Event Date Category Title Speaker(s) Lang Actions
31c3 <no category> The case of Chelsea Manning <no speakers> eng
31c3 <no category> Premiere: We love surveillance <no speakers> eng
31c3 2014-12-27 <no category> Erste Stunden der Zweisamkeit m.eik, Christoph, Bruder eng
31c3 2014-12-27 CCC 31C3 Opening Event erdgeist, Geraldine de Bastion eng
31c3 2014-12-27 CCC 31C3 Keynote alecempire eng
31c3 2014-12-27 Hardware & Making 3D Casting Aluminum Julia Longtin eng
31c3 2014-12-27 Science Trustworthy secure modular operating system engineering hannes, David Kaloper eng
31c3 2014-12-27 Ethics, Society & Politics Personal Tracking Devices and Online Identity Silvia eng
31c3 2014-12-27 Ethics, Society & Politics „Wir beteiligen uns aktiv an den Diskussionen“ Martin Haase/maha eng
31c3 2014-12-27 Hardware & Making Let’s build our own personalized open textile production line Hong Phuc Dang eng
31c3 2014-12-27 Ethics, Society & Politics Mit Kunst die Gesellschaft hacken Stefan Pelzer, Philipp Ruch eng
31c3 2014-12-27 Security & Hacking SCADA StrangeLove: Too Smart Grid in da Cloud Sergey Gordeychik, Aleksandr Timorin eng
31c3 2014-12-27 Security & Hacking Reproducible Builds Mike Perry, Seth Schoen, Hans Steiner eng
31c3 2014-12-27 Security & Hacking Practical EMV PIN interception and fraud detection Andrea Barisani eng
31c3 2014-12-27 Security & Hacking Revisiting SSL/TLS Implementations Sebastian Schinzel eng
31c3 2014-12-27 Hardware & Making How I Learned to Stop Reinventing and Love the Wheels Andreas Bihlmaier eng
31c3 2014-12-27 Security & Hacking osmo-gmr: What's up with sat-phones ? Sylvain Munaut eng
31c3 2014-12-27 Science Mein Bot, der Kombattant josch, arche3000 eng
31c3 2014-12-27 Hardware & Making The eXperimental Robot Project Norbert Braun, darthrake eng
31c3 2014-12-27 Security & Hacking Glitching For n00bs exide eng
31c3 2014-12-27 Security & Hacking SS7: Locate. Track. Manipulate. Tobias Engel eng
31c3 2014-12-27 Hardware & Making 10 Jahre OpenStreetMap Thomas Skowron, ubahnverleih eng
31c3 2014-12-27 Hardware & Making Jugend hackt Fiona Krakenbürger, Maria Reimer, Philipp Kalweit, Max Nagy , Lukas, Nico eng
31c3 2014-12-27 Security & Hacking Mobile self-defense Karsten Nohl eng
31c3 2014-12-27 Science Rocket science – how hard can it be? David Madlener eng
31c3 2014-12-27 Security & Hacking Ich sehe, also bin ich ... Du starbug eng
31c3 2014-12-27 Security & Hacking Code Pointer Integrity gannimo eng
31c3 2014-12-27 Science Space Hacker Karsten Becker, Robert eng
31c3 2014-12-27 Hardware & Making Towards General Purpose Reconfigurable Computing on Novena stars, Andy Isaacson eng
31c3 2014-12-27 Ethics, Society & Politics The Cloud Conspiracy 2008-2014 Caspar Bowden eng
31c3 2014-12-27 Security & Hacking AMD x86 SMU firmware analysis Rudolf Marek eng
31c3 2014-12-27 Security & Hacking ECCHacks djb, Tanja Lange eng
31c3 2014-12-27 Security & Hacking (In)Security of Mobile Banking ericfiliol, Paul Irolla eng
31c3 2014-12-27 Security & Hacking Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States tw, gadi eng
31c3 2014-12-27 Security & Hacking SS7map : mapping vulnerability of the international mobile roaming infrastructure Laurent Ghigonis, Alexandre De Oliveira eng
31c3 2014-12-27 Science From Maxwell to antenna arrays Friederike eng
31c3 2014-12-27 Security & Hacking Crypto Tales from the Trenches Nadia Heninger, Julia Angwin, Laura Poitras, Jack Gillum eng
31c3 2014-12-28 Science Why is GPG "damn near unusable"? Arne Padmos eng
31c3 2014-12-28 Security & Hacking Switches Get Stitches Eireann Leverett eng
31c3 2014-12-28 Science From Computation to Consciousness Joscha eng
31c3 2014-12-28 Security & Hacking Uncaging Microchips Peter Laackmann, Marcus Janke eng
31c3 2014-12-28 Art & Culture Serenität – Anleitung zum Glücklichsein Elektra, Andrea Behrendt - read & delete eng
31c3 2014-12-28 Security & Hacking Beyond PNR: Exploring airline systems saper eng
31c3 2014-12-28 Ethics, Society & Politics Tell no-one James Bamford eng
31c3 2014-12-28 Other Lightning Talks Day 2 gedsic eng
31c3 2014-12-28 Security & Hacking Cyber Necromancy Joseph Tartaro, Matthew Halchyshak eng
31c3 2014-12-28 Ethics, Society & Politics Security Analysis of Estonia's Internet Voting System J. Alex Halderman eng
31c3 2014-12-28 Science Programming with dependent types in Idris raichoo eng
31c3 2014-12-28 Ethics, Society & Politics Das Transparenzportal Hamburg Lothar Hotz eng
31c3 2014-12-28 Hardware & Making Safer playing with lasers Sarah eng
31c3 2014-12-28 Science GIFs: Tod eines Mediums. Und sein Leben nach dem Tod. Felix Mütze eng
31c3 2014-12-28 Ethics, Society & Politics The automobile as massive data gathering source and the consequences for individual privacy Jimmy Schulz, Dr. Rüdiger Hanig eng
31c3 2014-12-28 Hardware & Making Iridium Pager Hacking Sec, schneider eng
31c3 2014-12-28 Ethics, Society & Politics Long war tactics Sacha van Geffen eng
31c3 2014-12-28 Science Krypto für die Zukunft ruedi eng
31c3 2014-12-28 Security & Hacking Finding the Weak Crypto Needle in a Byte Haystack Ben H. eng
31c3 2014-12-28 Ethics, Society & Politics Hacking Ethics in Education Jeroen van der Ham eng
31c3 2014-12-28 Hardware & Making Forging the USB armory Andrea Barisani eng
31c3 2014-12-28 Hardware & Making Mr Beam goes Kickstarter Teja Philipp, Philipp Engel eng
31c3 2014-12-28 Science Information Control and Strategic Violence Anita Gohdes eng
31c3 2014-12-28 Ethics, Society & Politics Privacy and Consumer Markets Reuben Binns eng
31c3 2014-12-28 Security & Hacking Vor Windows 8 wird gewarnt ruedi eng
31c3 2014-12-28 Hardware & Making Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking MeTaMiNd EvoLuTioN eng
31c3 2014-12-28 Ethics, Society & Politics Global Civil Society Under Attack Michael Carbone eng
31c3 2014-12-28 Hardware & Making Internet of toilets tbsprs eng
31c3 2014-12-28 Ethics, Society & Politics The Invisible Committee Returns with "Fuck Off Google" Anonymous member of Tarnac Solidarity Committee, tarnac nine eng
31c3 2014-12-28 Art & Culture »Hard Drive Punch« Aram Bartholl eng
31c3 2014-12-28 Security & Hacking Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer Rafal Wojtczuk, Corey Kallenberg eng
31c3 2014-12-28 Ethics, Society & Politics Reconstructing narratives Jacob, Laura Poitras eng
31c3 2014-12-28 Security & Hacking Preserving arcade games Ange Albertini eng
31c3 2014-12-28 Security & Hacking Mining for Bugs with Graph Database Queries fabs eng
31c3 2014-12-28 Ethics, Society & Politics net neutrality: days of future past? Rejo Zenger, Thomas Lohninger eng
31c3 2014-12-28 Security & Hacking Too Many Cooks - Exploiting the Internet-of-TR-069-Things Lior Oppenheim, Shahar Tal eng
31c3 2014-12-28 Hardware & Making Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source MT6260 SoC bunnie, Xobs eng
31c3 2014-12-28 Ethics, Society & Politics Inside Field Station Berlin Teufelsberg Bill Scannell eng
31c3 2014-12-28 Ethics, Society & Politics Traue keinem Scan, den du nicht selbst gefälscht hast David Kriesel eng
31c3 2014-12-28 Security & Hacking The Matter of Heartbleed Zakir Durumeric eng
31c3 2014-12-28 Art & Culture Superheroes Still Need Phoneboxes Ben Dalton eng
31c3 2014-12-28 Ethics, Society & Politics Doing right by sources, done right Sarah Harrison, gracefire eng
31c3 2014-12-28 Security & Hacking Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed Nick Sullivan eng
31c3 2014-12-29 Entertainment Fnord News Show frank, Fefe eng
31c3 2014-12-29 Ethics, Society & Politics Freedom in your computer and in the net Richard Stallman eng
31c3 2014-12-29 Ethics, Society & Politics NSA Points of Presence in AT Erich Moechel eng
31c3 2014-12-29 Security & Hacking Security Analysis of a Full-Body X-Ray Scanner Eric Wustrow, Hovav Shacham eng
31c3 2014-12-29 Hardware & Making Why do we need an open food information platform Alexis eng
31c3 2014-12-29 CCC Jahresrückblick des CCC Frank Rieger, erdgeist, Linus Neumann, heckpiet, Constanze Kurz eng
31c3 2014-12-29 Other Lightning Talks Day 3 Theresa eng
31c3 2014-12-29 Hardware & Making Damn Vulnerable Chemical Process Marmusha eng
31c3 2014-12-29 Science Let's build a quantum computer! Andreas Dewes eng
31c3 2014-12-29 Security & Hacking Funky File Formats Ange Albertini eng
31c3 2014-12-29 Ethics, Society & Politics Correcting copywrongs Julia Reda eng
31c3 2014-12-29 Art & Culture The Only Thing We Know About Cyberspace Is That Its 640x480 olia lialina eng
31c3 2014-12-29 Security & Hacking EMET 5.1 - Armor or Curtain? René Freingruber eng
31c3 2014-12-29 Science CAESAR and NORX Philipp Jovanovic, aumasson eng
31c3 2014-12-29 Ethics, Society & Politics Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar Katharina Nocun eng
31c3 2014-12-29 Art & Culture Die Krise der Bilder ist die Krise der Politik Mareike Foecking eng
31c3 2014-12-29 Science Source Code and Cross-Domain Authorship Attribution Aylin, greenie, Rebekah Overdorf eng
31c3 2014-12-29 Security & Hacking DP5: PIR for Privacy-preserving Presence Ian Goldberg, George Danezis, Nikita Borisov eng
31c3 2014-12-29 Ethics, Society & Politics What Ever Happened to Nuclear Weapons? Michael Büker eng
31c3 2014-12-29 Art & Culture ES GIBT VIEL ZU TUN - HAU'N WIR AB. Robert Verch, Eva Olivin eng
31c3 2014-12-29 Security & Hacking Thunderstrike: EFI bootkits for Apple MacBooks Trammell Hudson eng
31c3 2014-12-29 Hardware & Making The Maker movement meets patent law Natalia Lukaszewicz eng
31c3 2014-12-29 Art & Culture "Exploit" in theater cyphunk / nathan fain eng
31c3 2014-12-29 Ethics, Society & Politics IFG – Mit freundlichen Grüßen Stefan Wehrmeyer eng
31c3 2014-12-29 Hardware & Making Axoloti Johannes Taelman eng
31c3 2014-12-29 Ethics, Society & Politics Agri-tech and the Arts: From Barns to D-Space Richard Marggraf Turley eng
31c3 2014-12-29 Science Living Drones Anja Drephal eng
31c3 2014-12-29 Entertainment The Time is Right c-atre eng
31c3 2014-12-29 Science Eye Wear Computing Kai Kunze eng
31c3 2014-12-29 Ethics, Society & Politics Computer Science in the DPRK Will Scott eng
31c3 2014-12-29 Art & Culture The Magical Secrecy Tour Leslie Dunton-Downer eng
31c3 2014-12-29 Ethics, Society & Politics Trackography Maria Xynou, Claudio ࿓ vecna eng
31c3 2014-12-29 Security & Hacking The Perl Jam: Exploiting a 20 Year-old Vulnerability Netanel Rubin eng
31c3 2014-12-29 Science Automatically Subtitling the C3 timobaumann, Arne Köhn eng
31c3 2014-12-29 Hardware & Making MegaCode to facility gates Kévin Redon eng
31c3 2014-12-29 Security & Hacking UNHash - Methods for better password cracking Tonimir Kisasondi eng
31c3 2014-12-29 Art & Culture The Machine To Be Another BeAnotherLab eng
31c3 2014-12-29 Ethics, Society & Politics Infocalypse now: P0wning stuff is not enough Walter van Holst eng
31c3 2014-12-29 Science Higher-Dimensional Geometry and Fractals Magnus eng
31c3 2014-12-29 Ethics, Society & Politics Snowden Effect vs. Privacy Paradox Matthias Herz, Michael Johann eng
31c3 2014-12-30 Hardware & Making Low Cost High Speed Photography polygon eng
31c3 2014-12-30 Ethics, Society & Politics The rise and fall of Internet voting in Norway Tor E. Bjørstad eng
31c3 2014-12-30 Art & Culture Attribution revolution Jonas Öberg eng
31c3 2014-12-30 Other Lightning Talks Day 4 breakthesystem eng
31c3 2014-12-30 Science Diamonds are a quantum computer’s best friend Nicolas Wöhrl eng
31c3 2014-12-30 Science Why are computers so @#!*, and what can we do about it? Peter Sewell eng
31c3 2014-12-30 Ethics, Society & Politics State of the Onion Jacob, arma eng
31c3 2014-12-30 Ethics, Society & Politics Let's Encrypt Seth Schoen eng
31c3 2014-12-30 Ethics, Society & Politics Paypals War on Terror the_no, absolem eng
31c3 2014-12-30 CCC 31C3 Infrastructure Review Leon eng
31c3 2014-12-30 Security & Hacking Virtual Machine Introspection Tamas K Lengyel, Thomas Kittel eng
31c3 2014-12-30 Security & Hacking Now I sprinkle thee with crypto dust Ryan Lackey, Andres Erbsen, Jurre van Bergen, Ladar Levison, equinox eng
31c3 2014-12-30 Entertainment Security Nightmares frank, Ron eng
31c3 2014-12-30 Hardware & Making Telescope Making Madonius eng
31c3 2014-12-30 Security & Hacking Tor: Hidden Services and Deanonymisation Dr Gareth Owen eng
31c3 2014-12-30 CCC 31C3 Closing Event tomate, dodger eng