* História, Social & CIA
- (Felipe) A deep dive into the world of DOS viruses (Os primeiros virus de computador, engenharia reversa)
https://media.ccc.de/v/35c3-9617-a_deep_dive_into_the_world_of_dos_viruses
- (Roberto) USENIX Enigma 2022 - Can the Fight against Disinformation Really Scale?
https://www.youtube.com/watch?v=IjujEkIC7vo
- (Rodrigo CC) How Facebook tracks you on Android (even if you don’t have a Facebook account)
https://media.ccc.de/v/35c3-9941-how_facebook_tracks_you_on_android#t=5
- (Artur A) Russia vs. Telegram: technical notes on the battle
https://media.ccc.de/v/35c3-9653-russia_vs_telegram_technical_notes_on_the_battle
- Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime (2012)
https://media.ccc.de/v/29c3-5338-en-enemies_of_the_state_h264
- (Matheus) Estratégias de proteção da seguraça de redes contra hackers de estados-nações segundo funcionário da agência de espionagem NSA (2016)
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers
https://www.youtube.com/watch?v=bDJb8WOJYdA
* Hardware
- Apple's Iphone 15 under the C
- (Ricardo) Messing Around with Garage Doors
https://media.ccc.de/v/25c3-3030-en-messing_around_with_garage_doors
- Viva la Vita Vida (Hacking the most secure handheld console - Playstation Vita)
https://media.ccc.de/v/35c3-9364-viva_la_vita_vida
- Modchips of the State - Hardware implants in the supply-chain (supply chain attacks)
https://media.ccc.de/v/35c3-9597-modchips_of_the_state
- Hacking Sony PlayStation Blu-ray Drives
https://media.ccc.de/v/36c3-10567-hacking_sony_playstation_blu-ray_drives
- Console Hacking 2016 - PS4: PC Master Race
https://media.ccc.de/v/33c3-7946-console_hacking_2016
- Console Hacking - Breaking the 3DS
https://media.ccc.de/v/32c3-7240-console_hacking
- (Klesley) Console Hacking 2010 - PS3 Epic Fail
https://media.ccc.de/v/27c3-4087-en-console_hacking_2010
- (Estevão) Can trains be hacked?
https://media.ccc.de/v/28c3-4799-de-can_trains_be_hacked
- The sustainability of safety, security and privacy
* Redes
Tor censorship attempts in Russia, Iran, Turkmenistan (2023)
- Exploring fraud in telephony networks
https://media.ccc.de/v/35c3-9852-exploring_fraud_in_telephony_networks
- The Rocky Road to TLS 1.3 and better Internet Encryption
https://media.ccc.de/v/35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption
- Sneaking In Network Security - Enforcing strong network segmentation, without anyone noticing
https://media.ccc.de/v/35c3-9603-sneaking_in_network_security
- Emergency VPN: Analyzing mobile network traffic to detect digital threats
https://media.ccc.de/v/36c3-155-emergency-vpn-analyzing-mobile-network-traffic-to-detect-digital-threats
- (Ademar) All wireless communication stacks are equally broken
https://media.ccc.de/v/36c3-10531-all_wireless_communication_stacks_are_equally_broken
- KRACKing WPA2 by Forcing Nonce Reuse
https://media.ccc.de/v/34c3-9273-kracking_wpa2_by_forcing_nonce_reuse
* Vulnerabilidades em software
- (Gustavo G) Real-world exploits and mitigations in Large Language Model applications
- Writing secure software (2023)
- MD5 considered harmful today (Creating a rogue CA Certificate)
https://media.ccc.de/v/25c3-3023-en-making_the_theoretical_possible
- From Zero to Zero Day (Como achar vulnerabilidades?)
https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day#t=283
- (Luiz A) Como era possível roubar chaves privadas com "The Heartbleed Bug" em 2014
https://www.youtube.com/watch?v=SgJm0C6jzbo
https://heartbleed.com/
- What's left for private messaging? (2019)
- Messenger Hacking: Remotely Compromising an iPhone through iMessage (2019)
https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage#t=2
- (Railson) SELECT code_execution FROM * USING SQLite; --Gaining code execution using a malicious SQLite database
https://media.ccc.de/v/36c3-10701-select_code_execution_from_using_sqlite
- (Victor Hugo) How to Break PDFs - Breaking PDF Encryption and PDF Signatures
https://media.ccc.de/v/36c3-10832-how_to_break_pdfs
https://www.pdf-insecurity.org
- Hacking (with) a TPM Don't ask what you can do for TPMs, Ask what TPMs can do for you
https://media.ccc.de/v/36c3-10564-hacking_with_a_tpm
* Virus, malwares & cia
- USENIX Enigma 2023 - When Malware Changed Its Mind: How "Split Personalities" Affect Malware
https://www.youtube.com/watch?v=2TYFv3DGUMs
- SiliVaccine: North Korea's Weapon of Mass Detection -- Backdoor
https://media.ccc.de/v/35c3-9375-silivaccine_north_korea_s_weapon_of_mass_detection
* Criptografia
- Unlocked! Recovering files taken hostage by ransomware (2023)
- (Nicolli) The impact of quantum computers in cybersecurity
- BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
- FactHacks RSA factorization in the real world
https://media.ccc.de/v/29c3-5275-en-facthacks_h264
- ECCHacks A gentle introduction to elliptic-curve cryptography
https://media.ccc.de/v/31c3_-_6369_-_en_-_saal_1_-_201412272145_-_ecchacks_-_djb_-_tanja_lange
- Let's build a quantum computer! Understanding the architecture of a quantum processor
https://media.ccc.de/v/31c3_-_6261_-_en_-_saal_2_-_201412291245_-_let_s_build_a_quantum_computer_-_andreas_dewes
- (Joao Victor) Quantum Cryptography and Possible Attacks
https://media.ccc.de/v/24c3-2275-en-quantum_cryptography_and_possible_attacks
- The year in post-quantum crypto
https://media.ccc.de/v/35c3-9926-the_year_in_post-quantum_crypto
- (Post-Quantum) Isogeny Cryptography
https://media.ccc.de/v/36c3-10543-post-quantum_isogeny_cryptography
- USENIX Enigma 2023 - Adventures in Authentication and Authorization
https://www.youtube.com/watch?v=gfE9nzbiMww
- High-assurance crypto software
https://media.ccc.de/v/36c3-10893-high-assurance_crypto_software
- LatticeHacks Fun with lattices in cryptography and cryptanalysis
https://media.ccc.de/v/34c3-9075-latticehacks
* Cripto aplicada
- (Guilherme G)- Como fazendo mineração de bitcoins com papel e caneta (ou giz e louza)
https://www.youtube.com/watch?v=y3dqhixzGVo
http://www.righto.com/2014/09/mining-bitcoin-with-pencil-and-paper.html
https://docs.google.com/spreadsheets/d/1mOTrqckdetCoRxY5QkVcyQ7Z0gcYIH-Dc0tu7t9f7tw/