Best chaos computer club podcasts we could find (Updated August 2017)
Related podcasts: Chaosradio Community Hacking Chaos Radio Chaos Computer Club Technology Politics Tech Ccc Congress Hacking Security Netzpolitik Expert Interviews Science Society Rbb Fritz  
Chaos computer club public [search 0]
show episodes
 
C
Chaos Computer Club - recent audio-only feed
 
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
 
C
Chaos Computer Club - 33C3: works for me (mp4)
Daily+
 
This feed contains all events from 33c3 as mp4
 
C
Chaosradio International (all episodes)
 
Chaosradio International is the international podcast of the Chaos Computer Club. The podcast is discontinued but will be retained as an archive.
 
C
Chaosradio (Alle Sendungen)
Monthly
 
Chaosradio ist der unterhaltsame Live-Talk-Radio-Klassiker des Chaos Computer Clubs aus Berlin und eines der ältesten Tech-Radios überhaupt. Chaosradio informiert seit 1995 über wechselnde Themen rund um Technologie und Gesellschaft. Chaosradio sendet in der Regel am jeweils letzten Donnerstag eines Monats, an ungeraden Monaten auch auf dem Radiosender Fritz (RBB), jeweils von 22 bis 0 Uhr und lädt zur aktiven Teilnahme via Telefon und IRC ein.
 
C
Chaosradio International
Rare
 
Chaosradio International is the international podcast of the Chaos Computer Club. The podcast is discontinued but will be retained as an archive.
 
Loading …
show series
 
Host R.J. Rushdoony Description (Originally Aired – May 25, 1995) R.J. Rushdoony interviews Dr. Ellsworth McIntyre, founder of Grace Community School in SW Florida. The discussion involves Christian Reconstruction in the field of education. Listen Transcript of Episode: Speaker 1: Your Reconstruction Radio Podcast Network presents The Easy Chai ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Although IoT is already embedded in our everyday lives, our security and privacy are sometime left behind for comfort and other reasons, despite the serious impact that IoT vulnerabilities may have on our digital and physical security.Bluetooth Low Energy (BLE), also known as Bluetooth Smart is the most popular protocol used for interfacing IoT ...…
 
C
Chaos Computer Club - recent audio-only feed
 
In this talk you'll be given a very technical overview of DDoS and mitigation techniques; their effectiveness will be evaluated with real-life examples.#NetworkSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
We use traceroutes to explore and visualise interconnectedness between devices on the internet (specifically: RIPE Atlas probes). This talk is about exploring the interconnectedness within a country ("are local paths local"), and also about exploring the interconnectedness between hackerspaces.#NetworkSecurityabout this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
The SHA2017 Badge overview.#Makingabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
TLS can be limiting, OAuth is a (somewhat working) mess.What would happen if we redesigned things from scratch?Fenrir is a federated protocol built with both heavy security and high flexibility in mind, with lots of new and interesting security properties.#NetworkSecurityabout this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
What do design flaws, implementation errors, 0days etc. look like in physical locks?#PhysicalSecurity #Softwareabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Using encryption and onion routing is all fine and dandy, but both can be detected and both can, at the very least, be severely hampered or even be cut off. However, the Internet nowadays is full of services and systems that autonomously, and continuously, send data to users all over the world. These messages or interactions are seen as formali ...…
 
C
Chaos Computer Club - recent audio-only feed
 
History, relevance and future of penis imagery in culture.A radical way to deter hackers or just a stupid idea.Using your most private key in new and inventive ways.#Society #DeviceSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
India has rolled out a 'voluntary' biometric ID card to all of its billion-plus citizens. Which is fascinating from a social, technical and fundamental rights perspective. This talk is about both intended and unintended consequences of this grand experiment, with a focus on the (implicit) assumptions we tend to make about technology.#Society #P ...…
 
C
Chaos Computer Club - recent audio-only feed
 
A summary extraordinaire.#Communityabout this event: https://c3voc.de
 
In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it c ...…
 
C
Chaos Computer Club - recent audio-only feed
 
USB connectivity has become ubiquitous. The sheer variety of usb-connected devices— ranging from computers and game consoles to resource-constrained embedded systems— has resulted in a wide variety of vendor-specific protocols and custom USB software stacks. Being able to fuzz, monitor, mitm, or emulate USB can often be a foot in the door for w ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Infrastructure talk from Productiehuis, NOC and other interested teams. #Making #Sharing #NetworkSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
The history of cryptography is a history of failures. Stronger ciphers replaced broken ones, to be in turn broken again. Quantum cryptography is offering a hope to end this replacement cycle, for its security premises on the laws of quantum physics and not on limitations of human ingenuity and computing. But, can our nascent quantum technology ...…
 
C
Chaos Computer Club - recent audio-only feed
 
about this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
A-Frame is an open-source web framework by Mozilla for easily creating VR experiences which work on all platforms. In this session you will learn to use various concepts & APIs of A-Frame and create interactive VR scenes on the web, all you need to get started is a basic knowledge of HTML & JS.about this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
Hackefuffel is a small indie game label of 8-bit-heads from Hamburg. In late 2016 we decided to build the (open) retro-gaming console we always wanted...modern hardware, but old scholl spirit, and that's when Hackeboy was born. The first prototype was built at 33c3 and it has come a long way since then. In this talk we'll show you what we've bu ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Off Grid is a different kind of hacking game, and it is fully moddable. The game logic runs on Lua under the hood, and all the computers you hack, whether desktop PCs or IoT devices are their own Lua VMs allowing modders and hackers to create their own LUA hackable devices, hacking tools, and data types. This flexibility allows anyone to model ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Our vision is to increase transparency behind personalization algorithms. facebook.tracking.exposed, is two things: a web browser add-on that collects the stories visible in your Facebook Newsfeed, and a website that aggregates that data from all the users who have the addon installed.Our mission is to help researchers and users assessing how c ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Information sharing is a key element in detecting security breaches and proactively protecting information systems and infrastructures, but the practical aspect is often forgotten. Alexandre Dulaunoy offers an overview of MISP, a free software tool that supports information-sharing practices among communities, and shares some lessons learned wh ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Capitalist underpinnings of advanced technology development threatens individual agency and the notion of self-defined identity. As we are seen by an increasing number of image capture systems, this session will discuss prospects for the degrees of control do we exert over digital representations of our bodies as vision technology becomes more ...…
 
C
Chaos Computer Club - recent audio-only feed
 
The Internet isn't global. Only half of the world is connected to the Internet, English is still the largest language in terms of content and knowledge is increasingly privatized either through patented code (owned mostly by Sillicon Valley companies) or via obscure trade agreements pushed by the United States. How is the Internet used in Latin ...…
 
C
Chaos Computer Club - recent audio-only feed
 
How does internet influence your life?This lecture will be about my ongoing project Life Needs Internet (2012-2017) which documents digital culture through handwritten letters. Recent letters came from Brazil, China, France, India, Ghana and Papua. All handwritten letters are translated and documented on www.lifeneedsinternet.com. Together thes ...…
 
C
Chaos Computer Club - recent audio-only feed
 
This talk focuses on the thesis assignment of Willem Westerhof. During this thesis it was discovered that a weak spot exists withing the Powergrid, allowing an attacker to perform a distributed attack using PV-installations to cause massive (nation-wide/continental) power outages. #NetworkSecurity #PhysicalSecurityabout this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
In which we experiment with generative music, based on chaotic systems and cellular automata. Continuous sounds will be made using discrete systems, and discrete sounds will be made using continuous systems.#Makingabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Your pentesting goal: getting the data. You decide to do it physically. How to go about?#PhysicalSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
The ultimate Hackerspace; From Panopticon-prison to Hackervillage-Castle-compound#Community #Makingabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
A talk outlining the process of turning a personal electronic project into a successful kit business.#Makingabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
This talk will introduce a couple of less well known applications of cryptography. about this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Helping participants to find the best and most secure tools and configurations to automate acquiring TLS certificates and deploying them to use. Bring your own infra ;)#NetworkSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
The idea of how to transform brainwaves in images and sounds is not new, but with the new digital technologies, it becomes more accessible. During this lecture, will be present how to get this impulses from cheap sensors, and process it with free/open source tools.#Making #Sharingabout this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
Legal lecture on Cybercrime for non-legal-experts#Society #Politicsabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
What kind of work goes into implementing secure services? Service providers have to comply to the law, protect their users, worry about reputation, need to deal with vulnerability management, patch management and above all: business continuity. Researchers and attackers target the infrastructure for their own gain and suppliers have their own g ...…
 
CVE-2017-2636 is a 7-year old race condition in the Linux kernel that was fixed by Alexander Popov in March, 2017. This vulnerability affected all major Linux distributions. It can be exploited to gain a local privilege escalation. In this presentation Alexander will describe the PoC exploit for CVE-2017-2636. He will explain the effective meth ...…
 
C
Chaos Computer Club - recent audio-only feed
 
We can intentionally build and improve the sociotechnical systems of which we are a part, or we can be haphazard in the worlds we create. The things which we personally find fulfilling and useful may not hold true at scale. This talk lays a framework for approaching societal-level change through being scientifically minded and taking active ste ...…
 
C
Chaos Computer Club - recent audio-only feed
 
How do we know what good is. Are we creating something worth making? Are we lost in our own dogma? When do we step back and let the smoke clear before getting back to work? Important questions. Let's ask them out loudabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Car security is, not surprisingly, a hot topic; after all they are fast and heavy computer controlled machinery that nowadays come with all kinds of internet connectivity. So we decided to have a look at it. In our presentation, we’ll first cover some theory behind the IT-part of car architecture. We’ll discuss attack vectors and their likeliho ...…
 
C
Chaos Computer Club - recent audio-only feed
 
In 2012 I released a DES cracking service with Moxie Marlinspike for cracking MSCHAPv2 and quickly started seeing it being used for cracking other things besides MSCHAPv2. In this presentation we'll take a look at some of the research we've done into other widely used protocols and services that still rely on DES for security and provide an qui ...…
 
C
Chaos Computer Club - recent audio-only feed
 
When designing technologies, networked systems, and measurements on the Internet, we must be aware of their implications and consequences for the society and participants. As engineers, scientists, programmers and other experts, we have moral obligations towards our peers, users of technologies we create, and the wider communities.In this talk ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Neurodiversity is the concept that neurological conditions are variations in the human genome. Therefore Autism, ADHD, and mood- and personality disorders are considered social categories intersecting with other social categories. While "Nerd" is very broadly defined, the number of neurodiverse people within our social group is much higher than ...…
 
C
Chaos Computer Club - recent audio-only feed
 
The complexity of implementing a policy (law) and related operational and technical procedures to regulate the uses of Trojan by Law Enforcement in a way that protect civil rights while not preventing investigations from going on with the right balance of juridical/technical implementation. #Legal #Politics #Societyabout this event: https://c3v ...…
 
C
Chaos Computer Club - recent audio-only feed
 
This talk demonstrates how to make fake gemstones and related accessories using only a 3D printer and kitchen, as well as various pointers to make your own designs.#Makingabout this event: https://c3voc.de
 
This talk is about the collaboration and Responsible Disclosure in a school environment by a high school hacker.#Sharing #Trainingabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
about this event: https://c3voc.de
 
This presentation introduces "phishing spam", an open-source Spearphishing Toolkit, and has a surprising ending with an ethical + philosophical twist. This is the kindof story that only comes from the trenches..#Experimentalabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
This talk will show and compare different forms of political campaigns during election times, including Free Software tools. Best methods to be used for the different forms of campaigning will be explained in a way for you to pick it up and make it work for your topic. Let's put pressure bottom-up again!#Politicsabout this event: https://c3voc.de…
 
C
Chaos Computer Club - recent audio-only feed
 
The talk aims to be an introduction to LED lighting, how to create lighting hardware, what regulations and protocols are involved and how lighting can generally improve human wellbeing.#Society #Making #PhysicalSecurityabout this event: https://c3voc.de
 
C
Chaos Computer Club - recent audio-only feed
 
Our barrier-free documentary "Information. What are they looking at?" takes an inclusive approach to communicating knowledge around privacy violations through mass surveillance by governments and corporations. Addressing a diverse audience our we prioritise shifting the representational power from discourse dominating white men towards the expe ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Many of the things we use on a daily basis are becoming smart and connected. The Internet of Things (IoT) will improve our lives by helping us reach our fitness goals, reduce resource consumption, increasing productivity, and track and secure our assets. Many embedded developers realize the potential benefits of the IoT and are actively develop ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login