- Advanced microcontroller programming [26C3]
- After the Hype - The current state of One Laptop per Child and Sugar Labs [26C3]
- A Hacker's Utopia [26C3]
- A part time scientists' perspective of getting to the moon [26C3]
- Blackbox JTAG Reverse Engineering [26C3]
- Black Ops Of PKI [26C3]
- Building a Debugger [26C3]
- cat /proc/sys/net/ipv4/fuckups [26C3]
- CKAN: apt-get for the Debian of Data [26C3]
- Closing Event [26C3]
- Conlanging 101 [26C3]
- coreboot: Adding support for a system near you [26C3]
- Cybernetic Cannibalism [26C3]
- DDoS/botnet mitigation & hosting online communities [26C3]
- DECT (part II) [26C3]
- Defending the Poor - Preventing Flash Exploits [26C3]
- Exciting Tales of Journalists Getting Spied on, Arrested and Deported [26C3]
- Exposing Crypto Bugs through reverse engineering [26C3]
- Finding the key in the haystack [26C3]
- Fnord News Show 2009 [26C3; english translation]
- Fuzzing the Phone in your Phone [26C3]
- GSM: SRSLY? [26C3]
- Hacker Jeopardy 2009 [26C3]
- Hacking the universe [26C3]
- Here Be Electric Dragons [26C3]
- Homewreckery [26C3]
- How you can build an eavesdropper for a quantum cryptosystem [26C3]
- I, Internet [26C3]
- Legic Prime: Obscurity in Depth [26C3]
- Lightning Talks - Day 1 [26C3]
- Lightning Talks - Day 2 [26C3]
- Lightning Talks - Day 3 [26C3]
- Lightning Talks - Day 4 [26C3]
- Location tracking does scale up [26C3]
- Milkymist [26C3]
- Optimised to fail - Card readers for online banking [26C3]
- our darknet and its bright spots [26C3]
- Peanut Butter and Plastic: Industrial Revolution [26C3]
- Photography and the Art of Doing it Wrong [26C3]
- Playing with the Built City [26C3]
- Playing with the GSM RF Interface [26C3]
- Privacy & Stylometry [26C3]
- Privacy-Enhanced Event Scheduling [26C3]
- "Yes We Can't!" - on kleptography and cryptovirology [26C3]
- Reverse-Engineering DisplayLink devices [26C3]
- SCCP hacking, attacking the SS7 & SIGTRAN applications [26C3]
- secuBT - Hacking the Hackers with User-Space Virtualization [26C3]
- Stream: Security Nightmares 2009 [26C3, english translation]
- The Lost Cosmonauts [26C3]
- Tor and censorship: lessons learned [26C3]
- Understanding Telecommunication Interception: Intelligence Support Systems [26C3]
- Using OpenBSC for fuzzing of GSM handsets [26C3]
- Weaponizing Cultural Viruses [26C3]
- Why Germany Succeeded Where America Has Failed: Meaningful Voting Computer [26C3]
- Why Net Neutrality Matters? [26C3]
- WikiLeaks Release 1.0 [26C3]
- Wireless power transfer [26C3]