magnet:?xt=urn:btih:C7A3FFCF322EBCADEDBFD1BC45642EB7DB81BA16
30C3 - 2013/video/30c3-5577-de-en-Hacker_Jeopardy_h264-hd.mp4 1.3 GB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Libre_Hardware_Panel.mp4 1.0 GB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Summary_and_Political_Attack_Vectors-carlo_von_lynX.mp4 882.7 MB
33C3 - 2016/Methodisch inkorrekt! (33c3) - english translation.mp4 859.0 MB
30C3 - 2013/video/30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hd.mp4 824.6 MB
30C3 - 2013/video/30c3-5413-de-en-Security_Nightmares_h264-hd.mp4 793.2 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Jacob_Appelbaum-Pond.mp4 753.2 MB
29C3 - 2012/video/29c3-5309-de-en-hacker_jeopardy_h264.mp4 750.2 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh_Routing-Panel-cjdns_freifunk_GNUnet_net2o.mp4 735.5 MB
30C3 - 2013/video/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hd.mp4 718.8 MB
31C3 - 2014/video/31c3-6563-en-Lightning_Talks_Day_2_hd.mp4 709.3 MB
27C3 - 2010/video/27c3-4141-de-hacker_jeopardy.mp4 696.2 MB
27C3 - 2010/video/27c3-4333-en-hacker_jeopardy_translation.mp4 695.5 MB
33C3 - 2016/Methodisch inkorrekt! (33c3).mp4 688.1 MB
28C3 - 2011/video/28c3-4832-de-neue_leichtigkeit_h264.mp4 628.4 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_In_Depth-Alessandro_Di_Federico-SNAKE.mp4 621.3 MB
26C3 - 2009/video/26c3-3645-en-lightning_talks_-_day_4.mp4 619.2 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Routing-Panel_I2P_GNUnet_Tor_secushare.mp4 618.8 MB
26C3 - 2009/video/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4 614.1 MB
26C3 - 2009/video/26c3-3644-de-lightning_talks_-_day_3.mp4 598.9 MB
26C3 - 2009/video/26c3-3642-en-lightning_talks_-_day_2.mp4 581.8 MB
33C3 - 2016/CCC-JahresrUckblick 2016 (33c3) - traduction française.mp4 569.7 MB
31C3 - 2014/video/31c3-6580-en-de-Lightning_Talks_Day_4_hd.mp4 567.5 MB
26C3 - 2009/video/26c3-3668-en-hacker_jeopardy.mp4 561.0 MB
26C3 - 2009/video/26c3-3669-de-hacker_jeopardy.mp4 556.5 MB
26C3 - 2009/video/26c3-3550-de-chaos-familien-duell.mp4 519.0 MB
26C3 - 2009/video/26c3-3563-en-lightning_talks_-_day_1.mp4 518.9 MB
30C3 - 2013/video/30c3-5490-de-en-Fnord_News_Show_h264-hd.mp4 514.9 MB
31C3 - 2014/video/31c3-6543-de-en-The_Time_is_Right_hd.mp4 502.7 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh-Caleb_J_Delisle-cjdns-Hyperboria.mp4 479.5 MB
27C3 - 2010/video/27c3-4300-en-lightning_talks_d4.mp4 478.2 MB
27C3 - 2010/video/27c3-4239-en-lightning_talks_d3.mp4 477.0 MB
31C3 - 2014/video/31c3-6572-de-en-Security_Nightmares_hd.mp4 470.8 MB
28C3 - 2011/video/28c3-4907-en-lightning_talks_day_4_h264.mp4 467.9 MB
30C3 - 2013/video/30c3-5606-de-en-Closing_Event_h264-hd.mp4 451.2 MB
26C3 - 2009/video/26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4 450.4 MB
34C3 - 2017/34C3 - Methodisch inkorrekt! - english translation.mp4 448.8 MB
34C3 - 2017/34C3 - Methodisch inkorrekt!.mp4 448.3 MB
30C3 - 2013/video/30c3-5622-en-de-30c3_Keynote_h264-hd.mp4 443.3 MB
31C3 - 2014/video/31c3-6583-de-en-Jahresrueckblick_des_CCC_hd.mp4 437.7 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Alessandro_Di_Federico-Friendship_Establishment.mp4 436.1 MB
28C3 - 2011/video/28c3-4905-en-lightning_talks_day_2_h264.mp4 434.9 MB
27C3 - 2010/video/27c3-4145-en-spoilers_human_interfaces_airplanes.mp4 428.8 MB
26C3 - 2009/video/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4 428.6 MB
27C3 - 2010/video/27c3-4183-en-safety_on_open_sea.mp4 427.9 MB
28C3 - 2011/video/28c3-4934-en-hacker_jeopardy_translation_h264.mp4 427.7 MB
31C3 - 2014/video/31c3-6043-en-de-The_Maker_movement_meets_patent_law_hd.mp4 423.5 MB
31C3 - 2014/video/31c3-6291-en-Doing_right_by_sources_done_right_hd.mp4 421.0 MB
30C3 - 2013/video/30c3-5537-en-Glass_Hacks_h264-hd.mp4 420.5 MB
34C3 - 2017/34C3 - Hacker Jeopardy - english translation.mp4 418.1 MB
33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3) - traduction française.mp4 416.6 MB
27C3 - 2010/video/27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4 412.7 MB
30C3 - 2013/video/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hd.mp4 412.4 MB
27C3 - 2010/video/27c3-4265-en-hacking_smart_phones.mp4 405.8 MB
31C3 - 2014/video/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_hd.mp4 405.8 MB
27C3 - 2010/video/27c3-4090-en-baseband_apocalypse.mp4 403.3 MB
27C3 - 2010/video/27c3-4276-en-cognitive_psychology_for_hackers.mp4 403.3 MB
28C3 - 2011/video/28c3-4775-de-hacker_jeopardy_h264.mp4 401.8 MB
33C3 - 2016/CCC-JahresrUckblick 2016 (33c3) - english translation.mp4 400.9 MB
33C3 - 2016/CCC-JahresrUckblick 2016 (33c3).mp4 400.3 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Jan_Borchardt-Open_Source_Design.mp4 397.1 MB
30C3 - 2013/video/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hd.mp4 396.0 MB
33C3 - 2016/No Love for the US Gov. (33c3) - deutsche Ubersetzung.mp4 395.3 MB
33C3 - 2016/No Love for the US Gov. (33c3) - traduction française.mp4 394.6 MB
27C3 - 2010/video/27c3-4298-de-ccc_jahresrueckblick_2010.mp4 394.6 MB
34C3 - 2017/34C3 - Hacker Jeopardy - SchwizerdUUtschi Ubersetzig.mp4 394.2 MB
33C3 - 2016/No Love for the US Gov. (33c3).mp4 394.0 MB
34C3 - 2017/34C3 - Hacker Jeopardy.mp4 393.5 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Bernstein_Lange_Schwabe-NaCl_and_TweetNaCl.mp4 393.2 MB
25C3 - 2008/video/25c3-3024-de-jahresrueckblick.mp4 393.0 MB
27C3 - 2010/video/27c3-4121-en-is_the_ssliverse_a_safe_place.mp4 391.3 MB
27C3 - 2010/video/27c3-4094-de-netzneutralitaet_und_qos.mp4 387.4 MB
27C3 - 2010/video/27c3-4237-en-indect_eu_surveillance_project.mp4 386.0 MB
26C3 - 2009/video/26c3-3690-de-ccc-jahresrckblick.mp4 385.6 MB
28C3 - 2011/video/28c3-4932-de-camp_review_2011_h264.mp4 383.6 MB
33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3) - english translati.mp4 382.3 MB
31C3 - 2014/video/31c3-6602-en-de-The_case_of_Chelsea_Manning_hd.mp4 378.4 MB
26C3 - 2009/video/26c3-3687-de-security_nightmares.mp4 377.2 MB
26C3 - 2009/video/26c3-3725-en-stream_security_nightmares.mp4 376.7 MB
28C3 - 2011/video/28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264.mp4 376.0 MB
26C3 - 2009/video/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4 375.3 MB
27C3 - 2010/video/27c3-4123-en-defense_is_not_dead.mp4 373.4 MB
31C3 - 2014/video/31c3-6579-en-de-Lightning_Talks_Day_3_hd.mp4 371.0 MB
28C3 - 2011/video/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.mp4 368.3 MB
33C3 - 2016/Untrusting the CPU (33c3).mp4 367.7 MB
33C3 - 2016/Untrusting the CPU (33c3) - deutsche Ubersetzung.mp4 367.5 MB
33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3).mp4 366.3 MB
33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3) - english translation.mp4 365.7 MB
27C3 - 2010/video/27c3-4236-en-international_cyber_jurisdiction.mp4 363.1 MB
31C3 - 2014/video/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_hd.mp4 360.8 MB
27C3 - 2010/video/27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4 359.6 MB
30C3 - 2013/video/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hd.mp4 359.1 MB
33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3) - deutsche Ubersetzung.mp4 357.8 MB
27C3 - 2010/video/27c3-4187-en-your_infrastructure_will_kill_you.mp4 357.1 MB
33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3).mp4 356.6 MB
27C3 - 2010/video/27c3-4326-de-radio_der_zukunft.mp4 356.6 MB
32C3 - 2015/video/32c3-7525-de-en-Quantenphysik_und_Kosmologie_hd.mp4 355.5 MB
31C3 - 2014/video/31c3-6109-de-en-Fnord_News_Show_hd.mp4 355.1 MB
32C3 - 2015/video/32c3-7221-de-Methodisch_inkorrekt_hd.mp4 353.2 MB
33C3 - 2016/33C3 Infrastructure Review (33c3) - deutsche Ubersetzung.mp4 350.9 MB
31C3 - 2014/video/31c3-6251-en-de-State_of_the_Onion_hd.mp4 348.8 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-Brennan_Novak-mailpile_UX.mp4 348.8 MB
26C3 - 2009/video/26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4 348.2 MB
27C3 - 2010/video/27c3-4125-de-spinning_the_electronic_wheel.mp4 347.8 MB
27C3 - 2010/video/27c3-4195-de-literarischer_abend.mp4 347.5 MB
31C3 - 2014/video/31c3-5956-en-Cyber_Necromancy_hd.mp4 346.3 MB
26C3 - 2009/video/26c3-3658-en-black_ops_of_pki.mp4 346.2 MB
31C3 - 2014/video/31c3-6214-en-de-Attribution_revolution_hd.mp4 346.1 MB
27C3 - 2010/video/27c3-4339-en-openleaks.mp4 345.9 MB
26C3 - 2009/video/26c3-3613-de-fnord-jahresrckblick_2009.mp4 345.1 MB
28C3 - 2011/video/28c3-4908-de-jahresrueckblick_2011_h264.mp4 343.2 MB
27C3 - 2010/video/27c3-4011-en-embedded_reverse_engineering.mp4 343.1 MB
27C3 - 2010/video/27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4 342.6 MB
27C3 - 2010/video/27c3-4231-en-datenrettung_fun_with_hard_drives.mp4 341.0 MB
27C3 - 2010/video/27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4 340.5 MB
31C3 - 2014/video/31c3-6103-en-AMD_x86_SMU_firmware_analysis_hd.mp4 339.5 MB
30C3 - 2013/video/30c3-5423-en-The_Tor_Network_h264-hd.mp4 336.5 MB
33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3).mp4 335.2 MB
27C3 - 2010/video/27c3-4151-en-android_geolocation_using_gsm_network.mp4 335.1 MB
29C3 - 2012/video/29c3-5338-en-enemies_of_the_state_h264.mp4 332.5 MB
31C3 - 2014/video/31c3-6563-en-de-Lightning_Talks_Day_2_hd.mp4 331.6 MB
30C3 - 2013/video/30c3-5406-en-Drones_h264-hd.mp4 330.8 MB
28C3 - 2011/video/28c3-4935-en-eu_datenschutz_internet_der_dinge_h264.mp4 329.9 MB
28C3 - 2011/video/28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4 329.1 MB
32C3 - 2015/video/32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_hd.mp4 326.9 MB
32C3 - 2015/video/32c3-7306-de-en-Jahresrueckblick_des_CCC_hd.mp4 326.4 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Julian_Kirsch-Knock.mp4 326.2 MB
33C3 - 2016/Liberté, Égalité, Fraternité... and privacy ! (33c3).mp4 325.9 MB
33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3).mp4 325.5 MB
25C3 - 2008/video/25c3-2958-de-hacker_jeopardy.mp4 325.4 MB
27C3 - 2010/video/27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4 325.0 MB
26C3 - 2009/video/26c3-3520-en-conlanging_101.mp4 324.3 MB
33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3) - english translation.mp4 324.0 MB
30C3 - 2013/video/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hd.mp4 323.9 MB
25C3 - 2008/video/25c3-3057-en-hacker_jeopardy_english_interpretation.mp4 322.9 MB
27C3 - 2010/video/27c3-4082-en-sap_landscape.mp4 319.3 MB
27C3 - 2010/video/27c3-4176-de-hacking_ibuttons.mp4 318.3 MB
29C3 - 2012/video/29c3-5379-de-en-jahresrueckblick2012_h264.mp4 315.2 MB
33C3 - 2016/Die Sprache der Populisten (33c3) - english translation.mp4 314.2 MB
26C3 - 2009/video/26c3-3711-de-computerspielepolitik.mp4 314.2 MB
26C3 - 2009/video/26c3-3494-de-defending_the_poor.mp4 314.0 MB
27C3 - 2010/video/27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4 313.6 MB
27C3 - 2010/video/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4 313.1 MB
27C3 - 2010/video/27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4 312.8 MB
27C3 - 2010/video/27c3-4296-en-lightning_days_d2.mp4 312.6 MB
27C3 - 2010/video/27c3-4263-en-resisting_excessive_government_surveillance.mp4 312.5 MB
34C3 - 2017/34C3 - JahresrUckblick des CCC 2017 - traduction francaise.mp4 312.5 MB
26C3 - 2009/video/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4 310.4 MB
30C3 - 2013/video/30c3-5499-en-X_Security_h264-hd.mp4 309.8 MB
30C3 - 2013/video/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hd.mp4 308.4 MB
32C3 - 2015/video/32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_hd.mp4 306.7 MB
34C3 - 2017/34C3 - Lightning Talks Day 4 - Ubersetzung Translation.mp4 305.3 MB
26C3 - 2009/video/26c3-3654-en-gsm_srsly.mp4 304.5 MB
29C3 - 2012/video/29c3-5383-en-lightning_talks_2_h264.mp4 304.4 MB
28C3 - 2011/video/28c3-4721-en-pentanews_game_show_2k11_h264.mp4 304.2 MB
27C3 - 2010/video/27c3-4070-de-fnord_jahresrueckblick.mp4 303.0 MB
27C3 - 2010/video/27c3-4334-en-fnord_jahresrueckblick.mp4 302.9 MB
29C3 - 2012/video/29c3-5037-de-en-nougatbytes10_h264.mp4 302.2 MB
26C3 - 2009/video/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4 298.5 MB
34C3 - 2017/34C3 - JahresrUckblick des CCC 2017.mp4 298.2 MB
34C3 - 2017/34C3 - JahresrUckblick des CCC 2017 - english translation.mp4 298.2 MB
26C3 - 2009/video/26c3-3570-en-weaponizing_cultural_viruses.mp4 297.1 MB
25C3 - 2008/video/25c3-3021-de-security_nightmares_2009.mp4 296.9 MB
27C3 - 2010/video/27c3-4253-en-pentanews_game_show.mp4 296.2 MB
31C3 - 2014/video/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_hd.mp4 294.6 MB
34C3 - 2017/34C3 - Lightning Talks Day 4.mp4 293.1 MB
31C3 - 2014/video/31c3-5931-en-de-Telescope_Making_hd.mp4 292.4 MB
25C3 - 2008/video/25c3-3058-en-security_nightmares_2009_english_interpretation.mp4 292.2 MB
32C3 - 2015/video/32c3-7152-de-en-gsw-Hacker_Jeopardy_hd.mp4 291.8 MB
28C3 - 2011/video/28c3-4722-de-dick_size_war_for_nerds_h264.mp4 291.6 MB
32C3 - 2015/video/32c3-7421-en-de-Fluxus_cannot_save_the_world_hd.mp4 291.4 MB
31C3 - 2014/video/31c3-6397-en-de-Lets_Encrypt_hd.mp4 291.0 MB
27C3 - 2010/video/27c3-4160-en-automatic_identification_cryptographic_primitives.mp4 289.7 MB
26C3 - 2009/video/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4 289.5 MB
30C3 - 2013/video/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4 287.7 MB
31C3 - 2014/video/31c3-6261-en-de-Lets_build_a_quantum_computer_hd.mp4 285.9 MB
26C3 - 2009/video/26c3-3590-de-europische_biometriestrategien.mp4 285.1 MB
30C3 - 2013/video/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4 284.9 MB
31C3 - 2014/video/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_hd.mp4 284.0 MB
33C3 - 2016/Community (33c3) - deutsche Ubersetzung.mp4 283.9 MB
33C3 - 2016/Community (33c3).mp4 283.5 MB
27C3 - 2010/video/27c3-4234-en-usb_and_libusb.mp4 283.2 MB
27C3 - 2010/video/27c3-4164-de-friede_sei_mit_euren_daten.mp4 283.0 MB
31C3 - 2014/video/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_hd.mp4 282.2 MB
26C3 - 2009/video/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4 282.0 MB
27C3 - 2010/video/27c3-4144-en-short_political_history_of_acoustics.mp4 281.7 MB
28C3 - 2011/video/28c3-4937-en-security_nightmares_h264.mp4 281.3 MB
29C3 - 2012/video/29c3-5384-en-lightning_talks_3_h264.mp4 281.3 MB
27C3 - 2010/video/27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4 281.2 MB
31C3 - 2014/video/31c3-6571-en-31C3_Keynote_hd.mp4 280.2 MB
26C3 - 2009/video/26c3-3540-en-a_hackers_utopia.mp4 280.1 MB
33C3 - 2016/33C3 Closing Ceremony (33c3) - english translation.mp4 280.1 MB
32C3 - 2015/video/32c3-7283-en-de-Software_and_business_method_patents_call_for_action_hd.mp4 279.7 MB
27C3 - 2010/video/27c3-4230-de-security_nightmares.mp4 279.5 MB
31C3 - 2014/video/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_hd.mp4 279.4 MB
26C3 - 2009/video/26c3-3554-de-tor_and_censorship_lessons_learned.mp4 278.5 MB
26C3 - 2009/video/26c3-3567-en-wikileaks_release_10.mp4 277.6 MB
30C3 - 2013/video/30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hd.mp4 277.6 MB
31C3 - 2014/video/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_hd.mp4 277.5 MB
27C3 - 2010/video/27c3-4149-en-i_control_your_code.mp4 277.4 MB
26C3 - 2009/video/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4 277.2 MB
26C3 - 2009/video/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4 277.0 MB
27C3 - 2010/video/27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4 276.8 MB
27C3 - 2010/video/27c3-4018-en-frozencache.mp4 276.5 MB
26C3 - 2009/video/26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4 276.5 MB
31C3 - 2014/video/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_hd.mp4 276.2 MB
26C3 - 2009/video/26c3-3592-de-cybernetic_cannibalism.mp4 276.2 MB
26C3 - 2009/video/26c3-3464-de-liquid_democracy.mp4 276.0 MB
27C3 - 2010/video/27c3-4085-de-digitale_spaltung_per_gesetz.mp4 276.0 MB
27C3 - 2010/video/27c3-3957-en-ipv6_insecurities.mp4 275.5 MB
26C3 - 2009/video/26c3-3709-en-legic_prime_obscurity_in_depth.mp4 274.8 MB
34C3 - 2017/34C3 - The Snowden Refugees under Surveillance in Hong Kong - deutsche Ubersetzung.mp4 273.4 MB
34C3 - 2017/34C3 - The Snowden Refugees under Surveillance in Hong Kong - traduction francaise.mp4 273.2 MB
31C3 - 2014/video/31c3-6377-en-de-Paypals_War_on_Terror_hd.mp4 271.9 MB
27C3 - 2010/video/27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4 271.6 MB
30C3 - 2013/video/30c3-5587-en-Making_machines_that_make_h264-hd.mp4 271.6 MB
27C3 - 2010/video/27c3-4017-en-desktop_on_the_linux.mp4 271.0 MB
26C3 - 2009/video/26c3-3266-de-hacking_the_universe.mp4 270.7 MB
26C3 - 2009/video/26c3-3648-en-dect_part_ii.mp4 270.2 MB
26C3 - 2009/video/26c3-3481-de-leyen-rhetorik.mp4 269.6 MB
32C3 - 2015/video/32c3-7443-en-de-The_Price_Of_Dissent_hd.mp4 269.0 MB
30C3 - 2013/video/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hd.mp4 268.8 MB
28C3 - 2011/video/28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4 268.2 MB
26C3 - 2009/video/26c3-3713-de-unbild__pictures_and_non-pictures.mp4 267.8 MB
27C3 - 2010/video/27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4 267.8 MB
28C3 - 2011/video/28c3-4788-de-datenvieh_oder_daten_fee_h264.mp4 267.4 MB
28C3 - 2011/video/28c3-4898-de-security_nightmares_h264.mp4 267.3 MB
34C3 - 2017/34C3 - Nougatbytes 11 - english translation.mp4 266.4 MB
26C3 - 2009/video/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4 266.3 MB
31C3 - 2014/video/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_hd.mp4 265.3 MB
30C3 - 2013/video/30c3-5459-en-de-Security_of_the_IC_Backside_h264-hd.mp4 265.2 MB
28C3 - 2011/video/28c3-4928-en-kinectfusion_h264.mp4 265.2 MB
31C3 - 2014/video/31c3-5943-en-de-Low_Cost_High_Speed_Photography_hd.mp4 265.0 MB
26C3 - 2009/video/26c3-3573-en-playing_with_the_built_city.mp4 264.9 MB
30C3 - 2013/video/30c3-5295-en-de-The_Four_Wars_h264-hd.mp4 264.4 MB
27C3 - 2010/video/27c3-4244-en-critical_overview_of_10_years_pet.mp4 264.2 MB
27C3 - 2010/video/27c3-4061-en-building_custom_disassemblers.mp4 264.1 MB
26C3 - 2009/video/26c3-3547-en-after_the_hype.mp4 263.9 MB
31C3 - 2014/video/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_hd.mp4 263.9 MB
26C3 - 2009/video/26c3-3696-en-wireless_power_transfer.mp4 263.7 MB
26C3 - 2009/video/26c3-3510-de-technik_des_neuen_epa.mp4 263.4 MB
26C3 - 2009/video/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4 262.1 MB
26C3 - 2009/video/26c3-3452-en-here_be_electric_dragons.mp4 262.1 MB
26C3 - 2009/video/26c3-3657-en-optimised_to_fail.mp4 261.9 MB
31C3 - 2014/video/31c3-6240-en-Reproducible_Builds_hd.mp4 261.3 MB
26C3 - 2009/video/26c3-3600-de-location_tracking_does_scale_up.mp4 260.5 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Monero Hardware Development.mp4 260.2 MB
26C3 - 2009/video/26c3-3577-de-privacy-enhanced_event_scheduling.mp4 260.1 MB
30C3 - 2013/video/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hd.mp4 259.8 MB
31C3 - 2014/video/31c3-6255-de-en-10_Jahre_OpenStreetMap_hd.mp4 259.7 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Mesh-Bart_Polot-GNUnet_Wireless_Mesh_DHT.mp4 259.4 MB
28C3 - 2011/video/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.mp4 259.3 MB
25C3 - 2008/video/25c3-2639-en-attacking_nfc_mobile_phones.mp4 258.6 MB
26C3 - 2009/video/26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4 258.5 MB
27C3 - 2010/video/27c3-4338-de-wikileaks_und_mehr.mp4 257.4 MB
26C3 - 2009/video/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4 256.9 MB
27C3 - 2010/video/27c3-4297-de-die_gesamte_technik_ist_sicher.mp4 256.7 MB
26C3 - 2009/video/26c3-3495-de-das_zugangserschwerungsgesetz.mp4 256.2 MB
29C3 - 2012/video/29c3-5244-de-en-security_nightmares2012_h264.mp4 256.2 MB
27C3 - 2010/video/27c3-4190-en-data_retention_in_the_eu.mp4 256.0 MB
26C3 - 2009/video/26c3-3468-de-privacy_amp_stylometry.mp4 255.7 MB
32C3 - 2015/video/32c3-7558-en-de-Lightning_Talks_Day_2_hd.mp4 255.5 MB
27C3 - 2010/video/27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4 255.0 MB
29C3 - 2012/video/29c3-5316-en-lightningtalks1_h264.mp4 254.4 MB
31C3 - 2014/video/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_hd.mp4 254.0 MB
26C3 - 2009/video/26c3-3501-en-why_net_neutrality_matters.mp4 253.0 MB
25C3 - 2008/video/25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4 252.1 MB
30C3 - 2013/video/30c3-5295-en-The_Four_Wars_h264-hd.mp4 251.9 MB
28C3 - 2011/video/28c3-4913-de-almighty_dna_and_beyond_h264.mp4 251.9 MB
31C3 - 2014/video/31c3-6350-en-Correcting_copywrongs_hd.mp4 251.3 MB
34C3 - 2017/34C3 - Nougatbytes 11.mp4 251.1 MB
26C3 - 2009/video/26c3-3515-en-secubt.mp4 251.0 MB
27C3 - 2010/video/27c3-4174-en-the_hidden_nemesis.mp4 251.0 MB
34C3 - 2017/34C3 - Don't stop 'til you feel it - deutsche Ubersetzung.mp4 250.9 MB
33C3 - 2016/The Global Assassination Grid - traduction française (33c3).mp4 250.4 MB
29C3 - 2012/video/29c3-5282-de-en-rfidkleidung_h264.mp4 249.7 MB
34C3 - 2017/34C3 - Don't stop 'til you feel it.mp4 249.5 MB
26C3 - 2009/video/26c3-3670-en-blackbox_jtag_reverse_engineering.mp4 249.2 MB
26C3 - 2009/video/26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4 248.9 MB
27C3 - 2010/video/27c3-4301-en-flow_analysis_of_internet_activities.mp4 248.7 MB
32C3 - 2015/video/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_hd.mp4 248.3 MB
33C3 - 2016/Kampf dem Abmahnunwesen (33c3) - english translation.mp4 248.1 MB
27C3 - 2010/video/27c3-4140-en-contemporary_profiling_of_web_users.mp4 247.7 MB
28C3 - 2011/video/28c3-4660-en-post_memory_corruption_memory_analysis_h264.mp4 247.4 MB
25C3 - 2008/video/25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4 246.9 MB
28C3 - 2011/video/28c3-4581-en-taking_control_over_the_tor_network_h264.mp4 246.2 MB
28C3 - 2011/video/28c3-4748-en-the_best_of_the_oxcars_h264.mp4 245.9 MB
33C3 - 2016/Fnord-JahresrUckblick (33c3) - english translation.mp4 245.8 MB
33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3).mp4 245.1 MB
26C3 - 2009/video/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4 245.1 MB
26C3 - 2009/video/26c3-3490-en-building_a_debugger.mp4 243.7 MB
33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3) - traduction française.mp4 243.3 MB
26C3 - 2009/video/26c3-3509-de-wofr_offenes_internet.mp4 242.7 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_OS-Jon_Solworth-Ethos_Operating_System.mp4 242.0 MB
27C3 - 2010/video/27c3-4175-en-from_robot_to_robot.mp4 241.7 MB
28C3 - 2011/video/28c3-4768-en-eating_in_the_anthropocene_h264.mp4 241.5 MB
29C3 - 2012/video/29c3-5380-de-en-staatstrojaner2012_h264.mp4 240.8 MB
33C3 - 2016/Building Custom Pinball Machines (33c3) - deutsche Ubersetzung.mp4 240.4 MB
25C3 - 2008/video/25c3-3030-en-messing_around_with_garage_doors.mp4 240.4 MB
28C3 - 2011/video/28c3-4811-en-rootkits_in_your_web_application_h264.mp4 240.1 MB
26C3 - 2009/video/26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4 238.8 MB
32C3 - 2015/video/32c3-7559-en-de-Lightning_Talks_Day_3_hd.mp4 238.6 MB
28C3 - 2011/video/28c3-4700-en-what_is_whiteit_h264.mp4 238.3 MB
26C3 - 2009/video/26c3-3523-de-eine_zensur_findet_statt.mp4 238.2 MB
28C3 - 2011/video/28c3-4754-en-smart_hacking_for_privacy_h264.mp4 237.3 MB
33C3 - 2016/Durchmarsch von Rechts (33c3) - english translation.mp4 236.5 MB
31C3 - 2014/video/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_hd.mp4 236.2 MB
28C3 - 2011/video/28c3-4777-en-r0ket_h264.mp4 236.0 MB
26C3 - 2009/video/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4 235.8 MB
29C3 - 2012/video/29c3-5198-en-de-fnord_jahresrueckblick2012_h264.mp4 235.7 MB
33C3 - 2016/Warum in die Ferne schweifen, wenn das Ausland liegt so nah (33c3) - english translation.mp4 235.1 MB
28C3 - 2011/video/28c3-4799-de-can_trains_be_hacked_h264.mp4 234.7 MB
34C3 - 2017/34C3 - Tracking Transience - deutsche Ubersetzung.mp4 234.4 MB
34C3 - 2017/34C3 - Tracking Transience.mp4 234.0 MB
27C3 - 2010/video/27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4 233.6 MB
29C3 - 2012/video/29c3-5419-de-podcaster_workshop_h264.mp4 232.9 MB
33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3) - deutsche Uberse.mp4 232.8 MB
32C3 - 2015/video/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_hd.mp4 232.1 MB
26C3 - 2009/video/26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4 231.8 MB
27C3 - 2010/video/27c3-4184-de-stanislaw_lem_weltverbesserer.mp4 231.4 MB
33C3 - 2016/State of Internet Censorship 2016 (33c3) - deutsche Ubersetzung.mp4 231.1 MB
27C3 - 2010/video/27c3-4208-en-wideband_gsm_sniffing.mp4 231.0 MB
33C3 - 2016/Nicht öffentlich. (33c3) - traduction française.mp4 230.6 MB
28C3 - 2011/video/28c3-4713-en-what_is_in_a_name_h264.mp4 230.6 MB
33C3 - 2016/33C3 Infrastructure Review (33c3).mp4 230.6 MB
33C3 - 2016/Nicht öffentlich. (33c3) - english translation.mp4 230.5 MB
28C3 - 2011/video/28c3-4802-en-towards_a_single_secure_european_cyberspace_h264.mp4 230.3 MB
33C3 - 2016/Copywrongs 2.0 (33c3) - traduction française.mp4 230.1 MB
33C3 - 2016/An Elevator to the Moon (and back) (33c3) - deutsche Ubersetzung.mp4 230.0 MB
33C3 - 2016/Copywrongs 2.0 (33c3) - deutsche Ubersetzung.mp4 229.3 MB
26C3 - 2009/video/26c3-3504-en-our_darknet_and_its_bright_spots.mp4 229.3 MB
26C3 - 2009/video/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4 229.2 MB
26C3 - 2009/video/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4 229.0 MB
28C3 - 2011/video/28c3-4936-en-fnord_jahresrueckblick_h264.mp4 228.9 MB
26C3 - 2009/video/26c3-3685-de-im_herz_der_bestie.mp4 228.8 MB
34C3 - 2017/34C3 - Pointing Fingers at 'The Media' - deutsche Ubersetzung.mp4 228.7 MB
28C3 - 2011/video/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4 228.7 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Bart_Polot-GNU_Telephony.mp4 227.6 MB
28C3 - 2011/video/28c3-4930-en-black_ops_of_tcpip_2011_h264.mp4 227.6 MB
26C3 - 2009/video/26c3-3672-de-advanced_microcontroller_programming.mp4 227.4 MB
29C3 - 2012/video/29c3-5285-de-en-men_who_stare_at_bits_h264.mp4 227.4 MB
25C3 - 2008/video/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4 227.3 MB
31C3 - 2014/video/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_hd.mp4 227.3 MB
27C3 - 2010/video/27c3-4103-en-copyright_enforcement_versus_freedoms.mp4 227.3 MB
31C3 - 2014/video/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_hd.mp4 226.4 MB
28C3 - 2011/video/28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4 226.0 MB
31C3 - 2014/video/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_hd.mp4 225.2 MB
25C3 - 2008/video/25c3-2773-en-soviet_unterzoegersdorf.mp4 225.0 MB
32C3 - 2015/video/32c3-7280-en-de-Cyber_all_the_Wassenaars_hd.mp4 223.5 MB
34C3 - 2017/34C3 - Lobby-Schlacht um die ePrivacy-Verordnung.mp4 222.8 MB
27C3 - 2010/video/27c3-4206-en-immi_from_concept_to_reality.mp4 222.5 MB
34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection - deutsche Ubersetzun.mp4 222.4 MB
34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection - La traduccion espan.mp4 222.0 MB
34C3 - 2017/34C3 - Pointing Fingers at 'The Media'.mp4 221.9 MB
26C3 - 2009/video/26c3-3631-en-finding_the_key_in_the_haystack.mp4 221.8 MB
28C3 - 2011/video/28c3-4640-en-time_is_on_my_side_h264.mp4 221.6 MB
30C3 - 2013/video/30c3-5618-en-Baseband_Exploitation_in_2013_h264-hd.mp4 220.9 MB
29C3 - 2012/video/29c3-5262-de-en-anderthalb_jahre_fragdenstaat_h264.mp4 220.9 MB
25C3 - 2008/video/25c3-2860-de-neusprech_im_berwachungsstaat.mp4 220.8 MB
27C3 - 2010/video/27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4 220.2 MB
33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3) - deutsche Ubersetzung.mp4 219.8 MB
33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3).mp4 219.2 MB
32C3 - 2015/video/32c3-7540-en-de-Maker_Spaces_in_Favelas_-_Lecture_hd.mp4 219.1 MB
30C3 - 2013/video/30c3-5562-en-de-Lightning_Talks_Day_2_h264-hq.mp4 219.0 MB
32C3 - 2015/video/32c3-7403-en-de-A_New_Kid_on_the_Block_hd.mp4 218.9 MB
27C3 - 2010/video/27c3-4003-en-cybernetics_for_the_masses.mp4 218.4 MB
32C3 - 2015/video/32c3-7560-en-de-Lightning_Talks_Day_4_hd.mp4 218.0 MB
26C3 - 2009/video/26c3-3700-de-here_be_dragons.mp4 217.8 MB
34C3 - 2017/34C3 - Die Lauschprogramme der Geheimdienste.mp4 216.6 MB
26C3 - 2009/video/26c3-3710-en-the_lost_cosmonauts.mp4 216.5 MB
28C3 - 2011/video/28c3-4866-de-fnord_jahresrueckblick_h264.mp4 215.9 MB
26C3 - 2009/video/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4 215.4 MB
32C3 - 2015/video/32c3-7546-de-en-Security_Nightmares_0x10_hd.mp4 215.3 MB
28C3 - 2011/video/28c3-4821-en-not_your_grandfathers_moon_landing_h264.mp4 215.1 MB
31C3 - 2014/video/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_hd.mp4 214.9 MB
28C3 - 2011/video/28c3-4856-en-the_engineering_part_of_social_engineering_h264.mp4 214.0 MB
29C3 - 2012/video/29c3-5179-de-en-hacking_philosophy_h264.mp4 213.8 MB
33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3) - deutsche Ubersetzung.mp4 212.6 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Scalability-Gabor_Toth-Secure-Share-Multicasting-for-GNUnet.mp4 212.5 MB
25C3 - 2008/video/25c3-3016-en-life_is_a_holodeck.mp4 212.3 MB
28C3 - 2011/video/28c3-4780-en-print_me_if_you_dare_h264.mp4 212.1 MB
33C3 - 2016/Build your own NSA (33c3) - traduction française.mp4 211.9 MB
33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3).mp4 211.8 MB
34C3 - 2017/34C3 - QualityLand - english translation.mp4 211.0 MB
31C3 - 2014/video/31c3-5997-en-Preserving_arcade_games_hd.mp4 210.9 MB
25C3 - 2008/video/25c3-2937-en-dect.mp4 210.5 MB
33C3 - 2016/Die Sprache der Populisten (33c3).mp4 210.5 MB
34C3 - 2017/34C3 - QualityLand.mp4 210.4 MB
33C3 - 2016/Die Sprache der Populisten (33c3) - traduction française.mp4 210.4 MB
28C3 - 2011/video/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.mp4 209.8 MB
20C3 - 2003/video/20C3-600-RFID.mp4 209.2 MB
25C3 - 2008/video/25c3-2816-en-cisco_ios_attack_and_defense.mp4 208.8 MB
27C3 - 2010/video/27c3-4096-en-code_deobfuscation_by_optimization.mp4 208.5 MB
28C3 - 2011/video/28c3-4749-en-does_hacktivism_matter_h264.mp4 208.4 MB
28C3 - 2011/video/28c3-4706-en-power_gadgets_with_your_own_electricity_h264.mp4 208.1 MB
33C3 - 2016/Build your own NSA (33c3) - english translation.mp4 207.8 MB
31C3 - 2014/video/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_hd.mp4 207.1 MB
32C3 - 2015/video/32c3-7154-en-de-Iridium_Update_hd.mp4 207.0 MB
32C3 - 2015/video/32c3-7260-en-de-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for_hd.mp4 206.8 MB
25C3 - 2008/video/25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4 206.8 MB
34C3 - 2017/34C3 - Spy vs. Spy A Modern Study Of Microphone Bugs Operation And Detection.mp4 206.7 MB
25C3 - 2008/video/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4 206.7 MB
33C3 - 2016/Build your own NSA (33c3).mp4 206.7 MB
27C3 - 2010/video/27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4 206.5 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Apps-Simon_Levermann-Tox_Telephony.mp4 206.1 MB
30C3 - 2013/video/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hd.mp4 205.6 MB
29C3 - 2012/video/29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_h264.mp4 205.4 MB
26C3 - 2009/video/26c3-3608-en-playing_with_the_gsm_rf_interface.mp4 205.3 MB
31C3 - 2014/video/31c3-6253-en-de-Computer_Science_in_the_DPRK_hd.mp4 205.2 MB
25C3 - 2008/video/25c3-2991-en-terrorist_all-stars.mp4 205.1 MB
32C3 - 2015/video/32c3-7562-de-en-Jugend_hackt_2015_hd.mp4 205.0 MB
25C3 - 2008/video/25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4 205.0 MB
28C3 - 2011/video/28c3-4668-en-electronic_money_h264.mp4 204.9 MB
28C3 - 2011/video/28c3-4669-en-bionic_ears_h264.mp4 204.9 MB
25C3 - 2008/video/25c3-2934-en-blinkenlights_stereoscope.mp4 204.3 MB
25C3 - 2008/video/25c3-2863-en-climate_change_-_state_of_the_science.mp4 204.1 MB
32C3 - 2015/video/32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_hd.mp4 203.9 MB
26C3 - 2009/video/26c3-3594-de-internetsperren.mp4 203.9 MB
28C3 - 2011/video/28c3-4675-de-politik_neusprech_2011_h264.mp4 203.9 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Honigdachs-Podcast LIVE.mp4 202.8 MB
29C3 - 2012/video/29c3-5266-de-en-proximax_telex_flashproxy_h264.mp4 202.6 MB
28C3 - 2011/video/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264.mp4 202.4 MB
33C3 - 2016/Do as I Say not as I Do Stealth Modification of Programmable Logic Controllers I O by Pin Control A.mp4 202.1 MB
29C3 - 2012/video/29c3-5283-de-en-whiteit_cleanit_ceocoalition_h264.mp4 201.9 MB
31C3 - 2014/video/31c3-6142-en-de-Space_Hacker_hd.mp4 201.7 MB
32C3 - 2015/video/32c3-7307-en-de-State_of_the_Onion_hd.mp4 201.7 MB
32C3 - 2015/video/32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_hd.mp4 201.5 MB
34C3 - 2017/34C3 - We should share our secrets - deutsche Ubersetzung.mp4 200.9 MB
34C3 - 2017/34C3 - We should share our secrets - traduction francaise.mp4 200.7 MB
34C3 - 2017/34C3 - We should share our secrets.mp4 200.2 MB
34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen - english translation.mp4 200.0 MB
34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen - traduction francaise.mp4 199.6 MB
29C3 - 2012/video/29c3-5401-de-en-der_mord_faellt_aus_h264.mp4 199.5 MB
32C3 - 2015/video/32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_hd.mp4 199.1 MB
31C3 - 2014/video/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_hd.mp4 198.7 MB
31C3 - 2014/video/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_hd.mp4 198.7 MB
25C3 - 2008/video/25c3-3020-en-banking_malware_101.mp4 198.6 MB
33C3 - 2016/33C3 Closing Ceremony (33c3) - traduction française.mp4 198.2 MB
25C3 - 2008/video/25c3-2832-en-exploiting_symbian.mp4 197.7 MB
26C3 - 2009/video/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4 197.4 MB
26C3 - 2009/video/26c3-3302-en-i_internet.mp4 197.0 MB
33C3 - 2016/33C3 Closing Ceremony (33c3).mp4 196.9 MB
27C3 - 2010/video/27c3-4143-en-parttimescientists.mp4 196.7 MB
27C3 - 2010/video/27c3-4245-en-adventures_in_analyzing_stuxnet.mp4 196.1 MB
33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3) - english translation.mp4 196.0 MB
31C3 - 2014/video/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_hd.mp4 195.7 MB
28C3 - 2011/video/28c3-4755-en-counterlobbying_eu_institutions_h264.mp4 195.6 MB
21C3 - 2004/video/159 State of Emergent Democracy.mp4 195.0 MB
25C3 - 2008/video/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4 195.0 MB
27C3 - 2010/video/27c3-4073-de-logikschaltungen_ohne_elektronik.mp4 194.9 MB
29C3 - 2012/video/29c3-5397-de-en-indect_verhaltenserkennung_h264.mp4 194.9 MB
25C3 - 2008/video/25c3-3023-en-making_the_theoretical_possible.mp4 194.8 MB
29C3 - 2012/video/29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_h264.mp4 194.8 MB
31C3 - 2014/video/31c3-6600-en-de-Tell_no-one_hd.mp4 194.4 MB
29C3 - 2012/video/29c3-5270-de-en-hanussens_mindreading_h264.mp4 194.3 MB
32C3 - 2015/video/32c3-7570-en-de-Plunge_into_Proxy_Politics_hd.mp4 193.8 MB
31C3 - 2014/video/31c3-6122-en-de-Mobile_self-defense_hd.mp4 193.7 MB
25C3 - 2008/video/25c3-2893-en-attacking_rich_internet_applications.mp4 193.6 MB
31C3 - 2014/video/31c3-6299-en-de-Trackography_hd.mp4 193.6 MB
25C3 - 2008/video/25c3-2963-de-handschellen_hacken.mp4 193.3 MB
25C3 - 2008/video/25c3-3028-de-der_hackerparagraph_202c_stgb.mp4 193.3 MB
25C3 - 2008/video/25c3-2973-en-lightning_talks_day4.mp4 193.0 MB
26C3 - 2009/video/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4 192.8 MB
33C3 - 2016/Lightning Talks Day 2 (33c3) - deutsche Ubersetzung.mp4 192.7 MB
23C3 - 2006/video/23C3-1683-de-powerpoint_karaoke.mp4 192.4 MB
27C3 - 2010/video/27c3-4211-en-chip_and_pin_is_broken.mp4 191.9 MB
25C3 - 2008/video/25c3-2665-en-the_trust_situation.mp4 191.9 MB
25C3 - 2008/video/25c3-2874-en-the_ultimate_commodore_64_talk.mp4 191.9 MB
29C3 - 2012/video/29c3-5382-de-en-antiterrordatei_h264.mp4 191.4 MB
25C3 - 2008/video/25c3-2940-en-flying_for_free.mp4 190.9 MB
25C3 - 2008/video/25c3-2895-de-der_elektronische_personalausweis.mp4 190.8 MB
33C3 - 2016/Lightning Talks Day 2 (33c3).mp4 190.8 MB
33C3 - 2016/Lightning Talks Day 3 (33c3).mp4 190.5 MB
28C3 - 2011/video/28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.mp4 190.1 MB
28C3 - 2011/video/28c3-4732-en-datamining_for_hackers_h264.mp4 189.9 MB
32C3 - 2015/video/32c3-7561-en-de-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse_hd.mp4 189.7 MB
33C3 - 2016/Lightning Talks Day 3 (33c3) - deutsche Ubersetzung.mp4 188.9 MB
25C3 - 2008/video/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4 188.8 MB
34C3 - 2017/34C3 - Social Bots, Fake News und Filterblasen.mp4 188.8 MB
27C3 - 2010/video/27c3-4295-en-high_speed_high_security_cryptography.mp4 188.3 MB
30C3 - 2013/video/30c3-5416-en-de-Desperately_Seeking_Susy_h264-hq.mp4 188.2 MB
30C3 - 2013/video/30c3-5304-en-CounterStrike_h264-hd.mp4 188.1 MB
32C3 - 2015/video/32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_hd.mp4 188.0 MB
27C3 - 2010/video/27c3-4210-en-lying_to_the_neighbours.mp4 187.7 MB
30C3 - 2013/video/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hd.mp4 186.9 MB
28C3 - 2011/video/28c3-4648-en-quantum_of_science_h264.mp4 186.6 MB
32C3 - 2015/video/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_hd.mp4 186.6 MB
25C3 - 2008/video/25c3-3047-en-lightning_talks_day3_morning.mp4 186.5 MB
27C3 - 2010/video/27c3-4060-en-attacking_mobile_phones.mp4 186.3 MB
29C3 - 2012/video/29c3-5287-de-en-hinter_den_kulissen_nsu_h264.mp4 186.3 MB
25C3 - 2008/video/25c3-2979-en-embracing_post-privacy.mp4 186.3 MB
33C3 - 2016/Dissecting HDMI (33c3) - deutsche Ubersetzung.mp4 185.8 MB
25C3 - 2008/video/25c3-2899-en-mining_social_contacts_with_active_rfid.mp4 185.5 MB
27C3 - 2010/video/27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4 185.4 MB
31C3 - 2014/video/31c3-6573-en-de-From_Computation_to_Consciousness_hd.mp4 185.3 MB
33C3 - 2016/Dissecting HDMI (33c3) - traduction française.mp4 185.2 MB
29C3 - 2012/video/29c3-5306-en-the_tor_software_ecosystem_h264.mp4 185.2 MB
30C3 - 2013/video/30c3-5439-en-To_Protect_And_Infect_h264-hd.mp4 184.8 MB
34C3 - 2017/34C3 - Tiger, Drucker und ein Mahnmal (2).mp4 184.6 MB
25C3 - 2008/video/25c3-2980-en-the_infinite_library.mp4 184.6 MB
25C3 - 2008/video/25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4 184.6 MB
25C3 - 2008/video/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4 184.5 MB
32C3 - 2015/video/32c3-7130-en-de-The_Perl_Jam_2_hd.mp4 184.5 MB
34C3 - 2017/34C3 - Tiger, Drucker und ein Mahnmal.mp4 184.5 MB
26C3 - 2009/video/26c3-3596-de-cat_procsysnetipv4fuckups.mp4 184.4 MB
30C3 - 2013/video/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hd.mp4 184.4 MB
31C3 - 2014/video/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_hd.mp4 184.3 MB
26C3 - 2009/video/26c3-3350-en-milkymist.mp4 184.2 MB
25C3 - 2008/video/25c3-2916-en-wikileaks.mp4 184.1 MB
33C3 - 2016/Lightning Talks Day 4 (33c3) - deutsche Ubersetzung.mp4 183.9 MB
26C3 - 2009/video/26c3-3664-en-homewreckery.mp4 183.8 MB
30C3 - 2013/video/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4 183.8 MB
25C3 - 2008/video/25c3-2669-en-collapsing_the_european_security_architecture.mp4 183.7 MB
27C3 - 2010/video/27c3-4142-en-nodejs_as_a_networking_tool.mp4 183.5 MB
25C3 - 2008/video/25c3-2976-en-hacking_the_iphone.mp4 183.4 MB
29C3 - 2012/video/29c3-5102-de-en-digiges_h264.mp4 182.8 MB
29C3 - 2012/video/29c3-5289-de-en-meldegesetz_h264.mp4 182.8 MB
34C3 - 2017/34C3 - Bildung auf dem Weg ins Neuland - english translation.mp4 182.6 MB
33C3 - 2016/JODI - Apache is functioning normally (33c3) - deutsche Ubersetzung.mp4 182.1 MB
19C3 - 2002/video/19C3-491-distributed-computing.mp4 182.0 MB
34C3 - 2017/34C3 - Internet of Fails - La traduccion espanola.mp4 182.0 MB
29C3 - 2012/video/29c3-5121-de-en-sind_faire_computer_moeglich_h264.mp4 181.7 MB
33C3 - 2016/JODI - Apache is functioning normally (33c3).mp4 181.7 MB
29C3 - 2012/video/29c3-5336-de-en-sprache_ungleichheit_unfreiheit_h264.mp4 181.6 MB
28C3 - 2011/video/28c3-4766-en-802_11_packets_in_packets_h264.mp4 181.6 MB
30C3 - 2013/video/30c3-5397-en-Sysadmins_of_the_world_unite__h264-hd.mp4 181.4 MB
29C3 - 2012/video/29c3-5274-en-grand_eu_data_protection_reform_h264.mp4 181.4 MB
31C3 - 2014/video/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_hd.mp4 181.4 MB
25C3 - 2008/video/25c3-2975-de-zehn_big_brother_awards_in_at.mp4 180.9 MB
28C3 - 2011/video/28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.mp4 180.8 MB
28C3 - 2011/video/28c3-4781-en-deceiving_authorship_detection_h264.mp4 180.8 MB
28C3 - 2011/video/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264.mp4 180.7 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - net2o GUI, realtime mixnet and ethical micropayment with efficient BlockChain.mp4 180.2 MB
26C3 - 2009/video/26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4 180.2 MB
27C3 - 2010/video/27c3-4046-en-all_colours_are_beautiful.mp4 180.0 MB
25C3 - 2008/video/25c3-3008-en-anatomy_of_smartphone_hardware.mp4 179.8 MB
25C3 - 2008/video/25c3-3015-en-rapid_prototype_your_life.mp4 179.5 MB
32C3 - 2015/video/32c3-7368-en-de-Shopshifting_hd.mp4 179.4 MB
31C3 - 2014/video/31c3-6137-en-de-CAESAR_and_NORX_hd.mp4 179.3 MB
26C3 - 2009/video/26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4 179.3 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Ethereum AMA.mp4 179.2 MB
32C3 - 2015/video/32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_hd.mp4 179.2 MB
28C3 - 2011/video/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.mp4 178.5 MB
31C3 - 2014/video/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_hd.mp4 178.5 MB
33C3 - 2016/Lightning Talks Day 4 (33c3).mp4 178.4 MB
27C3 - 2010/video/27c3-4168-en-automated_architecture_independent_gadget_search.mp4 178.1 MB
27C3 - 2010/video/27c3-4302-en-27c3_keynote_we_come_in_peace.mp4 178.1 MB
32C3 - 2015/video/32c3-7565-en-Keynote_hd.mp4 177.9 MB
23C3 - 2006/video/23C3-1566-en-openpcd_openpicc.mp4 177.9 MB
25C3 - 2008/video/25c3-2799-en-console_hacking_2008_wii_fail.mp4 177.8 MB
31C3 - 2014/video/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_hd.mp4 177.5 MB
32C3 - 2015/video/32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_hd.mp4 177.4 MB
33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3) - deutsche Ubersetzung.mp4 177.3 MB
33C3 - 2016/The Ultimate Game Boy Talk (33c3) - deutsche Ubersetzung.mp4 176.9 MB
33C3 - 2016/The Ultimate Game Boy Talk (33c3) - traduction française.mp4 176.9 MB
32C3 - 2015/video/32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_hd.mp4 176.8 MB
33C3 - 2016/Hebocon (33c3).mp4 176.7 MB
33C3 - 2016/Hebocon (33c3) - deutsche Ubersetzung.mp4 176.7 MB
32C3 - 2015/video/32c3-7279-en-de-Public_Library_Memory_of_the_World_hd.mp4 176.3 MB
33C3 - 2016/radare demystified (33c3) - traduction française.mp4 176.2 MB
33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3) - traduction française.mp4 175.9 MB
26C3 - 2009/video/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4 175.8 MB
28C3 - 2011/video/28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.mp4 175.7 MB
33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3).mp4 175.7 MB
33C3 - 2016/Eavesdropping on the Dark Cosmos (33c3) - deutsche Ubersetzung.mp4 175.5 MB
33C3 - 2016/radare demystified (33c3) - deutsche Ubersetzung.mp4 175.4 MB
32C3 - 2015/video/32c3-7216-en-de-CHINTERNET_ART_hd.mp4 175.0 MB
29C3 - 2012/video/29c3-5308-de-en-open_source_schluessel_und_schloesser_h264.mp4 174.7 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Magic Internet Money.mp4 174.6 MB
32C3 - 2015/video/32c3-7555-en-de-32C3_Infrastructure_Review_hd.mp4 174.4 MB
31C3 - 2014/video/31c3-6258-en-Reconstructing_narratives_hd.mp4 174.3 MB
33C3 - 2016/Hochsicherheits-GeneralschlUssel Marke Eigenbau (33c3) - english translation.mp4 174.1 MB
25C3 - 2008/video/25c3-3044-en-all_your_bases_are_belong_to_us.mp4 174.0 MB
33C3 - 2016/The Global Assassination Grid (33c3).mp4 173.9 MB
28C3 - 2011/video/28c3-4848-en-the_coming_war_on_general_computation_h264.mp4 173.9 MB
33C3 - 2016/The Global Assassination Grid - deutsche Ubersetzung (33c3).mp4 173.9 MB
25C3 - 2008/video/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4 173.8 MB
34C3 - 2017/34C3 - On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso (2).mp4 173.5 MB
31C3 - 2014/video/31c3-6249-en-de-SS7_Locate_Track_Manipulate_hd.mp4 173.2 MB
27C3 - 2010/video/27c3-4221-en-omg_wtf_pdf.mp4 173.1 MB
28C3 - 2011/video/28c3-4798-en-sovereign_keys_h264.mp4 172.7 MB
34C3 - 2017/34C3 - On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso.mp4 172.7 MB
25C3 - 2008/video/25c3-3053-en-lightning_talks_day3_-_evening.mp4 172.5 MB
32C3 - 2015/video/32c3-7341-en-de-So_you_want_to_build_a_satellite_hd.mp4 172.4 MB
23C3 - 2006/video/23C3-1759-de-schlossoeffnung_staatssicherheit.mp4 172.4 MB
34C3 - 2017/34C3 - Open Source Estrogen - deutsche Ubersetzung.mp4 172.4 MB
33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3) - La traducción española.mp4 172.1 MB
31C3 - 2014/video/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_hd.mp4 171.8 MB
33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3) - deutsche Ubersetzung.mp4 171.3 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Die Programmiersprache Forth.mp4 171.3 MB
23C3 - 2006/video/23C3-1567-en-hacker_jeopardy.mp4 171.0 MB
25C3 - 2008/video/25c3-2952-de-pflanzenhacken.mp4 170.8 MB
30C3 - 2013/video/30c3-5192-en-Android_DDI_h264-hd.mp4 170.3 MB
31C3 - 2014/video/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_hd.mp4 170.3 MB
25C3 - 2008/video/25c3-3032-en-analyzing_rfid_security.mp4 170.2 MB
28C3 - 2011/video/28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264.mp4 170.2 MB
33C3 - 2016/Warum in die Ferne schweifen, wenn das Ausland liegt so nah (33c3).mp4 170.0 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Namecoin as a Decentralized Alternative to Certificate Authorities for TLS.mp4 169.7 MB
22C3 - 2005/video/22C3-546-de-gesundheitskarte.mp4 169.5 MB
30C3 - 2013/video/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4 169.5 MB
32C3 - 2015/video/32c3-7273-en-Unpatchable_hd.mp4 169.1 MB
31C3 - 2014/video/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_hd.mp4 168.9 MB
29C3 - 2012/video/29c3-5395-en-howto_hack_the_law_h264.mp4 168.9 MB
25C3 - 2008/video/25c3-2734-en-short_attention_span_security.mp4 168.8 MB
27C3 - 2010/video/27c3-4099-en-file_print_electronics.mp4 168.7 MB
33C3 - 2016/Fnord-JahresrUckblick (33c3).mp4 168.6 MB
34C3 - 2017/34C3 - Internet of Fails.mp4 168.4 MB
31C3 - 2014/video/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_hd.mp4 168.2 MB
34C3 - 2017/34C3 - Internet of Fails - deutsche Ubersetzung.mp4 168.1 MB
27C3 - 2010/video/27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4 167.4 MB
30C3 - 2013/video/30c3-5415-de-en-Der_tiefe_Staat_h264-hq.mp4 167.3 MB
34C3 - 2017/34C3 - Bildung auf dem Weg ins Neuland.mp4 167.2 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Nextcloud End to End Encryption.mp4 167.0 MB
28C3 - 2011/video/28c3-4804-de-politik_hacken_h264.mp4 166.8 MB
25C3 - 2008/video/25c3-2814-de-datenpannen.mp4 166.7 MB
33C3 - 2016/Fnord-JahresrUckblick (33c3) - SchwizerdUUtschi Ubersetzig.mp4 166.7 MB
32C3 - 2015/video/32c3-7218-en-de-A_Dozen_Years_of_Shellphish_hd.mp4 166.3 MB
32C3 - 2015/video/32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_hd.mp4 166.2 MB
27C3 - 2010/video/27c3-4261-en-key_recovery_attacks_rc4.mp4 166.2 MB
28C3 - 2011/video/28c3-4688-en-introducing_osmo_gmr_h264.mp4 166.1 MB
21C3 - 2004/video/013 The Art of Fingerprinting.mp4 166.0 MB
32C3 - 2015/video/32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think_hd.mp4 165.3 MB
33C3 - 2016/Durchmarsch von Rechts (33c3).mp4 165.1 MB
28C3 - 2011/video/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.mp4 165.1 MB
33C3 - 2016/Deploying TLS 1.3 the great, the good and the bad (33c3).mp4 164.8 MB
29C3 - 2012/video/29c3-5256-en-the_future_of_protocol_reversing_and_simulation_h264.mp4 164.8 MB
33C3 - 2016/Building Custom Pinball Machines (33c3).mp4 164.6 MB
28C3 - 2011/video/28c3-4736-en-defending_mobile_phones_h264.mp4 164.0 MB
31C3 - 2014/video/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_hd.mp4 163.7 MB
28C3 - 2011/video/28c3-4876-de-die_spinnen_die_sachsen_h264.mp4 163.4 MB
29C3 - 2012/video/29c3-5299-de-en-best_of_verfassungsschutz_h264.mp4 163.4 MB
32C3 - 2015/video/32c3-7321-en-de-re_cycle_hd.mp4 163.4 MB
33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3).mp4 163.3 MB
25C3 - 2008/video/25c3-2781-en-objects_as_software_the_coming_revolution.mp4 163.0 MB
26C3 - 2009/video/26c3-3353-de-reverse-engineering_displaylink_devices.mp4 162.9 MB
25C3 - 2008/video/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4 162.5 MB
28C3 - 2011/video/28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.mp4 162.4 MB
33C3 - 2016/Copywrongs 2.0 (33c3).mp4 162.4 MB
33C3 - 2016/Netzpolitik in Österreich (33c3) - english translation.mp4 162.3 MB
34C3 - 2017/34C3 - Open Source Estrogen.mp4 161.6 MB
32C3 - 2015/video/32c3-7277-en-de-Breaking_Honeypots_for_Fun_and_Profit_hd.mp4 161.6 MB
28C3 - 2011/video/28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4 161.4 MB
25C3 - 2008/video/25c3-3048-en-lightning_talks_day2.mp4 161.4 MB
33C3 - 2016/Make Wi-Fi fast again (33c3) - english translation.mp4 161.2 MB
33C3 - 2016/Von Alpakas, Hasenbären und Einhörnern - Uber Anerkennungskultur (33c3).mp4 161.0 MB
33C3 - 2016/Von Alpakas, Hasenbären und Einhörnern - Uber Anerkennungskultur (33c3) - english translation.mp4 160.9 MB
31C3 - 2014/video/31c3-6050-en-Code_Pointer_Integrity_hd.mp4 160.9 MB
25C3 - 2008/video/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4 160.8 MB
31C3 - 2014/video/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_hd.mp4 160.8 MB
34C3 - 2017/34C3 - Beeinflussung durch KUnstliche Intelligenz - english translation.mp4 160.8 MB
33C3 - 2016/Nicht öffentlich. (33c3).mp4 160.8 MB
31C3 - 2014/video/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_hd.mp4 160.7 MB
25C3 - 2008/video/25c3-2843-en-algorithmic_music_in_a_box.mp4 160.6 MB
31C3 - 2014/video/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_hd.mp4 160.3 MB
30C3 - 2013/video/30c3-5339-en-de-The_Year_in_Crypto_h264-hd.mp4 160.1 MB
31C3 - 2014/video/31c3-6321-en-de-The_Matter_of_Heartbleed_hd.mp4 160.1 MB
34C3 - 2017/34C3 - Resilienced Kryptographie - english translation.mp4 159.9 MB
31C3 - 2014/video/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_hd.mp4 159.8 MB
32C3 - 2015/video/32c3-7259-en-de-Graphs_Drones_Phones_hd.mp4 159.4 MB
23C3 - 2006/video/23C3-1419-de-java_wird_groovy.mp4 159.2 MB
25C3 - 2008/video/25c3-2970-en-coreboot_beyond_the_final_frontier.mp4 159.1 MB
31C3 - 2014/video/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_hd.mp4 159.1 MB
34C3 - 2017/34C3 - Protecting Your Privacy at the Border - deutsche Ubersetzung.mp4 159.0 MB
32C3 - 2015/video/32c3-7282-de-en-Fnord-Jahresrueckblick_hd.mp4 158.9 MB
31C3 - 2014/video/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_hd.mp4 158.8 MB
25C3 - 2008/video/25c3-2812-de-fnord_news_show.mp4 158.7 MB
34C3 - 2017/34C3 - Lets break modern binary code obfuscation - deutsche Ubersetzung.mp4 158.6 MB
34C3 - 2017/34C3 - Lets break modern binary code obfuscation.mp4 158.5 MB
25C3 - 2008/video/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4 158.4 MB
25C3 - 2008/video/25c3-3056-en-fnord_news_show_english_interpretation.mp4 158.4 MB
33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3) - La traducción española.mp4 158.3 MB
33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3) - english translation.mp4 158.2 MB
29C3 - 2012/video/29c3-5368-de-en-ifg_chance_oder_buergerbluff_h264.mp4 158.0 MB
21C3 - 2004/video/105 Honeypot Forensics.mp4 158.0 MB
23C3 - 2006/video/23C3-1444-en-tor_and_china.mp4 157.9 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Usability-carlo_von_lynX-UX_cannot_fix_technology.mp4 157.9 MB
25C3 - 2008/video/25c3-2999-en-closing_ceremony.mp4 157.8 MB
34C3 - 2017/34C3 - Opening Closed Systems with GlitchKit - deutsche Ubersetzung.mp4 157.5 MB
29C3 - 2012/video/29c3-5177-en-securing_the_campaign_h264.mp4 157.3 MB
25C3 - 2008/video/25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4 157.2 MB
28C3 - 2011/video/28c3-4897-en-keynote_h264.mp4 157.1 MB
27C3 - 2010/video/27c3-4193-en-having_fun_with_rtp.mp4 157.0 MB
25C3 - 2008/video/25c3-2827-de-u23.mp4 157.0 MB
28C3 - 2011/video/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.mp4 156.9 MB
34C3 - 2017/34C3 - Lightning Talks Day 3.mp4 156.8 MB
27C3 - 2010/video/27c3-4159-en-reverse_engineering_mos_6502.mp4 156.7 MB
27C3 - 2010/video/27c3-3983-en-hackers_and_computer_science.mp4 156.5 MB
34C3 - 2017/34C3 - Lightning Talks Day 3 - deutsche Ubersetzung - YouTube.mp4 156.3 MB
29C3 - 2012/video/29c3-5230-en-stylometry_and_online_underground_markets_h264.mp4 156.2 MB
33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3).mp4 156.1 MB
33C3 - 2016/Eine kleine Geschichte der Parlamentsschlägerei (33c3) - SchwizerdUUtschi Ubersetzig.mp4 155.9 MB
30C3 - 2013/video/30c3-5290-en-Console_Hacking_2013_h264-hq.mp4 155.7 MB
29C3 - 2012/video/29c3-5333-en-gsm_cell_phone_network_review_h264.mp4 155.6 MB
34C3 - 2017/34C3 - How risky is the software you use.mp4 155.5 MB
33C3 - 2016/ATMs how to break them to stop the fraud (33c3) - deutsche Ubersetzung.mp4 155.4 MB
32C3 - 2015/video/32c3-7336-en-de-3D_printing_on_the_moon_hd.mp4 155.2 MB
25C3 - 2008/video/25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4 155.2 MB
28C3 - 2011/video/28c3-4818-en-evolving_custom_communication_protocols_h264.mp4 155.0 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Monerujo - Android Monero Wallet.mp4 154.8 MB
33C3 - 2016/State of Internet Censorship 2016 (33c3).mp4 154.7 MB
31C3 - 2014/video/31c3-6547-en-de-Exploit_in_theater_sd.mp4 154.6 MB
28C3 - 2011/video/28c3-4916-en-buggedplanet_h264.mp4 154.1 MB
29C3 - 2012/video/29c3-5402-en-russias_surveillance_state_h264.mp4 153.9 MB
34C3 - 2017/34C3 - Deconstructing a Socialist Lawnmower.mp4 153.7 MB
24C3 - 2007/video/24c3-2402-en-lightning_talks_2007_day_4_high.mp4 153.7 MB
34C3 - 2017/34C3 - Deconstructing a Socialist Lawnmower - deutsche Ubersetzung.mp4 153.3 MB
25C3 - 2008/video/25c3-2942-de-vertex_hacking.mp4 153.3 MB
28C3 - 2011/video/28c3-4763-en-the_science_of_insecurity_h264.mp4 153.1 MB
28C3 - 2011/video/28c3-4710-en-the_future_of_cryptology_h264.mp4 153.1 MB
29C3 - 2012/video/29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_h264.mp4 152.7 MB
29C3 - 2012/video/29c3-5305-en-long_live_the_protocoletariat_h264.mp4 152.6 MB
25C3 - 2008/video/25c3-2997-en-locating_mobile_phones_using_ss7.mp4 152.6 MB
25C3 - 2008/video/25c3-2596-en-swf_and_the_malware_tragedy.mp4 152.4 MB
29C3 - 2012/video/29c3-5160-en-transparenzgesetz_hh_h264.mp4 152.1 MB
31C3 - 2014/video/31c3-6297-en-de-Virtual_Machine_Introspection_hd.mp4 152.1 MB
31C3 - 2014/video/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_hd.mp4 151.9 MB
34C3 - 2017/34C3 - Beeinflussung durch KUnstliche Intelligenz.mp4 151.8 MB
25C3 - 2008/video/25c3-2872-en-the_privacy_workshop_project.mp4 151.8 MB
29C3 - 2012/video/29c3-5134-en-new_human_interfaces_for_music_h264.mp4 151.6 MB
31C3 - 2014/video/31c3-6369-en-ECCHacks_hd.mp4 151.4 MB
25C3 - 2008/video/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4 151.4 MB
25C3 - 2008/video/25c3-2882-en-full-disk-encryption_crash-course.mp4 151.3 MB
26C3 - 2009/video/26c3-3717-en-closing_event.mp4 151.2 MB
28C3 - 2011/video/28c3-4738-de-echtes_netz_h264.mp4 150.5 MB
34C3 - 2017/34C3 - Lightning Talks Day 3 (2).mp4 150.4 MB
29C3 - 2012/video/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264.mp4 150.2 MB
28C3 - 2011/video/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.mp4 150.2 MB
34C3 - 2017/34C3 - Resilienced Kryptographie - YouTube.mp4 150.2 MB
25C3 - 2008/video/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4 149.9 MB
34C3 - 2017/34C3 - Free Electron Lasers - deutsche Ubersetzung.mp4 149.8 MB
31C3 - 2014/video/31c3-6460-en-de-Eye_Wear_Computing_hd.mp4 149.8 MB
33C3 - 2016/Stopping law enforcement hacking (33c3) - english translation.mp4 149.7 MB
32C3 - 2015/video/32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_hd.mp4 149.6 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Eigenes HackLab bauen!.mp4 149.1 MB
33C3 - 2016/No USB No problem. (33c3) - deutsche Ubersetzung.mp4 149.1 MB
27C3 - 2010/video/27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4 149.0 MB
33C3 - 2016/The High Priests of the Digital Age (33c3) - traduction française.mp4 148.8 MB
32C3 - 2015/video/32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_hd.mp4 148.8 MB
34C3 - 2017/34C3 - Opening Closed Systems with GlitchKit.mp4 148.1 MB
33C3 - 2016/The High Priests of the Digital Age (33c3) - deutsche Ubersetzung.mp4 148.1 MB
32C3 - 2015/video/32c3-7538-en-Internet_Landscapes_hd.mp4 148.1 MB
31C3 - 2014/video/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_hd.mp4 147.8 MB
21C3 - 2004/video/053 Enforcing the GNU GPL.mp4 147.8 MB
29C3 - 2012/video/29c3-5216-en-attacking_mobile_terminated_service_in_gsm_h264.mp4 147.8 MB
29C3 - 2012/video/29c3-5216-en-let_me_answer_that_for_you_h264.mp4 147.8 MB
33C3 - 2016/ATMs how to break them to stop the fraud (33c3).mp4 147.5 MB
31C3 - 2014/video/31c3-6295-de-en-Krypto_fuer_die_Zukunft_hd.mp4 147.5 MB
25C3 - 2008/video/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4 147.1 MB
19C3 - 2002/video/19C3-411-patent-party.mp4 146.9 MB
32C3 - 2015/video/32c3-7567-de-en-Katastrophe_und_Kommunikation_hd.mp4 146.8 MB
29C3 - 2012/video/29c3-5024-en-hackers_as_a_highrisk_population_h264.mp4 146.6 MB
29C3 - 2012/video/29c3-5396-de-en-gender_studies_informatik_h264.mp4 146.5 MB
32C3 - 2015/video/32c3-7386-en-de-Crypto_Wars_Part_II_hd.mp4 146.3 MB
30C3 - 2013/video/30c3-5377-de-en-UEberwachen_und_Sprache_h264-hq.mp4 146.2 MB
29C3 - 2012/video/29c3-5112-en-isps_black_box_h264.mp4 146.1 MB
29C3 - 2012/video/29c3-5319-en-certificate_authority_collapse_h264.mp4 145.9 MB
31C3 - 2014/video/31c3-5960-en-Revisiting_SSL_TLS_Implementations_hd.mp4 145.8 MB
31C3 - 2014/video/31c3-6596-en-de-The_Magical_Secrecy_Tour_hd.mp4 145.7 MB
29C3 - 2012/video/29c3-5124-en-low_cost_chip_microprobing_h264.mp4 145.3 MB
28C3 - 2011/video/28c3-4813-en-macro_dragnets_h264.mp4 145.1 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Scalable and privacy-respectful distributed systems - Our chance to avoid cloud co.mp4 145.0 MB
28C3 - 2011/video/28c3-4871-en-hacking_mfps_h264.mp4 144.4 MB
34C3 - 2017/34C3 - Der PC-Wahl-Hack - english translation.mp4 144.4 MB
34C3 - 2017/34C3 - Uncertain Concern - deutsche Ubersetzung.mp4 144.3 MB
33C3 - 2016/How do we know our PRNGs work properly (33c3).mp4 144.2 MB
32C3 - 2015/video/32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_hd.mp4 144.2 MB
29C3 - 2012/video/29c3-5323-de-en-pflanzenhacken_richtig_h264.mp4 144.1 MB
25C3 - 2008/video/25c3-2873-en-privacy_in_the_social_semantic_web.mp4 144.0 MB
23C3 - 2006/video/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp4 144.0 MB
34C3 - 2017/34C3 - Uncertain Concern - La traduccion espanola.mp4 143.9 MB
28C3 - 2011/video/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.mp4 143.4 MB
34C3 - 2017/34C3 - Lightning Talks Day 2 - deutsche Ubersetzung.mp4 143.2 MB
31C3 - 2014/video/31c3-6499-en-Glitching_For_n00bs_hd.mp4 143.0 MB
31C3 - 2014/video/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_hd.mp4 142.9 MB
34C3 - 2017/34C3 - Lightning Talks Day 2 - traduction francaise.mp4 142.8 MB
29C3 - 2012/video/29c3-5239-en-smart_meter_h264.mp4 142.7 MB
29C3 - 2012/video/29c3-5237-en-a_rambling_walk_through_an_emv_transaction_h264.mp4 142.6 MB
26C3 - 2009/video/26c3-3688-de-haste_man_netblock.mp4 142.6 MB
31C3 - 2014/video/31c3-6559-de-en-Jugend_hackt_sd.mp4 142.5 MB
34C3 - 2017/34C3 - Free Electron Lasers.mp4 141.7 MB
29C3 - 2012/video/29c3-5393-en-milking_the_digital_cash_cow_h264.mp4 141.5 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Bisq - A decentralized bitcoin exchange.mp4 141.3 MB
25C3 - 2008/video/25c3-2896-en-chip_reverse_engineering.mp4 141.2 MB
32C3 - 2015/video/32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_hd.mp4 141.2 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - SecureDrop.mp4 141.2 MB
31C3 - 2014/video/31c3-6275-en-de-Living_Drones_hd.mp4 141.2 MB
25C3 - 2008/video/25c3-3007-en-running_your_own_gsm_network.mp4 141.0 MB
32C3 - 2015/video/32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_hd.mp4 140.9 MB
34C3 - 2017/34C3 - cryptocurrencies, smart contracts, etc. revolutionary tech - deutsche Ubersetzung.mp4 140.9 MB
31C3 - 2014/video/31c3-6084-en-Uncaging_Microchips_hd.mp4 140.8 MB
25C3 - 2008/video/25c3-3004-en-why_technology_sucks.mp4 140.8 MB
32C3 - 2015/video/32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_hd.mp4 140.7 MB
25C3 - 2008/video/25c3-2892-en-about_cyborgs_and_gargoyles_.mp4 140.7 MB
31C3 - 2014/video/31c3-5930-en-de-Funky_File_Formats_hd.mp4 140.6 MB
25C3 - 2008/video/25c3-2988-en-just_estonia_and_georgia.mp4 140.2 MB
30C3 - 2013/video/30c3-5298-en-de-Rock_em_Graphic_Cards_h264-hq.mp4 140.2 MB
25C3 - 2008/video/25c3-2845-en-rf_fingerprinting_of_rfid.mp4 140.1 MB
34C3 - 2017/34C3 - cryptocurrencies, smart contracts, etc. revolutionary tech.mp4 140.0 MB
34C3 - 2017/34C3 - Treibhausgasemissionen einschätzen - english translation.mp4 140.0 MB
31C3 - 2014/video/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_hd.mp4 139.9 MB
33C3 - 2016/Console Hacking 2016 (33c3) - deutsche Ubersetzung.mp4 139.9 MB
33C3 - 2016/The Transhumanist Paradox (33c3) - deutsche Ubersetzung.mp4 139.9 MB
33C3 - 2016/Console Hacking 2016 (33c3) - traduction française.mp4 139.8 MB
31C3 - 2014/video/31c3-6385-en-de-The_Machine_To_Be_Another_hd.mp4 139.6 MB
28C3 - 2011/video/28c3-4746-en-bitcoin_an_analysis_h264.mp4 139.5 MB
32C3 - 2015/video/32c3-7483-en-de-Computational_Meta-Psychology_hd.mp4 138.9 MB
32C3 - 2015/video/32c3-7438-en-de-goto_fail_hd.mp4 138.8 MB
33C3 - 2016/EinfUhrung zu Blockchains (33c3) - traduction française.mp4 138.5 MB
30C3 - 2013/video/30c3-5532-de-en-Die_Drohnenkriege_h264-hq.mp4 138.4 MB
33C3 - 2016/Talking Behind Your Back (33c3).mp4 138.4 MB
30C3 - 2013/video/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hd.mp4 138.3 MB
25C3 - 2008/video/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4 138.3 MB
28C3 - 2011/video/28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.mp4 138.3 MB
20C3 - 2003/video/20C3-611-Hacker_Jeopardy.mp4 138.2 MB
23C3 - 2006/video/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp4 138.2 MB
32C3 - 2015/video/32c3-7291-de-en-Microsofts_Windows_10_Botnet_hd.mp4 137.8 MB
33C3 - 2016/A world without blockchain (33c3) - deutsche Ubersetzung.mp4 137.8 MB
23C3 - 2006/video/23C3-1760-en-on_free.mp4 137.8 MB
29C3 - 2012/video/29c3-5180-de-en-marvin_und_der_blues_h264.mp4 137.6 MB
33C3 - 2016/EinfUhrung zu Blockchains (33c3) - english translation.mp4 137.5 MB
33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3) - traduction française.mp4 137.4 MB
34C3 - 2017/34C3 - Lightning Talks Day 2.mp4 137.4 MB
34C3 - 2017/34C3 - Policing in the age of data exploitation - deutsche Ubersetzung - YouTube.mp4 137.2 MB
33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3) - deutsche Ubersetzung.mp4 137.0 MB
33C3 - 2016/Making Technology Inclusive Through Papercraft and Sound (33c3) - deutsche Ubersetzung.mp4 136.6 MB
21C3 - 2004/video/141 Pirate Radio.mp4 136.5 MB
29C3 - 2012/video/29c3-5152-en-hashflooding_dos_reloaded_h264.mp4 136.2 MB
33C3 - 2016/Making Technology Inclusive Through Papercraft and Sound (33c3).mp4 136.0 MB
34C3 - 2017/34C3 - Uncertain Concern.mp4 136.0 MB
31C3 - 2014/video/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_hd.mp4 136.0 MB
33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3) - traduction française.mp4 135.9 MB
33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3) - deutsche Ubersetzung.mp4 135.9 MB
34C3 - 2017/34C3 - Der PC-Wahl-Hack.mp4 135.7 MB
33C3 - 2016/The Fight for Encryption in 2016 (33c3) - deutsche Ubersetzung.mp4 135.5 MB
32C3 - 2015/video/32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_hd.mp4 135.5 MB
23C3 - 2006/video/23C3-1596-en-openxpki.mp4 135.3 MB
32C3 - 2015/video/32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_hd.mp4 135.2 MB
29C3 - 2012/video/29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_h264.mp4 134.6 MB
34C3 - 2017/34C3 - Treibhausgasemissionen einschätzen.mp4 134.2 MB
29C3 - 2012/video/29c3-5219-en-how_i_met_your_pointer_h264.mp4 134.2 MB
32C3 - 2015/video/32c3-7340-en-de-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone_hd.mp4 134.0 MB
30C3 - 2013/video/30c3-5210-de-en-Bullshit_made_in_Germany_h264-hq.mp4 133.8 MB
34C3 - 2017/34C3 - Protecting Your Privacy at the Border.mp4 133.8 MB
33C3 - 2016/Beyond Virtual and Augmented Reality (33c3) - La traducción española.mp4 133.7 MB
33C3 - 2016/Million Dollar Dissidents and the Rest of Us (33c3).mp4 133.5 MB
33C3 - 2016/Beyond Virtual and Augmented Reality (33c3) - deutsche Ubersetzung.mp4 133.5 MB
33C3 - 2016/The Moon and European Space Exploration (33c3).mp4 133.4 MB
33C3 - 2016/The Moon and European Space Exploration (33c3) - traduction française.mp4 133.4 MB
33C3 - 2016/The Moon and European Space Exploration (33c3) - deutsche Ubersetzung.mp4 133.4 MB
33C3 - 2016/Machine Dreams (33c3) - traduction française.mp4 133.3 MB
23C3 - 2006/audio/23C3-1517-en-lightning_talks_day_4.mp3 133.3 MB
27C3 - 2010/video/27c3-4087-en-console_hacking_2010.mp4 133.0 MB
33C3 - 2016/Beyond Virtual and Augmented Reality (33c3).mp4 132.7 MB
33C3 - 2016/Check Your Police Record! (33c3) - english translation.mp4 132.7 MB
34C3 - 2017/34C3 - institutions for Resolution Disputes.mp4 132.6 MB
34C3 - 2017/34C3 - institutions for Resolution Disputes - deutsche Ubersetzung.mp4 132.6 MB
32C3 - 2015/video/32c3-7490-en-de-The_Great_Train_Cyber_Robbery_hd.mp4 132.6 MB
28C3 - 2011/video/28c3-4759-en-open_source_music_tracking_2_0_h264.mp4 132.5 MB
32C3 - 2015/video/32c3-7294-en-de-Sanitizing_PCAPs_hd.mp4 132.4 MB
33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3) - deutsche Ubersetzung.mp4 131.8 MB
23C3 - 2006/video/23C3-1616-de-nerds_und_geeks.mp4 131.8 MB
33C3 - 2016/Routerzwang und Funkabschottung (33c3) - english translation.mp4 131.8 MB
32C3 - 2015/video/32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_hd.mp4 131.6 MB
23C3 - 2006/video/23C3-1256-en-who_can_you_trust.mp4 131.6 MB
28C3 - 2011/video/28c3-4676-en-apple_vs_google_client_platforms_h264.mp4 131.4 MB
28C3 - 2011/video/28c3-4740-de-frag_den_staat_h264.mp4 131.3 MB
30C3 - 2013/video/30c3-5601-en-de-EUDataP_State_of_the_Union_h264-hq.mp4 131.2 MB
33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3) - traduction française.mp4 131.2 MB
29C3 - 2012/video/29c3-5275-en-facthacks_h264.mp4 130.7 MB
33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3) - deutsche Ubersetzung.mp4 130.5 MB
33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3) - traduction française.mp4 130.4 MB
23C3 - 2006/video/23C3-1433-en-design_a_decent_user_interface.mp4 130.3 MB
28C3 - 2011/video/28c3-4817-en-string_oriented_programming_h264.mp4 130.3 MB
31C3 - 2014/video/31c3-6463-en-Damn_Vulnerable_Chemical_Process_hd.mp4 130.1 MB
34C3 - 2017/34C3 - Decoding Contactless (Card) Payments - deutsche Ubersetzung.mp4 130.1 MB
23C3 - 2006/audio/23C3-1736-en-project_sputnik.mp3 130.0 MB
33C3 - 2016/What We Can Learn about Creativity from 3D Printing (33c3).mp4 129.8 MB
28C3 - 2011/video/28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4 129.7 MB
27C3 - 2010/video/27c3-4181-en-sip_home_gateways_under_fire.mp4 129.7 MB
29C3 - 2012/video/29c3-5221-de-en-cyberwar_statt_cyberwar_h264.mp4 129.6 MB
34C3 - 2017/34C3 - Die göttliche Informatik The divine Computer Science - La traduccion espanola.mp4 129.5 MB
34C3 - 2017/34C3 - The divine Computer Science - english translation.mp4 129.4 MB
33C3 - 2016/Understanding the Snooper’s Charter (33c3) - deutsche Ubersetzung.mp4 129.1 MB
32C3 - 2015/video/32c3-7171-en-de-When_hardware_must_just_work_hd.mp4 129.0 MB
34C3 - 2017/34C3 - Dude, you broke the Future! - traduction francaise.mp4 129.0 MB
30C3 - 2013/video/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4 129.0 MB
29C3 - 2012/video/29c3-5159-en-defend_freedoms_online_h264.mp4 128.9 MB
34C3 - 2017/34C3 - 34C3 Infrastructure Review - traduction francaise.mp4 128.9 MB
23C3 - 2006/video/23C3-1452-de-critical_theory_and_chaos.mp4 128.8 MB
32C3 - 2015/video/32c3-7387-en-de-Net_Neutrality_in_Europe_hd.mp4 128.8 MB
23C3 - 2006/video/23C3-1724-en-transparency_and_privacy.mp4 128.6 MB
34C3 - 2017/34C3 - Are all BSDs created equally - deutsche Ubersetzung.mp4 128.4 MB
33C3 - 2016/Formal Verification of Verilog HDL with Yosys-SMTBMC (33c3) - deutsche Ubersetzung.mp4 127.9 MB
29C3 - 2012/video/29c3-5195-en-executable_metadata_h264.mp4 127.9 MB
30C3 - 2013/video/30c3-5433-de-en-Recht_auf_Remix_h264-hq.mp4 127.8 MB
34C3 - 2017/34C3 - Policing in the age of data exploitation.mp4 127.8 MB
32C3 - 2015/video/32c3-7153-en-de-rad1o_hd.mp4 127.7 MB
33C3 - 2016/Formal Verification of Verilog HDL with Yosys-SMTBMC (33c3).mp4 127.5 MB
31C3 - 2014/video/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_hd.mp4 127.4 MB
32C3 - 2015/video/32c3-7517-en-de-the_possibility_of_an_army_hd.mp4 127.3 MB
34C3 - 2017/34C3 - Ein Festival der Demokratie - english translation.mp4 127.2 MB
32C3 - 2015/video/32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_hd.mp4 127.1 MB
28C3 - 2011/video/28c3-4723-en-dc_plus_the_protocol_h264.mp4 126.9 MB
31C3 - 2014/video/31c3-6361-en-From_Maxwell_to_antenna_arrays_hd.mp4 126.7 MB
31C3 - 2014/video/31c3-6417-en-3D_Casting_Aluminum_hd.mp4 126.7 MB
23C3 - 2006/video/23C3-1608-en-vehicular_communication_and_vanets.mp4 126.5 MB
20C3 - 2003/video/20C3-609-Security_Nightmares_III.mp4 126.4 MB
33C3 - 2016/A world without blockchain (33c3).mp4 126.3 MB
28C3 - 2011/video/28c3-4927-en-noc_review_28c3_camp_h264.mp4 126.3 MB
32C3 - 2015/video/32c3-7210-en-de-PQCHacks_hd.mp4 126.0 MB
32C3 - 2015/video/32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_hd.mp4 125.7 MB
34C3 - 2017/34C3 - Forensic Architecture - La traduccion espanola.mp4 125.7 MB
31C3 - 2014/video/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_hd.mp4 125.6 MB
34C3 - 2017/34C3 - A hacker's guide to Climate Change - What do we know and how do we know it.mp4 125.5 MB
28C3 - 2011/video/28c3-4826-en-a_brief_history_of_plutocracy_h264.mp4 125.2 MB
34C3 - 2017/34C3 - A hacker's guide to Climate Change - What do we know and how do we know it - deutsche Ubers.mp4 125.0 MB
20C3 - 2003/video/20C3-542-Trusted_or_Treacherous.mp4 124.9 MB
31C3 - 2014/video/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_hd.mp4 124.7 MB
29C3 - 2012/video/29c3-5146-en-an_overview_of_secure_name_resolution_h264.mp4 124.3 MB
23C3 - 2006/video/23C3-1381-en-stealth_malware.mp4 124.3 MB
31C3 - 2014/video/31c3-6162-en-Programming_with_dependent_types_in_Idris_hd.mp4 124.2 MB
29C3 - 2012/video/29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_h264.mp4 124.2 MB
23C3 - 2006/video/23C3-1721-en-software_protection_and_the_tpm.mp4 124.2 MB
34C3 - 2017/34C3 - Are all BSDs created equally.mp4 124.0 MB
28C3 - 2011/video/28c3-4869-de-tresor_h264.mp4 123.6 MB
32C3 - 2015/video/32c3-7165-en-de-Vehicle2Vehicle_Communication_based_on_IEEE_80211p_hd.mp4 123.5 MB
31C3 - 2014/video/31c3-6530-en-In_Security_of_Mobile_Banking_hd.mp4 123.5 MB
21C3 - 2004/video/027 Biometrie in Ausweisdokumenten.mp4 123.4 MB
30C3 - 2013/video/30c3-5337-de-en-Kryptographie_nach_Snowden_h264-hq.mp4 123.4 MB
25C3 - 2008/video/25c3-2890-en-scalable_swarm_robotics.mp4 123.4 MB
29C3 - 2012/video/29c3-5225-en-security_evaluation_of_russian_gost_cipher_h264.mp4 123.2 MB
29C3 - 2012/video/29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_h264.mp4 123.1 MB
34C3 - 2017/34C3 - How to drift with any car - La traduccion espanola.mp4 123.1 MB
32C3 - 2015/video/32c3-7343-en-de-Beyond_Anti_Evil_Maid_hd.mp4 123.0 MB
34C3 - 2017/34C3 - The making of a chip - deutsche Ubersetzung.mp4 122.9 MB
33C3 - 2016/Reverse engineering Outernet (33c3) - deutsche Ubersetzung.mp4 122.9 MB
34C3 - 2017/34C3 - How to drift with any car - deutsche Ubersetzung.mp4 122.8 MB
29C3 - 2012/video/29c3-5417-en-cve_2011_3402_analysis_h264.mp4 122.7 MB
34C3 - 2017/34C3 - Electroedibles - deutsche Ubersetzung.mp4 122.7 MB
33C3 - 2016/Hacking collective as a laboratory (33c3) - deutsche Ubersetzung.mp4 122.6 MB
20C3 - 2003/video/20C3-589-AN.ON_and_the_future_of_anonymizers.mp4 122.4 MB
34C3 - 2017/34C3 - Ein Festival der Demokratie.mp4 122.3 MB
34C3 - 2017/34C3 - Electroedibles.mp4 122.3 MB
24C3 - 2007/video/24c3-2352-de-hacker_jeopardy_high.mp4 122.2 MB
34C3 - 2017/34C3 - Electromagnetic Threats for Information Security - deutsche Ubersetzung.mp4 121.9 MB
21C3 - 2004/video/063 Edit This Page.mp4 121.6 MB
34C3 - 2017/34C3 - Relativitätstheorie fUr blutige Anfänger - english translation.mp4 121.6 MB
34C3 - 2017/34C3 - 34C3 Infrastructure Review - deutsche Ubersetzung.mp4 121.5 MB
34C3 - 2017/34C3 - 34C3 Infrastructure Review.mp4 121.5 MB
32C3 - 2015/video/32c3-7324-en-de-What_is_the_value_of_anonymous_communication_hd.mp4 121.4 MB
32C3 - 2015/video/32c3-7243-en-de-Gibberish_Detection_102_hd.mp4 121.4 MB
34C3 - 2017/34C3 - Decoding Contactless (Card) Payments.mp4 121.3 MB
34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask - deutsch.mp4 121.3 MB
34C3 - 2017/34C3 - Electromagnetic Threats for Information Security.mp4 121.2 MB
33C3 - 2016/Reverse engineering Outernet (33c3).mp4 121.2 MB
33C3 - 2016/Hacking collective as a laboratory (33c3).mp4 121.2 MB
34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask - traduct.mp4 121.0 MB
30C3 - 2013/video/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4 120.9 MB
30C3 - 2013/video/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4 120.6 MB
21C3 - 2004/video/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.mp4 120.5 MB
34C3 - 2017/34C3 - Dude, you broke the Future!.mp4 120.4 MB
34C3 - 2017/34C3 - Microarchitectural Attacks on Trusted Execution Environments.mp4 120.3 MB
34C3 - 2017/34C3 - Dude, you broke the Future! - deutsche Ubersetzung.mp4 120.2 MB
34C3 - 2017/34C3 - Microarchitectural Attacks on Trusted Execution Environments - deutsche Ubersetzung.mp4 120.2 MB
31C3 - 2014/video/31c3-6595-en-de-Hard_Drive_Punch_hd.mp4 120.1 MB
32C3 - 2015/video/32c3-7356-en-de-Top_X_usability_obstacles_hd.mp4 119.9 MB
33C3 - 2016/Wheel of Fortune (33c3) - deutsche Ubersetzung.mp4 119.7 MB
32C3 - 2015/video/32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_hd.mp4 119.7 MB
32C3 - 2015/video/32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_hd.mp4 119.5 MB
30C3 - 2013/video/30c3-5214-en-The_Gospel_of_IRMA__h264-hd.mp4 119.3 MB
29C3 - 2012/video/29c3-5265-en-page_fault_liberation_army_h264.mp4 119.2 MB
25C3 - 2008/video/25c3-3002-en-squeezing_attack_traces.mp4 119.2 MB
32C3 - 2015/video/32c3-7143-en-de-The_state_of_Internet_Censorship_hd.mp4 119.1 MB
31C3 - 2014/video/31c3-6234-en-The_eXperimental_Robot_Project_hd.mp4 119.0 MB
34C3 - 2017/34C3 - The divine Computer Science.mp4 119.0 MB
33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3).mp4 118.9 MB
19C3 - 2002/video/19C3-366-tcpa.mp4 118.8 MB
33C3 - 2016/Keys of Fury (33c3) - deutsche Ubersetzung.mp4 118.4 MB
34C3 - 2017/34C3 - Security Nightmares 0x12.mp4 118.4 MB
33C3 - 2016/Keys of Fury (33c3).mp4 118.4 MB
33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3) - traduction française.mp4 118.3 MB
31C3 - 2014/video/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_hd.mp4 118.2 MB
31C3 - 2014/video/31c3-6406-en-Long_war_tactics_hd.mp4 118.2 MB
23C3 - 2006/video/23C3-1514-en-lightning_talks_day_1.mp4 118.1 MB
34C3 - 2017/34C3 - Security Nightmares 0x12 - english translation.mp4 118.0 MB
21C3 - 2004/video/134 Secure Instant Messaging.mp4 117.6 MB
33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3) - deutsche Ubersetzung.mp4 117.6 MB
34C3 - 2017/34C3 - Forensic Architecture.mp4 117.6 MB
23C3 - 2006/video/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp4 117.6 MB
25C3 - 2008/video/25c3-2839-en-cracking_the_msp430_bsl.mp4 117.4 MB
32C3 - 2015/video/32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_hd.mp4 117.2 MB
34C3 - 2017/34C3 - Forensic Architecture - deutsche Ubersetzung.mp4 117.0 MB
29C3 - 2012/video/29c3-5059-en-scada_strangelove_h264.mp4 116.9 MB
23C3 - 2006/video/23C3-1605-de-digitale_bildforensik.mp4 116.9 MB
33C3 - 2016/Security Nightmares 0x11 (33c3).mp4 116.8 MB
29C3 - 2012/video/29c3-5385-en-not_my_department_h264.mp4 116.7 MB
33C3 - 2016/radare demystified (33c3).mp4 116.5 MB
30C3 - 2013/video/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4 116.4 MB
25C3 - 2008/video/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4 116.3 MB
33C3 - 2016/Shining some light on the Amazon Dash button (33c3) - deutsche Ubersetzung.mp4 116.1 MB
30C3 - 2013/video/30c3-5609-en-Infrastructure_Review_h264-hq.mp4 116.0 MB
34C3 - 2017/34C3 - Relativitätstheorie fUr blutige Anfänger.mp4 115.9 MB
34C3 - 2017/34C3 - How to drift with any car.mp4 115.6 MB
32C3 - 2015/video/32c3-7240-en-de-Console_Hacking_hd.mp4 115.5 MB
30C3 - 2013/video/30c3-5713-en-de-To_Protect_And_Infect_Part_2_h264-hq.mp4 115.5 MB
33C3 - 2016/The Ultimate Game Boy Talk (33c3).mp4 115.4 MB
32C3 - 2015/video/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_hd.mp4 115.3 MB
34C3 - 2017/34C3 - Everything you want to know about x86 microcode, but might have been afraid to ask.mp4 115.2 MB
29C3 - 2012/video/29c3-5208-en-accessibility_and_security_h264.mp4 114.8 MB
34C3 - 2017/34C3 - The making of a chip.mp4 114.8 MB
29C3 - 2012/video/29c3-5181-de-die_wahrheit_was_wirklich_passierte_h264.mp4 114.7 MB
28C3 - 2011/video/28c3-4760-en-chokepointproject_h264.mp4 114.6 MB
32C3 - 2015/video/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_hd.mp4 114.5 MB
33C3 - 2016/Where in the World Is Carmen Sandiego (33c3) - deutsche Ubersetzung.mp4 114.4 MB
33C3 - 2016/Security Nightmares 0x11 (33c3) - english translation.mp4 114.3 MB
33C3 - 2016/Shining some light on the Amazon Dash button (33c3) - traduction française.mp4 114.3 MB
32C3 - 2015/video/32c3-7305-en-de-Quantum_Cryptography_hd.mp4 114.1 MB
33C3 - 2016/Where in the World Is Carmen Sandiego (33c3).mp4 114.1 MB
27C3 - 2010/video/27c3-4006-en-diy_synthesizers_and_sound_generators.mp4 114.0 MB
29C3 - 2012/video/29c3-5085-en-everycook_h264.mp4 113.9 MB
33C3 - 2016/Wheel of Fortune (33c3).mp4 113.8 MB
30C3 - 2013/video/30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4 113.7 MB
34C3 - 2017/34C3 - Console Security - Switch - deutsche Ubersetzung.mp4 113.7 MB
23C3 - 2006/video/23C3-1688-en-rootkits_as_reversing_tools.mp4 113.5 MB
23C3 - 2006/video/23C3-1457-en-credit_card_security.mp4 113.5 MB
22C3 - 2005/video/22C3-559-en-xbox_hacking.mp4 113.5 MB
23C3 - 2006/video/23C3-1520-en-counter_development.mp4 113.5 MB
29C3 - 2012/video/29c3-5400-en-hacking_cisco_phones_h264.mp4 113.2 MB
25C3 - 2008/video/25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4 113.2 MB
34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography - traduction francaise.mp4 113.2 MB
33C3 - 2016/Rebel Cities (33c3) - traduction française.mp4 113.0 MB
34C3 - 2017/34C3 - Type confusion discovery, abuse, and protection - deutsche Ubersetzung.mp4 113.0 MB
34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography - deutsche Ubersetzung.mp4 112.9 MB
23C3 - 2006/video/23C3-1733-en-bluetooth_hacking_revisited.mp4 112.8 MB
23C3 - 2006/video/23C3-1663-de-tracking_goods_and_tracing_people.mp4 112.8 MB
33C3 - 2016/Rebel Cities (33c3) - deutsche Ubersetzung.mp4 112.7 MB
34C3 - 2017/34C3 - Console Security - Switch.mp4 112.6 MB
33C3 - 2016/The woman behind your WiFi (33c3) - traduction française.mp4 112.6 MB
33C3 - 2016/Rebel Cities (33c3).mp4 112.5 MB
31C3 - 2014/video/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_sd.mp4 112.3 MB
30C3 - 2013/video/30c3-5611-en-Hello_World__h264-hq.mp4 112.3 MB
34C3 - 2017/34C3 - All Computers Are Beschlagnahmt - english translation.mp4 111.9 MB
33C3 - 2016/The woman behind your WiFi (33c3) - deutsche Ubersetzung.mp4 111.9 MB
34C3 - 2017/34C3 - Fuck Dutch mass-surveillance let's have a referendum! - deutsche Ubersetzung.mp4 111.8 MB
29C3 - 2012/video/29c3-5301-en-defeating_windows_memory_forensics_h264.mp4 111.8 MB
25C3 - 2008/video/25c3-2992-en-tricks_makes_you_smile.mp4 111.7 MB
23C3 - 2006/video/23C3-1454-en-natural_language_database_interface.mp4 111.7 MB
23C3 - 2006/video/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp4 111.7 MB
34C3 - 2017/34C3 - All Computers Are Beschlagnahmt.mp4 111.5 MB
33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - traduction f.mp4 111.5 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Einführung in den OpenStreetMap Online-Editor iD.mp4 111.5 MB
33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - english tran.mp4 111.3 MB
32C3 - 2015/video/32c3-7284-en-de-Check_your_privileges_hd.mp4 111.2 MB
31C3 - 2014/video/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4 111.1 MB
33C3 - 2016/The woman behind your WiFi (33c3).mp4 111.0 MB
34C3 - 2017/34C3 - Zamir Transnational Network und Zagreb Dairy.mp4 110.9 MB
30C3 - 2013/video/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4 110.8 MB
28C3 - 2011/video/28c3-4712-en-mining_your_geotags_h264.mp4 110.8 MB
34C3 - 2017/34C3 - Zamir Transnational Network und Zagreb Dairy - english translation.mp4 110.8 MB
23C3 - 2006/video/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp4 110.7 MB
23C3 - 2006/video/23C3-1708-en-tv_b_gone.mp4 110.7 MB
34C3 - 2017/34C3 - Ladeinfrastruktur fUr Elektroautos Ausbau statt Sicherheit - english translation.mp4 110.6 MB
34C3 - 2017/34C3 - Ladeinfrastruktur fUr Elektroautos Ausbau statt Sicherheit.mp4 110.6 MB
23C3 - 2006/video/23C3-1516-en-lightning_talks_day_3.mp4 110.3 MB
23C3 - 2006/video/23C3-1423-en-we_dont_trust_voting_computers.mp4 110.2 MB
19C3 - 2002/video/19C3-382-quantenkryptographie.mp4 110.2 MB
34C3 - 2017/34C3 - Inside Intel Management Engine.mp4 110.1 MB
29C3 - 2012/video/29c3-5398-en-closing_event2012_h264.mp4 109.7 MB
31C3 - 2014/video/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_hd.mp4 109.6 MB
30C3 - 2013/video/30c3-5610-de-Seidenstrasse_h264-hq.mp4 109.6 MB
34C3 - 2017/34C3 - Inside Intel Management Engine - deutsche Ubersetzung.mp4 109.5 MB
20C3 - 2003/video/20C3-568-Data_mining_and_intelligence_software.mp4 109.5 MB
31C3 - 2014/video/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_sd.mp4 109.4 MB
29C3 - 2012/video/29c3-5095-en-privacy_and_the_car_of_the_future_h264.mp4 108.8 MB
23C3 - 2006/video/23C3-1502-en-the_gift_of_sharing.mp4 108.7 MB
32C3 - 2015/video/32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_hd.mp4 108.5 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Privacy-Oriented Distributed Networking for an Ethical Internet - including 50 sub.mp4 108.4 MB
22C3 - 2005/video/22C3-789-en-hacker_jeopardy.mp4 108.3 MB
33C3 - 2016/Space making space shaping (33c3).mp4 108.3 MB
34C3 - 2017/34C3 - Type confusion discovery, abuse, and protection.mp4 108.2 MB
33C3 - 2016/Space making space shaping (33c3) - english translation.mp4 108.2 MB
23C3 - 2006/video/23C3-1622-en-void_the_warranty.mp4 107.9 MB
34C3 - 2017/34C3 - Defeating (Not)Petya's Cryptography.mp4 107.9 MB
23C3 - 2006/video/23C3-1679-de-ueberwachungsdruck.mp4 107.8 MB
23C3 - 2006/video/23C3-1487-de-ccc_jahresrueckblick.mp4 107.7 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Worldviews Hacking Abstractions.mp4 107.7 MB
33C3 - 2016/Es sind die kleinen Dinge im Leben (33c3).mp4 107.7 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - On Scripting.mp4 107.7 MB
33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3) - deutsche Ubers.mp4 107.6 MB
20C3 - 2003/video/20C3-653-Device_hacking_with_JTAG.mp4 107.6 MB
33C3 - 2016/Bootstraping a slightly more secure laptop (33c3).mp4 107.4 MB
30C3 - 2013/video/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4 107.2 MB
30C3 - 2013/video/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4 107.2 MB
19C3 - 2002/video/19C3-399-xbox-linux.mp4 107.1 MB
34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience - deutsche Ubersetzung.mp4 107.1 MB
34C3 - 2017/34C3 - Abschluss - traduction francaise.mp4 106.9 MB
31C3 - 2014/video/31c3-6170-en-net_neutrality_days_of_future_past_hd.mp4 106.9 MB
22C3 - 2005/video/22C3-537-en-fuzzing.mp4 106.9 MB
23C3 - 2006/video/23C3-1758-en-fuzzing_corporate_world.mp4 106.9 MB
34C3 - 2017/34C3 - Fuck Dutch mass-surveillance let's have a referendum!.mp4 106.9 MB
32C3 - 2015/video/32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_hd.mp4 106.8 MB
33C3 - 2016/Bootstraping a slightly more secure laptop (33c3) - traduction française.mp4 106.6 MB
22C3 - 2005/video/22C3-790-de-nerds_kochen.mp4 106.6 MB
33C3 - 2016/Bootstraping a slightly more secure laptop (33c3) - deutsche Ubersetzung.mp4 106.4 MB
34C3 - 2017/34C3 - Inside Android’s SafetyNet Attestation Attack and Defense - deutsche Ubersetzung.mp4 106.1 MB
23C3 - 2006/video/23C3-1738-en-mmorpgs.mp4 106.0 MB
34C3 - 2017/34C3 - Inside Android’s SafetyNet Attestation Attack and Defense.mp4 105.8 MB
32C3 - 2015/video/32c3-7449-en-de-Prediction_and_Control_hd.mp4 105.8 MB
19C3 - 2002/video/19C3-443-how-to-find-anything-on-the-web.mp4 105.5 MB
23C3 - 2006/video/23C3-1257-en-podjournalism.mp4 105.5 MB
25C3 - 2008/video/25c3-2681-en-repurposing_the_ti_ez430u.mp4 105.4 MB
23C3 - 2006/video/23C3-1456-en-unusual_bugs.mp4 104.9 MB
23C3 - 2006/video/23C3-1685-de-go_menschen.mp4 104.9 MB
32C3 - 2015/video/32c3-7342-en-Household_Totalitarianism_and_Cyberspace_hd.mp4 104.8 MB
34C3 - 2017/34C3 - Tightening the Net in Iran - deutsche Ubersetzung.mp4 104.7 MB
34C3 - 2017/34C3 - Implementing an LLVM based Dynamic Binary Instrumentation framework - deutsche Ubersetzung.mp4 104.7 MB
34C3 - 2017/34C3 - Making Experts Makers and Makers Experts - deutsche Ubersetzung.mp4 104.5 MB
34C3 - 2017/34C3 - Making Experts Makers and Makers Experts.mp4 104.5 MB
34C3 - 2017/34C3 - Implementing an LLVM based Dynamic Binary Instrumentation framework.mp4 104.4 MB
30C3 - 2013/video/30c3-5426-de-en-Das_FlipDot-Projekt_h264-hq.mp4 104.4 MB
34C3 - 2017/34C3 - Making Experts Makers and Makers Experts - La traduccion espanola.mp4 104.3 MB
34C3 - 2017/34C3 - SCADA - Gateway to (s)hell.mp4 104.2 MB
29C3 - 2012/video/29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_h264.mp4 104.2 MB
31C3 - 2014/video/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_hd.mp4 104.2 MB
34C3 - 2017/34C3 - Financial surveillance - deutsche Ubersetzung.mp4 103.9 MB
34C3 - 2017/34C3 - Financial surveillance - traduction francaise.mp4 103.8 MB
30C3 - 2013/video/30c3-5554-en-Magic_Lantern_h264-hq.mp4 103.7 MB
34C3 - 2017/34C3 - SCADA - Gateway to (s)hell - deutsche Ubersetzung.mp4 103.7 MB
34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons - d.mp4 103.7 MB
34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons.mp4 103.5 MB
34C3 - 2017/34C3 - Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons - t.mp4 103.4 MB
31C3 - 2014/video/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_hd.mp4 103.4 MB
32C3 - 2015/video/32c3-7543-de-The_mummy_unwrapped_hd.mp4 103.2 MB
32C3 - 2015/audio/32c3-7558-en-Lightning_Talks_Day_2.opus 103.1 MB
32C3 - 2015/audio/32c3-7559-en-Lightning_Talks_Day_3.opus 103.0 MB
23C3 - 2006/audio/23C3-1567-en-hacker_jeopardy.mp3 103.0 MB
33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3).mp4 103.0 MB
28C3 - 2011/video/28c3-4656-en-ooops_i_hacked_my_pbx_h264.mp4 102.9 MB
28C3 - 2011/video/28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4 102.9 MB
33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3) - deutsche Ubersetzung.mp4 102.8 MB
30C3 - 2013/video/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4 102.6 MB
29C3 - 2012/video/29c3-5140-en-safecast_h264.mp4 102.4 MB
34C3 - 2017/34C3 - Abschluss - english translation.mp4 102.4 MB
34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience.mp4 102.3 MB
34C3 - 2017/34C3 - Abschluss.mp4 102.3 MB
32C3 - 2015/audio/32c3-7560-en-Lightning_Talks_Day_4.opus 102.3 MB
34C3 - 2017/34C3 - Mobile Data Interception from the Interconnection Link - deutsche Ubersetzung.mp4 102.1 MB
29C3 - 2012/video/29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_h264.mp4 102.1 MB
33C3 - 2016/Netzpolitik in Österreich (33c3).mp4 102.0 MB
34C3 - 2017/34C3 - The Internet in Cuba A Story of Community Resilience - La traduccion espanola.mp4 102.0 MB
23C3 - 2006/video/23C3-1604-de-tracking_von_personen_in_videoszenen.mp4 101.9 MB
30C3 - 2013/video/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4 101.9 MB
33C3 - 2016/Make Wi-Fi fast again (33c3).mp4 101.8 MB
30C3 - 2013/video/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4 101.7 MB
21C3 - 2004/video/163 SPAM Workshop.mp4 101.6 MB
32C3 - 2015/video/32c3-7189-en-Key-logger_Video_Mouse_hd.mp4 101.5 MB
34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma - traduction francaise.mp4 101.4 MB
34C3 - 2017/34C3 - Deep Learning Blindspots - La traduccion espanola.mp4 101.2 MB
21C3 - 2004/video/074 Hacker-Jeopardy.mp4 101.0 MB
34C3 - 2017/34C3 - LatticeHacks - deutsche Ubersetzung.mp4 100.9 MB
23C3 - 2006/video/23C3-1619-en-introduction_to_matrix_programming.mp4 100.9 MB
30C3 - 2013/audio/30c3-5577-de-en-Hacker_Jeopardy_opus.opus 100.8 MB
31C3 - 2014/audio/31c3-6583-de-en-Jahresrueckblick_des_CCC_opus.opus 100.8 MB
34C3 - 2017/34C3 - LatticeHacks.mp4 100.7 MB
34C3 - 2017/34C3 - Uncovering vulnerabilities in Hoermann BiSecur - deutsche Ubersetzung.mp4 100.6 MB
24C3 - 2007/video/24c3-2336-de-security_nightmares_high.mp4 100.5 MB
34C3 - 2017/34C3 - Uncovering vulnerabilities in Hoermann BiSecur.mp4 100.4 MB
34C3 - 2017/34C3 - Ensuring Climate Data Remains Public.mp4 100.3 MB
32C3 - 2015/video/32c3-7432-en-de-Datahavens_from_HavenCo_to_Today_hd.mp4 100.3 MB
34C3 - 2017/34C3 - Ensuring Climate Data Remains Public - deutsche Ubersetzung.mp4 100.2 MB
30C3 - 2013/video/30c3-5305-en-Breaking_Baryons_h264-hq.mp4 100.1 MB
34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions - traduction francaise.mp4 100.0 MB
32C3 - 2015/video/32c3-7355-en-de-apertus_AXIOM_hd.mp4 99.7 MB
23C3 - 2006/video/23C3-1713-en-black_ops_2006.mp4 99.6 MB
23C3 - 2006/video/23C3-1554-de-ethernet_mit_mikrocontrollern.mp4 99.6 MB
32C3 - 2015/video/32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung_hd.mp4 99.5 MB
28C3 - 2011/video/28c3-4828-de-antiforensik_h264.mp4 99.4 MB
34C3 - 2017/34C3 - WTFrance - deutsche Ubersetzung.mp4 99.3 MB
33C3 - 2016/Haft fUr Whistleblower (33c3) - traduction française.mp4 99.1 MB
23C3 - 2006/video/23C3-1513-en-detecting_temperature_through_clock_skew.mp4 99.0 MB
29C3 - 2012/video/29c3-5123-en-small_footprint_inspection_techniques_for_android_h264.mp4 99.0 MB
34C3 - 2017/34C3 - WTFrance.mp4 98.9 MB
33C3 - 2016/Haft fUr Whistleblower (33c3) - english translation.mp4 98.8 MB
32C3 - 2015/video/32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_hd.mp4 98.6 MB
34C3 - 2017/34C3 - Think big or care for yourself - deutsche Ubersetzung.mp4 98.3 MB
33C3 - 2016/A look into the Mobile Messaging Black Box (33c3) - deutsche Ubersetzung.mp4 98.2 MB
32C3 - 2015/video/32c3-7435-en-de-Replication_Prohibited_hd.mp4 97.9 MB
23C3 - 2006/video/23C3-1642-en-unlocking_filevault.mp4 97.9 MB
34C3 - 2017/34C3 - Tightening the Net in Iran.mp4 97.9 MB
23C3 - 2006/video/23C3-1682-de-security_nightmares.mp4 97.9 MB
34C3 - 2017/34C3 - Financial surveillance.mp4 97.9 MB
30C3 - 2013/video/30c3-5412-en-Bug_class_genocide_h264-hd.mp4 97.9 MB
30C3 - 2013/video/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4 97.8 MB
31C3 - 2014/video/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_sd.mp4 97.7 MB
23C3 - 2006/video/23C3-1429-de-fnord_jahresrueckblick.mp4 97.7 MB
29C3 - 2012/video/29c3-5203-en-omg_oer_h264.mp4 97.7 MB
24C3 - 2007/video/24c3-2203-de-chaos_jahresrueckblick_high.mp4 97.3 MB
34C3 - 2017/34C3 - Coming Soon Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme (2).mp4 97.2 MB
32C3 - 2015/audio/32c3-7221-de-Methodisch_inkorrekt.opus 97.1 MB
34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma - deutsche Ubersetzung.mp4 97.1 MB
34C3 - 2017/34C3 - Deep Learning Blindspots.mp4 97.1 MB
21C3 - 2004/video/315 Fight for your Right to Fileshare.mp4 97.1 MB
34C3 - 2017/34C3 - Briar - deutsche Ubersetzung.mp4 97.1 MB
34C3 - 2017/34C3 - Deep Learning Blindspots - deutsche Ubersetzung.mp4 97.1 MB
33C3 - 2016/The High Priests of the Digital Age (33c3).mp4 97.0 MB
34C3 - 2017/34C3 - Ecstasy 10x yellow Twitter 120mg Mdma.mp4 97.0 MB
30C3 - 2013/video/30c3-5443-en-Introduction_to_Processor_Design_h264-hq.mp4 96.9 MB
34C3 - 2017/34C3 - Coming Soon Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme.mp4 96.9 MB
34C3 - 2017/34C3 - Briar - La traduccion espanola.mp4 96.9 MB
33C3 - 2016/A look into the Mobile Messaging Black Box (33c3).mp4 96.6 MB
32C3 - 2015/video/32c3-7133-en-de-Beyond_your_cable_modem_hd.mp4 96.6 MB
30C3 - 2013/video/30c3-5444-en-Attacking_HomeMatic_h264-hq.mp4 96.6 MB
34C3 - 2017/34C3 - Intel ME Myths and reality - deutsche Ubersetzung.mp4 96.4 MB
31C3 - 2014/video/31c3-6358-en-de-Information_Control_and_Strategic_Violence_hd.mp4 96.3 MB
34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk - traduction francaise.mp4 96.3 MB
33C3 - 2016/How do we know our PRNGs work properly (33c3) - deutsche Ubersetzung.mp4 96.2 MB
34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk - deutsche Ubersetzung.mp4 96.2 MB
21C3 - 2004/video/016 Phishing the Web.mp4 96.1 MB
23C3 - 2006/video/23C3-1652-de-geschichte_der_automaten.mp4 96.1 MB
34C3 - 2017/34C3 - Intel ME Myths and reality - traduction francaise.mp4 96.1 MB
34C3 - 2017/34C3 - Holography of Wi-Fi radiation - deutsche Ubersetzung.mp4 96.1 MB
30C3 - 2013/video/30c3-5334-en-RFID_Treehouse_of_Horror_h264-hq.mp4 95.9 MB
30C3 - 2013/video/30c3-5613-en-Forbidden_Fruit_h264-hq.mp4 95.9 MB
25C3 - 2008/video/25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4 95.8 MB
34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions - deutsche Ubersetzung.mp4 95.8 MB
23C3 - 2006/video/23C3-1578-de-hacking_fingerprint_recognition_systems.mp4 95.8 MB
34C3 - 2017/34C3 - How Alice and Bob meet if they don't like onions.mp4 95.8 MB
23C3 - 2006/video/23C3-1478-en-traffic_analysis.mp4 95.6 MB
34C3 - 2017/34C3 - Mobile Data Interception from the Interconnection Link.mp4 95.6 MB
32C3 - 2015/video/32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_hd.mp4 95.6 MB
23C3 - 2006/video/23C3-1494-de-ego_striptease.mp4 95.5 MB
31C3 - 2014/audio/31c3-6579-en-de-Lightning_Talks_Day_3_opus.opus 95.5 MB
34C3 - 2017/34C3 - Holography of Wi-Fi radiation.mp4 95.5 MB
31C3 - 2014/video/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_hd.mp4 95.4 MB
34C3 - 2017/34C3 - Robot Music - deutsche Ubersetzung.mp4 95.4 MB
19C3 - 2002/video/19C3-517-eu-data-retention.mp4 95.4 MB
30C3 - 2013/video/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4 95.3 MB
34C3 - 2017/34C3 - Robot Music.mp4 95.3 MB
33C3 - 2016/Dieselgate - A year later (33c3) - traduction française.mp4 95.2 MB
33C3 - 2016/Software Defined Emissions (33c3) - deutsche Ubersetzung.mp4 95.1 MB
29C3 - 2012/video/29c3-5104-en-esxi_beast_h264.mp4 95.0 MB
29C3 - 2012/video/29c3-5167-en-setting_mobile_phones_free_h264.mp4 94.9 MB
23C3 - 2006/video/23C3-1694-en-automated_exploit_detection_in_binaries.mp4 94.9 MB
23C3 - 2006/video/23C3-1473-en-large_scale_internet_content_filtering.mp4 94.8 MB
29C3 - 2012/video/29c3-5226-en-further_hacks_calypso_h264.mp4 94.7 MB
32C3 - 2015/video/32c3-7400-en-de-Technology_and_Mass_Atrocity_Prevention_hd.mp4 94.6 MB
23C3 - 2006/video/23C3-1347-en-we_are_great_together.mp4 94.6 MB
30C3 - 2013/video/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hd.mp4 94.6 MB
30C3 - 2013/video/30c3-5395-en-Towards_an_affordable_brain-computer-interface_h264-hq.mp4 94.5 MB
31C3 - 2014/video/31c3-6541-en-de-Forging_the_USB_armory_hd.mp4 94.2 MB
33C3 - 2016/EinfUhrung zu Blockchains (33c3).mp4 94.0 MB
29C3 - 2012/video/29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_h264.mp4 93.9 MB
33C3 - 2016/Machine Dreams (33c3).mp4 93.9 MB
33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3).mp4 93.9 MB
33C3 - 2016/No USB No problem. (33c3) - YouTube.mp4 93.9 MB
33C3 - 2016/Dissecting modern (3G 4G) cellular modems (33c3).mp4 93.7 MB
22C3 - 2005/video/22C3-536-en-bluetooth_hacking.mp4 93.6 MB
31C3 - 2014/video/31c3-6236-en-de-Iridium_Pager_Hacking_hd.mp4 93.5 MB
34C3 - 2017/34C3 - Schnaps Hacking - deutsche Ubersetzung.mp4 93.5 MB
32C3 - 2015/video/32c3-7314-en-de-All_Our_Shared_Spectrum_Are_Belong_to_Us_hd.mp4 93.3 MB
33C3 - 2016/Edible Soft Robotics (33c3) - deutsche Ubersetzung.mp4 93.1 MB
33C3 - 2016/Software Defined Emissions (33c3).mp4 93.1 MB
32C3 - 2015/video/32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_hd.mp4 93.0 MB
34C3 - 2017/34C3 - Intel ME Myths and reality.mp4 93.0 MB
34C3 - 2017/34C3 - Think big or care for yourself.mp4 92.9 MB
23C3 - 2006/audio/23C3-1710-en-tap_the_eff.mp3 92.9 MB
31C3 - 2014/video/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_hd.mp4 92.8 MB
23C3 - 2006/video/23C3-1609-en-data_retention_update.mp4 92.5 MB
31C3 - 2014/video/31c3-6196-en-Switches_Get_Stitches_sd.mp4 92.4 MB
33C3 - 2016/The Fight for Encryption in 2016 (33c3).mp4 92.4 MB
34C3 - 2017/34C3 - The Ultimate Apollo Guidance Computer Talk.mp4 92.4 MB
33C3 - 2016/Edible Soft Robotics (33c3).mp4 92.4 MB
34C3 - 2017/34C3 - TrUgerische Sicherheit - english translation.mp4 92.3 MB
20C3 - 2003/video/20C3-538-Practical_WIN32_and_Unicode_exploitation.mp4 92.0 MB
33C3 - 2016/Lockpicking in the IoT (33c3) - deutsche Ubersetzung.mp4 92.0 MB
29C3 - 2012/audio/29c3-5384-en-lightning_talks_3_ogg.ogg 91.9 MB
33C3 - 2016/The Transhumanist Paradox (33c3).mp4 91.8 MB
31C3 - 2014/audio/31c3-6563-en-Lightning_Talks_Day_2_opus.opus 91.8 MB
31C3 - 2014/audio/31c3-6563-en-de-Lightning_Talks_Day_2_opus.opus 91.8 MB
33C3 - 2016/Make the Internet Neutral Again (33c3) - deutsche Ubersetzung.mp4 91.6 MB
33C3 - 2016/Make the Internet Neutral Again (33c3) - traduction française.mp4 91.6 MB
23C3 - 2006/video/23C3-1402-de-drones.mp4 91.6 MB
29C3 - 2012/video/29c3-5404-en-noc_review_h264.mp4 91.5 MB
17C3 - 2000/video/17C3_bigbrother.mp4 91.5 MB
20C3 - 2003/radio/20C3_Radio_Riff_-_Aufschnitt_Alpha.mp3 91.4 MB
31C3 - 2014/video/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_hd.mp4 91.4 MB
34C3 - 2017/34C3 - Briar.mp4 91.4 MB
33C3 - 2016/Lockpicking in the IoT (33c3) - traduction française.mp4 91.3 MB
25C3 - 2008/video/25c3-2904-en-solar-powering_your_geek_gear.mp4 91.3 MB
23C3 - 2006/audio/23C3-1420-en-strong_random_number_generator.mp3 91.2 MB
32C3 - 2015/audio/32c3-7306-de-Jahresrueckblick_des_CCC.opus 91.0 MB
27C3 - 2010/video/27c3-4299-en-closing_event.mp4 90.8 MB
33C3 - 2016/Make the Internet Neutral Again (33c3).mp4 90.8 MB
33C3 - 2016/The Zcash anonymous cryptocurrency (33c3) - traduction française.mp4 90.6 MB
20C3 - 2003/video/20C3-537-WSIS_Overview.mp4 90.5 MB
33C3 - 2016/Console Hacking 2016 (33c3).mp4 90.5 MB
34C3 - 2017/34C3 - Reverse engineering FPGAs - deutsche Ubersetzung.mp4 90.4 MB
30C3 - 2013/video/30c3-5185-en-FPGA_101_h264-hq.mp4 90.3 MB
33C3 - 2016/The Zcash anonymous cryptocurrency (33c3).mp4 90.3 MB
33C3 - 2016/The Zcash anonymous cryptocurrency (33c3) - deutsche Ubersetzung.mp4 90.3 MB
34C3 - 2017/34C3 - Reverse engineering FPGAs.mp4 90.3 MB
30C3 - 2013/video/30c3-5544-de-en-Sim_Gishel_h264-hq.mp4 90.2 MB
30C3 - 2013/video/30c3-5590-en-White-Box_Cryptography_h264-hq.mp4 90.0 MB
30C3 - 2013/video/30c3-5293-en-de-Dead_Man_Edition_h264-hq.mp4 90.0 MB
33C3 - 2016/Corporate surveillance, digital tracking, big data & privacy (33c3).mp4 90.0 MB
33C3 - 2016/Decoding the LoRa PHY (33c3) - deutsche Ubersetzung.mp4 89.9 MB
30C3 - 2013/video/30c3-5293-de-en-Dead_Man_Edition_h264-hq.mp4 89.9 MB
31C3 - 2014/audio/31c3-6580-en-de-Lightning_Talks_Day_4_opus.opus 89.9 MB
34C3 - 2017/34C3 - TrUgerische Sicherheit.mp4 89.8 MB
32C3 - 2015/video/32c3-7426-en-de-Intelexit_hd.mp4 89.8 MB
33C3 - 2016/Lasers in the sky (with asteroids) (33c3) - deutsche Ubersetzung.mp4 89.7 MB
33C3 - 2016/Lasers in the sky (with asteroids) (33c3).mp4 89.6 MB
31C3 - 2014/video/31c3-6582-de-Das_Transparenzportal_Hamburg_hd.mp4 89.5 MB
33C3 - 2016/Lockpicking in the IoT (33c3).mp4 89.5 MB
23C3 - 2006/audio/23C3-1683-de-powerpoint_karaoke.mp3 89.5 MB
33C3 - 2016/Irren ist staatlich (33c3) - traduction française.mp4 89.3 MB
23C3 - 2006/video/23C3-1498-en-mining_aol_search_queries.mp4 89.3 MB
33C3 - 2016/Irren ist staatlich (33c3) - english translation.mp4 89.2 MB
31C3 - 2014/video/31c3-6399-en-Global_Civil_Society_Under_Attack_hd.mp4 89.1 MB
33C3 - 2016/Corporate surveillance, digital tracking, big data & privacy (33c3) - deutsche Ubersetzung.mp4 89.1 MB
31C3 - 2014/video/31c3-6462-en-de-MegaCode_to_facility_gates_hd.mp4 89.0 MB
28C3 - 2011/video/28c3-4587-en-bup_git_for_backups_h264.mp4 88.8 MB
33C3 - 2016/Everything you always wanted to know about Certificate Transparency (33c3) - deutsche Ubersetzung.mp4 88.8 MB
34C3 - 2017/34C3 - iOS kernel exploitation archaeology - deutsche Ubersetzung.mp4 88.6 MB
21C3 - 2004/video/176 Passive covert channels in the Linux kernel.mp4 88.6 MB
33C3 - 2016/Hacking the World (33c3) - deutsche Ubersetzung.mp4 88.5 MB
33C3 - 2016/Decoding the LoRa PHY (33c3).mp4 88.5 MB
34C3 - 2017/34C3 - iOS kernel exploitation archaeology.mp4 88.5 MB
28C3 - 2011/video/28c3-4770-en-dont_scan_just_ask_h264.mp4 88.4 MB
33C3 - 2016/The Fight for Encryption in 2016 (33c3) - traduction française.mp4 88.3 MB
23C3 - 2006/video/23C3-1500-en-hackerspaces.mp4 88.3 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Habitual Automation - Because we have to script.mp4 88.3 MB
34C3 - 2017/34C3 - Schnaps Hacking.mp4 88.3 MB
29C3 - 2012/video/29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_h264.mp4 88.1 MB
33C3 - 2016/The 12 Networking Truths (33c3) - deutsche Ubersetzung.mp4 88.0 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - In der Weihnachtsbäckerei - Data Science und Kekse.mp4 88.0 MB
33C3 - 2016/Ethics in the data society (33c3) - deutsche Ubersetzung.mp4 87.7 MB
31C3 - 2014/video/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_hd.mp4 87.6 MB
32C3 - 2015/video/32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_hd.mp4 87.5 MB
33C3 - 2016/Ethics in the data society (33c3).mp4 87.4 MB
30C3 - 2013/video/30c3-5447-en-Policing_the_Romantic_Crowd_h264-hq.mp4 87.2 MB
34C3 - 2017/34C3 - eMMC hacking, or how I fixed long-dead Galaxy S3 phones - deutsche Ubersetzung.mp4 87.2 MB
34C3 - 2017/34C3 - Die Sprache der Uberwacher - english translation.mp4 87.1 MB
32C3 - 2015/video/32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_hd.mp4 86.8 MB
34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging - La traduccion espanola.mp4 86.6 MB
33C3 - 2016/Visiting The Bear Den (33c3) - deutsche Ubersetzung.mp4 86.6 MB
34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging - deutsche Ubersetzung.mp4 86.6 MB
30C3 - 2013/workshops/30c3-WS-en-YBTI_Routing-Caleb_James_Delisle-Edge_of_Dystopia.mp4 86.6 MB
34C3 - 2017/34C3 - Netzpolitik in der Schweiz - english translation.mp4 86.6 MB
23C3 - 2006/video/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp4 86.4 MB
34C3 - 2017/34C3 - Netzpolitik in der Schweiz - traduction francaise.mp4 86.4 MB
33C3 - 2016/Virtual Secure Boot (33c3) - deutsche Ubersetzung.mp4 86.3 MB
29C3 - 2012/audio/29c3-5309-de-en-hacker_jeopardy_ogg.ogg 86.2 MB
24C3 - 2007/video/24c3-2275-en-quantum_cryptography_and_possible_attacks_high.mp4 85.5 MB
34C3 - 2017/34C3 - Access To Bodies - english translation.mp4 85.5 MB
21C3 - 2004/video/101 XMPP - Jabber.mp4 85.5 MB
30C3 - 2013/video/30c3-5566-en-Open_source_experimental_incubator_build_up_h264-hq.mp4 85.5 MB
33C3 - 2016/Irren ist staatlich (33c3).mp4 85.4 MB
33C3 - 2016/Virtual Secure Boot (33c3).mp4 85.2 MB
33C3 - 2016/Everything you always wanted to know about Certificate Transparency (33c3).mp4 85.1 MB
33C3 - 2016/From Server Farm to Data Table (33c3) - deutsche Ubersetzung.mp4 85.1 MB
33C3 - 2016/Visiting The Bear Den (33c3).mp4 85.1 MB
34C3 - 2017/34C3 - Bringing Linux back to server boot ROMs with NERF and Heads - deutsche Ubersetzung.mp4 85.0 MB
23C3 - 2006/video/23C3-1600-en-biometrics.mp4 84.9 MB
31C3 - 2014/video/31c3-6184-de-en-Mein_Bot_der_Kombattant_sd.mp4 84.9 MB
33C3 - 2016/Nintendo Hacking 2016 (33c3).mp4 84.8 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - A Blueprint for Making Namecoin Anonymous.mp4 84.8 MB
31C3 - 2014/video/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_hd.mp4 84.8 MB
31C3 - 2014/video/31c3-6402-en-de-Axoloti_hd.mp4 84.8 MB
33C3 - 2016/From Server Farm to Data Table (33c3).mp4 84.7 MB
20C3 - 2003/video/20C3-591-Berichte_von_den_Big_Brother_Awards.mp4 84.7 MB
23C3 - 2006/video/23C3-1439-en-information_operations.mp4 84.6 MB
31C3 - 2014/audio/31c3-6109-de-en-Fnord_News_Show_opus.opus 84.6 MB
32C3 - 2015/video/32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_hd.mp4 84.5 MB
31C3 - 2014/video/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_hd.mp4 84.3 MB
29C3 - 2012/audio/29c3-5383-en-lightning_talks_2_ogg.ogg 84.3 MB
23C3 - 2006/video/23C3-1638-de-freie_software.mp4 84.0 MB
30C3 - 2013/video/30c3-5552-en-India_s_Surveillance_State_h264-hq.mp4 83.9 MB
24C3 - 2007/video/24c3-2355-de-trecker_fahrn_high.mp4 83.9 MB
34C3 - 2017/34C3 - eMMC hacking, or how I fixed long-dead Galaxy S3 phones.mp4 83.8 MB
33C3 - 2016/Nintendo Hacking 2016 (33c3) - deutsche Ubersetzung.mp4 83.8 MB
23C3 - 2006/audio/23C3-1444-en-tor_and_china.mp3 83.8 MB
19C3 - 2002/video/19C3-392-codeflow-analyse.mp4 83.7 MB
33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3).mp4 83.6 MB
33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3) - deutsche Ubersetzung.mp4 83.5 MB
24C3 - 2007/video/24c3-2356-en-computer_popsongs_high.mp4 83.3 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Modeling Trust in a Distributed Private Social Network - secushare.org.mp4 83.3 MB
29C3 - 2012/video/29c3-5390-en-tacticaltech_h264.mp4 83.2 MB
34C3 - 2017/34C3 - Es sind die kleinen Dinge im Leben II - english translation.mp4 82.9 MB
33C3 - 2016/Interplanetary Colonization (33c3) - traduction française.mp4 82.6 MB
20C3 - 2003/video/20C3-633-Fnord_Jahresrueckschau.mp4 82.6 MB
21C3 - 2004/video/117 Kampagne Fair Sharing.mp4 82.5 MB
23C3 - 2006/video/23C3-1560-en-csrf.mp4 82.5 MB
20C3 - 2003/video/20C3-598-Trust_based_P2P_WYMIWYG_KnoBot_project.mp4 82.4 MB
33C3 - 2016/Interplanetary Colonization (33c3) - deutsche Ubersetzung.mp4 82.4 MB
30C3 - 2013/video/30c3-5356-en-Firmware_Fat_Camp_h264-hq.mp4 82.3 MB
24C3 - 2007/video/24c3-2241-de-das_panoptische_prinzip_high.mp4 82.3 MB
34C3 - 2017/34C3 - MQA - A clever stealth DRM-Trojan - deutsche Ubersetzung.mp4 82.3 MB
34C3 - 2017/34C3 - Digitale Bildung in der Schule - La traduccion espanola.mp4 82.2 MB
34C3 - 2017/34C3 - Public FPGA based DMA Attacking.mp4 82.2 MB
34C3 - 2017/34C3 - Digitale Bildung in der Schule - english translation.mp4 82.1 MB
31C3 - 2014/video/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_hd.mp4 82.1 MB
34C3 - 2017/34C3 - Public FPGA based DMA Attacking - deutsche Ubersetzung.mp4 82.1 MB
30C3 - 2013/audio/30c3-5563-en-de-Lightning_Talks_Day_3_opus.opus 82.0 MB
30C3 - 2013/video/30c3-5289-en-Coding_your_body_h264-hq.mp4 82.0 MB
34C3 - 2017/34C3 - Low Cost Non-Invasive Biomedical Imaging.mp4 82.0 MB
22C3 - 2005/video/22C3-426-de-entschwoerungstheorie.mp4 81.9 MB
32C3 - 2015/video/32c3-7367-en-de-Ling_-_High_level_system_programming_hd.mp4 81.9 MB
33C3 - 2016/Tapping into the core (33c3) - deutsche Ubersetzung.mp4 81.9 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Sovereignty in Catalonia_ 1st Step Decentralized Infrastructure.mp4 81.8 MB
31C3 - 2014/video/31c3-6131-en-de-Safer_playing_with_lasers_hd.mp4 81.8 MB
34C3 - 2017/34C3 - Access To Bodies.mp4 81.7 MB
32C3 - 2015/video/32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_hd.mp4 81.7 MB
30C3 - 2013/video/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_h264-hq.mp4 81.6 MB
34C3 - 2017/34C3 - Practical Mix Network Design - deutsche Ubersetzung.mp4 81.4 MB
33C3 - 2016/Syrian Archive (33c3) - deutsche Ubersetzung.mp4 81.4 MB
33C3 - 2016/Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3) - english translation.mp4 81.3 MB
34C3 - 2017/34C3 - Practical Mix Network Design - traduction francaise.mp4 81.3 MB
33C3 - 2016/A Data Point Walks Into a Bar (33c3) - deutsche Ubersetzung.mp4 81.3 MB
24C3 - 2007/video/24c3-2382-de-tor_high.mp4 81.2 MB
30C3 - 2013/video/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__h264-hq.mp4 81.1 MB
34C3 - 2017/34C3 - Practical Mix Network Design.mp4 81.1 MB
34C3 - 2017/34C3 - Die Sprache der Uberwacher.mp4 81.0 MB
20C3 - 2003/video/20C3-588-Schummeln_in_oeffentlichen-Projekten.mp4 80.9 MB
34C3 - 2017/34C3 - Netzpolitik in der Schweiz.mp4 80.8 MB
33C3 - 2016/Syrian Archive (33c3).mp4 80.7 MB
30C3 - 2013/video/30c3-5394-BREACH_in_Agda_h264-hq.mp4 80.5 MB
30C3 - 2013/video/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_h264-hq.mp4 80.5 MB
30C3 - 2013/video/30c3-5376-en-Do_You_Think_That_s_Funny__h264-hq.mp4 80.5 MB
31C3 - 2014/video/31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4 80.1 MB
33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3) - traduction française.mp4 80.1 MB
33C3 - 2016/Memory Deduplication The Curse that Keeps on Giving (33c3) - deutsche Ubersetzung.mp4 80.0 MB
33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3) - english translation.mp4 79.9 MB
30C3 - 2013/video/30c3-5186-en-Programming_FPGAs_with_PSHDL_h264-hq.mp4 79.9 MB
33C3 - 2016/Shining some light on the Amazon Dash button (33c3).mp4 79.9 MB
23C3 - 2006/video/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp4 79.8 MB
34C3 - 2017/34C3 - Bringing Linux back to server boot ROMs with NERF and Heads.mp4 79.8 MB
30C3 - 2013/video/30c3-5495-en-Concepts_for_global_TSCM_h264-hq.mp4 79.8 MB
32C3 - 2015/video/32c3-7423-en-de-One_year_of_securitarian_drift_in_France_hd.mp4 79.6 MB
30C3 - 2013/video/30c3-5588-en-de-My_journey_into_FM-RDS_h264-hq.mp4 79.5 MB
33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3).mp4 79.5 MB
23C3 - 2006/video/23C3-1728-en-23c3_network_review.mp4 79.4 MB
34C3 - 2017/34C3 - MQA - A clever stealth DRM-Trojan.mp4 79.3 MB
33C3 - 2016/Datenschutzgrundverordnung Rechte fUr Menschen, Pflichten fUr Firmen & Chancen fUr uns (33c3) - eng.mp4 79.3 MB
24C3 - 2007/video/24c3-2381-en-what_is_terrorism_high.mp4 79.3 MB
23C3 - 2006/video/23C3-1552-en-nintendo_ds.mp4 79.1 MB
32C3 - 2015/video/32c3-7547-en-de-libusb_Maintainer_fail_hd.mp4 79.0 MB
34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse - La traduccion espanola.mp4 78.8 MB
24C3 - 2007/video/24c3-2363-de-der_bundestrojaner_high.mp4 78.8 MB
28C3 - 2011/video/28c3-4847-en-reverse_engineering_usb_devices_h264.mp4 78.7 MB
23C3 - 2006/video/23C3-1495-en-green_phone.mp4 78.6 MB
30C3 - 2013/audio/30c3-5564-en-de-Lightning_Talks_Day_4_opus.opus 78.4 MB
21C3 - 2004/video/158 How to find anything on the web.mp4 78.4 MB
34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia - La traduccion espanola.mp4 78.4 MB
29C3 - 2012/audio/29c3-5338-en-enemies_of_the_state_ogg.ogg 78.3 MB
21C3 - 2004/video/060 Digital Prosthetics.mp4 78.3 MB
33C3 - 2016/SpiegelMining - Reverse Engineering von Spiegel-Online (33c3).mp4 78.2 MB
29C3 - 2012/video/29c3-5206-en-the_ethics_of_activists_ddos_actions_h264.mp4 78.2 MB
33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3) - La traducción española.mp4 78.1 MB
24C3 - 2007/video/24c3-2272-en-hacking_in_the_age_of_declining_everything_high.mp4 78.1 MB
34C3 - 2017/34C3 - avatar - deutsche Ubersetzung.mp4 77.9 MB
33C3 - 2016/The DROWN Attack (33c3) - deutsche Ubersetzung.mp4 77.8 MB
33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3) - deutsche Ubersetzung.mp4 77.8 MB
34C3 - 2017/34C3 - Es sind die kleinen Dinge im Leben II.mp4 77.7 MB
34C3 - 2017/34C3 - Digitale Bildung in der Schule.mp4 77.7 MB
30C3 - 2013/video/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4 77.7 MB
33C3 - 2016/On Smart Cities, Smart Energy, And Dumb Security (33c3).mp4 77.6 MB
33C3 - 2016/Surveilling the surveillers (33c3) - traduction française.mp4 77.5 MB
33C3 - 2016/Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern (33c3).mp4 77.5 MB
33C3 - 2016/Surveilling the surveillers (33c3) - deutsche Ubersetzung.mp4 77.4 MB
23C3 - 2006/video/23C3-1610-en-fudging_with_firmware.mp4 76.8 MB
33C3 - 2016/Surveilling the surveillers (33c3).mp4 76.7 MB
32C3 - 2015/video/32c3-7441-en-de-The_plain_simple_reality_of_entropy_hd.mp4 76.7 MB
29C3 - 2012/video/29c3-5044-en-time_is_not_on_your_side_h264.mp4 76.4 MB
20C3 - 2003/video/20C3-630-The_Quintessenz_biometrics_doqubase1.mp4 76.3 MB
34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse.mp4 76.2 MB
34C3 - 2017/34C3 - KRACKing WPA2 by Forcing Nonce Reuse - deutsche Ubersetzung.mp4 76.2 MB
21C3 - 2004/video/066 Bluetooth Hacking.mp4 76.1 MB
34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU - traduction francaise.mp4 76.1 MB
34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU - deutsche Ubersetzung.mp4 76.0 MB
34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect - deutsche Ubersetzung.mp4 75.7 MB
34C3 - 2017/34C3 - BBSs and early Internet access in the 1990ies.mp4 75.6 MB
33C3 - 2016/Datenschutzgrundverordnung Rechte fUr Menschen, Pflichten fUr Firmen & Chancen fUr uns (33c3).mp4 75.6 MB
34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect - traduction francaise.mp4 75.6 MB
34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia - deutsche Ubersetzung.mp4 75.6 MB
23C3 - 2006/audio/23C3-1566-en-openpcd_openpicc.mp3 75.4 MB
33C3 - 2016/Privatisierung der Rechtsdurchsetzung (33c3) - english translation.mp4 75.4 MB
23C3 - 2006/audio/23C3-1381-en-stealth_malware.mp3 75.3 MB
32C3 - 2015/video/32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World_hd.mp4 75.3 MB
34C3 - 2017/34C3 - avatar.mp4 75.2 MB
23C3 - 2006/video/23C3-1492-en-dying_giraffe_recordings.mp4 75.1 MB
34C3 - 2017/34C3 - Catch me if you can Internet Activism in Saudi Arabia.mp4 75.1 MB
32C3 - 2015/video/32c3-7529-en-de-Mobile_Censorship_in_Iran_hd.mp4 75.1 MB
33C3 - 2016/Berechnete Welt (33c3) - english translation.mp4 74.9 MB
33C3 - 2016/Berechnete Welt (33c3).mp4 74.8 MB
30C3 - 2013/audio/30c3-5608-de-en-Jahresrueckblick_des_CCC_opus.opus 74.8 MB
20C3 - 2003/video/20C3-576-Free_WLANs_for_the_masses.mp4 74.8 MB
31C3 - 2014/video/31c3-6370-en-Internet_of_toilets_hd.mp4 74.7 MB
31C3 - 2014/video/31c3-6589-en-Mr_Beam_goes_Kickstarter_hd.mp4 74.6 MB
33C3 - 2016/PUFs, protection, privacy, PRNGs (33c3).mp4 74.6 MB
30C3 - 2013/video/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4 74.6 MB
34C3 - 2017/34C3 - UPSat - the first open source satellite - deutsche Ubersetzung.mp4 74.6 MB
21C3 - 2004/video/047 Datamining the NSA.mp4 74.5 MB
30C3 - 2013/video/30c3-5453-en-Against_Metadata_h264-hq.mp4 74.4 MB
29C3 - 2012/video/29c3-5138-en-romantichackers_h264.mp4 74.4 MB
32C3 - 2015/video/32c3-7138-en-de-Gscheitern_hd.mp4 74.4 MB
33C3 - 2016/PUFs, protection, privacy, PRNGs (33c3) - deutsche Ubersetzung.mp4 74.4 MB
24C3 - 2007/video/24c3-2325-en-current_events_in_tor_development_high.mp4 74.3 MB
30C3 - 2013/video/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4 74.2 MB
30C3 - 2013/video/30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hd.mp4 74.1 MB
32C3 - 2015/video/32c3-7264-en-de-Profiling_In_justice_hd.mp4 74.0 MB
24C3 - 2007/video/24c3-2380-de-nedap_wahlcomputer_in_deutschland_high.mp4 74.0 MB
30C3 - 2013/video/30c3-5360-en-Script_Your_Car__h264-hq.mp4 73.9 MB
32C3 - 2015/video/32c3-7245-en-de-Reversing_UEFI_by_execution_hd.mp4 73.9 MB
31C3 - 2014/video/31c3-6557-en-de-31C3_Infrastructure_Review_sd.mp4 73.8 MB
30C3 - 2013/video/30c3-5398-en-HbbTV_Security_h264-hq.mp4 73.6 MB
20C3 - 2003/video/20C3-581-Chaos-Rueckblick-2003.mp4 73.6 MB
30C3 - 2013/video/30c3-5476-en-Electronic_Bank_Robberies_h264-hq.mp4 73.6 MB
31C3 - 2014/audio/31c3-6572-de-en-Security_Nightmares_opus.opus 73.5 MB
33C3 - 2016/In Search of Evidence-Based IT-Security (33c3).mp4 73.2 MB
33C3 - 2016/In Search of Evidence-Based IT-Security (33c3) - deutsche Ubersetzung.mp4 73.2 MB
22C3 - 2005/video/22C3-920-en-we_lost_the_war.mp4 73.2 MB
19C3 - 2002/video/19C3-453-die-fuenf-pforten-der-manipulation.mp4 73.1 MB
33C3 - 2016/In Search of Evidence-Based IT-Security (33c3) - traduction française.mp4 72.9 MB
30C3 - 2013/video/30c3-5223-en-WarGames_in_memory_h264-hq.mp4 72.8 MB
23C3 - 2006/audio/23C3-1760-en-on_free.mp3 72.8 MB
33C3 - 2016/Der 33 JahrerUckblick (33c3) - traduction française.mp4 72.5 MB
23C3 - 2006/audio/23C3-1439-en-information_operations.mp3 72.5 MB
30C3 - 2013/video/30c3-5526-en-How_to_Build_a_Mind_h264-hq.mp4 72.4 MB
24C3 - 2007/video/24c3-2192-de-elektronische_dokumente_high.mp4 72.3 MB
24C3 - 2007/video/24c3-2290-en-overtaking_proprietary_software_high.mp4 72.2 MB
33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3).mp4 72.0 MB
33C3 - 2016/Downgrading iOS From past to present (33c3) - deutsche Ubersetzung.mp4 71.7 MB
34C3 - 2017/34C3 - Internet censorship in the Catalan referendum - deutsche Ubersetzung.mp4 71.6 MB
32C3 - 2015/video/32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_hd.mp4 71.6 MB
34C3 - 2017/34C3 - Social Cooling - big data’s unintended side effect.mp4 71.4 MB
33C3 - 2016/Understanding the Snooper’s Charter (33c3).mp4 71.4 MB
34C3 - 2017/34C3 - Net Neutraliy Enforcement in the EU.mp4 71.4 MB
34C3 - 2017/34C3 - Internet censorship in the Catalan referendum - La traduccion espanola.mp4 71.3 MB
34C3 - 2017/34C3 - openPower - the current state of commercial openness in CPU development - deutsche Ubersetzu.mp4 71.3 MB
30C3 - 2013/video/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4 71.3 MB
29C3 - 2012/audio/29c3-5316-en-lightningtalks1_ogg.ogg 71.2 MB
29C3 - 2012/video/29c3-5178-en-the_ultimate_galaksija_talk_h264.mp4 71.2 MB
24C3 - 2007/video/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte_high.mp4 71.1 MB
21C3 - 2004/video/019 Verdeckte Netzwerkanalyse.mp4 71.1 MB
33C3 - 2016/Haft fUr Whistleblower (33c3).mp4 71.1 MB
24C3 - 2007/video/24c3-2371-de-wahlstift_high.mp4 71.0 MB
30C3 - 2013/video/30c3-5509-de-en-IFGINT_h264-hq.mp4 71.0 MB
23C3 - 2006/audio/23C3-1605-de-digitale_bildforensik.mp3 70.9 MB
23C3 - 2006/video/23C3-1593-de-krypta.mp4 70.8 MB
32C3 - 2015/audio/32c3-7152-de-Hacker_Jeopardy.opus 70.6 MB
24C3 - 2007/video/24c3-2332-en-no_ooxml_high.mp4 70.6 MB
33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3) - La traducción española.mp4 70.6 MB
28C3 - 2011/video/28c3-4652-en-data_mining_the_israeli_census_h264.mp4 70.3 MB
33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3) - deutsche Ubersetzung.mp4 70.2 MB
23C3 - 2006/video/23C3-1459-en-sip_security.mp4 70.2 MB
24C3 - 2007/video/24c3-2292-en-wireless_kernel_tweaking_high.mp4 70.1 MB
33C3 - 2016/Genetic Codes and what they tell us - and everyone else (33c3).mp4 70.0 MB
22C3 - 2005/video/22C3-545-en-web_of_trust.mp4 69.9 MB
33C3 - 2016/Downgrading iOS From past to present (33c3).mp4 69.9 MB
34C3 - 2017/34C3 - UPSat - the first open source satellite.mp4 69.7 MB
24C3 - 2007/video/24c3-2225-en-paparazzi_high.mp4 69.5 MB
22C3 - 2005/video/22C3-418-en-ajax_web_applications.mp4 69.5 MB
24C3 - 2007/video/24c3-2271-en-distributed_campaigns_high.mp4 69.3 MB
30C3 - 2013/video/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4 69.2 MB
34C3 - 2017/34C3 - Blinkenrocket! - deutsche Ubersetzung.mp4 69.2 MB
24C3 - 2007/video/24c3-2289-en-card_payment_high.mp4 69.2 MB
24C3 - 2007/video/24c3-2393-en-dns_rebinding_packet_tricks_high.mp4 69.2 MB
33C3 - 2016/International exchange of tax information (33c3) - deutsche Ubersetzung.mp4 69.2 MB
34C3 - 2017/34C3 - Blinkenrocket!.mp4 69.0 MB
24C3 - 2007/video/24c3-2331-en-spotter_guide_to_aacs_keys_high.mp4 68.9 MB
34C3 - 2017/34C3 - Internet censorship in the Catalan referendum.mp4 68.9 MB
23C3 - 2006/video/23C3-1603-en-foss_in_india.mp4 68.8 MB
23C3 - 2006/audio/23C3-1682-de-security_nightmares.mp3 68.8 MB
33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3) - deutsche Ubersetzung.mp4 68.8 MB
31C3 - 2014/video/31c3-6071-en-Hacking_Ethics_in_Education_hd.mp4 68.8 MB
32C3 - 2015/video/32c3-7238-en-de-Vector_retrogaming_hd.mp4 68.7 MB
34C3 - 2017/34C3 - Taxation - traduction francaise.mp4 68.7 MB
26C3 - 2009/audio/26c3-3645-en-lightning_talks_-_day_4.ogg 68.5 MB
28C3 - 2011/audio/28c3-4907-en-lightning_talks_day_4.ogg 68.5 MB
23C3 - 2006/video/23C3-1678-de-kritik_an_den_illuminaten.mp4 68.5 MB
32C3 - 2015/video/32c3-7205-de-Netzpolitik_in_der_Schweiz_2015_16_hd.mp4 68.5 MB
32C3 - 2015/video/32c3-7205-de-Netzpolitik_in_der_Schweiz_hd.mp4 68.5 MB
23C3 - 2006/audio/23C3-1457-en-credit_card_security.mp3 68.5 MB
34C3 - 2017/34C3 - openPower - the current state of commercial openness in CPU development.mp4 68.5 MB
34C3 - 2017/34C3 - Taxation - deutsche Ubersetzung.mp4 68.5 MB
34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS - deutsche Ubersetzung.mp4 68.3 MB
23C3 - 2006/video/23C3-1606-en-console_hacking_2006.mp4 68.3 MB
34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS - traduction francaise.mp4 68.2 MB
33C3 - 2016/International exchange of tax information (33c3).mp4 68.1 MB
34C3 - 2017/34C3 - The seizure of the Iuventa.mp4 68.0 MB
21C3 - 2004/video/307 Gesundheitskarte.mp4 68.0 MB
26C3 - 2009/audio/26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.ogg 68.0 MB
34C3 - 2017/34C3 - The seizure of the Iuventa - deutsche Ubersetzung.mp4 67.9 MB
23C3 - 2006/audio/23C3-1346-de-sie_haben_das_recht_zu_schweigen.mp3 67.9 MB
32C3 - 2015/video/32c3-7114-en-de-Craft_leisure_and_end-user_innovation_hd.mp4 67.7 MB
24C3 - 2007/video/24c3-2345-de-gplv3_auswirkungen_high.mp4 67.7 MB
34C3 - 2017/34C3 - BootStomp On the Security of Bootloaders in Mobile Devices - deutsche Ubersetzung.mp4 67.6 MB
22C3 - 2005/video/22C3-520-de-geometrie_ohne_punkte.mp4 67.6 MB
33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3) - deutsche Ubersetzung.mp4 67.6 MB
24C3 - 2007/video/24c3-2329-en-change_me_high.mp4 67.5 MB
34C3 - 2017/34C3 - Watching the changing Earth - traduction francaise.mp4 67.5 MB
33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3).mp4 67.4 MB
33C3 - 2016/SpinalHDL An alternative hardware description language (33c3) - deutsche Ubersetzung.mp4 67.4 MB
33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3) - traduction française.mp4 67.4 MB
32C3 - 2015/video/32c3-7530-en-de-Buffering_sucks_hd.mp4 67.3 MB
24C3 - 2007/video/24c3-2233-en-vx_high.mp4 67.1 MB
32C3 - 2015/video/32c3-7412-en-Running_your_own_3G_35G_network_hd.mp4 67.1 MB
34C3 - 2017/34C3 - OONI Let's Fight Internet Censorship, Together!.mp4 67.1 MB
23C3 - 2006/video/23C3-1515-en-lightning_talks_day_2.mp4 67.0 MB
34C3 - 2017/34C3 - OONI Let's Fight Internet Censorship, Together! - deutsche Ubersetzung.mp4 66.9 MB
33C3 - 2016/The Clash of Digitalizations (33c3) - deutsche Ubersetzung.mp4 66.9 MB
24C3 - 2007/video/24c3-2293-en-what_can_we_do_to_counter_the_spies_high.mp4 66.9 MB
33C3 - 2016/SpinalHDL An alternative hardware description language (33c3).mp4 66.8 MB
34C3 - 2017/34C3 - Running GSM mobile phone on SDR - deutsche Ubersetzung.mp4 66.8 MB
24C3 - 2007/video/24c3-2383-en-data_retention_high.mp4 66.7 MB
24C3 - 2007/video/24c3-2342-en-it_was_a_bad_idea_anyway_high.mp4 66.7 MB
21C3 - 2004/video/028 Biometrie ueberwinden.mp4 66.6 MB
21C3 - 2004/video/052 Die Ueblichen Verdaechtigen.mp4 66.5 MB
24C3 - 2007/video/24c3-2396-en-eu_rfid_policy_high.mp4 66.4 MB
34C3 - 2017/34C3 - History and implications of DRM - deutsche Ubersetzung.mp4 66.4 MB
24C3 - 2007/video/24c3-2279-en-deconstructing_xbox_360_security_high.mp4 66.4 MB
34C3 - 2017/34C3 - 1-day exploit development for Cisco IOS.mp4 66.3 MB
24C3 - 2007/video/24c3-2387-en-open_source_lobbying_high.mp4 66.3 MB
26C3 - 2009/audio/26c3-3644-en-lightning_talks_-_day_3.ogg 66.3 MB
23C3 - 2006/audio/23C3-1423-en-we_dont_trust_voting_computers.mp3 66.2 MB
34C3 - 2017/34C3 - History and implications of DRM.mp4 66.2 MB
34C3 - 2017/34C3 - Science is broken - deutsche Ubersetzung.mp4 66.2 MB
19C3 - 2002/audio/19C3-411-patent-party.mp3 66.2 MB
34C3 - 2017/34C3 - Squeezing a key through a carry bit - deutsche Ubersetzung.mp4 66.1 MB
24C3 - 2007/video/24c3-2344-de-grundlagen_der_sicheren_programmierung_high.mp4 66.0 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Scuttlebutt introduction.mp4 66.0 MB
24C3 - 2007/video/24c3-2378-en-mifare_security_high.mp4 65.9 MB
23C3 - 2006/audio/23C3-1516-en-lightning_talks_day_3.mp3 65.9 MB
24C3 - 2007/video/24c3-2285-en-10ge_monitoring_live_high.mp4 65.8 MB
23C3 - 2006/audio/23C3-1495-en-green_phone.mp3 65.7 MB
23C3 - 2006/audio/23C3-1721-en-software_protection_and_the_tpm.mp3 65.7 MB
32C3 - 2015/video/32c3-7265-en-de-Maritime_Robotics_hd.mp4 65.7 MB
31C3 - 2014/audio/31c3-6543-de-en-The_Time_is_Right_opus.opus 65.7 MB
33C3 - 2016/Dieselgate - A year later (33c3).mp4 65.6 MB
23C3 - 2006/video/23C3-1646-en-dvb_t.mp4 65.6 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - P2P with JavaScript to defend against bad lawmaking.mp4 65.5 MB
23C3 - 2006/audio/23C3-1609-en-data_retention_update.mp3 65.5 MB
23C3 - 2006/audio/23C3-1592-en-inside_vmware.mp3 65.4 MB
34C3 - 2017/34C3 - Visceral Systems - deutsche Ubersetzung.mp4 65.4 MB
24C3 - 2007/video/24c3-2346-de-meine_finger_gehoeren_mir_high.mp4 65.3 MB
22C3 - 2005/video/22C3-516-de-was_ist_technisches_wissen.mp4 65.3 MB
24C3 - 2007/video/24c3-2155-en-universe_on_supercomputers_high.mp4 65.2 MB
27C3 - 2010/audio/27c3-4141-de-hacker_jeopardy.ogg 65.2 MB
34C3 - 2017/34C3 - Closing the loop Reconnecting social-technologial dynamics to Earth System science.mp4 65.2 MB
22C3 - 2005/video/22C3-913-en-lightning_talk_day_3.mp4 65.2 MB
20C3 - 2003/video/20C3-593-Weird_programming.mp4 65.2 MB
24C3 - 2007/video/24c3-2245-en-how_to_reach_digital_sustainability_high.mp4 65.2 MB
34C3 - 2017/34C3 - Taxation.mp4 65.2 MB
23C3 - 2006/audio/23C3-1679-de-ueberwachungsdruck.mp3 65.1 MB
22C3 - 2005/video/22C3-600-de-security_nightmares.mp4 65.1 MB
34C3 - 2017/34C3 - Visceral Systems.mp4 65.1 MB
27C3 - 2010/audio/27c3-4333-en-hacker_jeopardy_translation.ogg 65.1 MB
21C3 - 2004/video/171 Siegerehrung Lockpicking.mp4 65.1 MB
33C3 - 2016/Intercoms Hacking (33c3).mp4 65.0 MB
34C3 - 2017/34C3 - Closing the loop Reconnecting social-technologial dynamics to Earth System science - deutsc.mp4 65.0 MB
29C3 - 2012/video/29c3-5077-en-ethics_in_security_research_h264.mp4 65.0 MB
33C3 - 2016/Dieselgate - A year later (33c3) - deutsche Ubersetzung.mp4 65.0 MB
24C3 - 2007/video/24c3-2284-en-linguistic_hacking_high.mp4 64.9 MB
22C3 - 2005/video/22C3-519-en-the_cell_processor.mp4 64.9 MB
23C3 - 2006/video/23C3-1655-de-elektronische_reisedokumente.mp4 64.8 MB
19C3 - 2002/video/19C3-426-ec-karten-unsicherheit.mp4 64.8 MB
23C3 - 2006/video/23C3-1699-en-drm_comes_to_european_digital_tv.mp4 64.7 MB
34C3 - 2017/34C3 - Watching the changing Earth - deutsche Ubersetzung.mp4 64.7 MB
24C3 - 2007/video/24c3-2158-en-the_arctic_cold_war_high.mp4 64.5 MB
24C3 - 2007/video/24c3-2333-de-spiel_freude_eierkuchen_high.mp4 64.5 MB
34C3 - 2017/34C3 - Watching the changing Earth.mp4 64.5 MB
22C3 - 2005/video/22C3-492-en-freenet_new_version.mp4 64.5 MB
22C3 - 2005/video/22C3-591-en-european_it_lobbying.mp4 64.5 MB
24C3 - 2007/video/24c3-2354-en-latest_trends_in_oracle_security_high.mp4 64.4 MB
34C3 - 2017/34C3 - Running GSM mobile phone on SDR.mp4 64.3 MB
26C3 - 2009/audio/26c3-3642-en-lightning_talks_-_day_2.ogg 64.3 MB
20C3 - 2003/video/20C3-624-Neue_Notrufnummern_fuer_die_Informationsgesellschaft.mp4 64.3 MB
24C3 - 2007/video/24c3-2389-en-hacking_icann_high.mp4 64.3 MB
24C3 - 2007/video/24c3-2270-en-sputnik_data_analysis_high.mp4 64.2 MB
24C3 - 2007/video/24c3-2227-en-hacking_scada_high.mp4 64.0 MB
24C3 - 2007/video/24c3-2347-en-c64_dtv_hacking_high.mp4 64.0 MB
30C3 - 2013/video/30c3-5468-en-We_only_have_one_earth_h264-hq.mp4 64.0 MB
32C3 - 2015/video/32c3-7119-en-de-Building_and_Breaking_Wireless_Security_hd.mp4 63.9 MB
34C3 - 2017/34C3 - BootStomp On the Security of Bootloaders in Mobile Devices.mp4 63.9 MB
33C3 - 2016/Intercoms Hacking (33c3) - deutsche Ubersetzung.mp4 63.8 MB
19C3 - 2002/video/19C3-432-sicherheit-zeitliche-dimension.mp4 63.8 MB
21C3 - 2004/video/090 Hacktivity.mp4 63.7 MB
24C3 - 2007/video/24c3-2255-de-wahlchaos_high.mp4 63.7 MB
23C3 - 2006/audio/23C3-1257-en-podjournalism.mp3 63.6 MB
22C3 - 2005/video/22C3-427-de-wargames_hacker_spielen.mp4 63.6 MB
30C3 - 2013/audio/30c3-5562-en-de-Lightning_Talks_Day_2_opus.opus 63.6 MB
34C3 - 2017/34C3 - Squeezing a key through a carry bit.mp4 63.5 MB
31C3 - 2014/video/31c3-6608-en-Premiere_We_love_surveillance_hd.mp4 63.5 MB
32C3 - 2015/video/32c3-7310-en-de-QRtistry_hd.mp4 63.5 MB
23C3 - 2006/audio/23C3-1456-en-unusual_bugs.mp3 63.4 MB
24C3 - 2007/video/24c3-2286-en-openstreetmap_high.mp4 63.4 MB
34C3 - 2017/34C3 - BGP and the Rule of Custom.mp4 63.4 MB
34C3 - 2017/34C3 - BGP and the Rule of Custom - deutsche Ubersetzung.mp4 63.3 MB
32C3 - 2015/video/32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_hd.mp4 63.3 MB
34C3 - 2017/34C3 - Science is broken.mp4 63.2 MB
34C3 - 2017/34C3 - Gamified Control - deutsche Ubersetzung.mp4 63.1 MB
22C3 - 2005/video/22C3-1139-en-complete_harddisk_encryption_with_freebsd.mp4 63.1 MB
21C3 - 2004/audio/074 Hacker-Jeopardy.mp3 63.1 MB
22C3 - 2005/video/22C3-1147-en-the_realtime_podcast.mp4 63.1 MB
34C3 - 2017/34C3 - Simulating the future of the global agro-food system - deutsche Ubersetzung.mp4 62.9 MB
23C3 - 2006/video/23C3-1543-de-kollaboratives_wissenmanagement.mp4 62.9 MB
34C3 - 2017/34C3 - Gamified Control.mp4 62.8 MB
32C3 - 2015/video/32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_hd.mp4 62.8 MB
24C3 - 2007/video/24c3-2311-en-hacking_ideologies_2_high.mp4 62.8 MB
23C3 - 2006/video/23C3-1592-en-inside_vmware.mp4 62.7 MB
23C3 - 2006/video/23C3-1670-de-barrierefreies_web.mp4 62.6 MB
24C3 - 2007/video/24c3-2248-de-desperate_house_hackers_high.mp4 62.6 MB
26C3 - 2009/audio/26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.ogg 62.6 MB
34C3 - 2017/34C3 - Simulating the future of the global agro-food system - La traduccion espanola.mp4 62.6 MB
23C3 - 2006/audio/23C3-1629-en-body_hacking.mp3 62.5 MB
19C3 - 2002/video/19C3-434-security-nightmares.mp4 62.4 MB
22C3 - 2005/video/22C3-550-de-epass_und_biop2.mp4 62.4 MB
24C3 - 2007/audio/24c3-2402-en-lightning_talks_2007_day_4.mp3 62.4 MB
28C3 - 2011/audio/28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.ogg 62.4 MB
28C3 - 2011/audio/28c3-4906-en-lightning_talks_day_3_pecha_kucha.ogg 62.3 MB
23C3 - 2006/audio/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3 62.2 MB
34C3 - 2017/34C3 - ASLR on the line - deutsche Ubersetzung.mp4 62.2 MB
24C3 - 2007/video/24c3-2213-de-getting_things_done_high.mp4 62.2 MB
30C3 - 2013/video/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4 62.1 MB
26C3 - 2009/audio/26c3-3668-en-hacker_jeopardy.ogg 62.0 MB
22C3 - 2005/video/22C3-572-en-fuzzy_democracy.mp4 62.0 MB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Three Ways to Enhance Metadata Protection Beyond Tor - secushare.org.mp4 61.9 MB
21C3 - 2004/video/168 Spampolitik.mp4 61.9 MB
32C3 - 2015/video/32c3-7286-en-de-Sin_in_the_time_of_Technology_hd.mp4 61.9 MB
23C3 - 2006/audio/23C3-1604-de-tracking_von_personen_in_videoszenen.mp3 61.8 MB
23C3 - 2006/video/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp4 61.8 MB
30C3 - 2013/video/30c3-5527-en-Basics_of_Digital_Wireless_Communication_h264-hq.mp4 61.8 MB
23C3 - 2006/video/23C3-1667-de-jabber_showcase.mp4 61.8 MB
34C3 - 2017/34C3 - Algorithmic science evaluation and power structure the discourse on strategic citation and.mp4 61.8 MB
19C3 - 2002/video/19C3-402-network-hijacking-workshop.mp4 61.7 MB
34C3 - 2017/34C3 - Algorithmic science evaluation and power structure the discourse on strategic citation and (2).mp4 61.7 MB
23C3 - 2006/audio/23C3-1256-en-who_can_you_trust.mp3 61.7 MB
34C3 - 2017/34C3 - Humans as software extensions - deutsche Ubersetzung.mp4 61.7 MB
23C3 - 2006/video/23C3-1700-en-router_and_infrastructure_hacking.mp4 61.7 MB
23C3 - 2006/video/23C3-1540-de-learn_to_be_honest.mp4 61.6 MB
34C3 - 2017/34C3 - Humans as software extensions - La traduccion espanola.mp4 61.5 MB
26C3 - 2009/audio/26c3-3669-de-hacker_jeopardy.ogg 61.5 MB
30C3 - 2013/video/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4 61.4 MB
23C3 - 2006/video/23C3-1505-de-gaeste_ueberwachung.mp4 61.3 MB
21C3 - 2004/video/046 Tollcollect.mp4 61.2 MB
33C3 - 2016/Geolocation methods in mobile networks (33c3).mp4 61.0 MB
21C3 - 2004/video/308 MD5 To Be Considered Harmful Someday.mp4 60.9 MB
34C3 - 2017/34C3 - Growing Up Software Development - deutsche Ubersetzung.mp4 60.8 MB
23C3 - 2006/audio/23C3-1493-de-virtuelle_sicherheit.mp3 60.8 MB
23C3 - 2006/audio/23C3-1593-de-krypta.mp3 60.8 MB
34C3 - 2017/34C3 - Growing Up Software Development.mp4 60.7 MB
22C3 - 2005/video/22C3-1108-en-black_ops_of_tcp_ip.mp4 60.6 MB
22C3 - 2005/video/22C3-586-en-pypy.mp4 60.6 MB
21C3 - 2004/video/062 Hacking EU funding for a FOSS project.mp4 60.5 MB
23C3 - 2006/audio/23C3-1663-de-tracking_goods_and_tracing_people.mp3 60.4 MB
23C3 - 2006/audio/23C3-1724-en-transparency_and_privacy.mp3 60.3 MB
23C3 - 2006/video/23C3-1709-en-revenge_of_the_female_nerds.mp4 60.3 MB
23C3 - 2006/audio/23C3-1520-en-counter_development.mp3 60.3 MB
34C3 - 2017/34C3 - Modern key distribution with ClaimChain.mp4 60.2 MB
34C3 - 2017/34C3 - Modern key distribution with ClaimChain - deutsche Ubersetzung.mp4 60.2 MB
21C3 - 2004/video/164 Barrierefreies Internet.mp4 60.2 MB
23C3 - 2006/audio/23C3-1688-en-rootkits_as_reversing_tools.mp3 60.2 MB
34C3 - 2017/34C3 - Modern key distribution with ClaimChain - traduction francaise.mp4 60.2 MB
34C3 - 2017/34C3 - Die fabelhafte Welt des Mobilebankings - english translation - YouTube.mp4 60.1 MB
23C3 - 2006/video/23C3-1701-en-open_source_machine_translation.mp4 60.0 MB
24C3 - 2007/video/24c3-2253-en-dining_cryptographers_high.mp4 60.0 MB
22C3 - 2005/video/22C3-464-en-working_memory_mental_imagery.mp4 60.0 MB
32C3 - 2015/video/32c3-7551-en-de-Closing_Event_hd.mp4 60.0 MB
33C3 - 2016/Geolocation methods in mobile networks (33c3) - deutsche Ubersetzung.mp4 60.0 MB
33C3 - 2016/Anthropology for kids - What is privacy (33c3) - deutsche Ubersetzung.mp4 60.0 MB
33C3 - 2016/Anthropology for kids - What is privacy (33c3).mp4 59.9 MB
23C3 - 2006/audio/23C3-1608-en-vehicular_communication_and_vanets.mp3 59.9 MB
23C3 - 2006/audio/23C3-1513-en-detecting_temperature_through_clock_skew.mp3 59.8 MB
34C3 - 2017/34C3 - Humans as software extensions.mp4 59.7 MB
23C3 - 2006/audio/23C3-1568-en-json_rpc.mp3 59.7 MB
23C3 - 2006/audio/23C3-1459-en-sip_security.mp3 59.6 MB
34C3 - 2017/34C3 - ASLR on the line.mp4 59.6 MB
21C3 - 2004/video/044 Machine Learning in Science and Engineering.mp4 59.5 MB
21C3 - 2004/video/310 Information-Wissen-Macht.mp4 59.5 MB
23C3 - 2006/audio/23C3-1733-en-bluetooth_hacking_revisited.mp3 59.5 MB
23C3 - 2006/audio/23C3-1454-en-natural_language_database_interface.mp3 59.5 MB
19C3 - 2002/video/19C3-409-call-center.mp4 59.4 MB
34C3 - 2017/34C3 - Simulating the future of the global agro-food system.mp4 59.4 MB
22C3 - 2005/video/22C3-417-en-learning_js_with_google_maps.mp4 59.4 MB
22C3 - 2005/video/22C3-882-de-biometrics_in_science_fiction.mp4 59.4 MB
22C3 - 2005/video/22C3-801-en-vulnerability_markets.mp4 59.4 MB
23C3 - 2006/audio/23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.mp3 59.4 MB
30C3 - 2013/video/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4 59.4 MB
23C3 - 2006/video/23C3-1740-en-in_the_absence_of_trust.mp4 59.3 MB
31C3 - 2014/video/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_sd.mp4 59.3 MB
19C3 - 2002/video/19C3-479-eu-urheberrechtslinie.mp4 59.2 MB
27C3 - 2010/audio/27c3-4300-en-lightning_talks_d4.ogg 59.2 MB
22C3 - 2005/video/22C3-1134-en-the_silent_decline_of_public_control.mp4 59.2 MB
20C3 - 2003/video/20C3-546-1024_bit_RSA_ist_unsicher.mp4 59.1 MB
22C3 - 2005/video/22C3-1101-en-the_grey_commons.mp4 59.1 MB
19C3 - 2002/video/19C3-483-bsi-zertifizierung.mp4 59.1 MB
23C3 - 2006/audio/23C3-1373-en-hacker_foundation.mp3 59.0 MB
34C3 - 2017/34C3 - Taking a scalpel to QNX - deutsche Ubersetzung.mp4 59.0 MB
24C3 - 2007/video/24c3-2189-en-hidden_trojan_high.mp4 59.0 MB
34C3 - 2017/34C3 - Taking a scalpel to QNX.mp4 59.0 MB
22C3 - 2005/video/22C3-569-en-lojban.mp4 59.0 MB
23C3 - 2006/video/23C3-1640-en-10ge_monitoring_system.mp4 58.9 MB
23C3 - 2006/audio/23C3-1429-de-fnord_jahresrueckblick.mp3 58.8 MB
24C3 - 2007/video/24c3-2364-en-smartcard_protocol_sniffing_high.mp4 58.8 MB
22C3 - 2005/video/22C3-1112-en-modern_disk_encryption.mp4 58.8 MB
33C3 - 2016/Exploiting PHP7 unserialize (33c3) - deutsche Ubersetzung.mp4 58.7 MB
24C3 - 2007/video/24c3-2228-de-lieber_cyborg_als_goettin_high.mp4 58.7 MB
23C3 - 2006/audio/23C3-1603-en-foss_in_india.mp3 58.7 MB
20C3 - 2003/video/20C3-574-Fragen_an_eine_maschinenlesbare_Regierung.mp4 58.7 MB
23C3 - 2006/video/23C3-1523-en-the_rise_and_fall_of_open_source.mp4 58.7 MB
22C3 - 2005/video/22C3-407-en-evocell.mp4 58.6 MB
23C3 - 2006/audio/23C3-1656-en-dylan_network_security.mp3 58.6 MB
34C3 - 2017/34C3 - “Nabovarme” opensource heating infrastructure in Christiania - deutsche Ubersetzung.mp4 58.6 MB
34C3 - 2017/34C3 - Taking a scalpel to QNX - traduction francaise.mp4 58.6 MB
22C3 - 2005/video/22C3-577-de-voip_2005_regulierte_revolution.mp4 58.6 MB
32C3 - 2015/video/32c3-7401-en-de-Internet_Cube_hd.mp4 58.5 MB
20C3 - 2003/video/20C3-623-Softwarekunstprojekt_runme.org.mp4 58.5 MB
22C3 - 2005/video/22C3-888-de-digitale_buergerrechte_in_europa.mp4 58.5 MB
24C3 - 2007/video/24c3-2294-de-23_ways_to_fight_for_your_rights_high.mp4 58.4 MB
34C3 - 2017/34C3 - “Nabovarme” opensource heating infrastructure in Christiania.mp4 58.4 MB
23C3 - 2006/video/23C3-1563-en-funkerspuk.mp4 58.4 MB
23C3 - 2006/audio/23C3-1560-en-csrf.mp3 58.4 MB
34C3 - 2017/34C3 - May contain DTraces of FreeBSD - traduction francaise.mp4 58.4 MB
22C3 - 2005/video/22C3-931-en-changing_realities.mp4 58.4 MB
24C3 - 2007/video/24c3-2280-en-i_know_who_you_clicked_last_summer_high.mp4 58.4 MB
34C3 - 2017/34C3 - May contain DTraces of FreeBSD - deutsche Ubersetzung.mp4 58.3 MB
23C3 - 2006/video/23C3-1493-de-virtuelle_sicherheit.mp4 58.3 MB
19C3 - 2002/video/19C3-488-symbolics-lisp-machines.mp4 58.2 MB
23C3 - 2006/audio/23C3-1708-en-tv_b_gone.mp3 58.2 MB
23C3 - 2006/audio/23C3-1543-de-kollaboratives_wissenmanagement.mp3 58.2 MB
21C3 - 2004/video/246 RFID Technologie und Implikationen.mp4 58.2 MB
22C3 - 2005/video/22C3-585-en-agile_business_and_eu_funding.mp4 58.1 MB
22C3 - 2005/video/22C3-495-de-hash_trust_compute.mp4 58.1 MB
17C3 - 2000/audio/AES.mp3 58.1 MB
22C3 - 2005/video/22C3-1148-de-sicherheitueberwachung.mp4 58.1 MB
22C3 - 2005/video/22C3-800-en-better_code.mp4 58.0 MB
22C3 - 2005/video/22C3-562-en-the_right_track.mp4 58.0 MB
24C3 - 2007/video/24c3-2322-en-infectious_diseases_high.mp4 58.0 MB
22C3 - 2005/video/22C3-390-en-private_investigations.mp4 57.9 MB
19C3 - 2002/video/19C3-433-tcp-ip-fuer-anfaenger.mp4 57.9 MB
22C3 - 2005/video/22C3-772-en-attacking_ipv6.mp4 57.8 MB
23C3 - 2006/audio/23C3-1494-de-ego_striptease.mp3 57.8 MB
22C3 - 2005/video/22C3-602-en-protocols_services_embedded_devices.mp4 57.8 MB
23C3 - 2006/video/23C3-1727-en-closing_ceremony.mp4 57.8 MB
32C3 - 2015/video/32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_hd.mp4 57.7 MB
26C3 - 2009/audio/26c3-3563-en-lightning_talks_-_day_1.ogg 57.7 MB
23C3 - 2006/audio/23C3-1578-de-hacking_fingerprint_recognition_systems.mp3 57.7 MB
28C3 - 2011/audio/28c3-4908-de-jahresrueckblick_2011.ogg 57.7 MB
22C3 - 2005/video/22C3-571-en-understanding_buffer_overflow_exploitation.mp4 57.6 MB
33C3 - 2016/Exploiting PHP7 unserialize (33c3).mp4 57.6 MB
20C3 - 2003/video/20C3-562-Der_Zettel_am_Bildschirm.mp4 57.5 MB
22C3 - 2005/video/22C3-405-en-cybercrime_convention.mp4 57.5 MB
23C3 - 2006/audio/23C3-1478-en-traffic_analysis.mp3 57.5 MB
24C3 - 2007/video/24c3-2358-en-guerilla_knitting_high.mp4 57.5 MB
23C3 - 2006/audio/23C3-1347-en-we_are_great_together.mp3 57.5 MB
26C3 - 2009/audio/26c3-3550-de-chaos-familien-duell.ogg 57.5 MB
32C3 - 2015/audio/32c3-7240-en-Console_Hacking.opus 57.5 MB
23C3 - 2006/audio/23C3-1735-en-faster_pwning_assured.mp3 57.5 MB
22C3 - 2005/video/22C3-530-en-seccode.mp4 57.3 MB
23C3 - 2006/audio/23C3-1473-en-large_scale_internet_content_filtering.mp3 57.2 MB
30C3 - 2013/video/30c3-5607-en-The_Pirate_Cinema_h264-hq.mp4 57.2 MB
24C3 - 2007/video/24c3-2321-en-d_libd_and_the_slate_project_high.mp4 57.1 MB
34C3 - 2017/34C3 - Die fabelhafte Welt des Mobilebankings.mp4 57.1 MB
28C3 - 2011/audio/28c3-4934-en-hacker_jeopardy_translation.ogg 57.0 MB
34C3 - 2017/34C3 - Drones of Power Airborne Wind Energy - deutsche Ubersetzung.mp4 56.9 MB
33C3 - 2016/The 12 Networking Truths (33c3).mp4 56.8 MB
23C3 - 2006/audio/23C3-1487-de-ccc_jahresrueckblick.mp3 56.8 MB
22C3 - 2005/video/22C3-1104-en-search_oracle_society.mp4 56.8 MB
30C3 - 2013/video/30c3-5420-de-en-calcpw_h264-hq.mp4 56.8 MB
22C3 - 2005/video/22C3-1132-de-sony_rootkit.mp4 56.8 MB
22C3 - 2005/video/22C3-470-en-wsis_review.mp4 56.7 MB
32C3 - 2015/video/32c3-7219-en-de-Trust_us_and_our_business_will_expand_hd.mp4 56.7 MB
30C3 - 2013/video/30c3-5614-en-Perfect_Paul_h264-hq.mp4 56.6 MB
24C3 - 2007/video/24c3-2288-de-verschwoerungstheorien_high.mp4 56.5 MB
22C3 - 2005/video/22C3-423-en-corp_vs_corp.mp4 56.5 MB
19C3 - 2002/video/19C3-401-network-hijacking.mp4 56.5 MB
28C3 - 2011/audio/28c3-4775-de-hacker_jeopardy.ogg 56.5 MB
23C3 - 2006/audio/23C3-1515-en-lightning_talks_day_2.mp3 56.4 MB
32C3 - 2015/audio/32c3-7307-en-State_of_the_Onion.opus 56.3 MB
23C3 - 2006/video/23C3-1568-en-json_rpc.mp4 56.3 MB
20C3 - 2003/video/20C3-545-Abschlussveranstaltung_Lockpicking.mp4 56.2 MB
22C3 - 2005/video/22C3-504-en-data_retention.mp4 56.2 MB
24C3 - 2007/video/24c3-2258-en-design_noir_high.mp4 56.2 MB
32C3 - 2015/audio/32c3-7546-de-Security_Nightmares_0x10.opus 56.2 MB
23C3 - 2006/audio/23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.mp3 56.1 MB
23C3 - 2006/audio/23C3-1738-en-mmorpgs.mp3 56.1 MB
19C3 - 2002/video/19C3-400-ipv6-rapid-deployment.mp4 56.0 MB
22C3 - 2005/video/22C3-598-de-literarisches_code_quartett.mp4 55.9 MB
24C3 - 2007/video/24c3-2260-en-to_be_or_i2p_high.mp4 55.8 MB
24C3 - 2007/video/24c3-2287-de-sex20_high.mp4 55.8 MB
19C3 - 2002/video/19C3-442-lawful-interception-europe.mp4 55.8 MB
22C3 - 2005/video/22C3-605-de-hacking_cctv.mp4 55.8 MB
34C3 - 2017/34C3 - Organisational Structures for Sustainable Free Software Development.mp4 55.7 MB
34C3 - 2017/34C3 - Organisational Structures for Sustainable Free Software Development - deutsche Ubersetzung.mp4 55.6 MB
19C3 - 2002/video/19C3-430-icann-status-quo.mp4 55.5 MB
22C3 - 2005/video/22C3-1085-en-technological_art.mp4 55.5 MB
23C3 - 2006/video/23C3-1373-en-hacker_foundation.mp4 55.5 MB
22C3 - 2005/video/22C3-788-en-the_future_of_virtualization.mp4 55.5 MB
34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas - traduction francaise.mp4 55.5 MB
32C3 - 2015/video/32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_hd.mp4 55.4 MB
23C3 - 2006/audio/23C3-1728-en-23c3_network_review.mp3 55.4 MB
22C3 - 2005/video/22C3-429-en-w3c_web.mp4 55.4 MB
23C3 - 2006/audio/23C3-1685-de-go_menschen.mp3 55.4 MB
23C3 - 2006/audio/23C3-1646-en-dvb_t.mp3 55.3 MB
23C3 - 2006/audio/23C3-1514-en-lightning_talks_day_1.mp3 55.3 MB
34C3 - 2017/34C3 - DPRK Consumer Technology - deutsche Ubersetzung.mp4 55.3 MB
30C3 - 2013/video/30c3-5547-en-Turing_Complete_User_h264-hq.mp4 55.2 MB
20C3 - 2003/video/20C3-603-Spam_Analyse.mp4 55.2 MB
22C3 - 2005/video/22C3-785-de-anon_tor_jap.mp4 55.1 MB
34C3 - 2017/34C3 - International Image Interoperability Framework (IIIF) - Kulturinstitutionen schaffen interop.mp4 55.1 MB
34C3 - 2017/34C3 - DPRK Consumer Technology - traduction francaise.mp4 55.1 MB
22C3 - 2005/video/22C3-781-en-bad_trips.mp4 55.0 MB
20C3 - 2003/audio/20c3_611_Hacker-Jeopardy.ogg 55.0 MB
34C3 - 2017/34C3 - International Image Interoperability Framework (IIIF) - Kulturinstitutionen schaffen interop (2).mp4 55.0 MB
23C3 - 2006/video/23C3-1644-en-sflow.mp4 55.0 MB
22C3 - 2005/video/22C3-933-en-w3c_mobil_css_multimodal.mp4 55.0 MB
34C3 - 2017/34C3 - May contain DTraces of FreeBSD.mp4 55.0 MB
34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig - traduction francaise.mp4 54.9 MB
23C3 - 2006/audio/23C3-1433-en-design_a_decent_user_interface.mp3 54.9 MB
32C3 - 2015/video/32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_hd.mp4 54.8 MB
19C3 - 2002/video/19C3-506-detecting-ddos-attacks.mp4 54.8 MB
22C3 - 2005/video/22C3-1098-en-internet_voting_in_estonia.mp4 54.8 MB
19C3 - 2002/video/19C3-448-zero-tool-hacking.mp4 54.8 MB
23C3 - 2006/video/23C3-1735-en-faster_pwning_assured.mp4 54.7 MB
33C3 - 2016/A Data Point Walks Into a Bar (33c3).mp4 54.6 MB
22C3 - 2005/video/22C3-505-en-collateral_damage.mp4 54.6 MB
34C3 - 2017/34C3 - Drones of Power Airborne Wind Energy.mp4 54.6 MB
31C3 - 2014/video/31c3-6202-en-de-Privacy_and_Consumer_Markets_sd.mp4 54.6 MB
23C3 - 2006/video/23C3-1422-en-pornography_and_technology.mp4 54.5 MB
24C3 - 2007/video/24c3-2360-en-all_tomorrows_high.mp4 54.4 MB
23C3 - 2006/video/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp4 54.4 MB
24C3 - 2007/video/24c3-2235-en-one_token_to_rule_them_all_high.mp4 54.4 MB
23C3 - 2006/audio/23C3-1627-en-software_reliability.mp3 54.3 MB
30C3 - 2013/audio/30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__opus.opus 54.3 MB
33C3 - 2016/The Nibbletronic (33c3).mp4 54.2 MB
22C3 - 2005/video/22C3-336-en-nanotechnology.mp4 54.2 MB
34C3 - 2017/34C3 - hacking disaster.mp4 54.1 MB
21C3 - 2004/video/130 Physical Security Pt 2.mp4 54.1 MB
33C3 - 2016/Interplanetary Colonization (33c3).mp4 54.1 MB
23C3 - 2006/audio/23C3-1655-de-elektronische_reisedokumente.mp3 54.1 MB
33C3 - 2016/Memory Deduplication The Curse that Keeps on Giving (33c3).mp4 54.1 MB
22C3 - 2005/video/22C3-479-en-fair_code.mp4 54.1 MB
20C3 - 2003/video/20C3-577-Secure_Internet_live_conferencing_with_SILC.mp4 54.1 MB
22C3 - 2005/video/22C3-588-en-robots_for_fun_and_research.mp4 54.0 MB
22C3 - 2005/video/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.mp4 54.0 MB
22C3 - 2005/video/22C3-782-de-urheberrecht.mp4 54.0 MB
28C3 - 2011/audio/28c3-4905-en-lightning_talks_day_2.ogg 53.9 MB
19C3 - 2002/video/19C3-480-one-time-crypto.mp4 53.8 MB
28C3 - 2011/video/28c3-4910-de-demokratie_auf_saechsisch_h264.mp4 53.8 MB
32C3 - 2015/audio/32c3-7225-de-Grundrechte_gelten_nicht_im_Weltall.opus 53.7 MB
23C3 - 2006/audio/23C3-1492-en-dying_giraffe_recordings.mp3 53.7 MB
22C3 - 2005/video/22C3-580-en-wartracking.mp4 53.7 MB
22C3 - 2005/video/22C3-424-en-the_very_early_computer_game_history.mp4 53.7 MB
22C3 - 2005/video/22C3-521-de-transparenz_der_verantwortung_in_behoerden.mp4 53.6 MB
23C3 - 2006/audio/23C3-1500-en-hackerspaces.mp3 53.6 MB
22C3 - 2005/video/22C3-1094-de-biop_2_studie.mp4 53.6 MB
22C3 - 2005/video/22C3-768-en-free_software_gsm_phone.mp4 53.5 MB
22C3 - 2005/video/22C3-596-en-blackberry.mp4 53.4 MB
23C3 - 2006/audio/23C3-1670-de-barrierefreies_web.mp3 53.4 MB
30C3 - 2013/video/30c3-5474-en-World_War_II_Hackers_h264-hq.mp4 53.4 MB
25C3 - 2008/audio/25c3-3024-de-jahresrueckblick.ogg 53.4 MB
31C3 - 2014/video/31c3-6554-en-de-Automatically_Subtitling_the_C3_sd.mp4 53.3 MB
22C3 - 2005/video/22C3-517-en-free_software_and_anarchism.mp4 53.3 MB
34C3 - 2017/34C3 - The Noise Protocol Framework - deutsche Ubersetzung.mp4 53.3 MB
22C3 - 2005/video/22C3-478-en-desaster_areas.mp4 53.3 MB
34C3 - 2017/34C3 - WHWP - english translation.mp4 53.3 MB
33C3 - 2016/The Universe Is, Like, Seriously Huge (33c3).mp4 53.3 MB
22C3 - 2005/video/22C3-408-en-private_investigations_in_searching.mp4 53.2 MB
22C3 - 2005/video/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.mp4 53.2 MB
22C3 - 2005/video/22C3-599-en-seaside_squeak.mp4 53.2 MB
32C3 - 2015/audio/32c3-7374-en-The_architecture_of_a_street_level_panopticon.opus 53.2 MB
24C3 - 2007/audio/24c3-2352-de-hacker_jeopardy.mp3 53.1 MB
31C3 - 2014/audio/31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_opus.opus 53.1 MB
31C3 - 2014/audio/31c3-6251-en-de-State_of_the_Onion_opus.opus 53.0 MB
22C3 - 2005/video/22C3-568-en-eu_data_retention_proposals.mp4 53.0 MB
21C3 - 2004/video/070 Fnord-Jahresrueckblick.mp4 53.0 MB
34C3 - 2017/34C3 - library operating systems - traduction francaise.mp4 52.9 MB
34C3 - 2017/34C3 - Der netzpolitische Wetterbericht - english translation.mp4 52.9 MB
21C3 - 2004/video/138 Protesting in the new Millenium.mp4 52.8 MB
23C3 - 2006/audio/23C3-1607-de-probabilistic_trust_model_for_gnupg.mp3 52.8 MB
22C3 - 2005/video/22C3-1103-en-community_mesh_networking.mp4 52.7 MB
34C3 - 2017/34C3 - DPRK Consumer Technology.mp4 52.7 MB
20C3 - 2003/audio/20c3_609_Security_Nightmares-III.ogg 52.7 MB
34C3 - 2017/34C3 - Italy's surveillance toolbox - deutsche Ubersetzung.mp4 52.7 MB
21C3 - 2004/audio/095 Security Nightmares 2005.mp3 52.7 MB
19C3 - 2002/video/19C3-508-amateurfunk.mp4 52.7 MB
22C3 - 2005/audio/22C3-546-de-gesundheitskarte.m4a 52.7 MB
34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas.mp4 52.6 MB
19C3 - 2002/video/19C3-381-blinkenlights-arcade.mp4 52.6 MB
29C3 - 2012/audio/29c3-5379-de-en-jahresrueckblick2012_ogg.ogg 52.6 MB
23C3 - 2006/audio/23C3-1713-en-black_ops_2006.mp3 52.6 MB
34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig.mp4 52.5 MB
34C3 - 2017/34C3 - Privacy Shield - Lipstick on a Pig - deutsche Ubersetzung.mp4 52.5 MB
34C3 - 2017/34C3 - Uncovering British spies’ web of sockpuppet social media personas - deutsche Ubersetzung.mp4 52.4 MB
22C3 - 2005/video/22C3-508-en-media_system_deployment.mp4 52.3 MB
32C3 - 2015/audio/32c3-7386-en-Crypto_Wars_Part_II.opus 52.2 MB
22C3 - 2005/video/22C3-603-de-hacking_tomtom_go.mp4 52.2 MB
33C3 - 2016/Tapping into the core (33c3).mp4 52.2 MB
23C3 - 2006/audio/23C3-1540-de-learn_to_be_honest.mp3 52.2 MB
19C3 - 2002/video/19C3-494-x86_64-ia64-architecture.mp4 52.1 MB
23C3 - 2006/audio/23C3-1505-de-gaeste_ueberwachung.mp3 52.1 MB
30C3 - 2013/video/30c3-5405-en-Data_Mining_for_Good_h264-hq.mp4 52.1 MB
28C3 - 2011/audio/28c3-4721-en-pentanews_game_show_2k11.ogg 52.0 MB
23C3 - 2006/audio/23C3-1596-en-openxpki.mp3 52.0 MB
23C3 - 2006/audio/23C3-1416-de-wlan_schwarzsurfen_und_das_recht.mp3 52.0 MB
19C3 - 2002/video/19C3-412-lockpicking.mp4 52.0 MB
24C3 - 2007/video/24c3-2296-en-random_things_high.mp4 51.9 MB
32C3 - 2015/audio/32c3-7343-en-Beyond_Anti_Evil_Maid.opus 51.9 MB
22C3 - 2005/video/22C3-561-en-intrusion_detection_systems.mp4 51.9 MB
22C3 - 2005/video/22C3-513-en-military_intelligence.mp4 51.9 MB
29C3 - 2012/audio/29c3-5419-de-podcaster_workshop_ogg.ogg 51.9 MB
19C3 - 2002/audio/19C3-399-xbox-linux.mp3 51.8 MB
22C3 - 2005/video/22C3-473-en-privaterra.mp4 51.7 MB
21C3 - 2004/video/278 TKUeV-Das Ohr am Draht.mp4 51.7 MB
32C3 - 2015/audio/32c3-7322-en-Tor_onion_services_more_useful_than_you_think.opus 51.6 MB
23C3 - 2006/audio/23C3-1642-en-unlocking_filevault.mp3 51.6 MB
21C3 - 2004/video/129 Die Propagandawueste des realen Krieges.mp4 51.5 MB
22C3 - 2005/video/22C3-778-de-zauberhafte_naturwissenschaften.mp4 51.4 MB
32C3 - 2015/audio/32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_opus.opus 51.4 MB
22C3 - 2005/video/22C3-543-en-i_see_airplanes.mp4 51.3 MB
34C3 - 2017/34C3 - WHWP.mp4 51.3 MB
22C3 - 2005/video/22C3-567-en-3g_investigations.mp4 51.3 MB
23C3 - 2006/audio/23C3-1602-en-subverting_ajax.mp3 51.2 MB
34C3 - 2017/34C3 - library operating systems.mp4 51.1 MB
22C3 - 2005/video/22C3-549-en-digital_identity.mp4 51.1 MB
23C3 - 2006/audio/23C3-1709-en-revenge_of_the_female_nerds.mp3 51.0 MB
34C3 - 2017/34C3 - library operating systems - deutsche Ubersetzung.mp4 51.0 MB
23C3 - 2006/audio/23C3-1652-de-geschichte_der_automaten.mp3 51.0 MB
34C3 - 2017/34C3 - How can you trust formally verified software - deutsche Ubersetzung.mp4 51.0 MB
22C3 - 2005/video/22C3-529-en-muxtcp.mp4 51.0 MB
23C3 - 2006/video/23C3-1512-de-homegrown_interactive_tables.mp4 51.0 MB
32C3 - 2015/audio/32c3-7207-en-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time.opus 51.0 MB
19C3 - 2002/video/19C3-415-biometrie.mp4 51.0 MB
30C3 - 2013/video/30c3-5494-en-Nerds_in_the_news_h264-hq.mp4 50.9 MB
30C3 - 2013/video/30c3-5469-de-en-2_Takte_spaeter_h264-hq.mp4 50.9 MB
24C3 - 2007/video/24c3-2216-de-erlang_high.mp4 50.9 MB
24C3 - 2007/audio/24c3-2336-de-security_nightmares.mp3 50.8 MB
20C3 - 2003/audio/20c3_542_Trusted-or-Treacherous.ogg 50.8 MB
33C3 - 2016/33C3 Opening Ceremony - traduction française (33c3).mp4 50.8 MB
33C3 - 2016/Gone in 60 Milliseconds (33c3).mp4 50.8 MB
22C3 - 2005/video/22C3-511-de-videoueberwachung_hochschulen.mp4 50.7 MB
23C3 - 2006/audio/23C3-1342-en-botnet_detection.mp3 50.7 MB
32C3 - 2015/audio/32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_opus.opus 50.7 MB
21C3 - 2004/video/067 Inside PDF.mp4 50.7 MB
22C3 - 2005/video/22C3-490-de-data_mining_weltfrieden.mp4 50.6 MB
23C3 - 2006/audio/23C3-1616-de-nerds_und_geeks.mp3 50.6 MB
23C3 - 2006/audio/23C3-1758-en-fuzzing_corporate_world.mp3 50.6 MB
22C3 - 2005/video/22C3-1084-de-informationsfreiheitsgesetz.mp4 50.6 MB
21C3 - 2004/video/178 Humanoid Robots.mp4 50.4 MB
34C3 - 2017/34C3 - The Noise Protocol Framework.mp4 50.4 MB
19C3 - 2002/video/19C3-495-sctp.mp4 50.4 MB
32C3 - 2015/audio/32c3-7438-en-goto_fail.opus 50.3 MB
21C3 - 2004/video/174 Lobbying fuer Nerds.mp4 50.3 MB
23C3 - 2006/audio/23C3-1561-de-big_brother_awards.mp3 50.3 MB
22C3 - 2005/video/22C3-535-en-old_skewl_hacking.mp4 50.2 MB
23C3 - 2006/audio/23C3-1622-en-void_the_warranty.mp3 50.2 MB
24C3 - 2007/video/24c3-2256-de-openser_sip_server_high.mp4 50.2 MB
34C3 - 2017/34C3 - Der netzpolitische Wetterbericht.mp4 50.2 MB
23C3 - 2006/audio/23C3-1640-en-10ge_monitoring_system.mp3 50.2 MB
17C3 - 2000/audio/Tron-Diskussion.mp3 50.2 MB
34C3 - 2017/34C3 - Italy's surveillance toolbox.mp4 50.2 MB
21C3 - 2004/video/059 Wikipedia Sociographics.mp4 50.1 MB
23C3 - 2006/audio/23C3-1563-en-funkerspuk.mp3 50.0 MB
31C3 - 2014/audio/31c3-5931-en-de-Telescope_Making_opus.opus 50.0 MB
34C3 - 2017/34C3 - SatNOGS Crowd-sourced satellite operations - deutsche Ubersetzung.mp4 50.0 MB
33C3 - 2016/Privatisierung der Rechtsdurchsetzung (33c3).mp4 49.9 MB
23C3 - 2006/video/23C3-1627-en-software_reliability.mp4 49.9 MB
33C3 - 2016/Code BROWN in the Air (33c3) - deutsche Ubersetzung.mp4 49.8 MB
17C3 - 2000/video/17C3_illuminatus.mp4 49.8 MB
30C3 - 2013/video/30c3-5479-en-Building_a_safe_NFC_ticketing_system_h264-hq.mp4 49.8 MB
22C3 - 2005/video/22C3-915-en-lightning_talk_day_4.mp4 49.7 MB
19C3 - 2002/video/19C3-521-big-brother-awards-discussion.mp4 49.7 MB
32C3 - 2015/audio/32c3-7443-en-The_Price_Of_Dissent.opus 49.7 MB
34C3 - 2017/34C3 - Eröffnung tuwat - english translation.mp4 49.5 MB
24C3 - 2007/video/24c3-2212-en-unusual_web_bugs_high.mp4 49.5 MB
34C3 - 2017/34C3 - Eröffnung tuwat - traduction francaise.mp4 49.5 MB
34C3 - 2017/34C3 - Extended DNA Analysis - deutsche Ubersetzung.mp4 49.5 MB
34C3 - 2017/34C3 - Eröffnung tuwat.mp4 49.5 MB
32C3 - 2015/audio/32c3-7305-en-Quantum_Cryptography.opus 49.4 MB
24C3 - 2007/video/24c3-2252-en-ruby_on_rails_security_high.mp4 49.4 MB
24C3 - 2007/video/24c3-2131-en-port_scanning_improved_high.mp4 49.4 MB
22C3 - 2005/video/22C3-553-en-syscall_proxying.mp4 49.4 MB
22C3 - 2005/video/22C3-544-en-applied_machine_learning.mp4 49.3 MB
22C3 - 2005/video/22C3-563-en-real_life_bug_finding_in_win32.mp4 49.3 MB
19C3 - 2002/audio/19C3-517-eu-data-retention.mp3 49.3 MB
34C3 - 2017/34C3 - Extended DNA Analysis.mp4 49.2 MB
32C3 - 2015/audio/32c3-7341-en-So_you_want_to_build_a_satellite.opus 49.2 MB
22C3 - 2005/video/22C3-499-en-access_to_knowledge.mp4 49.2 MB
22C3 - 2005/video/22C3-1111-de-hexenbesen_und_heiliger_gral.mp4 49.2 MB
32C3 - 2015/audio/32c3-7483-en-Computational_Meta-Psychology.opus 49.2 MB
23C3 - 2006/audio/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp3 49.2 MB
29C3 - 2012/video/29c3-5210-en-on_breaking_saml_h264.mp4 49.1 MB
33C3 - 2016/Machine Dreams (33c3) - deutsche Ubersetzung.mp4 49.1 MB
22C3 - 2005/video/22C3-468-en-lawful_interception_of_voip_networks.mp4 49.1 MB
21C3 - 2004/video/029 Robocup.mp4 49.1 MB
31C3 - 2014/audio/31c3-2000-de-Erste_Stunden_der_Zweisamkeit_opus.opus 49.0 MB
29C3 - 2012/audio/29c3-5037-de-en-nougatbytes10_ogg.ogg 49.0 MB
32C3 - 2015/audio/32c3-7562-de-Jugend_hackt_2015.opus 49.0 MB
32C3 - 2015/audio/32c3-7252-en-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale.opus 49.0 MB
32C3 - 2015/audio/32c3-7403-en-A_New_Kid_on_the_Block.opus 49.0 MB
24C3 - 2007/video/24c3-2166-en-embedded_devices_reverse_engineering_high.mp4 49.0 MB
28C3 - 2011/audio/28c3-4722-de-dick_size_war_for_nerds.ogg 48.9 MB
31C3 - 2014/audio/31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_opus.opus 48.9 MB
19C3 - 2002/audio/19C3-366-tcpa.mp3 48.9 MB
33C3 - 2016/Saving the World with (Vegan) Science (33c3) - deutsche Ubersetzung.mp4 48.8 MB
23C3 - 2006/video/23C3-1342-en-botnet_detection.mp4 48.8 MB
32C3 - 2015/audio/32c3-7523-en-DDoS_mitigation_EPIC_FAIL_collection.opus 48.7 MB
20C3 - 2003/video/20C3-599-Softwarepatente.mp4 48.7 MB
19C3 - 2002/video/19C3-386-spam-prevention.mp4 48.7 MB
23C3 - 2006/audio/23C3-1698-en-culture_jamming_discordianism.mp3 48.7 MB
32C3 - 2015/audio/32c3-7561-en-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse.opus 48.7 MB
27C3 - 2010/audio/27c3-4298-de-ccc_jahresrueckblick_2010.ogg 48.7 MB
22C3 - 2005/video/22C3-565-en-voiphreaking.mp4 48.6 MB
32C3 - 2015/audio/32c3-7538-en-Internet_Landscapes_opus.opus 48.6 MB
23C3 - 2006/audio/23C3-1759-de-schlossoeffnung_staatssicherheit.mp3 48.6 MB
23C3 - 2006/audio/23C3-1678-de-kritik_an_den_illuminaten.mp3 48.6 MB
33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3) - traduction française.mp4 48.5 MB
22C3 - 2005/video/22C3-1083-en-informational_cognitive_capitalism.mp4 48.5 MB
31C3 - 2014/audio/31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_opus.opus 48.5 MB
34C3 - 2017/34C3 - Demystifying Network Cards - traduction francaise.mp4 48.5 MB
32C3 - 2015/audio/32c3-7260-en-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for.opus 48.4 MB
22C3 - 2005/video/22C3-466-en-hacking_data_retention.mp4 48.4 MB
31C3 - 2014/audio/31c3-6043-en-de-The_Maker_movement_meets_patent_law_opus.opus 48.3 MB
33C3 - 2016/Code BROWN in the Air (33c3).mp4 48.3 MB
22C3 - 2005/video/22C3-1099-en-hacking_openwrt.mp4 48.3 MB
22C3 - 2005/video/22C3-1078-en-wifi_long_shots.mp4 48.3 MB
24C3 - 2007/audio/24c3-2203-de-chaos_jahresrueckblick.mp3 48.3 MB
33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3).mp4 48.2 MB
32C3 - 2015/audio/32c3-7323-de-Wie_man_einen_Blackout_verursacht.opus 48.2 MB
23C3 - 2006/audio/23C3-1402-de-drones.mp3 48.1 MB
34C3 - 2017/34C3 - How can you trust formally verified software.mp4 48.1 MB
32C3 - 2015/audio/32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone.opus 48.0 MB
23C3 - 2006/audio/23C3-1419-de-java_wird_groovy.mp3 48.0 MB
32C3 - 2015/audio/32c3-7216-en-CHINTERNET_ART.opus 47.9 MB
20C3 - 2003/audio/20c3_589_AN.ON-and-the-futureof-anonymziers.ogg 47.9 MB
33C3 - 2016/Retail Surveillance Retail Countersurveillance (33c3).mp4 47.9 MB
23C3 - 2006/audio/23C3-1606-en-console_hacking_2006.mp3 47.9 MB
34C3 - 2017/34C3 - End-to-end formal ISA verification of RISC-V processors with riscv-formal - deutsche Uberset.mp4 47.9 MB
32C3 - 2015/audio/32c3-7555-en-32C3_Infrastructure_Review.opus 47.9 MB
24C3 - 2007/video/24c3-2303-en-inside_the_macosx_kernel_high.mp4 47.9 MB
34C3 - 2017/34C3 - End-to-end formal ISA verification of RISC-V processors with riscv-formal.mp4 47.8 MB
32C3 - 2015/audio/32c3-7412-en-Running_your_own_3G_35G_network.opus 47.8 MB
30C3 - 2013/video/30c3-5595-en-The_ArduGuitar_h264-hq.mp4 47.8 MB
19C3 - 2002/video/19C3-374-ccc-geschichte.mp4 47.7 MB
29C3 - 2012/audio/29c3-5198-de-en-fnord_jahresrueckblick2012_ogg.ogg 47.7 MB
20C3 - 2003/audio/20c3_568_Data-Mining-und-intelligence-Software.ogg 47.7 MB
33C3 - 2016/Saving the World with (Vegan) Science (33c3).mp4 47.6 MB
32C3 - 2015/audio/32c3-7171-en-When_hardware_must_just_work.opus 47.6 MB
32C3 - 2015/audio/32c3-7356-en-Top_X_usability_obstacles.opus 47.6 MB
30C3 - 2013/video/30c3-5536-en-Long_Distance_Quantum_Communication_h264-hq.mp4 47.6 MB
31C3 - 2014/audio/31c3-6571-en-31C3_Keynote_opus.opus 47.6 MB
22C3 - 2005/video/22C3-593-en-software_patenting.mp4 47.6 MB
32C3 - 2015/audio/32c3-7482-en-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives.opus 47.5 MB
32C3 - 2015/audio/32c3-7432-en-Datahavens_from_HavenCo_to_Today.opus 47.5 MB
33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3) - deutsche Ubersetzung.mp4 47.4 MB
22C3 - 2005/video/22C3-791-de-big_brother_awards.mp4 47.4 MB
19C3 - 2002/video/19C3-498-freedom-cpu.mp4 47.4 MB
30C3 - 2013/video/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4 47.3 MB
17C3 - 2000/audio/erratik.mp3 47.3 MB
32C3 - 2015/audio/32c3-7565-en-Keynote_opus.opus 47.3 MB
21C3 - 2004/video/080 USB-Unbekannter Serieller Bus.mp4 47.3 MB
34C3 - 2017/34C3 - SatNOGS Crowd-sourced satellite operations.mp4 47.3 MB
21C3 - 2004/video/123 Gentoo Hardened.mp4 47.3 MB
21C3 - 2004/video/133 How to Herd Cats.mp4 47.3 MB
32C3 - 2015/audio/32c3-7210-en-PQCHacks.opus 47.3 MB
32C3 - 2015/audio/32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_opus.opus 47.2 MB
32C3 - 2015/audio/32c3-7525-de-Quantenphysik_und_Kosmologie.opus 47.2 MB
24C3 - 2007/video/24c3-2367-en-closing_event_high.mp4 47.2 MB
32C3 - 2015/audio/32c3-7162-en-Shooting_lasers_into_space_-_for_science.opus 47.2 MB
23C3 - 2006/audio/23C3-1498-en-mining_aol_search_queries.mp3 47.2 MB
19C3 - 2002/video/19C3-489-big-brother-awards.mp4 47.1 MB
19C3 - 2002/video/19C3-460-isp-user-profiles.mp4 47.1 MB
21C3 - 2004/audio/066 Bluetooth Hacking.mp3 47.1 MB
19C3 - 2002/audio/19C3-443-how-to-find-anything-on-the-web.mp3 47.0 MB
24C3 - 2007/video/24c3-2353-en-from_ring_zero_to_uid_zero_high.mp4 47.0 MB
31C3 - 2014/audio/31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_opus.opus 46.9 MB
23C3 - 2006/video/23C3-1555-de-konrad_zuse_der_rechnende_raum.mp4 46.9 MB
23C3 - 2006/audio/23C3-1461-en-the_grim_meathook_future.mp3 46.9 MB
34C3 - 2017/34C3 - Demystifying Network Cards.mp4 46.8 MB
32C3 - 2015/audio/32c3-7196-en-How_the_Great_Firewall_discovers_hidden_circumvention_servers.opus 46.8 MB
22C3 - 2005/video/22C3-867-de-have_you_hugged_your_mac_today.mp4 46.8 MB
23C3 - 2006/audio/23C3-1554-de-ethernet_mit_mikrocontrollern.mp3 46.8 MB
34C3 - 2017/34C3 - Demystifying Network Cards - deutsche Ubersetzung.mp4 46.7 MB
24C3 - 2007/video/24c3-2247-en-breaking_a_vm_high.mp4 46.7 MB
19C3 - 2002/video/19C3-464-stego-analyse.mp4 46.6 MB
32C3 - 2015/audio/32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_opus.opus 46.6 MB
22C3 - 2005/video/22C3-532-de-lyrical_i.mp4 46.6 MB
31C3 - 2014/audio/31c3-6122-en-de-Mobile_self-defense_opus.opus 46.6 MB
22C3 - 2005/video/22C3-461-en-peer_to_peer_under_the_hood.mp4 46.6 MB
34C3 - 2017/34C3 - Regulating Autonomous Weapons.mp4 46.6 MB
23C3 - 2006/audio/23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.mp3 46.6 MB
34C3 - 2017/34C3 - Regulating Autonomous Weapons - deutsche Ubersetzung.mp4 46.6 MB
32C3 - 2015/audio/32c3-7150-de-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik.opus 46.6 MB
34C3 - 2017/34C3 - Regulating Autonomous Weapons - traduction francaise.mp4 46.5 MB
22C3 - 2005/video/22C3-489-en-hacking_health.mp4 46.5 MB
34C3 - 2017/34C3 - Hardening Open Source Development - deutsche Ubersetzung.mp4 46.5 MB
31C3 - 2014/audio/31c3-6240-en-Reproducible_Builds_opus.opus 46.4 MB
33C3 - 2016/Der 33 JahrerUckblick (33c3) - deutsche Ubersetzung.mp4 46.3 MB
31C3 - 2014/audio/31c3-6547-en-de-Exploit_in_theater_opus.opus 46.3 MB
31C3 - 2014/audio/31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_opus.opus 46.3 MB
32C3 - 2015/audio/32c3-7218-en-A_Dozen_Years_of_Shellphish.opus 46.3 MB
29C3 - 2012/audio/29c3-5244-de-en-security_nightmares2012_ogg.ogg 46.3 MB
31C3 - 2014/audio/31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_opus.opus 46.3 MB
32C3 - 2015/audio/32c3-7389-en-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands.opus 46.2 MB
23C3 - 2006/audio/23C3-1644-en-sflow.mp3 46.2 MB
22C3 - 2005/video/22C3-769-en-rfid_protocols.mp4 46.2 MB
19C3 - 2002/video/19C3-500-c-optimizations.mp4 46.2 MB
34C3 - 2017/34C3 - Schreibtisch-Hooligans - english translation.mp4 46.1 MB
31C3 - 2014/audio/31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus 46.1 MB
31C3 - 2014/audio/31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_opus.opus 46.1 MB
31C3 - 2014/audio/31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_opus.opus 46.1 MB
22C3 - 2005/video/22C3-482-de-atmel_avr_for_dummies.mp4 46.1 MB
22C3 - 2005/video/22C3-498-de-paper_prototyping_workshop.mp4 46.1 MB
32C3 - 2015/audio/32c3-7368-en-Shopshifting.opus 46.0 MB
34C3 - 2017/34C3 - Schreibtisch-Hooligans.mp4 46.0 MB
32C3 - 2015/audio/32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_opus.opus 45.9 MB
32C3 - 2015/video/32c3-7550-en-Opening_Event_hd.mp4 45.9 MB
31C3 - 2014/audio/31c3-6258-en-Reconstructing_narratives_opus.opus 45.9 MB
31C3 - 2014/audio/31c3-6195-en-The_Cloud_Conspiracy_2008-2014_opus.opus 45.9 MB
23C3 - 2006/audio/23C3-1502-en-the_gift_of_sharing.mp3 45.8 MB
32C3 - 2015/audio/32c3-7387-en-Net_Neutrality_in_Europe.opus 45.8 MB
23C3 - 2006/audio/23C3-1699-en-drm_comes_to_european_digital_tv.mp3 45.8 MB
32C3 - 2015/audio/32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_opus.opus 45.7 MB
34C3 - 2017/34C3 - Afro TECH - deutsche Ubersetzung.mp4 45.7 MB
34C3 - 2017/34C3 - Afro TECH.mp4 45.6 MB
32C3 - 2015/audio/32c3-7231-en-CloudABI.opus 45.6 MB
33C3 - 2016/Der 33 JahrerUckblick (33c3).mp4 45.6 MB
30C3 - 2013/audio/30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_opus.opus 45.6 MB
23C3 - 2006/audio/23C3-1545-en-advanced_attacks_against_pocketpc_phones.mp3 45.6 MB
31C3 - 2014/audio/31c3-6600-en-de-Tell_no-one_opus.opus 45.6 MB
21C3 - 2004/video/064 Trusted Computing.mp4 45.6 MB
24C3 - 2007/video/24c3-2190-en-introduction_in_mems_high.mp4 45.5 MB
32C3 - 2015/audio/32c3-7165-en-Vehicle2Vehicle_Communication_based_on_IEEE_80211p.opus 45.5 MB
32C3 - 2015/audio/32c3-7153-en-de-rad1o_opus.opus 45.5 MB
22C3 - 2005/video/22C3-428-en-hacking_challenge.mp4 45.5 MB
32C3 - 2015/audio/32c3-7273-en-Unpatchable.opus 45.4 MB
22C3 - 2005/video/22C3-531-en-hopalong_casualty.mp4 45.4 MB
32C3 - 2015/audio/32c3-7154-en-Iridium_Update.opus 45.4 MB
30C3 - 2013/video/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4 45.4 MB
31C3 - 2014/audio/31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_opus.opus 45.4 MB
23C3 - 2006/audio/23C3-1452-de-critical_theory_and_chaos.mp3 45.3 MB
31C3 - 2014/audio/31c3-6123-en-de-Freedom_in_your_computer_and_in_the_net_opus.opus 45.3 MB
23C3 - 2006/audio/23C3-1658-en-bignum_arithmetic.mp3 45.3 MB
28C3 - 2011/audio/28c3-4898-de-security_nightmares.ogg 45.3 MB
32C3 - 2015/audio/32c3-7243-en-Gibberish_Detection_102.opus 45.3 MB
24C3 - 2007/audio/24c3-2356-en-computer_popsongs.mp3 45.3 MB
22C3 - 2005/video/22C3-871-en-honeymonkeys.mp4 45.3 MB
31C3 - 2014/audio/31c3-6142-en-de-Space_Hacker_opus.opus 45.3 MB
28C3 - 2011/audio/28c3-4937-en-security_nightmares.ogg 45.3 MB
33C3 - 2016/The Clash of Digitalizations (33c3).mp4 45.2 MB
22C3 - 2005/video/22C3-765-en-magnetic_stripe_technology.mp4 45.2 MB
22C3 - 2005/video/22C3-556-en-preventing_buffer_overflows.mp4 45.2 MB
32C3 - 2015/audio/32c3-7333-en-The_Magic_World_of_Searchable_Symmetric_Encryption.opus 45.2 MB
33C3 - 2016/Shut Up and Take My Money! (33c3) - deutsche Ubersetzung.mp4 45.2 MB
32C3 - 2015/audio/32c3-7567-de-Katastrophe_und_Kommunikation.opus 45.1 MB
33C3 - 2016/Pegasus internals (33c3).mp4 45.1 MB
21C3 - 2004/audio/090 Hacktivity.mp3 45.1 MB
31C3 - 2014/audio/31c3-6175-en-Superheroes_Still_Need_Phoneboxes_opus.opus 45.1 MB
32C3 - 2015/audio/32c3-7174-en-Lifting_the_Fog_on_Red_Star_OS.opus 45.0 MB
31C3 - 2014/audio/31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_opus.opus 45.0 MB
31C3 - 2014/audio/31c3-6397-en-de-Lets_Encrypt_opus.opus 44.9 MB
22C3 - 2005/video/22C3-575-en-the_realtime_thing.mp4 44.9 MB
21C3 - 2004/video/097 Das Literarische Code-Quartett.mp4 44.9 MB
32C3 - 2015/audio/32c3-7342-en-Household_Totalitarianism_and_Cyberspace.opus 44.8 MB
31C3 - 2014/audio/31c3-6084-en-Uncaging_Microchips_opus.opus 44.8 MB
32C3 - 2015/audio/32c3-7143-en-The_state_of_Internet_Censorship.opus 44.8 MB
31C3 - 2014/audio/31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_opus.opus 44.8 MB
31C3 - 2014/audio/31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_opus.opus 44.7 MB
19C3 - 2002/video/19C3-441-radiokampagne.mp4 44.7 MB
31C3 - 2014/audio/31c3-6050-en-Code_Pointer_Integrity_opus.opus 44.7 MB
31C3 - 2014/audio/31c3-6350-en-Correcting_copywrongs_opus.opus 44.6 MB
31C3 - 2014/audio/31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_opus.opus 44.6 MB
31C3 - 2014/audio/31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_opus.opus 44.6 MB
33C3 - 2016/Pegasus internals (33c3) - deutsche Ubersetzung.mp4 44.6 MB
30C3 - 2013/audio/30c3-5255-en-de-Through_a_PRISM_Darkly_opus.opus 44.5 MB
22C3 - 2005/video/22C3-415-en-developing_intelligent_search_engines.mp4 44.5 MB
23C3 - 2006/audio/23C3-1694-en-automated_exploit_detection_in_binaries.mp3 44.5 MB
32C3 - 2015/audio/32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_opus.opus 44.4 MB
19C3 - 2002/video/19C3-413-aes-attacks.mp4 44.4 MB
23C3 - 2006/audio/23C3-1638-de-freie_software.mp3 44.4 MB
23C3 - 2006/audio/23C3-1449-en-not_so_smart_card.mp3 44.4 MB
33C3 - 2016/Whats It Doing Now (33c3) - deutsche Ubersetzung.mp4 44.3 MB
31C3 - 2014/audio/31c3-6154-en-de-Crypto_Tales_from_the_Trenches_opus.opus 44.3 MB
31C3 - 2014/audio/31c3-6573-en-de-From_Computation_to_Consciousness_opus.opus 44.3 MB
26C3 - 2009/audio/26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.ogg 44.3 MB
34C3 - 2017/34C3 - Hardening Open Source Development.mp4 44.3 MB
31C3 - 2014/audio/31c3-6137-en-de-CAESAR_and_NORX_opus.opus 44.2 MB
23C3 - 2006/audio/23C3-1523-en-the_rise_and_fall_of_open_source.mp3 44.2 MB
31C3 - 2014/audio/31c3-6291-en-Doing_right_by_sources_done_right_opus.opus 44.2 MB
31C3 - 2014/audio/31c3-6463-en-Damn_Vulnerable_Chemical_Process_opus.opus 44.2 MB
31C3 - 2014/audio/31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_opus.opus 44.1 MB
32C3 - 2015/audio/32c3-7277-en-Breaking_Honeypots_for_Fun_and_Profit.opus 44.1 MB
32C3 - 2015/audio/32c3-7468-en-The_Ultimate_Amiga_500_Talk.opus 44.1 MB
31C3 - 2014/audio/31c3-5943-en-de-Low_Cost_High_Speed_Photography_opus.opus 44.1 MB
31C3 - 2014/audio/31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_opus.opus 44.1 MB
32C3 - 2015/audio/32c3-7229-de-en-PLC-Blaster_opus.opus 44.1 MB
33C3 - 2016/Whats It Doing Now (33c3).mp4 44.0 MB
22C3 - 2005/video/22C3-503-de-esperanto.mp4 44.0 MB
25C3 - 2008/audio/25c3-2958-de-hacker_jeopardy.ogg 44.0 MB
32C3 - 2015/audio/32c3-7163-en-New_memory_corruption_attacks_why_cant_we_have_nice_things.opus 44.0 MB
31C3 - 2014/audio/31c3-6249-en-de-SS7_Locate_Track_Manipulate_opus.opus 43.9 MB
22C3 - 2005/video/22C3-911-en-lightning_talk_day_1.mp4 43.9 MB
19C3 - 2002/audio/19C3-382-quantenkryptographie.mp3 43.9 MB
22C3 - 2005/video/22C3-589-en-anonymous_data_broadcasting.mp4 43.9 MB
33C3 - 2016/Whats It Doing Now (33c3) - traduction française.mp4 43.9 MB
32C3 - 2015/audio/32c3-7421-en-Fluxus_cannot_save_the_world.opus 43.9 MB
31C3 - 2014/audio/31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_opus.opus 43.8 MB
25C3 - 2008/audio/25c3-3057-en-hacker_jeopardy_english_interpretation.ogg 43.8 MB
31C3 - 2014/audio/31c3-6184-de-en-Mein_Bot_der_Kombattant_opus.opus 43.8 MB
31C3 - 2014/audio/31c3-6261-en-de-Lets_build_a_quantum_computer_opus.opus 43.8 MB
20C3 - 2003/video/20C3-557-Ein_Rant_ueber_den_Missbrauch_von_Java_HTTP_und_XML.mp4 43.7 MB
24C3 - 2007/video/24c3-2326-en-diy_survival_high.mp4 43.6 MB
20C3 - 2003/video/20C3-550-ROCK-Linux_Das_Tool_zum_Erstellen_von_Distros.mp4 43.6 MB
22C3 - 2005/video/22C3-483-de-ccc_jahresrueckblick.mp4 43.6 MB
31C3 - 2014/audio/31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_opus.opus 43.6 MB
31C3 - 2014/audio/31c3-6170-en-net_neutrality_days_of_future_past_opus.opus 43.6 MB
31C3 - 2014/audio/31c3-6559-de-en-Jugend_hackt_opus.opus 43.6 MB
30C3 - 2013/video/30c3-5212-en-The_GNU_Name_System_h264-hq.mp4 43.6 MB
31C3 - 2014/audio/31c3-6430-de-en-NSA_Points_of_Presence_in_AT_opus.opus 43.5 MB
23C3 - 2006/audio/23C3-1446-en-secure_network_server_programming_on_unix.mp3 43.5 MB
32C3 - 2015/audio/32c3-7340-en-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone.opus 43.5 MB
22C3 - 2005/video/22C3-926-en-disassembler_internals.mp4 43.5 MB
30C3 - 2013/audio/30c3-5423-en-The_Tor_Network_opus.opus 43.4 MB
23C3 - 2006/audio/23C3-1700-en-router_and_infrastructure_hacking.mp3 43.4 MB
23C3 - 2006/audio/23C3-1512-de-homegrown_interactive_tables.mp3 43.4 MB
31C3 - 2014/audio/31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_opus.opus 43.4 MB
24C3 - 2007/video/24c3-2338-en-steam_powered_telegraphy_high.mp4 43.3 MB
20C3 - 2003/audio/20c3_600_RFID.ogg 43.2 MB
34C3 - 2017/34C3 - Doping your Fitbit - deutsche Ubersetzung.mp4 43.2 MB
19C3 - 2002/video/19C3-461-noc-review.mp4 43.2 MB
32C3 - 2015/audio/32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching.opus 43.2 MB
33C3 - 2016/Welcome to the Anthropocene (33c3).mp4 43.2 MB
31C3 - 2014/audio/31c3-6308-en-Beyond_PNR_Exploring_airline_systems_opus.opus 43.2 MB
31C3 - 2014/audio/31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_opus.opus 43.2 MB
32C3 - 2015/audio/32c3-7324-en-What_is_the_value_of_anonymous_communication.opus 43.1 MB
32C3 - 2015/audio/32c3-7249-de-Das_Zahnrad_aus_Fleisch.opus 43.0 MB
22C3 - 2005/video/22C3-1295-en-future_challenges.mp4 43.0 MB
31C3 - 2014/audio/31c3-6499-en-Glitching_For_n00bs_opus.opus 43.0 MB
33C3 - 2016/Welcome to the Anthropocene (33c3) - deutsche Ubersetzung.mp4 43.0 MB
31C3 - 2014/audio/31c3-6602-en-de-The_case_of_Chelsea_Manning_opus.opus 43.0 MB
23C3 - 2006/video/23C3-1658-en-bignum_arithmetic.mp4 42.9 MB
31C3 - 2014/audio/31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_opus.opus 42.9 MB
32C3 - 2015/audio/32c3-7449-en-Prediction_and_Control.opus 42.9 MB
23C3 - 2006/audio/23C3-1619-en-introduction_to_matrix_programming.mp3 42.9 MB
21C3 - 2004/video/109 Anti-Honeypot Techniques.mp4 42.9 MB
24C3 - 2007/audio/24c3-2275-en-quantum_cryptography_and_possible_attacks.mp3 42.8 MB
29C3 - 2012/audio/29c3-5275-en-facthacks_ogg.ogg 42.8 MB
31C3 - 2014/audio/31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_opus.opus 42.8 MB
21C3 - 2004/video/055 CCC-Jahresrueckblick.mp4 42.8 MB
21C3 - 2004/video/208 Gamecube Hacking.mp4 42.8 MB
22C3 - 2005/video/22C3-798-en-tcpip_covert_channels.mp4 42.7 MB
34C3 - 2017/34C3 - Unleash your smart-home devices Vacuum Cleaning Robot Hacking - deutsche Ubersetzung.mp4 42.7 MB
20C3 - 2003/video/20C3-SkoleLinux.mp4 42.7 MB
31C3 - 2014/audio/31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_opus.opus 42.6 MB
26C3 - 2009/audio/26c3-3690-de-ccc-jahresrckblick.ogg 42.6 MB
31C3 - 2014/audio/31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_opus.opus 42.6 MB
32C3 - 2015/audio/32c3-7259-en-Graphs_Drones_Phones.opus 42.6 MB
31C3 - 2014/audio/31c3-6196-en-Switches_Get_Stitches_opus.opus 42.6 MB
30C3 - 2013/audio/30c3-5499-en-X_Security_opus.opus 42.5 MB
31C3 - 2014/audio/31c3-6377-en-de-Paypals_War_on_Terror_opus.opus 42.5 MB
20C3 - 2003/video/20C3-637-Distributed_Computing.mp4 42.4 MB
21C3 - 2004/video/078 Aspects of Elliptic Curve Cryptography.mp4 42.4 MB
33C3 - 2016/The Economic Consequences of Internet Censorship (33c3) - traduction française.mp4 42.4 MB
19C3 - 2002/video/19C3-396-videorendering-cluster.mp4 42.4 MB
30C3 - 2013/audio/30c3-5537-en-Glass_Hacks_opus.opus 42.3 MB
33C3 - 2016/The Economic Consequences of Internet Censorship (33c3) - deutsche Ubersetzung.mp4 42.3 MB
30C3 - 2013/video/30c3-5594-en-Structuring_open_hardware_projects_h264-hq.mp4 42.2 MB
23C3 - 2006/audio/23C3-1701-en-open_source_machine_translation.mp3 42.2 MB
30C3 - 2013/audio/30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_opus.opus 42.2 MB
24C3 - 2007/video/24c3-2250-de-abschlussbericht_fem_high.mp4 42.1 MB
33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3) - deutsche Ubersetzung.mp4 42.1 MB
30C3 - 2013/audio/30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_opus.opus 42.1 MB
34C3 - 2017/34C3 - Unleash your smart-home devices Vacuum Cleaning Robot Hacking.mp4 42.1 MB
31C3 - 2014/audio/31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_opus.opus 42.1 MB
32C3 - 2015/audio/32c3-7490-en-The_Great_Train_Cyber_Robbery.opus 42.1 MB
21C3 - 2004/video/037 GNOME Anwendungsentwicklung.mp4 42.0 MB
22C3 - 2005/video/22C3-776-en-closing_event.mp4 42.0 MB
31C3 - 2014/audio/31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_opus.opus 42.0 MB
23C3 - 2006/audio/23C3-1740-en-in_the_absence_of_trust.mp3 42.0 MB
19C3 - 2002/audio/19C3-424-beopardy.mp3 42.0 MB
32C3 - 2015/audio/32c3-7255-en-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015.opus 42.0 MB
33C3 - 2016/The Economic Consequences of Internet Censorship (33c3).mp4 42.0 MB
30C3 - 2013/audio/30c3-5406-en-Drones_opus.opus 42.0 MB
19C3 - 2002/video/19C3-414-kuenstliche-unintelligenz.mp4 42.0 MB
32C3 - 2015/audio/32c3-7336-en-3D_printing_on_the_moon.opus 41.9 MB
21C3 - 2004/video/015 Sicherheit bei VoIP-Systemen.mp4 41.9 MB
31C3 - 2014/audio/31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_opus.opus 41.8 MB
23C3 - 2006/video/23C3-1449-en-not_so_smart_card.mp4 41.8 MB
22C3 - 2005/video/22C3-828-en-terminator_genes_and_gurt.mp4 41.8 MB
32C3 - 2015/audio/32c3-7189-en-Key-logger_Video_Mouse.opus 41.8 MB
31C3 - 2014/audio/31c3-6297-en-de-Virtual_Machine_Introspection_opus.opus 41.8 MB
31C3 - 2014/audio/31c3-6021-en-de-Why_is_GPG_damn_near_unusable_opus.opus 41.8 MB
31C3 - 2014/audio/31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_opus.opus 41.7 MB
26C3 - 2009/audio/26c3-3687-de-security_nightmares.ogg 41.7 MB
28C3 - 2011/audio/28c3-4800-en-how_governments_have_tried_to_block_tor.ogg 41.6 MB
26C3 - 2009/audio/26c3-3725-en-stream_security_nightmares.ogg 41.6 MB
23C3 - 2006/audio/23C3-1552-en-nintendo_ds.mp3 41.5 MB
21C3 - 2004/video/041 Einfuehrung in Kryptographische Methoden.mp4 41.5 MB
34C3 - 2017/34C3 - Home Distilling.mp4 41.5 MB
23C3 - 2006/video/23C3-1418-de-trust_your_eyes.mp4 41.5 MB
31C3 - 2014/audio/31c3-6162-en-Programming_with_dependent_types_in_Idris_opus.opus 41.5 MB
26C3 - 2009/audio/26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.ogg 41.4 MB
34C3 - 2017/34C3 - Home Distilling - deutsche Ubersetzung.mp4 41.3 MB
30C3 - 2013/audio/30c3-5339-en-de-The_Year_in_Crypto_opus.opus 41.2 MB
27C3 - 2010/audio/27c3-4230-de-security_nightmares.ogg 41.1 MB
19C3 - 2002/audio/19C3-392-codeflow-analyse.mp3 41.1 MB
21C3 - 2004/audio/158 How to find anything on the web.mp3 41.1 MB
23C3 - 2006/video/23C3-1446-en-secure_network_server_programming_on_unix.mp4 41.1 MB
30C3 - 2013/audio/30c3-5459-en-de-Security_of_the_IC_Backside_opus.opus 41.0 MB
31C3 - 2014/audio/31c3-6530-en-In_Security_of_Mobile_Banking_opus.opus 41.0 MB
21C3 - 2004/audio/316 Bericht von den BigBrotherAwards.mp3 41.0 MB
30C3 - 2013/video/30c3-5539-en-Human_Rights_and_Technology_h264-hq.mp4 41.0 MB
23C3 - 2006/audio/23C3-1610-en-fudging_with_firmware.mp3 40.9 MB
21C3 - 2004/video/218 Practical MacOS X Insecurities.mp4 40.8 MB
31C3 - 2014/audio/31c3-5960-en-Revisiting_SSL_TLS_Implementations_opus.opus 40.8 MB
33C3 - 2016/Hacking the World (33c3).mp4 40.8 MB
21C3 - 2004/video/077 Weird Programming 2.mp4 40.7 MB
34C3 - 2017/34C3 - Doping your Fitbit.mp4 40.7 MB
30C3 - 2013/audio/30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_opus.opus 40.6 MB
31C3 - 2014/audio/31c3-6417-en-3D_Casting_Aluminum_opus.opus 40.6 MB
21C3 - 2004/video/113 Automated Hacking via Google.mp4 40.6 MB
19C3 - 2002/video/19C3-445-forensik-schluesselspuren.mp4 40.5 MB
31C3 - 2014/video/31c3-6561-en-31C3_Opening_Event_sd.mp4 40.5 MB
34C3 - 2017/34C3 - 0en & 1en auf dem Acker - english translation.mp4 40.5 MB
31C3 - 2014/audio/31c3-5956-en-Cyber_Necromancy_opus.opus 40.5 MB
27C3 - 2010/audio/27c3-4070-de-fnord_jahresrueckblick.ogg 40.5 MB
34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers... - deutsche Ubersetzung.mp4 40.4 MB
32C3 - 2015/audio/32c3-7134-en-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world.opus 40.4 MB
27C3 - 2010/audio/27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg 40.4 MB
34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers....mp4 40.3 MB
30C3 - 2013/audio/30c3-5618-en-Baseband_Exploitation_in_2013_opus.opus 40.3 MB
31C3 - 2014/audio/31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_opus.opus 40.3 MB
29C3 - 2012/audio/29c3-5380-de-en-staatstrojaner2012_ogg.ogg 40.3 MB
25C3 - 2008/audio/25c3-3021-de-security_nightmares_2009.ogg 40.3 MB
34C3 - 2017/34C3 - Why Do We Anthropomorphize Computers... - traduction francaise.mp4 40.2 MB
31C3 - 2014/audio/31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_opus.opus 40.1 MB
31C3 - 2014/audio/31c3-6214-en-de-Attribution_revolution_opus.opus 40.1 MB
34C3 - 2017/34C3 - 0en & 1en auf dem Acker - La traduccion espanola.mp4 40.1 MB
21C3 - 2004/video/051 Recent features to OpenBSD-ntpd and bgpd.mp4 40.1 MB
31C3 - 2014/audio/31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_opus.opus 40.1 MB
30C3 - 2013/audio/30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_opus.opus 40.0 MB
21C3 - 2004/video/209 Freedom of expression in new Arab landscape.mp4 40.0 MB
31C3 - 2014/audio/31c3-6369-en-ECCHacks_opus.opus 40.0 MB
31C3 - 2014/audio/31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_opus.opus 39.9 MB
34C3 - 2017/34C3 - Antipatterns und Missverständnisse in der Softwareentwicklung.mp4 39.9 MB
19C3 - 2002/video/19C3-440-pop-culture-and-media-hacking.mp4 39.7 MB
19C3 - 2002/video/19C3-463-rsa-padding-angriffe.mp4 39.7 MB
31C3 - 2014/audio/31c3-6255-de-en-10_Jahre_OpenStreetMap_opus.opus 39.7 MB
24C3 - 2007/audio/24c3-2381-en-what_is_terrorism.mp3 39.7 MB
31C3 - 2014/audio/31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_opus.opus 39.7 MB
34C3 - 2017/34C3 - Antipatterns und Missverständnisse in der Softwareentwicklung - english translation.mp4 39.7 MB
30C3 - 2013/video/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4 39.6 MB
21C3 - 2004/video/215 The Incomputable Alan Turing.mp4 39.6 MB
31C3 - 2014/audio/31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_opus.opus 39.6 MB
25C3 - 2008/audio/25c3-3058-en-security_nightmares_2009_english_interpretation.ogg 39.6 MB
24C3 - 2007/audio/24c3-2363-de-der_bundestrojaner.mp3 39.6 MB
20C3 - 2003/audio/20c3_537_WSIS-An-Overview.ogg 39.5 MB
21C3 - 2004/video/114 Der 2. Korb der Urheberrechtsnovelle.mp4 39.5 MB
21C3 - 2004/video/135 Voting Machine Technology.mp4 39.5 MB
17C3 - 2000/video/17C3_bigbrother.rm 39.5 MB
21C3 - 2004/video/038 Free Software Usage in South America.mp4 39.4 MB
32C3 - 2015/audio/32c3-7369-en-How_to_contribute_to_make_open_hardware_happen.opus 39.4 MB
30C3 - 2013/audio/30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_opus.opus 39.3 MB
21C3 - 2004/video/018 Computer und Robotik in Entenhausen.mp4 39.2 MB
30C3 - 2013/audio/30c3-5601-en-de-EUDataP_State_of_the_Union_opus.opus 39.2 MB
34C3 - 2017/34C3 - 0en & 1en auf dem Acker.mp4 39.2 MB
32C3 - 2015/audio/32c3-7375-en-Wireless_Drivers_Freedom_considered_harmful.opus 39.2 MB
29C3 - 2012/audio/29c3-5327-en-writing_a_thumbdrive_from_scratch_ogg.ogg 39.1 MB
34C3 - 2017/34C3 - Designing PCBs with code - deutsche Ubersetzung.mp4 39.1 MB
31C3 - 2014/audio/31c3-6103-en-AMD_x86_SMU_firmware_analysis_opus.opus 39.1 MB
21C3 - 2004/video/098 Portable Software-Installation with pkg source.mp4 38.9 MB
30C3 - 2013/video/30c3-5311-en-lasers_in_space_h264-hq.mp4 38.9 MB
31C3 - 2014/audio/31c3-6361-en-From_Maxwell_to_antenna_arrays_opus.opus 38.7 MB
22C3 - 2005/video/22C3-601-de-fnord_jahresrueckblick.mp4 38.7 MB
31C3 - 2014/audio/31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_opus.opus 38.6 MB
30C3 - 2013/audio/30c3-5622-en-de-30c3_Keynote_opus.opus 38.6 MB
27C3 - 2010/audio/27c3-4094-de-netzneutralitaet_und_qos.ogg 38.6 MB
34C3 - 2017/34C3 - Mietshäusersyndikat den Immobilienmarkt hacken - english translation.mp4 38.5 MB
30C3 - 2013/audio/30c3-5214-en-The_Gospel_of_IRMA__opus.opus 38.5 MB
32C3 - 2015/audio/32c3-7133-en-Beyond_your_cable_modem.opus 38.5 MB
20C3 - 2003/audio/20c3_633_Fnord-Jahresrueckschau.ogg 38.5 MB
32C3 - 2015/audio/32c3-7205-de-Netzpolitik_in_der_Schweiz.opus 38.5 MB
26C3 - 2009/audio/26c3-3723-en-stream_fnord-jahresrckblick_2009.ogg 38.4 MB
19C3 - 2002/audio/19C3-380-computer-und-videogame-producer.mp3 38.4 MB
19C3 - 2002/video/19C3-478-ipv6.mp4 38.3 MB
34C3 - 2017/34C3 - Mietshäusersyndikat den Immobilienmarkt hacken.mp4 38.3 MB
24C3 - 2007/video/24c3-2209-en-playstation_portable_cracking_high.mp4 38.3 MB
30C3 - 2013/audio/30c3-5609-en-Infrastructure_Review_opus.opus 38.3 MB
26C3 - 2009/audio/26c3-3658-en-black_ops_of_pki.ogg 38.2 MB
30C3 - 2013/video/30c3-5582-en-SCADA_StrangeLove_2_h264-hq.mp4 38.2 MB
26C3 - 2009/audio/26c3-3613-de-fnord-jahresrckblick_2009.ogg 38.2 MB
31C3 - 2014/audio/31c3-6557-en-de-31C3_Infrastructure_Review_opus.opus 38.1 MB
23C3 - 2006/audio/23C3-1422-en-pornography_and_technology.mp3 38.1 MB
29C3 - 2012/audio/29c3-5336-de-en-sprache_ungleichheit_unfreiheit_ogg.ogg 38.1 MB
32C3 - 2015/audio/32c3-7435-en-Replication_Prohibited.opus 38.0 MB
19C3 - 2002/video/19C3-397-netbsd.mp4 37.9 MB
27C3 - 2010/audio/27c3-4326-de-radio_der_zukunft.ogg 37.9 MB
29C3 - 2012/audio/29c3-5256-en-the_future_of_protocol_reversing_and_simulation_ogg.ogg 37.9 MB
22C3 - 2005/video/22C3-574-en-memory_allocator_security.mp4 37.8 MB
34C3 - 2017/34C3 - Designing PCBs with code.mp4 37.8 MB
33C3 - 2016/33C3 Opening Ceremony (33c3).mp4 37.7 MB
31C3 - 2014/video/31c3-6562-de-en-31C3_Closing_Event_sd.mp4 37.6 MB
19C3 - 2002/audio/19C3-388-attacking-networked-embedded-systems.mp3 37.5 MB
29C3 - 2012/audio/29c3-5306-en-the_tor_software_ecosystem_ogg.ogg 37.4 MB
28C3 - 2011/video/28c3-4899-en-closing_event_h264.mp4 37.4 MB
34C3 - 2017/34C3 - Saving the World with Space Solar Power - deutsche Ubersetzung.mp4 37.3 MB
31C3 - 2014/audio/31c3-5997-en-Preserving_arcade_games_opus.opus 37.2 MB
27C3 - 2010/audio/27c3-4082-en-sap_landscape.ogg 37.2 MB
22C3 - 2005/video/22C3-606-en-autodafe.mp4 37.2 MB
19C3 - 2002/video/19C3-449-smartcards-sosse.mp4 37.2 MB
21C3 - 2004/video/099 GPL fuer Anfaenger.mp4 37.1 MB
29C3 - 2012/audio/29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_ogg.ogg 37.0 MB
30C3 - 2013/audio/30c3-5376-en-Do_You_Think_That_s_Funny__opus.opus 37.0 MB
22C3 - 2005/video/22C3-912-en-lightning_talk_day_2.mp4 37.0 MB
17C3 - 2000/video/17C3_Movie_freedom_downtime_discussion.mp4 37.0 MB
33C3 - 2016/33C3 Opening Ceremony - deutsche Ubersetzung (33c3).mp4 36.9 MB
24C3 - 2007/audio/24c3-2355-de-trecker_fahrn.mp3 36.9 MB
19C3 - 2002/audio/19C3-402-network-hijacking-workshop.mp3 36.9 MB
24C3 - 2007/video/24c3-2214-en-make_cool_things_with_microcontrollers_high.mp4 36.9 MB
34C3 - 2017/34C3 - TrustZone is not enough.mp4 36.9 MB
31C3 - 2014/audio/31c3-5930-en-de-Funky_File_Formats_opus.opus 36.9 MB
33C3 - 2016/Gone in 60 Milliseconds (33c3) - traduction française.mp4 36.9 MB
24C3 - 2007/audio/24c3-2255-de-wahlchaos.mp3 36.8 MB
32C3 - 2015/audio/32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_opus.opus 36.8 MB
19C3 - 2002/video/19C3-428-eroffnung.mp4 36.8 MB
24C3 - 2007/audio/24c3-2192-de-elektronische_dokumente.mp3 36.8 MB
28C3 - 2011/audio/28c3-4936-en-fnord_jahresrueckblick.ogg 36.7 MB
34C3 - 2017/34C3 - TrustZone is not enough - deutsche Ubersetzung.mp4 36.7 MB
31C3 - 2014/audio/31c3-6321-en-de-The_Matter_of_Heartbleed_opus.opus 36.7 MB
28C3 - 2011/audio/28c3-4866-de-fnord_jahresrueckblick.ogg 36.6 MB
31C3 - 2014/audio/31c3-6234-en-The_eXperimental_Robot_Project_opus.opus 36.5 MB
20C3 - 2003/video/20C3-644-Gute-Antennen-selber-bauen.mp4 36.4 MB
29C3 - 2012/audio/29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_ogg.ogg 36.3 MB
34C3 - 2017/34C3 - Saving the World with Space Solar Power.mp4 36.1 MB
22C3 - 2005/video/22C3-469-en-learning_cryptography.mp4 35.9 MB
17C3 - 2000/video/17C3_AndyMM_WauHolland_Rueckblick.mp4 35.9 MB
24C3 - 2007/video/24c3-2340-de-absurde_mathematik_high.mp4 35.9 MB
27C3 - 2010/audio/27c3-4265-en-hacking_smart_phones.ogg 35.8 MB
29C3 - 2012/audio/29c3-5230-en-stylometry_and_online_underground_markets_ogg.ogg 35.8 MB
26C3 - 2009/audio/26c3-3520-en-conlanging_101.ogg 35.8 MB
21C3 - 2004/video/146 Mehr Sicherheit fuer HostAP-WLANs.mp4 35.8 MB
30C3 - 2013/video/30c3-5319-en-Technomonopolies_h264-hq.mp4 35.7 MB
21C3 - 2004/bonus/21C3_-_The_Network_Equipment_Delivery.mp4 35.6 MB
22C3 - 2005/audio/22C3-559-en-xbox_hacking.m4a 35.5 MB
21C3 - 2004/video/111 The Kernel Accelerator Device.mp4 35.4 MB
24C3 - 2007/audio/24c3-2293-en-what_can_we_do_to_counter_the_spies.mp3 35.4 MB
30C3 - 2013/audio/30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_opus.opus 35.4 MB
32C3 - 2015/audio/32c3-7321-en-re_cycle.opus 35.4 MB
29C3 - 2012/audio/29c3-5305-en-long_live_the_protocoletariat_ogg.ogg 35.3 MB
27C3 - 2010/audio/27c3-4061-en-building_custom_disassemblers.ogg 35.3 MB
24C3 - 2007/audio/24c3-2241-de-das_panoptische_prinzip.mp3 35.3 MB
30C3 - 2013/audio/30c3-5606-de-en-Closing_Event_opus.opus 35.2 MB
29C3 - 2012/audio/29c3-5397-de-en-indect_verhaltenserkennung_ogg.ogg 35.2 MB
25C3 - 2008/audio/25c3-2639-en-attacking_nfc_mobile_phones.ogg 35.2 MB
27C3 - 2010/audio/27c3-4239-en-lightning_talks_d3.ogg 35.1 MB
17C3 - 2000/video/17C3_telekom_ueberwachung.rm 35.1 MB
29C3 - 2012/audio/29c3-5319-en-certificate_authority_collapse_ogg.ogg 35.1 MB
21C3 - 2004/video/130 Physical Security Pt 1.mp4 34.9 MB
20C3 - 2003/audio/20c3_538_Practical-Win32-ans-Unicode-exploitation.ogg 34.8 MB
26C3 - 2009/audio/26c3-3494-de-defending_the_poor.ogg 34.8 MB
23C3 - 2006/audio/23C3-1692-en-hacking_the_electoral_law.mp3 34.8 MB
21C3 - 2004/video/131 Learning OpenPGP by Example.mp4 34.8 MB
29C3 - 2012/audio/29c3-5159-en-defend_freedoms_online_ogg.ogg 34.7 MB
29C3 - 2012/audio/29c3-5024-en-hackers_as_a_highrisk_population_ogg.ogg 34.7 MB
26C3 - 2009/audio/26c3-3711-de-computerspielepolitik.ogg 34.7 MB
24C3 - 2007/audio/24c3-2158-en-the_arctic_cold_war.mp3 34.7 MB
24C3 - 2007/audio/24c3-2272-en-hacking_in_the_age_of_declining_everything.mp3 34.7 MB
30C3 - 2013/audio/30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_opus.opus 34.6 MB
23C3 - 2006/audio/23C3-1418-de-trust_your_eyes.mp3 34.6 MB
23C3 - 2006/audio/23C3-1600-en-biometrics.mp3 34.6 MB
25C3 - 2008/audio/25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg 34.5 MB
31C3 - 2014/audio/31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_opus.opus 34.5 MB
20C3 - 2003/video/20C3-560-Soziale_Software.mp4 34.4 MB
29C3 - 2012/audio/29c3-5287-de-en-hinter_den_kulissen_nsu_ogg.ogg 34.4 MB
26C3 - 2009/audio/26c3-3661-de-coreboot_adding_support_for_a_system_near_you.ogg 34.3 MB
30C3 - 2013/audio/30c3-5449-en-Mobile_network_attack_evolution_opus.opus 34.2 MB
33C3 - 2016/The DROWN Attack (33c3).mp4 34.1 MB
24C3 - 2007/audio/24c3-2329-en-change_me.mp3 34.0 MB
29C3 - 2012/audio/29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_ogg.ogg 34.0 MB
30C3 - 2013/audio/30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_opus.opus 34.0 MB
29C3 - 2012/audio/29c3-5195-en-executable_metadata_ogg.ogg 34.0 MB
24C3 - 2007/audio/24c3-2382-de-tor.mp3 33.9 MB
32C3 - 2015/audio/32c3-7540-en-Maker_Spaces_in_Favelas_-_Lecture.opus 33.9 MB
29C3 - 2012/audio/29c3-5124-en-low_cost_chip_microprobing_ogg.ogg 33.9 MB
28C3 - 2011/audio/28c3-4832-de-neue_leichtigkeit.ogg 33.9 MB
32C3 - 2015/audio/32c3-7294-en-Sanitizing_PCAPs.opus 33.8 MB
22C3 - 2005/audio/22C3-789-en-hacker_jeopardy.m4a 33.7 MB
29C3 - 2012/audio/29c3-5146-en-an_overview_of_secure_name_resolution_ogg.ogg 33.7 MB
22C3 - 2005/audio/22C3-537-en-fuzzing.m4a 33.7 MB
26C3 - 2009/audio/26c3-3654-en-gsm_srsly.ogg 33.7 MB
29C3 - 2012/audio/29c3-5401-de-en-der_mord_faellt_aus_ogg.ogg 33.7 MB
32C3 - 2015/audio/32c3-7236-en-Thunderstrike_2.opus 33.6 MB
29C3 - 2012/audio/29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_ogg.ogg 33.6 MB
30C3 - 2013/audio/30c3-5443-en-Introduction_to_Processor_Design_opus.opus 33.5 MB
24C3 - 2007/audio/24c3-2393-en-dns_rebinding_packet_tricks.mp3 33.5 MB
29C3 - 2012/audio/29c3-5237-en-a_rambling_walk_through_an_emv_transaction_ogg.ogg 33.5 MB
29C3 - 2012/audio/29c3-5266-de-en-proximax_telex_flashproxy_ogg.ogg 33.5 MB
25C3 - 2008/audio/25c3-2773-en-soviet_unterzoegersdorf.ogg 33.5 MB
22C3 - 2005/audio/22C3-790-de-nerds_kochen.m4a 33.5 MB
21C3 - 2004/video/045 Internet Censorship in China.mp4 33.4 MB
25C3 - 2008/audio/25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg 33.4 MB
29C3 - 2012/audio/29c3-5323-de-en-pflanzenhacken_richtig_ogg.ogg 33.4 MB
27C3 - 2010/audio/27c3-4145-en-spoilers_human_interfaces_airplanes.ogg 33.3 MB
29C3 - 2012/audio/29c3-5274-en-grand_eu_data_protection_reform_ogg.ogg 33.3 MB
29C3 - 2012/audio/29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_ogg.ogg 33.3 MB
20C3 - 2003/audio/20c3_598_trustbased-P2P-WYMIWYG-KnoBot-project.ogg 33.3 MB
29C3 - 2012/audio/29c3-5299-de-en-best_of_verfassungsschutz_ogg.ogg 33.3 MB
24C3 - 2007/audio/24c3-2289-en-card_payment.mp3 33.3 MB
20C3 - 2003/audio/20c3_591_Berichte-von-den-BigBrother-Awards.ogg 33.2 MB
29C3 - 2012/audio/29c3-5333-en-gsm_cell_phone_network_review_ogg.ogg 33.1 MB
26C3 - 2009/audio/26c3-3570-en-weaponizing_cultural_viruses.ogg 33.1 MB
24C3 - 2007/audio/24c3-2311-en-hacking_ideologies_2.mp3 33.0 MB
22C3 - 2005/video/22C3-496-en-22c3_network.mp4 33.0 MB
28C3 - 2011/audio/28c3-4788-de-datenvieh_oder_daten_fee.ogg 32.9 MB
30C3 - 2013/audio/30c3-5192-en-Android_DDI_opus.opus 32.9 MB
26C3 - 2009/audio/26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.ogg 32.9 MB
30C3 - 2013/audio/30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_opus.opus 32.9 MB
29C3 - 2012/audio/29c3-5160-en-transparenzgesetz_hh_ogg.ogg 32.9 MB
27C3 - 2010/audio/27c3-4187-en-your_infrastructure_will_kill_you.ogg 32.9 MB
30C3 - 2013/audio/30c3-5554-en-Magic_Lantern_opus.opus 32.8 MB
30C3 - 2013/audio/30c3-5468-en-We_only_have_one_earth_opus.opus 32.8 MB
29C3 - 2012/audio/29c3-5393-en-milking_the_digital_cash_cow_ogg.ogg 32.8 MB
30C3 - 2013/audio/30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_opus.opus 32.8 MB
29C3 - 2012/audio/29c3-5289-de-en-meldegesetz_ogg.ogg 32.8 MB
29C3 - 2012/audio/29c3-5225-en-security_evaluation_of_russian_gost_cipher_ogg.ogg 32.8 MB
30C3 - 2013/audio/30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_opus.opus 32.7 MB
28C3 - 2011/audio/28c3-4581-en-taking_control_over_the_tor_network.ogg 32.7 MB
25C3 - 2008/audio/25c3-3030-en-messing_around_with_garage_doors.ogg 32.7 MB
30C3 - 2013/audio/30c3-5412-en-Bug_class_genocide_opus.opus 32.7 MB
29C3 - 2012/audio/29c3-5102-de-en-digiges_ogg.ogg 32.6 MB
24C3 - 2007/audio/24c3-2279-en-deconstructing_xbox_360_security.mp3 32.6 MB
29C3 - 2012/audio/29c3-5121-de-en-sind_faire_computer_moeglich_ogg.ogg 32.6 MB
29C3 - 2012/audio/29c3-5417-en-cve_2011_3402_analysis_ogg.ogg 32.5 MB
30C3 - 2013/audio/30c3-5587-en-Making_machines_that_make_opus.opus 32.5 MB
23C3 - 2006/audio/23C3-1667-de-jabber_showcase.mp3 32.4 MB
29C3 - 2012/audio/29c3-5239-en-smart_meter_ogg.ogg 32.4 MB
21C3 - 2004/video/108 The Convergence of Anti-Counterfeiting and Computer Security.mp4 32.4 MB
31C3 - 2014/audio/31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_opus.opus 32.4 MB
29C3 - 2012/audio/29c3-5402-en-russias_surveillance_state_ogg.ogg 32.3 MB
30C3 - 2013/audio/30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_opus.opus 32.3 MB
30C3 - 2013/audio/30c3-5304-en-CounterStrike_opus.opus 32.3 MB
32C3 - 2015/audio/32c3-7543-de-The_mummy_unwrapped.opus 32.3 MB
29C3 - 2012/audio/29c3-5179-de-en-hacking_philosophy_ogg.ogg 32.3 MB
28C3 - 2011/audio/28c3-4928-en-kinectfusion.ogg 32.2 MB
21C3 - 2004/audio/129 Die Propagandawueste des realen Krieges.mp3 32.2 MB
27C3 - 2010/audio/27c3-4237-en-indect_eu_surveillance_project.ogg 32.2 MB
19C3 - 2002/audio/19C3-453-die-fuenf-pforten-der-manipulation.mp3 32.2 MB
22C3 - 2005/video/22C3-864-de-das_geheimnis_reloaded.mp4 32.2 MB
30C3 - 2013/audio/30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_opus.opus 32.2 MB
24C3 - 2007/audio/24c3-2290-en-overtaking_proprietary_software.mp3 32.2 MB
29C3 - 2012/audio/29c3-5265-en-page_fault_liberation_army_ogg.ogg 32.1 MB
28C3 - 2011/audio/28c3-4930-en-black_ops_of_tcpip_2011.ogg 32.0 MB
29C3 - 2012/audio/29c3-5282-de-en-rfidkleidung_ogg.ogg 32.0 MB
30C3 - 2013/audio/30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_opus.opus 32.0 MB
27C3 - 2010/audio/27c3-4090-en-baseband_apocalypse.ogg 32.0 MB
30C3 - 2013/audio/30c3-5713-en-de-To_Protect_And_Infect_Part_2_opus.opus 32.0 MB
29C3 - 2012/audio/29c3-5382-de-en-antiterrordatei_ogg.ogg 32.0 MB
26C3 - 2009/audio/26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.ogg 31.9 MB
29C3 - 2012/audio/29c3-5152-en-hashflooding_dos_reloaded_ogg.ogg 31.9 MB
30C3 - 2013/audio/30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_opus.opus 31.9 MB
29C3 - 2012/audio/29c3-5219-en-how_i_met_your_pointer_ogg.ogg 31.9 MB
28C3 - 2011/audio/28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.ogg 31.9 MB
30C3 - 2013/audio/30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__opus.opus 31.8 MB
27C3 - 2010/audio/27c3-4276-en-cognitive_psychology_for_hackers.ogg 31.8 MB
30C3 - 2013/audio/30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_opus.opus 31.8 MB
29C3 - 2012/audio/29c3-5283-de-en-whiteit_cleanit_ceocoalition_ogg.ogg 31.7 MB
29C3 - 2012/audio/29c3-5385-en-not_my_department_ogg.ogg 31.7 MB
30C3 - 2013/audio/30c3-5590-en-White-Box_Cryptography_opus.opus 31.7 MB
27C3 - 2010/audio/27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg 31.7 MB
24C3 - 2007/audio/24c3-2227-en-hacking_scada.mp3 31.7 MB
30C3 - 2013/audio/30c3-5210-de-en-Bullshit_made_in_Germany_opus.opus 31.7 MB
29C3 - 2012/audio/29c3-5167-en-setting_mobile_phones_free_ogg.ogg 31.6 MB
24C3 - 2007/audio/24c3-2281-en-haxe.mp3 31.6 MB
24C3 - 2007/audio/24c3-2383-en-data_retention.mp3 31.6 MB
30C3 - 2013/audio/30c3-5495-en-Concepts_for_global_TSCM_opus.opus 31.6 MB
20C3 - 2003/audio/20c3_588_Schummeln-in-oeffentlichen-Projekten.ogg 31.5 MB
32C3 - 2015/audio/32c3-7130-en-The_Perl_Jam_2.opus 31.5 MB
30C3 - 2013/audio/30c3-5532-de-en-Die_Drohnenkriege_opus.opus 31.5 MB
26C3 - 2009/audio/26c3-3590-de-europische_biometriestrategien.ogg 31.4 MB
28C3 - 2011/audio/28c3-4675-de-politik_neusprech_2011.ogg 31.4 MB
30C3 - 2013/audio/30c3-5395-en-Towards_an_affordable_brain-computer-interface_opus.opus 31.4 MB
27C3 - 2010/audio/27c3-4253-en-pentanews_game_show.ogg 31.4 MB
24C3 - 2007/audio/24c3-2245-en-how_to_reach_digital_sustainability.mp3 31.4 MB
29C3 - 2012/audio/29c3-5301-en-defeating_windows_memory_forensics_ogg.ogg 31.4 MB
24C3 - 2007/audio/24c3-2346-de-meine_finger_gehoeren_mir.mp3 31.4 MB
29C3 - 2012/audio/29c3-5181-de-die_wahrheit_was_wirklich_passierte_ogg.ogg 31.3 MB
28C3 - 2011/audio/28c3-4799-de-can_trains_be_hacked.ogg 31.3 MB
28C3 - 2011/audio/28c3-4798-en-sovereign_keys.ogg 31.3 MB
19C3 - 2002/audio/19C3-406-chipkarten-und-ueberwachung.mp3 31.3 MB
30C3 - 2013/audio/30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_opus.opus 31.3 MB
28C3 - 2011/audio/28c3-4713-en-what_is_in_a_name.ogg 31.3 MB
27C3 - 2010/audio/27c3-4123-en-defense_is_not_dead.ogg 31.3 MB
29C3 - 2012/audio/29c3-5059-en-scada_strangelove_ogg.ogg 31.2 MB
27C3 - 2010/audio/27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg 31.2 MB
30C3 - 2013/audio/30c3-5613-en-Forbidden_Fruit_opus.opus 31.2 MB
27C3 - 2010/audio/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg 31.1 MB
26C3 - 2009/audio/26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.ogg 31.1 MB
23C3 - 2006/audio/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp3 31.1 MB
26C3 - 2009/audio/26c3-3540-en-a_hackers_utopia.ogg 31.1 MB
30C3 - 2013/audio/30c3-5290-en-Console_Hacking_2013_opus.opus 31.1 MB
24C3 - 2007/audio/24c3-2333-de-spiel_freude_eierkuchen.mp3 31.0 MB
25C3 - 2008/audio/25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg 31.0 MB
26C3 - 2009/audio/26c3-3554-de-tor_and_censorship_lessons_learned.ogg 31.0 MB
29C3 - 2012/audio/29c3-5400-en-hacking_cisco_phones_ogg.ogg 31.0 MB
30C3 - 2013/audio/30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_opus.opus 30.9 MB
27C3 - 2010/audio/27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg 30.9 MB
28C3 - 2011/audio/28c3-4780-en-print_me_if_you_dare.ogg 30.9 MB
30C3 - 2013/video/30c3-5425-en-Hacking_as_Artistic_Practice_h264-hq.mp4 30.8 MB
30C3 - 2013/audio/30c3-5337-de-en-Kryptographie_nach_Snowden_opus.opus 30.8 MB
27C3 - 2010/audio/27c3-4208-en-wideband_gsm_sniffing.ogg 30.8 MB
30C3 - 2013/audio/30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_opus.opus 30.7 MB
29C3 - 2012/audio/29c3-5044-en-time_is_not_on_your_side_ogg.ogg 30.7 MB
27C3 - 2010/audio/27c3-4125-de-spinning_the_electronic_wheel.ogg 30.7 MB
26C3 - 2009/audio/26c3-3464-de-liquid_democracy.ogg 30.7 MB
25C3 - 2008/audio/25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg 30.7 MB
20C3 - 2003/audio/20c3_576_Free-WLANs-for-the-masses.ogg 30.7 MB
26C3 - 2009/audio/26c3-3567-en-wikileaks_release_10.ogg 30.6 MB
30C3 - 2013/audio/30c3-5186-en-Programming_FPGAs_with_PSHDL_opus.opus 30.6 MB
21C3 - 2004/audio/059 Wikipedia Sociographics.mp3 30.6 MB
27C3 - 2010/audio/27c3-4151-en-android_geolocation_using_gsm_network.ogg 30.6 MB
28C3 - 2011/audio/28c3-4706-en-power_gadgets_with_your_own_electricity.ogg 30.6 MB
28C3 - 2011/audio/28c3-4814-en-behind_the_scenes_of_a_c64_demo.ogg 30.6 MB
26C3 - 2009/audio/26c3-3721-de-etsi-vorratsdatenspeicherung_2009.ogg 30.6 MB
29C3 - 2012/audio/29c3-5395-en-howto_hack_the_law_ogg.ogg 30.6 MB
28C3 - 2011/audio/28c3-4663-en-cellular_protocol_stacks_for_internet.ogg 30.6 MB
30C3 - 2013/audio/30c3-5334-en-RFID_Treehouse_of_Horror_opus.opus 30.6 MB
26C3 - 2009/audio/26c3-3647-de-ckan_apt-get_for_the_debian_of_data.ogg 30.5 MB
30C3 - 2013/audio/30c3-5611-en-Hello_World__opus.opus 30.5 MB
24C3 - 2007/audio/24c3-2378-en-mifare_security.mp3 30.5 MB
28C3 - 2011/audio/28c3-4735-en-reverse_engineering_a_qualcomm_baseband.ogg 30.5 MB
28C3 - 2011/audio/28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.ogg 30.5 MB
26C3 - 2009/audio/26c3-3592-de-cybernetic_cannibalism.ogg 30.4 MB
20C3 - 2003/video/20C3-531-NOC_Preview.mp4 30.4 MB
28C3 - 2011/audio/28c3-4660-en-post_memory_corruption_memory_analysis.ogg 30.4 MB
29C3 - 2012/audio/29c3-5262-de-en-anderthalb_jahre_fragdenstaat_ogg.ogg 30.4 MB
30C3 - 2013/audio/30c3-5305-en-Breaking_Baryons_opus.opus 30.4 MB
27C3 - 2010/audio/27c3-4149-en-i_control_your_code.ogg 30.4 MB
28C3 - 2011/audio/28c3-4746-en-bitcoin_an_analysis.ogg 30.3 MB
26C3 - 2009/audio/26c3-3709-en-legic_prime_obscurity_in_depth.ogg 30.3 MB
27C3 - 2010/audio/27c3-4295-en-high_speed_high_security_cryptography.ogg 30.2 MB
30C3 - 2013/audio/30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_opus.opus 30.2 MB
30C3 - 2013/audio/30c3-5293-de-en-Dead_Man_Edition_opus.opus 30.2 MB
28C3 - 2011/audio/28c3-4669-en-bionic_ears.ogg 30.1 MB
30C3 - 2013/audio/30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_opus.opus 30.1 MB
27C3 - 2010/audio/27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg 30.0 MB
28C3 - 2011/audio/28c3-4764-en-automatic_algorithm_invention_with_a_gpu.ogg 30.0 MB
26C3 - 2009/audio/26c3-3266-de-hacking_the_universe.ogg 30.0 MB
23C3 - 2006/audio/23C3-1727-en-closing_ceremony.mp3 30.0 MB
21C3 - 2004/audio/126 Apache Security.mp3 30.0 MB
27C3 - 2010/audio/27c3-4339-en-openleaks.ogg 29.9 MB
30C3 - 2013/audio/30c3-5476-en-Electronic_Bank_Robberies_opus.opus 29.9 MB
25C3 - 2008/audio/25c3-2860-de-neusprech_im_berwachungsstaat.ogg 29.9 MB
27C3 - 2010/audio/27c3-4060-en-attacking_mobile_phones.ogg 29.9 MB
26C3 - 2009/audio/26c3-3481-de-leyen-rhetorik.ogg 29.8 MB
26C3 - 2009/audio/26c3-3648-en-dect_part_ii.ogg 29.8 MB
27C3 - 2010/audio/27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg 29.8 MB
28C3 - 2011/audio/28c3-4668-en-electronic_money.ogg 29.8 MB
21C3 - 2004/audio/171 Siegerehrung Lockpicking.mp3 29.7 MB
30C3 - 2013/audio/30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_opus.opus 29.7 MB
24C3 - 2007/audio/24c3-2387-en-open_source_lobbying.mp3 29.7 MB
29C3 - 2012/audio/29c3-5112-en-isps_black_box_ogg.ogg 29.7 MB
21C3 - 2004/audio/120 Softwarepatente - Ruestzeug zur Debatte.mp3 29.6 MB
19C3 - 2002/video/19C3-435-ccc-jahresrueckblick.mp4 29.6 MB
28C3 - 2011/audio/28c3-4640-en-time_is_on_my_side.ogg 29.6 MB
26C3 - 2009/audio/26c3-3713-de-unbild__pictures_and_non-pictures.ogg 29.6 MB
29C3 - 2012/audio/29c3-5178-en-the_ultimate_galaksija_talk_ogg.ogg 29.6 MB
21C3 - 2004/audio/046 Tollcollect.mp3 29.6 MB
30C3 - 2013/audio/30c3-5416-en-de-Desperately_Seeking_Susy_opus.opus 29.5 MB
28C3 - 2011/audio/28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.ogg 29.5 MB
28C3 - 2011/audio/28c3-4897-en-keynote.ogg 29.5 MB
21C3 - 2004/audio/133 How to Herd Cats.mp3 29.5 MB
29C3 - 2012/audio/29c3-5095-en-privacy_and_the_car_of_the_future_ogg.ogg 29.5 MB
21C3 - 2004/audio/013 The Art of Fingerprinting.mp3 29.4 MB
26C3 - 2009/audio/26c3-3573-en-playing_with_the_built_city.ogg 29.4 MB
26C3 - 2009/audio/26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.ogg 29.4 MB
24C3 - 2007/audio/24c3-2233-en-vx.mp3 29.4 MB
15C3 - 1998/audio/isdn_grundlagen.mp3 29.4 MB
27C3 - 2010/audio/27c3-4231-en-datenrettung_fun_with_hard_drives.ogg 29.3 MB
29C3 - 2012/audio/29c3-5085-en-everycook_ogg.ogg 29.3 MB
19C3 - 2002/audio/19C3-432-sicherheit-zeitliche-dimension.mp3 29.3 MB
27C3 - 2010/audio/27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg 29.3 MB
26C3 - 2009/audio/26c3-3547-en-after_the_hype.ogg 29.3 MB
27C3 - 2010/audio/27c3-4190-en-data_retention_in_the_eu.ogg 29.3 MB
24C3 - 2007/audio/24c3-2401-en-anonymity_for_2015.mp3 29.2 MB
28C3 - 2011/audio/28c3-4813-en-macro_dragnets.ogg 29.2 MB
27C3 - 2010/audio/27c3-4297-de-die_gesamte_technik_ist_sicher.ogg 29.2 MB
22C3 - 2005/audio/22C3-536-en-bluetooth_hacking.m4a 29.2 MB
28C3 - 2011/audio/28c3-4754-en-smart_hacking_for_privacy.ogg 29.2 MB
28C3 - 2011/audio/28c3-4700-en-what_is_whiteit.ogg 29.2 MB
27C3 - 2010/audio/27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg 29.2 MB
24C3 - 2007/audio/24c3-2358-en-guerilla_knitting.mp3 29.1 MB
26C3 - 2009/audio/26c3-3452-en-here_be_electric_dragons.ogg 29.1 MB
26C3 - 2009/audio/26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.ogg 29.1 MB
26C3 - 2009/audio/26c3-3696-en-wireless_power_transfer.ogg 29.1 MB
30C3 - 2013/audio/30c3-5433-de-en-Recht_auf_Remix_opus.opus 29.1 MB
26C3 - 2009/audio/26c3-3510-de-technik_des_neuen_epa.ogg 29.0 MB
24C3 - 2007/audio/24c3-2396-en-eu_rfid_policy.mp3 29.0 MB
28C3 - 2011/audio/28c3-4738-de-echtes_netz.ogg 29.0 MB
29C3 - 2012/audio/29c3-5308-de-en-open_source_schluessel_und_schloesser_ogg.ogg 28.9 MB
28C3 - 2011/audio/28c3-4781-en-deceiving_authorship_detection.ogg 28.9 MB
27C3 - 2010/audio/27c3-4183-en-safety_on_open_sea.ogg 28.9 MB
30C3 - 2013/audio/30c3-5298-en-de-Rock_em_Graphic_Cards_opus.opus 28.9 MB
30C3 - 2013/audio/30c3-5552-en-India_s_Surveillance_State_opus.opus 28.9 MB
30C3 - 2013/audio/30c3-5377-de-en-UEberwachen_und_Sprache_opus.opus 28.9 MB
29C3 - 2012/audio/29c3-5396-de-en-gender_studies_informatik_ogg.ogg 28.9 MB
26C3 - 2009/audio/26c3-3577-de-privacy-enhanced_event_scheduling.ogg 28.9 MB
26C3 - 2009/audio/26c3-3657-en-optimised_to_fail.ogg 28.8 MB
28C3 - 2011/audio/28c3-4821-en-not_your_grandfathers_moon_landing.ogg 28.8 MB
28C3 - 2011/audio/28c3-4913-de-almighty_dna_and_beyond.ogg 28.8 MB
24C3 - 2007/audio/24c3-2342-en-it_was_a_bad_idea_anyway.mp3 28.8 MB
25C3 - 2008/audio/25c3-3016-en-life_is_a_holodeck.ogg 28.8 MB
24C3 - 2007/audio/24c3-2286-en-openstreetmap.mp3 28.8 MB
31C3 - 2014/audio/31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_opus.opus 28.8 MB
27C3 - 2010/audio/27c3-4236-en-international_cyber_jurisdiction.ogg 28.8 MB
28C3 - 2011/audio/28c3-4763-en-the_science_of_insecurity.ogg 28.8 MB
28C3 - 2011/audio/28c3-4648-en-quantum_of_science.ogg 28.7 MB
26C3 - 2009/audio/26c3-3557-de-vom_kreationismus_zum_kollektivismus.ogg 28.7 MB
27C3 - 2010/audio/27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg 28.7 MB
26C3 - 2009/audio/26c3-3600-de-location_tracking_does_scale_up.ogg 28.7 MB
29C3 - 2012/audio/29c3-5177-en-securing_the_campaign_ogg.ogg 28.7 MB
27C3 - 2010/audio/27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg 28.7 MB
28C3 - 2011/audio/28c3-4761-en-new_ways_im_going_to_hack_your_web_app.ogg 28.6 MB
30C3 - 2013/audio/30c3-5415-de-en-Der_tiefe_Staat_opus.opus 28.6 MB
27C3 - 2010/audio/27c3-4143-en-parttimescientists.ogg 28.6 MB
31C3 - 2014/audio/31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_opus.opus 28.6 MB
21C3 - 2004/audio/159 State of Emergent Democracy.mp3 28.6 MB
23C3 - 2006/audio/23C3-1611-en-privacy_identity_and_anonymity_in_web_20.mp3 28.6 MB
25C3 - 2008/audio/25c3-2937-en-dect.ogg 28.5 MB
27C3 - 2010/audio/27c3-4245-en-adventures_in_analyzing_stuxnet.ogg 28.5 MB
24C3 - 2007/audio/24c3-2225-en-paparazzi.mp3 28.5 MB
26C3 - 2009/audio/26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.ogg 28.5 MB
28C3 - 2011/audio/28c3-4755-en-counterlobbying_eu_institutions.ogg 28.4 MB
21C3 - 2004/video/057 SUN Bloody Daft Solaris Mechanisms.mp4 28.4 MB
20C3 - 2003/video/20C3-610-Abschlussveranstaltung.mp4 28.4 MB
26C3 - 2009/audio/26c3-3468-de-privacy__stylometry.ogg 28.3 MB
29C3 - 2012/audio/29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_ogg.ogg 28.3 MB
27C3 - 2010/audio/27c3-4301-en-flow_analysis_of_internet_activities.ogg 28.3 MB
31C3 - 2014/audio/31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_opus.opus 28.3 MB
30C3 - 2013/audio/30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_opus.opus 28.3 MB
30C3 - 2013/audio/30c3-5444-en-Attacking_HomeMatic_opus.opus 28.3 MB
30C3 - 2013/audio/30c3-5223-en-WarGames_in_memory_opus.opus 28.3 MB
30C3 - 2013/video/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4 28.2 MB
21C3 - 2004/audio/078 Aspects of Elliptic Curve Cryptography.mp3 28.2 MB
25C3 - 2008/audio/25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg 28.2 MB
30C3 - 2013/audio/30c3-5360-en-Script_Your_Car__opus.opus 28.2 MB
21C3 - 2004/audio/019 Verdeckte Netzwerkanalyse.mp3 28.2 MB
27C3 - 2010/audio/27c3-4121-en-is_the_ssliverse_a_safe_place.ogg 28.1 MB
24C3 - 2007/audio/24c3-2288-de-verschwoerungstheorien.mp3 28.1 MB
29C3 - 2012/audio/29c3-5216-en-let_me_answer_that_for_you_ogg.ogg 28.1 MB
24C3 - 2007/audio/24c3-2331-en-spotter_guide_to_aacs_keys.mp3 28.1 MB
27C3 - 2010/audio/27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg 28.1 MB
24C3 - 2007/audio/24c3-2213-de-getting_things_done.mp3 28.0 MB
28C3 - 2011/audio/28c3-4871-en-hacking_mfps.ogg 28.0 MB
19C3 - 2002/video/19C3-429-abschlussveranstaltung.mp4 28.0 MB
30C3 - 2013/audio/30c3-5526-en-How_to_Build_a_Mind_opus.opus 28.0 MB
25C3 - 2008/audio/25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg 28.0 MB
29C3 - 2012/audio/29c3-5134-en-new_human_interfaces_for_music_ogg.ogg 28.0 MB
30C3 - 2013/audio/30C3_-_5622_-_en_-_30c3_keynote_-_glenn_greenwald_-_frank-direct.opus 28.0 MB
28C3 - 2011/audio/28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.ogg 28.0 MB
26C3 - 2009/audio/26c3-3501-en-why_net_neutrality_matters.ogg 28.0 MB
21C3 - 2004/audio/168 Spampolitik.mp3 28.0 MB
21C3 - 2004/audio/072 The Reality of Network Address Translators.mp3 28.0 MB
24C3 - 2007/audio/24c3-2292-en-wireless_kernel_tweaking.mp3 28.0 MB
27C3 - 2010/audio/27c3-4211-en-chip_and_pin_is_broken.ogg 27.9 MB
28C3 - 2011/audio/28c3-4736-en-defending_mobile_phones.ogg 27.9 MB
30C3 - 2013/audio/30c3-5185-en-FPGA_101_opus.opus 27.9 MB
28C3 - 2011/audio/28c3-4804-de-politik_hacken.ogg 27.9 MB
25C3 - 2008/audio/25c3-2991-en-terrorist_all-stars.ogg 27.9 MB
32C3 - 2015/audio/32c3-7102-de-Crypto_ist_Abwehr_IFG_ist_Angriff.opus 27.8 MB
30C3 - 2013/audio/30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_opus.opus 27.8 MB
24C3 - 2007/audio/24c3-2280-en-i_know_who_you_clicked_last_summer.mp3 27.8 MB
27C3 - 2010/audio/27c3-4221-en-omg_wtf_pdf.ogg 27.8 MB
23C3 - 2006/audio/23C3-1576-en-rfid_hacking.mp3 27.8 MB
25C3 - 2008/audio/25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg 27.8 MB
28C3 - 2011/audio/28c3-4766-en-802_11_packets_in_packets.ogg 27.7 MB
30C3 - 2013/audio/30c3-5474-en-World_War_II_Hackers_opus.opus 27.7 MB
26C3 - 2009/audio/26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.ogg 27.7 MB
25C3 - 2008/audio/25c3-2934-en-blinkenlights_stereoscope.ogg 27.7 MB
26C3 - 2009/audio/26c3-3515-de-secubt.ogg 27.7 MB
29C3 - 2012/audio/29c3-5140-en-safecast_ogg.ogg 27.7 MB
24C3 - 2007/audio/24c3-2270-en-sputnik_data_analysis.mp3 27.7 MB
28C3 - 2011/audio/28c3-4768-en-eating_in_the_anthropocene.ogg 27.7 MB
25C3 - 2008/audio/25c3-2863-en-climate_change_-_state_of_the_science.ogg 27.7 MB
28C3 - 2011/audio/28c3-4818-en-evolving_custom_communication_protocols.ogg 27.7 MB
28C3 - 2011/audio/28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.ogg 27.7 MB
24C3 - 2007/audio/24c3-2273-en-toying_with_barcodes.mp3 27.6 MB
28C3 - 2011/audio/28c3-4680-en-effective_dos_attacks_against_web_application_platforms.ogg 27.6 MB
22C3 - 2005/video/22C3-1102-en-message_generation_at_the_info_layer.mp4 27.6 MB
27C3 - 2010/audio/27c3-4195-de-literarischer_abend.ogg 27.6 MB
21C3 - 2004/audio/097 Das Literarische Code-Quartett.mp3 27.5 MB
27C3 - 2010/audio/27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg 27.5 MB
26C3 - 2009/audio/26c3-3670-en-blackbox_jtag_reverse_engineering.ogg 27.5 MB
24C3 - 2007/audio/24c3-2254-en-freifunkerei.mp3 27.4 MB
27C3 - 2010/audio/27c3-4206-en-immi_from_concept_to_reality.ogg 27.4 MB
30C3 - 2013/audio/30c3-5477-en-An_introduction_to_Firmware_Analysis_opus.opus 27.4 MB
27C3 - 2010/audio/27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg 27.4 MB
24C3 - 2007/audio/24c3-2228-de-lieber_cyborg_als_goettin.mp3 27.4 MB
34C3 - 2017/34C3 - The Work of Art in the Age of Digital Assassination.mp4 27.4 MB
27C3 - 2010/audio/27c3-4263-en-resisting_excessive_government_surveillance.ogg 27.4 MB
31C3 - 2014/audio/31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_opus.opus 27.4 MB
28C3 - 2011/audio/28c3-4710-en-the_future_of_cryptology.ogg 27.4 MB
34C3 - 2017/34C3 - The Work of Art in the Age of Digital Assassination - deutsche Ubersetzung.mp4 27.4 MB
21C3 - 2004/audio/183 Tor.mp3 27.3 MB
28C3 - 2011/audio/28c3-4876-de-die_spinnen_die_sachsen.ogg 27.3 MB
28C3 - 2011/audio/28c3-4811-en-rootkits_in_your_web_application.ogg 27.3 MB
23C3 - 2006/audio/23C3-1537-en-know_your_citizens.mp3 27.3 MB
27C3 - 2010/audio/27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg 27.3 MB
30C3 - 2013/audio/30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_opus.opus 27.3 MB
21C3 - 2004/audio/121 Black Ops of DNS.mp3 27.2 MB
27C3 - 2010/audio/27c3-4234-en-usb_and_libusb.ogg 27.2 MB
21C3 - 2004/video/058 The Blinking Suspects.mp4 27.2 MB
21C3 - 2004/bonus/Thriller.mp4 27.2 MB
27C3 - 2010/audio/27c3-4011-en-embedded_reverse_engineering.ogg 27.2 MB
16C3 - 1999/audio/tron.mp3 27.2 MB
21C3 - 2004/audio/250 Lightning Talks Day 3.mp3 27.2 MB
30C3 - 2013/audio/30c3-5212-en-The_GNU_Name_System_opus.opus 27.2 MB
20C3 - 2003/audio/20c3_630_The-Quintessenz-biometrics-doqubase1.ogg 27.2 MB
29C3 - 2012/audio/29c3-5285-de-en-men_who_stare_at_bits_ogg.ogg 27.1 MB
27C3 - 2010/audio/27c3-4103-en-copyright_enforcement_versus_freedoms.ogg 27.1 MB
21C3 - 2004/audio/109 Anti-Honeypot Techniques.mp3 27.0 MB
28C3 - 2011/audio/28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.ogg 27.0 MB
26C3 - 2009/audio/26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg 27.0 MB
27C3 - 2010/audio/27c3-4017-en-desktop_on_the_linux.ogg 27.0 MB
25C3 - 2008/audio/25c3-3020-en-banking_malware_101.ogg 27.0 MB
32C3 - 2015/audio/32c3-7197-en-Rowhammerjs_Root_privileges_for_web_apps.opus 27.0 MB
21C3 - 2004/audio/044 Machine Learning in Science and Engineering.mp3 27.0 MB
24C3 - 2007/audio/24c3-2294-de-23_ways_to_fight_for_your_rights.mp3 26.9 MB
20C3 - 2003/video/20C3-555-Eroeffnung.mp4 26.9 MB
21C3 - 2004/audio/278 TKUeV-Das Ohr am Draht.mp3 26.9 MB
21C3 - 2004/audio/310 Information-Wissen-Macht.mp3 26.9 MB
26C3 - 2009/audio/26c3-3490-en-building_a_debugger.ogg 26.9 MB
24C3 - 2007/audio/24c3-2380-de-nedap_wahlcomputer_in_deutschland.mp3 26.9 MB
25C3 - 2008/audio/25c3-2832-en-exploiting_symbian.ogg 26.9 MB
27C3 - 2010/audio/27c3-4018-en-frozencache.ogg 26.8 MB
28C3 - 2011/audio/28c3-4688-en-introducing_osmo_gmr.ogg 26.8 MB
30C3 - 2013/audio/30c3-5387-en-Toward_a_Cognitive_Quantified_Self__opus.opus 26.8 MB
21C3 - 2004/audio/041 Einfuehrung in Kryptographische Methoden.mp3 26.7 MB
26C3 - 2009/audio/26c3-3509-de-wofr_offenes_internet.ogg 26.7 MB
19C3 - 2002/audio/19C3-483-bsi-zertifizierung.mp3 26.7 MB
21C3 - 2004/audio/118 Verified Fiasco.mp3 26.7 MB
19C3 - 2002/audio/19C3-479-eu-urheberrechtslinie.mp3 26.6 MB
24C3 - 2007/audio/24c3-2248-de-desperate_house_hackers.mp3 26.6 MB
21C3 - 2004/audio/114 Der 2. Korb der Urheberrechtsnovelle.mp3 26.6 MB
19C3 - 2002/audio/19C3-426-ec-karten-unsicherheit.mp3 26.6 MB
21C3 - 2004/audio/246 RFID Technologie und Implikationen.mp3 26.6 MB
25C3 - 2008/audio/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg 26.6 MB
21C3 - 2004/audio/115 The Fiasco Kernel.mp3 26.5 MB
32C3 - 2015/audio/32c3-7416-en-Evolution_of_Brain-Computer_Interfaces.opus 26.5 MB
21C3 - 2004/audio/055 CCC-Jahresrueckblick.mp3 26.5 MB
28C3 - 2011/audio/28c3-4732-en-datamining_for_hackers.ogg 26.5 MB
21C3 - 2004/audio/040 Firewall Piercing.mp3 26.5 MB
28C3 - 2011/audio/28c3-4848-en-the_coming_war_on_general_computation.ogg 26.5 MB
30C3 - 2013/video/30c3-5437-en-Plants_Machines_h264-hq.mp4 26.5 MB
27C3 - 2010/audio/27c3-4164-de-friede_sei_mit_euren_daten.ogg 26.5 MB
24C3 - 2007/audio/24c3-2318-en-cybercrime20.mp3 26.4 MB
24C3 - 2007/audio/24c3-2284-en-linguistic_hacking.mp3 26.4 MB
24C3 - 2007/audio/24c3-2271-en-distributed_campaigns.mp3 26.4 MB
25C3 - 2008/audio/25c3-3023-en-making_the_theoretical_possible.ogg 26.4 MB
26C3 - 2009/audio/26c3-3523-de-eine_zensur_findet_statt.ogg 26.4 MB
21C3 - 2004/audio/117 Kampagne Fair Sharing.mp3 26.3 MB
25C3 - 2008/audio/25c3-2893-en-attacking_rich_internet_applications.ogg 26.3 MB
24C3 - 2007/audio/24c3-2344-de-grundlagen_der_sicheren_programmierung.mp3 26.3 MB
26C3 - 2009/audio/26c3-3691-de-vier_fuste_fr_ein_halleluja.ogg 26.3 MB
25C3 - 2008/audio/25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg 26.3 MB
32C3 - 2015/audio/32c3-7367-en-Ling_-_High_level_system_programming.opus 26.3 MB
20C3 - 2003/audio/20c3_602_Sniffen-fuer-Fortgeschrittene.ogg 26.3 MB
27C3 - 2010/audio/27c3-4244-en-critical_overview_of_10_years_pet.ogg 26.3 MB
27C3 - 2010/audio/27c3-4140-en-contemporary_profiling_of_web_users.ogg 26.3 MB
25C3 - 2008/audio/25c3-2816-en-cisco_ios_attack_and_defense.ogg 26.2 MB
24C3 - 2007/audio/24c3-2332-en-no_ooxml.mp3 26.2 MB
21C3 - 2004/audio/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.mp3 26.2 MB
25C3 - 2008/audio/25c3-2963-de-handschellen_hacken.ogg 26.2 MB
28C3 - 2011/audio/28c3-4935-en-eu_datenschutz_internet_der_dinge.ogg 26.2 MB
21C3 - 2004/audio/039 Squeak and Croquet.mp3 26.2 MB
24C3 - 2007/audio/24c3-2360-en-all_tomorrows.mp3 26.1 MB
25C3 - 2008/audio/25c3-2973-en-lightning_talks_day4.ogg 26.1 MB
25C3 - 2008/audio/25c3-3028-de-der_hackerparagraph_202c_stgb.ogg 26.1 MB
19C3 - 2002/audio/19C3-409-call-center.mp3 26.1 MB
28C3 - 2011/audio/28c3-4802-en-towards_a_single_secure_european_cyberspace.ogg 26.1 MB
30C3 - 2013/audio/30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_opus.opus 26.1 MB
25C3 - 2008/audio/25c3-2874-en-the_ultimate_commodore_64_talk.ogg 26.1 MB
17C3 - 2000/audio/Upcoming Security Nightmares.mp3 26.1 MB
28C3 - 2011/audio/28c3-4748-en-the_best_of_the_oxcars.ogg 26.1 MB
21C3 - 2004/audio/017 Next Generation Peer to Peer Systems.mp3 26.1 MB
28C3 - 2011/audio/28c3-4844-de-eu_datenschutz_internet_der_dinge.ogg 26.1 MB
19C3 - 2002/audio/19C3-434-security-nightmares.mp3 26.0 MB
24C3 - 2007/audio/24c3-2371-de-wahlstift.mp3 26.0 MB
26C3 - 2009/audio/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg 26.0 MB
29C3 - 2012/audio/29c3-5226-en-further_hacks_calypso_ogg.ogg 26.0 MB
24C3 - 2007/audio/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte.mp3 26.0 MB
21C3 - 2004/audio/079 AVG aint vector graphics.mp3 26.0 MB
24C3 - 2007/audio/24c3-2325-en-current_events_in_tor_development.mp3 25.9 MB
21C3 - 2004/audio/164 Barrierefreies Internet.mp3 25.9 MB
25C3 - 2008/audio/25c3-2665-en-the_trust_situation.ogg 25.9 MB
32C3 - 2015/audio/32c3-7457-en-Predicting_Crime_in_a_Big_Data_World.opus 25.9 MB
30C3 - 2013/video/30c3-5278-en-The_philosophy_of_hacking_h264-hq.mp4 25.9 MB
27C3 - 2010/audio/27c3-4176-de-hacking_ibuttons.ogg 25.8 MB
32C3 - 2015/audio/32c3-7135-de-Ein_Abgrund_von_Landesverrat.opus 25.8 MB
21C3 - 2004/audio/165 Softwarepatente - Der Tag danach.mp3 25.8 MB
25C3 - 2008/audio/25c3-2940-en-flying_for_free.ogg 25.8 MB
27C3 - 2010/audio/27c3-3957-en-ipv6_insecurities.ogg 25.8 MB
28C3 - 2011/audio/28c3-4699-en-building_a_distributed_satellite_ground_station_network.ogg 25.7 MB
32C3 - 2015/audio/32c3-7195-en-Verified_Firewall_Ruleset_Verification.opus 25.7 MB
25C3 - 2008/audio/25c3-2895-de-der_elektronische_personalausweis.ogg 25.7 MB
26C3 - 2009/audio/26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.ogg 25.7 MB
24C3 - 2007/audio/24c3-2235-en-one_token_to_rule_them_all.mp3 25.6 MB
25C3 - 2008/audio/25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg 25.6 MB
29C3 - 2012/audio/29c3-5123-en-small_footprint_inspection_techniques_for_android_ogg.ogg 25.6 MB
21C3 - 2004/audio/208 Gamecube Hacking.mp3 25.6 MB
19C3 - 2002/audio/19C3-433-tcp-ip-fuer-anfaenger.mp3 25.5 MB
27C3 - 2010/audio/27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg 25.5 MB
20C3 - 2003/audio/20c3_574_Fragen-an-eine-maschienenlesbare-Regierung.ogg 25.4 MB
27C3 - 2010/audio/27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg 25.4 MB
21C3 - 2004/audio/077 Weird Programming 2.mp3 25.4 MB
26C3 - 2009/audio/26c3-3579-en-photography_and_the_art_of_doing_it_wrong.ogg 25.4 MB
24C3 - 2007/audio/24c3-2347-en-c64_dtv_hacking.mp3 25.4 MB
29C3 - 2012/audio/29c3-5206-en-the_ethics_of_activists_ddos_actions_ogg.ogg 25.4 MB
21C3 - 2004/audio/157 Lightning Talks Day 2.mp3 25.4 MB
28C3 - 2011/audio/28c3-4742-en-from_press_freedom_to_the_freedom_of_information.ogg 25.4 MB
24C3 - 2007/audio/24c3-2253-en-dining_cryptographers.mp3 25.4 MB
28C3 - 2011/audio/28c3-4856-en-the_engineering_part_of_social_engineering.ogg 25.4 MB
25C3 - 2008/audio/25c3-2979-en-embracing_post-privacy.ogg 25.3 MB
25C3 - 2008/audio/25c3-3047-en-lightning_talks_day3_morning.ogg 25.3 MB
31C3 - 2014/audio/31c3-6370-en-Internet_of_toilets_opus.opus 25.3 MB
26C3 - 2009/audio/26c3-3504-en-our_darknet_and_its_bright_spots.ogg 25.3 MB
32C3 - 2015/audio/32c3-7114-en-Craft_leisure_and_end-user_innovation.opus 25.3 MB
26C3 - 2009/audio/26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.ogg 25.2 MB
32C3 - 2015/audio/32c3-7426-en-Intelexit.opus 25.2 MB
20C3 - 2003/audio/20c3_653_Device-Hackling-with-JTAG.ogg 25.2 MB
25C3 - 2008/audio/25c3-2899-en-mining_social_contacts_with_active_rfid.ogg 25.2 MB
32C3 - 2015/audio/32c3-7570-en-Plunge_into_Proxy_Politics.opus 25.2 MB
26C3 - 2009/audio/26c3-3685-de-im_herz_der_bestie.ogg 25.2 MB
27C3 - 2010/audio/27c3-4159-en-reverse_engineering_mos_6502.ogg 25.2 MB
33C3 - 2016/Gone in 60 Milliseconds (33c3) - deutsche Ubersetzung.mp4 25.2 MB
24C3 - 2007/audio/24c3-2131-en-port_scanning_improved.mp3 25.1 MB
21C3 - 2004/audio/209 Freedom of expression in new Arab landscape.mp3 25.1 MB
24C3 - 2007/audio/24c3-2389-en-hacking_icann.mp3 25.1 MB
24C3 - 2007/audio/24c3-2296-en-random_things.mp3 25.1 MB
26C3 - 2009/audio/26c3-3672-de-advanced_microcontroller_programming.ogg 25.1 MB
28C3 - 2011/audio/28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.ogg 25.1 MB
21C3 - 2004/audio/123 Gentoo Hardened.mp3 25.1 MB
21C3 - 2004/audio/029 Robocup.mp3 25.0 MB
25C3 - 2008/audio/25c3-2916-en-wikileaks.ogg 25.0 MB
25C3 - 2008/audio/25c3-2980-en-the_infinite_library.ogg 25.0 MB
25C3 - 2008/audio/25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg 25.0 MB
21C3 - 2004/audio/083 Quanteninformationstheorie fuer Nicht Physiker.mp3 25.0 MB
25C3 - 2008/audio/25c3-2669-en-collapsing_the_european_security_architecture.ogg 24.9 MB
32C3 - 2015/audio/32c3-7246-en-Free_Software_and_Hardware_bring_National_Sovereignty.opus 24.9 MB
27C3 - 2010/audio/27c3-4160-en-automatic_identification_cryptographic_primitives.ogg 24.9 MB
21C3 - 2004/audio/100 Anonymous communications.mp3 24.9 MB
31C3 - 2014/audio/31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_opus.opus 24.9 MB
21C3 - 2004/audio/023 Ciphire Mail.mp3 24.9 MB
27C3 - 2010/audio/27c3-4099-en-file_print_electronics.ogg 24.9 MB
25C3 - 2008/audio/25c3-2976-en-hacking_the_iphone.ogg 24.9 MB
28C3 - 2011/audio/28c3-4676-en-apple_vs_google_client_platforms.ogg 24.9 MB
29C3 - 2012/audio/29c3-5104-en-esxi_beast_ogg.ogg 24.9 MB
24C3 - 2007/audio/24c3-2321-en-d_libd_and_the_slate_project.mp3 24.8 MB
21C3 - 2004/audio/153 Suchmaschinenpolitik.mp3 24.8 MB
19C3 - 2002/audio/19C3-442-lawful-interception-europe.mp3 24.8 MB
28C3 - 2011/audio/28c3-4916-en-buggedplanet.ogg 24.8 MB
24C3 - 2007/audio/24c3-2367-en-closing_event.mp3 24.7 MB
32C3 - 2015/audio/32c3-7230-de-Lessons_learned_Freifunk_fuer_Gefluechtete.opus 24.7 MB
21C3 - 2004/audio/018 Computer und Robotik in Entenhausen.mp3 24.7 MB
28C3 - 2011/audio/28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.ogg 24.7 MB
20C3 - 2003/audio/20c3_581_CHAOS-Rueckblick-2003.ogg 24.7 MB
29C3 - 2012/audio/29c3-5368-de-en-ifg_chance_oder_buergerbluff_ogg.ogg 24.6 MB
16C3 - 1999/audio/jahresrueckblick.mp3 24.6 MB
21C3 - 2004/audio/038 Free Software Usage in South America.mp3 24.6 MB
29C3 - 2012/audio/29c3-5270-de-en-hanussens_mindreading_ogg.ogg 24.6 MB
21C3 - 2004/video/049 Zufallszahlengeneratoren.mp4 24.6 MB
29C3 - 2012/audio/29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_ogg.ogg 24.6 MB
24C3 - 2007/audio/24c3-2260-en-to_be_or_i2p.mp3 24.6 MB
21C3 - 2004/audio/244 High Speed Computing with FPGAs.mp3 24.5 MB
24C3 - 2007/audio/24c3-2189-en-hidden_trojan.mp3 24.5 MB
29C3 - 2012/audio/29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_ogg.ogg 24.5 MB
32C3 - 2015/audio/32c3-7263-en-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India.opus 24.5 MB
25C3 - 2008/audio/25c3-2975-de-zehn_big_brother_awards_in_at.ogg 24.5 MB
32C3 - 2015/audio/32c3-7360-de-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking.opus 24.5 MB
24C3 - 2007/audio/24c3-2155-en-universe_on_supercomputers.mp3 24.5 MB
21C3 - 2004/audio/135 Voting Machine Technology.mp3 24.5 MB
26C3 - 2009/audio/26c3-3631-en-finding_the_key_in_the_haystack.ogg 24.5 MB
24C3 - 2007/video/24c3-2276-en-space_communism_high.mp4 24.4 MB
32C3 - 2015/audio/32c3-7419-en-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society.opus 24.4 MB
31C3 - 2014/audio/31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_opus.opus 24.4 MB
25C3 - 2008/audio/25c3-3008-en-anatomy_of_smartphone_hardware.ogg 24.3 MB
21C3 - 2004/audio/080 USB-Unbekannter Serieller Bus.mp3 24.3 MB
25C3 - 2008/audio/25c3-3015-en-rapid_prototype_your_life.ogg 24.3 MB
27C3 - 2010/audio/27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg 24.3 MB
21C3 - 2004/audio/308 MD5 To Be Considered Harmful Someday.mp3 24.2 MB
31C3 - 2014/audio/31c3-6399-en-Global_Civil_Society_Under_Attack_opus.opus 24.2 MB
24C3 - 2007/audio/24c3-2364-en-smartcard_protocol_sniffing.mp3 24.2 MB
31C3 - 2014/audio/31c3-6253-en-de-Computer_Science_in_the_DPRK_opus.opus 24.1 MB
15C3 - 1998/audio/geschichte_des_ccc_und_des_hackertums_in_deutschland.mp3 24.1 MB
27C3 - 2010/audio/27c3-4296-en-lightning_days_d2.ogg 24.1 MB
27C3 - 2010/audio/27c3-4144-en-short_political_history_of_acoustics.ogg 24.1 MB
20C3 - 2003/audio/20c3_593_Weird-Programming.ogg 24.1 MB
25C3 - 2008/audio/25c3-2799-en-console_hacking_2008_wii_fail.ogg 24.1 MB
30C3 - 2013/audio/30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_opus.opus 24.1 MB
21C3 - 2004/audio/028 Biometrie ueberwinden.mp3 24.1 MB
32C3 - 2015/audio/32c3-7413-de-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung.opus 24.1 MB
29C3 - 2012/audio/29c3-5203-en-omg_oer_ogg.ogg 24.0 MB
21C3 - 2004/audio/047 Datamining the NSA.mp3 24.0 MB
26C3 - 2009/audio/26c3-3700-de-here_be_dragons.ogg 24.0 MB
32C3 - 2015/audio/32c3-7415-de-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen.opus 23.9 MB
32C3 - 2015/audio/32c3-7355-en-apertus_AXIOM.opus 23.9 MB
28C3 - 2011/audio/28c3-4749-en-does_hacktivism_matter.ogg 23.9 MB
28C3 - 2011/audio/28c3-4777-en-r0ket.ogg 23.9 MB
20C3 - 2003/audio/20c3_562_Der-Zettel-am-Bildschirm.ogg 23.9 MB
26C3 - 2009/audio/26c3-3710-en-the_lost_cosmonauts.ogg 23.9 MB
21C3 - 2004/audio/178 Humanoid Robots.mp3 23.8 MB
32C3 - 2015/audio/32c3-7166-de-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S.opus 23.8 MB
32C3 - 2015/audio/32c3-7400-en-Technology_and_Mass_Atrocity_Prevention.opus 23.7 MB
24C3 - 2007/audio/24c3-2322-en-infectious_diseases.mp3 23.7 MB
26C3 - 2009/audio/26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.ogg 23.7 MB
27C3 - 2010/audio/27c3-4096-en-code_deobfuscation_by_optimization.ogg 23.7 MB
32C3 - 2015/audio/32c3-7517-en-the_possibility_of_an_army.opus 23.7 MB
32C3 - 2015/audio/32c3-7441-en-The_plain_simple_reality_of_entropy.opus 23.7 MB
19C3 - 2002/audio/19C3-452-perl.mp3 23.6 MB
25C3 - 2008/audio/25c3-3044-en-all_your_bases_are_belong_to_us.ogg 23.6 MB
19C3 - 2002/audio/19C3-508-amateurfunk.mp3 23.6 MB
32C3 - 2015/audio/32c3-7314-en-All_Our_Shared_Spectrum_Are_Belong_to_Us.opus 23.5 MB
25C3 - 2008/audio/25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg 23.5 MB
25C3 - 2008/audio/25c3-3053-en-lightning_talks_day3_-_evening.ogg 23.5 MB
19C3 - 2002/audio/19C3-498-freedom-cpu.mp3 23.5 MB
19C3 - 2002/audio/19C3-430-icann-status-quo.mp3 23.5 MB
31C3 - 2014/audio/31c3-6460-en-de-Eye_Wear_Computing_opus.opus 23.5 MB
31C3 - 2014/audio/31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_opus.opus 23.4 MB
21C3 - 2004/video/173 Closing Event.mp4 23.4 MB
32C3 - 2015/audio/32c3-7529-en-Mobile_Censorship_in_Iran.opus 23.4 MB
31C3 - 2014/audio/31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_opus.opus 23.3 MB
20C3 - 2003/audio/20c3_624_Neue-Notrufnummern.ogg 23.3 MB
19C3 - 2002/audio/19C3-401-network-hijacking.mp3 23.3 MB
31C3 - 2014/audio/31c3-6582-de-Das_Transparenzportal_Hamburg_opus.opus 23.3 MB
28C3 - 2011/audio/28c3-4817-en-string_oriented_programming.ogg 23.2 MB
25C3 - 2008/audio/25c3-2952-de-pflanzenhacken.ogg 23.2 MB
30C3 - 2013/audio/30c3-5398-en-HbbTV_Security_opus.opus 23.2 MB
26C3 - 2009/audio/26c3-3608-en-playing_with_the_gsm_rf_interface.ogg 23.2 MB
19C3 - 2002/audio/19C3-488-symbolics-lisp-machines.mp3 23.2 MB
32C3 - 2015/audio/32c3-7119-en-Building_and_Breaking_Wireless_Security.opus 23.2 MB
15C3 - 1998/audio/religioese_diskussion_der_betriebssystem-evangelisten.mp3 23.2 MB
22C3 - 2005/audio/22C3-920-en-we_lost_the_war.m4a 23.1 MB
19C3 - 2002/audio/19C3-448-zero-tool-hacking.mp3 23.1 MB
24C3 - 2007/audio/24c3-2385-en-lightning_talks_2007_day_2.mp3 23.1 MB
32C3 - 2015/audio/32c3-7549-en-20_OSCILLATORS_IN_20_MINUTES.opus 23.1 MB
24C3 - 2007/audio/24c3-2212-en-unusual_web_bugs.mp3 23.1 MB
31C3 - 2014/audio/31c3-6299-en-de-Trackography_opus.opus 23.1 MB
32C3 - 2015/audio/32c3-7310-en-QRtistry.opus 23.1 MB
29C3 - 2012/audio/29c3-5180-de-en-marvin_und_der_blues_ogg.ogg 23.0 MB
25C3 - 2008/audio/25c3-3032-en-analyzing_rfid_security.ogg 23.0 MB
32C3 - 2015/audio/32c3-7530-en-Buffering_sucks.opus 22.9 MB
29C3 - 2012/video/29c3-5399-en-opening_event_h264.mp4 22.9 MB
25C3 - 2008/audio/25c3-2734-en-short_attention_span_security.ogg 22.9 MB
30C3 - 2013/audio/30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_opus.opus 22.9 MB
32C3 - 2015/audio/32c3-7547-en-libusb_Maintainer_fail.opus 22.8 MB
24C3 - 2007/audio/24c3-2133-en-building_a_hacker_space.mp3 22.8 MB
31C3 - 2014/audio/31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_opus.opus 22.8 MB
27C3 - 2010/audio/27c3-4174-en-the_hidden_nemesis.ogg 22.8 MB
29C3 - 2012/audio/29c3-5221-de-en-cyberwar_statt_cyberwar_ogg.ogg 22.8 MB
30C3 - 2013/audio/30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_opus.opus 22.8 MB
27C3 - 2010/audio/27c3-4175-en-from_robot_to_robot.ogg 22.7 MB
15C3 - 1998/audio/tcphijacking.mp3 22.7 MB
31C3 - 2014/audio/31c3-6236-en-de-Iridium_Pager_Hacking_opus.opus 22.7 MB
21C3 - 2004/audio/134 Secure Instant Messaging.mp3 22.6 MB
32C3 - 2015/audio/32c3-7202-de-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur.opus 22.6 MB
25C3 - 2008/audio/25c3-2814-de-datenpannen.ogg 22.6 MB
26C3 - 2009/audio/26c3-3594-de-internetsperren.ogg 22.5 MB
31C3 - 2014/audio/31c3-6295-de-en-Krypto_fuer_die_Zukunft_opus.opus 22.5 MB
31C3 - 2014/audio/31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_opus.opus 22.5 MB
24C3 - 2007/audio/24c3-2285-en-10ge_monitoring_live.mp3 22.5 MB
21C3 - 2004/audio/182 Radioaktive Paesse.mp3 22.5 MB
29C3 - 2012/audio/29c3-5398-en-closing_event2012_ogg.ogg 22.4 MB
31C3 - 2014/audio/31c3-6541-en-de-Forging_the_USB_armory_opus.opus 22.4 MB
24C3 - 2007/audio/24c3-2345-de-gplv3_auswirkungen.mp3 22.4 MB
24C3 - 2007/audio/24c3-2277-en-automatic_memory_management.mp3 22.3 MB
31C3 - 2014/audio/31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_opus.opus 22.3 MB
31C3 - 2014/audio/31c3-6589-en-Mr_Beam_goes_Kickstarter_opus.opus 22.3 MB
32C3 - 2015/audio/32c3-7528-en-Lets_Encrypt_--_What_launching_a_free_CA_looks_like.opus 22.2 MB
31C3 - 2014/audio/31c3-6554-en-de-Automatically_Subtitling_the_C3_opus.opus 22.2 MB
31C3 - 2014/audio/31c3-6202-en-de-Privacy_and_Consumer_Markets_opus.opus 22.2 MB
32C3 - 2015/audio/32c3-7388-en-Media_Coverage_and_the_Public_in_the_Surveillance_Society.opus 22.2 MB
31C3 - 2014/audio/31c3-6275-en-de-Living_Drones_opus.opus 22.2 MB
25C3 - 2008/audio/25c3-2781-en-objects_as_software_the_coming_revolution.ogg 22.1 MB
30C3 - 2013/audio/30c3-5610-de-Seidenstrasse_opus.opus 22.1 MB
28C3 - 2011/audio/28c3-4730-en-crowdsourcing_genome_wide_association_studies.ogg 22.1 MB
19C3 - 2002/audio/19C3-374-ccc-geschichte.mp3 22.1 MB
21C3 - 2004/audio/037 GNOME Anwendungsentwicklung.mp3 22.1 MB
30C3 - 2013/audio/30c3-5439-en-To_Protect_And_Infect_opus.opus 22.0 MB
21C3 - 2004/audio/131 Learning OpenPGP by Example.mp3 22.0 MB
25C3 - 2008/audio/25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg 22.0 MB
28C3 - 2011/audio/28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.ogg 22.0 MB
19C3 - 2002/audio/19C3-391-wikipedia.mp3 22.0 MB
19C3 - 2002/audio/19C3-400-ipv6-rapid-deployment.mp3 22.0 MB
22C3 - 2005/audio/22C3-418-en-ajax_web_applications.m4a 22.0 MB
22C3 - 2005/audio/22C3-545-en-web_of_trust.m4a 22.0 MB
30C3 - 2013/audio/30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_opus.opus 22.0 MB
19C3 - 2002/audio/19C3-494-x86_64-ia64-architecture.mp3 21.9 MB
21C3 - 2004/audio/156 Videoueberwachung im europaeischen Vergleich.mp3 21.9 MB
26C3 - 2009/audio/26c3-3302-en-i_internet.ogg 21.9 MB
21C3 - 2004/audio/015 Sicherheit bei VoIP-Systemen.mp3 21.9 MB
31C3 - 2014/audio/31c3-6596-en-de-The_Magical_Secrecy_Tour_opus.opus 21.9 MB
31C3 - 2014/audio/31c3-6385-en-de-The_Machine_To_Be_Another_opus.opus 21.9 MB
25C3 - 2008/audio/25c3-3048-en-lightning_talks_day2.ogg 21.8 MB
21C3 - 2004/audio/099 GPL fuer Anfaenger.mp3 21.8 MB
22C3 - 2005/audio/22C3-426-de-entschwoerungstheorie.m4a 21.8 MB
25C3 - 2008/audio/25c3-2843-en-algorithmic_music_in_a_box.ogg 21.8 MB
28C3 - 2011/audio/28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.ogg 21.8 MB
26C3 - 2009/audio/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg 21.8 MB
25C3 - 2008/audio/25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg 21.7 MB
30C3 - 2013/audio/30c3-5397-en-Sysadmins_of_the_world_unite__opus.opus 21.7 MB
30C3 - 2013/audio/30c3-5394-BREACH_in_Agda_opus.opus 21.7 MB
21C3 - 2004/audio/063 Edit This Page.mp3 21.7 MB
21C3 - 2004/audio/111 The Kernel Accelerator Device.mp3 21.7 MB
32C3 - 2015/audio/32c3-7264-en-Profiling_In_justice.opus 21.7 MB
21C3 - 2004/audio/127 Security Frameworks.mp3 21.7 MB
19C3 - 2002/audio/19C3-480-one-time-crypto.mp3 21.7 MB
32C3 - 2015/audio/32c3-7423-en-One_year_of_securitarian_drift_in_France.opus 21.7 MB
31C3 - 2014/audio/31c3-6358-en-de-Information_Control_and_Strategic_Violence_opus.opus 21.6 MB
25C3 - 2008/audio/25c3-2970-en-coreboot_beyond_the_final_frontier.ogg 21.6 MB
27C3 - 2010/audio/27c3-4184-de-stanislaw_lem_weltverbesserer.ogg 21.6 MB
25C3 - 2008/audio/25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg 21.6 MB
30C3 - 2013/audio/30c3-5582-en-SCADA_StrangeLove_2_opus.opus 21.5 MB
19C3 - 2002/audio/19C3-412-lockpicking.mp3 21.5 MB
20C3 - 2003/audio/20c3_546_1024bit-RSA-ist-unsicher.ogg 21.4 MB
25C3 - 2008/audio/25c3-2812-de-fnord_news_show.ogg 21.4 MB
31C3 - 2014/audio/31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_opus.opus 21.4 MB
25C3 - 2008/audio/25c3-3056-en-fnord_news_show_english_interpretation.ogg 21.4 MB
19C3 - 2002/audio/19C3-495-sctp.mp3 21.4 MB
27C3 - 2010/audio/27c3-4087-en-console_hacking_2010.ogg 21.4 MB
24C3 - 2007/audio/24c3-2216-de-erlang.mp3 21.4 MB
31C3 - 2014/audio/31c3-6402-en-de-Axoloti_opus.opus 21.4 MB
25C3 - 2008/audio/25c3-2999-en-closing_ceremony.ogg 21.4 MB
32C3 - 2015/audio/32c3-7265-en-Maritime_Robotics.opus 21.3 MB
25C3 - 2008/audio/25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg 21.3 MB
17C3 - 2000/audio/Abschlussveranstaltung.mp3 21.3 MB
17C3 - 2000/video/17C3_illuminatus.rm 21.3 MB
25C3 - 2008/audio/25c3-2827-de-u23.ogg 21.3 MB
17C3 - 2000/video/17C3_digitv_new.rm 21.2 MB
27C3 - 2010/audio/27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg 21.2 MB
19C3 - 2002/audio/19C3-500-c-optimizations.mp3 21.2 MB
26C3 - 2009/audio/26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.ogg 21.2 MB
30C3 - 2013/audio/30c3-5527-en-Basics_of_Digital_Wireless_Communication_opus.opus 21.2 MB
20C3 - 2003/audio/20c3_545_Abschlussveranstalltung-Lockpicking.ogg 21.1 MB
24C3 - 2007/audio/24c3-2303-en-inside_the_macosx_kernel.mp3 21.1 MB
31C3 - 2014/audio/31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_opus.opus 21.0 MB
22C3 - 2005/audio/22C3-520-de-geometrie_ohne_punkte.m4a 21.0 MB
25C3 - 2008/audio/25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg 21.0 MB
29C3 - 2012/audio/29c3-5404-en-noc_review_ogg.ogg 21.0 MB
31C3 - 2014/audio/31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_opus.opus 21.0 MB
21C3 - 2004/audio/051 Recent features to OpenBSD-ntpd and bgpd.mp3 21.0 MB
24C3 - 2007/audio/24c3-2166-en-embedded_devices_reverse_engineering.mp3 20.9 MB
21C3 - 2004/audio/045 Internet Censorship in China.mp3 20.9 MB
31C3 - 2014/audio/31c3-6406-en-Long_war_tactics_opus.opus 20.9 MB
32C3 - 2015/audio/32c3-7520-de-Compileroptimierungen_fuer_Forth_im_Microcontroller.opus 20.9 MB
28C3 - 2011/audio/28c3-4932-de-camp_review_2011.ogg 20.9 MB
19C3 - 2002/audio/19C3-415-biometrie.mp3 20.8 MB
31C3 - 2014/audio/31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_opus.opus 20.8 MB
30C3 - 2013/audio/30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_opus.opus 20.8 MB
19C3 - 2002/audio/19C3-381-blinkenlights-arcade.mp3 20.8 MB
21C3 - 2004/audio/141 Pirate Radio.mp3 20.8 MB
25C3 - 2008/audio/25c3-2942-de-vertex_hacking.ogg 20.8 MB
19C3 - 2002/audio/19C3-467-buergernetze.mp3 20.7 MB
22C3 - 2005/audio/22C3-1139-en-complete_harddisk_encryption_with_freebsd.m4a 20.7 MB
25C3 - 2008/audio/25c3-2596-en-swf_and_the_malware_tragedy.ogg 20.7 MB
30C3 - 2013/audio/30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_opus.opus 20.7 MB
25C3 - 2008/audio/25c3-2997-en-locating_mobile_phones_using_ss7.ogg 20.7 MB
15C3 - 1998/audio/film23_diskussion.mp3 20.6 MB
15C3 - 1998/audio/geheimdienstliche_methoden_der_informationskombination.mp3 20.6 MB
19C3 - 2002/audio/19C3-464-stego-analyse.mp3 20.6 MB
24C3 - 2007/audio/24c3-2351-de-anonaccess.mp3 20.6 MB
19C3 - 2002/audio/19C3-386-spam-prevention.mp3 20.6 MB
25C3 - 2008/audio/25c3-2872-en-the_privacy_workshop_project.ogg 20.6 MB
30C3 - 2013/audio/30c3-5356-en-Firmware_Fat_Camp_opus.opus 20.5 MB
25C3 - 2008/audio/25c3-2882-en-full-disk-encryption_crash-course.ogg 20.5 MB
25C3 - 2008/audio/25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg 20.5 MB
22C3 - 2005/audio/22C3-516-de-was_ist_technisches_wissen.m4a 20.5 MB
31C3 - 2014/audio/31c3-6071-en-Hacking_Ethics_in_Education_opus.opus 20.4 MB
20C3 - 2003/audio/20c3_577_Secure-Internet-Live-Conferencing-with-SILC.ogg 20.4 MB
26C3 - 2009/audio/26c3-3350-en-milkymist.ogg 20.4 MB
21C3 - 2004/audio/098 Portable Software-Installation with pkg source.mp3 20.4 MB
27C3 - 2010/audio/27c3-4261-en-key_recovery_attacks_rc4.ogg 20.3 MB
26C3 - 2009/audio/26c3-3596-de-cat_procsysnetipv4fuckups.ogg 20.3 MB
22C3 - 2005/audio/22C3-519-en-the_cell_processor.m4a 20.3 MB
28C3 - 2011/audio/28c3-4723-en-dc_plus_the_protocol.ogg 20.3 MB
25C3 - 2008/audio/25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg 20.3 MB
26C3 - 2009/audio/26c3-3664-en-homewreckery.ogg 20.2 MB
22C3 - 2005/audio/22C3-591-en-european_it_lobbying.m4a 20.2 MB
22C3 - 2005/audio/22C3-600-de-security_nightmares.m4a 20.2 MB
22C3 - 2005/audio/22C3-492-en-freenet_new_version.m4a 20.2 MB
24C3 - 2007/audio/24c3-2252-en-ruby_on_rails_security.mp3 20.2 MB
31C3 - 2014/audio/31c3-6462-en-de-MegaCode_to_facility_gates_opus.opus 20.2 MB
28C3 - 2011/audio/28c3-4910-de-demokratie_auf_saechsisch.ogg 20.1 MB
26C3 - 2009/audio/26c3-3496-de-fugngernavigation_mit_augmented_reality.ogg 20.0 MB
19C3 - 2002/audio/19C3-413-aes-attacks.mp3 20.0 MB
21C3 - 2004/audio/151 Side Channel Analysis of Smart Cards.mp3 19.9 MB
30C3 - 2013/audio/30c3-5607-en-The_Pirate_Cinema_opus.opus 19.9 MB
25C3 - 2008/audio/25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg 19.9 MB
27C3 - 2010/audio/27c3-4338-de-wikileaks_und_mehr.ogg 19.9 MB
30C3 - 2013/audio/30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_opus.opus 19.9 MB
22C3 - 2005/audio/22C3-427-de-wargames_hacker_spielen.m4a 19.8 MB
27C3 - 2010/audio/27c3-4085-de-digitale_spaltung_per_gesetz.ogg 19.8 MB
19C3 - 2002/audio/19C3-521-big-brother-awards-discussion.mp3 19.8 MB
21C3 - 2004/audio/081 Quantenmechanik fuer Nicht Physiker.mp3 19.8 MB
19C3 - 2002/audio/19C3-506-detecting-ddos-attacks.mp3 19.7 MB
19C3 - 2002/audio/19C3-489-big-brother-awards.mp3 19.7 MB
26C3 - 2009/audio/26c3-3507-de-fuzzing_the_phone_in_your_phone.ogg 19.7 MB
28C3 - 2011/audio/28c3-4712-en-mining_your_geotags.ogg 19.7 MB
31C3 - 2014/audio/31c3-6131-en-de-Safer_playing_with_lasers_opus.opus 19.6 MB
21C3 - 2004/audio/016 Phishing the Web.mp3 19.6 MB
30C3 - 2013/audio/30c3-5426-de-en-Das_FlipDot-Projekt_opus.opus 19.6 MB
25C3 - 2008/audio/25c3-2873-en-privacy_in_the_social_semantic_web.ogg 19.6 MB
30C3 - 2013/audio/30c3-5544-de-en-Sim_Gishel_opus.opus 19.5 MB
22C3 - 2005/audio/22C3-550-de-epass_und_biop2.m4a 19.5 MB
22C3 - 2005/audio/22C3-572-en-fuzzy_democracy.m4a 19.5 MB
26C3 - 2009/audio/26c3-3340-de-wolpertinger_ein_verteilter_portscanner.ogg 19.5 MB
25C3 - 2008/audio/25c3-2892-en-about_cyborgs_and_gargoyles_.ogg 19.4 MB
22C3 - 2005/audio/22C3-1147-en-the_realtime_podcast.m4a 19.4 MB
24C3 - 2007/audio/24c3-2250-de-abschlussbericht_fem.mp3 19.3 MB
30C3 - 2013/audio/30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_opus.opus 19.3 MB
24C3 - 2007/audio/24c3-2247-en-breaking_a_vm.mp3 19.2 MB
22C3 - 2005/audio/22C3-586-en-pypy.m4a 19.2 MB
27C3 - 2010/audio/27c3-4003-en-cybernetics_for_the_masses.ogg 19.2 MB
24C3 - 2007/audio/24c3-2190-en-introduction_in_mems.mp3 19.1 MB
25C3 - 2008/audio/25c3-2896-en-chip_reverse_engineering.ogg 19.1 MB
25C3 - 2008/audio/25c3-3007-en-running_your_own_gsm_network.ogg 19.1 MB
32C3 - 2015/audio/32c3-7138-en-Gscheitern.opus 19.1 MB
25C3 - 2008/audio/25c3-2988-en-just_estonia_and_georgia.ogg 19.0 MB
22C3 - 2005/audio/22C3-464-en-working_memory_mental_imagery.m4a 19.0 MB
25C3 - 2008/audio/25c3-3004-en-why_technology_sucks.ogg 19.0 MB
25C3 - 2008/audio/25c3-2845-en-rf_fingerprinting_of_rfid.ogg 19.0 MB
29C3 - 2012/audio/29c3-5208-en-accessibility_and_security_ogg.ogg 18.9 MB
22C3 - 2005/audio/22C3-1108-en-black_ops_of_tcp_ip.m4a 18.9 MB
22C3 - 2005/audio/22C3-888-de-digitale_buergerrechte_in_europa.m4a 18.9 MB
16C3 - 1999/audio/teslaspulen_vortrag.wav.mp3 18.9 MB
20C3 - 2003/audio/20c3_587_Daten-sammeln-fuer-Datengarten-und-Lesemaschienen.ogg 18.8 MB
22C3 - 2005/audio/22C3-1101-en-the_grey_commons.m4a 18.8 MB
22C3 - 2005/audio/22C3-602-en-protocols_services_embedded_devices.m4a 18.8 MB
27C3 - 2010/audio/27c3-4302-en-27c3_keynote_we_come_in_peace.ogg 18.8 MB
22C3 - 2005/audio/22C3-417-en-learning_js_with_google_maps.m4a 18.8 MB
32C3 - 2015/audio/32c3-7245-en-Reversing_UEFI_by_execution.opus 18.8 MB
25C3 - 2008/audio/25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg 18.7 MB
20C3 - 2003/audio/20c3_599_Software-Patente.ogg 18.7 MB
22C3 - 2005/audio/22C3-800-en-better_code.m4a 18.7 MB
29C3 - 2012/audio/29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_ogg.ogg 18.7 MB
22C3 - 2005/audio/22C3-577-de-voip_2005_regulierte_revolution.m4a 18.7 MB
22C3 - 2005/audio/22C3-801-en-vulnerability_markets.m4a 18.7 MB
24C3 - 2007/audio/24c3-2354-en-latest_trends_in_oracle_security.mp3 18.7 MB
30C3 - 2013/audio/30c3-5447-en-Policing_the_Romantic_Crowd_opus.opus 18.6 MB
22C3 - 2005/audio/22C3-1112-en-modern_disk_encryption.m4a 18.6 MB
22C3 - 2005/audio/22C3-407-en-evocell.m4a 18.6 MB
22C3 - 2005/audio/22C3-571-en-understanding_buffer_overflow_exploitation.m4a 18.5 MB
22C3 - 2005/audio/22C3-598-de-literarisches_code_quartett.m4a 18.5 MB
22C3 - 2005/audio/22C3-569-en-lojban.m4a 18.5 MB
22C3 - 2005/audio/22C3-1134-en-the_silent_decline_of_public_control.m4a 18.5 MB
22C3 - 2005/audio/22C3-882-de-biometrics_in_science_fiction.m4a 18.5 MB
30C3 - 2013/audio/30c3-5545-en-Trezor_Bitcoin_hardware_wallet_opus.opus 18.4 MB
19C3 - 2002/audio/19C3-404-unscharfe-kryptografische-fingerabdruecke.mp3 18.4 MB
22C3 - 2005/audio/22C3-495-de-hash_trust_compute.m4a 18.4 MB
22C3 - 2005/audio/22C3-585-en-agile_business_and_eu_funding.m4a 18.4 MB
22C3 - 2005/audio/22C3-390-en-private_investigations.m4a 18.3 MB
24C3 - 2007/audio/24c3-2276-en-space_communism.mp3 18.3 MB
31C3 - 2014/audio/31c3-6561-en-31C3_Opening_Event_opus.opus 18.3 MB
22C3 - 2005/audio/22C3-931-en-changing_realities.m4a 18.2 MB
22C3 - 2005/audio/22C3-562-en-the_right_track.m4a 18.2 MB
22C3 - 2005/audio/22C3-772-en-attacking_ipv6.m4a 18.2 MB
21C3 - 2004/audio/215 The Incomputable Alan Turing.mp3 18.1 MB
24C3 - 2007/audio/24c3-2214-en-make_cool_things_with_microcontrollers.mp3 18.1 MB
22C3 - 2005/audio/22C3-1148-de-sicherheitueberwachung.m4a 18.1 MB
22C3 - 2005/audio/22C3-530-en-seccode.m4a 18.0 MB
26C3 - 2009/audio/26c3-3353-de-reverse-engineering_displaylink_devices.ogg 18.0 MB
31C3 - 2014/audio/31c3-6595-en-de-Hard_Drive_Punch_opus.opus 18.0 MB
22C3 - 2005/audio/22C3-405-en-cybercrime_convention.m4a 18.0 MB
21C3 - 2004/audio/101 XMPP - Jabber.mp3 18.0 MB
24C3 - 2007/audio/24c3-2258-en-design_noir.mp3 17.9 MB
22C3 - 2005/presentations/22C3_Proceedings.pdf 17.9 MB
30C3 - 2013/audio/30c3-5588-en-de-My_journey_into_FM-RDS_opus.opus 17.9 MB
20C3 - 2003/audio/20c3_550_ROCK-Linux-Das-Tool-zum-erstellen-von-Distros.ogg 17.9 MB
22C3 - 2005/audio/22C3-768-en-free_software_gsm_phone.m4a 17.8 MB
21C3 - 2004/audio/060 Digital Prosthetics.mp3 17.8 MB
22C3 - 2005/audio/22C3-470-en-wsis_review.m4a 17.7 MB
22C3 - 2005/audio/22C3-1132-de-sony_rootkit.m4a 17.7 MB
22C3 - 2005/audio/22C3-1104-en-search_oracle_society.m4a 17.7 MB
32C3 - 2015/audio/32c3-7401-en-Internet_Cube.opus 17.7 MB
27C3 - 2010/audio/27c3-4168-en-automated_architecture_independent_gadget_search.ogg 17.7 MB
22C3 - 2005/audio/22C3-423-en-corp_vs_corp.m4a 17.6 MB
20C3 - 2003/audio/20c3_557_Ein-Rant-ueber-den-Missbrauch.ogg 17.6 MB
22C3 - 2005/audio/22C3-605-de-hacking_cctv.m4a 17.6 MB
22C3 - 2005/audio/22C3-504-en-data_retention.m4a 17.6 MB
22C3 - 2005/audio/22C3-785-de-anon_tor_jap.m4a 17.6 MB
27C3 - 2010/audio/27c3-4193-en-having_fun_with_rtp.ogg 17.6 MB
24C3 - 2007/audio/24c3-2209-en-playstation_portable_cracking.mp3 17.6 MB
19C3 - 2002/audio/19C3-440-pop-culture-and-media-hacking.mp3 17.5 MB
22C3 - 2005/audio/22C3-429-en-w3c_web.m4a 17.5 MB
24C3 - 2007/audio/24c3-2338-en-steam_powered_telegraphy.mp3 17.4 MB
22C3 - 2005/audio/22C3-788-en-the_future_of_virtualization.m4a 17.4 MB
15C3 - 1998/audio/sprache_dienste_und_kultur_des_internets.mp3 17.4 MB
21C3 - 2004/audio/142 Lightning Talks Day 1.mp3 17.4 MB
22C3 - 2005/audio/22C3-1085-en-technological_art.m4a 17.3 MB
30C3 - 2013/audio/30c3-5536-en-Long_Distance_Quantum_Communication_opus.opus 17.3 MB
27C3 - 2010/audio/27c3-4046-en-all_colours_are_beautiful.ogg 17.2 MB
22C3 - 2005/audio/22C3-933-en-w3c_mobil_css_multimodal.m4a 17.2 MB
22C3 - 2005/audio/22C3-781-en-bad_trips.m4a 17.2 MB
22C3 - 2005/audio/22C3-505-en-collateral_damage.m4a 17.1 MB
27C3 - 2010/audio/27c3-4073-de-logikschaltungen_ohne_elektronik.ogg 17.1 MB
22C3 - 2005/audio/22C3-599-en-seaside_squeak.m4a 17.1 MB
30C3 - 2013/audio/30c3-5547-en-Turing_Complete_User_opus.opus 17.1 MB
22C3 - 2005/audio/22C3-588-en-robots_for_fun_and_research.m4a 17.1 MB
32C3 - 2015/audio/32c3-7219-en-Trust_us_and_our_business_will_expand.opus 17.0 MB
22C3 - 2005/audio/22C3-1103-en-community_mesh_networking.m4a 17.0 MB
30C3 - 2013/audio/30c3-5494-en-Nerds_in_the_news_opus.opus 17.0 MB
22C3 - 2005/audio/22C3-1098-en-internet_voting_in_estonia.m4a 17.0 MB
22C3 - 2005/audio/22C3-479-en-fair_code.m4a 17.0 MB
22C3 - 2005/audio/22C3-517-en-free_software_and_anarchism.m4a 17.0 MB
22C3 - 2005/audio/22C3-782-de-urheberrecht.m4a 16.9 MB
21C3 - 2004/audio/057 SUN Bloody Daft Solaris Mechanisms.mp3 16.9 MB
22C3 - 2005/audio/22C3-1094-de-biop_2_studie.m4a 16.9 MB
22C3 - 2005/audio/22C3-558-de-erste_hilfe_fuer_nerds_und_geeks.m4a 16.8 MB
22C3 - 2005/audio/22C3-336-en-nanotechnology.m4a 16.8 MB
29C3 - 2012/audio/29c3-5077-en-ethics_in_security_research_ogg.ogg 16.8 MB
22C3 - 2005/audio/22C3-521-de-transparenz_der_verantwortung_in_behoerden.m4a 16.8 MB
22C3 - 2005/audio/22C3-508-en-media_system_deployment.m4a 16.8 MB
19C3 - 2002/audio/19C3-396-videorendering-cluster.mp3 16.8 MB
27C3 - 2010/audio/27c3-4210-en-lying_to_the_neighbours.ogg 16.8 MB
22C3 - 2005/audio/22C3-424-en-the_very_early_computer_game_history.m4a 16.8 MB
22C3 - 2005/audio/22C3-473-en-privaterra.m4a 16.7 MB
22C3 - 2005/audio/22C3-1109-de-linux_fuer_blinde_und_sehbehinderte.m4a 16.7 MB
28C3 - 2011/audio/28c3-4927-en-noc_review_28c3_camp.ogg 16.7 MB
25C3 - 2008/audio/25c3-2890-en-scalable_swarm_robotics.ogg 16.7 MB
30C3 - 2013/audio/30c3-5295-en-The_Four_Wars_opus.opus 16.6 MB
22C3 - 2005/audio/22C3-408-en-private_investigations_in_searching.m4a 16.6 MB
22C3 - 2005/audio/22C3-596-en-blackberry.m4a 16.6 MB
26C3 - 2009/audio/26c3-3717-en-closing_event.ogg 16.6 MB
20C3 - 2003/audio/20c3_603_Spam-Analyse.ogg 16.6 MB
22C3 - 2005/audio/22C3-580-en-wartracking.m4a 16.6 MB
32C3 - 2015/audio/32c3-7238-en-Vector_retrogaming.opus 16.5 MB
27C3 - 2010/audio/27c3-3983-en-hackers_and_computer_science.ogg 16.5 MB
30C3 - 2013/audio/30c3-5614-en-Perfect_Paul_opus.opus 16.5 MB
19C3 - 2002/audio/19C3-461-noc-review.mp3 16.5 MB
22C3 - 2005/audio/22C3-549-en-digital_identity.m4a 16.5 MB
19C3 - 2002/audio/19C3-445-forensik-schluesselspuren.mp3 16.5 MB
29C3 - 2012/audio/29c3-5390-en-tacticaltech_ogg.ogg 16.5 MB
22C3 - 2005/audio/22C3-513-en-military_intelligence.m4a 16.5 MB
30C3 - 2013/audio/30c3-5479-en-Building_a_safe_NFC_ticketing_system_opus.opus 16.4 MB
22C3 - 2005/audio/22C3-568-en-eu_data_retention_proposals.m4a 16.4 MB
19C3 - 2002/audio/19C3-414-kuenstliche-unintelligenz.mp3 16.4 MB
22C3 - 2005/audio/22C3-603-de-hacking_tomtom_go.m4a 16.4 MB
28C3 - 2011/audio/28c3-4869-de-tresor.ogg 16.4 MB
19C3 - 2002/audio/19C3-408-next-generation-operations-support-systems.mp3 16.4 MB
22C3 - 2005/audio/22C3-1078-en-wifi_long_shots.m4a 16.3 MB
22C3 - 2005/audio/22C3-567-en-3g_investigations.m4a 16.3 MB
22C3 - 2005/audio/22C3-478-en-desaster_areas.m4a 16.3 MB
21C3 - 2004/audio/049 Zufallszahlengeneratoren.mp3 16.2 MB
22C3 - 2005/audio/22C3-561-en-intrusion_detection_systems.m4a 16.2 MB
25C3 - 2008/audio/25c3-3002-en-squeezing_attack_traces.ogg 16.1 MB
27C3 - 2010/audio/27c3-4142-en-nodejs_as_a_networking_tool.ogg 16.1 MB
22C3 - 2005/audio/22C3-778-de-zauberhafte_naturwissenschaften.m4a 16.1 MB
17C3 - 2000/video/17C3_Movie_freedom_downtime_discussion.rm 16.1 MB
22C3 - 2005/audio/22C3-543-en-i_see_airplanes.m4a 16.0 MB
30C3 - 2013/audio/30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_opus.opus 16.0 MB
30C3 - 2013/audio/30c3-5289-en-Coding_your_body_opus.opus 15.9 MB
25C3 - 2008/audio/25c3-2839-en-cracking_the_msp430_bsl.ogg 15.9 MB
22C3 - 2005/audio/22C3-529-en-muxtcp.m4a 15.9 MB
24C3 - 2007/audio/24c3-2340-de-absurde_mathematik.mp3 15.8 MB
22C3 - 2005/audio/22C3-1084-de-informationsfreiheitsgesetz.m4a 15.8 MB
28C3 - 2011/audio/28c3-4828-de-antiforensik.ogg 15.8 MB
30C3 - 2013/audio/30c3-5420-de-en-calcpw_opus.opus 15.8 MB
24C3 - 2007/audio/24c3-2353-en-from_ring_zero_to_uid_zero.mp3 15.8 MB
22C3 - 2005/audio/22C3-490-de-data_mining_weltfrieden.m4a 15.8 MB
20C3 - 2003/audio/20c3_637_Distributed-Computing.ogg 15.8 MB
19C3 - 2002/audio/19C3-463-rsa-padding-angriffe.mp3 15.7 MB
22C3 - 2005/audio/22C3-511-de-videoueberwachung_hochschulen.m4a 15.7 MB
25C3 - 2008/audio/25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg 15.7 MB
26C3 - 2009/audio/26c3-3688-de-haste_man_netblock.ogg 15.6 MB
22C3 - 2005/audio/22C3-535-en-old_skewl_hacking.m4a 15.6 MB
32C3 - 2015/audio/32c3-7551-en-Closing_Event.opus 15.6 MB
22C3 - 2005/audio/22C3-1111-de-hexenbesen_und_heiliger_gral.m4a 15.5 MB
30C3 - 2013/audio/30c3-5425-en-Hacking_as_Artistic_Practice_opus.opus 15.5 MB
30C3 - 2013/video/30c3-5605-en-Opening_Event_h264-hq.mp4 15.5 MB
22C3 - 2005/audio/22C3-468-en-lawful_interception_of_voip_networks.m4a 15.5 MB
22C3 - 2005/audio/22C3-915-en-lightning_talk_day_4.m4a 15.5 MB
22C3 - 2005/audio/22C3-563-en-real_life_bug_finding_in_win32.m4a 15.5 MB
22C3 - 2005/audio/22C3-466-en-hacking_data_retention.m4a 15.5 MB
22C3 - 2005/audio/22C3-499-en-access_to_knowledge.m4a 15.4 MB
24C3 - 2007/audio/24c3-2256-de-openser_sip_server.mp3 15.4 MB
22C3 - 2005/audio/22C3-553-en-syscall_proxying.m4a 15.4 MB
22C3 - 2005/audio/22C3-565-en-voiphreaking.m4a 15.4 MB
30C3 - 2013/audio/30c3-5594-en-Structuring_open_hardware_projects_opus.opus 15.3 MB
22C3 - 2005/audio/22C3-544-en-applied_machine_learning.m4a 15.3 MB
25C3 - 2008/audio/25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg 15.3 MB
22C3 - 2005/audio/22C3-913-en-lightning_talk_day_3.m4a 15.3 MB
19C3 - 2002/audio/19C3-518-angriff-der-mensch-maschine-schnittstelle.mp3 15.3 MB
30C3 - 2013/audio/30c3-5469-de-en-2_Takte_spaeter_opus.opus 15.2 MB
19C3 - 2002/audio/19C3-428-eroeffnung.mp3 15.2 MB
25C3 - 2008/audio/25c3-2992-en-tricks_makes_you_smile.ogg 15.2 MB
30C3 - 2013/audio/30c3-5566-en-Open_source_experimental_incubator_build_up_opus.opus 15.1 MB
22C3 - 2005/audio/22C3-1099-en-hacking_openwrt.m4a 15.1 MB
17C3 - 2000/video/17C3_AndyMM_WauHolland_Rueckblick.rm 15.1 MB
22C3 - 2005/audio/22C3-791-de-big_brother_awards.m4a 15.1 MB
22C3 - 2005/audio/22C3-1083-en-informational_cognitive_capitalism.m4a 15.1 MB
22C3 - 2005/audio/22C3-926-en-disassembler_internals.m4a 15.0 MB
30C3 - 2013/audio/30c3-5311-en-lasers_in_space_opus.opus 15.0 MB
21C3 - 2004/audio/058 The Blinking Suspects.mp3 15.0 MB
28C3 - 2011/audio/28c3-4759-en-open_source_music_tracking_2_0.ogg 15.0 MB
30C3 - 2013/audio/30c3-5509-de-en-IFGINT_opus.opus 15.0 MB
19C3 - 2002/audio/19C3-478-ipv6.mp3 14.9 MB
30C3 - 2013/audio/30c3-5278-en-The_philosophy_of_hacking_opus.opus 14.9 MB
22C3 - 2005/audio/22C3-461-en-peer_to_peer_under_the_hood.m4a 14.9 MB
29C3 - 2012/audio/29c3-5138-en-romantichackers_ogg.ogg 14.9 MB
22C3 - 2005/audio/22C3-769-en-rfid_protocols.m4a 14.8 MB
22C3 - 2005/audio/22C3-593-en-software_patenting.m4a 14.8 MB
19C3 - 2002/audio/19C3-449-smartcards-sosse.mp3 14.8 MB
30C3 - 2013/audio/30c3-5539-en-Human_Rights_and_Technology_opus.opus 14.7 MB
27C3 - 2010/audio/27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg 14.7 MB
17C3 - 2000/audio/exploits.mp3 14.7 MB
22C3 - 2005/audio/22C3-489-en-hacking_health.m4a 14.7 MB
21C3 - 2004/audio/173 Closing Event.mp3 14.7 MB
22C3 - 2005/audio/22C3-532-de-lyrical_i.m4a 14.6 MB
29C3 - 2012/audio/29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_ogg.ogg 14.5 MB
22C3 - 2005/audio/22C3-867-de-have_you_hugged_your_mac_today.m4a 14.5 MB
30C3 - 2013/audio/30c3-5437-en-Plants_Machines_opus.opus 14.5 MB
22C3 - 2005/audio/22C3-498-de-paper_prototyping_workshop.m4a 14.5 MB
22C3 - 2005/audio/22C3-871-en-honeymonkeys.m4a 14.4 MB
22C3 - 2005/audio/22C3-482-de-atmel_avr_for_dummies.m4a 14.4 MB
24C3 - 2007/audio/24c3-2287-de-sex20.mp3 14.4 MB
15C3 - 1998/audio/chipcard_hacking_teil2.mp3 14.3 MB
30C3 - 2013/audio/30c3-5595-en-The_ArduGuitar_opus.opus 14.3 MB
21C3 - 2004/audio/125 Old Skewl Hacking.mp3 14.3 MB
22C3 - 2005/audio/22C3-556-en-preventing_buffer_overflows.m4a 14.3 MB
25C3 - 2008/audio/25c3-2681-en-repurposing_the_ti_ez430u.ogg 14.3 MB
21C3 - 2004/audio/052 Die Ueblichen Verdaechtigen.mp3 14.3 MB
21C3 - 2004/audio/146 Mehr Sicherheit fuer HostAP-WLANs.mp3 14.2 MB
22C3 - 2005/audio/22C3-428-en-hacking_challenge.m4a 14.2 MB
22C3 - 2005/audio/22C3-531-en-hopalong_casualty.m4a 14.1 MB
30C3 - 2013/audio/30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_opus.opus 14.1 MB
22C3 - 2005/audio/22C3-765-en-magnetic_stripe_technology.m4a 14.0 MB
22C3 - 2005/audio/22C3-575-en-the_realtime_thing.m4a 14.0 MB
22C3 - 2005/audio/22C3-415-en-developing_intelligent_search_engines.m4a 13.9 MB
22C3 - 2005/audio/22C3-776-en-closing_event.m4a 13.9 MB
17C3 - 2000/audio/Eroeffnung.mp3 13.9 MB
20C3 - 2003/audio/20c3_623_Softwarekunst-Projekt-runme-org.ogg 13.9 MB
28C3 - 2011/audio/28c3-4740-de-frag_den_staat.ogg 13.8 MB
21C3 - 2004/video/249 Opening Event.mp4 13.8 MB
22C3 - 2005/audio/22C3-503-de-esperanto.m4a 13.8 MB
22C3 - 2005/audio/22C3-911-en-lightning_talk_day_1.m4a 13.7 MB
22C3 - 2005/audio/22C3-589-en-anonymous_data_broadcasting.m4a 13.7 MB
20C3 - 2003/audio/20c3_631_SkoleLinux.ogg 13.7 MB
30C3 - 2013/audio/30c3-5319-en-Technomonopolies_opus.opus 13.7 MB
22C3 - 2005/audio/22C3-483-de-ccc_jahresrueckblick.m4a 13.6 MB
28C3 - 2011/audio/28c3-4656-en-ooops_i_hacked_my_pbx.ogg 13.6 MB
30C3 - 2013/audio/30c3-5405-en-Data_Mining_for_Good_opus.opus 13.5 MB
22C3 - 2005/audio/22C3-1295-en-future_challenges.m4a 13.5 MB
27C3 - 2010/audio/27c3-4299-en-closing_event.ogg 13.3 MB
17C3 - 2000/video/17C3_AndyMM_WauHolland_Abschluss.rm 13.3 MB
22C3 - 2005/audio/22C3-798-en-tcpip_covert_channels.m4a 13.3 MB
22C3 - 2005/audio/22C3-828-en-terminator_genes_and_gurt.m4a 13.2 MB
15C3 - 1998/audio/chipcard_hacking_teil1.mp3 13.2 MB
30C3 - 2013/audio/30c3-5453-en-Against_Metadata_opus.opus 13.2 MB
15C3 - 1998/audio/denial_of_service_attacks.mp3 13.2 MB
28C3 - 2011/audio/28c3-4587-en-bup_git_for_backups.ogg 13.1 MB
24C3 - 2007/audio/24c3-2359-en-brilliant_deviants.mp3 13.1 MB
19C3 - 2002/audio/19C3-481-raketen-basteln.mp3 13.0 MB
29C3 - 2012/audio/29c3-5210-en-on_breaking_saml_ogg.ogg 13.0 MB
31C3 - 2014/audio/31c3-6562-de-en-31C3_Closing_Event_opus.opus 13.0 MB
25C3 - 2008/audio/25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg 12.9 MB
20C3 - 2003/audio/20c3_560_Soziale-Software.ogg 12.9 MB
28C3 - 2011/audio/28c3-4760-en-chokepointproject.ogg 12.9 MB
28C3 - 2011/audio/28c3-4826-en-a_brief_history_of_plutocracy.ogg 12.8 MB
28C3 - 2011/audio/28c3-4770-en-dont_scan_just_ask.ogg 12.7 MB
28C3 - 2011/audio/28c3-4847-en-reverse_engineering_usb_devices.ogg 12.5 MB
28C3 - 2011/audio/28c3-4652-en-data_mining_the_israeli_census.ogg 12.5 MB
15C3 - 1998/audio/schulen_lehrer_und_blamagen.mp3 12.5 MB
25C3 - 2008/audio/25c3-2904-en-solar-powering_your_geek_gear.ogg 12.4 MB
28C3 - 2011/audio/28c3-4767-en-security_log_visualization_with_a_correlation_engine.ogg 12.4 MB
19C3 - 2002/audio/19C3-429-abschlussveranstaltung.mp3 12.3 MB
22C3 - 2005/audio/22C3-606-en-autodafe.m4a 12.1 MB
22C3 - 2005/audio/22C3-1077-en-quantum_entanglement.m4a 12.0 MB
27C3 - 2010/audio/27c3-4181-en-sip_home_gateways_under_fire.ogg 12.0 MB
27C3 - 2010/audio/27c3-4006-en-diy_synthesizers_and_sound_generators.ogg 12.0 MB
22C3 - 2005/audio/22C3-601-de-fnord_jahresrueckblick.m4a 12.0 MB
32C3 - 2015/audio/32c3-7550-en-Opening_Event_opus.opus 11.9 MB
21C3 - 2004/audio/312 Wirklich selbst denken oder durchdrehen.mp3 11.9 MB
22C3 - 2005/audio/22C3-574-en-memory_allocator_security.m4a 11.9 MB
20C3 - 2003/audio/20c3_644_Gute-Antennen-selber-bauen.ogg 11.9 MB
22C3 - 2005/video/22C3-491-en-advanced_buffer_overflow_methods.mp4 11.8 MB
17C3 - 2000/video/17C3_fefe_multicast.rm 11.6 MB
22C3 - 2005/audio/22C3-912-en-lightning_talk_day_2.m4a 11.6 MB
22C3 - 2005/audio/22C3-469-en-learning_cryptography.m4a 11.1 MB
20C3 - 2003/audio/20c3_531_NOC-Preview_audio.ogg 10.6 MB
20C3 - 2003/audio/20c3_610_Abschlussveranstaltung.ogg 10.5 MB
24C3 - 2007/audio/24c3-2326-en-diy_survival.mp3 10.4 MB
22C3 - 2005/audio/22C3-496-en-22c3_network.m4a 10.2 MB
22C3 - 2005/audio/22C3-864-de-das_geheimnis_reloaded.m4a 10.0 MB
17C3 - 2000/audio/Rueckblick.mp3 9.8 MB
17C3 - 2000/video/17C3_AndyMM_WauHolland_intro.rm 9.8 MB
20C3 - 2003/audio/20c3_555_Eroeffnung.ogg 9.6 MB
21C3 - 2004/video/157 Lightning Talk-SEXual Salvation .mp4 9.0 MB
21C3 - 2004/video/157 Lightning Talk-Piepie.mp4 8.9 MB
22C3 - 2005/audio/22C3-1102-en-message_generation_at_the_info_layer.m4a 8.5 MB
21C3 - 2004/audio/113 Automated Hacking via Google.mp3 8.3 MB
31C3 - 2014/audio/31c3-6608-en-Premiere_We_love_surveillance_opus.opus 7.6 MB
21C3 - 2004/audio/249 Opening Event.mp3 7.1 MB
29C3 - 2012/audio/29c3-5399-en-opening_event_ogg.ogg 6.2 MB
21C3 - 2004/video/157 Lightning Talk-Liquid Democracy Voting Machines in Brazil.mp4 6.1 MB
28C3 - 2011/audio/28c3-4899-en-closing_event.ogg 6.1 MB
24C3 - 2007/audio/24c3-2366-en-opening_event.mp3 5.8 MB
21C3 - 2004/video/250 Lightning Talk-Subnetting in P2P systems.mp4 5.8 MB
21C3 - 2004/video/250 Lightning Talk-IT security magazines in Europe.mp4 5.8 MB
21C3 - 2004/video/142 Lightning Talk-IT Security - Quo Vadis.mp4 5.7 MB
21C3 - 2004/video/157 Lightning Talk-Window Manager Improved GUI Concepts.mp4 5.7 MB
21C3 - 2004/video/250 Lightning Talk-Introducing Meshdisk single floppy Linux.mp4 5.6 MB
30C3 - 2013/audio/30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_opus.opus 5.6 MB
32C3 - 2015/audio/32c3-7279-en-Public_Library_Memory_of_the_World.opus 5.5 MB
30C3 - 2013/audio/30c3-5605-en-Opening_Event_opus.opus 5.4 MB
21C3 - 2004/video/21C3_-_The_Network_Equipment_Delivery.mp4 5.4 MB
21C3 - 2004/video/142 Lightning Talk-Linuxclub.de.mp4 5.4 MB
21C3 - 2004/video/250 Lightning Talk-Mute Magazine and openmute.org.mp4 5.3 MB
21C3 - 2004/bonus/21C3-trailer.mp4 5.2 MB
21C3 - 2004/video/250 Lightning Talk-Block Ciphers creates by evolutionary algorithms.mp4 5.2 MB
21C3 - 2004/presentations/125 Old Skewl Hacking Infra Red.pdf 5.1 MB
21C3 - 2004/video/157 Lightning Talk-Whats hot in Wikilandia.mp4 5.1 MB
15C3 - 1998/audio/interview_mit_tron.mp3 5.0 MB
21C3 - 2004/video/157 Lightning Talk-trusted computing for everybody.mp4 5.0 MB
21C3 - 2004/video/250 Lightning Talk-NetBSD Status Report.mp4 4.7 MB
21C3 - 2004/video/157 Lightning Talk-TPP text presentation program.mp4 4.5 MB
21C3 - 2004/presentations/044 Machine Learning in Science and Engineering.pdf 4.5 MB
21C3 - 2004/video/142 Lightning Talk-Plazes by Plazes.mp4 4.3 MB
21C3 - 2004/video/142 Lightning Talk-Shortest C Coding Contest Announcement.mp4 4.2 MB
21C3 - 2004/video/157 Lightning Talk-muttng.mp4 4.1 MB
21C3 - 2004/video/157 Lightning Talk-New Demonstration Tactics Pink Silver Block.mp4 4.0 MB
21C3 - 2004/video/157 Lightning Talk-Bags for Cellphones Silvercell.mp4 4.0 MB
33C3 - 2016/Talking Behind Your Back (33c3) - deutsche Ubersetzung.mp4 3.9 MB
21C3 - 2004/presentations/121 Black Ops of DNS.pdf 3.8 MB
21C3 - 2004/presentations/310 Information-Wissen-Macht.pdf 3.8 MB
21C3 - 2004/video/250 Lightning Talk-Stacksmashing Winner.mp4 3.7 MB
22C3 - 2005/audio/22C3-491-en-advanced_buffer_overflow_methods.m4a 3.6 MB
21C3 - 2004/presentations/070 Fnord-Jahresrueckblick.pdf 3.6 MB
15C3 - 1998/audio/versuche_einer_klaerung_von_trons_tod.mp3 3.6 MB
21C3 - 2004/presentations/153 Suchmaschinenpolitik.pdf 3.5 MB
21C3 - 2004/presentations/183 Tor.pdf 3.5 MB
21C3 - 2004/presentations/029 Robocup.pdf 3.4 MB
21C3 - 2004/presentations/271 Hidden Data in Internet Published Documents.pdf 3.3 MB
21C3 - 2004/presentations/232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf 3.3 MB
21C3 - 2004/presentations/059 Wikipedia Sociographics.pdf 3.2 MB
21C3 - 2004/presentations/079 AVG aint vector graphics.pdf 3.1 MB
15C3 - 1998/audio/eroeffnung.mp3 3.1 MB
21C3 - 2004/presentations/140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf 2.8 MB
21C3 - 2004/presentations/012 Natural Language Steganography.pdf 2.7 MB
21C3 - 2004/presentations/136 Hacking Linux-Powered Devices.pdf 2.7 MB
21C3 - 2004/presentations/178 Humanoid Robots.pdf 2.6 MB
21C3 - 2004/presentations/077 Weird Programming 2.pdf 2.3 MB
21C3 - 2004/presentations/158 How to find anything on the web.pdf 2.2 MB
21C3 - 2004/presentations/040 Firewall Piercing.pdf 2.0 MB
21C3 - 2004/presentations/108 The Convergence of Anti-Counterfeiting and Computer Security.pdf 2.0 MB
33C3 - 2016/Dissecting HDMI (33c3).mp4 1.9 MB
21C3 - 2004/presentations/126 Apache Security.pdf 1.9 MB
21C3 - 2004/presentations/168 Spampolitik.pdf 1.8 MB
21C3 - 2004/presentations/207 Amateurfunk.pdf 1.8 MB
21C3 - 2004/presentations/216 Hacking The Genome.pdf 1.7 MB
21C3 - 2004/presentations/208 GameCube Hacking.pdf 1.7 MB
23C3 - 2006/video/23C3-1602-en-subverting_ajax.mp4 1.7 MB
21C3 - 2004/video/142 Lightning Talk-Stacksmashing Contest.mp4 1.7 MB
23C3 - 2006/video/23C3-1680-de-neues_gesetzliches_verbot_des_hackings.mp4 1.7 MB
21C3 - 2004/presentations/130 Physical Security.pdf 1.7 MB
21C3 - 2004/audio/331 Biometrie ueberwinden Wdh.mp3 1.7 MB
21C3 - 2004/presentations/118 Verified Fiasco.pdf 1.7 MB
21C3 - 2004/presentations/151 Side Channel Analysis of Smart Cards.pdf 1.6 MB
23C3 - 2006/video/23C3-1561-de-big_brother_awards.mp4 1.6 MB
21C3 - 2004/presentations/081 Quantenmechanik fuer Nicht Physiker.pdf 1.6 MB
21C3 - 2004/presentations/176 Passive covert channels in the Linux kernel.pdf 1.5 MB
23C3 - 2006/video/23C3-1656-en-dylan_network_security.mp4 1.4 MB
23C3 - 2006/video/23C3-1576-en-rfid_hacking.mp4 1.4 MB
17C3 - 2000/audio/fefe_multicast.mp3 1.4 MB
21C3 - 2004/presentations/063 Edit This Page.pdf 1.4 MB
21C3 - 2004/presentations/083 Quanteninformationstheorie fuer Nicht Physiker.pdf 1.4 MB
21C3 - 2004/presentations/109 Anti-Honeypot Techniques.pdf 1.3 MB
21C3 - 2004/presentations/065 Grundlagen des Compilerdesign.pdf 1.3 MB
23C3 - 2006/video/23C3-1692-en-hacking_the_electoral_law.mp4 1.3 MB
23C3 - 2006/video/23C3-1461-en-the_grim_meathook_future.mp4 1.3 MB
21C3 - 2004/presentations/255 Pixels want to talk.pdf 1.3 MB
21C3 - 2004/presentations/068 NOC Overview.pdf 1.2 MB
21C3 - 2004/presentations/046 Tollcollect.pdf 1.2 MB
21C3 - 2004/presentations/058 The Blinking Suspects.pdf 1.1 MB
21C3 - 2004/presentations/013 The Art of Fingerprinting.pdf 1.1 MB
21C3 - 2004/presentations/242 Weird Programming 1.pdf 1.1 MB
23C3 - 2006/video/23C3-1537-en-know_your_citizens.mp4 1.1 MB
21C3 - 2004/presentations/064 Trusted Computing.pdf 1.1 MB
21C3 - 2004/presentations/187 Einfuehrung in die Rastersondenmikroskopie.pdf 1.1 MB
21C3 - 2004/presentations/017 Next Generation Peer to Peer Systems.pdf 1.0 MB
21C3 - 2004/presentations/039 Squeak and Croquet.pdf 1.0 MB
21C3 - 2004/presentations/023 Ciphire Mail.pdf 1.0 MB
21C3 - 2004/presentations/080 USB-Unbekannter Serieller Bus.pdf 996.0 kB
21C3 - 2004/presentations/214 Kryptographie in Theorie und Praxis.pdf 935.5 kB
21C3 - 2004/presentations/097 Das Literarische Code-Quartett.pdf 933.6 kB
21C3 - 2004/video/21C3-trailer.mp4 929.3 kB
21C3 - 2004/presentations/165 Softwarepatente - Der Tag danach.pdf 926.8 kB
21C3 - 2004/presentations/051 Recent features to OpenBSD-ntpd and bgpd.pdf 919.5 kB
21C3 - 2004/presentations/246 RFID Technologie und Implikationen.pdf 887.2 kB
21C3 - 2004/presentations/037 GNOME Anwendungsentwicklung.pdf 836.8 kB
21C3 - 2004/presentations/016 Phishing the Web.pdf 780.9 kB
21C3 - 2004/presentations/277 Das Programmiersystem Forth.pdf 777.4 kB
21C3 - 2004/presentations/062 Hacking EU funding for a FOSS project.pdf 774.4 kB
21C3 - 2004/presentations/115 The Fiasco Kernel.pdf 759.8 kB
21C3 - 2004/presentations/019 Verdeckte Netzwerkanalyse.pdf 729.1 kB
21C3 - 2004/presentations/213 Haskell.pdf 697.4 kB
21C3 - 2004/presentations/105 Honeypot Forensics.pdf 684.6 kB
21C3 - 2004/presentations/026 SAP R3 Protocol Reverse Engineering.pdf 674.8 kB
21C3 - 2004/presentations/146 Mehr Sicherheit fuer HostAP-WLANs.pdf 671.8 kB
21C3 - 2004/presentations/250 Lightning Talk-NetBSD Status Report.pdf 667.0 kB
21C3 - 2004/presentations/315 Fight for your Right to Fileshare.pdf 652.5 kB
21C3 - 2004/presentations/045 Internet Censorship in China.pdf 588.4 kB
21C3 - 2004/presentations/038 Free Software Usage in South America.pdf 582.4 kB
21C3 - 2004/presentations/273 Crashkurs Mathematik am Beispiel Biometrie.pdf 579.8 kB
33C3 - 2016/A New Dark Age (33c3).mp4 569.6 kB
21C3 - 2004/presentations/014 Feuriges Hacken.pdf 508.6 kB
21C3 - 2004/presentations/159 State of Emergent Democracy.pdf 497.7 kB
21C3 - 2004/presentations/049 Zufallszahlengeneratoren.pdf 497.1 kB
21C3 - 2004/presentations/272 Sicherheitsmanagement.pdf 487.4 kB
33C3 - 2016/Hochsicherheits-GeneralschlUssel Marke Eigenbau (33c3).mp4 432.7 kB
21C3 - 2004/presentations/078 Aspects of Elliptic Curve Cryptography.pdf 425.6 kB
33C3 - 2016/An Elevator to the Moon (and back) (33c3).mp4 420.9 kB
21C3 - 2004/presentations/114 Der 2. Korb der Urheberrechtsnovelle.pdf 389.3 kB
21C3 - 2004/presentations/306 Ruby.pdf 374.6 kB
21C3 - 2004/presentations/066 Bluetooth Hacking.pdf 362.1 kB
21C3 - 2004/presentations/060 Digital Prosthetics.pdf 349.2 kB
21C3 - 2004/presentations/027 Biometrie in Ausweisdokumenten.pdf 343.4 kB
33C3 - 2016/A New Dark Age (33c3) - deutsche Ubersetzung.mp4 338.3 kB
33C3 - 2016/Technologien fUr und wider Digitale Souveränität (33c3) - english translation.mp4 337.3 kB
19C3 - 2002/presentations/19C3-506-slides.pdf 326.0 kB
21C3 - 2004/presentations/107 Embedded Devices as an attack vector.pdf 305.0 kB
21C3 - 2004/presentations/316 Bericht von den BigBrotherAwards.pdf 300.2 kB
21C3 - 2004/presentations/317 Unsicherheit von Personal Firewalls.pdf 296.1 kB
21C3 - 2004/presentations/131 Learning OpenPGP by Example.pdf 294.6 kB
21C3 - 2004/presentations/099 GPL fuer Anfaenger.pdf 275.1 kB
21C3 - 2004/presentations/098 Portable Software-Installation with pkg source.pdf 267.8 kB
19C3 - 2002/presentations/Internet-Zensur-in-NRW.pdf 260.5 kB
19C3 - 2002/presentations/19C3-506-slides.ppt 254.0 kB
33C3 - 2016/The Nibbletronic (33c3) - deutsche Ubersetzung.mp4 237.5 kB
21C3 - 2004/presentations/111 The Kernel Accelerator Device.pdf 228.9 kB
21C3 - 2004/presentations/110 Applied Data Mining.pdf 223.8 kB
21C3 - 2004/presentations/278 TKUeV-Das Ohr am Draht.pdf 206.6 kB
21C3 - 2004/presentations/123 Gentoo Hardened.pdf 201.8 kB
21C3 - 2004/presentations/056 LiberTOS.pdf 201.5 kB
21C3 - 2004/presentations/042 Cored Programming.pdf 200.9 kB
19C3 - 2002/presentations/19C3-411-pressemappe.pdf 200.1 kB
33C3 - 2016/How Do I Crack Satellite and Cable Pay TV (33c3).srt 173.9 kB
21C3 - 2004/presentations/218 Practical MacOS X Insecurities.pdf 170.8 kB
21C3 - 2004/presentations/011 xDash.pdf 168.9 kB
33C3 - 2016/Console Hacking 2016 (33c3).srt 165.3 kB
33C3 - 2016/Stopping law enforcement hacking (33c3) - english translation.srt 162.8 kB
33C3 - 2016/Nicht öffentlich. (33c3) - english translation.srt 161.7 kB
33C3 - 2016/Software Defined Emissions (33c3).srt 161.3 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Monero Hardware Development.en.transcribed.srt 161.3 kB
33C3 - 2016/Die Sprache der Populisten (33c3) - english translation.srt 160.9 kB
33C3 - 2016/Untrusting the CPU (33c3).srt 160.8 kB
33C3 - 2016/Liberté, Égalité, Fraternité... and privacy ! (33c3) - deutsche Ubersetzung.mp4 160.2 kB
33C3 - 2016/3 Years After Snowden Is Germany fighting State Surveillance (33c3).srt 159.9 kB
17C3 - 2000/video/17C3_digitv.rm 159.7 kB
19C3 - 2002/presentations/19C3-518-slides-de.pdf 158.7 kB
21C3 - 2004/presentations/308 MD5 To Be Considered Harmful Someday.pdf 157.4 kB
33C3 - 2016/A look into the Mobile Messaging Black Box (33c3).srt 157.1 kB
19C3 - 2002/presentations/19C3-518-slides-en.pdf 155.9 kB
33C3 - 2016/Visiting The Bear Den (33c3).srt 155.8 kB
33C3 - 2016/EinfUhrung zu Blockchains (33c3) - english translation.srt 153.2 kB
21C3 - 2004/presentations/120 Softwarepatente - Ruestzeug zur Debatte.pdf 152.8 kB
33C3 - 2016/Recount 2016 An Uninvited Security Audit of the U.S. Presidential Election (33c3).srt 150.5 kB
33C3 - 2016/Woolim - Lifting the Fog on DPRK’s Latest Tablet PC (33c3).srt 150.5 kB
21C3 - 2004/presentations/117 Kampagne Fair Sharing.pdf 150.2 kB
33C3 - 2016/Where in the World Is Carmen Sandiego (33c3).srt 149.5 kB
33C3 - 2016/Copywrongs 2.0 (33c3).srt 148.2 kB
19C3 - 2002/presentations/19C3-484-slides.sdd 148.0 kB
33C3 - 2016/No USB No problem. (33c3) - YouTube.srt 147.0 kB
33C3 - 2016/Predicting and Abusing WPA2 802.11 Group Keys (33c3).srt 146.8 kB
21C3 - 2004/presentations/274 Praktische Anleitung zum Bau eines Radiosenders.pdf 146.7 kB
21C3 - 2004/presentations/244 High Speed Computing with FPGAs.pdf 144.7 kB
33C3 - 2016/SearchWing - Drones to find refugees in Mediterranean Sea (33c3) - english translation.srt 144.5 kB
33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3).mp4 143.6 kB
33C3 - 2016/On the Security and Privacy of Modern Single Sign-On in the Web (33c3).srt 142.9 kB
33C3 - 2016/The Fight for Encryption in 2016 (33c3).srt 141.7 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Magic Internet Money.en.transcribed.srt 139.4 kB
33C3 - 2016/The DROWN Attack (33c3).srt 138.7 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Privacy-Oriented Distributed Networking for an Ethical Internet - including 50 sub.en.transcribed.srt 138.0 kB
33C3 - 2016/Building a high throughput low-latency PCIe based SDR (33c3).srt 137.4 kB
33C3 - 2016/What could possibly go wrong with (insert x86 instruction here) (33c3).srt 136.5 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Ethereum AMA.en.transcribed.srt 132.5 kB
33C3 - 2016/Downgrading iOS From past to present (33c3).srt 130.6 kB
33C3 - 2016/The Untold Story of Edward Snowden’s Escape from Hong Kong (33c3).srt 126.7 kB
21C3 - 2004/presentations/134 Secure Instant Messaging.pdf 123.6 kB
19C3 - 2002/presentations/479/content.xml 120.3 kB
33C3 - 2016/Exploiting PHP7 unserialize (33c3).srt 119.8 kB
33C3 - 2016/Netzpolitik in Österreich (33c3) - english translation.srt 119.7 kB
21C3 - 2004/presentations/057 SUN Bloody Daft Solaris Mechanisms.pdf 118.6 kB
21C3 - 2004/presentations/067 Inside PDF.pdf 118.1 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Namecoin as a Decentralized Alternative to Certificate Authorities for TLS.en.transcribed.srt 117.4 kB
33C3 - 2016/Reverse engineering Outernet (33c3).srt 117.2 kB
33C3 - 2016/The Global Assassination Grid (33c3).srt 116.3 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Bisq - A decentralized bitcoin exchange.en.transcribed.srt 116.1 kB
33C3 - 2016/Bootstraping a slightly more secure laptop (33c3).srt 110.2 kB
33C3 - 2016/A world without blockchain (33c3).srt 107.9 kB
21C3 - 2004/presentations/313 Biometrie als datenschutzrechtliches Problem.pdf 107.4 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Nextcloud End to End Encryption.en.transcribed.srt 106.2 kB
21C3 - 2004/presentations/127 Security Frameworks.pdf 105.1 kB
33C3 - 2016/You can -j REJECT but you can not hide Global scanning of the IPv6 Internet (33c3).srt 102.8 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Monerujo - Android Monero Wallet.en.transcribed.srt 102.7 kB
19C3 - 2002/presentations/19C3-432-slides.pdf 101.3 kB
21C3 - 2004/presentations/055 CCC-Jahresrueckblick.pdf 101.1 kB
33C3 - 2016/Netzpolitik in der Schweiz 2016 (33c3) - english translation.srt 101.0 kB
21C3 - 2004/presentations/041 Einfuehrung in Kryptographische Methoden.pdf 99.9 kB
33C3 - 2016/Zwischen Technikbegeisterung und kritischer Reflexion Chaos macht Schule (33c3) - english translati.srt 99.0 kB
19C3 - 2002/presentations/19C3-434-slides.pdf 96.6 kB
21C3 - 2004/presentations/129 Die Propagandawueste des realen Krieges.pdf 96.3 kB
33C3 - 2016/Wheel of Fortune (33c3).srt 96.0 kB
21C3 - 2004/presentations/101 XMPP - Jabber.pdf 94.4 kB
21C3 - 2004/presentations/095 Security Nightmares 2005.pdf 90.0 kB
21C3 - 2004/presentations/015 Sicherheit bei VoIP-Systemen.pdf 89.7 kB
33C3 - 2016/The Clash of Digitalizations (33c3).srt 88.8 kB
21C3 - 2004/presentations/289 Mixing VJing and Post-Production.pdf 87.8 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - SecureDrop.en.transcribed.srt 86.4 kB
21C3 - 2004/presentations/100 Anonymous communications.pdf 85.5 kB
21C3 - 2004/presentations/135 Voting Machine Technology.pdf 84.9 kB
33C3 - 2016/Routerzwang und Funkabschottung (33c3).mp4 82.0 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Scalable and privacy-respectful distributed systems - Our chance to avoid cloud co.en.transcribed.srt 81.5 kB
21C3 - 2004/presentations/113 Automated Hacking via Google.pdf 80.3 kB
21C3 - 2004/presentations/122 Enforcement of Intellectual Property Rights under German Private Law.pdf 80.0 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Die Programmiersprache Forth.en.transcribed.srt 79.6 kB
21C3 - 2004/presentations/053 Enforcing the GNU GPL.pdf 78.9 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Worldviews Hacking Abstractions.en.transcribed.srt 78.3 kB
33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3).srt 78.2 kB
33C3 - 2016/Make the Internet Neutral Again (33c3).srt 78.0 kB
33C3 - 2016/Pegasus internals (33c3).srt 77.5 kB
32C3 - 2015/audio/32c3-7491-en-De-anonymizing_Programmers.opus 77.1 kB
33C3 - 2016/Syrian Archive (33c3).srt 76.5 kB
33C3 - 2016/Routerzwang und Funkabschottung (33c3) - english translation.srt 75.8 kB
33C3 - 2016/How physicists analyze massive data LHC + brain + ROOT = Higgs (33c3).srt 75.4 kB
33C3 - 2016/Whats It Doing Now (33c3).srt 73.5 kB
33C3 - 2016/In Search of Evidence-Based IT-Security (33c3).srt 73.4 kB
33C3 - 2016/Hacking the World (33c3).srt 71.9 kB
33C3 - 2016/Shut Up and Take My Money! (33c3).srt 71.0 kB
33C3 - 2016/Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken (33c3) - english tran.srt 69.9 kB
33C3 - 2016/Welcome to the Anthropocene (33c3).srt 68.5 kB
33C3 - 2016/Space making space shaping (33c3) - english translation.srt 68.0 kB
33C3 - 2016/Geolocation methods in mobile networks (33c3).srt 65.9 kB
21C3 - 2004/presentations/072 The Reality of Network Address Translators.pdf 65.5 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - On Scripting.en.transcribed.srt 64.4 kB
19C3 - 2002/presentations/19C3-453-manuscript.rtf 59.9 kB
33C3 - 2016/International exchange of tax information (33c3).srt 58.8 kB
33C3 - 2016/Der 33 JahrerUckblick (33c3).srt 54.7 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - A Blueprint for Making Namecoin Anonymous.en.transcribed.srt 52.4 kB
33C3 - 2016/Tapping into the core (33c3).srt 52.1 kB
21C3 - 2004/presentations/253 Pixels want to be many.pdf 50.1 kB
33C3 - 2016/Kampf dem Abmahnunwesen (33c3) - english translation.srt 49.1 kB
21C3 - 2004/presentations/052 Die Ueblichen Verdaechtigen.pdf 48.2 kB
21C3 - 2004/presentations/163 SPAM Workshop.pdf 44.9 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Hacking Sovereignty in Catalonia; 1st Step Decentralized Infrastructure.en.transcribed.srt 44.7 kB
33C3 - 2016/Shut Up and Take My Money! (33c3).mp4 43.9 kB
33C3 - 2016/Kampf dem Abmahnunwesen (33c3).mp4 43.8 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - P2P with JavaScript to defend against bad lawmaking.en.transcribed.srt 42.7 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Three Ways to Enhance Metadata Protection Beyond Tor - secushare.org.en.transcribed.srt 41.5 kB
33C3 - 2016/The Nibbletronic (33c3).srt 40.9 kB
ChaosWest 34c3 - 2017/34C3 ChaosWest - Scuttlebutt introduction.en.transcribed.srt 39.9 kB
33C3 - 2016/Check Your Police Record! (33c3) - traduction française.mp4 38.5 kB
19C3 - 2002/presentations/479/styles.xml 29.7 kB
21C3 - 2004/presentations/047 Datamining the NSA.pdf 29.1 kB
33C3 - 2016/33C3 Opening Ceremony (33c3).srt 28.5 kB
15C3 - 1998/presentations/tcpip/folie35.png 27.4 kB
15C3 - 1998/presentations/tcpip/folie33.png 27.3 kB
15C3 - 1998/presentations/tcpip/folie45.png 27.3 kB
15C3 - 1998/presentations/tcpip/folie12.png 26.9 kB
15C3 - 1998/presentations/tcpip/folie18.png 26.6 kB
15C3 - 1998/presentations/tcpip/folie16.png 26.2 kB
15C3 - 1998/presentations/tcpip/folie41.png 26.2 kB
15C3 - 1998/presentations/tcpip/folie10.png 25.9 kB
15C3 - 1998/presentations/tcpip/folie4.png 25.8 kB
15C3 - 1998/presentations/tcpip/folie36.png 25.7 kB
15C3 - 1998/presentations/tcpip/folie23.png 25.7 kB
15C3 - 1998/presentations/tcpip/folie46.png 25.7 kB
15C3 - 1998/presentations/tcpip/folie27.png 25.6 kB
15C3 - 1998/presentations/tcpip/folie54.png 25.5 kB
15C3 - 1998/presentations/tcpip/folie20.png 25.2 kB
15C3 - 1998/presentations/tcpip/folie32.png 25.1 kB
15C3 - 1998/presentations/tcpip/folie42.png 24.7 kB
15C3 - 1998/presentations/tcpip/folie39.png 24.1 kB
15C3 - 1998/presentations/tcpip/folie37.png 23.9 kB
15C3 - 1998/presentations/tcpip/folie3.png 23.8 kB
15C3 - 1998/presentations/tcpip/folie50.png 23.7 kB
15C3 - 1998/presentations/tcpip/folie22.png 23.7 kB
15C3 - 1998/presentations/tcpip/folie15.png 23.7 kB
15C3 - 1998/presentations/tcpip/folie53.png 23.6 kB
15C3 - 1998/presentations/tcpip/folie55.png 23.5 kB
15C3 - 1998/presentations/tcpip/folie52.png 23.5 kB
15C3 - 1998/presentations/tcpip/folie11.png 23.5 kB
15C3 - 1998/presentations/tcpip/folie51.png 23.4 kB
15C3 - 1998/presentations/tcpip/folie34.png 23.3 kB
15C3 - 1998/presentations/tcpip/folie38.png 23.2 kB
15C3 - 1998/presentations/tcpip/folie26.png 23.2 kB
15C3 - 1998/presentations/tcpip/folie17.png 23.0 kB
15C3 - 1998/presentations/tcpip/folie13.png 22.5 kB
15C3 - 1998/presentations/tcpip/folie19.png 22.5 kB
15C3 - 1998/presentations/tcpip/folie24.png 22.4 kB
15C3 - 1998/presentations/tcpip/folie29.png 22.2 kB
15C3 - 1998/presentations/tcpip/folie47.png 21.6 kB
15C3 - 1998/presentations/tcpip/folie25.png 21.4 kB
15C3 - 1998/presentations/tcpip/folie30.png 20.9 kB
22C3 - 2005/audio/index.html 20.2 kB
19C3 - 2002/presentations/479/02-12-29_lex-drm.sxi 20.1 kB
15C3 - 1998/presentations/tcpip/folie31.png 20.1 kB
15C3 - 1998/presentations/tcpip/folie5.png 20.0 kB
15C3 - 1998/presentations/tcpip/folie43.png 20.0 kB
15C3 - 1998/presentations/tcpip/folie48.png 20.0 kB
15C3 - 1998/presentations/tcpip/folie2.png 19.9 kB
15C3 - 1998/presentations/tcpip/folie44.png 19.9 kB
15C3 - 1998/presentations/tcpip/folie14.png 19.6 kB
15C3 - 1998/presentations/tcpip/folie40.png 19.4 kB
15C3 - 1998/presentations/tcpip/folie28.png 19.2 kB
15C3 - 1998/presentations/tcpip/folie1.png 19.1 kB
15C3 - 1998/presentations/tcpip/folie49.png 18.6 kB
15C3 - 1998/presentations/tcpip/folie7.png 18.6 kB
15C3 - 1998/presentations/tcpip/folie8.png 18.4 kB
15C3 - 1998/presentations/tcpip/folie21.png 18.4 kB
23C3 - 2006/audio/index.html 18.1 kB
15C3 - 1998/presentations/tcpip/folie9.png 16.6 kB
15C3 - 1998/presentations/tcpip/folie6.png 16.5 kB
CCC logo.jpg 11.7 kB
33C3 - 2016/Shut Up and Take My Money! (33c3) - traduction française.mp4 10.9 kB
33C3 - 2016/Check Your Police Record! (33c3).mp4 10.8 kB
19C3 - 2002/presentations/479/settings.xml 10.5 kB
33C3 - 2016/Law Enforcement Are Hacking the Planet (33c3) - traduction francaise.mp4 5.6 kB
32C3 - 2015/video/32c3-7491-en-de-De-anonymizing_Programmers_hd.mp4 3.4 kB
19C3 - 2002/presentations/479/Pictures/10000200000000DD00000047AFA3D82E.gif 1.6 kB
19C3 - 2002/presentations/479/meta.xml 1.0 kB
19C3 - 2002/presentations/479/META-INF/manifest.xml 876 Bytes
Chaos Computer Club - Congress thank you.txt 837 Bytes
CETD-196,CFNM-001,CHIR-003,CHS-035,CIIN-002,CLUB-089,CLUB... 105.7 MB
CETD-196,CFNM-001,CHIR-003,CHS-035,CIIN-002,CLUB-089,CLUB... 954 Bytes
CLUB-388视频,CLUB-387下载,CLUB-385电影,CLUB-385 avi,CLUB-383直接看 21.3 MB
Club Mixes Non Stop Megamix Club Crazy Vol. 2 Club House... 185.0 MB
Club Doma - Club Night 8 - Live At The Doma Club 676.2 MB
CLUB-223,CLUB-227,CLUB-222,CND-152,BOBB-281,IPZ-647,IPZ-6... 894.1 MB
Ракетные Комплексы Club-K, Club-M, Club-U, UKSK 752.9 MB
Club Mixes Non Stop Megamix Club Crazy Club House... 190.4 MB
[H-Game] [ADV] [U-Me SOFT] CLUB ROMANCE ~クラブ・ロマンスへようこそ~... 552.3 MB
Techno Club - 1999 - Techno Club, Volume 07 - Techno... 975.9 MB
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-EniaHD.mkv 5077次下载
WEB
DL
DDP5
The.Super.Cube.S01E09.1080p.iQ.WEB-DL.AAC2.0.H.264-VARYG.mkv 5040次下载
WEB
DL
Cube
Star.Wars.Andor.S02E05.I.Have.Friends.Everywhere.1080p.DS... 4944次下载
WEB
DL
Star
新桥恋人.电影港 地址发布页 www.dygang.me 收藏不迷路 4365次下载
me
www
发布页
Night at the Museum Battle of the Smithsonian 2009 2160p... 4161次下载
KiNGDOM
WEB
DL
www.UIndex.org - ... 4126次下载
www
MeGusta
HEVC
Palma.2.2024.WEB-DL.1080p.ExKinoRay.mkv 4000次下载
WEB
DL
2.2024
Guns N' Roses - Greatest Hits Live Broadcast Collection... 3915次下载
Live
Remastered
Hits
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
(同人CG集) [白色絵の具 (無味ムスミ)] 友達の母が巨乳で金髪の淫乱美女でした.zip 6346次下载
zip
巨乳
CG
You.S05E02.720p.HEVC.x265-MeGusta[EZTVx.to].mkv 6221次下载
S05E02
HEVC
720p
up-mod-minecraft-play-with-friends-v1-21-80-28-... 6023次下载
982108028
mod
play
the.last.of.us.s02e02.1080p.web.h264-successful... 5335次下载
web
last
h264
异世降临.6v电影 地址发布页 www.6v123.net 收藏不迷路 5220次下载
www
发布页
6v123
Opasnaya.blizost.S01.2025.WEB-DL.1080p 5127次下载
WEB
DL
S01
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Andor.S02E02.Sagrona.Teema.1080p.HEVC.x265-MeGu... 5100次下载
HEVC
Andor
mkv
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-E... 5077次下载
WEB
DL
DDP5
Shoot.Paragon.1970.DVDRip.XviD-AFO [NO-RAR] -...
Shoot
www
AFO
DASS-041-U
DASS
041
www.UIndex.org - Andy Richter Controls...
www
Episode
S01E04
[AniDub]_Sora_Kara_Furu_Ichioku_no_Hoshi_[Oriko_Qbiq]
Furu
no
Oriko
[BEST-TORRENTS.COM]...
Cheese
DL
2160p
【成人抖音-黑料-换妻-直播-手机搜7t7a.cc】麻豆传媒映画・爆操黑丝车模小姐姐・超级圆润...
麻豆
小姐姐
车模
Por siempre [HDTV 720p][Cap.106]
siempre
720p
Cap
Workaholics.S04E01.Season.4.Episode.1.WEBRip.72...
Workaholics
Episode
HoC
MobLand.S01E01.1080P.ENG.ITA.H264-TheBlackKing.mkv
ENG
H264
ITA
43606101 - Public Dick Flash Compilation..mp4
Dick
..
Compilation
吃瓜!去欧美留学的林淑瑶 ️被欧美大鸡巴驯化3P大战被洋吊深喉狂艹!
欧美
3P
被洋
Hellraiser III Hell On Earth 1992 1080p BluRay...
5.1
1992
AAC
Ghosts S04E21 Kyle 1080p PMTP WEB-DL DDP5 1 H...
WEB
DL
STC
[Gecko] Araiguma Calcal-dan - S01E07...
WEB
DL
AAC
salamander-2-salamander-deluxe-pack-play-statio...
salamander
play
full
Catalina Cruz live cam show pack
Catalina
show
live
SDMU-534
534
SDMU
dccdom.com@MIDV111C
com
MIDV111C
dccdom
