Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/cdn.media.ccc.de/congress/2009/mp4/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
26c3-3725-en-stream_security_nightmares.mp4.md578 B2010-01-03 12:41:30
26c3-3725-en-stream_security_nightmares.mp4959.0 MiB2010-01-03 12:38:10
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4.md584 B2010-01-02 00:05:45
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp4886.2 MiB2009-12-30 16:43:14
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4.md585 B2010-01-02 00:04:55
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp4705.4 MiB2009-12-29 16:13:14
26c3-3717-en-closing_event.mp4.md565 B2010-01-03 11:27:58
26c3-3717-en-closing_event.mp4385.0 MiB2010-01-03 11:24:41
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4.md5146 B2010-01-02 00:04:13
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp4736.4 MiB2009-12-29 15:45:55
26c3-3713-de-unbild__pictures_and_non-pictures.mp4.md585 B2010-01-02 00:03:32
26c3-3713-de-unbild__pictures_and_non-pictures.mp4681.7 MiB2009-12-29 15:45:00
26c3-3711-de-computerspielepolitik.mp4.md573 B2010-01-02 00:02:55
26c3-3711-de-computerspielepolitik.mp4799.8 MiB2009-12-29 13:49:47
26c3-3710-en-the_lost_cosmonauts.mp4.md571 B2010-01-02 00:02:13
26c3-3710-en-the_lost_cosmonauts.mp4550.6 MiB2009-12-30 09:46:23
26c3-3709-en-legic_prime_obscurity_in_depth.mp4.md582 B2010-01-02 00:01:44
26c3-3709-en-legic_prime_obscurity_in_depth.mp4699.6 MiB2009-12-30 15:14:46
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4.md595 B2010-01-15 10:27:40
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp4677.6 MiB2010-01-15 10:21:40
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4.md5125 B2010-01-03 02:09:41
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4599.5 MiB2010-01-03 02:07:35
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4.md590 B2010-01-02 00:00:34
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp4954.9 MiB2009-12-30 13:54:46
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4.md5100 B2010-01-01 23:59:41
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4502.1 MiB2009-12-29 15:33:00
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4.md5100 B2010-01-01 23:59:14
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp4623.3 MiB2009-12-30 10:33:44
26c3-3700-de-here_be_dragons.mp4.md567 B2010-01-01 23:58:39
26c3-3700-de-here_be_dragons.mp4554.0 MiB2009-12-28 23:11:45
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp4.md588 B2010-01-03 12:30:58
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp41.5 GiB2010-01-03 12:27:07
26c3-3696-en-wireless_power_transfer.mp4.md575 B2010-01-01 23:58:09
26c3-3696-en-wireless_power_transfer.mp4670.7 MiB2009-12-29 16:38:40
26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4.md579 B2010-01-01 23:57:32
26c3-3691-de-vier_faeuste_fuer_ein_halleluja.mp4607.4 MiB2009-12-30 17:09:12
26c3-3690-de-ccc-jahresrckblick.mp4.md570 B2010-01-01 23:56:26
26c3-3690-de-ccc-jahresrckblick.mp4981.6 MiB2009-12-30 09:33:34
26c3-3688-de-haste_man_netblock.mp4.md570 B2010-01-01 23:55:31
26c3-3688-de-haste_man_netblock.mp4362.0 MiB2010-01-01 19:38:01
26c3-3687-de-security_nightmares.mp4.md571 B2010-01-02 16:10:36
26c3-3687-de-security_nightmares.mp4960.8 MiB2010-01-02 16:07:34
26c3-3685-de-im_herz_der_bestie.mp4.md570 B2010-01-03 09:48:22
26c3-3685-de-im_herz_der_bestie.mp4582.2 MiB2010-01-03 09:31:05
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4.md5101 B2010-01-01 23:55:11
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp4717.4 MiB2009-12-29 22:31:00
26c3-3672-de-advanced_microcontroller_programming.mp4.md588 B2010-01-01 23:54:27
26c3-3672-de-advanced_microcontroller_programming.mp4578.1 MiB2009-12-29 23:40:18
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp4.md598 B2010-01-03 12:18:36
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp41.1 GiB2010-01-03 11:49:42
26c3-3670-en-blackbox_jtag_reverse_engineering.mp4.md585 B2010-01-03 10:48:58
26c3-3670-en-blackbox_jtag_reverse_engineering.mp4634.4 MiB2010-01-03 10:47:25
26c3-3669-de-hacker_jeopardy.mp4.md567 B2010-01-06 19:07:20
26c3-3669-de-hacker_jeopardy.mp41.4 GiB2010-01-06 18:49:03
26c3-3668-en-hacker_jeopardy.mp4.md567 B2010-01-15 12:31:01
26c3-3668-en-hacker_jeopardy.mp41.4 GiB2010-01-15 12:24:28
26c3-3664-en-homewreckery.mp4.md564 B2010-01-01 23:52:48
26c3-3664-en-homewreckery.mp4467.3 MiB2009-12-29 19:18:48
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4.md597 B2010-01-01 23:52:21
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp4790.3 MiB2009-12-29 15:42:47
26c3-3658-en-black_ops_of_pki.mp4.md568 B2010-01-06 20:46:04
26c3-3658-en-black_ops_of_pki.mp4881.9 MiB2010-01-06 20:43:57
26c3-3657-en-optimised_to_fail.mp4.md569 B2010-02-09 18:45:12
26c3-3657-en-optimised_to_fail.mp4666.7 MiB2010-02-09 18:45:01
26c3-3654-en-gsm_srsly.mp4.md561 B2010-01-01 23:50:43
26c3-3654-en-gsm_srsly.mp4775.6 MiB2009-12-29 15:19:13
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4.md5120 B2010-01-01 23:49:56
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp4547.5 MiB2009-12-29 23:41:43
26c3-3648-en-dect_part_ii.mp4.md564 B2010-01-01 23:49:24
26c3-3648-en-dect_part_ii.mp4687.6 MiB2009-12-30 09:39:06
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4.md587 B2010-01-01 23:48:43
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp4704.8 MiB2009-12-29 15:36:44
26c3-3645-en-lightning_talks_-_day_4.mp4.md575 B2010-01-03 11:22:58
26c3-3645-en-lightning_talks_-_day_4.mp41.5 GiB2010-01-03 11:20:59
26c3-3644-de-lightning_talks_-_day_3.mp4.md575 B2010-01-03 11:37:09
26c3-3644-de-lightning_talks_-_day_3.mp41.5 GiB2010-01-03 11:33:43
26c3-3642-en-lightning_talks_-_day_2.mp4.md575 B2010-01-01 23:48:02
26c3-3642-en-lightning_talks_-_day_2.mp41.4 GiB2009-12-29 17:33:05
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4.md599 B2010-01-01 23:46:34
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp4489.9 MiB2009-12-30 10:31:46
26c3-3631-en-finding_the_key_in_the_haystack.mp4.md583 B2010-01-03 08:27:23
26c3-3631-en-finding_the_key_in_the_haystack.mp4564.6 MiB2010-01-03 08:26:28
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4.md594 B2010-01-01 23:46:03
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp4759.8 MiB2009-12-30 16:54:36
26c3-3613-de-fnord-jahresrckblick_2009.mp4.md577 B2010-01-15 10:58:32
26c3-3613-de-fnord-jahresrckblick_2009.mp4879.1 MiB2010-01-15 10:52:21
26c3-3608-en-playing_with_the_gsm_rf_interface.mp4.md585 B2010-01-15 11:29:18
26c3-3608-en-playing_with_the_gsm_rf_interface.mp4536.4 MiB2010-01-15 11:22:54
26c3-3600-de-location_tracking_does_scale_up.mp4.md583 B2010-01-01 23:44:30
26c3-3600-de-location_tracking_does_scale_up.mp4662.2 MiB2009-12-30 10:34:49
26c3-3596-de-cat_procsysnetipv4fuckups.mp4.md577 B2010-01-01 23:43:47
26c3-3596-de-cat_procsysnetipv4fuckups.mp4469.3 MiB2009-12-30 16:25:35
26c3-3594-de-internetsperren.mp4.md567 B2010-01-01 23:43:18
26c3-3594-de-internetsperren.mp4518.7 MiB2009-12-29 03:47:58
26c3-3592-de-cybernetic_cannibalism.mp4.md574 B2010-01-01 23:42:48
26c3-3592-de-cybernetic_cannibalism.mp4702.8 MiB2009-12-29 16:41:45
26c3-3590-de-europische_biometriestrategien.mp4.md582 B2010-01-01 23:42:06
26c3-3590-de-europische_biometriestrategien.mp4725.2 MiB2009-12-30 09:40:31
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4.md593 B2010-01-03 08:41:52
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp4586.4 MiB2010-01-03 08:36:35
26c3-3577-de-privacy-enhanced_event_scheduling.mp4.md585 B2010-01-01 23:41:22
26c3-3577-de-privacy-enhanced_event_scheduling.mp4665.8 MiB2009-12-30 11:35:03
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4.md5112 B2010-01-01 23:40:43
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp4582.3 MiB2009-12-29 16:30:53
26c3-3573-en-playing_with_the_built_city.mp4.md579 B2010-01-01 23:40:09
26c3-3573-en-playing_with_the_built_city.mp4678.9 MiB2009-12-30 09:37:26
26c3-3570-en-weaponizing_cultural_viruses.mp4.md580 B2010-01-01 23:39:31
26c3-3570-en-weaponizing_cultural_viruses.mp4762.5 MiB2009-12-30 11:53:32
26c3-3567-en-wikileaks_release_10.mp4.md572 B2010-01-01 23:38:48
26c3-3567-en-wikileaks_release_10.mp4706.2 MiB2009-12-29 15:00:56
26c3-3563-en-lightning_talks_-_day_1.mp4.md575 B2010-01-08 09:07:51
26c3-3563-en-lightning_talks_-_day_1.mp41.3 GiB2010-01-08 09:05:02
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4.md588 B2010-01-15 13:17:10
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp4662.6 MiB2010-01-15 13:10:03
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4.md5153 B2010-01-07 18:17:41
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp4639.8 MiB2009-12-29 16:39:52
26c3-3554-de-tor_and_censorship_lessons_learned.mp4.md586 B2010-01-01 23:37:23
26c3-3554-de-tor_and_censorship_lessons_learned.mp4715.1 MiB2009-12-29 14:27:19
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4.md5113 B2010-01-01 23:36:41
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp4657.3 MiB2009-12-29 19:26:11
26c3-3550-de-chaos-familien-duell.mp4.md572 B2010-01-01 23:36:00
26c3-3550-de-chaos-familien-duell.mp41.3 GiB2009-12-29 16:22:08
26c3-3547-en-after_the_hype.mp4.md566 B2010-01-03 09:15:28
26c3-3547-en-after_the_hype.mp4676.2 MiB2010-01-03 09:13:24
26c3-3540-en-a_hackers_utopia.mp4.md568 B2010-01-01 23:33:55
26c3-3540-en-a_hackers_utopia.mp4717.4 MiB2009-12-29 15:17:38
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4.md5101 B2010-01-01 23:33:15
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp4592.5 MiB2009-12-30 09:45:05
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4.md593 B2010-01-01 23:32:42
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp4669.0 MiB2009-12-30 09:54:04
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4.md5103 B2010-01-01 23:32:04
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger.mp4709.4 MiB2009-12-29 23:21:28
26c3-3523-de-eine_zensur_findet_statt.mp4.md576 B2010-01-01 23:31:25
26c3-3523-de-eine_zensur_findet_statt.mp4607.8 MiB2009-12-29 13:41:50
26c3-3520-en-conlanging_101.mp4.md566 B2010-01-08 09:49:05
26c3-3520-en-conlanging_101.mp4825.4 MiB2010-01-08 09:46:18
26c3-3515-en-secubt.mp4.md558 B2010-01-01 23:30:10
26c3-3515-en-secubt.mp4638.5 MiB2009-12-30 16:41:29
26c3-3510-de-technik_des_neuen_epa.mp4.md573 B2010-01-01 23:29:34
26c3-3510-de-technik_des_neuen_epa.mp4670.3 MiB2009-12-30 10:56:52
26c3-3509-de-wofr_offenes_internet.mp4.md573 B2010-01-17 20:50:12
26c3-3509-de-wofr_offenes_internet.mp4617.6 MiB2010-01-17 20:42:56
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4.md583 B2010-01-03 02:00:18
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp4455.5 MiB2010-01-03 01:58:32
26c3-3504-en-our_darknet_and_its_bright_spots.mp4.md584 B2010-01-03 08:41:33
26c3-3504-en-our_darknet_and_its_bright_spots.mp4583.2 MiB2010-01-03 08:33:41
26c3-3501-en-why_net_neutrality_matters.mp4.md578 B2010-01-15 11:59:57
26c3-3501-en-why_net_neutrality_matters.mp4645.2 MiB2010-01-15 11:53:31
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4.md591 B2010-01-01 23:28:33
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp4461.1 MiB2009-12-30 16:40:36
26c3-3495-de-das_zugangserschwerungsgesetz.mp4.md581 B2010-01-01 23:28:08
26c3-3495-de-das_zugangserschwerungsgesetz.mp4655.7 MiB2009-12-29 14:26:09
26c3-3494-de-defending_the_poor.mp4.md570 B2010-01-01 23:27:29
26c3-3494-de-defending_the_poor.mp4801.4 MiB2009-12-29 16:18:35
26c3-3490-en-building_a_debugger.mp4.md571 B2010-01-07 16:22:08
26c3-3490-en-building_a_debugger.mp4619.8 MiB2010-01-07 16:22:07
26c3-3481-de-leyen-rhetorik.mp4.md566 B2010-01-01 23:26:23
26c3-3481-de-leyen-rhetorik.mp4688.3 MiB2009-12-29 13:43:35
26c3-3468-de-privacy_amp_stylometry.mp4.md574 B2010-01-01 23:25:44
26c3-3468-de-privacy_amp_stylometry.mp4653.4 MiB2009-12-29 19:37:09
26c3-3464-de-liquid_democracy.mp4.md568 B2010-01-01 23:25:04
26c3-3464-de-liquid_democracy.mp4708.1 MiB2009-12-30 16:27:26
26c3-3452-en-here_be_electric_dragons.mp4.md576 B2010-01-01 23:24:18
26c3-3452-en-here_be_electric_dragons.mp4671.0 MiB2009-12-29 14:57:55
26c3-3353-de-reverse-engineering_displaylink_devices.mp4.md591 B2010-01-01 23:23:34
26c3-3353-de-reverse-engineering_displaylink_devices.mp4416.6 MiB2009-12-29 16:32:48
26c3-3350-en-milkymist.mp4.md561 B2010-01-01 23:23:10
26c3-3350-en-milkymist.mp4470.4 MiB2009-12-30 16:22:23
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4.md591 B2010-01-15 10:12:14
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp4448.9 MiB2010-01-15 10:06:15
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp4.md5110 B2010-01-01 23:22:43
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp41.4 GiB2009-12-29 15:28:10
26c3-3302-en-i_internet.mp4.md562 B2010-01-01 23:21:21
26c3-3302-en-i_internet.mp4505.4 MiB2009-12-30 10:21:05
26c3-3266-de-hacking_the_universe.mp4.md572 B2010-01-03 10:55:33
26c3-3266-de-hacking_the_universe.mp4693.0 MiB2010-01-03 10:52:09