Blog/content/posts/2017-01-30-33c3-watchlist.md
2017-10-09 12:03:43 +02:00

4.9 KiB
Raw Permalink Blame History

title author type date url categories tags
33C3 Watchlist eNBeWe post 2017-01-30T14:51:09+00:00 /2017/01/30/33c3-watchlist/
Congress
Persönliches
33C3
CCC
CCH
Congress
Hacker
Hacking
Kongress

Okay, the 33C3 is over for quite some time and I didn't write about it. Short form: I was there, it was amazing, I was sick afterwards.

I havn't seen lots of talks yet, but here is my watchlist:

  • 3 Years After Snowden: Is Germany fighting State Surveillance?
  • 33C3 Closing Ceremony
  • 33C3 Infrastructure Review
  • 33C3 Opening Ceremony
  • A Data Point Walks Into a Bar
  • A look into the Mobile Messaging Black Box
  • A world without blockchain
  • An Elevator to the Moon (and back)
  • Anthropology for kids - What is privacy?
  • ATMs how to break them to stop the fraud
  • Berechnete Welt
  • Beyond Virtual and Augmented Reality
  • Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken
  • Bootstraping a slightly more secure laptop
  • Build your own NSA
  • Building Custom Pinball Machines
  • CCC-Jahresrückblick 2016
  • Check Your Police Record!
  • Console Hacking 2016
  • Copywrongs 2.0
  • Corporate surveillance, digital tracking, big data & privacy
  • Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns
  • Deploying TLS 1.3: the great, the good and the bad
  • Der 33 Jahrerückblick
  • DIE NSU-MONOLOGE / NSU-MONOLOGLARI
  • Die Sprache der Populisten
  • Dieselgate A year later
  • Dissecting HDMI
  • Dissecting modern (3G/4G) cellular modems
  • Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack
  • Downgrading iOS: From past to present
  • Eavesdropping on the Dark Cosmos
  • Eine kleine Geschichte der Parlamentsschlägerei
  • Einführung zu Blockchains
  • Es sind die kleinen Dinge im Leben
  • Everything you always wanted to know about Certificate Transparency
  • Exploiting PHP7 unserialize
  • Fnord-Jahresrückblick
  • Freakshow
  • From Server Farm to Data Table
  • Genetic Codes and what they tell us and everyone else
  • Geolocation methods in mobile networks
  • Gone in 60 Milliseconds
  • Hacking the World
  • Haft für Whistleblower?
  • Hebocon
  • Hochsicherheits-Generalschlüssel Marke Eigenbau
  • How Do I Crack Satellite and Cable Pay TV?
  • How do we know our PRNGs work properly?
  • How physicists analyze massive data: LHC + brain + ROOT = Higgs
  • Intercoms Hacking
  • Interplanetary Colonization
  • Irren ist staatlich
  • Kampf dem Abmahnunwesen
  • Lasers in the sky (with asteroids)
  • Law Enforcement Are Hacking the Planet
  • Lockpicking in the IoT
  • Make the Internet Neutral Again
  • Make Wi-Fi fast again
  • Memory Deduplication: The Curse that Keeps on Giving
  • Methodisch inkorrekt!
  • Million Dollar Dissidents and the Rest of Us
  • Nicht öffentlich.
  • Nintendo Hacking 2016
  • No Love for the US Gov.
  • No USB? No problem.
  • On Smart Cities, Smart Energy, And Dumb Security
  • On the Security and Privacy of Modern Single Sign-On in the Web
  • Pegasus internals
  • Predicting and Abusing WPA2/802.11 Group Keys
  • Privatisierung der Rechtsdurchsetzung
  • PUFs, protection, privacy, PRNGs
  • Realitätsabgleich
  • Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election
  • Retail Surveillance / Retail Countersurveillance
  • Routerzwang und Funkabschottung
  • Searchwing - Mit Drohnen leben retten
  • Security Nightmares 0x11
  • Shining some light on the Amazon Dash button
  • Shut Up and Take My Money!
  • Software Defined Emissions
  • Space making/space shaping
  • SpiegelMining Reverse Engineering von Spiegel-Online
  • SpinalHDL : An alternative hardware description language
  • State of Internet Censorship 2016
  • Stopping law enforcement hacking
  • Surveilling the surveillers
  • Talking Behind Your Back
  • Tapping into the core
  • Technische Aufklärung live
  • Technologien für und wider Digitale Souveränität
  • The DROWN Attack
  • The Economic Consequences of Internet Censorship
  • The Fight for Encryption in 2016
  • The Global Assassination Grid
  • The High Priests of the Digital Age
  • The Moon and European Space Exploration
  • The Ultimate Game Boy Talk
  • The Universe Is, Like, Seriously Huge
  • The Untold Story of Edward Snowdens Escape from Hong Kong
  • The woman behind your WiFi
  • Understanding the Snoopers Charter
  • Untrusting the CPU
  • Virtual Secure Boot
  • Warum in die Ferne schweifen, wenn das Ausland liegt so nah?
  • Welcome to the Anthropocene?
  • What could possibly go wrong with <insert x86 instruction here>?
  • What's It Doing Now?
  • Wheel of Fortune
  • Where in the World Is Carmen Sandiego?
  • You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
  • Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule