Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

39C3: To sign or not to sign: Practical vulnerabilities in GPG & friends

39C3: Power Cycles- media.ccc.de

39C3: Power Cycles Streaming

Who Cares about the Baltic Jammer? Terrestrial Navigation in Baltic Sea Region [video]

All my Deutschlandtickets gone: Fraud at an industrial scale [video]

A Tale of Two Leaks: How Hackers Breached the Great Firewall of China [video]

Opencoil – appropriating inductive charging pads in the wild (2020) [video]

Live-Streams from All Systems Go! 2025

How to rig elections [video]

WHY2025: How to become your own ISP [video]

Sound Chip, whisper me your secrets [video]

Onion Services: Design, Protocol and Implementation

Gulaschprogrammiernacht 23

Rivulet: An esolang inspired by calligraphy && code [video]

Low cost, high speed data acquisition over HDMI [video]

Data Compression Nerds Hate This One Trick [video]

Sixos: A nix OS without systemd [video]

The Game Boy Talk [video]

Hacking into Apple's new USB-C Controller [video]

Hacking yourself a satellite – recovering BEESAT-1 [video]

38C3: Illegal Instructions

Opt Green: Coordinating a Windows 10-to-Linux upcycling campaign across Free Software communities worldwide

Liberating Wi-Fi on the ESP32 [video]

From Pegasus to Predator – The evolution of commercial spyware on iOS [video]

BioTerrorism Will Save Your Life with the 4 Thieves Vinegar Collective [video]

38C3: Illegal Instructions Streaming

From Pegasus to Predator – The evolution of commercial spyware on iOS [video]

Breaking the Mirror – A Look at Apple's New iPhone Remote Control Feature [video]

We've not been trained for this: life after the Newag DRM disclosure [video]

7 Years Later: Why and How to Make Portable Open Hardware Computers (Relive) [video]

More →