Help Us Translate 33c3

As in previous years, all talks at 33c3 are going to be simultaneously translated from English to German (and vice-versa). Because talks cover such a huge array of topics, we like to prepare a glossary for each talk. If you’re speaking at the congress, you can really help us out by submitting any documents that can help us prepare a glossary, such as presentation slides or a manuscript.

To get started, choose your talk from the list below.

0en & 1en auf dem Acker

Fritz Herzrasen, Lisa Tschorn · No files uploaded

The 12 Networking Truths

Jonas Lund · No files uploaded

Der 33 Jahrerückblick

maxigas, mel · No files uploaded

33C3 Closing Ceremony

Nicolas Wöhrl, @ReinhardRemfort · No files uploaded

33C3 Infrastructure Review

Leon · No files uploaded

33C3 Opening Ceremony

anna, elisa · No files uploaded

Anthropology for kids - What is privacy?

Nika Dubrovsky · No files uploaded

ATMs how to break them to stop the fraud

Olga Kochetova, Alexey Osipov · No files uploaded

Back to the 16bit Era

kirschju · No files uploaded

Berechnete Welt

Karl Urban · No files uploaded

Beyond Virtual and Augmented Reality

Kai Kunze · No files uploaded

Bonsai Kitten waren mir lieber - Rechte Falschmeldungen in sozialen Netzwerken

fraulutz, NoAverageRobot · No files uploaded

Bootstraping a slightly more secure laptop

Trammell Hudson · No files uploaded

Build your own NSA

Andreas Dewes, @sveckert · No files uploaded

Building a high throughput low-latency PCIe based SDR

ipse, Sergey Kostanbaev · No files uploaded

Building Custom Pinball Machines

jab · No files uploaded

CCC-Jahresrückblick 2016

frank, Linus Neumann, Constanze Kurz, nexus · No files uploaded

Check Your Police Record!

RA Ulrich Kerner · No files uploaded

The Clash of Digitalizations

Saud Al-Zaid · No files uploaded

Code BROWN in the Air

miaoski · No files uploaded

Console Hacking 2016

marcan · No files uploaded

Copywrongs 2.0

Julia Reda · No files uploaded

Corporate surveillance, digital tracking, big data & privacy

wchr · No files uploaded

A Data Point Walks Into a Bar

Lisa Charlotte Rost · 1 file uploaded

Datenschutzgrundverordnung: Rechte für Menschen, Pflichten für Firmen & Chancen für uns

derPUPE · No files uploaded

Decoding the LoRa PHY

Matt Knight · No files uploaded

Deploying TLS 1.3: the great, the good and the bad

Filippo Valsorda · No files uploaded

Dieselgate – A year later

Daniel Lange (DLange) · No files uploaded

Dissecting HDMI

Tim 'mithro' Ansell · No files uploaded

Dissecting modern (3G/4G) cellular modems

LaForge, holger · No files uploaded

Do as I Say not as I Do: Stealth Modification of Programmable Logic Controllers I/O by Pin Control Attack

Ali Abbasi, Majid · No files uploaded

Downgrading iOS: From past to present

tihmstar · No files uploaded

The DROWN Attack

Sebastian Schinzel · No files uploaded

Durchmarsch von Rechts

Friedrich Burschel · No files uploaded

Eavesdropping on the Dark Cosmos

Simon Barke · No files uploaded

The Economic Consequences of Internet Censorship

Toni · No files uploaded

Edible Soft Robotics

Kari Love · No files uploaded

Eine kleine Geschichte der Parlamentsschlägerei

Joachim Schautenbach, Pia Fortunata · No files uploaded

Einführung zu Blockchains

vimja · No files uploaded

An Elevator to the Moon (and back)

Markus Landgraf · No files uploaded

Es sind die kleinen Dinge im Leben

André Lampe · No files uploaded

Ethics in the data society

mayameme · No files uploaded

Everything you always wanted to know about Certificate Transparency

Martin Schmiedecker · No files uploaded

Exploiting PHP7 unserialize

Yannay Livneh · No files uploaded

The Fight for Encryption in 2016

Kurt Opsahl · No files uploaded

Fnord-Jahresrückblick

Fefe, frank · No files uploaded

Formal Verification of Verilog HDL with Yosys-SMTBMC

Clifford · No files uploaded

From Server Farm to Data Table

Ingrid Burrington · No files uploaded

Genetic Codes and what they tell us – and everyone else

_Adora_Belle_ · No files uploaded

Geolocation methods in mobile networks

Erik · No files uploaded

Germany after Snowden: Is Data-Protection-Friendly Germany fighting State Surveillance?

anna, Andre Meister · No files uploaded

The Global Assassination Grid

Cian Westmoreland · No files uploaded

Gone in 60 Milliseconds

Rich Jones · No files uploaded

Hacking collective as a laboratory

Ezi · No files uploaded

Hacking Reality

Kate Genevieve · No files uploaded

Hacking the World

Claudio "nex" Guarnieri · No files uploaded

Haft für Whistleblower?

RA Ulrich Kerner · No files uploaded

Hebocon

Konfusius · No files uploaded

The High Priests of the Digital Age

catchthewhistle · No files uploaded

Hochsicherheits-Generalschlüssel Marke Eigenbau

Michael Weiner, RFguy · No files uploaded

How Do I Crack Satellite and Cable Pay TV?

Chris Gerlinsky · No files uploaded

How do we know our PRNGs work properly?

Vladimir Klebanov, Felix Dörre · No files uploaded

How physicists analyze massive data: LHC + brain + ROOT = Higgs

Axel · No files uploaded

In Search of Evidence-Based IT-Security

hanno · No files uploaded

Intercoms Hacking

Sebastien Dudek · No files uploaded

International exchange of tax information

taxman · No files uploaded

Interplanetary Colonization

Liz George, Peter Buschkamp · No files uploaded

Irren ist staatlich

Arne Semsrott · No files uploaded

JODI - Apache is functioning normally

DI, JO · No files uploaded

Kampf dem Abmahnunwesen

Beata Hubrig, erdgeist · No files uploaded

Keys of Fury

raquel meyers · No files uploaded

Lasers in the sky (with asteroids)

Peter Buschkamp · No files uploaded

Law Enforcement Are Hacking the Planet

Joseph Cox · No files uploaded

Liberté, Égalité, Fraternité... and privacy ?!

Agnes, Christopher Talib · No files uploaded

Lightning Talks Day 2

gedsic · No files uploaded

Lightning Talks Day 3

gedsic · No files uploaded

Lightning Talks Day 4

gedsic · No files uploaded

Lockpicking in the IoT

Ray · No files uploaded

A look into the Mobile Messaging Black Box

Roland Schilling, Frieder Steinmetz · No files uploaded

Machine Dreams

Joscha · No files uploaded

Make the Internet Neutral Again

Thomas Lohninger, Christopher Talib · No files uploaded

Make Wi-Fi fast again

Hendrik Lüth · No files uploaded

Making Technology Inclusive Through Papercraft and Sound

bunnie · No files uploaded

Mass Surveillance through Computational Linguistics and Human Language Technology

hernani · No files uploaded

Memory Deduplication: The Curse that Keeps on Giving

Ben Gras, Kaveh Razavi, brainsmoke, Antonio Barresi · No files uploaded

Methodisch inkorrekt!

Nicolas Wöhrl, @ReinhardRemfort · No files uploaded

Million Dollar Dissidents and the Rest of Us

wrm, John Scott-Railton · No files uploaded

The Moon and European Space Exploration

Jan Wörner · No files uploaded

Netzpolitik in der Schweiz 2016

Hakuna MaMate · No files uploaded

Netzpolitik in Österreich

Thomas Lohninger, Alexander Czadilek · No files uploaded

A New Dark Age

James Bridle · No files uploaded

The Nibbletronic

ctrapp · 3 files uploaded

Nicht öffentlich.

anna, Kai Biermann, Felix Betzin, Elisabeth Pleß, Johannes Wolf · No files uploaded

Nintendo Hacking 2016

derrek, nedwill, naehrwert · No files uploaded

No Love for the US Gov.

Jake Davis, Lauri Love · No files uploaded

No USB? No problem.

Xobs · 1 file uploaded

NSU Monologe

Bühne für Menschenrechte · No files uploaded

On Smart Cities, Smart Energy, And Dumb Security

Netanel Rubin · No files uploaded

On the Security and Privacy of Modern Single Sign-On in the Web

Guido Schmitz (gtrs), dfett · No files uploaded

Pegasus internals

Max Bazaliy · No files uploaded

Predicting and Abusing WPA2/802.11 Group Keys

Mathy Vanhoef · No files uploaded

Prediction Fail

ISR - Institute for Social Role Play · No files uploaded

Privatisierung der Rechtsdurchsetzung

Markus Beckedahl · No files uploaded

PUFs, protection, privacy, PRNGs

Pol Van Aubel · No files uploaded

radare demystified

pancake · No files uploaded

Rebel Cities

renataavila · No files uploaded

Recount 2016: An Uninvited Security Audit of the U.S. Presidential Election

Matt Bernhard, J. Alex Halderman · No files uploaded

Retail Surveillance / Retail Countersurveillance

Adam Harvey · No files uploaded

Reverse engineering Outernet

Daniel Estévez · No files uploaded

Routerzwang und Funkabschottung

Max Mehl · No files uploaded

Saving the World with (Vegan) Science

Benjamin Rupert · No files uploaded

SearchWing - Drones to find refugees in Mediterranean Sea

Steini, Ruben Neugebauer, benthor · No files uploaded

Security Nightmares 0x11

frank, Ron · No files uploaded

Shining some light on the Amazon Dash button

hunz · No files uploaded

Shut Up and Take My Money!

Vincent Haupert · No files uploaded

Software Defined Emissions

Felix „tmbinc“ Domke · No files uploaded

Space making/space shaping

Ulf Treger · No files uploaded

SpiegelMining – Reverse Engineering von Spiegel-Online

David Kriesel · No files uploaded

SpinalHDL : An alternative hardware description language

Dolu1990 · No files uploaded

Die Sprache der Populisten

Kai Biermann, Martin Haase/maha · No files uploaded

State of Internet Censorship 2016

Will Scott · No files uploaded

Stopping law enforcement hacking

Christopher Soghoian · No files uploaded

A Story of Discrimination and Unfairness

Aylin Caliskan · No files uploaded

Surveilling the surveillers

mare · No files uploaded

Syrian Archive

Syrian Archive · No files uploaded

Talking Behind Your Back

Vasilios Mavroudis, Federico Maggi · No files uploaded

Tapping into the core

mgoryachy, Mark Ermolov · No files uploaded

Technologien für und wider Digitale Souveränität

ruedi · No files uploaded

The Transhumanist Paradox

Xavier Flory · No files uploaded

The Ultimate Game Boy Talk

Michael Steil · No files uploaded

Understanding the Snooper’s Charter

Hendrik Obelöer · No files uploaded

The Universe Is, Like, Seriously Huge

Michael Büker · No files uploaded

Untrusting the CPU

jaseg · No files uploaded

Virtual Secure Boot

Gerd Hoffmann · No files uploaded

Visiting The Bear Den

Jessy Campos · No files uploaded

Von Alpakas, Hasenbären und Einhörnern – Über Anerkennungskultur

Maria Reimer, Daniel seitz, Paula Glaser, Robert Alisch · No files uploaded

Von Kaffeeriechern, Abtrittanbietern und Fischbeinreißern

Michaela Vieser · No files uploaded

Welcome to the Anthropocene?

KaLeiMai · No files uploaded

What could possibly go wrong with <insert x86 instruction here>?

Clémentine Maurice, Moritz Lipp · No files uploaded

What We Can Learn about Creativity from 3D Printing

Sascha Friesike · No files uploaded

What's It Doing Now?

Bernd Sieker · No files uploaded

Wheel of Fortune

Jos Wetzels, Ali Abbasi · No files uploaded

Where in the World Is Carmen Sandiego?

Karsten Nohl, Nemanja Nikodijevic · No files uploaded

The woman behind your WiFi

Anja Drephal · No files uploaded

Woolim – Lifting the Fog on DPRK’s Latest Tablet PC

Florian Grunow, Niklaus Schiess, Manuel Lubetzki · No files uploaded

A world without blockchain

Mark van Cuijk · No files uploaded

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet

Tobias Fiebig · No files uploaded

The Zcash anonymous cryptocurrency

pesco · No files uploaded

Zwischen Technikbegeisterung und kritischer Reflexion: Chaos macht Schule

benni, Dorina · No files uploaded