Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2014/mp3/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
31c3-6608-en-Premiere_We_love_surveillance_mp3.mp314.6 MiB2015-01-02 15:17:06
31c3-6602-en-de-The_case_of_Chelsea_Manning_mp3.mp381.7 MiB2015-01-02 20:52:49
31c3-6600-en-de-Tell_no-one_mp3.mp385.8 MiB2014-12-29 17:11:55
31c3-6597-en-de-Now_I_sprinkle_thee_with_crypto_dust_mp3.mp384.2 MiB2015-01-01 15:48:29
31c3-6596-en-de-The_Magical_Secrecy_Tour_mp3.mp341.7 MiB2014-12-30 00:40:31
31c3-6595-en-de-Hard_Drive_Punch_mp3.mp334.2 MiB2014-12-29 19:41:36
31c3-6589-en-Mr_Beam_goes_Kickstarter_mp3.mp342.6 MiB2014-12-29 16:18:31
31c3-6585-en-de-Inside_Field_Station_Berlin_Teufelsberg_mp3.mp376.1 MiB2014-12-29 23:22:09
31c3-6584-de-en-Mit_Kunst_die_Gesellschaft_hacken_mp3.mp392.5 MiB2015-01-11 22:39:49
31c3-6583-de-en-Jahresrueckblick_des_CCC_mp3.mp3190.2 MiB2014-12-29 23:49:44
31c3-6582-de-Das_Transparenzportal_Hamburg_mp3.mp344.4 MiB2014-12-29 15:59:46
31c3-6580-en-de-Lightning_Talks_Day_4_mp3.mp3169.9 MiB2015-01-01 15:44:55
31c3-6579-en-de-Lightning_Talks_Day_3_mp3.mp3180.1 MiB2014-12-29 23:49:20
31c3-6575-en-Rocket_Kitten_Advanced_Off-the-Shelf_Targeted_Attacks_Against_Nation_States_mp3.mp384.4 MiB2014-12-29 14:42:00
31c3-6574-en-de-Why_are_computers_so_and_what_can_we_do_about_it_mp3.mp381.2 MiB2015-01-02 00:44:52
31c3-6573-en-de-From_Computation_to_Consciousness_mp3.mp383.4 MiB2014-12-29 15:04:00
31c3-6572-de-en-Security_Nightmares_mp3.mp3139.6 MiB2015-01-01 23:22:13
31c3-6571-en-31C3_Keynote_mp3.mp391.0 MiB2014-12-28 19:55:04
31c3-6563-en-de-Lightning_Talks_Day_2_mp3.mp3174.0 MiB2015-01-01 15:12:55
31c3-6563-en-Lightning_Talks_Day_2_mp3.mp3174.0 MiB2014-12-29 17:01:35
31c3-6562-de-en-31C3_Closing_Event_mp3.mp324.9 MiB2015-01-01 23:13:19
31c3-6561-en-31C3_Opening_Event_mp3.mp334.8 MiB2014-12-28 19:47:41
31c3-6559-de-en-Jugend_hackt_mp3.mp382.6 MiB2014-12-29 14:22:18
31c3-6558-de-en-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_mp3.mp387.2 MiB2015-01-02 17:13:11
31c3-6558-de-Traue_keinem_Scan_den_du_nicht_selbst_gefaelscht_hast_mp3.mp387.2 MiB2015-01-01 17:28:04
31c3-6557-en-de-31C3_Infrastructure_Review_mp3.mp372.1 MiB2015-01-04 13:27:53
31c3-6554-en-de-Automatically_Subtitling_the_C3_mp3.mp342.3 MiB2014-12-30 00:42:08
31c3-6547-en-de-Exploit_in_theater_mp3.mp388.5 MiB2014-12-29 23:50:34
31c3-6543-de-en-The_Time_is_Right_mp3.mp3131.6 MiB2014-12-30 12:22:09
31c3-6541-en-de-Forging_the_USB_armory_mp3.mp342.2 MiB2014-12-29 16:16:29
31c3-6534-en-Mining_for_Bugs_with_Graph_Database_Queries_mp3.mp375.4 MiB2014-12-29 16:41:20
31c3-6531-en-SS7map_mapping_vulnerability_of_the_international_mobile_roaming_infrastructure_mp3.mp383.5 MiB2014-12-29 14:46:52
31c3-6530-en-In_Security_of_Mobile_Banking_mp3.mp377.3 MiB2014-12-29 14:29:55
31c3-6499-en-Glitching_For_n00bs_mp3.mp380.7 MiB2014-12-29 02:20:43
31c3-6463-en-Damn_Vulnerable_Chemical_Process_mp3.mp383.9 MiB2014-12-29 23:49:24
31c3-6462-en-de-MegaCode_to_facility_gates_mp3.mp338.6 MiB2014-12-30 00:43:49
31c3-6460-en-de-Eye_Wear_Computing_mp3.mp344.3 MiB2014-12-30 13:42:43
31c3-6459-en-de-The_Invisible_Committee_Returns_with_Fuck_Off_Google_mp3.mp383.6 MiB2014-12-29 16:36:13
31c3-6455-de-en-Snowden_Effect_vs_Privacy_Paradox_mp3.mp347.1 MiB2014-12-30 13:06:44
31c3-6450-de-en-Ich_sehe_also_bin_ich_Du_mp3.mp376.6 MiB2014-12-29 14:46:17
31c3-6447-en-Lets_build_our_own_personalized_open_textile_production_line_mp3.mp376.9 MiB2015-01-10 20:40:55
31c3-6443-en-Trustworthy_secure_modular_operating_system_engineering_mp3.mp383.7 MiB2015-01-10 21:29:13
31c3-6430-de-en-NSA_Points_of_Presence_in_AT_mp3.mp382.0 MiB2014-12-29 23:37:19
31c3-6417-en-3D_Casting_Aluminum_mp3.mp376.7 MiB2015-01-13 09:59:53
31c3-6412-en-Towards_General_Purpose_Reconfigurable_Computing_on_Novena_mp3.mp381.7 MiB2014-12-29 16:24:00
31c3-6406-en-Long_war_tactics_mp3.mp339.4 MiB2014-12-29 16:03:56
31c3-6402-en-de-Axoloti_mp3.mp340.8 MiB2014-12-30 00:39:22
31c3-6399-en-Global_Civil_Society_Under_Attack_mp3.mp346.0 MiB2014-12-29 19:40:25
31c3-6397-en-de-Lets_Encrypt_mp3.mp385.5 MiB2015-01-01 15:37:16
31c3-6385-en-de-The_Machine_To_Be_Another_mp3.mp341.3 MiB2014-12-30 13:42:41
31c3-6381-de-en-Die_Krise_der_Bilder_ist_die_Krise_der_Politik_mp3.mp380.1 MiB2014-12-30 02:21:59
31c3-6377-en-de-Paypals_War_on_Terror_mp3.mp380.6 MiB2015-01-01 23:26:50
31c3-6373-en-de-The_Only_Thing_We_Know_About_Cyberspace_Is_That_Its_640x480_mp3.mp383.4 MiB2014-12-29 23:50:11
31c3-6370-en-Internet_of_toilets_mp3.mp348.0 MiB2014-12-29 16:37:24
31c3-6369-en-ECCHacks_mp3.mp376.2 MiB2014-12-29 14:33:00
31c3-6366-de-en-IFG_-_Mit_freundlichen_Gruessen_mp3.mp345.9 MiB2014-12-30 00:38:53
31c3-6361-en-From_Maxwell_to_antenna_arrays_mp3.mp373.9 MiB2014-12-29 14:50:07
31c3-6358-en-de-Information_Control_and_Strategic_Violence_mp3.mp341.2 MiB2014-12-29 16:11:01
31c3-6350-en-Correcting_copywrongs_mp3.mp384.0 MiB2014-12-29 23:49:57
31c3-6344-en-Security_Analysis_of_Estonias_Internet_Voting_System_mp3.mp3100.0 MiB2014-12-29 15:43:12
31c3-6342-de-Deine_Rechte_sind_in_diesen_Freihandelsabkommen_nicht_verfuegbar_mp3.mp385.3 MiB2014-12-29 23:50:06
31c3-6332-en-de-Security_Analysis_of_a_Full-Body_X-Ray_Scanner_mp3.mp374.9 MiB2014-12-29 23:36:49
31c3-6325-de-en-GIFs_Tod_eines_Mediums_Und_sein_Leben_nach_dem_Tod_mp3.mp342.8 MiB2014-12-29 16:31:06
31c3-6321-en-de-The_Matter_of_Heartbleed_mp3.mp369.0 MiB2014-12-29 23:35:18
31c3-6308-en-Beyond_PNR_Exploring_airline_systems_mp3.mp382.0 MiB2014-12-29 15:20:46
31c3-6299-en-de-Trackography_mp3.mp343.7 MiB2014-12-30 00:41:03
31c3-6297-en-de-Virtual_Machine_Introspection_mp3.mp380.4 MiB2015-01-01 15:50:41
31c3-6295-de-en-Krypto_fuer_die_Zukunft_mp3.mp342.4 MiB2014-12-29 19:02:36
31c3-6294-de-en-Vor_Windows_8_wird_gewarnt_mp3.mp343.1 MiB2014-12-29 18:09:02
31c3-6291-en-Doing_right_by_sources_done_right_mp3.mp383.4 MiB2014-12-30 18:28:33
31c3-6275-en-de-Living_Drones_mp3.mp342.5 MiB2014-12-29 23:50:51
31c3-6267-en-osmo-gmr_Whats_up_with_sat-phones_mp3.mp379.6 MiB2014-12-29 02:17:01
31c3-6265-en-The_automobile_as_massive_data_gathering_source_and_the_consequences_for_individual_privacy_mp3.mp354.1 MiB2014-12-29 17:24:25
31c3-6264-de-en-Wir_beteiligen_uns_aktiv_an_den_Diskussionen_mp3.mp386.4 MiB2014-12-28 14:31:59
31c3-6261-en-de-Lets_build_a_quantum_computer_mp3.mp382.2 MiB2014-12-29 23:49:29
31c3-6258-en-Reconstructing_narratives_mp3.mp387.4 MiB2014-12-29 23:19:35
31c3-6255-de-en-10_Jahre_OpenStreetMap_mp3.mp374.7 MiB2014-12-29 14:47:54
31c3-6253-en-de-Computer_Science_in_the_DPRK_mp3.mp345.8 MiB2014-12-30 00:39:45
31c3-6251-en-de-State_of_the_Onion_mp3.mp399.6 MiB2015-01-02 00:01:40
31c3-6249-en-de-SS7_Locate_Track_Manipulate_mp3.mp383.5 MiB2014-12-29 02:54:52
31c3-6244-de-Serenitaet_-_Anleitung_zum_Gluecklichsein_mp3.mp362.0 MiB2014-12-29 15:37:35
31c3-6243-en-de-The_Perl_Jam_Exploiting_a_20_Year-old_Vulnerability_mp3.mp339.6 MiB2014-12-30 00:41:36
31c3-6240-en-Reproducible_Builds_mp3.mp387.7 MiB2015-01-10 20:41:31
31c3-6236-en-de-Iridium_Pager_Hacking_mp3.mp343.3 MiB2015-01-11 22:36:02
31c3-6234-en-The_eXperimental_Robot_Project_mp3.mp369.2 MiB2014-12-29 11:36:09
31c3-6214-en-de-Attribution_revolution_mp3.mp375.5 MiB2015-01-01 15:26:21
31c3-6213-en-de-The_rise_and_fall_of_Internet_voting_in_Norway_mp3.mp382.5 MiB2015-01-01 15:20:12
31c3-6212-en-de-Heartache_and_Heartbleed_The_insiders_perspective_on_the_aftermath_of_Heartbleed_mp3.mp339.7 MiB2014-12-29 23:36:14
31c3-6205-en-de-Infocalypse_now_P0wning_stuff_is_not_enough_mp3.mp340.8 MiB2014-12-30 12:49:27
31c3-6202-en-de-Privacy_and_Consumer_Markets_mp3.mp342.2 MiB2014-12-29 18:15:53
31c3-6196-en-Switches_Get_Stitches_mp3.mp380.0 MiB2014-12-29 14:58:41
31c3-6195-en-The_Cloud_Conspiracy_2008-2014_mp3.mp387.3 MiB2014-12-29 14:39:02
31c3-6184-de-en-Mein_Bot_der_Kombattant_mp3.mp383.5 MiB2015-01-09 14:32:47
31c3-6180-en-de-Rocket_science_-_how_hard_can_it_be_mp3.mp389.2 MiB2014-12-29 11:57:45
31c3-6175-en-Superheroes_Still_Need_Phoneboxes_mp3.mp385.4 MiB2014-12-29 23:35:46
31c3-6173-en-de-Source_Code_and_Cross-Domain_Authorship_Attribution_mp3.mp387.9 MiB2014-12-29 23:50:29
31c3-6170-en-net_neutrality_days_of_future_past_mp3.mp382.4 MiB2014-12-29 23:22:45
31c3-6166-en-Too_Many_Cooks_-_Exploiting_the_Internet-of-TR-069-Things_mp3.mp373.4 MiB2014-12-29 16:49:04
31c3-6162-en-Programming_with_dependent_types_in_Idris_mp3.mp377.9 MiB2014-12-29 15:52:57
31c3-6161-en-de-EMET_51_-_Armor_or_Curtain_mp3.mp378.8 MiB2014-12-29 23:50:15
31c3-6158-en-de-Why_do_we_need_an_open_food_information_platform_mp3.mp353.4 MiB2014-12-29 23:49:00
31c3-6157-en-de-Diamonds_are_a_quantum_computers_best_friend_mp3.mp391.3 MiB2015-01-01 15:07:55
31c3-6156-en-Fernvale_An_Open_Hardware_and_Software_Platform_Based_on_the_nominally_Closed-Source_MT6260_SoC_mp3.mp382.0 MiB2014-12-29 23:21:40
31c3-6154-en-de-Crypto_Tales_from_the_Trenches_mp3.mp384.2 MiB2014-12-29 14:45:48
31c3-6148-en-Open-BCI_DIY-Neuroscience_Maker-Art_Mind-Hacking_mp3.mp352.2 MiB2014-12-29 19:02:02
31c3-6144-en-Finding_the_Weak_Crypto_Needle_in_a_Byte_Haystack_mp3.mp344.5 MiB2014-12-29 16:09:28
31c3-6142-en-de-Space_Hacker_mp3.mp385.9 MiB2014-12-29 14:52:32
31c3-6140-en-de-DP5_PIR_for_Privacy-preserving_Presence_mp3.mp382.0 MiB2014-12-29 23:50:23
31c3-6137-en-de-CAESAR_and_NORX_mp3.mp383.7 MiB2014-12-29 23:50:01
31c3-6135-en-de-Agri-tech_and_the_Arts_From_Barns_to_D-Space_mp3.mp340.2 MiB2014-12-30 00:39:43
31c3-6131-en-de-Safer_playing_with_lasers_mp3.mp337.4 MiB2014-12-29 15:57:25
31c3-6129-en-Attacks_on_UEFI_security_inspired_by_Darth_Venamiss_misery_and_Speed_Racer_mp3.mp382.7 MiB2014-12-29 23:21:05
31c3-6128-en-de-Thunderstrike_EFI_bootkits_for_Apple_MacBooks_mp3.mp379.3 MiB2014-12-29 23:50:39
31c3-6124-de-en-ES_GIBT_VIEL_ZU_TUN_-_HAUN_WIR_AB_mp3.mp388.3 MiB2014-12-29 23:50:49
31c3-6122-en-de-Mobile_self-defense_mp3.mp387.7 MiB2014-12-29 11:40:14
31c3-6121-en-de-What_Ever_Happened_to_Nuclear_Weapons_mp3.mp384.1 MiB2014-12-30 00:39:33
31c3-6120-en-Practical_EMV_PIN_interception_and_fraud_detection_mp3.mp380.2 MiB2014-12-29 01:56:13
31c3-6112-en-de-Tor_Hidden_Services_and_Deanonymisation_mp3.mp386.9 MiB2015-01-01 15:42:10
31c3-6109-de-en-Fnord_News_Show_mp3.mp3160.8 MiB2014-12-29 12:42:48
31c3-6103-en-AMD_x86_SMU_firmware_analysis_mp3.mp374.1 MiB2014-12-29 14:37:12
31c3-6100-en-Personal_Tracking_Devices_and_Online_Identity_mp3.mp355.3 MiB2014-12-29 01:20:48
31c3-6084-en-Uncaging_Microchips_mp3.mp384.8 MiB2014-12-29 15:09:56
31c3-6077-en-How_I_Learned_to_Stop_Reinventing_and_Love_the_Wheels_mp3.mp378.4 MiB2014-12-29 02:11:30
31c3-6072-en-de-Higher-Dimensional_Geometry_and_Fractals_mp3.mp342.2 MiB2014-12-30 13:09:32
31c3-6071-en-Hacking_Ethics_in_Education_mp3.mp338.8 MiB2014-12-29 16:20:10
31c3-6050-en-Code_Pointer_Integrity_mp3.mp384.1 MiB2014-12-29 16:28:12
31c3-6043-en-de-The_Maker_movement_meets_patent_law_mp3.mp392.1 MiB2014-12-29 23:50:44
31c3-6021-en-de-Why_is_GPG_damn_near_unusable_mp3.mp379.3 MiB2014-12-29 15:16:30
31c3-6010-en-SCADA_StrangeLove_Too_Smart_Grid_in_da_Cloud_mp3.mp365.4 MiB2014-12-28 20:32:54
31c3-5997-en-Preserving_arcade_games_mp3.mp371.5 MiB2014-12-29 23:20:35
31c3-5966-en-de-UNHash_-_Methods_for_better_password_cracking_mp3.mp344.5 MiB2014-12-30 00:42:36
31c3-5960-en-Revisiting_SSL_TLS_Implementations_mp3.mp376.6 MiB2014-12-29 02:05:34
31c3-5956-en-Cyber_Necromancy_mp3.mp376.6 MiB2014-12-29 15:46:20
31c3-5943-en-de-Low_Cost_High_Speed_Photography_mp3.mp382.9 MiB2014-12-30 18:33:41
31c3-5931-en-de-Telescope_Making_mp3.mp395.0 MiB2015-01-01 15:45:21
31c3-5930-en-de-Funky_File_Formats_mp3.mp370.1 MiB2014-12-29 23:49:50
31c3-2000-de-Erste_Stunden_der_Zweisamkeit_mp3.mp392.3 MiB2015-01-15 13:31:31