PLAY PODCASTS
Chaos Computer Club - archive feed

Chaos Computer Club - archive feed

14,359 episodes — Page 269 of 288

Die Zukunft der Demokratie - Alles Bingo oder was? (sigint09)

May 22, 200954 min

Datenschutz - und was tun die Gewerkschaften? (sigint09)

May 22, 200954 min

Die Politik von Deep Packet Inspection (sigint09)

May 22, 200958 min

The Innermost Unifier: The Corporate Anthem (sigint09)

May 22, 20091h 19m

Keynote Tag 1: Control and Surveillance (sigint09)

May 22, 200941 min

Paranoid Machines (sigint09)

May 22, 200959 min

Analyse von Daten aus Überwachungsvorgängen; Werkzeuge der Geheimdienste (sigint09)

May 22, 200954 min

Sollte Sicherheitstechnik demokratisiert werden? (sigint09)

May 22, 20091h 2m

Open Government (sigint09)

May 22, 20091h 45m

ePass und ePA (sigint09)

May 22, 20091h 8m

Wikileaks (har2009)

Jan 1, 200951 min

Wikileaks panel (har2009)

Jan 1, 20091h 16m

Wikileaks - followup (har2009)

Jan 1, 200945 min

Ministerin Zypries diskutiert mit IT-Aktivisten auf den mrmcd0x8h (mrmcd0x8)

Jan 1, 20091h 0m

Chaosradio Documentation (chaosradio)

Jan 1, 20097 min

MD5 considered harmful today (25c3)

Dec 30, 20081h 1m

Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You (25c3)

Dec 30, 200848 min

Vertex Hacking (25c3)

Dec 30, 200848 min

Mining social contacts with active RFID (25c3)

Dec 30, 200859 min

Crafting and Hacking: Separated at Birth (25c3)

Dec 30, 200836 min

Pflanzenhacken (25c3)

Dec 30, 200854 min

Wikileaks (25c3)

Dec 30, 200858 min

Security Nightmares 2009 (25c3)

Dec 30, 20081h 34m

Security Nightmares 2009 (English interpretation) (25c3)

Dec 30, 20081h 32m

La Quadrature du Net - Campaigning on Telecoms Package (25c3)

Dec 30, 20081h 6m

Predictable RNG in the vulnerable Debian OpenSSL package (25c3)

Dec 30, 200850 min

Why technology sucks (25c3)

Dec 30, 200844 min

Lightning Talks Day4 (25c3)

Dec 30, 20081h 1m

Closing Ceremony (25c3)

Dec 30, 200850 min

SWF and the Malware Tragedy (25c3)

Dec 29, 200848 min

OnionCat – A Tor-based Anonymous VPN (25c3)

Dec 29, 200844 min

Security and anonymity vulnerabilities in Tor (25c3)

Dec 29, 20081h 2m

Squeezing Attack Traces (25c3)

Dec 29, 200838 min

Lightning Talks Day3 - Evening (25c3)

Dec 29, 200855 min

Der elektronische Personalausweis (25c3)

Dec 29, 20081h 0m

Hacker Jeopardy (English interpretation) (25c3)

Dec 29, 20081h 42m

The Privacy Workshop Project (25c3)

Dec 29, 200848 min

Stormfucker: Owning the Storm Botnet (25c3)

Dec 29, 20081h 20m

Analyzing RFID Security (25c3)

Dec 29, 200854 min

Cisco IOS attack and defense (25c3)

Dec 29, 20081h 6m

Lightning Talks Day3 - Morning (25c3)

Dec 29, 200859 min

Neusprech im Überwachungsstaat (25c3)

Dec 29, 20081h 10m

Privacy in the social semantic web (25c3)

Dec 29, 200845 min

eVoting after Nedap and Digital Pen (25c3)

Dec 29, 20081h 5m

Methods for Understanding Targeted Attacks with Office Documents (25c3)

Dec 29, 200851 min

Attacking NFC mobile phones (25c3)

Dec 29, 20081h 22m

DECT (25c3)

Dec 29, 20081h 6m

Hacker Jeopardy (25c3)

Dec 29, 20081h 43m

An introduction to new stream cipher designs (25c3)

Dec 29, 200846 min

Objects as Software: The Coming Revolution (25c3)

Dec 29, 200852 min