dcc01aac5818b673ebd74fbf48bb697f *27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4 c90ad90a0d42422b38d987cbe919d956 *27c3-3957-en-ipv6_insecurities.mp4 c8f99703150bfabb35b3d5fcef3e6776 *27c3-3983-en-hackers_and_computer_science.mp4 cbc20bf38b557879007a7a2c8b76c882 *27c3-4003-en-cybernetics_for_the_masses.mp4 c2c5aae0900af3eb57465ae8315dc802 *27c3-4006-en-diy_synthesizers_and_sound_generators.mp4 c50c412a33940e5c086e825c6624af04 *27c3-4011-en-embedded_reverse_engineering.mp4 cc4bbd461c1ba261a9b2e70aa2518a0c *27c3-4017-en-desktop_on_the_linux.mp4 63f46c051061c3dbdbe635fa72780c47 *27c3-4018-en-frozencache.mp4 84e2a77b4cd09f56bcabdc006d6143ec *27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4 7c244648368d8c82f9ca9f077ad430c2 *27c3-4046-en-all_colours_are_beautiful.mp4 0110f96f80ecdcb01a500459ebe56ed5 *27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4 1be8484554c6209ec144bd7f80d08e7c *27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4 b4891526733a440b7ed7bd6aaee9346b *27c3-4060-en-attacking_mobile_phones.mp4 9dfd51039bd26815bb1aa7baaf9455bb *27c3-4061-en-building_custom_disassemblers.mp4 189bd3f6d9989be1bea5322e2591a7de *27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4 c8c7ddb0dcc16a2c002bacd3700abc59 *27c3-4070-de-fnord_jahresrueckblick.mp4 02362ccf0d4cb4c34bf9abeee7c62a6c *27c3-4073-de-logikschaltungen_ohne_elektronik.mp4 87ffc266e0d3dd235f9cd85b936f0a6c *27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4 92b3412be3492cee91612e1250bddef3 *27c3-4082-en-sap_landscape.mp4 df0430009a16ba6db93349c0012aecb0 *27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4 632b6d1c5ea9621566ce57351691643c *27c3-4085-de-digitale_spaltung_per_gesetz.mp4 6121ff6eaee2ffb546d77d9a5a8303b2 *27c3-4087-en-console_hacking_2010.mp4 438bd8bc72953ca0ebf84143e6fc98b9 *27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4 aa19cc7111b6b5c3cb3a518f37fed5a7 *27c3-4090-en-baseband_apocalypse.mp4 853c71fed84d0f3c90432cb1e29800f1 *27c3-4094-de-netzneutralitaet_und_qos.mp4 48b77cea15dfbd180395914a6cd59d7d *27c3-4096-en-code_deobfuscation_by_optimization.mp4 39af08af2848a32376a02c2155b0dc99 *27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4 7b54d7c33a2bc198a74eb2526b441ec3 *27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4 9888a38f7f899990396bac3f34db3ed4 *27c3-4099-en-file_print_electronics.mp4 3abdeed87a0ca0d5e566d544ddc2b9cd *27c3-4103-en-copyright_enforcement_versus_freedoms.mp4 a1dec3a4b0eb0ab72aeaa4d33fe6d5c7 *27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4 0c8870de4d352086673b342b2f44ebe6 *27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4 aa93a030c97f8ebf1b3e805a37767868 *27c3-4121-en-is_the_ssliverse_a_safe_place.mp4 28ec3cecb6dbdd2463bbdbade458cbfd *27c3-4123-en-defense_is_not_dead.mp4 735f54d1038f8d6eb88f5187d9eb087f *27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4 77ef0f6b143a0fd9d7b58125d07aa704 *27c3-4125-de-spinning_the_electronic_wheel.mp4 c5f24a771ab519ab5659c3306cc598c5 *27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4 38a7c7e0aa56fa456bdbf067d4d6b55d *27c3-4140-en-contemporary_profiling_of_web_users.mp4 eef9077f3ae67349163ee51b34633bf1 *27c3-4141-de-hacker_jeopardy.mp4 5ea2ac8af1ced930a547e38d3c8f3d40 *27c3-4142-en-nodejs_as_a_networking_tool.mp4 a9d2e19449f94060ac2b5793f97eb601 *27c3-4143-en-parttimescientists.mp4 28f27b797edde006f8453cd525a69acd *27c3-4144-en-short_political_history_of_acoustics.mp4 b3e067175ff1216fe51c9fe4d03e82df *27c3-4145-en-spoilers_human_interfaces_airplanes.mp4 f449f78a1421b9ce2127a3de379c4717 *27c3-4149-en-i_control_your_code.mp4 02e015633cfabe8335a7325cc99e31ae *27c3-4151-en-android_geolocation_using_gsm_network.mp4 62503a17578f1d3be8ab9b0f4c85beeb *27c3-4159-en-reverse_engineering_mos_6502.mp4 c9abff1a830fa0c90d6ee1ce7326812d *27c3-4160-en-automatic_identification_cryptographic_primitives.mp4 11cf050e797497442b8994aab2f8be3e *27c3-4164-de-friede_sei_mit_euren_daten.mp4 069ac0e0f4d71a977eea4482f5f3983e *27c3-4168-en-automated_architecture_independent_gadget_search.mp4 0551efe92e9f7b9f44e0363d279e5808 *27c3-4174-en-the_hidden_nemesis.mp4 53ae859bbc8e42c7ee4d0a5069619296 *27c3-4175-en-from_robot_to_robot.mp4 baa664310279c342aa01e4741255f887 *27c3-4176-de-hacking_ibuttons.mp4 452767c8b6f78f5abd3d1b05118b0abe *27c3-4181-en-sip_home_gateways_under_fire.mp4 3f5e4551d7f0130f6949101a86eb24b6 *27c3-4183-en-safety_on_open_sea.mp4 1e95a32647a3d4da833089aa59a3ca49 *27c3-4184-de-stanislaw_lem_weltverbesserer.mp4 ec6c189319b2b70ca8398a4978edfac0 *27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4 167159851aa4a6076c857e1378598860 *27c3-4187-en-your_infrastructure_will_kill_you.mp4 3add117cae5f4aafa5087be849af7a5a *27c3-4190-en-data_retention_in_the_eu.mp4 7de66af1b7046b39f495a6d88794b386 *27c3-4193-en-having_fun_with_rtp.mp4 a32e18101908cf3b69d6fe259016ef65 *27c3-4195-de-literarischer_abend.mp4 eeb62b0e9056edfda292a4150cfa4a8b *27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4 754d4c11fac24e96c7ebbc0cab82499c *27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4 f2f96a615d1ef916b928008568295655 *27c3-4206-en-immi_from_concept_to_reality.mp4 a8b938ebba4492f6c2166f71c398ba2c *27c3-4208-en-wideband_gsm_sniffing.mp4 e12e6d2e00612b6f332649988c0e4066 *27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4 236de88008dfda2d8bd07c24f3f489fd *27c3-4210-en-lying_to_the_neighbours.mp4 dbbfaeae46ef6db3f34a8b799cd6df00 *27c3-4211-en-chip_and_pin_is_broken.mp4 7d42ec0dc817c7eeed5d109615751d7f *27c3-4221-en-omg_wtf_pdf.mp4 839b67c988ed2fc190ff0f9bafc98ea1 *27c3-4230-de-security_nightmares.mp4 006599f18866fabd7384dd04a763d8c8 *27c3-4231-en-datenrettung_fun_with_hard_drives.mp4 8302df840dc2eab53aba47057342aa86 *27c3-4234-en-usb_and_libusb.mp4 2114126d811c47def3276f54939afd6d *27c3-4236-en-international_cyber_jurisdiction.mp4 baeb0f6867cc6d0c20970f9f43e0df98 *27c3-4237-en-indect_eu_surveillance_project.mp4 7eb3e84372a9bf356ddbd01a695a1d7c *27c3-4239-en-lightning_talks_d3.mp4 4b4d25d933e191ee2e585d60a7342003 *27c3-4244-en-critical_overview_of_10_years_pet.mp4 6d482c4a2fcc9853448983f55aeaa0e5 *27c3-4245-en-adventures_in_analyzing_stuxnet.mp4 3a08cf0411a12249c9b48b035365ad7f *27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4 c3d79cb190c2713120fb52b61843d9d5 *27c3-4253-en-pentanews_game_show.mp4 be01f8d6444065186d64f8dfb4348cf5 *27c3-4261-en-key_recovery_attacks_rc4.mp4 7f83f924dc44b39d7fb15ce61ad8ce31 *27c3-4263-en-resisting_excessive_government_surveillance.mp4 b0fc890528f10936afdd205c5d3ead18 *27c3-4265-en-hacking_smart_phones.mp4 3fac49095370cbbc6ff6a94525bd8565 *27c3-4276-en-cognitive_psychology_for_hackers.mp4 cb417f417683d34c5ba7cb8c11127372 *27c3-4295-en-high_speed_high_security_cryptography.mp4 5c111bce7eaaf404e89bc5896b8255c2 *27c3-4296-en-lightning_days_d2.mp4 ef906f2a5f4d0f89307443a4a3846d29 *27c3-4297-de-die_gesamte_technik_ist_sicher.mp4 de59e9081b37b7d3749682730139d5b0 *27c3-4298-de-ccc_jahresrueckblick_2010.mp4 b0992baea0398359b52eda944f636f38 *27c3-4299-en-closing_event.mp4 5fb6145df686461337b128b427b2bb79 *27c3-4300-en-lightning_talks_d4.mp4 e7e1835a413b806c2e042f1d391855f2 *27c3-4301-en-flow_analysis_of_internet_activities.mp4 45c3f3e12ae224440f7309268ea9bc1f *27c3-4302-en-27c3_keynote_we_come_in_peace.mp4 e9a127f83eb20ee2d4389d699ebd7f45 *27c3-4326-de-radio_der_zukunft.mp4 952d6f4bdfaa5d71f77c579ae2196b4f *27c3-4333-en-hacker_jeopardy_translation.mp4 7efb34c26f629c0880e2acf04ae038e6 *27c3-4334-en-fnord_jahresrueckblick.mp4 139c866671630a2f96323df8ace514e6 *27c3-4338-de-wikileaks_und_mehr.mp4 f85e07a9c37540bb97992053971bf0e3 *27c3-4339-en-openleaks.mp4