* História, Social & CIA

  1. A deep dive into the world of DOS viruses (Os primeiros virus de computador, engenharia reversa)
  2. https://media.ccc.de/v/35c3-9617-a_deep_dive_into_the_world_of_dos_viruses

  3. (Atribuído a Isadora) USENIX Enigma 2022 - Can the Fight against Disinformation Really Scale?
  4. https://www.youtube.com/watch?v=IjujEkIC7vo

  5. (Atribuído a Vinicius) How Facebook tracks you on Android (even if you don’t have a Facebook account)
  6. https://media.ccc.de/v/35c3-9941-how_facebook_tracks_you_on_android#t=5

  7. (Atribuído a Tiago V.) Russia vs. Telegram: technical notes on the battle
  8. https://media.ccc.de/v/35c3-9653-russia_vs_telegram_technical_notes_on_the_battle

  9. (Atribuído a Guilherme) Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime (2012)
  10. https://media.ccc.de/v/29c3-5338-en-enemies_of_the_state_h264

  11. Estratégias de proteção da seguraça de redes contra hackers de estados-nações segundo funcionário da agência de espionagem NSA (2016)
  12. USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers https://www.youtube.com/watch?v=bDJb8WOJYdA

    * Hardware

  13. (Atribuído a Enzo) Messing Around with Garage Doors
  14. https://media.ccc.de/v/25c3-3030-en-messing_around_with_garage_doors

  15. (Atribuído a GSO) Viva la Vita Vida (Hacking the most secure handheld console - Playstation Vita)
  16. https://media.ccc.de/v/35c3-9364-viva_la_vita_vida

  17. Modchips of the State - Hardware implants in the supply-chain (supply chain attacks)
  18. https://media.ccc.de/v/35c3-9597-modchips_of_the_state

  19. Hacking Sony PlayStation Blu-ray Drives
  20. https://media.ccc.de/v/36c3-10567-hacking_sony_playstation_blu-ray_drives

  21. (Atribuído a GBSO) Console Hacking 2016 - PS4: PC Master Race
  22. https://media.ccc.de/v/33c3-7946-console_hacking_2016

  23. (Atribuído a Pedro) Console Hacking - Breaking the 3DS
  24. https://media.ccc.de/v/32c3-7240-console_hacking

  25. (Atribuído a Vitor Hugo) Console Hacking 2010 - PS3 Epic Fail
  26. https://media.ccc.de/v/27c3-4087-en-console_hacking_2010

  27. Can trains be hacked?
  28. https://media.ccc.de/v/28c3-4799-de-can_trains_be_hacked

  29. (atribuído a PDSS) - The sustainability of safety, security and privacy
  30. * Redes

  31. Exploring fraud in telephony networks
  32. https://media.ccc.de/v/35c3-9852-exploring_fraud_in_telephony_networks

  33. (Atribuído a Marco) The Rocky Road to TLS 1.3 and better Internet Encryption
  34. https://media.ccc.de/v/35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption

  35. Sneaking In Network Security - Enforcing strong network segmentation, without anyone noticing
  36. https://media.ccc.de/v/35c3-9603-sneaking_in_network_security

  37. (Atribuído a Frederico) Emergency VPN: Analyzing mobile network traffic to detect digital threats
  38. https://media.ccc.de/v/36c3-155-emergency-vpn-analyzing-mobile-network-traffic-to-detect-digital-threats

  39. (Atribuído a GCBSA) All wireless communication stacks are equally broken
  40. https://media.ccc.de/v/36c3-10531-all_wireless_communication_stacks_are_equally_broken

  41. KRACKing WPA2 by Forcing Nonce Reuse
  42. https://media.ccc.de/v/34c3-9273-kracking_wpa2_by_forcing_nonce_reuse

    * Vulnerabilidades em software

  43. MD5 considered harmful today (Creating a rogue CA Certificate)
  44. https://media.ccc.de/v/25c3-3023-en-making_the_theoretical_possible

  45. (Atribuído a Ana G.) From Zero to Zero Day (Como achar vulnerabilidades?)
  46. https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day#t=283

  47. Como era possível roubar chaves privadas com "The Heartbleed Bug" em 2014
  48. https://www.youtube.com/watch?v=SgJm0C6jzbo

    https://heartbleed.com/

  49. What's left for private messaging? (2019)
  50. Messenger Hacking: Remotely Compromising an iPhone through iMessage (2019)
  51. https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage#t=2

  52. (Atribuído a Gabril M.) SELECT code_execution FROM * USING SQLite; --Gaining code execution using a malicious SQLite database
  53. https://media.ccc.de/v/36c3-10701-select_code_execution_from_using_sqlite

  54. (Atribuído a Jerusa) How to Break PDFs - Breaking PDF Encryption and PDF Signatures
  55. https://media.ccc.de/v/36c3-10832-how_to_break_pdfs

    https://www.pdf-insecurity.org

  56. (Atribuído a Alexia) Hacking (with) a TPM Don't ask what you can do for TPMs, Ask what TPMs can do for you
  57. https://media.ccc.de/v/36c3-10564-hacking_with_a_tpm

    * Virus, malwares & cia

  58. USENIX Enigma 2023 - When Malware Changed Its Mind: How "Split Personalities" Affect Malware
  59. https://www.youtube.com/watch?v=2TYFv3DGUMs

  60. (Atribuído a Tiago M.) SiliVaccine: North Korea's Weapon of Mass Detection -- Backdoor
  61. https://media.ccc.de/v/35c3-9375-silivaccine_north_korea_s_weapon_of_mass_detection

    * Criptografia

  62. FactHacks RSA factorization in the real world
  63. https://media.ccc.de/v/29c3-5275-en-facthacks_h264

  64. ECCHacks A gentle introduction to elliptic-curve cryptography
  65. https://media.ccc.de/v/31c3_-_6369_-_en_-_saal_1_-_201412272145_-_ecchacks_-_djb_-_tanja_lange

  66. Let's build a quantum computer! Understanding the architecture of a quantum processor
  67. https://media.ccc.de/v/31c3_-_6261_-_en_-_saal_2_-_201412291245_-_let_s_build_a_quantum_computer_-_andreas_dewes

  68. Quantum Cryptography and Possible Attacks
  69. https://media.ccc.de/v/24c3-2275-en-quantum_cryptography_and_possible_attacks

  70. The year in post-quantum crypto
  71. https://media.ccc.de/v/35c3-9926-the_year_in_post-quantum_crypto

  72. (Post-Quantum) Isogeny Cryptography
  73. https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography

  74. (Atribuído a Euler) USENIX Enigma 2023 - Adventures in Authentication and Authorization
  75. https://www.youtube.com/watch?v=gfE9nzbiMww

  76. High-assurance crypto software
  77. https://media.ccc.de/v/36c3-10893-high-assurance_crypto_software

  78. LatticeHacks Fun with lattices in cryptography and cryptanalysis
  79. https://media.ccc.de/v/34c3-9075-latticehacks

    * Cripto aplicada

  80. - Como fazendo mineração de bitcoins com papel e caneta (ou giz e louza)
  81. https://www.youtube.com/watch?v=y3dqhixzGVo

    http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html

    https://docs.google.com/spreadsheets/d/1mOTrqckdetCoRxY5QkVcyQ7Z0gcYIH-Dc0tu7t9f7tw/