CCC 2016 Dec. 27, 2016 to Dec. 30, 2016, hamburg,germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Genetic Codes and what they tell us – and everyone else _adora_belle_ N/A
33C3 Closing Ceremony Nicolas Wöhrl , @reinhardremfort N/A
Methodisch inkorrekt! Nicolas Wöhrl , @reinhardremfort N/A
Build your own NSA Andreas Dewes , @sveckert N/A
Retail Surveillance / Retail Countersurveillance Adam Harvey N/A
Liberté, Égalité, Fraternité... and privacy ?! Agnes , Christopher Talib N/A
Netzpolitik in Österreich Thomas Lohninger , Alexander Czadilek N/A
ATMs how to break them to stop the fraud Alexey Osipov , Olga Kochetova N/A
Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack Ali Abbasi , Majid N/A
Wheel of Fortune Ali Abbasi , Jos Wetzels N/A
Es sind die kleinen Dinge im Leben André Lampe N/A
3 Years After Snowden: Is Germany fighting State Surveillance? Andre Meister , Anna N/A
DIE NSU-MONOLOGE / NSU-MONOLOGLARI Bühne Für Menschenrechte , Andreas Kienzle , Barnie Ecke , Elisabeth Pleß , Florentine Seuffert , Idil Üner , Mehmet Kurtulus , Michael Ruf , Nissar Gardi , Robert Colonius , Sarah Sott , Vanida Karun N/A
The woman behind your WiFi Anja Drephal N/A
Nicht öffentlich. Kai Biermann , Vieuxrenard , Anna , Felix Betzin , Elisabeth Pleß , Johannes Wolf N/A
33C3 Opening Ceremony Anna , Elisa N/A
Memory Deduplication: The Curse that Keeps on Giving Antonio Barresi , Kaveh Razavi , Ben Gras , Brainsmoke N/A
Irren ist staatlich Arne Semsrott N/A
How physicists analyze massive data: LHC + brain + ROOT = Higgs Axel N/A
A Story of Discrimination and Unfairness Aylin Caliskan N/A
Kampf dem Abmahnunwesen Erdgeist , Beata Hubrig N/A
Saving the World with (Vegan) Science Benjamin Rupert N/A
Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule Benni , Dorina N/A
SearchWing - Drones to find refugees in Mediterranean Sea Steini , Benthor , Ruben Neugebauer N/A
What's It Doing Now? Bernd Sieker N/A
Lightning Talks Day 2 Gedsic , Bigalex N/A
Lightning Talks Day 3 Gedsic , Bigalex N/A
Lightning Talks Day 4 Gedsic , Bigalex N/A
Making Technology Inclusive Through Papercraft and Sound Bunnie N/A
The High Priests of the Digital Age Catchthewhistle N/A
How Do I Crack Satellite and Cable Pay TV? Chris Gerlinsky N/A
Space Flyers Christoffer Jerkeby , Raquel Meyers N/A
Stopping law enforcement hacking Christopher Soghoian N/A
Make the Internet Neutral Again Thomas Lohninger , Christopher Talib N/A
The Global Assassination Grid Cian Westmoreland N/A
Hacking the World Claudio "nex" Guarnieri N/A
What could possibly go wrong with <insert x86 instruction here>? Clémentine Maurice , Moritz Lipp N/A
Formal Verification of Verilog HDL with Yosys-SMTBMC Clifford N/A
CCC-Jahresrückblick 2016 Constanze Kurz , Nexus , Linus Neumann , Frank N/A
The Nibbletronic Ctrapp N/A
Reverse engineering Outernet Daniel Estévez N/A
Dieselgate – A year later Daniel Lange N/A
Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur Maria Reimer , Daniel Seitz , Paula Glaser , Robert Alisch N/A
SpiegelMining – Reverse Engineering von Spiegel-Online David Kriesel N/A
Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns Derpupe N/A
Nintendo Hacking 2016 Derrek , Naehrwert , Nedwill N/A
On the Security and Privacy of Modern Single Sign-On in the Web Guido Schmitz , Dfett N/A
JODI - Apache is functioning normally Di , Jo N/A
SpinalHDL : An alternative hardware description language Dolu1990 N/A
Geolocation methods in mobile networks Erik N/A
Hacking collective as a laboratory Ezi N/A
Talking Behind Your Back Federico Maggi , Vasilios Mavroudis N/A
Fnord-Jahresrückblick Frank , Fefe N/A
Software Defined Emissions Felix Domke N/A
How do we know our PRNGs work properly? Felix Dörre , Vladimir Klebanov N/A
Deploying TLS 1.3: the great, the good and the bad Filippo Valsorda N/A
Woolim – Lifting the Fog on DPRK’s Latest Tablet PC Florian Grunow , Niklaus Schiess , Manuel Lubetzki N/A
Security Nightmares 0x11 Ron , Frank N/A
Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken Fraulutz , Noaveragerobot N/A
A look into the Mobile Messaging Black Box Frieder Steinmetz , Roland Schilling N/A
Durchmarsch von Rechts Friedrich Burschel N/A
0en & 1en auf dem Acker Fritz Herzrasen , Lisa Tschorn N/A
Virtual Secure Boot Gerd Hoffmann N/A
Netzpolitik in der Schweiz 2016 Hakuna Mamate N/A
In Search of Evidence-Based IT-Security Hanno N/A
Make Wi-Fi fast again Hendrik Lüth N/A
Understanding the Snooper’s Charter Hendrik Obelöer N/A
Mass Surveillance through Computational Linguistics and Human Language Technology Hernani N/A
Dissecting modern (3G/4G) cellular modems Laforge , Holger N/A
Shining some light on the Amazon Dash button Hunz N/A
From Server Farm to Data Table Ingrid Burrington N/A
Building a high throughput low-latency PCIe based SDR Ipse , Sergey Kostanbaev N/A
Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election J. Alex Halderman , Matt Bernhard N/A
Building Custom Pinball Machines Jab N/A
No Love for the US Gov. Lauri Love , Jake Davis N/A
A New Dark Age James Bridle N/A
The Moon and European Space Exploration Jan Wörner N/A
Untrusting the CPU Jaseg N/A
Visiting The Bear Den Jessy Campos N/A
Eine kleine Geschichte der Parlamentsschlägerei Joachim Schautenbach , Pia Fortunata N/A
Million Dollar Dissidents and the Rest of Us John Scott-railton , Wrm N/A
The 12 Networking Truths Jonas Lund N/A
Machine Dreams Joscha N/A
Law Enforcement Are Hacking the Planet Joseph Cox N/A
Copywrongs 2.0 Julia Reda N/A
Beyond Virtual and Augmented Reality Kai Kunze N/A
Welcome to the Anthropocene? Kaleimai N/A
Edible Soft Robotics Kari Love N/A
Berechnete Welt Karl Urban N/A
Where in the World Is Carmen Sandiego? Karsten Nohl , Nemanja Nikodijevic N/A
Hacking Reality Kate Genevieve N/A
Back to the 16bit Era Kirschju N/A
Warum in die Ferne schweifen, wenn das Ausland liegt so nah? Klaus Landefeld N/A
Hebocon Konfusius N/A
The Fight for Encryption in 2016 Kurt Opsahl N/A
The Untold Story of Edward Snowden’s Escape from Hong Kong Lena Rohrbach , Robert Tibbo , Sönke Iwersen N/A
33C3 Infrastructure Review Leon N/A
A Data Point Walks Into a Bar Lisa Charlotte Rost N/A
Interplanetary Colonization Peter Buschkamp , Liz George N/A
Console Hacking 2016 Marcan N/A
Surveilling the surveillers Mare N/A
Tapping into the core Mark Ermolov , Maxim Goryachy N/A
A world without blockchain Mark van Cuijk N/A
Privatisierung der Rechtsdurchsetzung Markus Beckedahl N/A
An Elevator to the Moon (and back) Markus Landgraf N/A
Die Sprache der Populisten Martin Haase/maha N/A
Everything you always wanted to know about Certificate Transparency Martin Schmiedecker N/A
Predicting and Abusing WPA2/802.11 Group Keys Mathy Vanhoef N/A
Decoding the LoRa PHY Matt Knight N/A
Pegasus internals Max Bazaliy N/A
Routerzwang und Funkabschottung Max Mehl N/A
Der 33 Jahrerückblick Maxigas , Mel N/A
Ethics in the data society Mayameme N/A
Code BROWN in the Air Miaoski N/A
The Universe Is, Like, Seriously Huge Michael Büker N/A
The Ultimate Game Boy Talk Michael Steil N/A
Hochsicherheits-Generalschlüssel Marke Eigenbau Rfguy , Michael Weiner N/A
Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern Michaela Vieser N/A
Patterns Mitch N/A
On Smart Cities, Smart Energy, And Dumb Security Netanel Rubin N/A
Anthropology for kids - What is privacy? Nika Dubrovsky N/A
radare demystified Pancake N/A
The Zcash anonymous cryptocurrency Pesco N/A
Lasers in the sky (with asteroids) Peter Buschkamp N/A
State of Internet Censorship 2016 Philipp Winter , Will Scott N/A
PUFs, protection, privacy, PRNGs Pol Van Aubel N/A
Technologien für und wider Digitale Souveränität Stefan Lucks , Ruedi , Vgrass N/A
Check Your Police Record! Ulrich Kerner N/A
Haft für Whistleblower? Ulrich Kerner N/A
Keys of Fury Raquel Meyers N/A
Lockpicking in the IoT Ray N/A
Rebel Cities Renataavila N/A
Gone in 60 Milliseconds Rich Jones N/A
What We Can Learn about Creativity from 3D Printing Sascha Friesike N/A
The Clash of Digitalizations Saud Al-zaid N/A
The DROWN Attack Sebastian Schinzel N/A
Intercoms Hacking Sebastien Dudek N/A
Eavesdropping on the Dark Cosmos Simon Barke N/A
International exchange of tax information Taxman N/A
Downgrading iOS: From past to present Tihmstar N/A
Dissecting HDMI Tim 'mithro' Ansell N/A
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet Tobias Fiebig N/A
The Economic Consequences of Internet Censorship Toni N/A
Bootstraping a slightly more secure laptop Trammell Hudson N/A
Space making/space shaping Ulf Treger N/A
Einführung zu Blockchains Vimja N/A
Shut Up and Take My Money! Vincent Haupert N/A
Corporate surveillance, digital tracking, big data & privacy Wchr N/A
The Transhumanist Paradox Xavier Flory N/A
No USB? No problem. Xobs N/A