Parent directory/ | - | - |
30C3_-_5622_-_en_-_30c3_keynote_-_glenn_greenwald_-_frank-direct.opus | 26.7 MiB | 2013-12-27 22:27:16 |
30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_opus.opus | 28.3 MiB | 2014-01-06 12:59:54 |
30c3-5185-en-FPGA_101_opus.opus | 26.6 MiB | 2014-01-06 13:03:09 |
30c3-5186-en-Programming_FPGAs_with_PSHDL_opus.opus | 29.2 MiB | 2014-01-06 13:05:17 |
30c3-5192-en-Android_DDI_opus.opus | 31.4 MiB | 2014-01-04 15:18:53 |
30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_opus.opus | 37.5 MiB | 2014-01-03 21:38:10 |
30c3-5210-de-en-Bullshit_made_in_Germany_opus.opus | 30.2 MiB | 2014-01-06 13:04:16 |
30c3-5212-en-The_GNU_Name_System_opus.opus | 25.9 MiB | 2014-01-06 13:02:02 |
30c3-5214-en-The_Gospel_of_IRMA__opus.opus | 36.7 MiB | 2014-01-03 19:41:42 |
30c3-5223-en-WarGames_in_memory_opus.opus | 27.0 MiB | 2014-01-06 13:06:24 |
30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_opus.opus | 21.7 MiB | 2014-01-06 12:40:26 |
30c3-5255-en-de-Through_a_PRISM_Darkly_opus.opus | 42.4 MiB | 2014-01-03 23:16:05 |
30c3-5278-en-The_philosophy_of_hacking_opus.opus | 14.2 MiB | 2014-01-06 13:08:32 |
30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_opus.opus | 30.4 MiB | 2014-01-03 22:56:31 |
30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_opus.opus | 43.5 MiB | 2014-01-03 19:26:55 |
30c3-5289-en-Coding_your_body_opus.opus | 15.2 MiB | 2014-01-06 13:07:25 |
30c3-5290-en-Console_Hacking_2013_opus.opus | 29.6 MiB | 2014-01-06 13:01:01 |
30c3-5293-de-en-Dead_Man_Edition_opus.opus | 28.8 MiB | 2014-01-06 13:09:39 |
30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_opus.opus | 40.2 MiB | 2014-01-03 22:54:21 |
30c3-5295-en-The_Four_Wars_opus.opus | 15.9 MiB | 2014-01-03 22:59:42 |
30c3-5298-en-de-Rock_em_Graphic_Cards_opus.opus | 27.6 MiB | 2014-01-06 12:50:42 |
30c3-5304-en-CounterStrike_opus.opus | 30.8 MiB | 2014-01-03 23:04:05 |
30c3-5305-en-Breaking_Baryons_opus.opus | 29.0 MiB | 2014-01-06 13:20:25 |
30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_opus.opus | 20.9 MiB | 2014-01-06 13:11:48 |
30c3-5311-en-lasers_in_space_opus.opus | 14.3 MiB | 2014-01-06 13:12:49 |
30c3-5319-en-Technomonopolies_opus.opus | 13.1 MiB | 2014-01-06 13:57:06 |
30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_opus.opus | 27.0 MiB | 2014-01-06 18:24:04 |
30c3-5334-en-RFID_Treehouse_of_Horror_opus.opus | 29.1 MiB | 2014-01-06 17:06:01 |
30c3-5337-de-en-Kryptographie_nach_Snowden_opus.opus | 29.4 MiB | 2014-01-06 13:13:55 |
30c3-5339-en-de-The_Year_in_Crypto_opus.opus | 39.3 MiB | 2014-01-03 23:31:19 |
30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_opus.opus | 28.8 MiB | 2014-01-06 13:17:10 |
30c3-5356-en-Firmware_Fat_Camp_opus.opus | 19.6 MiB | 2014-01-06 13:18:11 |
30c3-5360-en-Script_Your_Car__opus.opus | 26.9 MiB | 2014-01-06 13:28:39 |
30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_opus.opus | 19.7 MiB | 2014-01-06 13:56:00 |
30c3-5376-en-Do_You_Think_That_s_Funny__opus.opus | 35.3 MiB | 2014-01-03 14:46:51 |
30c3-5377-de-en-UEberwachen_und_Sprache_opus.opus | 27.5 MiB | 2014-01-06 13:10:41 |
30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_opus.opus | 26.5 MiB | 2014-01-07 22:13:38 |
30c3-5387-en-Toward_a_Cognitive_Quantified_Self__opus.opus | 25.5 MiB | 2014-01-06 13:16:03 |
30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_opus.opus | 15.3 MiB | 2014-01-06 13:59:14 |
30c3-5394-BREACH_in_Agda_opus.opus | 20.7 MiB | 2014-01-07 22:37:13 |
30c3-5395-en-Towards_an_affordable_brain-computer-interface_opus.opus | 30.0 MiB | 2014-01-06 17:59:03 |
30c3-5397-en-Sysadmins_of_the_world_unite__opus.opus | 20.7 MiB | 2014-01-03 23:02:58 |
30c3-5398-en-HbbTV_Security_opus.opus | 22.1 MiB | 2014-01-06 13:19:18 |
30c3-5405-en-Data_Mining_for_Good_opus.opus | 12.9 MiB | 2014-01-06 18:10:29 |
30c3-5406-en-Drones_opus.opus | 40.0 MiB | 2014-01-03 22:52:14 |
30c3-5412-en-Bug_class_genocide_opus.opus | 31.1 MiB | 2014-01-03 19:30:12 |
30c3-5415-de-en-Der_tiefe_Staat_opus.opus | 27.3 MiB | 2014-01-05 23:08:10 |
30c3-5416-en-de-Desperately_Seeking_Susy_opus.opus | 28.2 MiB | 2014-01-06 13:52:45 |
30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_opus.opus | 19.0 MiB | 2014-01-06 13:26:32 |
30c3-5420-de-en-calcpw_opus.opus | 15.1 MiB | 2014-01-06 17:04:54 |
30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_opus.opus | 33.7 MiB | 2014-01-06 14:30:40 |
30c3-5423-en-The_Tor_Network_opus.opus | 41.4 MiB | 2014-01-03 19:32:21 |
30c3-5425-en-Hacking_as_Artistic_Practice_opus.opus | 14.8 MiB | 2014-01-06 13:51:43 |
30c3-5426-de-en-Das_FlipDot-Projekt_opus.opus | 18.7 MiB | 2014-01-06 17:41:00 |
30c3-5433-de-en-Recht_auf_Remix_opus.opus | 27.7 MiB | 2014-01-06 18:09:53 |
30c3-5437-en-Plants_Machines_opus.opus | 13.8 MiB | 2014-01-06 13:54:58 |
30c3-5439-en-To_Protect_And_Infect_opus.opus | 21.0 MiB | 2014-01-11 23:06:52 |
30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_opus.opus | 28.7 MiB | 2014-01-06 13:53:52 |
30c3-5443-en-Introduction_to_Processor_Design_opus.opus | 32.0 MiB | 2014-01-06 13:50:37 |
30c3-5444-en-Attacking_HomeMatic_opus.opus | 27.0 MiB | 2014-01-06 14:24:06 |
30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_opus.opus | 30.8 MiB | 2014-01-06 17:43:15 |
30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_opus.opus | 13.5 MiB | 2014-01-06 16:58:28 |
30c3-5447-en-Policing_the_Romantic_Crowd_opus.opus | 17.8 MiB | 2014-01-06 13:15:02 |
30c3-5449-en-Mobile_network_attack_evolution_opus.opus | 32.6 MiB | 2014-01-03 19:29:05 |
30c3-5453-en-Against_Metadata_opus.opus | 12.6 MiB | 2014-01-06 13:49:35 |
30c3-5459-en-de-Security_of_the_IC_Backside_opus.opus | 39.1 MiB | 2014-01-03 23:32:27 |
30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_opus.opus | 31.3 MiB | 2014-01-03 21:19:29 |
30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_opus.opus | 29.5 MiB | 2014-01-06 14:36:10 |
30c3-5468-en-We_only_have_one_earth_opus.opus | 31.3 MiB | 2014-01-06 13:47:27 |
30c3-5469-de-en-2_Takte_spaeter_opus.opus | 14.5 MiB | 2014-01-06 18:11:42 |
30c3-5474-en-World_War_II_Hackers_opus.opus | 26.4 MiB | 2014-01-06 13:46:20 |
30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_opus.opus | 18.4 MiB | 2014-01-06 18:01:41 |
30c3-5476-en-Electronic_Bank_Robberies_opus.opus | 28.5 MiB | 2014-01-06 13:42:03 |
30c3-5477-en-An_introduction_to_Firmware_Analysis_opus.opus | 26.2 MiB | 2014-01-03 19:20:48 |
30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_opus.opus | 24.9 MiB | 2014-01-06 17:38:50 |
30c3-5479-en-Building_a_safe_NFC_ticketing_system_opus.opus | 15.7 MiB | 2014-01-06 14:01:22 |
30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_opus.opus | 30.5 MiB | 2014-01-06 13:58:08 |
30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_opus.opus | 29.8 MiB | 2014-01-03 19:37:31 |
30c3-5494-en-Nerds_in_the_news_opus.opus | 16.2 MiB | 2014-01-06 18:07:20 |
30c3-5495-en-Concepts_for_global_TSCM_opus.opus | 30.1 MiB | 2014-01-06 14:26:22 |
30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_opus.opus | 23.0 MiB | 2014-01-06 13:40:56 |
30c3-5499-en-X_Security_opus.opus | 40.6 MiB | 2014-01-03 22:57:34 |
30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_opus.opus | 5.3 MiB | 2014-01-06 18:21:02 |
30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__opus.opus | 30.3 MiB | 2014-01-06 17:37:43 |
30c3-5509-de-en-IFGINT_opus.opus | 14.3 MiB | 2014-01-06 13:43:04 |
30c3-5526-en-How_to_Build_a_Mind_opus.opus | 26.7 MiB | 2014-01-06 17:58:26 |
30c3-5527-en-Basics_of_Digital_Wireless_Communication_opus.opus | 20.2 MiB | 2014-01-06 14:48:50 |
30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_opus.opus | 21.8 MiB | 2014-01-06 13:44:11 |
30c3-5532-de-en-Die_Drohnenkriege_opus.opus | 30.0 MiB | 2014-01-06 17:39:58 |
30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_opus.opus | 30.3 MiB | 2014-01-06 13:48:29 |
30c3-5536-en-Long_Distance_Quantum_Communication_opus.opus | 16.5 MiB | 2014-01-06 13:45:17 |
30c3-5537-en-Glass_Hacks_opus.opus | 40.4 MiB | 2014-01-03 21:17:17 |
30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_opus.opus | 33.0 MiB | 2014-01-07 22:40:02 |
30c3-5539-en-Human_Rights_and_Technology_opus.opus | 14.0 MiB | 2014-01-06 14:31:46 |
30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_opus.opus | 31.4 MiB | 2014-01-06 16:57:22 |
30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_opus.opus | 19.9 MiB | 2014-01-06 17:02:43 |
30c3-5544-de-en-Sim_Gishel_opus.opus | 18.6 MiB | 2014-01-06 16:44:31 |
30c3-5545-en-Trezor_Bitcoin_hardware_wallet_opus.opus | 17.6 MiB | 2014-01-03 23:01:56 |
30c3-5547-en-Turing_Complete_User_opus.opus | 16.3 MiB | 2014-01-06 16:55:15 |
30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_opus.opus | 40.2 MiB | 2014-01-03 21:43:31 |
30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_opus.opus | 29.3 MiB | 2014-01-06 17:36:41 |
30c3-5552-en-India_s_Surveillance_State_opus.opus | 27.5 MiB | 2014-01-06 17:01:42 |
30c3-5554-en-Magic_Lantern_opus.opus | 31.3 MiB | 2014-01-06 16:52:01 |
30c3-5562-en-de-Lightning_Talks_Day_2_opus.opus | 60.6 MiB | 2014-01-06 16:49:52 |
30c3-5563-en-de-Lightning_Talks_Day_3_opus.opus | 78.2 MiB | 2014-01-06 17:03:53 |
30c3-5564-en-de-Lightning_Talks_Day_4_opus.opus | 74.8 MiB | 2014-01-06 14:34:01 |
30c3-5566-en-Open_source_experimental_incubator_build_up_opus.opus | 14.4 MiB | 2014-01-06 16:56:21 |
30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_opus.opus | 30.7 MiB | 2014-01-06 18:20:31 |
30c3-5577-de-en-Hacker_Jeopardy_opus.opus | 96.1 MiB | 2014-01-03 19:38:40 |
30c3-5582-en-SCADA_StrangeLove_2_opus.opus | 20.5 MiB | 2014-01-06 16:59:30 |
30c3-5587-en-Making_machines_that_make_opus.opus | 31.0 MiB | 2014-01-03 22:48:58 |
30c3-5588-en-de-My_journey_into_FM-RDS_opus.opus | 17.1 MiB | 2014-01-06 16:53:07 |
30c3-5590-en-White-Box_Cryptography_opus.opus | 30.2 MiB | 2014-01-06 18:09:32 |
30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_opus.opus | 26.0 MiB | 2014-01-03 23:12:49 |
30c3-5594-en-Structuring_open_hardware_projects_opus.opus | 14.6 MiB | 2014-01-06 17:53:28 |
30c3-5595-en-The_ArduGuitar_opus.opus | 13.7 MiB | 2014-01-06 17:07:02 |
30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_opus.opus | 38.7 MiB | 2014-01-03 23:13:56 |
30c3-5601-en-de-EUDataP_State_of_the_Union_opus.opus | 37.4 MiB | 2014-01-06 16:50:54 |
30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_opus.opus | 32.4 MiB | 2014-01-03 21:48:49 |
30c3-5605-en-Opening_Event_opus.opus | 5.1 MiB | 2014-01-05 23:34:43 |
30c3-5606-de-en-Closing_Event_opus.opus | 33.6 MiB | 2014-01-03 23:19:21 |
30c3-5607-en-The_Pirate_Cinema_opus.opus | 19.0 MiB | 2014-01-06 16:54:09 |
30c3-5608-de-en-Jahresrueckblick_des_CCC_opus.opus | 71.3 MiB | 2014-01-03 22:47:51 |
30c3-5609-en-Infrastructure_Review_opus.opus | 36.5 MiB | 2014-01-06 14:28:31 |
30c3-5610-de-Seidenstrasse_opus.opus | 21.1 MiB | 2014-01-06 14:00:21 |
30c3-5611-en-Hello_World__opus.opus | 29.1 MiB | 2014-01-06 16:48:45 |
30c3-5613-en-Forbidden_Fruit_opus.opus | 29.7 MiB | 2014-01-06 16:43:24 |
30c3-5614-en-Perfect_Paul_opus.opus | 15.8 MiB | 2014-01-06 17:00:36 |
30c3-5618-en-Baseband_Exploitation_in_2013_opus.opus | 38.5 MiB | 2014-01-03 19:33:24 |
30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_opus.opus | 31.2 MiB | 2014-01-06 18:25:33 |
30c3-5622-en-de-30c3_Keynote_opus.opus | 36.8 MiB | 2014-01-03 19:31:14 |
30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__opus.opus | 51.8 MiB | 2014-01-03 23:17:09 |
30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_opus.opus | 38.2 MiB | 2014-01-03 19:28:03 |
30c3-5713-en-de-To_Protect_And_Infect_Part_2_opus.opus | 30.5 MiB | 2014-01-06 17:22:30 |