Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/cdn.media.ccc.de/congress/2014/h264-sd/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
subtitles/-2021-04-15 12:29:17
31c3-6608-en-Premiere_We_love_surveillance_sd.mp457.2 MiB2015-01-02 15:17:05
31c3-6370-en-Internet_of_toilets_sd.mp474.2 MiB2014-12-29 16:38:40
31c3-6562-de-en-31C3_Closing_Event_sd.mp484.1 MiB2015-01-01 23:20:34
31c3-6071-en-Hacking_Ethics_in_Education_sd.mp491.6 MiB2014-12-29 16:21:24
31c3-6589-en-Mr_Beam_goes_Kickstarter_sd.mp496.3 MiB2014-12-29 16:19:08
31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_sd.mp497.5 MiB2014-12-29 16:42:36
31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_sd.mp4101.9 MiB2014-12-29 16:30:32
31c3-6561-en-31C3_Opening_Event_sd.mp4102.6 MiB2014-12-28 19:46:14
31c3-6406-en-Long_war_tactics_sd.mp4103.1 MiB2014-12-29 16:04:46
31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_sd.mp4103.4 MiB2014-12-29 02:10:54
31c3-6402-en-de-Axoloti_sd.mp4107.5 MiB2014-12-30 00:37:55
31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_sd.mp4108.8 MiB2014-12-29 16:08:52
31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_sd.mp4111.5 MiB2014-12-30 00:39:39
31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_sd.mp4112.7 MiB2014-12-30 00:46:34
31c3-6399-en-Global_Civil_Society_Under_Attack_sd.mp4114.3 MiB2014-12-29 19:39:57
31c3-6462-en-de-MegaCode_to_facility_gates_sd.mp4114.3 MiB2014-12-30 00:47:11
31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_sd.mp4115.2 MiB2014-12-30 00:13:40
31c3-6131-en-de-Safer_playing_with_lasers_sd.mp4115.4 MiB2014-12-29 15:56:26
31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_sd.mp4118.3 MiB2014-12-28 13:30:52
31c3-6541-en-de-Forging_the_USB_armory_sd.mp4118.4 MiB2014-12-29 16:15:37
31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_sd.mp4123.3 MiB2014-12-29 17:13:20
31c3-6554-en-de-Automatically_Subtitling_the_C3_sd.mp4124.1 MiB2014-12-30 00:45:52
31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_sd.mp4124.1 MiB2014-12-30 00:47:51
31c3-6582-de-Das_Transparenzportal_Hamburg_sd.mp4126.4 MiB2015-06-03 21:36:25
31c3-6358-en-de-Information_Control_and_Strategic_Violence_sd.mp4126.8 MiB2014-12-29 16:11:50
31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_sd.mp4129.2 MiB2014-12-29 16:48:38
31c3-6361-en-From_Maxwell_to_antenna_arrays_sd.mp4129.3 MiB2014-12-29 14:50:49
31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_sd.mp4129.4 MiB2014-12-30 00:14:22
31c3-6236-en-de-Iridium_Pager_Hacking_sd.mp4131.7 MiB2015-01-11 22:36:42
31c3-6202-en-de-Privacy_and_Consumer_Markets_sd.mp4132.4 MiB2014-12-29 18:14:55
31c3-6103-en-AMD_x86_SMU_firmware_analysis_sd.mp4132.8 MiB2014-12-29 14:36:10
31c3-5956-en-Cyber_Necromancy_sd.mp4133.9 MiB2014-12-29 15:47:47
31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_sd.mp4134.0 MiB2014-12-29 17:58:13
31c3-6275-en-de-Living_Drones_sd.mp4136.7 MiB2014-12-30 00:39:02
31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_sd.mp4138.1 MiB2014-12-30 12:43:17
31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_sd.mp4140.1 MiB2014-12-30 12:35:04
31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_sd.mp4142.5 MiB2014-12-29 16:35:14
31c3-6460-en-de-Eye_Wear_Computing_sd.mp4143.8 MiB2014-12-30 11:53:10
31c3-6385-en-de-The_Machine_To_Be_Another_sd.mp4144.0 MiB2014-12-30 14:40:16
31c3-6530-en-In_Security_of_Mobile_Banking_sd.mp4145.0 MiB2014-12-29 14:38:32
31c3-6595-en-de-Hard_Drive_Punch_sd.mp4145.3 MiB2014-12-29 19:41:08
31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_sd.mp4146.5 MiB2014-12-30 12:38:24
31c3-6596-en-de-The_Magical_Secrecy_Tour_sd.mp4146.7 MiB2014-12-30 00:39:54
31c3-6195-en-The_Cloud_Conspiracy_2008-2014_sd.mp4150.3 MiB2014-12-29 14:35:27
31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_sd.mp4150.8 MiB2014-12-29 14:42:53
31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_sd.mp4150.8 MiB2014-12-30 00:40:03
31c3-6234-en-The_eXperimental_Robot_Project_sd.mp4151.0 MiB2014-12-29 11:48:01
31c3-5960-en-Revisiting_SSL_TLS_Implementations_sd.mp4152.8 MiB2014-12-29 02:06:19
31c3-6417-en-3D_Casting_Aluminum_sd.mp4154.4 MiB2015-01-13 10:00:31
31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_sd.mp4155.5 MiB2014-12-28 13:45:40
31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_sd.mp4156.4 MiB2014-12-29 15:07:13
31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_sd.mp4156.7 MiB2014-12-30 00:08:16
31c3-6499-en-Glitching_For_n00bs_sd.mp4158.0 MiB2014-12-29 02:21:26
31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_sd.mp4158.3 MiB2014-12-29 02:15:59
31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_sd.mp4158.3 MiB2014-12-29 01:55:48
31c3-6162-en-Programming_with_dependent_types_in_Idris_sd.mp4158.9 MiB2014-12-29 15:52:01
31c3-6295-de-en-Krypto_fuer_die_Zukunft_sd.mp4159.4 MiB2014-12-29 18:28:29
31c3-6299-en-de-Trackography_sd.mp4160.2 MiB2014-12-30 00:45:13
31c3-6369-en-ECCHacks_sd.mp4162.7 MiB2014-12-29 14:31:56
31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_sd.mp4167.1 MiB2014-12-29 14:45:18
31c3-6021-en-de-Why_is_GPG_damn_near_unusable_sd.mp4167.2 MiB2014-12-29 15:17:52
31c3-6084-en-Uncaging_Microchips_sd.mp4167.3 MiB2014-12-29 15:10:45
31c3-6463-en-Damn_Vulnerable_Chemical_Process_sd.mp4173.2 MiB2014-12-30 00:27:31
31c3-6253-en-de-Computer_Science_in_the_DPRK_sd.mp4173.2 MiB2014-12-30 00:44:44
31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_sd.mp4174.3 MiB2014-12-30 00:10:20
31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4175.0 MiB2015-01-01 17:33:47
31c3-5930-en-de-Funky_File_Formats_sd.mp4175.1 MiB2014-12-30 00:29:12
31c3-2000-de-Erste_Stunden_der_Zweisamkeit_sd.mp4181.5 MiB2015-01-15 13:32:21
31c3-6557-en-de-31C3_Infrastructure_Review_sd.mp4181.9 MiB2015-01-04 13:26:58
31c3-6308-en-Beyond_PNR_Exploring_airline_systems_sd.mp4186.4 MiB2014-12-29 15:19:43
31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_sd.mp4197.8 MiB2015-01-10 21:28:47
31c3-6321-en-de-The_Matter_of_Heartbleed_sd.mp4198.1 MiB2014-12-30 00:12:29
31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_sd.mp4200.6 MiB2014-12-30 00:36:14
31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_sd.mp4201.9 MiB2015-01-01 15:29:02
31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_sd.mp4207.7 MiB2014-12-29 18:55:42
31c3-6184-de-en-Mein_Bot_der_Kombattant_sd.mp4207.7 MiB2015-01-09 14:32:21
31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_sd.mp4208.1 MiB2014-12-30 02:21:33
31c3-6196-en-Switches_Get_Stitches_sd.mp4208.3 MiB2014-12-29 14:59:32
31c3-6170-en-net_neutrality_days_of_future_past_sd.mp4210.9 MiB2014-12-30 00:09:41
31c3-6297-en-de-Virtual_Machine_Introspection_sd.mp4211.0 MiB2015-01-01 15:32:01
31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_sd.mp4211.8 MiB2015-01-01 15:01:27
31c3-6050-en-Code_Pointer_Integrity_sd.mp4213.8 MiB2014-12-29 14:25:44
31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_sd.mp4214.3 MiB2014-12-30 00:38:32
31c3-6350-en-Correcting_copywrongs_sd.mp4227.8 MiB2014-12-30 00:29:43
31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_sd.mp4228.3 MiB2015-01-02 00:42:57
31c3-6258-en-Reconstructing_narratives_sd.mp4231.5 MiB2014-12-29 23:19:05
31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_sd.mp4235.1 MiB2015-01-02 17:21:34
31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_sd.mp4236.8 MiB2014-12-29 11:58:37
31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_sd.mp4236.8 MiB2014-12-29 14:27:38
31c3-6249-en-de-SS7_Locate_Track_Manipulate_sd.mp4237.7 MiB2014-12-29 02:55:44
31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_sd.mp4240.0 MiB2014-12-30 11:16:19
31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_sd.mp4240.7 MiB2014-12-30 00:09:04
31c3-6397-en-de-Lets_Encrypt_sd.mp4241.0 MiB2015-01-01 15:18:16
31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_sd.mp4246.2 MiB2014-12-30 00:30:17
31c3-6240-en-Reproducible_Builds_sd.mp4247.1 MiB2015-01-10 21:05:11
31c3-5943-en-de-Low_Cost_High_Speed_Photography_sd.mp4247.7 MiB2015-01-01 14:41:16
31c3-6122-en-de-Mobile_self-defense_sd.mp4251.2 MiB2014-12-29 11:41:07
31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_sd.mp4253.2 MiB2014-12-30 00:31:59
31c3-6600-en-de-Tell_no-one_sd.mp4253.7 MiB2014-12-29 17:01:05
31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_sd.mp4253.9 MiB2015-01-10 18:44:57
31c3-5997-en-Preserving_arcade_games_sd.mp4254.8 MiB2014-12-30 00:07:42
31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_sd.mp4254.9 MiB2014-12-30 00:15:52
31c3-6137-en-de-CAESAR_and_NORX_sd.mp4261.1 MiB2014-12-30 00:29:57
31c3-6573-en-de-From_Computation_to_Consciousness_sd.mp4263.3 MiB2014-12-29 15:04:53
31c3-6175-en-Superheroes_Still_Need_Phoneboxes_sd.mp4264.7 MiB2014-12-30 00:13:13
31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_sd.mp4265.8 MiB2014-12-30 00:32:35
31c3-6142-en-de-Space_Hacker_sd.mp4269.0 MiB2014-12-29 14:29:03
31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_sd.mp4274.1 MiB2014-12-29 15:38:41
31c3-6214-en-de-Attribution_revolution_sd.mp4274.8 MiB2015-01-01 15:17:19
31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_sd.mp4275.1 MiB2014-12-28 13:29:05
31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_sd.mp4277.3 MiB2014-12-30 00:34:41
31c3-6377-en-de-Paypals_War_on_Terror_sd.mp4278.1 MiB2015-01-01 23:37:52
31c3-6291-en-Doing_right_by_sources_done_right_sd.mp4278.4 MiB2015-01-01 14:38:19
31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_sd.mp4279.3 MiB2015-01-01 15:26:17
31c3-6261-en-de-Lets_build_a_quantum_computer_sd.mp4280.7 MiB2014-12-30 00:26:53
31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_sd.mp4283.8 MiB2015-06-03 20:39:34
31c3-5931-en-de-Telescope_Making_sd.mp4288.1 MiB2015-01-01 15:38:45
31c3-6563-en-Lightning_Talks_Day_2_sd.mp4288.3 MiB2014-12-29 16:58:22
31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_sd.mp4296.8 MiB2015-01-01 15:31:26
31c3-6430-de-en-NSA_Points_of_Presence_in_AT_sd.mp4309.5 MiB2014-12-30 00:15:19
31c3-6602-en-de-The_case_of_Chelsea_Manning_sd.mp4311.8 MiB2015-01-02 20:52:28
31c3-6571-en-31C3_Keynote_sd.mp4312.7 MiB2014-12-28 16:57:26
31c3-6255-de-en-10_Jahre_OpenStreetMap_sd.mp4314.1 MiB2014-12-29 17:51:05
31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_sd.mp4318.3 MiB2015-04-08 15:23:20
31c3-6154-en-de-Crypto_Tales_from_the_Trenches_sd.mp4340.4 MiB2014-12-29 14:41:10
31c3-6251-en-de-State_of_the_Onion_sd.mp4341.6 MiB2015-01-02 00:15:02
31c3-6547-en-de-Exploit_in_theater_sd.mp4346.2 MiB2014-12-30 00:33:51
31c3-6559-de-en-Jugend_hackt_sd.mp4351.2 MiB2014-12-29 12:16:09
31c3-6043-en-de-The_Maker_movement_meets_patent_law_sd.mp4375.5 MiB2014-12-30 00:35:42
31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_sd.mp4382.9 MiB2015-01-11 22:49:18
31c3-6563-en-de-Lightning_Talks_Day_2_sd.mp4406.4 MiB2015-01-01 15:14:51
31c3-6572-de-en-Security_Nightmares_sd.mp4423.8 MiB2015-01-01 23:00:16
31c3-6109-de-en-Fnord_News_Show_sd.mp4424.6 MiB2014-12-29 15:49:03
31c3-6579-en-de-Lightning_Talks_Day_3_sd.mp4513.0 MiB2014-12-30 00:27:18
31c3-6580-en-de-Lightning_Talks_Day_4_sd.mp4541.1 MiB2015-01-01 16:01:15
31c3-6583-de-en-Jahresrueckblick_des_CCC_sd.mp4583.6 MiB2014-12-30 00:28:50
31c3-6543-de-en-The_Time_is_Right_sd.mp4719.4 MiB2014-12-30 12:20:07