--- title: 32C3 – My personal video list author: eNBeWe type: post date: 2016-01-06T21:21:13+00:00 url: /2016/01/06/32c3-my-personal-video-list/ categories: - Allgemein - Congress - Persönliches tags: - 32C3 - CCC - CCH - Congress - Hacker - Hacking - Hamburg - Politics - Videos --- Hi there, After quite a long time of silence (\*cough\* Sorry about that) I think I can write a new post. At the end of last year I was at the 32C3. That is the 32nd *Chaos Communication Congress*. This year about 12000 nice people got together and captured the Congress Center in Hamburg for four days. Apart from the giant program of talks (which I will talk about in a second) the *main* part of the congress is the opportunity to meet other people and have a blast of a time. I managed to meet a lot of nice people and I learned so much during the time that I will need some time to fully sort that in my mind. But back to the talks. This year I volunteered as an _Angel_ (again). These angels are the helpers that take shifts and do all the various jobs that need to be done to get the congress running. That starts at manning the bars or the cashier desk, controlling the access to the congress area at the entries, sorting empty bottles in the storage area but also range to announcing the speakers at the talks or operating the cameras which film the talks. This last one is a task which I did for the first time this year. I had lots of fun and learned some basic stuff about image composition and tracking speakers on stage. The talks I helped filming are also annotated in the list below. All the talks are available at [media.ccc.de][1] and the following list just shows my personal favorites. There are still some vidoes which I didn't get to watching these are still missing from my list. * [Opening Event][2] * [Keynote][3] - Keynote ... Surprising speaker and nice message. * ["Fluxus cannot save the world"][4] - I filmed the close-up on this one. The guest speaker surprised me here and jumped from stage into the audience. I didn't know about the fluxus movement beforeheand and am still not sure whether I fully understand what they are doing. * [(In)Security of Embedded Devices´ Firmware][5] - Didn't get to watching this (yet) but heard good things about it. Definitely on my watchlist. * [(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking ][6]- The next proof why it is stupid to bundle the two-factor authentication app on the same device as the controlled app. * [32C3 Infrastructure Review][7] - A standard talk about the congress. Some nice data about the network and other infrastructure on congress. * [3D printing on the moon][8] - Sending a 3D-printing roboter to the moon ... Do I need to say more? * [A Dozen Years of Shellphish][9] - Quite a disturbing talk about automated exploiting. I am not sure what I think (ethically) about this one. * [Beyond Anti Evil Maid][10] - How to protect your computer and detect malicious software in the boot process. Made me want to try coreboot but sadly not working with my devices yet. Also I filmed one camera on this one, but that was quite easy. * [Beyond your cable modem][11] - This talks leaves some barren wasteland where there used to be the believe in network security in cable internet networks. * [Breaking Honeypots for Fun and Profit][12] - A nice talk about honeypots. I wanted to install a honeypot for some time and I am not sure I still want that now. * [Buffering sucks!][13] - Calculating the price of buffering on global economy. * [Compileroptimierungen für Forth im Microcontroller][14] - I filmed this one but didn't really get the point on this one. Didn't get into Forth before this one, but seems like a nice language. * [Crypto ist Abwehr, IFG ist Angriff!][15] - Summing the experience with freedom of information. Nice talk. * [Ein Abgrund von Landesverrat][16] - The blog [netzpolitik.org][17] was charged with treason. This is the summary of their experience. * [Fnord-Jahresrückblick][18] - A standard talk. I think it looses its appeal over time but still nice. * [Grundrechte gelten nicht im Weltall! ][19]- A grat reading of protocols from investigations against our intelligence agencies. A must view. * [Hardware-Trojaner in Security-Chips][20] - Trojans in software a nothing new, here is the talk about the same thing in hardware. * [How hackers grind an MMORPG: by taking it apart!][21] - After two years of WoW I was interested in this one. A nice talk about some general reverse engineering of network protocols. * [Intelexit][22] - Making intelligence officers leave thir jobs. A great and funny talk. I filmed the close-up on this one and was exausted after the talk because the speaker walked around stage A LOT. But the camera was great and it was really fun doing this. * [Jahresrückblick des CCC ][23]- Summing up the activites of CCC in 2015. Nothing more, nothing less. * [Let's Encrypt - What launching a free CA looks like][24] - Free encryption for everyone. Fuck yeah! * [Logjam: Diffie-Hellman, discrete logs, the NSA, and you][25] - Not viewed yet but definitely going to. * [Methodisch inkorrekt!][26] - Watch this! Watch this! Watch this! * [NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen ][27]- Another talk about the intelligence agencies and the surrounding scandals. * [Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015][28] - Secure your eMail more. This talk has no real suggestions how to do it but shows what is available. * [QRtistry][29] - Making art with QR codes. Also gives some nice explanations about QR codes and where to put data in them. * [Security Nightmares 0x10][30] - Having nightmares about security? This talk won't make it better. * [Shopshifting][31] - Since watching this talk I don't want to use my debit card for payment anymore. Huge holes in the security of payment terminals. * [Wie man einen Blackout verursacht][32] - How to break the power distribution network. It is not that easy. * [Closing Event][33] As I said there are still lots of talks to be watched. I will probably post a second list then. [1]: https://media.ccc.de/c/32c3?sort=name [2]: https://media.ccc.de/v/32c3-7550-opening_event [3]: https://media.ccc.de/v/32c3-7565-keynote [4]: https://media.ccc.de/v/32c3-7421-fluxus_cannot_save_the_world [5]: https://media.ccc.de/v/32c3-7252-in_security_of_embedded_devices_firmware_-_fast_and_furious_at_large_scale [6]: https://media.ccc.de/v/32c3-7360-un_sicherheit_von_app-basierten_tan-verfahren_im_onlinebanking [7]: https://media.ccc.de/v/32c3-7555-32c3_infrastructure_review [8]: https://media.ccc.de/v/32c3-7336-3d_printing_on_the_moon [9]: https://media.ccc.de/v/32c3-7218-a_dozen_years_of_shellphish [10]: https://media.ccc.de/v/32c3-7343-beyond_anti_evil_maid [11]: https://media.ccc.de/v/32c3-7133-beyond_your_cable_modem [12]: https://media.ccc.de/v/32c3-7277-breaking_honeypots_for_fun_and_profit [13]: https://media.ccc.de/v/32c3-7530-buffering_sucks [14]: https://media.ccc.de/v/32c3-7520-compileroptimierungen_fur_forth_im_microcontroller [15]: https://media.ccc.de/v/32c3-7102-crypto_ist_abwehr_ifg_ist_angriff [16]: https://media.ccc.de/v/32c3-7135-ein_abgrund_von_landesverrat [17]: https://netzpolitik.org [18]: https://media.ccc.de/v/32c3-7282-fnord-jahresruckblick [19]: https://media.ccc.de/v/32c3-7225-grundrechte_gelten_nicht_im_weltall [20]: https://media.ccc.de/v/32c3-7146-hardware-trojaner_in_security-chips [21]: https://media.ccc.de/v/32c3-7493-how_hackers_grind_an_mmorpg_by_taking_it_apart [22]: https://media.ccc.de/v/32c3-7426-intelexit [23]: https://media.ccc.de/v/32c3-7306-jahresruckblick_des_ccc [24]: https://media.ccc.de/v/32c3-7528-let_s_encrypt_--_what_launching_a_free_ca_looks_like [25]: https://media.ccc.de/v/32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you [26]: https://media.ccc.de/v/32c3-7221-methodisch_inkorrekt [27]: https://media.ccc.de/v/32c3-7228-nsa-untersuchungsausschuss_zwischen_aufklarungswillen_und_mauern_aus_schweigen [28]: https://media.ccc.de/v/32c3-7255-neither_snow_nor_rain_nor_mitm_the_state_of_email_security_in_2015 [29]: https://media.ccc.de/v/32c3-7310-qrtistry [30]: https://media.ccc.de/v/32c3-7546-security_nightmares_0x10 [31]: https://media.ccc.de/v/32c3-7368-shopshifting [32]: https://media.ccc.de/v/32c3-7323-wie_man_einen_blackout_verursacht [33]: https://media.ccc.de/v/32c3-7551-closing_event