Event Date Category Title Speaker(s) Lang Actions
32c3 12/27/2015 CCC 32C3 Opening Event Carina Haupt, Linus Neumann eng
32c3 12/27/2015 Science What is the value of anonymous communication? greenstadt eng
32c3 12/27/2015 CCC 32C3 Keynote Fatuma Musa Afrah eng
32c3 12/27/2015 Art & Culture The mummy unwrapped nelles-al-badri deu
32c3 12/27/2015 Ethics, Society & Politics Hacking EU funding for a decentralizing FOSS project holger krekel eng
Ethics, Society & Politics 12/27/2015 NSAUA NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen Anna Biselli deu
32c3 12/27/2015 Security Towards (reasonably) trustworthy x86 laptops Joanna Rutkowska eng
32c3 12/27/2015 Ethics, Society & Politics Avoiding kernel panic: Europe’s biggest fails in digital policy-making Kirst3nF, Walter van Holst eng
32c3 12/27/2015 Science REXUS/BEXUS - Rocket and Balloon Experiments for University Students panic, sev eng
32c3 12/27/2015 Ethics, Society & Politics The exhaust emissions scandal („Dieselgate“) Daniel Lange (DLange), Felix "tmbinc" Domke eng
32c3 12/27/2015 Art & Culture Internet Landscapes Evan Roth eng
32c3 12/27/2015 Hardware & Making rad1o++ Sec, schneider eng
32c3 12/27/2015 Security PLC-Blaster Maik Brüggemann, Ralf Spenneberg deu
32c3 12/27/2015 Ethics, Society & Politics Lifting the Fog on Red Star OS Florian Grunow, Niklaus Schiess eng
32c3 12/27/2015 Security Hardware-Trojaner in Security-Chips Peter Laackmann, Marcus Janke deu
32c3 12/27/2015 CCC Netzpolitik in der Schweiz vimja, ari, Patrick Stählin, Hakuna MaMate eng
32c3 12/27/2015 Hardware & Making A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs Clifford eng
32c3 12/27/2015 Science How the Great Firewall discovers hidden circumvention servers Philipp Winter eng
32c3 12/27/2015 Security Windows drivers attack surface Ilja van Sprundel eng
32c3 12/27/2015 Security Key-logger, Video, Mouse Yaniv Balmas eng
32c3 12/27/2015 Art & Culture Public Library/Memory of the World Marcell Mars eng
32c3 12/27/2015 Art & Culture What does Big Brother see, while he is watching? Simon eng
32c3 12/27/2015 Security The Great Train Cyber Robbery Sergey Gordeychik, Aleksandr Timorin, repdet eng
32c3 12/27/2015 Security Beyond your cable modem Alexander Graf eng
32c3 12/27/2015 Hardware & Making The Ultimate Amiga 500 Talk rahra eng
32c3 12/27/2015 Security Thunderstrike 2 Trammell Hudson eng
32c3 12/27/2015 Security Running your own 3G/3.5G network LaForge eng
32c3 12/27/2015 Failosophy Datahavens from HavenCo to Today Ryan Lackey eng
32c3 12/27/2015 Hardware & Making So you want to build a satellite? INCO eng
32c3 12/27/2015 Security Shopshifting Karsten Nohl, Fabian Bräunlein, dexter eng
32c3 12/27/2015 Failosophy When hardware must „just work“ David Kaplan eng
32c3 12/27/2015 Security New memory corruption attacks: why can't we have nice things? gannimo, npc@berkeley.edu eng
32c3 12/27/2015 Science Shooting lasers into space – for science! Peter Buschkamp eng
32c3 12/27/2015 Security PQCHacks djb, Tanja Lange eng
32c3 12/27/2015 Hardware & Making My Robot Will Crush You With Its Soft Delicate Hands! Gianteye eng
32c3 12/27/2015 Security APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for Inbar Raz, Gadi Evron eng
32c3 12/27/2015 Security Console Hacking plutoo, derrek, smea eng
32c3 12/28/2015 CCC Jahresrückblick des CCC frank, Linus Neumann, erdgeist, Constanze Kurz, Falk Garbsch deu
32c3 12/28/2015 Science Household, Totalitarianism and Cyberspace Julia Maria Mönig eng
32c3 12/28/2015 Ethics, Society & Politics The state of Internet Censorship Will Scott, andz@torproject.org eng
32c3 12/28/2015 Hardware & Making Maker Spaces in Favelas - Lecture Miguel Chaves eng
32c3 12/28/2015 Security CloudABI Ed Schouten eng
32c3 12/28/2015 CCC Lightning Talks Day 2 gedsic, bigalex eng
32c3 12/28/2015 Ethics, Society & Politics Net Neutrality in Europe Thomas Lohninger eng
32c3 12/28/2015 Ethics, Society & Politics Buffering sucks! Fredy Künzler eng
32c3 12/28/2015 CCC Jugend hackt 2015 Jugend hackt deu
32c3 12/28/2015 Ethics, Society & Politics Software and business method patents: call for action Iga Bałos, Benjamin Henrion (zoobab) eng
32c3 12/28/2015 Ethics, Society & Politics Cyber all the Wassenaars Walter van Holst, Nate Cardozo, mlp, Richard Tynan eng
32c3 12/28/2015 Ethics, Society & Politics Ein Abgrund von Landesverrat Markus Beckedahl deu
32c3 12/28/2015 Hardware & Making Evolution of Brain-Computer Interfaces fractalfox eng
32c3 12/28/2015 Security Sicherheit von 125kHz Transpondern am Beispiel Hitag S Ralf Spenneberg, Hendrik Schwartke, Oguzhan Cicek deu
32c3 12/28/2015 Ethics, Society & Politics Profiling (In)justice Jeff Deutch eng
32c3 12/28/2015 Security (Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking Vincent Haupert deu
32c3 12/28/2015 Ethics, Society & Politics Lessons learned: Freifunk für Geflüchtete Peter Löwenstein deu
32c3 12/28/2015 Hardware & Making apertus° AXIOM Matthias Tarasiewicz (parasew) eng
32c3 12/28/2015 Art & Culture Plunge into Proxy Politics Vera Tollmann, Boaz Levin eng
32c3 12/28/2015 Science Verified Firewall Ruleset Verification Cornelius Diekmann eng
32c3 12/28/2015 Ethics, Society & Politics Wie Jugendschutzprogramme nicht nur die Jugend schädigen Alvar Freude deu
32c3 12/28/2015 Hardware & Making All Our Shared Spectrum Are Belong to Us Paul Fuxjaeger eng
32c3 12/28/2015 Ethics, Society & Politics One year of securitarian drift in France taziden, Adrienne Charmet eng
32c3 12/28/2015 Failosophy G’scheitern Gregor Ruttner eng
32c3 12/28/2015 Security Rowhammer.js: Root privileges for web apps? Clémentine Maurice, Daniel Gruss eng
32c3 12/28/2015 Hardware & Making Vector retrogaming Trammell Hudson, Adelle Lin eng
32c3 12/28/2015 Ethics, Society & Politics Mobile Censorship in Iran Mahsa eng
32c3 12/28/2015 Science Ling - High level system programming Nicolas Pouillard eng
32c3 12/28/2015 Ethics, Society & Politics Ecuador: how an authoritarian government is fooling the entire world Pedro Noel, Bethany Horne eng
32c3 12/28/2015 Ethics, Society & Politics Let's Encrypt -- What launching a free CA looks like Roland Bracewell Shoemaker eng
32c3 12/28/2015 Security The Perl Jam 2 Netanel Rubin eng
32c3 12/28/2015 Science Quantum Cryptography Christian Schaffner eng
32c3 12/28/2015 Hardware & Making Hardsploit: A Metasploit-like tool for hardware hacking Yann.A, Julien MOINARD, Gwénolé Audic eng
32c3 12/28/2015 Ethics, Society & Politics Das Zahnrad aus Fleisch agonarch, @fraufeli deu
32c3 12/28/2015 Science Quantenphysik und Kosmologie Steini deu
32c3 12/28/2015 Security Dissecting VoLTE Dongkwan, Hongil Kim eng
32c3 12/28/2015 Security Logjam: Diffie-Hellman, discrete logs, the NSA, and you J. Alex Halderman, Nadia Heninger eng
32c3 12/28/2015 Security How hackers grind an MMORPG: by taking it apart! Rink Springer eng
32c3 12/28/2015 Hardware & Making Iridium Update Sec, schneider eng
32c3 12/28/2015 Security Sanitizing PCAPs Jasper Bongertz eng
32c3 12/28/2015 Security Unpatchable Marie Moe, Eireann Leverett eng
32c3 12/28/2015 Failosophy goto fail; Nick Sullivan eng
32c3 12/29/2015 Entertainment Fnord-Jahresrückblick Fefe, frank deu
32c3 12/29/2015 Entertainment Methodisch inkorrekt! Nicolas Wöhrl, Reinhard Remfort deu
32c3 12/29/2015 Hardware & Making re_cycle obelix eng
32c3 12/29/2015 Ethics, Society & Politics „Nach bestem Wissen und Gewissen“ – Floskeln in der Politik Martin Haase/maha, Kai Biermann deu
32c3 12/29/2015 Security (In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale Andrei Costin eng
32c3 12/29/2015 Security Beyond Anti Evil Maid Matthew Garrett eng
32c3 12/29/2015 CCC Lightning Talks Day 3 gedsic, bigalex eng
32c3 12/29/2015 Security Tor onion services: more useful than you think Roger, David Goulet, asn eng
32c3 12/29/2015 Science Computational Meta-Psychology Joscha eng
32c3 12/29/2015 Ethics, Society & Politics Graphs, Drones & Phones Christoph Engemann eng
32c3 12/29/2015 Security Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 Zakir Durumeric eng
32c3 12/29/2015 Art & Culture "Fluxus cannot save the world." leomagnet, Markus Zimmermann eng
32c3 12/29/2015 Ethics, Society & Politics State of the Onion Roger, Jacob Appelbaum, Mike Perry, Shari Steele, Alison Macrina eng
32c3 12/29/2015 Security Gibberish Detection 102 Ben H. eng
32c3 12/29/2015 Hardware & Making Vehicle2Vehicle Communication based on IEEE 802.11p Bernd Lehmann eng
32c3 12/29/2015 Security Check your privileges! Fefe eng
32c3 12/29/2015 Science Say hi to your new boss: How algorithms might soon control our lives. Andreas Dewes eng
32c3 12/29/2015 Ethics, Society & Politics Safe Harbor Max Schrems eng
32c3 12/29/2015 Security De-anonymizing Programmers Aylin eng
32c3 12/29/2015 Ethics, Society & Politics The Price Of Dissent CAGE, Cerie Bullivant eng
32c3 12/29/2015 Security A Dozen Years of Shellphish Antonio Bianchi, Jacopo Corbetta, Andrew Dutcher eng
32c3 12/29/2015 Ethics, Society & Politics Ten years after ‚We Lost The War‘ rop, frank eng
32c3 12/29/2015 Hardware & Making 3D printing on the moon Karsten Becker eng
32c3 12/29/2015 Ethics, Society & Politics The architecture of a street level panopticon Dia Kayyali eng
32c3 12/29/2015 Ethics, Society & Politics Prediction and Control Jennifer Helsby eng
32c3 12/29/2015 32c3 State of the Internat AS201701 - Freifunk Rheinland e.V. Backbone Takt, Barbarossa, ThomasDOTwtf, Lars deu
32c3 12/29/2015 Art & Culture 20 OSCILLATORS IN 20 MINUTES Darsha eng
32c3 12/29/2015 Science Media Coverage and the Public in the Surveillance Society Arne Hintz, Lina Dencik eng
32c3 12/29/2015 Security Reversing UEFI by execution Jethro Beekman eng
32c3 12/29/2015 Art & Culture QRtistry Henryk Plötz eng
32c3 12/29/2015 Ethics, Society & Politics Intelexit Gloria Spindle – Peng! Collective eng
32c3 12/29/2015 Security The plain simple reality of entropy Filippo Valsorda eng
32c3 12/29/2015 Ethics, Society & Politics Free Software and Hardware bring National Sovereignty Tarek Loubani eng
32c3 12/29/2015 Art & Culture Trust us and our business will expand! Andreas Zingerle, Linda Kronman eng
Ethics, Society & Politics 12/29/2015 <no category> Crypto ist Abwehr, IFG ist Angriff! Arne Semsrott deu
32c3 12/29/2015 Art & Culture the possibility of an army constantdull eng
32c3 12/29/2015 Hardware & Making Internet Cube taziden, kload eng
32c3 12/29/2015 Science Craft, leisure, and end-user innovation Susann Wagenknecht eng
32c3 12/29/2015 Ethics, Society & Politics On Computing Numbers, with an Application to Problems of our Society Stefan Wehrmeyer eng
32c3 12/29/2015 Security Building and Breaking Wireless Security jiska eng
32c3 12/29/2015 Hardware & Making Stromtankstellen – eine neue öffentliche Infrastruktur Gunnar Thöle deu
32c3 12/29/2015 Ethics, Society & Politics Österreich: Der Kampf gegen unkontrollierte Massenüberwachung Thomas Lohninger, Werner Reiter deu
32c3 12/29/2015 Failosophy libusb: Maintainer fail Peter Stuge eng
32c3 12/29/2015 Hardware & Making Maritime Robotics lilafisch eng
32c3 12/29/2015 Ethics, Society & Politics #GOIBlocks - Technical observations about recent internet censorship in India Kaustubh Srikanth eng
32c3 12/29/2015 Ethics, Society & Politics Technology and Mass Atrocity Prevention Nicolai Pogadl eng
32c3 12/30/2015 Entertainment Hacker Jeopardy Sec, ray deu
32c3 12/30/2015 Ethics, Society & Politics Grundrechte gelten nicht im Weltall! Anna Biselli, Constanze Kurz, cbass, Felix Betzin deu
32c3 12/30/2015 Ethics, Society & Politics Katastrophe und Kommunikation Sebastian Jünemann deu
32c3 12/30/2015 Hardware & Making Replication Prohibited Eric Wustrow eng
32c3 12/30/2015 Science The Magic World of Searchable Symmetric Encryption Tobias Mueller, Christian Forler eng
32c3 12/30/2015 Science “I feel like a criminal and I have to be god at the same time” Leonie Maria Tanczer eng
32c3 12/30/2015 Ethics, Society & Politics Crypto Wars Part II Kurt Opsahl eng
32c3 12/30/2015 Failosophy Top X* usability obstacles BoB Marvan eng
32c3 12/30/2015 CCC Lightning Talks Day 4 gedsic, bigalex eng
32c3 12/30/2015 Ethics, Society & Politics A New Kid on the Block Katharina Nocun eng
32c3 12/30/2015 Art & Culture When algorithms fail in our personal lives Caroline Sinders eng
32c3 12/30/2015 Failosophy DDoS mitigation EPIC FAIL collection dalmoz eng
32c3 12/30/2015 Hardware & Making How to contribute to make open hardware happen mclien eng
32c3 12/30/2015 Science Wie man einen Blackout verursacht Mathias Dalheimer deu
32c3 12/30/2015 Art & Culture CHINTERNET ART Michelle Proksell eng
32c3 12/30/2015 Security Breaking Honeypots for Fun and Profit DeanSysman, Gadi Evron, Itamar Sher eng
32c3 12/30/2015 Ethics, Society & Politics How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse). Salton Arthur Massally, Harold Valentine Mac-Saidu, Francis Banguara, Emerson eng
32c3 12/30/2015 Ethics, Society & Politics Sin in the time of Technology Matthew Stender, Jillian C. York eng
32c3 12/30/2015 Hardware & Making Compileroptimierungen für Forth im Microcontroller Matthias Koch deu
32c3 12/30/2015 Security Microsofts Windows 10 Botnet ruedi deu
32c3 12/30/2015 Ethics, Society & Politics Predicting Crime in a Big Data World Whitney Merrill eng
32c3 12/30/2015 Ethics, Society & Politics Collect It All: Open Source Intelligence (OSINT) for Everyone M. C. McGrath eng
32c3 12/30/2015 Hardware & Making Wireless Drivers: Freedom considered harmful? Felix Fietkau eng
32c3 12/30/2015 CCC 32C3 Infrastructure Review Leon, Marcus, florolf, Peter Stuge, Team Silkroad eng
32c3 12/30/2015 CCC Security Nightmares 0x10 Ron, frank deu
32c3 12/30/2015 CCC 32C3 Closing Event Carina Haupt, Linus Neumann eng