Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https and ftp. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/mirrors/mirrors/cdn.media.ccc.de/congress/2018/slides-pdf/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
35c3-10023-stalking_spy_apps_doxing_digitale_gewalt_gegen_frauen.pdf249.2 KiB2019-01-13 18:06:48
35c3-9385-modeling_and_simulation_of_physical_systems_for_hobbyists.pdf274.9 KiB2019-01-13 18:20:25
35c3-10017-electronic_evicence_in_criminal_matters.pdf308.5 KiB2019-01-13 18:17:27
35c3-9792-quantum_mechanics.pdf390.9 KiB2019-01-13 18:06:32
35c3-10016-g10_bnd-gesetz_und_der_effektive_schutz_vor_grundrechten.pdf435.9 KiB2019-01-13 18:03:21
35c3-9492-wallet_security.pdf520.2 KiB2019-01-13 18:17:14
35c3-10028-feminist_perspectives.pdf616.6 KiB2019-01-13 18:15:28
35c3-9733-was_schutzt_eigentlich_der_datenschutz.pdf659.9 KiB2019-01-13 18:17:12
35c3-9596-no_evidence_of_communication_and_morality_in_protocols_off-the-record_protocol_version_4.pdf764.6 KiB2019-01-13 18:18:56
35c3-9941-how_facebook_tracks_you_on_android.pdf956.8 KiB2019-01-13 18:19:01
35c3-9532-kernel_tracing_with_ebpf.pdf1.0 MiB2019-01-13 18:25:44
35c3-9346-in_soviet_russia_smart_card_hacks_you.pdf1.1 MiB2019-01-13 18:19:38
35c3-9486-hebocon.pdf1.5 MiB2019-01-13 18:17:32
35c3-9686-die_dreckige_empirie.pdf1.7 MiB2019-01-13 18:17:19
35c3-9653-russia_vs_telegram_technical_notes_on_the_battle.pdf1.9 MiB2019-01-13 18:17:26
35c3-9561-first_sednit_uefi_rootkit_unveiled.pdf2.4 MiB2019-01-13 18:05:11
35c3-9419-explaining_online_us_political_advertising.pdf2.5 MiB2019-01-13 18:12:09
35c3-9648-micropython_python_for_microcontrollers.pdf3.1 MiB2019-01-13 18:19:29
35c3-9498-dissecting_broadcom_bluetooth.pdf3.3 MiB2019-01-13 18:25:02
35c3-9599-locked_up_science.pdf3.3 MiB2019-01-13 18:05:03
35c3-9703-supermuc-ng.pdf3.5 MiB2019-01-13 18:14:37
35c3-9446-sd-wan_a_new_hop.pdf3.6 MiB2019-01-13 18:11:29
35c3-9800-how_to_teach_programming_to_your_loved_ones.pdf3.9 MiB2019-01-13 18:12:22
35c3-10012-transhuman_expression.pdf4.0 MiB2019-01-13 18:24:06
35c3-9720-frontex_der_europaische_grenzgeheimdienst.pdf4.2 MiB2019-01-13 18:06:45
35c3-9812-a_farewell_to_soul-crushing_code.pdf4.2 MiB2019-01-13 18:15:12
35c3-9400-matrix_the_current_status_and_year_to_date.pdf4.3 MiB2019-01-13 18:22:11
35c3-9898-mehr_schlecht_als_recht_grauzone_sicherheitsforschung.pdf5.0 MiB2019-01-13 18:22:25
35c3-9664-kosmische_teilchenbeschleuniger_und_ihre_spuren_in_der_antarktis.pdf5.3 MiB2019-01-13 18:19:16
35c3-9877-censored_planet_a_global_censorship_observatory.pdf6.0 MiB2019-01-13 18:03:58
35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption.pdf6.3 MiB2019-01-13 18:03:40
35c3-9917-election_cybersecurity_progress_report.pdf6.5 MiB2019-01-13 18:01:58
35c3-9838-genom-editierung_mit_crispr_cas.pdf6.5 MiB2019-01-13 18:04:18
35c3-9410-libresilicon.pdf6.7 MiB2019-01-13 18:10:48
35c3-9965-what_is_good_technology.pdf7.0 MiB2019-01-13 18:14:58
35c3-9851-conquering_large_numbers_at_the_lhc.pdf7.2 MiB2019-01-13 18:18:54
35c3-9971-the_critical_making_movement.pdf7.3 MiB2019-01-13 18:18:33
35c3-9882-the_foodsaving_grassroots_movement.pdf7.8 MiB2019-01-13 18:24:53
35c3-9517-provable_security.pdf8.1 MiB2019-01-13 18:21:34
35c3-9993-media_disruption_led_by_the_blind.pdf8.4 MiB2019-01-13 18:24:31
35c3-9671-self-encrypting_deception.pdf8.6 MiB2019-01-13 18:21:58
35c3-9926-the_year_in_post-quantum_crypto.pdf9.7 MiB2019-01-13 18:15:57
35c3-9734-information_biology_-_investigating_the_information_flow_in_living_systems.pdf9.9 MiB2019-01-13 18:11:18
35c3-9383-compromising_online_accounts_by_cracking_voicemail_systems.pdf10.0 MiB2019-01-13 18:07:19
35c3-9463-attacking_end-to-end_email_encryption.pdf10.8 MiB2019-01-13 18:12:01
35c3-9614-inside_the_amd_microcode_rom.pdf11.4 MiB2019-01-13 18:04:53
35c3-9768-open_source_orgelbau.pdf11.7 MiB2019-01-13 18:25:41
35c3-9386-introduction_to_deep_learning.pdf12.1 MiB2019-01-13 18:02:40
35c3-9545-venenerkennung_hacken.pdf12.8 MiB2019-01-13 18:03:19
35c3-9483-web-based_cryptojacking_in_the_wild.pdf15.0 MiB2019-01-13 18:20:23
35c3-9765-remo2hbo_-robustes_und_reparierbares_vitalparametermonitoring.pdf15.8 MiB2019-01-13 18:21:11
35c3-9758-hacking_the_human_microbiome.pdf19.1 MiB2019-01-13 18:23:21
35c3-9915-projekt_hannah.pdf24.6 MiB2019-01-13 18:17:10
35c3-9358-chaos_im_fernsehrat.pdf25.8 MiB2019-01-13 18:06:30
35c3-9913-going_deep_underground_to_watch_the_stars.pdf28.9 MiB2019-01-13 18:10:28
35c3-9456-hacking_ecology.pdf31.2 MiB2019-01-13 18:09:00
35c3-9775-how_medicine_discovered_sex.pdf40.9 MiB2019-01-13 18:14:26