896d054eb3a72de5885a6100e2eb9d6b *27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3 d293243c60ec171fe8314bd055ce3a5a *27c3-3957-en-ipv6_insecurities.mp3 29a376955f10578063f8df9792eb5526 *27c3-3983-en-hackers_and_computer_science.mp3 c9d2b0add36fc32fd61b18fdb5cb58c1 *27c3-4003-en-cybernetics_for_the_masses.mp3 6b887364ea127ade3a4ee94641810712 *27c3-4006-en-diy_synthesizers_and_sound_generators.mp3 0263016285c50bfd93d407af7019da8d *27c3-4011-en-embedded_reverse_engineering.mp3 4e63b2328d4d2a75f85a08d9d67b2097 *27c3-4017-en-desktop_on_the_linux.mp3 c9098d711cf48ed93509b0137556ed82 *27c3-4018-en-frozencache.mp3 eef2f35af6d43040b058b2d3ee1cf7a2 *27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3 0bb7f9ebe768a68edeaa5b259e6f3658 *27c3-4046-en-all_colours_are_beautiful.mp3 a8e80083aebaf18ad58ff4a939840f08 *27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3 68007a6b13b9263aeac040d100b0c755 *27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3 37d1d7139847ac8395d2353ba8cc5e9d *27c3-4060-en-attacking_mobile_phones.mp3 385c132e76dfc06e208fec60bd847904 *27c3-4061-en-building_custom_disassemblers.mp3 594ff9b1c9e1cbf5323f46deae995434 *27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3 11eb8f59380ab2ee1eb97209e919e439 *27c3-4070-de-fnord_jahresrueckblick.mp3 bf2f24f9d163c18eec574d2c6181e427 *27c3-4073-de-logikschaltungen_ohne_elektronik.mp3 0dba6b7603395721fc20080b0470adde *27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3 384acb7af567bab8711de57f008be88e *27c3-4082-en-sap_landscape.mp3 1df71d11fb511a5add9b527adbd9b0cf *27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3 bca8f9d59d9e074ec0e1302d45c918cf *27c3-4085-de-digitale_spaltung_per_gesetz.mp3 835286b498d56c100bef9b7476635d8a *27c3-4087-en-console_hacking_2010.mp3 4fa4151a3d08be5e1b81f311783340b3 *27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3 9813f6abd5d53d720a0b77dc6d590c5e *27c3-4090-en-the_baseband_apocalypse.mp3 53e4299609578a1f1c81a2614e56a82b *27c3-4094-de-netzneutralitaet_und_qos.mp3 a14dff15e958af3058a85a940dc9ef2a *27c3-4096-en-code_deobfuscation_by_optimization.mp3 8344f61321039d09be94701560e0b3f2 *27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3 53c4850bebbcad2cff3c2134994c73d0 *27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3 5594960205c0c34b1692d709a62d7b8f *27c3-4099-en-file_-_print_-_electronics.mp3 2d1ad3fa32557bbd47a487f0f8fb8c9a *27c3-4103-en-copyright_enforcement_versus_freedoms.mp3 4ba3fa1699519bbb43398a597b6d76db *27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3 c584b111c921f51f85071b6c6fc22cf5 *27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3 315dbc7e94ef0ad5b7ced21abab67123 *27c3-4121-en-is_the_ssliverse_a_safe_place.mp3 d301faab7bdea870769d9e8ca4176971 *27c3-4123-en-defense_is_not_dead.mp3 12f0fe388df6009fcd657e26116cdcda *27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3 5c52edbacc57a7755027835964edee31 *27c3-4125-de-spinning_the_electornic_wheel.mp3 8f7fea319f2eeb127758bc037c94d2c1 *27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3 773c5543bf80bddd88a2e775996e59bb *27c3-4140-en-contemporary_profiling_of_web_users.mp3 7ec8e31c9e0ee4d28423d95d454e7e36 *27c3-4141-de-hacker_jeopardy.mp3 55d345311a62827585d6b8a3a694a1c7 *27c3-4142-en-nodejs_as_a_networking_tool.mp3 46ed2e1d72ecb149cd07c916cf148022 *27c3-4143-en-part-time_scientists.mp3 fbc464b8e0a0d407f33b6d5713e2cb57 *27c3-4144-en-a_short_political_history_of_acoustics.mp3 6fc3fc55931804609f88ea9a78a6b8fc *27c3-4145-en-spoilers_human_interfaces_airplanes.mp3 858f7b517b659e662628e70c107adfef *27c3-4149-en-i_control_your_code.mp3 a4906d86c6b63c23152a2f8baa57d8c7 *27c3-4151-en-android_geolocation_using_gsm_network.mp3 4354bd8e751c9073ea25506834a2aa40 *27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3 7bb57a7058207c576b0e53a48f1c6d99 *27c3-4160-en-automatic_identification_cryptographic_primitives.mp3 2545bb456c38ef2b490f1d14ca188bd1 *27c3-4164-de-friede_sei_mit_euren_daten.mp3 c7f39669ac9fbd3999507f346c777f5b *27c3-4168-en-automated_architecture_independent_gadget_search.mp3 3f2cdef6cbcea984e46db6bbc0b9c346 *27c3-4174-en-the_hidden_nemesis.mp3 539e4a6a3e181f827c079eb49075be7b *27c3-4175-en-from_robot_to_robot.mp3 869dea31cfcb0cad0c07ef31765e243f *27c3-4176-de-hacking_ibuttons.mp3 38330724dea9a1a9c9641b2ec5ecc591 *27c3-4181-en-sip_home_gateways_under_fire.mp3 0f4e153d497e4e4737b1b9f8b1a2de81 *27c3-4183-en-safety_on_the_open_sea.mp3 6063e70be82686012f706b274824820a *27c3-4184-de-stanislaw_lem_weltverbesserer.mp3 dd4a739721c309de105af8c1db985d52 *27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3 5b3fcd7d25e954c8f174ce2e4a987a7f *27c3-4187-en-your_infrastructure_will_kill_you.mp3 655c7b46a66be7bf9544387920a56904 *27c3-4190-en-data_retention_in_the_eu.mp3 20b030ff5a88e79ee013393760f3e095 *27c3-4193-en-having_fun_with_rtp.mp3 a2b632a539323e6f80ab7686ee09743d *27c3-4195-de-literarischer_abend.mp3 a5ee1819930b3e174451198149621ada *27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3 b1006e9ed78212a2e894f5e35e51ec3c *27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3 62f9f255a88ccb6f782bf527cafe272e *27c3-4206-en-immi_from_concept_to_reality.mp3 d9a3ed98612948c485c1e5afd21ee0f7 *27c3-4208-en-wideband_gsm_sniffing.mp3 7836b169a5fe2872e533b73b005e90e0 *27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3 4b2d868364e54d03aa31f9d61c259f13 *27c3-4210-en-lying_to_the_neighbours.mp3 7a9a2fef15de2a75b19fe6c9b4e8d052 *27c3-4211-en-chip_and_pin_is_broken.mp3 e5019c92c88c80f8f83627e425ad090f *27c3-4221-en-omg_wtf_pdf.mp3 b2beae8c193584e371b866d8c28a35c4 *27c3-4230-de-security_nightmares.mp3 630231ca7bd40dae6b251f427d30d3fc *27c3-4231-en-datenrettung_fun_with_hard_drives.mp3 414b4d268e3428f2f9a2504551a09a64 *27c3-4234-en-usb_and_libusb.mp3 d7844d60aac5f973167d38e6ab0d19d6 *27c3-4236-en-international_cyber_jurisdiction.mp3 a3434b59016a8bfae36ebc51015d4f90 *27c3-4237-en-indect_eu_surveillance_project.mp3 cd45aab15aadc1035efd83069d83a905 *27c3-4239-en-lightning_talks_d3.mp3 958d230596a522d1890573e8f8c9eb4a *27c3-4244-en-critical_overview_of_10_years_pet.mp3 25fac63a17f02dcf7b74969f34271ad5 *27c3-4245-en-adventures_in_analyzing_stuxnet.mp3 6cb1e9b4064673efeac6dfc89a61f23a *27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3 4f89aef43a83d5989be05b222bdc622a *27c3-4253-en-pentanews_game_show.mp3 3931011d4a66aed59884dc8b96bc09d6 *27c3-4261-en-key_recovery_attacks_rc4.mp3 a465bef07a7bcf6766442250dabcec8a *27c3-4263-en-resisting_excessive_government_surveillance.mp3 dc81a4e531eaba44cc351693dc8ad9db *27c3-4265-en-hacking_smart_phones.mp3 48f7587964e82134e3e776f634c4e415 *27c3-4276-en-cognitive_psychology_for_hackers.mp3 d46d4a5940755410f946191e693f1e49 *27c3-4295-en-high_speed_high_security_cryptography.mp3 05232e3f4014ddefc42670b165725988 *27c3-4296-en-lightning_days_d2.mp3 d0636266b248a2ce92ac99ff5ad7a87b *27c3-4297-de-die_gesamte_technik_ist_sicher.mp3 bdd0805048ce23883d7e9a7bc0f9bfe0 *27c3-4298-de-ccc_jahresrueckblick_2010.mp3 14b48a66bc6c48a9f18d5d1dd25b36b1 *27c3-4299-en-closing_event.mp3 1721023232ba7992fb28a6add2af5a58 *27c3-4300-en-lightning_talks_d4.mp3 05e59bb4205d2124085c7c8791425b8e *27c3-4301-en-flow_analysis_of_internet_activities.mp3 dfcc3aa9a68ee487d2d0c05938cacfab *27c3-4302-en-27c3_keynote_we_come_in_peace.mp3 06405d680fbb54911d8ba7fdf7a2f2d9 *27c3-4326-de-radio_der_zukunft.mp3 c435b0d5d118b4910d553e5057bca4cc *27c3-4333-en-hacker_jeopardy_translation.mp3 577d460c5f03ad2db9693c49e0074abb *27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3 dab78bfb2d9ebfeaeb1ac19234301dba *27c3-4338-de-wikileaks_und_mehr.mp3 69dd75460d996a6060ecde94fd813b55 *27c3-4339-en-openleaks.mp3