35th Chaos Communication Congress

The speaker’s profile picture
_Adora_Belle_
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Aiko
  • Die dreckige Empirie
The speaker’s profile picture
Alex Dirksen
  • A Blockchain Picture Book
The speaker’s profile picture
Alexey Osipov
  • Truly cardless: Jackpotting an ATM using auxiliary devices.
The speaker’s profile picture
Amy (itszn)
  • The Layman's Guide to Zero-Day Engineering
The speaker’s profile picture
Andreas Westerwick
  • LibreSilicon
The speaker’s profile picture
Andreea Belu (EDRi)
  • Citzens or subjects? The battle to control our bodies, speech and communications
The speaker’s profile picture
André Lampe
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Andre Meister
  • Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
  • Best of Informationsfreiheit
The speaker’s profile picture
Andy
  • What the flag is CTF?
The speaker’s profile picture
Andy Olsen
  • Kernel Tracing With eBPF
The speaker’s profile picture
Angela Washko
  • Tactical Embodiment
The speaker’s profile picture
Angelika Adensamer
  • Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
The speaker’s profile picture
Anna Biselli
  • Computer, die über Asyl (mit)entscheiden
  • Best of Informationsfreiheit
The speaker’s profile picture
Anne Roth
  • Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen
The speaker’s profile picture
Anni
  • Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
The speaker’s profile picture
Arne Semsrott
  • Court in the Akten
  • Best of Informationsfreiheit
The speaker’s profile picture
Aurélien Francillon
  • Exploring fraud in telephony networks
The speaker’s profile picture
Beata Hubrig
  • Datenschutz für Neulandbürger
The speaker’s profile picture
Ben Cartwright-Cox
  • A deep dive into the world of DOS viruses
The speaker’s profile picture
Benjamin Kollenda
  • Inside the AMD Microcode ROM
The speaker’s profile picture
Benjamin Wand
  • Open Source Orgelbau
The speaker’s profile picture
Ben Parsons from Matrix
  • Matrix, the current status and year to date
The speaker’s profile picture
Ben Senior
  • Hacking how we see
The speaker’s profile picture
bigalex
  • Lightning Talks Day 2
  • Lightning Talks Day 3
  • Lightning Talks Day 4
The speaker’s profile picture
breakthesystem
  • The Mars Rover On-board Computer
The speaker’s profile picture
bücherratten
  • Butterbrotdosen-Smartphone
The speaker’s profile picture
bunnie
  • Snakes and Rabbits - How CCC shaped an open hardware success
The speaker’s profile picture
Carlo Meijer
  • Self-encrypting deception
The speaker’s profile picture
Caro Keller (NSU-Watch)
  • "Das ist mir nicht erinnerlich." − Der NSU-Komplex heute
The speaker’s profile picture
Carsten Bittrich
  • Conquering Large Numbers at the LHC
The speaker’s profile picture
Christian Zenger
  • Enclosure-PUF
The speaker’s profile picture
Christine Spindler
  • MicroPython – Python for Microcontrollers
The speaker’s profile picture
Christopher Weatherhead
  • How Facebook tracks you on Android
The speaker’s profile picture
Claudia Frick - @FuzzyLeapfrog
  • Locked up science
The speaker’s profile picture
Claudio Agosti
  • Analyze the Facebook algorithm and reclaim data sovereignty
The speaker’s profile picture
Claudio Canella
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Clifford Wolf
  • The nextpnr FOSS FPGA place-and-route tool
The speaker’s profile picture
Coco Sollfrank
  • A la recherche de l'information perdue
The speaker’s profile picture
Constanze Kurz
  • Polizeigesetze
  • Jahresrückblick des CCC 2018
  • Microtargeting und Manipulation
The speaker’s profile picture
Dagmar Krefting
  • Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
The speaker’s profile picture
Damon McCoy
  • Explaining Online US Political Advertising
The speaker’s profile picture
Daniel Gruss
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Davee
  • Viva la Vita Vida
The speaker’s profile picture
David Holin
  • Enclosure-PUF
The speaker’s profile picture
David Stainton
  • Introducing the katzenpost mix network system
The speaker’s profile picture
dia
  • C2X: The television will not be revolutionized.
The speaker’s profile picture
Diego Naranjo (EDRi)
  • Citzens or subjects? The battle to control our bodies, speech and communications
The speaker’s profile picture
Dieter Kranzlmueller
  • SuperMUC-NG
The speaker’s profile picture
DISNOVATION.ORG
  • DISNOVATION.ORG
The speaker’s profile picture
djb
  • The year in post-quantum crypto
The speaker’s profile picture
Dmitry Nedospasov
  • wallet.fail
The speaker’s profile picture
domenukk
  • Mehr schlecht als Recht: Grauzone Sicherheitsforschung
The speaker’s profile picture
Dr Dade Murphy
  • Inside the Fake Science Factories
The speaker’s profile picture
Dustin Hoffmann
  • Die EU und ihre Institutionen
The speaker’s profile picture
Elke Manz
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Em O'Sullivan
  • Feminist Perspectives
The speaker’s profile picture
erdgeist
  • Jahresrückblick des CCC 2018
The speaker’s profile picture
Eric Sesterhenn
  • In Soviet Russia Smart Card Hacks You
The speaker’s profile picture
Eyal Itkin
  • What The Fax?!
The speaker’s profile picture
F.
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
Fabian Franzen
  • Mehr schlecht als Recht: Grauzone Sicherheitsforschung
The speaker’s profile picture
Felix Just
  • Projekt Hannah
The speaker’s profile picture
FJW
  • Provable Security
The speaker’s profile picture
Florian
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
Florian Euchner (Jeija)
  • Hunting the Sigfox: Wireless IoT Network Security
The speaker’s profile picture
frank
  • Jahresrückblick des CCC 2018
  • Security Nightmares 0x13
  • Hackerethik - eine Einführung
The speaker’s profile picture
Fraxinas
  • Repair-Cafés
The speaker’s profile picture
Frédéric Vachon
  • First Sednit UEFI Rootkit Unveiled
The speaker’s profile picture
Frederike Kaltheuner
  • How Facebook tracks you on Android
The speaker’s profile picture
Friederike
  • Digital Airwaves
The speaker’s profile picture
fuzzle/fr
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
gedsic
  • Lightning Talks Day 2
  • Lightning Talks Day 3
  • Lightning Talks Day 4
The speaker’s profile picture
Geraldine de Bastion
  • Feminist Perspectives
The speaker’s profile picture
Guy Standing
  • The Precariat: A Disruptive Class for Disruptive Times.
The speaker’s profile picture
hammes hacks
  • Artistic PCB Design and Fabrication
The speaker’s profile picture
Hannes Mehnert
  • Transmission Control Protocol
  • Domain Name System
The speaker’s profile picture
hanno
  • The Rocky Road to TLS 1.3 and better Internet Encryption
The speaker’s profile picture
Hans-Christoph Steiner
  • Wind: Off-Grid Services for Everyday People
The speaker’s profile picture
Hong Phuc Dang
  • Feminist Perspectives
The speaker’s profile picture
honky
  • Hebocon
The speaker’s profile picture
hsank
  • LibreSilicon
The speaker’s profile picture
Ilja van Sprundel
  • Memsad
The speaker’s profile picture
Ingo Dachwitz
  • Microtargeting und Manipulation
The speaker’s profile picture
j0nathanj
  • From Zero to Zero Day
The speaker’s profile picture
J. Alex Halderman
  • Election Cybersecurity Progress Report
The speaker’s profile picture
JAN BERGER
  • Never Forgetti
The speaker’s profile picture
Jan Garcia
  • Circumventing video identification using augmented reality
The speaker’s profile picture
Janina Abels
  • The foodsaving grassroots movement
The speaker’s profile picture
Jan Kalbitzer
  • (Cyber-)Stalking: Wenn Grenzen verschwimmen
The speaker’s profile picture
Jannik Beyerstedt
  • Open Source Orgelbau
The speaker’s profile picture
Jeff Dileo
  • Kernel Tracing With eBPF
The speaker’s profile picture
Jeffrey Alan Scudder
  • Radical Digital Painting
The speaker’s profile picture
Jeffrey Scudder
  • Radical Digital Painting
The speaker’s profile picture
jiska
  • Dissecting Broadcom Bluetooth
The speaker’s profile picture
Joana Chicau
  • A WebPage in Three Acts
The speaker’s profile picture
Jonathan Jacobi
  • From Zero to Zero Day
The speaker’s profile picture
Joscha
  • The Ghost in the Machine
The speaker’s profile picture
Josh Datko
  • wallet.fail
The speaker’s profile picture
Jost Migenda
  • Going Deep Underground to Watch the Stars
The speaker’s profile picture
Judith Okonkwo
  • Reality Check! Basel/Lagos?? In virtual reality?
The speaker’s profile picture
jule
  • Mondnacht
The speaker’s profile picture
Jule Torhorst
  • Mondnacht
The speaker’s profile picture
Julian
  • Venenerkennung hacken
The speaker’s profile picture
Jürgen Pahle
  • Information Biology - Investigating the information flow in living systems
The speaker’s profile picture
Jurre van Bergen
  • No evidence of communication and morality in protocols: Off-the-Record protocol version 4
The speaker’s profile picture
KaLeiMai
  • Genom-Editierung mit CRISPR/Cas
The speaker’s profile picture
Karim Ben Khelifa
  • The Enemy
The speaker’s profile picture
Katharina Nocun
  • Archäologische Studien im Datenmüll
The speaker’s profile picture
Kay Voges
  • Theater und Quantenzeitalter
The speaker’s profile picture
Kévin Redon
  • 35C3 Infrastructure Review
The speaker’s profile picture
Kire
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Klaus Landefeld
  • G10, BND-Gesetz und der effektive Schutz vor Grundrechten
  • Electronic Evicence in Criminal Matters
The speaker’s profile picture
kmc
  • Cat & Mouse: Evading the Censors in 2018
The speaker’s profile picture
Korina Winter
  • (Cyber-)Stalking: Wenn Grenzen verschwimmen
The speaker’s profile picture
Kristin Pietrzyk
  • Verhalten bei Hausdurchsuchungen
The speaker’s profile picture
Kurt Opsahl
  • It Always Feels Like the Five Eyes Are Watching You
The speaker’s profile picture
Lars Steinschulte
  • Enclosure-PUF
The speaker’s profile picture
Lena Mohr
  • Feminist Perspectives
The speaker’s profile picture
Leon
  • 35C3 Infrastructure Review
The speaker’s profile picture
Leonhard Dobusch
  • Chaos im Fernsehrat
The speaker’s profile picture
Leonid Evdokimov (darkk)
  • Russia vs. Telegram: technical notes on the battle
The speaker’s profile picture
Le RESET, feminist hackerspace
  • Feminist Perspectives
The speaker’s profile picture
Letty
  • Archäologische Studien im Datenmüll
The speaker’s profile picture
leviathan
  • LibreSilicon
The speaker’s profile picture
Liat_Grayver
  • Transhuman Expression
The speaker’s profile picture
Lina
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Lina Hurlin
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Linus Neumann
  • Jahresrückblick des CCC 2018
  • Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
The speaker’s profile picture
LorenzAdlung
  • Hacking the Human Microbiome
The speaker’s profile picture
Lucas Pleß
  • Theater und Quantenzeitalter
The speaker’s profile picture
Lukas
  • Provable Security
The speaker’s profile picture
mantz
  • Dissecting Broadcom Bluetooth
The speaker’s profile picture
Manuel Aiple
  • Modeling and Simulation of Physical Systems for Hobbyists
The speaker’s profile picture
Marie Bröckling
  • Polizeigesetze
The speaker’s profile picture
Mario Simon
  • Theater und Quantenzeitalter
The speaker’s profile picture
Marius Musch
  • Web-based Cryptojacking in the Wild
The speaker’s profile picture
Mark Lechtik
  • SiliVaccine: North Korea's Weapon of Mass Detection
The speaker’s profile picture
Markus Beckedahl
  • Netzpolitischer Wetterbericht 2018
The speaker’s profile picture
Markus Gaasedelen
  • The Layman's Guide to Zero-Day Engineering
The speaker’s profile picture
Martin Sonneborn
  • Meine Abenteuer im EU-Parlament
The speaker’s profile picture
Martin Steiger
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Martin Tschirsich
  • All Your Gesundheitsakten Are Belong To Us
The speaker’s profile picture
Martin Vigo
  • Compromising online accounts by cracking voicemail systems
The speaker’s profile picture
Matthias Kubisch
  • Projekt Hannah
The speaker’s profile picture
Matthias Monroy
  • Frontex: Der europäische Grenzgeheimdienst
The speaker’s profile picture
maxb
  • Sneaking In Network Security
The speaker’s profile picture
Maximilian Burkhardt
  • Sneaking In Network Security
The speaker’s profile picture
Merve Sahin
  • Exploring fraud in telephony networks
The speaker’s profile picture
Michael Schwarz
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
Michael Steigerwald
  • Smart Home - Smart Hack
The speaker’s profile picture
Mike Sperber
  • How to teach programming to your loved ones
  • A farewell to soul-crushing code
The speaker’s profile picture
Moritz Lipp
  • A Christmas Carol - The Spectres of the Past, Present, and Future
The speaker’s profile picture
mp_ttaa
  • The Urban Organism
The speaker’s profile picture
nedwill
  • Attacking Chrome IPC
The speaker’s profile picture
nexus
  • Jahresrückblick des CCC 2018
The speaker’s profile picture
Nick sellen
  • The foodsaving grassroots movement
The speaker’s profile picture
Nico
  • Updates von der europäischen Außengrenze
The speaker’s profile picture
Nicole Rauch
  • A farewell to soul-crushing code
The speaker’s profile picture
Nico Semsrott
  • Freude ist nur ein Mangel an Information
The speaker’s profile picture
Nikita Tarakanov
  • Exploiting Kernel Memory Corruptions on Microsoft Windows 10 RedStone 5
The speaker’s profile picture
Nina Gassmann
  • Updates von der europäischen Außengrenze
The speaker’s profile picture
Nora Markard
  • Freedom needs fighters!
The speaker’s profile picture
Noujoum
  • Mind the Trap: Die Netzpolitik der AfD im Bundestag
The speaker’s profile picture
Olga Kochetova
  • Truly cardless: Jackpotting an ATM using auxiliary devices.
The speaker’s profile picture
Patrick "packi" Stählin
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Paul Emmerich
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Peter Hornung
  • Inside the Fake Science Factories
The speaker’s profile picture
Peter Schmidt
  • Die verborgene Seite des Mobilfunks
The speaker’s profile picture
Peter Sewell
  • Taming the Chaos: Can we build systems that actually work?
The speaker’s profile picture
Peter Stuge
  • How does the Internet work?
The speaker’s profile picture
Philipp Busch
  • Simulating Universes
The speaker’s profile picture
Philipp Koppe
  • Inside the AMD Microcode ROM
The speaker’s profile picture
Polaris
  • Are machines feminine?
The speaker’s profile picture
preip
  • Augmented Reality: Bridging the gap between the physical and the digital world
The speaker’s profile picture
qbi
  • Verhalten bei Hausdurchsuchungen
The speaker’s profile picture
Rainer Rehak
  • Was schützt eigentlich der Datenschutz?
  • Best of Informationsfreiheit
The speaker’s profile picture
Rama Thiaw
  • C2X: The television will not be revolutionized.
The speaker’s profile picture
Reclaim Club Culture
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Regina M. Sipos
  • The Critical Making Movement
The speaker’s profile picture
Régine Debatty
  • The good, the strange and the ugly in 2018 art &tech
The speaker’s profile picture
Ricardo Ruiz
  • The Critical Making Movement
The speaker’s profile picture
Robert Clausen
  • Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht
The speaker’s profile picture
Robert Tibbo
  • The Surveillance State limited by acts of courage and conscience
The speaker’s profile picture
Ron
  • Security Nightmares 0x13
The speaker’s profile picture
Rosa Rave
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Rosa Rave*
  • #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
The speaker’s profile picture
Roya Ensafi
  • Censored Planet: a Global Censorship Observatory
The speaker’s profile picture
rufus
  • Opening Event
  • Closing Event
The speaker’s profile picture
Saad Chinoy
  • The Critical Making Movement
The speaker’s profile picture
Saar Amar
  • Modern Windows Userspace Exploitation
The speaker’s profile picture
Sabio
  • Media Disruption Led By The Blind
The speaker’s profile picture
Sai
  • Sense without sight: a crash course on #BlindNavigation
The speaker’s profile picture
Samuel Brinkmann
  • Kickstart the Chaos: Hackerspace gründen für Anfänger
The speaker’s profile picture
Sandra Trostel
  • All Creatures Welcome
The speaker’s profile picture
Sarah Hiltner
  • How medicine discovered sex
The speaker’s profile picture
Sara Konrad
  • Let's reverse engineer the Universe
The speaker’s profile picture
Schmidt
  • Die Häuser denen, die darin wohnen!
The speaker’s profile picture
Sebastian Jünemann
  • Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
The speaker’s profile picture
Sebastian Schinzel
  • Attacking end-to-end email encryption
The speaker’s profile picture
Sebastian Voit
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Sélim Harbi
  • Afroroutes: Africa Elsewhere
The speaker’s profile picture
Sergey Gordeychik
  • SD-WAN a New Hop
The speaker’s profile picture
Simon Ellmann
  • Safe and Secure Drivers in High-Level Languages
The speaker’s profile picture
Sofia Celi
  • No evidence of communication and morality in protocols: Off-the-Record protocol version 4
The speaker’s profile picture
Sophie Hiltner
  • How medicine discovered sex
The speaker’s profile picture
sri
  • Quantum Mechanics
The speaker’s profile picture
st
  • Wallet Security
The speaker’s profile picture
starbug
  • Venenerkennung hacken
The speaker’s profile picture
Stefanie Todt
  • Conquering Large Numbers at the LHC
The speaker’s profile picture
Steffen Arora
  • The Surveillance State limited by acts of courage and conscience
The speaker’s profile picture
Stephan Verbücheln
  • Wallet Security
The speaker’s profile picture
STG
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
@sveckert
  • Inside the Fake Science Factories
The speaker’s profile picture
sven
  • Space Ops 101
The speaker’s profile picture
swaio
  • Internet, the Business Side
The speaker’s profile picture
Tammo Messow
  • Mondnacht
The speaker’s profile picture
Tammo.messow@posteo.de
  • Mondnacht
The speaker’s profile picture
Tanja Lange
  • The year in post-quantum crypto
The speaker’s profile picture
tedix@gmx.net
  • Mondnacht
The speaker’s profile picture
Ted Siegert
  • Mondnacht
The speaker’s profile picture
teubi
  • Introduction to Deep Learning
The speaker’s profile picture
Theodor Sperlea
  • Hacking Ecology
The speaker’s profile picture
Thies Mynther
  • All Creatures Welcome
The speaker’s profile picture
Thomas Lohninger
  • Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
The speaker’s profile picture
Thomas Roth
  • wallet.fail
The speaker’s profile picture
Thorben Dittmar
  • Kickstart the Chaos: Hackerspace gründen für Anfänger
  • Chaos Communication Slam
The speaker’s profile picture
Thorsten Schröder
  • Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
The speaker’s profile picture
tihmstar
  • Jailbreaking iOS
The speaker’s profile picture
@tillkrause
  • Inside the Fake Science Factories
The speaker’s profile picture
Tilmann Becker
  • The foodsaving grassroots movement
The speaker’s profile picture
Tim 'mithro' Ansell
  • Snakes and Rabbits - How CCC shaped an open hardware success
  • SymbiFlow - Finally the GCC of FPGAs!
The speaker’s profile picture
Tobias 'tester' Kunze
  • Opening Event
  • Closing Event
The speaker’s profile picture
Toni
  • "The" Social Credit System
The speaker’s profile picture
Trammell Hudson
  • Modchips of the State
The speaker’s profile picture
Trollofix
  • Planes and Ships and Saving Lives
The speaker’s profile picture
Ulf Buermeyer
  • Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
  • Freedom needs fighters!
The speaker’s profile picture
Werner Schober
  • Internet of Dongs
The speaker’s profile picture
Xenia
  • A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation
The speaker’s profile picture
Yaniv Balmas
  • What The Fax?!
The speaker’s profile picture
Yann Leretaille
  • What is Good Technology?
The speaker’s profile picture
Yifan Lu
  • Viva la Vita Vida
The speaker’s profile picture
zaolin
  • Open Source Firmware
The speaker’s profile picture
Zenna / zelf
  • Scuttlebutt