1c356bfa8002414628008cf3fa9b2ddd572524dc *27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb_iProd.mp4 5638e1c225e36a06936ab06ac7b41f77ac70efc0 *27c3-3957-en-ipv6_insecurities_iProd.mp4 1dc33b2e54495cf8d5159e282a62c866efcf9dbf *27c3-3983-en-hackers_and_computer_science_iProd.mp4 90b9a8bd88114d023eb8b69c226fee1f85a25553 *27c3-4003-en-cybernetics_for_the_masses_iProd.mp4 aefe2b5535eccab378c49234b096645cf7437748 *27c3-4006-en-diy_synthesizers_and_sound_generators_iProd.mp4 b37fb64075dcf472895ef7f6c70bcd24e795de57 *27c3-4011-en-embedded_reverse_engineering_iProd.mp4 f534894a7c4b4dae8ffa0e5f3eb76debe0c55183 *27c3-4017-en-desktop_on_the_linux_iProd.mp4 9a055a0a22c1bc5bc2f32f561d4a87c6071458d7 *27c3-4018-en-frozencache_iProd.mp4 3c8068baa9144ee034e8490fc3b8161894b1331f *27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system_iProd.mp4 84f2552b3cadb02db18ae4b9dd67bc89415101fc *27c3-4046-en-all_colours_are_beautiful_iProd.mp4 192935c128678ae96ea038c3c8c50dee00ea7f74 *27c3-4055-en-terrorists_win_exploiting_telecommunications_data_iProd.mp4 44eee22aad058e0bb5969f2e2f1b804924bd3763 *27c3-4057-en-adventures_in_mapping_afghanistan_elections_iProd.mp4 5323c09a85de1fc185c02fdaa36a0ca5e2c178cc *27c3-4060-en-attacking_mobile_phones_iProd.mp4 64a8263eec3d80bc33942e5ef4b1bb2ec0d3e3b4 *27c3-4061-en-building_custom_disassemblers_iProd.mp4 9425204be5f4b0b4cf72e191ce5db04cec97ef02 *27c3-4067-en-data_analysis_in_terabit_ethernet_traffic_iProd.mp4 14c4cec237e9abd232672d81ed2affc3b24267f1 *27c3-4070-de-fnord_jahresrueckblick_iProd.mp4 23fe897224760cdb92232f1a174f9343abd4609f *27c3-4073-de-logikschaltungen_ohne_elektronik_iProd.mp4 d69516cc581c363d8e2b835c6bd66584e449644c *27c3-4081-de-netzmedienrecht_lobbyismus_korruption_iProd.mp4 3aaffb870deb0796d3c6de64ac87bbe1a86ee0b3 *27c3-4082-en-sap_landscape_iProd.mp4 9f2e34998ee0c296795a6c17ed5e549b72c5a0cc *27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace_iProd.mp4 d5f4de850d4582a5b5280c14c7482e54f6840bdc *27c3-4085-de-digitale_spaltung_per_gesetz_iProd.mp4 efb5da84f3166b60294aa15d47e080c7193d8419 *27c3-4087-en-console_hacking_2010_iProd.mp4 98dabbbf5a378213f3c3a7ce4d075d1ddd448be2 *27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden_iProd.mp4 c415690a598347d4dbcd8317c0d5878a4d263b06 *27c3-4090-en-baseband_apocalypse_iProd.mp4 3bdd7e486570334e30ff59ce05aa255d33e1c8bc *27c3-4094-de-netzneutralitaet_und_qos_iProd.mp4 25586d6d70149050cd2c931fbf3f1bce1ba51d04 *27c3-4096-en-code_deobfuscation_by_optimization_iProd.mp4 1b55ca540b5e04a658b67be9919c18a99520cd9f *27c3-4097-de-identifizierung_von_netzwerkprotokollen_iProd.mp4 6e447c6b8643abe54eb18c9d3603ce093d6df424 *27c3-4098-en-tor_is_peace_software_freedom_is_slavery_iProd.mp4 56f00893e1855e82d2d617f243d23355e8511ca8 *27c3-4099-en-file_print_electronics_iProd.mp4 e52a294ee5468f7c9cf0a10f4975d21dc9e09e1c *27c3-4103-en-copyright_enforcement_versus_freedoms_iProd.mp4 94414dca331d05a374871be8065c0a1003a1a5eb *27c3-4111-de-eins_zwei_drei_alle_sind_dabei_iProd.mp4 2929f033fb43518ed637e93247824e7d73c8cccb *27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem_iProd.mp4 345ee1e02cd4127041acd9dd4204423a557209e4 *27c3-4121-en-is_the_ssliverse_a_safe_place_iProd.mp4 34df4f60a2956e16c48ad554ff1de8ede5a85315 *27c3-4123-en-defense_is_not_dead_iProd.mp4 97d22c8a731daafbc4751331105beed12089995d *27c3-4124-en-three_jobs_that_journalists_will_do_in_2050_iProd.mp4 29de42c8df0f343a784730ffa3d449385c97ab72 *27c3-4125-de-spinning_the_electronic_wheel_iProd.mp4 89e36b8805dfe901d2253ce390d1dc9834b38659 *27c3-4138-en-secure_communications_below_the_hearing_threshold_iProd.mp4 e85bb5b7a228a63588e44552907689324328c54e *27c3-4140-en-contemporary_profiling_of_web_users_iProd.mp4 feab62f4d4c80e9ae721f954a807c227a558ba14 *27c3-4141-de-hacker_jeopardy_iProd.mp4 48d003f0be71404bb1f7ea95fc8fa68192e03e4d *27c3-4142-en-nodejs_as_a_networking_tool_iProd.mp4 27d09ba1e01d3683ac30daeb4923e860d5b34e6b *27c3-4143-en-parttimescientists_iProd.mp4 ae2f8c8c74173c3e0bfc3cc9901bb6793848790e *27c3-4144-en-short_political_history_of_acoustics_iProd.mp4 5667050dedf1fc31192f8eeb639d6a183f424bbd *27c3-4145-en-spoilers_human_interfaces_airplanes_iProd.mp4 b5610b9edbcb7ff80568a314b252043b03407cd5 *27c3-4149-en-i_control_your_code_iProd.mp4 cd1a0da3c501938ccd7ae2385831d5fed1025259 *27c3-4151-en-android_geolocation_using_gsm_network_iProd.mp4 608f212979125faf52831bc73406253d1987f13d *27c3-4159-en-reverse_engineering_mos_6502_iProd.mp4 d4aceb1721221f3ee88545fd557034b4a1cd02ca *27c3-4160-en-automatic_identification_cryptographic_primitives_iProd.mp4 27709ad244d1f8dfca3e4bc7df853fe87eab383a *27c3-4164-de-friede_sei_mit_euren_daten_iProd.mp4 673c9826c734638c5d56881463ce9f209251c7e2 *27c3-4168-en-automated_architecture_independent_gadget_search_iProd.mp4 0832f57372810d08b938a8b64a486d9e092bbe48 *27c3-4174-en-the_hidden_nemesis_iProd.mp4 592035e40329b0172116303c478ad7d297825e1d *27c3-4175-en-from_robot_to_robot_iProd.mp4 347c4c3ef404914d34381ec8273ff13e8dde8679 *27c3-4176-de-hacking_ibuttons_iProd.mp4 ca996e91c1d379b2e0ee5cb64feaa328728d859d *27c3-4181-en-sip_home_gateways_under_fire_iProd.mp4 b646f62e5b35fdbe43c631e36e8b4f1227e78d0f *27c3-4183-en-safety_on_open_sea_iProd.mp4 899da3f28a49fb6e6647c833e20e0ddc15e6e126 *27c3-4184-de-stanislaw_lem_weltverbesserer_iProd.mp4 5872103c7137adf08819f7749c8ee7c755ec4e2c *27c3-4185-de-whistleblowing_licht_ins_dunkel_iProd.mp4 75e4866b03d59b7b262c2bc47a246638311bcdd8 *27c3-4187-en-your_infrastructure_will_kill_you_iProd.mp4 36c78e82228ed483f6f186559b589d754a7e0599 *27c3-4190-en-data_retention_in_the_eu_iProd.mp4 e626239ed7403d4b943b09fdae0a4a26c32fa2f2 *27c3-4193-en-having_fun_with_rtp_iProd.mp4 1d305a718c1abc21fccbb2f9c790f5e4fffe6428 *27c3-4195-de-literarischer_abend_iProd.mp4 81287fc04c45c998e67808bfa52edf33d5146b97 *27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture_iProd.mp4 ddb9a03b67eaaad4b5e50f52dab11e14530b4760 *27c3-4203-en-distributed_fpga_number_crunching_for_the_masses_iProd.mp4 fae7e9617e74c38e19b3b4745d82fe5bcd4ef76a *27c3-4206-en-immi_from_concept_to_reality_iProd.mp4 694e8c6adcf71341808ee47f943fb805a33b6904 *27c3-4208-en-wideband_gsm_sniffing_iProd.mp4 d6a15019a931e0d66f3610c95771a9763e8c78fe *27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis_iProd.mp4 ca686880131e898233b97b16f4d92dc012a2b1b1 *27c3-4210-en-lying_to_the_neighbours_iProd.mp4 3e9333c075aef23255d3f86a7d5a40c58af04d23 *27c3-4211-en-chip_and_pin_is_broken_iProd.mp4 9bc669c9d7e193680638c9d631564d53f6b57def *27c3-4221-en-omg_wtf_pdf_iProd.mp4 d94c1b92e1c640699f8291c186529410c338e524 *27c3-4230-de-security_nightmares_iProd.mp4 bb7992e4987e3c6afdfd4bc2444371e9cdcb2900 *27c3-4231-en-datenrettung_fun_with_hard_drives_iProd.mp4 ebfcc7d990895694773dd458796a6fe232e3e9aa *27c3-4234-en-usb_and_libusb_iProd.mp4 a6a789643dcbcc39db104b870667e153ee26d8a8 *27c3-4236-en-international_cyber_jurisdiction_iProd.mp4 dca6e4f66884b4c9e22c5db7284ebfbf58c0496c *27c3-4237-en-indect_eu_surveillance_project_iProd.mp4 c23a7ee16b9af5b1c427b78c9bc18dea46a7bf47 *27c3-4239-en-lightning_talks_d3_iProd.mp4 a643db5f5db394e504714a8d24b99bfe17282f6b *27c3-4244-en-critical_overview_of_10_years_pet_iProd.mp4 b2976687699a78f4dc9043bd3aa51faa6383c07c *27c3-4245-en-adventures_in_analyzing_stuxnet_iProd.mp4 8b8fc093fdc962b2824b00aba4cf2191f108e7fe *27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet_iProd.mp4 66e82b0c9977cfc11fd2197d9756332f57a85dcc *27c3-4253-en-pentanews_game_show_iProd.mp4 dcf1fe1b5c565b33c69166c3bfe117321c2d627e *27c3-4261-en-key_recovery_attacks_rc4_iProd.mp4 1d296d9ef129759db6f1b9a7322f58bfe8ff65af *27c3-4263-en-resisting_excessive_government_surveillance_iProd.mp4 73bfcce97362e06531000eebdf48fe38373d3962 *27c3-4265-en-hacking_smart_phones_iProd.mp4 c74db56a12aa2c5727b95fa58b3290f511558ac8 *27c3-4276-en-cognitive_psychology_for_hackers_iProd.mp4 2a6ecc4998a9fa088dda5566cc0d5bc9b5ee9965 *27c3-4295-en-high_speed_high_security_cryptography_iProd.mp4 e64a6f6357526403d5c759bf435788fbeae9f114 *27c3-4296-en-lightning_days_d2_iProd.mp4 55c848d9465e234c3c5f073f4105c5e5eba2dc54 *27c3-4297-de-die_gesamte_technik_ist_sicher_iProd.mp4 cac0f5c8286cff2146465a69d989dc1645eff332 *27c3-4298-de-ccc_jahresrueckblick_2010_iProd.mp4 6cb6de376e5fdacaf334c29280a6a0d655cefa7e *27c3-4299-en-closing_event_iProd.mp4 b6112fabcbd52b4cfb12d5ce3d8dc6844840bdbf *27c3-4300-en-lightning_talks_d4_iProd.mp4 35981fab03fbd7545ea53b7320a27ddb0d87ce8b *27c3-4301-en-flow_analysis_of_internet_activities_iProd.mp4 d3064a43c3dfdb236c736faf535a86ff8b2c413a *27c3-4302-en-27c3_keynote_we_come_in_peace_iProd.mp4 4ea59a2c512b0115adb2d7f19d07015b2aef5955 *27c3-4326-de-radio_der_zukunft_iProd.mp4 23ab942d1552bd50775dcd8fc170def52fc930c3 *27c3-4333-en-hacker_jeopardy_translation_iProd.mp4 446baf7bfb81310c49074418f3c476ed735ddbe5 *27c3-4334-en-fnord_jahresrueckblick_iProd.mp4 b61e7765ffcacdf0712e761d25f0afb6ca4eb7f3 *27c3-4338-de-wikileaks_und_mehr_iProd.mp4 a28ad65524621b137fc0fbd1fdf6fc3b04a0b441 *27c3-4339-en-openleaks_iProd.mp4