Parent directory/ | - | - |
subtitles/ | - | 2021-04-16 08:30:31 |
30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_webm.webm | 331.1 MiB | 2014-01-20 23:31:21 |
30c3-5490-de-en-Fnord_News_Show_webm.webm | 425.3 MiB | 2014-01-14 18:05:56 |
30c3-5439-en-To_Protect_And_Infect_webm.webm | 114.3 MiB | 2014-01-12 13:24:28 |
30c3-5532-de-en-Die_Drohnenkriege_webm.webm | 397.3 MiB | 2014-01-11 23:19:58 |
30c3-5290-en-Console_Hacking_2013_webm.webm | 111.5 MiB | 2014-01-08 21:56:10 |
30c3-5413-de-en-Security_Nightmares_webm.webm | 477.6 MiB | 2014-01-07 23:21:00 |
30c3-5295-en-de-The_Four_Wars_webm.webm | 168.8 MiB | 2014-01-07 23:11:10 |
30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_webm.webm | 258.7 MiB | 2014-01-07 22:49:27 |
30c3-5394-BREACH_in_Agda_webm.webm | 287.1 MiB | 2014-01-07 22:35:23 |
30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_webm.webm | 174.7 MiB | 2014-01-07 22:22:42 |
30c3-5582-en-SCADA_StrangeLove_2_webm.webm | 81.6 MiB | 2014-01-06 17:49:28 |
30c3-5713-en-de-To_Protect_And_Infect_Part_2_webm.webm | 274.9 MiB | 2014-01-06 17:43:13 |
30c3-5495-en-Concepts_for_global_TSCM_webm.webm | 222.0 MiB | 2014-01-06 14:25:24 |
30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_webm.webm | 252.7 MiB | 2014-01-05 18:52:59 |
30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_webm.webm | 134.6 MiB | 2014-01-03 23:27:16 |
30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__webm.webm | 362.5 MiB | 2014-01-03 23:11:00 |
30c3-5606-de-en-Closing_Event_webm.webm | 200.7 MiB | 2014-01-03 21:33:17 |
30c3-5255-en-de-Through_a_PRISM_Darkly_webm.webm | 192.7 MiB | 2014-01-03 15:58:23 |
30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_webm.webm | 192.7 MiB | 2014-01-03 15:55:17 |
30c3-5304-en-CounterStrike_webm.webm | 146.5 MiB | 2014-01-03 15:52:50 |
30c3-5397-en-Sysadmins_of_the_world_unite__webm.webm | 116.6 MiB | 2014-01-03 15:50:42 |
30c3-5545-en-Trezor_Bitcoin_hardware_wallet_webm.webm | 82.6 MiB | 2014-01-03 15:47:21 |
30c3-5295-en-The_Four_Wars_webm.webm | 156.4 MiB | 2014-01-03 15:40:07 |
30c3-5499-en-X_Security_webm.webm | 221.0 MiB | 2014-01-03 15:39:04 |
30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_webm.webm | 138.4 MiB | 2014-01-03 15:37:38 |
30c3-5192-en-Android_DDI_webm.webm | 106.2 MiB | 2014-01-03 15:36:24 |
30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_webm.webm | 251.0 MiB | 2014-01-03 15:34:26 |
30c3-5406-en-Drones_webm.webm | 218.0 MiB | 2014-01-03 15:33:07 |
30c3-5587-en-Making_machines_that_make_webm.webm | 141.4 MiB | 2014-01-03 15:29:40 |
30c3-5608-de-en-Jahresrueckblick_des_CCC_webm.webm | 494.8 MiB | 2014-01-03 15:28:57 |
30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_webm.webm | 129.4 MiB | 2014-01-03 15:26:27 |
30c3-5459-en-de-Security_of_the_IC_Backside_webm.webm | 228.8 MiB | 2014-01-03 15:25:12 |
30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_webm.webm | 207.7 MiB | 2014-01-03 15:22:59 |
30c3-5339-en-de-The_Year_in_Crypto_webm.webm | 163.2 MiB | 2014-01-03 15:21:53 |
30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_webm.webm | 132.3 MiB | 2014-01-03 15:18:36 |
30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_webm.webm | 114.8 MiB | 2014-01-03 15:17:27 |
30c3-5537-en-Glass_Hacks_webm.webm | 205.7 MiB | 2014-01-03 15:16:18 |
30c3-5214-en-The_Gospel_of_IRMA__webm.webm | 97.6 MiB | 2014-01-03 15:14:58 |
30c3-5577-de-en-Hacker_Jeopardy_webm.webm | 1015.7 MiB | 2014-01-03 15:13:32 |
30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_webm.webm | 223.7 MiB | 2014-01-03 15:11:49 |
30c3-5618-en-Baseband_Exploitation_in_2013_webm.webm | 144.8 MiB | 2014-01-03 15:10:25 |
30c3-5423-en-The_Tor_Network_webm.webm | 187.5 MiB | 2014-01-03 15:09:20 |
30c3-5622-en-de-30c3_Keynote_webm.webm | 213.9 MiB | 2014-01-03 15:08:03 |
30c3-5412-en-Bug_class_genocide_webm.webm | 86.1 MiB | 2014-01-03 15:06:47 |
30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_webm.webm | 167.7 MiB | 2014-01-03 15:05:39 |
30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_webm.webm | 317.8 MiB | 2014-01-03 15:04:33 |
30c3-5376-en-Do_You_Think_That_s_Funny__webm.webm | 166.2 MiB | 2014-01-03 11:55:28 |
30c3-5449-en-Mobile_network_attack_evolution_webm.webm | 111.5 MiB | 2014-01-03 03:14:43 |
30c3-5477-en-An_introduction_to_Firmware_Analysis_webm.webm | 79.8 MiB | 2014-01-02 21:43:02 |
30c3-5426-de-en-Das_FlipDot-Projekt_webm.webm | 269.6 MiB | 2013-12-30 21:56:23 |
30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_webm.webm | 168.2 MiB | 2013-12-30 21:47:46 |
30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_webm.webm | 335.0 MiB | 2013-12-30 21:45:24 |
30c3-5395-en-Towards_an_affordable_brain-computer-interface_webm.webm | 262.0 MiB | 2013-12-30 21:44:43 |
30c3-5405-en-Data_Mining_for_Good_webm.webm | 175.6 MiB | 2013-12-30 21:38:42 |
30c3-5605-en-Opening_Event_webm.webm | 30.7 MiB | 2013-12-30 20:43:50 |
30c3-5564-en-de-Lightning_Talks_Day_4_webm.webm | 622.9 MiB | 2013-12-30 20:42:48 |
30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_webm.webm | 255.7 MiB | 2013-12-30 20:23:41 |
30c3-5609-en-Infrastructure_Review_webm.webm | 381.0 MiB | 2013-12-30 20:03:45 |
30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_webm.webm | 406.4 MiB | 2013-12-30 20:01:21 |
30c3-5437-en-Plants_Machines_webm.webm | 77.4 MiB | 2013-12-30 19:58:31 |
30c3-5186-en-Programming_FPGAs_with_PSHDL_webm.webm | 230.2 MiB | 2013-12-30 19:56:04 |
30c3-5293-de-en-Dead_Man_Edition_webm.webm | 201.3 MiB | 2013-12-30 18:22:46 |
30c3-5278-en-The_philosophy_of_hacking_webm.webm | 60.0 MiB | 2013-12-30 18:07:15 |
30c3-5444-en-Attacking_HomeMatic_webm.webm | 346.7 MiB | 2013-12-30 17:48:33 |
30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_webm.webm | 244.0 MiB | 2013-12-30 17:02:47 |
30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_webm.webm | 258.4 MiB | 2013-12-30 17:01:40 |
30c3-5469-de-en-2_Takte_spaeter_webm.webm | 111.1 MiB | 2013-12-30 17:00:57 |
30c3-5539-en-Human_Rights_and_Technology_webm.webm | 119.5 MiB | 2013-12-30 16:49:17 |
30c3-5607-en-The_Pirate_Cinema_webm.webm | 151.3 MiB | 2013-12-30 15:49:33 |
30c3-5185-en-FPGA_101_webm.webm | 316.1 MiB | 2013-12-30 15:46:56 |
30c3-5547-en-Turing_Complete_User_webm.webm | 139.9 MiB | 2013-12-30 15:44:23 |
30c3-5601-en-de-EUDataP_State_of_the_Union_webm.webm | 315.1 MiB | 2013-12-30 15:41:42 |
30c3-5588-en-de-My_journey_into_FM-RDS_webm.webm | 217.3 MiB | 2013-12-30 15:37:49 |
30c3-5566-en-Open_source_experimental_incubator_build_up_webm.webm | 268.3 MiB | 2013-12-30 15:37:21 |
30c3-5554-en-Magic_Lantern_webm.webm | 311.7 MiB | 2013-12-30 15:35:16 |
30c3-5443-en-Introduction_to_Processor_Design_webm.webm | 304.9 MiB | 2013-12-30 15:27:07 |
30c3-5453-en-Against_Metadata_webm.webm | 239.5 MiB | 2013-12-30 15:25:46 |
30c3-5425-en-Hacking_as_Artistic_Practice_webm.webm | 107.1 MiB | 2013-12-30 15:22:30 |
30c3-5360-en-Script_Your_Car__webm.webm | 180.3 MiB | 2013-12-30 15:21:30 |
30c3-5562-en-de-Lightning_Talks_Day_2_webm.webm | 516.6 MiB | 2013-12-30 15:15:16 |
30c3-5416-en-de-Desperately_Seeking_Susy_webm.webm | 590.2 MiB | 2013-12-30 15:14:21 |
30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_webm.webm | 139.2 MiB | 2013-12-30 15:12:44 |
30c3-5210-de-en-Bullshit_made_in_Germany_webm.webm | 382.1 MiB | 2013-12-30 15:08:20 |
30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_webm.webm | 263.5 MiB | 2013-12-30 15:04:22 |
30c3-5319-en-Technomonopolies_webm.webm | 103.5 MiB | 2013-12-30 15:01:30 |
30c3-5563-en-de-Lightning_Talks_Day_3_webm.webm | 705.9 MiB | 2013-12-30 14:55:58 |
30c3-5611-en-Hello_World__webm.webm | 306.1 MiB | 2013-12-30 14:53:37 |
30c3-5468-en-We_only_have_one_earth_webm.webm | 180.6 MiB | 2013-12-30 14:52:46 |
30c3-5544-de-en-Sim_Gishel_webm.webm | 246.8 MiB | 2013-12-30 14:49:02 |
30c3-5305-en-Breaking_Baryons_webm.webm | 308.1 MiB | 2013-12-30 14:45:30 |
30c3-5398-en-HbbTV_Security_webm.webm | 241.0 MiB | 2013-12-30 14:43:38 |
30c3-5356-en-Firmware_Fat_Camp_webm.webm | 237.4 MiB | 2013-12-30 14:41:29 |
30c3-5212-en-The_GNU_Name_System_webm.webm | 118.3 MiB | 2013-12-30 14:36:46 |
30c3-5289-en-Coding_your_body_webm.webm | 266.5 MiB | 2013-12-30 14:32:55 |
30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_webm.webm | 499.3 MiB | 2013-12-30 14:24:27 |
30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_webm.webm | 261.9 MiB | 2013-12-30 14:20:50 |
30c3-5474-en-World_War_II_Hackers_webm.webm | 185.9 MiB | 2013-12-30 14:20:10 |
30c3-5613-en-Forbidden_Fruit_webm.webm | 340.2 MiB | 2013-12-30 14:17:56 |
30c3-5387-en-Toward_a_Cognitive_Quantified_Self__webm.webm | 265.3 MiB | 2013-12-30 14:16:45 |
30c3-5447-en-Policing_the_Romantic_Crowd_webm.webm | 277.0 MiB | 2013-12-30 14:12:23 |
30c3-5536-en-Long_Distance_Quantum_Communication_webm.webm | 133.6 MiB | 2013-12-30 13:21:14 |
30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_webm.webm | 163.8 MiB | 2013-12-30 13:18:05 |
30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__webm.webm | 381.5 MiB | 2013-12-30 12:16:06 |
30c3-5614-en-Perfect_Paul_webm.webm | 142.8 MiB | 2013-12-30 12:10:52 |
30c3-5527-en-Basics_of_Digital_Wireless_Communication_webm.webm | 163.2 MiB | 2013-12-30 11:59:22 |
30c3-5337-de-en-Kryptographie_nach_Snowden_webm.webm | 314.5 MiB | 2013-12-30 11:51:30 |
30c3-5298-en-de-Rock_em_Graphic_Cards_webm.webm | 369.8 MiB | 2013-12-30 11:40:29 |
30c3-5509-de-en-IFGINT_webm.webm | 186.3 MiB | 2013-12-30 11:00:42 |
30c3-5476-en-Electronic_Bank_Robberies_webm.webm | 233.0 MiB | 2013-12-30 10:40:52 |
30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_webm.webm | 170.2 MiB | 2013-12-30 10:29:44 |
30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_webm.webm | 257.8 MiB | 2013-12-30 10:27:03 |
30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_webm.webm | 114.7 MiB | 2013-12-30 10:25:52 |
30c3-5415-de-en-Der_tiefe_Staat_webm.webm | 449.8 MiB | 2013-12-30 10:23:21 |
30c3-5377-de-en-UEberwachen_und_Sprache_webm.webm | 390.5 MiB | 2013-12-30 10:20:08 |
30c3-5610-de-Seidenstrasse_webm.webm | 381.7 MiB | 2013-12-30 10:14:25 |
30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_webm.webm | 248.3 MiB | 2013-12-30 03:57:55 |
30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_webm.webm | 117.1 MiB | 2013-12-30 03:55:31 |
30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_webm.webm | 226.6 MiB | 2013-12-30 03:54:59 |
30c3-5552-en-India_s_Surveillance_State_webm.webm | 319.2 MiB | 2013-12-30 03:54:27 |
30c3-5479-en-Building_a_safe_NFC_ticketing_system_webm.webm | 122.5 MiB | 2013-12-30 03:50:09 |
30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_webm.webm | 202.6 MiB | 2013-12-30 03:47:02 |
30c3-5594-en-Structuring_open_hardware_projects_webm.webm | 106.9 MiB | 2013-12-30 03:44:30 |
30c3-5420-de-en-calcpw_webm.webm | 141.0 MiB | 2013-12-30 03:42:12 |
30c3-5334-en-RFID_Treehouse_of_Horror_webm.webm | 264.1 MiB | 2013-12-30 03:41:41 |
30c3-5595-en-The_ArduGuitar_webm.webm | 133.6 MiB | 2013-12-30 03:39:48 |
30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_webm.webm | 241.9 MiB | 2013-12-30 03:36:54 |
30c3-5526-en-How_to_Build_a_Mind_webm.webm | 239.0 MiB | 2013-12-30 03:36:21 |
30c3-5494-en-Nerds_in_the_news_webm.webm | 165.5 MiB | 2013-12-30 03:33:16 |
30c3-5433-de-en-Recht_auf_Remix_webm.webm | 293.1 MiB | 2013-12-30 03:31:02 |
30c3-5590-en-White-Box_Cryptography_webm.webm | 295.1 MiB | 2013-12-30 03:30:29 |
30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_webm.webm | 100.6 MiB | 2013-12-30 03:23:20 |
30c3-5223-en-WarGames_in_memory_webm.webm | 246.1 MiB | 2013-12-30 03:19:24 |
30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_webm.webm | 355.3 MiB | 2013-12-30 03:15:38 |
30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_webm.webm | 332.9 MiB | 2013-12-30 03:14:20 |
30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_webm.webm | 541.2 MiB | 2013-12-30 03:14:00 |
30c3-5311-en-lasers_in_space_webm.webm | 94.8 MiB | 2013-12-30 03:07:52 |