* História, Social & CIA

  1. (Felipe) A deep dive into the world of DOS viruses (Os primeiros virus de computador, engenharia reversa)
  2. https://media.ccc.de/v/35c3-9617-a_deep_dive_into_the_world_of_dos_viruses

  3. (Roberto) USENIX Enigma 2022 - Can the Fight against Disinformation Really Scale?
  4. https://www.youtube.com/watch?v=IjujEkIC7vo

  5. (Rodrigo CC) How Facebook tracks you on Android (even if you don’t have a Facebook account)
  6. https://media.ccc.de/v/35c3-9941-how_facebook_tracks_you_on_android#t=5

  7. (Artur A) Russia vs. Telegram: technical notes on the battle
  8. https://media.ccc.de/v/35c3-9653-russia_vs_telegram_technical_notes_on_the_battle

  9. Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime (2012)
  10. https://media.ccc.de/v/29c3-5338-en-enemies_of_the_state_h264

  11. (Matheus) Estratégias de proteção da seguraça de redes contra hackers de estados-nações segundo funcionário da agência de espionagem NSA (2016)
  12. USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers https://www.youtube.com/watch?v=bDJb8WOJYdA

    * Hardware

  13. Apple's Iphone 15 under the C
  14. (Ricardo) Messing Around with Garage Doors
  15. https://media.ccc.de/v/25c3-3030-en-messing_around_with_garage_doors

  16. Viva la Vita Vida (Hacking the most secure handheld console - Playstation Vita)
  17. https://media.ccc.de/v/35c3-9364-viva_la_vita_vida

  18. Modchips of the State - Hardware implants in the supply-chain (supply chain attacks)
  19. https://media.ccc.de/v/35c3-9597-modchips_of_the_state

  20. Hacking Sony PlayStation Blu-ray Drives
  21. https://media.ccc.de/v/36c3-10567-hacking_sony_playstation_blu-ray_drives

  22. Console Hacking 2016 - PS4: PC Master Race
  23. https://media.ccc.de/v/33c3-7946-console_hacking_2016

  24. Console Hacking - Breaking the 3DS
  25. https://media.ccc.de/v/32c3-7240-console_hacking

  26. (Klesley) Console Hacking 2010 - PS3 Epic Fail
  27. https://media.ccc.de/v/27c3-4087-en-console_hacking_2010

  28. (Estevão) Can trains be hacked?
  29. https://media.ccc.de/v/28c3-4799-de-can_trains_be_hacked

  30. The sustainability of safety, security and privacy
  31. * Redes

    Tor censorship attempts in Russia, Iran, Turkmenistan (2023)
  32. Exploring fraud in telephony networks
  33. https://media.ccc.de/v/35c3-9852-exploring_fraud_in_telephony_networks

  34. The Rocky Road to TLS 1.3 and better Internet Encryption
  35. https://media.ccc.de/v/35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption

  36. Sneaking In Network Security - Enforcing strong network segmentation, without anyone noticing
  37. https://media.ccc.de/v/35c3-9603-sneaking_in_network_security

  38. Emergency VPN: Analyzing mobile network traffic to detect digital threats
  39. https://media.ccc.de/v/36c3-155-emergency-vpn-analyzing-mobile-network-traffic-to-detect-digital-threats

  40. (Ademar) All wireless communication stacks are equally broken
  41. https://media.ccc.de/v/36c3-10531-all_wireless_communication_stacks_are_equally_broken

  42. KRACKing WPA2 by Forcing Nonce Reuse
  43. https://media.ccc.de/v/34c3-9273-kracking_wpa2_by_forcing_nonce_reuse

    * Vulnerabilidades em software

  44. (Gustavo G) Real-world exploits and mitigations in Large Language Model applications
  45. Writing secure software (2023)
  46. MD5 considered harmful today (Creating a rogue CA Certificate)
  47. https://media.ccc.de/v/25c3-3023-en-making_the_theoretical_possible

  48. From Zero to Zero Day (Como achar vulnerabilidades?)
  49. https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day#t=283

  50. (Luiz A) Como era possível roubar chaves privadas com "The Heartbleed Bug" em 2014
  51. https://www.youtube.com/watch?v=SgJm0C6jzbo

    https://heartbleed.com/

  52. What's left for private messaging? (2019)
  53. Messenger Hacking: Remotely Compromising an iPhone through iMessage (2019)
  54. https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage#t=2

  55. (Railson) SELECT code_execution FROM * USING SQLite; --Gaining code execution using a malicious SQLite database
  56. https://media.ccc.de/v/36c3-10701-select_code_execution_from_using_sqlite

  57. (Victor Hugo) How to Break PDFs - Breaking PDF Encryption and PDF Signatures
  58. https://media.ccc.de/v/36c3-10832-how_to_break_pdfs

    https://www.pdf-insecurity.org

  59. Hacking (with) a TPM Don't ask what you can do for TPMs, Ask what TPMs can do for you
  60. https://media.ccc.de/v/36c3-10564-hacking_with_a_tpm

    * Virus, malwares & cia

  61. USENIX Enigma 2023 - When Malware Changed Its Mind: How "Split Personalities" Affect Malware
  62. https://www.youtube.com/watch?v=2TYFv3DGUMs

  63. SiliVaccine: North Korea's Weapon of Mass Detection -- Backdoor
  64. https://media.ccc.de/v/35c3-9375-silivaccine_north_korea_s_weapon_of_mass_detection

    * Criptografia

  65. Unlocked! Recovering files taken hostage by ransomware (2023)
  66. (Nicolli) The impact of quantum computers in cybersecurity
  67. BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
  68. FactHacks RSA factorization in the real world
  69. https://media.ccc.de/v/29c3-5275-en-facthacks_h264

  70. ECCHacks A gentle introduction to elliptic-curve cryptography
  71. https://media.ccc.de/v/31c3_-_6369_-_en_-_saal_1_-_201412272145_-_ecchacks_-_djb_-_tanja_lange

  72. Let's build a quantum computer! Understanding the architecture of a quantum processor
  73. https://media.ccc.de/v/31c3_-_6261_-_en_-_saal_2_-_201412291245_-_let_s_build_a_quantum_computer_-_andreas_dewes

  74. (Joao Victor) Quantum Cryptography and Possible Attacks
  75. https://media.ccc.de/v/24c3-2275-en-quantum_cryptography_and_possible_attacks

  76. The year in post-quantum crypto
  77. https://media.ccc.de/v/35c3-9926-the_year_in_post-quantum_crypto

  78. (Post-Quantum) Isogeny Cryptography
  79. https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography

  80. USENIX Enigma 2023 - Adventures in Authentication and Authorization
  81. https://www.youtube.com/watch?v=gfE9nzbiMww

  82. High-assurance crypto software
  83. https://media.ccc.de/v/36c3-10893-high-assurance_crypto_software

  84. LatticeHacks Fun with lattices in cryptography and cryptanalysis
  85. https://media.ccc.de/v/34c3-9075-latticehacks

    * Cripto aplicada

  86. (Guilherme G)- Como fazendo mineração de bitcoins com papel e caneta (ou giz e louza)
  87. https://www.youtube.com/watch?v=y3dqhixzGVo

    http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html

    https://docs.google.com/spreadsheets/d/1mOTrqckdetCoRxY5QkVcyQ7Z0gcYIH-Dc0tu7t9f7tw/