Skip to content

Instantly share code, notes, and snippets.

@1maetsch
Last active March 23, 2018 09:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save 1maetsch/cbe4d27d347895bb01d2a162f208ba46 to your computer and use it in GitHub Desktop.
Save 1maetsch/cbe4d27d347895bb01d2a162f208ba46 to your computer and use it in GitHub Desktop.
Date: Fri Mar 23 2018 10:55:56 GMT+0100 (CET)
1. Antipatterns und Missverständnisse in der Softwareentwicklung (34033)
2. Dude, you broke the Future! (29290)
3. Methodisch inkorrekt! (20691)
4. Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit (20102)
5. Eröffnung: tuwat (19301)
6. Die Lauschprogramme der Geheimdienste (19116)
7. Social Bots, Fake News und Filterblasen (18983)
8. Internet of Fails (17024)
9. Security Nightmares 0x12 (16033)
10. The Ultimate Apollo Guidance Computer Talk (15455)
11. Die fabelhafte Welt des Mobilebankings (15424)
12. Console Security - Switch (14272)
13. Gamified Control? (12905)
14. Relativitätstheorie für blutige Anfänger (12185)
15. Jahresrückblick des CCC 2017 (11546)
16. Demystifying Network Cards (10106)
17. Everything you want to know about x86 microcode, but might have been afraid to ask (9729)
18. Hacker Jeopardy (9527)
19. Beeinflussung durch Künstliche Intelligenz (8836)
20. All Computers Are Beschlagnahmt (8496)
21. Uncovering British spies’ web of sockpuppet social media personas (8109)
22. Unleash your smart-home devices: Vacuum Cleaning Robot Hacking (7831)
23. Free Electron Lasers (7125)
24. How to drift with any car (6953)
25. hacking disaster (6528)
26. Inside Intel Management Engine (5840)
27. Ecstasy 10x yellow Twitter 120mg Mdma (5679)
28. Trügerische Sicherheit (5444)
29. QualityLand (5222)
30. Are all BSDs created equally? (5155)
31. Reverse engineering FPGAs (5039)
32. Mietshäusersyndikat: den Immobilienmarkt hacken (5035)
33. Doping your Fitbit (4902)
34. Tiger, Drucker und ein Mahnmal (4872)
35. Deep Learning Blindspots (4841)
36. Protecting Your Privacy at the Border (4533)
37. Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection (4430)
38. SCADA - Gateway to (s)hell (4385)
39. DPRK Consumer Technology (4195)
40. cryptocurrencies, smart contracts, etc.: revolutionary tech? (4069)
41. Schreibtisch-Hooligans (3909)
42. Pointing Fingers at 'The Media' (3907)
43. 34C3 Abschluss (3849)
44. Die Sprache der Überwacher (3761)
45. Der PC-Wahl-Hack (3504)
46. Taxation (3484)
47. Digitale Bildung in der Schule (3341)
48. Der netzpolitische Wetterbericht (2916)
49. Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Development (2876)
50. Nougatbytes 11₂ (2757)
51. How risky is the software you use? (2679)
52. Watching the changing Earth (2670)
53. 1-day exploit development for Cisco IOS (2632)
54. Intel ME: Myths and reality (2595)
55. Science is broken (2554)
56. LatticeHacks (2496)
57. KRACKing WPA2 by Forcing Nonce Reuse (2474)
58. Decoding Contactless (Card) Payments (2408)
59. Social Cooling - big data’s unintended side effect (2358)
60. Bildung auf dem Weg ins Neuland (2324)
61. WTFrance (2263)
62. Die göttliche Informatik (2261)
63. Internet censorship in the Catalan referendum (2261)
64. iOS kernel exploitation archaeology (2167)
65. The Internet in Cuba: A Story of Community Resilience (2125)
66. 34C3 Infrastructure Review (2093)
67. 0en & 1en auf dem Acker (2007)
68. Resilienced Kryptographie (1996)
69. ASLR on the line (1946)
70. Schnaps Hacking (1936)
71. Ein Festival der Demokratie (1909)
72. The Snowden Refugees under Surveillance in Hong Kong (1856)
73. Home Distilling (1837)
74. Financial surveillance (1805)
75. Bringing Linux back to server boot ROMs with NERF and Heads (1784)
76. Lets break modern binary code obfuscation (1766)
77. Holography of Wi-Fi radiation (1671)
78. Opening Closed Systems with GlitchKit (1639)
79. BBSs and early Internet access in the 1990ies (1617)
80. Tightening the Net in Iran (1614)
81. Growing Up Software Development (1592)
82. Humans as software extensions (1552)
83. Es sind die kleinen Dinge im Leben II (1546)
84. How Alice and Bob meet if they don't like onions (1497)
85. The Work of Art in the Age of Digital Assassination (1442)
86. How can you trust formally verified software? (1421)
87. Designing PCBs with code (1401)
88. BGP and the Rule of Custom (1396)
89. Lobby-Schlacht um die ePrivacy-Verordnung (1340)
90. Mobile Data Interception from the Interconnection Link (1333)
91. A hacker's guide to Climate Change - What do we know and how do we know it? (1288)
92. Treibhausgasemissionen einschätzen (1285)
93. The making of a chip (1274)
94. MQA - A clever stealth DRM-Trojan (1255)
95. May contain DTraces of FreeBSD (1248)
96. Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons (1241)
97. Low Cost Non-Invasive Biomedical Imaging (1233)
98. Access To Bodies (1184)
99. Briar (1183)
100. Lightning Talks Day 2 (1136)
101. Forensic Architecture (1113)
102. Running GSM mobile phone on SDR (1111)
103. Electromagnetic Threats for Information Security (1064)
104. Privacy Shield - Lipstick on a Pig? (1062)
105. Blinkenrocket! (1051)
106. UPSat - the first open source satellite (1038)
107. Squeezing a key through a carry bit (999)
108. BootStomp: On the Security of Bootloaders in Mobile Devices (989)
109. Fuck Dutch mass-surveillance: let's have a referendum! (983)
110. End-to-end formal ISA verification of RISC-V processors with riscv-formal (976)
111. Defeating (Not)Petya's Cryptography (961)
112. Net Neutraliy Enforcement in the EU (915)
113. Drones of Power: Airborne Wind Energy (907)
114. Netzpolitik in der Schweiz (905)
115. WHWP (880)
116. Robot Music (872)
117. Why Do We Anthropomorphize Computers?... (863)
118. Catch me if you can: Internet Activism in Saudi Arabia (844)
119. Saving the World with Space Solar Power (827)
120. Inside Android’s SafetyNet Attestation: Attack and Defense (821)
121. Lightning Talks Day 4 (815)
122. avatar² (808)
123. Implementing an LLVM based Dynamic Binary Instrumentation framework (794)
124. Hardening Open Source Development (756)
125. We should share our secrets (755)
126. Microarchitectural Attacks on Trusted Execution Environments (754)
127. eMMC hacking, or: how I fixed long-dead Galaxy S3 phones (750)
128. The Noise Protocol Framework (696)
129. Type confusion: discovery, abuse, and protection (691)
130. Policing in the age of data exploitation (678)
131. openPower - the current state of commercial openness in CPU development (673)
132. Public FPGA based DMA Attacking (648)
133. Afro TECH (632)
134. Uncovering vulnerabilities in Hoermann BiSecur (618)
135. Regulating Autonomous Weapons (610)
136. Taking a scalpel to QNX (603)
137. Deconstructing a Socialist Lawnmower (596)
138. History and implications of DRM (596)
139. The seizure of the Iuventa (594)
140. Italy's surveillance toolbox (594)
141. Modern key distribution with ClaimChain (594)
142. This is NOT a proposal about mass surveillance! (585)
143. Extended DNA Analysis (571)
144. Open Source Estrogen (551)
145. Practical Mix Network Design (549)
146. SatNOGS: Crowd-sourced satellite operations (540)
147. Making Experts Makers and Makers Experts (514)
148. library operating systems (507)
149. Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels' (495)
150. Electroedibles (449)
151. Simulating the future of the global agro-food system (447)
152. “Nabovarme” opensource heating infrastructure in Christiania (444)
153. Lightning Talks Day 3 (442)
154. Think big or care for yourself (426)
155. Zamir Transnational Network und Zagreb Dairy (403)
156. Tracking Transience (401)
157. Visceral Systems (396)
158. OONI: Let's Fight Internet Censorship, Together! (375)
159. Organisational Structures for Sustainable Free Software Development (366)
160. TrustZone is not enough (328)
161. Don't stop 'til you feel it (294)
162. Uncertain Concern (292)
163. International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interoperable Schnittstellen für digitalisiertes Kulturgut (289)
164. On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Resolution (278)
165. Ensuring Climate Data Remains Public (275)
166. institutions for Resolution Disputes (255)
167. Closing the loop: Reconnecting social-technologial dynamics to Earth System science (252)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment