25C3 Audio Recordings cover art

All Episodes

25C3 Audio Recordings — 92 episodes

#
Title
1

25C3_2999 Closing Ceremony

2

25C3_3021 Security Nightmares 2009

3

25C3_3058 Security Nightmares 2009 (English interpretation)

4

25C3_2952 Pflanzenhacken

5

25C3_2899 Mining social contacts with active RFID

6

25C3_3023 MD5 considered harmful today

7

25C3_2916 Wikileaks

8

25C3_2777 Crafting and Hacking: Separated at Birth

9

25C3_2942 Vertex Hacking

10

25C3_2995 Predictable RNG in the vulnerable Debian OpenSSL package

11

25C3_2791 La Quadrature du Net - Campaigning on Telecoms Package

12

25C3_2680 Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You

13

25C3_2973 Lightning Talks Day4

14

25C3_3004 Why technology sucks

15

25C3_2958 Hacker Jeopardy

16

25C3_3057 Hacker Jeopardy (English interpretation)

17

25C3_2816 Cisco IOS attack and defense

18

25C3_2781 Objects as Software: The Coming Revolution

19

25C3_2895 Der elektronische Personalausweis

20

25C3_2938 Methods for Understanding Targeted Attacks with Office Documents

21

25C3_3053 Lightning Talks Day3 - Evening

22

25C3_2596 SWF and the Malware Tragedy

23

25C3_2639 Attacking NFC mobile phones

24

25C3_2828 OnionCat – A Tor-based Anonymous VPN

25

25C3_2977 Security and anonymity vulnerabilities in Tor

26

25C3_2937 DECT

27

25C3_3000 Stormfucker: Owning the Storm Botnet

28

25C3_2874 The Ultimate Commodore 64 Talk

29

25C3_3032 Analyzing RFID Security

30

25C3_3002 Squeezing Attack Traces

31

25C3_2875 An introduction to new stream cipher designs

32

25C3_2860 Neusprech im Überwachungsstaat

33

25C3_2873 Privacy in the social semantic web

34

25C3_2681 Repurposing the TI EZ430U

35

25C3_3041 eVoting after Nedap and Digital Pen

36

25C3_2975 Zehn Big Brother Awards in .at

37

25C3_3007 Running your own GSM network

38

25C3_3047 Lightning Talks Day3 - Morning

39

25C3_2872 The Privacy Workshop Project

40

25C3_2773 Soviet Unterzoegersdorf

41

25C3_2812 Fnord News Show

42

25C3_3016 Life is a Holodeck!

43

25C3_3056 Fnord News Show (English interpretation)

44

25C3_2799 Console Hacking 2008: Wii Fail

45

25C3_2992 Tricks: makes you smile

46

25C3_2980 The Infinite Library

47

25C3_3020 Banking Malware 101

48

25C3_3044 All your base(s) are belong to us

49

25C3_3015 Rapid Prototype Your Life

50

25C3_2843 Algorithmic Music in a Box

51

25C3_2890 Scalable Swarm Robotics

52

25C3_2734 Short Attention Span Security

53

25C3_3008 Anatomy of smartphone hardware

54

25C3_2909 TCP Denial of Service Vulnerabilities

55

25C3_2831 Security of MICA*-based wireless sensor networks

56

25C3_2678 Vulnerability discovery in encrypted closed source PHP applications

57

25C3_2934 Blinkenlights Stereoscope

58

25C3_2963 Handschellen hacken

59

25C3_2893 Attacking Rich Internet Applications

60

25C3_2832 Exploiting Symbian

61

25C3_2940 Flying for free

62

25C3_2863 Climate Change - State of the Science

63

25C3_2882 Full-Disk-Encryption Crash-Course

64

25C3_2979 Embracing Post-Privacy

65

25C3_3024 Jahresrückblick

66

25C3_3048 Lightning Talks Day2

67

25C3_3050 Kurt Gödel – I do not fit into this century

68

25C3_2970 coreboot: Beyond The Final Frontier

69

25C3_2906 Why were we so vulnerable to the DNS vulnerability?

70

25C3_3030 Messing Around with Garage Doors

71

25C3_2997 Locating Mobile Phones using SS7

72

25C3_2922 Advanced memory forensics: The Cold Boot Attacks

73

25C3_2669 Collapsing the European security architecture

74

25C3_2839 Cracking the MSP430 BSL

75

25C3_2976 Hacking the iPhone

76

25C3_2815 Beyond Asimov - Laws for Robots

77

25C3_2807 Erich Mühsams Tagebücher in der Festungshaft

78

25C3_2896 Chip Reverse Engineering

79

25C3_2923 Das Grundrecht auf digitale Intimsphäre

80

25C3_2988 Just Estonia and Georgia?

81

25C3_2991 Terrorist All-Stars

82

25C3_2806 Building an international movement: hackerspaces.org

83

25C3_2892 About Cyborgs and Gargoyles

84

25C3_2845 RF fingerprinting of RFID

85

25C3_3028 Der Hackerparagraph 202c StGB

86

25C3_2904 Solar-powering your Geek Gear

87

25C3_2953 Security Failures in Smart Card Payment Systems

88

25C3_2665 The Trust Situation

89

25C3_2901 FAIFA: A first open source PLC tool

90

25C3_2827 U23

91

25C3_2814 Datenpannen

92

25C3_3025 Opening and Keynote