Parent directory/ | - | - |
subtitles/ | - | 2021-04-15 12:48:26 |
32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_sd.mp4 | 131.9 MiB | 2015-12-30 17:13:33 |
32c3-7114-en-de-Craft_leisure_and_end-user_innovation_sd.mp4 | 122.1 MiB | 2015-12-30 17:14:43 |
32c3-7119-en-de-Building_and_Breaking_Wireless_Security_sd.mp4 | 114.4 MiB | 2015-12-30 14:19:32 |
32c3-7130-en-de-The_Perl_Jam_2_sd.mp4 | 220.8 MiB | 2015-12-29 16:58:46 |
32c3-7133-en-de-Beyond_your_cable_modem_sd.mp4 | 187.2 MiB | 2015-12-28 15:12:40 |
32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_sd.mp4 | 208.8 MiB | 2015-12-29 13:24:23 |
32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_sd.mp4 | 154.1 MiB | 2015-12-29 16:02:05 |
32c3-7138-en-de-Gscheitern_sd.mp4 | 112.8 MiB | 2015-12-29 14:30:34 |
32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_sd.mp4 | 241.4 MiB | 2015-12-28 14:32:53 |
32c3-7143-en-de-The_state_of_Internet_Censorship_sd.mp4 | 220.4 MiB | 2016-01-02 21:44:28 |
32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_sd.mp4 | 183.6 MiB | 2015-12-28 13:12:32 |
32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_sd.mp4 | 292.7 MiB | 2015-12-29 23:18:12 |
32c3-7152-de-en-gsw-Hacker_Jeopardy_sd.mp4 | 543.2 MiB | 2016-01-06 21:21:26 |
32c3-7153-en-de-rad1o_sd.mp4 | 232.4 MiB | 2015-12-28 12:54:25 |
32c3-7154-en-de-Iridium_Update_sd.mp4 | 274.2 MiB | 2015-12-29 17:03:58 |
32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_sd.mp4 | 279.5 MiB | 2015-12-28 15:53:31 |
32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_sd.mp4 | 190.5 MiB | 2015-12-28 15:35:47 |
32c3-7165-en-de-Vehicle2Vehicle_Communication_based_on_IEEE_80211p_sd.mp4 | 226.6 MiB | 2015-12-30 17:01:06 |
32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_sd.mp4 | 114.8 MiB | 2015-12-29 16:40:30 |
32c3-7171-en-de-When_hardware_must_just_work_sd.mp4 | 229.5 MiB | 2015-12-28 15:35:13 |
32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_sd.mp4 | 223.5 MiB | 2015-12-28 14:40:19 |
32c3-7189-en-Key-logger_Video_Mouse_sd.mp4 | 144.4 MiB | 2015-12-28 13:42:43 |
32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_sd.mp4 | 105.6 MiB | 2015-12-30 00:07:06 |
32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_sd.mp4 | 234.6 MiB | 2015-12-28 14:47:11 |
32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_sd.mp4 | 153.6 MiB | 2015-12-29 13:48:16 |
32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_sd.mp4 | 95.2 MiB | 2015-12-30 13:06:31 |
32c3-7205-de-Netzpolitik_in_der_Schweiz_sd.mp4 | 135.8 MiB | 2015-12-28 14:33:15 |
32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_sd.mp4 | 216.8 MiB | 2015-12-30 18:54:44 |
32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_sd.mp4 | 275.1 MiB | 2015-12-28 15:24:52 |
32c3-7210-en-de-PQCHacks_sd.mp4 | 226.0 MiB | 2015-12-29 13:15:05 |
32c3-7216-en-de-CHINTERNET_ART_sd.mp4 | 278.7 MiB | 2016-01-04 17:08:11 |
32c3-7218-en-de-A_Dozen_Years_of_Shellphish_sd.mp4 | 246.3 MiB | 2015-12-30 17:08:10 |
32c3-7219-en-de-Trust_us_and_our_business_will_expand_sd.mp4 | 92.0 MiB | 2015-12-30 17:11:45 |
32c3-7221-de-Methodisch_inkorrekt_sd.mp4 | 861.8 MiB | 2016-01-10 13:56:01 |
32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall_sd.mp4 | 280.9 MiB | 2015-12-30 14:15:28 |
32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_sd.mp4 | 245.3 MiB | 2015-12-28 12:37:13 |
32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_sd.mp4 | 225.3 MiB | 2015-12-28 12:19:11 |
32c3-7229-de-en-PLC-Blaster_sd.mp4 | 246.7 MiB | 2015-12-28 12:58:52 |
32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete_sd.mp4 | 123.8 MiB | 2015-12-29 19:09:31 |
32c3-7231-en-de-CloudABI_sd.mp4 | 282.3 MiB | 2015-12-29 17:43:06 |
32c3-7236-en-de-Thunderstrike_2_sd.mp4 | 161.4 MiB | 2015-12-28 15:30:37 |
32c3-7238-en-de-Vector_retrogaming_sd.mp4 | 107.8 MiB | 2015-12-29 20:55:25 |
32c3-7240-en-de-Console_Hacking_sd.mp4 | 196.1 MiB | 2015-12-28 13:51:10 |
32c3-7243-en-de-Gibberish_Detection_102_sd.mp4 | 212.2 MiB | 2015-12-29 23:59:55 |
32c3-7245-en-de-Reversing_UEFI_by_execution_sd.mp4 | 109.8 MiB | 2015-12-30 17:10:07 |
32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_sd.mp4 | 142.2 MiB | 2015-12-30 17:14:18 |
32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_sd.mp4 | 207.2 MiB | 2016-01-02 19:12:51 |
32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_sd.mp4 | 222.0 MiB | 2015-12-30 13:58:51 |
32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_sd.mp4 | 181.8 MiB | 2015-12-30 13:27:56 |
32c3-7259-en-de-Graphs_Drones_Phones_sd.mp4 | 240.4 MiB | 2015-12-30 13:46:56 |
32c3-7260-en-de-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for_sd.mp4 | 294.9 MiB | 2015-12-29 18:07:54 |
32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_sd.mp4 | 124.5 MiB | 2015-12-30 12:57:29 |
32c3-7264-en-de-Profiling_In_justice_sd.mp4 | 120.8 MiB | 2015-12-29 16:00:35 |
32c3-7265-en-de-Maritime_Robotics_sd.mp4 | 114.3 MiB | 2015-12-30 13:05:12 |
32c3-7273-en-Unpatchable_sd.mp4 | 247.5 MiB | 2015-12-30 13:03:13 |
32c3-7277-en-de-Breaking_Honeypots_for_Fun_and_Profit_sd.mp4 | 223.2 MiB | 2016-01-04 17:09:03 |
32c3-7279-en-de-Public_Library_Memory_of_the_World_sd.mp4 | 285.9 MiB | 2015-12-28 13:39:53 |
32c3-7280-en-de-Cyber_all_the_Wassenaars_sd.mp4 | 301.7 MiB | 2016-01-06 21:37:32 |
32c3-7282-de-en-Fnord-Jahresrueckblick_sd.mp4 | 295.5 MiB | 2015-12-30 13:05:03 |
32c3-7283-eng-deu-Software_and_business_method_patents_call_for_action_sd.mp4 | 296.6 MiB | 2016-01-10 13:55:50 |
32c3-7284-en-de-Check_your_privileges_sd.mp4 | 193.4 MiB | 2015-12-30 17:41:35 |
32c3-7286-en-de-Sin_in_the_time_of_Technology_sd.mp4 | 127.7 MiB | 2016-01-04 17:09:44 |
32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_sd.mp4 | 268.2 MiB | 2015-12-29 16:58:35 |
32c3-7291-de-en-Microsofts_Windows_10_Botnet_sd.mp4 | 166.5 MiB | 2016-01-04 17:09:14 |
32c3-7294-en-de-Sanitizing_PCAPs_sd.mp4 | 204.7 MiB | 2015-12-30 12:58:31 |
32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_sd.mp4 | 271.2 MiB | 2015-12-28 11:46:53 |
32c3-7305-en-de-Quantum_Cryptography_sd.mp4 | 216.3 MiB | 2016-01-02 23:36:55 |
32c3-7306-de-en-Jahresrueckblick_des_CCC_sd.mp4 | 509.6 MiB | 2016-01-02 21:32:06 |
32c3-7307-en-de-State_of_the_Onion_sd.mp4 | 308.5 MiB | 2015-12-30 01:50:53 |
32c3-7310-en-de-QRtistry_sd.mp4 | 107.5 MiB | 2015-12-30 01:28:19 |
32c3-7314-en-de-All_Our_Shared_Spectrum_Are_Belong_to_Us_sd.mp4 | 133.3 MiB | 2015-12-29 16:49:37 |
32c3-7321-en-de-re_cycle_sd.mp4 | 218.1 MiB | 2015-12-30 13:41:53 |
32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think_sd.mp4 | 269.3 MiB | 2016-01-06 21:17:30 |
32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_sd.mp4 | 330.0 MiB | 2016-01-04 17:08:18 |
32c3-7324-en-de-What_is_the_value_of_anonymous_communication_sd.mp4 | 154.3 MiB | 2015-12-30 19:03:36 |
32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_sd.mp4 | 164.7 MiB | 2015-12-28 12:30:32 |
32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_sd.mp4 | 256.1 MiB | 2015-12-28 12:30:39 |
32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_sd.mp4 | 281.0 MiB | 2016-01-04 23:24:35 |
32c3-7336-en-de-3D_printing_on_the_moon_sd.mp4 | 263.4 MiB | 2015-12-30 00:29:14 |
32c3-7340-eng-deu-fra-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone_sd.mp4 | 244.0 MiB | 2016-01-08 13:38:00 |
32c3-7341-en-de-So_you_want_to_build_a_satellite_sd.mp4 | 273.8 MiB | 2015-12-28 14:01:22 |
32c3-7342-en-Household_Totalitarianism_and_Cyberspace_sd.mp4 | 167.0 MiB | 2015-12-30 00:55:13 |
32c3-7343-en-de-Beyond_Anti_Evil_Maid_sd.mp4 | 213.2 MiB | 2015-12-30 14:17:52 |
32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_sd.mp4 | 196.9 MiB | 2015-12-28 12:17:27 |
32c3-7355-en-de-apertus_AXIOM_sd.mp4 | 139.7 MiB | 2015-12-29 20:02:05 |
32c3-7356-en-de-Top_X_usability_obstacles_sd.mp4 | 239.8 MiB | 2015-12-30 19:42:18 |
32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_sd.mp4 | 131.5 MiB | 2015-12-29 19:57:52 |
32c3-7367-en-de-Ling_-_High_level_system_programming_sd.mp4 | 140.5 MiB | 2015-12-29 13:26:35 |
32c3-7368-en-de-Shopshifting_sd.mp4 | 288.0 MiB | 2015-12-28 14:56:49 |
32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_sd.mp4 | 174.8 MiB | 2016-01-04 17:07:12 |
32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_sd.mp4 | 277.0 MiB | 2015-12-30 00:10:05 |
32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_sd.mp4 | 225.9 MiB | 2016-01-02 16:04:25 |
32c3-7386-en-de-Crypto_Wars_Part_II_sd.mp4 | 253.1 MiB | 2015-12-30 19:33:13 |
32c3-7387-en-de-Net_Neutrality_in_Europe_sd.mp4 | 225.4 MiB | 2015-12-29 17:33:30 |
32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_sd.mp4 | 111.3 MiB | 2015-12-30 01:37:52 |
32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_sd.mp4 | 283.4 MiB | 2015-12-29 17:33:19 |
32c3-7400-en-de-Technology_and_Mass_Atrocity_Prevention_sd.mp4 | 137.5 MiB | 2015-12-30 12:54:25 |
32c3-7401-en-de-Internet_Cube_sd.mp4 | 93.9 MiB | 2015-12-30 13:16:59 |
32c3-7403-en-de-A_New_Kid_on_the_Block_sd.mp4 | 303.7 MiB | 2016-01-04 17:06:31 |
32c3-7412-en-Running_your_own_3G_35G_network_sd.mp4 | 118.8 MiB | 2015-12-30 12:07:45 |
32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung_sd.mp4 | 148.8 MiB | 2015-12-30 14:17:41 |
32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_sd.mp4 | 148.8 MiB | 2015-12-29 22:36:52 |
32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_sd.mp4 | 166.3 MiB | 2015-12-29 17:56:38 |
32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_sd.mp4 | 161.4 MiB | 2015-12-30 13:12:42 |
32c3-7421-en-de-Fluxus_cannot_save_the_world_sd.mp4 | 344.7 MiB | 2015-12-30 17:00:10 |
32c3-7423-en-de-One_year_of_securitarian_drift_in_France_sd.mp4 | 115.8 MiB | 2015-12-29 16:47:27 |
32c3-7426-en-de-Intelexit_sd.mp4 | 136.5 MiB | 2015-12-30 17:13:26 |
32c3-7432-en-de-Datahavens_from_HavenCo_to_Today_sd.mp4 | 196.3 MiB | 2015-12-28 13:58:20 |
32c3-7435-en-de-Replication_Prohibited_sd.mp4 | 176.0 MiB | 2015-12-30 19:35:29 |
32c3-7438-en-de-goto_fail_sd.mp4 | 248.4 MiB | 2015-12-30 12:38:49 |
32c3-7441-en-de-The_plain_simple_reality_of_entropy_sd.mp4 | 124.0 MiB | 2015-12-30 17:12:37 |
32c3-7443-en-de-The_Price_Of_Dissent_sd.mp4 | 378.5 MiB | 2015-12-30 17:07:17 |
32c3-7449-en-de-Prediction_and_Control_sd.mp4 | 203.1 MiB | 2015-12-30 17:08:57 |
32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World_sd.mp4 | 124.5 MiB | 2016-01-04 17:09:36 |
32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_sd.mp4 | 218.4 MiB | 2015-12-28 12:17:54 |
32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_sd.mp4 | 226.0 MiB | 2015-12-30 17:02:53 |
32c3-7483-en-de-Computational_Meta-Psychology_sd.mp4 | 240.3 MiB | 2015-12-30 13:44:40 |
32c3-7490-en-de-The_Great_Train_Cyber_Robbery_sd.mp4 | 228.0 MiB | 2015-12-28 15:00:27 |
32c3-7491-en-de-De-anonymizing_Programmers_sd.mp4 | 220.1 MiB | 2015-12-29 23:12:07 |
32c3-7493-en-de-How_hackers_grind_an_MMORPG_by_taking_it_apart_sd.mp4 | 234.9 MiB | 2015-12-30 01:09:46 |
32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_sd.mp4 | 297.2 MiB | 2016-01-02 18:28:28 |
32c3-7497-en-de-When_algorithms_fail_in_our_personal_lives_sd.mp4 | 206.9 MiB | 2015-12-30 19:50:28 |
32c3-7501-en-de-Ten_years_after_We_Lost_The_War_sd.mp4 | 298.1 MiB | 2015-12-30 00:28:00 |
32c3-7502-en-de-Dissecting_VoLTE_sd.mp4 | 180.1 MiB | 2015-12-29 13:18:28 |
32c3-7510-en-de-Windows_drivers_attack_surface_sd.mp4 | 240.2 MiB | 2015-12-28 14:54:12 |
32c3-7513-en-de-Safe_Harbor_sd.mp4 | 269.6 MiB | 2015-12-30 17:06:15 |
32c3-7517-en-de-the_possibility_of_an_army_sd.mp4 | 170.6 MiB | 2015-12-30 17:15:09 |
32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_sd.mp4 | 103.2 MiB | 2016-01-02 13:16:06 |
32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_sd.mp4 | 268.8 MiB | 2016-01-04 13:24:53 |
32c3-7525-de-en-Quantenphysik_und_Kosmologie_sd.mp4 | 352.5 MiB | 2015-12-29 16:58:40 |
32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_sd.mp4 | 182.2 MiB | 2015-12-29 13:24:04 |
32c3-7529-en-de-Mobile_Censorship_in_Iran_sd.mp4 | 119.4 MiB | 2015-12-29 13:41:34 |
32c3-7530-en-de-Buffering_sucks_sd.mp4 | 120.3 MiB | 2016-01-03 22:00:05 |
32c3-7538-en-Internet_Landscapes_sd.mp4 | 222.8 MiB | 2015-12-28 13:24:54 |
32c3-7540-en-de-Maker_Spaces_in_Favelas_-_Lecture_sd.mp4 | 287.4 MiB | 2016-01-02 21:59:42 |
32c3-7543-de-The_mummy_unwrapped_sd.mp4 | 180.6 MiB | 2016-01-02 13:33:51 |
32c3-7546-de-en-Security_Nightmares_0x10_sd.mp4 | 331.9 MiB | 2016-01-06 18:29:19 |
32c3-7547-en-de-libusb_Maintainer_fail_sd.mp4 | 121.8 MiB | 2015-12-30 13:00:25 |
32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_sd.mp4 | 336.8 MiB | 2015-12-30 13:54:59 |
32c3-7550-en-Opening_Event_sd.mp4 | 74.5 MiB | 2015-12-28 11:38:27 |
32c3-7551-en-de-Closing_Event_sd.mp4 | 111.6 MiB | 2016-01-05 12:10:43 |
32c3-7555-en-de-32C3_Infrastructure_Review_sd.mp4 | 270.2 MiB | 2016-01-04 00:43:17 |
32c3-7558-en-de-Lightning_Talks_Day_2_sd.mp4 | 436.7 MiB | 2015-12-29 19:54:36 |
32c3-7559-en-de-Lightning_Talks_Day_3_sd.mp4 | 420.1 MiB | 2015-12-30 12:57:13 |
32c3-7560-en-de-Lightning_Talks_Day_4_sd.mp4 | 381.3 MiB | 2016-01-04 17:06:24 |
32c3-7561-en-de-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse_sd.mp4 | 277.2 MiB | 2016-01-04 17:07:50 |
32c3-7562-deu-eng-Jugend_hackt_2015_sd.mp4 | 278.2 MiB | 2016-01-10 13:56:17 |
32c3-7565-en-Keynote_sd.mp4 | 279.7 MiB | 2015-12-28 12:53:13 |
32c3-7567-de-en-Katastrophe_und_Kommunikation_sd.mp4 | 234.3 MiB | 2016-01-04 20:28:08 |
32c3-7570-en-de-Plunge_into_Proxy_Politics_sd.mp4 | 170.6 MiB | 2015-12-29 16:49:16 |
32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_sd.mp4 | 385.6 MiB | 2016-01-12 19:31:57 |