Index of /events/CCC/pub/congress/25c3/audio_only/
../
25c3-2596-en-swf_and_the_malware_tragedy.mp3 11-Jan-2009 21:42 23209971
25c3-2596-en-swf_and_the_malware_tragedy.mp3.md5 11-Jan-2009 21:42 79
25c3-2596-en-swf_and_the_malware_tragedy.ogg 11-Jan-2009 21:42 20678288
25c3-2596-en-swf_and_the_malware_tragedy.ogg.md5 11-Jan-2009 21:42 79
25c3-2639-en-attacking_nfc_mobile_phones.mp3 12-Jan-2009 01:38 39348727
25c3-2639-en-attacking_nfc_mobile_phones.mp3.md5 12-Jan-2009 01:38 79
25c3-2639-en-attacking_nfc_mobile_phones.ogg 12-Jan-2009 01:39 35158140
25c3-2639-en-attacking_nfc_mobile_phones.ogg.md5 12-Jan-2009 01:38 79
25c3-2665-en-the_trust_situation.mp3 29-Dec-2008 12:25 29034287
25c3-2665-en-the_trust_situation.mp3.md5 06-Jan-2009 20:21 71
25c3-2665-en-the_trust_situation.ogg 29-Dec-2008 15:36 25876231
25c3-2665-en-the_trust_situation.ogg.md5 06-Jan-2009 20:21 71
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38 27966788
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38 97
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:39 24930193
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38 97
25c3-2678-en-vulnerability_discovery_in_encrypt..> 29-Dec-2008 02:11 28715612
25c3-2678-en-vulnerability_discovery_in_encrypt..> 06-Jan-2009 20:21 119
25c3-2678-en-vulnerability_discovery_in_encrypt..> 29-Dec-2008 13:53 25624781
25c3-2678-en-vulnerability_discovery_in_encrypt..> 06-Jan-2009 20:21 119
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:42 22970033
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:41 138
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:46 20484056
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:41 138
25c3-2681-en-repurposing_the_ti_ez430u.mp3 29-Dec-2008 23:06 15981174
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5 06-Jan-2009 20:21 77
25c3-2681-en-repurposing_the_ti_ez430u.ogg 30-Dec-2008 01:51 14264026
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5 06-Jan-2009 20:21 77
25c3-2734-en-short_attention_span_security.mp3 12-Jan-2009 01:38 25601331
25c3-2734-en-short_attention_span_security.mp3.md5 12-Jan-2009 01:38 81
25c3-2734-en-short_attention_span_security.ogg 12-Jan-2009 01:39 22877418
25c3-2734-en-short_attention_span_security.ogg.md5 12-Jan-2009 01:38 81
25c3-2773-en-soviet_unterzoegersdorf.mp3 29-Dec-2008 23:20 37571565
25c3-2773-en-soviet_unterzoegersdorf.mp3.md5 06-Jan-2009 20:21 75
25c3-2773-en-soviet_unterzoegersdorf.ogg 30-Dec-2008 01:47 33462258
25c3-2773-en-soviet_unterzoegersdorf.ogg.md5 06-Jan-2009 20:21 75
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38 17188860
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38 91
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:39 15328670
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38 91
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42 24827586
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42 93
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42 22133583
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42 93
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:42 31648430
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:41 106
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:46 28181697
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:41 106
25c3-2799-en-console_hacking_2008_wii_fail.mp3 29-Dec-2008 15:38 27018298
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5 06-Jan-2009 20:21 81
25c3-2799-en-console_hacking_2008_wii_fail.ogg 29-Dec-2008 13:53 24085439
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5 06-Jan-2009 20:21 81
25c3-2806-en-building_an_international_movement..> 29-Dec-2008 13:16 31374847
25c3-2806-en-building_an_international_movement..> 06-Jan-2009 20:21 102
25c3-2806-en-building_an_international_movement..> 29-Dec-2008 13:16 28019258
25c3-2806-en-building_an_international_movement..> 06-Jan-2009 20:21 102
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28 24732172
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28 98
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28 22038508
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28 98
25c3-2812-de-fnord_news_show.mp3 29-Dec-2008 22:08 23998139
25c3-2812-de-fnord_news_show.mp3.md5 06-Jan-2009 20:21 67
25c3-2812-de-fnord_news_show.ogg 29-Dec-2008 22:08 21420877
25c3-2812-de-fnord_news_show.ogg.md5 06-Jan-2009 20:21 67
25c3-2814-de-datenpannen.mp3 29-Dec-2008 15:12 25239415
25c3-2814-de-datenpannen.mp3.md5 06-Jan-2009 20:21 63
25c3-2814-de-datenpannen.ogg 29-Dec-2008 15:16 22591516
25c3-2814-de-datenpannen.ogg.md5 06-Jan-2009 20:21 63
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3 29-Dec-2008 15:10 23554616
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp..> 06-Jan-2009 20:21 83
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg 29-Dec-2008 15:21 20988288
25c3-2815-en-beyond_asimov_-_laws_for_robots.og..> 06-Jan-2009 20:21 83
25c3-2816-en-cisco_ios_attack_and_defense.mp3 06-Jan-2009 20:42 31707896
25c3-2816-en-cisco_ios_attack_and_defense.mp3.md5 06-Jan-2009 20:41 80
25c3-2816-en-cisco_ios_attack_and_defense.ogg 06-Jan-2009 20:46 26239360
25c3-2816-en-cisco_ios_attack_and_defense.ogg.md5 06-Jan-2009 20:41 80
25c3-2827-de-u23.mp3 29-Dec-2008 23:19 23834528
25c3-2827-de-u23.mp3.md5 06-Jan-2009 20:21 55
25c3-2827-de-u23.ogg 30-Dec-2008 01:46 21259527
25c3-2827-de-u23.ogg.md5 06-Jan-2009 20:21 55
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08 21024081
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08 86
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:09 18735307
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08 86
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:42 17607431
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:41 99
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:46 15691378
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:41 99
25c3-2832-en-exploiting_symbian.mp3 29-Dec-2008 14:22 30129646
25c3-2832-en-exploiting_symbian.mp3.md5 06-Jan-2009 20:21 70
25c3-2832-en-exploiting_symbian.ogg 29-Dec-2008 14:22 26850120
25c3-2832-en-exploiting_symbian.ogg.md5 06-Jan-2009 20:21 70
25c3-2839-en-cracking_the_msp430_bsl.mp3 29-Dec-2008 15:08 17837812
25c3-2839-en-cracking_the_msp430_bsl.mp3.md5 06-Jan-2009 20:21 75
25c3-2839-en-cracking_the_msp430_bsl.ogg 29-Dec-2008 13:24 15914272
25c3-2839-en-cracking_the_msp430_bsl.ogg.md5 06-Jan-2009 20:21 75
25c3-2843-en-algorithmic_music_in_a_box.mp3 07-Jan-2009 23:09 24406124
25c3-2843-en-algorithmic_music_in_a_box.mp3.md5 07-Jan-2009 23:08 78
25c3-2843-en-algorithmic_music_in_a_box.ogg 07-Jan-2009 23:10 21772056
25c3-2843-en-algorithmic_music_in_a_box.ogg.md5 07-Jan-2009 23:08 78
25c3-2845-en-rf_fingerprinting_of_rfid.mp3 29-Dec-2008 14:34 21274621
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5 06-Jan-2009 20:21 77
25c3-2845-en-rf_fingerprinting_of_rfid.ogg 29-Dec-2008 13:21 18967458
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5 06-Jan-2009 20:21 77
25c3-2860-de-neusprech_im_berwachungsstaat.mp3 30-Dec-2008 01:47 33528768
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5 06-Jan-2009 20:21 81
25c3-2860-de-neusprech_im_berwachungsstaat.ogg 30-Dec-2008 01:48 29899366
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5 06-Jan-2009 20:21 81
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59 30934523
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59 89
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59 27662248
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59 89
25c3-2872-en-the_privacy_workshop_project.mp3 29-Dec-2008 23:20 23095488
25c3-2872-en-the_privacy_workshop_project.mp3.md5 06-Jan-2009 20:21 80
25c3-2872-en-the_privacy_workshop_project.ogg 30-Dec-2008 01:50 20567767
25c3-2872-en-the_privacy_workshop_project.ogg.md5 06-Jan-2009 20:21 80
25c3-2873-en-privacy_in_the_social_semantic_web..> 29-Dec-2008 23:02 21911097
25c3-2873-en-privacy_in_the_social_semantic_web..> 06-Jan-2009 20:21 86
25c3-2873-en-privacy_in_the_social_semantic_web..> 30-Dec-2008 01:45 19552349
25c3-2873-en-privacy_in_the_social_semantic_web..> 06-Jan-2009 20:21 86
25c3-2874-en-the_ultimate_commodore_64_talk.mp3 11-Jan-2009 21:42 29253176
25c3-2874-en-the_ultimate_commodore_64_talk.mp3..> 11-Jan-2009 21:42 82
25c3-2874-en-the_ultimate_commodore_64_talk.ogg 11-Jan-2009 21:42 26099952
25c3-2874-en-the_ultimate_commodore_64_talk.ogg..> 11-Jan-2009 21:42 82
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:09 22363275
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:08 96
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:10 19918459
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:08 96
25c3-2882-en-full-disk-encryption_crash-course.mp3 29-Dec-2008 13:54 22996992
25c3-2882-en-full-disk-encryption_crash-course...> 06-Jan-2009 20:21 85
25c3-2882-en-full-disk-encryption_crash-course.ogg 29-Dec-2008 14:01 20491159
25c3-2882-en-full-disk-encryption_crash-course...> 06-Jan-2009 20:21 85
25c3-2890-en-scalable_swarm_robotics.mp3 29-Dec-2008 14:28 18698926
25c3-2890-en-scalable_swarm_robotics.mp3.md5 06-Jan-2009 20:21 75
25c3-2890-en-scalable_swarm_robotics.ogg 29-Dec-2008 13:19 16668705
25c3-2890-en-scalable_swarm_robotics.ogg.md5 06-Jan-2009 20:21 75
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3 29-Dec-2008 14:11 21464693
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5 06-Jan-2009 20:21 80
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg 29-Dec-2008 14:11 19440242
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5 06-Jan-2009 20:21 80
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:42 29467273
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:41 88
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:46 26315183
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:41 88
25c3-2895-de-der_elektronische_personalausweis.mp3 11-Jan-2009 21:42 28815429
25c3-2895-de-der_elektronische_personalausweis...> 11-Jan-2009 21:42 85
25c3-2895-de-der_elektronische_personalausweis.ogg 11-Jan-2009 21:42 25670955
25c3-2895-de-der_elektronische_personalausweis...> 11-Jan-2009 21:42 85
25c3-2896-en-chip_reverse_engineering.mp3 29-Dec-2008 12:17 21431098
25c3-2896-en-chip_reverse_engineering.mp3.md5 06-Jan-2009 20:21 76
25c3-2896-en-chip_reverse_engineering.ogg 29-Dec-2008 13:07 19131454
25c3-2896-en-chip_reverse_engineering.ogg.md5 06-Jan-2009 20:21 76
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:43 28298970
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:41 91
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:46 25201679
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:41 91
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 29-Dec-2008 12:55 23881992
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 06-Jan-2009 20:21 86
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 29-Dec-2008 15:29 21289082
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 06-Jan-2009 20:21 86
25c3-2904-en-solar-powering_your_geek_gear.mp3 29-Dec-2008 12:05 13785088
25c3-2904-en-solar-powering_your_geek_gear.mp3.md5 06-Jan-2009 20:21 81
25c3-2904-en-solar-powering_your_geek_gear.ogg 29-Dec-2008 18:27 12443469
25c3-2904-en-solar-powering_your_geek_gear.ogg.md5 06-Jan-2009 20:21 81
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:39 34777612
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:38 102
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:39 31026991
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:38 102
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 29-Dec-2008 15:11 14493186
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 06-Jan-2009 20:21 89
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 29-Dec-2008 13:12 12935390
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 06-Jan-2009 20:21 89
25c3-2916-en-wikileaks.mp3 11-Jan-2009 21:42 27989791
25c3-2916-en-wikileaks.mp3.md5 11-Jan-2009 21:42 61
25c3-2916-en-wikileaks.ogg 11-Jan-2009 21:42 25008194
25c3-2916-en-wikileaks.ogg.md5 11-Jan-2009 21:42 61
25c3-2922-en-advanced_memory_forensics_the_cold..> 29-Dec-2008 15:13 27988876
25c3-2922-en-advanced_memory_forensics_the_cold..> 06-Jan-2009 20:21 99
25c3-2922-en-advanced_memory_forensics_the_cold..> 29-Dec-2008 15:22 24982757
25c3-2922-en-advanced_memory_forensics_the_cold..> 06-Jan-2009 20:21 99
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:43 26399122
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:41 92
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:47 23529512
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:41 92
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 29-Dec-2008 13:16 30652910
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:21 90
25c3-2934-en-blinkenlights_stereoscope.mp3 06-Jan-2009 20:43 31106930
25c3-2934-en-blinkenlights_stereoscope.mp3.md5 06-Jan-2009 20:41 77
25c3-2934-en-blinkenlights_stereoscope.ogg 06-Jan-2009 20:47 27700724
25c3-2934-en-blinkenlights_stereoscope.ogg.md5 06-Jan-2009 20:41 77
25c3-2937-en-dect.mp3 06-Jan-2009 20:43 31999746
25c3-2937-en-dect.mp3.md5 06-Jan-2009 20:41 56
25c3-2937-en-dect.ogg 06-Jan-2009 20:47 28545974
25c3-2937-en-dect.ogg.md5 06-Jan-2009 20:41 56
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:44 24397527
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:41 116
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:48 21747137
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:41 116
25c3-2940-en-flying_for_free.mp3 22-Jan-2009 23:28 28902375
25c3-2940-en-flying_for_free.mp3.md5 22-Jan-2009 23:28 67
25c3-2940-en-flying_for_free.ogg 22-Jan-2009 23:28 25797221
25c3-2940-en-flying_for_free.ogg.md5 22-Jan-2009 23:28 67
25c3-2942-de-vertex_hacking.mp3 06-Jan-2009 20:44 23344359
25c3-2942-de-vertex_hacking.mp3.md5 06-Jan-2009 20:41 66
25c3-2942-de-vertex_hacking.ogg 06-Jan-2009 20:48 20777482
25c3-2942-de-vertex_hacking.ogg.md5 06-Jan-2009 20:41 66
25c3-2952-de-pflanzenhacken.mp3 11-Jan-2009 21:42 26007014
25c3-2952-de-pflanzenhacken.mp3.md5 11-Jan-2009 21:42 66
25c3-2952-de-pflanzenhacken.ogg 11-Jan-2009 21:42 23217701
25c3-2952-de-pflanzenhacken.ogg.md5 11-Jan-2009 21:42 66
25c3-2953-en-security_failures_in_smart_card_pa..> 29-Dec-2008 15:08 29503757
25c3-2953-en-security_failures_in_smart_card_pa..> 06-Jan-2009 20:21 99
25c3-2953-en-security_failures_in_smart_card_pa..> 29-Dec-2008 15:06 26288618
25c3-2953-en-security_failures_in_smart_card_pa..> 06-Jan-2009 20:21 99
25c3-2958-de-hacker_jeopardy.mp3 12-Jan-2009 01:39 49435634
25c3-2958-de-hacker_jeopardy.mp3.md5 12-Jan-2009 01:38 67
25c3-2958-de-hacker_jeopardy.ogg 12-Jan-2009 01:39 44038282
25c3-2958-de-hacker_jeopardy.ogg.md5 12-Jan-2009 01:38 67
25c3-2963-de-handschellen_hacken.mp3 26-Jan-2009 11:39 29400035
25c3-2963-de-handschellen_hacken.mp3.md5 26-Jan-2009 11:39 71
25c3-2963-de-handschellen_hacken.ogg 26-Jan-2009 11:39 26192597
25c3-2963-de-handschellen_hacken.ogg.md5 26-Jan-2009 11:39 71
25c3-2970-en-coreboot_beyond_the_final_frontier..> 29-Dec-2008 00:52 24258560
25c3-2970-en-coreboot_beyond_the_final_frontier..> 06-Jan-2009 20:21 86
25c3-2970-en-coreboot_beyond_the_final_frontier..> 29-Dec-2008 15:23 21594952
25c3-2970-en-coreboot_beyond_the_final_frontier..> 06-Jan-2009 20:21 86
25c3-2973-en-lightning_talks_day4.mp3 11-Jan-2009 21:42 29268541
25c3-2973-en-lightning_talks_day4.mp3.md5 11-Jan-2009 21:42 72
25c3-2973-en-lightning_talks_day4.ogg 11-Jan-2009 21:42 26128547
25c3-2973-en-lightning_talks_day4.ogg.md5 11-Jan-2009 21:42 72
25c3-2975-de-zehn_big_brother_awards_in_at.mp3 06-Jan-2009 20:44 27522299
25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md5 06-Jan-2009 20:41 81
25c3-2975-de-zehn_big_brother_awards_in_at.ogg 06-Jan-2009 20:48 24522199
25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md5 06-Jan-2009 20:41 81
25c3-2976-en-hacking_the_iphone.mp3 29-Dec-2008 12:59 27889021
25c3-2976-en-hacking_the_iphone.mp3.md5 06-Jan-2009 20:21 70
25c3-2976-en-hacking_the_iphone.ogg 29-Dec-2008 15:24 24864661
25c3-2976-en-hacking_the_iphone.ogg.md5 06-Jan-2009 20:21 70
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:44 29764874
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:41 97
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:48 26568384
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:41 97
25c3-2979-en-embracing_post-privacy.mp3 06-Jan-2009 20:44 28423552
25c3-2979-en-embracing_post-privacy.mp3.md5 06-Jan-2009 20:41 74
25c3-2979-en-embracing_post-privacy.ogg 06-Jan-2009 20:48 25324720
25c3-2979-en-embracing_post-privacy.ogg.md5 06-Jan-2009 20:41 74
25c3-2980-en-the_infinite_library.mp3 06-Jan-2009 22:25 28044523
25c3-2980-en-the_infinite_library.mp3.md5 06-Jan-2009 22:25 72
25c3-2980-en-the_infinite_library.ogg 07-Jan-2009 23:10 24986890
25c3-2980-en-the_infinite_library.ogg.md5 07-Jan-2009 23:08 72
25c3-2988-en-just_estonia_and_georgia.mp3 06-Jan-2009 20:45 21336048
25c3-2988-en-just_estonia_and_georgia.mp3.md5 06-Jan-2009 20:41 76
25c3-2988-en-just_estonia_and_georgia.ogg 06-Jan-2009 20:48 19015109
25c3-2988-en-just_estonia_and_georgia.ogg.md5 06-Jan-2009 20:41 76
25c3-2991-en-terrorist_all-stars.mp3 06-Jan-2009 20:45 31200041
25c3-2991-en-terrorist_all-stars.mp3.md5 06-Jan-2009 20:41 71
25c3-2991-en-terrorist_all-stars.ogg 06-Jan-2009 20:48 27852981
25c3-2991-en-terrorist_all-stars.ogg.md5 06-Jan-2009 20:41 71
25c3-2992-en-tricks_makes_you_smile.mp3 07-Jan-2009 23:09 16993973
25c3-2992-en-tricks_makes_you_smile.mp3.md5 07-Jan-2009 23:08 74
25c3-2992-en-tricks_makes_you_smile.ogg 07-Jan-2009 23:10 15185123
25c3-2992-en-tricks_makes_you_smile.ogg.md5 07-Jan-2009 23:08 74
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:45 24195947
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:41 108
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:49 21553131
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:41 108
25c3-2997-en-locating_mobile_phones_using_ss7.mp3 29-Dec-2008 15:15 23148537
25c3-2997-en-locating_mobile_phones_using_ss7.m..> 06-Jan-2009 20:21 84
25c3-2997-en-locating_mobile_phones_using_ss7.ogg 29-Dec-2008 15:18 20652305
25c3-2997-en-locating_mobile_phones_using_ss7.o..> 06-Jan-2009 20:21 84
25c3-2999-en-closing_ceremony.mp3 11-Jan-2009 21:42 23930924
25c3-2999-en-closing_ceremony.mp3.md5 11-Jan-2009 21:42 68
25c3-2999-en-closing_ceremony.ogg 11-Jan-2009 21:42 21350112
25c3-2999-en-closing_ceremony.ogg.md5 11-Jan-2009 21:42 68
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:39 38675981
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:38 87
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:39 34481796
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:38 87
25c3-3002-en-squeezing_attack_traces.mp3 11-Jan-2009 21:42 18116211
25c3-3002-en-squeezing_attack_traces.mp3.md5 11-Jan-2009 21:42 75
25c3-3002-en-squeezing_attack_traces.ogg 11-Jan-2009 21:43 16132841
25c3-3002-en-squeezing_attack_traces.ogg.md5 11-Jan-2009 21:42 75
25c3-3004-en-why_technology_sucks.mp3 06-Jan-2009 20:45 21312048
25c3-3004-en-why_technology_sucks.mp3.md5 06-Jan-2009 20:41 72
25c3-3004-en-why_technology_sucks.ogg 06-Jan-2009 20:49 18971534
25c3-3004-en-why_technology_sucks.ogg.md5 06-Jan-2009 20:42 72
25c3-3007-en-running_your_own_gsm_network.mp3 30-Dec-2008 17:16 21364867
25c3-3007-en-running_your_own_gsm_network.mp3.md5 06-Jan-2009 20:21 80
25c3-3007-en-running_your_own_gsm_network.ogg 30-Dec-2008 17:16 19116180
25c3-3007-en-running_your_own_gsm_network.ogg.md5 06-Jan-2009 20:21 80
25c3-3008-en-anatomy_of_smartphone_hardware.mp3 06-Jan-2009 20:45 27196855
25c3-3008-en-anatomy_of_smartphone_hardware.mp3..> 06-Jan-2009 20:42 82
25c3-3008-en-anatomy_of_smartphone_hardware.ogg 06-Jan-2009 20:49 24332407
25c3-3008-en-anatomy_of_smartphone_hardware.ogg..> 06-Jan-2009 20:42 82
25c3-3015-en-rapid_prototype_your_life.mp3 29-Dec-2008 13:10 27219881
25c3-3015-en-rapid_prototype_your_life.mp3.md5 06-Jan-2009 20:21 77
25c3-3015-en-rapid_prototype_your_life.ogg 29-Dec-2008 13:09 24288351
25c3-3015-en-rapid_prototype_your_life.ogg.md5 06-Jan-2009 20:21 77
25c3-3016-en-life_is_a_holodeck.mp3 11-Jan-2009 21:42 32230134
25c3-3016-en-life_is_a_holodeck.mp3.md5 11-Jan-2009 21:42 70
25c3-3016-en-life_is_a_holodeck.ogg 11-Jan-2009 21:43 28774198
25c3-3016-en-life_is_a_holodeck.ogg.md5 11-Jan-2009 21:42 70
25c3-3020-en-banking_malware_101.mp3 12-Jan-2009 01:39 30257133
25c3-3020-en-banking_malware_101.mp3.md5 12-Jan-2009 01:38 71
25c3-3020-en-banking_malware_101.ogg 12-Jan-2009 01:40 26955331
25c3-3020-en-banking_malware_101.ogg.md5 12-Jan-2009 01:38 71
25c3-3021-de-security_nightmares_2009.mp3 12-Jan-2009 01:39 45177846
25c3-3021-de-security_nightmares_2009.mp3.md5 12-Jan-2009 01:38 76
25c3-3021-de-security_nightmares_2009.ogg 12-Jan-2009 01:40 40297934
25c3-3021-de-security_nightmares_2009.ogg.md5 12-Jan-2009 01:38 76
25c3-3023-en-making_the_theoretical_possible.mp3 06-Jan-2009 20:46 29526799
25c3-3023-en-making_the_theoretical_possible.mp..> 06-Jan-2009 20:42 83
25c3-3023-en-making_the_theoretical_possible.ogg 06-Jan-2009 20:49 26384375
25c3-3023-en-making_the_theoretical_possible.og..> 06-Jan-2009 20:42 83
25c3-3024-de-jahresrueckblick.mp3 12-Jan-2009 01:39 59863593
25c3-3024-de-jahresrueckblick.mp3.md5 12-Jan-2009 01:38 68
25c3-3024-de-jahresrueckblick.ogg 12-Jan-2009 01:40 53385430
25c3-3024-de-jahresrueckblick.ogg.md5 12-Jan-2009 01:38 68
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28 37421838
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28 87
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28 33399529
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28 87
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3 29-Dec-2008 15:14 29286816
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5 06-Jan-2009 20:21 81
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg 29-Dec-2008 15:19 26123519
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5 06-Jan-2009 20:21 81
25c3-3030-en-messing_around_with_garage_doors.mp3 12-Jan-2009 01:39 36680716
25c3-3030-en-messing_around_with_garage_doors.m..> 12-Jan-2009 01:38 84
25c3-3030-en-messing_around_with_garage_doors.ogg 12-Jan-2009 01:40 32662177
25c3-3030-en-messing_around_with_garage_doors.o..> 12-Jan-2009 01:38 84
25c3-3032-en-analyzing_rfid_security.mp3 06-Jan-2009 20:46 25785665
25c3-3032-en-analyzing_rfid_security.mp3.md5 06-Jan-2009 20:42 75
25c3-3032-en-analyzing_rfid_security.ogg 06-Jan-2009 20:50 23012827
25c3-3032-en-analyzing_rfid_security.ogg.md5 06-Jan-2009 20:42 75
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 29-Dec-2008 23:00 31116542
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 06-Jan-2009 20:21 87
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 30-Dec-2008 01:45 27759064
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 06-Jan-2009 20:21 87
25c3-3044-en-all_your_bases_are_belong_to_us.mp3 29-Dec-2008 11:53 26497979
25c3-3044-en-all_your_bases_are_belong_to_us.mp..> 06-Jan-2009 20:21 83
25c3-3044-en-all_your_bases_are_belong_to_us.ogg 29-Dec-2008 12:27 23589276
25c3-3044-en-all_your_bases_are_belong_to_us.og..> 06-Jan-2009 20:21 83
25c3-3047-en-lightning_talks_day3_morning.mp3 29-Dec-2008 22:56 28413189
25c3-3047-en-lightning_talks_day3_morning.mp3.md5 06-Jan-2009 20:21 80
25c3-3047-en-lightning_talks_day3_morning.ogg 29-Dec-2008 23:05 25311827
25c3-3047-en-lightning_talks_day3_morning.ogg.md5 06-Jan-2009 20:21 80
25c3-3048-en-lightning_talks_day2.mp3 29-Dec-2008 15:25 24487741
25c3-3048-en-lightning_talks_day2.mp3.md5 06-Jan-2009 20:21 72
25c3-3048-en-lightning_talks_day2.ogg 29-Dec-2008 15:35 21849859
25c3-3048-en-lightning_talks_day2.ogg.md5 06-Jan-2009 20:21 72
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42 22736760
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42 96
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:43 20266331
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42 96
25c3-3053-en-lightning_talks_day3_-_evening.mp3 07-Jan-2009 23:09 26367414
25c3-3053-en-lightning_talks_day3_-_evening.mp3..> 07-Jan-2009 23:08 82
25c3-3053-en-lightning_talks_day3_-_evening.ogg 07-Jan-2009 23:10 23494152
25c3-3053-en-lightning_talks_day3_-_evening.ogg..> 07-Jan-2009 23:08 82
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59 24031764
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59 90
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59 21418297
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59 90
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59 49263819
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59 90
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59 43836182
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59 90
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59 44347087
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59 99
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59 39590800
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59 99