Index of /CCC/26C3/mp4

Icon  Name                                                                                                                           Last modified      Size  Description
[PARENTDIR] Parent Directory - [VID] 26c3-3515-en-secubt.mp4.md5 2010-01-02 00:30 58 [VID] 26c3-3350-en-milkymist.mp4.md5 2010-01-02 00:23 61 [VID] 26c3-3654-en-gsm_srsly.mp4.md5 2010-01-02 00:50 61 [VID] 26c3-3302-en-i_internet.mp4.md5 2010-01-02 00:21 62 [VID] 26c3-3648-en-dect_part_ii.mp4.md5 2010-01-02 00:49 64 [VID] 26c3-3664-en-homewreckery.mp4.md5 2010-01-02 00:52 64 [VID] 26c3-3717-en-closing_event.mp4.md5 2010-01-03 12:27 65 [VID] 26c3-3481-de-leyen-rhetorik.mp4.md5 2010-01-02 00:26 66 [VID] 26c3-3520-en-conlanging_101.mp4.md5 2010-01-08 10:49 66 [VID] 26c3-3547-en-after_the_hype.mp4.md5 2010-01-03 10:15 66 [VID] 26c3-3594-de-internetsperren.mp4.md5 2010-01-02 00:43 67 [VID] 26c3-3668-en-hacker_jeopardy.mp4.md5 2010-01-15 13:31 67 [VID] 26c3-3669-de-hacker_jeopardy.mp4.md5 2010-01-06 20:07 67 [VID] 26c3-3700-de-here_be_dragons.mp4.md5 2010-01-02 00:58 67 [VID] 26c3-3464-de-liquid_democracy.mp4.md5 2010-01-02 00:25 68 [VID] 26c3-3540-en-a_hackers_utopia.mp4.md5 2010-01-02 00:33 68 [VID] 26c3-3658-en-black_ops_of_pki.mp4.md5 2010-01-06 21:46 68 [VID] 26c3-3657-en-optimised_to_fail.mp4.md5 2010-02-09 19:45 69 [VID] 26c3-3494-de-defending_the_poor.mp4.md5 2010-01-02 00:27 70 [VID] 26c3-3685-de-im_herz_der_bestie.mp4.md5 2010-01-03 10:48 70 [VID] 26c3-3688-de-haste_man_netblock.mp4.md5 2010-01-02 00:55 70 [VID] 26c3-3690-de-ccc-jahresrckblick.mp4.md5 2010-01-02 00:56 70 [VID] 26c3-3490-en-building_a_debugger.mp4.md5 2010-01-07 17:22 71 [VID] 26c3-3687-de-security_nightmares.mp4.md5 2010-01-02 17:10 71 [VID] 26c3-3710-en-the_lost_cosmonauts.mp4.md5 2010-01-02 01:02 71 [VID] 26c3-3266-de-hacking_the_universe.mp4.md5 2010-01-03 11:55 72 [VID] 26c3-3550-de-chaos-familien-duell.mp4.md5 2010-01-02 00:36 72 [VID] 26c3-3567-en-wikileaks_release_10.mp4.md5 2010-01-02 00:38 72 [VID] 26c3-3509-de-wofr_offenes_internet.mp4.md5 2010-01-17 21:50 73 [VID] 26c3-3510-de-technik_des_neuen_epa.mp4.md5 2010-01-02 00:29 73 [VID] 26c3-3711-de-computerspielepolitik.mp4.md5 2010-01-02 01:02 73 [VID] 26c3-3468-de-privacy_amp_stylometry.mp4.md5 2010-01-02 00:25 74 [VID] 26c3-3592-de-cybernetic_cannibalism.mp4.md5 2010-01-02 00:42 74 [VID] 26c3-3563-en-lightning_talks_-_day_1.mp4.md5 2010-01-08 10:07 75 [VID] 26c3-3642-en-lightning_talks_-_day_2.mp4.md5 2010-01-02 00:48 75 [VID] 26c3-3644-de-lightning_talks_-_day_3.mp4.md5 2010-01-03 12:37 75 [VID] 26c3-3645-en-lightning_talks_-_day_4.mp4.md5 2010-01-03 12:22 75 [VID] 26c3-3696-en-wireless_power_transfer.mp4.md5 2010-01-02 00:58 75 [VID] 26c3-3452-en-here_be_electric_dragons.mp4.md5 2010-01-02 00:24 76 [VID] 26c3-3523-de-eine_zensur_findet_statt.mp4.md5 2010-01-02 00:31 76 [VID] 26c3-3596-de-cat_procsysnetipv4fuckups.mp4.md5 2010-01-02 00:43 77 [VID] 26c3-3613-de-fnord-jahresrckblick_2009.mp4.md5 2010-01-15 11:58 77 [VID] 26c3-3501-en-why_net_neutrality_matters.mp4.md5 2010-01-15 12:59 78 [VID] 26c3-3725-en-stream_security_nightmares.mp4.md5 2010-01-03 13:41 78 [VID] 26c3-3573-en-playing_with_the_built_city.mp4.md5 2010-01-02 00:40 79 [VID] 26c3-3691-de-vier_fuste_fr_ein_halleluja.mp4.md5 2010-01-02 00:57 79 [VID] 26c3-3570-en-weaponizing_cultural_viruses.mp4.md5 2010-01-02 00:39 80 [VID] 26c3-3495-de-das_zugangserschwerungsgesetz.mp4.md5 2010-01-02 00:28 81 [VID] 26c3-3590-de-europische_biometriestrategien.mp4.md5 2010-01-02 00:42 82 [VID] 26c3-3709-en-legic_prime_obscurity_in_depth.mp4.md5 2010-01-02 01:01 82 [VID] 26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4.md5 2010-01-03 03:00 83 [VID] 26c3-3600-de-location_tracking_does_scale_up.mp4.md5 2010-01-02 00:44 83 [VID] 26c3-3631-en-finding_the_key_in_the_haystack.mp4.md5 2010-01-03 09:27 83 [VID] 26c3-3504-en-our_darknet_and_its_bright_spots.mp4.md5 2010-01-03 09:41 84 [VID] 26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4.md5 2010-01-02 01:05 84 [VID] 26c3-3577-de-privacy-enhanced_event_scheduling.mp4.md5 2010-01-02 00:41 85 [VID] 26c3-3608-en-playing_with_the_gsm_rf_interface.mp4.md5 2010-01-15 12:29 85 [VID] 26c3-3670-en-blackbox_jtag_reverse_engineering.mp4.md5 2010-01-03 11:48 85 [VID] 26c3-3713-de-unbild__pictures_and_non-pictures.mp4.md5 2010-01-02 01:03 85 [VID] 26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4.md5 2010-01-02 01:04 85 [VID] 26c3-3554-de-tor_and_censorship_lessons_learned.mp4.md5 2010-01-02 00:37 86 [VID] 26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4.md5 2010-01-02 00:48 87 [VID] 26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4.md5 2010-01-15 14:17 88 [VID] 26c3-3672-de-advanced_microcontroller_programming.mp4.md5 2010-01-02 00:54 88 [VID] 26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4.md5 2010-01-03 13:30 88 [VID] 26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4.md5 2010-01-02 01:00 90 [VID] 26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4.md5 2010-01-15 11:12 91 [VID] 26c3-3353-de-reverse-engineering_displaylink_devices.mp4.md5 2010-01-02 00:23 91 [VID] 26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4.md5 2010-01-02 00:28 91 [VID] 26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4.md5 2010-01-02 00:32 93 [VID] 26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4.md5 2010-01-03 09:41 93 [VID] 26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4.md5 2010-01-02 00:46 94 [VID] 26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4.md5 2010-01-15 11:27 95 [VID] 26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4.md5 2010-01-02 00:52 97 [VID] 26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4.md5 2010-01-03 13:18 98 [VID] 26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4.md5 2010-01-02 00:46 99 [VID] 26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4.md5 2010-01-02 00:59 100 [VID] 26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4.md5 2010-01-02 00:59 100 [VID] 26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4.md5 2010-01-02 00:33 101 [VID] 26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4.md5 2010-01-02 00:55 101 [VID] 26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4.md5 2010-01-02 00:32 103 [VID] 26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4.md5 2010-01-02 00:22 110 [VID] 26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4.md5 2010-01-02 00:40 112 [VID] 26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4.md5 2010-01-02 00:36 113 [VID] 26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4.md5 2010-01-02 00:49 120 [VID] 26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4.md5 2010-01-03 03:09 125 [VID] 26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4.md5 2010-01-02 01:04 146 [VID] 26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4.md5 2010-01-07 19:17 153 [VID] 26c3.mp4.all.md5 2011-01-18 07:39 7.1K [   ] 26c3-3688-de-haste_man_netblock.mp4.torrent 2011-01-18 04:44 15K [   ] 26c3-3717-en-closing_event.mp4.torrent 2011-01-18 04:47 16K [   ] 26c3-3353-de-reverse-engineering_displaylink_devices.mp4.torrent 2011-01-18 04:34 17K [   ] 26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4.torrent 2011-01-18 04:34 18K [   ] 26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4.torrent 2011-01-18 04:36 18K [   ] 26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4.torrent 2011-01-18 04:36 19K [   ] 26c3-3664-en-homewreckery.mp4.torrent 2011-01-18 04:43 19K [   ] 26c3-3596-de-cat_procsysnetipv4fuckups.mp4.torrent 2011-01-18 04:40 19K [   ] 26c3-3350-en-milkymist.mp4.torrent 2011-01-18 04:34 19K [   ] 26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4.torrent 2011-01-18 04:40 20K [   ] 26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4.torrent 2011-01-18 04:45 20K [   ] 26c3-3302-en-i_internet.mp4.torrent 2011-01-18 04:34 20K [   ] 26c3-3594-de-internetsperren.mp4.torrent 2011-01-18 04:40 21K [   ] 26c3-3608-en-playing_with_the_gsm_rf_interface.mp4.torrent 2011-01-18 04:40 22K [   ] 26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4.torrent 2011-01-18 04:42 22K [   ] 26c3-3710-en-the_lost_cosmonauts.mp4.torrent 2011-01-18 04:46 22K [   ] 26c3-3700-de-here_be_dragons.mp4.torrent 2011-01-18 04:45 22K [   ] 26c3-3631-en-finding_the_key_in_the_haystack.mp4.torrent 2011-01-18 04:40 23K [   ] 26c3-3672-de-advanced_microcontroller_programming.mp4.torrent 2011-01-18 04:44 23K [   ] 26c3-3685-de-im_herz_der_bestie.mp4.torrent 2011-01-18 04:44 23K [   ] 26c3-3504-en-our_darknet_and_its_bright_spots.mp4.torrent 2011-01-18 04:36 23K [   ] 26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4.torrent 2011-01-18 04:39 23K [   ] 26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4.torrent 2011-01-18 04:39 24K [   ] 26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4.torrent 2011-01-18 04:37 24K [   ] 26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4.torrent 2011-01-18 04:46 24K [   ] 26c3-3691-de-vier_fuste_fr_ein_halleluja.mp4.torrent 2011-01-18 04:45 24K [   ] 26c3-3523-de-eine_zensur_findet_statt.mp4.torrent 2011-01-18 04:37 24K [   ] 26c3-3509-de-wofr_offenes_internet.mp4.torrent 2011-01-18 04:36 25K [   ] 26c3-3490-en-building_a_debugger.mp4.torrent 2011-01-18 04:35 25K [   ] 26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4.torrent 2011-01-18 04:45 25K [   ] 26c3-3670-en-blackbox_jtag_reverse_engineering.mp4.torrent 2011-01-18 04:43 25K [   ] 26c3-3515-en-secubt.mp4.torrent 2011-01-18 04:36 26K [   ] 26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4.torrent 2011-01-18 04:38 26K [   ] 26c3-3501-en-why_net_neutrality_matters.mp4.torrent 2011-01-18 04:36 26K [   ] 26c3-3468-de-privacy_amp_stylometry.mp4.torrent 2011-01-18 04:35 26K [   ] 26c3-3495-de-das_zugangserschwerungsgesetz.mp4.torrent 2011-01-18 04:35 26K [   ] 26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4.torrent 2011-01-18 04:38 26K [   ] 26c3-3600-de-location_tracking_does_scale_up.mp4.torrent 2011-01-18 04:40 27K [   ] 26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4.torrent 2011-01-18 04:38 27K [   ] 26c3-3577-de-privacy-enhanced_event_scheduling.mp4.torrent 2011-01-18 04:39 27K [   ] 26c3-3657-en-optimised_to_fail.mp4.torrent 2011-01-18 04:42 27K [   ] 26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4.torrent 2011-01-18 04:37 27K [   ] 26c3-3510-de-technik_des_neuen_epa.mp4.torrent 2011-01-18 04:36 27K [   ] 26c3-3696-en-wireless_power_transfer.mp4.torrent 2011-01-18 04:45 27K [   ] 26c3-3452-en-here_be_electric_dragons.mp4.torrent 2011-01-18 04:34 27K [   ] 26c3-3547-en-after_the_hype.mp4.torrent 2011-01-18 04:37 27K [   ] 26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4.torrent 2011-01-18 04:46 27K [   ] 26c3-3573-en-playing_with_the_built_city.mp4.torrent 2011-01-18 04:39 27K [   ] 26c3-3713-de-unbild__pictures_and_non-pictures.mp4.torrent 2011-01-18 04:46 27K [   ] 26c3-3648-en-dect_part_ii.mp4.torrent 2011-01-18 04:42 28K [   ] 26c3-3481-de-leyen-rhetorik.mp4.torrent 2011-01-18 04:35 28K [   ] 26c3-3266-de-hacking_the_universe.mp4.torrent 2011-01-18 04:34 28K [   ] 26c3-3709-en-legic_prime_obscurity_in_depth.mp4.torrent 2011-01-18 04:46 28K [   ] 26c3-3592-de-cybernetic_cannibalism.mp4.torrent 2011-01-18 04:39 28K [   ] 26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4.torrent 2011-01-18 04:42 28K [   ] 26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4.torrent 2011-01-18 04:47 28K [   ] 26c3-3567-en-wikileaks_release_10.mp4.torrent 2011-01-18 04:39 28K [   ] 26c3-3464-de-liquid_democracy.mp4.torrent 2011-01-18 04:35 28K [   ] 26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4.torrent 2011-01-18 04:37 28K [   ] 26c3-3554-de-tor_and_censorship_lessons_learned.mp4.torrent 2011-01-18 04:38 29K [   ] 26c3-3540-en-a_hackers_utopia.mp4.torrent 2011-01-18 04:37 29K [   ] 26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4.torrent 2011-01-18 04:44 29K [   ] 26c3-3590-de-europische_biometriestrategien.mp4.torrent 2011-01-18 04:39 29K [   ] 26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4.torrent 2011-01-18 04:47 30K [   ] 26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4.torrent 2011-01-18 04:40 30K [   ] 26c3-3570-en-weaponizing_cultural_viruses.mp4.torrent 2011-01-18 04:39 30K [   ] 26c3-3654-en-gsm_srsly.mp4.torrent 2011-01-18 04:42 31K [   ] 26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4.torrent 2011-01-18 04:43 32K [   ] 26c3-3711-de-computerspielepolitik.mp4.torrent 2011-01-18 04:46 32K [   ] 26c3-3494-de-defending_the_poor.mp4.torrent 2011-01-18 04:35 32K [   ] 26c3-3520-en-conlanging_101.mp4.torrent 2011-01-18 04:36 33K [   ] 26c3-3613-de-fnord-jahresrckblick_2009.mp4.torrent 2011-01-18 04:40 35K [   ] 26c3-3658-en-black_ops_of_pki.mp4.torrent 2011-01-18 04:42 35K [   ] 26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4.torrent 2011-01-18 04:47 35K [   ] 26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4.torrent 2011-01-18 04:46 38K [   ] 26c3-3725-en-stream_security_nightmares.mp4.torrent 2011-01-18 04:47 38K [   ] 26c3-3687-de-security_nightmares.mp4.torrent 2011-01-18 04:44 38K [   ] 26c3-3690-de-ccc-jahresrckblick.mp4.torrent 2011-01-18 04:44 39K [   ] 26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4.torrent 2011-01-18 04:44 46K [   ] 26c3-3550-de-chaos-familien-duell.mp4.torrent 2011-01-18 04:38 52K [   ] 26c3-3563-en-lightning_talks_-_day_1.mp4.torrent 2011-01-18 04:38 53K [   ] 26c3-3669-de-hacker_jeopardy.mp4.torrent 2011-01-18 04:43 56K [   ] 26c3-3668-en-hacker_jeopardy.mp4.torrent 2011-01-18 04:43 56K [   ] 26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4.torrent 2011-01-18 04:34 57K [   ] 26c3-3642-en-lightning_talks_-_day_2.mp4.torrent 2011-01-18 04:41 59K [   ] 26c3-3644-de-lightning_talks_-_day_3.mp4.torrent 2011-01-18 04:41 60K [   ] 26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4.torrent 2011-01-18 04:45 62K [   ] 26c3-3645-en-lightning_talks_-_day_4.mp4.torrent 2011-01-18 04:42 62K [   ] 26c3.mp4.all.torrent 2011-01-18 21:21 2.5M [VID] 26c3-3688-de-haste_man_netblock.mp4 2010-01-01 20:38 362M [VID] 26c3-3717-en-closing_event.mp4 2010-01-03 12:24 385M [VID] 26c3-3353-de-reverse-engineering_displaylink_devices.mp4 2009-12-29 17:32 417M [VID] 26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4 2010-01-15 11:06 449M [VID] 26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4 2010-01-03 02:58 456M [VID] 26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4 2009-12-30 17:40 461M [VID] 26c3-3664-en-homewreckery.mp4 2009-12-29 20:18 467M [VID] 26c3-3596-de-cat_procsysnetipv4fuckups.mp4 2009-12-30 17:25 469M [VID] 26c3-3350-en-milkymist.mp4 2009-12-30 17:22 470M [VID] 26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4 2009-12-30 11:31 490M [VID] 26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4 2009-12-29 16:33 502M [VID] 26c3-3302-en-i_internet.mp4 2009-12-30 11:21 505M [VID] 26c3-3594-de-internetsperren.mp4 2009-12-29 04:47 519M [VID] 26c3-3608-en-playing_with_the_gsm_rf_interface.mp4 2010-01-15 12:22 536M [VID] 26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4 2009-12-30 00:41 547M [VID] 26c3-3710-en-the_lost_cosmonauts.mp4 2009-12-30 10:46 551M [VID] 26c3-3700-de-here_be_dragons.mp4 2009-12-29 00:11 554M [VID] 26c3-3631-en-finding_the_key_in_the_haystack.mp4 2010-01-03 09:26 565M [VID] 26c3-3672-de-advanced_microcontroller_programming.mp4 2009-12-30 00:40 578M [VID] 26c3-3685-de-im_herz_der_bestie.mp4 2010-01-03 10:31 582M [VID] 26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4 2009-12-29 17:30 582M [VID] 26c3-3504-en-our_darknet_and_its_bright_spots.mp4 2010-01-03 09:33 583M [VID] 26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4 2010-01-03 09:36 586M [VID] 26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4 2009-12-30 10:45 592M [VID] 26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4 2010-01-03 03:07 600M [VID] 26c3-3691-de-vier_fuste_fr_ein_halleluja.mp4 2009-12-30 18:09 607M [VID] 26c3-3523-de-eine_zensur_findet_statt.mp4 2009-12-29 14:41 608M [VID] 26c3-3509-de-wofr_offenes_internet.mp4 2010-01-17 21:42 618M [VID] 26c3-3490-en-building_a_debugger.mp4 2010-01-07 17:22 620M [VID] 26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4 2009-12-30 11:33 623M [VID] 26c3-3670-en-blackbox_jtag_reverse_engineering.mp4 2010-01-03 11:47 634M [VID] 26c3-3515-en-secubt.mp4 2009-12-30 17:41 638M [VID] 26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4 2009-12-29 17:39 640M [VID] 26c3-3501-en-why_net_neutrality_matters.mp4 2010-01-15 12:53 645M [VID] 26c3-3468-de-privacy_amp_stylometry.mp4 2009-12-29 20:37 653M [VID] 26c3-3495-de-das_zugangserschwerungsgesetz.mp4 2009-12-29 15:26 656M [VID] 26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4 2009-12-29 20:26 657M [VID] 26c3-3600-de-location_tracking_does_scale_up.mp4 2009-12-30 11:34 662M [VID] 26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4 2010-01-15 14:10 663M [VID] 26c3-3577-de-privacy-enhanced_event_scheduling.mp4 2009-12-30 12:35 666M [VID] 26c3-3657-en-optimised_to_fail.mp4 2010-02-09 19:45 667M [VID] 26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4 2009-12-30 10:54 669M [VID] 26c3-3510-de-technik_des_neuen_epa.mp4 2009-12-30 11:56 670M [VID] 26c3-3696-en-wireless_power_transfer.mp4 2009-12-29 17:38 671M [VID] 26c3-3452-en-here_be_electric_dragons.mp4 2009-12-29 15:57 671M [VID] 26c3-3547-en-after_the_hype.mp4 2010-01-03 10:13 676M [VID] 26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4 2010-01-15 11:21 678M [VID] 26c3-3573-en-playing_with_the_built_city.mp4 2009-12-30 10:37 679M [VID] 26c3-3713-de-unbild__pictures_and_non-pictures.mp4 2009-12-29 16:45 682M [VID] 26c3-3648-en-dect_part_ii.mp4 2009-12-30 10:39 688M [VID] 26c3-3481-de-leyen-rhetorik.mp4 2009-12-29 14:43 688M [VID] 26c3-3266-de-hacking_the_universe.mp4 2010-01-03 11:52 693M [VID] 26c3-3709-en-legic_prime_obscurity_in_depth.mp4 2009-12-30 16:14 700M [VID] 26c3-3592-de-cybernetic_cannibalism.mp4 2009-12-29 17:41 703M [VID] 26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4 2009-12-29 16:36 705M [VID] 26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4 2009-12-29 17:13 705M [VID] 26c3-3567-en-wikileaks_release_10.mp4 2009-12-29 16:00 706M [VID] 26c3-3464-de-liquid_democracy.mp4 2009-12-30 17:27 708M [VID] 26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4 2009-12-30 00:21 709M [VID] 26c3-3554-de-tor_and_censorship_lessons_learned.mp4 2009-12-29 15:27 715M [VID] 26c3-3540-en-a_hackers_utopia.mp4 2009-12-29 16:17 717M [VID] 26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4 2009-12-29 23:31 717M [VID] 26c3-3590-de-europische_biometriestrategien.mp4 2009-12-30 10:40 725M [VID] 26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4 2009-12-29 16:45 736M [VID] 26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4 2009-12-30 17:54 760M [VID] 26c3-3570-en-weaponizing_cultural_viruses.mp4 2009-12-30 12:53 762M [VID] 26c3-3654-en-gsm_srsly.mp4 2009-12-29 16:19 776M [VID] 26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4 2009-12-29 16:42 790M [VID] 26c3-3711-de-computerspielepolitik.mp4 2009-12-29 14:49 800M [VID] 26c3-3494-de-defending_the_poor.mp4 2009-12-29 17:18 801M [VID] 26c3-3520-en-conlanging_101.mp4 2010-01-08 10:46 825M [VID] 26c3-3613-de-fnord-jahresrckblick_2009.mp4 2010-01-15 11:52 879M [VID] 26c3-3658-en-black_ops_of_pki.mp4 2010-01-06 21:43 882M [VID] 26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4 2009-12-30 17:43 886M [VID] 26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4 2009-12-30 14:54 955M [VID] 26c3-3725-en-stream_security_nightmares.mp4 2010-01-03 13:38 959M [VID] 26c3-3687-de-security_nightmares.mp4 2010-01-02 17:07 961M [VID] 26c3-3690-de-ccc-jahresrckblick.mp4 2009-12-30 10:33 1.0G [VID] 26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4 2010-01-03 12:49 1.1G [VID] 26c3-3550-de-chaos-familien-duell.mp4 2009-12-29 17:22 1.3G [VID] 26c3-3563-en-lightning_talks_-_day_1.mp4 2010-01-08 10:05 1.3G [VID] 26c3-3669-de-hacker_jeopardy.mp4 2010-01-06 19:49 1.4G [VID] 26c3-3668-en-hacker_jeopardy.mp4 2010-01-15 13:24 1.4G [VID] 26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4 2009-12-29 16:28 1.4G [VID] 26c3-3642-en-lightning_talks_-_day_2.mp4 2009-12-29 18:33 1.4G [VID] 26c3-3644-de-lightning_talks_-_day_3.mp4 2010-01-03 12:33 1.5G [VID] 26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4 2010-01-03 13:27 1.5G [VID] 26c3-3645-en-lightning_talks_-_day_4.mp4 2010-01-03 12:20 1.5G
Apache/2.4.41 (Ubuntu) Server at dewy.fem.tu-ilmenau.de Port 80