Parent directory/ | - | - |
26c3-3266-de-hacking_the_universe.mp4 | 693.0 MiB | 2010-01-03 10:52:09 |
26c3-3266-de-hacking_the_universe.mp4.md5 | 72 B | 2010-01-03 10:55:33 |
26c3-3302-en-i_internet.mp4 | 505.4 MiB | 2009-12-30 10:21:05 |
26c3-3302-en-i_internet.mp4.md5 | 62 B | 2010-01-01 23:21:21 |
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4 | 1.4 GiB | 2009-12-29 15:28:10 |
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4.md5 | 110 B | 2010-01-01 23:22:43 |
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4 | 448.9 MiB | 2010-01-15 10:06:15 |
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4.md5 | 91 B | 2010-01-15 10:12:14 |
26c3-3350-en-milkymist.mp4 | 470.4 MiB | 2009-12-30 16:22:23 |
26c3-3350-en-milkymist.mp4.md5 | 61 B | 2010-01-01 23:23:10 |
26c3-3353-de-reverse-engineering_displaylink_devices.mp4 | 416.6 MiB | 2009-12-29 16:32:48 |
26c3-3353-de-reverse-engineering_displaylink_devices.mp4.md5 | 91 B | 2010-01-01 23:23:34 |
26c3-3452-en-here_be_electric_dragons.mp4 | 671.0 MiB | 2009-12-29 14:57:55 |
26c3-3452-en-here_be_electric_dragons.mp4.md5 | 76 B | 2010-01-01 23:24:18 |
26c3-3464-de-liquid_democracy.mp4 | 708.1 MiB | 2009-12-30 16:27:26 |
26c3-3464-de-liquid_democracy.mp4.md5 | 68 B | 2010-01-01 23:25:04 |
26c3-3468-de-privacy_amp_stylometry.mp4 | 653.4 MiB | 2009-12-29 19:37:09 |
26c3-3468-de-privacy_amp_stylometry.mp4.md5 | 74 B | 2010-01-01 23:25:44 |
26c3-3481-de-leyen-rhetorik.mp4 | 688.3 MiB | 2009-12-29 13:43:35 |
26c3-3481-de-leyen-rhetorik.mp4.md5 | 66 B | 2010-01-01 23:26:23 |
26c3-3490-en-building_a_debugger.mp4 | 619.8 MiB | 2010-01-07 16:22:07 |
26c3-3490-en-building_a_debugger.mp4.md5 | 71 B | 2010-01-07 16:22:08 |
26c3-3494-de-defending_the_poor.mp4 | 801.4 MiB | 2009-12-29 16:18:35 |
26c3-3494-de-defending_the_poor.mp4.md5 | 70 B | 2010-01-01 23:27:29 |
26c3-3495-de-das_zugangserschwerungsgesetz.mp4 | 655.7 MiB | 2009-12-29 14:26:09 |
26c3-3495-de-das_zugangserschwerungsgesetz.mp4.md5 | 81 B | 2010-01-01 23:28:08 |
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4 | 461.1 MiB | 2009-12-30 16:40:36 |
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4.md5 | 91 B | 2010-01-01 23:28:33 |
26c3-3501-en-why_net_neutrality_matters.mp4 | 645.2 MiB | 2010-01-15 11:53:31 |
26c3-3501-en-why_net_neutrality_matters.mp4.md5 | 78 B | 2010-01-15 11:59:57 |
26c3-3504-en-our_darknet_and_its_bright_spots.mp4 | 583.2 MiB | 2010-01-03 08:33:41 |
26c3-3504-en-our_darknet_and_its_bright_spots.mp4.md5 | 84 B | 2010-01-03 08:41:33 |
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4 | 455.5 MiB | 2010-01-03 01:58:32 |
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4.md5 | 83 B | 2010-01-03 02:00:18 |
26c3-3509-de-wofr_offenes_internet.mp4 | 617.6 MiB | 2010-01-17 20:42:56 |
26c3-3509-de-wofr_offenes_internet.mp4.md5 | 73 B | 2010-01-17 20:50:12 |
26c3-3510-de-technik_des_neuen_epa.mp4 | 670.3 MiB | 2009-12-30 10:56:52 |
26c3-3510-de-technik_des_neuen_epa.mp4.md5 | 73 B | 2010-01-01 23:29:34 |
26c3-3515-en-secubt.mp4 | 638.5 MiB | 2009-12-30 16:41:29 |
26c3-3515-en-secubt.mp4.md5 | 58 B | 2010-01-01 23:30:10 |
26c3-3520-en-conlanging_101.mp4 | 825.4 MiB | 2010-01-08 09:46:18 |
26c3-3520-en-conlanging_101.mp4.md5 | 66 B | 2010-01-08 09:49:05 |
26c3-3523-de-eine_zensur_findet_statt.mp4 | 607.8 MiB | 2009-12-29 13:41:50 |
26c3-3523-de-eine_zensur_findet_statt.mp4.md5 | 76 B | 2010-01-01 23:31:25 |
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4 | 709.4 MiB | 2009-12-29 23:21:28 |
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4.md5 | 103 B | 2010-01-01 23:32:04 |
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4 | 669.0 MiB | 2009-12-30 09:54:04 |
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4.md5 | 93 B | 2010-01-01 23:32:42 |
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4 | 592.5 MiB | 2009-12-30 09:45:05 |
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4.md5 | 101 B | 2010-01-01 23:33:15 |
26c3-3540-en-a_hackers_utopia.mp4 | 717.4 MiB | 2009-12-29 15:17:38 |
26c3-3540-en-a_hackers_utopia.mp4.md5 | 68 B | 2010-01-01 23:33:55 |
26c3-3547-en-after_the_hype.mp4 | 676.2 MiB | 2010-01-03 09:13:24 |
26c3-3547-en-after_the_hype.mp4.md5 | 66 B | 2010-01-03 09:15:28 |
26c3-3550-de-chaos-familien-duell.mp4 | 1.3 GiB | 2009-12-29 16:22:08 |
26c3-3550-de-chaos-familien-duell.mp4.md5 | 72 B | 2010-01-01 23:36:00 |
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4 | 657.3 MiB | 2009-12-29 19:26:11 |
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4.md5 | 113 B | 2010-01-01 23:36:41 |
26c3-3554-de-tor_and_censorship_lessons_learned.mp4 | 715.1 MiB | 2009-12-29 14:27:19 |
26c3-3554-de-tor_and_censorship_lessons_learned.mp4.md5 | 86 B | 2010-01-01 23:37:23 |
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4 | 639.8 MiB | 2009-12-29 16:39:52 |
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4.md5 | 153 B | 2010-01-07 18:17:41 |
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4 | 662.6 MiB | 2010-01-15 13:10:03 |
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4.md5 | 88 B | 2010-01-15 13:17:10 |
26c3-3563-en-lightning_talks_-_day_1.mp4 | 1.3 GiB | 2010-01-08 09:05:02 |
26c3-3563-en-lightning_talks_-_day_1.mp4.md5 | 75 B | 2010-01-08 09:07:51 |
26c3-3567-en-wikileaks_release_10.mp4 | 706.2 MiB | 2009-12-29 15:00:56 |
26c3-3567-en-wikileaks_release_10.mp4.md5 | 72 B | 2010-01-01 23:38:48 |
26c3-3570-en-weaponizing_cultural_viruses.mp4 | 762.5 MiB | 2009-12-30 11:53:32 |
26c3-3570-en-weaponizing_cultural_viruses.mp4.md5 | 80 B | 2010-01-01 23:39:31 |
26c3-3573-en-playing_with_the_built_city.mp4 | 678.9 MiB | 2009-12-30 09:37:26 |
26c3-3573-en-playing_with_the_built_city.mp4.md5 | 79 B | 2010-01-01 23:40:09 |
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4 | 582.3 MiB | 2009-12-29 16:30:53 |
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4.md5 | 112 B | 2010-01-01 23:40:43 |
26c3-3577-de-privacy-enhanced_event_scheduling.mp4 | 665.8 MiB | 2009-12-30 11:35:03 |
26c3-3577-de-privacy-enhanced_event_scheduling.mp4.md5 | 85 B | 2010-01-01 23:41:22 |
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4 | 586.4 MiB | 2010-01-03 08:36:35 |
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4.md5 | 93 B | 2010-01-03 08:41:52 |
26c3-3590-de-europische_biometriestrategien.mp4 | 725.2 MiB | 2009-12-30 09:40:31 |
26c3-3590-de-europische_biometriestrategien.mp4.md5 | 82 B | 2010-01-01 23:42:06 |
26c3-3592-de-cybernetic_cannibalism.mp4 | 702.8 MiB | 2009-12-29 16:41:45 |
26c3-3592-de-cybernetic_cannibalism.mp4.md5 | 74 B | 2010-01-01 23:42:48 |
26c3-3594-de-internetsperren.mp4 | 518.7 MiB | 2009-12-29 03:47:58 |
26c3-3594-de-internetsperren.mp4.md5 | 67 B | 2010-01-01 23:43:18 |
26c3-3596-de-cat_procsysnetipv4fuckups.mp4 | 469.3 MiB | 2009-12-30 16:25:35 |
26c3-3596-de-cat_procsysnetipv4fuckups.mp4.md5 | 77 B | 2010-01-01 23:43:47 |
26c3-3600-de-location_tracking_does_scale_up.mp4 | 662.2 MiB | 2009-12-30 10:34:49 |
26c3-3600-de-location_tracking_does_scale_up.mp4.md5 | 83 B | 2010-01-01 23:44:30 |
26c3-3608-en-playing_with_the_gsm_rf_interface.mp4 | 536.4 MiB | 2010-01-15 11:22:54 |
26c3-3608-en-playing_with_the_gsm_rf_interface.mp4.md5 | 85 B | 2010-01-15 11:29:18 |
26c3-3613-de-fnord-jahresrckblick_2009.mp4 | 879.1 MiB | 2010-01-15 10:52:21 |
26c3-3613-de-fnord-jahresrckblick_2009.mp4.md5 | 77 B | 2010-01-15 10:58:32 |
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4 | 759.8 MiB | 2009-12-30 16:54:36 |
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4.md5 | 94 B | 2010-01-01 23:46:03 |
26c3-3631-en-finding_the_key_in_the_haystack.mp4 | 564.6 MiB | 2010-01-03 08:26:28 |
26c3-3631-en-finding_the_key_in_the_haystack.mp4.md5 | 83 B | 2010-01-03 08:27:23 |
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4 | 489.9 MiB | 2009-12-30 10:31:46 |
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4.md5 | 99 B | 2010-01-01 23:46:34 |
26c3-3642-en-lightning_talks_-_day_2.mp4 | 1.4 GiB | 2009-12-29 17:33:05 |
26c3-3642-en-lightning_talks_-_day_2.mp4.md5 | 75 B | 2010-01-01 23:48:02 |
26c3-3644-de-lightning_talks_-_day_3.mp4 | 1.5 GiB | 2010-01-03 11:33:43 |
26c3-3644-de-lightning_talks_-_day_3.mp4.md5 | 75 B | 2010-01-03 11:37:09 |
26c3-3645-en-lightning_talks_-_day_4.mp4 | 1.5 GiB | 2010-01-03 11:20:59 |
26c3-3645-en-lightning_talks_-_day_4.mp4.md5 | 75 B | 2010-01-03 11:22:58 |
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4 | 704.8 MiB | 2009-12-29 15:36:44 |
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4.md5 | 87 B | 2010-01-01 23:48:43 |
26c3-3648-en-dect_part_ii.mp4 | 687.6 MiB | 2009-12-30 09:39:06 |
26c3-3648-en-dect_part_ii.mp4.md5 | 64 B | 2010-01-01 23:49:24 |
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4 | 547.5 MiB | 2009-12-29 23:41:43 |
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4.md5 | 120 B | 2010-01-01 23:49:56 |
26c3-3654-en-gsm_srsly.mp4 | 775.6 MiB | 2009-12-29 15:19:13 |
26c3-3654-en-gsm_srsly.mp4.md5 | 61 B | 2010-01-01 23:50:43 |
26c3-3657-en-optimised_to_fail.mp4 | 666.7 MiB | 2010-02-09 18:45:01 |
26c3-3657-en-optimised_to_fail.mp4.md5 | 69 B | 2010-02-09 18:45:12 |
26c3-3658-en-black_ops_of_pki.mp4 | 881.9 MiB | 2010-01-06 20:43:57 |
26c3-3658-en-black_ops_of_pki.mp4.md5 | 68 B | 2010-01-06 20:46:04 |
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4 | 790.3 MiB | 2009-12-29 15:42:47 |
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4.md5 | 97 B | 2010-01-01 23:52:21 |
26c3-3664-en-homewreckery.mp4 | 467.3 MiB | 2009-12-29 19:18:48 |
26c3-3664-en-homewreckery.mp4.md5 | 64 B | 2010-01-01 23:52:48 |
26c3-3668-en-hacker_jeopardy.mp4 | 1.4 GiB | 2010-01-15 12:24:28 |
26c3-3668-en-hacker_jeopardy.mp4.md5 | 67 B | 2010-01-15 12:31:01 |
26c3-3669-de-hacker_jeopardy.mp4 | 1.4 GiB | 2010-01-06 18:49:03 |
26c3-3669-de-hacker_jeopardy.mp4.md5 | 67 B | 2010-01-06 19:07:20 |
26c3-3670-en-blackbox_jtag_reverse_engineering.mp4 | 634.4 MiB | 2010-01-03 10:47:25 |
26c3-3670-en-blackbox_jtag_reverse_engineering.mp4.md5 | 85 B | 2010-01-03 10:48:58 |
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4 | 1.1 GiB | 2010-01-03 11:49:42 |
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4.md5 | 98 B | 2010-01-03 12:18:36 |
26c3-3672-de-advanced_microcontroller_programming.mp4 | 578.1 MiB | 2009-12-29 23:40:18 |
26c3-3672-de-advanced_microcontroller_programming.mp4.md5 | 88 B | 2010-01-01 23:54:27 |
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4 | 717.4 MiB | 2009-12-29 22:31:00 |
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4.md5 | 101 B | 2010-01-01 23:55:11 |
26c3-3685-de-im_herz_der_bestie.mp4 | 582.2 MiB | 2010-01-03 09:31:05 |
26c3-3685-de-im_herz_der_bestie.mp4.md5 | 70 B | 2010-01-03 09:48:22 |
26c3-3687-de-security_nightmares.mp4 | 960.8 MiB | 2010-01-02 16:07:34 |
26c3-3687-de-security_nightmares.mp4.md5 | 71 B | 2010-01-02 16:10:36 |
26c3-3688-de-haste_man_netblock.mp4 | 362.0 MiB | 2010-01-01 19:38:01 |
26c3-3688-de-haste_man_netblock.mp4.md5 | 70 B | 2010-01-01 23:55:31 |
26c3-3690-de-ccc-jahresrckblick.mp4 | 981.6 MiB | 2009-12-30 09:33:34 |
26c3-3690-de-ccc-jahresrckblick.mp4.md5 | 70 B | 2010-01-01 23:56:26 |
26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4 | 607.4 MiB | 2009-12-30 17:09:12 |
26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4.md5 | 79 B | 2010-01-01 23:57:32 |
26c3-3696-en-wireless_power_transfer.mp4 | 670.7 MiB | 2009-12-29 16:38:40 |
26c3-3696-en-wireless_power_transfer.mp4.md5 | 75 B | 2010-01-01 23:58:09 |
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4 | 1.5 GiB | 2010-01-03 12:27:07 |
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4.md5 | 88 B | 2010-01-03 12:30:58 |
26c3-3700-de-here_be_dragons.mp4 | 554.0 MiB | 2009-12-28 23:11:45 |
26c3-3700-de-here_be_dragons.mp4.md5 | 67 B | 2010-01-01 23:58:39 |
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4 | 623.3 MiB | 2009-12-30 10:33:44 |
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4.md5 | 100 B | 2010-01-01 23:59:14 |
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4 | 502.1 MiB | 2009-12-29 15:33:00 |
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4.md5 | 100 B | 2010-01-01 23:59:41 |
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4 | 954.9 MiB | 2009-12-30 13:54:46 |
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4.md5 | 90 B | 2010-01-02 00:00:34 |
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4 | 599.5 MiB | 2010-01-03 02:07:35 |
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4.md5 | 125 B | 2010-01-03 02:09:41 |
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4 | 677.6 MiB | 2010-01-15 10:21:40 |
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4.md5 | 95 B | 2010-01-15 10:27:40 |
26c3-3709-en-legic_prime_obscurity_in_depth.mp4 | 699.6 MiB | 2009-12-30 15:14:46 |
26c3-3709-en-legic_prime_obscurity_in_depth.mp4.md5 | 82 B | 2010-01-02 00:01:44 |
26c3-3710-en-the_lost_cosmonauts.mp4 | 550.6 MiB | 2009-12-30 09:46:23 |
26c3-3710-en-the_lost_cosmonauts.mp4.md5 | 71 B | 2010-01-02 00:02:13 |
26c3-3711-de-computerspielepolitik.mp4 | 799.8 MiB | 2009-12-29 13:49:47 |
26c3-3711-de-computerspielepolitik.mp4.md5 | 73 B | 2010-01-02 00:02:55 |
26c3-3713-de-unbild__pictures_and_non-pictures.mp4 | 681.7 MiB | 2009-12-29 15:45:00 |
26c3-3713-de-unbild__pictures_and_non-pictures.mp4.md5 | 85 B | 2010-01-02 00:03:32 |
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4 | 736.4 MiB | 2009-12-29 15:45:55 |
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4.md5 | 146 B | 2010-01-02 00:04:13 |
26c3-3717-en-closing_event.mp4 | 385.0 MiB | 2010-01-03 11:24:41 |
26c3-3717-en-closing_event.mp4.md5 | 65 B | 2010-01-03 11:27:58 |
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4 | 705.4 MiB | 2009-12-29 16:13:14 |
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4.md5 | 85 B | 2010-01-02 00:04:55 |
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4 | 886.2 MiB | 2009-12-30 16:43:14 |
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4.md5 | 84 B | 2010-01-02 00:05:45 |
26c3-3725-en-stream_security_nightmares.mp4 | 959.0 MiB | 2010-01-03 12:38:10 |
26c3-3725-en-stream_security_nightmares.mp4.md5 | 78 B | 2010-01-03 12:41:30 |