38C3 - Attack Mining: How to use distributed sensors to identify and take down adversaries
-
Not SyncedPlease use the Etherpad for the transcript.
If there is no transcript in the etherpad available yet, please tell us. -
Not SyncedTranskript here won't be further processed!
In the Etherpad you can find a auto generated Transcript as start. -
Not Syncedhttps://c3subtitles.de/talk/3394
https://subtitles.pads.ccc.de/38c3-talk-180
