Knowledge

Chaos Computer Club

Source đź“ť

463: 51: 358: 692: 269: 764: 832:, with no checks for authentication or integrity. This leaves any computer under surveillance using this software vulnerable to attack. The captured screenshots and audio files were encrypted, but so incompetently that the encryption was ineffective. All captured data was sent over a proxy server in the United States, which is problematic since the data is then temporarily outside the German 360: 619:
134,000 (equivalent to €131,600 in 2021) in a Hamburg bank in favor of the club. The money was returned the next day in front of the press. Prior to the incident, the system provider had failed to react to proof of the security flaw provided by the CCC, claiming to the public that their system
250:
Members of the CCC have demonstrated and publicized a number of important information security problems. The CCC frequently criticizes new legislation and products with weak information security which endanger citizen rights or the privacy of users. Notable members of the CCC regularly function as
944:
system claims to be "one of the safest ways to keep your phone locked and the contents private" as "patterns in your irises are unique to you and are virtually impossible to replicate", as quoted in official Samsung content. However, in some cases, using a high resolution photograph of the phone
923:
The CCC has repeatedly warned phone users of the weakness of biometric identification in the wake of the 2008 Schäuble fingerprints affair. In their "hacker ethics" the CCC includes "protect people data", but also "Computers can change your life for the better". The club regards privacy as an
895:(BKA); this statement however does not eliminate the possibility that it has been used by state-level German police forces. The BKA had previously announced however (in 2007) that they had somewhat similar trojan software that can inspect a computer's hard drive. 1971:"A good example of this was the fake hacking meeting created in the middle 1990' so called the CCCF (Chaos Computer Club France) where a lot of hackers got busted under the active participation of a renegade hacker so called Jean-Bernard Condat." 226:
The CCC describes itself as "a galactic community of life forms, independent of age, sex, race or societal orientation, which strives across borders for freedom of information…". In general, the CCC advocates more transparency in government,
448:
The CCC sensitises and introduces people to the questions of data privacy. Some of its local chapters support or organize so called CryptoParties to introduce people to the basics of practical cryptography and internet anonymity.
507:, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Knowledge. 924:
individual right: the CCC does not discourage people from sharing or storing personal information on their phones, but advocates better privacy protection, and the use of specific browsing and sharing techniques by users.
212:) in various cities in Germany and the surrounding countries, particularly where there are German-speaking communities. Since 1985, some chapters in Switzerland have organized an independent sister association called the 359: 620:
was safe. Bildschirmtext was the biggest commercially available online system targeted at the general public in its region at that time, run and heavily advertised by the German telecommunications agency
243:. The CCC spreads an entrepreneurial vision refusing capitalist control. It has been characterised as "…one of the most influential digital organisations anywhere, the centre of German digital culture, 969:
governmental agency. The primary goal of the CCCF was to watch and to gather information about the French hacker community, identifying the hackers who could harm the country. Journalist
1551: 818:
has ruled that the police may only use such programs for telephony wiretapping, and for no other purpose, and that this restriction should be enforced through technical and legal means.
493: 911:
was expelled from the national CCC (but not the Berlin chapter) in August 2011. This decision was revoked in February 2012. As a result of his role in the expulsion, board member
584: 1240: 821:
On 8 October 2011, the CCC published an analysis of the Staatstrojaner software. The software was found to have the ability to remote control the target computer, to capture
650:, who was loosely affiliated with the CCC, was arrested for breaking into US government and corporate computers, and then selling operating-system source code to the Soviet 1697: 517: 825:, and to fetch and run arbitrary extra code. The CCC says that having this functionality built in is in direct contradiction to the ruling of the constitutional court. 404:
and on the internet. Other programs have emerged in the context of Chaosradio, including radio programs offered by some regional Chaos Groups and the podcast spin-off
828:
In addition, there were a number of security problems with the implementation. The software was controllable over the Internet, but the commands were sent completely
2357: 932:
From a photograph of the user's fingerprint on a glass surface, using "easy everyday means", the biometrics hacking team of the CCC was able to unlock an iPhone 5S.
2377: 1209: 313:
in 2013, it drew 9,000 guests. For the 2016 installment, 11,000 guests were expected, with additional viewers following the event via live streaming.
1582: 527:
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
1417: 2069: 394: 2043: 1561: 970: 2991: 1695:
German federal Trojan eavesdrops on 15 applications, experts find. The R2-D2 surveillance Trojan also has support for 64-bit Windows systems
1374: 2529: 1759: 379: 2347: 338:
is with more than 1,500 participants the second largest annual event. Another yearly CCC event taking place on the Easter weekend is the
2337: 880:, short for Skype Capture Unit Installer. The 64-bit Windows version installs a digitally signed driver, but signed by the non-existing 2291: 966: 888: 861: 1327: 1248: 1804: 892: 3522: 2925: 1459: 1184: 1012: 815: 603:
and others in anticipation of the prominent role that information technology would play in the way people live and communicate.
426:
CCC members are present in big tech companies and in administrative instances. One of the spokespersons of the CCC, as of 1986,
328:
which focused on the impact of digitisation on society. The SIGINT conference was discontinued in 2014. The four-day conference
1694: 2106: 810:. This "source wiretapping" is the only feasible way to wiretap in this case, since Internet telephony programs will usually 2461: 1167: 1285: 2875: 2342: 512: 721: 3512: 3009: 2492: 2270: 2036: 741: 535: 3015: 2541: 2502: 2137: 239:, the club also fights for free universal access to computers and technological infrastructure as well as the use of 1846: 1216: 548:
Content in this edit is translated from the existing German Knowledge article at ]; see its history for attribution.
3075: 3021: 2596: 2487: 2316: 320:
is the outdoor alternative for hackers worldwide. The CCC also held, from 2009 to 2013, a yearly conference called
3069: 2423: 2260: 2162: 1718: 1682: 2482: 2255: 2224: 981: 218: 843:
because the string "C3PO-r2d2-POE" was found in its code; another alias for it is 0zapftis ("It's tapped!" in
2362: 2275: 2074: 2064: 2029: 3236: 2626: 2413: 2352: 2311: 2209: 1031: 306: 252: 103: 17: 2973: 2731: 2466: 2229: 213: 2566: 611:
The CCC became world-famous in 1984 when they drew public attention to the security flaws of the German
591:
The CCC was founded in West Berlin on 12 September 1981 at a table which had previously belonged to the
399: 3420: 2761: 2616: 2408: 2301: 2245: 1502: 680: 199: 2167: 2901: 2870: 2497: 779: 2456: 1827: 1657: 1486: 3039: 2606: 2524: 2430: 2403: 1627: 1302: 795: 557: 543: 317: 167: 1783: 3195: 2859: 2332: 2265: 2111: 1985: 855:
analysis, the trojan's behavior matches that described in a confidential memo between the German
839:
The CCC's findings were widely reported in the German press. This trojan has also been nicknamed
783: 708:
In 2001, the CCC celebrated its twentieth birthday with an interactive light installation dubbed
330: 310: 1000: 3517: 2756: 2418: 1087: 475: 228: 2398: 1913: 1157: 3257: 3210: 3118: 3045: 2829: 2193: 1072: 908: 881: 848: 800: 703: 564: 2440: 2296: 912: 427: 2854: 2219: 1937: 1740: 1320: 240: 204: 744: 8: 3344: 2372: 2188: 1434: 1062: 962: 621: 321: 298: 2701: 945:
owner's iris and a lens, the CCC claimed to be able to trick the authentication system.
751:. This was done to protest the use of biometric data in German identity devices such as 247:, hacktivism, and the intersection of any discussion of democratic and digital rights". 3482: 3477: 3374: 3003: 2766: 2692: 2382: 2183: 1966: 807: 752: 748: 647: 633: 31: 2705: 2214: 747:. The magazine also included the fingerprint on a film that readers could use to fool 279: 202:
with 7,700 registered members. Founded in 1981, the association is incorporated as an
3487: 3369: 3339: 2943: 2799: 2157: 2121: 1411: 1163: 996: 856: 844: 787: 539: 1683:
Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware)
803:
program installed secretly on a suspect's computer, which the German police uses to
3415: 3267: 3190: 2839: 2776: 2651: 2100: 1805:"German company behind government spyware admits sale to Bavaria – DW – 11.10.2011" 1052: 941: 713: 596: 3113: 1375:"Medienkompetenz, quo vadis? Teil III: Interview zum Projekt "Chaos macht Schule"" 3425: 3400: 3364: 3292: 3205: 3200: 2844: 2636: 2546: 2250: 1701: 1490: 1460:"Hacker remembered as computer age hero / Wau Holland fought to free information" 1289: 1077: 1067: 995:. Between 4 January 1993 and 5 August 1993, seventy-three issues were published ( 988: 975: 419:
which supports teaching in local schools. Its aims are to improve technology and
255:, organize lawsuits and campaigns, or otherwise influence the political process. 113: 274: 3164: 3159: 2849: 2834: 2824: 2819: 2751: 2726: 2721: 2716: 2661: 2435: 2116: 1606: 1282: 1057: 1047: 1042: 639: 612: 420: 370: 244: 2306: 1269: 3506: 3287: 2746: 2697: 1865: 1082: 695: 616: 434:(Internet Corporation for Assigned Names and Numbers) between 2000 and 2002. 384: 50: 691: 3231: 3185: 2985: 2949: 2804: 2794: 2687: 2682: 2677: 2551: 2367: 1851: 1557: 1396: 884:"Goose Cert". DigiTask later admitted selling spy software to governments. 833: 768: 643: 409: 236: 232: 1583:"CCC publiziert die Fingerabdrücke von Wolfgang Schäuble [Update]" 1553:
CCC publishes fingerprints of Wolfgang Schäuble, the German Home Secretary
891:
released a statement in which they denied that R2-D2 has been used by the
3467: 3457: 3405: 3313: 3169: 2979: 2809: 2671: 2536: 1832: 1632: 1394: 866: 822: 740:
In March 2008, the CCC acquired and published the fingerprints of German
600: 443: 294: 92: 3410: 3395: 3323: 3063: 2967: 2919: 2895: 2883: 2741: 2666: 2656: 2646: 2631: 2591: 2516: 2147: 2021: 1527: 811: 676: 546:
to the source of your translation. A model attribution edit summary is
390: 339: 378:) since 1984. The Berlin chapter produces a monthly radio show called 3441: 3318: 3282: 3272: 3144: 2961: 2711: 2641: 2581: 2142: 1107: 1036: 1018: 904: 873: 829: 656: 624:
which also strove to keep up-to-date alternatives out of the market.
592: 335: 1889: 1185:"Berlin's digital exiles: where tech activists go to escape the NSA" 389:
which picks up various technical and political topics in a two-hour
309:, Europe's biggest hacker gathering. When the event was held in the 268: 3349: 3277: 3262: 3081: 3057: 2931: 2913: 2814: 2736: 2571: 2556: 1989: 716:
in Berlin into a giant computer screen. A follow-up installation,
668:
In April 1998, the CCC successfully demonstrated the cloning of a
3379: 3252: 3215: 3149: 3128: 3098: 3051: 3033: 2955: 2889: 2586: 2576: 2561: 1503:"Nuit Blanche 2002 : jeux de lumière sur une tour de la BnF" 804: 775: 763: 729: 725: 673: 415:
Many of the chapters of CCC participate in the volunteer project
325: 123: 35: 504: 3462: 3354: 3308: 3123: 2937: 2907: 2786: 2771: 2601: 2152: 1961: 1142: 1026: 852: 346: 1760:"Federal Trojan has more capabilities than previously thought" 583: 3087: 3027: 2997: 2016: 876:
in 2008. Among other correlations is the dropper's file name
840: 431: 349:
located in Berlin as an event location or as function rooms.
175: 1866:"CCC – Ergebnis der außerordentlichen Mitgliederversammlung" 1039:, the local chapter of the Chaos Computer Club at Düsseldorf 724:. Later in October 2008 CCC's Project Blinkenlights went to 3359: 3154: 958: 393:
show. The program is aired on a local radio station called
137: 1528:"Welcome to Project Blinkenlights – Project Blinkenlights" 1241:"Hacks and Highlights of the Chaos Communication Congress" 965:, under the command of Jean-Luc Delacour, an agent of the 516:
to this template: there are already 1,881 articles in the
2338:
Hollywood Presbyterian Medical Center ransomware incident
2011: 1483: 957:(CCCF) was a fake hacker organisation created in 1989 in 669: 651: 342:, which is more workshop oriented than the other events. 272:
Chaos Communication Camp 2003 near Berlin, featuring the
1429: 1427: 1395:
Tim Pritlove, Florian Grunow, Peter Hecko (2012-01-06).
1352: 1306: 638:
In 1987, the CCC was peripherally involved in the first
1967:"A personal view of the french underground (1992–2007)" 2004: 1938:"Security – Iris Scanner | Samsung Galaxy S8 and S8+" 1435:"Les " bidouilleurs " de la société de l'information" 1424: 1210:"Hacktivism and Politically Motivated Computer Crime" 767:
Mascot used to protest against the Staatstrojaner, a
500: 496:
a machine-translated version of the German article.
235:to communication. Supporting the principles of the 151: 948: 1607:"Chaos Computer Club analyzes government malware" 980:said that this organization also worked with the 642:case to make international headlines. A group of 430:, was a member of the executive committee of the 3504: 1914:"CCC | Chaos Computer Club breaks Apple TouchID" 1628:"CCC findet SicherheitslĂĽcken in Bundestrojaner" 1321:"19. Gulaschprogrammiernacht: Chaos im Lichthof" 2378:Russian interference in the 2016 U.S. elections 1986:Chaos Computer Club hackers 'have a conscience' 1121: 918: 1741:"German states defend use of 'Federal Trojan'" 1658:"Electronic Surveillance Scandal Hits Germany" 1176: 935: 542:accompanying your translation by providing an 487:Click for important translation instructions. 474:expand this article with text translated from 2037: 1416:: CS1 maint: multiple names: authors list ( 1372: 1283:https://events.ccc.de/sigint/2009/Hauptseite 1201: 1149: 352: 287: 65: 57: 2348:Democratic National Committee cyber attacks 654:. This incident was portrayed in the movie 3472: 2292:Office of Personnel Management data breach 2044: 2030: 1652: 1650: 1276: 1182: 967:Direction de la surveillance du territoire 814:the data when it leaves the computer. The 1828:Top German Hacker Slams OpenLeaks Founder 720:, was created in 2002 by the CCC for the 368:The CCC publishes the irregular magazine 2051: 1713: 1711: 1709: 1207: 1155: 898: 762: 758: 735: 698:at the 22nd Chaos Communication Congress 690: 686: 679:algorithm used at that time by many GSM 615:computer network by causing it to debit 582: 356: 267: 208:in Germany, with local chapters (called 1647: 1262: 1013:Category:Members of Chaos Computer Club 816:Federal Constitutional Court of Germany 14: 3505: 1784:"Federal Trojan's got a "Big Brother"" 1580: 1135: 297:malapropism to the logo of the former 2025: 1719:"German 'Government' R2D2 Trojan FAQ" 1706: 554:{{Translated|de|Chaos Computer Club}} 198:) is Europe's largest association of 1757: 1675: 1129:annual general assembly minutes 2018 915:was not reelected for another term. 456: 2343:Commission on Elections data breach 732:, Canada with project Stereoscope. 24: 1979: 1847:Inside the secret world of hackers 1738: 1233: 1156:Boullier, Dominique (2016-04-27). 1100: 423:of pupils, parents, and teachers. 27:Germany based hackers organization 25: 3534: 2503:Jeff Bezos phone hacking incident 1996: 1609:. Chaos Computer Club. 2011-10-08 1183:Cadwalladr, Carole (2014-11-09). 263: 3076:Microarchitectural Data Sampling 2312:Ukrainian Power Grid Cyberattack 2220:Cyberterrorism attack of June 25 1942:The Official Samsung Galaxy Site 1197:– via www.theguardian.com. 927: 889:Federal Ministry of the Interior 722:Bibliothèque nationale de France 461: 49: 2424:2017 Ukraine ransomware attacks 2261:2014 JPMorgan Chase data breach 1954: 1930: 1906: 1882: 1858: 1839: 1821: 1797: 1776: 1751: 1732: 1688: 1620: 1599: 1574: 1544: 1520: 1495: 1477: 1452: 1388: 1366: 1350: 1344: 1333:from the original on 2021-06-27 1313: 1295: 949:Fake Chaos Computer Club France 788:Heiko Maas § State trojans 3523:Organisations based in Hamburg 2256:2014 celebrity nude photo leak 1484:CCC | CCC klont D2 Kundenkarte 1143:Satzung des CCC e.V. (German). 893:Federal Criminal Police Office 595:in the rooms of the newspaper 552:You may also add the template 437: 13: 1: 2493:Bulgarian revenue agency hack 2271:Russian hacker password theft 1093: 301:, the Federal Post of Germany 258: 2627:Bangladesh Black Hat Hackers 2103:(publication of 2009 events) 1581:online, heise (2008-03-29). 1560:, 2008-03-31, archived from 1032:Chaos Communication Congress 919:Phone authentication systems 672:customer card, breaking the 627: 307:Chaos Communication Congress 7: 2488:Baltimore ransomware attack 1758:Zorz, Zeljka (2011-10-19). 1397:"CRE189 Chaos macht Schule" 1373:Anna Biselli (2014-03-24). 1162:(in French). Armand Colin. 1131:, Chaos Computer Club, 2018 1006: 982:French National Gendarmerie 936:Samsung S8 iris recognition 859:and a software firm called 663: 606: 578: 524:will aid in categorization. 253:German constitutional court 214:Chaos Computer Club Schweiz 10: 3539: 2762:Tailored Access Operations 2409:WannaCry ransomware attack 2302:Ashley Madison data breach 2246:Anthem medical data breach 2163:PlayStation network outage 2017:Chaosradio Podcast Network 1010: 955:Chaos Computer Club France 847:, a sardonic reference to 773: 701: 631: 499:Machine translation, like 452: 441: 55:Chaos Computer Club Logo ( 29: 3513:Computer clubs in Germany 3450: 3434: 3388: 3332: 3301: 3245: 3224: 3178: 3137: 3106: 3097: 2868: 2785: 2615: 2515: 2498:WhatsApp snooping scandal 2475: 2449: 2391: 2363:Indian Bank data breaches 2325: 2284: 2238: 2202: 2176: 2130: 2093: 2086: 2057: 872:; the memo was leaked on 780:MiniPanzer and MegaPanzer 712:that turned the building 476:the corresponding article 353:Publications and outreach 305:The CCC hosts the annual 251:expert witnesses for the 184: 166: 162: 146: 130: 119: 114:Computer security hacking 109: 99: 76: 48: 3040:Speculative Store Bypass 2607:Ukrainian Cyber Alliance 2404:2017 Macron e-mail leaks 1685:, LISS 2013, pp. 419–428 940:The Samsung Galaxy S8's 742:Minister of the Interior 318:Chaos Communication Camp 30:Not to be confused with 2414:Westminster data breach 2333:Bangladesh Bank robbery 2276:2014 Yahoo! data breach 2266:2014 Sony Pictures hack 2225:2013 Yahoo! data breach 2210:South Korea cyberattack 2112:Operation Olympic Games 2107:Australian cyberattacks 1441:(in French). 2008-09-01 1208:Anderson, Kent (2006). 1159:Sociologie du numĂ©rique 784:Magic Lantern (spyware) 563:For more guidance, see 345:The CCC often uses the 331:Gulaschprogrammiernacht 311:Hamburg congress center 2757:Syrian Electronic Army 2467:SingHealth data breach 2230:Singapore cyberattacks 2168:RSA SecurID compromise 1292:SIGINT Willkommen 2009 1270:"33C3 Call For Papers" 1088:Wau Holland Foundation 771: 699: 588: 365: 316:Every four years, the 302: 288: 229:freedom of information 82:; 43 years ago 80:12 September 1981 66: 58: 3046:Lazy FP state restore 2830:Kristoffer von Hassel 2483:Sri Lanka cyberattack 2353:Vietnam Airport Hacks 2194:Operation High Roller 1439:Le Monde diplomatique 1110:. Chaos Computer Club 1108:"Chaos Computer Club" 1073:Project Blinkenlights 993:Chaos Digest (ChaosD) 909:Daniel Domscheit-Berg 899:Domscheit-Berg affair 882:certificate authority 801:computer surveillance 766: 759:Staatstrojaner affair 736:Schäuble fingerprints 710:Project Blinkenlights 704:Project Blinkenlights 694: 687:Project Blinkenlights 586: 565:Knowledge:Translation 536:copyright attribution 363: 271: 2992:Silent Bob is Silent 2052:Hacking in the 2010s 1353:"Chaos macht Schule" 1146:Accessed 2013-09-23. 792:The Staatstrojaner ( 241:open-source software 205:eingetragener Verein 2926:SS7 vulnerabilities 2462:Atlanta cyberattack 2431:Equifax data breach 2189:Stratfor email leak 2138:Canadian government 2117:Operation ShadowNet 1890:"CCC | Hackerethik" 1063:Information privacy 963:Jean-Bernard Condat 749:fingerprint readers 622:Deutsche Bundespost 299:Deutsche Bundespost 192:Chaos Computer Club 45: 44:Chaos Computer Club 3375:Petya and NotPetya 3004:ROCA vulnerability 2767:The Shadow Brokers 2693:Iranian Cyber Army 2619:persistent threats 2419:Petya and NotPetya 2383:2016 Bitfinex hack 2358:DCCC cyber attacks 2317:SWIFT banking hack 1700:2014-02-01 at the 1489:2008-05-30 at the 1288:2017-07-08 at the 913:Andy MĂĽller-Maguhn 851:). According to a 808:Internet telephony 772: 700: 634:Karl Koch (hacker) 589: 544:interlanguage link 428:Andy MĂĽller-Maguhn 417:Chaos macht Schule 366: 303: 223:(CCC-CH) instead. 43: 32:Chaos Esports Club 3500: 3499: 3496: 3495: 3488:ZeroAccess botnet 2800:Mustafa Al-Bassam 2567:New World Hackers 2530:associated events 2511: 2510: 2307:VTech data breach 2158:Operation AntiSec 2122:Operation Payback 2081: 2080: 1764:Help Net Security 1532:blinkenlights.net 857:Landeskriminalamt 745:Wolfgang Schäuble 576: 575: 488: 484: 361: 188: 187: 16:(Redirected from 3530: 3104: 3103: 2777:Yemen Cyber Army 2101:Operation Aurora 2091: 2090: 2060: 2059: 2046: 2039: 2032: 2023: 2022: 2008: 2007: 2005:Official website 1973: 1958: 1952: 1951: 1949: 1948: 1934: 1928: 1927: 1925: 1924: 1910: 1904: 1903: 1901: 1900: 1886: 1880: 1879: 1877: 1876: 1862: 1856: 1845:Heather Brooke, 1843: 1837: 1825: 1819: 1818: 1816: 1815: 1801: 1795: 1794: 1792: 1791: 1780: 1774: 1773: 1771: 1770: 1755: 1749: 1748: 1736: 1730: 1729: 1727: 1726: 1715: 1704: 1692: 1686: 1679: 1673: 1672: 1670: 1669: 1654: 1645: 1644: 1642: 1641: 1624: 1618: 1617: 1615: 1614: 1603: 1597: 1596: 1594: 1593: 1578: 1572: 1571: 1570: 1569: 1548: 1542: 1541: 1539: 1538: 1524: 1518: 1517: 1515: 1514: 1499: 1493: 1481: 1475: 1474: 1472: 1471: 1456: 1450: 1449: 1447: 1446: 1431: 1422: 1421: 1415: 1407: 1405: 1404: 1392: 1386: 1385: 1383: 1382: 1370: 1364: 1363: 1361: 1360: 1348: 1342: 1341: 1339: 1338: 1332: 1325: 1317: 1311: 1310: 1305:. Archived from 1299: 1293: 1280: 1274: 1273: 1266: 1260: 1259: 1257: 1256: 1247:. Archived from 1237: 1231: 1230: 1228: 1227: 1221: 1215:. Archived from 1214: 1205: 1199: 1198: 1196: 1195: 1180: 1174: 1173: 1169:978-2-20061207-8 1153: 1147: 1139: 1133: 1132: 1125: 1119: 1118: 1116: 1115: 1104: 1053:Digital identity 991:magazine called 987:The CCCF had an 979: 942:iris recognition 879: 870: 714:Haus des Lehrers 597:Die Tageszeitung 555: 549: 523: 522:|topic= 520:, and specifying 505:Google Translate 486: 482: 465: 464: 457: 403: 388: 362: 291: 283: 222: 158: 155: 153: 90: 88: 83: 69: 61: 53: 46: 42: 21: 3538: 3537: 3533: 3532: 3531: 3529: 3528: 3527: 3503: 3502: 3501: 3492: 3446: 3430: 3384: 3328: 3297: 3241: 3220: 3174: 3133: 3093: 2873: 2871:vulnerabilities 2864: 2781: 2674:(confederation) 2637:Charming Kitten 2618: 2611: 2547:Goatse Security 2507: 2471: 2445: 2436:Deloitte breach 2387: 2373:Dyn cyberattack 2321: 2280: 2251:Operation Tovar 2234: 2198: 2172: 2126: 2087:Major incidents 2082: 2053: 2050: 2012:CCC Events Blog 2003: 2002: 1999: 1982: 1980:Further reading 1977: 1976: 1959: 1955: 1946: 1944: 1936: 1935: 1931: 1922: 1920: 1912: 1911: 1907: 1898: 1896: 1888: 1887: 1883: 1874: 1872: 1864: 1863: 1859: 1844: 1840: 1826: 1822: 1813: 1811: 1803: 1802: 1798: 1789: 1787: 1782: 1781: 1777: 1768: 1766: 1756: 1752: 1737: 1733: 1724: 1722: 1717: 1716: 1707: 1702:Wayback Machine 1693: 1689: 1680: 1676: 1667: 1665: 1656: 1655: 1648: 1639: 1637: 1626: 1625: 1621: 1612: 1610: 1605: 1604: 1600: 1591: 1589: 1579: 1575: 1567: 1565: 1550: 1549: 1545: 1536: 1534: 1526: 1525: 1521: 1512: 1510: 1501: 1500: 1496: 1491:Wayback Machine 1482: 1478: 1469: 1467: 1458: 1457: 1453: 1444: 1442: 1433: 1432: 1425: 1409: 1408: 1402: 1400: 1393: 1389: 1380: 1378: 1371: 1367: 1358: 1356: 1349: 1345: 1336: 1334: 1330: 1323: 1319: 1318: 1314: 1301: 1300: 1296: 1290:Wayback Machine 1281: 1277: 1268: 1267: 1263: 1254: 1252: 1245:Tech the Future 1239: 1238: 1234: 1225: 1223: 1219: 1212: 1206: 1202: 1193: 1191: 1181: 1177: 1170: 1154: 1150: 1140: 1136: 1127: 1126: 1122: 1113: 1111: 1106: 1105: 1101: 1096: 1078:Security hacker 1068:Netzpolitik.org 1015: 1009: 973: 951: 938: 930: 921: 901: 877: 864: 790: 761: 738: 706: 689: 666: 646:hackers led by 636: 630: 609: 581: 572: 571: 570: 553: 547: 521: 489: 466: 462: 455: 446: 440: 397: 382: 357: 355: 277: 266: 261: 216: 180: 150: 142: 91: 86: 84: 81: 72: 39: 28: 23: 22: 15: 12: 11: 5: 3536: 3526: 3525: 3520: 3515: 3498: 3497: 3494: 3493: 3491: 3490: 3485: 3480: 3475: 3470: 3465: 3460: 3454: 3452: 3448: 3447: 3445: 3444: 3438: 3436: 3432: 3431: 3429: 3428: 3423: 3418: 3413: 3408: 3403: 3398: 3392: 3390: 3386: 3385: 3383: 3382: 3377: 3372: 3367: 3362: 3357: 3352: 3347: 3342: 3336: 3334: 3330: 3329: 3327: 3326: 3321: 3316: 3311: 3305: 3303: 3299: 3298: 3296: 3295: 3290: 3285: 3280: 3275: 3270: 3265: 3260: 3258:Black Energy 3 3255: 3249: 3247: 3243: 3242: 3240: 3239: 3234: 3228: 3226: 3222: 3221: 3219: 3218: 3213: 3208: 3203: 3198: 3193: 3188: 3182: 3180: 3176: 3175: 3173: 3172: 3167: 3165:Metulji botnet 3162: 3157: 3152: 3147: 3141: 3139: 3135: 3134: 3132: 3131: 3126: 3121: 3119:Black Energy 2 3116: 3110: 3108: 3101: 3095: 3094: 3092: 3091: 3085: 3079: 3073: 3067: 3061: 3055: 3049: 3043: 3037: 3031: 3025: 3019: 3013: 3007: 3001: 2995: 2989: 2983: 2977: 2974:Broadcom Wi-Fi 2971: 2965: 2959: 2953: 2947: 2941: 2935: 2929: 2923: 2917: 2911: 2905: 2899: 2893: 2887: 2880: 2878: 2866: 2865: 2863: 2862: 2857: 2852: 2847: 2842: 2837: 2835:Junaid Hussain 2832: 2827: 2825:Jeremy Hammond 2822: 2820:Elliott Gunton 2817: 2812: 2807: 2802: 2797: 2791: 2789: 2783: 2782: 2780: 2779: 2774: 2769: 2764: 2759: 2754: 2752:Stealth Falcon 2749: 2744: 2739: 2734: 2729: 2727:PLA Unit 61486 2724: 2722:PLA Unit 61398 2719: 2717:Numbered Panda 2714: 2709: 2695: 2690: 2685: 2680: 2675: 2669: 2664: 2662:Equation Group 2659: 2654: 2649: 2644: 2639: 2634: 2629: 2623: 2621: 2613: 2612: 2610: 2609: 2604: 2599: 2594: 2589: 2584: 2579: 2574: 2569: 2564: 2559: 2554: 2549: 2544: 2539: 2534: 2533: 2532: 2521: 2519: 2513: 2512: 2509: 2508: 2506: 2505: 2500: 2495: 2490: 2485: 2479: 2477: 2473: 2472: 2470: 2469: 2464: 2459: 2453: 2451: 2447: 2446: 2444: 2443: 2438: 2433: 2428: 2427: 2426: 2416: 2411: 2406: 2401: 2395: 2393: 2389: 2388: 2386: 2385: 2380: 2375: 2370: 2365: 2360: 2355: 2350: 2345: 2340: 2335: 2329: 2327: 2323: 2322: 2320: 2319: 2314: 2309: 2304: 2299: 2294: 2288: 2286: 2282: 2281: 2279: 2278: 2273: 2268: 2263: 2258: 2253: 2248: 2242: 2240: 2236: 2235: 2233: 2232: 2227: 2222: 2217: 2212: 2206: 2204: 2200: 2199: 2197: 2196: 2191: 2186: 2180: 2178: 2174: 2173: 2171: 2170: 2165: 2160: 2155: 2153:HBGary Federal 2150: 2145: 2140: 2134: 2132: 2128: 2127: 2125: 2124: 2119: 2114: 2109: 2104: 2097: 2095: 2088: 2084: 2083: 2079: 2078: 2072: 2067: 2058: 2055: 2054: 2049: 2048: 2041: 2034: 2026: 2020: 2019: 2014: 2009: 1998: 1997:External links 1995: 1994: 1993: 1981: 1978: 1975: 1974: 1953: 1929: 1905: 1881: 1857: 1838: 1820: 1796: 1775: 1750: 1739:Leyden, John. 1731: 1705: 1687: 1674: 1646: 1619: 1598: 1573: 1543: 1519: 1494: 1476: 1451: 1423: 1387: 1365: 1343: 1312: 1309:on 2015-04-19. 1294: 1275: 1261: 1232: 1200: 1175: 1168: 1148: 1134: 1120: 1098: 1097: 1095: 1092: 1091: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1058:Hacker culture 1055: 1050: 1048:Digitalcourage 1045: 1043:Datenschleuder 1040: 1034: 1029: 1024: 1008: 1005: 950: 947: 937: 934: 929: 926: 920: 917: 900: 897: 760: 757: 737: 734: 702:Main article: 688: 685: 665: 662: 640:cyberespionage 632:Main article: 629: 626: 613:Bildschirmtext 608: 605: 580: 577: 574: 573: 569: 568: 561: 550: 528: 525: 513:adding a topic 508: 497: 490: 483:(January 2017) 471: 470: 469: 467: 460: 454: 451: 442:Main article: 439: 436: 421:media literacy 376:data slingshot 371:Datenschleuder 354: 351: 347:c-base station 265: 264:Regular events 262: 260: 257: 245:hacker culture 186: 185: 182: 181: 179: 178: 172: 170: 164: 163: 160: 159: 148: 144: 143: 141: 140: 134: 132: 128: 127: 121: 117: 116: 111: 107: 106: 101: 97: 96: 95:, West Germany 78: 74: 73: 54: 34:, an American 26: 9: 6: 4: 3: 2: 3535: 3524: 3521: 3519: 3518:Hacker groups 3516: 3514: 3511: 3510: 3508: 3489: 3486: 3484: 3481: 3479: 3476: 3474: 3471: 3469: 3466: 3464: 3461: 3459: 3456: 3455: 3453: 3449: 3443: 3440: 3439: 3437: 3433: 3427: 3424: 3422: 3419: 3417: 3414: 3412: 3409: 3407: 3404: 3402: 3399: 3397: 3394: 3393: 3391: 3387: 3381: 3378: 3376: 3373: 3371: 3368: 3366: 3363: 3361: 3358: 3356: 3353: 3351: 3348: 3346: 3343: 3341: 3338: 3337: 3335: 3331: 3325: 3322: 3320: 3317: 3315: 3312: 3310: 3307: 3306: 3304: 3300: 3294: 3291: 3289: 3288:Gameover ZeuS 3286: 3284: 3281: 3279: 3276: 3274: 3271: 3269: 3266: 3264: 3261: 3259: 3256: 3254: 3251: 3250: 3248: 3244: 3238: 3235: 3233: 3230: 3229: 3227: 3223: 3217: 3214: 3212: 3209: 3207: 3204: 3202: 3199: 3197: 3194: 3192: 3189: 3187: 3184: 3183: 3181: 3177: 3171: 3168: 3166: 3163: 3161: 3158: 3156: 3153: 3151: 3148: 3146: 3143: 3142: 3140: 3136: 3130: 3127: 3125: 3122: 3120: 3117: 3115: 3112: 3111: 3109: 3105: 3102: 3100: 3096: 3089: 3086: 3083: 3080: 3077: 3074: 3071: 3068: 3065: 3062: 3059: 3056: 3053: 3050: 3047: 3044: 3041: 3038: 3035: 3032: 3029: 3026: 3023: 3020: 3017: 3014: 3011: 3008: 3005: 3002: 2999: 2996: 2993: 2990: 2987: 2984: 2981: 2978: 2975: 2972: 2969: 2966: 2963: 2960: 2957: 2954: 2951: 2948: 2945: 2942: 2939: 2936: 2933: 2930: 2927: 2924: 2921: 2918: 2915: 2912: 2909: 2906: 2903: 2900: 2897: 2894: 2891: 2888: 2885: 2882: 2881: 2879: 2877: 2872: 2867: 2861: 2858: 2856: 2853: 2851: 2848: 2846: 2843: 2841: 2838: 2836: 2833: 2831: 2828: 2826: 2823: 2821: 2818: 2816: 2813: 2811: 2808: 2806: 2803: 2801: 2798: 2796: 2793: 2792: 2790: 2788: 2784: 2778: 2775: 2773: 2770: 2768: 2765: 2763: 2760: 2758: 2755: 2753: 2750: 2748: 2747:Rocket Kitten 2745: 2743: 2740: 2738: 2735: 2733: 2730: 2728: 2725: 2723: 2720: 2718: 2715: 2713: 2710: 2707: 2703: 2699: 2698:Lazarus Group 2696: 2694: 2691: 2689: 2686: 2684: 2681: 2679: 2676: 2673: 2670: 2668: 2665: 2663: 2660: 2658: 2655: 2653: 2650: 2648: 2645: 2643: 2640: 2638: 2635: 2633: 2630: 2628: 2625: 2624: 2622: 2620: 2614: 2608: 2605: 2603: 2600: 2598: 2595: 2593: 2590: 2588: 2585: 2583: 2580: 2578: 2575: 2573: 2570: 2568: 2565: 2563: 2560: 2558: 2555: 2553: 2550: 2548: 2545: 2543: 2540: 2538: 2535: 2531: 2528: 2527: 2526: 2523: 2522: 2520: 2518: 2514: 2504: 2501: 2499: 2496: 2494: 2491: 2489: 2486: 2484: 2481: 2480: 2478: 2474: 2468: 2465: 2463: 2460: 2458: 2455: 2454: 2452: 2448: 2442: 2441:Disqus breach 2439: 2437: 2434: 2432: 2429: 2425: 2422: 2421: 2420: 2417: 2415: 2412: 2410: 2407: 2405: 2402: 2400: 2397: 2396: 2394: 2390: 2384: 2381: 2379: 2376: 2374: 2371: 2369: 2366: 2364: 2361: 2359: 2356: 2354: 2351: 2349: 2346: 2344: 2341: 2339: 2336: 2334: 2331: 2330: 2328: 2324: 2318: 2315: 2313: 2310: 2308: 2305: 2303: 2300: 2298: 2295: 2293: 2290: 2289: 2287: 2283: 2277: 2274: 2272: 2269: 2267: 2264: 2262: 2259: 2257: 2254: 2252: 2249: 2247: 2244: 2243: 2241: 2237: 2231: 2228: 2226: 2223: 2221: 2218: 2216: 2215:Snapchat hack 2213: 2211: 2208: 2207: 2205: 2201: 2195: 2192: 2190: 2187: 2185: 2184:LinkedIn hack 2182: 2181: 2179: 2175: 2169: 2166: 2164: 2161: 2159: 2156: 2154: 2151: 2149: 2146: 2144: 2141: 2139: 2136: 2135: 2133: 2129: 2123: 2120: 2118: 2115: 2113: 2110: 2108: 2105: 2102: 2099: 2098: 2096: 2092: 2089: 2085: 2077: → 2076: 2073: 2071: 2068: 2066: 2063:←  2062: 2061: 2056: 2047: 2042: 2040: 2035: 2033: 2028: 2027: 2024: 2018: 2015: 2013: 2010: 2006: 2001: 2000: 1991: 1987: 1984: 1983: 1972: 1968: 1964: 1963: 1957: 1943: 1939: 1933: 1919: 1915: 1909: 1895: 1891: 1885: 1871: 1867: 1861: 1854: 1853: 1848: 1842: 1835: 1834: 1829: 1824: 1810: 1806: 1800: 1785: 1779: 1765: 1761: 1754: 1746: 1742: 1735: 1720: 1714: 1712: 1710: 1703: 1699: 1696: 1691: 1684: 1678: 1663: 1659: 1653: 1651: 1635: 1634: 1629: 1623: 1608: 1602: 1588: 1584: 1577: 1564:on 2013-12-08 1563: 1559: 1555: 1554: 1547: 1533: 1529: 1523: 1508: 1504: 1498: 1492: 1488: 1485: 1480: 1465: 1461: 1455: 1440: 1436: 1430: 1428: 1419: 1413: 1398: 1391: 1376: 1369: 1354: 1347: 1329: 1326:(in German). 1322: 1316: 1308: 1304: 1298: 1291: 1287: 1284: 1279: 1271: 1265: 1251:on 2014-07-05 1250: 1246: 1242: 1236: 1222:on 2008-02-27 1218: 1211: 1204: 1190: 1186: 1179: 1171: 1165: 1161: 1160: 1152: 1145: 1144: 1138: 1130: 1124: 1109: 1103: 1099: 1089: 1086: 1084: 1083:Tron (hacker) 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1049: 1046: 1044: 1041: 1038: 1035: 1033: 1030: 1028: 1025: 1023: 1021: 1017: 1016: 1014: 1004: 1002: 998: 994: 990: 985: 983: 977: 972: 968: 964: 960: 956: 946: 943: 933: 928:Apple TouchID 925: 916: 914: 910: 906: 896: 894: 890: 885: 883: 875: 871: 868: 863: 858: 854: 850: 846: 842: 837: 835: 831: 826: 824: 819: 817: 813: 809: 806: 802: 798: 797: 789: 785: 781: 777: 770: 765: 756: 754: 750: 746: 743: 733: 731: 727: 723: 719: 715: 711: 705: 697: 696:Blinkenlights 693: 684: 682: 678: 675: 671: 661: 659: 658: 653: 649: 645: 641: 635: 625: 623: 618: 614: 604: 602: 598: 594: 585: 566: 562: 559: 551: 545: 541: 537: 533: 529: 526: 519: 518:main category 515: 514: 509: 506: 502: 498: 495: 492: 491: 485: 479: 477: 472:You can help 468: 459: 458: 450: 445: 435: 433: 429: 424: 422: 418: 413: 411: 407: 401: 396: 392: 386: 381: 377: 373: 372: 350: 348: 343: 341: 337: 333: 332: 327: 323: 319: 314: 312: 308: 300: 296: 292: 290: 284: 281: 276: 270: 256: 254: 248: 246: 242: 238: 234: 230: 224: 220: 215: 211: 207: 206: 201: 197: 193: 183: 177: 174: 173: 171: 169: 165: 161: 157: 149: 145: 139: 136: 135: 133: 129: 125: 122: 118: 115: 112: 108: 105: 102: 98: 94: 79: 75: 70: 68: 62: 60: 52: 47: 41: 38:organization. 37: 33: 19: 3232:CryptoLocker 2986:DoublePulsar 2805:Cyber Anakin 2795:Ryan Ackroyd 2688:Helix Kitten 2683:Hacking Team 2678:Guccifer 2.0 2552:Lizard Squad 2368:Surkov leaks 2297:Hacking Team 1992:, 2011-02-11 1970: 1960: 1956: 1945:. Retrieved 1941: 1932: 1921:. Retrieved 1917: 1908: 1897:. Retrieved 1893: 1884: 1873:. Retrieved 1869: 1860: 1855:, 2011-08-25 1852:The Guardian 1850: 1841: 1836:, 2011-08-15 1831: 1823: 1812:. Retrieved 1808: 1799: 1788:. Retrieved 1786:. 2011-10-18 1778: 1767:. Retrieved 1763: 1753: 1745:The Register 1744: 1734: 1723:. Retrieved 1721:. 2011-10-10 1690: 1681:Basil Cupa, 1677: 1666:. Retrieved 1664:. 2011-10-10 1661: 1638:. Retrieved 1636:. 2011-10-09 1631: 1622: 1611:. Retrieved 1601: 1590:. Retrieved 1586: 1576: 1566:, retrieved 1562:the original 1558:Heise Online 1552: 1546: 1535:. Retrieved 1531: 1522: 1511:. Retrieved 1506: 1497: 1479: 1468:. Retrieved 1466:. 2001-08-13 1463: 1454: 1443:. Retrieved 1438: 1401:. Retrieved 1390: 1379:. Retrieved 1368: 1357:. Retrieved 1346: 1335:. Retrieved 1315: 1307:the original 1297: 1278: 1264: 1253:. Retrieved 1249:the original 1244: 1235: 1224:. Retrieved 1217:the original 1203: 1192:. Retrieved 1189:The Observer 1188: 1178: 1158: 1151: 1141: 1137: 1128: 1123: 1112:. Retrieved 1102: 1019: 992: 986: 971:Jean Guisnel 961:(France) by 954: 952: 939: 931: 922: 902: 886: 860: 838: 834:jurisdiction 827: 820: 796:Trojan horse 793: 791: 769:trojan horse 739: 717: 709: 707: 667: 655: 637: 610: 590: 540:edit summary 531: 511: 481: 473: 447: 425: 416: 414: 410:Tim Pritlove 405: 375: 369: 367: 344: 329: 315: 304: 286: 275:Pesthörnchen 273: 249: 237:hacker ethic 225: 209: 203: 195: 191: 189: 120:Headquarters 64: 56: 40: 18:Chaos Digest 3468:NetTraveler 3406:LogicLocker 3314:Hidden Tear 3211:Red October 3070:Dragonblood 2980:EternalBlue 2944:Stagefright 2810:George Hotz 2787:Individuals 2537:CyberBerkut 1833:Der Spiegel 1662:Der Spiegel 1633:Der Spiegel 1509:(in French) 1507:blog.bnf.fr 1399:(in German) 1377:(in German) 1355:(in German) 974: [ 878:scuinst.exe 865: [ 849:Oktoberfest 830:unencrypted 823:screenshots 753:e-passports 601:Wau Holland 587:Wau Holland 444:CryptoParty 438:CryptoParty 398: [ 383: [ 295:Jolly Roger 278: [ 233:human right 217: [ 210:Erfa-Kreise 93:West Berlin 67:Datenknoten 59:Chaosknoten 3507:Categories 3411:Rensenware 3396:BrickerBot 3324:TeslaCrypt 3114:Bad Rabbit 3064:Foreshadow 2968:Cloudbleed 2920:Row hammer 2902:Shellshock 2896:Heartbleed 2884:Evercookie 2860:The Jester 2742:Red Apollo 2702:BlueNorOff 2672:GOSSIPGIRL 2667:Fancy Bear 2657:Elfin Team 2652:DarkMatter 2647:Dark Basin 2632:Bureau 121 2592:Teamp0ison 2517:Hacktivism 2148:DNSChanger 1947:2018-03-12 1923:2018-03-12 1918:www.ccc.de 1899:2018-03-13 1894:www.ccc.de 1875:2018-12-28 1870:www.ccc.de 1814:2018-12-28 1790:2021-03-16 1769:2018-12-28 1725:2018-12-28 1668:2011-10-31 1640:2011-10-10 1613:2011-10-10 1592:2018-12-28 1568:2008-04-17 1537:2018-12-28 1513:2021-01-26 1470:2019-04-19 1445:2018-03-12 1403:2016-01-11 1381:2016-01-11 1359:2016-01-11 1337:2019-06-03 1255:2014-08-20 1226:2008-05-14 1194:2018-12-28 1114:2016-08-23 1094:References 1011:See also: 989:electronic 907:spokesman 774:See also: 677:encryption 391:talk radio 380:Chaosradio 340:Easterhegg 289:Datenpirat 259:Activities 231:, and the 87:1981-09-12 3442:VPNFilter 3319:Rombertik 3283:FinFisher 3273:DarkHotel 3237:DarkSeoul 3145:Coreflood 3010:BlueBorne 2962:Dirty COW 2876:disclosed 2874:publicly 2712:NSO Group 2642:Cozy Bear 2582:PayPal 14 2525:Anonymous 2399:SHAttered 2143:DigiNotar 1037:Chaosdorf 1001:1244-4901 905:WikiLeaks 874:WikiLeaks 648:Karl Koch 628:Karl Koch 593:Kommune 1 558:talk page 510:Consider 478:in German 336:Karlsruhe 126:, Germany 77:Formation 3483:Titanium 3426:XafeCopy 3421:WannaCry 3350:KeRanger 3278:Duqu 2.0 3263:Carbanak 3082:BlueKeep 3058:SigSpoof 3016:Meltdown 2932:WinShock 2914:Rootpipe 2815:Guccifer 2737:Pranknet 2732:PLATINUM 2706:AndAriel 2617:Advanced 2572:NullCrew 2557:LulzRaft 2457:Trustico 2070:Timeline 1990:BBC News 1969:, 2007: 1965:No. 64, 1698:Archived 1587:Security 1487:Archived 1412:cite web 1328:Archived 1303:"SIGINT" 1286:Archived 1007:See also 862:DigiTask 845:Bavarian 794:Federal 664:GSM-Hack 607:BTX-Hack 579:Founding 534:provide 131:Location 3380:X-Agent 3370:Pegasus 3253:Brambul 3216:Shamoon 3160:Kelihos 3150:Alureon 3129:Stuxnet 3099:Malware 3052:TLBleed 3034:Exactis 3022:Spectre 2956:Badlock 2890:iSeeYou 2855:Topiary 2587:RedHack 2577:OurMine 2562:LulzSec 903:Former 812:encrypt 805:wiretap 799:) is a 776:FOXACID 730:Ontario 726:Toronto 674:COMP128 556:to the 538:in the 480:. 453:History 326:Cologne 200:hackers 147:Website 124:Hamburg 110:Purpose 85: ( 36:esports 3463:Joanap 3416:Triton 3355:Necurs 3345:Jigsaw 3340:Hitler 3309:Dridex 3268:Careto 3191:Dexter 3124:SpyEye 3090:(2019) 3084:(2019) 3078:(2019) 3072:(2019) 3066:(2018) 3060:(2018) 3054:(2018) 3048:(2018) 3042:(2018) 3036:(2018) 3030:(2018) 3024:(2018) 3018:(2018) 3012:(2017) 3006:(2017) 3000:(2017) 2994:(2017) 2988:(2017) 2982:(2017) 2976:(2017) 2970:(2017) 2964:(2016) 2958:(2016) 2952:(2016) 2946:(2015) 2940:(2015) 2938:JASBUG 2934:(2014) 2928:(2014) 2922:(2014) 2916:(2014) 2910:(2014) 2908:POODLE 2904:(2014) 2898:(2014) 2892:(2013) 2886:(2010) 2869:Major 2850:Track2 2772:xDedic 2602:UGNazi 1962:Phrack 1809:DW.COM 1464:SFGate 1166:  1027:c-base 1022:(film) 999:  853:Sophos 786:, and 718:Arcade 644:German 322:SIGINT 3478:Tinba 3365:Mirai 3293:Regin 3206:Mahdi 3201:Flame 3186:Carna 3170:Stars 3088:Kr00k 3028:EFAIL 2998:KRACK 2950:DROWN 2075:2020s 2065:2000s 1351:CCC. 1331:(PDF) 1324:(PDF) 1220:(PDF) 1213:(PDF) 978:] 869:] 841:R2-D2 501:DeepL 432:ICANN 402:] 395:Fritz 387:] 364:Video 282:] 221:] 176:50472 3473:R2D2 3458:Grum 3451:2019 3435:2018 3401:Kirk 3389:2017 3360:MEMZ 3333:2016 3302:2015 3246:2014 3225:2013 3179:2012 3155:Duqu 3138:2011 3107:2010 2845:Sabu 2597:TDO 2542:GNAA 2476:2019 2450:2018 2392:2017 2326:2016 2285:2015 2239:2014 2203:2013 2177:2012 2131:2011 2094:2010 1418:link 1164:ISBN 997:ISSN 959:Lyon 953:The 887:The 681:SIMs 532:must 530:You 494:View 293:, a 285:aka 190:The 138:DACH 100:Type 63:aka 3196:FBI 2840:MLT 2704:) ( 1003:). 670:GSM 652:KGB 599:by 503:or 408:by 406:CRE 334:in 324:in 196:CCC 168:ASN 156:/en 154:.de 152:ccc 104:NGO 3509:: 1988:, 1940:. 1916:. 1892:. 1868:. 1849:, 1830:, 1807:. 1762:. 1743:. 1708:^ 1660:. 1649:^ 1630:. 1585:. 1556:, 1530:. 1505:. 1462:. 1437:. 1426:^ 1414:}} 1410:{{ 1243:. 1187:. 1020:23 984:. 976:fr 867:de 836:. 782:, 778:, 755:. 728:, 683:. 660:. 657:23 617:DM 412:. 400:de 385:de 280:de 219:de 2708:) 2700:( 2045:e 2038:t 2031:v 1950:. 1926:. 1902:. 1878:. 1817:. 1793:. 1772:. 1747:. 1728:. 1671:. 1643:. 1616:. 1595:. 1540:. 1516:. 1473:. 1448:. 1420:) 1406:. 1384:. 1362:. 1340:. 1272:. 1258:. 1229:. 1172:. 1117:. 567:. 560:. 374:( 194:( 89:) 71:) 20:)

Index

Chaos Digest
Chaos Esports Club
esports

West Berlin
NGO
Computer security hacking
Hamburg
DACH
ccc.de/en
ASN
50472
hackers
eingetragener Verein
Chaos Computer Club Schweiz
de
freedom of information
human right
hacker ethic
open-source software
hacker culture
German constitutional court

Pesthörnchen
de
Jolly Roger
Deutsche Bundespost
Chaos Communication Congress
Hamburg congress center
Chaos Communication Camp

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑