Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/mirrors/cdn.media.ccc.de/congress/2013/mp4-hd/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
subtitles/-2021-04-16 08:53:46
30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_h264-hd.mp4795.0 MiB2014-01-02 09:23:16
30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hd.mp42.0 GiB2014-01-02 22:40:59
30c3-5622-en-de-30c3_Keynote_h264-hd.mp41.2 GiB2014-01-02 09:26:52
30c3-5618-en-Baseband_Exploitation_in_2013_h264-hd.mp4587.5 MiB2014-01-02 09:30:31
30c3-5608-de-en-Jahresrueckblick_des_CCC_h264-hd.mp42.0 GiB2013-12-30 03:10:32
30c3-5606-de-en-Closing_Event_h264-hd.mp41.3 GiB2014-01-02 22:18:59
30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_h264-hd.mp4521.1 MiB2014-01-02 14:54:35
30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_h264-hd.mp41.0 GiB2014-01-02 22:43:59
30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_h264-hd.mp4805.5 MiB2013-12-30 18:35:31
30c3-5587-en-Making_machines_that_make_h264-hd.mp4641.5 MiB2013-12-30 04:32:22
30c3-5577-de-en-Hacker_Jeopardy_h264-hd.mp43.3 GiB2014-01-02 10:03:29
30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_h264-hd.mp4783.2 MiB2014-01-02 14:50:02
30c3-5545-en-Trezor_Bitcoin_hardware_wallet_h264-hd.mp4338.9 MiB2013-12-30 04:28:52
30c3-5537-en-Glass_Hacks_h264-hd.mp41.2 GiB2014-01-02 09:59:26
30c3-5499-en-X_Security_h264-hd.mp4821.2 MiB2013-12-30 04:29:43
30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_h264-hd.mp4881.8 MiB2013-12-30 12:35:39
30c3-5490-de-en-Fnord_News_Show_h264-hd.mp41.5 GiB2014-01-14 18:08:28
30c3-5477-en-An_introduction_to_Firmware_Analysis_h264-hd.mp4298.2 MiB2014-01-06 20:12:56
30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hd.mp4532.1 MiB2014-01-07 23:02:40
30c3-5459-en-de-Security_of_the_IC_Backside_h264-hd.mp4817.8 MiB2014-01-02 14:53:13
30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4435.4 MiB2013-12-30 11:10:10
30c3-5439-en-To_Protect_And_Infect_h264-hd.mp4542.0 MiB2014-01-12 00:57:24
30c3-5423-en-The_Tor_Network_h264-hd.mp4897.6 MiB2014-01-03 11:20:57
30c3-5413-de-en-Security_Nightmares_h264-hd.mp42.2 GiB2014-01-07 23:20:13
30c3-5412-en-Bug_class_genocide_h264-hd.mp4415.7 MiB2014-01-07 23:01:27
30c3-5406-en-Drones_h264-hd.mp4956.0 MiB2013-12-30 04:31:47
30c3-5397-en-Sysadmins_of_the_world_unite__h264-hd.mp4551.3 MiB2014-01-02 22:50:00
30c3-5339-en-de-The_Year_in_Crypto_h264-hd.mp4575.0 MiB2014-01-02 10:18:27
30c3-5304-en-CounterStrike_h264-hd.mp4606.6 MiB2014-01-02 15:14:55
30c3-5295-en-de-The_Four_Wars_h264-hd.mp4740.3 MiB2014-01-07 23:10:31
30c3-5295-en-The_Four_Wars_h264-hd.mp4725.3 MiB2014-01-02 15:04:32
30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_h264-hd.mp4901.6 MiB2014-01-02 22:51:43
30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hd.mp41.1 GiB2013-12-30 11:03:53
30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_h264-hd.mp4492.5 MiB2014-01-02 15:02:15
30c3-5255-en-de-Through_a_PRISM_Darkly_h264-hd.mp4864.1 MiB2013-12-30 20:10:12
30c3-5214-en-The_Gospel_of_IRMA__h264-hd.mp4449.2 MiB2013-12-30 12:58:31
30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_h264-hd.mp4518.1 MiB2014-01-02 10:08:39
30c3-5192-en-Android_DDI_h264-hd.mp4461.7 MiB2013-12-30 04:30:06