Vídeos de la 30c3
Durante el pasado fin de semana (viernes a lunes) se celebró en Alemania, Hamburgo la ya veterana CCC, Chaos Communication Congress, que celebraba su 30 edición. Como viene ocurriendo desde hace unos años, todas las charlas se emitían en vivo a través de internet e incluso podías seguirla por teléfono.
Si te perdiste alguna de las charlas o simplemente quieres volver a ver alguna de las que seguiste, ya puedes descargarte los vídeos. Además del sitio oficial, tienes otras alternativas como:
- http://cdn.media.ccc.de/congress/2013 (multiple hosts, CDN)
 - ftp://mirror.fem-net.de/CCC/30C3/
 - http://30c3.mirror.speedpartner.de/ (1Gbit, IPv4/IPv6, SpeedPartner GmbH)
 - http://ftp.halifax.rwth-aachen.de/ccc/30C3/ (10 GBit/sec, DFN, also offers ftp and rsync)
 - http://mirror.netcologne.de/CCC/congress/2013/ (2Gbit/s, IPv4/IPv6, also part of cdn.media.ccc.de)
 - http://ftp.snt.utwente.nl/pub/misc/30c3/ (10Gbit/s, IPv4/IPv6, http/ftp/rsync)
 
Aquí os dejo un listado con los enlaces al FTP oficial de todas las charlas publicadas:
- 30c3_Keynote_h264-hd.mp4
 - Monitoring_the_Spectrum_Building_Your_Own_Distributed_RF_Scanner_Array_h264-hq.mp4
 - FPGA_101_h264-hq.mp4
 - Programming_FPGAs_with_PSHDL_h264-hq.mp4
 - Android_DDI_h264-hq.mp4
 - en-Bullshit_made_in_Germany_h264-hq.mp4
 - The_GNU_Name_System_h264-hq.mp4
 - The_Gospel_of_IRMA__h264-hq.mp4
 - WarGames_in_memory_h264-hq.mp4
 - Triggering_Deep_Vulnerabilities_Using_Symbolic_Execution_h264-hq.mp4
 - de-Through_a_PRISM_Darkly_h264-hq.mp4
 - The_philosophy_of_hacking_h264-hq.mp4
 - en-Keine_Anhaltspunkte_fuer_flaechendeckende_UEberwachung_h264-hq.mp4
 - Coding_your_body_h264-hq.mp4
 - Console_Hacking_2013_h264-hq.mp4
 - en-Dead_Man_Edition_h264-hq.mp4
 - de-Dead_Man_Edition_h264-hq.mp4
 - de-Rock_em_Graphic_Cards_h264-hq.mp4
 - Breaking_Baryons_h264-hq.mp4
 - Reverse_engineering_of_CHIASMUS_from_GSTOOL_h264-hq.mp4
 - lasers_in_space_h264-hq.mp4
 - Technomonopolies_h264-hq.mp4
 - Reverse_engineering_the_Wii_U_Gamepad_h264-hq.mp4
 - RFID_Treehouse_of_Horror_h264-hq.mp4
 - en-Kryptographie_nach_Snowden_h264-hq.mp4
 - en-Der_Kampf_um_Netzneutralitaet_h264-hq.mp4
 - Firmware_Fat_Camp_h264-hq.mp4
 - Script_Your_Car__h264-hq.mp4
 - Disclosure_DOs_Disclosure_DON_Ts_h264-hq.mp4
 - en-UEberwachen_und_Sprache_h264-hq.mp4
 - Toward_a_Cognitive_Quantified_Self__h264-hq.mp4
 - de-Y_U_NO_ISP_taking_back_the_Net_h264-hq.mp4
 - Towards_an_affordable_brain-computer-interface_h264-hq.mp4
 - HbbTV_Security_h264-hq.mp4
 - Data_Mining_for_Good_h264-hq.mp4
 - Drones_h264-hq.mp4
 - Bug_class_genocide_h264-hq.mp4
 - en-Der_tiefe_Staat_h264-hq.mp4
 - de-Desperately_Seeking_Susy_h264-hq.mp4
 - Extracting_keys_from_FPGAs_OTP_Tokens_and_Door_Locks_h264-hq.mp4
 - en-calcpw_h264-hq.mp4
 - THE_DATABASE_NATION_aka_THE_STATE_OF_SURVEILLANCE_h264-hq.mp4
 - The_Tor_Network_h264-hq.mp4
 - Hacking_as_Artistic_Practice_h264-hq.mp4
 - en-Das_FlipDot-Projekt_h264-hq.mp4
 - en-Recht_auf_Remix_h264-hq.mp4
 - Plants_Machines_h264-hq.mp4
 - de-Art_of_the_Exploit_An_Introduction_to_Critical_Engineering_h264-hq.mp4
 - Introduction_to_Processor_Design_h264-hq.mp4
 - Attacking_HomeMatic_h264-hq.mp4
 - Virtually_Impossible_The_Reality_Of_Virtualization_Security_h264-hq.mp4
 - The_good_the_bad_and_the_ugly_-_Linux_Kernel_patches_h264-hq.mp4
 - Policing_the_Romantic_Crowd_h264-hq.mp4
 - Mobile_network_attack_evolution_h264-hq.mp4
 - Against_Metadata_h264-hq.mp4
 - Hillbilly_Tracking_of_Low_Earth_Orbit_h264-hq.mp4
 - en-Warum_die_Digitale_Revolution_des_Lernens_gescheitert_ist_h264-hq.mp4
 - We_only_have_one_earth_h264-hq.mp4
 - en-2_Takte_spaeter_h264-hq.mp4
 - World_War_II_Hackers_h264-hq.mp4
 - _SOPA_NSA_and_the_New_Internet_Lobby_h264-hq.mp4
 - Electronic_Bank_Robberies_h264-hq.mp4
 - de-Backdoors_Government_Hacking_and_The_Next_Crypto_Wars_h264-hq.mp4
 - Building_a_safe_NFC_ticketing_system_h264-hq.mp4
 - Europe_the_USA_and_Identity_Ecosystems_h264-hq.mp4
 - de-No_Neutral_Ground_in_a_Burning_World_h264-hq.mp4
 - Nerds_in_the_news_h264-hq.mp4
 - Concepts_for_global_TSCM_h264-hq.mp4
 - 10_Years_of_Fun_with_Embedded_Devices_h264-hq.mp4
 - X_Security_h264-hq.mp4
 - Anonymity_and_Privacy_in_Public_Space_and_on_the_Internet_h264-hq.mp4
 - en-Zwischen_supersicherer_Verschluesselung_und_Klartext_liegt_nur_ein_falsches_Bit__h264-hq.mp4
 - en-IFGINT_h264-hq.mp4
 - How_to_Build_a_Mind_h264-hq.mp4
 - Basics_of_Digital_Wireless_Communication_h264-hq.mp4
 - Hardening_hardware_and_choosing_a_goodBIOS_h264-hq.mp4
 - Fast_Internet-wide_Scanning_and_its_Security_Applications_h264-hq.mp4
 - Long_Distance_Quantum_Communication_h264-hq.mp4
 - Human_Rights_and_Technology_h264-hq.mp4
 - Revisiting_Trusting_Trust_for_binary_toolchains_h264-hq.mp4
 - de-ID_Cards_in_China_Your_Worst_Nightmare_h264-hq.mp4
 - en-Sim_Gishel_h264-hq.mp4
 - Trezor_Bitcoin_hardware_wallet_h264-hq.mp4
 - Turing_Complete_User_h264-hq.mp4
 - Beyond_the_Tech_Building_Internet_Freedom_Tools_for_Real_People_h264-hq.mp4
 - India_s_Surveillance_State_h264-hq.mp4
 - Magic_Lantern_h264-hq.mp4
 - de-Lightning_Talks_Day_2_h264-hq.mp4
 - de-Lightning_Talks_Day_3_h264-hq.mp4
 - de-Lightning_Talks_Day_4_h264-hq.mp4
 - Open_source_experimental_incubator_build_up_h264-hq.mp4
 - Calafou_postcapitalist_ecoindustrial_community_h264-hq.mp4
 - SCADA_StrangeLove_2_h264-hq.mp4
 - Making_machines_that_make_h264-hq.mp4
 - de-My_journey_into_FM-RDS_h264-hq.mp4
 - White-Box_Cryptography_h264-hq.mp4
 - Hacking_the_Czech_Parliament_via_SMS_h264-hq.mp4
 - Structuring_open_hardware_projects_h264-hq.mp4
 - The_ArduGuitar_h264-hq.mp4
 - de-EUDataP_State_of_the_Union_h264-hq.mp4
 - Opening_Event_h264-hq.mp4
 - The_Pirate_Cinema_h264-hq.mp4
 - en-Jahresrueckblick_des_CCC_h264-hq.mp4
 - Infrastructure_Review_h264-hq.mp4
 - Seidenstrasse_h264-hq.mp4
 - Hello_World__h264-hq.mp4
 - Forbidden_Fruit_h264-hq.mp4
 - Perfect_Paul_h264-hq.mp4
 - en-Mind-Hacking_mit_Psychedelika_h264-hq.mp4
 - de-30c3_Keynote_h264-hq.mp4
 - en-Amtliche_Datenschuetzer_Kontrolleure_oder_Papiertiger__h264-hq.mp4
 - de-To_Protect_And_Infect_Part_2_h264-hq.mp4
 
Buscar
Entradas Recientes
- Posts
 - Reemplazando la bateria del AirTag
 - OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
 - Docker Init
 - Kubernetes para profesionales
 - Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
 - Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
 - Mujeres hackers en ElevenPaths Radio
 - Creando certificados X.509 caducados
 - Generador de imágenes Docker para infosec
 



