463:
51:
358:
692:
269:
764:
832:, with no checks for authentication or integrity. This leaves any computer under surveillance using this software vulnerable to attack. The captured screenshots and audio files were encrypted, but so incompetently that the encryption was ineffective. All captured data was sent over a proxy server in the United States, which is problematic since the data is then temporarily outside the German
360:
619:
134,000 (equivalent to €131,600 in 2021) in a
Hamburg bank in favor of the club. The money was returned the next day in front of the press. Prior to the incident, the system provider had failed to react to proof of the security flaw provided by the CCC, claiming to the public that their system
250:
Members of the CCC have demonstrated and publicized a number of important information security problems. The CCC frequently criticizes new legislation and products with weak information security which endanger citizen rights or the privacy of users. Notable members of the CCC regularly function as
944:
system claims to be "one of the safest ways to keep your phone locked and the contents private" as "patterns in your irises are unique to you and are virtually impossible to replicate", as quoted in official
Samsung content. However, in some cases, using a high resolution photograph of the phone
923:
The CCC has repeatedly warned phone users of the weakness of biometric identification in the wake of the 2008 Schäuble fingerprints affair. In their "hacker ethics" the CCC includes "protect people data", but also "Computers can change your life for the better". The club regards privacy as an
895:(BKA); this statement however does not eliminate the possibility that it has been used by state-level German police forces. The BKA had previously announced however (in 2007) that they had somewhat similar trojan software that can inspect a computer's hard drive.
1971:"A good example of this was the fake hacking meeting created in the middle 1990' so called the CCCF (Chaos Computer Club France) where a lot of hackers got busted under the active participation of a renegade hacker so called Jean-Bernard Condat."
226:
The CCC describes itself as "a galactic community of life forms, independent of age, sex, race or societal orientation, which strives across borders for freedom of information…". In general, the CCC advocates more transparency in government,
448:
The CCC sensitises and introduces people to the questions of data privacy. Some of its local chapters support or organize so called CryptoParties to introduce people to the basics of practical cryptography and internet anonymity.
507:, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Knowledge.
924:
individual right: the CCC does not discourage people from sharing or storing personal information on their phones, but advocates better privacy protection, and the use of specific browsing and sharing techniques by users.
212:) in various cities in Germany and the surrounding countries, particularly where there are German-speaking communities. Since 1985, some chapters in Switzerland have organized an independent sister association called the
359:
620:
was safe. Bildschirmtext was the biggest commercially available online system targeted at the general public in its region at that time, run and heavily advertised by the German telecommunications agency
243:. The CCC spreads an entrepreneurial vision refusing capitalist control. It has been characterised as "…one of the most influential digital organisations anywhere, the centre of German digital culture,
969:
governmental agency. The primary goal of the CCCF was to watch and to gather information about the French hacker community, identifying the hackers who could harm the country. Journalist
1551:
818:
has ruled that the police may only use such programs for telephony wiretapping, and for no other purpose, and that this restriction should be enforced through technical and legal means.
493:
911:
was expelled from the national CCC (but not the Berlin chapter) in August 2011. This decision was revoked in
February 2012. As a result of his role in the expulsion, board member
584:
1240:
821:
On 8 October 2011, the CCC published an analysis of the
Staatstrojaner software. The software was found to have the ability to remote control the target computer, to capture
650:, who was loosely affiliated with the CCC, was arrested for breaking into US government and corporate computers, and then selling operating-system source code to the Soviet
1697:
517:
825:, and to fetch and run arbitrary extra code. The CCC says that having this functionality built in is in direct contradiction to the ruling of the constitutional court.
404:
and on the internet. Other programs have emerged in the context of
Chaosradio, including radio programs offered by some regional Chaos Groups and the podcast spin-off
828:
In addition, there were a number of security problems with the implementation. The software was controllable over the
Internet, but the commands were sent completely
2357:
932:
From a photograph of the user's fingerprint on a glass surface, using "easy everyday means", the biometrics hacking team of the CCC was able to unlock an iPhone 5S.
2377:
1209:
313:
in 2013, it drew 9,000 guests. For the 2016 installment, 11,000 guests were expected, with additional viewers following the event via live streaming.
1582:
527:
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
1417:
2069:
394:
2043:
1561:
970:
2991:
1695:
German federal Trojan eavesdrops on 15 applications, experts find. The R2-D2 surveillance Trojan also has support for 64-bit
Windows systems
1374:
2529:
1759:
379:
2347:
338:
is with more than 1,500 participants the second largest annual event. Another yearly CCC event taking place on the Easter weekend is the
2337:
880:, short for Skype Capture Unit Installer. The 64-bit Windows version installs a digitally signed driver, but signed by the non-existing
2291:
966:
888:
861:
1327:
1248:
1804:
892:
3522:
2925:
1459:
1184:
1012:
815:
603:
and others in anticipation of the prominent role that information technology would play in the way people live and communicate.
426:
CCC members are present in big tech companies and in administrative instances. One of the spokespersons of the CCC, as of 1986,
328:
which focused on the impact of digitisation on society. The SIGINT conference was discontinued in 2014. The four-day conference
1694:
2106:
810:. This "source wiretapping" is the only feasible way to wiretap in this case, since Internet telephony programs will usually
2461:
1167:
1285:
2875:
2342:
512:
721:
3512:
3009:
2492:
2270:
2036:
741:
535:
3015:
2541:
2502:
2137:
239:, the club also fights for free universal access to computers and technological infrastructure as well as the use of
1846:
1216:
548:
Content in this edit is translated from the existing German
Knowledge article at ]; see its history for attribution.
3075:
3021:
2596:
2487:
2316:
320:
is the outdoor alternative for hackers worldwide. The CCC also held, from 2009 to 2013, a yearly conference called
3069:
2423:
2260:
2162:
1718:
1682:
17:
2482:
2255:
2224:
981:
218:
843:
because the string "C3PO-r2d2-POE" was found in its code; another alias for it is 0zapftis ("It's tapped!" in
2362:
2275:
2074:
2064:
2029:
3236:
2626:
2413:
2352:
2311:
2209:
1031:
306:
252:
103:
2973:
2731:
2466:
2229:
213:
2566:
611:
The CCC became world-famous in 1984 when they drew public attention to the security flaws of the German
591:
The CCC was founded in West Berlin on 12 September 1981 at a table which had previously belonged to the
399:
3420:
2761:
2616:
2408:
2301:
2245:
1502:
680:
199:
2167:
2901:
2870:
2497:
779:
2456:
1827:
1657:
1486:
3039:
2606:
2524:
2430:
2403:
1627:
1302:
795:
557:
543:
317:
167:
1783:
3195:
2859:
2332:
2265:
2111:
1985:
855:
analysis, the trojan's behavior matches that described in a confidential memo between the German
839:
The CCC's findings were widely reported in the German press. This trojan has also been nicknamed
783:
708:
In 2001, the CCC celebrated its twentieth birthday with an interactive light installation dubbed
330:
310:
1000:
3517:
2756:
2418:
1087:
475:
228:
2398:
1913:
1157:
3257:
3210:
3118:
3045:
2829:
2193:
1072:
908:
881:
848:
800:
703:
564:
2440:
2296:
912:
427:
2854:
2219:
1937:
1740:
1320:
240:
204:
744:
8:
3344:
2372:
2188:
1434:
1062:
962:
621:
321:
298:
2701:
945:
owner's iris and a lens, the CCC claimed to be able to trick the authentication system.
751:. This was done to protest the use of biometric data in German identity devices such as
247:, hacktivism, and the intersection of any discussion of democratic and digital rights".
3482:
3477:
3374:
3003:
2766:
2692:
2382:
2183:
1966:
807:
752:
748:
647:
633:
31:
2705:
2214:
747:. The magazine also included the fingerprint on a film that readers could use to fool
279:
202:
with 7,700 registered members. Founded in 1981, the association is incorporated as an
3487:
3369:
3339:
2943:
2799:
2157:
2121:
1411:
1163:
996:
856:
844:
787:
539:
1683:
Trojan Horse
Resurrected: On the Legality of the Use of Government Spyware (Govware)
803:
program installed secretly on a suspect's computer, which the German police uses to
3415:
3267:
3190:
2839:
2776:
2651:
2100:
1805:"German company behind government spyware admits sale to Bavaria – DW – 11.10.2011"
1052:
941:
713:
596:
3113:
1375:"Medienkompetenz, quo vadis? Teil III: Interview zum Projekt "Chaos macht Schule""
3425:
3400:
3364:
3292:
3205:
3200:
2844:
2636:
2546:
2250:
1701:
1490:
1460:"Hacker remembered as computer age hero / Wau Holland fought to free information"
1289:
1077:
1067:
995:. Between 4 January 1993 and 5 August 1993, seventy-three issues were published (
988:
975:
419:
which supports teaching in local schools. Its aims are to improve technology and
255:, organize lawsuits and campaigns, or otherwise influence the political process.
113:
274:
3164:
3159:
2849:
2834:
2824:
2819:
2751:
2726:
2721:
2716:
2661:
2435:
2116:
1606:
1282:
1057:
1047:
1042:
639:
612:
420:
370:
244:
2306:
1269:
3506:
3287:
2746:
2697:
1865:
1082:
695:
616:
434:(Internet Corporation for Assigned Names and Numbers) between 2000 and 2002.
384:
50:
691:
3231:
3185:
2985:
2949:
2804:
2794:
2687:
2682:
2677:
2551:
2367:
1851:
1557:
1396:
884:"Goose Cert". DigiTask later admitted selling spy software to governments.
833:
768:
643:
409:
236:
232:
1583:"CCC publiziert die Fingerabdrücke von Wolfgang Schäuble [Update]"
1553:
CCC publishes fingerprints of
Wolfgang Schäuble, the German Home Secretary
891:
released a statement in which they denied that R2-D2 has been used by the
3467:
3457:
3405:
3313:
3169:
2979:
2809:
2671:
2536:
1832:
1632:
1394:
866:
822:
740:
In March 2008, the CCC acquired and published the fingerprints of German
600:
443:
294:
92:
3410:
3395:
3323:
3063:
2967:
2919:
2895:
2883:
2741:
2666:
2656:
2646:
2631:
2591:
2516:
2147:
2021:
1527:
811:
676:
546:
to the source of your translation. A model attribution edit summary is
390:
339:
378:) since 1984. The Berlin chapter produces a monthly radio show called
3441:
3318:
3282:
3272:
3144:
2961:
2711:
2641:
2581:
2142:
1107:
1036:
1018:
904:
873:
829:
656:
624:
which also strove to keep up-to-date alternatives out of the market.
592:
335:
1889:
1185:"Berlin's digital exiles: where tech activists go to escape the NSA"
389:
which picks up various technical and political topics in a two-hour
309:, Europe's biggest hacker gathering. When the event was held in the
268:
3349:
3277:
3262:
3081:
3057:
2931:
2913:
2814:
2736:
2571:
2556:
1989:
716:
in Berlin into a giant computer screen. A follow-up installation,
668:
In April 1998, the CCC successfully demonstrated the cloning of a
3379:
3252:
3215:
3149:
3128:
3098:
3051:
3033:
2955:
2889:
2586:
2576:
2561:
1503:"Nuit Blanche 2002 : jeux de lumière sur une tour de la BnF"
804:
775:
763:
729:
725:
673:
415:
Many of the chapters of CCC participate in the volunteer project
325:
123:
35:
504:
3462:
3354:
3308:
3123:
2937:
2907:
2786:
2771:
2601:
2152:
1961:
1142:
1026:
852:
346:
1760:"Federal Trojan has more capabilities than previously thought"
583:
3087:
3027:
2997:
2016:
876:
in 2008. Among other correlations is the dropper's file name
840:
431:
349:
located in Berlin as an event location or as function rooms.
175:
1866:"CCC – Ergebnis der außerordentlichen Mitgliederversammlung"
1039:, the local chapter of the Chaos Computer Club at DĂĽsseldorf
724:. Later in October 2008 CCC's Project Blinkenlights went to
3359:
3154:
958:
393:
show. The program is aired on a local radio station called
137:
1528:"Welcome to Project Blinkenlights – Project Blinkenlights"
1241:"Hacks and Highlights of the Chaos Communication Congress"
965:, under the command of Jean-Luc Delacour, an agent of the
516:
to this template: there are already 1,881 articles in the
2338:
Hollywood Presbyterian Medical Center ransomware incident
2011:
1483:
957:(CCCF) was a fake hacker organisation created in 1989 in
669:
651:
342:, which is more workshop oriented than the other events.
272:
Chaos Communication Camp 2003 near Berlin, featuring the
1429:
1427:
1395:
Tim Pritlove, Florian Grunow, Peter Hecko (2012-01-06).
1352:
1306:
638:
In 1987, the CCC was peripherally involved in the first
1967:"A personal view of the french underground (1992–2007)"
2004:
1938:"Security – Iris Scanner | Samsung Galaxy S8 and S8+"
1435:"Les " bidouilleurs " de la société de l'information"
1424:
1210:"Hacktivism and Politically Motivated Computer Crime"
767:
Mascot used to protest against the Staatstrojaner, a
500:
496:
a machine-translated version of the German article.
235:to communication. Supporting the principles of the
151:
948:
1607:"Chaos Computer Club analyzes government malware"
980:said that this organization also worked with the
642:case to make international headlines. A group of
430:, was a member of the executive committee of the
3504:
1914:"CCC | Chaos Computer Club breaks Apple TouchID"
1628:"CCC findet SicherheitslĂĽcken in Bundestrojaner"
1321:"19. Gulaschprogrammiernacht: Chaos im Lichthof"
2378:Russian interference in the 2016 U.S. elections
1986:Chaos Computer Club hackers 'have a conscience'
1121:
918:
1741:"German states defend use of 'Federal Trojan'"
1658:"Electronic Surveillance Scandal Hits Germany"
1176:
935:
542:accompanying your translation by providing an
487:Click for important translation instructions.
474:expand this article with text translated from
2037:
1416:: CS1 maint: multiple names: authors list (
1372:
1283:https://events.ccc.de/sigint/2009/Hauptseite
1201:
1149:
352:
287:
65:
57:
2348:Democratic National Committee cyber attacks
654:. This incident was portrayed in the movie
3472:
2292:Office of Personnel Management data breach
2044:
2030:
1652:
1650:
1276:
1182:
967:Direction de la surveillance du territoire
814:the data when it leaves the computer. The
1828:Top German Hacker Slams OpenLeaks Founder
720:, was created in 2002 by the CCC for the
368:The CCC publishes the irregular magazine
2051:
1713:
1711:
1709:
1207:
1155:
898:
762:
758:
735:
698:at the 22nd Chaos Communication Congress
690:
686:
679:algorithm used at that time by many GSM
615:computer network by causing it to debit
582:
356:
267:
208:in Germany, with local chapters (called
1647:
1262:
1013:Category:Members of Chaos Computer Club
816:Federal Constitutional Court of Germany
14:
3505:
1784:"Federal Trojan's got a "Big Brother""
1580:
1135:
297:malapropism to the logo of the former
2025:
1719:"German 'Government' R2D2 Trojan FAQ"
1706:
554:{{Translated|de|Chaos Computer Club}}
198:) is Europe's largest association of
1757:
1675:
1129:annual general assembly minutes 2018
915:was not reelected for another term.
456:
2343:Commission on Elections data breach
732:, Canada with project Stereoscope.
24:
1979:
1847:Inside the secret world of hackers
1738:
1233:
1156:Boullier, Dominique (2016-04-27).
1100:
423:of pupils, parents, and teachers.
27:Germany based hackers organization
25:
3534:
2503:Jeff Bezos phone hacking incident
1996:
1609:. Chaos Computer Club. 2011-10-08
1183:Cadwalladr, Carole (2014-11-09).
263:
3076:Microarchitectural Data Sampling
2312:Ukrainian Power Grid Cyberattack
2220:Cyberterrorism attack of June 25
1942:The Official Samsung Galaxy Site
1197:– via www.theguardian.com.
927:
889:Federal Ministry of the Interior
722:Bibliothèque nationale de France
461:
49:
2424:2017 Ukraine ransomware attacks
2261:2014 JPMorgan Chase data breach
1954:
1930:
1906:
1882:
1858:
1839:
1821:
1797:
1776:
1751:
1732:
1688:
1620:
1599:
1574:
1544:
1520:
1495:
1477:
1452:
1388:
1366:
1350:
1344:
1333:from the original on 2021-06-27
1313:
1295:
949:Fake Chaos Computer Club France
788:Heiko Maas § State trojans
3523:Organisations based in Hamburg
2256:2014 celebrity nude photo leak
1484:CCC | CCC klont D2 Kundenkarte
1143:Satzung des CCC e.V. (German).
893:Federal Criminal Police Office
595:in the rooms of the newspaper
552:You may also add the template
437:
13:
1:
2493:Bulgarian revenue agency hack
2271:Russian hacker password theft
1093:
301:, the Federal Post of Germany
258:
2627:Bangladesh Black Hat Hackers
2103:(publication of 2009 events)
1581:online, heise (2008-03-29).
1560:, 2008-03-31, archived from
1032:Chaos Communication Congress
919:Phone authentication systems
672:customer card, breaking the
627:
307:Chaos Communication Congress
7:
2488:Baltimore ransomware attack
1758:Zorz, Zeljka (2011-10-19).
1397:"CRE189 Chaos macht Schule"
1373:Anna Biselli (2014-03-24).
1162:(in French). Armand Colin.
1131:, Chaos Computer Club, 2018
1006:
982:French National Gendarmerie
936:Samsung S8 iris recognition
859:and a software firm called
663:
606:
578:
524:will aid in categorization.
253:German constitutional court
214:Chaos Computer Club Schweiz
10:
3539:
2762:Tailored Access Operations
2409:WannaCry ransomware attack
2302:Ashley Madison data breach
2246:Anthem medical data breach
2163:PlayStation network outage
2017:Chaosradio Podcast Network
1010:
955:Chaos Computer Club France
847:, a sardonic reference to
773:
701:
631:
499:Machine translation, like
452:
441:
55:Chaos Computer Club Logo (
29:
3513:Computer clubs in Germany
3450:
3434:
3388:
3332:
3301:
3245:
3224:
3178:
3137:
3106:
3097:
2868:
2785:
2615:
2515:
2498:WhatsApp snooping scandal
2475:
2449:
2391:
2363:Indian Bank data breaches
2325:
2284:
2238:
2202:
2176:
2130:
2093:
2086:
2057:
872:; the memo was leaked on
780:MiniPanzer and MegaPanzer
712:that turned the building
476:the corresponding article
353:Publications and outreach
305:The CCC hosts the annual
251:expert witnesses for the
184:
166:
162:
146:
130:
119:
114:Computer security hacking
109:
99:
76:
48:
3040:Speculative Store Bypass
2607:Ukrainian Cyber Alliance
2404:2017 Macron e-mail leaks
1685:, LISS 2013, pp. 419–428
940:The Samsung Galaxy S8's
742:Minister of the Interior
318:Chaos Communication Camp
30:Not to be confused with
2414:Westminster data breach
2333:Bangladesh Bank robbery
2276:2014 Yahoo! data breach
2266:2014 Sony Pictures hack
2225:2013 Yahoo! data breach
2210:South Korea cyberattack
2112:Operation Olympic Games
2107:Australian cyberattacks
1441:(in French). 2008-09-01
1208:Anderson, Kent (2006).
1159:Sociologie du numérique
784:Magic Lantern (spyware)
563:For more guidance, see
345:The CCC often uses the
331:Gulaschprogrammiernacht
311:Hamburg congress center
2757:Syrian Electronic Army
2467:SingHealth data breach
2230:Singapore cyberattacks
2168:RSA SecurID compromise
1292:SIGINT Willkommen 2009
1270:"33C3 Call For Papers"
1088:Wau Holland Foundation
771:
699:
588:
365:
316:Every four years, the
302:
288:
229:freedom of information
82:; 43 years ago
80:12 September 1981
66:
58:
3046:Lazy FP state restore
2830:Kristoffer von Hassel
2483:Sri Lanka cyberattack
2353:Vietnam Airport Hacks
2194:Operation High Roller
1439:Le Monde diplomatique
1110:. Chaos Computer Club
1108:"Chaos Computer Club"
1073:Project Blinkenlights
993:Chaos Digest (ChaosD)
909:Daniel Domscheit-Berg
899:Domscheit-Berg affair
882:certificate authority
801:computer surveillance
766:
759:Staatstrojaner affair
736:Schäuble fingerprints
710:Project Blinkenlights
704:Project Blinkenlights
694:
687:Project Blinkenlights
586:
565:Knowledge:Translation
536:copyright attribution
363:
271:
2992:Silent Bob is Silent
2052:Hacking in the 2010s
1353:"Chaos macht Schule"
1146:Accessed 2013-09-23.
792:The Staatstrojaner (
241:open-source software
205:eingetragener Verein
2926:SS7 vulnerabilities
2462:Atlanta cyberattack
2431:Equifax data breach
2189:Stratfor email leak
2138:Canadian government
2117:Operation ShadowNet
1890:"CCC | Hackerethik"
1063:Information privacy
963:Jean-Bernard Condat
749:fingerprint readers
622:Deutsche Bundespost
299:Deutsche Bundespost
192:Chaos Computer Club
45:
44:Chaos Computer Club
3375:Petya and NotPetya
3004:ROCA vulnerability
2767:The Shadow Brokers
2693:Iranian Cyber Army
2619:persistent threats
2419:Petya and NotPetya
2383:2016 Bitfinex hack
2358:DCCC cyber attacks
2317:SWIFT banking hack
1700:2014-02-01 at the
1489:2008-05-30 at the
1288:2017-07-08 at the
913:Andy MĂĽller-Maguhn
851:). According to a
808:Internet telephony
772:
700:
634:Karl Koch (hacker)
589:
544:interlanguage link
428:Andy MĂĽller-Maguhn
417:Chaos macht Schule
366:
303:
223:(CCC-CH) instead.
43:
32:Chaos Esports Club
3500:
3499:
3496:
3495:
3488:ZeroAccess botnet
2800:Mustafa Al-Bassam
2567:New World Hackers
2530:associated events
2511:
2510:
2307:VTech data breach
2158:Operation AntiSec
2122:Operation Payback
2081:
2080:
1764:Help Net Security
1532:blinkenlights.net
857:Landeskriminalamt
745:Wolfgang Schäuble
576:
575:
488:
484:
361:
188:
187:
16:(Redirected from
3530:
3104:
3103:
2777:Yemen Cyber Army
2101:Operation Aurora
2091:
2090:
2060:
2059:
2046:
2039:
2032:
2023:
2022:
2008:
2007:
2005:Official website
1973:
1958:
1952:
1951:
1949:
1948:
1934:
1928:
1927:
1925:
1924:
1910:
1904:
1903:
1901:
1900:
1886:
1880:
1879:
1877:
1876:
1862:
1856:
1845:Heather Brooke,
1843:
1837:
1825:
1819:
1818:
1816:
1815:
1801:
1795:
1794:
1792:
1791:
1780:
1774:
1773:
1771:
1770:
1755:
1749:
1748:
1736:
1730:
1729:
1727:
1726:
1715:
1704:
1692:
1686:
1679:
1673:
1672:
1670:
1669:
1654:
1645:
1644:
1642:
1641:
1624:
1618:
1617:
1615:
1614:
1603:
1597:
1596:
1594:
1593:
1578:
1572:
1571:
1570:
1569:
1548:
1542:
1541:
1539:
1538:
1524:
1518:
1517:
1515:
1514:
1499:
1493:
1481:
1475:
1474:
1472:
1471:
1456:
1450:
1449:
1447:
1446:
1431:
1422:
1421:
1415:
1407:
1405:
1404:
1392:
1386:
1385:
1383:
1382:
1370:
1364:
1363:
1361:
1360:
1348:
1342:
1341:
1339:
1338:
1332:
1325:
1317:
1311:
1310:
1305:. Archived from
1299:
1293:
1280:
1274:
1273:
1266:
1260:
1259:
1257:
1256:
1247:. Archived from
1237:
1231:
1230:
1228:
1227:
1221:
1215:. Archived from
1214:
1205:
1199:
1198:
1196:
1195:
1180:
1174:
1173:
1169:978-2-20061207-8
1153:
1147:
1139:
1133:
1132:
1125:
1119:
1118:
1116:
1115:
1104:
1053:Digital identity
991:magazine called
987:The CCCF had an
979:
942:iris recognition
879:
870:
714:Haus des Lehrers
597:Die Tageszeitung
555:
549:
523:
522:|topic=
520:, and specifying
505:Google Translate
486:
482:
465:
464:
457:
403:
388:
362:
291:
283:
222:
158:
155:
153:
90:
88:
83:
69:
61:
53:
46:
42:
21:
3538:
3537:
3533:
3532:
3531:
3529:
3528:
3527:
3503:
3502:
3501:
3492:
3446:
3430:
3384:
3328:
3297:
3241:
3220:
3174:
3133:
3093:
2873:
2871:vulnerabilities
2864:
2781:
2674:(confederation)
2637:Charming Kitten
2618:
2611:
2547:Goatse Security
2507:
2471:
2445:
2436:Deloitte breach
2387:
2373:Dyn cyberattack
2321:
2280:
2251:Operation Tovar
2234:
2198:
2172:
2126:
2087:Major incidents
2082:
2053:
2050:
2012:CCC Events Blog
2003:
2002:
1999:
1982:
1980:Further reading
1977:
1976:
1959:
1955:
1946:
1944:
1936:
1935:
1931:
1922:
1920:
1912:
1911:
1907:
1898:
1896:
1888:
1887:
1883:
1874:
1872:
1864:
1863:
1859:
1844:
1840:
1826:
1822:
1813:
1811:
1803:
1802:
1798:
1789:
1787:
1782:
1781:
1777:
1768:
1766:
1756:
1752:
1737:
1733:
1724:
1722:
1717:
1716:
1707:
1702:Wayback Machine
1693:
1689:
1680:
1676:
1667:
1665:
1656:
1655:
1648:
1639:
1637:
1626:
1625:
1621:
1612:
1610:
1605:
1604:
1600:
1591:
1589:
1579:
1575:
1567:
1565:
1550:
1549:
1545:
1536:
1534:
1526:
1525:
1521:
1512:
1510:
1501:
1500:
1496:
1491:Wayback Machine
1482:
1478:
1469:
1467:
1458:
1457:
1453:
1444:
1442:
1433:
1432:
1425:
1409:
1408:
1402:
1400:
1393:
1389:
1380:
1378:
1371:
1367:
1358:
1356:
1349:
1345:
1336:
1334:
1330:
1323:
1319:
1318:
1314:
1301:
1300:
1296:
1290:Wayback Machine
1281:
1277:
1268:
1267:
1263:
1254:
1252:
1245:Tech the Future
1239:
1238:
1234:
1225:
1223:
1219:
1212:
1206:
1202:
1193:
1191:
1181:
1177:
1170:
1154:
1150:
1140:
1136:
1127:
1126:
1122:
1113:
1111:
1106:
1105:
1101:
1096:
1078:Security hacker
1068:Netzpolitik.org
1015:
1009:
973:
951:
938:
930:
921:
901:
877:
864:
790:
761:
738:
706:
689:
666:
646:hackers led by
636:
630:
609:
581:
572:
571:
570:
553:
547:
521:
489:
466:
462:
455:
446:
440:
397:
382:
357:
355:
277:
266:
261:
216:
180:
150:
142:
91:
86:
84:
81:
72:
39:
28:
23:
22:
15:
12:
11:
5:
3536:
3526:
3525:
3520:
3515:
3498:
3497:
3494:
3493:
3491:
3490:
3485:
3480:
3475:
3470:
3465:
3460:
3454:
3452:
3448:
3447:
3445:
3444:
3438:
3436:
3432:
3431:
3429:
3428:
3423:
3418:
3413:
3408:
3403:
3398:
3392:
3390:
3386:
3385:
3383:
3382:
3377:
3372:
3367:
3362:
3357:
3352:
3347:
3342:
3336:
3334:
3330:
3329:
3327:
3326:
3321:
3316:
3311:
3305:
3303:
3299:
3298:
3296:
3295:
3290:
3285:
3280:
3275:
3270:
3265:
3260:
3258:Black Energy 3
3255:
3249:
3247:
3243:
3242:
3240:
3239:
3234:
3228:
3226:
3222:
3221:
3219:
3218:
3213:
3208:
3203:
3198:
3193:
3188:
3182:
3180:
3176:
3175:
3173:
3172:
3167:
3165:Metulji botnet
3162:
3157:
3152:
3147:
3141:
3139:
3135:
3134:
3132:
3131:
3126:
3121:
3119:Black Energy 2
3116:
3110:
3108:
3101:
3095:
3094:
3092:
3091:
3085:
3079:
3073:
3067:
3061:
3055:
3049:
3043:
3037:
3031:
3025:
3019:
3013:
3007:
3001:
2995:
2989:
2983:
2977:
2974:Broadcom Wi-Fi
2971:
2965:
2959:
2953:
2947:
2941:
2935:
2929:
2923:
2917:
2911:
2905:
2899:
2893:
2887:
2880:
2878:
2866:
2865:
2863:
2862:
2857:
2852:
2847:
2842:
2837:
2835:Junaid Hussain
2832:
2827:
2825:Jeremy Hammond
2822:
2820:Elliott Gunton
2817:
2812:
2807:
2802:
2797:
2791:
2789:
2783:
2782:
2780:
2779:
2774:
2769:
2764:
2759:
2754:
2752:Stealth Falcon
2749:
2744:
2739:
2734:
2729:
2727:PLA Unit 61486
2724:
2722:PLA Unit 61398
2719:
2717:Numbered Panda
2714:
2709:
2695:
2690:
2685:
2680:
2675:
2669:
2664:
2662:Equation Group
2659:
2654:
2649:
2644:
2639:
2634:
2629:
2623:
2621:
2613:
2612:
2610:
2609:
2604:
2599:
2594:
2589:
2584:
2579:
2574:
2569:
2564:
2559:
2554:
2549:
2544:
2539:
2534:
2533:
2532:
2521:
2519:
2513:
2512:
2509:
2508:
2506:
2505:
2500:
2495:
2490:
2485:
2479:
2477:
2473:
2472:
2470:
2469:
2464:
2459:
2453:
2451:
2447:
2446:
2444:
2443:
2438:
2433:
2428:
2427:
2426:
2416:
2411:
2406:
2401:
2395:
2393:
2389:
2388:
2386:
2385:
2380:
2375:
2370:
2365:
2360:
2355:
2350:
2345:
2340:
2335:
2329:
2327:
2323:
2322:
2320:
2319:
2314:
2309:
2304:
2299:
2294:
2288:
2286:
2282:
2281:
2279:
2278:
2273:
2268:
2263:
2258:
2253:
2248:
2242:
2240:
2236:
2235:
2233:
2232:
2227:
2222:
2217:
2212:
2206:
2204:
2200:
2199:
2197:
2196:
2191:
2186:
2180:
2178:
2174:
2173:
2171:
2170:
2165:
2160:
2155:
2153:HBGary Federal
2150:
2145:
2140:
2134:
2132:
2128:
2127:
2125:
2124:
2119:
2114:
2109:
2104:
2097:
2095:
2088:
2084:
2083:
2079:
2078:
2072:
2067:
2058:
2055:
2054:
2049:
2048:
2041:
2034:
2026:
2020:
2019:
2014:
2009:
1998:
1997:External links
1995:
1994:
1993:
1981:
1978:
1975:
1974:
1953:
1929:
1905:
1881:
1857:
1838:
1820:
1796:
1775:
1750:
1739:Leyden, John.
1731:
1705:
1687:
1674:
1646:
1619:
1598:
1573:
1543:
1519:
1494:
1476:
1451:
1423:
1387:
1365:
1343:
1312:
1309:on 2015-04-19.
1294:
1275:
1261:
1232:
1200:
1175:
1168:
1148:
1134:
1120:
1098:
1097:
1095:
1092:
1091:
1090:
1085:
1080:
1075:
1070:
1065:
1060:
1058:Hacker culture
1055:
1050:
1048:Digitalcourage
1045:
1043:Datenschleuder
1040:
1034:
1029:
1024:
1008:
1005:
950:
947:
937:
934:
929:
926:
920:
917:
900:
897:
760:
757:
737:
734:
702:Main article:
688:
685:
665:
662:
640:cyberespionage
632:Main article:
629:
626:
613:Bildschirmtext
608:
605:
580:
577:
574:
573:
569:
568:
561:
550:
528:
525:
513:adding a topic
508:
497:
490:
483:(January 2017)
471:
470:
469:
467:
460:
454:
451:
442:Main article:
439:
436:
421:media literacy
376:data slingshot
371:Datenschleuder
354:
351:
347:c-base station
265:
264:Regular events
262:
260:
257:
245:hacker culture
186:
185:
182:
181:
179:
178:
172:
170:
164:
163:
160:
159:
148:
144:
143:
141:
140:
134:
132:
128:
127:
121:
117:
116:
111:
107:
106:
101:
97:
96:
95:, West Germany
78:
74:
73:
54:
34:, an American
26:
9:
6:
4:
3:
2:
3535:
3524:
3521:
3519:
3518:Hacker groups
3516:
3514:
3511:
3510:
3508:
3489:
3486:
3484:
3481:
3479:
3476:
3474:
3471:
3469:
3466:
3464:
3461:
3459:
3456:
3455:
3453:
3449:
3443:
3440:
3439:
3437:
3433:
3427:
3424:
3422:
3419:
3417:
3414:
3412:
3409:
3407:
3404:
3402:
3399:
3397:
3394:
3393:
3391:
3387:
3381:
3378:
3376:
3373:
3371:
3368:
3366:
3363:
3361:
3358:
3356:
3353:
3351:
3348:
3346:
3343:
3341:
3338:
3337:
3335:
3331:
3325:
3322:
3320:
3317:
3315:
3312:
3310:
3307:
3306:
3304:
3300:
3294:
3291:
3289:
3288:Gameover ZeuS
3286:
3284:
3281:
3279:
3276:
3274:
3271:
3269:
3266:
3264:
3261:
3259:
3256:
3254:
3251:
3250:
3248:
3244:
3238:
3235:
3233:
3230:
3229:
3227:
3223:
3217:
3214:
3212:
3209:
3207:
3204:
3202:
3199:
3197:
3194:
3192:
3189:
3187:
3184:
3183:
3181:
3177:
3171:
3168:
3166:
3163:
3161:
3158:
3156:
3153:
3151:
3148:
3146:
3143:
3142:
3140:
3136:
3130:
3127:
3125:
3122:
3120:
3117:
3115:
3112:
3111:
3109:
3105:
3102:
3100:
3096:
3089:
3086:
3083:
3080:
3077:
3074:
3071:
3068:
3065:
3062:
3059:
3056:
3053:
3050:
3047:
3044:
3041:
3038:
3035:
3032:
3029:
3026:
3023:
3020:
3017:
3014:
3011:
3008:
3005:
3002:
2999:
2996:
2993:
2990:
2987:
2984:
2981:
2978:
2975:
2972:
2969:
2966:
2963:
2960:
2957:
2954:
2951:
2948:
2945:
2942:
2939:
2936:
2933:
2930:
2927:
2924:
2921:
2918:
2915:
2912:
2909:
2906:
2903:
2900:
2897:
2894:
2891:
2888:
2885:
2882:
2881:
2879:
2877:
2872:
2867:
2861:
2858:
2856:
2853:
2851:
2848:
2846:
2843:
2841:
2838:
2836:
2833:
2831:
2828:
2826:
2823:
2821:
2818:
2816:
2813:
2811:
2808:
2806:
2803:
2801:
2798:
2796:
2793:
2792:
2790:
2788:
2784:
2778:
2775:
2773:
2770:
2768:
2765:
2763:
2760:
2758:
2755:
2753:
2750:
2748:
2747:Rocket Kitten
2745:
2743:
2740:
2738:
2735:
2733:
2730:
2728:
2725:
2723:
2720:
2718:
2715:
2713:
2710:
2707:
2703:
2699:
2698:Lazarus Group
2696:
2694:
2691:
2689:
2686:
2684:
2681:
2679:
2676:
2673:
2670:
2668:
2665:
2663:
2660:
2658:
2655:
2653:
2650:
2648:
2645:
2643:
2640:
2638:
2635:
2633:
2630:
2628:
2625:
2624:
2622:
2620:
2614:
2608:
2605:
2603:
2600:
2598:
2595:
2593:
2590:
2588:
2585:
2583:
2580:
2578:
2575:
2573:
2570:
2568:
2565:
2563:
2560:
2558:
2555:
2553:
2550:
2548:
2545:
2543:
2540:
2538:
2535:
2531:
2528:
2527:
2526:
2523:
2522:
2520:
2518:
2514:
2504:
2501:
2499:
2496:
2494:
2491:
2489:
2486:
2484:
2481:
2480:
2478:
2474:
2468:
2465:
2463:
2460:
2458:
2455:
2454:
2452:
2448:
2442:
2441:Disqus breach
2439:
2437:
2434:
2432:
2429:
2425:
2422:
2421:
2420:
2417:
2415:
2412:
2410:
2407:
2405:
2402:
2400:
2397:
2396:
2394:
2390:
2384:
2381:
2379:
2376:
2374:
2371:
2369:
2366:
2364:
2361:
2359:
2356:
2354:
2351:
2349:
2346:
2344:
2341:
2339:
2336:
2334:
2331:
2330:
2328:
2324:
2318:
2315:
2313:
2310:
2308:
2305:
2303:
2300:
2298:
2295:
2293:
2290:
2289:
2287:
2283:
2277:
2274:
2272:
2269:
2267:
2264:
2262:
2259:
2257:
2254:
2252:
2249:
2247:
2244:
2243:
2241:
2237:
2231:
2228:
2226:
2223:
2221:
2218:
2216:
2215:Snapchat hack
2213:
2211:
2208:
2207:
2205:
2201:
2195:
2192:
2190:
2187:
2185:
2184:LinkedIn hack
2182:
2181:
2179:
2175:
2169:
2166:
2164:
2161:
2159:
2156:
2154:
2151:
2149:
2146:
2144:
2141:
2139:
2136:
2135:
2133:
2129:
2123:
2120:
2118:
2115:
2113:
2110:
2108:
2105:
2102:
2099:
2098:
2096:
2092:
2089:
2085:
2077: →
2076:
2073:
2071:
2068:
2066:
2063:←
2062:
2061:
2056:
2047:
2042:
2040:
2035:
2033:
2028:
2027:
2024:
2018:
2015:
2013:
2010:
2006:
2001:
2000:
1991:
1987:
1984:
1983:
1972:
1968:
1964:
1963:
1957:
1943:
1939:
1933:
1919:
1915:
1909:
1895:
1891:
1885:
1871:
1867:
1861:
1854:
1853:
1848:
1842:
1835:
1834:
1829:
1824:
1810:
1806:
1800:
1785:
1779:
1765:
1761:
1754:
1746:
1742:
1735:
1720:
1714:
1712:
1710:
1703:
1699:
1696:
1691:
1684:
1678:
1663:
1659:
1653:
1651:
1635:
1634:
1629:
1623:
1608:
1602:
1588:
1584:
1577:
1564:on 2013-12-08
1563:
1559:
1555:
1554:
1547:
1533:
1529:
1523:
1508:
1504:
1498:
1492:
1488:
1485:
1480:
1465:
1461:
1455:
1440:
1436:
1430:
1428:
1419:
1413:
1398:
1391:
1376:
1369:
1354:
1347:
1329:
1326:(in German).
1322:
1316:
1308:
1304:
1298:
1291:
1287:
1284:
1279:
1271:
1265:
1251:on 2014-07-05
1250:
1246:
1242:
1236:
1222:on 2008-02-27
1218:
1211:
1204:
1190:
1186:
1179:
1171:
1165:
1161:
1160:
1152:
1145:
1144:
1138:
1130:
1124:
1109:
1103:
1099:
1089:
1086:
1084:
1083:Tron (hacker)
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1038:
1035:
1033:
1030:
1028:
1025:
1023:
1021:
1017:
1016:
1014:
1004:
1002:
998:
994:
990:
985:
983:
977:
972:
968:
964:
960:
956:
946:
943:
933:
928:Apple TouchID
925:
916:
914:
910:
906:
896:
894:
890:
885:
883:
875:
871:
868:
863:
858:
854:
850:
846:
842:
837:
835:
831:
826:
824:
819:
817:
813:
809:
806:
802:
798:
797:
789:
785:
781:
777:
770:
765:
756:
754:
750:
746:
743:
733:
731:
727:
723:
719:
715:
711:
705:
697:
696:Blinkenlights
693:
684:
682:
678:
675:
671:
661:
659:
658:
653:
649:
645:
641:
635:
625:
623:
618:
614:
604:
602:
598:
594:
585:
566:
562:
559:
551:
545:
541:
537:
533:
529:
526:
519:
518:main category
515:
514:
509:
506:
502:
498:
495:
492:
491:
485:
479:
477:
472:You can help
468:
459:
458:
450:
445:
435:
433:
429:
424:
422:
418:
413:
411:
407:
401:
396:
392:
386:
381:
377:
373:
372:
350:
348:
343:
341:
337:
333:
332:
327:
323:
319:
314:
312:
308:
300:
296:
292:
290:
284:
281:
276:
270:
256:
254:
248:
246:
242:
238:
234:
230:
224:
220:
215:
211:
207:
206:
201:
197:
193:
183:
177:
174:
173:
171:
169:
165:
161:
157:
149:
145:
139:
136:
135:
133:
129:
125:
122:
118:
115:
112:
108:
105:
102:
98:
94:
79:
75:
70:
68:
62:
60:
52:
47:
41:
38:organization.
37:
33:
19:
3232:CryptoLocker
2986:DoublePulsar
2805:Cyber Anakin
2795:Ryan Ackroyd
2688:Helix Kitten
2683:Hacking Team
2678:Guccifer 2.0
2552:Lizard Squad
2368:Surkov leaks
2297:Hacking Team
1992:, 2011-02-11
1970:
1960:
1956:
1945:. Retrieved
1941:
1932:
1921:. Retrieved
1917:
1908:
1897:. Retrieved
1893:
1884:
1873:. Retrieved
1869:
1860:
1855:, 2011-08-25
1852:The Guardian
1850:
1841:
1836:, 2011-08-15
1831:
1823:
1812:. Retrieved
1808:
1799:
1788:. Retrieved
1786:. 2011-10-18
1778:
1767:. Retrieved
1763:
1753:
1745:The Register
1744:
1734:
1723:. Retrieved
1721:. 2011-10-10
1690:
1681:Basil Cupa,
1677:
1666:. Retrieved
1664:. 2011-10-10
1661:
1638:. Retrieved
1636:. 2011-10-09
1631:
1622:
1611:. Retrieved
1601:
1590:. Retrieved
1586:
1576:
1566:, retrieved
1562:the original
1558:Heise Online
1552:
1546:
1535:. Retrieved
1531:
1522:
1511:. Retrieved
1506:
1497:
1479:
1468:. Retrieved
1466:. 2001-08-13
1463:
1454:
1443:. Retrieved
1438:
1401:. Retrieved
1390:
1379:. Retrieved
1368:
1357:. Retrieved
1346:
1335:. Retrieved
1315:
1307:the original
1297:
1278:
1264:
1253:. Retrieved
1249:the original
1244:
1235:
1224:. Retrieved
1217:the original
1203:
1192:. Retrieved
1189:The Observer
1188:
1178:
1158:
1151:
1141:
1137:
1128:
1123:
1112:. Retrieved
1102:
1019:
992:
986:
971:Jean Guisnel
961:(France) by
954:
952:
939:
931:
922:
902:
886:
860:
838:
834:jurisdiction
827:
820:
796:Trojan horse
793:
791:
769:trojan horse
739:
717:
709:
707:
667:
655:
637:
610:
590:
540:edit summary
531:
511:
481:
473:
447:
425:
416:
414:
410:Tim Pritlove
405:
375:
369:
367:
344:
329:
315:
304:
286:
275:Pesthörnchen
273:
249:
237:hacker ethic
225:
209:
203:
195:
191:
189:
120:Headquarters
64:
56:
40:
18:Pesthörnchen
3468:NetTraveler
3406:LogicLocker
3314:Hidden Tear
3211:Red October
3070:Dragonblood
2980:EternalBlue
2944:Stagefright
2810:George Hotz
2787:Individuals
2537:CyberBerkut
1833:Der Spiegel
1662:Der Spiegel
1633:Der Spiegel
1509:(in French)
1507:blog.bnf.fr
1399:(in German)
1377:(in German)
1355:(in German)
974: [
878:scuinst.exe
865: [
849:Oktoberfest
830:unencrypted
823:screenshots
753:e-passports
601:Wau Holland
587:Wau Holland
444:CryptoParty
438:CryptoParty
398: [
383: [
295:Jolly Roger
278: [
233:human right
217: [
210:Erfa-Kreise
93:West Berlin
67:Datenknoten
59:Chaosknoten
3507:Categories
3411:Rensenware
3396:BrickerBot
3324:TeslaCrypt
3114:Bad Rabbit
3064:Foreshadow
2968:Cloudbleed
2920:Row hammer
2902:Shellshock
2896:Heartbleed
2884:Evercookie
2860:The Jester
2742:Red Apollo
2702:BlueNorOff
2672:GOSSIPGIRL
2667:Fancy Bear
2657:Elfin Team
2652:DarkMatter
2647:Dark Basin
2632:Bureau 121
2592:Teamp0ison
2517:Hacktivism
2148:DNSChanger
1947:2018-03-12
1923:2018-03-12
1918:www.ccc.de
1899:2018-03-13
1894:www.ccc.de
1875:2018-12-28
1870:www.ccc.de
1814:2018-12-28
1790:2021-03-16
1769:2018-12-28
1725:2018-12-28
1668:2011-10-31
1640:2011-10-10
1613:2011-10-10
1592:2018-12-28
1568:2008-04-17
1537:2018-12-28
1513:2021-01-26
1470:2019-04-19
1445:2018-03-12
1403:2016-01-11
1381:2016-01-11
1359:2016-01-11
1337:2019-06-03
1255:2014-08-20
1226:2008-05-14
1194:2018-12-28
1114:2016-08-23
1094:References
1011:See also:
989:electronic
907:spokesman
774:See also:
677:encryption
391:talk radio
380:Chaosradio
340:Easterhegg
289:Datenpirat
259:Activities
231:, and the
87:1981-09-12
3442:VPNFilter
3319:Rombertik
3283:FinFisher
3273:DarkHotel
3237:DarkSeoul
3145:Coreflood
3010:BlueBorne
2962:Dirty COW
2876:disclosed
2874:publicly
2712:NSO Group
2642:Cozy Bear
2582:PayPal 14
2525:Anonymous
2399:SHAttered
2143:DigiNotar
1037:Chaosdorf
1001:1244-4901
905:WikiLeaks
874:WikiLeaks
648:Karl Koch
628:Karl Koch
593:Kommune 1
558:talk page
510:Consider
478:in German
336:Karlsruhe
126:, Germany
77:Formation
3483:Titanium
3426:XafeCopy
3421:WannaCry
3350:KeRanger
3278:Duqu 2.0
3263:Carbanak
3082:BlueKeep
3058:SigSpoof
3016:Meltdown
2932:WinShock
2914:Rootpipe
2815:Guccifer
2737:Pranknet
2732:PLATINUM
2706:AndAriel
2617:Advanced
2572:NullCrew
2557:LulzRaft
2457:Trustico
2070:Timeline
1990:BBC News
1969:, 2007:
1965:No. 64,
1698:Archived
1587:Security
1487:Archived
1412:cite web
1328:Archived
1303:"SIGINT"
1286:Archived
1007:See also
862:DigiTask
845:Bavarian
794:Federal
664:GSM-Hack
607:BTX-Hack
579:Founding
534:provide
131:Location
3380:X-Agent
3370:Pegasus
3253:Brambul
3216:Shamoon
3160:Kelihos
3150:Alureon
3129:Stuxnet
3099:Malware
3052:TLBleed
3034:Exactis
3022:Spectre
2956:Badlock
2890:iSeeYou
2855:Topiary
2587:RedHack
2577:OurMine
2562:LulzSec
903:Former
812:encrypt
805:wiretap
799:) is a
776:FOXACID
730:Ontario
726:Toronto
674:COMP128
556:to the
538:in the
480:.
453:History
326:Cologne
200:hackers
147:Website
124:Hamburg
110:Purpose
85: (
36:esports
3463:Joanap
3416:Triton
3355:Necurs
3345:Jigsaw
3340:Hitler
3309:Dridex
3268:Careto
3191:Dexter
3124:SpyEye
3090:(2019)
3084:(2019)
3078:(2019)
3072:(2019)
3066:(2018)
3060:(2018)
3054:(2018)
3048:(2018)
3042:(2018)
3036:(2018)
3030:(2018)
3024:(2018)
3018:(2018)
3012:(2017)
3006:(2017)
3000:(2017)
2994:(2017)
2988:(2017)
2982:(2017)
2976:(2017)
2970:(2017)
2964:(2016)
2958:(2016)
2952:(2016)
2946:(2015)
2940:(2015)
2938:JASBUG
2934:(2014)
2928:(2014)
2922:(2014)
2916:(2014)
2910:(2014)
2908:POODLE
2904:(2014)
2898:(2014)
2892:(2013)
2886:(2010)
2869:Major
2850:Track2
2772:xDedic
2602:UGNazi
1962:Phrack
1809:DW.COM
1464:SFGate
1166:
1027:c-base
1022:(film)
999:
853:Sophos
786:, and
718:Arcade
644:German
322:SIGINT
3478:Tinba
3365:Mirai
3293:Regin
3206:Mahdi
3201:Flame
3186:Carna
3170:Stars
3088:Kr00k
3028:EFAIL
2998:KRACK
2950:DROWN
2075:2020s
2065:2000s
1351:CCC.
1331:(PDF)
1324:(PDF)
1220:(PDF)
1213:(PDF)
978:]
869:]
841:R2-D2
501:DeepL
432:ICANN
402:]
395:Fritz
387:]
364:Video
282:]
221:]
176:50472
3473:R2D2
3458:Grum
3451:2019
3435:2018
3401:Kirk
3389:2017
3360:MEMZ
3333:2016
3302:2015
3246:2014
3225:2013
3179:2012
3155:Duqu
3138:2011
3107:2010
2845:Sabu
2597:TDO
2542:GNAA
2476:2019
2450:2018
2392:2017
2326:2016
2285:2015
2239:2014
2203:2013
2177:2012
2131:2011
2094:2010
1418:link
1164:ISBN
997:ISSN
959:Lyon
953:The
887:The
681:SIMs
532:must
530:You
494:View
293:, a
285:aka
190:The
138:DACH
100:Type
63:aka
3196:FBI
2840:MLT
2704:) (
1003:).
670:GSM
652:KGB
599:by
503:or
408:by
406:CRE
334:in
324:in
196:CCC
168:ASN
156:/en
154:.de
152:ccc
104:NGO
3509::
1988:,
1940:.
1916:.
1892:.
1868:.
1849:,
1830:,
1807:.
1762:.
1743:.
1708:^
1660:.
1649:^
1630:.
1585:.
1556:,
1530:.
1505:.
1462:.
1437:.
1426:^
1414:}}
1410:{{
1243:.
1187:.
1020:23
984:.
976:fr
867:de
836:.
782:,
778:,
755:.
728:,
683:.
660:.
657:23
617:DM
412:.
400:de
385:de
280:de
219:de
2708:)
2700:(
2045:e
2038:t
2031:v
1950:.
1926:.
1902:.
1878:.
1817:.
1793:.
1772:.
1747:.
1728:.
1671:.
1643:.
1616:.
1595:.
1540:.
1516:.
1473:.
1448:.
1420:)
1406:.
1384:.
1362:.
1340:.
1272:.
1258:.
1229:.
1172:.
1117:.
567:.
560:.
374:(
194:(
89:)
71:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.