35th Chaos Communication Congress

Your locale preferences have been saved. We like to think that we have excellent support for English in pretalx, but if you encounter issues or errors, please contact us!

The speaker’s profile picture
_Adora_Belle_
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Aiko
  • Die dreckige Empirie
The speaker’s profile picture
Alex Dirksen
  • A Blockchain Picture Book
The speaker’s profile picture
Alexey Osipov
  • Truly cardless: Jackpotting an ATM using auxiliary devices.
The speaker’s profile picture
Amy (itszn)
  • The Layman's Guide to Zero-Day Engineering
The speaker’s profile picture
Andreas Westerwick
  • LibreSilicon
The speaker’s profile picture
Andreea Belu (EDRi)
  • Citzens or subjects? The battle to control our bodies, speech and communications
The speaker’s profile picture
André Lampe
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Andre Meister
  • Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
  • Best of Informationsfreiheit
The speaker’s profile picture
Andy
  • What the flag is CTF?
The speaker’s profile picture
Andy Olsen
  • Kernel Tracing With eBPF
The speaker’s profile picture
Angela Washko
  • Tactical Embodiment
The speaker’s profile picture
Angelika Adensamer
  • Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
The speaker’s profile picture
Anna Biselli
  • Computer, die über Asyl (mit)entscheiden
  • Best of Informationsfreiheit
The speaker’s profile picture
Anne Roth
  • Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen
The speaker’s profile picture
Anni
  • Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
The speaker’s profile picture
Arne Semsrott
  • Court in the Akten
  • Best of Informationsfreiheit
The speaker’s profile picture
Aurélien Francillon
  • Exploring fraud in telephony networks
The speaker’s profile picture
Beata Hubrig
  • Datenschutz für Neulandbürger
The speaker’s profile picture
Ben Cartwright-Cox
  • A deep dive into the world of DOS viruses
The speaker’s profile picture
Benjamin Kollenda
  • Inside the AMD Microcode ROM
The speaker’s profile picture
Benjamin Wand
  • Open Source Orgelbau
The speaker’s profile picture
Ben Parsons from Matrix
  • Matrix, the current status and year to date
The speaker’s profile picture
Ben Senior
  • Hacking how we see
The speaker’s profile picture
bigalex
  • Lightning Talks Day 2
  • Lightning Talks Day 3
  • Lightning Talks Day 4
The speaker’s profile picture
breakthesystem
  • The Mars Rover On-board Computer
The speaker’s profile picture
bücherratten
  • Butterbrotdosen-Smartphone
The speaker’s profile picture
bunnie
  • Snakes and Rabbits - How CCC shaped an open hardware success
The speaker’s profile picture
Carlo Meijer
  • Self-encrypting deception
The speaker’s profile picture
Caro Keller (NSU-Watch)
  • "Das ist mir nicht erinnerlich." − Der NSU-Komplex heute
The speaker’s profile picture
Carsten Bittrich
  • Conquering Large Numbers at the LHC
The speaker’s profile picture
Christian Zenger
  • Enclosure-PUF
The speaker’s profile picture
Christine Spindler
  • MicroPython – Python for Microcontrollers
The speaker’s profile picture
Christopher Weatherhead
  • How Facebook tracks you on Android
The speaker’s profile picture
Claudia Frick - @FuzzyLeapfrog
  • Locked up science
The speaker’s profile picture
Claudio Agosti
  • Analyze the Facebook algorithm and reclaim data sovereignty
The speaker’s profile picture
Claudio Canella
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Clifford Wolf
  • The nextpnr FOSS FPGA place-and-route tool
The speaker’s profile picture
Coco Sollfrank
  • A la recherche de l'information perdue
The speaker’s profile picture
Constanze Kurz
  • Polizeigesetze
  • Jahresrückblick des CCC 2018
  • Microtargeting und Manipulation
The speaker’s profile picture
Dagmar Krefting
  • Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
The speaker’s profile picture
Damon McCoy
  • Explaining Online US Political Advertising
The speaker’s profile picture
Daniel Gruss
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Davee
  • Viva la Vita Vida
The speaker’s profile picture
David Holin
  • Enclosure-PUF
The speaker’s profile picture
David Stainton
  • Introducing the katzenpost mix network system
The speaker’s profile picture
dia
  • C2X: The television will not be revolutionized.
The speaker’s profile picture
Diego Naranjo (EDRi)
  • Citzens or subjects? The battle to control our bodies, speech and communications
The speaker’s profile picture
Dieter Kranzlmueller
  • SuperMUC-NG
The speaker’s profile picture
DISNOVATION.ORG
  • DISNOVATION.ORG
The speaker’s profile picture
djb
  • The year in post-quantum crypto
The speaker’s profile picture
Dmitry Nedospasov
  • wallet.fail
The speaker’s profile picture
domenukk
  • Mehr schlecht als Recht: Grauzone Sicherheitsforschung
The speaker’s profile picture
Dr Dade Murphy
  • Inside the Fake Science Factories
The speaker’s profile picture
Dustin Hoffmann
  • Die EU und ihre Institutionen
The speaker’s profile picture
Elke Manz
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Em O'Sullivan
  • Feminist Perspectives
The speaker’s profile picture
erdgeist
  • Jahresrückblick des CCC 2018
The speaker’s profile picture
Eric Sesterhenn
  • In Soviet Russia Smart Card Hacks You
The speaker’s profile picture
Eyal Itkin
  • What The Fax?!
The speaker’s profile picture
F.
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
Fabian Franzen
  • Mehr schlecht als Recht: Grauzone Sicherheitsforschung
The speaker’s profile picture
Felix Just
  • Projekt Hannah
The speaker’s profile picture
FJW
  • Provable Security
The speaker’s profile picture
Florian
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
Florian Euchner (Jeija)
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
frank
  • Jahresrückblick des CCC 2018
  • Security Nightmares 0x13
  • Hackerethik - eine Einführung
The speaker’s profile picture
Fraxinas
  • Repair-Cafés
The speaker’s profile picture
Frédéric Vachon
  • First Sednit UEFI Rootkit Unveiled
The speaker’s profile picture
Frederike Kaltheuner
  • How Facebook tracks you on Android
The speaker’s profile picture
Friederike
  • Digital Airwaves
The speaker’s profile picture
fuzzle/fr
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
gedsic
  • Lightning Talks Day 2
  • Lightning Talks Day 3
  • Lightning Talks Day 4
The speaker’s profile picture
Geraldine de Bastion
  • Feminist Perspectives
The speaker’s profile picture
Guy Standing
  • The Precariat: A Disruptive Class for Disruptive Times.
The speaker’s profile picture
hammes hacks
  • Artistic PCB Design and Fabrication
The speaker’s profile picture
Hannes Mehnert
  • Transmission Control Protocol
  • Domain Name System
The speaker’s profile picture
hanno
  • The Rocky Road to TLS 1.3 and better Internet Encryption
The speaker’s profile picture
Hans-Christoph Steiner
  • Wind: Off-Grid Services for Everyday People
The speaker’s profile picture
Hong Phuc Dang
  • Feminist Perspectives
The speaker’s profile picture
honky
  • Hebocon
The speaker’s profile picture
hsank
  • LibreSilicon
The speaker’s profile picture
Ilja van Sprundel
  • Memsad
The speaker’s profile picture
Ingo Dachwitz
  • Microtargeting und Manipulation
The speaker’s profile picture
j0nathanj
  • From Zero to Zero Day
The speaker’s profile picture
J. Alex Halderman
  • Election Cybersecurity Progress Report
The speaker’s profile picture
JAN BERGER
  • Never Forgetti
The speaker’s profile picture
Jan Garcia
  • Circumventing video identification using augmented reality
The speaker’s profile picture
Janina Abels
  • The foodsaving grassroots movement
The speaker’s profile picture
Jan Kalbitzer
  • (Cyber-)Stalking: Wenn Grenzen verschwimmen
The speaker’s profile picture
Jannik Beyerstedt
  • Open Source Orgelbau
The speaker’s profile picture
Jeff Dileo
  • Kernel Tracing With eBPF
The speaker’s profile picture
Jeffrey Alan Scudder
  • Radical Digital Painting
The speaker’s profile picture
Jeffrey Scudder
  • Radical Digital Painting
The speaker’s profile picture
jiska
  • Dissecting Broadcom Bluetooth
The speaker’s profile picture
Joana Chicau
  • A WebPage in Three Acts
The speaker’s profile picture
Jonathan Jacobi
  • From Zero to Zero Day
The speaker’s profile picture
Joscha
  • The Ghost in the Machine
The speaker’s profile picture
Josh Datko
  • wallet.fail
The speaker’s profile picture
Jost Migenda
  • Going Deep Underground to Watch the Stars
The speaker’s profile picture
Judith Okonkwo
  • Reality Check! Basel/Lagos?? In virtual reality?
The speaker’s profile picture
jule
  • Mondnacht
The speaker’s profile picture
Jule Torhorst
  • Mondnacht
The speaker’s profile picture
Julian
  • Venenerkennung hacken
The speaker’s profile picture
Jürgen Pahle
  • Information Biology - Investigating the information flow in living systems
The speaker’s profile picture
Jurre van Bergen
  • No evidence of communication and morality in protocols: Off-the-Record protocol version 4
The speaker’s profile picture
KaLeiMai
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Karim Ben Khelifa
  • The Enemy
The speaker’s profile picture
Katharina Nocun
  • Archäologische Studien im Datenmüll
The speaker’s profile picture
Kay Voges
  • Theater und Quantenzeitalter
The speaker’s profile picture
Kévin Redon
  • 35C3 Infrastructure Review
The speaker’s profile picture
Kire
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Klaus Landefeld
  • G10, BND-Gesetz und der effektive Schutz vor Grundrechten
  • Electronic Evicence in Criminal Matters
The speaker’s profile picture
kmc
  • Cat & Mouse: Evading the Censors in 2018
The speaker’s profile picture
Korina Winter
  • (Cyber-)Stalking: Wenn Grenzen verschwimmen
The speaker’s profile picture
Kristin Pietrzyk
  • Verhalten bei Hausdurchsuchungen
The speaker’s profile picture
Kurt Opsahl
  • It Always Feels Like the Five Eyes Are Watching You
The speaker’s profile picture
Lars Steinschulte
  • Enclosure-PUF
The speaker’s profile picture
Lena Mohr
  • Feminist Perspectives
The speaker’s profile picture
Leon
  • 35C3 Infrastructure Review
The speaker’s profile picture
Leonhard Dobusch
  • Chaos im Fernsehrat
The speaker’s profile picture
Leonid Evdokimov (darkk)
  • Russia vs. Telegram: technical notes on the battle
The speaker’s profile picture
Le RESET, feminist hackerspace
  • Feminist Perspectives
The speaker’s profile picture
Letty
  • Archäologische Studien im Datenmüll
The speaker’s profile picture
leviathan
  • LibreSilicon
The speaker’s profile picture
Liat_Grayver
  • Transhuman Expression
The speaker’s profile picture
Lina
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Lina Hurlin
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Linus Neumann
  • Jahresrückblick des CCC 2018
  • Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
The speaker’s profile picture
LorenzAdlung
  • Hacking the Human Microbiome
The speaker’s profile picture
Lucas Pleß
  • Theater und Quantenzeitalter
The speaker’s profile picture
Lukas
  • Provable Security
The speaker’s profile picture
mantz
  • Dissecting Broadcom Bluetooth
The speaker’s profile picture
Manuel Aiple
  • Modeling and Simulation of Physical Systems for Hobbyists
The speaker’s profile picture
Marie Bröckling
  • Polizeigesetze
The speaker’s profile picture
Mario Simon
  • Theater und Quantenzeitalter
The speaker’s profile picture
Marius Musch
  • Web-based Cryptojacking in the Wild
The speaker’s profile picture
Mark Lechtik
  • SiliVaccine: North Korea's Weapon of Mass Detection
The speaker’s profile picture
Markus Beckedahl
  • Netzpolitischer Wetterbericht 2018
The speaker’s profile picture
Markus Gaasedelen
  • The Layman's Guide to Zero-Day Engineering
The speaker’s profile picture
Martin Sonneborn
  • Meine Abenteuer im EU-Parlament
The speaker’s profile picture
Martin Steiger
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Martin Tschirsich
  • All Your Gesundheitsakten Are Belong To Us
The speaker’s profile picture
Martin Vigo
  • Compromising online accounts by cracking voicemail systems
The speaker’s profile picture
Matthias Kubisch
  • Projekt Hannah
The speaker’s profile picture
Matthias Monroy
  • Frontex: Der europäische Grenzgeheimdienst
The speaker’s profile picture
maxb
  • Sneaking In Network Security
The speaker’s profile picture
Maximilian Burkhardt
  • Sneaking In Network Security
The speaker’s profile picture
Merve Sahin
  • Exploring fraud in telephony networks
The speaker’s profile picture
Michael Schwarz
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Michael Steigerwald
  • Smart Home - Smart Hack
The speaker’s profile picture
Mike Sperber
  • How to teach programming to your loved ones
  • A farewell to soul-crushing code
The speaker’s profile picture
Moritz Lipp
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
mp_ttaa
  • The Urban Organism
The speaker’s profile picture
nedwill
  • Attacking Chrome IPC
The speaker’s profile picture
nexus
  • Jahresrückblick des CCC 2018
The speaker’s profile picture
Nick sellen
  • The foodsaving grassroots movement
The speaker’s profile picture
Nico
  • Updates von der europäischen Außengrenze
The speaker’s profile picture
Nicole Rauch
  • A farewell to soul-crushing code
The speaker’s profile picture
Nico Semsrott
  • Freude ist nur ein Mangel an Information
The speaker’s profile picture
Nikita Tarakanov
  • Exploiting Kernel Memory Corruptions on Microsoft Windows 10 RedStone 5
The speaker’s profile picture
Nina Gassmann
  • Updates von der europäischen Außengrenze
The speaker’s profile picture
Nora Markard
  • Freedom needs fighters!
The speaker’s profile picture
Noujoum
  • Mind the Trap: Die Netzpolitik der AfD im Bundestag
The speaker’s profile picture
Olga Kochetova
  • Truly cardless: Jackpotting an ATM using auxiliary devices.
The speaker’s profile picture
Patrick "packi" Stählin
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Paul Emmerich
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Peter Hornung
  • Inside the Fake Science Factories
The speaker’s profile picture
Peter Schmidt
  • Die verborgene Seite des Mobilfunks
The speaker’s profile picture
Peter Sewell
  • Taming the Chaos: Can we build systems that actually work?
The speaker’s profile picture
Peter Stuge
  • How does the Internet work?
The speaker’s profile picture
Philipp Busch
  • Simulating Universes
The speaker’s profile picture
Philipp Koppe
  • Inside the AMD Microcode ROM
The speaker’s profile picture
Polaris
  • Are machines feminine?
The speaker’s profile picture
preip
  • Augmented Reality: Bridging the gap between the physical and the digital world
The speaker’s profile picture
qbi
  • Verhalten bei Hausdurchsuchungen
The speaker’s profile picture
Rainer Rehak
  • Was schützt eigentlich der Datenschutz?
  • Best of Informationsfreiheit
The speaker’s profile picture
Rama Thiaw
  • C2X: The television will not be revolutionized.
The speaker’s profile picture
Reclaim Club Culture
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Regina M. Sipos
  • The Critical Making Movement
The speaker’s profile picture
Régine Debatty
  • The good, the strange and the ugly in 2018 art &tech
The speaker’s profile picture
Ricardo Ruiz
  • The Critical Making Movement
The speaker’s profile picture
Robert Clausen
  • Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht
The speaker’s profile picture
Robert Tibbo
  • The Surveillance State limited by acts of courage and conscience
The speaker’s profile picture
Ron
  • Security Nightmares 0x13
The speaker’s profile picture
Rosa Rave
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Rosa Rave*
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Roya Ensafi
  • Censored Planet: a Global Censorship Observatory
The speaker’s profile picture
rufus
  • Opening Event
  • Closing Event
The speaker’s profile picture
Saad Chinoy
  • The Critical Making Movement
The speaker’s profile picture
Saar Amar
  • Modern Windows Userspace Exploitation
The speaker’s profile picture
Sabio
  • Media Disruption Led By The Blind
The speaker’s profile picture
Sai
  • Sense without sight: a crash course on #BlindNavigation
The speaker’s profile picture
Samuel Brinkmann
  • Kickstart the Chaos: Hackerspace gründen für Anfänger
The speaker’s profile picture
Sandra Trostel
  • All Creatures Welcome
The speaker’s profile picture
Sarah Hiltner
  • How medicine discovered sex
The speaker’s profile picture
Sara Konrad
  • Let's reverse engineer the Universe
The speaker’s profile picture
Schmidt
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Sebastian Jünemann
  • Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
The speaker’s profile picture
Sebastian Schinzel
  • Attacking end-to-end email encryption
The speaker’s profile picture
Sebastian Voit
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Sélim Harbi
  • Afroroutes: Africa Elsewhere
The speaker’s profile picture
Sergey Gordeychik
  • SD-WAN a New Hop
The speaker’s profile picture
Simon Ellmann
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Sofia Celi
  • No evidence of communication and morality in protocols: Off-the-Record protocol version 4
The speaker’s profile picture
Sophie Hiltner
  • How medicine discovered sex
The speaker’s profile picture
sri
  • Quantum Mechanics
The speaker’s profile picture
st
  • Wallet Security
The speaker’s profile picture
starbug
  • Venenerkennung hacken
The speaker’s profile picture
Stefanie Todt
  • Conquering Large Numbers at the LHC
The speaker’s profile picture
Steffen Arora
  • The Surveillance State limited by acts of courage and conscience
The speaker’s profile picture
Stephan Verbücheln
  • Wallet Security
The speaker’s profile picture
STG
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
@sveckert
  • Inside the Fake Science Factories
The speaker’s profile picture
sven
  • Space Ops 101
The speaker’s profile picture
swaio
  • Internet, the Business Side
The speaker’s profile picture
Tammo Messow
  • Mondnacht
The speaker’s profile picture
Tammo.messow@posteo.de
  • Mondnacht
The speaker’s profile picture
Tanja Lange
  • The year in post-quantum crypto
The speaker’s profile picture
tedix@gmx.net
  • Mondnacht
The speaker’s profile picture
Ted Siegert
  • Mondnacht
The speaker’s profile picture
teubi
  • Introduction to Deep Learning
The speaker’s profile picture
Theodor Sperlea
  • Hacking Ecology
The speaker’s profile picture
Thies Mynther
  • All Creatures Welcome
The speaker’s profile picture
Thomas Lohninger
  • Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
The speaker’s profile picture
Thomas Roth
  • wallet.fail
The speaker’s profile picture
Thorben Dittmar
  • Kickstart the Chaos: Hackerspace gründen für Anfänger
  • Chaos Communication Slam
The speaker’s profile picture
Thorsten Schröder
  • Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
The speaker’s profile picture
tihmstar
  • Jailbreaking iOS
The speaker’s profile picture
@tillkrause
  • Inside the Fake Science Factories
The speaker’s profile picture
Tilmann Becker
  • The foodsaving grassroots movement
The speaker’s profile picture
Tim 'mithro' Ansell
  • Snakes and Rabbits - How CCC shaped an open hardware success
  • SymbiFlow - Finally the GCC of FPGAs!
The speaker’s profile picture
Tobias 'tester' Kunze
  • Opening Event
  • Closing Event
The speaker’s profile picture
Toni
  • "The" Social Credit System
The speaker’s profile picture
Trammell Hudson
  • Modchips of the State
The speaker’s profile picture
Trollofix
  • Planes and Ships and Saving Lives
The speaker’s profile picture
Ulf Buermeyer
  • Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
  • Freedom needs fighters!
The speaker’s profile picture
Werner Schober
  • Internet of Dongs
The speaker’s profile picture
Xenia
  • A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation
The speaker’s profile picture
Yaniv Balmas
  • What The Fax?!
The speaker’s profile picture
Yann Leretaille
  • What is Good Technology?
The speaker’s profile picture
Yifan Lu
  • Viva la Vita Vida
The speaker’s profile picture
zaolin
  • Open Source Firmware
The speaker’s profile picture
Zenna / zelf
  • Scuttlebutt