PDA

Ver la versión completa : Material del 32nd Chaos Communication Congress (32c3)



LUK
16-01-2016, 13:46
Hablaros del Chaos Computer Club (aka CCC) es hablaros de la historia viva del hacking, la mayor asociación de hackers de Europa que fue fundada en Berlín el 12 de septiembre de 1981.

Desde 1984 entre nochebuena y nochevieja organizan el Chaos Communication Congress y en su 32 edición de 2015 volvían a celebrarlo en Hamburgo bajo el lema "Gated Communities".

Durante los días del congreso, desde bien temprano y hasta madrugada se impartieron numerosas charlas (en inglés y en alemán) y talleres que no os podéis perder:



27 de diciembre


A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs (https://media.ccc.de/v/32c3-7139-a_free_and_open_source_verilog-to-bitstream_flow_for_ice40_fpgas)


APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for (https://media.ccc.de/v/32c3-7260-apt_reports_and_opsec_evolution_or_these_are_not_t he_apt_reports_you_are_looking_for)


Avoiding kernel panic: Europe’s biggest fails in digital policy-making (https://media.ccc.de/v/32c3-7227-avoiding_kernel_panic_europe_s_biggest_fails_in_di gital_policy-making)


Beyond your cable modem (https://media.ccc.de/v/32c3-7133-beyond_your_cable_modem)


Console Hacking (https://media.ccc.de/v/32c3-7240-console_hacking)


Datahavens from HavenCo to Today (https://media.ccc.de/v/32c3-7432-datahavens_from_havenco_to_today)


Hacking EU funding for a decentralizing FOSS project (https://media.ccc.de/v/32c3-7300-hacking_eu_funding_for_a_decentralizing_foss_proje ct)


Hardware-Trojaner in Security-Chips (https://media.ccc.de/v/32c3-7146-hardware-trojaner_in_security-chips)


How the Great Firewall discovers hidden circumvention servers (https://media.ccc.de/v/32c3-7196-how_the_great_firewall_discovers_hidden_circumvent ion_servers)


Internet Landscapes (https://media.ccc.de/v/32c3-7538-internet_landscapes)


Key-logger, Video, Mouse (https://media.ccc.de/v/32c3-7189-key-logger_video_mouse)


Keynote (https://media.ccc.de/v/32c3-7565-keynote)


Lifting the Fog on Red Star OS (https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os)


My Robot Will Crush You With Its Soft Delicate Hands! (https://media.ccc.de/v/32c3-7389-my_robot_will_crush_you_with_its_soft_delicate_han ds)


Netzpolitik in der Schweiz (https://media.ccc.de/v/32c3-7205-netzpolitik_in_der_schweiz)


New memory corruption attacks: why can't we have nice things? (https://media.ccc.de/v/32c3-7163-new_memory_corruption_attacks_why_can_t_we_have_ni ce_things)


NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen (https://media.ccc.de/v/32c3-7228-nsa-untersuchungsausschuss_zwischen_aufklarungswillen_ und_mauern_aus_schweigen)


Opening Event (https://media.ccc.de/v/32c3-7550-opening_event)


PLC-Blaster (https://media.ccc.de/v/32c3-7229-plc-blaster)


PQCHacks (https://media.ccc.de/v/32c3-7210-pqchacks)


Public Library/Memory of the World (https://media.ccc.de/v/32c3-7279-public_library_memory_of_the_world)


rad1o++ (https://media.ccc.de/v/32c3-7153-rad1o)


REXUS/BEXUS - Rocket and Balloon Experiments for University Students (https://media.ccc.de/v/32c3-7325-rexus_bexus_-_rocket_and_balloon_experiments_for_university_stu dents)


Running your own 3G/3.5G network (https://media.ccc.de/v/32c3-7412-running_your_own_3g_3_5g_network)


Shooting lasers into space – for science! (https://media.ccc.de/v/32c3-7162-shooting_lasers_into_space_for_science)


Shopshifting (https://media.ccc.de/v/32c3-7368-shopshifting)


So you want to build a satellite? (https://media.ccc.de/v/32c3-7341-so_you_want_to_build_a_satellite)


The exhaust emissions scandal („Dieselgate“) (https://media.ccc.de/v/32c3-7331-the_exhaust_emissions_scandal_dieselgate)


The Great Train Cyber Robbery (https://media.ccc.de/v/32c3-7490-the_great_train_cyber_robbery)


The mummy unwrapped (https://media.ccc.de/v/32c3-7543-the_mummy_unwrapped)


The Ultimate Amiga 500 Talk (https://media.ccc.de/v/32c3-7468-the_ultimate_amiga_500_talk)


Thunderstrike 2 (https://media.ccc.de/v/32c3-7236-thunderstrike_2)


Towards (reasonably) trustworthy x86 laptops (https://media.ccc.de/v/32c3-7352-towards_reasonably_trustworthy_x86_laptops)


What does Big Brother see, while he is watching? (https://media.ccc.de/v/32c3-7209-what_does_big_brother_see_while_he_is_watching)


What is the value of anonymous communication? (https://media.ccc.de/v/32c3-7324-what_is_the_value_of_anonymous_communication)


When hardware must „just work“ (https://media.ccc.de/v/32c3-7171-when_hardware_must_just_work)


Windows drivers attack surface (https://media.ccc.de/v/32c3-7510-windows_drivers_attack_surface)


28 de diciembre


(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking (https://media.ccc.de/v/32c3-7360-un_sicherheit_von_app-basierten_tan-verfahren_im_onlinebanking)


All Our Shared Spectrum Are Belong to Us (https://media.ccc.de/v/32c3-7314-all_our_shared_spectrum_are_belong_to_us)


apertus° AXIOM (https://media.ccc.de/v/32c3-7355-apertus_axiom)


CloudABI (https://media.ccc.de/v/32c3-7231-cloudabi)


Cyber all the Wassenaars (https://media.ccc.de/v/32c3-7280-cyber_all_the_wassenaars)


Das Zahnrad aus Fleisch (https://media.ccc.de/v/32c3-7249-das_zahnrad_aus_fleisch)


Dissecting VoLTE (https://media.ccc.de/v/32c3-7502-dissecting_volte)


Ecuador: how an authoritarian government is fooling the entire world (https://media.ccc.de/v/32c3-7134-ecuador_how_an_authoritarian_government_is_fooling _the_entire_world)


Ein Abgrund von Landesverrat (https://media.ccc.de/v/32c3-7135-ein_abgrund_von_landesverrat)


Evolution of Brain-Computer Interfaces (https://media.ccc.de/v/32c3-7416-evolution_of_brain-computer_interfaces)


G’scheitern (https://media.ccc.de/v/32c3-7138-g_scheitern)


goto fail; (https://media.ccc.de/v/32c3-7438-goto_fail)


Hardsploit: A Metasploit-like tool for hardware hacking (https://media.ccc.de/v/32c3-7496-hardsploit_a_metasploit-like_tool_for_hardware_hacking)


Household, Totalitarianism and Cyberspace (https://media.ccc.de/v/32c3-7342-household_totalitarianism_and_cyberspace)


How hackers grind an MMORPG: by taking it apart! (https://media.ccc.de/v/32c3-7493-how_hackers_grind_an_mmorpg_by_taking_it_apart)


Iridium Update (https://media.ccc.de/v/32c3-7154-iridium_update)


Jahresrückblick des CCC (https://media.ccc.de/v/32c3-7306-jahresruckblick_des_ccc)


Jugend hackt 2015 (https://media.ccc.de/v/32c3-7562-jugend_hackt_2015)


Lessons learned: Freifunk für Geflüchtete (https://media.ccc.de/v/32c3-7230-lessons_learned_freifunk_fur_gefluchtete)


Let's Encrypt -- What launching a free CA looks like (https://media.ccc.de/v/32c3-7528-let_s_encrypt_--_what_launching_a_free_ca_looks_like)


Lightning Talks Day 2 (https://media.ccc.de/v/32c3-7558-lightning_talks_day_2)


Logjam: Diffie-Hellman, discrete logs, the NSA, and you (https://media.ccc.de/v/32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you)


Maker Spaces in Favelas - Lecture (https://media.ccc.de/v/32c3-7540-maker_spaces_in_favelas_-_lecture)


Mobile Censorship in Iran (https://media.ccc.de/v/32c3-7529-mobile_censorship_in_iran)


Net Neutrality in Europe (https://media.ccc.de/v/32c3-7387-net_neutrality_in_europe)


One year of securitarian drift in France (https://media.ccc.de/v/32c3-7423-one_year_of_securitarian_drift_in_france)


Plunge into Proxy Politics (https://media.ccc.de/v/32c3-7570-plunge_into_proxy_politics)


Profiling (In)justice (https://media.ccc.de/v/32c3-7264-profiling_in_justice)


Quantenphysik und Kosmologie (https://media.ccc.de/v/32c3-7525-quantenphysik_und_kosmologie)


Quantum Cryptography (https://media.ccc.de/v/32c3-7305-quantum_cryptography)


Rowhammer.js: Root privileges for web apps? (https://media.ccc.de/v/32c3-7197-rowhammer_js_root_privileges_for_web_apps)


Sanitizing PCAPs (https://media.ccc.de/v/32c3-7294-sanitizing_pcaps)


Sicherheit von 125kHz Transpondern am Beispiel Hitag S (https://media.ccc.de/v/32c3-7166-sicherheit_von_125khz_transpondern_am_beispiel_hit ag_s)


Software and business method patents: call for action (https://media.ccc.de/v/32c3-7283-software_and_business_method_patents_call_for_acti on)


The Perl Jam 2 (https://media.ccc.de/v/32c3-7130-the_perl_jam_2)


The state of Internet Censorship (https://media.ccc.de/v/32c3-7143-the_state_of_internet_censorship)


Unpatchable (https://media.ccc.de/v/32c3-7273-unpatchable)


Verified Firewall Ruleset Verification (https://media.ccc.de/v/32c3-7195-verified_firewall_ruleset_verification)


Wie Jugendschutzprogramme nicht nur die Jugend schädigen (https://media.ccc.de/v/32c3-7415-wie_jugendschutzprogramme_nicht_nur_die_jugend_sch adigen)


29 de diciembre


"Fluxus cannot save the world." (https://media.ccc.de/v/32c3-7421-fluxus_cannot_save_the_world)


#GOIBlocks - Technical observations about recent internet censorship in India (https://media.ccc.de/v/32c3-7263-goiblocks_-_technical_observations_about_recent_internet_cens orship_in_india)


(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale (https://media.ccc.de/v/32c3-7252-in_security_of_embedded_devices_firmware_-_fast_and_furious_at_large_scale)


„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik (https://media.ccc.de/v/32c3-7150-nach_bestem_wissen_und_gewissen_floskeln_in_der_po litik)


20 OSCILLATORS IN 20 MINUTES (https://media.ccc.de/v/32c3-7549-20_oscillators_in_20_minutes)


3D printing on the moon (https://media.ccc.de/v/32c3-7336-3d_printing_on_the_moon)


A Dozen Years of Shellphish (https://media.ccc.de/v/32c3-7218-a_dozen_years_of_shellphish)


Beyond Anti Evil Maid (https://media.ccc.de/v/32c3-7343-beyond_anti_evil_maid)


Building and Breaking Wireless Security (https://media.ccc.de/v/32c3-7119-building_and_breaking_wireless_security)


Check your privileges! (https://media.ccc.de/v/32c3-7284-check_your_privileges)


Computational Meta-Psychology (https://media.ccc.de/v/32c3-7483-computational_meta-psychology)


Craft, leisure, and end-user innovation (https://media.ccc.de/v/32c3-7114-craft_leisure_and_end-user_innovation)


Crypto ist Abwehr, IFG ist Angriff! (https://media.ccc.de/v/32c3-7102-crypto_ist_abwehr_ifg_ist_angriff)


De-anonymizing Programmers (https://media.ccc.de/v/32c3-7491-de-anonymizing_programmers)


Fnord-Jahresrückblick (https://media.ccc.de/v/32c3-7282-fnord-jahresruckblick)


Free Software and Hardware bring National Sovereignty (https://media.ccc.de/v/32c3-7246-free_software_and_hardware_bring_national_sovereig nty)


Gibberish Detection 102 (https://media.ccc.de/v/32c3-7243-gibberish_detection_102)


Graphs, Drones & Phones (https://media.ccc.de/v/32c3-7259-graphs_drones_phones)


Intelexit (https://media.ccc.de/v/32c3-7426-intelexit)


Internet Cube (https://media.ccc.de/v/32c3-7401-internet_cube)


libusb: Maintainer fail (https://media.ccc.de/v/32c3-7547-libusb_maintainer_fail)


Lightning Talks Day 3 (https://media.ccc.de/v/32c3-7559-lightning_talks_day_3)


Media Coverage and the Public in the Surveillance Society (https://media.ccc.de/v/32c3-7388-media_coverage_and_the_public_in_the_surveillance_ society)


Methodisch inkorrekt! (https://media.ccc.de/v/32c3-7221-methodisch_inkorrekt)


Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015 (https://media.ccc.de/v/32c3-7255-neither_snow_nor_rain_nor_mitm_the_state_of_email_ security_in_2015)


On Computing Numbers, with an Application to Problems of our Society (https://media.ccc.de/v/32c3-7419-on_computing_numbers_with_an_application_to_proble ms_of_our_society)


Österreich: Der Kampf gegen unkontrollierte Massenüberwachung (https://media.ccc.de/v/32c3-7413-osterreich_der_kampf_gegen_unkontrollierte_massenu berwachung)


Prediction and Control (https://media.ccc.de/v/32c3-7449-prediction_and_control)


QRtistry (https://media.ccc.de/v/32c3-7310-qrtistry)


re_cycle (https://media.ccc.de/v/32c3-7321-re_cycle)


Reversing UEFI by execution (https://media.ccc.de/v/32c3-7245-reversing_uefi_by_execution)


Safe Harbor (https://media.ccc.de/v/32c3-7513-safe_harbor)


Say hi to your new boss: How algorithms might soon control our lives. (https://media.ccc.de/v/32c3-7482-say_hi_to_your_new_boss_how_algorithms_might_soon_ control_our_lives)


State of the Onion (https://media.ccc.de/v/32c3-7307-state_of_the_onion)


Stromtankstellen – eine neue öffentliche Infrastruktur (https://media.ccc.de/v/32c3-7202-stromtankstellen_eine_neue_offentliche_infrastrukt ur)


Technology and Mass Atrocity Prevention (https://media.ccc.de/v/32c3-7400-technology_and_mass_atrocity_prevention)


Ten years after ‚We Lost The War‘ (https://media.ccc.de/v/32c3-7501-ten_years_after_we_lost_the_war)


The architecture of a street level panopticon (https://media.ccc.de/v/32c3-7374-the_architecture_of_a_street_level_panopticon)


The plain simple reality of entropy (https://media.ccc.de/v/32c3-7441-the_plain_simple_reality_of_entropy)


the possibility of an army (https://media.ccc.de/v/32c3-7517-the_possibility_of_an_army)


The Price Of Dissent (https://media.ccc.de/v/32c3-7443-the_price_of_dissent)


Tor onion services: more useful than you think (https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think)


Trust us and our business will expand! (https://media.ccc.de/v/32c3-7219-trust_us_and_our_business_will_expand)


Vehicle2Vehicle Communication based on IEEE 802.11p (https://media.ccc.de/v/32c3-7165-vehicle2vehicle_communication_based_on_ieee_802_11 p)


30 de diciembre


“I feel like a criminal and I have to be god at the same time” (https://media.ccc.de/v/32c3-7207-i_feel_like_a_criminal_and_i_have_to_be_god_at_the _same_time)


A New Kid on the Block (https://media.ccc.de/v/32c3-7403-a_new_kid_on_the_block)


Breaking Honeypots for Fun and Profit (https://media.ccc.de/v/32c3-7277-breaking_honeypots_for_fun_and_profit)


CHINTERNET ART (https://media.ccc.de/v/32c3-7216-chinternet_art)


Collect It All: Open Source Intelligence (OSINT) for Everyone (https://media.ccc.de/v/32c3-7340-collect_it_all_open_source_intelligence_osint_for_ everyone)


Compileroptimierungen für Forth im Microcontroller (https://media.ccc.de/v/32c3-7520-compileroptimierungen_fur_forth_im_microcontroller )


Crypto Wars Part II (https://media.ccc.de/v/32c3-7386-crypto_wars_part_ii)


Grundrechte gelten nicht im Weltall! (https://media.ccc.de/v/32c3-7225-grundrechte_gelten_nicht_im_weltall)


Hacker Jeopardy (https://media.ccc.de/v/32c3-7152-hacker_jeopardy)


Katastrophe und Kommunikation (https://media.ccc.de/v/32c3-7567-katastrophe_und_kommunikation)


Maritime Robotics (https://media.ccc.de/v/32c3-7265-maritime_robotics)


Microsofts Windows 10 Botnet (https://media.ccc.de/v/32c3-7291-microsofts_windows_10_botnet)


Predicting Crime in a Big Data World (https://media.ccc.de/v/32c3-7457-predicting_crime_in_a_big_data_world)


Replication Prohibited (https://media.ccc.de/v/32c3-7435-replication_prohibited)


Security Nightmares 0x10 (https://media.ccc.de/v/32c3-7546-security_nightmares_0x10)


Sin in the time of Technology (https://media.ccc.de/v/32c3-7286-sin_in_the_time_of_technology)


The Magic World of Searchable Symmetric Encryption (https://media.ccc.de/v/32c3-7333-the_magic_world_of_searchable_symmetric_encryption )


Top X* usability obstacles (https://media.ccc.de/v/32c3-7356-top_x_usability_obstacles)


When algorithms fail in our personal lives (https://media.ccc.de/v/32c3-7497-when_algorithms_fail_in_our_personal_lives)


Wie man einen Blackout verursacht (https://media.ccc.de/v/32c3-7323-wie_man_einen_blackout_verursacht)


Wireless Drivers: Freedom considered harmful? (https://media.ccc.de/v/32c3-7375-wireless_drivers_freedom_considered_harmful)



Fuente: https://media.ccc.de/c/32c3?sort=date