b6c7f0a97249ed304b93c6e24b8a176f *26c3-3266-de-hacking_the_universe.mp3 ae013be6d519e12575e53ade63cdae88 *26c3-3302-en-i_internet.mp3 3b979a8e1dd466d082399bb1299976d8 *26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp3 c402d5edb20d83b7dff0be704db25310 *26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp3 bab74007bf3da689ce116d76ecffa964 *26c3-3350-en-milkymist.mp3 89b253446b3f6379b28aa1d98db7942e *26c3-3353-de-reverse-engineering_displaylink_devices.mp3 ec4c42a26d2b26925f439206ed81305a *26c3-3452-en-here_be_electric_dragons.mp3 261b56cf0acdd57070c68b65787eaf83 *26c3-3464-de-liquid_democracy.mp3 96e1fa54f5e75d3687bc624dc0a2968a *26c3-3468-de-privacy__stylometry.mp3 bc27b05a59a73542f0a2ec14c2ccee65 *26c3-3481-de-leyen-rhetorik.mp3 6633f24b4f1fdefacdd4dec094259db5 *26c3-3490-en-building_a_debugger.mp3 28a9ec5e607e3070a7485ac755653102 *26c3-3494-de-defending_the_poor.mp3 84206f3f2265d48d63d6428ab151e06e *26c3-3496-de-fugngernavigation_mit_augmented_reality.mp3 b306206591cb0735532e5ea0da86b87c *26c3-3501-en-why_net_neutrality_matters.mp3 ba4a8cb70eb412c0f66e9f18dc7058bd *26c3-3504-en-our_darknet_and_its_bright_spots.mp3 31a1cf9884e5ce92ceb791c5a01709d0 *26c3-3507-de-fuzzing_the_phone_in_your_phone.mp3 08a84d153fbba08dcbf4b8ef9853241a *26c3-3509-de-wofr_offenes_internet.mp3 0ba1bb07737a6e1b966f934e630bb9b7 *26c3-3510-de-technik_des_neuen_epa.mp3 b9ba0499db36d866490fb4820dbe4a0c *26c3-3515-de-secubt.mp3 bc77ba683e4465e707de8ea671ffcb9b *26c3-3520-en-conlanging_101.mp3 92f77e0e384ecd42185a6cd20c830568 *26c3-3523-de-eine_zensur_findet_statt.mp3 2575b9c8f204f4f059f1e50b460f3214 *26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp3 03331dfde708c5f251b7fe9a51bc6727 *26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp3 1d95d5bff6908acc6735180216ea949e *26c3-3540-en-a_hackers_utopia.mp3 a88a7a36ec6c8e5a23fef3f88c639fe4 *26c3-3547-en-after_the_hype.mp3 27acd6c870dad5af6ebc069c40545bf6 *26c3-3550-de-chaos-familien-duell.mp3 fdacc29bb5cae6f7552e283b91d697f8 *26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp3 84eb37b6d06c53858ecc16f25aeba79c *26c3-3554-de-tor_and_censorship_lessons_learned.mp3 22c11078004bbad7777bf22e857e54ec *26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp3 53f711e3d1c7cdbbeafd9c7391455c57 *26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp3 3c387bd207c96132e9f7fb2734ad0cbc *26c3-3563-en-lightning_talks_-_day_1.mp3 473ab616f30681219ddcadfd089a8fd6 *26c3-3567-en-wikileaks_release_10.mp3 d78bfaaca1ea019b6e187bff95c0dd78 *26c3-3570-en-weaponizing_cultural_viruses.mp3 de82d228156f4d0ddf1ffbec339b9ba8 *26c3-3573-en-playing_with_the_built_city.mp3 5185445ff6fa4fce23c1cfcbfc38c65d *26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp3 a97ba5efc2269b3e14b75f5f9140d6eb *26c3-3577-de-privacy-enhanced_event_scheduling.mp3 6a4c3ec6c73934906f1fc20e3b1d25f4 *26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp3 bca3869990992a771f9d4558ef250dff *26c3-3590-de-europische_biometriestrategien.mp3 4420a778f3f2b3dece9e1a961ba86847 *26c3-3592-de-cybernetic_cannibalism.mp3 040123304ae1ccd9f43c98cd2d3c6054 *26c3-3594-de-internetsperren.mp3 55a438f3aa825efc6f0006994ffccb02 *26c3-3596-de-cat_procsysnetipv4fuckups.mp3 313674014555a1bcf77e681ccea1c5fa *26c3-3600-de-location_tracking_does_scale_up.mp3 0c2dcc7502a5eac8cea753832faaccc0 *26c3-3608-en-playing_with_the_gsm_rf_interface.mp3 2aaf13429a7692ef20fc269a8e931fef *26c3-3613-de-fnord-jahresrckblick_2009.mp3 61e9aaec471c8b01c2e1e037264e104f *26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp3 0d1eef7006c5947ef9d599593535a5ff *26c3-3631-en-finding_the_key_in_the_haystack.mp3 7c773e1ed98fa8a25e3ab3b08a647d87 *26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp3 49c72861e51a520c491371d6e1f4df0b *26c3-3642-en-lightning_talks_-_day_2.mp3 aeb598e4db6fe8e228ef69cc911b4fc9 *26c3-3644-en-lightning_talks_-_day_3.mp3 4ad9ebe833483cd2261483fa6e2a88bd *26c3-3645-en-lightning_talks_-_day_4.mp3 88c5b306fd0090e3dc49ddd9ee5b552f *26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp3 4701117f34d8197a0efa0423ffc22749 *26c3-3648-en-dect_part_ii.mp3 448b0276d689ccf31663a448357fca70 *26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp3 7bb6a2d5efb4013046a0141bdd8e0d53 *26c3-3654-en-gsm_srsly.mp3 d654f17dd627d6218c7f65dbd280b14c *26c3-3657-en-optimised_to_fail.mp3 663052231b2d69d9fda697faa15943a8 *26c3-3658-en-black_ops_of_pki.mp3 c22e36eac3ba4ef9fca4ce211538c1fe *26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp3 86a900b1c985db3ddf79807e8f550178 *26c3-3664-en-homewreckery.mp3 52a38d9d1f72f7e2e9aa49cb8dcc7a06 *26c3-3668-en-hacker_jeopardy.mp3 25343f342627d60f61894ab6412c8411 *26c3-3669-de-hacker_jeopardy.mp3 9163691b43d9cd94e0f612a7dea1ea1b *26c3-3670-en-blackbox_jtag_reverse_engineering.mp3 75558a8a12fcdb2a1fddf4c0532cf85e *26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp3 43c14e5ed2f44dd3cb6d7db9dd9a1cfc *26c3-3672-de-advanced_microcontroller_programming.mp3 18f039471f6ae523d756c54e61474b39 *26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp3 c4292c4b52ec77063cf5ef43dc830394 *26c3-3685-de-im_herz_der_bestie.mp3 f28b9ca5e4e76ce3ce718ee6dbd25470 *26c3-3687-de-security_nightmares.mp3 709f4a0ca639ecf98d053555b60788df *26c3-3688-de-haste_man_netblock.mp3 5bfa4eceaa1db15a8152629f59a2de0f *26c3-3690-de-ccc-jahresrckblick.mp3 60093faa6f6e1209467021b1d7600ca8 *26c3-3691-de-vier_fuste_fr_ein_halleluja.mp3 f741cd84750be8231799757a31d2aab7 *26c3-3696-en-wireless_power_transfer.mp3 bf2d010882b77c6f7fbeb7f322e26877 *26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp3 4724b376ec8edd054cdf18c3cac91846 *26c3-3700-de-here_be_dragons.mp3 86b1dd2ac854b89ddc42fca0c10f3c4c *26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp3 9e5f6428da698778451531e701695c56 *26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp3 1407035b064ab157d5ead7337bf28b06 *26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp3 1210e4ceefeb3dcc7c3e1c04ec3d5e49 *26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp3 aa7416412d1ba0996c597b7917808705 *26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp3 41f36f1daf3c49c0c95b3a8a7a43ba10 *26c3-3709-en-legic_prime_obscurity_in_depth.mp3 754c6b8e284eaaa385d4565a5a8aec20 *26c3-3710-en-the_lost_cosmonauts.mp3 8d949d111b815da678c334a88ff9cc9a *26c3-3711-de-computerspielepolitik.mp3 9d6d2860857c517a176932b704b6b547 *26c3-3713-de-unbild__pictures_and_non-pictures.mp3 8b6031be16537fc1939feea97dab3091 *26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp3 4059e3d0a6366804b6b9e2f5392e535c *26c3-3717-en-closing_event.mp3 efff445ea88a9a26707fc816a8c35f7e *26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp3 f1b2abecb68879e49fa91c18f9fb86df *26c3-3723-en-stream_fnord-jahresrckblick_2009.mp3 49f0237df44bf1ec36bc003f7c23807f *26c3-3725-en-stream_security_nightmares.mp3