3ce86839c9ccc3eb171c67b01aaaf1f0 *27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg 283e1885988588bfbf0b88eeb1153ee3 *27c3-3957-en-ipv6_insecurities.ogg cd41ce1a416d4e5099def43f2d8d781c *27c3-3983-en-hackers_and_computer_science.ogg 49f5fdba77fc0797909731f5382746de *27c3-4003-en-cybernetics_for_the_masses.ogg 53e7b691679028d52b2c409ab455f24e *27c3-4006-en-diy_synthesizers_and_sound_generators.ogg 84cb883053d377979389eaa362b5e8f7 *27c3-4011-en-embedded_reverse_engineering.ogg 338588629ef82890911e01f531914b0b *27c3-4017-en-desktop_on_the_linux.ogg e40addf6367895c0b94dc07fabcba807 *27c3-4018-en-frozencache.ogg 82fdeee40460edc31ad7a790ca87e535 *27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg ccf030c21b6b1440d29c07a78cd33e76 *27c3-4046-en-all_colours_are_beautiful.ogg d09c58dcf9f0a833e3f9edf39f7cfb25 *27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg 117f78db43e9c60e4ed67a57602092e8 *27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg 468398f05a9de5f895383934a022f75b *27c3-4060-en-attacking_mobile_phones.ogg 597529831461b45e39ad0cc305f214b6 *27c3-4061-en-building_custom_disassemblers.ogg d04783bf322896515f03b5b579908302 *27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg 2fba20d72a187277f41427ce974e6360 *27c3-4070-de-fnord_jahresrueckblick.ogg 83ddc919c968726ce4dcb19af4b7be99 *27c3-4073-de-logikschaltungen_ohne_elektronik.ogg d3bc9e7973f8b309d254367f9cc087c8 *27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg d6b883f882e854c7ae43819d60200835 *27c3-4082-en-sap_landscape.ogg c25844f76dd99c096da8be184e0f6dc2 *27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg 442bb8183be9869ce851a2363f4ebb4a *27c3-4085-de-digitale_spaltung_per_gesetz.ogg 0269417acf434a3ed0b390f30c2c342a *27c3-4087-en-console_hacking_2010.ogg 83686274a10791189278c83cd7f93991 *27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg b73f6c3367aff7914d23cc6a74d542e6 *27c3-4090-en-baseband_apocalypse.ogg 56a7ade7ce0e01935a618572c7af34a1 *27c3-4094-de-netzneutralitaet_und_qos.ogg 1405788178fff80174469cd62d71e581 *27c3-4096-en-code_deobfuscation_by_optimization.ogg a186572920b5f4d45c91d4a86f469a59 *27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg 0d0b1f696b273f5a44d037d65df790a2 *27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg 9504a3d79b25377839eb3c2a40ccda0d *27c3-4099-en-file_print_electronics.ogg f15421ce5ffe64d3f766c98beee0fffa *27c3-4103-en-copyright_enforcement_versus_freedoms.ogg 5d45180337ac303310ac86c145d02389 *27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg 5a46542f7416860525ae713fdb80d627 *27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg f424a3e1dc093dce8e67210809449caf *27c3-4121-en-is_the_ssliverse_a_safe_place.ogg 457afae80f1bae903a118ddc4649007f *27c3-4123-en-defense_is_not_dead.ogg af810e4aa4dbfbd1b40288622065f07d *27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg 156e91b24918f6cab90552f9e5137f82 *27c3-4125-de-spinning_the_electronic_wheel.ogg a3079d94399ba60312470d4843078ef5 *27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg c17bed47036a6a5cedc526351355d613 *27c3-4140-en-contemporary_profiling_of_web_users.ogg 27ef2b3718ad9f54289c71771c3a2b90 *27c3-4141-de-hacker_jeopardy.ogg bcebb27c4b56824fd8d336951fc7f02d *27c3-4142-en-nodejs_as_a_networking_tool.ogg bae835f0fb725665d889562c5b44ebe3 *27c3-4143-en-parttimescientists.ogg f2c3e335a5c1383a9be82cfc5528c084 *27c3-4144-en-short_political_history_of_acoustics.ogg 84b43202e7d3f5fd93d5ce905bf4003c *27c3-4145-en-spoilers_human_interfaces_airplanes.ogg 44db1a5a4bac6469183d24ae7a2531ac *27c3-4149-en-i_control_your_code.ogg 522a755297329e384d1a46d8a2e21037 *27c3-4151-en-android_geolocation_using_gsm_network.ogg 4fa9d946ab0bced002b61da31a348ecc *27c3-4159-en-reverse_engineering_mos_6502.ogg 0fa1f1a78b115dc2c504bcdc6b9793ad *27c3-4160-en-automatic_identification_cryptographic_primitives.ogg 652dcc91b05241f995a5218c354d07a3 *27c3-4164-de-friede_sei_mit_euren_daten.ogg 79ddd16ffd8b523d63f9cdc7acc791de *27c3-4168-en-automated_architecture_independent_gadget_search.ogg f12fdf42ceef0c522e46feec9bbcac18 *27c3-4174-en-the_hidden_nemesis.ogg b1725d44b35a89f6b290d2d49b89493f *27c3-4175-en-from_robot_to_robot.ogg 97a436a57c722029e511762dea6e781a *27c3-4176-de-hacking_ibuttons.ogg 6e00e75391dd1f6e641e2bc45823911d *27c3-4181-en-sip_home_gateways_under_fire.ogg ba276a78cd43b68aaf9a5719c6f0068e *27c3-4183-en-safety_on_open_sea.ogg 4dc9e464d91d036a666d416edb2afd34 *27c3-4184-de-stanislaw_lem_weltverbesserer.ogg 328bdc96155bee58d50529318fe612c5 *27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg ce91be9522b6a12797089830fc1dffa9 *27c3-4187-en-your_infrastructure_will_kill_you.ogg 462a5407142e8f54a0aa138ed068f5fb *27c3-4190-en-data_retention_in_the_eu.ogg ebff91ad9526b5e96f0e1549bcbb139f *27c3-4193-en-having_fun_with_rtp.ogg f75ae14ade86a8bca3615a3911798049 *27c3-4195-de-literarischer_abend.ogg 4a8111068f9801a3fc40292437671671 *27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg ee12a4ef53214105efff1a6e3ac28aa8 *27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg c44a570a560ab0f944e2bd12884c1f1b *27c3-4206-en-immi_from_concept_to_reality.ogg 0483955a4fcc0e44b096ed485d54169b *27c3-4208-en-wideband_gsm_sniffing.ogg 9422c614fae3ecb45bdccc57e421816f *27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg 189ac9289d6baa6617b6f3a421187167 *27c3-4210-en-lying_to_the_neighbours.ogg 34af764318f74764dd10f8a4da0628a0 *27c3-4211-en-chip_and_pin_is_broken.ogg dfe8263e1cff6abc0351103725fe0424 *27c3-4221-en-omg_wtf_pdf.ogg 3f8b675b3785a944a10a58fed55f0e34 *27c3-4230-de-security_nightmares.ogg 502fd2696d769afe2f01f3cd170b7dde *27c3-4231-en-datenrettung_fun_with_hard_drives.ogg 48e70416c850456ab26f49a2b9cebc14 *27c3-4234-en-usb_and_libusb.ogg 8baeac932cbc219dd936774f8e2eda84 *27c3-4236-en-international_cyber_jurisdiction.ogg 2b32abecc8f1a9c9c447b80b438c5a80 *27c3-4237-en-indect_eu_surveillance_project.ogg 58a327d55fd2f406a991d44be0ff2fa5 *27c3-4239-en-lightning_talks_d3.ogg 212418190344af7c06406df231788d64 *27c3-4244-en-critical_overview_of_10_years_pet.ogg 0e0dfbdfe7d95542d4893922da6cb2ad *27c3-4245-en-adventures_in_analyzing_stuxnet.ogg a68ab1ba2bb9c4922f07e99c3d275a5a *27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg ec0add772f217516dc7c2c7c93e4263a *27c3-4253-en-pentanews_game_show.ogg cba79510abc434f8cf23934efbe44db8 *27c3-4261-en-key_recovery_attacks_rc4.ogg 5d5bf1770155cfa045e9a2e58b583eb2 *27c3-4263-en-resisting_excessive_government_surveillance.ogg 5837e407f455ffa3cd7f33df032177c7 *27c3-4265-en-hacking_smart_phones.ogg ecb5515e753d104cd0fb1cc43524c0d6 *27c3-4276-en-cognitive_psychology_for_hackers.ogg b7f07c295682a78c1b30be831ae9e60d *27c3-4295-en-high_speed_high_security_cryptography.ogg 7a3f259a6f3023156d7c7661d5620e9b *27c3-4296-en-lightning_days_d2.ogg aac16638fdcded08786408e70fc895de *27c3-4297-de-die_gesamte_technik_ist_sicher.ogg 512aa73de3fc04fcec06c0e3aa127244 *27c3-4298-de-ccc_jahresrueckblick_2010.ogg 970a4b7d616c07f13fd4700fcfc76be1 *27c3-4299-en-closing_event.ogg d10df3992bf45af50883c5f4a1a1a2ae *27c3-4300-en-lightning_talks_d4.ogg 863b012f8576011e5abd642c52c61713 *27c3-4301-en-flow_analysis_of_internet_activities.ogg e4d76293c4d7a59196d9dbdf92be3d11 *27c3-4302-en-27c3_keynote_we_come_in_peace.ogg 441fd73524a7917e6a630cc2bd136416 *27c3-4326-de-radio_der_zukunft.ogg 119d702ce41c9a935f453520a3220baa *27c3-4333-en-hacker_jeopardy_translation.ogg 53e8199ae2a8b9150f34d7fb47a31ae9 *27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg 68a5fe84bd4238a2f8c864daa50e7952 *27c3-4338-de-wikileaks_und_mehr.ogg f3fc8d3eea744504076c8ea6e343aa43 *27c3-4339-en-openleaks.ogg