- 10 Years of Fun with Embedded Devices [30c3]
- 30c3 keynote with Glenn Greenwald [30c3]
- Against Metadata [30c3]
- Android DDI [30c3]
- An introduction to Firmware Analysis [30c3]
- Anonymity and Privacy in Public Space and on the Internet [30c3]
- Art of the Exploit: An Introduction to Critical Engineering [30c3]
- Attacking HomeMatic [30c3]
- Backdoors, Government Hacking and The Next Crypto Wars [30c3]
- Baseband Exploitation in 2013 [30c3]
- Basics of Digital Wireless Communication [30c3]
- Beyond the Tech: Building Internet Freedom Tools for Real People [30c3]
- Breaking Baryons [30c3]
- Bug class genocide [30c3]
- Building a safe NFC ticketing system [30c3]
- Calafou, postcapitalist ecoindustrial community [30c3]
- Chelsea Manning: 07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade [30c3]
- Coding your body [30c3]
- Concepts for global TSCM - getting out of surveillance state mode [30c3]
- Console Hacking 2013: WiiU [30c3]
- CounterStrike - Lawful Interception [30c3]
- Data Mining for Good [30c3]
- Desperately Seeking Susy [30c3]
- Disclosure DOs, Disclosure DON'Ts [30c3]
- Do You Think That's Funny? - Art Practice under the Regime of Anti-Terror Legislation [30c3]
- Drones [30c3]
- Electronic Bank Robberies [30c3]
- EUDataP: State of the Union [30c3]
- Europe, the USA and Identity Ecosystems [30c3]
- Even More Tamagotchis Were Harmed in the Making of this Presentation [30c3]
- Extracting keys from FPGAs, OTP Tokens and Door Locks [30c3]
- Fast Internet-wide Scanning and its Security Applications [30c3]
- Firmware Fat Camp [30c3]
- Forbidden Fruit [30c3]
- FPGA 101 - Making awesome stuff with FPGAs [30c3]
- Google Glass Hacks [30c3]
- Hacking as Artistic Practice [30c3]
- Hardening hardware and choosing a #goodBIOS [30c3]
- Hardware Attacks, Advanced ARM Exploitation, and Android Hacking [30c3]
- HbbTV Security [30c3]
- Hello World! How to make art after Snowden? [30c3]
- Hillbilly Tracking of Low Earth Orbit [30c3]
- How to Build a Mind - Artificial Intelligence Reloaded [30c3]
- Human Rights and Technology [30c3]
- ID Cards in China: Your Worst Nightmare [30c3]
- India's Surveillance State [30c3]
- Infrastructure Review - Presentation of MOC/NOC/VOC/SOC/*OC [30c3]
- Introduction to Processor Design [30c3]
- Jacob Applebaum: To Protect And Infect, Part 2 [30c3]
- lasers in space - more than just pew pew! [30c3]
- Lightning Talks, Day 2 [30c3]
- Lightning Talks, Day 3 [30c3]
- Lightning Talks, Day 4 [30c3]
- Long Distance Quantum Communication [30c3]
- Magic Lantern - Free Software on Your Camera [30c3]
- Making machines that make [30c3]
- Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array [30c3]
- My journey into FM-RDS [30c3]
- Nerds in the news [30c3]
- Opening Event [30c3] mit Tim Pritlove
- Open source experimental incubator build up [30c3]
- Perfect Paul - On Freedom of Facial Expression [30c3]
- Plants & Machines: Food replicating Robots from Open Source Technologies [30c3]
- Policing the Romantic Crowd [30c3]
- Programming FPGAs with PSHDL - Let's create the Arduino for FPGAs [30c3]
- Reverse engineering of CHIASMUS from GSTOOL [30c3]
- Reverse engineering the Wii U Gamepad [30c3]
- Revisiting "Trusting Trust" for binary toolchains [30c3]
- RFID Treehouse of Horror [30c3]
- Rock' em Graphic Cards - Introduction to Heterogeneous Parallel Programming [30c3]
- SCADA StrangeLove 2 [30c3]
- Script Your Car! [30c3]
- Seeing The Secret State: Six Landscapes [30c3]
- #SOPA, #NSA, and the New Internet "Lobby" [30c3]
- Structuring open hardware projects [30c3]
- Technomonopolies [30c3]
- The ArduGuitar: An Ardunio Powered Electric Guitar [30c3]
- THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE [30c3]
- The Exploration and Exploitation of an SD Memory Card [30c3]
- The Four Wars: Terror, whistleblowers, drugs, internet [30c3]
- The GNU Name System [30c3]
- The good, the bad, and the ugly - Linux Kernel patches [30c3]
- The Gospel of IRMA - Attribute Based Credentials in Practice [30c3]
- The philosophy of hacking [30c3]
- The Pirate Cinema [30c3]
- The Tor Network [30c3] by Jacob Applebaum
- The Year in Crypto [30c3]
- Through a PRISM, Darkly [30c3]
- Toward a Cognitive "Quantified Self" - Activity Recognition for the Mind [30c3]
- Towards an affordable brain-computer-interface [30c3]
- Trezor: Bitcoin hardware wallet [30c3]
- Triggering Deep Vulnerabilities Using Symbolic Execution [30c3]
- Turing Complete User [30c3]
- Virtually Impossible: The Reality Of Virtualization Security [30c3]
- WarGames in memory [30c3]
- We only have one earth [30c3]
- White-Box Cryptography [30c3]
- World War II Hackers [30c3]
- X Security - It's worse than it looks [30c3]
- Y U NO ISP, taking back the Net [30c3]