Parent directory/ | - | - |
subtitles/ | - | 2021-Apr-15 13:48 |
32c3-7221-de-Methodisch_inkorrekt_sd.mp4 | 861.8 MiB | 2016-Jan-10 14:56 |
32c3-7152-de-en-gsw-Hacker_Jeopardy_sd.mp4 | 543.2 MiB | 2016-Jan-06 22:21 |
32c3-7306-de-en-Jahresrueckblick_des_CCC_sd.mp4 | 509.6 MiB | 2016-Jan-02 22:32 |
32c3-7558-en-de-Lightning_Talks_Day_2_sd.mp4 | 436.7 MiB | 2015-Dec-29 20:54 |
32c3-7559-en-de-Lightning_Talks_Day_3_sd.mp4 | 420.1 MiB | 2015-Dec-30 13:57 |
32c3-7XX1-deu-State_of_the_Internat_AS201701_-_Freifunk_Rheinland_eV_Backbone_sd.mp4 | 385.6 MiB | 2016-Jan-12 20:31 |
32c3-7560-en-de-Lightning_Talks_Day_4_sd.mp4 | 381.3 MiB | 2016-Jan-04 18:06 |
32c3-7443-en-de-The_Price_Of_Dissent_sd.mp4 | 378.5 MiB | 2015-Dec-30 18:07 |
32c3-7525-de-en-Quantenphysik_und_Kosmologie_sd.mp4 | 352.5 MiB | 2015-Dec-29 17:58 |
32c3-7421-en-de-Fluxus_cannot_save_the_world_sd.mp4 | 344.7 MiB | 2015-Dec-30 18:00 |
32c3-7549-en-de-20_OSCILLATORS_IN_20_MINUTES_sd.mp4 | 336.8 MiB | 2015-Dec-30 14:54 |
32c3-7546-de-en-Security_Nightmares_0x10_sd.mp4 | 331.9 MiB | 2016-Jan-06 19:29 |
32c3-7323-de-en-Wie_man_einen_Blackout_verursacht_sd.mp4 | 330.0 MiB | 2016-Jan-04 18:08 |
32c3-7307-en-de-State_of_the_Onion_sd.mp4 | 308.5 MiB | 2015-Dec-30 02:50 |
32c3-7403-en-de-A_New_Kid_on_the_Block_sd.mp4 | 303.7 MiB | 2016-Jan-04 18:06 |
32c3-7280-en-de-Cyber_all_the_Wassenaars_sd.mp4 | 301.7 MiB | 2016-Jan-06 22:37 |
32c3-7501-en-de-Ten_years_after_We_Lost_The_War_sd.mp4 | 298.1 MiB | 2015-Dec-30 01:28 |
32c3-7496-en-de-Hardsploit_A_Metasploit-like_tool_for_hardware_hacking_sd.mp4 | 297.2 MiB | 2016-Jan-02 19:28 |
32c3-7283-eng-deu-Software_and_business_method_patents_call_for_action_sd.mp4 | 296.6 MiB | 2016-Jan-10 14:55 |
32c3-7282-de-en-Fnord-Jahresrueckblick_sd.mp4 | 295.5 MiB | 2015-Dec-30 14:05 |
32c3-7260-en-de-APT_Reports_and_OPSEC_Evolution_or_These_are_not_the_APT_reports_you_are_looking_for_sd.mp4 | 294.9 MiB | 2015-Dec-29 19:07 |
32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik_sd.mp4 | 292.7 MiB | 2015-Dec-30 00:18 |
32c3-7368-en-de-Shopshifting_sd.mp4 | 288.0 MiB | 2015-Dec-28 15:56 |
32c3-7540-en-de-Maker_Spaces_in_Favelas_-_Lecture_sd.mp4 | 287.4 MiB | 2016-Jan-02 22:59 |
32c3-7279-en-de-Public_Library_Memory_of_the_World_sd.mp4 | 285.9 MiB | 2015-Dec-28 14:39 |
32c3-7389-en-de-My_Robot_Will_Crush_You_With_Its_Soft_Delicate_Hands_sd.mp4 | 283.4 MiB | 2015-Dec-29 18:33 |
32c3-7231-en-de-CloudABI_sd.mp4 | 282.3 MiB | 2015-Dec-29 18:43 |
32c3-7333-en-de-The_Magic_World_of_Searchable_Symmetric_Encryption_sd.mp4 | 281.0 MiB | 2016-Jan-05 00:24 |
32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall_sd.mp4 | 280.9 MiB | 2015-Dec-30 15:15 |
32c3-7565-en-Keynote_sd.mp4 | 279.7 MiB | 2015-Dec-28 13:53 |
32c3-7162-en-de-Shooting_lasers_into_space_-_for_science_sd.mp4 | 279.5 MiB | 2015-Dec-28 16:53 |
32c3-7216-en-de-CHINTERNET_ART_sd.mp4 | 278.7 MiB | 2016-Jan-04 18:08 |
32c3-7562-deu-eng-Jugend_hackt_2015_sd.mp4 | 278.2 MiB | 2016-Jan-10 14:56 |
32c3-7561-en-de-How_Open_Source_Software_second_hand_laptops_and_hackers_helped_stop_Ebola_and_stopped_an_apocalypse_sd.mp4 | 277.2 MiB | 2016-Jan-04 18:07 |
32c3-7374-en-de-The_architecture_of_a_street_level_panopticon_sd.mp4 | 277.0 MiB | 2015-Dec-30 01:10 |
32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching_sd.mp4 | 275.1 MiB | 2015-Dec-28 16:24 |
32c3-7154-en-de-Iridium_Update_sd.mp4 | 274.2 MiB | 2015-Dec-29 18:03 |
32c3-7341-en-de-So_you_want_to_build_a_satellite_sd.mp4 | 273.8 MiB | 2015-Dec-28 15:01 |
32c3-7300-en-de-Hacking_EU_funding_for_a_decentralizing_FOSS_project_sd.mp4 | 271.2 MiB | 2015-Dec-28 12:46 |
32c3-7555-en-de-32C3_Infrastructure_Review_sd.mp4 | 270.2 MiB | 2016-Jan-04 01:43 |
32c3-7513-en-de-Safe_Harbor_sd.mp4 | 269.6 MiB | 2015-Dec-30 18:06 |
32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think_sd.mp4 | 269.3 MiB | 2016-Jan-06 22:17 |
32c3-7523-en-de-DDoS_mitigation_EPIC_FAIL_collection_sd.mp4 | 268.8 MiB | 2016-Jan-04 14:24 |
32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you_sd.mp4 | 268.2 MiB | 2015-Dec-29 17:58 |
32c3-7336-en-de-3D_printing_on_the_moon_sd.mp4 | 263.4 MiB | 2015-Dec-30 01:29 |
32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate_sd.mp4 | 256.1 MiB | 2015-Dec-28 13:30 |
32c3-7386-en-de-Crypto_Wars_Part_II_sd.mp4 | 253.1 MiB | 2015-Dec-30 20:33 |
32c3-7438-en-de-goto_fail_sd.mp4 | 248.4 MiB | 2015-Dec-30 13:38 |
32c3-7273-en-Unpatchable_sd.mp4 | 247.5 MiB | 2015-Dec-30 14:03 |
32c3-7229-de-en-PLC-Blaster_sd.mp4 | 246.7 MiB | 2015-Dec-28 13:58 |
32c3-7218-en-de-A_Dozen_Years_of_Shellphish_sd.mp4 | 246.3 MiB | 2015-Dec-30 18:08 |
32c3-7227-en-Avoiding_kernel_panic_Europes_biggest_fails_in_digital_policy-making_sd.mp4 | 245.3 MiB | 2015-Dec-28 13:37 |
32c3-7340-eng-deu-fra-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone_sd.mp4 | 244.0 MiB | 2016-Jan-08 14:38 |
32c3-7139-en-de-A_Free_and_Open_Source_Verilog-to-Bitstream_Flow_for_iCE40_FPGAs_sd.mp4 | 241.4 MiB | 2015-Dec-28 15:32 |
32c3-7259-en-de-Graphs_Drones_Phones_sd.mp4 | 240.4 MiB | 2015-Dec-30 14:46 |
32c3-7483-en-de-Computational_Meta-Psychology_sd.mp4 | 240.3 MiB | 2015-Dec-30 14:44 |
32c3-7510-en-de-Windows_drivers_attack_surface_sd.mp4 | 240.2 MiB | 2015-Dec-28 15:54 |
32c3-7356-en-de-Top_X_usability_obstacles_sd.mp4 | 239.8 MiB | 2015-Dec-30 20:42 |
32c3-7493-en-de-How_hackers_grind_an_MMORPG_by_taking_it_apart_sd.mp4 | 234.9 MiB | 2015-Dec-30 02:09 |
32c3-7196-en-de-How_the_Great_Firewall_discovers_hidden_circumvention_servers_sd.mp4 | 234.6 MiB | 2015-Dec-28 15:47 |
32c3-7567-de-en-Katastrophe_und_Kommunikation_sd.mp4 | 234.3 MiB | 2016-Jan-04 21:28 |
32c3-7153-en-de-rad1o_sd.mp4 | 232.4 MiB | 2015-Dec-28 13:54 |
32c3-7171-en-de-When_hardware_must_just_work_sd.mp4 | 229.5 MiB | 2015-Dec-28 16:35 |
32c3-7490-en-de-The_Great_Train_Cyber_Robbery_sd.mp4 | 228.0 MiB | 2015-Dec-28 16:00 |
32c3-7165-en-de-Vehicle2Vehicle_Communication_based_on_IEEE_80211p_sd.mp4 | 226.6 MiB | 2015-Dec-30 18:01 |
32c3-7482-en-de-Say_hi_to_your_new_boss_How_algorithms_might_soon_control_our_lives_sd.mp4 | 226.0 MiB | 2015-Dec-30 18:02 |
32c3-7210-en-de-PQCHacks_sd.mp4 | 226.0 MiB | 2015-Dec-29 14:15 |
32c3-7375-en-de-Wireless_Drivers_Freedom_considered_harmful_sd.mp4 | 225.9 MiB | 2016-Jan-02 17:04 |
32c3-7387-en-de-Net_Neutrality_in_Europe_sd.mp4 | 225.4 MiB | 2015-Dec-29 18:33 |
32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen_sd.mp4 | 225.3 MiB | 2015-Dec-28 13:19 |
32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS_sd.mp4 | 223.5 MiB | 2015-Dec-28 15:40 |
32c3-7277-en-de-Breaking_Honeypots_for_Fun_and_Profit_sd.mp4 | 223.2 MiB | 2016-Jan-04 18:09 |
32c3-7538-en-Internet_Landscapes_sd.mp4 | 222.8 MiB | 2015-Dec-28 14:24 |
32c3-7252-en-de-In_Security_of_Embedded_Devices_Firmware_-_Fast_and_Furious_at_Large_Scale_sd.mp4 | 222.0 MiB | 2015-Dec-30 14:58 |
32c3-7130-en-de-The_Perl_Jam_2_sd.mp4 | 220.8 MiB | 2015-Dec-29 17:58 |
32c3-7143-en-de-The_state_of_Internet_Censorship_sd.mp4 | 220.4 MiB | 2016-Jan-02 22:44 |
32c3-7491-en-de-De-anonymizing_Programmers_sd.mp4 | 220.1 MiB | 2015-Dec-30 00:12 |
32c3-7468-en-de-The_Ultimate_Amiga_500_Talk_sd.mp4 | 218.4 MiB | 2015-Dec-28 13:17 |
32c3-7321-en-de-re_cycle_sd.mp4 | 218.1 MiB | 2015-Dec-30 14:41 |
32c3-7207-en-de-I_feel_like_a_criminal_and_I_have_to_be_god_at_the_same_time_sd.mp4 | 216.8 MiB | 2015-Dec-30 19:54 |
32c3-7305-en-de-Quantum_Cryptography_sd.mp4 | 216.3 MiB | 2016-Jan-03 00:36 |
32c3-7343-en-de-Beyond_Anti_Evil_Maid_sd.mp4 | 213.2 MiB | 2015-Dec-30 15:17 |
32c3-7243-en-de-Gibberish_Detection_102_sd.mp4 | 212.2 MiB | 2015-Dec-30 00:59 |
32c3-7134-en-de-Ecuador_how_an_authoritarian_government_is_fooling_the_entire_world_sd.mp4 | 208.8 MiB | 2015-Dec-29 14:24 |
32c3-7249-de-en-Das_Zahnrad_aus_Fleisch_sd.mp4 | 207.2 MiB | 2016-Jan-02 20:12 |
32c3-7497-en-de-When_algorithms_fail_in_our_personal_lives_sd.mp4 | 206.9 MiB | 2015-Dec-30 20:50 |
32c3-7294-en-de-Sanitizing_PCAPs_sd.mp4 | 204.7 MiB | 2015-Dec-30 13:58 |
32c3-7449-en-de-Prediction_and_Control_sd.mp4 | 203.1 MiB | 2015-Dec-30 18:08 |
32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops_sd.mp4 | 196.9 MiB | 2015-Dec-28 13:17 |
32c3-7432-en-de-Datahavens_from_HavenCo_to_Today_sd.mp4 | 196.3 MiB | 2015-Dec-28 14:58 |
32c3-7240-en-de-Console_Hacking_sd.mp4 | 196.1 MiB | 2015-Dec-28 14:51 |
32c3-7284-en-de-Check_your_privileges_sd.mp4 | 193.4 MiB | 2015-Dec-30 18:41 |
32c3-7163-en-de-New_memory_corruption_attacks_why_cant_we_have_nice_things_sd.mp4 | 190.5 MiB | 2015-Dec-28 16:35 |
32c3-7133-en-de-Beyond_your_cable_modem_sd.mp4 | 187.2 MiB | 2015-Dec-28 16:12 |
32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips_sd.mp4 | 183.6 MiB | 2015-Dec-28 14:12 |
32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like_sd.mp4 | 182.2 MiB | 2015-Dec-29 14:24 |
32c3-7255-en-de-Neither_Snow_Nor_Rain_Nor_MITM_The_State_of_Email_Security_in_2015_sd.mp4 | 181.8 MiB | 2015-Dec-30 14:27 |
32c3-7543-de-The_mummy_unwrapped_sd.mp4 | 180.6 MiB | 2016-Jan-02 14:33 |
32c3-7502-en-de-Dissecting_VoLTE_sd.mp4 | 180.1 MiB | 2015-Dec-29 14:18 |
32c3-7435-en-de-Replication_Prohibited_sd.mp4 | 176.0 MiB | 2015-Dec-30 20:35 |
32c3-7369-en-de-How_to_contribute_to_make_open_hardware_happen_sd.mp4 | 174.8 MiB | 2016-Jan-04 18:07 |
32c3-7517-en-de-the_possibility_of_an_army_sd.mp4 | 170.6 MiB | 2015-Dec-30 18:15 |
32c3-7570-en-de-Plunge_into_Proxy_Politics_sd.mp4 | 170.6 MiB | 2015-Dec-29 17:49 |
32c3-7342-en-Household_Totalitarianism_and_Cyberspace_sd.mp4 | 167.0 MiB | 2015-Dec-30 01:55 |
32c3-7291-de-en-Microsofts_Windows_10_Botnet_sd.mp4 | 166.5 MiB | 2016-Jan-04 18:09 |
32c3-7416-en-de-Evolution_of_Brain-Computer_Interfaces_sd.mp4 | 166.3 MiB | 2015-Dec-29 18:56 |
32c3-7325-en-de-REXUS_BEXUS_-_Rocket_and_Balloon_Experiments_for_University_Students_sd.mp4 | 164.7 MiB | 2015-Dec-28 13:30 |
32c3-7419-en-de-On_Computing_Numbers_with_an_Application_to_Problems_of_our_Society_sd.mp4 | 161.4 MiB | 2015-Dec-30 14:12 |
32c3-7236-en-de-Thunderstrike_2_sd.mp4 | 161.4 MiB | 2015-Dec-28 16:30 |
32c3-7324-en-de-What_is_the_value_of_anonymous_communication_sd.mp4 | 154.3 MiB | 2015-Dec-30 20:03 |
32c3-7135-de-en-Ein_Abgrund_von_Landesverrat_sd.mp4 | 154.1 MiB | 2015-Dec-29 17:02 |
32c3-7197-en-de-Rowhammerjs_Root_privileges_for_web_apps_sd.mp4 | 153.6 MiB | 2015-Dec-29 14:48 |
32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung_sd.mp4 | 148.8 MiB | 2015-Dec-30 15:17 |
32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen_sd.mp4 | 148.8 MiB | 2015-Dec-29 23:36 |
32c3-7189-en-Key-logger_Video_Mouse_sd.mp4 | 144.4 MiB | 2015-Dec-28 14:42 |
32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty_sd.mp4 | 142.2 MiB | 2015-Dec-30 18:14 |
32c3-7367-en-de-Ling_-_High_level_system_programming_sd.mp4 | 140.5 MiB | 2015-Dec-29 14:26 |
32c3-7355-en-de-apertus_AXIOM_sd.mp4 | 139.7 MiB | 2015-Dec-29 21:02 |
32c3-7400-en-de-Technology_and_Mass_Atrocity_Prevention_sd.mp4 | 137.5 MiB | 2015-Dec-30 13:54 |
32c3-7426-en-de-Intelexit_sd.mp4 | 136.5 MiB | 2015-Dec-30 18:13 |
32c3-7205-de-Netzpolitik_in_der_Schweiz_sd.mp4 | 135.8 MiB | 2015-Dec-28 15:33 |
32c3-7314-en-de-All_Our_Shared_Spectrum_Are_Belong_to_Us_sd.mp4 | 133.3 MiB | 2015-Dec-29 17:49 |
32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff_sd.mp4 | 131.9 MiB | 2015-Dec-30 18:13 |
32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking_sd.mp4 | 131.5 MiB | 2015-Dec-29 20:57 |
32c3-7286-en-de-Sin_in_the_time_of_Technology_sd.mp4 | 127.7 MiB | 2016-Jan-04 18:09 |
32c3-7263-en-de-GOIBlocks_-_Technical_observations_about_recent_internet_censorship_in_India_sd.mp4 | 124.5 MiB | 2015-Dec-30 13:57 |
32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World_sd.mp4 | 124.5 MiB | 2016-Jan-04 18:09 |
32c3-7441-en-de-The_plain_simple_reality_of_entropy_sd.mp4 | 124.0 MiB | 2015-Dec-30 18:12 |
32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete_sd.mp4 | 123.8 MiB | 2015-Dec-29 20:09 |
32c3-7114-en-de-Craft_leisure_and_end-user_innovation_sd.mp4 | 122.1 MiB | 2015-Dec-30 18:14 |
32c3-7547-en-de-libusb_Maintainer_fail_sd.mp4 | 121.8 MiB | 2015-Dec-30 14:00 |
32c3-7264-en-de-Profiling_In_justice_sd.mp4 | 120.8 MiB | 2015-Dec-29 17:00 |
32c3-7530-en-de-Buffering_sucks_sd.mp4 | 120.3 MiB | 2016-Jan-03 23:00 |
32c3-7529-en-de-Mobile_Censorship_in_Iran_sd.mp4 | 119.4 MiB | 2015-Dec-29 14:41 |
32c3-7412-en-Running_your_own_3G_35G_network_sd.mp4 | 118.8 MiB | 2015-Dec-30 13:07 |
32c3-7423-en-de-One_year_of_securitarian_drift_in_France_sd.mp4 | 115.8 MiB | 2015-Dec-29 17:47 |
32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S_sd.mp4 | 114.8 MiB | 2015-Dec-29 17:40 |
32c3-7119-en-de-Building_and_Breaking_Wireless_Security_sd.mp4 | 114.4 MiB | 2015-Dec-30 15:19 |
32c3-7265-en-de-Maritime_Robotics_sd.mp4 | 114.3 MiB | 2015-Dec-30 14:05 |
32c3-7138-en-de-Gscheitern_sd.mp4 | 112.8 MiB | 2015-Dec-29 15:30 |
32c3-7551-en-de-Closing_Event_sd.mp4 | 111.6 MiB | 2016-Jan-05 13:10 |
32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society_sd.mp4 | 111.3 MiB | 2015-Dec-30 02:37 |
32c3-7245-en-de-Reversing_UEFI_by_execution_sd.mp4 | 109.8 MiB | 2015-Dec-30 18:10 |
32c3-7238-en-de-Vector_retrogaming_sd.mp4 | 107.8 MiB | 2015-Dec-29 21:55 |
32c3-7310-en-de-QRtistry_sd.mp4 | 107.5 MiB | 2015-Dec-30 02:28 |
32c3-7195-en-de-Verified_Firewall_Ruleset_Verification_sd.mp4 | 105.6 MiB | 2015-Dec-30 01:07 |
32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller_sd.mp4 | 103.2 MiB | 2016-Jan-02 14:16 |
32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur_sd.mp4 | 95.2 MiB | 2015-Dec-30 14:06 |
32c3-7401-en-de-Internet_Cube_sd.mp4 | 93.9 MiB | 2015-Dec-30 14:16 |
32c3-7219-en-de-Trust_us_and_our_business_will_expand_sd.mp4 | 92.0 MiB | 2015-Dec-30 18:11 |
32c3-7550-en-Opening_Event_sd.mp4 | 74.5 MiB | 2015-Dec-28 12:38 |