39th Chaos Communication Congress (39C3): Power Cycles
The 39th Chaos Communication Congress — the annual four-day conference on technology, society and utopia organized by the Chaos Computer Club.
→ See editor’s top picks at 39th Chaos Communication Congress (39C3): Power Cycles
- A Tale of Two Leaks: How Hackers Breached the Great Firewall of China — Jade Sheffey
In this compelling talk at 39C3, Jade Sheffey, a PhD student at the University of Massachusetts Amherst, unveiled two significant breaches into the operational mechanisms of China's formidable…
- All Sorted by Machines of Loving Grace?: "AI", Cybernetics, and Fascism and how to Intervene — Katika Kühnreich
In her thought-provoking 39C3 presentation, Katika Kühnreich, a political scientist and China scientist with a philosophical background, dissects the intricate and often overlooked connections…
- The art of text (rendering) — Nicolas Rougier
Nicolas Rougier's talk, "The art of text (rendering)," delivered at 39C3, delves into the profound complexities and technical challenges of **real-time rendering** text, particularly in dynamic…
- Brennende Wälder und Kommentarspalten: Klimaupdate mit dem FragDenStaat Climate Helpdesk — Joschi Wolf
- Demystifying Fuzzer Behaviour — Addison
In this insightful talk, "Demystifying Fuzzer Behaviour," Addison, a PhD student and former teacher, challenges the prevailing, often uncritical, perception of fuzzing as a "magic box" solution for…
- ISDN + POTS Telephony at Congress and Camp — Harald "LaF0rge" Welte
Harald "LaF0rge" Welte's talk, "ISDN + POTS Telephony at Congress and Camp," delves into the ambitious project undertaken by the C3 ISDN team to establish and operate a fully functional, real-world…
- Zentrum für Politische Schönheit: Ein Jahr Adenauer SRP+ und der Walter Lübcke Memorial Park — Stefan Pelzer, Philipp Ruch
- Building hardware - easier than ever - harder than it should be — Kliment
In a compelling and often humorous address at 39C3, Kliment dismantled the pervasive myth that "hardware is hard," arguing instead that building electronics is more accessible and affordable than…
- FeTAp 611 unplugged: Taking a rotary dial phone to the mobile age — Michael Weiner
In an era dominated by sleek smartphones and ubiquitous digital communication, Michael Weiner's talk, "FeTAp 611 unplugged: Taking a rotary dial phone to the mobile age," presents a fascinating…
- Neuroexploitation by Design: Wie Algorithmen in Glücksspielprodukten sich Wirkweisen des Reinforcement Learning und dopaminergen Belohnungssystems zunutze machen — Elke Smith
- Who cares about the Baltic Jammer?: Terrestrial Navigation in the Baltic Sea Region — Lars, Niklas Hehenkamp, Markus
This talk, presented by researchers from the German Aerospace Center (DLR), delves into the critical vulnerabilities of Global Navigation Satellite Systems (GNSS), such as GPS and Galileo…
- Chaos macht Küche — Ingwer Andersen
- Developing New Medicines in the Age of AI and Personalized Medicine — Dennis Özcelik
Dennis Özcelik's talk at 39C3, "Developing New Medicines in the Age of AI and Personalized Medicine," provides a comprehensive and critical examination of the current state and future trajectory of…
- Endlich maschinenlesbare Urteile! : Open Access für Juristen — Beata Hubrig, Nuri Khadem-Al-Charieh
- Liberating Bluetooth on the ESP32 — Antonio Vázquez Blanco (Antón)
In this insightful talk, Antonio Vázquez Blanco, known as Antón, from Talogic Security, unveils his extensive work in reverse engineering the undocumented Bluetooth internals of the Espressif ESP32…
- KIM 1.5: Noch mehr Kaos In der Medizinischen Telematikinfrastruktur (TI) — Christoph Saatjohann
- Not an Impasse: Child Safety, Privacy, and Healing Together — Kate Sim
In "Not an Impasse: Child Safety, Privacy, and Healing Together," Kate Sim, Director of the Children's Online Safety and Privacy Research (COSPER) program, challenges the pervasive framing of online…
- Opening pAMDora's box and unleashing a thousand paths on the journey to play Beatsaber custom songs — tihmstar
This talk, presented by tihmstar at 39C3, delves into a comprehensive hardware hacking journey aimed at enabling custom Beat Saber songs on a commercial gaming console. While the ultimate goal might…
- RedScout42 – Zur digitalen Wohnungsfrage — Sandra, Leonard
- All my Deutschlandtickets gone: Fraud at an industrial scale — Q Misell, 551724 / maya boeckh
This talk, "All my Deutschlandtickets gone: Fraud at an industrial scale," delivered by Q Misell and 551724 / maya boeckh at 39C3, meticulously uncovers two distinct yet interconnected large-scale…
- Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot — stacksmashing, nsr
In an engaging and highly technical presentation at 39C3, security researchers Marius Muench (NNSA) and Thomas Roth (stacksmashing) unveiled their findings from the Raspberry Pi RP2350 hacking…
- Escaping Containment: A Security Analysis of FreeBSD Jails — ilja, Michael Smith
This talk, "Escaping Containment: A Security Analysis of FreeBSD Jails," delves deep into the security boundaries of FreeBSD jails, a long-standing and widely used containerization technology…
- Handy weg bis zur Ausreise: Wie Cellebrite ins Ausländeramt kam — Chris Köver
- To sign or not to sign: Practical vulnerabilities in GPG & friends — 49016, Liam
In this revealing talk from 39C3, security researchers Lexi (49016) and Liam delved deep into the often-assumed impenetrable world of **Pretty Good Privacy (PGP)** and its most prevalent…
- Die Känguru-Rebellion: Digital Independence Day — Marc-Uwe Kling, Linus Neumann
- Chatkontrolle: Ctrl+Alt+Delete — khaleesi, Markus Reuter
- Excuse me, what precise time is It? — Oliver Ettlin
Oliver Ettlin's talk, "Excuse me, what precise time is It?", delves into the critical role of **Precision Time Protocol (PTP)** in achieving highly accurate time synchronization across network…
- DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices — Zhongrui Li, Yizhe Zhuang, Kira Chen
This talk, presented by Zhongrui Li ("Nun"), Yizhe Zhuang, and Kira Chen from DarkMatter, provides a comprehensive technical analysis of recent zero-click attack chains targeting WhatsApp on both…
- Hacking washing machines — Severin von Wnuck-Lipinski, Hajo Noerenberg
In an engaging and highly technical presentation at 39C3, Severin von Wnuck-Lipinski and Hajo Noerenberg unveiled their extensive research into the often-overlooked security landscape of modern…
- Throwing your rights under the Omnibus: How the EU's reform agenda threatens to erase a decade of digital rights — Thomas Lohninger, Ralf Bendrath
This talk, delivered by Thomas Lohninger of APE Center Works and Ralf Bendrath of the European Parliament, critically examines the European Union's ambitious "simplification agenda," particularly…
- Bluetooth Headphone Jacking: A Key to Your Phone — Dennis Heinze, Frieder Steinmetz
In this compelling talk, "Bluetooth Headphone Jacking: A Key to Your Phone," Dennis Heinze and Frieder Steinmetz from ERW, a German security company, unveil a critical vulnerability ecosystem…
- Breaking architecture barriers: Running x86 games and apps on ARM — Tony Wasserka
In a compelling presentation at 39C3, Tony Wasserka unveiled the intricacies and triumphs of Fex, an open-source x86 emulator designed to run proprietary x86 applications and games on ARM-based…
- Coding Dissent: Art, Technology, and Tactical Media — Helena Nikonole
- AI-generated content in Wikipedia - a tale of caution — Mathias Schindler
In an era increasingly shaped by artificial intelligence, Mathias Schindler, a veteran Wikipedian and co-founder of Wikimedia Germany, delivered a crucial talk at 39C3 titled "AI-generated content…
- Building a NOC from scratch — lilly
- From Silicon to Darude Sand-storm: breaking famous synthesizer DSPs — giulioz
This talk, "From Silicon to Darude Sand-storm: breaking famous synthesizer DSPs," delves into the intricate process of reverse engineering proprietary Digital Signal Processor (DSP) chips found in…
- Digitale Inklusion: Wie wir digitale Barrierefreiheit für alle erreichen können — Jakob Sponholz, Kathrin Klapper, Lena Christina Müller
- Hatupangwingwi: The story how Kenyans fought back against intrusive digital identity systems — Mustafa Mahmoud Yousif
Mustafa Mahmoud Yousif's talk, "Hatupangwingwi: The story how Kenyans fought back against intrusive digital identity systems," delivered at 39C3, chronicles a decade-long struggle by Kenyan civil…
- Neue Chaos Events: InselChaos und Håck ma’s Castle plaudern aus dem Nähkästchen — Erwin Ernst "eest9" Steinhammer, lasii, Daniel, Niklas
- Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots — Shipei Qu, Zikai Xu, Xuangan Xiao
This talk, "Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots," delivered by the Dark Navy team at 39C3, presents a comprehensive security analysis of modern…
- Suing spyware in Europe: news from the front! — Lori Roussey, Celia/Irídia
This talk, "Suing spyware in Europe: news from the front!", delivered by Lori Roussey of Data Rights and Celia from Irídia, delves into the escalating use of mercenary surveillance tools like…
- A post-American, enshittification-resistant internet — Cory Doctorow
In his compelling 39C3 talk, "A post-American, enshittification-resistant internet," long-time Electronic Frontier Foundation (EFF) activist Cory Doctorow delivers a powerful indictment of modern…
- A space odyssey #2: How to study moon rocks from the Soviet sample return mission Luna 24 — Paul Koetter
This talk, "A space odyssey #2: How to study moon rocks from the Soviet sample return mission Luna 24," delivered by Paul Koetter at 39C3, offers a fascinating glimpse into the cutting-edge…
- Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents — Johann Rehberger
In this insightful talk from 39C3, Johann Rehberger, a security researcher focused on machine learning and AI, delves into the critical and rapidly evolving threat landscape surrounding **agentic AI…
- selbstverständlich antifaschistisch!: Aktuelle Informationen zu den Verfahren im Budapest-Komplex - von family & friends Hamburg — Andreas family & friends Hamburg, Birgit family & friends Hamburg
- Chaos Communication Chemistry: DNA security systems based on molecular randomness — Anne Lüscher
In this captivating talk, Anne Lüscher, a Postdoc at the Institute for Chemical and Bioengineering at ETH Zurich, introduces the audience to the burgeoning field of DNA information technology…
- Chaospager: How to construct an Open Pager System for c3 — Max, Julian
This talk, "Chaospager: How to construct an Open Pager System for C3," delves into the ambitious project of developing an entirely custom, open-source pager system designed specifically for…
- Live, Die, Repeat: The fight against data retention and boundless access to data — Klaus Landefeld
Klaus Landefeld's talk, "Live, Die, Repeat: The fight against data retention and boundless access to data," delves into the persistent and escalating battle against mandatory data retention…
- Power Cycle B7 oder Warum kauft man eine Zeche? — Kohlenpod, kater, Stephan
- Amateurfunk im All – Kontakt mit Fram2 — akira25, flx, Gato
- Cracking open what makes Apple's Low-Latency WiFi so fast — Henri Jäger
This talk, presented by Henri Jäger, delves into the intricate mechanisms behind Apple's proprietary **low-latency Wi-Fi** (LLW) technology, which underpins many of the company's "Continuity"…
- Auf die Dauer hilft nur Power: Herausforderungen für dezentrale Netzwerke aus Sicht der Soziologie — Marco Wähner
- Persist, resist, stitch — Philo
Philo's compelling talk, "Persist, resist, stitch," delves into the often-overlooked history and profound significance of textile crafts as tools for **steganography**, **resistance**, and…
- A Quick Stop at the HostileShop — Mike Perry
In "A Quick Stop at the HostileShop," Mike Perry delivers a compelling and deeply technical exploration into the evolving landscape of Large Language Model (LLM) agent security. The talk centers on…
- Current Drone Wars — Leonard
Leonard's thought-provoking talk, "Current Drone Wars," delivered at 39C3, plunged into the rapidly evolving landscape of modern warfare, where unmanned combat vehicles, or drones, are redefining…
- Amtsgeheimnis raus, Datenhalde rein: Was die Informationsfreiheit in Österreich bringt — Markus (fin) Hametner, Erwin Ernst "eest9" Steinhammer
- CPU Entwicklung in Factorio: Vom D-Flip-Flop bis zum eigenen Betriebssystem — PhD (Philipp)
- How to render cloud FPGAs useless — Dirk
In this compelling talk from 39C3, Dirk, a researcher from the novel computing technologies group, delves into the vulnerabilities of Field-Programmable Gate Arrays (FPGAs) when deployed in cloud…
- In-house electronics manufacturing from scratch: How hard can it be? — Augustin Bielefeld, Alexander Willer
In this compelling talk at 39C3, Augustin Bielefeld and Alexander Willer share their arduous yet enlightening journey into the world of **DIY electronics manufacturing from scratch**. Driven by a…
- Recharge your batteries with us: – an empowering journey through the energy transition — Salacidre, JulianeB
This talk, "Recharge your batteries with us: – an empowering journey through the energy transition," delivered by JulianeB and Salacidre at 39C3, offers a much-needed optimistic perspective on the…
- Verlorene Domains, offene Türen: Was alte Behördendomains verraten — Tim Philipp Schäfers (TPS)
- Don’t look up: There are sensitive internal links in the clear on GEO satellites — Nadia Heninger, Annie Dai
In a revealing talk at 39C3, Nadia Heninger and Annie Dai presented their groundbreaking research into the unencrypted data streams broadcast from geostationary (GEO) satellites. Their work…
- How To Minimize Bugs in Cryptography Code — Jade
In this insightful talk, Jade tackles a critical challenge in cybersecurity: minimizing bugs in cryptography code. While the common adage "don't roll your own crypto" rightly advises developers to…
- Textiles 101: Fast Fiber Transform — octoprog
In "Textiles 101: Fast Fiber Transform," octoprog, also known as Lionus, delivered a comprehensive and engaging primer on the vast world of textiles. Presented at the 39th Chaos Communication…
- 51 Ways to Spell the Image Giraffe: The Hidden Politics of Token Languages in Generative AI — Ting-Chun Liu, Leon-Etienne Kühr
This talk, "51 Ways to Spell the Image Giraffe," delves into the often-overlooked yet foundational process of **tokenization** in generative AI, particularly its profound impact on text-to-image…
- When Vibe Scammers Met Vibe Hackers: Pwning PhaaS with Their Own Weapons — Chiao-Lin Yu (Steven Meow)
- Xous: A Pure-Rust Rethink of the Embedded Operating System — bunnie, Sean "xobs" Cross
This talk introduces Xous, a groundbreaking embedded operating system (OS) written entirely in Rust, designed to address the pervasive memory insecurity in low-cost embedded and IoT devices…
- Reverse engineering the Pixel TitanM2 firmware — willem
In this insightful talk at 39C3, independent researcher willem delved into the intricacies of Google's **Titan M2** security chip, a critical component embedded within modern Pixel phones. The Titan…
- The Small Packet of Bits That Can Save (or Destabilize) a City — Manuel Rábade
Manuel Rábade's 39C3 talk, "The Small Packet of Bits That Can Save (or Destabilize) a City," delves into the fascinating and critical infrastructure of Mexico City's Seismic Alert System (SAS). This…
- Design for 3D-Printing — rahix
In this insightful talk, "Design for 3D-Printing," rahix challenges the common perception that 3D printing is an unpredictable, hit-or-miss manufacturing process. He argues that by understanding and…
- Greenhouse Gas Emission Data: Public, difficult to access, and not always correct — Hanno Böck
In this compelling talk, independent researcher Hanno Böck exposes the significant challenges and alarming inaccuracies prevalent in publicly available greenhouse gas (GHG) emission data. Addressing…
- The Museum of Care: Open-Source Survival Kit Collection — Nika Dubrovsky
This talk, "The Museum of Care: Open-Source Survival Kit Collection," delivered by Nika Dubrovsky and Alistair Parvin at 39C3, presents a radical vision for alternative institutions rooted in…
- Celestial navigation with very little math — Trammell Hudson
In an era dominated by ubiquitous Global Positioning System (GPS) technology, the art of celestial navigation might seem like a relic of the past. However, Trammell Hudson's engaging talk…
- Hacking Karlsruhe - 10 years later — Jürgen Bering
- BE Modded: Exploring and hacking the Vital Bracelet ecosystem — cyanic
In this insightful talk from 39C3, security researcher cyanic takes attendees on a deep dive into the **Bandai Vital Bracelet** ecosystem, a series of fitness-tracking toys that allow users to raise…
- Teckids – eine verstehbare (digitale) Welt — Keno, Darius Auding
- What Makes Bike-Sharing Work?: Insights from 43 Million Kilometers of European Cycling Data — Martin Lellep, Georg Balke, Felix Waldner
Bike-sharing systems present a fascinating paradox: on one hand, images of neglected, broken, or discarded bikes are common; on the other, many cities see significant investment in and successful…
- Watch Your Kids: Inside a Children's Smartwatch — Nils Rollshausen
In an era where digital devices are increasingly integrated into every aspect of life, even children are equipped with smartwatches promising safety and connectivity. Nils Rollshausen's talk, "Watch…
- Wer hat Angst vor dem Neutralitätsgebot? — Hannah Vos, Vivian Kube
- When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU — girst (Tobi)
In an era dominated by multi-core processors, gigabytes of RAM, and cloud-native applications, Tobi (girst), a network engineer by profession, presented a captivating journey into the extreme…
- Programmierte Kriegsverbrechen?: Über KI-Systeme im Kriegseinsatz in Gaza und warum IT-Fachleute sich dazu äußern müssen — Rainer Rehak
- Supplements und Social Media – wenn der Online-Hype zur realen Gesundheitsgefahr wird — Christoph Wiedmer
- APT Down and the mystery of the burning data centers — Christopher Kunz, Sylvester
This talk, "APT Down and the mystery of the burning data centers," delves into the intricate and alarming details of a significant cybersecurity leak concerning South Korean government and corporate…
- Gegenmacht - Best of Informationsfreiheit — Arne Semsrott
- Von wegen Eisblumen! Wie man mit Code, Satelliten und Schiffsexpeditionen die bunte Welt des arktischen Phytoplanktons sichtbar macht — Moritz Zeising (er/he)
- Set-top box Hacking: freeing the 'Freebox' — Frédéric Hoguin
This talk, "Set-top box Hacking: freeing the 'Freebox'," presented by Frédéric Hoguin at 39C3, details a comprehensive journey into reverse engineering and exploiting the Freebox HD, a pioneering…
- The Last of Us - Fighting the EU Surveillance Law Apocalypse — Svea Windwehr, Chloé Berthélémy
In "The Last of Us - Fighting the EU Surveillance Law Apocalypse," Svea Windwehr and Chloé Berthélémy of European Digital Rights (EDRI) deliver a stark warning about the escalating and often…
- Wer liegt hier wem auf der Tasche?: Genug mit dem Bürgergeld-Fetisch. Stürmt die Paläste! — Helena Steinhaus
- AI Agent, AI Spy — Udbhav Tiwari, Meredith Whittaker
In their compelling 39C3 talk, "AI Agent, AI Spy," Meredith Whittaker and Udbhav Tiwari from Signal presented a stark warning about the integration of so-called AI agents into operating systems…
- Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU — Romain Malmain
This talk, presented by Romain Malmain at 39C3, delves into the intricate process of building a comprehensive emulated Android phone environment, specifically targeting the Qualcomm GPU kernel…
- Netzpolitik in der Schweiz: Zwischen Bodensee und Matterhorn — Kire, Rahel
- The Angry Path to Zen: AMD Zen Microcode Tools and Insights — Benjamin Kollenda
Benjamin Kollenda’s talk, "The Angry Path to Zen: AMD Zen Microcode Tools and Insights," presents a deep dive into the opaque world of AMD Zen microcode. Building on previous work on K8/K10…
- Blackbox Palantir — Constanze Kurz, Franziska Görlitz
- 10 years of Dieselgate — Felix Domke, Karsten Burger
A decade after the initial "Dieselgate" scandal rocked the automotive industry, security researchers Felix Domke and Karsten Burger revisit the pervasive issue of **defeat devices** in vehicle…
- The Heartbreak Machine: Nazis in the Echo Chamber — Martha Root, Eva Hoffmann, Christian Fuchs
- Light in the Dark(net) — Tobias Höller
Tobias Höller's talk, "Light in the Dark(net)," delves into the profound challenges of accurately measuring and interpreting activity on Tor's onion services, often colloquially referred to as the…
- The Spectrum - Hackspace Beyond Hacking — sjaelv, MultisampledNight
This talk introduces "The Spectrum," a groundbreaking **transdisciplinary and queer hackspace** that redefines the traditional concept of hacking. Presented by MultisampledNight, who brings a…
- Peep-Show für die Polizei. Staatliche Überwachung von Queers in Hamburger Toiletten bis 1980 — Simon Schultz
- Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM — Martin Heckel, Florian Adamsky, Daniel Gruss
This talk, presented by Martin Heckel, Florian Adamsky, and Daniel Gruss at 39C3, delves into the pervasive and evolving threat of **Rowhammer** attacks, leveraging insights from their large-scale…
- Von Fuzzern zu Agenten: Entwicklung eines Cyber Reasoning Systems für die AIxCC — Mischa Meier (mmisc), Annika Kuntze
- PRÜF — Nico Semsrott
- Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities — Thijs Raymakers
Eight years after the initial disclosures of **Spectre** and **Meltdown**, CPU vulnerabilities continue to challenge the fundamental security boundaries of modern computing. This talk, "Spectre in…
- Die große Datenschutz-, Datenpannen- und DS-GVO-Show — Alvar C.H. Freude
- Asahi Linux - Porting Linux to Apple Silicon — sven
This talk provides an in-depth look into the monumental effort of porting Linux to Apple Silicon Macs, a project known as Asahi Linux. Presented by Sven, a key contributor to the project, the talk…
- How to keep Open Source open without leaving our communities open to threats — Quintessence
In this compelling talk, Quintessence (Q), the Executive Director of the Nively Foundation, dissects a critical and often overlooked dimension of open source security: the human element. The…
- CCC&T - Cosmic ray, the Climate Catastrophe and Trains. — FantasticMisterFux, louiT
This talk, titled "CCC&T - Cosmic ray, the Climate Catastrophe and Trains," delves into innovative methodologies for measuring **soil moisture**, a critical parameter for understanding and…
- CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren — Lina Lastname, Elias Zeidler (Northernside)
- Fossile Industrie liebt KI! — Stefan, Yannik & Rike, Moritz Leiner
- Who runs the www? WSIS+20 and the future of Internet governance — Sophia Longwe
Sophia Longwe, a Project Manager in the public policy team of Wikimedia Germany, delivered a compelling talk at 39C3, addressing the fundamental question of "Who runs the worldwide web?" Her…
- Security Nightmares — Constanze Kurz, Ron