Isn’t it frustrating when you realize you have nothing in common with someone? Wouldn’t you like to just force them to like the things you like!? In “flip it & reverse it” we’ll do just that. Week to week we’ll switch and reverse who controls the topic. You can expect anything from sports to trashy reality tv! Check us out on instagram!@therealjasminesherman @ask_why_not Support this podcast: https://podcasters.spotify.com/pod/show/jasmine-sherman/support
…
continue reading
Flip It Reverse Podcasts
This podcast will help you Understand the Times, Stand for Truth and Grow in Your Faith. It will bring you the truth behind the headlines and equip your faith to navigate the cultural chaos of today. Each week you'll hear a devotional-style episode that will edify your faith in a refreshingly practical and actionable way, and you'll hear an episode that will reveal the meaning behind current events. This show will also bring you engaging interviews on important topics. God is on the move rig ...
…
continue reading
Tim Ferriss is a self-experimenter and bestselling author, best known for The 4-Hour Workweek, which has been translated into 40+ languages. Newsweek calls him "the world's best human guinea pig," and The New York Times calls him "a cross between Jack Welch and a Buddhist monk." In this show, he deconstructs world-class performers from eclectic areas (investing, chess, pro sports, etc.), digging deep to find the tools, tactics, and tricks that listeners can use.
…
continue reading
A daily show for everyone who works a regular job and wants to start an income-earning project on the side. In each episode, listeners will hear a different story of someone who's started a side hustle—along with what went well, how that person overcame challenges, and what happened as a result. The show is written and hosted by Chris Guillebeau, the New York Times bestselling author of The $100 Startup, The Happiness of Pursuit, and other books. Sales and Distribution by Lemonada Media http ...
…
continue reading
Tiffany Parker and Megan Papageorge share their wedding planning expertise while making light of the seriousness of all things matrimony. Planning a wedding can be stressful but taking a moment to learn, laugh and sometimes say f*ck it makes the process a whole lot easier (and more fun) to handle.
…
continue reading
We have one single mission: Help women find ease, meaning and joy at work and in life. We use our experiences as business owners, entrepreneurs, mentors and inspirational leaders to explore topics that all working women care about: shitty bosses; smashing the patriarchy; balancing work and life; navigating change and getting what you want! We guarantee that you will be entertained and inspired... promise!
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Join Saadia Khan on Immigrantly, the award-winning podcast that dives deep into immigrant narratives and the messy beauty of identity, race, and belonging in America today. Each week, Saadia, a human rights activist, social entrepreneur, and proud cat mom, hosts unfiltered conversations with diverse voices: artists, academics, cultural disruptors, and everyday people with extraordinary cultural stories. At Immigrantly, we go beyond surface-level diversity to explore how culture, immigration, ...
…
continue reading
Sobriety podcast featuring real addiction recovery stories and practical tools that actually work. I'm Will Gordon. Boston school teacher, two-time organ transplant survivor, and a guy who used to hide vodka bottles in places I don't even like remembering. At 35, my liver and kidneys were done. Doctors said weeks, maybe less. Transplants gave me a second shot. Sobriety gave me everything else. This isn't some shiny recovery show. It's raw conversations about what addiction actually feels lik ...
…
continue reading
Learn exactly how to talk to girls, how to approach women, how to get a girlfriend, how to get out of the friend zone, how to get a girl's phone number, how to build attraction, how to master the dating apps, and how to have sex with the women you want — all while becoming the most confident, masculine, and powerful version of yourself. Hosted by Mark Sing, an elite NLP dating coach for men, this show breaks down everything you need to master seduction, attraction, masculine frame, confidenc ...
…
continue reading
1
Och Menno X Disconnected Unexpected : Elbonian Incident Response : Wie reagiere ich falsch (39c3)
1:22:42
1:22:42
Play later
Play later
Lists
Like
Liked
1:22:42Jeder redet darüber wie man eine Krise optimal bearbeitet. Bei Disconnected Unexpected geht es ja darum das das Publikum ein Szenario in den Raum wirft und Teams versuchen eine optimale Lösung zu finden. Bei Och Menno geht es darum das Sachen schief gehen. In der großen Nation Elbonien geht es darum das immer die komplizierteste, gerechtfertigte Lö…
…
continue reading
1
APT Down and the mystery of the burning data centers (39c3)
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42In August 2025 Phrack published the dump of an APT member's workstation. It was full of exploits and loot from government networks, cell carriers and telcos. The dump sparked a government investigation, and corpos like LG and Korea Telecom were asked to explain themselves. Hours before an onsite audit, the data center mysteriously caught fire, dest…
…
continue reading
1
Programmierte Kriegsverbrechen? Über KI-Systeme im Kriegseinsatz in Gaza und warum IT-Fachleute sich dazu äußern müssen (39c3)
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09Die automatisierten Zielsysteme des israelischen Militärs zeigen gut, wie KI-baserte Kriegsautomatisierung aktuell aussieht, was daran falsch läuft und warum wir Techies uns einmischen müssenDas Thema „KI in der Militärtechnik“ und die Beziehung zwischen Mensch und Maschine ist seit Jahrzehnten ein Thema in der Friedensbewegung, der Konfliktforschu…
…
continue reading
1
Supplements und Social Media – wenn der Online-Hype zur realen Gesundheitsgefahr wird (39c3)
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32Nicht zuletzt durch die Werbung in den sozialen Medien werden in Deutschland immer mehr Nahrungsergänzungsmittel verkauft. Einige Influencer bringen sogar ihre eigenen Präparate auf den Markt. Gleichzeitig häufen sich Fälle, in denen die Einnahme von vermeintlich harmlosen „Supplements“ zu Gesundheitsschäden geführt hat. Der Vortrag will daher die …
…
continue reading
1
Learning from South Korean Telco Breaches (39c3)
49:14
49:14
Play later
Play later
Lists
Like
Liked
49:142025 was a bad year for South Korean mobile network operators. All three operators (SK Telecom, KT, LG U+) were affected by breach in some part of their respective network: HSS of SK Telecom, femtocells of KT. Meanwhile, handling of the breach by each operators and post-mortem analysis of each breaches have stark differences. The technical details …
…
continue reading
1
When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU (39c3)
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26Over the last half year I have explored the Motorola mc14500 - a CPU with a true one-bit architecture - and made it simulate Conway's Game of Life. This talk gives a look into how implementing a design for such a simplistic CPU can work, and how it's possible to address 256 LEDs and half a kiloword of memory with just four bits of address space.In …
…
continue reading
1
Shit for Future: turning human shit into a climate solution (39c3)
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06Humanity has already crossed the point where simply reducing emissions will no longer be enough to keep global warming below 2°C. According to the IPCC (AR6, WGIII), it is now essential to actively remove greenhouse gases from the atmosphere in order to meet global climate targets, maintain net-zero (or even net-negative emissions), and address the…
…
continue reading
1
Watch Your Kids: Inside a Children's Smartwatch (39c3)
36:44
36:44
Play later
Play later
Lists
Like
Liked
36:44Join us as we hack at a popular children's smartwatch and expose the secrets of every fifth child in Norway, their parents, and millions more.Smartwatches for children have entered the mainstream: Advertised on the subway and sold by your cell provider, manufacturers are charging premium prices comparable to an entry-level Apple watch.In exchange, …
…
continue reading
1
Wer hat Angst vor dem Neutralitätsgebot? (39c3)
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01Wer überhaupt „neutral“ sein muss, was das bedeutet, und wer sich jetzt wehren muss.„Neutralität“ wird zum neuen Kampfbegriff: Weil sie gegen die menschenfeindliche Politik von Friedrich Merz protestieren, wirft die CDU Gruppen wie Omas gegen Rechts, Greenpeace und Correctiv vor, nicht neutral zu sein. Unter Berufung auf ein angeblich verletztes Ne…
…
continue reading
1
BE Modded: Exploring and hacking the Vital Bracelet ecosystem (39c3)
34:57
34:57
Play later
Play later
Lists
Like
Liked
34:57The Vital Bracelet series is an ecosystem of interactive fitness toys, content on memory chips, and apps that talk via NFC. In this talk, we'll explore the hardware and software of the series, from its obscure CPU architecture, to how it interacts with the outside world, from dumping OTP ROMs and breaking security, to making custom firmware.The Vit…
…
continue reading
1
Teckids – eine verstehbare (digitale) Welt (39c3)
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53Die Teckids-Gemeinschaft bringt Kinder, Jugendliche und Erwachsene zusammen, um gemeinsam aktiv für eine verstehbare (digitale) Welt zu sein.Bei Teckids geht es nicht "nur" um Technikbasteln und Programmieren mit Kindern, sondern darum, mit anderen, für andere, bei Events und gesellschaftlich aktiv zu werden.In letzter Zeit haben wir viele Projekte…
…
continue reading
1
What Makes Bike-Sharing Work? Insights from 43 Million Kilometers of European Cycling Data (39c3)
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23Bike- and e-bike-sharing promise sustainable, equitable mobility - but what makes these systems successful? Despite hundreds of cities operating thousands of shared bikes, trip data is rarely public. To address this, we built a geospatial analysis pipeline that reconstructs trip data from publicly accessible system status feeds. Using this method, …
…
continue reading
1
a media-almost-archaeology on data that is too dirty for "AI" (39c3)
37:55
37:55
Play later
Play later
Lists
Like
Liked
37:55when datasets are scaled up to the volume of (partial) internet, together with the idea that scale will average out the noise, large dataset builders came up with a human-not-in-the-loop, cheaper-than-cheap-labor method to clean the datasets: heuristic filtering. Heuristics in this context are basically a set of rules came up by the engineers with …
…
continue reading
1
Celestial navigation with very little math (39c3)
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38Learn how to find your position using a sextant and a custom slide rule, almost no math required!Since the dawn of time people have asked themselves: where am I and why am I here? This talk won't help you answer the why question, but it will discuss how determine the where in the pre-GPS age of sextants, slide rules and stopwatches by taking the no…
…
continue reading
3D-Printers have given us all the unprecedented ability to manufacture mechanical parts with a very low barrier to entry. The only thing between your idea and its physical manifestation is the process of designing the parts. However, this is actually a topic of incredible depth: Design engineering is a whole discipline to itself, built on top of to…
…
continue reading
1
Greenhouse Gas Emission Data: Public, difficult to access, and not always correct (39c3)
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Data about greenhouse gas emissions, both from countries and individual factories, isoften publicly available. However, the data sources are often not as accessible andreliable as they should be. EU emission databases contain obvious flaws, and nobodywants to be responsible.Which factory in my city is the largest emitter of CO2? Which industrial se…
…
continue reading
Lightning Talks - Tag 3- **Lightning Talks Introduction**- **"Oma, erzähl mir von der Zukunft" oder: Wie wir weiter interessante Sachen machen, ohne den Planeten zu ruinieren 🌱** — *EstherD*- **Don't abuse the ecosystem** — *michele*- **The Climatepoetry.org video tool** — *Magnus Ahltorp*- **Neo-Kolonialismus & Katzenbilder - Installation zur Lief…
…
continue reading
1
Ep. 3285 - First $1,000: A Discord Server That Pays the Rent
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18In this week’s Throwback Thursday segment, discover how one creative learner built a thriving online community—and why most of its value has nothing to do with algorithms or ads. Side Hustle School features a new episode EVERY DAY, featuring detailed case studies of people who earn extra money without quitting their job. This year, the show include…
…
continue reading
1
The Small Packet of Bits That Can Save (or Destabilize) a City (39c3)
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04The Emergency Alert System (EAS) and its SAME (Specific Area Message Encoding) protocol are public alerting technologies that broadcast short digital bursts over VHF triggering emergency messages on millions of receivers across North America. In Mexico, this technology was integrated into the Seismic Alert System (SASMEX) which more than 30 million…
…
continue reading
1
Reverse engineering the Pixel TitanM2 firmware (39c3)
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13The TitanM2 chip has been central to the security of the google pixel series since the Pixel 6. It is based on a modified RISC-V design with a bignum accelerator. Google added some non standard instructions to the RISC-V ISA. This talk investigates the reverse engineering using Ghidra, and simulation of the firmware in python.I will discuss the pro…
…
continue reading
1
51 Ways to Spell the Image Giraffe: The Hidden Politics of Token Languages in Generative AI (39c3)
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28Generative AI models don't operate on human languages – they speak in **tokens**. Tokens are computational fragments that deconstruct language into subword units, stored in large dictionaries. These tokens encode not only language but also political ideologies, corporate interests, and cultural biases even before model training begins. Social media…
…
continue reading
1
Xous: A Pure-Rust Rethink of the Embedded Operating System (39c3)
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24Xous is a message-passing microkernel implemented in pure Rust, targeting secure embedded applications. This talk covers three novel aspects of the OS: hardware MMU support (and why we had to make our own chip to get this feature), how and why we implemented the Rust standard library in Rust (instead of calling the C standard library, like most oth…
…
continue reading
1
Machine Vision – Vom Algorithmus zum Baumpilz im digitalen Metabolismus (39c3)
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33Milliarden von Kameras produzieren täglich Bilder, die zunehmend von Maschinen analysiert werden. In dieser Lecture Performance beleuchten wir die Entwicklung des maschinellen Sehens – von den frühen algorithmischen Ansätzen bis zu den heutigen Anwendungen – und schauen, wie verschiedene Künstler:innen diese Technologien nutzen und reflektieren. An…
…
continue reading
1
How To Minimize Bugs in Cryptography Code (39c3)
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03"Don't roll your own crypto" is an often-repeated aphorism. It's good advice -- but then how does any cryptography get made? Writers of cryptography code like myself write code with bugs just like anyone else, so how do we take precautions against our own mistakes? In this talk, I will give a peek into the cryptographer's toolbox of advanced techni…
…
continue reading
1
Textiles 101: Fast Fiber Transform (39c3)
41:50
41:50
Play later
Play later
Lists
Like
Liked
41:50Textiles are everywhere, yet few of us know how they’re made. This talk aims to give you an overview over the complete transformation from fiber to finished textile. We'll be exploring fiber properties, spinning, and techniques like weaving, knitting, crochet, braiding, and knotting, followed by finishing methods such as dyeing, printing, and embro…
…
continue reading
1
Don’t look up: There are sensitive internal links in the clear on GEO satellites (39c3)
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24We pointed a commercial-off-the-shelf satellite dish at the sky and examined all of the geostationary satellite communications visible from our vantage point. A shockingly large amount of sensitive traffic is being broadcast unencrypted, including critical infrastructure, internal corporate and government communications, private citizens’ voice cal…
…
continue reading
1
Verlorene Domains, offene Türen - Was alte Behördendomains verraten (39c3)
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02Was passiert, wenn staatliche Domains auslaufen - und plötzlich jemand anderes sie besitzt?In diesem Vortrag wird berichtet, wie mehrere ehemals offizielle, aber unregistrierte Domains deutscher Bundesministerien und Behörden erworben werden konnten - und welche Datenströme dadurch sichtbar wurden. Über Monate hinweg konnten so DNS-Anfragen aus Net…
…
continue reading
1
Wie wir alte Flipperautomaten am Leben erhalten (39c3)
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52Der Vortrag beschreibt, wie eine Gruppe von Begeisterten eine Sammlung von ca. 100 Flipperautomaten (Pinball Machines) am Leben und in spielbereitem Zustand erhält.Der Vortrag gibt einen Einblick in die verschiedenen Generationen von Flippern und deren Technik. Angefangen von elektromechanischen Geräten aus den frühen Sechzigern, über erste Prozess…
…
continue reading
1
Power Cycles statt Burnout – Wie Einflussnahme nicht verpufft (39c3)
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10Zwischen offenen Briefen, Massenmails, Petitionen und Kaffee trinken : Zwei Ex-Insiderinnen aus dem Digitalausschuss und Bundestag erzählen, wie politische Einflussnahme wirklich funktioniert. Ein ehrlicher Blick hinter die Kulissen parlamentarischer Entscheidungsfindung – mit praktischen Tipps, wie die Zivilgesellschaft ihre Energie dort einsetzt,…
…
continue reading
1
"Passwort" - der heise security Podcast live vom 39C3 (39c3)
1:27:00
1:27:00
Play later
Play later
Lists
Like
Liked
1:27:00Der heise security Podcast macht wieder einen Betriebsausflug nach Hamburg. Diesmal bringt Christopher seinen Co-Host Sylvester mit und spricht 90 Minuten lang über aktuelle Security-Themen vom Congress. Wir haben uns erneut einige spannende Fundstücke herausgesucht und sprechen darüber miteinander, aber auch mit unseren Gästen.Welche Themen wir be…
…
continue reading
1
freiheit.exe - Utopien als Malware (39c3)
39:25
39:25
Play later
Play later
Lists
Like
Liked
39:25"freiheit.exe“ ist eine Lecture über die ideologischen Rootkits des Silicon Valley. Sie schlägt den Bogen von den italienischen Futuristen zu den heutigen Tech-Feudalisten, vom Akzelerationismus zur Demokratieskepsis der Libertären, von Tolkien zur PayPal-Mafia. Basierend auf den Recherchen zu meinem Theaterstück "freiheit.exe. Utopien als Malware"…
…
continue reading
1
Prometheus: Reverse-Engineering Overwatch (39c3)
37:58
37:58
Play later
Play later
Lists
Like
Liked
37:58This talk explores the internals of Overwatch which make the game work under the hood. The end goal is to democratise development of Overwatch. Being able to host your own servers and modify the game client to your liking should not be up for discussion for a game many people have paid money for.Hey you! Yes you! Do you want to pay for a game which…
…
continue reading
1
Recharge your batteries with us - an empowering journey through the energy transition (39c3)
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29Amidst gloomy headlines, extreme weather, and climate anxiety, the good stories often get lost. Yet they exist - inspiring people, clever engineering, real breakthroughs. And that's exactly what we bring you – the positive power cycles of the energy transition in action. And real energy on stage.A committed energy activist and an award-winning sola…
…
continue reading
1
In-house electronics manufacturing from scratch: How hard can it be? (39c3)
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Why is electronics manufacturing hard? Can it ever be made easy and more accessible? What will it take to relocate industrial production to Europe?We share with you what we learned when we spent more than 1 year setting up our own production line in our office in Hamburg. Turns out a lot of the difficulties are rarely talked about or hidden behind …
…
continue reading
While FPGA developers usually try to minimize the power consumption of their designs, we approached the problem from the opposite perspective: what is the maximum power consumption that can be achieved or wasted on an FPGA? Short answer: we found that it’s easy to implement oscillators running at 6 GHz that can theoretically dissipate around 20 kW …
…
continue reading
1
CPU Entwicklung in Factorio: Vom D-Flip-Flop bis zum eigenen Betriebssystem (39c3)
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Factorio ist ein Fabriksimulationsspiel mit integriertem Logiksystem. Dies ermöglichte mir den Bau einer CPU, die unter anderem aus einer 5-stufiger Pipeline, einer Forwarding Logikeinheit, Interrupt Handling sowie einem I/O Interface besteht. Über einen selbst geschriebenen Assembler konnte ich ein eigenes Betriebssystem und Programme wie Mineswee…
…
continue reading
1
Amtsgeheimnis raus, Datenhalde rein: was die Informationsfreiheit in Österreich bringt (39c3)
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37Jahrelang war die staatliche Intransparenz in Österreich nur eine Punchline in den Congress-Talks von Frag Den Staat. Damit könnte jetzt Schluss sein: seit heuer haben Bürger:innen endlich ein Recht, Dokumente einzusehen und ein Informationsfreiheitsgesetz. Wir zeigen, was Deutschland aus der über ein Jahrzehnt andauernden Kampagne für die Abschaff…
…
continue reading
Die Freak Show und alle Hörerinnen und Hörer machen eine Sendung als GesprächIm Clubhouse-Style trifft das Freak Show Team auf seine Hörer. Jeder kann mitmachen. Werde zum Freak Show Host für 5 Minuten. Wir diskutieren mit Euch jedes frühere oder künftige Thema und sind uns auch für Hot Takes nicht zu schade.Licensed to the public under http://crea…
…
continue reading
1
Kenji Tanaka LIVE // Insights into my workflow, structure and philosophy (39c3)
1:03:07
1:03:07
Play later
Play later
Lists
Like
Liked
1:03:07How does live techno work?On the dance floor, it's practically impossible to understand what's happening up front. It's also irrelevant there, because it's all about the music and many other things.Live sets have a thousand faces. Everyone has their own workflow, and there are countless approaches to performing electronic music. I don't know all of…
…
continue reading
HostileShop is a python-based tool for generating prompt injections and jailbreaks against LLM agents. I created HostileShop to see if I could use LLMs to write a framework that generates prompt injections against LLMs, by having LLMs attack other LLMs. It's LLMs all the way down. HostileShop generated prompt injections for a winning submission in …
…
continue reading
The character of drone wars has changed. The large, cumbersome long-range drones have been complemented with small and low-budget drones. Moreover, more and more states are developing, deploying and selling them. Ten years ago at least 50 states were developing them. At the top are USA, Israel, Turkey, China, Iran and Russia. Russia's attack on Ukr…
…
continue reading
Das war nicht das Jahr 2025, das wir bestellt hatten.2025 war ein gutes Jahr für Exploits, kein gutes Jahr für die Freiheit und ein herausragendes für schlechte Ideen. Regierungen kämpften weiter für Massenüberwachung, natürlich mit KI-Unterstützung™. Kriege wurden weiter „digitalisiert“, Chatkontrolle als Kinderschutz verkauft, Waffensysteme haben…
…
continue reading
What does knitting have to do with espionage? Can embroidery help your mental health? This talk shows how the skills to create textile art have enabled people to resist and to persist under oppressive regimes for centuries. And it offers ways to keep doing so.Working with textile mediums like yarn, thread, and floss is generally seen as a feminine …
…
continue reading
1
Auf die Dauer hilft nur Power: Herausforderungen für dezentrale Netzwerke aus Sicht der Soziologie (39c3)
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45Der Vortrag diskutiert Herausforderungen dezentraler Netzwerke aus soziologischer Perspektive. Als dezentrale Netzwerke werden technische Infrastrukturen verstanden, die nicht von einer zentralen Autorität, sondern verteilt über Instanzen zur Verfügung gestellt werden. Nutzer:innen profitieren von dieser Infrastruktur, nutzen beispielsweise das Fed…
…
continue reading
Wir, das sind Steffen und arl , besprechen in unserem Podcast alles was die Große und Kleine Fliegerei angeht.Das CFWU Team besteht I.d.R. aus aktiven Piloten:innen von großen und kleinen Flugzeugen, sehr gut unterstützt durch den sehr erfahrenen Flugzeugtechniker Harry!Update GPS SpoofingATPL (AirlineTransportPilotLicense)Wie lernt man heute flieg…
…
continue reading
1
Amateurfunk im All – Kontakt mit Fram2 (39c3)
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11Wir geben Einblicke in zwei intensive Wochen Planung, Koordination und Aufbau, den Betrieb einer (improvisierten) Bodenstation, sprechen über technische Hürden, Antennendesign und Organisation – und wie wir schließlich mit Astronautin Rabea Rogge im Weltraum gefunkt haben.Schon kurz nachdem die ersten Satelliten den Weltraum eroberten, waren auch A…
…
continue reading
Es gab den Wunsch nach Creator AmA Sessions. Ich würde hiermit eine anbieten. Ich bin aber definitiv remote. ^^Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://events.ccc.de/congress/2025/hub/event/detail/aaa-ask-advi-anythingBy Thomas Brandt
…
continue reading
1
Cracking open what makes Apple's Low-Latency WiFi so fast (39c3)
39:40
39:40
Play later
Play later
Lists
Like
Liked
39:40This talk presents Apple's link-layer protocol Low-Latency WiFi and how it achieves its real-time capabilities to enable Continuity features like Sidecar Display and Continuity Camera. We make more kernel logging available on iOS and build a log aggregator that combines and aligns system- and network-level log sources from iOS and macOS.Apple's Con…
…
continue reading
1
Power Cycle B7 oder Warum kauft man eine Zeche? (39c3)
40:35
40:35
Play later
Play later
Lists
Like
Liked
40:35Aus einem Barwitz wurde ein Projekt!Blumenthal7 ist die letzte vollständig erhaltene Schachtanlage des ehemaligen Steinkohlebergwerks General Blumenthal in Recklinghausen im nördlichen Ruhrgebiet. Nach diversen Startschwierigkeiten ist aus einer im Dornröschenschlaf liegenden Industriebrache ein Projekt geworden, das bereits jetzt einer Vielzahl vo…
…
continue reading
1
Chaos Communication Chemistry: DNA security systems based on molecular randomness (39c3)
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07**Over the past few decades, nucleic acids have increasingly been investigated as alternative data storage media and platforms for molecular computing. This talk builds on past research and introduces another branch to the field: DNA cryptography based on random chemistry. This technology provides a platform for conceiving new security architecture…
…
continue reading