Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Date: Wed Jan 10 2018 23:39:50 GMT+0100 (CET)
- 1. Jahresrückblick des CCC 2017 (28139)
- 2. Security Nightmares 0x12 (26033)
- 3. Console Security - Switch (23664)
- 4. Social Bots, Fake News und Filterblasen (19866)
- 5. Schreibtisch-Hooligans (19763)
- 6. ASLR on the line (19482)
- 7. Methodisch inkorrekt! (17809)
- 8. Dude, you broke the Future! (17753)
- 9. Die Lauschprogramme der Geheimdienste (16569)
- 10. Die fabelhafte Welt des Mobilebankings (15937)
- 11. QualityLand (15735)
- 12. Hacker Jeopardy (15568)
- 13. Antipatterns und Missverständnisse in der Softwareentwicklung (14132)
- 14. Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit (14052)
- 15. All Computers Are Beschlagnahmt (11614)
- 16. Trügerische Sicherheit (11517)
- 17. Tiger, Drucker und ein Mahnmal (10158)
- 18. Relativitätstheorie für blutige Anfänger (8739)
- 19. Beeinflussung durch Künstliche Intelligenz (7310)
- 20. Der netzpolitische Wetterbericht (7061)
- 21. The Ultimate Apollo Guidance Computer Talk (6709)
- 22. Nougatbytes 11₂ (6170)
- 23. Der PC-Wahl-Hack (6011)
- 24. Eröffnung: tuwat (5584)
- 25. SCADA - Gateway to (s)hell (5323)
- 26. Die Sprache der Überwacher (5003)
- 27. Mietshäusersyndikat: den Immobilienmarkt hacken (4470)
- 28. Es sind die kleinen Dinge im Leben II (3611)
- 29. Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection (3582)
- 30. How to drift with any car (3535)
- 31. Uncovering British spies’ web of sockpuppet social media personas (3405)
- 32. Public FPGA based DMA Attacking (3368)
- 33. Everything you want to know about x86 microcode, but might have been afraid to ask (3117)
- 34. Gamified Control? (3070)
- 35. How risky is the software you use? (2899)
- 36. Deep Learning Blindspots (2859)
- 37. hacking disaster (2822)
- 38. 0en & 1en auf dem Acker (2803)
- 39. Abschluss (2801)
- 40. Bildung auf dem Weg ins Neuland (2789)
- 41. Inside Intel Management Engine (2569)
- 42. Unleash your smart-home devices: Vacuum Cleaning Robot Hacking (2537)
- 43. Internet of Fails (2536)
- 44. Resilienced Kryptographie (2479)
- 45. The Snowden Refugees under Surveillance in Hong Kong (2405)
- 46. Infrastructure Review (2383)
- 47. Holography of Wi-Fi radiation (2326)
- 48. Ein Festival der Demokratie (2283)
- 49. Science is broken (2200)
- 50. Protecting Your Privacy at the Border (2157)
- 51. Demystifying Network Cards (2135)
- 52. A hacker's guide to Climate Change - What do we know and how do we know it? (2131)
- 53. Lobby-Schlacht um die ePrivacy-Verordnung (2104)
- 54. cryptocurrencies, smart contracts, etc.: revolutionary tech? (2027)
- 55. eMMC hacking, or: how I fixed long-dead Galaxy S3 phones (1940)
- 56. Decoding Contactless (Card) Payments (1871)
- 57. Free Electron Lasers (1850)
- 58. Taxation (1831)
- 59. Intel ME: Myths and reality (1797)
- 60. Forensic Architecture (1713)
- 61. Treibhausgasemissionen einschätzen (1651)
- 62. Die göttliche Informatik / The divine Computer Science (1524)
- 63. Running GSM mobile phone on SDR (1523)
- 64. DPRK Consumer Technology (1483)
- 65. Tightening the Net in Iran (1475)
- 66. Financial surveillance (1472)
- 67. Digitale Bildung in der Schule (1458)
- 68. MQA - A clever stealth DRM-Trojan (1434)
- 69. Internet censorship in the Catalan referendum (1343)
- 70. Access To Bodies (1338)
- 71. Are all BSDs created equally? (1275)
- 72. BBSs and early Internet access in the 1990ies (1221)
- 73. Privacy Shield - Lipstick on a Pig? (1204)
- 74. Schnaps Hacking (1194)
- 75. 1-day exploit development for Cisco IOS (1170)
- 76. KRACKing WPA2 by Forcing Nonce Reuse (1157)
- 77. UPSat - the first open source satellite (1120)
- 78. How Alice and Bob meet if they don't like onions (1072)
- 79. Reverse engineering FPGAs (1002)
- 80. The Internet in Cuba: A Story of Community Resilience (976)
- 81. Deconstructing a Socialist Lawnmower (970)
- 82. library operating systems (965)
- 83. LatticeHacks (942)
- 84. Briar (921)
- 85. Mobile Data Interception from the Interconnection Link (895)
- 86. Lets break modern binary code obfuscation (884)
- 87. Don't stop 'til you feel it (859)
- 88. Doping your Fitbit (844)
- 89. The making of a chip (830)
- 90. Social Cooling - big data’s unintended side effect (822)
- 91. Ecstasy 10x yellow Twitter 120mg Mdma (807)
- 92. Lightning Talks Day 4 (802)
- 93. Robot Music (793)
- 94. Watching the changing Earth (772)
- 95. Drones of Power: Airborne Wind Energy (767)
- 96. Home Distilling (748)
- 97. Type confusion: discovery, abuse, and protection (741)
- 98. Italy's surveillance toolbox (725)
- 99. Designing PCBs with code (719)
- 100. SatNOGS: Crowd-sourced satellite operations (717)
- 101. May contain DTraces of FreeBSD (694)
- 102. Open Source Estrogen (693)
- 103. Pointing Fingers at 'The Media' (685)
- 104. WHWP (682)
- 105. Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme (665)
- 106. Humans as software extensions (663)
- 107. Extended DNA Analysis (648)
- 108. Growing Up Software Development (621)
- 109. Bringing Linux back to server boot ROMs with NERF and Heads (615)
- 110. Lightning Talks Day 3 (609)
- 111. Tracking Transience (606)
- 112. openPower - the current state of commercial openness in CPU development (605)
- 113. Opening Closed Systems with GlitchKit (585)
- 114. Squeezing a key through a carry bit (582)
- 115. Saving the World with Space Solar Power (581)
- 116. The Work of Art in the Age of Digital Assassination (580)
- 117. Low Cost Non-Invasive Biomedical Imaging (574)
- 118. Lightning Talks Day 2 (574)
- 119. Fuck Dutch mass-surveillance: let's have a referendum! (570)
- 120. BootStomp: On the Security of Bootloaders in Mobile Devices (559)
- 121. Uncertain Concern (554)
- 122. Electroedibles (549)
- 123. Hardening Open Source Development (544)
- 124. TrustZone is not enough (522)
- 125. iOS kernel exploitation archaeology (507)
- 126. WTFrance (506)
- 127. We should share our secrets (481)
- 128. avatar² (467)
- 129. Electromagnetic Threats for Information Security (452)
- 130. End-to-end formal ISA verification of RISC-V processors with riscv-formal (445)
- 131. Netzpolitik in der Schweiz (438)
- 132. Inside Android’s SafetyNet Attestation: Attack and Defense (399)
- 133. Simulating the future of the global agro-food system (398)
- 134. Microarchitectural Attacks on Trusted Execution Environments (398)
- 135. Policing in the age of data exploitation (397)
- 136. Uncovering vulnerabilities in Hoermann BiSecur (389)
- 137. The Noise Protocol Framework (389)
- 138. Catch me if you can: Internet Activism in Saudi Arabia (387)
- 139. Implementing an LLVM based Dynamic Binary Instrumentation framework (387)
- 140. Defeating (Not)Petya's Cryptography (381)
- 141. Taking a scalpel to QNX (369)
- 142. Blinkenrocket! (368)
- 143. How can you trust formally verified software? (356)
- 144. Modern key distribution with ClaimChain (338)
- 145. Net Neutraliy Enforcement in the EU (336)
- 146. Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons (318)
- 147. Ensuring Climate Data Remains Public (313)
- 148. Organisational Structures for Sustainable Free Software Development (297)
- 149. Think big or care for yourself (296)
- 150. Regulating Autonomous Weapons (287)
- 151. Making Experts Makers and Makers Experts (278)
- 152. Afro TECH (273)
- 153. BGP and the Rule of Custom (270)
- 154. “Nabovarme” opensource heating infrastructure in Christiania (261)
- 155. OONI: Let's Fight Internet Censorship, Together! (250)
- 156. Why Do We Anthropomorphize Computers?... (244)
- 157. Practical Mix Network Design (244)
- 158. institutions for Resolution Disputes (243)
- 159. On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso (235)
- 160. International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interop (209)
- 161. History and implications of DRM (208)
- 162. Visceral Systems (202)
- 163. The seizure of the Iuventa (165)
- 164. Zamir Transnational Network und Zagreb Dairy (163)
- 165. Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels' (155)
- 166. Closing the loop: Reconnecting social-technologial dynamics to Earth System science (143)
Add Comment
Please, Sign In to add comment