The speaker’s profile picture
adz
  • p2panda
The speaker’s profile picture
Alexander Eichner
  • Uncover, Understand, Own - Regaining Control Over Your AMD CPU
The speaker’s profile picture
Ali Abbasi
  • A Deep Dive Into Unconstrained Code Execution on Siemens S7 PLCs
The speaker’s profile picture
alina
  • No roborders, no nation, or: smile for a European surveillance propagation
The speaker’s profile picture
Ali Ramadhan
  • Mathematical diseases in climate models and how to cure them
The speaker’s profile picture
Andrea Barisani
  • TamaGo - bare metal Go framework for ARM SoCs.
The speaker’s profile picture
Andrea Jungaberle
  • Psychedelic Medicine - Hacking Psychiatry?!
The speaker’s profile picture
Andreas Dewes
  • Quantum Computing: Are we there yet?
The speaker’s profile picture
Andreas Fritsch
  • Fairtronics
The speaker’s profile picture
Andreas Fuchs
  • Hacking (with) a TPM
The speaker’s profile picture
Andrea Zappa
  • Infrastructures in a horizontal farmers community
The speaker’s profile picture
Andrew Konstantinov
  • Email authentication for penetration testers
The speaker’s profile picture
Angela Richter
  • The Case Against WikiLeaks: a direct threat to our community
The speaker’s profile picture
Anja
  • Polizei-Datenbanken und Minderheiten: Staatliche Stigmatisierung und Diskriminierung von Sinti und Roma
  • Degrowth is coming - be ready to repair
The speaker’s profile picture
Anja Drephal
  • The KGB Hack: 30 Years Later
The speaker’s profile picture
Anja Höfner
  • Degrowth is coming - be ready to repair
The speaker’s profile picture
Anja Reuss
  • Polizei-Datenbanken und Minderheiten: Staatliche Stigmatisierung und Diskriminierung von Sinti und Roma
The speaker’s profile picture
Anna Biselli
  • Digitalisierte Migrationskontrolle
The speaker’s profile picture
Anna Mazgal
  • Confessions of a future terrorist
The speaker’s profile picture
Arne Semsrott
  • Das Mauern muss weg
The speaker’s profile picture
Arne Vogelgesang
  • Let’s play Infokrieg
The speaker’s profile picture
Aseel Kayal
  • The Eye on the Nile
The speaker’s profile picture
befi
  • Wifibroadcast
The speaker’s profile picture
benjamin@fairdanmark.dk
  • Reusing ICT equipment, why & how
The speaker’s profile picture
Benjamin Hättasch
  • Der Deep Learning Hype
The speaker’s profile picture
Bernd Sieker
  • Boeing 737MAX: Automated Crashes
The speaker’s profile picture
Bernhard Stoevesandt
  • Science for future?
The speaker’s profile picture
bigalex
  • Lightning Talks Day 4
  • Lightning Talks Day 3
  • Lightning Talks Day 2
The speaker’s profile picture
Bijan Moini
  • #NoPNR – Let’s kill the next Data Retention Law
The speaker’s profile picture
bleeptrack
  • Closing Ceremony (de)
  • Opening Ceremony (de)
The speaker’s profile picture
blinry
  • Closing Ceremony (de)
  • Opening Ceremony (de)
The speaker’s profile picture
Brandon Azad
  • KTRW: The journey to build a debuggable iPhone
The speaker’s profile picture
bunnie
  • Open Source is Insufficient to Solve Trust Problems in Hardware
The speaker’s profile picture
c0rs
  • On the insecure nature of turbine control systems in power generation
The speaker’s profile picture
cafca
  • p2panda
The speaker’s profile picture
Carina Haupt
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
caro
  • Grow your own planet
The speaker’s profile picture
Caroline
  • An ultrashort history of ultrafast imaging
The speaker’s profile picture
CheolJun Park
  • SigOver + alpha
The speaker’s profile picture
chipforge
  • LibreSilicon's Standard Cell Library (de)
The speaker’s profile picture
Chloé Berthélémy
  • Content take-downs: Who cleans the internet?
The speaker’s profile picture
Christian Werling
  • Uncover, Understand, Own - Regaining Control Over Your AMD CPU
The speaker’s profile picture
Christopher Weatherhead
  • No Body's Business But Mine, a dive into Menstruation Apps
The speaker’s profile picture
Christoph Saatjohann
  • 15 Jahre deutsche Telematikinfrastruktur (TI)
The speaker’s profile picture
Claus Diem
  • Provable Insecurity
The speaker’s profile picture
Clemens Schöll
  • Wohnungsbot: An Automation-Drama in Three Acts
The speaker’s profile picture
Constanze Kurz
  • Geheimdienstliche Massenüberwachung vs. Menschenrechte
The speaker’s profile picture
Daniel Gruss
  • ZombieLoad Attack
  • Plundervolt: Flipping Bits from Software without Rowhammer
The speaker’s profile picture
Daniel Schulz
  • Die Affäre Hannibal
The speaker’s profile picture
David Graeber
  • From Managerial Feudalism to the Revolt of the Caring Classes
The speaker’s profile picture
David Kriesel
  • BahnMining - Pünktlichkeit ist eine Zier
The speaker’s profile picture
Dennis Tatang
  • Inside the Fake Like Factories
The speaker’s profile picture
djb
  • High-assurance crypto software
The speaker’s profile picture
dreiwert
  • Provable Insecurity
The speaker’s profile picture
Drew Fustini
  • Linux on Open Source Hardware with Open Source chip design
The speaker’s profile picture
DrLuke
  • Open Code Verlesung
The speaker’s profile picture
Edward Snowden
  • Human Rights at a Global Crossroads
The speaker’s profile picture
el
  • Art against Facebook
The speaker’s profile picture
Elenos Manifesti
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Elisabeth Niekrenz
  • Die Zukunft grenzüberschreitenden Datenzugriffs und politischer Verfolgung
The speaker’s profile picture
Eva Blum-Dumontet
  • No Body's Business But Mine, a dive into Menstruation Apps
The speaker’s profile picture
Eva Kern
  • Wie klimafreundlich ist Software?
The speaker’s profile picture
Extinction Rebellion Berlin
  • Extinction Rebellion
The speaker’s profile picture
f1yyy
  • The Great Escape of ESXi
The speaker’s profile picture
Fabian Ising
  • How to Break PDFs
The speaker’s profile picture
Fefe
  • Das nützlich-unbedenklich Spektrum
The speaker’s profile picture
Felix Erdmann
  • Offene Sensordaten für Jedermann - Ein Citizen Science Projekt basierend auf Open Source und Open Hardware
The speaker’s profile picture
Florina Speth
  • Mensch - Kunst – Maschine
The speaker’s profile picture
Foaly
  • Open Code Verlesung
The speaker’s profile picture
frank
  • Security Nightmares 0x14
The speaker’s profile picture
Gabriella "Biella" Coleman
  • Hack_Curio
The speaker’s profile picture
Gal Zror
  • Don't Ruck Us Too Hard - Owning Ruckus AP Devices
The speaker’s profile picture
gannimo
  • No source, no problem! High speed binary fuzzing
The speaker’s profile picture
Gauthier Roussilhe
  • Framing digital industry into planetary limits
The speaker’s profile picture
gedsic
  • Lightning Talks Day 4
  • Lightning Talks Day 3
  • Lightning Talks Day 2
The speaker’s profile picture
Hakuna MaMate
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Hannes Mehnert
  • Leaving legacy behind
The speaker’s profile picture
Hanqing Zhao
  • The Great Escape of ESXi
The speaker’s profile picture
Haoyu Yang
  • I am system: breaking the security boundary in windows OS.
The speaker’s profile picture
Helen Leigh
  • Ms
The speaker’s profile picture
Hellmut von Koerber
  • HUMUS sapiens
The speaker’s profile picture
Henryk Plötz
  • Was hat die PSD2 je für uns getan?
The speaker’s profile picture
Heuna Kim
  • How Data-driven Technology Helps the Expansion of Solar and Wind Energy in South Korea
The speaker’s profile picture
Heurekus
  • Der Pfad von 4G zu 5G
The speaker’s profile picture
Holger Klein
  • Der dezentrale Jahresrückblick des CCC
The speaker’s profile picture
honky
  • Hebocon
The speaker’s profile picture
Hüpno
  • Was tun bevor es brennt - wie gründe ich eigentlich einen Betriebsrat?
The speaker’s profile picture
Ilja van Sprundel
  • Boot2root
The speaker’s profile picture
Isabella Hermann
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Jasmine Guffond
  • The Sound of Surveillance
The speaker’s profile picture
Jean Peters
  • Geflüchtete schmuggeln, Kohlelobby unterwandern, Pässe fälschen
The speaker’s profile picture
jiska
  • All wireless communication stacks are equally broken
The speaker’s profile picture
Joana Moll
  • Environmental impact of Surveillance, Adtech and Legacy Code
The speaker’s profile picture
Johnny Parks
  • It’s alive! – Nach den Protesten gegen die Polizeigesetze ist vor den Protesten gegen die autoritäre Wende
The speaker’s profile picture
joliyea
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
josch
  • Aus dem Schimpfwörterbuch der neuen Rechten
The speaker’s profile picture
Joseph Tartaro
  • Boot2root
The speaker’s profile picture
Jos Wetzels
  • Harry Potter and the Not-So-Smart Proxy War
The speaker’s profile picture
Jo Tiffe
  • Connected Mobility hacken: digital.bike.23
The speaker’s profile picture
Julian mikroBIOMIK.org
  • HUMUS sapiens
The speaker’s profile picture
Julian Oliver
  • Server Infrastructure for Global Rebellion
The speaker’s profile picture
Julia Riede
  • Megatons to Megawatts
The speaker’s profile picture
julika
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Jutta Buschbom
  • Protecting the Wild
The speaker’s profile picture
Kai Biermann
  • Vom Ich zum Wir
The speaker’s profile picture
karlabyrinth
  • Climate Modelling
The speaker’s profile picture
Katharin Tai
  • What the World can learn from Hongkong
The speaker’s profile picture
Katrin Nicke
  • Nach der Braunkohle: Li-Io Batterierecycling
The speaker’s profile picture
Kiran Jonnalagadda
  • Unpacking the compromises of Aadhaar, and other digital identities inspired by it
The speaker’s profile picture
Kire
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Kit Murdock
  • Plundervolt: Flipping Bits from Software without Rowhammer
The speaker’s profile picture
Kitty
  • Understanding millions of gates
The speaker’s profile picture
Kurfuerstin
  • Warum 3D-gedruckte Kleidung NICHT die Zukunft ist
The speaker’s profile picture
LaForge
  • SIM card technology from A-Z
  • #mifail oder: Mit Gigaset wäre das nicht passiert!
The speaker’s profile picture
Laura Pöhler
  • It’s alive! – Nach den Protesten gegen die Polizeigesetze ist vor den Protesten gegen die autoritäre Wende
The speaker’s profile picture
Lea Beckmann
  • Polizei-Datenbanken und Minderheiten: Staatliche Stigmatisierung und Diskriminierung von Sinti und Roma
  • Digitalisierte Migrationskontrolle
The speaker’s profile picture
Leon
  • 36C3 Infrastructure Review
The speaker’s profile picture
Linus Neumann
  • Hirne Hacken
The speaker’s profile picture
lislis
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Lissim
  • Was tun bevor es brennt - wie gründe ich eigentlich einen Betriebsrat?
The speaker’s profile picture
littlelailo
  • Tales of old: untethering iOS 11
The speaker’s profile picture
Louise Ashcroft
  • Speaking Fiction To Power
The speaker’s profile picture
Lu Yen Roloff
  • Extinction Rebellion
The speaker’s profile picture
maha
  • Vom Ich zum Wir
The speaker’s profile picture
Malte Larsen
  • HUMUS sapiens
The speaker’s profile picture
manuel
  • Nutzung öffentlicher Klimadaten
The speaker’s profile picture
Maria
  • Extinction Rebellion
The speaker’s profile picture
Marina Köhn
  • Wie klimafreundlich ist Software?
The speaker’s profile picture
Markus Beckedahl
  • Der netzpolitische Jahresrückblick
The speaker’s profile picture
Martin Hillenbrand
  • Kritikalität von Rohstoffen - wann platzt die Bombe?
The speaker’s profile picture
Matt Evans
  • The Ultimate Acorn Archimedes talk
The speaker’s profile picture
Max Hoffmann
  • HAL - The Open-Source Hardware Analyzer
The speaker’s profile picture
melzai
  • Jahresrückblick der Haecksen
  • Welcome Pattern - Theorie und Praxis
The speaker’s profile picture
Michael Kreil
  • Von Menschen radikalisiert: Über Rassismus im Internet
The speaker’s profile picture
Michael Kurth
  • Practical Cache Attacks from the Network and Bad Cat Puns
The speaker’s profile picture
Michael Ruf
  • Die Mittelmeer-Monologe
The speaker’s profile picture
Michael Schwarz
  • ZombieLoad Attack
The speaker’s profile picture
Michiel Leenaars
  • NGI Zero: A treasure trove of IT innovation
The speaker’s profile picture
Mike Sperber
  • Getting software right with properties, generated tests, and proofs
The speaker’s profile picture
Mincheol Son
  • SigOver + alpha
The speaker’s profile picture
miosta
  • Grow your own planet
The speaker’s profile picture
@_moradek_
  • On the insecure nature of turbine control systems in power generation
The speaker’s profile picture
Moritz Chollet
  • HUMUS sapiens
The speaker’s profile picture
Moritz Lipp
  • ZombieLoad Attack
The speaker’s profile picture
mort
  • On the Edge of Human-Data Interaction with the Databox
The speaker’s profile picture
Moxie Marlinspike
  • The ecosystem is moving
The speaker’s profile picture
mrchrisadams
  • Reducing Carbon in the Digital Realm
The speaker’s profile picture
Nadja Geisler
  • Der Deep Learning Hype
The speaker’s profile picture
naehrwert
  • (Post-Quantum) Isogeny Cryptography
The speaker’s profile picture
nanooq
  • Welcome Pattern - Theorie und Praxis
The speaker’s profile picture
naomi@auerfeld.com
  • The Case Against WikiLeaks: a direct threat to our community
The speaker’s profile picture
nba::yoh
  • It's not safe on the streets... especially for your 3DS!
The speaker’s profile picture
Nicolas Guenot
  • Degrowth is coming - be ready to repair
The speaker’s profile picture
niczem
  • No roborders, no nation, or: smile for a European surveillance propagation
The speaker’s profile picture
Nikhil Mittal
  • Breaking Microsoft Edge Extensions Security Policies
The speaker’s profile picture
Niklas Jordan
  • The Planet Friendly Web
The speaker’s profile picture
Nilo Redini
  • Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
The speaker’s profile picture
Nspace
  • No source, no problem! High speed binary fuzzing
The speaker’s profile picture
oct0xor
  • Hacking Sony PlayStation Blu-ray Drives
The speaker’s profile picture
Ole
  • Was tun bevor es brennt - wie gründe ich eigentlich einen Betriebsrat?
The speaker’s profile picture
OmerGull
  • SELECT code_execution FROM * USING SQLite;
The speaker’s profile picture
oots
  • Cryptography demystified
The speaker’s profile picture
Patrick "packi" Stählin
  • Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
The speaker’s profile picture
Patrick Römer
  • Aufbau eines Sensornetzes für die Messung von Stickstoffdioxid
The speaker’s profile picture
Paula Bialski
  • Hack_Curio
The speaker’s profile picture
Paul Gardner-Stephen
  • Creating Resilient and Sustainable Mobile Phones
The speaker’s profile picture
Peter Bosch
  • Intel Management Engine deep dive
The speaker’s profile picture
Peter Schmidt
  • Der Pfad von 4G zu 5G
The speaker’s profile picture
Phil
  • Warum die Card10 kein Medizinprodukt ist
The speaker’s profile picture
pkreissel
  • Inside the Fake Like Factories
The speaker’s profile picture
post@sinakamala.de
  • Extinction Rebellion
The speaker’s profile picture
qwertyoruiop
  • The One Weird Trick SecureROM Hates
The speaker’s profile picture
Rainer Rehak
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
RA Ulrich Kerner
  • Hackerparagraph § 202c StGB // Reality Check
The speaker’s profile picture
Ray
  • Hacker Jeopardy
The speaker’s profile picture
Reclaim Club Culture
  • Art against Facebook
The speaker’s profile picture
Régine Débatty
  • The Internet of rubbish things and bodies
The speaker’s profile picture
renataavila
  • The Case Against WikiLeaks: a direct threat to our community
The speaker’s profile picture
repdet
  • On the insecure nature of turbine control systems in power generation
The speaker’s profile picture
robbi5
  • Verkehrswende selber hacken
The speaker’s profile picture
Robert Buhren
  • Uncover, Understand, Own - Regaining Control Over Your AMD CPU
The speaker’s profile picture
Robert Tibbo
  • Human Rights at a Global Crossroads
The speaker’s profile picture
Ron
  • Security Nightmares 0x14
The speaker’s profile picture
Ronny Sommer
  • Geflüchtete schmuggeln, Kohlelobby unterwandern, Pässe fälschen
The speaker’s profile picture
RonnyXing
  • The Inside Story: There are Apps in Apps and Here is How to Break Them
The speaker’s profile picture
Rosa Rave
  • Art against Facebook
The speaker’s profile picture
Ross Anderson
  • The sustainability of safety, security and privacy
The speaker’s profile picture
Ruben Neugebauer
  • Katastrophe und Kommunikation am Beispiel Rojava
The speaker’s profile picture
Samuel Groß
  • Messenger Hacking: Remotely Compromising an iPhone through iMessage
The speaker’s profile picture
Sasha
  • How (not) to build autonomous robots
The speaker’s profile picture
Sean "xobs" Cross
  • Open Source is Insufficient to Solve Trust Problems in Hardware
The speaker’s profile picture
Sebastian Erb
  • Die Affäre Hannibal
The speaker’s profile picture
Sebastian Pischel
  • Energiespeicher von heute für die Energie von morgen
The speaker’s profile picture
Sebastian Staacks
  • phyphox: Using smartphone sensors for physics experiments
The speaker’s profile picture
Sec
  • Hacker Jeopardy
The speaker’s profile picture
sev
  • The Large Hadron Collider Infrastructure Talk
The speaker’s profile picture
Shi Qin
  • I am system: breaking the security boundary in windows OS.
The speaker’s profile picture
Simon Hegelich
  • Mensch - Kunst – Maschine
The speaker’s profile picture
sophiiistika
  • p2panda
The speaker’s profile picture
Steffen Becker
  • Reflections on the New Reverse Engineering Law
The speaker’s profile picture
stein
  • A systematic evaluation of OpenBSD's mitigations
The speaker’s profile picture
Stephan Koloßa
  • Reflections on the New Reverse Engineering Law
The speaker’s profile picture
ST Kambor-Wiesenberg
  • #mifail oder: Mit Gigaset wäre das nicht passiert!
The speaker’s profile picture
@sveckert
  • Inside the Fake Like Factories
The speaker’s profile picture
sven
  • Thrust is not an Option: How to get to Mars really slow
The speaker’s profile picture
Sven Hilbig
  • Gerechtigkeit 4.0
The speaker’s profile picture
Szymon
  • How to Design Highly Reliable Digital Electronics
The speaker’s profile picture
tamdrx
  • Fairtronics
The speaker’s profile picture
Tanja Lange
  • High-assurance crypto software
The speaker’s profile picture
thasti
  • How to Design Highly Reliable Digital Electronics
  • The Large Hadron Collider Infrastructure Talk
The speaker’s profile picture
Thomas Lohninger
  • Content take-downs: Who cleans the internet?
  • 5G & Net Neutrality
The speaker’s profile picture
Thomas Roth
  • TrustZone-M(eh): Breaking ARMv8-M's security
The speaker’s profile picture
Thomas Weber
  • Was tun bevor es brennt - wie gründe ich eigentlich einen Betriebsrat?
The speaker’s profile picture
Thorben Dittmar
  • Chaos Communication Slam
The speaker’s profile picture
Thorsten Schröder
  • Finfisher verklagen
The speaker’s profile picture
Tobias Scharnowski
  • A Deep Dive Into Unconstrained Code Execution on Siemens S7 PLCs
The speaker’s profile picture
Tofu
  • Open Code Verlesung
The speaker’s profile picture
Tom Marble
  • Open Source is Insufficient to Solve Trust Problems in Hardware
The speaker’s profile picture
Tom Patzelt
  • Fridays for Future (de)
The speaker’s profile picture
Trollofix
  • Open Code Verlesung
The speaker’s profile picture
ubahnverleih
  • Verkehrswende selber hacken
The speaker’s profile picture
Ulf Buermeyer
  • Finfisher verklagen
The speaker’s profile picture
Ulrich Kelber
  • Weichenstellung
The speaker’s profile picture
Valentin Churavy
  • Mathematical diseases in climate models and how to cure them
The speaker’s profile picture
Viktor
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Viktor
  • Das Bits&Bäume-Sporangium
The speaker’s profile picture
Vincent Ahrend
  • p2panda
The speaker’s profile picture
Vincenzo Iozzo
  • The Case for Scale in Cyber Security
The speaker’s profile picture
Vladislav Mladenov
  • How to Break PDFs
The speaker’s profile picture
Walter Hötzendorfer
  • #NoPNR – Let’s kill the next Data Retention Law
The speaker’s profile picture
Wenxu Wu
  • I am system: breaking the security boundary in windows OS.
The speaker’s profile picture
Will Scott
  • What's left for private messaging?
The speaker’s profile picture
Wouter Bokslag
  • Vehicle immobilization revisited
The speaker’s profile picture
xian
  • Fairtronics
The speaker’s profile picture
yann@NextGenQ.com
  • Build you own Quantum Computer @ Home - 99% of discount - Hacker Style !
The speaker’s profile picture
Yves-Alexandre de Montjoye
  • The search for anonymous data
The speaker’s profile picture
zivillian
  • #mifail oder: Mit Gigaset wäre das nicht passiert!