- Genom-Editierung mit CRISPR/Cas
- Die dreckige Empirie
- A Blockchain Picture Book
- Truly cardless: Jackpotting an ATM using auxiliary devices.
- The Layman's Guide to Zero-Day Engineering
- LibreSilicon
- Citzens or subjects? The battle to control our bodies, speech and communications
- Genom-Editierung mit CRISPR/Cas
- Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
- Best of Informationsfreiheit
- What the flag is CTF?
- Kernel Tracing With eBPF
- Tactical Embodiment
- Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
- Computer, die über Asyl (mit)entscheiden
- Best of Informationsfreiheit
- Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen
- Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
- Court in the Akten
- Best of Informationsfreiheit
- Exploring fraud in telephony networks
- Datenschutz für Neulandbürger
- A deep dive into the world of DOS viruses
- Inside the AMD Microcode ROM
- Open Source Orgelbau
- Matrix, the current status and year to date
- Hacking how we see
- Lightning Talks Day 2
- Lightning Talks Day 3
- Lightning Talks Day 4
- The Mars Rover On-board Computer
- Butterbrotdosen-Smartphone
- Snakes and Rabbits - How CCC shaped an open hardware success
- Self-encrypting deception
- "Das ist mir nicht erinnerlich." − Der NSU-Komplex heute
- Conquering Large Numbers at the LHC
- Enclosure-PUF
- MicroPython – Python for Microcontrollers
- How Facebook tracks you on Android
- Locked up science
- Analyze the Facebook algorithm and reclaim data sovereignty
- A Christmas Carol - The Spectres of the Past, Present, and Future
- The nextpnr FOSS FPGA place-and-route tool
- A la recherche de l'information perdue
- Polizeigesetze
- Jahresrückblick des CCC 2018
- Microtargeting und Manipulation
- Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
- Explaining Online US Political Advertising
- A Christmas Carol - The Spectres of the Past, Present, and Future
- Viva la Vita Vida
- Enclosure-PUF
- Introducing the katzenpost mix network system
- C2X: The television will not be revolutionized.
- Citzens or subjects? The battle to control our bodies, speech and communications
- SuperMUC-NG
- DISNOVATION.ORG
- The year in post-quantum crypto
- wallet.fail
- Mehr schlecht als Recht: Grauzone Sicherheitsforschung
- Inside the Fake Science Factories
- Die EU und ihre Institutionen
- Die Häuser denen, die darin wohnen!
- Feminist Perspectives
- Jahresrückblick des CCC 2018
- In Soviet Russia Smart Card Hacks You
- What The Fax?!
- Hunting the Sigfox: Wireless IoT Network Security
- Mehr schlecht als Recht: Grauzone Sicherheitsforschung
- Projekt Hannah
- Provable Security
- Hunting the Sigfox: Wireless IoT Network Security
- Hunting the Sigfox: Wireless IoT Network Security
- Jahresrückblick des CCC 2018
- Security Nightmares 0x13
- Hackerethik - eine Einführung
- Repair-Cafés
- First Sednit UEFI Rootkit Unveiled
- How Facebook tracks you on Android
- Digital Airwaves
- Die Häuser denen, die darin wohnen!
- Lightning Talks Day 2
- Lightning Talks Day 3
- Lightning Talks Day 4
- Feminist Perspectives
- The Precariat: A Disruptive Class for Disruptive Times.
- Artistic PCB Design and Fabrication
- Transmission Control Protocol
- Domain Name System
- The Rocky Road to TLS 1.3 and better Internet Encryption
- Wind: Off-Grid Services for Everyday People
- Feminist Perspectives
- Hebocon
- LibreSilicon
- Memsad
- Microtargeting und Manipulation
- From Zero to Zero Day
- Election Cybersecurity Progress Report
- Never Forgetti
- Circumventing video identification using augmented reality
- The foodsaving grassroots movement
- (Cyber-)Stalking: Wenn Grenzen verschwimmen
- Open Source Orgelbau
- Kernel Tracing With eBPF
- Radical Digital Painting
- Radical Digital Painting
- Dissecting Broadcom Bluetooth
- A WebPage in Three Acts
- From Zero to Zero Day
- The Ghost in the Machine
- wallet.fail
- Going Deep Underground to Watch the Stars
- Reality Check! Basel/Lagos?? In virtual reality?
- Mondnacht
- Mondnacht
- Venenerkennung hacken
- Information Biology - Investigating the information flow in living systems
- No evidence of communication and morality in protocols: Off-the-Record protocol version 4
- Genom-Editierung mit CRISPR/Cas
- The Enemy
- Archäologische Studien im Datenmüll
- Theater und Quantenzeitalter
- 35C3 Infrastructure Review
- Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
- G10, BND-Gesetz und der effektive Schutz vor Grundrechten
- Electronic Evicence in Criminal Matters
- Cat & Mouse: Evading the Censors in 2018
- (Cyber-)Stalking: Wenn Grenzen verschwimmen
- Verhalten bei Hausdurchsuchungen
- It Always Feels Like the Five Eyes Are Watching You
- Enclosure-PUF
- Feminist Perspectives
- 35C3 Infrastructure Review
- Chaos im Fernsehrat
- Russia vs. Telegram: technical notes on the battle
- Feminist Perspectives
- Archäologische Studien im Datenmüll
- LibreSilicon
- Transhuman Expression
- Die Häuser denen, die darin wohnen!
- Die Häuser denen, die darin wohnen!
- Jahresrückblick des CCC 2018
- Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
- Hacking the Human Microbiome
- Theater und Quantenzeitalter
- Provable Security
- Dissecting Broadcom Bluetooth
- Modeling and Simulation of Physical Systems for Hobbyists
- Polizeigesetze
- Theater und Quantenzeitalter
- Web-based Cryptojacking in the Wild
- SiliVaccine: North Korea's Weapon of Mass Detection
- Netzpolitischer Wetterbericht 2018
- The Layman's Guide to Zero-Day Engineering
- Meine Abenteuer im EU-Parlament
- Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
- All Your Gesundheitsakten Are Belong To Us
- Compromising online accounts by cracking voicemail systems
- Projekt Hannah
- Frontex: Der europäische Grenzgeheimdienst
- Sneaking In Network Security
- Sneaking In Network Security
- Exploring fraud in telephony networks
- A Christmas Carol - The Spectres of the Past, Present, and Future
- Smart Home - Smart Hack
- How to teach programming to your loved ones
- A farewell to soul-crushing code
- A Christmas Carol - The Spectres of the Past, Present, and Future
- The Urban Organism
- Attacking Chrome IPC
- Jahresrückblick des CCC 2018
- The foodsaving grassroots movement
- Updates von der europäischen Außengrenze
- A farewell to soul-crushing code
- Freude ist nur ein Mangel an Information
- Exploiting Kernel Memory Corruptions on Microsoft Windows 10 RedStone 5
- Updates von der europäischen Außengrenze
- Freedom needs fighters!
- Mind the Trap: Die Netzpolitik der AfD im Bundestag
- Truly cardless: Jackpotting an ATM using auxiliary devices.
- Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
- Safe and Secure Drivers in High-Level Languages
- Inside the Fake Science Factories
- Die verborgene Seite des Mobilfunks
- Taming the Chaos: Can we build systems that actually work?
- How does the Internet work?
- Simulating Universes
- Inside the AMD Microcode ROM
- Are machines feminine?
- Augmented Reality: Bridging the gap between the physical and the digital world
- Verhalten bei Hausdurchsuchungen
- Was schützt eigentlich der Datenschutz?
- Best of Informationsfreiheit
- C2X: The television will not be revolutionized.
- #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
- The Critical Making Movement
- The good, the strange and the ugly in 2018 art &tech
- The Critical Making Movement
- Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht
- The Surveillance State limited by acts of courage and conscience
- Security Nightmares 0x13
- #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
- #afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
- Censored Planet: a Global Censorship Observatory
- Opening Event
- Closing Event
- The Critical Making Movement
- Modern Windows Userspace Exploitation
- Media Disruption Led By The Blind
- Sense without sight: a crash course on #BlindNavigation
- Kickstart the Chaos: Hackerspace gründen für Anfänger
- All Creatures Welcome
- How medicine discovered sex
- Let's reverse engineer the Universe
- Die Häuser denen, die darin wohnen!
- Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
- Attacking end-to-end email encryption
- Safe and Secure Drivers in High-Level Languages
- Afroroutes: Africa Elsewhere
- SD-WAN a New Hop
- Safe and Secure Drivers in High-Level Languages
- No evidence of communication and morality in protocols: Off-the-Record protocol version 4
- How medicine discovered sex
- Quantum Mechanics
- Wallet Security
- Venenerkennung hacken
- Conquering Large Numbers at the LHC
- The Surveillance State limited by acts of courage and conscience
- Wallet Security
- Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
- Inside the Fake Science Factories
- Space Ops 101
- Internet, the Business Side
- Mondnacht
- Mondnacht
- The year in post-quantum crypto
- Mondnacht
- Mondnacht
- Introduction to Deep Learning
- Hacking Ecology
- All Creatures Welcome
- Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
- wallet.fail
- Kickstart the Chaos: Hackerspace gründen für Anfänger
- Chaos Communication Slam
- Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
- Jailbreaking iOS
- Inside the Fake Science Factories
- The foodsaving grassroots movement
- Snakes and Rabbits - How CCC shaped an open hardware success
- SymbiFlow - Finally the GCC of FPGAs!
- Opening Event
- Closing Event
- "The" Social Credit System
- Modchips of the State
- Planes and Ships and Saving Lives
- Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
- Freedom needs fighters!
- Internet of Dongs
- A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation
- What The Fax?!
- What is Good Technology?
- Viva la Vita Vida
- Open Source Firmware
- Scuttlebutt