Friday 27. December - Decentralize your internet with self-hosting - andreas, seb - ACE up the sleeve: Hacking into Apple's new USB-C Controller - Dark Networks: Building Your First Lora Mesh Network From Scratch - WillCrash - How Roaming Agreements Enable 5G MitM Attacks - Swantje Lange - Reverse engineering U-Boot for fun and profit - zeno - Investigating the Iridium Satellite Network - Sec, schneider - Demystifying Common Microcontroller Debug Protocols - Sean 'xobs' Cross - Farm your own C2: Adventures in hacking Micromobility IOT - James D - We've not been trained for this: life after the Newag DRM disclosure - Michał Kowalczyk, q3k and Jakub Stepniewicz - A dive into DNS - altf4 - Hardware hacking mit Bluetooth Low Energy - Daniel Dakhno - Operation Mindfuck Vol. 7 - blinry, bleeptrack Saturday 28. December - From Critical Making via unmaking towards (un)making - Yoshinari Nishiki - State of Surveillance - A year of digital threats to civil society - 7 years later: Why and how to make portable open hardware computers - minute - BlinkenCity: Radio-Controlling Street Lamps and Power Plants - Fabian Bräunlein, Luca Melette - Lets spark children's interest in coding - anaghz - Guardians of the onion: Ensuring the health and resilience of the Tor Network - Hiro, Gus - Illegal Infrastructure - 12 years of hosting in the greyzone - kolja Sunday 29. December - A fully free BIOS with GNU Boot - neox, GNUtoo - The whois protocol for internet routing policy, or how plaintext retrieved over TCP/43 ends up in router configurations - Ties de Kock, becha - we made a globally distributed DNS network for shits and giggles - sdomi, famfo, merlin - Postpartum Punk: make space for unfiltered creativity - Ania Poullain-Majchrzak - Hacker's Guide to Meshtastic: Off-Grid Encrypted LoRa Meshnets for Cheap! - Kody Kinzie Sunday 30. December - Moving with feelings: Behind the scenes of a one man show mobile & fiber operator in Spain - Edgar Saumell Oechsle - Resource Consumption of AI - Degrow or Die - Thomas Fricke - identity theft, credit card fraud and cloaking services – how state-sponsored propaganda makes use of the cyber criminal toolbox - Alexej Hock, Max Bernhard - Find My * 101 - Henryk Plötz - corebooting Intel-based systems - aprl, elly - What's inside my train ticket? - Q Misell - Going Long! Sending weird signals over long haul optical networks - Ben Cartwright-Cox - 38C3: Infrastructure Review - nicoduck