432a3777552ca23afc14a63e5fd9d173d3bb6765 *27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3 8f838d9bef28a8781d6e09856635ec427619e0e6 *27c3-3957-en-ipv6_insecurities.mp3 9c6ace4815774298ec97bb2a6b63e558e247a896 *27c3-3983-en-hackers_and_computer_science.mp3 90872b17285911e41df80e500ea7efe38c73159c *27c3-4003-en-cybernetics_for_the_masses.mp3 56f496284a16e120b72818adc543411e6f52fe67 *27c3-4006-en-diy_synthesizers_and_sound_generators.mp3 2ce80c16b203d4138988b9a48d2cd50e67fdace4 *27c3-4011-en-embedded_reverse_engineering.mp3 ce51698e97f07726728d97c1288520413c7ea9eb *27c3-4017-en-desktop_on_the_linux.mp3 7ee2bc03297656088687e8aecb43e8bd4772afc2 *27c3-4018-en-frozencache.mp3 6eb99df5def1a56f27aee7cd9b1df154101b5f81 *27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3 1a89facf36de5af37678e1c0b3aec179c3b5e439 *27c3-4046-en-all_colours_are_beautiful.mp3 f37582e019159aa3ee646fff4b5b82e80e5d7d10 *27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3 d34714e6b6a8863f9ffbe9c7fab98b075ae86ea9 *27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3 2b4b6bac766ab30678ea849155f0d7f899564a7f *27c3-4060-en-attacking_mobile_phones.mp3 83ce663afcef3b9bb0e3bd141258062bf4c4f0c4 *27c3-4061-en-building_custom_disassemblers.mp3 06ea01cb9bb6814d3ebc945f86d9b763c3188c0d *27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3 1ecd72ceeebabe54c0c826bb35164e70076adb30 *27c3-4070-de-fnord_jahresrueckblick.mp3 cf351b0151090ce694f3b301070af6de70e38475 *27c3-4073-de-logikschaltungen_ohne_elektronik.mp3 f11e7d4467d9a71ac2657c13ab49617899930c25 *27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3 0af46bb9f7bec8111de22a468a3f56fb97750ee6 *27c3-4082-en-sap_landscape.mp3 c19f6f3cf6da7e3694991fde6ed6de017a869717 *27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3 318d1d3c4b93786b7867928fcd448efae8685e1e *27c3-4085-de-digitale_spaltung_per_gesetz.mp3 917a0643948336b517033888972f7d0e50266be5 *27c3-4087-en-console_hacking_2010.mp3 4ec2634c420eade7e21bf1e56d653e088b1381b7 *27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3 d1bd5cd20eb76ee45d05a9ecb6e9252443e52af0 *27c3-4090-en-the_baseband_apocalypse.mp3 8cb865816b8e10f7e7e1b16f0f0c1fce11514133 *27c3-4094-de-netzneutralitaet_und_qos.mp3 e84c57e5fa3bc07e6c36752b24a2f941c8c9d10c *27c3-4096-en-code_deobfuscation_by_optimization.mp3 b3cb6793a56f625d88bd97fb044c06bf9ae9d88a *27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3 1bc372406fe5ac9a9a160af15fe59cb863fa59f9 *27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3 f0a2db4aed48ff8237c111ca36bbfce65cecfb8d *27c3-4099-en-file_-_print_-_electronics.mp3 236597974550e83bfc9e3bdf9d78c6238a9daf69 *27c3-4103-en-copyright_enforcement_versus_freedoms.mp3 58af4724008ca0691931e99b93fef47dae0c4da0 *27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3 e7963b11f20a5b051886ca2db1d839f30b82de9c *27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3 ce299f6a4624ad438a438fc395387e1c18b50f20 *27c3-4121-en-is_the_ssliverse_a_safe_place.mp3 8dd3be334bc93439ab21641b305052c14b9242b4 *27c3-4123-en-defense_is_not_dead.mp3 ed0201f44985f249e440a3af60dfd37bba9f8bb5 *27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3 a6db80a85f9168f7c2f03d74395a144381a927d8 *27c3-4125-de-spinning_the_electornic_wheel.mp3 f8b2e0c84727c52567bb11bb3aa064148b4f6cfd *27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3 0c6359fa37d684324e850ab8de49ecbe20f9a4b8 *27c3-4140-en-contemporary_profiling_of_web_users.mp3 068aa41feefadeeff49c39a811faf43d9ae7767e *27c3-4141-de-hacker_jeopardy.mp3 f7ff87b946c94a145a796d0ad5bd60789f00b6ee *27c3-4142-en-nodejs_as_a_networking_tool.mp3 2d8f0cbcd583c8404eeb4dd01454cd82675321d4 *27c3-4143-en-part-time_scientists.mp3 1c43fa21f92d98d59cb690a033a68d9fe455c0fe *27c3-4144-en-a_short_political_history_of_acoustics.mp3 28ddb23bbe7cc12919c99211050b993b17798ac4 *27c3-4145-en-spoilers_human_interfaces_airplanes.mp3 a9264de0cd6be869b86c09ac43693c9908aeead4 *27c3-4149-en-i_control_your_code.mp3 855c12cb92bfc0c9694ce5c0abf855cb4542079e *27c3-4151-en-android_geolocation_using_gsm_network.mp3 1897a7debc2a5e2c853906749e37c6e9e2ecde6d *27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3 181d8ba7b83c31d0b8a8fd6c03730611b9129516 *27c3-4160-en-automatic_identification_cryptographic_primitives.mp3 b42e5aa5356e828b7faa16937717bf5c63898574 *27c3-4164-de-friede_sei_mit_euren_daten.mp3 67e378300875e00077d16f0659850935269816b9 *27c3-4168-en-automated_architecture_independent_gadget_search.mp3 5322484e73613e7ab749bfac60a2d88252600362 *27c3-4174-en-the_hidden_nemesis.mp3 7f8066b6de5bd1f801b5857c12d8da0e70a7c650 *27c3-4175-en-from_robot_to_robot.mp3 25c9e4baf531154eec17edbce122961972b99c08 *27c3-4176-de-hacking_ibuttons.mp3 43d0401b3d463d47bf525410ab6e09e3eec0d484 *27c3-4181-en-sip_home_gateways_under_fire.mp3 bdac0a148dcff8dac1d4567fb6a9f52404496217 *27c3-4183-en-safety_on_the_open_sea.mp3 f6c2ff7a1c66ba6320d253eda2cc542360d7d3c3 *27c3-4184-de-stanislaw_lem_weltverbesserer.mp3 87ad83e7a06d2197971ef7fe039e7e45e673afca *27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3 5a0d178971de0bff916868068dc65cb07170cb0c *27c3-4187-en-your_infrastructure_will_kill_you.mp3 e1f5c7cb7191809dc26dbc61ff3522c07aad9cca *27c3-4190-en-data_retention_in_the_eu.mp3 8d6017b849b90630b766ee19fa53978cfaf49b97 *27c3-4193-en-having_fun_with_rtp.mp3 c3b5c82e789df92775cc1bc0f3feeceeab78d45e *27c3-4195-de-literarischer_abend.mp3 2de9629b5b4d0ffecfb33903119f0d1d1efa92ca *27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3 6e4634e53653e6ca93b343bcc710b0fa71c937f7 *27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3 dd2f9645baa11bda8b3a290de7596a6c229205ad *27c3-4206-en-immi_from_concept_to_reality.mp3 d26afc8ef5c8f6cc07080118006f65e21693bc28 *27c3-4208-en-wideband_gsm_sniffing.mp3 142a2a05381b35097d768dc11f5ab450bee30352 *27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3 0005d77d429ea56a6d7cab2b755ade62dad3bdbf *27c3-4210-en-lying_to_the_neighbours.mp3 b7f328def9ce4960f3cd6459dca287298bd800cc *27c3-4211-en-chip_and_pin_is_broken.mp3 313cddb4780f65b9781212ae93ff406e88086d74 *27c3-4221-en-omg_wtf_pdf.mp3 48a76b0c6e01bbad13cd3fc26313ca892b46ed41 *27c3-4230-de-security_nightmares.mp3 ccece1aac4a6474d71e9dcf95825638f6b798318 *27c3-4231-en-datenrettung_fun_with_hard_drives.mp3 d097b087e04c06a2d99fb4bcd70442352ef3a8f4 *27c3-4234-en-usb_and_libusb.mp3 27356743fcac3e271fb06b6f69e57d150fce3ae3 *27c3-4236-en-international_cyber_jurisdiction.mp3 2762cf7e301ec47e14854a5f5c5a8c2797e6cc8e *27c3-4237-en-indect_eu_surveillance_project.mp3 fd2017912dbc5e0ed348c3eec862ec753d9686a8 *27c3-4239-en-lightning_talks_d3.mp3 a49ee5392425be4ea78b9daf6903d80826d83eaf *27c3-4244-en-critical_overview_of_10_years_pet.mp3 36a8f0bcbddfbbc1f7088476f5e53923675e3b41 *27c3-4245-en-adventures_in_analyzing_stuxnet.mp3 b802c33b0571ccf86c50d0aa4e59ab60cd7dde2a *27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3 86fd54dc8f2ba6f616ca95c9b4b9a94e4e5521f6 *27c3-4253-en-pentanews_game_show.mp3 918b14589a71fce02e94aebea3cfe767080ea326 *27c3-4261-en-key_recovery_attacks_rc4.mp3 dc2a7afff9a4b4561131823407fafd9c791ce992 *27c3-4263-en-resisting_excessive_government_surveillance.mp3 46ff09502a611bea6fd9f778f18223704194f23b *27c3-4265-en-hacking_smart_phones.mp3 eb74d81c07ce81dcb8712b2367338c9b0bb44a37 *27c3-4276-en-cognitive_psychology_for_hackers.mp3 0ee8f22101a98f5ef23320ab7516c00ce344c483 *27c3-4295-en-high_speed_high_security_cryptography.mp3 8038fa5a0049370094725f20d4a1d58b3e90962e *27c3-4296-en-lightning_days_d2.mp3 027b856bd9b7de7a33748f5192a0e5a1ed7d9593 *27c3-4297-de-die_gesamte_technik_ist_sicher.mp3 2893019b2b4af12332cba1377cb9fd562c2a2043 *27c3-4298-de-ccc_jahresrueckblick_2010.mp3 011a3f41d74df69959850eef4cea6213d0b99811 *27c3-4299-en-closing_event.mp3 de50244a1ba967400525d9ea01c1b9ba370e0dab *27c3-4300-en-lightning_talks_d4.mp3 34c39033028a4db96f9b0e7bc2f82a31cdf5de12 *27c3-4301-en-flow_analysis_of_internet_activities.mp3 b2a20b40d533ceff8984149cc4d26ae6316a5ec5 *27c3-4302-en-27c3_keynote_we_come_in_peace.mp3 1ddb4b3351d04145a8f15a62bab5274deaa7c566 *27c3-4326-de-radio_der_zukunft.mp3 6bf0c994e68fa5ae1a841cbb53bb55ae6e029541 *27c3-4333-en-hacker_jeopardy_translation.mp3 6c1335060613a358fc4a84b3b496f2b2b1248bbe *27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3 960b8adb7d00b5a322b13235b197b14407fdf98a *27c3-4338-de-wikileaks_und_mehr.mp3 7ae0b0b92983216f7f5aa01e349fc215726ed949 *27c3-4339-en-openleaks.mp3