Ethics of Activist DDOS Actions

A Historical Analysis In the world of digital activism, distributed denial of service attacks present relatively low barriers to popular participation, have a high potential for attracting large numbers of […]

Ethics in Security Research

Recently, several research papers in the area of computer security were published that may or may not be considered unethical. Looking at these borderline cases is relevant as today’s research […]

On Breaking SAML

Be Whoever You Want to Be The Security Assertion Markup Language (SAML) is a widely adopted language for making security statements about subjects. It is a critical component for the […]

The Future of Protocol Reversing

Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]

FactHacks

RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]

Chaos: Opening Event

The Chaos Computer Club e. V. (CCC) is Europe’s largest association of hackers. For more than thirty years we are providing information about technical and societal issues, such as surveillance, […]

The Grand EU Data Protection Reform

The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]

Further Hacks on the Calypso Platform

OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]

Our Daily Job Hacking the Law

The key elements of policy hacking Legal systems have a huge impact on what we do as hackers, but also on internet users in general. Laws can restrict our freedom […]

The Tor Software Ecosystem

At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of […]