Duration: (31:39) ?Subscribe5835 2025-02-06T15:00:23+00:00
38C3 - From Silicon to Sovereignty: How Advanced Chips are Redefining Global Dominance
(40:2)
38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS
(59:35)
38C3 - From Simulation to Tenant Takeover
(29:56)
38C3: From Pegasus to Predator - The evolution of Commercial Spyware on iOS (Matthias Frielingsdorf)
38C3 - From Critical Making via unmaking towards (un)making
(36:19)
38C3 - Find My * 101
(40:16)
38C3 - From fault injection to RCE: Analyzing a Bluetooth tracker
(31:39)
38C3 - A dive into DNS
(40:29)
38C3 - Dialing into the Past: RCE via the Fax Machine – Because Why Not?
(38:49)
38C3 - Hacker Jeopardy
(1:45:46)
38C3 - Waiter, There's An LLM In My Search!
(39:18)
38C3 - 7 Years Later: Why And How To Make Portable Open Hardware Computers
(38:57)
38C3 - Hacking the RP2350
(57:15)
38C3 - Escaping Big Brother (or Your Ex) - counter surveillance for women's shelters
(40:41)
38C3 - We've not been trained for this: life after the Newag DRM disclosure
(44:34)