Chaos Communication Congress

The Chaos Communication Congress is an annual meeting of the international hacker scene, organised by the Chaos Computer Club.

The Congress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.

p

Conference information

Days until the next conference

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Location

Congress Center Hamburg
Am Dammtor / Marseiller Strasse
20355 Hamburg
Germany

Conference program

The conference program can be viewed here.

News

  • 12-11-2014 | 31C3 Call for Assemblies – Read more
  • 28-09-2014 | The 31C3 Wiki is online: Get ready and contribute! – Read more

CCH - Congress Center Hamburg

Articles

How secure is your security badge?

14-08-2014 | Nearly four years ago, researchers at the Chaos Communication Congress (CCC), a security conference in Berlin, released a paper (PDF) demonstrating a serious vulnerability in smart cards made by Austin, Texas-based HID Global, by far the largest manufacturer of these devices. The CCC researchers showed that the card reader device that HID sells to validate the data stored on its then-new line of iClass proximity cards includes the master encryption key needed to read data on those cards. Read more

Cash machines raided with infected USB sticks

30-12-2013 | Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year. The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank’s cash dispensers were presented at the hacker-themed Chaos Communication Congress in Hamburg. Read more

WikiLeaks’ Julian Assange calls on computer hackers to unite against NSA surveillance

31-12-2013 | WikiLeaks founder Julian Assange addressed a major gathering of computer experts Monday at the Chaos Communication Congress in Hamburg, Germany, calling on them to join forces in resisting government intrusions on Internet freedom and privacy. Read more

Flash memory cards contain powerful, unsecured microcontrollers

31-12-2013 | Researchers demonstrated yesterday at the Chaos Communication Congress in Hamburg that they could write arbitrary code onto various SD memory cards, a hack that could give attackers the ability to perform man-in-the-middle attacks on devices housing the cards, as well as give users access to an inexpensive source of powerful and programmable microcontrollers. Read more

Available videos

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

We describe the design of the Xbox 360 security system from a very high-legel point of view. In the second part we will discuss the details of the Xbox 360 system and security architecture.

29C3: Russia’s surveillance state

29C3: Russia’s surveillance state

Privacy International, Agentura.Ru and Citizen Lab have joined forces to launch a new project ‘Russia’s Surveillance State’. The project aims to undertake research and investigation into surveillance practices in Russia.

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

The “European Great Firewall” was the way that European civil rights organizations has addressed the proposal to create a “single European cyberspace”. This lecture will describe a vulnerability that the proposal reveals in the power structures of the European and world governance.

RFID hacking

RFID hacking

Learn about the security and social aspects of RFID technology

25C3: Hacking the iPhone

25C3: Hacking the iPhone

This talk will summarize what we have learned about the internal architecture of the iPhone platform, its security, and the ways we have found to defeat these security measures.

29C3 GSM: Cell phone network review

29C3 GSM: Cell phone network review

We will describe the process of setting up the test network we operate at 29C3, what legal and technical challenges we have faced, and we will describe the actual installation at the CCH.

27C3: Chip and PIN is Broken (EN)

27C3: Chip and PIN is Broken (EN)

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

29C3: We are all lawmakers!

29C3: We are all lawmakers!

In the Free City of Hamburg a coalition of hackers, activists and other players of civil society have drafted the most revolutionary Freedom of information law in the world.

24C3: Cybercrime 2.0

24C3: Cybercrime 2.0

The first part of the talk provides a brief history of Storm Worm focusing on the actual propagation phase. Afterwards we describe the network communication of the bot in detail and show how we can learn more about the botnet.

Tweets