PodParley PodParley
#
Title
1

Lightning Talks Day4 (25c3)

2

Mining social contacts with active RFID (25c3)

3

Pflanzenhacken (25c3)

4

Crafting and Hacking: Separated at Birth (25c3)

5

Predictable RNG in the vulnerable Debian OpenSSL package (25c3)

6

Security Nightmares 2009 (25c3)

7

Closing Ceremony (25c3)

8

MD5 considered harmful today (25c3)

9

Why technology sucks (25c3)

10

Security Nightmares 2009 (English interpretation) (25c3)

11

La Quadrature du Net - Campaigning on Telecoms Package (25c3)

12

Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You (25c3)

13

Vertex Hacking (25c3)

14

Wikileaks (25c3)

15

Stormfucker: Owning the Storm Botnet (25c3)

16

Hacker Jeopardy (25c3)

17

Hacker Jeopardy (English interpretation) (25c3)

18

Squeezing Attack Traces (25c3)

19

Analyzing RFID Security (25c3)

20

Lightning Talks Day3 - Evening (25c3)

21

The Ultimate Commodore 64 Talk (25c3)

22

Running your own GSM network (25c3)

23

Der elektronische Personalausweis (25c3)

24

Attacking NFC mobile phones (25c3)

25

Methods for Understanding Targeted Attacks with Office Documents (25c3)

26

SWF and the Malware Tragedy (25c3)

27

Cisco IOS attack and defense (25c3)

28

OnionCat – A Tor-based Anonymous VPN (25c3)

29

Repurposing the TI EZ430U (25c3)

30

Objects as Software: The Coming Revolution (25c3)

31

An introduction to new stream cipher designs (25c3)

32

Zehn Big Brother Awards in .at (25c3)

33

Security and anonymity vulnerabilities in Tor (25c3)

34

DECT (25c3)

35

The Privacy Workshop Project (25c3)

36

Privacy in the social semantic web (25c3)

37

Lightning Talks Day3 - Morning (25c3)

38

eVoting after Nedap and Digital Pen (25c3)

39

Neusprech im Überwachungsstaat (25c3)

40

Handschellen hacken (25c3)

41

Flying for free (25c3)

42

Scalable Swarm Robotics (25c3)

43

Banking Malware 101 (25c3)

44

Short Attention Span Security (25c3)

45

Jahresrückblick (25c3)

46

Life is a Holodeck! (25c3)

47

Algorithmic Music in a Box (25c3)

48

Security of MICA*-based wireless sensor networks (25c3)

49

Anatomy of smartphone hardware (25c3)

50

The Infinite Library (25c3)

51

Blinkenlights Stereoscope (25c3)

52

Tricks: makes you smile (25c3)

53

Attacking Rich Internet Applications (25c3)

54

Fnord News Show (English interpretation) (25c3)

55

Climate Change - State of the Science (25c3)

56

Embracing Post-Privacy (25c3)

57

Lightning Talks Day2 (25c3)

58

Rapid Prototype Your Life (25c3)

59

All your base(s) are belong to us (25c3)

60

Exploiting Symbian (25c3)

61

Console Hacking 2008: Wii Fail (25c3)

62

Fnord News Show (25c3)

63

TCP Denial of Service Vulnerabilities (25c3)

64

Full-Disk-Encryption Crash-Course (25c3)

65

Soviet Unterzoegersdorf (25c3)

66

Vulnerability discovery in encrypted closed source PHP applications (25c3)

67

25C3 Opening and Keynote "Nothing to hide" (25c3)

68

RF fingerprinting of RFID (25c3)

69

Solar-powering your Geek Gear (25c3)

70

Das Grundrecht auf digitale Intimsphäre (25c3)

71

Why were we so vulnerable to the DNS vulnerability? (25c3)

72

Kurt Gödel – I do not fit into this century (25c3)

73

Terrorist All-Stars (25c3)

74

About Cyborgs and Gargoyles (25c3)

75

Messing Around with Garage Doors (25c3)

76

Collapsing the European security architecture (25c3)

77

Just Estonia and Georgia? (25c3)

78

Cracking the MSP430 BSL (25c3)

79

Building an international movement: hackerspaces.org (25c3)

80

U23 (25c3)

81

Datenpannen (25c3)

82

Advanced memory forensics: The Cold Boot Attacks (25c3)

83

Beyond Asimov - Laws for Robots (25c3)

84

FAIFA: A first open source PLC tool (25c3)

85

The Trust Situation (25c3)

86

Security Failures in Smart Card Payment Systems (25c3)

87

Der Hackerparagraph 202c StGB (25c3)

88

Hacking the iPhone (25c3)

89

Erich Mühsams Tagebücher in der Festungshaft (25c3)

90

Chip Reverse Engineering (25c3)

91

Locating Mobile Phones using SS7 (25c3)

92

coreboot: Beyond The Final Frontier (25c3)