<GPG, SECURITY:
https://events.ccc.de/congress/2025/hub/en/event/detail/to-sign-or-not-to-sign-practical-vulnerabilities-i
>we found reaches from various signature verification bypasses, breaking encryption in transit and encryption at rest, undermining key signatures, to exploitable memory corruption vulnerabilities
>in cryptographic utilities, namely in *GnuPG*, *Sequoia PGP*, *age*, and *minisign*
<RP2350, EFUSES, SECUREBOOT:
https://events.ccc.de/congress/2025/hub/en/event/detail/of-boot-vectors-and-double-glitches-bypassing-rp2350-s-secure-boot
>we talk about all successful attacks - including laser fault-injection, a reset glitch
>double-glitch during execution of the bootrom
>to show all the different ways in which a chip can be attacked
<LAW & DISORDER:
https://events.ccc.de/congress/2025/hub/en/event/detail/verschlusselung-brechen-durch-physischen-zugriff-smartphone-beschlagnahme-durch-polizei
>Allein in Sachsen-Anhalt waren es innerhalb von fünf Jahren 13.000 Smartphones
>Auch bei leichten Straftaten und Ordnungswidrigkeiten beschlagnahmt die Polizei regelmäßig Datenträger
>insbesondere Smartphones und Laptops - etwa beim Verdacht einer Beleidigung
>oder bei der Handynutzung im Straßenverkehr
<SCIENCE:
https://events.ccc.de/congress/2025/hub/en/event/detail/laser-beams-light-streams-letting-hackers-go-pew-pew-building-affordable-light-based-hardware-security-tooling
>something that only nation state actors are capable of doing
>Currently, sophisticated hardware labs use expensive, high frequency IR beams to penetrate the resin
>This project demonstrates that with a limited budget and hacker-and-maker mentality
>leveraging inexpensive technology alternatives, we implement a tool that does laser fault injection
>can detect hardware malware, detect supply chain chip replacements, and delve into the realm of laser logic state imaging
<TIME NUTS:
https://events.ccc.de/congress/2025/hub/en/event/detail/excuse-me-what-precise-time-is-it
>We’ll look at why PTP is critical for modern audio/video-over-IP standards like AES67 and SMPTE 2110
>how they push Ethernet to its absolute temporal limits
>We will do live Wireshark dissections of real PTP traffic, demos showing what happens when timing breaks
<BATTERIEFORSCHUNG, etc:
https://events.ccc.de/congress/2025/hub/en/event/detail/the-eyes-of-photon-science-imaging-simulation-and-the-quest-to-make-the-invisible-visible
>At facilities like the European XFEL, the world's most powerful X-ray free-electron laser
>located in the Hamburg metropolitan area, imaging detectors capture ultrashort X-ray flashes
>at MHz frame rates and with high dynamic range
>Without these advanced detectors, even the brightest X-ray laser beam would remain invisible
<BLUETOOTH BEING SHIT:
https://events.ccc.de/congress/2025/hub/en/event/detail/bluetooth-headphone-jacking-a-key-to-your-phone
>popular Bluetooth audio chips developed by Airoha
>These chips are used by many popular device manufacturers in numerous Bluetooth headphones and earbuds
>The identified vulnerabilities may allow a complete device compromise
<BLUETOOTH FÜR HACKER:
https://events.ccc.de/congress/2025/hub/en/event/detail/liberating-bluetooth-on-the-esp32
>this work aims to empower researchers, hackers, and developers to build custom Bluetooth stacks
>audit existing ones, and repurpose the ESP32 for novel applications