| 26c3-3266-de-hacking_the_universe.ogg | 28.6 MiB | 2010-Jan-03 12:20 |
| 26c3-3266-de-hacking_the_universe.ogg.md5 | 72 B | 2010-Jan-03 12:25 |
| 26c3-3302-en-i_internet.ogg | 20.9 MiB | 2009-Dec-30 12:22 |
| 26c3-3302-en-i_internet.ogg.md5 | 62 B | 2010-Jan-01 23:56 |
| 26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.ogg | 59.7 MiB | 2009-Dec-30 01:39 |
| 26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.ogg.md5 | 110 B | 2010-Jan-01 23:56 |
| 26c3-3340-de-wolpertinger_ein_verteilter_portscanner.ogg | 18.6 MiB | 2010-Jan-15 10:35 |
| 26c3-3340-de-wolpertinger_ein_verteilter_portscanner.ogg.md5 | 91 B | 2010-Jan-15 10:41 |
| 26c3-3350-en-milkymist.ogg | 19.4 MiB | 2010-Jan-07 10:35 |
| 26c3-3350-en-milkymist.ogg.md5 | 61 B | 2010-Jan-07 11:14 |
| 26c3-3353-de-reverse-engineering_displaylink_devices.ogg | 17.2 MiB | 2010-Jan-08 10:54 |
| 26c3-3353-de-reverse-engineering_displaylink_devices.ogg.md5 | 91 B | 2010-Jan-08 10:54 |
| 26c3-3452-en-here_be_electric_dragons.ogg | 27.7 MiB | 2009-Dec-30 00:24 |
| 26c3-3452-en-here_be_electric_dragons.ogg.md5 | 76 B | 2010-Jan-01 23:56 |
| 26c3-3464-de-liquid_democracy.ogg | 29.3 MiB | 2010-Jan-06 20:33 |
| 26c3-3464-de-liquid_democracy.ogg.md5 | 68 B | 2010-Jan-06 20:35 |
| 26c3-3468-de-privacy__stylometry.ogg | 27.0 MiB | 2009-Dec-29 23:13 |
| 26c3-3468-de-privacy__stylometry.ogg.md5 | 71 B | 2010-Jan-01 23:56 |
| 26c3-3481-de-leyen-rhetorik.ogg | 28.4 MiB | 2010-Jan-08 01:25 |
| 26c3-3481-de-leyen-rhetorik.ogg.md5 | 66 B | 2010-Jan-08 10:53 |
| 26c3-3490-en-building_a_debugger.ogg | 25.6 MiB | 2009-Dec-30 15:57 |
| 26c3-3490-en-building_a_debugger.ogg.md5 | 71 B | 2010-Jan-01 23:56 |
| 26c3-3494-de-defending_the_poor.ogg | 33.2 MiB | 2009-Dec-30 16:10 |
| 26c3-3494-de-defending_the_poor.ogg.md5 | 70 B | 2010-Jan-01 23:56 |
| 26c3-3496-de-fugngernavigation_mit_augmented_reality.ogg | 19.0 MiB | 2009-Dec-30 12:19 |
| 26c3-3496-de-fugngernavigation_mit_augmented_reality.ogg.md5 | 91 B | 2010-Jan-01 23:56 |
| 26c3-3501-en-why_net_neutrality_matters.ogg | 26.7 MiB | 2010-Jan-06 21:19 |
| 26c3-3501-en-why_net_neutrality_matters.ogg.md5 | 78 B | 2010-Jan-06 21:21 |
| 26c3-3504-en-our_darknet_and_its_bright_spots.ogg | 24.1 MiB | 2010-Jan-03 11:42 |
| 26c3-3504-en-our_darknet_and_its_bright_spots.ogg.md5 | 84 B | 2010-Jan-03 11:47 |
| 26c3-3507-de-fuzzing_the_phone_in_your_phone.ogg | 18.8 MiB | 2010-Jan-03 04:15 |
| 26c3-3507-de-fuzzing_the_phone_in_your_phone.ogg.md5 | 83 B | 2010-Jan-03 04:16 |
| 26c3-3509-de-wofr_offenes_internet.ogg | 25.5 MiB | 2010-Jan-16 19:26 |
| 26c3-3509-de-wofr_offenes_internet.ogg.md5 | 73 B | 2010-Jan-16 19:34 |
| 26c3-3510-de-technik_des_neuen_epa.ogg | 27.7 MiB | 2009-Dec-30 13:09 |
| 26c3-3510-de-technik_des_neuen_epa.ogg.md5 | 73 B | 2010-Jan-01 23:56 |
| 26c3-3515-de-secubt.ogg | 26.4 MiB | 2009-Dec-30 16:13 |
| 26c3-3515-de-secubt.ogg.md5 | 58 B | 2010-Jan-01 23:56 |
| 26c3-3520-en-conlanging_101.ogg | 34.1 MiB | 2010-Jan-03 11:44 |
| 26c3-3520-en-conlanging_101.ogg.md5 | 66 B | 2010-Jan-03 11:47 |
| 26c3-3523-de-eine_zensur_findet_statt.ogg | 25.1 MiB | 2009-Dec-29 21:41 |
| 26c3-3523-de-eine_zensur_findet_statt.ogg.md5 | 76 B | 2010-Jan-01 23:57 |
| 26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.ogg | 27.7 MiB | 2009-Dec-30 11:53 |
| 26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.ogg.md5 | 93 B | 2010-Jan-01 23:57 |
| 26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.ogg | 24.5 MiB | 2009-Dec-30 11:46 |
| 26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.ogg.md5 | 101 B | 2010-Jan-01 23:57 |
| 26c3-3540-en-a_hackers_utopia.ogg | 29.6 MiB | 2009-Dec-30 12:46 |
| 26c3-3540-en-a_hackers_utopia.ogg.md5 | 68 B | 2010-Jan-01 23:57 |
| 26c3-3547-en-after_the_hype.ogg | 27.9 MiB | 2010-Jan-03 12:19 |
| 26c3-3547-en-after_the_hype.ogg.md5 | 66 B | 2010-Jan-03 12:25 |
| 26c3-3550-de-chaos-familien-duell.ogg | 54.8 MiB | 2010-Jan-03 12:24 |
| 26c3-3550-de-chaos-familien-duell.ogg.md5 | 72 B | 2010-Jan-03 12:25 |
| 26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.ogg | 27.2 MiB | 2009-Dec-30 19:07 |
| 26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.ogg.md5 | 113 B | 2010-Jan-01 23:57 |
| 26c3-3554-de-tor_and_censorship_lessons_learned.ogg | 29.6 MiB | 2009-Dec-29 22:08 |
| 26c3-3554-de-tor_and_censorship_lessons_learned.ogg.md5 | 86 B | 2010-Jan-01 23:57 |
| 26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.ogg | 26.4 MiB | 2009-Dec-30 01:20 |
| 26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.ogg.md5 | 153 B | 2010-Jan-07 20:17 |
| 26c3-3557-de-vom_kreationismus_zum_kollektivismus.ogg | 27.4 MiB | 2010-Jan-15 15:25 |
| 26c3-3557-de-vom_kreationismus_zum_kollektivismus.ogg.md5 | 88 B | 2010-Jan-15 15:32 |
| 26c3-3563-en-lightning_talks_-_day_1.ogg | 55.0 MiB | 2010-Jan-06 20:33 |
| 26c3-3563-en-lightning_talks_-_day_1.ogg.md5 | 75 B | 2010-Jan-06 20:35 |
| 26c3-3567-en-wikileaks_release_10.ogg | 29.2 MiB | 2009-Dec-30 11:38 |
| 26c3-3567-en-wikileaks_release_10.ogg.md5 | 72 B | 2010-Jan-01 23:57 |
| 26c3-3570-en-weaponizing_cultural_viruses.ogg | 31.5 MiB | 2009-Dec-30 13:57 |
| 26c3-3570-en-weaponizing_cultural_viruses.ogg.md5 | 80 B | 2010-Jan-01 23:57 |
| 26c3-3573-en-playing_with_the_built_city.ogg | 28.1 MiB | 2009-Dec-30 03:26 |
| 26c3-3573-en-playing_with_the_built_city.ogg.md5 | 79 B | 2010-Jan-01 23:57 |
| 26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.ogg | 24.1 MiB | 2009-Dec-30 11:35 |
| 26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.ogg.md5 | 112 B | 2010-Jan-01 23:57 |
| 26c3-3577-de-privacy-enhanced_event_scheduling.ogg | 27.5 MiB | 2009-Dec-30 13:25 |
| 26c3-3577-de-privacy-enhanced_event_scheduling.ogg.md5 | 85 B | 2010-Jan-01 23:57 |
| 26c3-3579-en-photography_and_the_art_of_doing_it_wrong.ogg | 24.2 MiB | 2010-Jan-03 11:40 |
| 26c3-3579-en-photography_and_the_art_of_doing_it_wrong.ogg.md5 | 93 B | 2010-Jan-03 11:47 |
| 26c3-3590-de-europische_biometriestrategien.ogg | 30.0 MiB | 2009-Dec-30 12:30 |
| 26c3-3590-de-europische_biometriestrategien.ogg.md5 | 82 B | 2010-Jan-01 23:57 |
| 26c3-3592-de-cybernetic_cannibalism.ogg | 29.0 MiB | 2009-Dec-30 11:36 |
| 26c3-3592-de-cybernetic_cannibalism.ogg.md5 | 74 B | 2010-Jan-01 23:57 |
| 26c3-3594-de-internetsperren.ogg | 21.5 MiB | 2009-Dec-29 21:49 |
| 26c3-3594-de-internetsperren.ogg.md5 | 67 B | 2010-Jan-01 23:58 |
| 26c3-3596-de-cat_procsysnetipv4fuckups.ogg | 19.4 MiB | 2009-Dec-29 22:26 |
| 26c3-3596-de-cat_procsysnetipv4fuckups.ogg.md5 | 77 B | 2010-Jan-01 23:58 |
| 26c3-3600-de-location_tracking_does_scale_up.ogg | 27.4 MiB | 2009-Dec-30 12:37 |
| 26c3-3600-de-location_tracking_does_scale_up.ogg.md5 | 83 B | 2010-Jan-01 23:58 |
| 26c3-3608-en-playing_with_the_gsm_rf_interface.ogg | 22.1 MiB | 2010-Jan-08 15:01 |
| 26c3-3608-en-playing_with_the_gsm_rf_interface.ogg.md5 | 85 B | 2010-Jan-08 15:04 |
| 26c3-3613-de-fnord-jahresrckblick_2009.ogg | 36.4 MiB | 2010-Jan-15 10:50 |
| 26c3-3613-de-fnord-jahresrckblick_2009.ogg.md5 | 77 B | 2010-Jan-15 10:56 |
| 26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.ogg | 31.4 MiB | 2009-Dec-30 16:10 |
| 26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.ogg.md5 | 94 B | 2010-Jan-01 23:58 |
| 26c3-3631-en-finding_the_key_in_the_haystack.ogg | 23.3 MiB | 2010-Jan-06 20:33 |
| 26c3-3631-en-finding_the_key_in_the_haystack.ogg.md5 | 83 B | 2010-Jan-06 20:35 |
| 26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.ogg | 20.2 MiB | 2009-Dec-30 12:29 |
| 26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.ogg.md5 | 99 B | 2010-Jan-01 23:58 |
| 26c3-3642-en-lightning_talks_-_day_2.ogg | 61.3 MiB | 2009-Dec-29 23:12 |
| 26c3-3642-en-lightning_talks_-_day_2.ogg.md5 | 75 B | 2010-Jan-01 23:58 |
| 26c3-3644-en-lightning_talks_-_day_3.ogg | 63.2 MiB | 2009-Dec-30 16:11 |
| 26c3-3644-en-lightning_talks_-_day_3.ogg.md5 | 75 B | 2010-Jan-01 23:58 |
| 26c3-3645-en-lightning_talks_-_day_4.ogg | 65.4 MiB | 2010-Jan-03 12:37 |
| 26c3-3645-en-lightning_talks_-_day_4.ogg.md5 | 75 B | 2010-Jan-03 12:40 |
| 26c3-3647-de-ckan_apt-get_for_the_debian_of_data.ogg | 29.1 MiB | 2009-Dec-30 01:43 |
| 26c3-3647-de-ckan_apt-get_for_the_debian_of_data.ogg.md5 | 87 B | 2010-Jan-01 23:58 |
| 26c3-3648-en-dect_part_ii.ogg | 28.4 MiB | 2009-Dec-30 11:39 |
| 26c3-3648-en-dect_part_ii.ogg.md5 | 64 B | 2010-Jan-01 23:58 |
| 26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.ogg | 22.6 MiB | 2009-Dec-30 03:08 |
| 26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.ogg.md5 | 120 B | 2010-Jan-01 23:58 |
| 26c3-3654-en-gsm_srsly.ogg | 32.1 MiB | 2009-Dec-29 22:03 |
| 26c3-3654-en-gsm_srsly.ogg.md5 | 61 B | 2010-Jan-01 23:59 |
| 26c3-3657-en-optimised_to_fail.ogg | 27.5 MiB | 2010-Feb-09 20:44 |
| 26c3-3657-en-optimised_to_fail.ogg.md5 | 69 B | 2010-Feb-09 20:44 |
| 26c3-3658-en-black_ops_of_pki.ogg | 36.5 MiB | 2010-Jan-06 21:16 |
| 26c3-3658-en-black_ops_of_pki.ogg.md5 | 68 B | 2010-Jan-06 21:21 |
| 26c3-3661-de-coreboot_adding_support_for_a_system_near_you.ogg | 32.7 MiB | 2010-Jan-23 22:17 |
| 26c3-3661-de-coreboot_adding_support_for_a_system_near_you.ogg.md5 | 97 B | 2010-Jan-23 22:18 |
| 26c3-3664-en-homewreckery.ogg | 19.3 MiB | 2009-Dec-30 11:35 |
| 26c3-3664-en-homewreckery.ogg.md5 | 64 B | 2010-Jan-01 23:59 |
| 26c3-3668-en-hacker_jeopardy.ogg | 59.1 MiB | 2010-Jan-15 11:20 |
| 26c3-3668-en-hacker_jeopardy.ogg.md5 | 67 B | 2010-Jan-15 11:27 |
| 26c3-3669-de-hacker_jeopardy.ogg | 58.6 MiB | 2010-Jan-03 13:39 |
| 26c3-3669-de-hacker_jeopardy.ogg.md5 | 67 B | 2010-Jan-03 13:43 |
| 26c3-3670-en-blackbox_jtag_reverse_engineering.ogg | 26.2 MiB | 2010-Jan-03 12:54 |
| 26c3-3670-en-blackbox_jtag_reverse_engineering.ogg.md5 | 85 B | 2010-Jan-03 12:55 |
| 26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.ogg | 42.2 MiB | 2009-Dec-30 16:11 |
| 26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.ogg.md5 | 98 B | 2010-Jan-01 23:59 |
| 26c3-3672-de-advanced_microcontroller_programming.ogg | 23.9 MiB | 2009-Dec-29 23:14 |
| 26c3-3672-de-advanced_microcontroller_programming.ogg.md5 | 88 B | 2010-Jan-01 23:59 |
| 26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.ogg | 29.7 MiB | 2009-Dec-29 21:38 |
| 26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.ogg.md5 | 101 B | 2010-Jan-01 23:59 |
| 26c3-3685-de-im_herz_der_bestie.ogg | 24.0 MiB | 2010-Jan-03 12:53 |
| 26c3-3685-de-im_herz_der_bestie.ogg.md5 | 70 B | 2010-Jan-03 12:55 |
| 26c3-3687-de-security_nightmares.ogg | 39.8 MiB | 2010-Jan-03 00:14 |
| 26c3-3687-de-security_nightmares.ogg.md5 | 71 B | 2010-Jan-03 00:15 |
| 26c3-3688-de-haste_man_netblock.ogg | 14.9 MiB | 2009-Dec-30 18:55 |
| 26c3-3688-de-haste_man_netblock.ogg.md5 | 70 B | 2010-Jan-01 23:59 |
| 26c3-3690-de-ccc-jahresrckblick.ogg | 40.6 MiB | 2009-Dec-30 11:36 |
| 26c3-3690-de-ccc-jahresrckblick.ogg.md5 | 70 B | 2010-Jan-01 23:59 |
| 26c3-3691-de-vier_fuste_fr_ein_halleluja.ogg | 25.1 MiB | 2010-Jan-07 11:07 |
| 26c3-3691-de-vier_fuste_fr_ein_halleluja.ogg.md5 | 79 B | 2010-Jan-07 11:16 |
| 26c3-3696-en-wireless_power_transfer.ogg | 27.7 MiB | 2009-Dec-30 11:39 |
| 26c3-3696-en-wireless_power_transfer.ogg.md5 | 75 B | 2010-Jan-01 23:59 |
| 26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.ogg | 64.8 MiB | 2010-Jan-03 12:21 |
| 26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.ogg.md5 | 88 B | 2010-Jan-03 12:25 |
| 26c3-3700-de-here_be_dragons.ogg | 22.9 MiB | 2009-Dec-30 11:35 |
| 26c3-3700-de-here_be_dragons.ogg.md5 | 67 B | 2010-Jan-01 23:59 |
| 26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg | 25.7 MiB | 2009-Dec-30 12:18 |
| 26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.ogg.md5 | 100 B | 2010-Jan-01 23:59 |
| 26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg | 20.8 MiB | 2009-Dec-29 22:01 |
| 26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg.md5 | 100 B | 2010-Jan-02 00:00 |
| 26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.ogg | 39.5 MiB | 2010-Jan-07 11:07 |
| 26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.ogg.md5 | 90 B | 2010-Jan-07 11:16 |
| 26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg | 24.8 MiB | 2010-Jan-07 09:58 |
| 26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg.md5 | 125 B | 2010-Jan-07 10:01 |
| 26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.ogg | 28.1 MiB | 2010-Jan-15 14:54 |
| 26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.ogg.md5 | 95 B | 2010-Jan-15 15:01 |
| 26c3-3709-en-legic_prime_obscurity_in_depth.ogg | 28.9 MiB | 2010-Jan-07 10:37 |
| 26c3-3709-en-legic_prime_obscurity_in_depth.ogg.md5 | 82 B | 2010-Jan-07 11:16 |
| 26c3-3710-en-the_lost_cosmonauts.ogg | 22.8 MiB | 2009-Dec-30 11:42 |
| 26c3-3710-en-the_lost_cosmonauts.ogg.md5 | 71 B | 2010-Jan-02 00:00 |
| 26c3-3711-de-computerspielepolitik.ogg | 33.1 MiB | 2009-Dec-29 21:53 |
| 26c3-3711-de-computerspielepolitik.ogg.md5 | 73 B | 2010-Jan-02 00:00 |
| 26c3-3713-de-unbild__pictures_and_non-pictures.ogg | 28.2 MiB | 2009-Dec-30 18:29 |
| 26c3-3713-de-unbild__pictures_and_non-pictures.ogg.md5 | 85 B | 2010-Jan-02 00:00 |
| 26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.ogg | 30.4 MiB | 2009-Dec-30 00:18 |
| 26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.ogg.md5 | 146 B | 2010-Jan-02 00:00 |
| 26c3-3717-en-closing_event.ogg | 15.9 MiB | 2010-Jan-03 14:30 |
| 26c3-3717-en-closing_event.ogg.md5 | 65 B | 2010-Jan-03 14:34 |
| 26c3-3721-de-etsi-vorratsdatenspeicherung_2009.ogg | 29.2 MiB | 2009-Dec-30 11:35 |
| 26c3-3721-de-etsi-vorratsdatenspeicherung_2009.ogg.md5 | 85 B | 2010-Jan-02 00:00 |
| 26c3-3723-en-stream_fnord-jahresrckblick_2009.ogg | 36.7 MiB | 2010-Jan-07 09:59 |
| 26c3-3723-en-stream_fnord-jahresrckblick_2009.ogg.md5 | 84 B | 2010-Jan-07 10:01 |
| 26c3-3725-en-stream_security_nightmares.ogg | 39.7 MiB | 2010-Jan-03 11:32 |
| 26c3-3725-en-stream_security_nightmares.ogg.md5 | 78 B | 2010-Jan-03 11:48 |