This is a very thorough analysis of the security principles and usability of various Two Factor Authentication systems: https://wiki.shibboleth.net/confluence/display/~trscavo@ncsa.illinois.edu/Two-Factor+Authentication
This evening's hack is a port of Pixel Dust to p5.js that uses your phone's accelerometer: https://osresearch.github.io/sand/
"given a cool name, researchers will be able to find a new vulnerability to match it in finite time": Plundervolt at #36c3 https://media.ccc.de/v/36c3-10883-plundervolt_flipping_bits_from_software_without_rowhammer
Watching all the #36c3 talks that we missed during Congress is our New Year's Eve train ride tradition.
CRT projection lens + analog oscilloscope + MAME = large screen vector games at #36c6 https://trmm.net/MAME
Do you hack on MAME? Are you at #36c3? Want to help fix my ancient and unacceptably hacky patches to drive vector monitors? Let's meet up and get them merged into the mainline! https://trmm.net/MAME
The #36c3 Day 3 fiveK jog departed Leipzig Hbf on schedule at 0900, made it to the frozen Congress, and now we're the only riders for the tram back from the CCL. Bring your running shoes and join us next year!