25C3 Audio Recordings

PODCAST · technology

25C3 Audio Recordings

The 25th Chaos Communication Congress (25C3: Nothing to hide) took place from December 27th to December 30th 2008 at Berliner Congress Center in Berlin, Germany. This channel offers the complete set of available audio recordings of the 25C3 lectures. Most lectures are in english, some in german. The recordings are being offered in universally playable MP3 encoding.

  1. 92

    25C3_2999 Closing Ceremony

    25C3 Audio Recordings 25C3_2999 Veröffentlicht am: 30.12.2008, 18:15 Uhr Präsentation vom: 30.12.2008, 18:15 Uhr http://chaosradio.ccc.de/25c3_mp3_2999.html Closing Ceremony Abstract : Speakers : Sandro Gaycken Language : en Date : 2008-12-30 Time : 18:15 Room : Saal 1 More information... http://events.ccc.de/congress/2008/Fahrplan/events/2999.en.html

  2. 91

    25C3_3021 Security Nightmares 2009

    Oder: worüber wir nächstes Jahr lachen werden

  3. 90
  4. 89
  5. 88

    25C3_2899 Mining social contacts with active RFID

    25C3 Audio Recordings 25C3_2899 Veröffentlicht am: 30.12.2008, 15:15 Uhr Präsentation vom: 30.12.2008, 15:15 Uhr http://chaosradio.ccc.de/25c3_mp3_2899.html Mining social contacts with active RFID Abstract : We describe the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. We report on experiments performed during conference gatherings, where the new feature of proximity detection was used to mine and expose patterns of social contact. We discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure. Speakers : aestetix, Ciro Cattuto, Milosch Meriac Language : en Date : 2008-12-30 Time : 15:15 Room : Saal 2 More information... http://events.ccc.de/congress/2008/Fahrplan/events/2899.en.html

  6. 87

    25C3_3023 MD5 considered harmful today

    Creating a rogue CA Certificate

  7. 86

    25C3_2916 Wikileaks

    Wikileaks vs. the World

  8. 85

    25C3_2777 Crafting and Hacking: Separated at Birth

    25C3 Audio Recordings 25C3_2777 Veröffentlicht am: 30.12.2008, 14:00 Uhr Präsentation vom: 30.12.2008, 14:00 Uhr http://chaosradio.ccc.de/25c3_mp3_2777.html Crafting and Hacking: Separated at Birth Abstract : What do hackers have in common with crafters? Lots. While crafting is more often about string and glue than bits and electrons, crafters often feel the same need to create things and manipulate materials into something new. The roots of computing are intertwined with craft around the invention of the Jaquard punchcard loom. We'll look at where the two scenes have gone since then, and what we can gain by reconnecting the hacker world with its softer, more decorative cousin. Speakers : Kellbot Language : en Date : 2008-12-30 Time : 14:00 Room : Saal 3 More information... http://events.ccc.de/congress/2008/Fahrplan/events/2777.en.html

  9. 84

    25C3_2942 Vertex Hacking

    Reverse Engineering von 3D-Dateiformaten

  10. 83
  11. 82

    25C3_2791 La Quadrature du Net - Campaigning on Telecoms Package

    Pan-european activism for patching a "pirated" law

  12. 81

    25C3_2680 Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You

    The silent march of the multinational GMO soy industry and its growing power in South America, the EU, and around the World.

  13. 80
  14. 79

    25C3_3004 Why technology sucks

    If technology is the solution, politicians are the problem

  15. 78

    25C3_2958 Hacker Jeopardy

    Die ultimative Hacker-Quizshow

  16. 77
  17. 76
  18. 75

    25C3_2781 Objects as Software: The Coming Revolution

    How RepRap and physical compilers will change the world as we know it (and already have)

  19. 74

    25C3_2895 Der elektronische Personalausweis

    Endlich wird jeder zum "Trusted Citizen"

  20. 73

    25C3_2938 Methods for Understanding Targeted Attacks with Office Documents

    25C3 Audio Recordings 25C3_2938 Veröffentlicht am: 29.12.2008, 20:30 Uhr Präsentation vom: 29.12.2008, 20:30 Uhr http://chaosradio.ccc.de/25c3_mp3_2938.html Methods for Understanding Targeted Attacks with Office Documents Abstract : As more security features and anti-exploitation mechanisms are added to modern operating systems, attackers are changing their targets to higher-level applications. In the last few years, we have seen increasing targeted attacks using malicious Office documents against both government and non-government entities. These attacks are well publicized in the media; unfortunately, there is not much public information on attack details or exploitation mechanisms employed in the attacks themselves. This presentation aims to fill the gap by offering: Speakers : Bruce Dang Language : en Date : 2008-12-29 Time : 20:30 Room : Saal 1 More information... http://events.ccc.de/congress/2008/Fahrplan/events/2938.en.html

  21. 72
  22. 71

    25C3_2596 SWF and the Malware Tragedy

    Hide and Seek in A. Flash

  23. 70

    25C3_2639 Attacking NFC mobile phones

    First look at the security of NFC mobile phones

  24. 69

    25C3_2828 OnionCat – A Tor-based Anonymous VPN

    Building an anonymous Internet within the Internet

  25. 68
  26. 67

    25C3_2937 DECT

    The Digital Enhanced Cordless Telecommunications standard

  27. 66

    25C3_3000 Stormfucker: Owning the Storm Botnet

    25C3 Audio Recordings 25C3_3000 Veröffentlicht am: 29.12.2008, 16:45 Uhr Präsentation vom: 29.12.2008, 16:45 Uhr http://chaosradio.ccc.de/25c3_mp3_3000.html Stormfucker: Owning the Storm Botnet Abstract : In the talk we will demonstrate how to own the storm botnet (live demo included). Speakers : Felix Leder, Georg 'oxff' Wicherski, Mark Schlösser, Tillmann Werner Language : en Date : 2008-12-29 Time : 16:45 Room : Saal 3 More information... http://events.ccc.de/congress/2008/Fahrplan/events/3000.en.html

  28. 65

    25C3_2874 The Ultimate Commodore 64 Talk

    Everything about the C64 in 64 Minutes

  29. 64

    25C3_3032 Analyzing RFID Security

    25C3 Audio Recordings 25C3_3032 Veröffentlicht am: 29.12.2008, 16:00 Uhr Präsentation vom: 29.12.2008, 16:00 Uhr http://chaosradio.ccc.de/25c3_mp3_3032.html Analyzing RFID Security Abstract : Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID cards, we release an open-source, software-controlled, and extensible RFID reader with support for most common standards. Speakers : Henryk Plötz, Karsten Nohl Language : en Date : 2008-12-29 Time : 16:00 Room : Saal 1 More information... http://events.ccc.de/congress/2008/Fahrplan/events/3032.en.html

  30. 63

    25C3_3002 Squeezing Attack Traces

    How to get useable information out of your honeypot

  31. 62

    25C3_2875 An introduction to new stream cipher designs

    Turning data into line noise and back

  32. 61

    25C3_2860 Neusprech im Überwachungsstaat

    Politikersprache zwischen Orwell und Online

  33. 60
  34. 59

    25C3_2681 Repurposing the TI EZ430U

    with msp430static, solder, and syringe

  35. 58

    25C3_3041 eVoting after Nedap and Digital Pen

    Why cryptography might not fix the issue of transparent elections

  36. 57

    25C3_2975 Zehn Big Brother Awards in .at

    Rückblick über eine bewegte Zeit

  37. 56

    25C3_3007 Running your own GSM network

    25C3 Audio Recordings 25C3_3007 Veröffentlicht am: 29.12.2008, 11:30 Uhr Präsentation vom: 29.12.2008, 11:30 Uhr http://chaosradio.ccc.de/25c3_mp3_3007.html Running your own GSM network Abstract : This presentation will mark the first public release of a new GPL licensed Free Software project implementing the GSM fixed network, including the various minimal necessary functionality of BSC, MSC, HLR. It will introduce the respective standards and protocols, as well as a short demonstration of an actual phone call between two mobile phones registered to the base station. Speakers : Dieter Spaar, Harald Welte Language : en Date : 2008-12-29 Time : 11:30 Room : Saal 1 More information... http://events.ccc.de/congress/2008/Fahrplan/events/3007.en.html

  38. 55
  39. 54

    25C3_2872 The Privacy Workshop Project

    Enhancing the value of privacy in todays students view

  40. 53
  41. 52

    25C3_2812 Fnord News Show

    Wir helfen Euch, die Fnords zu sehen

  42. 51

    25C3_3016 Life is a Holodeck!

    An overview of holographic techniques

  43. 50
  44. 49

    25C3_2799 Console Hacking 2008: Wii Fail

    Is implementation the enemy of design?

  45. 48

    25C3_2992 Tricks: makes you smile

    A clever or ingenious device or expedient; adroit technique: the tricks of the trade.

  46. 47

    25C3_2980 The Infinite Library

    Storage and Access of Pornographic Information

  47. 46

    25C3_3020 Banking Malware 101

    Overview of Current Keylogger Threats

  48. 45

    25C3_3044 All your base(s) are belong to us

    Dawn of the high-throughput DNA sequencing era

  49. 44

    25C3_3015 Rapid Prototype Your Life

    The time is now to make anything you can imagine

  50. 43

    25C3_2843 Algorithmic Music in a Box

    Doing music with microcontrollers

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

The 25th Chaos Communication Congress (25C3: Nothing to hide) took place from December 27th to December 30th 2008 at Berliner Congress Center in Berlin, Germany. This channel offers the complete set of available audio recordings of the 25C3 lectures. Most lectures are in english, some in german. The recordings are being offered in universally playable MP3 encoding.

HOSTED BY

Chaos Computer Club

CATEGORIES

URL copied to clipboard!