Skip to content

Instantly share code, notes, and snippets.

@1maetsch
Last active March 23, 2018 09:55
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save 1maetsch/674f488d544951021ea32fbeb2ee586b to your computer and use it in GitHub Desktop.
Save 1maetsch/674f488d544951021ea32fbeb2ee586b to your computer and use it in GitHub Desktop.
Date: Fri Mar 23 2018 10:54:29 GMT+0100 (CET)
1. Console Security - Switch (66579)
2. Social Bots, Fake News und Filterblasen (47740)
3. QualityLand (38384)
4. Jahresrückblick des CCC 2017 (37920)
5. Schreibtisch-Hooligans (37777)
6. Security Nightmares 0x12 (37519)
7. Die fabelhafte Welt des Mobilebankings (28151)
8. Methodisch inkorrekt! (28050)
9. Hacker Jeopardy (25676)
10. Dude, you broke the Future! (23626)
11. Antipatterns und Missverständnisse in der Softwareentwicklung (23459)
12. The Ultimate Apollo Guidance Computer Talk (22227)
13. All Computers Are Beschlagnahmt (21718)
14. ASLR on the line (21475)
15. Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit (21299)
16. Trügerische Sicherheit (20192)
17. Die Lauschprogramme der Geheimdienste (18360)
18. Beeinflussung durch Künstliche Intelligenz (14374)
19. Relativitätstheorie für blutige Anfänger (13934)
20. Tiger, Drucker und ein Mahnmal (11610)
21. Der netzpolitische Wetterbericht (11392)
22. SCADA - Gateway to (s)hell (8838)
23. Die Sprache der Überwacher (8709)
24. Nougatbytes 11₂ (8045)
25. Der PC-Wahl-Hack (7759)
26. Mietshäusersyndikat: den Immobilienmarkt hacken (7607)
27. Eröffnung: tuwat (6600)
28. Es sind die kleinen Dinge im Leben II (6362)
29. Unleash your smart-home devices: Vacuum Cleaning Robot Hacking (6248)
30. Everything you want to know about x86 microcode, but might have been afraid to ask (6149)
31. eMMC hacking, or: how I fixed long-dead Galaxy S3 phones (5600)
32. Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection (5272)
33. How to drift with any car (5151)
34. Deep Learning Blindspots (4826)
35. Die göttliche Informatik / The divine Computer Science (4757)
36. Holography of Wi-Fi radiation (4524)
37. Public FPGA based DMA Attacking (4439)
38. Internet of Fails (4327)
39. Gamified Control? (4305)
40. How risky is the software you use? (4187)
41. Bildung auf dem Weg ins Neuland (3991)
42. 0en & 1en auf dem Acker (3976)
43. A hacker's guide to Climate Change - What do we know and how do we know it? (3948)
44. Reverse engineering FPGAs (3855)
45. Uncovering British spies’ web of sockpuppet social media personas (3824)
46. hacking disaster (3664)
47. Resilienced Kryptographie (3591)
48. Protecting Your Privacy at the Border (3532)
49. Infrastructure Review (3449)
50. Science is broken (3396)
51. Intel ME: Myths and reality (3355)
52. Ein Festival der Demokratie (3345)
53. Abschluss (3340)
54. Lobby-Schlacht um die ePrivacy-Verordnung (3282)
55. The Snowden Refugees under Surveillance in Hong Kong (3239)
56. Free Electron Lasers (3188)
57. Inside Intel Management Engine (3183)
58. cryptocurrencies, smart contracts, etc.: revolutionary tech? (3134)
59. Decoding Contactless (Card) Payments (2950)
60. Running GSM mobile phone on SDR (2754)
61. MQA - A clever stealth DRM-Trojan (2734)
62. Demystifying Network Cards (2660)
63. Treibhausgasemissionen einschätzen (2455)
64. Taxation (2443)
65. BBSs and early Internet access in the 1990ies (2433)
66. Forensic Architecture (2400)
67. Financial surveillance (2392)
68. Are all BSDs created equally? (2209)
69. library operating systems (2185)
70. KRACKing WPA2 by Forcing Nonce Reuse (2131)
71. Digitale Bildung in der Schule (2045)
72. DPRK Consumer Technology (1998)
73. Lets break modern binary code obfuscation (1841)
74. 1-day exploit development for Cisco IOS (1746)
75. Schnaps Hacking (1721)
76. Privacy Shield - Lipstick on a Pig? (1696)
77. Tightening the Net in Iran (1667)
78. UPSat - the first open source satellite (1615)
79. LatticeHacks (1606)
80. The Internet in Cuba: A Story of Community Resilience (1558)
81. Access To Bodies (1554)
82. Internet censorship in the Catalan referendum (1530)
83. How Alice and Bob meet if they don't like onions (1487)
84. The making of a chip (1400)
85. Deconstructing a Socialist Lawnmower (1342)
86. Briar (1342)
87. Drones of Power: Airborne Wind Energy (1338)
88. Social Cooling - big data’s unintended side effect (1337)
89. Don't stop 'til you feel it (1316)
90. May contain DTraces of FreeBSD (1304)
91. Mobile Data Interception from the Interconnection Link (1301)
92. Designing PCBs with code (1208)
93. Lightning Talks Day 4 (1182)
94. Type confusion: discovery, abuse, and protection (1177)
95. TrustZone is not enough (1163)
96. Doping your Fitbit (1115)
97. Ecstasy 10x yellow Twitter 120mg Mdma (1085)
98. SatNOGS: Crowd-sourced satellite operations (1078)
99. Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme (1071)
100. Squeezing a key through a carry bit (1060)
101. openPower - the current state of commercial openness in CPU development (1004)
102. Italy's surveillance toolbox (996)
103. Robot Music (988)
104. Bringing Linux back to server boot ROMs with NERF and Heads (981)
105. Home Distilling (970)
106. WHWP (969)
107. Watching the changing Earth (955)
108. Lightning Talks Day 2 (937)
109. Humans as software extensions (936)
110. Hardening Open Source Development (911)
111. Extended DNA Analysis (909)
112. Tracking Transience (900)
113. Pointing Fingers at 'The Media' (889)
114. Open Source Estrogen (871)
115. End-to-end formal ISA verification of RISC-V processors with riscv-formal (833)
116. Low Cost Non-Invasive Biomedical Imaging (819)
117. Lightning Talks Day 3 (816)
118. Saving the World with Space Solar Power (811)
119. Growing Up Software Development (801)
120. Opening Closed Systems with GlitchKit (794)
121. Fuck Dutch mass-surveillance: let's have a referendum! (767)
122. BootStomp: On the Security of Bootloaders in Mobile Devices (762)
123. Electroedibles (758)
124. Uncertain Concern (750)
125. We should share our secrets (740)
126. iOS kernel exploitation archaeology (711)
127. Simulating the future of the global agro-food system (673)
128. The Work of Art in the Age of Digital Assassination (668)
129. Microarchitectural Attacks on Trusted Execution Environments (638)
130. The Noise Protocol Framework (617)
131. avatar² (603)
132. Inside Android’s SafetyNet Attestation: Attack and Defense (600)
133. Implementing an LLVM based Dynamic Binary Instrumentation framework (594)
134. Uncovering vulnerabilities in Hoermann BiSecur (587)
135. Policing in the age of data exploitation (583)
136. Electromagnetic Threats for Information Security (577)
137. WTFrance (565)
138. Net Neutraliy Enforcement in the EU (562)
139. Taking a scalpel to QNX (560)
140. Blinkenrocket! (537)
141. Defeating (Not)Petya's Cryptography (537)
142. Netzpolitik in der Schweiz (530)
143. Organisational Structures for Sustainable Free Software Development (504)
144. Catch me if you can: Internet Activism in Saudi Arabia (503)
145. Modern key distribution with ClaimChain (499)
146. Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons (486)
147. How can you trust formally verified software? (474)
148. Ensuring Climate Data Remains Public (456)
149. On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso (414)
150. OONI: Let's Fight Internet Censorship, Together! (402)
151. Regulating Autonomous Weapons (393)
152. institutions for Resolution Disputes (385)
153. BGP and the Rule of Custom (380)
154. “Nabovarme” opensource heating infrastructure in Christiania (376)
155. Afro TECH (364)
156. Why Do We Anthropomorphize Computers?... (356)
157. Making Experts Makers and Makers Experts (348)
158. Think big or care for yourself (341)
159. Practical Mix Network Design (322)
160. International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interop (320)
161. History and implications of DRM (287)
162. Closing the loop: Reconnecting social-technologial dynamics to Earth System science (250)
163. Visceral Systems (236)
164. Zamir Transnational Network und Zagreb Dairy (224)
165. Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels' (217)
166. The seizure of the Iuventa (209)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment