DiscoverChaos Computer Club - 31C3: a new dawn (mp3)
Chaos Computer Club - 31C3: a new dawn (mp3)
Claim Ownership

Chaos Computer Club - 31C3: a new dawn (mp3)

Author: m.eik, Christoph, Bruder

Subscribed: 0Played: 26
Share

Description

A wide variety of video material distributed by the Chaos Computer Club. This feed contains all events from 31c3 as mp3
190 Episodes
Reverse
A discussion with U.S. Army private Chelsea Manning's attorneys Nanny Hollander, Ahmed Ghappour, and Chase Strangio. Moderated by journalist Alexa O'Brien.
Premiere of the English version of the shortfilm "We love surveillance".
about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6562.html
Security Nightmares (31c3)

Security Nightmares (31c3)

2014-12-3001:41:37

Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen? about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6572.html
Telescope Making (31c3)

Telescope Making (31c3)

2014-12-3001:09:11

In this talk an introduction to amateur telescope making (ATM) will be provided. Starting from grinding the mirror, testing it and building the telescope around it. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5931.html
This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6112.html
Sections 0:10 Network (NOC) 26:19 Power 29:39 Seidenstraße (SOC) 37:21 Video (VOC) about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6557.html
We are the PayPal 14. For the last several years we've been restricted in what we could or couldn't say about our court case. Our sentencing is on December 4th, ending the legal restrictions on what we can share about our story. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6377.html
When the Internet was designed, it was thought to be meadows full of daisies. As we now know, it's a dark place, where communication is monitored and subverted. This session presents both developments in known solutions, as well as novel suggestions, to liberally apply crypto to improve the foundations of Internet communications. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6597.html
New methods and approaches for securing cloud environments are becoming increasingly more critical as traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory. The cloud environment nevertheless offers a unique opportunity: the ability to peer into a running operating system from an outside perspective, known as virtual machine introspection (VMI). More interestingly, it is also possible to alter the behavior of the virtualized components to help protect virtual systems in real-time. In this talk we will explore the open-source LibVMI library which over the last year, as part of the DARPA Cyber Fast Track program, has been significantly extended to ease the process of developing cloud security solutions. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6297.html
State of the Onion (31c3)

State of the Onion (31c3)

2014-12-3001:12:29

The current state of the Tor network and community, covering important updates, discussions of the ecosystem of software, and include a longer Q&A than previous CCC talks! about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6251.html
Let's Encrypt (31c3)

Let's Encrypt (31c3)

2014-12-3001:02:15

As we've called for widespread use of HTTPS, the cost and complexity of the certificate system has been an obstacle. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6397.html
Computers have become ubiquitous and essential, but they remain massively error-prone and insecure - as if we were back in the early days of the industrial revolution, with steam engines exploding left, right, and centre. Why is this, and can we do better? Is it science, engineering, craft, or bodgery? I'll talk about attempts to mix better engineering methods from a cocktail of empiricism and logic, with examples from network protocols, programming languages, and (especially) the concurrency behaviour of programming languages and multiprocessors (from the ARMs in your phone to x86 and IBM Power servers), together with dealings with architects and language standards groups. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6574.html
Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6580.html
The next revolution in data processing is Quantum computing. This talk is an entertaining “tour de force” starting with a brief introduction to the fascinating yet strange theories of quantum physics, the concepts of using these in quantum computing and the latest results on qubits in devices made out of real diamonds. If you want to learn about the machines that decrypt your passwords in the coming years and how you can actually grow diamonds in your microwave oven (and who wouldn’t?) this talk is for you! about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6157.html
Re-using works licensed under Creative Commons seems pretty simple, but it can often be quite time consuming. One image might be okay, but keeping track of the license and attribution of a thousand images in your mashup, or when quoting from massively crowdsourced data sets such as Wikipedia? Whoah! Don’t we have computers to do that for us!? We do – but there’s no widespread support for including licensing or author information when sharing or reusing digital works. This session will discuss how this should work in the open knowledge environment. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6214.html
In the parliamentary elections of September 2013, more than 250 000 Norwegians in selected municipalities were able to vote from home. They were taking part in a national trial of Internet voting, building on an advanced cryptographic protocol. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6213.html
Capturing the splash of a water balloon, the snap of a mouse trap or the impact of a bullet results in exciting pictures. Best of all, it doesn't require expensive equipment. This talk covers the theory of high speed photography, the required hardware, microcontroller hacking and setting up an improvised studio in the shower. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/5943.html
Extending the common 3-space-to-2-space projections to 4D and higher and how certain types of fractals can be presented using these expansions. After that we'll have a closer look at Fractal Flames as used in Electric Sheep. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6072.html
This speech about how the hacker scene is failing its own ideals and what questions must be addressed to make a real difference. about this event: http://events.ccc.de/congress/2014/Fahrplan/events/6205.html
loading
Comments 
Download from Google Play
Download from App Store