d8:announce30:http://tracker.ccc.de/announce13:announce-listll30:http://tracker.ccc.de/announce32:udp://tracker.ccc.de:80/announceel39:http://tracker.publicbt.com:80/announce38:udp://tracker.publicbt.com:80/announceel45:http://tracker.openbittorrent.com:80/announce44:udp://tracker.openbittorrent.com:80/announceel42:http://tracker.birkenwald.de:6969/announceel39:http://tracker.torrent.to:2710/announceel32:http://exodus.1337x.org/announceel32:http://tracker.token.ro/announceee10:created by13:mktorrent 1.013:creation datei1299259355e4:infod5:filesld6:lengthi422185932e4:pathl64:27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4eed6:lengthi704347762e4:pathl34:27c3-3957-en-ipv6_insecurities.mp4eed6:lengthi370532965e4:pathl45:27c3-3983-en-hackers_and_computer_science.mp4eed6:lengthi564032407e4:pathl43:27c3-4003-en-cybernetics_for_the_masses.mp4eed6:lengthi278624327e4:pathl54:27c3-4006-en-diy_synthesizers_and_sound_generators.mp4eed6:lengthi858593494e4:pathl45:27c3-4011-en-embedded_reverse_engineering.mp4eed6:lengthi665736768e4:pathl37:27c3-4017-en-desktop_on_the_linux.mp4eed6:lengthi722334922e4:pathl28:27c3-4018-en-frozencache.mp4eed6:lengthi820282819e4:pathl68:27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4eed6:lengthi449407192e4:pathl42:27c3-4046-en-all_colours_are_beautiful.mp4eed6:lengthi803202529e4:pathl66:27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4eed6:lengthi503177416e4:pathl60:27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4eed6:lengthi409886241e4:pathl40:27c3-4060-en-attacking_mobile_phones.mp4eed6:lengthi618343155e4:pathl46:27c3-4061-en-building_custom_disassemblers.mp4eed6:lengthi703637831e4:pathl58:27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4eed6:lengthi712516307e4:pathl39:27c3-4070-de-fnord_jahresrueckblick.mp4eed6:lengthi485533418e4:pathl49:27c3-4073-de-logikschaltungen_ohne_elektronik.mp4eed6:lengthi926988182e4:pathl54:27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4eed6:lengthi784977233e4:pathl30:27c3-4082-en-sap_landscape.mp4eed6:lengthi366979012e4:pathl61:27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4eed6:lengthi708251949e4:pathl45:27c3-4085-de-digitale_spaltung_per_gesetz.mp4eed6:lengthi288306895e4:pathl37:27c3-4087-en-console_hacking_2010.mp4eed6:lengthi682609681e4:pathl63:27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4eed6:lengthi1058840209e4:pathl36:27c3-4090-en-baseband_apocalypse.mp4eed6:lengthi973163834e4:pathl41:27c3-4094-de-netzneutralitaet_und_qos.mp4eed6:lengthi491764041e4:pathl51:27c3-4096-en-code_deobfuscation_by_optimization.mp4eed6:lengthi402750690e4:pathl56:27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4eed6:lengthi790876908e4:pathl57:27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4eed6:lengthi401297617e4:pathl39:27c3-4099-en-file_print_electronics.mp4eed6:lengthi555045979e4:pathl54:27c3-4103-en-copyright_enforcement_versus_freedoms.mp4eed6:lengthi876236079e4:pathl47:27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4eed6:lengthi907169699e4:pathl60:27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4eed6:lengthi1015938640e4:pathl46:27c3-4121-en-is_the_ssliverse_a_safe_place.mp4eed6:lengthi956373975e4:pathl36:27c3-4123-en-defense_is_not_dead.mp4eed6:lengthi542760828e4:pathl60:27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4eed6:lengthi885340767e4:pathl46:27c3-4125-de-spinning_the_electronic_wheel.mp4eed6:lengthi712286104e4:pathl66:27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4eed6:lengthi593396151e4:pathl52:27c3-4140-en-contemporary_profiling_of_web_users.mp4eed6:lengthi1749947570e4:pathl32:27c3-4141-de-hacker_jeopardy.mp4eed6:lengthi463834519e4:pathl44:27c3-4142-en-nodejs_as_a_networking_tool.mp4eed6:lengthi469993035e4:pathl35:27c3-4143-en-parttimescientists.mp4eed6:lengthi746054411e4:pathl53:27c3-4144-en-short_political_history_of_acoustics.mp4eed6:lengthi1132372069e4:pathl52:27c3-4145-en-spoilers_human_interfaces_airplanes.mp4eed6:lengthi698632661e4:pathl36:27c3-4149-en-i_control_your_code.mp4eed6:lengthi840254039e4:pathl54:27c3-4151-en-android_geolocation_using_gsm_network.mp4eed6:lengthi358175088e4:pathl45:27c3-4159-en-reverse_engineering_mos_6502.mp4eed6:lengthi747331928e4:pathl66:27c3-4160-en-automatic_identification_cryptographic_primitives.mp4eed6:lengthi706329412e4:pathl43:27c3-4164-de-friede_sei_mit_euren_daten.mp4eed6:lengthi445504306e4:pathl65:27c3-4168-en-automated_architecture_independent_gadget_search.mp4eed6:lengthi655055220e4:pathl35:27c3-4174-en-the_hidden_nemesis.mp4eed6:lengthi599582699e4:pathl36:27c3-4175-en-from_robot_to_robot.mp4eed6:lengthi815281285e4:pathl33:27c3-4176-de-hacking_ibuttons.mp4eed6:lengthi322522580e4:pathl45:27c3-4181-en-sip_home_gateways_under_fire.mp4eed6:lengthi1132792839e4:pathl35:27c3-4183-en-safety_on_open_sea.mp4eed6:lengthi590962597e4:pathl46:27c3-4184-de-stanislaw_lem_weltverbesserer.mp4eed6:lengthi534843298e4:pathl48:27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4eed6:lengthi899403746e4:pathl50:27c3-4187-en-your_infrastructure_will_kill_you.mp4eed6:lengthi631950137e4:pathl41:27c3-4190-en-data_retention_in_the_eu.mp4eed6:lengthi397166340e4:pathl36:27c3-4193-en-having_fun_with_rtp.mp4eed6:lengthi885135306e4:pathl36:27c3-4195-de-literarischer_abend.mp4eed6:lengthi615837419e4:pathl68:27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4eed6:lengthi691939804e4:pathl65:27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4eed6:lengthi538091392e4:pathl45:27c3-4206-en-immi_from_concept_to_reality.mp4eed6:lengthi536116183e4:pathl38:27c3-4208-en-wideband_gsm_sniffing.mp4eed6:lengthi842041089e4:pathl67:27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4eed6:lengthi482055471e4:pathl40:27c3-4210-en-lying_to_the_neighbours.mp4eed6:lengthi458675544e4:pathl39:27c3-4211-en-chip_and_pin_is_broken.mp4eed6:lengthi382564568e4:pathl28:27c3-4221-en-omg_wtf_pdf.mp4eed6:lengthi625698930e4:pathl36:27c3-4230-de-security_nightmares.mp4eed6:lengthi897808476e4:pathl50:27c3-4231-en-datenrettung_fun_with_hard_drives.mp4eed6:lengthi698784970e4:pathl31:27c3-4234-en-usb_and_libusb.mp4eed6:lengthi946766538e4:pathl49:27c3-4236-en-international_cyber_jurisdiction.mp4eed6:lengthi1006335317e4:pathl47:27c3-4237-en-indect_eu_surveillance_project.mp4eed6:lengthi1240814994e4:pathl35:27c3-4239-en-lightning_talks_d3.mp4eed6:lengthi643957944e4:pathl50:27c3-4244-en-critical_overview_of_10_years_pet.mp4eed6:lengthi461737713e4:pathl48:27c3-4245-en-adventures_in_analyzing_stuxnet.mp4eed6:lengthi1092835441e4:pathl60:27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4eed6:lengthi725451343e4:pathl36:27c3-4253-en-pentanews_game_show.mp4eed6:lengthi412477447e4:pathl41:27c3-4261-en-key_recovery_attacks_rc4.mp4eed6:lengthi781741757e4:pathl60:27c3-4263-en-resisting_excessive_government_surveillance.mp4eed6:lengthi1002575681e4:pathl37:27c3-4265-en-hacking_smart_phones.mp4eed6:lengthi1048323835e4:pathl49:27c3-4276-en-cognitive_psychology_for_hackers.mp4eed6:lengthi444965910e4:pathl54:27c3-4295-en-high_speed_high_security_cryptography.mp4eed6:lengthi833621863e4:pathl34:27c3-4296-en-lightning_days_d2.mp4eed6:lengthi606458609e4:pathl47:27c3-4297-de-die_gesamte_technik_ist_sicher.mp4eed6:lengthi959658513e4:pathl42:27c3-4298-de-ccc_jahresrueckblick_2010.mp4eed6:lengthi200997735e4:pathl30:27c3-4299-en-closing_event.mp4eed6:lengthi1162356628e4:pathl35:27c3-4300-en-lightning_talks_d4.mp4eed6:lengthi606779807e4:pathl53:27c3-4301-en-flow_analysis_of_internet_activities.mp4eed6:lengthi431654704e4:pathl46:27c3-4302-en-27c3_keynote_we_come_in_peace.mp4eed6:lengthi869184602e4:pathl34:27c3-4326-de-radio_der_zukunft.mp4eed6:lengthi1727421834e4:pathl44:27c3-4333-en-hacker_jeopardy_translation.mp4eed6:lengthi712185629e4:pathl39:27c3-4334-en-fnord_jahresrueckblick.mp4eed6:lengthi671683317e4:pathl35:27c3-4338-de-wikileaks_und_mehr.mp4eed6:lengthi916813145e4:pathl26:27c3-4339-en-openleaks.mp4eed6:lengthi7684e4:pathl16:27c3.mp4.all.md5eed6:lengthi8444e4:pathl17:27c3.mp4.all.sha1eee4:name11:mp4-h264-HQ12:piece lengthi262144e6:pieces5120340:r~QS&9!@gmP> Ps5j4ѐSIz"pCxgQIKm2% T NMɕݹҿpQw%XӨ^Y;*+O6IETf +D+EZtfqV"f m/)KfiWVT|0# TxR v{6 lQՔ IY;8b4EeNqq()$mOvb%kh_<7 9:[Dq@0k7#ܕ0l&AEV]^bgdXl4VPt̢b ?ܐtuOL @E!*Q+MbyxZg%<,Cjl#dDd%$j).9CZ=5/ `͎e7/=KR,⤆8>[,ݐQb/ݜe"xTJdh/ZO\FOc u} i?:5m;='Yi| Sl-axdW,PE+C:֤?}a\RsYI}{}6Qt)VR2L*5@-1+C䔁 n`pù$KRp< -c eeRwq_%9ٙOŜΝX^å@0Ӝ0uFjڐhzU HP'7>{0"Ty,[1k> .ϽwD'HK7{E{zm^ `E|8?Ej'?Ll3 ۤ[w`l%^@?ѯXOը[5}KkJ&QL^ >J.j%X7D=(r/fdɏQx`bqwjqP` _1_/{֡XdqN+DD \N+k8ț#8Qi!$5NԶ@cFsvH?A$a1jSGjӻR2$3\Ak_2E*JtܛW{M*,dz_yrY{t0@oϰ"wĕ)Zg3rc ",\ŏuLue߷[)!!GM@[`'mݺ+}Bwc"}%+(iqO;_)>4l˼nmj$a%-h! }߁uP><↹rX=