Parent directory/ | - | - |
LICENSE_CC-BY-4.0.txt | 18.2 KiB | 2018-12-29 16:38:55 |
32c3-7570-en-de-Plunge_into_Proxy_Politics.en.srt | 37.4 KiB | 2018-12-29 16:38:55 |
32c3-7567-de-en-Katastrophe_und_Kommunikation.de.srt | 92.9 KiB | 2018-12-29 16:38:55 |
32c3-7565-en-Keynote.en.srt | 77.6 KiB | 2018-12-29 16:38:55 |
32c3-7562-deu-eng-Jugend_hackt_2015.de.srt | 98.8 KiB | 2018-12-29 16:38:55 |
32c3-7551-en-de-Closing_Event.en.srt | 19.2 KiB | 2018-12-29 16:38:55 |
32c3-7551-en-de-Closing_Event.de.srt | 19.7 KiB | 2018-12-29 16:38:55 |
32c3-7550-en-Opening_Event.en.srt | 15.2 KiB | 2018-12-29 16:38:55 |
32c3-7550-en-Opening_Event.de.srt | 16.3 KiB | 2018-12-29 16:38:55 |
32c3-7538-en-Internet_Landscapes.en.srt | 107.8 KiB | 2018-12-29 16:38:55 |
32c3-7530-en-de-Buffering_sucks.en.srt | 32.5 KiB | 2018-12-29 16:38:55 |
32c3-7529-en-de-Mobile_Censorship_in_Iran.en.srt | 38.2 KiB | 2018-12-29 16:38:55 |
32c3-7528-en-de-Lets_Encrypt_--_What_launching_a_free_CA_looks_like.en.srt | 39.9 KiB | 2018-12-29 16:38:55 |
32c3-7525-de-en-Quantenphysik_und_Kosmologie.de.srt | 119.2 KiB | 2018-12-29 16:38:55 |
32c3-7520-de-en-Compileroptimierungen_fuer_Forth_im_Microcontroller.de.srt | 39.3 KiB | 2018-12-29 16:38:55 |
32c3-7517-en-de-the_possibility_of_an_army.en.srt | 45.0 KiB | 2018-12-29 16:38:55 |
32c3-7513-en-de-Safe_Harbor.en.srt | 98.0 KiB | 2018-12-29 16:38:55 |
32c3-7501-en-de-Ten_years_after_We_Lost_The_War.en.srt | 85.2 KiB | 2018-12-29 16:38:55 |
32c3-7483-en-de-Computational_Meta-Psychology.en.srt | 104.4 KiB | 2018-12-29 16:38:55 |
32c3-7457-en-de-Predicting_Crime_in_a_Big_Data_World.en.srt | 43.5 KiB | 2018-12-29 16:38:55 |
32c3-7449-en-de-Prediction_and_Control.en.srt | 97.4 KiB | 2018-12-29 16:38:55 |
32c3-7441-en-de-The_plain_simple_reality_of_entropy.en.srt | 41.3 KiB | 2018-12-29 16:38:55 |
32c3-7426-en-de-Intelexit.en.srt | 45.2 KiB | 2018-12-29 16:38:55 |
32c3-7415-de-en-Wie_Jugendschutzprogramme_nicht_nur_die_Jugend_schaedigen.de.srt | 51.6 KiB | 2018-12-29 16:38:55 |
32c3-7413-de-en-OEsterreich_Der_Kampf_gegen_unkontrollierte_Massenueberwachung.de.srt | 51.7 KiB | 2018-12-29 16:38:55 |
32c3-7412-en-Running_your_own_3G_35G_network.en.srt | 74.8 KiB | 2018-12-29 16:38:55 |
32c3-7403-en-de-A_New_Kid_on_the_Block.en.srt | 76.3 KiB | 2018-12-29 16:38:55 |
32c3-7401-en-de-Internet_Cube.en.srt | 30.7 KiB | 2018-12-29 16:38:55 |
32c3-7388-en-de-Media_Coverage_and_the_Public_in_the_Surveillance_Society.en.srt | 42.1 KiB | 2018-12-29 16:38:55 |
32c3-7387-en-de-Net_Neutrality_in_Europe.en.srt | 79.8 KiB | 2018-12-29 16:38:55 |
32c3-7368-en-de-Shopshifting.en.srt | 90.7 KiB | 2018-12-29 16:38:55 |
32c3-7360-de-en-Un_Sicherheit_von_App-basierten_TAN-Verfahren_im_Onlinebanking.de.srt | 47.9 KiB | 2018-12-29 16:38:55 |
32c3-7352-en-de-Towards_reasonably_trustworthy_x86_laptops.en.srt | 62.1 KiB | 2018-12-29 16:38:55 |
32c3-7340-eng-deu-fra-Collect_It_All_Open_Source_Intelligence_OSINT_for_Everyone.en.srt | 80.1 KiB | 2018-12-29 16:38:55 |
32c3-7331-en-de-The_exhaust_emissions_scandal_Dieselgate.en.srt | 92.5 KiB | 2018-12-29 16:38:55 |
32c3-7324-en-de-What_is_the_value_of_anonymous_communication.en.srt | 75.0 KiB | 2018-12-29 16:38:55 |
32c3-7323-de-en-Wie_man_einen_Blackout_verursacht.de.srt | 90.2 KiB | 2018-12-29 16:38:55 |
32c3-7322-en-de-Tor_onion_services_more_useful_than_you_think.en.srt | 95.8 KiB | 2018-12-29 16:38:55 |
32c3-7307-en-de-State_of_the_Onion.en.srt | 94.8 KiB | 2018-12-29 16:38:55 |
32c3-7291-de-en-Microsofts_Windows_10_Botnet.de.srt | 51.2 KiB | 2018-12-29 16:38:55 |
32c3-7288-en-de-Logjam_Diffie-Hellman_discrete_logs_the_NSA_and_you.en.srt | 105.0 KiB | 2018-12-29 16:38:55 |
32c3-7286-en-de-Sin_in_the_time_of_Technology.en.srt | 44.0 KiB | 2018-12-29 16:38:55 |
32c3-7282-de-en-Fnord-Jahresrueckblick.de.srt | 106.2 KiB | 2018-12-29 16:38:55 |
32c3-7273-en-Unpatchable.en.srt | 96.8 KiB | 2018-12-29 16:38:55 |
32c3-7264-en-de-Profiling_In_justice.en.srt | 40.6 KiB | 2018-12-29 16:38:55 |
32c3-7249-de-en-Das_Zahnrad_aus_Fleisch.de.srt | 74.3 KiB | 2018-12-29 16:38:55 |
32c3-7246-en-de-Free_Software_and_Hardware_bring_National_Sovereignty.en.srt | 36.3 KiB | 2018-12-29 16:38:55 |
32c3-7245-en-de-Reversing_UEFI_by_execution.en.srt | 38.5 KiB | 2018-12-29 16:38:55 |
32c3-7240-en-de-Console_Hacking.en.srt | 86.0 KiB | 2018-12-29 16:38:55 |
32c3-7230-de-en-Lessons_learned_Freifunk_fuer_Gefluechtete.de.srt | 48.5 KiB | 2018-12-29 16:38:55 |
32c3-7228-de-en-NSA-Untersuchungsausschuss_Zwischen_Aufklaerungswillen_und_Mauern_aus_Schweigen.de.srt | 99.1 KiB | 2018-12-29 16:38:55 |
32c3-7225-de-en-Grundrechte_gelten_nicht_im_Weltall.de.srt | 84.2 KiB | 2018-12-29 16:38:55 |
32c3-7210-en-de-PQCHacks.en.srt | 111.0 KiB | 2018-12-29 16:38:55 |
32c3-7209-en-What_does_Big_Brother_see_while_he_is_watching.en.srt | 76.1 KiB | 2018-12-29 16:38:55 |
32c3-7205-de-Netzpolitik_in_der_Schweiz.de-ch.srt | 70.0 KiB | 2018-12-29 16:38:55 |
32c3-7202-de-en-Stromtankstellen_-_eine_neue_oeffentliche_Infrastruktur.de.srt | 45.1 KiB | 2018-12-29 16:38:55 |
32c3-7174-en-de-Lifting_the_Fog_on_Red_Star_OS.en.srt | 75.0 KiB | 2018-12-29 16:38:55 |
32c3-7166-de-en-Sicherheit_von_125kHz_Transpondern_am_Beispiel_Hitag_S.de.srt | 46.6 KiB | 2018-12-29 16:38:55 |
32c3-7162-en-de-Shooting_lasers_into_space_-_for_science.en.srt | 92.0 KiB | 2018-12-29 16:38:55 |
32c3-7154-en-de-Iridium_Update.en.srt | 68.5 KiB | 2018-12-29 16:38:55 |
32c3-7150-de-en-Nach_bestem_Wissen_und_Gewissen_-_Floskeln_in_der_Politik.de.srt | 94.8 KiB | 2018-12-29 16:38:55 |
32c3-7146-de-en-Hardware-Trojaner_in_Security-Chips.de.srt | 84.5 KiB | 2018-12-29 16:38:55 |
32c3-7138-en-de-Gscheitern.en.srt | 37.0 KiB | 2018-12-29 16:38:55 |
32c3-7135-de-en-Ein_Abgrund_von_Landesverrat.en.srt | 46.7 KiB | 2018-12-29 16:38:55 |
32c3-7135-de-en-Ein_Abgrund_von_Landesverrat.de.srt | 50.9 KiB | 2018-12-29 16:38:55 |
32c3-7133-en-de-Beyond_your_cable_modem.en.srt | 70.9 KiB | 2018-12-29 16:38:55 |
32c3-7130-en-de-The_Perl_Jam_2.en.srt | 45.9 KiB | 2018-12-29 16:38:55 |
32c3-7102-de-en-Crypto_ist_Abwehr_IFG_ist_Angriff.de.srt | 42.3 KiB | 2018-12-29 16:38:55 |