The Future of Protocol Reversing
Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]
FactHacks
RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]
Chaos: Opening Event
The Chaos Computer Club e. V. (CCC) is Europe’s largest association of hackers. For more than thirty years we are providing information about technical and societal issues, such as surveillance, […]
The Grand EU Data Protection Reform
The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]
Further Hacks on the Calypso Platform
OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]
Our Daily Job Hacking the Law
The key elements of policy hacking Legal systems have a huge impact on what we do as hackers, but also on internet users in general. Laws can restrict our freedom […]
The Tor Software Ecosystem

At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of […]
Hacking Cisco Phones
Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]
Page Fault Liberation Army
A History of Creative x86 Virtual Memory Uses The x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry […]
We Are All Lawmakers

How to further transparency by law – the Hamburg example and beyond In the Free City of Hamburg, which is one of 16 German states, a coalition of hackers, activists […]