Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/cdn.media.ccc.de/congress/2014/h264-hd/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
subtitles/-2021-04-16 08:34:32
31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_hd.mp4236.2 MiB2014-12-29 14:09:00
31c3-6295-de-en-Krypto_fuer_die_Zukunft_hd.mp4438.7 MiB2014-12-29 14:10:56
31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_hd.mp4314.5 MiB2014-12-29 14:11:13
31c3-6571-en-31C3_Keynote_hd.mp4694.7 MiB2014-12-29 14:12:11
31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_hd.mp4265.6 MiB2014-12-29 14:12:24
31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_hd.mp4551.0 MiB2014-12-29 14:13:19
31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_hd.mp4337.3 MiB2014-12-29 14:16:48
31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_hd.mp4199.4 MiB2014-12-29 14:17:04
31c3-5960-en-Revisiting_SSL_TLS_Implementations_hd.mp4320.0 MiB2014-12-29 14:17:36
31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_hd.mp4428.2 MiB2014-12-29 14:18:15
31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_hd.mp4346.1 MiB2014-12-29 14:18:44
31c3-6249-en-de-SS7_Locate_Track_Manipulate_hd.mp4483.3 MiB2014-12-29 14:19:28
31c3-6499-en-Glitching_For_n00bs_hd.mp4344.9 MiB2014-12-29 14:20:31
31c3-6234-en-The_eXperimental_Robot_Project_hd.mp4369.4 MiB2014-12-29 14:21:08
31c3-6559-de-en-Jugend_hackt_hd.mp4956.6 MiB2014-12-29 14:22:14
31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_hd.mp4458.6 MiB2014-12-29 14:23:28
31c3-6255-de-en-10_Jahre_OpenStreetMap_hd.mp4804.8 MiB2014-12-29 14:24:22
31c3-6122-en-de-Mobile_self-defense_hd.mp4507.1 MiB2014-12-29 14:24:48
31c3-6050-en-Code_Pointer_Integrity_hd.mp4519.8 MiB2014-12-29 14:25:22
31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_hd.mp4519.1 MiB2014-12-29 14:26:32
31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_hd.mp4333.2 MiB2014-12-29 14:26:57
31c3-6142-en-de-Space_Hacker_hd.mp4586.0 MiB2014-12-29 14:28:36
31c3-6530-en-In_Security_of_Mobile_Banking_hd.mp4324.3 MiB2014-12-29 14:29:39
31c3-6561-en-31C3_Opening_Event_hd.mp4231.2 MiB2014-12-29 14:30:39
31c3-6369-en-ECCHacks_hd.mp4378.8 MiB2014-12-29 14:31:25
31c3-6103-en-AMD_x86_SMU_firmware_analysis_hd.mp4278.1 MiB2014-12-29 14:32:35
31c3-6195-en-The_Cloud_Conspiracy_2008-2014_hd.mp4436.7 MiB2014-12-29 14:34:24
31c3-6154-en-de-Crypto_Tales_from_the_Trenches_hd.mp4771.5 MiB2014-12-29 14:40:06
31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_hd.mp4311.7 MiB2014-12-29 14:41:44
31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_hd.mp4421.6 MiB2014-12-29 14:43:40
31c3-6361-en-From_Maxwell_to_antenna_arrays_hd.mp4320.8 MiB2014-12-29 14:44:10
31c3-6196-en-Switches_Get_Stitches_hd.mp4478.0 MiB2014-12-29 14:48:49
31c3-6021-en-de-Why_is_GPG_damn_near_unusable_hd.mp4304.1 MiB2014-12-29 14:51:36
31c3-6084-en-Uncaging_Microchips_hd.mp4348.3 MiB2014-12-29 14:52:10
31c3-6573-en-de-From_Computation_to_Consciousness_hd.mp4527.8 MiB2014-12-29 14:53:27
31c3-6563-en-Lightning_Talks_Day_2_hd.mp4615.5 MiB2014-12-29 14:54:11
31c3-6600-en-de-Tell_no-one_hd.mp4484.3 MiB2014-12-29 14:54:36
31c3-6308-en-Beyond_PNR_Exploring_airline_systems_hd.mp4392.6 MiB2014-12-29 14:55:36
31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_hd.mp4639.6 MiB2014-12-29 14:56:22
31c3-6162-en-Programming_with_dependent_types_in_Idris_hd.mp4385.4 MiB2014-12-29 14:57:16
31c3-5956-en-Cyber_Necromancy_hd.mp4275.4 MiB2014-12-29 14:57:47
31c3-6131-en-de-Safer_playing_with_lasers_hd.mp4235.6 MiB2014-12-29 14:58:16
31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_hd.mp4292.2 MiB2014-12-29 15:01:19
31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_hd.mp4294.8 MiB2014-12-29 15:01:53
31c3-6406-en-Long_war_tactics_hd.mp4275.5 MiB2014-12-29 15:02:29
31c3-6071-en-Hacking_Ethics_in_Education_hd.mp4256.6 MiB2014-12-29 15:05:28
31c3-6358-en-de-Information_Control_and_Strategic_Violence_hd.mp4288.1 MiB2014-12-29 15:06:05
31c3-6589-en-Mr_Beam_goes_Kickstarter_hd.mp4240.1 MiB2014-12-29 15:06:34
31c3-6541-en-de-Forging_the_USB_armory_hd.mp4285.2 MiB2014-12-29 15:07:53
31c3-6399-en-Global_Civil_Society_Under_Attack_hd.mp4315.8 MiB2014-12-29 15:08:32
31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_hd.mp4558.2 MiB2014-12-29 15:09:19
31c3-6202-en-de-Privacy_and_Consumer_Markets_hd.mp4312.3 MiB2014-12-29 15:11:26
31c3-6595-en-de-Hard_Drive_Punch_hd.mp4332.1 MiB2014-12-29 15:12:06
31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_hd.mp4210.0 MiB2014-12-29 15:12:34
31c3-6370-en-Internet_of_toilets_hd.mp4193.2 MiB2014-12-29 15:13:10
31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_hd.mp4219.4 MiB2014-12-29 15:13:51
31c3-6258-en-Reconstructing_narratives_hd.mp4594.0 MiB2014-12-29 15:14:39
31c3-5997-en-Preserving_arcade_games_hd.mp4611.1 MiB2014-12-29 15:15:16
31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_hd.mp4409.4 MiB2014-12-29 15:15:37
31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_hd.mp4423.2 MiB2014-12-29 15:16:11
31c3-6170-en-net_neutrality_days_of_future_past_hd.mp4568.6 MiB2014-12-29 15:18:49
31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_hd.mp4289.5 MiB2014-12-29 15:19:04
31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_hd.mp4582.3 MiB2014-12-29 15:21:52
31c3-6321-en-de-The_Matter_of_Heartbleed_hd.mp4417.8 MiB2014-12-29 15:23:02
31c3-6175-en-Superheroes_Still_Need_Phoneboxes_hd.mp4656.3 MiB2014-12-29 15:24:37
31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_hd.mp4243.2 MiB2014-12-29 15:25:00
31c3-6109-de-en-Fnord_News_Show_hd.mp4850.6 MiB2014-12-29 15:25:50
31c3-6430-de-en-NSA_Points_of_Presence_in_AT_hd.mp4836.6 MiB2014-12-29 15:42:10
31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_hd.mp4250.4 MiB2014-12-29 15:44:41
31c3-6463-en-Damn_Vulnerable_Chemical_Process_hd.mp4411.2 MiB2014-12-29 15:46:10
31c3-6261-en-de-Lets_build_a_quantum_computer_hd.mp4699.9 MiB2014-12-29 15:51:41
31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_hd.mp4642.0 MiB2014-12-29 16:28:07
31c3-5930-en-de-Funky_File_Formats_hd.mp4387.1 MiB2014-12-29 16:30:10
31c3-6350-en-Correcting_copywrongs_hd.mp4669.6 MiB2014-12-29 19:06:13
31c3-6137-en-de-CAESAR_and_NORX_hd.mp4625.9 MiB2014-12-29 19:08:25
31c3-6579-en-de-Lightning_Talks_Day_3_hd.mp41.2 GiB2014-12-29 19:13:05
31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_hd.mp4444.5 MiB2014-12-29 19:15:29
31c3-6583-de-en-Jahresrueckblick_des_CCC_hd.mp41.3 GiB2014-12-29 19:23:48
31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_hd.mp4504.5 MiB2014-12-29 19:24:47
31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_hd.mp4676.1 MiB2014-12-29 22:28:48
31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_hd.mp4733.7 MiB2014-12-29 22:31:12
31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_hd.mp4420.9 MiB2014-12-29 22:33:00
31c3-6547-en-de-Exploit_in_theater_hd.mp4916.1 MiB2014-12-29 22:36:19
31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_hd.mp4717.4 MiB2014-12-29 22:39:04
31c3-6275-en-de-Living_Drones_hd.mp4416.6 MiB2014-12-29 22:53:10
31c3-6043-en-de-The_Maker_movement_meets_patent_law_hd.mp41.1 GiB2014-12-29 23:14:20
31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_hd.mp4275.7 MiB2014-12-29 23:14:35
31c3-6596-en-de-The_Magical_Secrecy_Tour_hd.mp4359.1 MiB2014-12-29 23:14:56
31c3-6402-en-de-Axoloti_hd.mp4282.3 MiB2014-12-29 23:15:15
31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_hd.mp4272.7 MiB2014-12-29 23:51:05
31c3-6253-en-de-Computer_Science_in_the_DPRK_hd.mp4514.5 MiB2014-12-29 23:51:38
31c3-6299-en-de-Trackography_hd.mp4490.3 MiB2014-12-29 23:52:45
31c3-6554-en-de-Automatically_Subtitling_the_C3_hd.mp4327.5 MiB2014-12-29 23:54:22
31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_hd.mp4292.8 MiB2014-12-29 23:55:40
31c3-6462-en-de-MegaCode_to_facility_gates_hd.mp4299.1 MiB2014-12-29 23:57:11
31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_hd.mp4387.7 MiB2014-12-30 00:04:35
31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_hd.mp4642.2 MiB2014-12-30 00:31:43
31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_hd.mp4498.3 MiB2014-12-30 00:51:11
31c3-6460-en-de-Eye_Wear_Computing_hd.mp4395.6 MiB2014-12-30 02:00:16
31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_hd.mp4403.0 MiB2014-12-30 02:03:43
31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_hd.mp4376.2 MiB2014-12-30 02:05:20
31c3-6385-en-de-The_Machine_To_Be_Another_hd.mp4405.2 MiB2014-12-30 02:11:14
31c3-6543-de-en-The_Time_is_Right_hd.mp42.6 GiB2014-12-30 03:05:43
31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_hd.mp4364.4 MiB2014-12-30 12:03:19
31c3-6291-en-Doing_right_by_sources_done_right_hd.mp41.1 GiB2014-12-30 18:24:22
31c3-5943-en-de-Low_Cost_High_Speed_Photography_hd.mp4687.6 MiB2014-12-30 18:27:00
31c3-6563-en-de-Lightning_Talks_Day_2_hd.mp4944.2 MiB2015-01-01 14:38:02
31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_hd.mp4483.5 MiB2015-01-01 14:40:47
31c3-6214-en-de-Attribution_revolution_hd.mp4919.3 MiB2015-01-01 14:44:31
31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_hd.mp4713.3 MiB2015-01-01 14:48:19
31c3-6397-en-de-Lets_Encrypt_hd.mp4709.4 MiB2015-01-01 14:51:24
31c3-6297-en-de-Virtual_Machine_Introspection_hd.mp4487.6 MiB2015-01-01 14:53:23
31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_hd.mp4458.1 MiB2015-01-01 14:55:13
31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_hd.mp4853.3 MiB2015-01-01 14:58:24
31c3-5931-en-de-Telescope_Making_hd.mp4773.9 MiB2015-01-01 15:01:15
31c3-6580-en-de-Lightning_Talks_Day_4_hd.mp41.4 GiB2015-01-01 15:26:03
31c3-6572-de-en-Security_Nightmares_hd.mp41.1 GiB2015-01-01 22:18:35
31c3-6562-de-en-31C3_Closing_Event_hd.mp4215.2 MiB2015-01-01 22:59:18
31c3-6377-en-de-Paypals_War_on_Terror_hd.mp4796.8 MiB2015-01-01 23:20:29
31c3-6251-en-de-State_of_the_Onion_hd.mp4973.2 MiB2015-01-01 23:45:39
31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_hd.mp4543.0 MiB2015-01-02 00:28:36
31c3-6608-en-Premiere_We_love_surveillance_hd.mp4177.8 MiB2015-01-02 14:36:33
31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_hd.mp4742.3 MiB2015-01-02 17:00:24
31c3-6602-en-de-The_case_of_Chelsea_Manning_hd.mp4889.4 MiB2015-01-02 20:32:21
31c3-6557-en-de-31C3_Infrastructure_Review_hd.mp4457.2 MiB2015-01-04 12:28:09
31c3-6184-de-en-Mein_Bot_der_Kombattant_hd.mp4449.7 MiB2015-01-09 12:49:11
31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_hd.mp4772.0 MiB2015-01-10 18:25:31
31c3-6240-en-Reproducible_Builds_hd.mp4796.9 MiB2015-01-10 18:36:06
31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_hd.mp4514.6 MiB2015-01-10 21:24:53
31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_hd.mp41.0 GiB2015-01-11 17:14:58
31c3-6236-en-de-Iridium_Pager_Hacking_hd.mp4322.9 MiB2015-01-11 17:16:09
31c3-6417-en-3D_Casting_Aluminum_hd.mp4475.9 MiB2015-01-13 08:56:43
31c3-2000-de-Erste_Stunden_der_Zweisamkeit_hd.mp4488.2 MiB2015-01-15 11:27:58
31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_hd.mp4586.3 MiB2015-04-08 14:57:33
31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_hd.mp4666.9 MiB2015-06-03 20:42:27
31c3-6582-de-Das_Transparenzportal_Hamburg_hd.mp4275.3 MiB2015-06-03 21:35:40