- 31C3 Keynote [31c3]
- 31C3 Opening Event [31c3] mit Erdgeist und Geraldine de Bastion
- 3D Casting Aluminum [31c3]
- Agri-tech and the Arts: From Barns to D-Space [31c3]
- AMD x86 SMU firmware analysis [31c3]
- Attacks on UEFI security, inspired by Darth Venamis's misery and Speed Racer [31c3]
- Automatically Subtitling the C3 [31c3] by Timo Baumann
- Axoloti - DIY audio signal processing [31c3]
- Beyond PNR: Exploring airline systems [31c3]
- CAESAR and NORX - Developing the Future of Authenticated Encryption [31c3]
- Code Pointer Integrity [31c3]
- Computer Science in the DPRK [31c3]
- Correcting copywrongs [31c3]
- Crypto Tales from the Trenches [31c3]
- Cyber Necromancy - Reverse Engineering Dead Protocols [31c3]
- Damn Vulnerable Chemical Process [31c3]
- Diamonds are a quantum computer’s best friend [31c3]
- Doing right by sources, done right [31c3] by Sarah Harrison
- DP5: PIR for Privacy-preserving Presence [31c3]
- ECCHacks - A gentle introduction to elliptic-curve cryptography [31c3]
- EMET 5.1 - Armor or Curtain? [31c3]
- Eye Wear Computing [31c3]
- Fernvale: An Open Hardware and Software Platform, Based on the Closed-Source MT6260 SoC [31c3]
- Finding the Weak Crypto Needle in a Byte Haystack [31c3]
- Forging the USB armory - Creating an open source secure flash-drive-sized computer [31c3]
- From Computation to Consciousness [31c3]
- From Maxwell to antenna arrays [31c3]
- Funky File Formats [31c3]
- Glitching For n00bs [31c3]
- Global Civil Society Under Attack [31c3]
- Hacking Ethics in Education [31c3]
- »Hard Drive Punch« Destroying data as a performative act [GEMA-Edition]
- Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed [31c3]
- Higher-Dimensional Geometry and Fractals [31c3]
- How I Learned to Stop Reinventing and Love the Wheels [31c3]
- Infocalypse now: P0wning stuff is not enough [31c3]
- Information Control and Strategic Violence [31c3]
- (In)Security of Mobile Banking [31c3]
- Inside Field Station Berlin Teufelsberg [31c3] by Bill Scannell
- Internet of toilets [31c3]
- Iridium Pager Hacking [31c3]
- Jacob Appelbaum: Reconstructing narratives - transparency in the service of justice [31c3]
- Karsten Nohl: Mobile self-defense [31c3] (SnoopSnitch)
- Let's build a quantum computer! [31c3]
- Let's Encrypt - A Free Robotic Certificate Authority [31c3]
- Let’s build our own personalized open textile production line [31c3]
- Lightning Talks Day 2 [31c3]
- Lightning Talks Day 3 [31c3]
- Living Drones [31c3]
- Long war tactics ... or how we learned to stop worrying and love the NSA [31c3]
- Low Cost High Speed Photography [31c3]
- MegaCode to facility gates [31c3]
- Mining for Bugs with Graph Database Queries [31c3]
- Mr Beam goes Kickstarter [31c3]
- net neutrality: days of future past? [31c3]
- NSA: Tell no-one [31c3] by James Bamford
- Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking [31c3]
- osmo-gmr: What's up with sat-phones ? [31c3]
- Personal Tracking Devices and Online Identity [31c3]
- Practical EMV PIN interception and fraud detection [31c3] by Andrea Barisani
- Preserving arcade games [31c3]
- Privacy and Consumer Markets [31c3]
- Programming with dependent types in Idris [31c3]
- "Exploit" in theater [31c3]
- Reproducible Builds - Moving Beyond Single Points of Failure for Software Distribution [31c3]
- Revisiting SSL/TLS Implementations [31c3]
- Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States [31c3]
- Rocket science – how hard can it be? [31c3]
- Safer playing with lasers [31c3]
- SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
- Security Analysis of a Full-Body X-Ray Scanner [31c3]
- Security Analysis of Estonia's Internet Voting System [31c3] by J. Alex Halderman
- Source Code and Cross-Domain Authorship Attribution [31c3]
- Space Hacker [31c3]
- SS7: Locate. Track. Manipulate. [31c3] by Tobias Engel (SnoopSnitch)
- SS7map : mapping vulnerability of the international mobile roaming infrastructure [31c3]
- Superheroes Still Need Phoneboxes [31c3]
- Switches Get Stitches - Industrial System Ownership [31c3]
- The automobile as massive data gathering source and the consequences for individual privacy [31c3]
- The Cloud Conspiracy 2008-2014 [31c3]
- The eXperimental Robot Project [31c3]
- The Invisible Committee Returns with "Fuck Off Google" [31c3]
- The Machine To Be Another [31c3]
- The Magical Secrecy Tour [31c3]
- The Maker movement meets patent law [31c3]
- The Matter of Heartbleed [31c3]
- The Only Thing We Know About Cyberspace Is That Its 640x480 One Terabyte of Kilobyte Age [31c3]
- The Perl Jam: Exploiting a 20 Year-old Vulnerability [31c3]
- The rise and fall of Internet voting in Norway [31c3]
- Thunderstrike: EFI bootkits for Apple MacBooks [31c3]
- Too Many Cooks - Exploiting the Internet-of-TR-069-Things [31c3]
- Tor: Hidden Services and Deanonymisation [31c3]
- Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena [31c3]
- Trackography - You never read alone [31c3]
- Trustworthy secure modular operating system engineering [31c3]
- Uncaging Microchips - Techniques for Chip Preparation [31c3]
- UNHash - Methods for better password cracking [31c3]
- What Ever Happened to Nuclear Weapons? [31c3]
- Why do we need an open food information platform [31c3]
- Why is GPG "damn near unusable"? [31c3]