Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2013/mp3/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
30c3-5500-en-Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_mp3.mp34.9 MiB2014-01-06 16:37:57
30c3-5605-en-Opening_Event_mp3.mp35.2 MiB2014-01-05 23:19:27
30c3-5453-en-Against_Metadata_mp3.mp311.9 MiB2014-01-06 16:29:11
30c3-5319-en-Technomonopolies_mp3.mp312.1 MiB2014-01-06 17:32:18
30c3-5405-en-Data_Mining_for_Good_mp3.mp312.2 MiB2014-01-06 16:41:16
30c3-5437-en-Plants_Machines_mp3.mp312.2 MiB2014-01-06 17:27:53
30c3-5509-de-en-IFGINT_mp3.mp313.0 MiB2014-01-06 17:09:15
30c3-5446-en-The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_mp3.mp313.0 MiB2014-01-06 17:26:47
30c3-5614-en-Perfect_Paul_mp3.mp313.2 MiB2014-01-06 17:34:31
30c3-5469-de-en-2_Takte_spaeter_mp3.mp313.2 MiB2014-01-06 18:11:05
30c3-5311-en-lasers_in_space_mp3.mp313.3 MiB2014-01-06 14:43:43
30c3-5607-en-The_Pirate_Cinema_mp3.mp313.4 MiB2014-01-06 16:30:17
30c3-5595-en-The_ArduGuitar_mp3.mp313.7 MiB2014-01-06 17:57:48
30c3-5278-en-The_philosophy_of_hacking_mp3.mp313.7 MiB2014-01-06 14:32:53
30c3-5479-en-Building_a_safe_NFC_ticketing_system_mp3.mp313.9 MiB2014-01-06 17:52:01
30c3-5420-de-en-calcpw_mp3.mp314.0 MiB2014-01-06 18:06:24
30c3-5494-en-Nerds_in_the_news_mp3.mp314.1 MiB2014-01-06 18:13:45
30c3-5391-en-de-Y_U_NO_ISP_taking_back_the_Net_mp3.mp314.5 MiB2014-01-06 17:55:15
30c3-5289-en-Coding_your_body_mp3.mp314.7 MiB2014-01-06 16:46:38
30c3-5539-en-Human_Rights_and_Technology_mp3.mp314.8 MiB2014-01-06 14:35:03
30c3-5594-en-Structuring_open_hardware_projects_mp3.mp315.0 MiB2014-01-06 17:54:04
30c3-5425-en-Hacking_as_Artistic_Practice_mp3.mp315.0 MiB2014-01-06 17:19:15
30c3-5566-en-Open_source_experimental_incubator_build_up_mp3.mp315.1 MiB2014-01-06 16:33:37
30c3-5547-en-Turing_Complete_User_mp3.mp315.4 MiB2014-01-06 16:32:30
30c3-5475-en-_SOPA_NSA_and_the_New_Internet_Lobby_mp3.mp316.2 MiB2014-01-06 18:02:18
30c3-5588-en-de-My_journey_into_FM-RDS_mp3.mp316.5 MiB2014-01-06 17:18:08
30c3-5544-de-en-Sim_Gishel_mp3.mp316.6 MiB2014-01-06 17:14:42
30c3-5536-en-Long_Distance_Quantum_Communication_mp3.mp316.7 MiB2014-01-06 14:57:14
30c3-5447-en-Policing_the_Romantic_Crowd_mp3.mp317.6 MiB2014-01-06 14:56:08
30c3-5543-en-de-ID_Cards_in_China_Your_Worst_Nightmare_mp3.mp318.0 MiB2014-01-06 17:52:37
30c3-5394-BREACH_in_Agda_mp3.mp318.6 MiB2014-01-07 22:53:08
30c3-5417-en-Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_mp3.mp318.9 MiB2014-01-06 16:25:57
30c3-5582-en-SCADA_StrangeLove_2_mp3.mp319.0 MiB2014-01-06 17:30:06
30c3-5426-de-en-Das_FlipDot-Projekt_mp3.mp319.2 MiB2014-01-06 17:42:12
30c3-5356-en-Firmware_Fat_Camp_mp3.mp319.3 MiB2014-01-06 16:21:31
30c3-5361-en-Disclosure_DOs_Disclosure_DON_Ts_mp3.mp320.1 MiB2014-01-06 17:28:59
30c3-5478-en-de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_mp3.mp320.3 MiB2014-01-06 17:41:26
30c3-5398-en-HbbTV_Security_mp3.mp320.6 MiB2014-01-06 16:20:25
30c3-5224-en-Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_mp3.mp320.9 MiB2014-01-06 14:03:37
30c3-5439-en-To_Protect_And_Infect_mp3.mp320.9 MiB2014-01-12 01:15:15
30c3-5527-en-Basics_of_Digital_Wireless_Communication_mp3.mp321.3 MiB2014-01-06 14:49:56
30c3-5529-en-Hardening_hardware_and_choosing_a_goodBIOS_mp3.mp321.7 MiB2014-01-06 14:58:21
30c3-5497-en-10_Years_of_Fun_with_Embedded_Devices_mp3.mp321.9 MiB2014-01-06 14:40:30
30c3-5307-en-Reverse_engineering_of_CHIASMUS_from_GSTOOL_mp3.mp322.1 MiB2014-01-06 14:04:44
30c3-5610-de-Seidenstrasse_mp3.mp322.3 MiB2014-01-06 14:02:30
30c3-5387-en-Toward_a_Cognitive_Quantified_Self__mp3.mp322.7 MiB2014-01-06 16:15:04
30c3-5552-en-India_s_Surveillance_State_mp3.mp323.5 MiB2014-01-06 17:51:25
30c3-5212-en-The_GNU_Name_System_mp3.mp323.7 MiB2014-01-06 16:19:18
30c3-5348-de-en-Der_Kampf_um_Netzneutralitaet_mp3.mp324.7 MiB2014-01-06 17:13:36
30c3-5474-en-World_War_II_Hackers_mp3.mp324.9 MiB2014-01-06 16:18:17
30c3-5380-en-de-Persistent_Stealthy_Remote-controlled_Dedicated_Hardware_Malware_mp3.mp325.0 MiB2014-01-07 22:38:55
30c3-5185-en-FPGA_101_mp3.mp325.0 MiB2014-01-06 16:31:24
30C3_-_5622_-_en_-_30c3_keynote_-_glenn_greenwald_-_frank-direct.mp325.0 MiB2013-12-27 22:27:41
30c3-5590-en-White-Box_Cryptography_mp3.mp325.3 MiB2014-01-06 16:42:23
30c3-5526-en-How_to_Build_a_Mind_mp3.mp325.5 MiB2014-01-06 18:00:00
30c3-5322-en-Reverse_engineering_the_Wii_U_Gamepad_mp3.mp325.5 MiB2014-01-06 16:35:45
30c3-5223-en-WarGames_in_memory_mp3.mp325.5 MiB2014-01-06 16:36:51
30c3-5298-en-de-Rock_em_Graphic_Cards_mp3.mp325.6 MiB2014-01-06 17:10:21
30c3-5476-en-Electronic_Bank_Robberies_mp3.mp325.7 MiB2014-01-06 14:41:37
30c3-5337-de-en-Kryptographie_nach_Snowden_mp3.mp326.1 MiB2014-01-06 17:11:28
30c3-5611-en-Hello_World__mp3.mp326.4 MiB2014-01-06 16:24:51
30c3-5395-en-Towards_an_affordable_brain-computer-interface_mp3.mp326.4 MiB2014-01-06 17:59:28
30c3-5440-en-de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_mp3.mp326.6 MiB2014-01-06 17:21:24
30c3-5360-en-Script_Your_Car__mp3.mp326.6 MiB2014-01-06 16:28:05
30c3-5613-en-Forbidden_Fruit_mp3.mp326.8 MiB2014-01-06 16:17:10
30c3-5377-de-en-UEberwachen_und_Sprache_mp3.mp326.8 MiB2014-01-06 16:11:52
30c3-5142-en-Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_mp3.mp326.8 MiB2014-01-06 14:59:27
30c3-5334-en-RFID_Treehouse_of_Horror_mp3.mp326.9 MiB2014-01-06 17:57:12
30c3-5290-en-Console_Hacking_2013_mp3.mp327.0 MiB2014-01-06 15:00:29
30c3-5445-en-Virtually_Impossible_The_Reality_Of_Virtualization_Security_mp3.mp327.0 MiB2014-01-06 16:39:03
30c3-5415-de-en-Der_tiefe_Staat_mp3.mp327.0 MiB2014-01-06 17:08:09
30c3-5444-en-Attacking_HomeMatic_mp3.mp327.1 MiB2014-01-06 14:38:23
30c3-5433-de-en-Recht_auf_Remix_mp3.mp327.1 MiB2014-01-06 17:12:35
30c3-5502-de-en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__mp3.mp327.3 MiB2014-01-06 17:41:50
30c3-5495-en-Concepts_for_global_TSCM_mp3.mp327.6 MiB2014-01-06 14:27:29
30c3-5542-en-Revisiting_Trusting_Trust_for_binary_toolchains_mp3.mp327.6 MiB2014-01-06 17:20:17
30c3-5305-en-Breaking_Baryons_mp3.mp327.7 MiB2014-01-06 16:22:37
30c3-5416-en-de-Desperately_Seeking_Susy_mp3.mp327.7 MiB2014-01-06 17:33:25
30c3-5210-de-en-Bullshit_made_in_Germany_mp3.mp327.7 MiB2014-01-06 17:31:12
30c3-5467-de-en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_mp3.mp327.8 MiB2014-01-06 17:43:49
30c3-5293-de-en-Dead_Man_Edition_mp3.mp328.0 MiB2014-01-06 17:44:13
30c3-5186-en-Programming_FPGAs_with_PSHDL_mp3.mp328.2 MiB2014-01-06 17:23:37
30c3-5443-en-Introduction_to_Processor_Design_mp3.mp328.2 MiB2014-01-06 16:34:43
30c3-5538-en-The_Internet_Doesn_t_Need_Another_Security_Guide_mp3.mp328.3 MiB2014-01-07 23:30:26
30c3-5550-en-Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_mp3.mp328.4 MiB2014-01-06 16:45:37
30c3-5421-en-THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_mp3.mp328.5 MiB2014-01-06 14:37:17
30c3-5571-en-Calafou_postcapitalist_ecoindustrial_community_mp3.mp328.5 MiB2014-01-06 16:40:10
30c3-5713-en-de-To_Protect_And_Infect_Part_2_mp3.mp328.7 MiB2014-01-06 17:42:28
30c3-5533-en-Fast_Internet-wide_Scanning_and_its_Security_Applications_mp3.mp328.8 MiB2014-01-06 16:26:58
30c3-5483-en-Europe_the_USA_and_Identity_Ecosystems_mp3.mp328.8 MiB2014-01-06 17:35:39
30c3-5554-en-Magic_Lantern_mp3.mp329.2 MiB2014-01-05 22:01:45
30c3-5468-en-We_only_have_one_earth_mp3.mp329.4 MiB2014-01-06 16:23:44
30c3-5619-de-en-Mind-Hacking_mit_Psychedelika_mp3.mp329.8 MiB2014-01-06 18:25:16
30c3-5532-de-en-Die_Drohnenkriege_mp3.mp330.2 MiB2014-01-08 12:31:19
30c3-5609-en-Infrastructure_Review_mp3.mp332.7 MiB2014-01-06 14:29:38
30c3-5295-en-The_Four_Wars_mp3.mp332.9 MiB2014-01-03 23:07:18
30c3-5601-en-de-EUDataP_State_of_the_Union_mp3.mp333.0 MiB2014-01-06 17:16:57
30c3-5545-en-Trezor_Bitcoin_hardware_wallet_mp3.mp336.1 MiB2014-01-03 23:08:25
30c3-5397-en-Sysadmins_of_the_world_unite__mp3.mp343.2 MiB2014-01-03 23:09:32
30c3-5593-en-Hacking_the_Czech_Parliament_via_SMS_mp3.mp353.9 MiB2014-01-03 23:20:25
30c3-5477-en-An_introduction_to_Firmware_Analysis_mp3.mp354.6 MiB2014-01-03 18:30:10
30c3-5562-en-de-Lightning_Talks_Day_2_mp3.mp356.4 MiB2014-01-06 17:15:50
30c3-5491-en-de-No_Neutral_Ground_in_a_Burning_World_mp3.mp362.1 MiB2014-01-03 18:49:01
30c3-5279-en-de-Even_More_Tamagotchis_Were_Harmed_in_the_Making_of_this_Presentation_mp3.mp362.7 MiB2014-01-03 23:00:54
30c3-5304-en-CounterStrike_mp3.mp363.8 MiB2014-01-03 23:11:47
30c3-5587-en-Making_machines_that_make_mp3.mp363.8 MiB2014-01-03 22:51:07
30c3-5463-en-Hillbilly_Tracking_of_Low_Earth_Orbit_mp3.mp364.4 MiB2014-01-03 21:20:36
30c3-5412-en-Bug_class_genocide_mp3.mp364.4 MiB2014-01-03 23:33:30
30c3-5192-en-Android_DDI_mp3.mp365.2 MiB2014-01-03 22:58:46
30c3-5604-en-de-Seeing_The_Secret_State_Six_Landscapes_mp3.mp366.8 MiB2014-01-03 21:49:57
30c3-5449-en-Mobile_network_attack_evolution_mp3.mp367.5 MiB2014-01-03 18:35:33
30c3-5606-de-en-Closing_Event_mp3.mp369.9 MiB2014-01-03 23:26:01
30c3-5564-en-de-Lightning_Talks_Day_4_mp3.mp370.0 MiB2014-01-06 17:43:32
30c3-5563-en-de-Lightning_Talks_Day_3_mp3.mp372.3 MiB2014-01-06 18:12:38
30c3-5376-en-Do_You_Think_That_s_Funny__mp3.mp374.1 MiB2014-01-03 11:49:43
30c3-5214-en-The_Gospel_of_IRMA__mp3.mp376.2 MiB2014-01-03 18:52:15
30c3-5622-en-de-30c3_Keynote_mp3.mp376.5 MiB2014-01-03 18:36:39
30c3-5193-en-Hardware_Attacks_Advanced_ARM_Exploitation_and_Android_Hacking_mp3.mp378.1 MiB2014-01-03 21:39:19
30c3-5634-en-07KINGSTON25_JAMAICA_MALARIA_UPDATE_Dispatches_from_Fort_Meade_mp3.mp379.3 MiB2014-01-03 18:34:24
30c3-5600-en-Thwarting_the_Evil_Maid_Attacks_mp3.mp380.1 MiB2014-01-03 23:21:44
30c3-5618-en-Baseband_Exploitation_in_2013_mp3.mp380.5 MiB2014-01-03 18:42:53
30c3-5459-en-de-Security_of_the_IC_Backside_mp3.mp381.0 MiB2014-01-03 21:45:46
30c3-5339-en-de-The_Year_in_Crypto_mp3.mp382.1 MiB2014-01-03 21:40:23
30c3-5294-en-The_Exploration_and_Exploitation_of_an_SD_Memory_Card_mp3.mp382.4 MiB2014-01-03 22:55:29
30c3-5537-en-Glass_Hacks_mp3.mp382.5 MiB2014-01-03 21:18:27
30c3-5406-en-Drones_mp3.mp382.8 MiB2014-01-03 22:53:18
30c3-5548-de-en-25_Jahre_Chipkarten-Angriffe_mp3.mp383.3 MiB2014-01-03 21:44:36
30c3-5499-en-X_Security_mp3.mp383.8 MiB2014-01-03 23:05:12
30c3-5423-en-The_Tor_Network_mp3.mp386.1 MiB2014-01-03 18:39:43
30c3-5255-en-de-Through_a_PRISM_Darkly_mp3.mp386.7 MiB2014-01-03 23:22:44
30c3-5281-de-en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_mp3.mp390.6 MiB2014-01-03 18:33:19
30c3-5623-de-en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__mp3.mp3107.8 MiB2014-01-03 23:23:52
30c3-5608-de-en-Jahresrueckblick_des_CCC_mp3.mp3149.5 MiB2014-01-03 22:50:04
30c3-5577-de-en-Hacker_Jeopardy_mp3.mp3202.4 MiB2014-01-03 18:51:30