Hablaros del Chaos Computer Club (aka CCC) es hablaros de la historia viva del hacking, la mayor asociación de hackers de Europa que fue fundada en Berlín el 12 de septiembre de 1981.

Desde 1984 entre nochebuena y nochevieja organizan el Chaos Communication Congress y en su 32 edición de 2015 volvían a celebrarlo en Hamburgo bajo el lema "Gated Communities".

Durante los días del congreso, desde bien temprano y hasta madrugada se impartieron numerosas charlas (en inglés y en alemán) y talleres que no os podéis perder:

27 de diciembre
A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
Beyond your cable modem
Console Hacking
Datahavens from HavenCo to Today
Hacking EU funding for a decentralizing FOSS project
Hardware-Trojaner in Security-Chips
How the Great Firewall discovers hidden circumvention servers
Internet Landscapes
Key-logger, Video, Mouse
Lifting the Fog on Red Star OS
My Robot Will Crush You With Its Soft Delicate Hands!
Netzpolitik in der Schweiz
New memory corruption attacks: why can't we have nice things?
NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen
Opening Event
Public Library/Memory of the World
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
Running your own 3G/3.5G network
Shooting lasers into space – for science!
So you want to build a satellite?
The exhaust emissions scandal („Dieselgate“)
The Great Train Cyber Robbery
The mummy unwrapped
The Ultimate Amiga 500 Talk
Thunderstrike 2
Towards (reasonably) trustworthy x86 laptops
What does Big Brother see, while he is watching?
What is the value of anonymous communication?
When hardware must „just work“
Windows drivers attack surface
28 de diciembre
(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking
All Our Shared Spectrum Are Belong to Us
apertus° AXIOM
Cyber all the Wassenaars
Das Zahnrad aus Fleisch
Dissecting VoLTE
Ecuador: how an authoritarian government is fooling the entire world
Ein Abgrund von Landesverrat
Evolution of Brain-Computer Interfaces
goto fail;
Hardsploit: A Metasploit-like tool for hardware hacking
Household, Totalitarianism and Cyberspace
How hackers grind an MMORPG: by taking it apart!
Iridium Update
Jahresrückblick des CCC
Jugend hackt 2015
Lessons learned: Freifunk für Geflüchtete
Let's Encrypt -- What launching a free CA looks like
Lightning Talks Day 2
Logjam: Diffie-Hellman, discrete logs, the NSA, and you
Maker Spaces in Favelas - Lecture
Mobile Censorship in Iran
Net Neutrality in Europe
One year of securitarian drift in France
Plunge into Proxy Politics
Profiling (In)justice
Quantenphysik und Kosmologie
Quantum Cryptography
Rowhammer.js: Root privileges for web apps?
Sanitizing PCAPs
Sicherheit von 125kHz Transpondern am Beispiel Hitag S
Software and business method patents: call for action
The Perl Jam 2
The state of Internet Censorship
Verified Firewall Ruleset Verification
Wie Jugendschutzprogramme nicht nur die Jugend schädigen
29 de diciembre
"Fluxus cannot save the world."
#GOIBlocks - Technical observations about recent internet censorship in India
(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale
„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
3D printing on the moon
A Dozen Years of Shellphish
Beyond Anti Evil Maid
Building and Breaking Wireless Security
Check your privileges!
Computational Meta-Psychology
Craft, leisure, and end-user innovation
Crypto ist Abwehr, IFG ist Angriff!
De-anonymizing Programmers
Free Software and Hardware bring National Sovereignty
Gibberish Detection 102
Graphs, Drones & Phones
Internet Cube
libusb: Maintainer fail
Lightning Talks Day 3
Media Coverage and the Public in the Surveillance Society
Methodisch inkorrekt!
Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015
On Computing Numbers, with an Application to Problems of our Society
Österreich: Der Kampf gegen unkontrollierte Massenüberwachung
Prediction and Control
Reversing UEFI by execution
Safe Harbor
Say hi to your new boss: How algorithms might soon control our lives.
State of the Onion
Stromtankstellen – eine neue öffentliche Infrastruktur
Technology and Mass Atrocity Prevention
Ten years after ‚We Lost The War‘
The architecture of a street level panopticon
The plain simple reality of entropy
the possibility of an army
The Price Of Dissent
Tor onion services: more useful than you think
Trust us and our business will expand!
Vehicle2Vehicle Communication based on IEEE 802.11p
30 de diciembre
“I feel like a criminal and I have to be god at the same time”
A New Kid on the Block
Breaking Honeypots for Fun and Profit
Collect It All: Open Source Intelligence (OSINT) for Everyone
Compileroptimierungen für Forth im Microcontroller
Crypto Wars Part II
Grundrechte gelten nicht im Weltall!
Hacker Jeopardy
Katastrophe und Kommunikation
Maritime Robotics
Microsofts Windows 10 Botnet
Predicting Crime in a Big Data World
Replication Prohibited
Security Nightmares 0x10
Sin in the time of Technology
The Magic World of Searchable Symmetric Encryption
Top X* usability obstacles
When algorithms fail in our personal lives
Wie man einen Blackout verursacht
Wireless Drivers: Freedom considered harmful?

Fuente: https://media.ccc.de/c/32c3?sort=date