Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2015/h264-sd/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
subtitles/-2021-04-15 12:48:26
32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_sd.mp4385.6 MiB2016-01-12 19:31:57
32c3-7570-en-de-Plunge_into_Proxy_Politics_sd.mp4170.6 MiB2015-12-29 16:49:16
32c3-7567-de-en-Katastrophe_und_Kommunikation_sd.mp4234.3 MiB2016-01-04 20:28:08
32c3-7565-en-Keynote_sd.mp4279.7 MiB2015-12-28 12:53:13
32c3-7562-deu-eng-Jugend_hackt_2015_sd.mp4278.2 MiB2016-01-10 13:56:17
32c3-7561-en-de-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse_sd.mp4277.2 MiB2016-01-04 17:07:50
32c3-7560-en-de-Lightning_Talks_Day_4_sd.mp4381.3 MiB2016-01-04 17:06:24
32c3-7559-en-de-Lightning_Talks_Day_3_sd.mp4420.1 MiB2015-12-30 12:57:13
32c3-7558-en-de-Lightning_Talks_Day_2_sd.mp4436.7 MiB2015-12-29 19:54:36
32c3-7555-en-de-32C3_Infrastructure_Review_sd.mp4270.2 MiB2016-01-04 00:43:17
32c3-7551-en-de-Closing_Event_sd.mp4111.6 MiB2016-01-05 12:10:43
32c3-7550-en-Opening_Event_sd.mp474.5 MiB2015-12-28 11:38:27
32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_sd.mp4336.8 MiB2015-12-30 13:54:59
32c3-7547-en-de-libusb_Maintainer_fail_sd.mp4121.8 MiB2015-12-30 13:00:25
32c3-7546-de-en-Security_Nightmares_0x10_sd.mp4331.9 MiB2016-01-06 18:29:19
32c3-7543-de-The_mummy_unwrapped_sd.mp4180.6 MiB2016-01-02 13:33:51
32c3-7540-en-de-Maker_Spaces_in_Favelas_-_Lecture_sd.mp4287.4 MiB2016-01-02 21:59:42
32c3-7538-en-Internet_Landscapes_sd.mp4222.8 MiB2015-12-28 13:24:54
32c3-7530-en-de-Buffering_sucks_sd.mp4120.3 MiB2016-01-03 22:00:05
32c3-7529-en-de-Mobile_Censorship_in_Iran_sd.mp4119.4 MiB2015-12-29 13:41:34
32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_sd.mp4182.2 MiB2015-12-29 13:24:04
32c3-7525-de-en-Quantenphysik_und_Kosmologie_sd.mp4352.5 MiB2015-12-29 16:58:40
32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_sd.mp4268.8 MiB2016-01-04 13:24:53
32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_sd.mp4103.2 MiB2016-01-02 13:16:06
32c3-7517-en-de-the_possibility_of_an_army_sd.mp4170.6 MiB2015-12-30 17:15:09
32c3-7513-en-de-Safe_Harbor_sd.mp4269.6 MiB2015-12-30 17:06:15
32c3-7510-en-de-Windows_drivers_attack_surface_sd.mp4240.2 MiB2015-12-28 14:54:12
32c3-7502-en-de-Dissecting_VoLTE_sd.mp4180.1 MiB2015-12-29 13:18:28
32c3-7501-en-de-Ten_years_after_We_Lost_The_War_sd.mp4298.1 MiB2015-12-30 00:28:00
32c3-7497-en-de-When_algorithms_fail_in_our_personal_lives_sd.mp4206.9 MiB2015-12-30 19:50:28
32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_sd.mp4297.2 MiB2016-01-02 18:28:28
32c3-7493-en-de-How_hackers_grind_an_MMORPG_by_taking_it_apart_sd.mp4234.9 MiB2015-12-30 01:09:46
32c3-7491-en-de-De-anonymizing_Programmers_sd.mp4220.1 MiB2015-12-29 23:12:07
32c3-7490-en-de-The_Great_Train_Cyber_Robbery_sd.mp4228.0 MiB2015-12-28 15:00:27
32c3-7483-en-de-Computational_Meta-Psychology_sd.mp4240.3 MiB2015-12-30 13:44:40
32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_sd.mp4226.0 MiB2015-12-30 17:02:53
32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_sd.mp4218.4 MiB2015-12-28 12:17:54
32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World_sd.mp4124.5 MiB2016-01-04 17:09:36
32c3-7449-en-de-Prediction_and_Control_sd.mp4203.1 MiB2015-12-30 17:08:57
32c3-7443-en-de-The_Price_Of_Dissent_sd.mp4378.5 MiB2015-12-30 17:07:17
32c3-7441-en-de-The_plain_simple_reality_of_entropy_sd.mp4124.0 MiB2015-12-30 17:12:37
32c3-7438-en-de-goto_fail_sd.mp4248.4 MiB2015-12-30 12:38:49
32c3-7435-en-de-Replication_Prohibited_sd.mp4176.0 MiB2015-12-30 19:35:29
32c3-7432-en-de-Datahavens_from_HavenCo_to_Today_sd.mp4196.3 MiB2015-12-28 13:58:20
32c3-7426-en-de-Intelexit_sd.mp4136.5 MiB2015-12-30 17:13:26
32c3-7423-en-de-One_year_of_securitarian_drift_in_France_sd.mp4115.8 MiB2015-12-29 16:47:27
32c3-7421-en-de-Fluxus_cannot_save_the_world_sd.mp4344.7 MiB2015-12-30 17:00:10
32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_sd.mp4161.4 MiB2015-12-30 13:12:42
32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_sd.mp4166.3 MiB2015-12-29 17:56:38
32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_sd.mp4148.8 MiB2015-12-29 22:36:52
32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung_sd.mp4148.8 MiB2015-12-30 14:17:41
32c3-7412-en-Running_your_own_3G_35G_network_sd.mp4118.8 MiB2015-12-30 12:07:45
32c3-7403-en-de-A_New_Kid_on_the_Block_sd.mp4303.7 MiB2016-01-04 17:06:31
32c3-7401-en-de-Internet_Cube_sd.mp493.9 MiB2015-12-30 13:16:59
32c3-7400-en-de-Technology_and_Mass_Atrocity_Prevention_sd.mp4137.5 MiB2015-12-30 12:54:25
32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_sd.mp4283.4 MiB2015-12-29 17:33:19
32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_sd.mp4111.3 MiB2015-12-30 01:37:52
32c3-7387-en-de-Net_Neutrality_in_Europe_sd.mp4225.4 MiB2015-12-29 17:33:30
32c3-7386-en-de-Crypto_Wars_Part_II_sd.mp4253.1 MiB2015-12-30 19:33:13
32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_sd.mp4225.9 MiB2016-01-02 16:04:25
32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_sd.mp4277.0 MiB2015-12-30 00:10:05
32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_sd.mp4174.8 MiB2016-01-04 17:07:12
32c3-7368-en-de-Shopshifting_sd.mp4288.0 MiB2015-12-28 14:56:49
32c3-7367-en-de-Ling_-_High_level_system_programming_sd.mp4140.5 MiB2015-12-29 13:26:35
32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_sd.mp4131.5 MiB2015-12-29 19:57:52
32c3-7356-en-de-Top_X_usability_obstacles_sd.mp4239.8 MiB2015-12-30 19:42:18
32c3-7355-en-de-apertus_AXIOM_sd.mp4139.7 MiB2015-12-29 20:02:05
32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_sd.mp4196.9 MiB2015-12-28 12:17:27
32c3-7343-en-de-Beyond_Anti_Evil_Maid_sd.mp4213.2 MiB2015-12-30 14:17:52
32c3-7342-en-Household_Totalitarianism_and_Cyberspace_sd.mp4167.0 MiB2015-12-30 00:55:13
32c3-7341-en-de-So_you_want_to_build_a_satellite_sd.mp4273.8 MiB2015-12-28 14:01:22
32c3-7340-eng-deu-fra-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone_sd.mp4244.0 MiB2016-01-08 13:38:00
32c3-7336-en-de-3D_printing_on_the_moon_sd.mp4263.4 MiB2015-12-30 00:29:14
32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_sd.mp4281.0 MiB2016-01-04 23:24:35
32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_sd.mp4256.1 MiB2015-12-28 12:30:39
32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_sd.mp4164.7 MiB2015-12-28 12:30:32
32c3-7324-en-de-What_is_the_value_of_anonymous_communication_sd.mp4154.3 MiB2015-12-30 19:03:36
32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_sd.mp4330.0 MiB2016-01-04 17:08:18
32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think_sd.mp4269.3 MiB2016-01-06 21:17:30
32c3-7321-en-de-re_cycle_sd.mp4218.1 MiB2015-12-30 13:41:53
32c3-7314-en-de-All_Our_Shared_Spectrum_Are_Belong_to_Us_sd.mp4133.3 MiB2015-12-29 16:49:37
32c3-7310-en-de-QRtistry_sd.mp4107.5 MiB2015-12-30 01:28:19
32c3-7307-en-de-State_of_the_Onion_sd.mp4308.5 MiB2015-12-30 01:50:53
32c3-7306-de-en-Jahresrueckblick_des_CCC_sd.mp4509.6 MiB2016-01-02 21:32:06
32c3-7305-en-de-Quantum_Cryptography_sd.mp4216.3 MiB2016-01-02 23:36:55
32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_sd.mp4271.2 MiB2015-12-28 11:46:53
32c3-7294-en-de-Sanitizing_PCAPs_sd.mp4204.7 MiB2015-12-30 12:58:31
32c3-7291-de-en-Microsofts_Windows_10_Botnet_sd.mp4166.5 MiB2016-01-04 17:09:14
32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_sd.mp4268.2 MiB2015-12-29 16:58:35
32c3-7286-en-de-Sin_in_the_time_of_Technology_sd.mp4127.7 MiB2016-01-04 17:09:44
32c3-7284-en-de-Check_your_privileges_sd.mp4193.4 MiB2015-12-30 17:41:35
32c3-7283-eng-deu-Software_and_business_method_patents_call_for_action_sd.mp4296.6 MiB2016-01-10 13:55:50
32c3-7282-de-en-Fnord-Jahresrueckblick_sd.mp4295.5 MiB2015-12-30 13:05:03
32c3-7280-en-de-Cyber_all_the_Wassenaars_sd.mp4301.7 MiB2016-01-06 21:37:32
32c3-7279-en-de-Public_Library_Memory_of_the_World_sd.mp4285.9 MiB2015-12-28 13:39:53
32c3-7277-en-de-Breaking_Honeypots_for_Fun_and_Profit_sd.mp4223.2 MiB2016-01-04 17:09:03
32c3-7273-en-Unpatchable_sd.mp4247.5 MiB2015-12-30 13:03:13
32c3-7265-en-de-Maritime_Robotics_sd.mp4114.3 MiB2015-12-30 13:05:12
32c3-7264-en-de-Profiling_In_justice_sd.mp4120.8 MiB2015-12-29 16:00:35
32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_sd.mp4124.5 MiB2015-12-30 12:57:29
32c3-7260-en-de-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for_sd.mp4294.9 MiB2015-12-29 18:07:54
32c3-7259-en-de-Graphs_Drones_Phones_sd.mp4240.4 MiB2015-12-30 13:46:56
32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_sd.mp4181.8 MiB2015-12-30 13:27:56
32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_sd.mp4222.0 MiB2015-12-30 13:58:51
32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_sd.mp4207.2 MiB2016-01-02 19:12:51
32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_sd.mp4142.2 MiB2015-12-30 17:14:18
32c3-7245-en-de-Reversing_UEFI_by_execution_sd.mp4109.8 MiB2015-12-30 17:10:07
32c3-7243-en-de-Gibberish_Detection_102_sd.mp4212.2 MiB2015-12-29 23:59:55
32c3-7240-en-de-Console_Hacking_sd.mp4196.1 MiB2015-12-28 13:51:10
32c3-7238-en-de-Vector_retrogaming_sd.mp4107.8 MiB2015-12-29 20:55:25
32c3-7236-en-de-Thunderstrike_2_sd.mp4161.4 MiB2015-12-28 15:30:37
32c3-7231-en-de-CloudABI_sd.mp4282.3 MiB2015-12-29 17:43:06
32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete_sd.mp4123.8 MiB2015-12-29 19:09:31
32c3-7229-de-en-PLC-Blaster_sd.mp4246.7 MiB2015-12-28 12:58:52
32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_sd.mp4225.3 MiB2015-12-28 12:19:11
32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_sd.mp4245.3 MiB2015-12-28 12:37:13
32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall_sd.mp4280.9 MiB2015-12-30 14:15:28
32c3-7221-de-Methodisch_inkorrekt_sd.mp4861.8 MiB2016-01-10 13:56:01
32c3-7219-en-de-Trust_us_and_our_business_will_expand_sd.mp492.0 MiB2015-12-30 17:11:45
32c3-7218-en-de-A_Dozen_Years_of_Shellphish_sd.mp4246.3 MiB2015-12-30 17:08:10
32c3-7216-en-de-CHINTERNET_ART_sd.mp4278.7 MiB2016-01-04 17:08:11
32c3-7210-en-de-PQCHacks_sd.mp4226.0 MiB2015-12-29 13:15:05
32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_sd.mp4275.1 MiB2015-12-28 15:24:52
32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_sd.mp4216.8 MiB2015-12-30 18:54:44
32c3-7205-de-Netzpolitik_in_der_Schweiz_sd.mp4135.8 MiB2015-12-28 14:33:15
32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_sd.mp495.2 MiB2015-12-30 13:06:31
32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_sd.mp4153.6 MiB2015-12-29 13:48:16
32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_sd.mp4234.6 MiB2015-12-28 14:47:11
32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_sd.mp4105.6 MiB2015-12-30 00:07:06
32c3-7189-en-Key-logger_Video_Mouse_sd.mp4144.4 MiB2015-12-28 13:42:43
32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_sd.mp4223.5 MiB2015-12-28 14:40:19
32c3-7171-en-de-When_hardware_must_just_work_sd.mp4229.5 MiB2015-12-28 15:35:13
32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_sd.mp4114.8 MiB2015-12-29 16:40:30
32c3-7165-en-de-Vehicle2Vehicle_Communication_based_on_IEEE_80211p_sd.mp4226.6 MiB2015-12-30 17:01:06
32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_sd.mp4190.5 MiB2015-12-28 15:35:47
32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_sd.mp4279.5 MiB2015-12-28 15:53:31
32c3-7154-en-de-Iridium_Update_sd.mp4274.2 MiB2015-12-29 17:03:58
32c3-7153-en-de-rad1o_sd.mp4232.4 MiB2015-12-28 12:54:25
32c3-7152-de-en-gsw-Hacker_Jeopardy_sd.mp4543.2 MiB2016-01-06 21:21:26
32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_sd.mp4292.7 MiB2015-12-29 23:18:12
32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_sd.mp4183.6 MiB2015-12-28 13:12:32
32c3-7143-en-de-The_state_of_Internet_Censorship_sd.mp4220.4 MiB2016-01-02 21:44:28
32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_sd.mp4241.4 MiB2015-12-28 14:32:53
32c3-7138-en-de-Gscheitern_sd.mp4112.8 MiB2015-12-29 14:30:34
32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_sd.mp4154.1 MiB2015-12-29 16:02:05
32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_sd.mp4208.8 MiB2015-12-29 13:24:23
32c3-7133-en-de-Beyond_your_cable_modem_sd.mp4187.2 MiB2015-12-28 15:12:40
32c3-7130-en-de-The_Perl_Jam_2_sd.mp4220.8 MiB2015-12-29 16:58:46
32c3-7119-en-de-Building_and_Breaking_Wireless_Security_sd.mp4114.4 MiB2015-12-30 14:19:32
32c3-7114-en-de-Craft_leisure_and_end-user_innovation_sd.mp4122.1 MiB2015-12-30 17:14:43
32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_sd.mp4131.9 MiB2015-12-30 17:13:33