Index of /congress/2009/mp3/
../
26c3-3266-de-hacking_the_universe.mp3 03-Jan-2010 10:20 29567175
26c3-3266-de-hacking_the_universe.mp3.md5 03-Jan-2010 10:25 72
26c3-3302-en-i_internet.mp3 30-Dec-2009 10:22 21531586
26c3-3302-en-i_internet.mp3.md5 01-Jan-2010 21:28 62
26c3-3332-en-a_part_time_scientists_perspective..> 29-Dec-2009 23:39 61671212
26c3-3332-en-a_part_time_scientists_perspective..> 01-Jan-2010 21:28 110
26c3-3340-de-wolpertinger_ein_verteilter_portsc..> 15-Jan-2010 08:35 19123929
26c3-3340-de-wolpertinger_ein_verteilter_portsc..> 15-Jan-2010 08:41 91
26c3-3350-en-milkymist.mp3 07-Jan-2010 08:35 20049732
26c3-3350-en-milkymist.mp3.md5 07-Jan-2010 09:14 61
26c3-3353-de-reverse-engineering_displaylink_de..> 08-Jan-2010 08:54 17738459
26c3-3353-de-reverse-engineering_displaylink_de..> 08-Jan-2010 08:54 91
26c3-3452-en-here_be_electric_dragons.mp3 29-Dec-2009 22:24 28619651
26c3-3452-en-here_be_electric_dragons.mp3.md5 01-Jan-2010 21:28 76
26c3-3464-de-liquid_democracy.mp3 06-Jan-2010 18:33 30196553
26c3-3464-de-liquid_democracy.mp3.md5 06-Jan-2010 18:35 68
26c3-3468-de-privacy__stylometry.mp3 29-Dec-2009 21:13 27866053
26c3-3468-de-privacy__stylometry.mp3.md5 01-Jan-2010 21:28 71
26c3-3481-de-leyen-rhetorik.mp3 07-Jan-2010 23:25 29356932
26c3-3481-de-leyen-rhetorik.mp3.md5 08-Jan-2010 08:53 66
26c3-3490-en-building_a_debugger.mp3 30-Dec-2009 13:57 26437000
26c3-3490-en-building_a_debugger.mp3.md5 01-Jan-2010 21:28 71
26c3-3494-de-defending_the_poor.mp3 30-Dec-2009 14:10 34208774
26c3-3494-de-defending_the_poor.mp3.md5 01-Jan-2010 21:28 70
26c3-3496-de-fugngernavigation_mit_augmented_re..> 30-Dec-2009 10:20 19636618
26c3-3496-de-fugngernavigation_mit_augmented_re..> 01-Jan-2010 21:28 91
26c3-3501-en-why_net_neutrality_matters.mp3 06-Jan-2010 19:19 27520084
26c3-3501-en-why_net_neutrality_matters.mp3.md5 06-Jan-2010 19:21 78
26c3-3504-en-our_darknet_and_its_bright_spots.mp3 03-Jan-2010 09:42 24850348
26c3-3504-en-our_darknet_and_its_bright_spots.m..> 03-Jan-2010 09:47 84
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp3 03-Jan-2010 02:15 19398483
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp..> 03-Jan-2010 02:16 83
26c3-3509-de-wofr_offenes_internet.mp3 16-Jan-2010 17:26 26341592
26c3-3509-de-wofr_offenes_internet.mp3.md5 16-Jan-2010 17:34 73
26c3-3510-de-technik_des_neuen_epa.mp3 30-Dec-2009 11:09 28594762
26c3-3510-de-technik_des_neuen_epa.mp3.md5 01-Jan-2010 21:28 73
26c3-3515-de-secubt.mp3 30-Dec-2009 14:14 27229560
26c3-3515-de-secubt.mp3.md5 01-Jan-2010 21:28 58
26c3-3520-en-conlanging_101.mp3 03-Jan-2010 09:44 35227324
26c3-3520-en-conlanging_101.mp3.md5 03-Jan-2010 09:47 66
26c3-3523-de-eine_zensur_findet_statt.mp3 29-Dec-2009 19:41 25914955
26c3-3523-de-eine_zensur_findet_statt.mp3.md5 01-Jan-2010 21:28 76
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_h..> 30-Dec-2009 09:53 28545178
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_h..> 01-Jan-2010 21:28 93
26c3-3536-de-ddosbotnet_mitigation__hosting_onl..> 30-Dec-2009 09:46 25265822
26c3-3536-de-ddosbotnet_mitigation__hosting_onl..> 01-Jan-2010 21:28 101
26c3-3540-en-a_hackers_utopia.mp3 30-Dec-2009 10:46 30605962
26c3-3540-en-a_hackers_utopia.mp3.md5 01-Jan-2010 21:28 68
26c3-3547-en-after_the_hype.mp3 03-Jan-2010 10:19 28839101
26c3-3547-en-after_the_hype.mp3.md5 03-Jan-2010 10:25 66
26c3-3550-de-chaos-familien-duell.mp3 03-Jan-2010 10:24 56596953
26c3-3550-de-chaos-familien-duell.mp3.md5 03-Jan-2010 10:25 72
26c3-3551-de-das_recht_am_eigenen_bild_und_das_..> 30-Dec-2009 17:07 28032176
26c3-3551-de-das_recht_am_eigenen_bild_und_das_..> 01-Jan-2010 21:28 113
26c3-3554-de-tor_and_censorship_lessons_learned..> 29-Dec-2009 20:08 30513368
26c3-3554-de-tor_and_censorship_lessons_learned..> 01-Jan-2010 21:28 86
26c3-3555-en-sccp_hacking_attacking_the_ss7_and..> 29-Dec-2009 23:20 27290714
26c3-3555-en-sccp_hacking_attacking_the_ss7_and..> 07-Jan-2010 18:17 153
26c3-3557-de-vom_kreationismus_zum_kollektivism..> 15-Jan-2010 13:25 28270805
26c3-3557-de-vom_kreationismus_zum_kollektivism..> 15-Jan-2010 13:32 88
26c3-3563-en-lightning_talks_-_day_1.mp3 06-Jan-2010 18:33 56759194
26c3-3563-en-lightning_talks_-_day_1.mp3.md5 06-Jan-2010 18:35 75
26c3-3567-en-wikileaks_release_10.mp3 30-Dec-2009 09:38 30128195
26c3-3567-en-wikileaks_release_10.mp3.md5 01-Jan-2010 21:28 72
26c3-3570-en-weaponizing_cultural_viruses.mp3 30-Dec-2009 11:57 32537424
26c3-3570-en-weaponizing_cultural_viruses.mp3.md5 01-Jan-2010 21:28 80
26c3-3573-en-playing_with_the_built_city.mp3 30-Dec-2009 01:26 28956622
26c3-3573-en-playing_with_the_built_city.mp3.md5 01-Jan-2010 21:28 79
26c3-3576-de-how_you_can_build_an_eavesdropper_..> 30-Dec-2009 09:35 24830201
26c3-3576-de-how_you_can_build_an_eavesdropper_..> 01-Jan-2010 21:28 112
26c3-3577-de-privacy-enhanced_event_scheduling.mp3 30-Dec-2009 11:25 28403289
26c3-3577-de-privacy-enhanced_event_scheduling...> 01-Jan-2010 21:28 85
26c3-3579-en-photography_and_the_art_of_doing_i..> 03-Jan-2010 09:40 25005844
26c3-3579-en-photography_and_the_art_of_doing_i..> 03-Jan-2010 09:47 93
26c3-3590-de-europische_biometriestrategien.mp3 30-Dec-2009 10:30 30935818
26c3-3590-de-europische_biometriestrategien.mp3..> 01-Jan-2010 21:29 82
26c3-3592-de-cybernetic_cannibalism.mp3 30-Dec-2009 09:36 29982298
26c3-3592-de-cybernetic_cannibalism.mp3.md5 01-Jan-2010 21:29 74
26c3-3594-de-internetsperren.mp3 29-Dec-2009 19:49 22107385
26c3-3594-de-internetsperren.mp3.md5 01-Jan-2010 21:29 67
26c3-3596-de-cat_procsysnetipv4fuckups.mp3 29-Dec-2009 20:26 19995411
26c3-3596-de-cat_procsysnetipv4fuckups.mp3.md5 01-Jan-2010 21:29 77
26c3-3600-de-location_tracking_does_scale_up.mp3 30-Dec-2009 10:37 28252563
26c3-3600-de-location_tracking_does_scale_up.mp..> 01-Jan-2010 21:29 83
26c3-3608-en-playing_with_the_gsm_rf_interface.mp3 08-Jan-2010 13:01 22861586
26c3-3608-en-playing_with_the_gsm_rf_interface...> 08-Jan-2010 13:04 85
26c3-3613-de-fnord-jahresrckblick_2009.mp3 15-Jan-2010 08:50 37519454
26c3-3613-de-fnord-jahresrckblick_2009.mp3.md5 15-Jan-2010 08:56 77
26c3-3622-de-die_neokonservativen_thinktanks_in..> 30-Dec-2009 14:10 32417050
26c3-3622-de-die_neokonservativen_thinktanks_in..> 01-Jan-2010 21:29 94
26c3-3631-en-finding_the_key_in_the_haystack.mp3 06-Jan-2010 18:33 24069256
26c3-3631-en-finding_the_key_in_the_haystack.mp..> 06-Jan-2010 18:35 83
26c3-3637-de-peanut_butter_and_plastic_industri..> 30-Dec-2009 10:29 20878616
26c3-3637-de-peanut_butter_and_plastic_industri..> 01-Jan-2010 21:29 99
26c3-3642-en-lightning_talks_-_day_2.mp3 29-Dec-2009 21:12 63316954
26c3-3642-en-lightning_talks_-_day_2.mp3.md5 01-Jan-2010 21:29 75
26c3-3644-en-lightning_talks_-_day_3.mp3 30-Dec-2009 14:11 65173978
26c3-3644-en-lightning_talks_-_day_3.mp3.md5 01-Jan-2010 21:29 75
26c3-3645-en-lightning_talks_-_day_4.mp3 03-Jan-2010 10:37 67378138
26c3-3645-en-lightning_talks_-_day_4.mp3.md5 03-Jan-2010 10:40 75
26c3-3647-de-ckan_apt-get_for_the_debian_of_dat..> 29-Dec-2009 23:43 30080231
26c3-3647-de-ckan_apt-get_for_the_debian_of_dat..> 01-Jan-2010 21:29 87
26c3-3648-en-dect_part_ii.mp3 30-Dec-2009 09:39 29331004
26c3-3648-en-dect_part_ii.mp3.md5 01-Jan-2010 21:29 64
26c3-3652-en-exciting_tales_of_journalists_gett..> 30-Dec-2009 01:08 23330677
26c3-3652-en-exciting_tales_of_journalists_gett..> 01-Jan-2010 21:29 120
26c3-3654-en-gsm_srsly.mp3 29-Dec-2009 20:03 33094793
26c3-3654-en-gsm_srsly.mp3.md5 01-Jan-2010 21:29 61
26c3-3657-en-optimised_to_fail.mp3 09-Feb-2010 18:44 28444359
26c3-3657-en-optimised_to_fail.mp3.md5 09-Feb-2010 18:44 69
26c3-3658-en-black_ops_of_pki.mp3 06-Jan-2010 19:16 37649985
26c3-3658-en-black_ops_of_pki.mp3.md5 06-Jan-2010 19:21 68
26c3-3661-de-coreboot_adding_support_for_a_syst..> 23-Jan-2010 20:17 33733214
26c3-3661-de-coreboot_adding_support_for_a_syst..> 23-Jan-2010 20:18 97
26c3-3664-en-homewreckery.mp3 30-Dec-2009 09:35 19908218
26c3-3664-en-homewreckery.mp3.md5 01-Jan-2010 21:29 64
26c3-3668-en-hacker_jeopardy.mp3 15-Jan-2010 09:20 61070922
26c3-3668-en-hacker_jeopardy.mp3.md5 15-Jan-2010 09:27 67
26c3-3669-de-hacker_jeopardy.mp3 03-Jan-2010 11:39 60573834
26c3-3669-de-hacker_jeopardy.mp3.md5 03-Jan-2010 11:43 67
26c3-3670-en-blackbox_jtag_reverse_engineering.mp3 03-Jan-2010 10:54 27042385
26c3-3670-en-blackbox_jtag_reverse_engineering...> 03-Jan-2010 10:55 85
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_u..> 30-Dec-2009 14:11 43576861
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_u..> 01-Jan-2010 21:29 98
26c3-3672-de-advanced_microcontroller_programmi..> 29-Dec-2009 21:14 24653326
26c3-3672-de-advanced_microcontroller_programmi..> 01-Jan-2010 21:29 88
26c3-3674-de-der_hackerparagraph_beim_bundesver..> 29-Dec-2009 19:38 30613989
26c3-3674-de-der_hackerparagraph_beim_bundesver..> 01-Jan-2010 21:29 101
26c3-3685-de-im_herz_der_bestie.mp3 03-Jan-2010 10:53 24827671
26c3-3685-de-im_herz_der_bestie.mp3.md5 03-Jan-2010 10:55 70
26c3-3687-de-security_nightmares.mp3 02-Jan-2010 22:14 41022473
26c3-3687-de-security_nightmares.mp3.md5 02-Jan-2010 22:15 71
26c3-3688-de-haste_man_netblock.mp3 30-Dec-2009 16:55 15396226
26c3-3688-de-haste_man_netblock.mp3.md5 01-Jan-2010 21:29 70
26c3-3690-de-ccc-jahresrckblick.mp3 30-Dec-2009 09:36 41915722
26c3-3690-de-ccc-jahresrckblick.mp3.md5 01-Jan-2010 21:29 70
26c3-3691-de-vier_fuste_fr_ein_halleluja.mp3 07-Jan-2010 09:07 25902301
26c3-3691-de-vier_fuste_fr_ein_halleluja.mp3.md5 07-Jan-2010 09:16 79
26c3-3696-en-wireless_power_transfer.mp3 30-Dec-2009 09:39 28607175
26c3-3696-en-wireless_power_transfer.mp3.md5 01-Jan-2010 21:29 75
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelsc..> 03-Jan-2010 10:21 66863253
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelsc..> 03-Jan-2010 10:25 88
26c3-3700-de-here_be_dragons.mp3 30-Dec-2009 09:35 23616512
26c3-3700-de-here_be_dragons.mp3.md5 01-Jan-2010 21:30 67
26c3-3702-en-yes_we_cant_-_on_kleptography_and_..> 30-Dec-2009 10:18 26581834
26c3-3702-en-yes_we_cant_-_on_kleptography_and_..> 01-Jan-2010 21:30 100
26c3-3703-en-exposing_crypto_bugs_through_rever..> 29-Dec-2009 20:01 21396646
26c3-3703-en-exposing_crypto_bugs_through_rever..> 01-Jan-2010 21:30 100
26c3-3705-de-die_ereignisse_des_129_und_ihre_fo..> 07-Jan-2010 09:07 40779613
26c3-3705-de-die_ereignisse_des_129_und_ihre_fo..> 07-Jan-2010 09:16 90
26c3-3706-en-understanding_telecommunication_in..> 07-Jan-2010 07:58 25572673
26c3-3706-en-understanding_telecommunication_in..> 07-Jan-2010 08:01 125
26c3-3708-de-die_schlacht_um_die_vorratsdatensp..> 15-Jan-2010 12:54 28916716
26c3-3708-de-die_schlacht_um_die_vorratsdatensp..> 15-Jan-2010 13:01 95
26c3-3709-en-legic_prime_obscurity_in_depth.mp3 07-Jan-2010 08:37 29833502
26c3-3709-en-legic_prime_obscurity_in_depth.mp3..> 07-Jan-2010 09:16 82
26c3-3710-en-the_lost_cosmonauts.mp3 30-Dec-2009 09:42 23475589
26c3-3710-en-the_lost_cosmonauts.mp3.md5 01-Jan-2010 21:30 71
26c3-3711-de-computerspielepolitik.mp3 29-Dec-2009 19:53 34140618
26c3-3711-de-computerspielepolitik.mp3.md5 01-Jan-2010 21:30 73
26c3-3713-de-unbild__pictures_and_non-pictures.mp3 30-Dec-2009 16:29 29080714
26c3-3713-de-unbild__pictures_and_non-pictures...> 01-Jan-2010 21:30 85
26c3-3714-de-why_germany_succeeded_where_americ..> 29-Dec-2009 22:18 31423504
26c3-3714-de-why_germany_succeeded_where_americ..> 01-Jan-2010 21:30 146
26c3-3717-en-closing_event.mp3 03-Jan-2010 12:30 16368501
26c3-3717-en-closing_event.mp3.md5 03-Jan-2010 12:34 65
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp3 30-Dec-2009 09:35 30090442
26c3-3721-de-etsi-vorratsdatenspeicherung_2009...> 01-Jan-2010 21:30 85
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp3 07-Jan-2010 07:59 37829900
26c3-3723-en-stream_fnord-jahresrckblick_2009.m..> 07-Jan-2010 08:01 84
26c3-3725-en-stream_security_nightmares.mp3 03-Jan-2010 09:32 40949518
26c3-3725-en-stream_security_nightmares.mp3.md5 03-Jan-2010 09:48 78