq.mp4 103.7 MB
  • 34C3 - 2017/34C3 - SCADA - Gateway to (s)hell - deutsche Ubersetzung.mp4 103.7 MB
  • 34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons - d.mp4 103.7 MB
  • 34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons.mp4 103.5 MB
  • 34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons - t.mp4 103.4 MB
  • 31C3 - 2014/video/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_hd.mp4 103.4 MB
  • 32C3 - 2015/video/32c3-7543-de-The_mummy_unwrapped_hd.mp4 103.2 MB
  • 32C3 - 2015/audio/32c3-7558-en-Lightning_Talks_Day_2.opus 103.1 MB
  • 32C3 - 2015/audio/32c3-7559-en-Lightning_Talks_Day_3.opus 103.0 MB
  • 23C3 - 2006/audio/23C3-1567-en-hacker_jeopardy.mp3 103.0 MB
  • 33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3).mp4 103.0 MB
  • 28C3 - 2011/video/28c3-4656-en-ooops_i_hacked_my_pbx_h264.mp4 102.9 MB
  • 28C3 - 2011/video/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4 102.9 MB
  • 33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3) - deutsche Ubersetzung.mp4 102.8 MB
  • 30C3 - 2013/video/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4 102.6 MB
  • 29C3 - 2012/video/29c3-5140-en-safecast_h264.mp4 102.4 MB
  • 34C3 - 2017/34C3 - Abschluss - english translation.mp4 102.4 MB
  • 34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience.mp4 102.3 MB
  • 34C3 - 2017/34C3 - Abschluss.mp4 102.3 MB
  • 32C3 - 2015/audio/32c3-7560-en-Lightning_Talks_Day_4.opus 102.3 MB
  • 34C3 - 2017/34C3 - Mobile Data Interception from the Interconnection Link - deutsche Ubersetzung.mp4 102.1 MB
  • 29C3 - 2012/video/29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_h264.mp4 102.1 MB
  • 33C3 - 2016/Netzpolitik in Österreich (33c3).mp4 102.0 MB
  • 34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience - La traduccion espanola.mp4 102.0 MB
  • 23C3 - 2006/video/23C3-1604-de-tracking_von_personen_in_videoszenen.mp4 101.9 MB
  • 30C3 - 2013/video/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4 101.9 MB
  • 33C3 - 2016/Make Wi-Fi fast again (33c3).mp4 101.8 MB
  • 30C3 - 2013/video/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4 101.7 MB
  • 21C3 - 2004/video/163 SPAM Workshop.mp4 101.6 MB
  • 32C3 - 2015/video/32c3-7189-en-Key-logger_Video_Mouse_hd.mp4 101.5 MB
  • 34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma - traduction francaise.mp4 101.4 MB
  • 34C3 - 2017/34C3 - Deep Learning Blindspots - La traduccion espanola.mp4 101.2 MB
  • 21C3 - 2004/video/074 Hacker-Jeopardy.mp4 101.0 MB
  • 34C3 - 2017/34C3 - LatticeHacks - deutsche Ubersetzung.mp4 100.9 MB
  • 23C3 - 2006/video/23C3-1619-en-introduction_to_matrix_programming.mp4 100.9 MB
  • 30C3 - 2013/audio/30c3-5577-de-en-Hacker_Jeopardy_opus.opus 100.8 MB
  • 31C3 - 2014/audio/31c3-6583-de-en-Jahresrueckblick_des_CCC_opus.opus 100.8 MB
  • 34C3 - 2017/34C3 - LatticeHacks.mp4 100.7 MB
  • 34C3 - 2017/34C3 - Uncovering vulnerabilities in Hoermann BiSecur - deutsche Ubersetzung.mp4 100.6 MB
  • 24C3 - 2007/video/24c3-2336-de-security_nightmares_high.mp4 100.5 MB
  • 34C3 - 2017/34C3 - Uncovering vulnerabilities in Hoermann BiSecur.mp4 100.4 MB
  • 34C3 - 2017/34C3 - Ensuring Climate Data Remains Public.mp4 100.3 MB
  • 32C3 - 2015/video/32c3-7432-en-de-Datahavens_from_HavenCo_to_Today_hd.mp4 100.3 MB
  • 34C3 - 2017/34C3 - Ensuring Climate Data Remains Public - deutsche Ubersetzung.mp4 100.2 MB
  • 30C3 - 2013/video/30c3-5305-en-Breaking_Baryons_h264-hq.mp4 100.1 MB
  • 34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions - traduction francaise.mp4 100.0 MB
  • 32C3 - 2015/video/32c3-7355-en-de-apertus_AXIOM_hd.mp4 99.7 MB
  • 23C3 - 2006/video/23C3-1713-en-black_ops_2006.mp4 99.6 MB
  • 23C3 - 2006/video/23C3-1554-de-ethernet_mit_mikrocontrollern.mp4 99.6 MB
  • 32C3 - 2015/video/32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung_hd.mp4 99.5 MB
  • 28C3 - 2011/video/28c3-4828-de-antiforensik_h264.mp4 99.4 MB
  • 34C3 - 2017/34C3 - WTFrance - deutsche Ubersetzung.mp4 99.3 MB
  • 33C3 - 2016/Haft fUr Whistleblower (33c3) - traduction française.mp4 99.1 MB
  • 23C3 - 2006/video/23C3-1513-en-detecting_temperature_through_clock_skew.mp4 99.0 MB
  • 29C3 - 2012/video/29c3-5123-en-small_footprint_inspection_techniques_for_android_h264.mp4 99.0 MB
  • 34C3 - 2017/34C3 - WTFrance.mp4 98.9 MB
  • 33C3 - 2016/Haft fUr Whistleblower (33c3) - english translation.mp4 98.8 MB
  • 32C3 - 2015/video/32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_hd.mp4 98.6 MB
  • 34C3 - 2017/34C3 - Think big or care for yourself - deutsche Ubersetzung.mp4 98.3 MB
  • 33C3 - 2016/A look into the Mobile Messaging Black Box (33c3) - deutsche Ubersetzung.mp4 98.2 MB
  • 32C3 - 2015/video/32c3-7435-en-de-Replication_Prohibited_hd.mp4 97.9 MB
  • 23C3 - 2006/video/23C3-1642-en-unlocking_filevault.mp4 97.9 MB
  • 34C3 - 2017/34C3 - Tightening the Net in Iran.mp4 97.9 MB
  • 23C3 - 2006/video/23C3-1682-de-security_nightmares.mp4 97.9 MB
  • 34C3 - 2017/34C3 - Financial surveillance.mp4 97.9 MB
  • 30C3 - 2013/video/30c3-5412-en-Bug_class_genocide_h264-hd.mp4 97.9 MB
  • 30C3 - 2013/video/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4 97.8 MB
  • 31C3 - 2014/video/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_sd.mp4 97.7 MB
  • 23C3 - 2006/video/23C3-1429-de-fnord_jahresrueckblick.mp4 97.7 MB
  • 29C3 - 2012/video/29c3-5203-en-omg_oer_h264.mp4 97.7 MB
  • 24C3 - 2007/video/24c3-2203-de-chaos_jahresrueckblick_high.mp4 97.3 MB
  • 34C3 - 2017/34C3 - Coming Soon Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme (2).mp4 97.2 MB
  • 32C3 - 2015/audio/32c3-7221-de-Methodisch_inkorrekt.opus 97.1 MB
  • 34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma - deutsche Ubersetzung.mp4 97.1 MB
  • 34C3 - 2017/34C3 - Deep Learning Blindspots.mp4 97.1 MB
  • 21C3 - 2004/video/315 Fight for your Right to Fileshare.mp4 97.1 MB
  • 34C3 - 2017/34C3 - Briar - deutsche Ubersetzung.mp4 97.1 MB
  • 34C3 - 2017/34C3 - Deep Learning Blindspots - deutsche Ubersetzung.mp4 97.1 MB
  • 33C3 - 2016/The High Priests of the Digital Age (33c3).mp4 97.0 MB
  • 34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma.mp4 97.0 MB
  • 30C3 - 2013/video/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4 96.9 MB
  • 34C3 - 2017/34C3 - Coming Soon Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme.mp4 96.9 MB
  • 34C3 - 2017/34C3 - Briar - La traduccion espanola.mp4 96.9 MB
  • 33C3 - 2016/A look into the Mobile Messaging Black Box (33c3).mp4 96.6 MB
  • 32C3 - 2015/video/32c3-7133-en-de-Beyond_your_cable_modem_hd.mp4 96.6 MB
  • 30C3 - 2013/video/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4 96.6 MB
  • 34C3 - 2017/34C3 - Intel ME Myths and reality - deutsche Ubersetzung.mp4 96.4 MB
  • 31C3 - 2014/video/31c3-6358-en-de-Information_Control_and_Strategic_Violence_hd.mp4 96.3 MB
  • 34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk - traduction francaise.mp4 96.3 MB
  • 33C3 - 2016/How do we know our PRNGs work properly (33c3) - deutsche Ubersetzung.mp4 96.2 MB
  • 34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk - deutsche Ubersetzung.mp4 96.2 MB
  • 21C3 - 2004/video/016 Phishing the Web.mp4 96.1 MB
  • 23C3 - 2006/video/23C3-1652-de-geschichte_der_automaten.mp4 96.1 MB
  • 34C3 - 2017/34C3 - Intel ME Myths and reality - traduction francaise.mp4 96.1 MB
  • 34C3 - 2017/34C3 - Holography of Wi-Fi radiation - deutsche Ubersetzung.mp4 96.1 MB
  • 30C3 - 2013/video/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4 95.9 MB
  • 30C3 - 2013/video/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4 95.9 MB
  • 25C3 - 2008/video/25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4 95.8 MB
  • 34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions - deutsche Ubersetzung.mp4 95.8 MB
  • 23C3 - 2006/video/23C3-1578-de-hacking_fingerprint_recognition_systems.mp4 95.8 MB
  • 34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions.mp4 95.8 MB
  • 23C3 - 2006/video/23C3-1478-en-traffic_analysis.mp4 95.6 MB
  • 34C3 - 2017/34C3 - Mobile Data Interception from the Interconnection Link.mp4 95.6 MB
  • 32C3 - 2015/video/32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_hd.mp4 95.6 MB
  • 23C3 - 2006/video/23C3-1494-de-ego_striptease.mp4 95.5 MB
  • 31C3 - 2014/audio/31c3-6579-en-de-Lightning_Talks_Day_3_opus.opus 95.5 MB
  • 34C3 - 2017/34C3 - Holography of Wi-Fi radiation.mp4 95.5 MB
  • 31C3 - 2014/video/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_hd.mp4 95.4 MB
  • 34C3 - 2017/34C3 - Robot Music - deutsche Ubersetzung.mp4 95.4 MB
  • 19C3 - 2002/video/19C3-517-eu-data-retention.mp4 95.4 MB
  • 30C3 - 2013/video/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4 95.3 MB
  • 34C3 - 2017/34C3 - Robot Music.mp4 95.3 MB
  • 33C3 - 2016/Dieselgate - A year later (33c3) - traduction française.mp4 95.2 MB
  • 33C3 - 2016/Software Defined Emissions (33c3) - deutsche Ubersetzung.mp4 95.1 MB
  • 29C3 - 2012/video/29c3-5104-en-esxi_beast_h264.mp4 95.0 MB
  • 29C3 - 2012/video/29c3-5167-en-setting_mobile_phones_free_h264.mp4 94.9 MB
  • 23C3 - 2006/video/23C3-1694-en-automated_exploit_detection_in_binaries.mp4 94.9 MB
  • 23C3 - 2006/video/23C3-1473-en-large_scale_internet_content_filtering.mp4 94.8 MB
  • 29C3 - 2012/video/29c3-5226-en-further_hacks_calypso_h264.mp4 94.7 MB
  • 32C3 - 2015/video/32c3-7400-en-de-Technology_and_Mass_Atrocity_Prevention_hd.mp4 94.6 MB
  • 23C3 - 2006/video/23C3-1347-en-we_are_great_together.mp4 94.6 MB
  • 30C3 - 2013/video/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hd.mp4 94.6 MB
  • 30C3 - 2013/video/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4 94.5 MB
  • 31C3 - 2014/video/31c3-6541-en-de-Forging_the_USB_armory_hd.mp4 94.2 MB
  • 33C3 - 2016/EinfUhrung zu Blockchains (33c3).mp4 94.0 MB
  • 29C3 - 2012/video/29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_h264.mp4 93.9 MB
  • 33C3 - 2016/Machine Dreams (33c3).mp4 93.9 MB
  • 33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3).mp4 93.9 MB
  • 33C3 - 2016/No USB No problem. (33c3) - YouTube.mp4 93.9 MB
  • 33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3).mp4 93.7 MB
  • 22C3 - 2005/video/22C3-536-en-bluetooth_hacking.mp4 93.6 MB
  • 31C3 - 2014/video/31c3-6236-en-de-Iridium_Pager_Hacking_hd.mp4 93.5 MB
  • 34C3 - 2017/34C3 - Schnaps Hacking - deutsche Ubersetzung.mp4 93.5 MB
  • 32C3 - 2015/video/32c3-7314-en-de-All_Our_Shared_Spectrum_Are_Belong_to_Us_hd.mp4 93.3 MB
  • 33C3 - 2016/Edible Soft Robotics (33c3) - deutsche Ubersetzung.mp4 93.1 MB
  • 33C3 - 2016/Software Defined Emissions (33c3).mp4 93.1 MB
  • 32C3 - 2015/video/32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_hd.mp4 93.0 MB
  • 34C3 - 2017/34C3 - Intel ME Myths and reality.mp4 93.0 MB
  • 34C3 - 2017/34C3 - Think big or care for yourself.mp4 92.9 MB
  • 23C3 - 2006/audio/23C3-1710-en-tap_the_eff.mp3 92.9 MB
  • 31C3 - 2014/video/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_hd.mp4 92.8 MB
  • 23C3 - 2006/video/23C3-1609-en-data_retention_update.mp4 92.5 MB
  • 31C3 - 2014/video/31c3-6196-en-Switches_Get_Stitches_sd.mp4 92.4 MB
  • 33C3 - 2016/The Fight for Encryption in 2016 (33c3).mp4 92.4 MB
  • 34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk.mp4 92.4 MB
  • 33C3 - 2016/Edible Soft Robotics (33c3).mp4 92.4 MB
  • 34C3 - 2017/34C3 - TrUgerische Sicherheit - english translation.mp4 92.3 MB
  • 20C3 - 2003/video/20C3-538-Practical_WIN32_and_Unicode_exploitation.mp4 92.0 MB
  • 33C3 - 2016/Lockpicking in the IoT (33c3) - deutsche Ubersetzung.mp4 92.0 MB
  • 29C3 - 2012/audio/29c3-5384-en-lightning_talks_3_ogg.ogg 91.9 MB
  • 33C3 - 2016/The Transhumanist Paradox (33c3).mp4 91.8 MB
  • 31C3 - 2014/audio/31c3-6563-en-Lightning_Talks_Day_2_opus.opus 91.8 MB
  • 31C3 - 2014/audio/31c3-6563-en-de-Lightning_Talks_Day_2_opus.opus 91.8 MB
  • 33C3 - 2016/Make the Internet Neutral Again (33c3) - deutsche Ubersetzung.mp4 91.6 MB
  • 33C3 - 2016/Make the Internet Neutral Again (33c3) - traduction française.mp4 91.6 MB
  • 23C3 - 2006/video/23C3-1402-de-drones.mp4 91.6 MB
  • 29C3 - 2012/video/29c3-5404-en-noc_review_h264.mp4 91.5 MB
  • 17C3 - 2000/video/17C3_bigbrother.mp4 91.5 MB
  • 20C3 - 2003/radio/20C3_Radio_Riff_-_Aufschnitt_Alpha.mp3 91.4 MB
  • 31C3 - 2014/video/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_hd.mp4 91.4 MB
  • 34C3 - 2017/34C3 - Briar.mp4 91.4 MB
  • 33C3 - 2016/Lockpicking in the IoT (33c3) - traduction française.mp4 91.3 MB
  • 25C3 - 2008/video/25c3-2904-en-solar-powering_your_geek_gear.mp4 91.3 MB
  • 23C3 - 2006/audio/23C3-1420-en-strong_random_number_generator.mp3 91.2 MB
  • 32C3 - 2015/audio/32c3-7306-de-Jahresrueckblick_des_CCC.opus 91.0 MB
  • 27C3 - 2010/video/27c3-4299-en-closing_event.mp4 90.8 MB
  • 33C3 - 2016/Make the Internet Neutral Again (33c3).mp4 90.8 MB
  • 33C3 - 2016/The Zcash anonymous cryptocurrency (33c3) - traduction française.mp4 90.6 MB
  • 20C3 - 2003/video/20C3-537-WSIS_Overview.mp4 90.5 MB
  • 33C3 - 2016/Console Hacking 2016 (33c3).mp4 90.5 MB
  • 34C3 - 2017/34C3 - Reverse engineering FPGAs - deutsche Ubersetzung.mp4 90.4 MB
  • 30C3 - 2013/video/30c3-5185-en-FPGA_101_h264-hq.mp4 90.3 MB
  • 33C3 - 2016/The Zcash anonymous cryptocurrency (33c3).mp4 90.3 MB
  • 33C3 - 2016/The Zcash anonymous cryptocurrency (33c3) - deutsche Ubersetzung.mp4 90.3 MB
  • 34C3 - 2017/34C3 - Reverse engineering FPGAs.mp4 90.3 MB
  • 30C3 - 2013/video/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4 90.2 MB
  • 30C3 - 2013/video/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4 90.0 MB
  • 30C3 - 2013/video/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4 90.0 MB
  • 33C3 - 2016/Corporate surveillance, digital tracking, big data & privacy (33c3).mp4 90.0 MB
  • 33C3 - 2016/Decoding the LoRa PHY (33c3) - deutsche Ubersetzung.mp4 89.9 MB
  • 30C3 - 2013/video/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4 89.9 MB
  • 31C3 - 2014/audio/31c3-6580-en-de-Lightning_Talks_Day_4_opus.opus 89.9 MB
  • 34C3 - 2017/34C3 - TrUgerische Sicherheit.mp4 89.8 MB
  • 32C3 - 2015/video/32c3-7426-en-de-Intelexit_hd.mp4 89.8 MB
  • 33C3 - 2016/Lasers in the sky (with asteroids) (33c3) - deutsche Ubersetzung.mp4 89.7 MB
  • 33C3 - 2016/Lasers in the sky (with asteroids) (33c3).mp4 89.6 MB
  • 31C3 - 2014/video/31c3-6582-de-Das_Transparenzportal_Hamburg_hd.mp4 89.5 MB
  • 33C3 - 2016/Lockpicking in the IoT (33c3).mp4 89.5 MB
  • 23C3 - 2006/audio/23C3-1683-de-powerpoint_karaoke.mp3 89.5 MB
  • 33C3 - 2016/Irren ist staatlich (33c3) - traduction française.mp4 89.3 MB
  • 23C3 - 2006/video/23C3-1498-en-mining_aol_search_queries.mp4 89.3 MB
  • 33C3 - 2016/Irren ist staatlich (33c3) - english translation.mp4 89.2 MB
  • 31C3 - 2014/video/31c3-6399-en-Global_Civil_Society_Under_Attack_hd.mp4 89.1 MB
  • 33C3 - 2016/Corporate surveillance, digital tracking, big data & privacy (33c3) - deutsche Ubersetzung.mp4 89.1 MB
  • 31C3 - 2014/video/31c3-6462-en-de-MegaCode_to_facility_gates_hd.mp4 89.0 MB
  • 28C3 - 2011/video/28c3-4587-en-bup_git_for_backups_h264.mp4 88.8 MB
  • 33C3 - 2016/Everything you always wanted to know about Certificate Transparency (33c3) - deutsche Ubersetzung.mp4 88.8 MB
  • 34C3 - 2017/34C3 - iOS kernel exploitation archaeology - deutsche Ubersetzung.mp4 88.6 MB
  • 21C3 - 2004/video/176 Passive covert channels in the Linux kernel.mp4 88.6 MB
  • 33C3 - 2016/Hacking the World (33c3) - deutsche Ubersetzung.mp4 88.5 MB
  • 33C3 - 2016/Decoding the LoRa PHY (33c3).mp4 88.5 MB
  • 34C3 - 2017/34C3 - iOS kernel exploitation archaeology.mp4 88.5 MB
  • 28C3 - 2011/video/28c3-4770-en-dont_scan_just_ask_h264.mp4 88.4 MB
  • 33C3 - 2016/The Fight for Encryption in 2016 (33c3) - traduction française.mp4 88.3 MB
  • 23C3 - 2006/video/23C3-1500-en-hackerspaces.mp4 88.3 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Habitual Automation - Because we have to script.mp4 88.3 MB
  • 34C3 - 2017/34C3 - Schnaps Hacking.mp4 88.3 MB
  • 29C3 - 2012/video/29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_h264.mp4 88.1 MB
  • 33C3 - 2016/The 12 Networking Truths (33c3) - deutsche Ubersetzung.mp4 88.0 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - In der Weihnachtsbäckerei - Data Science und Kekse.mp4 88.0 MB
  • 33C3 - 2016/Ethics in the data society (33c3) - deutsche Ubersetzung.mp4 87.7 MB
  • 31C3 - 2014/video/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_hd.mp4 87.6 MB
  • 32C3 - 2015/video/32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_hd.mp4 87.5 MB
  • 33C3 - 2016/Ethics in the data society (33c3).mp4 87.4 MB
  • 30C3 - 2013/video/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4 87.2 MB
  • 34C3 - 2017/34C3 - eMMC hacking, or how I fixed long-dead Galaxy S3 phones - deutsche Ubersetzung.mp4 87.2 MB
  • 34C3 - 2017/34C3 - Die Sprache der Uberwacher - english translation.mp4 87.1 MB
  • 32C3 - 2015/video/32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_hd.mp4 86.8 MB
  • 34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging - La traduccion espanola.mp4 86.6 MB
  • 33C3 - 2016/Visiting The Bear Den (33c3) - deutsche Ubersetzung.mp4 86.6 MB
  • 34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging - deutsche Ubersetzung.mp4 86.6 MB
  • 30C3 - 2013/workshops/30c3-WS-en-YBTI_Routing-Caleb_James_Delisle-Edge_of_Dystopia.mp4 86.6 MB
  • 34C3 - 2017/34C3 - Netzpolitik in der Schweiz - english translation.mp4 86.6 MB
  • 23C3 - 2006/video/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp4 86.4 MB
  • 34C3 - 2017/34C3 - Netzpolitik in der Schweiz - traduction francaise.mp4 86.4 MB
  • 33C3 - 2016/Virtual Secure Boot (33c3) - deutsche Ubersetzung.mp4 86.3 MB
  • 29C3 - 2012/audio/29c3-5309-de-en-hacker_jeopardy_ogg.ogg 86.2 MB
  • 24C3 - 2007/video/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4 85.5 MB
  • 34C3 - 2017/34C3 - Access To Bodies - english translation.mp4 85.5 MB
  • 21C3 - 2004/video/101 XMPP - Jabber.mp4 85.5 MB
  • 30C3 - 2013/video/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4 85.5 MB
  • 33C3 - 2016/Irren ist staatlich (33c3).mp4 85.4 MB
  • 33C3 - 2016/Virtual Secure Boot (33c3).mp4 85.2 MB
  • 33C3 - 2016/Everything you always wanted to know about Certificate Transparency (33c3).mp4 85.1 MB
  • 33C3 - 2016/From Server Farm to Data Table (33c3) - deutsche Ubersetzung.mp4 85.1 MB
  • 33C3 - 2016/Visiting The Bear Den (33c3).mp4 85.1 MB
  • 34C3 - 2017/34C3 - Bringing Linux back to server boot ROMs with NERF and Heads - deutsche Ubersetzung.mp4 85.0 MB
  • 23C3 - 2006/video/23C3-1600-en-biometrics.mp4 84.9 MB
  • 31C3 - 2014/video/31c3-6184-de-en-Mein_Bot_der_Kombattant_sd.mp4 84.9 MB
  • 33C3 - 2016/Nintendo Hacking 2016 (33c3).mp4 84.8 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - A Blueprint for Making Namecoin Anonymous.mp4 84.8 MB
  • 31C3 - 2014/video/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_hd.mp4 84.8 MB
  • 31C3 - 2014/video/31c3-6402-en-de-Axoloti_hd.mp4 84.8 MB
  • 33C3 - 2016/From Server Farm to Data Table (33c3).mp4 84.7 MB
  • 20C3 - 2003/video/20C3-591-Berichte_von_den_Big_Brother_Awards.mp4 84.7 MB
  • 23C3 - 2006/video/23C3-1439-en-information_operations.mp4 84.6 MB
  • 31C3 - 2014/audio/31c3-6109-de-en-Fnord_News_Show_opus.opus 84.6 MB
  • 32C3 - 2015/video/32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_hd.mp4 84.5 MB
  • 31C3 - 2014/video/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_hd.mp4 84.3 MB
  • 29C3 - 2012/audio/29c3-5383-en-lightning_talks_2_ogg.ogg 84.3 MB
  • 23C3 - 2006/video/23C3-1638-de-freie_software.mp4 84.0 MB
  • 30C3 - 2013/video/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4 83.9 MB
  • 24C3 - 2007/video/24c3-2355-de-trecker_fahrn_high.mp4 83.9 MB
  • 34C3 - 2017/34C3 - eMMC hacking, or how I fixed long-dead Galaxy S3 phones.mp4 83.8 MB
  • 33C3 - 2016/Nintendo Hacking 2016 (33c3) - deutsche Ubersetzung.mp4 83.8 MB
  • 23C3 - 2006/audio/23C3-1444-en-tor_and_china.mp3 83.8 MB
  • 19C3 - 2002/video/19C3-392-codeflow-analyse.mp4 83.7 MB
  • 33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3).mp4 83.6 MB
  • 33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3) - deutsche Ubersetzung.mp4 83.5 MB
  • 24C3 - 2007/video/24c3-2356-en-computer_popsongs_high.mp4 83.3 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Modeling Trust in a Distributed Private Social Network - secushare.org.mp4 83.3 MB
  • 29C3 - 2012/video/29c3-5390-en-tacticaltech_h264.mp4 83.2 MB
  • 34C3 - 2017/34C3 - Es sind die kleinen Dinge im Leben II - english translation.mp4 82.9 MB
  • 33C3 - 2016/Interplanetary Colonization (33c3) - traduction française.mp4 82.6 MB
  • 20C3 - 2003/video/20C3-633-Fnord_Jahresrueckschau.mp4 82.6 MB
  • 21C3 - 2004/video/117 Kampagne Fair Sharing.mp4 82.5 MB
  • 23C3 - 2006/video/23C3-1560-en-csrf.mp4 82.5 MB
  • 20C3 - 2003/video/20C3-598-Trust_based_P2P_WYMIWYG_KnoBot_project.mp4 82.4 MB
  • 33C3 - 2016/Interplanetary Colonization (33c3) - deutsche Ubersetzung.mp4 82.4 MB
  • 30C3 - 2013/video/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4 82.3 MB
  • 24C3 - 2007/video/24c3-2241-de-das_panoptische_prinzip_high.mp4 82.3 MB
  • 34C3 - 2017/34C3 - MQA - A clever stealth DRM-Trojan - deutsche Ubersetzung.mp4 82.3 MB
  • 34C3 - 2017/34C3 - Digitale Bildung in der Schule - La traduccion espanola.mp4 82.2 MB
  • 34C3 - 2017/34C3 - Public FPGA based DMA Attacking.mp4 82.2 MB
  • 34C3 - 2017/34C3 - Digitale Bildung in der Schule - english translation.mp4 82.1 MB
  • 31C3 - 2014/video/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_hd.mp4 82.1 MB
  • 34C3 - 2017/34C3 - Public FPGA based DMA Attacking - deutsche Ubersetzung.mp4 82.1 MB
  • 30C3 - 2013/audio/30c3-5563-en-de-Lightning_Talks_Day_3_opus.opus 82.0 MB
  • 30C3 - 2013/video/30c3-5289-en-Coding_your_body_h264-hq.mp4 82.0 MB
  • 34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging.mp4 82.0 MB
  • 22C3 - 2005/video/22C3-426-de-entschwoerungstheorie.mp4 81.9 MB
  • 32C3 - 2015/video/32c3-7367-en-de-Ling_-_High_level_system_programming_hd.mp4 81.9 MB
  • 33C3 - 2016/Tapping into the core (33c3) - deutsche Ubersetzung.mp4 81.9 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Sovereignty in Catalonia_ 1st Step Decentralized Infrastructure.mp4 81.8 MB
  • 31C3 - 2014/video/31c3-6131-en-de-Safer_playing_with_lasers_hd.mp4 81.8 MB
  • 34C3 - 2017/34C3 - Access To Bodies.mp4 81.7 MB
  • 32C3 - 2015/video/32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_hd.mp4 81.7 MB
  • 30C3 - 2013/video/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4 81.6 MB
  • 34C3 - 2017/34C3 - Practical Mix Network Design - deutsche Ubersetzung.mp4 81.4 MB
  • 33C3 - 2016/Syrian Archive (33c3) - deutsche Ubersetzung.mp4 81.4 MB
  • 33C3 - 2016/Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3) - english translation.mp4 81.3 MB
  • 34C3 - 2017/34C3 - Practical Mix Network Design - traduction francaise.mp4 81.3 MB
  • 33C3 - 2016/A Data Point Walks Into a Bar (33c3) - deutsche Ubersetzung.mp4 81.3 MB
  • 24C3 - 2007/video/24c3-2382-de-tor_high.mp4 81.2 MB
  • 30C3 - 2013/video/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4 81.1 MB
  • 34C3 - 2017/34C3 - Practical Mix Network Design.mp4 81.1 MB
  • 34C3 - 2017/34C3 - Die Sprache der Uberwacher.mp4 81.0 MB
  • 20C3 - 2003/video/20C3-588-Schummeln_in_oeffentlichen-Projekten.mp4 80.9 MB
  • 34C3 - 2017/34C3 - Netzpolitik in der Schweiz.mp4 80.8 MB
  • 33C3 - 2016/Syrian Archive (33c3).mp4 80.7 MB
  • 30C3 - 2013/video/30c3-5394-BREACH_in_Agda_h264-hq.mp4 80.5 MB
  • 30C3 - 2013/video/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4 80.5 MB
  • 30C3 - 2013/video/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4 80.5 MB
  • 31C3 - 2014/video/31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4 80.1 MB
  • 33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3) - traduction française.mp4 80.1 MB
  • 33C3 - 2016/Memory Deduplication The Curse that Keeps on Giving (33c3) - deutsche Ubersetzung.mp4 80.0 MB
  • 33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3) - english translation.mp4 79.9 MB
  • 30C3 - 2013/video/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4 79.9 MB
  • 33C3 - 2016/Shining some light on the Amazon Dash button (33c3).mp4 79.9 MB
  • 23C3 - 2006/video/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp4 79.8 MB
  • 34C3 - 2017/34C3 - Bringing Linux back to server boot ROMs with NERF and Heads.mp4 79.8 MB
  • 30C3 - 2013/video/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4 79.8 MB
  • 32C3 - 2015/video/32c3-7423-en-de-One_year_of_securitarian_drift_in_France_hd.mp4 79.6 MB
  • 30C3 - 2013/video/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4 79.5 MB
  • 33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3).mp4 79.5 MB
  • 23C3 - 2006/video/23C3-1728-en-23c3_network_review.mp4 79.4 MB
  • 34C3 - 2017/34C3 - MQA - A clever stealth DRM-Trojan.mp4 79.3 MB
  • 33C3 - 2016/Datenschutzgrundverordnung Rechte fUr Menschen, Pflichten fUr Firmen & Chancen fUr uns (33c3) - eng.mp4 79.3 MB
  • 24C3 - 2007/video/24c3-2381-en-what_is_terrorism_high.mp4 79.3 MB
  • 23C3 - 2006/video/23C3-1552-en-nintendo_ds.mp4 79.1 MB
  • 32C3 - 2015/video/32c3-7547-en-de-libusb_Maintainer_fail_hd.mp4 79.0 MB
  • 34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse - La traduccion espanola.mp4 78.8 MB
  • 24C3 - 2007/video/24c3-2363-de-der_bundestrojaner_high.mp4 78.8 MB
  • 28C3 - 2011/video/28c3-4847-en-reverse_engineering_usb_devices_h264.mp4 78.7 MB
  • 23C3 - 2006/video/23C3-1495-en-green_phone.mp4 78.6 MB
  • 30C3 - 2013/audio/30c3-5564-en-de-Lightning_Talks_Day_4_opus.opus 78.4 MB
  • 21C3 - 2004/video/158 How to find anything on the web.mp4 78.4 MB
  • 34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia - La traduccion espanola.mp4 78.4 MB
  • 29C3 - 2012/audio/29c3-5338-en-enemies_of_the_state_ogg.ogg 78.3 MB
  • 21C3 - 2004/video/060 Digital Prosthetics.mp4 78.3 MB
  • 33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3).mp4 78.2 MB
  • 29C3 - 2012/video/29c3-5206-en-the_ethics_of_activists_ddos_actions_h264.mp4 78.2 MB
  • 33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3) - La traducción española.mp4 78.1 MB
  • 24C3 - 2007/video/24c3-2272-en-hacking_in_the_age_of_declining_everything_high.mp4 78.1 MB
  • 34C3 - 2017/34C3 - avatar - deutsche Ubersetzung.mp4 77.9 MB
  • 33C3 - 2016/The DROWN Attack (33c3) - deutsche Ubersetzung.mp4 77.8 MB
  • 33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3) - deutsche Ubersetzung.mp4 77.8 MB
  • 34C3 - 2017/34C3 - Es sind die kleinen Dinge im Leben II.mp4 77.7 MB
  • 34C3 - 2017/34C3 - Digitale Bildung in der Schule.mp4 77.7 MB
  • 30C3 - 2013/video/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4 77.7 MB
  • 33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3).mp4 77.6 MB
  • 33C3 - 2016/Surveilling the surveillers (33c3) - traduction française.mp4 77.5 MB
  • 33C3 - 2016/Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3).mp4 77.5 MB
  • 33C3 - 2016/Surveilling the surveillers (33c3) - deutsche Ubersetzung.mp4 77.4 MB
  • 23C3 - 2006/video/23C3-1610-en-fudging_with_firmware.mp4 76.8 MB
  • 33C3 - 2016/Surveilling the surveillers (33c3).mp4 76.7 MB
  • 32C3 - 2015/video/32c3-7441-en-de-The_plain_simple_reality_of_entropy_hd.mp4 76.7 MB
  • 29C3 - 2012/video/29c3-5044-en-time_is_not_on_your_side_h264.mp4 76.4 MB
  • 20C3 - 2003/video/20C3-630-The_Quintessenz_biometrics_doqubase1.mp4 76.3 MB
  • 34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse.mp4 76.2 MB
  • 34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse - deutsche Ubersetzung.mp4 76.2 MB
  • 21C3 - 2004/video/066 Bluetooth Hacking.mp4 76.1 MB
  • 34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU - traduction francaise.mp4 76.1 MB
  • 34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU - deutsche Ubersetzung.mp4 76.0 MB
  • 34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect - deutsche Ubersetzung.mp4 75.7 MB
  • 34C3 - 2017/34C3 - BBSs and early Internet access in the 1990ies.mp4 75.6 MB
  • 33C3 - 2016/Datenschutzgrundverordnung Rechte fUr Menschen, Pflichten fUr Firmen & Chancen fUr uns (33c3).mp4 75.6 MB
  • 34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect - traduction francaise.mp4 75.6 MB
  • 34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia - deutsche Ubersetzung.mp4 75.6 MB
  • 23C3 - 2006/audio/23C3-1566-en-openpcd_openpicc.mp3 75.4 MB
  • 33C3 - 2016/Privatisierung der Rechtsdurchsetzung (33c3) - english translation.mp4 75.4 MB
  • 23C3 - 2006/audio/23C3-1381-en-stealth_malware.mp3 75.3 MB
  • 32C3 - 2015/video/32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World_hd.mp4 75.3 MB
  • 34C3 - 2017/34C3 - avatar.mp4 75.2 MB
  • 23C3 - 2006/video/23C3-1492-en-dying_giraffe_recordings.mp4 75.1 MB
  • 34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia.mp4 75.1 MB
  • 32C3 - 2015/video/32c3-7529-en-de-Mobile_Censorship_in_Iran_hd.mp4 75.1 MB
  • 33C3 - 2016/Berechnete Welt (33c3) - english translation.mp4 74.9 MB
  • 33C3 - 2016/Berechnete Welt (33c3).mp4 74.8 MB
  • 30C3 - 2013/audio/30c3-5608-de-en-Jahresrueckblick_des_CCC_opus.opus 74.8 MB
  • 20C3 - 2003/video/20C3-576-Free_WLANs_for_the_masses.mp4 74.8 MB
  • 31C3 - 2014/video/31c3-6370-en-Internet_of_toilets_hd.mp4 74.7 MB
  • 31C3 - 2014/video/31c3-6589-en-Mr_Beam_goes_Kickstarter_hd.mp4 74.6 MB
  • 33C3 - 2016/PUFs, protection, privacy, PRNGs (33c3).mp4 74.6 MB
  • 30C3 - 2013/video/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4 74.6 MB
  • 34C3 - 2017/34C3 - UPSat - the first open source satellite - deutsche Ubersetzung.mp4 74.6 MB
  • 21C3 - 2004/video/047 Datamining the NSA.mp4 74.5 MB
  • 30C3 - 2013/video/30c3-5453-en-Against_Metadata_h264-hq.mp4 74.4 MB
  • 29C3 - 2012/video/29c3-5138-en-romantichackers_h264.mp4 74.4 MB
  • 32C3 - 2015/video/32c3-7138-en-de-Gscheitern_hd.mp4 74.4 MB
  • 33C3 - 2016/PUFs, protection, privacy, PRNGs (33c3) - deutsche Ubersetzung.mp4 74.4 MB
  • 24C3 - 2007/video/24c3-2325-en-current_events_in_tor_development_high.mp4 74.3 MB
  • 30C3 - 2013/video/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4 74.2 MB
  • 30C3 - 2013/video/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hd.mp4 74.1 MB
  • 32C3 - 2015/video/32c3-7264-en-de-Profiling_In_justice_hd.mp4 74.0 MB
  • 24C3 - 2007/video/24c3-2380-de-nedap_wahlcomputer_in_deutschland_high.mp4 74.0 MB
  • 30C3 - 2013/video/30c3-5360-en-Script_Your_Car__h264-hq.mp4 73.9 MB
  • 32C3 - 2015/video/32c3-7245-en-de-Reversing_UEFI_by_execution_hd.mp4 73.9 MB
  • 31C3 - 2014/video/31c3-6557-en-de-31C3_Infrastructure_Review_sd.mp4 73.8 MB
  • 30C3 - 2013/video/30c3-5398-en-HbbTV_Security_h264-hq.mp4 73.6 MB
  • 20C3 - 2003/video/20C3-581-Chaos-Rueckblick-2003.mp4 73.6 MB
  • 30C3 - 2013/video/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4 73.6 MB
  • 31C3 - 2014/audio/31c3-6572-de-en-Security_Nightmares_opus.opus 73.5 MB
  • 33C3 - 2016/In Search of Evidence-Based IT-Security (33c3).mp4 73.2 MB
  • 33C3 - 2016/In Search of Evidence-Based IT-Security (33c3) - deutsche Ubersetzung.mp4 73.2 MB
  • 22C3 - 2005/video/22C3-920-en-we_lost_the_war.mp4 73.2 MB
  • 19C3 - 2002/video/19C3-453-die-fuenf-pforten-der-manipulation.mp4 73.1 MB
  • 33C3 - 2016/In Search of Evidence-Based IT-Security (33c3) - traduction française.mp4 72.9 MB
  • 30C3 - 2013/video/30c3-5223-en-WarGames_in_memory_h264-hq.mp4 72.8 MB
  • 23C3 - 2006/audio/23C3-1760-en-on_free.mp3 72.8 MB
  • 33C3 - 2016/Der 33 JahrerUckblick (33c3) - traduction française.mp4 72.5 MB
  • 23C3 - 2006/audio/23C3-1439-en-information_operations.mp3 72.5 MB
  • 30C3 - 2013/video/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4 72.4 MB
  • 24C3 - 2007/video/24c3-2192-de-elektronische_dokumente_high.mp4 72.3 MB
  • 24C3 - 2007/video/24c3-2290-en-overtaking_proprietary_software_high.mp4 72.2 MB
  • 33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3).mp4 72.0 MB
  • 33C3 - 2016/Downgrading iOS From past to present (33c3) - deutsche Ubersetzung.mp4 71.7 MB
  • 34C3 - 2017/34C3 - Internet censorship in the Catalan referendum - deutsche Ubersetzung.mp4 71.6 MB
  • 32C3 - 2015/video/32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_hd.mp4 71.6 MB
  • 34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect.mp4 71.4 MB
  • 33C3 - 2016/Understanding the Snooper’s Charter (33c3).mp4 71.4 MB
  • 34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU.mp4 71.4 MB
  • 34C3 - 2017/34C3 - Internet censorship in the Catalan referendum - La traduccion espanola.mp4 71.3 MB
  • 34C3 - 2017/34C3 - openPower - the current state of commercial openness in CPU development - deutsche Ubersetzu.mp4 71.3 MB
  • 30C3 - 2013/video/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4 71.3 MB
  • 29C3 - 2012/audio/29c3-5316-en-lightningtalks1_ogg.ogg 71.2 MB
  • 29C3 - 2012/video/29c3-5178-en-the_ultimate_galaksija_talk_h264.mp4 71.2 MB
  • 24C3 - 2007/video/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte_high.mp4 71.1 MB
  • 21C3 - 2004/video/019 Verdeckte Netzwerkanalyse.mp4 71.1 MB
  • 33C3 - 2016/Haft fUr Whistleblower (33c3).mp4 71.1 MB
  • 24C3 - 2007/video/24c3-2371-de-wahlstift_high.mp4 71.0 MB
  • 30C3 - 2013/video/30c3-5509-de-en-IFGINT_h264-hq.mp4 71.0 MB
  • 23C3 - 2006/audio/23C3-1605-de-digitale_bildforensik.mp3 70.9 MB
  • 23C3 - 2006/video/23C3-1593-de-krypta.mp4 70.8 MB
  • 32C3 - 2015/audio/32c3-7152-de-Hacker_Jeopardy.opus 70.6 MB
  • 24C3 - 2007/video/24c3-2332-en-no_ooxml_high.mp4 70.6 MB
  • 33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3) - La traducción española.mp4 70.6 MB
  • 28C3 - 2011/video/28c3-4652-en-data_mining_the_israeli_census_h264.mp4 70.3 MB
  • 33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3) - deutsche Ubersetzung.mp4 70.2 MB
  • 23C3 - 2006/video/23C3-1459-en-sip_security.mp4 70.2 MB
  • 24C3 - 2007/video/24c3-2292-en-wireless_kernel_tweaking_high.mp4 70.1 MB
  • 33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3).mp4 70.0 MB
  • 22C3 - 2005/video/22C3-545-en-web_of_trust.mp4 69.9 MB
  • 33C3 - 2016/Downgrading iOS From past to present (33c3).mp4 69.9 MB
  • 34C3 - 2017/34C3 - UPSat - the first open source satellite.mp4 69.7 MB
  • 24C3 - 2007/video/24c3-2225-en-paparazzi_high.mp4 69.5 MB
  • 22C3 - 2005/video/22C3-418-en-ajax_web_applications.mp4 69.5 MB
  • 24C3 - 2007/video/24c3-2271-en-distributed_campaigns_high.mp4 69.3 MB
  • 30C3 - 2013/video/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4 69.2 MB
  • 34C3 - 2017/34C3 - Blinkenrocket! - deutsche Ubersetzung.mp4 69.2 MB
  • 24C3 - 2007/video/24c3-2289-en-card_payment_high.mp4 69.2 MB
  • 24C3 - 2007/video/24c3-2393-en-dns_rebinding_packet_tricks_high.mp4 69.2 MB
  • 33C3 - 2016/International exchange of tax information (33c3) - deutsche Ubersetzung.mp4 69.2 MB
  • 34C3 - 2017/34C3 - Blinkenrocket!.mp4 69.0 MB
  • 24C3 - 2007/video/24c3-2331-en-spotter_guide_to_aacs_keys_high.mp4 68.9 MB
  • 34C3 - 2017/34C3 - Internet censorship in the Catalan referendum.mp4 68.9 MB
  • 23C3 - 2006/video/23C3-1603-en-foss_in_india.mp4 68.8 MB
  • 23C3 - 2006/audio/23C3-1682-de-security_nightmares.mp3 68.8 MB
  • 33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3) - deutsche Ubersetzung.mp4 68.8 MB
  • 31C3 - 2014/video/31c3-6071-en-Hacking_Ethics_in_Education_hd.mp4 68.8 MB
  • 32C3 - 2015/video/32c3-7238-en-de-Vector_retrogaming_hd.mp4 68.7 MB
  • 34C3 - 2017/34C3 - Taxation - traduction francaise.mp4 68.7 MB
  • 26C3 - 2009/audio/26c3-3645-en-lightning_talks_-_day_4.ogg 68.5 MB
  • 28C3 - 2011/audio/28c3-4907-en-lightning_talks_day_4.ogg 68.5 MB
  • 23C3 - 2006/video/23C3-1678-de-kritik_an_den_illuminaten.mp4 68.5 MB
  • 32C3 - 2015/video/32c3-7205-de-Netzpolitik_in_der_Schweiz_2015_16_hd.mp4 68.5 MB
  • 32C3 - 2015/video/32c3-7205-de-Netzpolitik_in_der_Schweiz_hd.mp4 68.5 MB
  • 23C3 - 2006/audio/23C3-1457-en-credit_card_security.mp3 68.5 MB
  • 34C3 - 2017/34C3 - openPower - the current state of commercial openness in CPU development.mp4 68.5 MB
  • 34C3 - 2017/34C3 - Taxation - deutsche Ubersetzung.mp4 68.5 MB
  • 34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS - deutsche Ubersetzung.mp4 68.3 MB
  • 23C3 - 2006/video/23C3-1606-en-console_hacking_2006.mp4 68.3 MB
  • 34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS - traduction francaise.mp4 68.2 MB
  • 33C3 - 2016/International exchange of tax information (33c3).mp4 68.1 MB
  • 34C3 - 2017/34C3 - The seizure of the Iuventa.mp4 68.0 MB
  • 21C3 - 2004/video/307 Gesundheitskarte.mp4 68.0 MB
  • 26C3 - 2009/audio/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.ogg 68.0 MB
  • 34C3 - 2017/34C3 - The seizure of the Iuventa - deutsche Ubersetzung.mp4 67.9 MB
  • 23C3 - 2006/audio/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp3 67.9 MB
  • 32C3 - 2015/video/32c3-7114-en-de-Craft_leisure_and_end-user_innovation_hd.mp4 67.7 MB
  • 24C3 - 2007/video/24c3-2345-de-gplv3_auswirkungen_high.mp4 67.7 MB
  • 34C3 - 2017/34C3 - BootStomp On the Security of Bootloaders in Mobile Devices - deutsche Ubersetzung.mp4 67.6 MB
  • 22C3 - 2005/video/22C3-520-de-geometrie_ohne_punkte.mp4 67.6 MB
  • 33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3) - deutsche Ubersetzung.mp4 67.6 MB
  • 24C3 - 2007/video/24c3-2329-en-change_me_high.mp4 67.5 MB
  • 34C3 - 2017/34C3 - Watching the changing Earth - traduction francaise.mp4 67.5 MB
  • 33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3).mp4 67.4 MB
  • 33C3 - 2016/SpinalHDL An alternative hardware description language (33c3) - deutsche Ubersetzung.mp4 67.4 MB
  • 33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3) - traduction française.mp4 67.4 MB
  • 32C3 - 2015/video/32c3-7530-en-de-Buffering_sucks_hd.mp4 67.3 MB
  • 24C3 - 2007/video/24c3-2233-en-vx_high.mp4 67.1 MB
  • 32C3 - 2015/video/32c3-7412-en-Running_your_own_3G_35G_network_hd.mp4 67.1 MB
  • 34C3 - 2017/34C3 - OONI Let's Fight Internet Censorship, Together!.mp4 67.1 MB
  • 23C3 - 2006/video/23C3-1515-en-lightning_talks_day_2.mp4 67.0 MB
  • 34C3 - 2017/34C3 - OONI Let's Fight Internet Censorship, Together! - deutsche Ubersetzung.mp4 66.9 MB
  • 33C3 - 2016/The Clash of Digitalizations (33c3) - deutsche Ubersetzung.mp4 66.9 MB
  • 24C3 - 2007/video/24c3-2293-en-what_can_we_do_to_counter_the_spies_high.mp4 66.9 MB
  • 33C3 - 2016/SpinalHDL An alternative hardware description language (33c3).mp4 66.8 MB
  • 34C3 - 2017/34C3 - Running GSM mobile phone on SDR - deutsche Ubersetzung.mp4 66.8 MB
  • 24C3 - 2007/video/24c3-2383-en-data_retention_high.mp4 66.7 MB
  • 24C3 - 2007/video/24c3-2342-en-it_was_a_bad_idea_anyway_high.mp4 66.7 MB
  • 21C3 - 2004/video/028 Biometrie ueberwinden.mp4 66.6 MB
  • 21C3 - 2004/video/052 Die Ueblichen Verdaechtigen.mp4 66.5 MB
  • 24C3 - 2007/video/24c3-2396-en-eu_rfid_policy_high.mp4 66.4 MB
  • 34C3 - 2017/34C3 - History and implications of DRM - deutsche Ubersetzung.mp4 66.4 MB
  • 24C3 - 2007/video/24c3-2279-en-deconstructing_xbox_360_security_high.mp4 66.4 MB
  • 34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS.mp4 66.3 MB
  • 24C3 - 2007/video/24c3-2387-en-open_source_lobbying_high.mp4 66.3 MB
  • 26C3 - 2009/audio/26c3-3644-en-lightning_talks_-_day_3.ogg 66.3 MB
  • 23C3 - 2006/audio/23C3-1423-en-we_dont_trust_voting_computers.mp3 66.2 MB
  • 34C3 - 2017/34C3 - History and implications of DRM.mp4 66.2 MB
  • 34C3 - 2017/34C3 - Science is broken - deutsche Ubersetzung.mp4 66.2 MB
  • 19C3 - 2002/audio/19C3-411-patent-party.mp3 66.2 MB
  • 34C3 - 2017/34C3 - Squeezing a key through a carry bit - deutsche Ubersetzung.mp4 66.1 MB
  • 24C3 - 2007/video/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4 66.0 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Scuttlebutt introduction.mp4 66.0 MB
  • 24C3 - 2007/video/24c3-2378-en-mifare_security_high.mp4 65.9 MB
  • 23C3 - 2006/audio/23C3-1516-en-lightning_talks_day_3.mp3 65.9 MB
  • 24C3 - 2007/video/24c3-2285-en-10ge_monitoring_live_high.mp4 65.8 MB
  • 23C3 - 2006/audio/23C3-1495-en-green_phone.mp3 65.7 MB
  • 23C3 - 2006/audio/23C3-1721-en-software_protection_and_the_tpm.mp3 65.7 MB
  • 32C3 - 2015/video/32c3-7265-en-de-Maritime_Robotics_hd.mp4 65.7 MB
  • 31C3 - 2014/audio/31c3-6543-de-en-The_Time_is_Right_opus.opus 65.7 MB
  • 33C3 - 2016/Dieselgate - A year later (33c3).mp4 65.6 MB
  • 23C3 - 2006/video/23C3-1646-en-dvb_t.mp4 65.6 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - P2P with JavaScript to defend against bad lawmaking.mp4 65.5 MB
  • 23C3 - 2006/audio/23C3-1609-en-data_retention_update.mp3 65.5 MB
  • 23C3 - 2006/audio/23C3-1592-en-inside_vmware.mp3 65.4 MB
  • 34C3 - 2017/34C3 - Visceral Systems - deutsche Ubersetzung.mp4 65.4 MB
  • 24C3 - 2007/video/24c3-2346-de-meine_finger_gehoeren_mir_high.mp4 65.3 MB
  • 22C3 - 2005/video/22C3-516-de-was_ist_technisches_wissen.mp4 65.3 MB
  • 24C3 - 2007/video/24c3-2155-en-universe_on_supercomputers_high.mp4 65.2 MB
  • 27C3 - 2010/audio/27c3-4141-de-hacker_jeopardy.ogg 65.2 MB
  • 34C3 - 2017/34C3 - Closing the loop Reconnecting social-technologial dynamics to Earth System science.mp4 65.2 MB
  • 22C3 - 2005/video/22C3-913-en-lightning_talk_day_3.mp4 65.2 MB
  • 20C3 - 2003/video/20C3-593-Weird_programming.mp4 65.2 MB
  • 24C3 - 2007/video/24c3-2245-en-how_to_reach_digital_sustainability_high.mp4 65.2 MB
  • 34C3 - 2017/34C3 - Taxation.mp4 65.2 MB
  • 23C3 - 2006/audio/23C3-1679-de-ueberwachungsdruck.mp3 65.1 MB
  • 22C3 - 2005/video/22C3-600-de-security_nightmares.mp4 65.1 MB
  • 34C3 - 2017/34C3 - Visceral Systems.mp4 65.1 MB
  • 27C3 - 2010/audio/27c3-4333-en-hacker_jeopardy_translation.ogg 65.1 MB
  • 21C3 - 2004/video/171 Siegerehrung Lockpicking.mp4 65.1 MB
  • 33C3 - 2016/Intercoms Hacking (33c3).mp4 65.0 MB
  • 34C3 - 2017/34C3 - Closing the loop Reconnecting social-technologial dynamics to Earth System science - deutsc.mp4 65.0 MB
  • 29C3 - 2012/video/29c3-5077-en-ethics_in_security_research_h264.mp4 65.0 MB
  • 33C3 - 2016/Dieselgate - A year later (33c3) - deutsche Ubersetzung.mp4 65.0 MB
  • 24C3 - 2007/video/24c3-2284-en-linguistic_hacking_high.mp4 64.9 MB
  • 22C3 - 2005/video/22C3-519-en-the_cell_processor.mp4 64.9 MB
  • 23C3 - 2006/video/23C3-1655-de-elektronische_reisedokumente.mp4 64.8 MB
  • 19C3 - 2002/video/19C3-426-ec-karten-unsicherheit.mp4 64.8 MB
  • 23C3 - 2006/video/23C3-1699-en-drm_comes_to_european_digital_tv.mp4 64.7 MB
  • 34C3 - 2017/34C3 - Watching the changing Earth - deutsche Ubersetzung.mp4 64.7 MB
  • 24C3 - 2007/video/24c3-2158-en-the_arctic_cold_war_high.mp4 64.5 MB
  • 24C3 - 2007/video/24c3-2333-de-spiel_freude_eierkuchen_high.mp4 64.5 MB
  • 34C3 - 2017/34C3 - Watching the changing Earth.mp4 64.5 MB
  • 22C3 - 2005/video/22C3-492-en-freenet_new_version.mp4 64.5 MB
  • 22C3 - 2005/video/22C3-591-en-european_it_lobbying.mp4 64.5 MB
  • 24C3 - 2007/video/24c3-2354-en-latest_trends_in_oracle_security_high.mp4 64.4 MB
  • 34C3 - 2017/34C3 - Running GSM mobile phone on SDR.mp4 64.3 MB
  • 26C3 - 2009/audio/26c3-3642-en-lightning_talks_-_day_2.ogg 64.3 MB
  • 20C3 - 2003/video/20C3-624-Neue_Notrufnummern_fuer_die_Informationsgesellschaft.mp4 64.3 MB
  • 24C3 - 2007/video/24c3-2389-en-hacking_icann_high.mp4 64.3 MB
  • 24C3 - 2007/video/24c3-2270-en-sputnik_data_analysis_high.mp4 64.2 MB
  • 24C3 - 2007/video/24c3-2227-en-hacking_scada_high.mp4 64.0 MB
  • 24C3 - 2007/video/24c3-2347-en-c64_dtv_hacking_high.mp4 64.0 MB
  • 30C3 - 2013/video/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4 64.0 MB
  • 32C3 - 2015/video/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4 63.9 MB
  • 34C3 - 2017/34C3 - BootStomp On the Security of Bootloaders in Mobile Devices.mp4 63.9 MB
  • 33C3 - 2016/Intercoms Hacking (33c3) - deutsche Ubersetzung.mp4 63.8 MB
  • 19C3 - 2002/video/19C3-432-sicherheit-zeitliche-dimension.mp4 63.8 MB
  • 21C3 - 2004/video/090 Hacktivity.mp4 63.7 MB
  • 24C3 - 2007/video/24c3-2255-de-wahlchaos_high.mp4 63.7 MB
  • 23C3 - 2006/audio/23C3-1257-en-podjournalism.mp3 63.6 MB
  • 22C3 - 2005/video/22C3-427-de-wargames_hacker_spielen.mp4 63.6 MB
  • 30C3 - 2013/audio/30c3-5562-en-de-Lightning_Talks_Day_2_opus.opus 63.6 MB
  • 34C3 - 2017/34C3 - Squeezing a key through a carry bit.mp4 63.5 MB
  • 31C3 - 2014/video/31c3-6608-en-Premiere_We_love_surveillance_hd.mp4 63.5 MB
  • 32C3 - 2015/video/32c3-7310-en-de-QRtistry_hd.mp4 63.5 MB
  • 23C3 - 2006/audio/23C3-1456-en-unusual_bugs.mp3 63.4 MB
  • 24C3 - 2007/video/24c3-2286-en-openstreetmap_high.mp4 63.4 MB
  • 34C3 - 2017/34C3 - BGP and the Rule of Custom.mp4 63.4 MB
  • 34C3 - 2017/34C3 - BGP and the Rule of Custom - deutsche Ubersetzung.mp4 63.3 MB
  • 32C3 - 2015/video/32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_hd.mp4 63.3 MB
  • 34C3 - 2017/34C3 - Science is broken.mp4 63.2 MB
  • 34C3 - 2017/34C3 - Gamified Control - deutsche Ubersetzung.mp4 63.1 MB
  • 22C3 - 2005/video/22C3-1139-en-complete_harddisk_encryption_with_freebsd.mp4 63.1 MB
  • 21C3 - 2004/audio/074 Hacker-Jeopardy.mp3 63.1 MB
  • 22C3 - 2005/video/22C3-1147-en-the_realtime_podcast.mp4 63.1 MB
  • 34C3 - 2017/34C3 - Simulating the future of the global agro-food system - deutsche Ubersetzung.mp4 62.9 MB
  • 23C3 - 2006/video/23C3-1543-de-kollaboratives_wissenmanagement.mp4 62.9 MB
  • 34C3 - 2017/34C3 - Gamified Control.mp4 62.8 MB
  • 32C3 - 2015/video/32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_hd.mp4 62.8 MB
  • 24C3 - 2007/video/24c3-2311-en-hacking_ideologies_2_high.mp4 62.8 MB
  • 23C3 - 2006/video/23C3-1592-en-inside_vmware.mp4 62.7 MB
  • 23C3 - 2006/video/23C3-1670-de-barrierefreies_web.mp4 62.6 MB
  • 24C3 - 2007/video/24c3-2248-de-desperate_house_hackers_high.mp4 62.6 MB
  • 26C3 - 2009/audio/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.ogg 62.6 MB
  • 34C3 - 2017/34C3 - Simulating the future of the global agro-food system - La traduccion espanola.mp4 62.6 MB
  • 23C3 - 2006/audio/23C3-1629-en-body_hacking.mp3 62.5 MB
  • 19C3 - 2002/video/19C3-434-security-nightmares.mp4 62.4 MB
  • 22C3 - 2005/video/22C3-550-de-epass_und_biop2.mp4 62.4 MB
  • 24C3 - 2007/audio/24c3-2402-en-lightning_talks_2007_day_4.mp3 62.4 MB
  • 28C3 - 2011/audio/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.ogg 62.4 MB
  • 28C3 - 2011/audio/28c3-4906-en-lightning_talks_day_3_pecha_kucha.ogg 62.3 MB
  • 23C3 - 2006/audio/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3 62.2 MB
  • 34C3 - 2017/34C3 - ASLR on the line - deutsche Ubersetzung.mp4 62.2 MB
  • 24C3 - 2007/video/24c3-2213-de-getting_things_done_high.mp4 62.2 MB
  • 30C3 - 2013/video/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4 62.1 MB
  • 26C3 - 2009/audio/26c3-3668-en-hacker_jeopardy.ogg 62.0 MB
  • 22C3 - 2005/video/22C3-572-en-fuzzy_democracy.mp4 62.0 MB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Three Ways to Enhance Metadata Protection Beyond Tor - secushare.org.mp4 61.9 MB
  • 21C3 - 2004/video/168 Spampolitik.mp4 61.9 MB
  • 32C3 - 2015/video/32c3-7286-en-de-Sin_in_the_time_of_Technology_hd.mp4 61.9 MB
  • 23C3 - 2006/audio/23C3-1604-de-tracking_von_personen_in_videoszenen.mp3 61.8 MB
  • 23C3 - 2006/video/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp4 61.8 MB
  • 30C3 - 2013/video/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4 61.8 MB
  • 23C3 - 2006/video/23C3-1667-de-jabber_showcase.mp4 61.8 MB
  • 34C3 - 2017/34C3 - Algorithmic science evaluation and power structure the discourse on strategic citation and.mp4 61.8 MB
  • 19C3 - 2002/video/19C3-402-network-hijacking-workshop.mp4 61.7 MB
  • 34C3 - 2017/34C3 - Algorithmic science evaluation and power structure the discourse on strategic citation and (2).mp4 61.7 MB
  • 23C3 - 2006/audio/23C3-1256-en-who_can_you_trust.mp3 61.7 MB
  • 34C3 - 2017/34C3 - Humans as software extensions - deutsche Ubersetzung.mp4 61.7 MB
  • 23C3 - 2006/video/23C3-1700-en-router_and_infrastructure_hacking.mp4 61.7 MB
  • 23C3 - 2006/video/23C3-1540-de-learn_to_be_honest.mp4 61.6 MB
  • 34C3 - 2017/34C3 - Humans as software extensions - La traduccion espanola.mp4 61.5 MB
  • 26C3 - 2009/audio/26c3-3669-de-hacker_jeopardy.ogg 61.5 MB
  • 30C3 - 2013/video/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4 61.4 MB
  • 23C3 - 2006/video/23C3-1505-de-gaeste_ueberwachung.mp4 61.3 MB
  • 21C3 - 2004/video/046 Tollcollect.mp4 61.2 MB
  • 33C3 - 2016/Geolocation methods in mobile networks (33c3).mp4 61.0 MB
  • 21C3 - 2004/video/308 MD5 To Be Considered Harmful Someday.mp4 60.9 MB
  • 34C3 - 2017/34C3 - Growing Up Software Development - deutsche Ubersetzung.mp4 60.8 MB
  • 23C3 - 2006/audio/23C3-1493-de-virtuelle_sicherheit.mp3 60.8 MB
  • 23C3 - 2006/audio/23C3-1593-de-krypta.mp3 60.8 MB
  • 34C3 - 2017/34C3 - Growing Up Software Development.mp4 60.7 MB
  • 22C3 - 2005/video/22C3-1108-en-black_ops_of_tcp_ip.mp4 60.6 MB
  • 22C3 - 2005/video/22C3-586-en-pypy.mp4 60.6 MB
  • 21C3 - 2004/video/062 Hacking EU funding for a FOSS project.mp4 60.5 MB
  • 23C3 - 2006/audio/23C3-1663-de-tracking_goods_and_tracing_people.mp3 60.4 MB
  • 23C3 - 2006/audio/23C3-1724-en-transparency_and_privacy.mp3 60.3 MB
  • 23C3 - 2006/video/23C3-1709-en-revenge_of_the_female_nerds.mp4 60.3 MB
  • 23C3 - 2006/audio/23C3-1520-en-counter_development.mp3 60.3 MB
  • 34C3 - 2017/34C3 - Modern key distribution with ClaimChain.mp4 60.2 MB
  • 34C3 - 2017/34C3 - Modern key distribution with ClaimChain - deutsche Ubersetzung.mp4 60.2 MB
  • 21C3 - 2004/video/164 Barrierefreies Internet.mp4 60.2 MB
  • 23C3 - 2006/audio/23C3-1688-en-rootkits_as_reversing_tools.mp3 60.2 MB
  • 34C3 - 2017/34C3 - Modern key distribution with ClaimChain - traduction francaise.mp4 60.2 MB
  • 34C3 - 2017/34C3 - Die fabelhafte Welt des Mobilebankings - english translation - YouTube.mp4 60.1 MB
  • 23C3 - 2006/video/23C3-1701-en-open_source_machine_translation.mp4 60.0 MB
  • 24C3 - 2007/video/24c3-2253-en-dining_cryptographers_high.mp4 60.0 MB
  • 22C3 - 2005/video/22C3-464-en-working_memory_mental_imagery.mp4 60.0 MB
  • 32C3 - 2015/video/32c3-7551-en-de-Closing_Event_hd.mp4 60.0 MB
  • 33C3 - 2016/Geolocation methods in mobile networks (33c3) - deutsche Ubersetzung.mp4 60.0 MB
  • 33C3 - 2016/Anthropology for kids - What is privacy (33c3) - deutsche Ubersetzung.mp4 60.0 MB
  • 33C3 - 2016/Anthropology for kids - What is privacy (33c3).mp4 59.9 MB
  • 23C3 - 2006/audio/23C3-1608-en-vehicular_communication_and_vanets.mp3 59.9 MB
  • 23C3 - 2006/audio/23C3-1513-en-detecting_temperature_through_clock_skew.mp3 59.8 MB
  • 34C3 - 2017/34C3 - Humans as software extensions.mp4 59.7 MB
  • 23C3 - 2006/audio/23C3-1568-en-json_rpc.mp3 59.7 MB
  • 23C3 - 2006/audio/23C3-1459-en-sip_security.mp3 59.6 MB
  • 34C3 - 2017/34C3 - ASLR on the line.mp4 59.6 MB
  • 21C3 - 2004/video/044 Machine Learning in Science and Engineering.mp4 59.5 MB
  • 21C3 - 2004/video/310 Information-Wissen-Macht.mp4 59.5 MB
  • 23C3 - 2006/audio/23C3-1733-en-bluetooth_hacking_revisited.mp3 59.5 MB
  • 23C3 - 2006/audio/23C3-1454-en-natural_language_database_interface.mp3 59.5 MB
  • 19C3 - 2002/video/19C3-409-call-center.mp4 59.4 MB
  • 34C3 - 2017/34C3 - Simulating the future of the global agro-food system.mp4 59.4 MB
  • 22C3 - 2005/video/22C3-417-en-learning_js_with_google_maps.mp4 59.4 MB
  • 22C3 - 2005/video/22C3-882-de-biometrics_in_science_fiction.mp4 59.4 MB
  • 22C3 - 2005/video/22C3-801-en-vulnerability_markets.mp4 59.4 MB
  • 23C3 - 2006/audio/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp3 59.4 MB
  • 30C3 - 2013/video/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4 59.4 MB
  • 23C3 - 2006/video/23C3-1740-en-in_the_absence_of_trust.mp4 59.3 MB
  • 31C3 - 2014/video/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_sd.mp4 59.3 MB
  • 19C3 - 2002/video/19C3-479-eu-urheberrechtslinie.mp4 59.2 MB
  • 27C3 - 2010/audio/27c3-4300-en-lightning_talks_d4.ogg 59.2 MB
  • 22C3 - 2005/video/22C3-1134-en-the_silent_decline_of_public_control.mp4 59.2 MB
  • 20C3 - 2003/video/20C3-546-1024_bit_RSA_ist_unsicher.mp4 59.1 MB
  • 22C3 - 2005/video/22C3-1101-en-the_grey_commons.mp4 59.1 MB
  • 19C3 - 2002/video/19C3-483-bsi-zertifizierung.mp4 59.1 MB
  • 23C3 - 2006/audio/23C3-1373-en-hacker_foundation.mp3 59.0 MB
  • 34C3 - 2017/34C3 - Taking a scalpel to QNX - deutsche Ubersetzung.mp4 59.0 MB
  • 24C3 - 2007/video/24c3-2189-en-hidden_trojan_high.mp4 59.0 MB
  • 34C3 - 2017/34C3 - Taking a scalpel to QNX.mp4 59.0 MB
  • 22C3 - 2005/video/22C3-569-en-lojban.mp4 59.0 MB
  • 23C3 - 2006/video/23C3-1640-en-10ge_monitoring_system.mp4 58.9 MB
  • 23C3 - 2006/audio/23C3-1429-de-fnord_jahresrueckblick.mp3 58.8 MB
  • 24C3 - 2007/video/24c3-2364-en-smartcard_protocol_sniffing_high.mp4 58.8 MB
  • 22C3 - 2005/video/22C3-1112-en-modern_disk_encryption.mp4 58.8 MB
  • 33C3 - 2016/Exploiting PHP7 unserialize (33c3) - deutsche Ubersetzung.mp4 58.7 MB
  • 24C3 - 2007/video/24c3-2228-de-lieber_cyborg_als_goettin_high.mp4 58.7 MB
  • 23C3 - 2006/audio/23C3-1603-en-foss_in_india.mp3 58.7 MB
  • 20C3 - 2003/video/20C3-574-Fragen_an_eine_maschinenlesbare_Regierung.mp4 58.7 MB
  • 23C3 - 2006/video/23C3-1523-en-the_rise_and_fall_of_open_source.mp4 58.7 MB
  • 22C3 - 2005/video/22C3-407-en-evocell.mp4 58.6 MB
  • 23C3 - 2006/audio/23C3-1656-en-dylan_network_security.mp3 58.6 MB
  • 34C3 - 2017/34C3 - “Nabovarme” opensource heating infrastructure in Christiania - deutsche Ubersetzung.mp4 58.6 MB
  • 34C3 - 2017/34C3 - Taking a scalpel to QNX - traduction francaise.mp4 58.6 MB
  • 22C3 - 2005/video/22C3-577-de-voip_2005_regulierte_revolution.mp4 58.6 MB
  • 32C3 - 2015/video/32c3-7401-en-de-Internet_Cube_hd.mp4 58.5 MB
  • 20C3 - 2003/video/20C3-623-Softwarekunstprojekt_runme.org.mp4 58.5 MB
  • 22C3 - 2005/video/22C3-888-de-digitale_buergerrechte_in_europa.mp4 58.5 MB
  • 24C3 - 2007/video/24c3-2294-de-23_ways_to_fight_for_your_rights_high.mp4 58.4 MB
  • 34C3 - 2017/34C3 - “Nabovarme” opensource heating infrastructure in Christiania.mp4 58.4 MB
  • 23C3 - 2006/video/23C3-1563-en-funkerspuk.mp4 58.4 MB
  • 23C3 - 2006/audio/23C3-1560-en-csrf.mp3 58.4 MB
  • 34C3 - 2017/34C3 - May contain DTraces of FreeBSD - traduction francaise.mp4 58.4 MB
  • 22C3 - 2005/video/22C3-931-en-changing_realities.mp4 58.4 MB
  • 24C3 - 2007/video/24c3-2280-en-i_know_who_you_clicked_last_summer_high.mp4 58.4 MB
  • 34C3 - 2017/34C3 - May contain DTraces of FreeBSD - deutsche Ubersetzung.mp4 58.3 MB
  • 23C3 - 2006/video/23C3-1493-de-virtuelle_sicherheit.mp4 58.3 MB
  • 19C3 - 2002/video/19C3-488-symbolics-lisp-machines.mp4 58.2 MB
  • 23C3 - 2006/audio/23C3-1708-en-tv_b_gone.mp3 58.2 MB
  • 23C3 - 2006/audio/23C3-1543-de-kollaboratives_wissenmanagement.mp3 58.2 MB
  • 21C3 - 2004/video/246 RFID Technologie und Implikationen.mp4 58.2 MB
  • 22C3 - 2005/video/22C3-585-en-agile_business_and_eu_funding.mp4 58.1 MB
  • 22C3 - 2005/video/22C3-495-de-hash_trust_compute.mp4 58.1 MB
  • 17C3 - 2000/audio/AES.mp3 58.1 MB
  • 22C3 - 2005/video/22C3-1148-de-sicherheitueberwachung.mp4 58.1 MB
  • 22C3 - 2005/video/22C3-800-en-better_code.mp4 58.0 MB
  • 22C3 - 2005/video/22C3-562-en-the_right_track.mp4 58.0 MB
  • 24C3 - 2007/video/24c3-2322-en-infectious_diseases_high.mp4 58.0 MB
  • 22C3 - 2005/video/22C3-390-en-private_investigations.mp4 57.9 MB
  • 19C3 - 2002/video/19C3-433-tcp-ip-fuer-anfaenger.mp4 57.9 MB
  • 22C3 - 2005/video/22C3-772-en-attacking_ipv6.mp4 57.8 MB
  • 23C3 - 2006/audio/23C3-1494-de-ego_striptease.mp3 57.8 MB
  • 22C3 - 2005/video/22C3-602-en-protocols_services_embedded_devices.mp4 57.8 MB
  • 23C3 - 2006/video/23C3-1727-en-closing_ceremony.mp4 57.8 MB
  • 32C3 - 2015/video/32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_hd.mp4 57.7 MB
  • 26C3 - 2009/audio/26c3-3563-en-lightning_talks_-_day_1.ogg 57.7 MB
  • 23C3 - 2006/audio/23C3-1578-de-hacking_fingerprint_recognition_systems.mp3 57.7 MB
  • 28C3 - 2011/audio/28c3-4908-de-jahresrueckblick_2011.ogg 57.7 MB
  • 22C3 - 2005/video/22C3-571-en-understanding_buffer_overflow_exploitation.mp4 57.6 MB
  • 33C3 - 2016/Exploiting PHP7 unserialize (33c3).mp4 57.6 MB
  • 20C3 - 2003/video/20C3-562-Der_Zettel_am_Bildschirm.mp4 57.5 MB
  • 22C3 - 2005/video/22C3-405-en-cybercrime_convention.mp4 57.5 MB
  • 23C3 - 2006/audio/23C3-1478-en-traffic_analysis.mp3 57.5 MB
  • 24C3 - 2007/video/24c3-2358-en-guerilla_knitting_high.mp4 57.5 MB
  • 23C3 - 2006/audio/23C3-1347-en-we_are_great_together.mp3 57.5 MB
  • 26C3 - 2009/audio/26c3-3550-de-chaos-familien-duell.ogg 57.5 MB
  • 32C3 - 2015/audio/32c3-7240-en-Console_Hacking.opus 57.5 MB
  • 23C3 - 2006/audio/23C3-1735-en-faster_pwning_assured.mp3 57.5 MB
  • 22C3 - 2005/video/22C3-530-en-seccode.mp4 57.3 MB
  • 23C3 - 2006/audio/23C3-1473-en-large_scale_internet_content_filtering.mp3 57.2 MB
  • 30C3 - 2013/video/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4 57.2 MB
  • 24C3 - 2007/video/24c3-2321-en-d_libd_and_the_slate_project_high.mp4 57.1 MB
  • 34C3 - 2017/34C3 - Die fabelhafte Welt des Mobilebankings.mp4 57.1 MB
  • 28C3 - 2011/audio/28c3-4934-en-hacker_jeopardy_translation.ogg 57.0 MB
  • 34C3 - 2017/34C3 - Drones of Power Airborne Wind Energy - deutsche Ubersetzung.mp4 56.9 MB
  • 33C3 - 2016/The 12 Networking Truths (33c3).mp4 56.8 MB
  • 23C3 - 2006/audio/23C3-1487-de-ccc_jahresrueckblick.mp3 56.8 MB
  • 22C3 - 2005/video/22C3-1104-en-search_oracle_society.mp4 56.8 MB
  • 30C3 - 2013/video/30c3-5420-de-en-calcpw_h264-hq.mp4 56.8 MB
  • 22C3 - 2005/video/22C3-1132-de-sony_rootkit.mp4 56.8 MB
  • 22C3 - 2005/video/22C3-470-en-wsis_review.mp4 56.7 MB
  • 32C3 - 2015/video/32c3-7219-en-de-Trust_us_and_our_business_will_expand_hd.mp4 56.7 MB
  • 30C3 - 2013/video/30c3-5614-en-Perfect_Paul_h264-hq.mp4 56.6 MB
  • 24C3 - 2007/video/24c3-2288-de-verschwoerungstheorien_high.mp4 56.5 MB
  • 22C3 - 2005/video/22C3-423-en-corp_vs_corp.mp4 56.5 MB
  • 19C3 - 2002/video/19C3-401-network-hijacking.mp4 56.5 MB
  • 28C3 - 2011/audio/28c3-4775-de-hacker_jeopardy.ogg 56.5 MB
  • 23C3 - 2006/audio/23C3-1515-en-lightning_talks_day_2.mp3 56.4 MB
  • 32C3 - 2015/audio/32c3-7307-en-State_of_the_Onion.opus 56.3 MB
  • 23C3 - 2006/video/23C3-1568-en-json_rpc.mp4 56.3 MB
  • 20C3 - 2003/video/20C3-545-Abschlussveranstaltung_Lockpicking.mp4 56.2 MB
  • 22C3 - 2005/video/22C3-504-en-data_retention.mp4 56.2 MB
  • 24C3 - 2007/video/24c3-2258-en-design_noir_high.mp4 56.2 MB
  • 32C3 - 2015/audio/32c3-7546-de-Security_Nightmares_0x10.opus 56.2 MB
  • 23C3 - 2006/audio/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp3 56.1 MB
  • 23C3 - 2006/audio/23C3-1738-en-mmorpgs.mp3 56.1 MB
  • 19C3 - 2002/video/19C3-400-ipv6-rapid-deployment.mp4 56.0 MB
  • 22C3 - 2005/video/22C3-598-de-literarisches_code_quartett.mp4 55.9 MB
  • 24C3 - 2007/video/24c3-2260-en-to_be_or_i2p_high.mp4 55.8 MB
  • 24C3 - 2007/video/24c3-2287-de-sex20_high.mp4 55.8 MB
  • 19C3 - 2002/video/19C3-442-lawful-interception-europe.mp4 55.8 MB
  • 22C3 - 2005/video/22C3-605-de-hacking_cctv.mp4 55.8 MB
  • 34C3 - 2017/34C3 - Organisational Structures for Sustainable Free Software Development.mp4 55.7 MB
  • 34C3 - 2017/34C3 - Organisational Structures for Sustainable Free Software Development - deutsche Ubersetzung.mp4 55.6 MB
  • 19C3 - 2002/video/19C3-430-icann-status-quo.mp4 55.5 MB
  • 22C3 - 2005/video/22C3-1085-en-technological_art.mp4 55.5 MB
  • 23C3 - 2006/video/23C3-1373-en-hacker_foundation.mp4 55.5 MB
  • 22C3 - 2005/video/22C3-788-en-the_future_of_virtualization.mp4 55.5 MB
  • 34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas - traduction francaise.mp4 55.5 MB
  • 32C3 - 2015/video/32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_hd.mp4 55.4 MB
  • 23C3 - 2006/audio/23C3-1728-en-23c3_network_review.mp3 55.4 MB
  • 22C3 - 2005/video/22C3-429-en-w3c_web.mp4 55.4 MB
  • 23C3 - 2006/audio/23C3-1685-de-go_menschen.mp3 55.4 MB
  • 23C3 - 2006/audio/23C3-1646-en-dvb_t.mp3 55.3 MB
  • 23C3 - 2006/audio/23C3-1514-en-lightning_talks_day_1.mp3 55.3 MB
  • 34C3 - 2017/34C3 - DPRK Consumer Technology - deutsche Ubersetzung.mp4 55.3 MB
  • 30C3 - 2013/video/30c3-5547-en-Turing_Complete_User_h264-hq.mp4 55.2 MB
  • 20C3 - 2003/video/20C3-603-Spam_Analyse.mp4 55.2 MB
  • 22C3 - 2005/video/22C3-785-de-anon_tor_jap.mp4 55.1 MB
  • 34C3 - 2017/34C3 - International Image Interoperability Framework (IIIF) - Kulturinstitutionen schaffen interop.mp4 55.1 MB
  • 34C3 - 2017/34C3 - DPRK Consumer Technology - traduction francaise.mp4 55.1 MB
  • 22C3 - 2005/video/22C3-781-en-bad_trips.mp4 55.0 MB
  • 20C3 - 2003/audio/20c3_611_Hacker-Jeopardy.ogg 55.0 MB
  • 34C3 - 2017/34C3 - International Image Interoperability Framework (IIIF) - Kulturinstitutionen schaffen interop (2).mp4 55.0 MB
  • 23C3 - 2006/video/23C3-1644-en-sflow.mp4 55.0 MB
  • 22C3 - 2005/video/22C3-933-en-w3c_mobil_css_multimodal.mp4 55.0 MB
  • 34C3 - 2017/34C3 - May contain DTraces of FreeBSD.mp4 55.0 MB
  • 34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig - traduction francaise.mp4 54.9 MB
  • 23C3 - 2006/audio/23C3-1433-en-design_a_decent_user_interface.mp3 54.9 MB
  • 32C3 - 2015/video/32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_hd.mp4 54.8 MB
  • 19C3 - 2002/video/19C3-506-detecting-ddos-attacks.mp4 54.8 MB
  • 22C3 - 2005/video/22C3-1098-en-internet_voting_in_estonia.mp4 54.8 MB
  • 19C3 - 2002/video/19C3-448-zero-tool-hacking.mp4 54.8 MB
  • 23C3 - 2006/video/23C3-1735-en-faster_pwning_assured.mp4 54.7 MB
  • 33C3 - 2016/A Data Point Walks Into a Bar (33c3).mp4 54.6 MB
  • 22C3 - 2005/video/22C3-505-en-collateral_damage.mp4 54.6 MB
  • 34C3 - 2017/34C3 - Drones of Power Airborne Wind Energy.mp4 54.6 MB
  • 31C3 - 2014/video/31c3-6202-en-de-Privacy_and_Consumer_Markets_sd.mp4 54.6 MB
  • 23C3 - 2006/video/23C3-1422-en-pornography_and_technology.mp4 54.5 MB
  • 24C3 - 2007/video/24c3-2360-en-all_tomorrows_high.mp4 54.4 MB
  • 23C3 - 2006/video/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp4 54.4 MB
  • 24C3 - 2007/video/24c3-2235-en-one_token_to_rule_them_all_high.mp4 54.4 MB
  • 23C3 - 2006/audio/23C3-1627-en-software_reliability.mp3 54.3 MB
  • 30C3 - 2013/audio/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__opus.opus 54.3 MB
  • 33C3 - 2016/The Nibbletronic (33c3).mp4 54.2 MB
  • 22C3 - 2005/video/22C3-336-en-nanotechnology.mp4 54.2 MB
  • 34C3 - 2017/34C3 - hacking disaster.mp4 54.1 MB
  • 21C3 - 2004/video/130 Physical Security Pt 2.mp4 54.1 MB
  • 33C3 - 2016/Interplanetary Colonization (33c3).mp4 54.1 MB
  • 23C3 - 2006/audio/23C3-1655-de-elektronische_reisedokumente.mp3 54.1 MB
  • 33C3 - 2016/Memory Deduplication The Curse that Keeps on Giving (33c3).mp4 54.1 MB
  • 22C3 - 2005/video/22C3-479-en-fair_code.mp4 54.1 MB
  • 20C3 - 2003/video/20C3-577-Secure_Internet_live_conferencing_with_SILC.mp4 54.1 MB
  • 22C3 - 2005/video/22C3-588-en-robots_for_fun_and_research.mp4 54.0 MB
  • 22C3 - 2005/video/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.mp4 54.0 MB
  • 22C3 - 2005/video/22C3-782-de-urheberrecht.mp4 54.0 MB
  • 28C3 - 2011/audio/28c3-4905-en-lightning_talks_day_2.ogg 53.9 MB
  • 19C3 - 2002/video/19C3-480-one-time-crypto.mp4 53.8 MB
  • 28C3 - 2011/video/28c3-4910-de-demokratie_auf_saechsisch_h264.mp4 53.8 MB
  • 32C3 - 2015/audio/32c3-7225-de-Grundrechte_gelten_nicht_im_Weltall.opus 53.7 MB
  • 23C3 - 2006/audio/23C3-1492-en-dying_giraffe_recordings.mp3 53.7 MB
  • 22C3 - 2005/video/22C3-580-en-wartracking.mp4 53.7 MB
  • 22C3 - 2005/video/22C3-424-en-the_very_early_computer_game_history.mp4 53.7 MB
  • 22C3 - 2005/video/22C3-521-de-transparenz_der_verantwortung_in_behoerden.mp4 53.6 MB
  • 23C3 - 2006/audio/23C3-1500-en-hackerspaces.mp3 53.6 MB
  • 22C3 - 2005/video/22C3-1094-de-biop_2_studie.mp4 53.6 MB
  • 22C3 - 2005/video/22C3-768-en-free_software_gsm_phone.mp4 53.5 MB
  • 22C3 - 2005/video/22C3-596-en-blackberry.mp4 53.4 MB
  • 23C3 - 2006/audio/23C3-1670-de-barrierefreies_web.mp3 53.4 MB
  • 30C3 - 2013/video/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4 53.4 MB
  • 25C3 - 2008/audio/25c3-3024-de-jahresrueckblick.ogg 53.4 MB
  • 31C3 - 2014/video/31c3-6554-en-de-Automatically_Subtitling_the_C3_sd.mp4 53.3 MB
  • 22C3 - 2005/video/22C3-517-en-free_software_and_anarchism.mp4 53.3 MB
  • 34C3 - 2017/34C3 - The Noise Protocol Framework - deutsche Ubersetzung.mp4 53.3 MB
  • 22C3 - 2005/video/22C3-478-en-desaster_areas.mp4 53.3 MB
  • 34C3 - 2017/34C3 - WHWP - english translation.mp4 53.3 MB
  • 33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3).mp4 53.3 MB
  • 22C3 - 2005/video/22C3-408-en-private_investigations_in_searching.mp4 53.2 MB
  • 22C3 - 2005/video/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.mp4 53.2 MB
  • 22C3 - 2005/video/22C3-599-en-seaside_squeak.mp4 53.2 MB
  • 32C3 - 2015/audio/32c3-7374-en-The_architecture_of_a_street_level_panopticon.opus 53.2 MB
  • 24C3 - 2007/audio/24c3-2352-de-hacker_jeopardy.mp3 53.1 MB
  • 31C3 - 2014/audio/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_opus.opus 53.1 MB
  • 31C3 - 2014/audio/31c3-6251-en-de-State_of_the_Onion_opus.opus 53.0 MB
  • 22C3 - 2005/video/22C3-568-en-eu_data_retention_proposals.mp4 53.0 MB
  • 21C3 - 2004/video/070 Fnord-Jahresrueckblick.mp4 53.0 MB
  • 34C3 - 2017/34C3 - library operating systems - traduction francaise.mp4 52.9 MB
  • 34C3 - 2017/34C3 - Der netzpolitische Wetterbericht - english translation.mp4 52.9 MB
  • 21C3 - 2004/video/138 Protesting in the new Millenium.mp4 52.8 MB
  • 23C3 - 2006/audio/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp3 52.8 MB
  • 22C3 - 2005/video/22C3-1103-en-community_mesh_networking.mp4 52.7 MB
  • 34C3 - 2017/34C3 - DPRK Consumer Technology.mp4 52.7 MB
  • 20C3 - 2003/audio/20c3_609_Security_Nightmares-III.ogg 52.7 MB
  • 34C3 - 2017/34C3 - Italy's surveillance toolbox - deutsche Ubersetzung.mp4 52.7 MB
  • 21C3 - 2004/audio/095 Security Nightmares 2005.mp3 52.7 MB
  • 19C3 - 2002/video/19C3-508-amateurfunk.mp4 52.7 MB
  • 22C3 - 2005/audio/22C3-546-de-gesundheitskarte.m4a 52.7 MB
  • 34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas.mp4 52.6 MB
  • 19C3 - 2002/video/19C3-381-blinkenlights-arcade.mp4 52.6 MB
  • 29C3 - 2012/audio/29c3-5379-de-en-jahresrueckblick2012_ogg.ogg 52.6 MB
  • 23C3 - 2006/audio/23C3-1713-en-black_ops_2006.mp3 52.6 MB
  • 34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig.mp4 52.5 MB
  • 34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig - deutsche Ubersetzung.mp4 52.5 MB
  • 34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas - deutsche Ubersetzung.mp4 52.4 MB
  • 22C3 - 2005/video/22C3-508-en-media_system_deployment.mp4 52.3 MB
  • 32C3 - 2015/audio/32c3-7386-en-Crypto_Wars_Part_II.opus 52.2 MB
  • 22C3 - 2005/video/22C3-603-de-hacking_tomtom_go.mp4 52.2 MB
  • 33C3 - 2016/Tapping into the core (33c3).mp4 52.2 MB
  • 23C3 - 2006/audio/23C3-1540-de-learn_to_be_honest.mp3 52.2 MB
  • 19C3 - 2002/video/19C3-494-x86_64-ia64-architecture.mp4 52.1 MB
  • 23C3 - 2006/audio/23C3-1505-de-gaeste_ueberwachung.mp3 52.1 MB
  • 30C3 - 2013/video/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4 52.1 MB
  • 28C3 - 2011/audio/28c3-4721-en-pentanews_game_show_2k11.ogg 52.0 MB
  • 23C3 - 2006/audio/23C3-1596-en-openxpki.mp3 52.0 MB
  • 23C3 - 2006/audio/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp3 52.0 MB
  • 19C3 - 2002/video/19C3-412-lockpicking.mp4 52.0 MB
  • 24C3 - 2007/video/24c3-2296-en-random_things_high.mp4 51.9 MB
  • 32C3 - 2015/audio/32c3-7343-en-Beyond_Anti_Evil_Maid.opus 51.9 MB
  • 22C3 - 2005/video/22C3-561-en-intrusion_detection_systems.mp4 51.9 MB
  • 22C3 - 2005/video/22C3-513-en-military_intelligence.mp4 51.9 MB
  • 29C3 - 2012/audio/29c3-5419-de-podcaster_workshop_ogg.ogg 51.9 MB
  • 19C3 - 2002/audio/19C3-399-xbox-linux.mp3 51.8 MB
  • 22C3 - 2005/video/22C3-473-en-privaterra.mp4 51.7 MB
  • 21C3 - 2004/video/278 TKUeV-Das Ohr am Draht.mp4 51.7 MB
  • 32C3 - 2015/audio/32c3-7322-en-Tor_onion_services_more_useful_than_you_think.opus 51.6 MB
  • 23C3 - 2006/audio/23C3-1642-en-unlocking_filevault.mp3 51.6 MB
  • 21C3 - 2004/video/129 Die Propagandawueste des realen Krieges.mp4 51.5 MB
  • 22C3 - 2005/video/22C3-778-de-zauberhafte_naturwissenschaften.mp4 51.4 MB
  • 32C3 - 2015/audio/32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_opus.opus 51.4 MB
  • 22C3 - 2005/video/22C3-543-en-i_see_airplanes.mp4 51.3 MB
  • 34C3 - 2017/34C3 - WHWP.mp4 51.3 MB
  • 22C3 - 2005/video/22C3-567-en-3g_investigations.mp4 51.3 MB
  • 23C3 - 2006/audio/23C3-1602-en-subverting_ajax.mp3 51.2 MB
  • 34C3 - 2017/34C3 - library operating systems.mp4 51.1 MB
  • 22C3 - 2005/video/22C3-549-en-digital_identity.mp4 51.1 MB
  • 23C3 - 2006/audio/23C3-1709-en-revenge_of_the_female_nerds.mp3 51.0 MB
  • 34C3 - 2017/34C3 - library operating systems - deutsche Ubersetzung.mp4 51.0 MB
  • 23C3 - 2006/audio/23C3-1652-de-geschichte_der_automaten.mp3 51.0 MB
  • 34C3 - 2017/34C3 - How can you trust formally verified software - deutsche Ubersetzung.mp4 51.0 MB
  • 22C3 - 2005/video/22C3-529-en-muxtcp.mp4 51.0 MB
  • 23C3 - 2006/video/23C3-1512-de-homegrown_interactive_tables.mp4 51.0 MB
  • 32C3 - 2015/audio/32c3-7207-en-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time.opus 51.0 MB
  • 19C3 - 2002/video/19C3-415-biometrie.mp4 51.0 MB
  • 30C3 - 2013/video/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4 50.9 MB
  • 30C3 - 2013/video/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4 50.9 MB
  • 24C3 - 2007/video/24c3-2216-de-erlang_high.mp4 50.9 MB
  • 24C3 - 2007/audio/24c3-2336-de-security_nightmares.mp3 50.8 MB
  • 20C3 - 2003/audio/20c3_542_Trusted-or-Treacherous.ogg 50.8 MB
  • 33C3 - 2016/33C3 Opening Ceremony - traduction française (33c3).mp4 50.8 MB
  • 33C3 - 2016/Gone in 60 Milliseconds (33c3).mp4 50.8 MB
  • 22C3 - 2005/video/22C3-511-de-videoueberwachung_hochschulen.mp4 50.7 MB
  • 23C3 - 2006/audio/23C3-1342-en-botnet_detection.mp3 50.7 MB
  • 32C3 - 2015/audio/32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_opus.opus 50.7 MB
  • 21C3 - 2004/video/067 Inside PDF.mp4 50.7 MB
  • 22C3 - 2005/video/22C3-490-de-data_mining_weltfrieden.mp4 50.6 MB
  • 23C3 - 2006/audio/23C3-1616-de-nerds_und_geeks.mp3 50.6 MB
  • 23C3 - 2006/audio/23C3-1758-en-fuzzing_corporate_world.mp3 50.6 MB
  • 22C3 - 2005/video/22C3-1084-de-informationsfreiheitsgesetz.mp4 50.6 MB
  • 21C3 - 2004/video/178 Humanoid Robots.mp4 50.4 MB
  • 34C3 - 2017/34C3 - The Noise Protocol Framework.mp4 50.4 MB
  • 19C3 - 2002/video/19C3-495-sctp.mp4 50.4 MB
  • 32C3 - 2015/audio/32c3-7438-en-goto_fail.opus 50.3 MB
  • 21C3 - 2004/video/174 Lobbying fuer Nerds.mp4 50.3 MB
  • 23C3 - 2006/audio/23C3-1561-de-big_brother_awards.mp3 50.3 MB
  • 22C3 - 2005/video/22C3-535-en-old_skewl_hacking.mp4 50.2 MB
  • 23C3 - 2006/audio/23C3-1622-en-void_the_warranty.mp3 50.2 MB
  • 24C3 - 2007/video/24c3-2256-de-openser_sip_server_high.mp4 50.2 MB
  • 34C3 - 2017/34C3 - Der netzpolitische Wetterbericht.mp4 50.2 MB
  • 23C3 - 2006/audio/23C3-1640-en-10ge_monitoring_system.mp3 50.2 MB
  • 17C3 - 2000/audio/Tron-Diskussion.mp3 50.2 MB
  • 34C3 - 2017/34C3 - Italy's surveillance toolbox.mp4 50.2 MB
  • 21C3 - 2004/video/059 Wikipedia Sociographics.mp4 50.1 MB
  • 23C3 - 2006/audio/23C3-1563-en-funkerspuk.mp3 50.0 MB
  • 31C3 - 2014/audio/31c3-5931-en-de-Telescope_Making_opus.opus 50.0 MB
  • 34C3 - 2017/34C3 - SatNOGS Crowd-sourced satellite operations - deutsche Ubersetzung.mp4 50.0 MB
  • 33C3 - 2016/Privatisierung der Rechtsdurchsetzung (33c3).mp4 49.9 MB
  • 23C3 - 2006/video/23C3-1627-en-software_reliability.mp4 49.9 MB
  • 33C3 - 2016/Code BROWN in the Air (33c3) - deutsche Ubersetzung.mp4 49.8 MB
  • 17C3 - 2000/video/17C3_illuminatus.mp4 49.8 MB
  • 30C3 - 2013/video/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4 49.8 MB
  • 22C3 - 2005/video/22C3-915-en-lightning_talk_day_4.mp4 49.7 MB
  • 19C3 - 2002/video/19C3-521-big-brother-awards-discussion.mp4 49.7 MB
  • 32C3 - 2015/audio/32c3-7443-en-The_Price_Of_Dissent.opus 49.7 MB
  • 34C3 - 2017/34C3 - Eröffnung tuwat - english translation.mp4 49.5 MB
  • 24C3 - 2007/video/24c3-2212-en-unusual_web_bugs_high.mp4 49.5 MB
  • 34C3 - 2017/34C3 - Eröffnung tuwat - traduction francaise.mp4 49.5 MB
  • 34C3 - 2017/34C3 - Extended DNA Analysis - deutsche Ubersetzung.mp4 49.5 MB
  • 34C3 - 2017/34C3 - Eröffnung tuwat.mp4 49.5 MB
  • 32C3 - 2015/audio/32c3-7305-en-Quantum_Cryptography.opus 49.4 MB
  • 24C3 - 2007/video/24c3-2252-en-ruby_on_rails_security_high.mp4 49.4 MB
  • 24C3 - 2007/video/24c3-2131-en-port_scanning_improved_high.mp4 49.4 MB
  • 22C3 - 2005/video/22C3-553-en-syscall_proxying.mp4 49.4 MB
  • 22C3 - 2005/video/22C3-544-en-applied_machine_learning.mp4 49.3 MB
  • 22C3 - 2005/video/22C3-563-en-real_life_bug_finding_in_win32.mp4 49.3 MB
  • 19C3 - 2002/audio/19C3-517-eu-data-retention.mp3 49.3 MB
  • 34C3 - 2017/34C3 - Extended DNA Analysis.mp4 49.2 MB
  • 32C3 - 2015/audio/32c3-7341-en-So_you_want_to_build_a_satellite.opus 49.2 MB
  • 22C3 - 2005/video/22C3-499-en-access_to_knowledge.mp4 49.2 MB
  • 22C3 - 2005/video/22C3-1111-de-hexenbesen_und_heiliger_gral.mp4 49.2 MB
  • 32C3 - 2015/audio/32c3-7483-en-Computational_Meta-Psychology.opus 49.2 MB
  • 23C3 - 2006/audio/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp3 49.2 MB
  • 29C3 - 2012/video/29c3-5210-en-on_breaking_saml_h264.mp4 49.1 MB
  • 33C3 - 2016/Machine Dreams (33c3) - deutsche Ubersetzung.mp4 49.1 MB
  • 22C3 - 2005/video/22C3-468-en-lawful_interception_of_voip_networks.mp4 49.1 MB
  • 21C3 - 2004/video/029 Robocup.mp4 49.1 MB
  • 31C3 - 2014/audio/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_opus.opus 49.0 MB
  • 29C3 - 2012/audio/29c3-5037-de-en-nougatbytes10_ogg.ogg 49.0 MB
  • 32C3 - 2015/audio/32c3-7562-de-Jugend_hackt_2015.opus 49.0 MB
  • 32C3 - 2015/audio/32c3-7252-en-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale.opus 49.0 MB
  • 32C3 - 2015/audio/32c3-7403-en-A_New_Kid_on_the_Block.opus 49.0 MB
  • 24C3 - 2007/video/24c3-2166-en-embedded_devices_reverse_engineering_high.mp4 49.0 MB
  • 28C3 - 2011/audio/28c3-4722-de-dick_size_war_for_nerds.ogg 48.9 MB
  • 31C3 - 2014/audio/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_opus.opus 48.9 MB
  • 19C3 - 2002/audio/19C3-366-tcpa.mp3 48.9 MB
  • 33C3 - 2016/Saving the World with (Vegan) Science (33c3) - deutsche Ubersetzung.mp4 48.8 MB
  • 23C3 - 2006/video/23C3-1342-en-botnet_detection.mp4 48.8 MB
  • 32C3 - 2015/audio/32c3-7523-en-DDoS_mitigation_EPIC_FAIL_collection.opus 48.7 MB
  • 20C3 - 2003/video/20C3-599-Softwarepatente.mp4 48.7 MB
  • 19C3 - 2002/video/19C3-386-spam-prevention.mp4 48.7 MB
  • 23C3 - 2006/audio/23C3-1698-en-culture_jamming_discordianism.mp3 48.7 MB
  • 32C3 - 2015/audio/32c3-7561-en-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse.opus 48.7 MB
  • 27C3 - 2010/audio/27c3-4298-de-ccc_jahresrueckblick_2010.ogg 48.7 MB
  • 22C3 - 2005/video/22C3-565-en-voiphreaking.mp4 48.6 MB
  • 32C3 - 2015/audio/32c3-7538-en-Internet_Landscapes_opus.opus 48.6 MB
  • 23C3 - 2006/audio/23C3-1759-de-schlossoeffnung_staatssicherheit.mp3 48.6 MB
  • 23C3 - 2006/audio/23C3-1678-de-kritik_an_den_illuminaten.mp3 48.6 MB
  • 33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3) - traduction française.mp4 48.5 MB
  • 22C3 - 2005/video/22C3-1083-en-informational_cognitive_capitalism.mp4 48.5 MB
  • 31C3 - 2014/audio/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_opus.opus 48.5 MB
  • 34C3 - 2017/34C3 - Demystifying Network Cards - traduction francaise.mp4 48.5 MB
  • 32C3 - 2015/audio/32c3-7260-en-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for.opus 48.4 MB
  • 22C3 - 2005/video/22C3-466-en-hacking_data_retention.mp4 48.4 MB
  • 31C3 - 2014/audio/31c3-6043-en-de-The_Maker_movement_meets_patent_law_opus.opus 48.3 MB
  • 33C3 - 2016/Code BROWN in the Air (33c3).mp4 48.3 MB
  • 22C3 - 2005/video/22C3-1099-en-hacking_openwrt.mp4 48.3 MB
  • 22C3 - 2005/video/22C3-1078-en-wifi_long_shots.mp4 48.3 MB
  • 24C3 - 2007/audio/24c3-2203-de-chaos_jahresrueckblick.mp3 48.3 MB
  • 33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3).mp4 48.2 MB
  • 32C3 - 2015/audio/32c3-7323-de-Wie_man_einen_Blackout_verursacht.opus 48.2 MB
  • 23C3 - 2006/audio/23C3-1402-de-drones.mp3 48.1 MB
  • 34C3 - 2017/34C3 - How can you trust formally verified software.mp4 48.1 MB
  • 32C3 - 2015/audio/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone.opus 48.0 MB
  • 23C3 - 2006/audio/23C3-1419-de-java_wird_groovy.mp3 48.0 MB
  • 32C3 - 2015/audio/32c3-7216-en-CHINTERNET_ART.opus 47.9 MB
  • 20C3 - 2003/audio/20c3_589_AN.ON-and-the-futureof-anonymziers.ogg 47.9 MB
  • 33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3).mp4 47.9 MB
  • 23C3 - 2006/audio/23C3-1606-en-console_hacking_2006.mp3 47.9 MB
  • 34C3 - 2017/34C3 - End-to-end formal ISA verification of RISC-V processors with riscv-formal - deutsche Uberset.mp4 47.9 MB
  • 32C3 - 2015/audio/32c3-7555-en-32C3_Infrastructure_Review.opus 47.9 MB
  • 24C3 - 2007/video/24c3-2303-en-inside_the_macosx_kernel_high.mp4 47.9 MB
  • 34C3 - 2017/34C3 - End-to-end formal ISA verification of RISC-V processors with riscv-formal.mp4 47.8 MB
  • 32C3 - 2015/audio/32c3-7412-en-Running_your_own_3G_35G_network.opus 47.8 MB
  • 30C3 - 2013/video/30c3-5595-en-The_ArduGuitar_h264-hq.mp4 47.8 MB
  • 19C3 - 2002/video/19C3-374-ccc-geschichte.mp4 47.7 MB
  • 29C3 - 2012/audio/29c3-5198-de-en-fnord_jahresrueckblick2012_ogg.ogg 47.7 MB
  • 20C3 - 2003/audio/20c3_568_Data-Mining-und-intelligence-Software.ogg 47.7 MB
  • 33C3 - 2016/Saving the World with (Vegan) Science (33c3).mp4 47.6 MB
  • 32C3 - 2015/audio/32c3-7171-en-When_hardware_must_just_work.opus 47.6 MB
  • 32C3 - 2015/audio/32c3-7356-en-Top_X_usability_obstacles.opus 47.6 MB
  • 30C3 - 2013/video/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4 47.6 MB
  • 31C3 - 2014/audio/31c3-6571-en-31C3_Keynote_opus.opus 47.6 MB
  • 22C3 - 2005/video/22C3-593-en-software_patenting.mp4 47.6 MB
  • 32C3 - 2015/audio/32c3-7482-en-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives.opus 47.5 MB
  • 32C3 - 2015/audio/32c3-7432-en-Datahavens_from_HavenCo_to_Today.opus 47.5 MB
  • 33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3) - deutsche Ubersetzung.mp4 47.4 MB
  • 22C3 - 2005/video/22C3-791-de-big_brother_awards.mp4 47.4 MB
  • 19C3 - 2002/video/19C3-498-freedom-cpu.mp4 47.4 MB
  • 30C3 - 2013/video/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4 47.3 MB
  • 17C3 - 2000/audio/erratik.mp3 47.3 MB
  • 32C3 - 2015/audio/32c3-7565-en-Keynote_opus.opus 47.3 MB
  • 21C3 - 2004/video/080 USB-Unbekannter Serieller Bus.mp4 47.3 MB
  • 34C3 - 2017/34C3 - SatNOGS Crowd-sourced satellite operations.mp4 47.3 MB
  • 21C3 - 2004/video/123 Gentoo Hardened.mp4 47.3 MB
  • 21C3 - 2004/video/133 How to Herd Cats.mp4 47.3 MB
  • 32C3 - 2015/audio/32c3-7210-en-PQCHacks.opus 47.3 MB
  • 32C3 - 2015/audio/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_opus.opus 47.2 MB
  • 32C3 - 2015/audio/32c3-7525-de-Quantenphysik_und_Kosmologie.opus 47.2 MB
  • 24C3 - 2007/video/24c3-2367-en-closing_event_high.mp4 47.2 MB
  • 32C3 - 2015/audio/32c3-7162-en-Shooting_lasers_into_space_-_for_science.opus 47.2 MB
  • 23C3 - 2006/audio/23C3-1498-en-mining_aol_search_queries.mp3 47.2 MB
  • 19C3 - 2002/video/19C3-489-big-brother-awards.mp4 47.1 MB
  • 19C3 - 2002/video/19C3-460-isp-user-profiles.mp4 47.1 MB
  • 21C3 - 2004/audio/066 Bluetooth Hacking.mp3 47.1 MB
  • 19C3 - 2002/audio/19C3-443-how-to-find-anything-on-the-web.mp3 47.0 MB
  • 24C3 - 2007/video/24c3-2353-en-from_ring_zero_to_uid_zero_high.mp4 47.0 MB
  • 31C3 - 2014/audio/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_opus.opus 46.9 MB
  • 23C3 - 2006/video/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp4 46.9 MB
  • 23C3 - 2006/audio/23C3-1461-en-the_grim_meathook_future.mp3 46.9 MB
  • 34C3 - 2017/34C3 - Demystifying Network Cards.mp4 46.8 MB
  • 32C3 - 2015/audio/32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus 46.8 MB
  • 22C3 - 2005/video/22C3-867-de-have_you_hugged_your_mac_today.mp4 46.8 MB
  • 23C3 - 2006/audio/23C3-1554-de-ethernet_mit_mikrocontrollern.mp3 46.8 MB
  • 34C3 - 2017/34C3 - Demystifying Network Cards - deutsche Ubersetzung.mp4 46.7 MB
  • 24C3 - 2007/video/24c3-2247-en-breaking_a_vm_high.mp4 46.7 MB
  • 19C3 - 2002/video/19C3-464-stego-analyse.mp4 46.6 MB
  • 32C3 - 2015/audio/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_opus.opus 46.6 MB
  • 22C3 - 2005/video/22C3-532-de-lyrical_i.mp4 46.6 MB
  • 31C3 - 2014/audio/31c3-6122-en-de-Mobile_self-defense_opus.opus 46.6 MB
  • 22C3 - 2005/video/22C3-461-en-peer_to_peer_under_the_hood.mp4 46.6 MB
  • 34C3 - 2017/34C3 - Regulating Autonomous Weapons.mp4 46.6 MB
  • 23C3 - 2006/audio/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp3 46.6 MB
  • 34C3 - 2017/34C3 - Regulating Autonomous Weapons - deutsche Ubersetzung.mp4 46.6 MB
  • 32C3 - 2015/audio/32c3-7150-de-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik.opus 46.6 MB
  • 34C3 - 2017/34C3 - Regulating Autonomous Weapons - traduction francaise.mp4 46.5 MB
  • 22C3 - 2005/video/22C3-489-en-hacking_health.mp4 46.5 MB
  • 34C3 - 2017/34C3 - Hardening Open Source Development - deutsche Ubersetzung.mp4 46.5 MB
  • 31C3 - 2014/audio/31c3-6240-en-Reproducible_Builds_opus.opus 46.4 MB
  • 33C3 - 2016/Der 33 JahrerUckblick (33c3) - deutsche Ubersetzung.mp4 46.3 MB
  • 31C3 - 2014/audio/31c3-6547-en-de-Exploit_in_theater_opus.opus 46.3 MB
  • 31C3 - 2014/audio/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_opus.opus 46.3 MB
  • 32C3 - 2015/audio/32c3-7218-en-A_Dozen_Years_of_Shellphish.opus 46.3 MB
  • 29C3 - 2012/audio/29c3-5244-de-en-security_nightmares2012_ogg.ogg 46.3 MB
  • 31C3 - 2014/audio/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_opus.opus 46.3 MB
  • 32C3 - 2015/audio/32c3-7389-en-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands.opus 46.2 MB
  • 23C3 - 2006/audio/23C3-1644-en-sflow.mp3 46.2 MB
  • 22C3 - 2005/video/22C3-769-en-rfid_protocols.mp4 46.2 MB
  • 19C3 - 2002/video/19C3-500-c-optimizations.mp4 46.2 MB
  • 34C3 - 2017/34C3 - Schreibtisch-Hooligans - english translation.mp4 46.1 MB
  • 31C3 - 2014/audio/31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus 46.1 MB
  • 31C3 - 2014/audio/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus 46.1 MB
  • 31C3 - 2014/audio/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_opus.opus 46.1 MB
  • 22C3 - 2005/video/22C3-482-de-atmel_avr_for_dummies.mp4 46.1 MB
  • 22C3 - 2005/video/22C3-498-de-paper_prototyping_workshop.mp4 46.1 MB
  • 32C3 - 2015/audio/32c3-7368-en-Shopshifting.opus 46.0 MB
  • 34C3 - 2017/34C3 - Schreibtisch-Hooligans.mp4 46.0 MB
  • 32C3 - 2015/audio/32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_opus.opus 45.9 MB
  • 32C3 - 2015/video/32c3-7550-en-Opening_Event_hd.mp4 45.9 MB
  • 31C3 - 2014/audio/31c3-6258-en-Reconstructing_narratives_opus.opus 45.9 MB
  • 31C3 - 2014/audio/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_opus.opus 45.9 MB
  • 23C3 - 2006/audio/23C3-1502-en-the_gift_of_sharing.mp3 45.8 MB
  • 32C3 - 2015/audio/32c3-7387-en-Net_Neutrality_in_Europe.opus 45.8 MB
  • 23C3 - 2006/audio/23C3-1699-en-drm_comes_to_european_digital_tv.mp3 45.8 MB
  • 32C3 - 2015/audio/32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_opus.opus 45.7 MB
  • 34C3 - 2017/34C3 - Afro TECH - deutsche Ubersetzung.mp4 45.7 MB
  • 34C3 - 2017/34C3 - Afro TECH.mp4 45.6 MB
  • 32C3 - 2015/audio/32c3-7231-en-CloudABI.opus 45.6 MB
  • 33C3 - 2016/Der 33 JahrerUckblick (33c3).mp4 45.6 MB
  • 30C3 - 2013/audio/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_opus.opus 45.6 MB
  • 23C3 - 2006/audio/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3 45.6 MB
  • 31C3 - 2014/audio/31c3-6600-en-de-Tell_no-one_opus.opus 45.6 MB
  • 21C3 - 2004/video/064 Trusted Computing.mp4 45.6 MB
  • 24C3 - 2007/video/24c3-2190-en-introduction_in_mems_high.mp4 45.5 MB
  • 32C3 - 2015/audio/32c3-7165-en-Vehicle2Vehicle_Communication_based_on_IEEE_80211p.opus 45.5 MB
  • 32C3 - 2015/audio/32c3-7153-en-de-rad1o_opus.opus 45.5 MB
  • 22C3 - 2005/video/22C3-428-en-hacking_challenge.mp4 45.5 MB
  • 32C3 - 2015/audio/32c3-7273-en-Unpatchable.opus 45.4 MB
  • 22C3 - 2005/video/22C3-531-en-hopalong_casualty.mp4 45.4 MB
  • 32C3 - 2015/audio/32c3-7154-en-Iridium_Update.opus 45.4 MB
  • 30C3 - 2013/video/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4 45.4 MB
  • 31C3 - 2014/audio/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_opus.opus 45.4 MB
  • 23C3 - 2006/audio/23C3-1452-de-critical_theory_and_chaos.mp3 45.3 MB
  • 31C3 - 2014/audio/31c3-6123-en-de-Freedom_in_your_computer_and_in_the_net_opus.opus 45.3 MB
  • 23C3 - 2006/audio/23C3-1658-en-bignum_arithmetic.mp3 45.3 MB
  • 28C3 - 2011/audio/28c3-4898-de-security_nightmares.ogg 45.3 MB
  • 32C3 - 2015/audio/32c3-7243-en-Gibberish_Detection_102.opus 45.3 MB
  • 24C3 - 2007/audio/24c3-2356-en-computer_popsongs.mp3 45.3 MB
  • 22C3 - 2005/video/22C3-871-en-honeymonkeys.mp4 45.3 MB
  • 31C3 - 2014/audio/31c3-6142-en-de-Space_Hacker_opus.opus 45.3 MB
  • 28C3 - 2011/audio/28c3-4937-en-security_nightmares.ogg 45.3 MB
  • 33C3 - 2016/The Clash of Digitalizations (33c3).mp4 45.2 MB
  • 22C3 - 2005/video/22C3-765-en-magnetic_stripe_technology.mp4 45.2 MB
  • 22C3 - 2005/video/22C3-556-en-preventing_buffer_overflows.mp4 45.2 MB
  • 32C3 - 2015/audio/32c3-7333-en-The_Magic_World_of_Searchable_Symmetric_Encryption.opus 45.2 MB
  • 33C3 - 2016/Shut Up and Take My Money! (33c3) - deutsche Ubersetzung.mp4 45.2 MB
  • 32C3 - 2015/audio/32c3-7567-de-Katastrophe_und_Kommunikation.opus 45.1 MB
  • 33C3 - 2016/Pegasus internals (33c3).mp4 45.1 MB
  • 21C3 - 2004/audio/090 Hacktivity.mp3 45.1 MB
  • 31C3 - 2014/audio/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_opus.opus 45.1 MB
  • 32C3 - 2015/audio/32c3-7174-en-Lifting_the_Fog_on_Red_Star_OS.opus 45.0 MB
  • 31C3 - 2014/audio/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_opus.opus 45.0 MB
  • 31C3 - 2014/audio/31c3-6397-en-de-Lets_Encrypt_opus.opus 44.9 MB
  • 22C3 - 2005/video/22C3-575-en-the_realtime_thing.mp4 44.9 MB
  • 21C3 - 2004/video/097 Das Literarische Code-Quartett.mp4 44.9 MB
  • 32C3 - 2015/audio/32c3-7342-en-Household_Totalitarianism_and_Cyberspace.opus 44.8 MB
  • 31C3 - 2014/audio/31c3-6084-en-Uncaging_Microchips_opus.opus 44.8 MB
  • 32C3 - 2015/audio/32c3-7143-en-The_state_of_Internet_Censorship.opus 44.8 MB
  • 31C3 - 2014/audio/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_opus.opus 44.8 MB
  • 31C3 - 2014/audio/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_opus.opus 44.7 MB
  • 19C3 - 2002/video/19C3-441-radiokampagne.mp4 44.7 MB
  • 31C3 - 2014/audio/31c3-6050-en-Code_Pointer_Integrity_opus.opus 44.7 MB
  • 31C3 - 2014/audio/31c3-6350-en-Correcting_copywrongs_opus.opus 44.6 MB
  • 31C3 - 2014/audio/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_opus.opus 44.6 MB
  • 31C3 - 2014/audio/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_opus.opus 44.6 MB
  • 33C3 - 2016/Pegasus internals (33c3) - deutsche Ubersetzung.mp4 44.6 MB
  • 30C3 - 2013/audio/30c3-5255-en-de-Through_a_PRISM_Darkly_opus.opus 44.5 MB
  • 22C3 - 2005/video/22C3-415-en-developing_intelligent_search_engines.mp4 44.5 MB
  • 23C3 - 2006/audio/23C3-1694-en-automated_exploit_detection_in_binaries.mp3 44.5 MB
  • 32C3 - 2015/audio/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_opus.opus 44.4 MB
  • 19C3 - 2002/video/19C3-413-aes-attacks.mp4 44.4 MB
  • 23C3 - 2006/audio/23C3-1638-de-freie_software.mp3 44.4 MB
  • 23C3 - 2006/audio/23C3-1449-en-not_so_smart_card.mp3 44.4 MB
  • 33C3 - 2016/Whats It Doing Now (33c3) - deutsche Ubersetzung.mp4 44.3 MB
  • 31C3 - 2014/audio/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_opus.opus 44.3 MB
  • 31C3 - 2014/audio/31c3-6573-en-de-From_Computation_to_Consciousness_opus.opus 44.3 MB
  • 26C3 - 2009/audio/26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.ogg 44.3 MB
  • 34C3 - 2017/34C3 - Hardening Open Source Development.mp4 44.3 MB
  • 31C3 - 2014/audio/31c3-6137-en-de-CAESAR_and_NORX_opus.opus 44.2 MB
  • 23C3 - 2006/audio/23C3-1523-en-the_rise_and_fall_of_open_source.mp3 44.2 MB
  • 31C3 - 2014/audio/31c3-6291-en-Doing_right_by_sources_done_right_opus.opus 44.2 MB
  • 31C3 - 2014/audio/31c3-6463-en-Damn_Vulnerable_Chemical_Process_opus.opus 44.2 MB
  • 31C3 - 2014/audio/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_opus.opus 44.1 MB
  • 32C3 - 2015/audio/32c3-7277-en-Breaking_Honeypots_for_Fun_and_Profit.opus 44.1 MB
  • 32C3 - 2015/audio/32c3-7468-en-The_Ultimate_Amiga_500_Talk.opus 44.1 MB
  • 31C3 - 2014/audio/31c3-5943-en-de-Low_Cost_High_Speed_Photography_opus.opus 44.1 MB
  • 31C3 - 2014/audio/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_opus.opus 44.1 MB
  • 32C3 - 2015/audio/32c3-7229-de-en-PLC-Blaster_opus.opus 44.1 MB
  • 33C3 - 2016/Whats It Doing Now (33c3).mp4 44.0 MB
  • 22C3 - 2005/video/22C3-503-de-esperanto.mp4 44.0 MB
  • 25C3 - 2008/audio/25c3-2958-de-hacker_jeopardy.ogg 44.0 MB
  • 32C3 - 2015/audio/32c3-7163-en-New_memory_corruption_attacks_why_cant_we_have_nice_things.opus 44.0 MB
  • 31C3 - 2014/audio/31c3-6249-en-de-SS7_Locate_Track_Manipulate_opus.opus 43.9 MB
  • 22C3 - 2005/video/22C3-911-en-lightning_talk_day_1.mp4 43.9 MB
  • 19C3 - 2002/audio/19C3-382-quantenkryptographie.mp3 43.9 MB
  • 22C3 - 2005/video/22C3-589-en-anonymous_data_broadcasting.mp4 43.9 MB
  • 33C3 - 2016/Whats It Doing Now (33c3) - traduction française.mp4 43.9 MB
  • 32C3 - 2015/audio/32c3-7421-en-Fluxus_cannot_save_the_world.opus 43.9 MB
  • 31C3 - 2014/audio/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_opus.opus 43.8 MB
  • 25C3 - 2008/audio/25c3-3057-en-hacker_jeopardy_english_interpretation.ogg 43.8 MB
  • 31C3 - 2014/audio/31c3-6184-de-en-Mein_Bot_der_Kombattant_opus.opus 43.8 MB
  • 31C3 - 2014/audio/31c3-6261-en-de-Lets_build_a_quantum_computer_opus.opus 43.8 MB
  • 20C3 - 2003/video/20C3-557-Ein_Rant_ueber_den_Missbrauch_von_Java_HTTP_und_XML.mp4 43.7 MB
  • 24C3 - 2007/video/24c3-2326-en-diy_survival_high.mp4 43.6 MB
  • 20C3 - 2003/video/20C3-550-ROCK-Linux_Das_Tool_zum_Erstellen_von_Distros.mp4 43.6 MB
  • 22C3 - 2005/video/22C3-483-de-ccc_jahresrueckblick.mp4 43.6 MB
  • 31C3 - 2014/audio/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_opus.opus 43.6 MB
  • 31C3 - 2014/audio/31c3-6170-en-net_neutrality_days_of_future_past_opus.opus 43.6 MB
  • 31C3 - 2014/audio/31c3-6559-de-en-Jugend_hackt_opus.opus 43.6 MB
  • 30C3 - 2013/video/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4 43.6 MB
  • 31C3 - 2014/audio/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_opus.opus 43.5 MB
  • 23C3 - 2006/audio/23C3-1446-en-secure_network_server_programming_on_unix.mp3 43.5 MB
  • 32C3 - 2015/audio/32c3-7340-en-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone.opus 43.5 MB
  • 22C3 - 2005/video/22C3-926-en-disassembler_internals.mp4 43.5 MB
  • 30C3 - 2013/audio/30c3-5423-en-The_Tor_Network_opus.opus 43.4 MB
  • 23C3 - 2006/audio/23C3-1700-en-router_and_infrastructure_hacking.mp3 43.4 MB
  • 23C3 - 2006/audio/23C3-1512-de-homegrown_interactive_tables.mp3 43.4 MB
  • 31C3 - 2014/audio/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_opus.opus 43.4 MB
  • 24C3 - 2007/video/24c3-2338-en-steam_powered_telegraphy_high.mp4 43.3 MB
  • 20C3 - 2003/audio/20c3_600_RFID.ogg 43.2 MB
  • 34C3 - 2017/34C3 - Doping your Fitbit - deutsche Ubersetzung.mp4 43.2 MB
  • 19C3 - 2002/video/19C3-461-noc-review.mp4 43.2 MB
  • 32C3 - 2015/audio/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching.opus 43.2 MB
  • 33C3 - 2016/Welcome to the Anthropocene (33c3).mp4 43.2 MB
  • 31C3 - 2014/audio/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_opus.opus 43.2 MB
  • 31C3 - 2014/audio/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_opus.opus 43.2 MB
  • 32C3 - 2015/audio/32c3-7324-en-What_is_the_value_of_anonymous_communication.opus 43.1 MB
  • 32C3 - 2015/audio/32c3-7249-de-Das_Zahnrad_aus_Fleisch.opus 43.0 MB
  • 22C3 - 2005/video/22C3-1295-en-future_challenges.mp4 43.0 MB
  • 31C3 - 2014/audio/31c3-6499-en-Glitching_For_n00bs_opus.opus 43.0 MB
  • 33C3 - 2016/Welcome to the Anthropocene (33c3) - deutsche Ubersetzung.mp4 43.0 MB
  • 31C3 - 2014/audio/31c3-6602-en-de-The_case_of_Chelsea_Manning_opus.opus 43.0 MB
  • 23C3 - 2006/video/23C3-1658-en-bignum_arithmetic.mp4 42.9 MB
  • 31C3 - 2014/audio/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_opus.opus 42.9 MB
  • 32C3 - 2015/audio/32c3-7449-en-Prediction_and_Control.opus 42.9 MB
  • 23C3 - 2006/audio/23C3-1619-en-introduction_to_matrix_programming.mp3 42.9 MB
  • 21C3 - 2004/video/109 Anti-Honeypot Techniques.mp4 42.9 MB
  • 24C3 - 2007/audio/24c3-2275-en-quantum_cryptography_and_possible_attacks.mp3 42.8 MB
  • 29C3 - 2012/audio/29c3-5275-en-facthacks_ogg.ogg 42.8 MB
  • 31C3 - 2014/audio/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_opus.opus 42.8 MB
  • 21C3 - 2004/video/055 CCC-Jahresrueckblick.mp4 42.8 MB
  • 21C3 - 2004/video/208 Gamecube Hacking.mp4 42.8 MB
  • 22C3 - 2005/video/22C3-798-en-tcpip_covert_channels.mp4 42.7 MB
  • 34C3 - 2017/34C3 - Unleash your smart-home devices Vacuum Cleaning Robot Hacking - deutsche Ubersetzung.mp4 42.7 MB
  • 20C3 - 2003/video/20C3-SkoleLinux.mp4 42.7 MB
  • 31C3 - 2014/audio/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_opus.opus 42.6 MB
  • 26C3 - 2009/audio/26c3-3690-de-ccc-jahresrckblick.ogg 42.6 MB
  • 31C3 - 2014/audio/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_opus.opus 42.6 MB
  • 32C3 - 2015/audio/32c3-7259-en-Graphs_Drones_Phones.opus 42.6 MB
  • 31C3 - 2014/audio/31c3-6196-en-Switches_Get_Stitches_opus.opus 42.6 MB
  • 30C3 - 2013/audio/30c3-5499-en-X_Security_opus.opus 42.5 MB
  • 31C3 - 2014/audio/31c3-6377-en-de-Paypals_War_on_Terror_opus.opus 42.5 MB
  • 20C3 - 2003/video/20C3-637-Distributed_Computing.mp4 42.4 MB
  • 21C3 - 2004/video/078 Aspects of Elliptic Curve Cryptography.mp4 42.4 MB
  • 33C3 - 2016/The Economic Consequences of Internet Censorship (33c3) - traduction française.mp4 42.4 MB
  • 19C3 - 2002/video/19C3-396-videorendering-cluster.mp4 42.4 MB
  • 30C3 - 2013/audio/30c3-5537-en-Glass_Hacks_opus.opus 42.3 MB
  • 33C3 - 2016/The Economic Consequences of Internet Censorship (33c3) - deutsche Ubersetzung.mp4 42.3 MB
  • 30C3 - 2013/video/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4 42.2 MB
  • 23C3 - 2006/audio/23C3-1701-en-open_source_machine_translation.mp3 42.2 MB
  • 30C3 - 2013/audio/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_opus.opus 42.2 MB
  • 24C3 - 2007/video/24c3-2250-de-abschlussbericht_fem_high.mp4 42.1 MB
  • 33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3) - deutsche Ubersetzung.mp4 42.1 MB
  • 30C3 - 2013/audio/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_opus.opus 42.1 MB
  • 34C3 - 2017/34C3 - Unleash your smart-home devices Vacuum Cleaning Robot Hacking.mp4 42.1 MB
  • 31C3 - 2014/audio/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_opus.opus 42.1 MB
  • 32C3 - 2015/audio/32c3-7490-en-The_Great_Train_Cyber_Robbery.opus 42.1 MB
  • 21C3 - 2004/video/037 GNOME Anwendungsentwicklung.mp4 42.0 MB
  • 22C3 - 2005/video/22C3-776-en-closing_event.mp4 42.0 MB
  • 31C3 - 2014/audio/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_opus.opus 42.0 MB
  • 23C3 - 2006/audio/23C3-1740-en-in_the_absence_of_trust.mp3 42.0 MB
  • 19C3 - 2002/audio/19C3-424-beopardy.mp3 42.0 MB
  • 32C3 - 2015/audio/32c3-7255-en-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015.opus 42.0 MB
  • 33C3 - 2016/The Economic Consequences of Internet Censorship (33c3).mp4 42.0 MB
  • 30C3 - 2013/audio/30c3-5406-en-Drones_opus.opus 42.0 MB
  • 19C3 - 2002/video/19C3-414-kuenstliche-unintelligenz.mp4 42.0 MB
  • 32C3 - 2015/audio/32c3-7336-en-3D_printing_on_the_moon.opus 41.9 MB
  • 21C3 - 2004/video/015 Sicherheit bei VoIP-Systemen.mp4 41.9 MB
  • 31C3 - 2014/audio/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_opus.opus 41.8 MB
  • 23C3 - 2006/video/23C3-1449-en-not_so_smart_card.mp4 41.8 MB
  • 22C3 - 2005/video/22C3-828-en-terminator_genes_and_gurt.mp4 41.8 MB
  • 32C3 - 2015/audio/32c3-7189-en-Key-logger_Video_Mouse.opus 41.8 MB
  • 31C3 - 2014/audio/31c3-6297-en-de-Virtual_Machine_Introspection_opus.opus 41.8 MB
  • 31C3 - 2014/audio/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_opus.opus 41.8 MB
  • 31C3 - 2014/audio/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_opus.opus 41.7 MB
  • 26C3 - 2009/audio/26c3-3687-de-security_nightmares.ogg 41.7 MB
  • 28C3 - 2011/audio/28c3-4800-en-how_governments_have_tried_to_block_tor.ogg 41.6 MB
  • 26C3 - 2009/audio/26c3-3725-en-stream_security_nightmares.ogg 41.6 MB
  • 23C3 - 2006/audio/23C3-1552-en-nintendo_ds.mp3 41.5 MB
  • 21C3 - 2004/video/041 Einfuehrung in Kryptographische Methoden.mp4 41.5 MB
  • 34C3 - 2017/34C3 - Home Distilling.mp4 41.5 MB
  • 23C3 - 2006/video/23C3-1418-de-trust_your_eyes.mp4 41.5 MB
  • 31C3 - 2014/audio/31c3-6162-en-Programming_with_dependent_types_in_Idris_opus.opus 41.5 MB
  • 26C3 - 2009/audio/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.ogg 41.4 MB
  • 34C3 - 2017/34C3 - Home Distilling - deutsche Ubersetzung.mp4 41.3 MB
  • 30C3 - 2013/audio/30c3-5339-en-de-The_Year_in_Crypto_opus.opus 41.2 MB
  • 27C3 - 2010/audio/27c3-4230-de-security_nightmares.ogg 41.1 MB
  • 19C3 - 2002/audio/19C3-392-codeflow-analyse.mp3 41.1 MB
  • 21C3 - 2004/audio/158 How to find anything on the web.mp3 41.1 MB
  • 23C3 - 2006/video/23C3-1446-en-secure_network_server_programming_on_unix.mp4 41.1 MB
  • 30C3 - 2013/audio/30c3-5459-en-de-Security_of_the_IC_Backside_opus.opus 41.0 MB
  • 31C3 - 2014/audio/31c3-6530-en-In_Security_of_Mobile_Banking_opus.opus 41.0 MB
  • 21C3 - 2004/audio/316 Bericht von den BigBrotherAwards.mp3 41.0 MB
  • 30C3 - 2013/video/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4 41.0 MB
  • 23C3 - 2006/audio/23C3-1610-en-fudging_with_firmware.mp3 40.9 MB
  • 21C3 - 2004/video/218 Practical MacOS X Insecurities.mp4 40.8 MB
  • 31C3 - 2014/audio/31c3-5960-en-Revisiting_SSL_TLS_Implementations_opus.opus 40.8 MB
  • 33C3 - 2016/Hacking the World (33c3).mp4 40.8 MB
  • 21C3 - 2004/video/077 Weird Programming 2.mp4 40.7 MB
  • 34C3 - 2017/34C3 - Doping your Fitbit.mp4 40.7 MB
  • 30C3 - 2013/audio/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_opus.opus 40.6 MB
  • 31C3 - 2014/audio/31c3-6417-en-3D_Casting_Aluminum_opus.opus 40.6 MB
  • 21C3 - 2004/video/113 Automated Hacking via Google.mp4 40.6 MB
  • 19C3 - 2002/video/19C3-445-forensik-schluesselspuren.mp4 40.5 MB
  • 31C3 - 2014/video/31c3-6561-en-31C3_Opening_Event_sd.mp4 40.5 MB
  • 34C3 - 2017/34C3 - 0en & 1en auf dem Acker - english translation.mp4 40.5 MB
  • 31C3 - 2014/audio/31c3-5956-en-Cyber_Necromancy_opus.opus 40.5 MB
  • 27C3 - 2010/audio/27c3-4070-de-fnord_jahresrueckblick.ogg 40.5 MB
  • 34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers... - deutsche Ubersetzung.mp4 40.4 MB
  • 32C3 - 2015/audio/32c3-7134-en-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world.opus 40.4 MB
  • 27C3 - 2010/audio/27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg 40.4 MB
  • 34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers....mp4 40.3 MB
  • 30C3 - 2013/audio/30c3-5618-en-Baseband_Exploitation_in_2013_opus.opus 40.3 MB
  • 31C3 - 2014/audio/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_opus.opus 40.3 MB
  • 29C3 - 2012/audio/29c3-5380-de-en-staatstrojaner2012_ogg.ogg 40.3 MB
  • 25C3 - 2008/audio/25c3-3021-de-security_nightmares_2009.ogg 40.3 MB
  • 34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers... - traduction francaise.mp4 40.2 MB
  • 31C3 - 2014/audio/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_opus.opus 40.1 MB
  • 31C3 - 2014/audio/31c3-6214-en-de-Attribution_revolution_opus.opus 40.1 MB
  • 34C3 - 2017/34C3 - 0en & 1en auf dem Acker - La traduccion espanola.mp4 40.1 MB
  • 21C3 - 2004/video/051 Recent features to OpenBSD-ntpd and bgpd.mp4 40.1 MB
  • 31C3 - 2014/audio/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_opus.opus 40.1 MB
  • 30C3 - 2013/audio/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_opus.opus 40.0 MB
  • 21C3 - 2004/video/209 Freedom of expression in new Arab landscape.mp4 40.0 MB
  • 31C3 - 2014/audio/31c3-6369-en-ECCHacks_opus.opus 40.0 MB
  • 31C3 - 2014/audio/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_opus.opus 39.9 MB
  • 34C3 - 2017/34C3 - Antipatterns und Missverständnisse in der Softwareentwicklung.mp4 39.9 MB
  • 19C3 - 2002/video/19C3-440-pop-culture-and-media-hacking.mp4 39.7 MB
  • 19C3 - 2002/video/19C3-463-rsa-padding-angriffe.mp4 39.7 MB
  • 31C3 - 2014/audio/31c3-6255-de-en-10_Jahre_OpenStreetMap_opus.opus 39.7 MB
  • 24C3 - 2007/audio/24c3-2381-en-what_is_terrorism.mp3 39.7 MB
  • 31C3 - 2014/audio/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_opus.opus 39.7 MB
  • 34C3 - 2017/34C3 - Antipatterns und Missverständnisse in der Softwareentwicklung - english translation.mp4 39.7 MB
  • 30C3 - 2013/video/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4 39.6 MB
  • 21C3 - 2004/video/215 The Incomputable Alan Turing.mp4 39.6 MB
  • 31C3 - 2014/audio/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_opus.opus 39.6 MB
  • 25C3 - 2008/audio/25c3-3058-en-security_nightmares_2009_english_interpretation.ogg 39.6 MB
  • 24C3 - 2007/audio/24c3-2363-de-der_bundestrojaner.mp3 39.6 MB
  • 20C3 - 2003/audio/20c3_537_WSIS-An-Overview.ogg 39.5 MB
  • 21C3 - 2004/video/114 Der 2. Korb der Urheberrechtsnovelle.mp4 39.5 MB
  • 21C3 - 2004/video/135 Voting Machine Technology.mp4 39.5 MB
  • 17C3 - 2000/video/17C3_bigbrother.rm 39.5 MB
  • 21C3 - 2004/video/038 Free Software Usage in South America.mp4 39.4 MB
  • 32C3 - 2015/audio/32c3-7369-en-How_to_contribute_to_make_open_hardware_happen.opus 39.4 MB
  • 30C3 - 2013/audio/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_opus.opus 39.3 MB
  • 21C3 - 2004/video/018 Computer und Robotik in Entenhausen.mp4 39.2 MB
  • 30C3 - 2013/audio/30c3-5601-en-de-EUDataP_State_of_the_Union_opus.opus 39.2 MB
  • 34C3 - 2017/34C3 - 0en & 1en auf dem Acker.mp4 39.2 MB
  • 32C3 - 2015/audio/32c3-7375-en-Wireless_Drivers_Freedom_considered_harmful.opus 39.2 MB
  • 29C3 - 2012/audio/29c3-5327-en-writing_a_thumbdrive_from_scratch_ogg.ogg 39.1 MB
  • 34C3 - 2017/34C3 - Designing PCBs with code - deutsche Ubersetzung.mp4 39.1 MB
  • 31C3 - 2014/audio/31c3-6103-en-AMD_x86_SMU_firmware_analysis_opus.opus 39.1 MB
  • 21C3 - 2004/video/098 Portable Software-Installation with pkg source.mp4 38.9 MB
  • 30C3 - 2013/video/30c3-5311-en-lasers_in_space_h264-hq.mp4 38.9 MB
  • 31C3 - 2014/audio/31c3-6361-en-From_Maxwell_to_antenna_arrays_opus.opus 38.7 MB
  • 22C3 - 2005/video/22C3-601-de-fnord_jahresrueckblick.mp4 38.7 MB
  • 31C3 - 2014/audio/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_opus.opus 38.6 MB
  • 30C3 - 2013/audio/30c3-5622-en-de-30c3_Keynote_opus.opus 38.6 MB
  • 27C3 - 2010/audio/27c3-4094-de-netzneutralitaet_und_qos.ogg 38.6 MB
  • 34C3 - 2017/34C3 - Mietshäusersyndikat den Immobilienmarkt hacken - english translation.mp4 38.5 MB
  • 30C3 - 2013/audio/30c3-5214-en-The_Gospel_of_IRMA__opus.opus 38.5 MB
  • 32C3 - 2015/audio/32c3-7133-en-Beyond_your_cable_modem.opus 38.5 MB
  • 20C3 - 2003/audio/20c3_633_Fnord-Jahresrueckschau.ogg 38.5 MB
  • 32C3 - 2015/audio/32c3-7205-de-Netzpolitik_in_der_Schweiz.opus 38.5 MB
  • 26C3 - 2009/audio/26c3-3723-en-stream_fnord-jahresrckblick_2009.ogg 38.4 MB
  • 19C3 - 2002/audio/19C3-380-computer-und-videogame-producer.mp3 38.4 MB
  • 19C3 - 2002/video/19C3-478-ipv6.mp4 38.3 MB
  • 34C3 - 2017/34C3 - Mietshäusersyndikat den Immobilienmarkt hacken.mp4 38.3 MB
  • 24C3 - 2007/video/24c3-2209-en-playstation_portable_cracking_high.mp4 38.3 MB
  • 30C3 - 2013/audio/30c3-5609-en-Infrastructure_Review_opus.opus 38.3 MB
  • 26C3 - 2009/audio/26c3-3658-en-black_ops_of_pki.ogg 38.2 MB
  • 30C3 - 2013/video/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4 38.2 MB
  • 26C3 - 2009/audio/26c3-3613-de-fnord-jahresrckblick_2009.ogg 38.2 MB
  • 31C3 - 2014/audio/31c3-6557-en-de-31C3_Infrastructure_Review_opus.opus 38.1 MB
  • 23C3 - 2006/audio/23C3-1422-en-pornography_and_technology.mp3 38.1 MB
  • 29C3 - 2012/audio/29c3-5336-de-en-sprache_ungleichheit_unfreiheit_ogg.ogg 38.1 MB
  • 32C3 - 2015/audio/32c3-7435-en-Replication_Prohibited.opus 38.0 MB
  • 19C3 - 2002/video/19C3-397-netbsd.mp4 37.9 MB
  • 27C3 - 2010/audio/27c3-4326-de-radio_der_zukunft.ogg 37.9 MB
  • 29C3 - 2012/audio/29c3-5256-en-the_future_of_protocol_reversing_and_simulation_ogg.ogg 37.9 MB
  • 22C3 - 2005/video/22C3-574-en-memory_allocator_security.mp4 37.8 MB
  • 34C3 - 2017/34C3 - Designing PCBs with code.mp4 37.8 MB
  • 33C3 - 2016/33C3 Opening Ceremony (33c3).mp4 37.7 MB
  • 31C3 - 2014/video/31c3-6562-de-en-31C3_Closing_Event_sd.mp4 37.6 MB
  • 19C3 - 2002/audio/19C3-388-attacking-networked-embedded-systems.mp3 37.5 MB
  • 29C3 - 2012/audio/29c3-5306-en-the_tor_software_ecosystem_ogg.ogg 37.4 MB
  • 28C3 - 2011/video/28c3-4899-en-closing_event_h264.mp4 37.4 MB
  • 34C3 - 2017/34C3 - Saving the World with Space Solar Power - deutsche Ubersetzung.mp4 37.3 MB
  • 31C3 - 2014/audio/31c3-5997-en-Preserving_arcade_games_opus.opus 37.2 MB
  • 27C3 - 2010/audio/27c3-4082-en-sap_landscape.ogg 37.2 MB
  • 22C3 - 2005/video/22C3-606-en-autodafe.mp4 37.2 MB
  • 19C3 - 2002/video/19C3-449-smartcards-sosse.mp4 37.2 MB
  • 21C3 - 2004/video/099 GPL fuer Anfaenger.mp4 37.1 MB
  • 29C3 - 2012/audio/29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_ogg.ogg 37.0 MB
  • 30C3 - 2013/audio/30c3-5376-en-Do_You_Think_That_s_Funny__opus.opus 37.0 MB
  • 22C3 - 2005/video/22C3-912-en-lightning_talk_day_2.mp4 37.0 MB
  • 17C3 - 2000/video/17C3_Movie_freedom_downtime_discussion.mp4 37.0 MB
  • 33C3 - 2016/33C3 Opening Ceremony - deutsche Ubersetzung (33c3).mp4 36.9 MB
  • 24C3 - 2007/audio/24c3-2355-de-trecker_fahrn.mp3 36.9 MB
  • 19C3 - 2002/audio/19C3-402-network-hijacking-workshop.mp3 36.9 MB
  • 24C3 - 2007/video/24c3-2214-en-make_cool_things_with_microcontrollers_high.mp4 36.9 MB
  • 34C3 - 2017/34C3 - TrustZone is not enough.mp4 36.9 MB
  • 31C3 - 2014/audio/31c3-5930-en-de-Funky_File_Formats_opus.opus 36.9 MB
  • 33C3 - 2016/Gone in 60 Milliseconds (33c3) - traduction française.mp4 36.9 MB
  • 24C3 - 2007/audio/24c3-2255-de-wahlchaos.mp3 36.8 MB
  • 32C3 - 2015/audio/32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_opus.opus 36.8 MB
  • 19C3 - 2002/video/19C3-428-eroffnung.mp4 36.8 MB
  • 24C3 - 2007/audio/24c3-2192-de-elektronische_dokumente.mp3 36.8 MB
  • 28C3 - 2011/audio/28c3-4936-en-fnord_jahresrueckblick.ogg 36.7 MB
  • 34C3 - 2017/34C3 - TrustZone is not enough - deutsche Ubersetzung.mp4 36.7 MB
  • 31C3 - 2014/audio/31c3-6321-en-de-The_Matter_of_Heartbleed_opus.opus 36.7 MB
  • 28C3 - 2011/audio/28c3-4866-de-fnord_jahresrueckblick.ogg 36.6 MB
  • 31C3 - 2014/audio/31c3-6234-en-The_eXperimental_Robot_Project_opus.opus 36.5 MB
  • 20C3 - 2003/video/20C3-644-Gute-Antennen-selber-bauen.mp4 36.4 MB
  • 29C3 - 2012/audio/29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_ogg.ogg 36.3 MB
  • 34C3 - 2017/34C3 - Saving the World with Space Solar Power.mp4 36.1 MB
  • 22C3 - 2005/video/22C3-469-en-learning_cryptography.mp4 35.9 MB
  • 17C3 - 2000/video/17C3_AndyMM_WauHolland_Rueckblick.mp4 35.9 MB
  • 24C3 - 2007/video/24c3-2340-de-absurde_mathematik_high.mp4 35.9 MB
  • 27C3 - 2010/audio/27c3-4265-en-hacking_smart_phones.ogg 35.8 MB
  • 29C3 - 2012/audio/29c3-5230-en-stylometry_and_online_underground_markets_ogg.ogg 35.8 MB
  • 26C3 - 2009/audio/26c3-3520-en-conlanging_101.ogg 35.8 MB
  • 21C3 - 2004/video/146 Mehr Sicherheit fuer HostAP-WLANs.mp4 35.8 MB
  • 30C3 - 2013/video/30c3-5319-en-Technomonopolies_h264-hq.mp4 35.7 MB
  • 21C3 - 2004/bonus/21C3_-_The_Network_Equipment_Delivery.mp4 35.6 MB
  • 22C3 - 2005/audio/22C3-559-en-xbox_hacking.m4a 35.5 MB
  • 21C3 - 2004/video/111 The Kernel Accelerator Device.mp4 35.4 MB
  • 24C3 - 2007/audio/24c3-2293-en-what_can_we_do_to_counter_the_spies.mp3 35.4 MB
  • 30C3 - 2013/audio/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_opus.opus 35.4 MB
  • 32C3 - 2015/audio/32c3-7321-en-re_cycle.opus 35.4 MB
  • 29C3 - 2012/audio/29c3-5305-en-long_live_the_protocoletariat_ogg.ogg 35.3 MB
  • 27C3 - 2010/audio/27c3-4061-en-building_custom_disassemblers.ogg 35.3 MB
  • 24C3 - 2007/audio/24c3-2241-de-das_panoptische_prinzip.mp3 35.3 MB
  • 30C3 - 2013/audio/30c3-5606-de-en-Closing_Event_opus.opus 35.2 MB
  • 29C3 - 2012/audio/29c3-5397-de-en-indect_verhaltenserkennung_ogg.ogg 35.2 MB
  • 25C3 - 2008/audio/25c3-2639-en-attacking_nfc_mobile_phones.ogg 35.2 MB
  • 27C3 - 2010/audio/27c3-4239-en-lightning_talks_d3.ogg 35.1 MB
  • 17C3 - 2000/video/17C3_telekom_ueberwachung.rm 35.1 MB
  • 29C3 - 2012/audio/29c3-5319-en-certificate_authority_collapse_ogg.ogg 35.1 MB
  • 21C3 - 2004/video/130 Physical Security Pt 1.mp4 34.9 MB
  • 20C3 - 2003/audio/20c3_538_Practical-Win32-ans-Unicode-exploitation.ogg 34.8 MB
  • 26C3 - 2009/audio/26c3-3494-de-defending_the_poor.ogg 34.8 MB
  • 23C3 - 2006/audio/23C3-1692-en-hacking_the_electoral_law.mp3 34.8 MB
  • 21C3 - 2004/video/131 Learning OpenPGP by Example.mp4 34.8 MB
  • 29C3 - 2012/audio/29c3-5159-en-defend_freedoms_online_ogg.ogg 34.7 MB
  • 29C3 - 2012/audio/29c3-5024-en-hackers_as_a_highrisk_population_ogg.ogg 34.7 MB
  • 26C3 - 2009/audio/26c3-3711-de-computerspielepolitik.ogg 34.7 MB
  • 24C3 - 2007/audio/24c3-2158-en-the_arctic_cold_war.mp3 34.7 MB
  • 24C3 - 2007/audio/24c3-2272-en-hacking_in_the_age_of_declining_everything.mp3 34.7 MB
  • 30C3 - 2013/audio/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_opus.opus 34.6 MB
  • 23C3 - 2006/audio/23C3-1418-de-trust_your_eyes.mp3 34.6 MB
  • 23C3 - 2006/audio/23C3-1600-en-biometrics.mp3 34.6 MB
  • 25C3 - 2008/audio/25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg 34.5 MB
  • 31C3 - 2014/audio/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_opus.opus 34.5 MB
  • 20C3 - 2003/video/20C3-560-Soziale_Software.mp4 34.4 MB
  • 29C3 - 2012/audio/29c3-5287-de-en-hinter_den_kulissen_nsu_ogg.ogg 34.4 MB
  • 26C3 - 2009/audio/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.ogg 34.3 MB
  • 30C3 - 2013/audio/30c3-5449-en-Mobile_network_attack_evolution_opus.opus 34.2 MB
  • 33C3 - 2016/The DROWN Attack (33c3).mp4 34.1 MB
  • 24C3 - 2007/audio/24c3-2329-en-change_me.mp3 34.0 MB
  • 29C3 - 2012/audio/29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_ogg.ogg 34.0 MB
  • 30C3 - 2013/audio/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_opus.opus 34.0 MB
  • 29C3 - 2012/audio/29c3-5195-en-executable_metadata_ogg.ogg 34.0 MB
  • 24C3 - 2007/audio/24c3-2382-de-tor.mp3 33.9 MB
  • 32C3 - 2015/audio/32c3-7540-en-Maker_Spaces_in_Favelas_-_Lecture.opus 33.9 MB
  • 29C3 - 2012/audio/29c3-5124-en-low_cost_chip_microprobing_ogg.ogg 33.9 MB
  • 28C3 - 2011/audio/28c3-4832-de-neue_leichtigkeit.ogg 33.9 MB
  • 32C3 - 2015/audio/32c3-7294-en-Sanitizing_PCAPs.opus 33.8 MB
  • 22C3 - 2005/audio/22C3-789-en-hacker_jeopardy.m4a 33.7 MB
  • 29C3 - 2012/audio/29c3-5146-en-an_overview_of_secure_name_resolution_ogg.ogg 33.7 MB
  • 22C3 - 2005/audio/22C3-537-en-fuzzing.m4a 33.7 MB
  • 26C3 - 2009/audio/26c3-3654-en-gsm_srsly.ogg 33.7 MB
  • 29C3 - 2012/audio/29c3-5401-de-en-der_mord_faellt_aus_ogg.ogg 33.7 MB
  • 32C3 - 2015/audio/32c3-7236-en-Thunderstrike_2.opus 33.6 MB
  • 29C3 - 2012/audio/29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_ogg.ogg 33.6 MB
  • 30C3 - 2013/audio/30c3-5443-en-Introduction_to_Processor_Design_opus.opus 33.5 MB
  • 24C3 - 2007/audio/24c3-2393-en-dns_rebinding_packet_tricks.mp3 33.5 MB
  • 29C3 - 2012/audio/29c3-5237-en-a_rambling_walk_through_an_emv_transaction_ogg.ogg 33.5 MB
  • 29C3 - 2012/audio/29c3-5266-de-en-proximax_telex_flashproxy_ogg.ogg 33.5 MB
  • 25C3 - 2008/audio/25c3-2773-en-soviet_unterzoegersdorf.ogg 33.5 MB
  • 22C3 - 2005/audio/22C3-790-de-nerds_kochen.m4a 33.5 MB
  • 21C3 - 2004/video/045 Internet Censorship in China.mp4 33.4 MB
  • 25C3 - 2008/audio/25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg 33.4 MB
  • 29C3 - 2012/audio/29c3-5323-de-en-pflanzenhacken_richtig_ogg.ogg 33.4 MB
  • 27C3 - 2010/audio/27c3-4145-en-spoilers_human_interfaces_airplanes.ogg 33.3 MB
  • 29C3 - 2012/audio/29c3-5274-en-grand_eu_data_protection_reform_ogg.ogg 33.3 MB
  • 29C3 - 2012/audio/29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_ogg.ogg 33.3 MB
  • 20C3 - 2003/audio/20c3_598_trustbased-P2P-WYMIWYG-KnoBot-project.ogg 33.3 MB
  • 29C3 - 2012/audio/29c3-5299-de-en-best_of_verfassungsschutz_ogg.ogg 33.3 MB
  • 24C3 - 2007/audio/24c3-2289-en-card_payment.mp3 33.3 MB
  • 20C3 - 2003/audio/20c3_591_Berichte-von-den-BigBrother-Awards.ogg 33.2 MB
  • 29C3 - 2012/audio/29c3-5333-en-gsm_cell_phone_network_review_ogg.ogg 33.1 MB
  • 26C3 - 2009/audio/26c3-3570-en-weaponizing_cultural_viruses.ogg 33.1 MB
  • 24C3 - 2007/audio/24c3-2311-en-hacking_ideologies_2.mp3 33.0 MB
  • 22C3 - 2005/video/22C3-496-en-22c3_network.mp4 33.0 MB
  • 28C3 - 2011/audio/28c3-4788-de-datenvieh_oder_daten_fee.ogg 32.9 MB
  • 30C3 - 2013/audio/30c3-5192-en-Android_DDI_opus.opus 32.9 MB
  • 26C3 - 2009/audio/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.ogg 32.9 MB
  • 30C3 - 2013/audio/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_opus.opus 32.9 MB
  • 29C3 - 2012/audio/29c3-5160-en-transparenzgesetz_hh_ogg.ogg 32.9 MB
  • 27C3 - 2010/audio/27c3-4187-en-your_infrastructure_will_kill_you.ogg 32.9 MB
  • 30C3 - 2013/audio/30c3-5554-en-Magic_Lantern_opus.opus 32.8 MB
  • 30C3 - 2013/audio/30c3-5468-en-We_only_have_one_earth_opus.opus 32.8 MB
  • 29C3 - 2012/audio/29c3-5393-en-milking_the_digital_cash_cow_ogg.ogg 32.8 MB
  • 30C3 - 2013/audio/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_opus.opus 32.8 MB
  • 29C3 - 2012/audio/29c3-5289-de-en-meldegesetz_ogg.ogg 32.8 MB
  • 29C3 - 2012/audio/29c3-5225-en-security_evaluation_of_russian_gost_cipher_ogg.ogg 32.8 MB
  • 30C3 - 2013/audio/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_opus.opus 32.7 MB
  • 28C3 - 2011/audio/28c3-4581-en-taking_control_over_the_tor_network.ogg 32.7 MB
  • 25C3 - 2008/audio/25c3-3030-en-messing_around_with_garage_doors.ogg 32.7 MB
  • 30C3 - 2013/audio/30c3-5412-en-Bug_class_genocide_opus.opus 32.7 MB
  • 29C3 - 2012/audio/29c3-5102-de-en-digiges_ogg.ogg 32.6 MB
  • 24C3 - 2007/audio/24c3-2279-en-deconstructing_xbox_360_security.mp3 32.6 MB
  • 29C3 - 2012/audio/29c3-5121-de-en-sind_faire_computer_moeglich_ogg.ogg 32.6 MB
  • 29C3 - 2012/audio/29c3-5417-en-cve_2011_3402_analysis_ogg.ogg 32.5 MB
  • 30C3 - 2013/audio/30c3-5587-en-Making_machines_that_make_opus.opus 32.5 MB
  • 23C3 - 2006/audio/23C3-1667-de-jabber_showcase.mp3 32.4 MB
  • 29C3 - 2012/audio/29c3-5239-en-smart_meter_ogg.ogg 32.4 MB
  • 21C3 - 2004/video/108 The Convergence of Anti-Counterfeiting and Computer Security.mp4 32.4 MB
  • 31C3 - 2014/audio/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_opus.opus 32.4 MB
  • 29C3 - 2012/audio/29c3-5402-en-russias_surveillance_state_ogg.ogg 32.3 MB
  • 30C3 - 2013/audio/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_opus.opus 32.3 MB
  • 30C3 - 2013/audio/30c3-5304-en-CounterStrike_opus.opus 32.3 MB
  • 32C3 - 2015/audio/32c3-7543-de-The_mummy_unwrapped.opus 32.3 MB
  • 29C3 - 2012/audio/29c3-5179-de-en-hacking_philosophy_ogg.ogg 32.3 MB
  • 28C3 - 2011/audio/28c3-4928-en-kinectfusion.ogg 32.2 MB
  • 21C3 - 2004/audio/129 Die Propagandawueste des realen Krieges.mp3 32.2 MB
  • 27C3 - 2010/audio/27c3-4237-en-indect_eu_surveillance_project.ogg 32.2 MB
  • 19C3 - 2002/audio/19C3-453-die-fuenf-pforten-der-manipulation.mp3 32.2 MB
  • 22C3 - 2005/video/22C3-864-de-das_geheimnis_reloaded.mp4 32.2 MB
  • 30C3 - 2013/audio/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_opus.opus 32.2 MB
  • 24C3 - 2007/audio/24c3-2290-en-overtaking_proprietary_software.mp3 32.2 MB
  • 29C3 - 2012/audio/29c3-5265-en-page_fault_liberation_army_ogg.ogg 32.1 MB
  • 28C3 - 2011/audio/28c3-4930-en-black_ops_of_tcpip_2011.ogg 32.0 MB
  • 29C3 - 2012/audio/29c3-5282-de-en-rfidkleidung_ogg.ogg 32.0 MB
  • 30C3 - 2013/audio/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_opus.opus 32.0 MB
  • 27C3 - 2010/audio/27c3-4090-en-baseband_apocalypse.ogg 32.0 MB
  • 30C3 - 2013/audio/30c3-5713-en-de-To_Protect_And_Infect_Part_2_opus.opus 32.0 MB
  • 29C3 - 2012/audio/29c3-5382-de-en-antiterrordatei_ogg.ogg 32.0 MB
  • 26C3 - 2009/audio/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.ogg 31.9 MB
  • 29C3 - 2012/audio/29c3-5152-en-hashflooding_dos_reloaded_ogg.ogg 31.9 MB
  • 30C3 - 2013/audio/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_opus.opus 31.9 MB
  • 29C3 - 2012/audio/29c3-5219-en-how_i_met_your_pointer_ogg.ogg 31.9 MB
  • 28C3 - 2011/audio/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.ogg 31.9 MB
  • 30C3 - 2013/audio/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__opus.opus 31.8 MB
  • 27C3 - 2010/audio/27c3-4276-en-cognitive_psychology_for_hackers.ogg 31.8 MB
  • 30C3 - 2013/audio/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_opus.opus 31.8 MB
  • 29C3 - 2012/audio/29c3-5283-de-en-whiteit_cleanit_ceocoalition_ogg.ogg 31.7 MB
  • 29C3 - 2012/audio/29c3-5385-en-not_my_department_ogg.ogg 31.7 MB
  • 30C3 - 2013/audio/30c3-5590-en-White-Box_Cryptography_opus.opus 31.7 MB
  • 27C3 - 2010/audio/27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg 31.7 MB
  • 24C3 - 2007/audio/24c3-2227-en-hacking_scada.mp3 31.7 MB
  • 30C3 - 2013/audio/30c3-5210-de-en-Bullshit_made_in_Germany_opus.opus 31.7 MB
  • 29C3 - 2012/audio/29c3-5167-en-setting_mobile_phones_free_ogg.ogg 31.6 MB
  • 24C3 - 2007/audio/24c3-2281-en-haxe.mp3 31.6 MB
  • 24C3 - 2007/audio/24c3-2383-en-data_retention.mp3 31.6 MB
  • 30C3 - 2013/audio/30c3-5495-en-Concepts_for_global_TSCM_opus.opus 31.6 MB
  • 20C3 - 2003/audio/20c3_588_Schummeln-in-oeffentlichen-Projekten.ogg 31.5 MB
  • 32C3 - 2015/audio/32c3-7130-en-The_Perl_Jam_2.opus 31.5 MB
  • 30C3 - 2013/audio/30c3-5532-de-en-Die_Drohnenkriege_opus.opus 31.5 MB
  • 26C3 - 2009/audio/26c3-3590-de-europische_biometriestrategien.ogg 31.4 MB
  • 28C3 - 2011/audio/28c3-4675-de-politik_neusprech_2011.ogg 31.4 MB
  • 30C3 - 2013/audio/30c3-5395-en-Towards_an_affordable_brain-computer-interface_opus.opus 31.4 MB
  • 27C3 - 2010/audio/27c3-4253-en-pentanews_game_show.ogg 31.4 MB
  • 24C3 - 2007/audio/24c3-2245-en-how_to_reach_digital_sustainability.mp3 31.4 MB
  • 29C3 - 2012/audio/29c3-5301-en-defeating_windows_memory_forensics_ogg.ogg 31.4 MB
  • 24C3 - 2007/audio/24c3-2346-de-meine_finger_gehoeren_mir.mp3 31.4 MB
  • 29C3 - 2012/audio/29c3-5181-de-die_wahrheit_was_wirklich_passierte_ogg.ogg 31.3 MB
  • 28C3 - 2011/audio/28c3-4799-de-can_trains_be_hacked.ogg 31.3 MB
  • 28C3 - 2011/audio/28c3-4798-en-sovereign_keys.ogg 31.3 MB
  • 19C3 - 2002/audio/19C3-406-chipkarten-und-ueberwachung.mp3 31.3 MB
  • 30C3 - 2013/audio/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_opus.opus 31.3 MB
  • 28C3 - 2011/audio/28c3-4713-en-what_is_in_a_name.ogg 31.3 MB
  • 27C3 - 2010/audio/27c3-4123-en-defense_is_not_dead.ogg 31.3 MB
  • 29C3 - 2012/audio/29c3-5059-en-scada_strangelove_ogg.ogg 31.2 MB
  • 27C3 - 2010/audio/27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg 31.2 MB
  • 30C3 - 2013/audio/30c3-5613-en-Forbidden_Fruit_opus.opus 31.2 MB
  • 27C3 - 2010/audio/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg 31.1 MB
  • 26C3 - 2009/audio/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.ogg 31.1 MB
  • 23C3 - 2006/audio/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp3 31.1 MB
  • 26C3 - 2009/audio/26c3-3540-en-a_hackers_utopia.ogg 31.1 MB
  • 30C3 - 2013/audio/30c3-5290-en-Console_Hacking_2013_opus.opus 31.1 MB
  • 24C3 - 2007/audio/24c3-2333-de-spiel_freude_eierkuchen.mp3 31.0 MB
  • 25C3 - 2008/audio/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg 31.0 MB
  • 26C3 - 2009/audio/26c3-3554-de-tor_and_censorship_lessons_learned.ogg 31.0 MB
  • 29C3 - 2012/audio/29c3-5400-en-hacking_cisco_phones_ogg.ogg 31.0 MB
  • 30C3 - 2013/audio/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_opus.opus 30.9 MB
  • 27C3 - 2010/audio/27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg 30.9 MB
  • 28C3 - 2011/audio/28c3-4780-en-print_me_if_you_dare.ogg 30.9 MB
  • 30C3 - 2013/video/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4 30.8 MB
  • 30C3 - 2013/audio/30c3-5337-de-en-Kryptographie_nach_Snowden_opus.opus 30.8 MB
  • 27C3 - 2010/audio/27c3-4208-en-wideband_gsm_sniffing.ogg 30.8 MB
  • 30C3 - 2013/audio/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_opus.opus 30.7 MB
  • 29C3 - 2012/audio/29c3-5044-en-time_is_not_on_your_side_ogg.ogg 30.7 MB
  • 27C3 - 2010/audio/27c3-4125-de-spinning_the_electronic_wheel.ogg 30.7 MB
  • 26C3 - 2009/audio/26c3-3464-de-liquid_democracy.ogg 30.7 MB
  • 25C3 - 2008/audio/25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg 30.7 MB
  • 20C3 - 2003/audio/20c3_576_Free-WLANs-for-the-masses.ogg 30.7 MB
  • 26C3 - 2009/audio/26c3-3567-en-wikileaks_release_10.ogg 30.6 MB
  • 30C3 - 2013/audio/30c3-5186-en-Programming_FPGAs_with_PSHDL_opus.opus 30.6 MB
  • 21C3 - 2004/audio/059 Wikipedia Sociographics.mp3 30.6 MB
  • 27C3 - 2010/audio/27c3-4151-en-android_geolocation_using_gsm_network.ogg 30.6 MB
  • 28C3 - 2011/audio/28c3-4706-en-power_gadgets_with_your_own_electricity.ogg 30.6 MB
  • 28C3 - 2011/audio/28c3-4814-en-behind_the_scenes_of_a_c64_demo.ogg 30.6 MB
  • 26C3 - 2009/audio/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.ogg 30.6 MB
  • 29C3 - 2012/audio/29c3-5395-en-howto_hack_the_law_ogg.ogg 30.6 MB
  • 28C3 - 2011/audio/28c3-4663-en-cellular_protocol_stacks_for_internet.ogg 30.6 MB
  • 30C3 - 2013/audio/30c3-5334-en-RFID_Treehouse_of_Horror_opus.opus 30.6 MB
  • 26C3 - 2009/audio/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.ogg 30.5 MB
  • 30C3 - 2013/audio/30c3-5611-en-Hello_World__opus.opus 30.5 MB
  • 24C3 - 2007/audio/24c3-2378-en-mifare_security.mp3 30.5 MB
  • 28C3 - 2011/audio/28c3-4735-en-reverse_engineering_a_qualcomm_baseband.ogg 30.5 MB
  • 28C3 - 2011/audio/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.ogg 30.5 MB
  • 26C3 - 2009/audio/26c3-3592-de-cybernetic_cannibalism.ogg 30.4 MB
  • 20C3 - 2003/video/20C3-531-NOC_Preview.mp4 30.4 MB
  • 28C3 - 2011/audio/28c3-4660-en-post_memory_corruption_memory_analysis.ogg 30.4 MB
  • 29C3 - 2012/audio/29c3-5262-de-en-anderthalb_jahre_fragdenstaat_ogg.ogg 30.4 MB
  • 30C3 - 2013/audio/30c3-5305-en-Breaking_Baryons_opus.opus 30.4 MB
  • 27C3 - 2010/audio/27c3-4149-en-i_control_your_code.ogg 30.4 MB
  • 28C3 - 2011/audio/28c3-4746-en-bitcoin_an_analysis.ogg 30.3 MB
  • 26C3 - 2009/audio/26c3-3709-en-legic_prime_obscurity_in_depth.ogg 30.3 MB
  • 27C3 - 2010/audio/27c3-4295-en-high_speed_high_security_cryptography.ogg 30.2 MB
  • 30C3 - 2013/audio/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_opus.opus 30.2 MB
  • 30C3 - 2013/audio/30c3-5293-de-en-Dead_Man_Edition_opus.opus 30.2 MB
  • 28C3 - 2011/audio/28c3-4669-en-bionic_ears.ogg 30.1 MB
  • 30C3 - 2013/audio/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_opus.opus 30.1 MB
  • 27C3 - 2010/audio/27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg 30.0 MB
  • 28C3 - 2011/audio/28c3-4764-en-automatic_algorithm_invention_with_a_gpu.ogg 30.0 MB
  • 26C3 - 2009/audio/26c3-3266-de-hacking_the_universe.ogg 30.0 MB
  • 23C3 - 2006/audio/23C3-1727-en-closing_ceremony.mp3 30.0 MB
  • 21C3 - 2004/audio/126 Apache Security.mp3 30.0 MB
  • 27C3 - 2010/audio/27c3-4339-en-openleaks.ogg 29.9 MB
  • 30C3 - 2013/audio/30c3-5476-en-Electronic_Bank_Robberies_opus.opus 29.9 MB
  • 25C3 - 2008/audio/25c3-2860-de-neusprech_im_berwachungsstaat.ogg 29.9 MB
  • 27C3 - 2010/audio/27c3-4060-en-attacking_mobile_phones.ogg 29.9 MB
  • 26C3 - 2009/audio/26c3-3481-de-leyen-rhetorik.ogg 29.8 MB
  • 26C3 - 2009/audio/26c3-3648-en-dect_part_ii.ogg 29.8 MB
  • 27C3 - 2010/audio/27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg 29.8 MB
  • 28C3 - 2011/audio/28c3-4668-en-electronic_money.ogg 29.8 MB
  • 21C3 - 2004/audio/171 Siegerehrung Lockpicking.mp3 29.7 MB
  • 30C3 - 2013/audio/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_opus.opus 29.7 MB
  • 24C3 - 2007/audio/24c3-2387-en-open_source_lobbying.mp3 29.7 MB
  • 29C3 - 2012/audio/29c3-5112-en-isps_black_box_ogg.ogg 29.7 MB
  • 21C3 - 2004/audio/120 Softwarepatente - Ruestzeug zur Debatte.mp3 29.6 MB
  • 19C3 - 2002/video/19C3-435-ccc-jahresrueckblick.mp4 29.6 MB
  • 28C3 - 2011/audio/28c3-4640-en-time_is_on_my_side.ogg 29.6 MB
  • 26C3 - 2009/audio/26c3-3713-de-unbild__pictures_and_non-pictures.ogg 29.6 MB
  • 29C3 - 2012/audio/29c3-5178-en-the_ultimate_galaksija_talk_ogg.ogg 29.6 MB
  • 21C3 - 2004/audio/046 Tollcollect.mp3 29.6 MB
  • 30C3 - 2013/audio/30c3-5416-en-de-Desperately_Seeking_Susy_opus.opus 29.5 MB
  • 28C3 - 2011/audio/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.ogg 29.5 MB
  • 28C3 - 2011/audio/28c3-4897-en-keynote.ogg 29.5 MB
  • 21C3 - 2004/audio/133 How to Herd Cats.mp3 29.5 MB
  • 29C3 - 2012/audio/29c3-5095-en-privacy_and_the_car_of_the_future_ogg.ogg 29.5 MB
  • 21C3 - 2004/audio/013 The Art of Fingerprinting.mp3 29.4 MB
  • 26C3 - 2009/audio/26c3-3573-en-playing_with_the_built_city.ogg 29.4 MB
  • 26C3 - 2009/audio/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.ogg 29.4 MB
  • 24C3 - 2007/audio/24c3-2233-en-vx.mp3 29.4 MB
  • 15C3 - 1998/audio/isdn_grundlagen.mp3 29.4 MB
  • 27C3 - 2010/audio/27c3-4231-en-datenrettung_fun_with_hard_drives.ogg 29.3 MB
  • 29C3 - 2012/audio/29c3-5085-en-everycook_ogg.ogg 29.3 MB
  • 19C3 - 2002/audio/19C3-432-sicherheit-zeitliche-dimension.mp3 29.3 MB
  • 27C3 - 2010/audio/27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg 29.3 MB
  • 26C3 - 2009/audio/26c3-3547-en-after_the_hype.ogg 29.3 MB
  • 27C3 - 2010/audio/27c3-4190-en-data_retention_in_the_eu.ogg 29.3 MB
  • 24C3 - 2007/audio/24c3-2401-en-anonymity_for_2015.mp3 29.2 MB
  • 28C3 - 2011/audio/28c3-4813-en-macro_dragnets.ogg 29.2 MB
  • 27C3 - 2010/audio/27c3-4297-de-die_gesamte_technik_ist_sicher.ogg 29.2 MB
  • 22C3 - 2005/audio/22C3-536-en-bluetooth_hacking.m4a 29.2 MB
  • 28C3 - 2011/audio/28c3-4754-en-smart_hacking_for_privacy.ogg 29.2 MB
  • 28C3 - 2011/audio/28c3-4700-en-what_is_whiteit.ogg 29.2 MB
  • 27C3 - 2010/audio/27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg 29.2 MB
  • 24C3 - 2007/audio/24c3-2358-en-guerilla_knitting.mp3 29.1 MB
  • 26C3 - 2009/audio/26c3-3452-en-here_be_electric_dragons.ogg 29.1 MB
  • 26C3 - 2009/audio/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.ogg 29.1 MB
  • 26C3 - 2009/audio/26c3-3696-en-wireless_power_transfer.ogg 29.1 MB
  • 30C3 - 2013/audio/30c3-5433-de-en-Recht_auf_Remix_opus.opus 29.1 MB
  • 26C3 - 2009/audio/26c3-3510-de-technik_des_neuen_epa.ogg 29.0 MB
  • 24C3 - 2007/audio/24c3-2396-en-eu_rfid_policy.mp3 29.0 MB
  • 28C3 - 2011/audio/28c3-4738-de-echtes_netz.ogg 29.0 MB
  • 29C3 - 2012/audio/29c3-5308-de-en-open_source_schluessel_und_schloesser_ogg.ogg 28.9 MB
  • 28C3 - 2011/audio/28c3-4781-en-deceiving_authorship_detection.ogg 28.9 MB
  • 27C3 - 2010/audio/27c3-4183-en-safety_on_open_sea.ogg 28.9 MB
  • 30C3 - 2013/audio/30c3-5298-en-de-Rock_em_Graphic_Cards_opus.opus 28.9 MB
  • 30C3 - 2013/audio/30c3-5552-en-India_s_Surveillance_State_opus.opus 28.9 MB
  • 30C3 - 2013/audio/30c3-5377-de-en-UEberwachen_und_Sprache_opus.opus 28.9 MB
  • 29C3 - 2012/audio/29c3-5396-de-en-gender_studies_informatik_ogg.ogg 28.9 MB
  • 26C3 - 2009/audio/26c3-3577-de-privacy-enhanced_event_scheduling.ogg 28.9 MB
  • 26C3 - 2009/audio/26c3-3657-en-optimised_to_fail.ogg 28.8 MB
  • 28C3 - 2011/audio/28c3-4821-en-not_your_grandfathers_moon_landing.ogg 28.8 MB
  • 28C3 - 2011/audio/28c3-4913-de-almighty_dna_and_beyond.ogg 28.8 MB
  • 24C3 - 2007/audio/24c3-2342-en-it_was_a_bad_idea_anyway.mp3 28.8 MB
  • 25C3 - 2008/audio/25c3-3016-en-life_is_a_holodeck.ogg 28.8 MB
  • 24C3 - 2007/audio/24c3-2286-en-openstreetmap.mp3 28.8 MB
  • 31C3 - 2014/audio/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_opus.opus 28.8 MB
  • 27C3 - 2010/audio/27c3-4236-en-international_cyber_jurisdiction.ogg 28.8 MB
  • 28C3 - 2011/audio/28c3-4763-en-the_science_of_insecurity.ogg 28.8 MB
  • 28C3 - 2011/audio/28c3-4648-en-quantum_of_science.ogg 28.7 MB
  • 26C3 - 2009/audio/26c3-3557-de-vom_kreationismus_zum_kollektivismus.ogg 28.7 MB
  • 27C3 - 2010/audio/27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg 28.7 MB
  • 26C3 - 2009/audio/26c3-3600-de-location_tracking_does_scale_up.ogg 28.7 MB
  • 29C3 - 2012/audio/29c3-5177-en-securing_the_campaign_ogg.ogg 28.7 MB
  • 27C3 - 2010/audio/27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg 28.7 MB
  • 28C3 - 2011/audio/28c3-4761-en-new_ways_im_going_to_hack_your_web_app.ogg 28.6 MB
  • 30C3 - 2013/audio/30c3-5415-de-en-Der_tiefe_Staat_opus.opus 28.6 MB
  • 27C3 - 2010/audio/27c3-4143-en-parttimescientists.ogg 28.6 MB
  • 31C3 - 2014/audio/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_opus.opus 28.6 MB
  • 21C3 - 2004/audio/159 State of Emergent Democracy.mp3 28.6 MB
  • 23C3 - 2006/audio/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp3 28.6 MB
  • 25C3 - 2008/audio/25c3-2937-en-dect.ogg 28.5 MB
  • 27C3 - 2010/audio/27c3-4245-en-adventures_in_analyzing_stuxnet.ogg 28.5 MB
  • 24C3 - 2007/audio/24c3-2225-en-paparazzi.mp3 28.5 MB
  • 26C3 - 2009/audio/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.ogg 28.5 MB
  • 28C3 - 2011/audio/28c3-4755-en-counterlobbying_eu_institutions.ogg 28.4 MB
  • 21C3 - 2004/video/057 SUN Bloody Daft Solaris Mechanisms.mp4 28.4 MB
  • 20C3 - 2003/video/20C3-610-Abschlussveranstaltung.mp4 28.4 MB
  • 26C3 - 2009/audio/26c3-3468-de-privacy__stylometry.ogg 28.3 MB
  • 29C3 - 2012/audio/29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_ogg.ogg 28.3 MB
  • 27C3 - 2010/audio/27c3-4301-en-flow_analysis_of_internet_activities.ogg 28.3 MB
  • 31C3 - 2014/audio/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_opus.opus 28.3 MB
  • 30C3 - 2013/audio/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_opus.opus 28.3 MB
  • 30C3 - 2013/audio/30c3-5444-en-Attacking_HomeMatic_opus.opus 28.3 MB
  • 30C3 - 2013/audio/30c3-5223-en-WarGames_in_memory_opus.opus 28.3 MB
  • 30C3 - 2013/video/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4 28.2 MB
  • 21C3 - 2004/audio/078 Aspects of Elliptic Curve Cryptography.mp3 28.2 MB
  • 25C3 - 2008/audio/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg 28.2 MB
  • 30C3 - 2013/audio/30c3-5360-en-Script_Your_Car__opus.opus 28.2 MB
  • 21C3 - 2004/audio/019 Verdeckte Netzwerkanalyse.mp3 28.2 MB
  • 27C3 - 2010/audio/27c3-4121-en-is_the_ssliverse_a_safe_place.ogg 28.1 MB
  • 24C3 - 2007/audio/24c3-2288-de-verschwoerungstheorien.mp3 28.1 MB
  • 29C3 - 2012/audio/29c3-5216-en-let_me_answer_that_for_you_ogg.ogg 28.1 MB
  • 24C3 - 2007/audio/24c3-2331-en-spotter_guide_to_aacs_keys.mp3 28.1 MB
  • 27C3 - 2010/audio/27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg 28.1 MB
  • 24C3 - 2007/audio/24c3-2213-de-getting_things_done.mp3 28.0 MB
  • 28C3 - 2011/audio/28c3-4871-en-hacking_mfps.ogg 28.0 MB
  • 19C3 - 2002/video/19C3-429-abschlussveranstaltung.mp4 28.0 MB
  • 30C3 - 2013/audio/30c3-5526-en-How_to_Build_a_Mind_opus.opus 28.0 MB
  • 25C3 - 2008/audio/25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg 28.0 MB
  • 29C3 - 2012/audio/29c3-5134-en-new_human_interfaces_for_music_ogg.ogg 28.0 MB
  • 30C3 - 2013/audio/30C3_-_5622_-_en_-_30c3_keynote_-_glenn_greenwald_-_frank-direct.opus 28.0 MB
  • 28C3 - 2011/audio/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.ogg 28.0 MB
  • 26C3 - 2009/audio/26c3-3501-en-why_net_neutrality_matters.ogg 28.0 MB
  • 21C3 - 2004/audio/168 Spampolitik.mp3 28.0 MB
  • 21C3 - 2004/audio/072 The Reality of Network Address Translators.mp3 28.0 MB
  • 24C3 - 2007/audio/24c3-2292-en-wireless_kernel_tweaking.mp3 28.0 MB
  • 27C3 - 2010/audio/27c3-4211-en-chip_and_pin_is_broken.ogg 27.9 MB
  • 28C3 - 2011/audio/28c3-4736-en-defending_mobile_phones.ogg 27.9 MB
  • 30C3 - 2013/audio/30c3-5185-en-FPGA_101_opus.opus 27.9 MB
  • 28C3 - 2011/audio/28c3-4804-de-politik_hacken.ogg 27.9 MB
  • 25C3 - 2008/audio/25c3-2991-en-terrorist_all-stars.ogg 27.9 MB
  • 32C3 - 2015/audio/32c3-7102-de-Crypto_ist_Abwehr_IFG_ist_Angriff.opus 27.8 MB
  • 30C3 - 2013/audio/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_opus.opus 27.8 MB
  • 24C3 - 2007/audio/24c3-2280-en-i_know_who_you_clicked_last_summer.mp3 27.8 MB
  • 27C3 - 2010/audio/27c3-4221-en-omg_wtf_pdf.ogg 27.8 MB
  • 23C3 - 2006/audio/23C3-1576-en-rfid_hacking.mp3 27.8 MB
  • 25C3 - 2008/audio/25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg 27.8 MB
  • 28C3 - 2011/audio/28c3-4766-en-802_11_packets_in_packets.ogg 27.7 MB
  • 30C3 - 2013/audio/30c3-5474-en-World_War_II_Hackers_opus.opus 27.7 MB
  • 26C3 - 2009/audio/26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.ogg 27.7 MB
  • 25C3 - 2008/audio/25c3-2934-en-blinkenlights_stereoscope.ogg 27.7 MB
  • 26C3 - 2009/audio/26c3-3515-de-secubt.ogg 27.7 MB
  • 29C3 - 2012/audio/29c3-5140-en-safecast_ogg.ogg 27.7 MB
  • 24C3 - 2007/audio/24c3-2270-en-sputnik_data_analysis.mp3 27.7 MB
  • 28C3 - 2011/audio/28c3-4768-en-eating_in_the_anthropocene.ogg 27.7 MB
  • 25C3 - 2008/audio/25c3-2863-en-climate_change_-_state_of_the_science.ogg 27.7 MB
  • 28C3 - 2011/audio/28c3-4818-en-evolving_custom_communication_protocols.ogg 27.7 MB
  • 28C3 - 2011/audio/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.ogg 27.7 MB
  • 24C3 - 2007/audio/24c3-2273-en-toying_with_barcodes.mp3 27.6 MB
  • 28C3 - 2011/audio/28c3-4680-en-effective_dos_attacks_against_web_application_platforms.ogg 27.6 MB
  • 22C3 - 2005/video/22C3-1102-en-message_generation_at_the_info_layer.mp4 27.6 MB
  • 27C3 - 2010/audio/27c3-4195-de-literarischer_abend.ogg 27.6 MB
  • 21C3 - 2004/audio/097 Das Literarische Code-Quartett.mp3 27.5 MB
  • 27C3 - 2010/audio/27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg 27.5 MB
  • 26C3 - 2009/audio/26c3-3670-en-blackbox_jtag_reverse_engineering.ogg 27.5 MB
  • 24C3 - 2007/audio/24c3-2254-en-freifunkerei.mp3 27.4 MB
  • 27C3 - 2010/audio/27c3-4206-en-immi_from_concept_to_reality.ogg 27.4 MB
  • 30C3 - 2013/audio/30c3-5477-en-An_introduction_to_Firmware_Analysis_opus.opus 27.4 MB
  • 27C3 - 2010/audio/27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg 27.4 MB
  • 24C3 - 2007/audio/24c3-2228-de-lieber_cyborg_als_goettin.mp3 27.4 MB
  • 34C3 - 2017/34C3 - The Work of Art in the Age of Digital Assassination.mp4 27.4 MB
  • 27C3 - 2010/audio/27c3-4263-en-resisting_excessive_government_surveillance.ogg 27.4 MB
  • 31C3 - 2014/audio/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_opus.opus 27.4 MB
  • 28C3 - 2011/audio/28c3-4710-en-the_future_of_cryptology.ogg 27.4 MB
  • 34C3 - 2017/34C3 - The Work of Art in the Age of Digital Assassination - deutsche Ubersetzung.mp4 27.4 MB
  • 21C3 - 2004/audio/183 Tor.mp3 27.3 MB
  • 28C3 - 2011/audio/28c3-4876-de-die_spinnen_die_sachsen.ogg 27.3 MB
  • 28C3 - 2011/audio/28c3-4811-en-rootkits_in_your_web_application.ogg 27.3 MB
  • 23C3 - 2006/audio/23C3-1537-en-know_your_citizens.mp3 27.3 MB
  • 27C3 - 2010/audio/27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg 27.3 MB
  • 30C3 - 2013/audio/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_opus.opus 27.3 MB
  • 21C3 - 2004/audio/121 Black Ops of DNS.mp3 27.2 MB
  • 27C3 - 2010/audio/27c3-4234-en-usb_and_libusb.ogg 27.2 MB
  • 21C3 - 2004/video/058 The Blinking Suspects.mp4 27.2 MB
  • 21C3 - 2004/bonus/Thriller.mp4 27.2 MB
  • 27C3 - 2010/audio/27c3-4011-en-embedded_reverse_engineering.ogg 27.2 MB
  • 16C3 - 1999/audio/tron.mp3 27.2 MB
  • 21C3 - 2004/audio/250 Lightning Talks Day 3.mp3 27.2 MB
  • 30C3 - 2013/audio/30c3-5212-en-The_GNU_Name_System_opus.opus 27.2 MB
  • 20C3 - 2003/audio/20c3_630_The-Quintessenz-biometrics-doqubase1.ogg 27.2 MB
  • 29C3 - 2012/audio/29c3-5285-de-en-men_who_stare_at_bits_ogg.ogg 27.1 MB
  • 27C3 - 2010/audio/27c3-4103-en-copyright_enforcement_versus_freedoms.ogg 27.1 MB
  • 21C3 - 2004/audio/109 Anti-Honeypot Techniques.mp3 27.0 MB
  • 28C3 - 2011/audio/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.ogg 27.0 MB
  • 26C3 - 2009/audio/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg 27.0 MB
  • 27C3 - 2010/audio/27c3-4017-en-desktop_on_the_linux.ogg 27.0 MB
  • 25C3 - 2008/audio/25c3-3020-en-banking_malware_101.ogg 27.0 MB
  • 32C3 - 2015/audio/32c3-7197-en-Rowhammerjs_Root_privileges_for_web_apps.opus 27.0 MB
  • 21C3 - 2004/audio/044 Machine Learning in Science and Engineering.mp3 27.0 MB
  • 24C3 - 2007/audio/24c3-2294-de-23_ways_to_fight_for_your_rights.mp3 26.9 MB
  • 20C3 - 2003/video/20C3-555-Eroeffnung.mp4 26.9 MB
  • 21C3 - 2004/audio/278 TKUeV-Das Ohr am Draht.mp3 26.9 MB
  • 21C3 - 2004/audio/310 Information-Wissen-Macht.mp3 26.9 MB
  • 26C3 - 2009/audio/26c3-3490-en-building_a_debugger.ogg 26.9 MB
  • 24C3 - 2007/audio/24c3-2380-de-nedap_wahlcomputer_in_deutschland.mp3 26.9 MB
  • 25C3 - 2008/audio/25c3-2832-en-exploiting_symbian.ogg 26.9 MB
  • 27C3 - 2010/audio/27c3-4018-en-frozencache.ogg 26.8 MB
  • 28C3 - 2011/audio/28c3-4688-en-introducing_osmo_gmr.ogg 26.8 MB
  • 30C3 - 2013/audio/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__opus.opus 26.8 MB
  • 21C3 - 2004/audio/041 Einfuehrung in Kryptographische Methoden.mp3 26.7 MB
  • 26C3 - 2009/audio/26c3-3509-de-wofr_offenes_internet.ogg 26.7 MB
  • 19C3 - 2002/audio/19C3-483-bsi-zertifizierung.mp3 26.7 MB
  • 21C3 - 2004/audio/118 Verified Fiasco.mp3 26.7 MB
  • 19C3 - 2002/audio/19C3-479-eu-urheberrechtslinie.mp3 26.6 MB
  • 24C3 - 2007/audio/24c3-2248-de-desperate_house_hackers.mp3 26.6 MB
  • 21C3 - 2004/audio/114 Der 2. Korb der Urheberrechtsnovelle.mp3 26.6 MB
  • 19C3 - 2002/audio/19C3-426-ec-karten-unsicherheit.mp3 26.6 MB
  • 21C3 - 2004/audio/246 RFID Technologie und Implikationen.mp3 26.6 MB
  • 25C3 - 2008/audio/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg 26.6 MB
  • 21C3 - 2004/audio/115 The Fiasco Kernel.mp3 26.5 MB
  • 32C3 - 2015/audio/32c3-7416-en-Evolution_of_Brain-Computer_Interfaces.opus 26.5 MB
  • 21C3 - 2004/audio/055 CCC-Jahresrueckblick.mp3 26.5 MB
  • 28C3 - 2011/audio/28c3-4732-en-datamining_for_hackers.ogg 26.5 MB
  • 21C3 - 2004/audio/040 Firewall Piercing.mp3 26.5 MB
  • 28C3 - 2011/audio/28c3-4848-en-the_coming_war_on_general_computation.ogg 26.5 MB
  • 30C3 - 2013/video/30c3-5437-en-Plants_Machines_h264-hq.mp4 26.5 MB
  • 27C3 - 2010/audio/27c3-4164-de-friede_sei_mit_euren_daten.ogg 26.5 MB
  • 24C3 - 2007/audio/24c3-2318-en-cybercrime20.mp3 26.4 MB
  • 24C3 - 2007/audio/24c3-2284-en-linguistic_hacking.mp3 26.4 MB
  • 24C3 - 2007/audio/24c3-2271-en-distributed_campaigns.mp3 26.4 MB
  • 25C3 - 2008/audio/25c3-3023-en-making_the_theoretical_possible.ogg 26.4 MB
  • 26C3 - 2009/audio/26c3-3523-de-eine_zensur_findet_statt.ogg 26.4 MB
  • 21C3 - 2004/audio/117 Kampagne Fair Sharing.mp3 26.3 MB
  • 25C3 - 2008/audio/25c3-2893-en-attacking_rich_internet_applications.ogg 26.3 MB
  • 24C3 - 2007/audio/24c3-2344-de-grundlagen_der_sicheren_programmierung.mp3 26.3 MB
  • 26C3 - 2009/audio/26c3-3691-de-vier_fuste_fr_ein_halleluja.ogg 26.3 MB
  • 25C3 - 2008/audio/25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg 26.3 MB
  • 32C3 - 2015/audio/32c3-7367-en-Ling_-_High_level_system_programming.opus 26.3 MB
  • 20C3 - 2003/audio/20c3_602_Sniffen-fuer-Fortgeschrittene.ogg 26.3 MB
  • 27C3 - 2010/audio/27c3-4244-en-critical_overview_of_10_years_pet.ogg 26.3 MB
  • 27C3 - 2010/audio/27c3-4140-en-contemporary_profiling_of_web_users.ogg 26.3 MB
  • 25C3 - 2008/audio/25c3-2816-en-cisco_ios_attack_and_defense.ogg 26.2 MB
  • 24C3 - 2007/audio/24c3-2332-en-no_ooxml.mp3 26.2 MB
  • 21C3 - 2004/audio/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.mp3 26.2 MB
  • 25C3 - 2008/audio/25c3-2963-de-handschellen_hacken.ogg 26.2 MB
  • 28C3 - 2011/audio/28c3-4935-en-eu_datenschutz_internet_der_dinge.ogg 26.2 MB
  • 21C3 - 2004/audio/039 Squeak and Croquet.mp3 26.2 MB
  • 24C3 - 2007/audio/24c3-2360-en-all_tomorrows.mp3 26.1 MB
  • 25C3 - 2008/audio/25c3-2973-en-lightning_talks_day4.ogg 26.1 MB
  • 25C3 - 2008/audio/25c3-3028-de-der_hackerparagraph_202c_stgb.ogg 26.1 MB
  • 19C3 - 2002/audio/19C3-409-call-center.mp3 26.1 MB
  • 28C3 - 2011/audio/28c3-4802-en-towards_a_single_secure_european_cyberspace.ogg 26.1 MB
  • 30C3 - 2013/audio/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_opus.opus 26.1 MB
  • 25C3 - 2008/audio/25c3-2874-en-the_ultimate_commodore_64_talk.ogg 26.1 MB
  • 17C3 - 2000/audio/Upcoming Security Nightmares.mp3 26.1 MB
  • 28C3 - 2011/audio/28c3-4748-en-the_best_of_the_oxcars.ogg 26.1 MB
  • 21C3 - 2004/audio/017 Next Generation Peer to Peer Systems.mp3 26.1 MB
  • 28C3 - 2011/audio/28c3-4844-de-eu_datenschutz_internet_der_dinge.ogg 26.1 MB
  • 19C3 - 2002/audio/19C3-434-security-nightmares.mp3 26.0 MB
  • 24C3 - 2007/audio/24c3-2371-de-wahlstift.mp3 26.0 MB
  • 26C3 - 2009/audio/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg 26.0 MB
  • 29C3 - 2012/audio/29c3-5226-en-further_hacks_calypso_ogg.ogg 26.0 MB
  • 24C3 - 2007/audio/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte.mp3 26.0 MB
  • 21C3 - 2004/audio/079 AVG aint vector graphics.mp3 26.0 MB
  • 24C3 - 2007/audio/24c3-2325-en-current_events_in_tor_development.mp3 25.9 MB
  • 21C3 - 2004/audio/164 Barrierefreies Internet.mp3 25.9 MB
  • 25C3 - 2008/audio/25c3-2665-en-the_trust_situation.ogg 25.9 MB
  • 32C3 - 2015/audio/32c3-7457-en-Predicting_Crime_in_a_Big_Data_World.opus 25.9 MB
  • 30C3 - 2013/video/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4 25.9 MB
  • 27C3 - 2010/audio/27c3-4176-de-hacking_ibuttons.ogg 25.8 MB
  • 32C3 - 2015/audio/32c3-7135-de-Ein_Abgrund_von_Landesverrat.opus 25.8 MB
  • 21C3 - 2004/audio/165 Softwarepatente - Der Tag danach.mp3 25.8 MB
  • 25C3 - 2008/audio/25c3-2940-en-flying_for_free.ogg 25.8 MB
  • 27C3 - 2010/audio/27c3-3957-en-ipv6_insecurities.ogg 25.8 MB
  • 28C3 - 2011/audio/28c3-4699-en-building_a_distributed_satellite_ground_station_network.ogg 25.7 MB
  • 32C3 - 2015/audio/32c3-7195-en-Verified_Firewall_Ruleset_Verification.opus 25.7 MB
  • 25C3 - 2008/audio/25c3-2895-de-der_elektronische_personalausweis.ogg 25.7 MB
  • 26C3 - 2009/audio/26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.ogg 25.7 MB
  • 24C3 - 2007/audio/24c3-2235-en-one_token_to_rule_them_all.mp3 25.6 MB
  • 25C3 - 2008/audio/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg 25.6 MB
  • 29C3 - 2012/audio/29c3-5123-en-small_footprint_inspection_techniques_for_android_ogg.ogg 25.6 MB
  • 21C3 - 2004/audio/208 Gamecube Hacking.mp3 25.6 MB
  • 19C3 - 2002/audio/19C3-433-tcp-ip-fuer-anfaenger.mp3 25.5 MB
  • 27C3 - 2010/audio/27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg 25.5 MB
  • 20C3 - 2003/audio/20c3_574_Fragen-an-eine-maschienenlesbare-Regierung.ogg 25.4 MB
  • 27C3 - 2010/audio/27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg 25.4 MB
  • 21C3 - 2004/audio/077 Weird Programming 2.mp3 25.4 MB
  • 26C3 - 2009/audio/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.ogg 25.4 MB
  • 24C3 - 2007/audio/24c3-2347-en-c64_dtv_hacking.mp3 25.4 MB
  • 29C3 - 2012/audio/29c3-5206-en-the_ethics_of_activists_ddos_actions_ogg.ogg 25.4 MB
  • 21C3 - 2004/audio/157 Lightning Talks Day 2.mp3 25.4 MB
  • 28C3 - 2011/audio/28c3-4742-en-from_press_freedom_to_the_freedom_of_information.ogg 25.4 MB
  • 24C3 - 2007/audio/24c3-2253-en-dining_cryptographers.mp3 25.4 MB
  • 28C3 - 2011/audio/28c3-4856-en-the_engineering_part_of_social_engineering.ogg 25.4 MB
  • 25C3 - 2008/audio/25c3-2979-en-embracing_post-privacy.ogg 25.3 MB
  • 25C3 - 2008/audio/25c3-3047-en-lightning_talks_day3_morning.ogg 25.3 MB
  • 31C3 - 2014/audio/31c3-6370-en-Internet_of_toilets_opus.opus 25.3 MB
  • 26C3 - 2009/audio/26c3-3504-en-our_darknet_and_its_bright_spots.ogg 25.3 MB
  • 32C3 - 2015/audio/32c3-7114-en-Craft_leisure_and_end-user_innovation.opus 25.3 MB
  • 26C3 - 2009/audio/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.ogg 25.2 MB
  • 32C3 - 2015/audio/32c3-7426-en-Intelexit.opus 25.2 MB
  • 20C3 - 2003/audio/20c3_653_Device-Hackling-with-JTAG.ogg 25.2 MB
  • 25C3 - 2008/audio/25c3-2899-en-mining_social_contacts_with_active_rfid.ogg 25.2 MB
  • 32C3 - 2015/audio/32c3-7570-en-Plunge_into_Proxy_Politics.opus 25.2 MB
  • 26C3 - 2009/audio/26c3-3685-de-im_herz_der_bestie.ogg 25.2 MB
  • 27C3 - 2010/audio/27c3-4159-en-reverse_engineering_mos_6502.ogg 25.2 MB
  • 33C3 - 2016/Gone in 60 Milliseconds (33c3) - deutsche Ubersetzung.mp4 25.2 MB
  • 24C3 - 2007/audio/24c3-2131-en-port_scanning_improved.mp3 25.1 MB
  • 21C3 - 2004/audio/209 Freedom of expression in new Arab landscape.mp3 25.1 MB
  • 24C3 - 2007/audio/24c3-2389-en-hacking_icann.mp3 25.1 MB
  • 24C3 - 2007/audio/24c3-2296-en-random_things.mp3 25.1 MB
  • 26C3 - 2009/audio/26c3-3672-de-advanced_microcontroller_programming.ogg 25.1 MB
  • 28C3 - 2011/audio/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.ogg 25.1 MB
  • 21C3 - 2004/audio/123 Gentoo Hardened.mp3 25.1 MB
  • 21C3 - 2004/audio/029 Robocup.mp3 25.0 MB
  • 25C3 - 2008/audio/25c3-2916-en-wikileaks.ogg 25.0 MB
  • 25C3 - 2008/audio/25c3-2980-en-the_infinite_library.ogg 25.0 MB
  • 25C3 - 2008/audio/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg 25.0 MB
  • 21C3 - 2004/audio/083 Quanteninformationstheorie fuer Nicht Physiker.mp3 25.0 MB
  • 25C3 - 2008/audio/25c3-2669-en-collapsing_the_european_security_architecture.ogg 24.9 MB
  • 32C3 - 2015/audio/32c3-7246-en-Free_Software_and_Hardware_bring_National_Sovereignty.opus 24.9 MB
  • 27C3 - 2010/audio/27c3-4160-en-automatic_identification_cryptographic_primitives.ogg 24.9 MB
  • 21C3 - 2004/audio/100 Anonymous communications.mp3 24.9 MB
  • 31C3 - 2014/audio/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_opus.opus 24.9 MB
  • 21C3 - 2004/audio/023 Ciphire Mail.mp3 24.9 MB
  • 27C3 - 2010/audio/27c3-4099-en-file_print_electronics.ogg 24.9 MB
  • 25C3 - 2008/audio/25c3-2976-en-hacking_the_iphone.ogg 24.9 MB
  • 28C3 - 2011/audio/28c3-4676-en-apple_vs_google_client_platforms.ogg 24.9 MB
  • 29C3 - 2012/audio/29c3-5104-en-esxi_beast_ogg.ogg 24.9 MB
  • 24C3 - 2007/audio/24c3-2321-en-d_libd_and_the_slate_project.mp3 24.8 MB
  • 21C3 - 2004/audio/153 Suchmaschinenpolitik.mp3 24.8 MB
  • 19C3 - 2002/audio/19C3-442-lawful-interception-europe.mp3 24.8 MB
  • 28C3 - 2011/audio/28c3-4916-en-buggedplanet.ogg 24.8 MB
  • 24C3 - 2007/audio/24c3-2367-en-closing_event.mp3 24.7 MB
  • 32C3 - 2015/audio/32c3-7230-de-Lessons_learned_Freifunk_fuer_Gefluechtete.opus 24.7 MB
  • 21C3 - 2004/audio/018 Computer und Robotik in Entenhausen.mp3 24.7 MB
  • 28C3 - 2011/audio/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.ogg 24.7 MB
  • 20C3 - 2003/audio/20c3_581_CHAOS-Rueckblick-2003.ogg 24.7 MB
  • 29C3 - 2012/audio/29c3-5368-de-en-ifg_chance_oder_buergerbluff_ogg.ogg 24.6 MB
  • 16C3 - 1999/audio/jahresrueckblick.mp3 24.6 MB
  • 21C3 - 2004/audio/038 Free Software Usage in South America.mp3 24.6 MB
  • 29C3 - 2012/audio/29c3-5270-de-en-hanussens_mindreading_ogg.ogg 24.6 MB
  • 21C3 - 2004/video/049 Zufallszahlengeneratoren.mp4 24.6 MB
  • 29C3 - 2012/audio/29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_ogg.ogg 24.6 MB
  • 24C3 - 2007/audio/24c3-2260-en-to_be_or_i2p.mp3 24.6 MB
  • 21C3 - 2004/audio/244 High Speed Computing with FPGAs.mp3 24.5 MB
  • 24C3 - 2007/audio/24c3-2189-en-hidden_trojan.mp3 24.5 MB
  • 29C3 - 2012/audio/29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_ogg.ogg 24.5 MB
  • 32C3 - 2015/audio/32c3-7263-en-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India.opus 24.5 MB
  • 25C3 - 2008/audio/25c3-2975-de-zehn_big_brother_awards_in_at.ogg 24.5 MB
  • 32C3 - 2015/audio/32c3-7360-de-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking.opus 24.5 MB
  • 24C3 - 2007/audio/24c3-2155-en-universe_on_supercomputers.mp3 24.5 MB
  • 21C3 - 2004/audio/135 Voting Machine Technology.mp3 24.5 MB
  • 26C3 - 2009/audio/26c3-3631-en-finding_the_key_in_the_haystack.ogg 24.5 MB
  • 24C3 - 2007/video/24c3-2276-en-space_communism_high.mp4 24.4 MB
  • 32C3 - 2015/audio/32c3-7419-en-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society.opus 24.4 MB
  • 31C3 - 2014/audio/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_opus.opus 24.4 MB
  • 25C3 - 2008/audio/25c3-3008-en-anatomy_of_smartphone_hardware.ogg 24.3 MB
  • 21C3 - 2004/audio/080 USB-Unbekannter Serieller Bus.mp3 24.3 MB
  • 25C3 - 2008/audio/25c3-3015-en-rapid_prototype_your_life.ogg 24.3 MB
  • 27C3 - 2010/audio/27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg 24.3 MB
  • 21C3 - 2004/audio/308 MD5 To Be Considered Harmful Someday.mp3 24.2 MB
  • 31C3 - 2014/audio/31c3-6399-en-Global_Civil_Society_Under_Attack_opus.opus 24.2 MB
  • 24C3 - 2007/audio/24c3-2364-en-smartcard_protocol_sniffing.mp3 24.2 MB
  • 31C3 - 2014/audio/31c3-6253-en-de-Computer_Science_in_the_DPRK_opus.opus 24.1 MB
  • 15C3 - 1998/audio/geschichte_des_ccc_und_des_hackertums_in_deutschland.mp3 24.1 MB
  • 27C3 - 2010/audio/27c3-4296-en-lightning_days_d2.ogg 24.1 MB
  • 27C3 - 2010/audio/27c3-4144-en-short_political_history_of_acoustics.ogg 24.1 MB
  • 20C3 - 2003/audio/20c3_593_Weird-Programming.ogg 24.1 MB
  • 25C3 - 2008/audio/25c3-2799-en-console_hacking_2008_wii_fail.ogg 24.1 MB
  • 30C3 - 2013/audio/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_opus.opus 24.1 MB
  • 21C3 - 2004/audio/028 Biometrie ueberwinden.mp3 24.1 MB
  • 32C3 - 2015/audio/32c3-7413-de-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung.opus 24.1 MB
  • 29C3 - 2012/audio/29c3-5203-en-omg_oer_ogg.ogg 24.0 MB
  • 21C3 - 2004/audio/047 Datamining the NSA.mp3 24.0 MB
  • 26C3 - 2009/audio/26c3-3700-de-here_be_dragons.ogg 24.0 MB
  • 32C3 - 2015/audio/32c3-7415-de-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen.opus 23.9 MB
  • 32C3 - 2015/audio/32c3-7355-en-apertus_AXIOM.opus 23.9 MB
  • 28C3 - 2011/audio/28c3-4749-en-does_hacktivism_matter.ogg 23.9 MB
  • 28C3 - 2011/audio/28c3-4777-en-r0ket.ogg 23.9 MB
  • 20C3 - 2003/audio/20c3_562_Der-Zettel-am-Bildschirm.ogg 23.9 MB
  • 26C3 - 2009/audio/26c3-3710-en-the_lost_cosmonauts.ogg 23.9 MB
  • 21C3 - 2004/audio/178 Humanoid Robots.mp3 23.8 MB
  • 32C3 - 2015/audio/32c3-7166-de-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S.opus 23.8 MB
  • 32C3 - 2015/audio/32c3-7400-en-Technology_and_Mass_Atrocity_Prevention.opus 23.7 MB
  • 24C3 - 2007/audio/24c3-2322-en-infectious_diseases.mp3 23.7 MB
  • 26C3 - 2009/audio/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.ogg 23.7 MB
  • 27C3 - 2010/audio/27c3-4096-en-code_deobfuscation_by_optimization.ogg 23.7 MB
  • 32C3 - 2015/audio/32c3-7517-en-the_possibility_of_an_army.opus 23.7 MB
  • 32C3 - 2015/audio/32c3-7441-en-The_plain_simple_reality_of_entropy.opus 23.7 MB
  • 19C3 - 2002/audio/19C3-452-perl.mp3 23.6 MB
  • 25C3 - 2008/audio/25c3-3044-en-all_your_bases_are_belong_to_us.ogg 23.6 MB
  • 19C3 - 2002/audio/19C3-508-amateurfunk.mp3 23.6 MB
  • 32C3 - 2015/audio/32c3-7314-en-All_Our_Shared_Spectrum_Are_Belong_to_Us.opus 23.5 MB
  • 25C3 - 2008/audio/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg 23.5 MB
  • 25C3 - 2008/audio/25c3-3053-en-lightning_talks_day3_-_evening.ogg 23.5 MB
  • 19C3 - 2002/audio/19C3-498-freedom-cpu.mp3 23.5 MB
  • 19C3 - 2002/audio/19C3-430-icann-status-quo.mp3 23.5 MB
  • 31C3 - 2014/audio/31c3-6460-en-de-Eye_Wear_Computing_opus.opus 23.5 MB
  • 31C3 - 2014/audio/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_opus.opus 23.4 MB
  • 21C3 - 2004/video/173 Closing Event.mp4 23.4 MB
  • 32C3 - 2015/audio/32c3-7529-en-Mobile_Censorship_in_Iran.opus 23.4 MB
  • 31C3 - 2014/audio/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_opus.opus 23.3 MB
  • 20C3 - 2003/audio/20c3_624_Neue-Notrufnummern.ogg 23.3 MB
  • 19C3 - 2002/audio/19C3-401-network-hijacking.mp3 23.3 MB
  • 31C3 - 2014/audio/31c3-6582-de-Das_Transparenzportal_Hamburg_opus.opus 23.3 MB
  • 28C3 - 2011/audio/28c3-4817-en-string_oriented_programming.ogg 23.2 MB
  • 25C3 - 2008/audio/25c3-2952-de-pflanzenhacken.ogg 23.2 MB
  • 30C3 - 2013/audio/30c3-5398-en-HbbTV_Security_opus.opus 23.2 MB
  • 26C3 - 2009/audio/26c3-3608-en-playing_with_the_gsm_rf_interface.ogg 23.2 MB
  • 19C3 - 2002/audio/19C3-488-symbolics-lisp-machines.mp3 23.2 MB
  • 32C3 - 2015/audio/32c3-7119-en-Building_and_Breaking_Wireless_Security.opus 23.2 MB
  • 15C3 - 1998/audio/religioese_diskussion_der_betriebssystem-evangelisten.mp3 23.2 MB
  • 22C3 - 2005/audio/22C3-920-en-we_lost_the_war.m4a 23.1 MB
  • 19C3 - 2002/audio/19C3-448-zero-tool-hacking.mp3 23.1 MB
  • 24C3 - 2007/audio/24c3-2385-en-lightning_talks_2007_day_2.mp3 23.1 MB
  • 32C3 - 2015/audio/32c3-7549-en-20_OSCILLATORS_IN_20_MINUTES.opus 23.1 MB
  • 24C3 - 2007/audio/24c3-2212-en-unusual_web_bugs.mp3 23.1 MB
  • 31C3 - 2014/audio/31c3-6299-en-de-Trackography_opus.opus 23.1 MB
  • 32C3 - 2015/audio/32c3-7310-en-QRtistry.opus 23.1 MB
  • 29C3 - 2012/audio/29c3-5180-de-en-marvin_und_der_blues_ogg.ogg 23.0 MB
  • 25C3 - 2008/audio/25c3-3032-en-analyzing_rfid_security.ogg 23.0 MB
  • 32C3 - 2015/audio/32c3-7530-en-Buffering_sucks.opus 22.9 MB
  • 29C3 - 2012/video/29c3-5399-en-opening_event_h264.mp4 22.9 MB
  • 25C3 - 2008/audio/25c3-2734-en-short_attention_span_security.ogg 22.9 MB
  • 30C3 - 2013/audio/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_opus.opus 22.9 MB
  • 32C3 - 2015/audio/32c3-7547-en-libusb_Maintainer_fail.opus 22.8 MB
  • 24C3 - 2007/audio/24c3-2133-en-building_a_hacker_space.mp3 22.8 MB
  • 31C3 - 2014/audio/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_opus.opus 22.8 MB
  • 27C3 - 2010/audio/27c3-4174-en-the_hidden_nemesis.ogg 22.8 MB
  • 29C3 - 2012/audio/29c3-5221-de-en-cyberwar_statt_cyberwar_ogg.ogg 22.8 MB
  • 30C3 - 2013/audio/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_opus.opus 22.8 MB
  • 27C3 - 2010/audio/27c3-4175-en-from_robot_to_robot.ogg 22.7 MB
  • 15C3 - 1998/audio/tcphijacking.mp3 22.7 MB
  • 31C3 - 2014/audio/31c3-6236-en-de-Iridium_Pager_Hacking_opus.opus 22.7 MB
  • 21C3 - 2004/audio/134 Secure Instant Messaging.mp3 22.6 MB
  • 32C3 - 2015/audio/32c3-7202-de-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur.opus 22.6 MB
  • 25C3 - 2008/audio/25c3-2814-de-datenpannen.ogg 22.6 MB
  • 26C3 - 2009/audio/26c3-3594-de-internetsperren.ogg 22.5 MB
  • 31C3 - 2014/audio/31c3-6295-de-en-Krypto_fuer_die_Zukunft_opus.opus 22.5 MB
  • 31C3 - 2014/audio/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_opus.opus 22.5 MB
  • 24C3 - 2007/audio/24c3-2285-en-10ge_monitoring_live.mp3 22.5 MB
  • 21C3 - 2004/audio/182 Radioaktive Paesse.mp3 22.5 MB
  • 29C3 - 2012/audio/29c3-5398-en-closing_event2012_ogg.ogg 22.4 MB
  • 31C3 - 2014/audio/31c3-6541-en-de-Forging_the_USB_armory_opus.opus 22.4 MB
  • 24C3 - 2007/audio/24c3-2345-de-gplv3_auswirkungen.mp3 22.4 MB
  • 24C3 - 2007/audio/24c3-2277-en-automatic_memory_management.mp3 22.3 MB
  • 31C3 - 2014/audio/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_opus.opus 22.3 MB
  • 31C3 - 2014/audio/31c3-6589-en-Mr_Beam_goes_Kickstarter_opus.opus 22.3 MB
  • 32C3 - 2015/audio/32c3-7528-en-Lets_Encrypt_--_What_launching_a_free_CA_looks_like.opus 22.2 MB
  • 31C3 - 2014/audio/31c3-6554-en-de-Automatically_Subtitling_the_C3_opus.opus 22.2 MB
  • 31C3 - 2014/audio/31c3-6202-en-de-Privacy_and_Consumer_Markets_opus.opus 22.2 MB
  • 32C3 - 2015/audio/32c3-7388-en-Media_Coverage_and_the_Public_in_the_Surveillance_Society.opus 22.2 MB
  • 31C3 - 2014/audio/31c3-6275-en-de-Living_Drones_opus.opus 22.2 MB
  • 25C3 - 2008/audio/25c3-2781-en-objects_as_software_the_coming_revolution.ogg 22.1 MB
  • 30C3 - 2013/audio/30c3-5610-de-Seidenstrasse_opus.opus 22.1 MB
  • 28C3 - 2011/audio/28c3-4730-en-crowdsourcing_genome_wide_association_studies.ogg 22.1 MB
  • 19C3 - 2002/audio/19C3-374-ccc-geschichte.mp3 22.1 MB
  • 21C3 - 2004/audio/037 GNOME Anwendungsentwicklung.mp3 22.1 MB
  • 30C3 - 2013/audio/30c3-5439-en-To_Protect_And_Infect_opus.opus 22.0 MB
  • 21C3 - 2004/audio/131 Learning OpenPGP by Example.mp3 22.0 MB
  • 25C3 - 2008/audio/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg 22.0 MB
  • 28C3 - 2011/audio/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.ogg 22.0 MB
  • 19C3 - 2002/audio/19C3-391-wikipedia.mp3 22.0 MB
  • 19C3 - 2002/audio/19C3-400-ipv6-rapid-deployment.mp3 22.0 MB
  • 22C3 - 2005/audio/22C3-418-en-ajax_web_applications.m4a 22.0 MB
  • 22C3 - 2005/audio/22C3-545-en-web_of_trust.m4a 22.0 MB
  • 30C3 - 2013/audio/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_opus.opus 22.0 MB
  • 19C3 - 2002/audio/19C3-494-x86_64-ia64-architecture.mp3 21.9 MB
  • 21C3 - 2004/audio/156 Videoueberwachung im europaeischen Vergleich.mp3 21.9 MB
  • 26C3 - 2009/audio/26c3-3302-en-i_internet.ogg 21.9 MB
  • 21C3 - 2004/audio/015 Sicherheit bei VoIP-Systemen.mp3 21.9 MB
  • 31C3 - 2014/audio/31c3-6596-en-de-The_Magical_Secrecy_Tour_opus.opus 21.9 MB
  • 31C3 - 2014/audio/31c3-6385-en-de-The_Machine_To_Be_Another_opus.opus 21.9 MB
  • 25C3 - 2008/audio/25c3-3048-en-lightning_talks_day2.ogg 21.8 MB
  • 21C3 - 2004/audio/099 GPL fuer Anfaenger.mp3 21.8 MB
  • 22C3 - 2005/audio/22C3-426-de-entschwoerungstheorie.m4a 21.8 MB
  • 25C3 - 2008/audio/25c3-2843-en-algorithmic_music_in_a_box.ogg 21.8 MB
  • 28C3 - 2011/audio/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.ogg 21.8 MB
  • 26C3 - 2009/audio/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg 21.8 MB
  • 25C3 - 2008/audio/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg 21.7 MB
  • 30C3 - 2013/audio/30c3-5397-en-Sysadmins_of_the_world_unite__opus.opus 21.7 MB
  • 30C3 - 2013/audio/30c3-5394-BREACH_in_Agda_opus.opus 21.7 MB
  • 21C3 - 2004/audio/063 Edit This Page.mp3 21.7 MB
  • 21C3 - 2004/audio/111 The Kernel Accelerator Device.mp3 21.7 MB
  • 32C3 - 2015/audio/32c3-7264-en-Profiling_In_justice.opus 21.7 MB
  • 21C3 - 2004/audio/127 Security Frameworks.mp3 21.7 MB
  • 19C3 - 2002/audio/19C3-480-one-time-crypto.mp3 21.7 MB
  • 32C3 - 2015/audio/32c3-7423-en-One_year_of_securitarian_drift_in_France.opus 21.7 MB
  • 31C3 - 2014/audio/31c3-6358-en-de-Information_Control_and_Strategic_Violence_opus.opus 21.6 MB
  • 25C3 - 2008/audio/25c3-2970-en-coreboot_beyond_the_final_frontier.ogg 21.6 MB
  • 27C3 - 2010/audio/27c3-4184-de-stanislaw_lem_weltverbesserer.ogg 21.6 MB
  • 25C3 - 2008/audio/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg 21.6 MB
  • 30C3 - 2013/audio/30c3-5582-en-SCADA_StrangeLove_2_opus.opus 21.5 MB
  • 19C3 - 2002/audio/19C3-412-lockpicking.mp3 21.5 MB
  • 20C3 - 2003/audio/20c3_546_1024bit-RSA-ist-unsicher.ogg 21.4 MB
  • 25C3 - 2008/audio/25c3-2812-de-fnord_news_show.ogg 21.4 MB
  • 31C3 - 2014/audio/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_opus.opus 21.4 MB
  • 25C3 - 2008/audio/25c3-3056-en-fnord_news_show_english_interpretation.ogg 21.4 MB
  • 19C3 - 2002/audio/19C3-495-sctp.mp3 21.4 MB
  • 27C3 - 2010/audio/27c3-4087-en-console_hacking_2010.ogg 21.4 MB
  • 24C3 - 2007/audio/24c3-2216-de-erlang.mp3 21.4 MB
  • 31C3 - 2014/audio/31c3-6402-en-de-Axoloti_opus.opus 21.4 MB
  • 25C3 - 2008/audio/25c3-2999-en-closing_ceremony.ogg 21.4 MB
  • 32C3 - 2015/audio/32c3-7265-en-Maritime_Robotics.opus 21.3 MB
  • 25C3 - 2008/audio/25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg 21.3 MB
  • 17C3 - 2000/audio/Abschlussveranstaltung.mp3 21.3 MB
  • 17C3 - 2000/video/17C3_illuminatus.rm 21.3 MB
  • 25C3 - 2008/audio/25c3-2827-de-u23.ogg 21.3 MB
  • 17C3 - 2000/video/17C3_digitv_new.rm 21.2 MB
  • 27C3 - 2010/audio/27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg 21.2 MB
  • 19C3 - 2002/audio/19C3-500-c-optimizations.mp3 21.2 MB
  • 26C3 - 2009/audio/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.ogg 21.2 MB
  • 30C3 - 2013/audio/30c3-5527-en-Basics_of_Digital_Wireless_Communication_opus.opus 21.2 MB
  • 20C3 - 2003/audio/20c3_545_Abschlussveranstalltung-Lockpicking.ogg 21.1 MB
  • 24C3 - 2007/audio/24c3-2303-en-inside_the_macosx_kernel.mp3 21.1 MB
  • 31C3 - 2014/audio/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_opus.opus 21.0 MB
  • 22C3 - 2005/audio/22C3-520-de-geometrie_ohne_punkte.m4a 21.0 MB
  • 25C3 - 2008/audio/25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg 21.0 MB
  • 29C3 - 2012/audio/29c3-5404-en-noc_review_ogg.ogg 21.0 MB
  • 31C3 - 2014/audio/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_opus.opus 21.0 MB
  • 21C3 - 2004/audio/051 Recent features to OpenBSD-ntpd and bgpd.mp3 21.0 MB
  • 24C3 - 2007/audio/24c3-2166-en-embedded_devices_reverse_engineering.mp3 20.9 MB
  • 21C3 - 2004/audio/045 Internet Censorship in China.mp3 20.9 MB
  • 31C3 - 2014/audio/31c3-6406-en-Long_war_tactics_opus.opus 20.9 MB
  • 32C3 - 2015/audio/32c3-7520-de-Compileroptimierungen_fuer_Forth_im_Microcontroller.opus 20.9 MB
  • 28C3 - 2011/audio/28c3-4932-de-camp_review_2011.ogg 20.9 MB
  • 19C3 - 2002/audio/19C3-415-biometrie.mp3 20.8 MB
  • 31C3 - 2014/audio/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_opus.opus 20.8 MB
  • 30C3 - 2013/audio/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_opus.opus 20.8 MB
  • 19C3 - 2002/audio/19C3-381-blinkenlights-arcade.mp3 20.8 MB
  • 21C3 - 2004/audio/141 Pirate Radio.mp3 20.8 MB
  • 25C3 - 2008/audio/25c3-2942-de-vertex_hacking.ogg 20.8 MB
  • 19C3 - 2002/audio/19C3-467-buergernetze.mp3 20.7 MB
  • 22C3 - 2005/audio/22C3-1139-en-complete_harddisk_encryption_with_freebsd.m4a 20.7 MB
  • 25C3 - 2008/audio/25c3-2596-en-swf_and_the_malware_tragedy.ogg 20.7 MB
  • 30C3 - 2013/audio/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_opus.opus 20.7 MB
  • 25C3 - 2008/audio/25c3-2997-en-locating_mobile_phones_using_ss7.ogg 20.7 MB
  • 15C3 - 1998/audio/film23_diskussion.mp3 20.6 MB
  • 15C3 - 1998/audio/geheimdienstliche_methoden_der_informationskombination.mp3 20.6 MB
  • 19C3 - 2002/audio/19C3-464-stego-analyse.mp3 20.6 MB
  • 24C3 - 2007/audio/24c3-2351-de-anonaccess.mp3 20.6 MB
  • 19C3 - 2002/audio/19C3-386-spam-prevention.mp3 20.6 MB
  • 25C3 - 2008/audio/25c3-2872-en-the_privacy_workshop_project.ogg 20.6 MB
  • 30C3 - 2013/audio/30c3-5356-en-Firmware_Fat_Camp_opus.opus 20.5 MB
  • 25C3 - 2008/audio/25c3-2882-en-full-disk-encryption_crash-course.ogg 20.5 MB
  • 25C3 - 2008/audio/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg 20.5 MB
  • 22C3 - 2005/audio/22C3-516-de-was_ist_technisches_wissen.m4a 20.5 MB
  • 31C3 - 2014/audio/31c3-6071-en-Hacking_Ethics_in_Education_opus.opus 20.4 MB
  • 20C3 - 2003/audio/20c3_577_Secure-Internet-Live-Conferencing-with-SILC.ogg 20.4 MB
  • 26C3 - 2009/audio/26c3-3350-en-milkymist.ogg 20.4 MB
  • 21C3 - 2004/audio/098 Portable Software-Installation with pkg source.mp3 20.4 MB
  • 27C3 - 2010/audio/27c3-4261-en-key_recovery_attacks_rc4.ogg 20.3 MB
  • 26C3 - 2009/audio/26c3-3596-de-cat_procsysnetipv4fuckups.ogg 20.3 MB
  • 22C3 - 2005/audio/22C3-519-en-the_cell_processor.m4a 20.3 MB
  • 28C3 - 2011/audio/28c3-4723-en-dc_plus_the_protocol.ogg 20.3 MB
  • 25C3 - 2008/audio/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg 20.3 MB
  • 26C3 - 2009/audio/26c3-3664-en-homewreckery.ogg 20.2 MB
  • 22C3 - 2005/audio/22C3-591-en-european_it_lobbying.m4a 20.2 MB
  • 22C3 - 2005/audio/22C3-600-de-security_nightmares.m4a 20.2 MB
  • 22C3 - 2005/audio/22C3-492-en-freenet_new_version.m4a 20.2 MB
  • 24C3 - 2007/audio/24c3-2252-en-ruby_on_rails_security.mp3 20.2 MB
  • 31C3 - 2014/audio/31c3-6462-en-de-MegaCode_to_facility_gates_opus.opus 20.2 MB
  • 28C3 - 2011/audio/28c3-4910-de-demokratie_auf_saechsisch.ogg 20.1 MB
  • 26C3 - 2009/audio/26c3-3496-de-fugngernavigation_mit_augmented_reality.ogg 20.0 MB
  • 19C3 - 2002/audio/19C3-413-aes-attacks.mp3 20.0 MB
  • 21C3 - 2004/audio/151 Side Channel Analysis of Smart Cards.mp3 19.9 MB
  • 30C3 - 2013/audio/30c3-5607-en-The_Pirate_Cinema_opus.opus 19.9 MB
  • 25C3 - 2008/audio/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg 19.9 MB
  • 27C3 - 2010/audio/27c3-4338-de-wikileaks_und_mehr.ogg 19.9 MB
  • 30C3 - 2013/audio/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_opus.opus 19.9 MB
  • 22C3 - 2005/audio/22C3-427-de-wargames_hacker_spielen.m4a 19.8 MB
  • 27C3 - 2010/audio/27c3-4085-de-digitale_spaltung_per_gesetz.ogg 19.8 MB
  • 19C3 - 2002/audio/19C3-521-big-brother-awards-discussion.mp3 19.8 MB
  • 21C3 - 2004/audio/081 Quantenmechanik fuer Nicht Physiker.mp3 19.8 MB
  • 19C3 - 2002/audio/19C3-506-detecting-ddos-attacks.mp3 19.7 MB
  • 19C3 - 2002/audio/19C3-489-big-brother-awards.mp3 19.7 MB
  • 26C3 - 2009/audio/26c3-3507-de-fuzzing_the_phone_in_your_phone.ogg 19.7 MB
  • 28C3 - 2011/audio/28c3-4712-en-mining_your_geotags.ogg 19.7 MB
  • 31C3 - 2014/audio/31c3-6131-en-de-Safer_playing_with_lasers_opus.opus 19.6 MB
  • 21C3 - 2004/audio/016 Phishing the Web.mp3 19.6 MB
  • 30C3 - 2013/audio/30c3-5426-de-en-Das_FlipDot-Projekt_opus.opus 19.6 MB
  • 25C3 - 2008/audio/25c3-2873-en-privacy_in_the_social_semantic_web.ogg 19.6 MB
  • 30C3 - 2013/audio/30c3-5544-de-en-Sim_Gishel_opus.opus 19.5 MB
  • 22C3 - 2005/audio/22C3-550-de-epass_und_biop2.m4a 19.5 MB
  • 22C3 - 2005/audio/22C3-572-en-fuzzy_democracy.m4a 19.5 MB
  • 26C3 - 2009/audio/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.ogg 19.5 MB
  • 25C3 - 2008/audio/25c3-2892-en-about_cyborgs_and_gargoyles_.ogg 19.4 MB
  • 22C3 - 2005/audio/22C3-1147-en-the_realtime_podcast.m4a 19.4 MB
  • 24C3 - 2007/audio/24c3-2250-de-abschlussbericht_fem.mp3 19.3 MB
  • 30C3 - 2013/audio/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_opus.opus 19.3 MB
  • 24C3 - 2007/audio/24c3-2247-en-breaking_a_vm.mp3 19.2 MB
  • 22C3 - 2005/audio/22C3-586-en-pypy.m4a 19.2 MB
  • 27C3 - 2010/audio/27c3-4003-en-cybernetics_for_the_masses.ogg 19.2 MB
  • 24C3 - 2007/audio/24c3-2190-en-introduction_in_mems.mp3 19.1 MB
  • 25C3 - 2008/audio/25c3-2896-en-chip_reverse_engineering.ogg 19.1 MB
  • 25C3 - 2008/audio/25c3-3007-en-running_your_own_gsm_network.ogg 19.1 MB
  • 32C3 - 2015/audio/32c3-7138-en-Gscheitern.opus 19.1 MB
  • 25C3 - 2008/audio/25c3-2988-en-just_estonia_and_georgia.ogg 19.0 MB
  • 22C3 - 2005/audio/22C3-464-en-working_memory_mental_imagery.m4a 19.0 MB
  • 25C3 - 2008/audio/25c3-3004-en-why_technology_sucks.ogg 19.0 MB
  • 25C3 - 2008/audio/25c3-2845-en-rf_fingerprinting_of_rfid.ogg 19.0 MB
  • 29C3 - 2012/audio/29c3-5208-en-accessibility_and_security_ogg.ogg 18.9 MB
  • 22C3 - 2005/audio/22C3-1108-en-black_ops_of_tcp_ip.m4a 18.9 MB
  • 22C3 - 2005/audio/22C3-888-de-digitale_buergerrechte_in_europa.m4a 18.9 MB
  • 16C3 - 1999/audio/teslaspulen_vortrag.wav.mp3 18.9 MB
  • 20C3 - 2003/audio/20c3_587_Daten-sammeln-fuer-Datengarten-und-Lesemaschienen.ogg 18.8 MB
  • 22C3 - 2005/audio/22C3-1101-en-the_grey_commons.m4a 18.8 MB
  • 22C3 - 2005/audio/22C3-602-en-protocols_services_embedded_devices.m4a 18.8 MB
  • 27C3 - 2010/audio/27c3-4302-en-27c3_keynote_we_come_in_peace.ogg 18.8 MB
  • 22C3 - 2005/audio/22C3-417-en-learning_js_with_google_maps.m4a 18.8 MB
  • 32C3 - 2015/audio/32c3-7245-en-Reversing_UEFI_by_execution.opus 18.8 MB
  • 25C3 - 2008/audio/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg 18.7 MB
  • 20C3 - 2003/audio/20c3_599_Software-Patente.ogg 18.7 MB
  • 22C3 - 2005/audio/22C3-800-en-better_code.m4a 18.7 MB
  • 29C3 - 2012/audio/29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_ogg.ogg 18.7 MB
  • 22C3 - 2005/audio/22C3-577-de-voip_2005_regulierte_revolution.m4a 18.7 MB
  • 22C3 - 2005/audio/22C3-801-en-vulnerability_markets.m4a 18.7 MB
  • 24C3 - 2007/audio/24c3-2354-en-latest_trends_in_oracle_security.mp3 18.7 MB
  • 30C3 - 2013/audio/30c3-5447-en-Policing_the_Romantic_Crowd_opus.opus 18.6 MB
  • 22C3 - 2005/audio/22C3-1112-en-modern_disk_encryption.m4a 18.6 MB
  • 22C3 - 2005/audio/22C3-407-en-evocell.m4a 18.6 MB
  • 22C3 - 2005/audio/22C3-571-en-understanding_buffer_overflow_exploitation.m4a 18.5 MB
  • 22C3 - 2005/audio/22C3-598-de-literarisches_code_quartett.m4a 18.5 MB
  • 22C3 - 2005/audio/22C3-569-en-lojban.m4a 18.5 MB
  • 22C3 - 2005/audio/22C3-1134-en-the_silent_decline_of_public_control.m4a 18.5 MB
  • 22C3 - 2005/audio/22C3-882-de-biometrics_in_science_fiction.m4a 18.5 MB
  • 30C3 - 2013/audio/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_opus.opus 18.4 MB
  • 19C3 - 2002/audio/19C3-404-unscharfe-kryptografische-fingerabdruecke.mp3 18.4 MB
  • 22C3 - 2005/audio/22C3-495-de-hash_trust_compute.m4a 18.4 MB
  • 22C3 - 2005/audio/22C3-585-en-agile_business_and_eu_funding.m4a 18.4 MB
  • 22C3 - 2005/audio/22C3-390-en-private_investigations.m4a 18.3 MB
  • 24C3 - 2007/audio/24c3-2276-en-space_communism.mp3 18.3 MB
  • 31C3 - 2014/audio/31c3-6561-en-31C3_Opening_Event_opus.opus 18.3 MB
  • 22C3 - 2005/audio/22C3-931-en-changing_realities.m4a 18.2 MB
  • 22C3 - 2005/audio/22C3-562-en-the_right_track.m4a 18.2 MB
  • 22C3 - 2005/audio/22C3-772-en-attacking_ipv6.m4a 18.2 MB
  • 21C3 - 2004/audio/215 The Incomputable Alan Turing.mp3 18.1 MB
  • 24C3 - 2007/audio/24c3-2214-en-make_cool_things_with_microcontrollers.mp3 18.1 MB
  • 22C3 - 2005/audio/22C3-1148-de-sicherheitueberwachung.m4a 18.1 MB
  • 22C3 - 2005/audio/22C3-530-en-seccode.m4a 18.0 MB
  • 26C3 - 2009/audio/26c3-3353-de-reverse-engineering_displaylink_devices.ogg 18.0 MB
  • 31C3 - 2014/audio/31c3-6595-en-de-Hard_Drive_Punch_opus.opus 18.0 MB
  • 22C3 - 2005/audio/22C3-405-en-cybercrime_convention.m4a 18.0 MB
  • 21C3 - 2004/audio/101 XMPP - Jabber.mp3 18.0 MB
  • 24C3 - 2007/audio/24c3-2258-en-design_noir.mp3 17.9 MB
  • 22C3 - 2005/presentations/22C3_Proceedings.pdf 17.9 MB
  • 30C3 - 2013/audio/30c3-5588-en-de-My_journey_into_FM-RDS_opus.opus 17.9 MB
  • 20C3 - 2003/audio/20c3_550_ROCK-Linux-Das-Tool-zum-erstellen-von-Distros.ogg 17.9 MB
  • 22C3 - 2005/audio/22C3-768-en-free_software_gsm_phone.m4a 17.8 MB
  • 21C3 - 2004/audio/060 Digital Prosthetics.mp3 17.8 MB
  • 22C3 - 2005/audio/22C3-470-en-wsis_review.m4a 17.7 MB
  • 22C3 - 2005/audio/22C3-1132-de-sony_rootkit.m4a 17.7 MB
  • 22C3 - 2005/audio/22C3-1104-en-search_oracle_society.m4a 17.7 MB
  • 32C3 - 2015/audio/32c3-7401-en-Internet_Cube.opus 17.7 MB
  • 27C3 - 2010/audio/27c3-4168-en-automated_architecture_independent_gadget_search.ogg 17.7 MB
  • 22C3 - 2005/audio/22C3-423-en-corp_vs_corp.m4a 17.6 MB
  • 20C3 - 2003/audio/20c3_557_Ein-Rant-ueber-den-Missbrauch.ogg 17.6 MB
  • 22C3 - 2005/audio/22C3-605-de-hacking_cctv.m4a 17.6 MB
  • 22C3 - 2005/audio/22C3-504-en-data_retention.m4a 17.6 MB
  • 22C3 - 2005/audio/22C3-785-de-anon_tor_jap.m4a 17.6 MB
  • 27C3 - 2010/audio/27c3-4193-en-having_fun_with_rtp.ogg 17.6 MB
  • 24C3 - 2007/audio/24c3-2209-en-playstation_portable_cracking.mp3 17.6 MB
  • 19C3 - 2002/audio/19C3-440-pop-culture-and-media-hacking.mp3 17.5 MB
  • 22C3 - 2005/audio/22C3-429-en-w3c_web.m4a 17.5 MB
  • 24C3 - 2007/audio/24c3-2338-en-steam_powered_telegraphy.mp3 17.4 MB
  • 22C3 - 2005/audio/22C3-788-en-the_future_of_virtualization.m4a 17.4 MB
  • 15C3 - 1998/audio/sprache_dienste_und_kultur_des_internets.mp3 17.4 MB
  • 21C3 - 2004/audio/142 Lightning Talks Day 1.mp3 17.4 MB
  • 22C3 - 2005/audio/22C3-1085-en-technological_art.m4a 17.3 MB
  • 30C3 - 2013/audio/30c3-5536-en-Long_Distance_Quantum_Communication_opus.opus 17.3 MB
  • 27C3 - 2010/audio/27c3-4046-en-all_colours_are_beautiful.ogg 17.2 MB
  • 22C3 - 2005/audio/22C3-933-en-w3c_mobil_css_multimodal.m4a 17.2 MB
  • 22C3 - 2005/audio/22C3-781-en-bad_trips.m4a 17.2 MB
  • 22C3 - 2005/audio/22C3-505-en-collateral_damage.m4a 17.1 MB
  • 27C3 - 2010/audio/27c3-4073-de-logikschaltungen_ohne_elektronik.ogg 17.1 MB
  • 22C3 - 2005/audio/22C3-599-en-seaside_squeak.m4a 17.1 MB
  • 30C3 - 2013/audio/30c3-5547-en-Turing_Complete_User_opus.opus 17.1 MB
  • 22C3 - 2005/audio/22C3-588-en-robots_for_fun_and_research.m4a 17.1 MB
  • 32C3 - 2015/audio/32c3-7219-en-Trust_us_and_our_business_will_expand.opus 17.0 MB
  • 22C3 - 2005/audio/22C3-1103-en-community_mesh_networking.m4a 17.0 MB
  • 30C3 - 2013/audio/30c3-5494-en-Nerds_in_the_news_opus.opus 17.0 MB
  • 22C3 - 2005/audio/22C3-1098-en-internet_voting_in_estonia.m4a 17.0 MB
  • 22C3 - 2005/audio/22C3-479-en-fair_code.m4a 17.0 MB
  • 22C3 - 2005/audio/22C3-517-en-free_software_and_anarchism.m4a 17.0 MB
  • 22C3 - 2005/audio/22C3-782-de-urheberrecht.m4a 16.9 MB
  • 21C3 - 2004/audio/057 SUN Bloody Daft Solaris Mechanisms.mp3 16.9 MB
  • 22C3 - 2005/audio/22C3-1094-de-biop_2_studie.m4a 16.9 MB
  • 22C3 - 2005/audio/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.m4a 16.8 MB
  • 22C3 - 2005/audio/22C3-336-en-nanotechnology.m4a 16.8 MB
  • 29C3 - 2012/audio/29c3-5077-en-ethics_in_security_research_ogg.ogg 16.8 MB
  • 22C3 - 2005/audio/22C3-521-de-transparenz_der_verantwortung_in_behoerden.m4a 16.8 MB
  • 22C3 - 2005/audio/22C3-508-en-media_system_deployment.m4a 16.8 MB
  • 19C3 - 2002/audio/19C3-396-videorendering-cluster.mp3 16.8 MB
  • 27C3 - 2010/audio/27c3-4210-en-lying_to_the_neighbours.ogg 16.8 MB
  • 22C3 - 2005/audio/22C3-424-en-the_very_early_computer_game_history.m4a 16.8 MB
  • 22C3 - 2005/audio/22C3-473-en-privaterra.m4a 16.7 MB
  • 22C3 - 2005/audio/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.m4a 16.7 MB
  • 28C3 - 2011/audio/28c3-4927-en-noc_review_28c3_camp.ogg 16.7 MB
  • 25C3 - 2008/audio/25c3-2890-en-scalable_swarm_robotics.ogg 16.7 MB
  • 30C3 - 2013/audio/30c3-5295-en-The_Four_Wars_opus.opus 16.6 MB
  • 22C3 - 2005/audio/22C3-408-en-private_investigations_in_searching.m4a 16.6 MB
  • 22C3 - 2005/audio/22C3-596-en-blackberry.m4a 16.6 MB
  • 26C3 - 2009/audio/26c3-3717-en-closing_event.ogg 16.6 MB
  • 20C3 - 2003/audio/20c3_603_Spam-Analyse.ogg 16.6 MB
  • 22C3 - 2005/audio/22C3-580-en-wartracking.m4a 16.6 MB
  • 32C3 - 2015/audio/32c3-7238-en-Vector_retrogaming.opus 16.5 MB
  • 27C3 - 2010/audio/27c3-3983-en-hackers_and_computer_science.ogg 16.5 MB
  • 30C3 - 2013/audio/30c3-5614-en-Perfect_Paul_opus.opus 16.5 MB
  • 19C3 - 2002/audio/19C3-461-noc-review.mp3 16.5 MB
  • 22C3 - 2005/audio/22C3-549-en-digital_identity.m4a 16.5 MB
  • 19C3 - 2002/audio/19C3-445-forensik-schluesselspuren.mp3 16.5 MB
  • 29C3 - 2012/audio/29c3-5390-en-tacticaltech_ogg.ogg 16.5 MB
  • 22C3 - 2005/audio/22C3-513-en-military_intelligence.m4a 16.5 MB
  • 30C3 - 2013/audio/30c3-5479-en-Building_a_safe_NFC_ticketing_system_opus.opus 16.4 MB
  • 22C3 - 2005/audio/22C3-568-en-eu_data_retention_proposals.m4a 16.4 MB
  • 19C3 - 2002/audio/19C3-414-kuenstliche-unintelligenz.mp3 16.4 MB
  • 22C3 - 2005/audio/22C3-603-de-hacking_tomtom_go.m4a 16.4 MB
  • 28C3 - 2011/audio/28c3-4869-de-tresor.ogg 16.4 MB
  • 19C3 - 2002/audio/19C3-408-next-generation-operations-support-systems.mp3 16.4 MB
  • 22C3 - 2005/audio/22C3-1078-en-wifi_long_shots.m4a 16.3 MB
  • 22C3 - 2005/audio/22C3-567-en-3g_investigations.m4a 16.3 MB
  • 22C3 - 2005/audio/22C3-478-en-desaster_areas.m4a 16.3 MB
  • 21C3 - 2004/audio/049 Zufallszahlengeneratoren.mp3 16.2 MB
  • 22C3 - 2005/audio/22C3-561-en-intrusion_detection_systems.m4a 16.2 MB
  • 25C3 - 2008/audio/25c3-3002-en-squeezing_attack_traces.ogg 16.1 MB
  • 27C3 - 2010/audio/27c3-4142-en-nodejs_as_a_networking_tool.ogg 16.1 MB
  • 22C3 - 2005/audio/22C3-778-de-zauberhafte_naturwissenschaften.m4a 16.1 MB
  • 17C3 - 2000/video/17C3_Movie_freedom_downtime_discussion.rm 16.1 MB
  • 22C3 - 2005/audio/22C3-543-en-i_see_airplanes.m4a 16.0 MB
  • 30C3 - 2013/audio/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_opus.opus 16.0 MB
  • 30C3 - 2013/audio/30c3-5289-en-Coding_your_body_opus.opus 15.9 MB
  • 25C3 - 2008/audio/25c3-2839-en-cracking_the_msp430_bsl.ogg 15.9 MB
  • 22C3 - 2005/audio/22C3-529-en-muxtcp.m4a 15.9 MB
  • 24C3 - 2007/audio/24c3-2340-de-absurde_mathematik.mp3 15.8 MB
  • 22C3 - 2005/audio/22C3-1084-de-informationsfreiheitsgesetz.m4a 15.8 MB
  • 28C3 - 2011/audio/28c3-4828-de-antiforensik.ogg 15.8 MB
  • 30C3 - 2013/audio/30c3-5420-de-en-calcpw_opus.opus 15.8 MB
  • 24C3 - 2007/audio/24c3-2353-en-from_ring_zero_to_uid_zero.mp3 15.8 MB
  • 22C3 - 2005/audio/22C3-490-de-data_mining_weltfrieden.m4a 15.8 MB
  • 20C3 - 2003/audio/20c3_637_Distributed-Computing.ogg 15.8 MB
  • 19C3 - 2002/audio/19C3-463-rsa-padding-angriffe.mp3 15.7 MB
  • 22C3 - 2005/audio/22C3-511-de-videoueberwachung_hochschulen.m4a 15.7 MB
  • 25C3 - 2008/audio/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg 15.7 MB
  • 26C3 - 2009/audio/26c3-3688-de-haste_man_netblock.ogg 15.6 MB
  • 22C3 - 2005/audio/22C3-535-en-old_skewl_hacking.m4a 15.6 MB
  • 32C3 - 2015/audio/32c3-7551-en-Closing_Event.opus 15.6 MB
  • 22C3 - 2005/audio/22C3-1111-de-hexenbesen_und_heiliger_gral.m4a 15.5 MB
  • 30C3 - 2013/audio/30c3-5425-en-Hacking_as_Artistic_Practice_opus.opus 15.5 MB
  • 30C3 - 2013/video/30c3-5605-en-Opening_Event_h264-hq.mp4 15.5 MB
  • 22C3 - 2005/audio/22C3-468-en-lawful_interception_of_voip_networks.m4a 15.5 MB
  • 22C3 - 2005/audio/22C3-915-en-lightning_talk_day_4.m4a 15.5 MB
  • 22C3 - 2005/audio/22C3-563-en-real_life_bug_finding_in_win32.m4a 15.5 MB
  • 22C3 - 2005/audio/22C3-466-en-hacking_data_retention.m4a 15.5 MB
  • 22C3 - 2005/audio/22C3-499-en-access_to_knowledge.m4a 15.4 MB
  • 24C3 - 2007/audio/24c3-2256-de-openser_sip_server.mp3 15.4 MB
  • 22C3 - 2005/audio/22C3-553-en-syscall_proxying.m4a 15.4 MB
  • 22C3 - 2005/audio/22C3-565-en-voiphreaking.m4a 15.4 MB
  • 30C3 - 2013/audio/30c3-5594-en-Structuring_open_hardware_projects_opus.opus 15.3 MB
  • 22C3 - 2005/audio/22C3-544-en-applied_machine_learning.m4a 15.3 MB
  • 25C3 - 2008/audio/25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg 15.3 MB
  • 22C3 - 2005/audio/22C3-913-en-lightning_talk_day_3.m4a 15.3 MB
  • 19C3 - 2002/audio/19C3-518-angriff-der-mensch-maschine-schnittstelle.mp3 15.3 MB
  • 30C3 - 2013/audio/30c3-5469-de-en-2_Takte_spaeter_opus.opus 15.2 MB
  • 19C3 - 2002/audio/19C3-428-eroeffnung.mp3 15.2 MB
  • 25C3 - 2008/audio/25c3-2992-en-tricks_makes_you_smile.ogg 15.2 MB
  • 30C3 - 2013/audio/30c3-5566-en-Open_source_experimental_incubator_build_up_opus.opus 15.1 MB
  • 22C3 - 2005/audio/22C3-1099-en-hacking_openwrt.m4a 15.1 MB
  • 17C3 - 2000/video/17C3_AndyMM_WauHolland_Rueckblick.rm 15.1 MB
  • 22C3 - 2005/audio/22C3-791-de-big_brother_awards.m4a 15.1 MB
  • 22C3 - 2005/audio/22C3-1083-en-informational_cognitive_capitalism.m4a 15.1 MB
  • 22C3 - 2005/audio/22C3-926-en-disassembler_internals.m4a 15.0 MB
  • 30C3 - 2013/audio/30c3-5311-en-lasers_in_space_opus.opus 15.0 MB
  • 21C3 - 2004/audio/058 The Blinking Suspects.mp3 15.0 MB
  • 28C3 - 2011/audio/28c3-4759-en-open_source_music_tracking_2_0.ogg 15.0 MB
  • 30C3 - 2013/audio/30c3-5509-de-en-IFGINT_opus.opus 15.0 MB
  • 19C3 - 2002/audio/19C3-478-ipv6.mp3 14.9 MB
  • 30C3 - 2013/audio/30c3-5278-en-The_philosophy_of_hacking_opus.opus 14.9 MB
  • 22C3 - 2005/audio/22C3-461-en-peer_to_peer_under_the_hood.m4a 14.9 MB
  • 29C3 - 2012/audio/29c3-5138-en-romantichackers_ogg.ogg 14.9 MB
  • 22C3 - 2005/audio/22C3-769-en-rfid_protocols.m4a 14.8 MB
  • 22C3 - 2005/audio/22C3-593-en-software_patenting.m4a 14.8 MB
  • 19C3 - 2002/audio/19C3-449-smartcards-sosse.mp3 14.8 MB
  • 30C3 - 2013/audio/30c3-5539-en-Human_Rights_and_Technology_opus.opus 14.7 MB
  • 27C3 - 2010/audio/27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg 14.7 MB
  • 17C3 - 2000/audio/exploits.mp3 14.7 MB
  • 22C3 - 2005/audio/22C3-489-en-hacking_health.m4a 14.7 MB
  • 21C3 - 2004/audio/173 Closing Event.mp3 14.7 MB
  • 22C3 - 2005/audio/22C3-532-de-lyrical_i.m4a 14.6 MB
  • 29C3 - 2012/audio/29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_ogg.ogg 14.5 MB
  • 22C3 - 2005/audio/22C3-867-de-have_you_hugged_your_mac_today.m4a 14.5 MB
  • 30C3 - 2013/audio/30c3-5437-en-Plants_Machines_opus.opus 14.5 MB
  • 22C3 - 2005/audio/22C3-498-de-paper_prototyping_workshop.m4a 14.5 MB
  • 22C3 - 2005/audio/22C3-871-en-honeymonkeys.m4a 14.4 MB
  • 22C3 - 2005/audio/22C3-482-de-atmel_avr_for_dummies.m4a 14.4 MB
  • 24C3 - 2007/audio/24c3-2287-de-sex20.mp3 14.4 MB
  • 15C3 - 1998/audio/chipcard_hacking_teil2.mp3 14.3 MB
  • 30C3 - 2013/audio/30c3-5595-en-The_ArduGuitar_opus.opus 14.3 MB
  • 21C3 - 2004/audio/125 Old Skewl Hacking.mp3 14.3 MB
  • 22C3 - 2005/audio/22C3-556-en-preventing_buffer_overflows.m4a 14.3 MB
  • 25C3 - 2008/audio/25c3-2681-en-repurposing_the_ti_ez430u.ogg 14.3 MB
  • 21C3 - 2004/audio/052 Die Ueblichen Verdaechtigen.mp3 14.3 MB
  • 21C3 - 2004/audio/146 Mehr Sicherheit fuer HostAP-WLANs.mp3 14.2 MB
  • 22C3 - 2005/audio/22C3-428-en-hacking_challenge.m4a 14.2 MB
  • 22C3 - 2005/audio/22C3-531-en-hopalong_casualty.m4a 14.1 MB
  • 30C3 - 2013/audio/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_opus.opus 14.1 MB
  • 22C3 - 2005/audio/22C3-765-en-magnetic_stripe_technology.m4a 14.0 MB
  • 22C3 - 2005/audio/22C3-575-en-the_realtime_thing.m4a 14.0 MB
  • 22C3 - 2005/audio/22C3-415-en-developing_intelligent_search_engines.m4a 13.9 MB
  • 22C3 - 2005/audio/22C3-776-en-closing_event.m4a 13.9 MB
  • 17C3 - 2000/audio/Eroeffnung.mp3 13.9 MB
  • 20C3 - 2003/audio/20c3_623_Softwarekunst-Projekt-runme-org.ogg 13.9 MB
  • 28C3 - 2011/audio/28c3-4740-de-frag_den_staat.ogg 13.8 MB
  • 21C3 - 2004/video/249 Opening Event.mp4 13.8 MB
  • 22C3 - 2005/audio/22C3-503-de-esperanto.m4a 13.8 MB
  • 22C3 - 2005/audio/22C3-911-en-lightning_talk_day_1.m4a 13.7 MB
  • 22C3 - 2005/audio/22C3-589-en-anonymous_data_broadcasting.m4a 13.7 MB
  • 20C3 - 2003/audio/20c3_631_SkoleLinux.ogg 13.7 MB
  • 30C3 - 2013/audio/30c3-5319-en-Technomonopolies_opus.opus 13.7 MB
  • 22C3 - 2005/audio/22C3-483-de-ccc_jahresrueckblick.m4a 13.6 MB
  • 28C3 - 2011/audio/28c3-4656-en-ooops_i_hacked_my_pbx.ogg 13.6 MB
  • 30C3 - 2013/audio/30c3-5405-en-Data_Mining_for_Good_opus.opus 13.5 MB
  • 22C3 - 2005/audio/22C3-1295-en-future_challenges.m4a 13.5 MB
  • 27C3 - 2010/audio/27c3-4299-en-closing_event.ogg 13.3 MB
  • 17C3 - 2000/video/17C3_AndyMM_WauHolland_Abschluss.rm 13.3 MB
  • 22C3 - 2005/audio/22C3-798-en-tcpip_covert_channels.m4a 13.3 MB
  • 22C3 - 2005/audio/22C3-828-en-terminator_genes_and_gurt.m4a 13.2 MB
  • 15C3 - 1998/audio/chipcard_hacking_teil1.mp3 13.2 MB
  • 30C3 - 2013/audio/30c3-5453-en-Against_Metadata_opus.opus 13.2 MB
  • 15C3 - 1998/audio/denial_of_service_attacks.mp3 13.2 MB
  • 28C3 - 2011/audio/28c3-4587-en-bup_git_for_backups.ogg 13.1 MB
  • 24C3 - 2007/audio/24c3-2359-en-brilliant_deviants.mp3 13.1 MB
  • 19C3 - 2002/audio/19C3-481-raketen-basteln.mp3 13.0 MB
  • 29C3 - 2012/audio/29c3-5210-en-on_breaking_saml_ogg.ogg 13.0 MB
  • 31C3 - 2014/audio/31c3-6562-de-en-31C3_Closing_Event_opus.opus 13.0 MB
  • 25C3 - 2008/audio/25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg 12.9 MB
  • 20C3 - 2003/audio/20c3_560_Soziale-Software.ogg 12.9 MB
  • 28C3 - 2011/audio/28c3-4760-en-chokepointproject.ogg 12.9 MB
  • 28C3 - 2011/audio/28c3-4826-en-a_brief_history_of_plutocracy.ogg 12.8 MB
  • 28C3 - 2011/audio/28c3-4770-en-dont_scan_just_ask.ogg 12.7 MB
  • 28C3 - 2011/audio/28c3-4847-en-reverse_engineering_usb_devices.ogg 12.5 MB
  • 28C3 - 2011/audio/28c3-4652-en-data_mining_the_israeli_census.ogg 12.5 MB
  • 15C3 - 1998/audio/schulen_lehrer_und_blamagen.mp3 12.5 MB
  • 25C3 - 2008/audio/25c3-2904-en-solar-powering_your_geek_gear.ogg 12.4 MB
  • 28C3 - 2011/audio/28c3-4767-en-security_log_visualization_with_a_correlation_engine.ogg 12.4 MB
  • 19C3 - 2002/audio/19C3-429-abschlussveranstaltung.mp3 12.3 MB
  • 22C3 - 2005/audio/22C3-606-en-autodafe.m4a 12.1 MB
  • 22C3 - 2005/audio/22C3-1077-en-quantum_entanglement.m4a 12.0 MB
  • 27C3 - 2010/audio/27c3-4181-en-sip_home_gateways_under_fire.ogg 12.0 MB
  • 27C3 - 2010/audio/27c3-4006-en-diy_synthesizers_and_sound_generators.ogg 12.0 MB
  • 22C3 - 2005/audio/22C3-601-de-fnord_jahresrueckblick.m4a 12.0 MB
  • 32C3 - 2015/audio/32c3-7550-en-Opening_Event_opus.opus 11.9 MB
  • 21C3 - 2004/audio/312 Wirklich selbst denken oder durchdrehen.mp3 11.9 MB
  • 22C3 - 2005/audio/22C3-574-en-memory_allocator_security.m4a 11.9 MB
  • 20C3 - 2003/audio/20c3_644_Gute-Antennen-selber-bauen.ogg 11.9 MB
  • 22C3 - 2005/video/22C3-491-en-advanced_buffer_overflow_methods.mp4 11.8 MB
  • 17C3 - 2000/video/17C3_fefe_multicast.rm 11.6 MB
  • 22C3 - 2005/audio/22C3-912-en-lightning_talk_day_2.m4a 11.6 MB
  • 22C3 - 2005/audio/22C3-469-en-learning_cryptography.m4a 11.1 MB
  • 20C3 - 2003/audio/20c3_531_NOC-Preview_audio.ogg 10.6 MB
  • 20C3 - 2003/audio/20c3_610_Abschlussveranstaltung.ogg 10.5 MB
  • 24C3 - 2007/audio/24c3-2326-en-diy_survival.mp3 10.4 MB
  • 22C3 - 2005/audio/22C3-496-en-22c3_network.m4a 10.2 MB
  • 22C3 - 2005/audio/22C3-864-de-das_geheimnis_reloaded.m4a 10.0 MB
  • 17C3 - 2000/audio/Rueckblick.mp3 9.8 MB
  • 17C3 - 2000/video/17C3_AndyMM_WauHolland_intro.rm 9.8 MB
  • 20C3 - 2003/audio/20c3_555_Eroeffnung.ogg 9.6 MB
  • 21C3 - 2004/video/157 Lightning Talk-SEXual Salvation .mp4 9.0 MB
  • 21C3 - 2004/video/157 Lightning Talk-Piepie.mp4 8.9 MB
  • 22C3 - 2005/audio/22C3-1102-en-message_generation_at_the_info_layer.m4a 8.5 MB
  • 21C3 - 2004/audio/113 Automated Hacking via Google.mp3 8.3 MB
  • 31C3 - 2014/audio/31c3-6608-en-Premiere_We_love_surveillance_opus.opus 7.6 MB
  • 21C3 - 2004/audio/249 Opening Event.mp3 7.1 MB
  • 29C3 - 2012/audio/29c3-5399-en-opening_event_ogg.ogg 6.2 MB
  • 21C3 - 2004/video/157 Lightning Talk-Liquid Democracy Voting Machines in Brazil.mp4 6.1 MB
  • 28C3 - 2011/audio/28c3-4899-en-closing_event.ogg 6.1 MB
  • 24C3 - 2007/audio/24c3-2366-en-opening_event.mp3 5.8 MB
  • 21C3 - 2004/video/250 Lightning Talk-Subnetting in P2P systems.mp4 5.8 MB
  • 21C3 - 2004/video/250 Lightning Talk-IT security magazines in Europe.mp4 5.8 MB
  • 21C3 - 2004/video/142 Lightning Talk-IT Security - Quo Vadis.mp4 5.7 MB
  • 21C3 - 2004/video/157 Lightning Talk-Window Manager Improved GUI Concepts.mp4 5.7 MB
  • 21C3 - 2004/video/250 Lightning Talk-Introducing Meshdisk single floppy Linux.mp4 5.6 MB
  • 30C3 - 2013/audio/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_opus.opus 5.6 MB
  • 32C3 - 2015/audio/32c3-7279-en-Public_Library_Memory_of_the_World.opus 5.5 MB
  • 30C3 - 2013/audio/30c3-5605-en-Opening_Event_opus.opus 5.4 MB
  • 21C3 - 2004/video/21C3_-_The_Network_Equipment_Delivery.mp4 5.4 MB
  • 21C3 - 2004/video/142 Lightning Talk-Linuxclub.de.mp4 5.4 MB
  • 21C3 - 2004/video/250 Lightning Talk-Mute Magazine and openmute.org.mp4 5.3 MB
  • 21C3 - 2004/bonus/21C3-trailer.mp4 5.2 MB
  • 21C3 - 2004/video/250 Lightning Talk-Block Ciphers creates by evolutionary algorithms.mp4 5.2 MB
  • 21C3 - 2004/presentations/125 Old Skewl Hacking Infra Red.pdf 5.1 MB
  • 21C3 - 2004/video/157 Lightning Talk-Whats hot in Wikilandia.mp4 5.1 MB
  • 15C3 - 1998/audio/interview_mit_tron.mp3 5.0 MB
  • 21C3 - 2004/video/157 Lightning Talk-trusted computing for everybody.mp4 5.0 MB
  • 21C3 - 2004/video/250 Lightning Talk-NetBSD Status Report.mp4 4.7 MB
  • 21C3 - 2004/video/157 Lightning Talk-TPP text presentation program.mp4 4.5 MB
  • 21C3 - 2004/presentations/044 Machine Learning in Science and Engineering.pdf 4.5 MB
  • 21C3 - 2004/video/142 Lightning Talk-Plazes by Plazes.mp4 4.3 MB
  • 21C3 - 2004/video/142 Lightning Talk-Shortest C Coding Contest Announcement.mp4 4.2 MB
  • 21C3 - 2004/video/157 Lightning Talk-muttng.mp4 4.1 MB
  • 21C3 - 2004/video/157 Lightning Talk-New Demonstration Tactics Pink Silver Block.mp4 4.0 MB
  • 21C3 - 2004/video/157 Lightning Talk-Bags for Cellphones Silvercell.mp4 4.0 MB
  • 33C3 - 2016/Talking Behind Your Back (33c3) - deutsche Ubersetzung.mp4 3.9 MB
  • 21C3 - 2004/presentations/121 Black Ops of DNS.pdf 3.8 MB
  • 21C3 - 2004/presentations/310 Information-Wissen-Macht.pdf 3.8 MB
  • 21C3 - 2004/video/250 Lightning Talk-Stacksmashing Winner.mp4 3.7 MB
  • 22C3 - 2005/audio/22C3-491-en-advanced_buffer_overflow_methods.m4a 3.6 MB
  • 21C3 - 2004/presentations/070 Fnord-Jahresrueckblick.pdf 3.6 MB
  • 15C3 - 1998/audio/versuche_einer_klaerung_von_trons_tod.mp3 3.6 MB
  • 21C3 - 2004/presentations/153 Suchmaschinenpolitik.pdf 3.5 MB
  • 21C3 - 2004/presentations/183 Tor.pdf 3.5 MB
  • 21C3 - 2004/presentations/029 Robocup.pdf 3.4 MB
  • 21C3 - 2004/presentations/271 Hidden Data in Internet Published Documents.pdf 3.3 MB
  • 21C3 - 2004/presentations/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf 3.3 MB
  • 21C3 - 2004/presentations/059 Wikipedia Sociographics.pdf 3.2 MB
  • 21C3 - 2004/presentations/079 AVG aint vector graphics.pdf 3.1 MB
  • 15C3 - 1998/audio/eroeffnung.mp3 3.1 MB
  • 21C3 - 2004/presentations/140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf 2.8 MB
  • 21C3 - 2004/presentations/012 Natural Language Steganography.pdf 2.7 MB
  • 21C3 - 2004/presentations/136 Hacking Linux-Powered Devices.pdf 2.7 MB
  • 21C3 - 2004/presentations/178 Humanoid Robots.pdf 2.6 MB
  • 21C3 - 2004/presentations/077 Weird Programming 2.pdf 2.3 MB
  • 21C3 - 2004/presentations/158 How to find anything on the web.pdf 2.2 MB
  • 21C3 - 2004/presentations/040 Firewall Piercing.pdf 2.0 MB
  • 21C3 - 2004/presentations/108 The Convergence of Anti-Counterfeiting and Computer Security.pdf 2.0 MB
  • 33C3 - 2016/Dissecting HDMI (33c3).mp4 1.9 MB
  • 21C3 - 2004/presentations/126 Apache Security.pdf 1.9 MB
  • 21C3 - 2004/presentations/168 Spampolitik.pdf 1.8 MB
  • 21C3 - 2004/presentations/207 Amateurfunk.pdf 1.8 MB
  • 21C3 - 2004/presentations/216 Hacking The Genome.pdf 1.7 MB
  • 21C3 - 2004/presentations/208 GameCube Hacking.pdf 1.7 MB
  • 23C3 - 2006/video/23C3-1602-en-subverting_ajax.mp4 1.7 MB
  • 21C3 - 2004/video/142 Lightning Talk-Stacksmashing Contest.mp4 1.7 MB
  • 23C3 - 2006/video/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp4 1.7 MB
  • 21C3 - 2004/presentations/130 Physical Security.pdf 1.7 MB
  • 21C3 - 2004/audio/331 Biometrie ueberwinden Wdh.mp3 1.7 MB
  • 21C3 - 2004/presentations/118 Verified Fiasco.pdf 1.7 MB
  • 21C3 - 2004/presentations/151 Side Channel Analysis of Smart Cards.pdf 1.6 MB
  • 23C3 - 2006/video/23C3-1561-de-big_brother_awards.mp4 1.6 MB
  • 21C3 - 2004/presentations/081 Quantenmechanik fuer Nicht Physiker.pdf 1.6 MB
  • 21C3 - 2004/presentations/176 Passive covert channels in the Linux kernel.pdf 1.5 MB
  • 23C3 - 2006/video/23C3-1656-en-dylan_network_security.mp4 1.4 MB
  • 23C3 - 2006/video/23C3-1576-en-rfid_hacking.mp4 1.4 MB
  • 17C3 - 2000/audio/fefe_multicast.mp3 1.4 MB
  • 21C3 - 2004/presentations/063 Edit This Page.pdf 1.4 MB
  • 21C3 - 2004/presentations/083 Quanteninformationstheorie fuer Nicht Physiker.pdf 1.4 MB
  • 21C3 - 2004/presentations/109 Anti-Honeypot Techniques.pdf 1.3 MB
  • 21C3 - 2004/presentations/065 Grundlagen des Compilerdesign.pdf 1.3 MB
  • 23C3 - 2006/video/23C3-1692-en-hacking_the_electoral_law.mp4 1.3 MB
  • 23C3 - 2006/video/23C3-1461-en-the_grim_meathook_future.mp4 1.3 MB
  • 21C3 - 2004/presentations/255 Pixels want to talk.pdf 1.3 MB
  • 21C3 - 2004/presentations/068 NOC Overview.pdf 1.2 MB
  • 21C3 - 2004/presentations/046 Tollcollect.pdf 1.2 MB
  • 21C3 - 2004/presentations/058 The Blinking Suspects.pdf 1.1 MB
  • 21C3 - 2004/presentations/013 The Art of Fingerprinting.pdf 1.1 MB
  • 21C3 - 2004/presentations/242 Weird Programming 1.pdf 1.1 MB
  • 23C3 - 2006/video/23C3-1537-en-know_your_citizens.mp4 1.1 MB
  • 21C3 - 2004/presentations/064 Trusted Computing.pdf 1.1 MB
  • 21C3 - 2004/presentations/187 Einfuehrung in die Rastersondenmikroskopie.pdf 1.1 MB
  • 21C3 - 2004/presentations/017 Next Generation Peer to Peer Systems.pdf 1.0 MB
  • 21C3 - 2004/presentations/039 Squeak and Croquet.pdf 1.0 MB
  • 21C3 - 2004/presentations/023 Ciphire Mail.pdf 1.0 MB
  • 21C3 - 2004/presentations/080 USB-Unbekannter Serieller Bus.pdf 996.0 kB
  • 21C3 - 2004/presentations/214 Kryptographie in Theorie und Praxis.pdf 935.5 kB
  • 21C3 - 2004/presentations/097 Das Literarische Code-Quartett.pdf 933.6 kB
  • 21C3 - 2004/video/21C3-trailer.mp4 929.3 kB
  • 21C3 - 2004/presentations/165 Softwarepatente - Der Tag danach.pdf 926.8 kB
  • 21C3 - 2004/presentations/051 Recent features to OpenBSD-ntpd and bgpd.pdf 919.5 kB
  • 21C3 - 2004/presentations/246 RFID Technologie und Implikationen.pdf 887.2 kB
  • 21C3 - 2004/presentations/037 GNOME Anwendungsentwicklung.pdf 836.8 kB
  • 21C3 - 2004/presentations/016 Phishing the Web.pdf 780.9 kB
  • 21C3 - 2004/presentations/277 Das Programmiersystem Forth.pdf 777.4 kB
  • 21C3 - 2004/presentations/062 Hacking EU funding for a FOSS project.pdf 774.4 kB
  • 21C3 - 2004/presentations/115 The Fiasco Kernel.pdf 759.8 kB
  • 21C3 - 2004/presentations/019 Verdeckte Netzwerkanalyse.pdf 729.1 kB
  • 21C3 - 2004/presentations/213 Haskell.pdf 697.4 kB
  • 21C3 - 2004/presentations/105 Honeypot Forensics.pdf 684.6 kB
  • 21C3 - 2004/presentations/026 SAP R3 Protocol Reverse Engineering.pdf 674.8 kB
  • 21C3 - 2004/presentations/146 Mehr Sicherheit fuer HostAP-WLANs.pdf 671.8 kB
  • 21C3 - 2004/presentations/250 Lightning Talk-NetBSD Status Report.pdf 667.0 kB
  • 21C3 - 2004/presentations/315 Fight for your Right to Fileshare.pdf 652.5 kB
  • 21C3 - 2004/presentations/045 Internet Censorship in China.pdf 588.4 kB
  • 21C3 - 2004/presentations/038 Free Software Usage in South America.pdf 582.4 kB
  • 21C3 - 2004/presentations/273 Crashkurs Mathematik am Beispiel Biometrie.pdf 579.8 kB
  • 33C3 - 2016/A New Dark Age (33c3).mp4 569.6 kB
  • 21C3 - 2004/presentations/014 Feuriges Hacken.pdf 508.6 kB
  • 21C3 - 2004/presentations/159 State of Emergent Democracy.pdf 497.7 kB
  • 21C3 - 2004/presentations/049 Zufallszahlengeneratoren.pdf 497.1 kB
  • 21C3 - 2004/presentations/272 Sicherheitsmanagement.pdf 487.4 kB
  • 33C3 - 2016/Hochsicherheits-GeneralschlUssel Marke Eigenbau (33c3).mp4 432.7 kB
  • 21C3 - 2004/presentations/078 Aspects of Elliptic Curve Cryptography.pdf 425.6 kB
  • 33C3 - 2016/An Elevator to the Moon (and back) (33c3).mp4 420.9 kB
  • 21C3 - 2004/presentations/114 Der 2. Korb der Urheberrechtsnovelle.pdf 389.3 kB
  • 21C3 - 2004/presentations/306 Ruby.pdf 374.6 kB
  • 21C3 - 2004/presentations/066 Bluetooth Hacking.pdf 362.1 kB
  • 21C3 - 2004/presentations/060 Digital Prosthetics.pdf 349.2 kB
  • 21C3 - 2004/presentations/027 Biometrie in Ausweisdokumenten.pdf 343.4 kB
  • 33C3 - 2016/A New Dark Age (33c3) - deutsche Ubersetzung.mp4 338.3 kB
  • 33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3) - english translation.mp4 337.3 kB
  • 19C3 - 2002/presentations/19C3-506-slides.pdf 326.0 kB
  • 21C3 - 2004/presentations/107 Embedded Devices as an attack vector.pdf 305.0 kB
  • 21C3 - 2004/presentations/316 Bericht von den BigBrotherAwards.pdf 300.2 kB
  • 21C3 - 2004/presentations/317 Unsicherheit von Personal Firewalls.pdf 296.1 kB
  • 21C3 - 2004/presentations/131 Learning OpenPGP by Example.pdf 294.6 kB
  • 21C3 - 2004/presentations/099 GPL fuer Anfaenger.pdf 275.1 kB
  • 21C3 - 2004/presentations/098 Portable Software-Installation with pkg source.pdf 267.8 kB
  • 19C3 - 2002/presentations/Internet-Zensur-in-NRW.pdf 260.5 kB
  • 19C3 - 2002/presentations/19C3-506-slides.ppt 254.0 kB
  • 33C3 - 2016/The Nibbletronic (33c3) - deutsche Ubersetzung.mp4 237.5 kB
  • 21C3 - 2004/presentations/111 The Kernel Accelerator Device.pdf 228.9 kB
  • 21C3 - 2004/presentations/110 Applied Data Mining.pdf 223.8 kB
  • 21C3 - 2004/presentations/278 TKUeV-Das Ohr am Draht.pdf 206.6 kB
  • 21C3 - 2004/presentations/123 Gentoo Hardened.pdf 201.8 kB
  • 21C3 - 2004/presentations/056 LiberTOS.pdf 201.5 kB
  • 21C3 - 2004/presentations/042 Cored Programming.pdf 200.9 kB
  • 19C3 - 2002/presentations/19C3-411-pressemappe.pdf 200.1 kB
  • 33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3).srt 173.9 kB
  • 21C3 - 2004/presentations/218 Practical MacOS X Insecurities.pdf 170.8 kB
  • 21C3 - 2004/presentations/011 xDash.pdf 168.9 kB
  • 33C3 - 2016/Console Hacking 2016 (33c3).srt 165.3 kB
  • 33C3 - 2016/Stopping law enforcement hacking (33c3) - english translation.srt 162.8 kB
  • 33C3 - 2016/Nicht öffentlich. (33c3) - english translation.srt 161.7 kB
  • 33C3 - 2016/Software Defined Emissions (33c3).srt 161.3 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Monero Hardware Development.en.transcribed.srt 161.3 kB
  • 33C3 - 2016/Die Sprache der Populisten (33c3) - english translation.srt 160.9 kB
  • 33C3 - 2016/Untrusting the CPU (33c3).srt 160.8 kB
  • 33C3 - 2016/Liberté, Égalité, Fraternité... and privacy ! (33c3) - deutsche Ubersetzung.mp4 160.2 kB
  • 33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3).srt 159.9 kB
  • 17C3 - 2000/video/17C3_digitv.rm 159.7 kB
  • 19C3 - 2002/presentations/19C3-518-slides-de.pdf 158.7 kB
  • 21C3 - 2004/presentations/308 MD5 To Be Considered Harmful Someday.pdf 157.4 kB
  • 33C3 - 2016/A look into the Mobile Messaging Black Box (33c3).srt 157.1 kB
  • 19C3 - 2002/presentations/19C3-518-slides-en.pdf 155.9 kB
  • 33C3 - 2016/Visiting The Bear Den (33c3).srt 155.8 kB
  • 33C3 - 2016/EinfUhrung zu Blockchains (33c3) - english translation.srt 153.2 kB
  • 21C3 - 2004/presentations/120 Softwarepatente - Ruestzeug zur Debatte.pdf 152.8 kB
  • 33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3).srt 150.5 kB
  • 33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3).srt 150.5 kB
  • 21C3 - 2004/presentations/117 Kampagne Fair Sharing.pdf 150.2 kB
  • 33C3 - 2016/Where in the World Is Carmen Sandiego (33c3).srt 149.5 kB
  • 33C3 - 2016/Copywrongs 2.0 (33c3).srt 148.2 kB
  • 19C3 - 2002/presentations/19C3-484-slides.sdd 148.0 kB
  • 33C3 - 2016/No USB No problem. (33c3) - YouTube.srt 147.0 kB
  • 33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3).srt 146.8 kB
  • 21C3 - 2004/presentations/274 Praktische Anleitung zum Bau eines Radiosenders.pdf 146.7 kB
  • 21C3 - 2004/presentations/244 High Speed Computing with FPGAs.pdf 144.7 kB
  • 33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3) - english translation.srt 144.5 kB
  • 33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3).mp4 143.6 kB
  • 33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3).srt 142.9 kB
  • 33C3 - 2016/The Fight for Encryption in 2016 (33c3).srt 141.7 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Magic Internet Money.en.transcribed.srt 139.4 kB
  • 33C3 - 2016/The DROWN Attack (33c3).srt 138.7 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Privacy-Oriented Distributed Networking for an Ethical Internet - including 50 sub.en.transcribed.srt 138.0 kB
  • 33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3).srt 137.4 kB
  • 33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3).srt 136.5 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Ethereum AMA.en.transcribed.srt 132.5 kB
  • 33C3 - 2016/Downgrading iOS From past to present (33c3).srt 130.6 kB
  • 33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3).srt 126.7 kB
  • 21C3 - 2004/presentations/134 Secure Instant Messaging.pdf 123.6 kB
  • 19C3 - 2002/presentations/479/content.xml 120.3 kB
  • 33C3 - 2016/Exploiting PHP7 unserialize (33c3).srt 119.8 kB
  • 33C3 - 2016/Netzpolitik in Österreich (33c3) - english translation.srt 119.7 kB
  • 21C3 - 2004/presentations/057 SUN Bloody Daft Solaris Mechanisms.pdf 118.6 kB
  • 21C3 - 2004/presentations/067 Inside PDF.pdf 118.1 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Namecoin as a Decentralized Alternative to Certificate Authorities for TLS.en.transcribed.srt 117.4 kB
  • 33C3 - 2016/Reverse engineering Outernet (33c3).srt 117.2 kB
  • 33C3 - 2016/The Global Assassination Grid (33c3).srt 116.3 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Bisq - A decentralized bitcoin exchange.en.transcribed.srt 116.1 kB
  • 33C3 - 2016/Bootstraping a slightly more secure laptop (33c3).srt 110.2 kB
  • 33C3 - 2016/A world without blockchain (33c3).srt 107.9 kB
  • 21C3 - 2004/presentations/313 Biometrie als datenschutzrechtliches Problem.pdf 107.4 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Nextcloud End to End Encryption.en.transcribed.srt 106.2 kB
  • 21C3 - 2004/presentations/127 Security Frameworks.pdf 105.1 kB
  • 33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3).srt 102.8 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Monerujo - Android Monero Wallet.en.transcribed.srt 102.7 kB
  • 19C3 - 2002/presentations/19C3-432-slides.pdf 101.3 kB
  • 21C3 - 2004/presentations/055 CCC-Jahresrueckblick.pdf 101.1 kB
  • 33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3) - english translation.srt 101.0 kB
  • 21C3 - 2004/presentations/041 Einfuehrung in Kryptographische Methoden.pdf 99.9 kB
  • 33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3) - english translati.srt 99.0 kB
  • 19C3 - 2002/presentations/19C3-434-slides.pdf 96.6 kB
  • 21C3 - 2004/presentations/129 Die Propagandawueste des realen Krieges.pdf 96.3 kB
  • 33C3 - 2016/Wheel of Fortune (33c3).srt 96.0 kB
  • 21C3 - 2004/presentations/101 XMPP - Jabber.pdf 94.4 kB
  • 21C3 - 2004/presentations/095 Security Nightmares 2005.pdf 90.0 kB
  • 21C3 - 2004/presentations/015 Sicherheit bei VoIP-Systemen.pdf 89.7 kB
  • 33C3 - 2016/The Clash of Digitalizations (33c3).srt 88.8 kB
  • 21C3 - 2004/presentations/289 Mixing VJing and Post-Production.pdf 87.8 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - SecureDrop.en.transcribed.srt 86.4 kB
  • 21C3 - 2004/presentations/100 Anonymous communications.pdf 85.5 kB
  • 21C3 - 2004/presentations/135 Voting Machine Technology.pdf 84.9 kB
  • 33C3 - 2016/Routerzwang und Funkabschottung (33c3).mp4 82.0 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Scalable and privacy-respectful distributed systems - Our chance to avoid cloud co.en.transcribed.srt 81.5 kB
  • 21C3 - 2004/presentations/113 Automated Hacking via Google.pdf 80.3 kB
  • 21C3 - 2004/presentations/122 Enforcement of Intellectual Property Rights under German Private Law.pdf 80.0 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Die Programmiersprache Forth.en.transcribed.srt 79.6 kB
  • 21C3 - 2004/presentations/053 Enforcing the GNU GPL.pdf 78.9 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Worldviews Hacking Abstractions.en.transcribed.srt 78.3 kB
  • 33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3).srt 78.2 kB
  • 33C3 - 2016/Make the Internet Neutral Again (33c3).srt 78.0 kB
  • 33C3 - 2016/Pegasus internals (33c3).srt 77.5 kB
  • 32C3 - 2015/audio/32c3-7491-en-De-anonymizing_Programmers.opus 77.1 kB
  • 33C3 - 2016/Syrian Archive (33c3).srt 76.5 kB
  • 33C3 - 2016/Routerzwang und Funkabschottung (33c3) - english translation.srt 75.8 kB
  • 33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3).srt 75.4 kB
  • 33C3 - 2016/Whats It Doing Now (33c3).srt 73.5 kB
  • 33C3 - 2016/In Search of Evidence-Based IT-Security (33c3).srt 73.4 kB
  • 33C3 - 2016/Hacking the World (33c3).srt 71.9 kB
  • 33C3 - 2016/Shut Up and Take My Money! (33c3).srt 71.0 kB
  • 33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - english tran.srt 69.9 kB
  • 33C3 - 2016/Welcome to the Anthropocene (33c3).srt 68.5 kB
  • 33C3 - 2016/Space making space shaping (33c3) - english translation.srt 68.0 kB
  • 33C3 - 2016/Geolocation methods in mobile networks (33c3).srt 65.9 kB
  • 21C3 - 2004/presentations/072 The Reality of Network Address Translators.pdf 65.5 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - On Scripting.en.transcribed.srt 64.4 kB
  • 19C3 - 2002/presentations/19C3-453-manuscript.rtf 59.9 kB
  • 33C3 - 2016/International exchange of tax information (33c3).srt 58.8 kB
  • 33C3 - 2016/Der 33 JahrerUckblick (33c3).srt 54.7 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - A Blueprint for Making Namecoin Anonymous.en.transcribed.srt 52.4 kB
  • 33C3 - 2016/Tapping into the core (33c3).srt 52.1 kB
  • 21C3 - 2004/presentations/253 Pixels want to be many.pdf 50.1 kB
  • 33C3 - 2016/Kampf dem Abmahnunwesen (33c3) - english translation.srt 49.1 kB
  • 21C3 - 2004/presentations/052 Die Ueblichen Verdaechtigen.pdf 48.2 kB
  • 21C3 - 2004/presentations/163 SPAM Workshop.pdf 44.9 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Sovereignty in Catalonia; 1st Step Decentralized Infrastructure.en.transcribed.srt 44.7 kB
  • 33C3 - 2016/Shut Up and Take My Money! (33c3).mp4 43.9 kB
  • 33C3 - 2016/Kampf dem Abmahnunwesen (33c3).mp4 43.8 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - P2P with JavaScript to defend against bad lawmaking.en.transcribed.srt 42.7 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Three Ways to Enhance Metadata Protection Beyond Tor - secushare.org.en.transcribed.srt 41.5 kB
  • 33C3 - 2016/The Nibbletronic (33c3).srt 40.9 kB
  • ChaosWest 34c3 - 2017/34C3 ChaosWest - Scuttlebutt introduction.en.transcribed.srt 39.9 kB
  • 33C3 - 2016/Check Your Police Record! (33c3) - traduction française.mp4 38.5 kB
  • 19C3 - 2002/presentations/479/styles.xml 29.7 kB
  • 21C3 - 2004/presentations/047 Datamining the NSA.pdf 29.1 kB
  • 33C3 - 2016/33C3 Opening Ceremony (33c3).srt 28.5 kB
  • 15C3 - 1998/presentations/tcpip/folie35.png 27.4 kB
  • 15C3 - 1998/presentations/tcpip/folie33.png 27.3 kB
  • 15C3 - 1998/presentations/tcpip/folie45.png 27.3 kB
  • 15C3 - 1998/presentations/tcpip/folie12.png 26.9 kB
  • 15C3 - 1998/presentations/tcpip/folie18.png 26.6 kB
  • 15C3 - 1998/presentations/tcpip/folie16.png 26.2 kB
  • 15C3 - 1998/presentations/tcpip/folie41.png 26.2 kB
  • 15C3 - 1998/presentations/tcpip/folie10.png 25.9 kB
  • 15C3 - 1998/presentations/tcpip/folie4.png 25.8 kB
  • 15C3 - 1998/presentations/tcpip/folie36.png 25.7 kB
  • 15C3 - 1998/presentations/tcpip/folie23.png 25.7 kB
  • 15C3 - 1998/presentations/tcpip/folie46.png 25.7 kB
  • 15C3 - 1998/presentations/tcpip/folie27.png 25.6 kB
  • 15C3 - 1998/presentations/tcpip/folie54.png 25.5 kB
  • 15C3 - 1998/presentations/tcpip/folie20.png 25.2 kB
  • 15C3 - 1998/presentations/tcpip/folie32.png 25.1 kB
  • 15C3 - 1998/presentations/tcpip/folie42.png 24.7 kB
  • 15C3 - 1998/presentations/tcpip/folie39.png 24.1 kB
  • 15C3 - 1998/presentations/tcpip/folie37.png 23.9 kB
  • 15C3 - 1998/presentations/tcpip/folie3.png 23.8 kB
  • 15C3 - 1998/presentations/tcpip/folie50.png 23.7 kB
  • 15C3 - 1998/presentations/tcpip/folie22.png 23.7 kB
  • 15C3 - 1998/presentations/tcpip/folie15.png 23.7 kB
  • 15C3 - 1998/presentations/tcpip/folie53.png 23.6 kB
  • 15C3 - 1998/presentations/tcpip/folie55.png 23.5 kB
  • 15C3 - 1998/presentations/tcpip/folie52.png 23.5 kB
  • 15C3 - 1998/presentations/tcpip/folie11.png 23.5 kB
  • 15C3 - 1998/presentations/tcpip/folie51.png 23.4 kB
  • 15C3 - 1998/presentations/tcpip/folie34.png 23.3 kB
  • 15C3 - 1998/presentations/tcpip/folie38.png 23.2 kB
  • 15C3 - 1998/presentations/tcpip/folie26.png 23.2 kB
  • 15C3 - 1998/presentations/tcpip/folie17.png 23.0 kB
  • 15C3 - 1998/presentations/tcpip/folie13.png 22.5 kB
  • 15C3 - 1998/presentations/tcpip/folie19.png 22.5 kB
  • 15C3 - 1998/presentations/tcpip/folie24.png 22.4 kB
  • 15C3 - 1998/presentations/tcpip/folie29.png 22.2 kB
  • 15C3 - 1998/presentations/tcpip/folie47.png 21.6 kB
  • 15C3 - 1998/presentations/tcpip/folie25.png 21.4 kB
  • 15C3 - 1998/presentations/tcpip/folie30.png 20.9 kB
  • 22C3 - 2005/audio/index.html 20.2 kB
  • 19C3 - 2002/presentations/479/02-12-29_lex-drm.sxi 20.1 kB
  • 15C3 - 1998/presentations/tcpip/folie31.png 20.1 kB
  • 15C3 - 1998/presentations/tcpip/folie5.png 20.0 kB
  • 15C3 - 1998/presentations/tcpip/folie43.png 20.0 kB
  • 15C3 - 1998/presentations/tcpip/folie48.png 20.0 kB
  • 15C3 - 1998/presentations/tcpip/folie2.png 19.9 kB
  • 15C3 - 1998/presentations/tcpip/folie44.png 19.9 kB
  • 15C3 - 1998/presentations/tcpip/folie14.png 19.6 kB
  • 15C3 - 1998/presentations/tcpip/folie40.png 19.4 kB
  • 15C3 - 1998/presentations/tcpip/folie28.png 19.2 kB
  • 15C3 - 1998/presentations/tcpip/folie1.png 19.1 kB
  • 15C3 - 1998/presentations/tcpip/folie49.png 18.6 kB
  • 15C3 - 1998/presentations/tcpip/folie7.png 18.6 kB
  • 15C3 - 1998/presentations/tcpip/folie8.png 18.4 kB
  • 15C3 - 1998/presentations/tcpip/folie21.png 18.4 kB
  • 23C3 - 2006/audio/index.html 18.1 kB
  • 15C3 - 1998/presentations/tcpip/folie9.png 16.6 kB
  • 15C3 - 1998/presentations/tcpip/folie6.png 16.5 kB
  • CCC logo.jpg 11.7 kB
  • 33C3 - 2016/Shut Up and Take My Money! (33c3) - traduction française.mp4 10.9 kB
  • 33C3 - 2016/Check Your Police Record! (33c3).mp4 10.8 kB
  • 19C3 - 2002/presentations/479/settings.xml 10.5 kB
  • 33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3) - traduction francaise.mp4 5.6 kB
  • 32C3 - 2015/video/32c3-7491-en-de-De-anonymizing_Programmers_hd.mp4 3.4 kB
  • 19C3 - 2002/presentations/479/Pictures/10000200000000DD00000047AFA3D82E.gif 1.6 kB
  • 19C3 - 2002/presentations/479/meta.xml 1.0 kB
  • 19C3 - 2002/presentations/479/META-INF/manifest.xml 876 Bytes
  • Chaos Computer Club - Congress thank you.txt 837 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!