138 lines
4.9 KiB
Markdown
138 lines
4.9 KiB
Markdown
|
---
|
|||
|
title: 33C3 Watchlist
|
|||
|
author: eNBeWe
|
|||
|
type: post
|
|||
|
date: 2017-01-30T14:51:09+00:00
|
|||
|
url: /2017/01/30/33c3-watchlist/
|
|||
|
categories:
|
|||
|
- Congress
|
|||
|
- Persönliches
|
|||
|
tags:
|
|||
|
- 33C3
|
|||
|
- CCC
|
|||
|
- CCH
|
|||
|
- Congress
|
|||
|
- Hacker
|
|||
|
- Hacking
|
|||
|
- Kongress
|
|||
|
|
|||
|
---
|
|||
|
Okay, the 33C3 is over for quite some time and I didn't write about it. Short form: I was there, it was amazing, I was sick afterwards.
|
|||
|
|
|||
|
I havn't seen lots of talks yet, but here is my watchlist:
|
|||
|
|
|||
|
<!--more-->
|
|||
|
|
|||
|
* 3 Years After Snowden: Is Germany fighting State Surveillance?
|
|||
|
* 33C3 Closing Ceremony
|
|||
|
* 33C3 Infrastructure Review
|
|||
|
* 33C3 Opening Ceremony
|
|||
|
* A Data Point Walks Into a Bar
|
|||
|
* A look into the Mobile Messaging Black Box
|
|||
|
* A world without blockchain
|
|||
|
* An Elevator to the Moon (and back)
|
|||
|
* Anthropology for kids - What is privacy?
|
|||
|
* ATMs how to break them to stop the fraud
|
|||
|
* Berechnete Welt
|
|||
|
* Beyond Virtual and Augmented Reality
|
|||
|
* Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
|
|||
|
* Bootstraping a slightly more secure laptop
|
|||
|
* Build your own NSA
|
|||
|
* Building Custom Pinball Machines
|
|||
|
* CCC-Jahresrückblick 2016
|
|||
|
* Check Your Police Record!
|
|||
|
* Console Hacking 2016
|
|||
|
* Copywrongs 2.0
|
|||
|
* Corporate surveillance, digital tracking, big data & privacy
|
|||
|
* Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
|
|||
|
* Deploying TLS 1.3: the great, the good and the bad
|
|||
|
* Der 33 Jahrerückblick
|
|||
|
* DIE NSU-MONOLOGE / NSU-MONOLOGLARI
|
|||
|
* Die Sprache der Populisten
|
|||
|
* Dieselgate – A year later
|
|||
|
* Dissecting HDMI
|
|||
|
* Dissecting modern (3G/4G) cellular modems
|
|||
|
* Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
|
|||
|
* Downgrading iOS: From past to present
|
|||
|
* Eavesdropping on the Dark Cosmos
|
|||
|
* Eine kleine Geschichte der Parlamentsschlägerei
|
|||
|
* Einführung zu Blockchains
|
|||
|
* Es sind die kleinen Dinge im Leben
|
|||
|
* Everything you always wanted to know about Certificate Transparency
|
|||
|
* Exploiting PHP7 unserialize
|
|||
|
* Fnord-Jahresrückblick
|
|||
|
* Freakshow
|
|||
|
* From Server Farm to Data Table
|
|||
|
* Genetic Codes and what they tell us – and everyone else
|
|||
|
* Geolocation methods in mobile networks
|
|||
|
* Gone in 60 Milliseconds
|
|||
|
* Hacking the World
|
|||
|
* Haft für Whistleblower?
|
|||
|
* Hebocon
|
|||
|
* Hochsicherheits-Generalschlüssel Marke Eigenbau
|
|||
|
* How Do I Crack Satellite and Cable Pay TV?
|
|||
|
* How do we know our PRNGs work properly?
|
|||
|
* How physicists analyze massive data: LHC + brain + ROOT = Higgs
|
|||
|
* Intercoms Hacking
|
|||
|
* Interplanetary Colonization
|
|||
|
* Irren ist staatlich
|
|||
|
* Kampf dem Abmahnunwesen
|
|||
|
* Lasers in the sky (with asteroids)
|
|||
|
* Law Enforcement Are Hacking the Planet
|
|||
|
* Lockpicking in the IoT
|
|||
|
* Make the Internet Neutral Again
|
|||
|
* Make Wi-Fi fast again
|
|||
|
* Memory Deduplication: The Curse that Keeps on Giving
|
|||
|
* Methodisch inkorrekt!
|
|||
|
* Million Dollar Dissidents and the Rest of Us
|
|||
|
* Nicht öffentlich.
|
|||
|
* Nintendo Hacking 2016
|
|||
|
* No Love for the US Gov.
|
|||
|
* No USB? No problem.
|
|||
|
* On Smart Cities, Smart Energy, And Dumb Security
|
|||
|
* On the Security and Privacy of Modern Single Sign-On in the Web
|
|||
|
* Pegasus internals
|
|||
|
* Predicting and Abusing WPA2/802.11 Group Keys
|
|||
|
* Privatisierung der Rechtsdurchsetzung
|
|||
|
* PUFs, protection, privacy, PRNGs
|
|||
|
* Realitätsabgleich
|
|||
|
* Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
|
|||
|
* Retail Surveillance / Retail Countersurveillance
|
|||
|
* Routerzwang und Funkabschottung
|
|||
|
* Searchwing - Mit Drohnen leben retten
|
|||
|
* Security Nightmares 0x11
|
|||
|
* Shining some light on the Amazon Dash button
|
|||
|
* Shut Up and Take My Money!
|
|||
|
* Software Defined Emissions
|
|||
|
* Space making/space shaping
|
|||
|
* SpiegelMining – Reverse Engineering von Spiegel-Online
|
|||
|
* SpinalHDL : An alternative hardware description language
|
|||
|
* State of Internet Censorship 2016
|
|||
|
* Stopping law enforcement hacking
|
|||
|
* Surveilling the surveillers
|
|||
|
* Talking Behind Your Back
|
|||
|
* Tapping into the core
|
|||
|
* Technische Aufklärung live
|
|||
|
* Technologien für und wider Digitale Souveränität
|
|||
|
* The DROWN Attack
|
|||
|
* The Economic Consequences of Internet Censorship
|
|||
|
* The Fight for Encryption in 2016
|
|||
|
* The Global Assassination Grid
|
|||
|
* The High Priests of the Digital Age
|
|||
|
* The Moon and European Space Exploration
|
|||
|
* The Ultimate Game Boy Talk
|
|||
|
* The Universe Is, Like, Seriously Huge
|
|||
|
* The Untold Story of Edward Snowden’s Escape from Hong Kong
|
|||
|
* The woman behind your WiFi
|
|||
|
* Understanding the Snooper’s Charter
|
|||
|
* Untrusting the CPU
|
|||
|
* Virtual Secure Boot
|
|||
|
* Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
|
|||
|
* Welcome to the Anthropocene?
|
|||
|
* What could possibly go wrong with <insert x86 instruction here>?
|
|||
|
* What's It Doing Now?
|
|||
|
* Wheel of Fortune
|
|||
|
* Where in the World Is Carmen Sandiego?
|
|||
|
* You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
|
|||
|
* Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule
|