<?xml version="1.0" encoding="UTF-8"?>
<schedule>
 <conference>
  <title>23rd Chaos Communication Congress</title>
  <subtitle>Who can you trust?</subtitle>
  <venue>Berliner Congress Center (bcc)</venue>
  <city>Berlin</city>
  <start>2006-12-27</start>
  <end>2006-12-30</end>
  <days>4</days>
  <release>1.5</release>
  <day_change>06:00</day_change>
  <timeslot_duration>00:15</timeslot_duration>
 </conference>
 <day date="2006-12-27" index="1">
  <room name="Saal 1">
   <event id="1256">
    <start>10:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>who_can_you_trust</tag>
    <title>Who can you trust?</title>
    <subtitle>Opening Ceremony and Keynote</subtitle>
    <track>General</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Opening event of the 23rd Chaos Communication Congress. After a welcome talk, the 23C3's keynote will be delivered.</abstract>
    <description></description>
    <persons>
     <person id="4">Tim Pritlove</person>
     <person id="1264">John Perry Barlow</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1680">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>neues_gesetzliches_verbot_des_hackings</tag>
    <title>Das neue gesetzliche Verbot des Hackings</title>
    <subtitle>Praktische Auswirkungen des neuen Strafrechtes, das in wenigen Monaten in Kraft treten wird</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Entwickler, Administratoren und gewisse Internet-Nutzer treffen die Auswirkungen eines aktuellen Gesetzesvorhabens auf dem kaltem Fu&#223;. Eine ganze Klasse von Systemwerkzeugen, die "Hackertools", soll verboten werden.</abstract>
    <description>Das Bundeskabinett hat im September 2006 den &#8220;Entwurf eines Strafrechts&#228;nderungsgesetzes zur Bek&#228;mpfung der Computerkriminalit&#228;t&#8221; beschlossen. Das Gesetz soll bereits Mitte M&#228;rz 2007 in Kraft treten.

Das neue Gesetz erweitert die Strafbarkeit dessen, was umgangsprachlich als Hacken bezeichnet wird. Existierende Straftatbest&#228;nde werden ausgeweitet, neue Straftatbest&#228;nde geschaffen. Nicht nur das Entwickeln und Verbreiten, sondern auch das blo&#223;e Sich-Verschaffen soll unter Strafe gestellt werden. Es werden neue Vorgehensweisen notwendig, um rechtliche Risiken zu begrenzen. Ein ganz neue Qualit&#228;t kommt durch das Verbot gewisser Vorfeld-Handlungen ins Spiel. 

Neuerdings wird das Entwickeln, Verbreiten oder auch nur Sich-Verschaffen sog. Hacker-Tools unter Strafe gestellt. Systementwickler, Administratoren und Internet-Nutzer m&#252;ssen umdenken. Zuk&#252;nftig wird es zwei Arten von Software geben. Schon der blo&#223;e Kontakt mit Hacker-Tools kann k&#252;nftig strafrechtliche Folgen hervorrufen. Betroffen ist jede Phase aus dem Lebenszyklus solcher Software.

Worauf die Beteiligen achten sollten, um strafrechtlichen Risiken ausweichen und Schutzvorkehrungen treffen zu k&#246;nnen, schildert der Vortrag. Dabei beschr&#228;nkt sich der Blick nicht auf das strafrechtliche Risiko, sondern benennt weitere rechtliche Folgen, die leicht &#252;bersehen werden.

Erste Stellungnahmen der Interessenverb&#228;nde zur grunds&#228;tzlichen Problematik des Gesetzesentwurfes liegen bereits vor. Bis zum Jahresende wird die &#246;ffentliche Er&#246;rterung voranschreiten. Deshalb streift dieser Vortrag Grundsatzfragen nur am Rande. Der Vortrag kn&#252;pft inhaltlich an das an, was auf dem 22C3 &#252;ber die Cybercrime Convention berichtet wurde. Im Vordergrund dieses Vortrages stehen die Auswirkungen des Gesetzesentwurfes auf die Praxis. 

Juristische Kenntnisse werden nicht vorausgesetzt. Der Vortrag wendet sich nicht an Juristen, sondern an Entwickler, Administratoren und gewisse Internetnutzer.</description>
    <persons>
     <person id="1231">Peter Voigt</person>
    </persons>
    <links>
     <link href="http://eur-lex.europa.eu/LexUriServ/site/de/oj/2005/l_069/l_06920050316de00670071.pdf">Rahmenbeschluss des EU-Rates</link>
     <link href="http://conventions.coe.int/Treaty/GER/Treaties/Html/185.htm">cybercrime convention</link>
     <link href="http://www.ccc.de/press/releases/2006/20060925/">1. Stellungnahme des CCC e.V.</link>
     <link href="http://www.heise.de/newsticker/meldung/78448">Mitteilung im Heise-Ticker vom 20.09.06</link>
     <link href="http://www.heise.de/newsticker/meldung/79180">Entgegnung Justizministerium</link>
     <link href="http://www.bitkom.de/files/documents/Stellungnahme_BITKOM_StrAendG_12_07_06.pdf">1. Stellungnahme Bitkom</link>
     <link href="http://www.heise.de/newsticker/meldung/79359">Heise zu Stellungnahme Bitkom</link>
     <link href="http://www.bmj.bund.de/media/archive/1317.pdf">Gesetzesentwurf der Bundesregierung</link>
    </links>
   </event>
   <event id="1537">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>know_your_citizens</tag>
    <title>Know Your Citizens</title>
    <subtitle>State Authorities' Access to Sensitive Information</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The balance between effective criminal investigations and the protection of human rights is currently intensively discussed. A number of approaches demonstrate a tendency that state authorities gain for more access to sensitive data. But do these information really help to prevent crimes (e.g. terrorist attacks) and how save are these information in the hands of state authorities'?</abstract>
    <description>The current discussion and legislative approaches shall be demonstrated by analysing some topic examples: 
- Data Retention Directive (Access of investigation authorities to traffic data)
- Real Time Collection of Content Data (Access to content data)
- Restriction of the use of Encryption Technology - Key Escrow System (Access to encryption key)
- Draft Legislation enabling Law Enforcement Agencies to secretly access Computer Systems</description>
    <persons>
     <person id="1137">Marco Gercke</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1461">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>the_grim_meathook_future</tag>
    <title>The Grim Meathook Future</title>
    <subtitle>How The Tech Culture Can Maintain Relevance In The 21st Century</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Most modern futurism describes technology-driven futures: the nanotech future, the biotech future, etc. But there's also another future, just as or more possible: the future where technology is marginalized by social and cultural forces (such as the rise of fundamentalism as a political force in the US and Middle East). This lecture talks about how technology and design can help humanity avoid a grim future.</abstract>
    <description>Amongst technology pundits and futurists, it seems to be a given that "progress" in the 21st century will be driven by technological advancements -- nanotechnology, biotechnology, networking technology, etc. However, recent global trends and events suggest that the course of human destiny can just as easily be driven by religious fanatics using weapons and tactics which are hardly on the technological cutting edge. 

Meanwhile, the promise of a global Internet providing equality to all is still a pipe dream; the developing world's primary interface to our networks come in the way of 419 spam and data piracy. Not to mention, of course, the fact that we're rapidly approaching the end of cheap, freely available energy sources and the likely beginning of massive  climatic change.

As a species, we could be on the verge of the utopian vision of the "Singularity"...but we might just as easily be on the verge of a Spenglerian return to a global Dark Ages; a scenario that resembles less the utopian science fictions of Hugo Gernsback and more a nightmare of feral cities and warlordism...a scenario which I refer to with a certain amount of bleak humor as the "Grim Meathook Future". Such a scenario is not apocalyptic; rather, it's a natural result of what happens when the economic and technological bedrock upon which our current society relies begin to fail and anarchy and irrationalism take their place.

Against this unnerving potentiality, such current tech culture obsessions such as the blogosphere and the war against copyright seem downright frivolous. Are we become too self-obsessed, self-referential? Are we making ourselves irrelevant?

These are the questions I want to explore in this lecture. I plan to explore ways in which, by looking outward rather than inward, those of us in the technology culture and industry can work to prevent the Grim Meathook Future, and to ensure that our labor works to benefit humanity as a whole.

The talk will probably include discussion of many if not all of the following topics:

* Spengler's concept of cyclical history and the widely-held idea that our society is in a similar position to societies like the Roman and Mayan empires, just prior to their collapse, and also some discussion of the shift in the 20th century from the idea of social improvement as progress to technological innovation as progress.

* Already-extant examples of the Grim Meathook Future, such as the Lord's Resistance Army in Northern Uganda, the Somalian city of Mogadishu (as an example of a "feral city"), the rise in warlordism in both the developing world and the former Soviet bloc, and the increasing rise of ad-hoc infrastructure instead of designed infrastructure (such as the growing number and entrenchment of squatter communities in major world cities, many with their own self-evolved governments and infrastructures). Also, the lessons we can learn from these events and scenarios.

* Current technological programs and initiatives which show promise in helping to direct and stabilize the massive changes which are beginning to occur globally, such as MIT's $100 laptop project, the Lifestraw project, and the search for alternative energy sources.

* Possible useful future projects and initiatives which can be undertaken by the technology culture/industry as a whole.</description>
    <persons>
     <person id="1079">Joshua Ellis</person>
    </persons>
    <links>
     <link href="http://www.zenarchery.com/2005/09/22/full-text-of-the-grim-meathook-future-thing/print/">The text of my original "Grim Meathook Future" mini-essay</link>
     <link href="http://www.nwc.navy.mil/press/Review/2003/Autumn/art6-a03.htm">"Feral Cities" : a 2003 essay by Dr. Richard Norton of the US Naval War College</link>
     <link href="http://www.gutenberg.org/etext/10753">"Open Source Democracy" - an essay by Douglas Rushkoff</link>
     <link href="http://globalguerrillas.typepad.com/globalguerrillas/">Global Guerillas - a blog dedicated to study of "fourth generational" warfare by John Robb</link>
     <link href="http://laptop.media.mit.edu/">$100 Laptop project at MIT</link>
     <link href="http://www.duke.edu/~aparks/SPENG7.html">"The Problem Of Civilization" by Oswald Spengler, from *The Decline of the West"</link>
     <link href="http://www.lifestraw.com/en/low/low.asp">The Lifestraw - an inexpensive device for purifying contaminated drinking water</link>
    </links>
   </event>
   <event id="1611">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>privacy_identity_and_anonymity_in_web_20</tag>
    <title>Privacy, Identity, and Anonymity in Web 2.0</title>
    <subtitle></subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The presentation will show the hidden privacy implications of some web2.0 and identity2.0 services, standards and applications and discuss the underlying trend here.</abstract>
    <description>Web2.0 has created a new rush towards social networking and collaborative applications. This enables new possibilities, but also is a threat to users' privacy and data. On the surface, many people seem to like giving away their data to others in exchange for building communities or getting their 15 seconds of fame. But below it lie less obvious privacy implications. Some of them are accidential, like publicly marking someone as a "friend" without asking that person before or putting personal data under a creative commons license. But some are more fundamental, as they are based on voluntary surveillance of the users. On the extreme end of the spectrum, the trend towards "identity 2.0" services - from microformats like OpenID and adressing systems like XDI to infrastructures like Cardspace and Higgins - will have far-reaching impacts on the future of privacy and anonymity on the web. The presentation will show the hidden privacy implications of some web2.0 and identity2.0 services, standards and applications and discuss the underlying trend here.</description>
    <persons>
     <person id="336">Ralf Bendrath</person>
     <person id="1233">Jan Schallab&#246;ck</person>
     <person id="1232">Udo Neitzel</person>
    </persons>
    <links>
     <link href="http://www.identitygang.org/">Identity Gang</link>
     <link href="http://www.fidis.net/">Future of Identity in the Information Society (FIDIS)</link>
     <link href="http://www.tiara.org/blog/?page_id=78">Online Identity Bibliography</link>
    </links>
   </event>
   <event id="1402">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>drones</tag>
    <title>Drones</title>
    <subtitle>Autonomous flying vehicles</subtitle>
    <track>Science</track>
    <type>Sonstiges</type>
    <language>deutsch</language>
    <abstract>I am watching you: drones for private use are getting real. A live presentation of actual devices in real action.</abstract>
    <description>The main aspect of this talk is the demonstration of an autonomous flying Quadrocopter microdrones md4-200 with 200g payload, which is a small 4-rotors-helicopter with a radio transmitting color-videocamera and a bunch of sensors on board. 
I will show the very first prototype of the md4-1000 with 1000g payload.
We will discuss the technology, the usage scenarios and the social aspects of such devices. 
Part of the talk will be an introduction to an homebrew approach to drones technology. 
Last but not least I will show which drones are existing right now, what is planned to do and who is using such devices.</description>
    <persons>
     <person id="284">Steini</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1692">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>hacking_the_electoral_law</tag>
    <title>Hacking the Electoral Law</title>
    <subtitle></subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>How the Ministry of the Interior turns fundamental election principals into their opposite, without even asking the parliament.</abstract>
    <description>Public control and transparency of elections, not trust, are well established principles to prevent electoral fraud in a democracy. With the introduction of voting computers or remote eVoting, this transparency is replaced by procedures which exclude both voters and the public from any control over the election process. Instead, trust in the administration is introduced as a new principle of electoral control. But what might be desirable for an authoritarian regime is inappropriate in a democracy. 
Using German eVoting regulations as an example, it is discussed how experts in the administration "hack" the electoral system by turning fundamental election principals into their opposite.</description>
    <persons>
     <person id="869">Ulrich Wiesner</person>
    </persons>
    <links>
     <link href="https://berlin.ccc.de/index.php/Wahlcomputer">CCC Wiki on voting computers (in German)</link>
     <link href="http://events.ccc.de/congress/2005/fahrplan/events/1134.de.html">22C3: e-Voting: The silent decline of public control</link>
     <link href="http://www.efve.eu">Europeans For Verifiable Elections: eVoting in Europe (in English)</link>
    </links>
   </event>
   <event id="1423">
    <start>20:30</start>
    <duration>02:15</duration>
    <room>Saal 1</room>
    <tag>we_dont_trust_voting_computers</tag>
    <title>We don't trust voting computers</title>
    <subtitle>The story of the dutch campaign against black-box voting to date</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk covers the dutch campaign against unverifiable voting on computers, which is part of a growing movement world-wide to reject these computers. Successes in Ireland and (surprise) the US seem to indicate that media, law-makers and the general public are beginning to wake up.</abstract>
    <description>For far too long The Netherlands have been the European capital of 'black-box style' electronic voting. It was time someone challenged Nedap, the leading manufacturer of unverifiable voting "machines" in Europe, in their own country.

The talk very briefly describes the international situation with regard to electronic Voting, with emphasis on European history and events. It then describes the dutch campaign that was set up this year. I will talk about the results of the FOIA (IFG) requests we made, the results of our lobbying as well as highlight some of the media attention we got.

We need help: I will also try to motivate you, the listener, to become active against unverifiable e-Voting in/on your own country, bundesland, weblog, city, province, university or wherever else you can.

We can win this one. And we must: either democracy destroys black-box voting or it will eventually destroy democracy.</description>
    <persons>
     <person id="235">Rop Gonggrijp</person>
    </persons>
    <links>
     <link href="http://www.wijvertrouwenstemcomputersniet.nl">Dutch campaign site (in dutch)</link>
    </links>
   </event>
   <event id="1709">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>revenge_of_the_female_nerds</tag>
    <title>Revenge of the Female Nerds</title>
    <subtitle>Busting Myths about Why Women Can't Be Technical</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Why do media and industry lag behind reality when it comes to estimating
women's technical and scientific abilities? That women have these
abilities is obvious. The question is how to change social expectations
about them. What are women doing, and what can they do, to combat
pervasive myths about their inferiority as engineers and scientists?</abstract>
    <description>Why do media and industry lag behind reality when it comes to estimating
women's technical and scientific abilities? That women have these
abilities is obvious. The question is how to change social expectations
about them. What are women doing, and what can they do, to combat
pervasive myths about their inferiority as engineers and scientists? I
have just completed a book-length project on female geeks, to be
published in January, which is a collection of essays by women in a
variety of male-dominated "geek" jobs -- everything from computer
science and bioinformatics work, to comic book writing and videogame
programming. I will present some of the findings from my book, looking
at real-life examples of women fighting back against sexism in
technical/science jobs. I'll also examine how women can help change the
pop culture image of geeks as almost entirely male.</description>
    <persons>
     <person id="1269">Annalee Newitz</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1555">
    <start>00:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>konrad_zuse_der_rechnende_raum</tag>
    <title>Konrad Zuse - Der rechnende Raum</title>
    <subtitle>Ein audiovisuelles Live-Feature</subtitle>
    <track>Culture</track>
    <type>Sonstiges</type>
    <language>deutsch</language>
    <abstract>Er gilt als der deutsche Pionier der fr&#252;hen Rechentechnik: Konrad Zuse. Sein Leben, seine Rechenmaschinen und seine Firma Zuse KG werden in diesem live gesprochenen dokumentarischen Feature der H&#246;rspielwerkstatt der Humboldt-Universit&#228;t zu Berlin portr&#228;tiert.</abstract>
    <description>Schon als junger Student an der TU Berlin hatte Zuse die Idee, Rechenmaschinen zu konzipieren und zu bauen. Vor Beginn des Zweiten Weltkrieges t&#252;ftelte er bereits im Wohnzimmer seiner Eltern in Berlin-Kreuzberg an seiner sp&#228;ter ber&#252;hmt gewordenen mechanischen Z1. Jenseits der US-amerikanischen Milit&#228;rforschung, zu der er keine Kontakte hatte, verwirklichte Zuse den ersten programmgesteuerten Rechner der Welt.
 
Die Geschichte des Computerpioniers wird in dem Live-Feature in Wort, Bild und mit musikalischer Untermalung erz&#228;hlt werden.</description>
    <persons>
     <person id="412">Marcus Richter</person>
     <person id="381">Constanze Kurz</person>
     <person id="872">Ina Kwasniewski</person>
     <person id="411">Jens-Martin Loebel</person>
     <person id="410">Kai Kittler</person>
    </persons>
    <links>
     <link href="http://46halbe.org/audio.html">Texte fr&#252;herer Features</link>
    </links>
   </event>
  </room>
  <room name="Saal 2">
   <event id="1730">
    <start>09:30</start>
    <duration>00:45</duration>
    <room>Saal 2</room>
    <tag>23c3pressekonferenz</tag>
    <title>Pressekonferenz</title>
    <subtitle></subtitle>
    <track>Society</track>
    <type>Sonstiges</type>
    <language>deutsch</language>
    <abstract>Pressekonferenz zum 23C3</abstract>
    <description>Teilnahme bitte mit Vorab-Akkreditierung an 23c3-presse@cccv.de</description>
    <persons>
     <person id="7">Andreas Lehner</person>
     <person id="381">Constanze Kurz</person>
     <person id="216">Frank Rosengart</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1685">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>go_menschen</tag>
    <title>Go - Das Spiel f&#252;r die Menschen</title>
    <subtitle>Auch f&#252;r Computer? - Nicht beim Go!</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Primitiv einfache Spielregeln aber komplexeste Zusammenh&#228;nge, bei denen Computerprogramme kl&#228;glich versagen w&#228;hrend Menschen auf wundersame Weise (Denk-)Muster erkennen und diese zu genialen Strategien umzusetzen verm&#246;gen - das ist Go. Kann uns umgekehrt Go auch St&#228;rken des menschlichen Intellekts aufzeigen? Es werden Parallelen zur Softwareentwicklung gezogen und den Entscheidungsprozessen, denen sich Entwickler dort ausgesetzt sehen.</abstract>
    <description>Der Vortrag wird mit einer sehr knappen Einf&#252;hrung in das Go-Spiel beginnen. Die Zuh&#246;rer werden nicht unbedingt in der Lage sein, ohne weitere Anleitung Go zu spielen, aber sie werden verstehen, worum es beim Go geht. Anhand von ausgew&#228;hlten Beispielen wird die Komplexit&#228;t des Spiels anschaulich dargestellt. Diese werden auch f&#252;r Zuh&#246;rer verst&#228;ndlich sein, die weder Go noch artverwandte Spiele kennen.

Der n&#228;chste Teil des Vortrags wird einen &#220;berblick &#252;ber die Bem&#252;hungen geben, Computerprogramme Go spielen zu lassen. Welche Fragestellungen des Spiel k&#246;nnen Computerprogramme beantworten, womit haben sie Schwierigkeiten? Der "Brute Force"-Ansatz scheitert unmittelbar an der Gr&#246;&#223;e des Spielbaums auf der Turniergr&#246;&#223;e 19x19: Es gibt mehr m&#246;gliche Spielabl&#228;ufe als die vermutete Zahl von Atomen im Universum. Von seiner Komplexit&#228;t ist Go EXPSPACE-hart und somit echt schwieriger als NP-vollst&#228;ndige Probleme.

Mit "Rechnen" ist Go nicht zu knacken. Gute Go-Spieler "f&#252;hlen" welche Z&#252;ge gut sind und welche schlecht sind. Dieses Gef&#252;hl ist unmittelbar da, ohne jedes Nachdenken! Je besser der Go-Spieler, um so besser sein Gef&#252;hl. Oder umgekehrt? Auch aber nicht nur. Ganz ohne Rechenf&#228;higkeit n&#252;tzt das beste Gef&#252;hl nichts. Denn Go hat eine ganz entscheidende Eigenschaft: was "hier" gut ist, ist "da" grottenschlecht. Gewissheit dar&#252;ber erhalten auch erfahrene Spieler nur durch "Rechnen", d.h. dem Vorausberechnen von Zugfolgen und deren Resultat. Aber ohne Gef&#252;hl geht es erst recht nicht: die allermeisten Entscheidungen im Go sind f&#252;r Rechnen zu komplex. Der Vortragende wird den Versuch wagen, den Charakter des "F&#252;hlens" beim Go darzulegen.

In der Softwareentwicklung gibt es &#228;hnliche Denkabl&#228;ufe wie beim Go. Einerseits gibt es die Logik des Codes: so l&#228;uft es ab und das ist das Ergebnis. Aber die meisten Entscheidungen eines Softwareentwicklers und erst recht die wichtigen sind anderer Natur: Ausgehend von einer Problemsituation "f&#252;hlt" ein Programmierer den Weg zu seiner L&#246;sung. Gute Softwareentwickler k&#246;nnen sofort aus dem Gef&#252;hl erkennen, dass eine bestimmte L&#246;sung gut oder schlecht ist. Der Vortragende stellt die These auf, dass die Unf&#228;higkeit von Computern, angesichts einer Problembeschreibung eine gute Implementierung generieren zu k&#246;nnen sehr eng verwandt ist mit der Unf&#228;higkeit von Computern, gut Go spielen zu k&#246;nnen.</description>
    <persons>
     <person id="1236">Christoph Gerlach</person>
    </persons>
    <links>
     <link href="http://playgo.to/interactive/german/">Eine einfache interaktive Go-Einf&#252;hrung</link>
     <link href="http://www.dgob.de/index.htm?einfuehrung/index.htm">Go-Einf&#252;hrung des Deutschen Go-Bundes</link>
     <link href="http://de.wikipedia.org/wiki/Komplexit%C3%A4tsklassen">Komplexit&#228;tsklassen</link>
     <link href="http://www.cgerlach.de">Homepage des Vortragenden</link>
     <link href="http://www.dgob.de">Deutscher Go-Bund als Dachverband aller Go-Spieler in Deutschland</link>
     <link href="http://www.gokgs.com">Empfehlenswerter Go-Server f&#252;r Online-Spiele mit anderen Go-Spielern</link>
    </links>
   </event>
   <event id="1736">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>project_sputnik</tag>
    <title>Project Sputnik</title>
    <subtitle>Realtime in-building location tracking at the 23C3</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Project Sputnik is the real-time in-building location tracking system present at the 23C3. The Sputnik is a small active 2.4GHz RF Beacon, whose signal is picked up by one or multiple of the 20+ Sputnik base stations installed in the event venue (bcc).  Attendees of the 23C3 are able to voluntarily participate in this system by purchasing an inexpensive Sputnik transponder which they can carry with them during the whole event.</abstract>
    <description>In order to make this project attractive to hackers, the Sputnik hardware schematics and firmware source code will be published on the first day of the event, enabling hackers to enhance/replace the exiting firmware, and to add new applications such as peer-to-peer communication between multiple Sputniki.

The location data (both raw and processed) will be available to the public via the congress network.  This means that everyone has access to all data.

The intention of the project is mainly to demonstrate what kind of surveillance is possible using off-the-shelf inexpensive technology, and to make hackers interested into exploring potential positive use cases for it.</description>
    <persons>
     <person id="62">Harald Welte</person>
     <person id="269">Milosch Meriac</person>
    </persons>
    <links>
     <link href="http://www.openbeacon.org/">The OpenBeacon Project (of which Sputnik is one incarnation)</link>
    </links>
   </event>
   <event id="1514">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>lightning_talks_day_1</tag>
    <title>Lightning Talks Day 1</title>
    <subtitle></subtitle>
    <track></track>
    <type>Lightning-Talk</type>
    <language></language>
    <abstract>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.</abstract>
    <description></description>
    <persons>
     <person id="136">b9punk</person>
     <person id="193">Sven Guckes</person>
    </persons>
    <links>
     <link href="http://events.ccc.de/congress/2006/Lightning_Talks">Wiki page</link>
    </links>
   </event>
   <event id="1449">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>not_so_smart_card</tag>
    <title>A not so smart card</title>
    <subtitle>How bad security decisions can ruin a debit card design</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This lecture will introduce you to the the Postcard, a widely used debit card issued by FostFinance in Switzerland. As other debit cards like the "EC" card it is used for shopping payments at POS terminals or to draw money from ATMs in Switzerland and many other countries. It's widely used by its 2'000'000 users, producing a total transaction volume of around 8'000'000'000 Swiss Francs a year.</abstract>
    <description>All security features of the card are described and their ineffectivness is demonstrated. It is shown how even outsiders can get access to the secret key of the card issuer, allowing them to create new, valid debit cards on their own or to clone existing card without any physical access to the original.

If the phrase "Your key is way too short" could embarass IT security officers as much as if we are referring to their private (male) body part - security would be much better off in some cases - at least in this one...</description>
    <persons>
     <person id="614">Bernd R. Fix</person>
    </persons>
    <links>
     <link href="https://events.congress.ccc.de/congress/2006/Pestcard">Postcard Modulus Factorization</link>
    </links>
   </event>
   <event id="1578">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>hacking_fingerprint_recognition_systems</tag>
    <title>Hacking fingerprint recognition systems</title>
    <subtitle>Kann ich dir ein Bier ausgeben?</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Der Vortrag stellt Wege und Werkzeuge vor um aus unterschiedlichen Quellen Bilder f&#252;r die Herstellung von Fingerabdruckattrappen zu gewinnen.</abstract>
    <description>Biometrische Systeme setzen sich mehr und mehr im Alltag durch, sei es in Mobiltelefonen, Computern, Geldautomaten oder als Zugangskontrolle. Das weitverbreitetste System ist dabei die Fingerabdruckerkennung. Entgegen der Versprechungen der Hersteller sind viele der Systeme aber immernoch mit einfachsten seit Jahren bekannten Mitteln zu &#252;berwinden. Der kapazitive Sensor in den neuen Thinkpads von Lenovo/IBM war der erste, der Gegenma&#223;nahmen gegen diese Art von Fingerabdruckattrappe beinhaltete. Anhand der Arbeiten zur &#220;berwindung dieses Systems werden Techniken zum Sammeln von Fingerabdr&#252;cken und eine Schritt-f&#252;r-Schritt Anleitung zur Herstellung einer Attrappe vorgestellt.</description>
    <persons>
     <person id="63">starbug</person>
    </persons>
    <links>
     <link href="http://www.ccc.de/biometrie/fingerabdruck_kopieren?language=en">How to fake fingerprints?</link>
    </links>
   </event>
   <event id="1701">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>open_source_machine_translation</tag>
    <title>Open Source Machine Translation</title>
    <subtitle>From tools, to tricks, to projects: build a translation engine from Klingon to Finnish in an hour</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods.  This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen.</abstract>
    <description>Today two revolutions are pushing the machine translation field forward: the open source movement, and the broader application of statistical methods.  This talk is at the intersection of the two: centering around the applications and contributions to be made to Moses, a state of the art open source toolkit for statistical machine translation developed by researchers from MIT, Edinburgh, Cornell, and Aachen. In the past, those who wanted quality machine translations were forced to rely on closed source, rule based engines such a SYSTRAN. Even most of Google's translation engine uses SYSTRAN software. But Google and others are moving towards flexible, trainable systems, based on computer generated statistics rather than PhD linguist generated rules. This means a machine translation is accessible to the average user. Next time, instead of getting angry or amused by a poor translation provided by Google Translate or BabelFish, use your own copy of the open source engine and you can hack away, helping to improve translation quality for yourself and users around the globe.</description>
    <persons>
     <person id="1260">Christine Corbett Moran</person>
    </persons>
    <links>
     <link href="http://sourceforge.net/projects/mosesdecoder/">http://sourceforge.net/projects/mosesdecoder/</link>
     <link href="http://www.iccs.inf.ed.ac.uk/~pkoehn/publications/tutorial2006.pdf">http://www.iccs.inf.ed.ac.uk/~pkoehn/publications/tutorial2006.pdf</link>
     <link href="http://www.statmt.org/moses/">http://www.statmt.org/moses/</link>
    </links>
   </event>
   <event id="1724">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>transparency_and_privacy</tag>
    <title>Transparency and Privacy</title>
    <subtitle>The 7 Laws of Identity and the Identity Metasystem</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Microsoft has proposed architectural principles ("7 Laws of Identity") to support convergence towards an inter-operable, secure, and privacy-enhancing plurality of identity systems - an "Identity Metasystem". This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable.</abstract>
    <description>The ability of Internet users to manage identity relationships with diverse organisations is a prerequisite to further development of e-commerce and efficient delivery of government services online. However a rising tide of information security threats, from &#8220;phishing&#8221; and &#8220;spoofing&#8221; attacks on the user, to large scale breaches of centralised repositories of identity information, suggests that new approaches are needed which can empower the individual to take more control of how their personal information is used online. For a number of years there has been growing interest in industry and research communities in the concept of "user-centric" identity management systems. Microsoft has proposed architectural principles ("7 Laws of Identity") to support convergence towards an inter-operable, secure, and privacy-enhancing "Identity Metasystem". This new concept presupposes that a single monolithic identity system for the Internet is neither practicable nor desirable. What are the implications for security and privacy of offering individuals greater transparency over how their data is used, and how can this best be achieved?

The 7 Laws of Identity
======================
1. User Control and Consent - Technical identity systems must only reveal information identifying a user with the user&#8217;s consent.

2. Minimal Disclosure for a Constrained Use - The solution that discloses the least amount of identifying information and best limits its use is the most stable long-term solution.

3. Justifiable Parties - Digital identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship.

4. Directed Identity - A universal identity system must support both &#8220;omni-directional&#8221; identifiers for use by public entities and &#8220;unidirectional&#8221; identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles.

5. Pluralism of Operators and Technologies - A universal identity metasystem system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers.

6. Human Integration - The universal identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human-machine communication mechanisms offering protection against identity attacks.

7. Consistent Experience Across Contexts - The unifying identity metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies.</description>
    <persons>
     <person id="797">Caspar Bowden</person>
    </persons>
    <links>
     <link href="http://www.identityblog.com/">Kim Cameron's Identity Blog</link>
    </links>
   </event>
   <event id="1609">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>data_retention_update</tag>
    <title>Data Retention Update</title>
    <subtitle>News and Perspectives on Implementation and Opposition</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The EU adopted a directive on the retention of data regarding the communications, movements and use of media of all 365 mio. EU citizens. The struggle is now continuing on the national levels, and privacy groups are preparing legal, political and technical challenges to this surveillance scheme.</abstract>
    <description>A year ago, the European ministers of justice and home affairs struck a deal with the European parliament and the commission according to which personal data regarding the communications, movements and use of media of all 365 mio. EU citizens is to be collected and stored for up to two years. While the EU directive 2006/24 EG on data retention has entered into force in May 2006, the struggle is continuing. The panel of three key anti-data retention activists will present to you the latest political and legal developments in this field in Europe and overseas.

Two antagonistic trends can be observed: On the one hand, some member states such as Denmark have started the implementation process, as expected with a broader scope of data to be stored than is required by the directive. The United States are also moving towards data retention, and hardware vendors are preparing to sell the necessary surveillance equipment to telcos and ISPs. On the other hand, the opposition against this step towards a police state is growing. A number of EU member states have announced that they will postpone the retention of internet traffic data. The Irish government is challenging the entire directive before the European Court of Justice. Privacy groups are preparing legal, political and technical challenges. 
The panel of three key anti-data retention activists will present to you the latest political and legal developments in this field in Europe and overseas.</description>
    <persons>
     <person id="316">Rikke Frank J&#248;rgensen</person>
     <person id="336">Ralf Bendrath</person>
     <person id="1207">Patrick Breyer</person>
    </persons>
    <links>
     <link href="http://wiki.dataretentionisnosolution.com/">EDRi Data Retention Wiki</link>
     <link href="http://www.vorratsdatenspeicherung.de/">German Working Group against Data Retention (AK Vorrat)</link>
     <link href="http://www.edri">European Digital Rights</link>
    </links>
   </event>
  </room>
  <room name="Saal 3">
   <event id="1656">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>dylan_network_security</tag>
    <title>Design and Implementation of an object-oriented, secure TCP/IP Stack</title>
    <subtitle>Ethereal^W Wireshark without remote exploits - a proof of concept</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>We present a domain-specific language (DSL) capable to describe ad-hoc defined protocols like TCP/IP.
Additionally we developed other libraries, like a flow graph for packet processing and a layering mechanism for protocol stacking, to get a complete TCP/IP stack.</abstract>
    <description>The security industry is in a paradox situation: many security appliances and analysis tools, be it IDS systems, virus scanners, firewalls or others, suffer from the same weaknesses as the systems they try to protect. What makes them vulnerable is the vast amount of structured data they need to understand to do their job, and the bugs that invariably manifest in parsers for complex protocols if written in unsafe programming languages.

We present the design and implementation of a domain-specific language (DSL) for description of structured byte-oriented protocols that addresses this problem. The DSL is applicable to a wide range of problems, such as network communication or file formats, and allows the programmer to write an abstract definition of some packet format, from which parsers and generators are then created automatically. That mechanism saves the programmer from tedious manual work for supporting new protocols, and at the same time prevents him from introducing vulnerabilities into the parsing process.

Our DSL is implemented on top of Dylan, a dynamically typed, object-oriented programming language. It makes heavy use of the Dylan macro facility to extend the language for the domain of packet format description, without sacrificing performance in the process. Beyond the safety gained by automating the parser creation process, Dylan provides additional security by its strong typing, mandatory bounds checking and automated memory management.

We also show the implementation of a userland TCP/IP stack, which uses the packetizer DSL for description of network packet formats, as well as a packet flow graph framework for packet processing and a layering mechanism for protocol handling.</description>
    <persons>
     <person id="91">Andreas Bogk</person>
     <person id="106">Hannes Mehnert</person>
    </persons>
    <links>
     <link href="http://www.opendylan.org/">Dylan</link>
     <link href="http://www.networknightvision.com/">Proof of concept</link>
    </links>
   </event>
   <event id="1561">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>big_brother_awards</tag>
    <title>4+2+1 Jahre BigBrotherAwards Deutschland</title>
    <subtitle>Eine Lesung aus dem Buch "Schwarzbuch Datenschutz"</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Vorgestellt wird das "Schwarzbuch Datenschutz", das in diesem Jahr entstanden ist: Sieben Jahre BigBrotherAwards Deutschland sind gelaufen. Was ist passiert und was bleibt &#252;brig? Eine R&#252;ckschau auf die interessantesten Gewinner der ersten sechs Jahre, die im Buch "Schwarzbuch Datenschutz" zusammengefasst wurden, und auf die aktuellen Preistr&#228;ger.</abstract>
    <description>Die BigBrotherAwards haben einen neuen Schwung in das Thema Datenschutz gebracht. Und keine andere Veranstaltung rund um das Thema Datenschutz genie&#223;t ein solch gro&#223;es &#246;ffentliches Interesse.

In Deutschland wurde der Preis mittlerweile sieben mal vergeben. Diese magische Zahl verleitet zu einem R&#252;ckblick. Die ersten sechs Jahre wurden in dem Buch "Schwarzbuch Datenschutz" zusammengefasst, aus dem viel zu h&#246;ren sein wird. Es wird gekl&#228;rt, wie es mit den Preistr&#228;gern weiter ging, und ob sie heute genauso schlimm sind wie damals oder ob sie ihre Politik ge&#228;ndert haben. Denn viele Preistr&#228;ger bekamen neben dem Award auch eine Extrabehandlung. Zudem gibt es was von den aktuellen Gewinnern zu h&#246;ren, die es auch faustdick hinter den Ohren haben.

Die Veranstaltung ist Lesung und Performance in einem und begibt sich auf eine Zeitreise durch die letzten sieben Jahre.</description>
    <persons>
     <person id="285">Rena Tangens</person>
     <person id="184">padeluun</person>
    </persons>
    <links>
     <link href="https://www.bigbrotherawards.de">BigBrotherAwards</link>
     <link href="https://www.foebud.org">FoeBuD e.V.</link>
     <link href="https://shop.foebud.org/product_info.php/products_id/149">Schwarzbuch Datenschutz</link>
     <link href="http://www.bigbrotherawards.org">BigBrotherAwards Internationale Homepage</link>
    </links>
   </event>
   <event id="1505">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>gaeste_ueberwachung</tag>
    <title>G&#228;ste-&#220;berwachung in Hotels durch staatliche und private Schn&#252;ffler</title>
    <subtitle></subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>- Fragw&#252;rdige Methoden der Informationsbeschaffung
- Rekonstruktion authentischer F&#228;lle
- Schutz von Gesch&#228;ftsgeheimnnissen und Privatsph&#228;re</abstract>
    <description>Internationale Hotels aller L&#228;nder dienen schon immer als Drehscheiben legaler und illegaler Aktivit&#228;ten. 

Die &#220;berwachung von Hotelzimmern, Konferenzr&#228;umen und Personen gilt daher als Pflicht&#252;bung staatlicher Bedarfstr&#228;ger und privater Informationsbeschaffer. Durch die Naivit&#228;t der G&#228;ste endet so mancher Fall nicht nur in der Besenkammer, sondern auch mit bitterem Erwachen in den Schlagzeilen.</description>
    <persons>
     <person id="1230">Manfred Fink</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1523">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>the_rise_and_fall_of_open_source</tag>
    <title>The Rise and Fall of Open Source</title>
    <subtitle>The Million Eyeball Principle and forkbombs</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This lecture outlines a possible future retrospective on OpenSource built from a simple continuation of current trends.</abstract>
    <description>It's now been quite a while that OpenSource projects started to die out due to lack of developers, while on the other hand the number of similar projects in the same area is astonishing. 2006 then turned out to be the year when the first major OpenSource projects started to run into a similar crisis.

In almost every area of computer science, there is an awful lot of similar projects which basically have the same goal but try to achieve it in only slightly different ways. There are, for example, gazillions of different Wiki projects, web fora, mail readers, editors, Linux distributions or window managers. This diversity does of course have a lot of advantages, but the amount of people working in the area of OpenSource in their free time is limited. Also, the amount of people who work in the area and are able to contribute quality code is quite low.

The usual life cycle of an OpenSource project nowadays starts with its creation, of course. Then, it is usually maintained to the point where it is about half finished in terms of features. Then, there is usually a clash over some subject (Specific features that go/don't go in, the use of specific version control systems, the attitude of the maintainer), followed by a fork. Usually, this fork results in 3 or more different projects. The parent project usually dies off due to a lack of resources, which have been drained to the child projects. Normally, most of the child projects also lack a security practitioner, which usually leads to vulnerabilities, and consequently to a high load of security incidents which slow down the progress of the child project even further. Also, a lot of people think that in a fork project, they can now finally get rid of the scourge of good coding habits. This usually leads to the project wasting away due to a load of bugs that nobody can manage.

There are various reasons for this. Of course, a prime reason lies in the evangelism that a lot of OpenSource developers just bear inside them. Projects get forked because they don't use the Only Beatific Technology, but some Inferior Technology from The Past. The original maintainer usually refuses to adapt to the new technology because he prefers to have a stable and well-known base to build on.

Another big reason for this is the ego of some developers. A lot of people can't stand it if somebody tells them to bugger off with their patch because it doesn't meet the quality standards of the project. They fprk off a new project with the old code plus their patch, and either a number of developers from the original project fork off as well, or the child project quickly falls behind.

Of course, there is also a problem on the maintainer side. A lot of maintainers don't like the fact at all that there are people who write better code or adapt new features that really are required for the project. This usually leads to one successful child project forking off while the parent project continues to float into space for a while with barely any maintainers left. This is of course one of the better ways to fork, but it still means a significant resource drain.

Also, today's source control systems make it incredibly easy to fork off a project. It usually only requires a fork of the current repository, which is an usually action because today's source control systems just use project forks and push/pull technologies for concurrent development. Also, there are usually tools which convert an entire repository from source control system A to source control system B without even losing the metadata. This means that there is less hassle involved in forking off a project than there used to be, so it's easier to overcome one's inhibitions because the technical bar is lower.

Another drain of resources isn't specific to an OpenSource project. An inherent problem of OpenSource resources lies in the fact that nowadays there is a new technology of the day out every other month, which means that most of the developers just try to learn a new Latest Thing (and start off projects with it, trying to solve problems that have been solved years before). This means that a lot of precious time is spent on learning Your Favorite Programming Language on Rails rather than writing code. On the other hand, the new technologies usually introduce new security problems that were previously unheard of, and that have to be taken into account as well. The .NET hype for example totally forgot to address that buffer overflow vulnerabilities aren't the only security problems in the world, and that .NET itself may also be a security problem.

Finally, there will also be some positivism and a couple of suggestions (or maybe even guidelines) on how to get along a lot better in our projects than we used to.</description>
    <persons>
     <person id="1124">Tonnerre Lombard</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1439">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>information_operations</tag>
    <title>Information Operations</title>
    <subtitle>Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnerable to theft or destruction of information assets, a process described as information operations. This is the presentation of a one-year Postgraduate Infosec Research Project conducted in New Zealand.</abstract>
    <description>This presentation gives a sector-oriented overview of what has been done so far to address information operations (IO) and where improvements could and should be made. Main threat sources were identified: malicious insiders, as well as competitive organizations, cyber terrorists, criminal groups, and foreign governments. The research analyzes the potential risks of IO, clarifies how organizations are prepared for IO, and demonstrates how IO threats are addressed. Miscellaneous IO weapons, trends, threats, and possible countermeasures will be discussed.

IO involves much more than computers and computer networks. It encompasses information in any form and transmitted over any medium. It covers operations against information content and operations against supporting systems, including hardware, software, and human practices. Numerous definitions of IO and related topics exist. When trying to define IO there is a danger of defining the concept either too narrowly or too broadly. Because they are commonly in use, definitions of the DOD Dictionary of Military and Associated Terms will be used:

- Information Operations: Actions taken to affect adversary information and information systems while defending one&#8217;s own information and information systems.
- Information Warfare: IO conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.</description>
    <persons>
     <person id="1059">Sebastian Schroeder</person>
    </persons>
    <links>
     <link href="http://www.au.af.mil/info-ops">Cyberspace &amp; Information Operations Study Center</link>
     <link href="http://www.maxwell.af.mil/au/awc/awcgate/iw-army/intro.htm">Information Warfare Tutorial</link>
     <link href="http://www.mind-books.com/extranet/microsite.asp?section=extranet&amp;ContentID=jiw_main">Journal of Information Warfare</link>
     <link href="http://www.terrorismcentral.com/Library/Teasers/Flamm.html">Cyber Terrorism and Information Warfare: Academic Perspectives: Cryptography</link>
     <link href="http://www.aci.net/kalliste/tic.htm">National Academy of Sciences: Trust in Cyberspace</link>
     <link href="http://www.iwar.org.uk/iwar/resources/canada/infoops.htm">Canadian Security Intelligence Service on Information Operations</link>
     <link href="http://niels.xtdnet.nl/cybersecurity">Center for Information Technology Integration: Cyber Security and Information Infrastructure Protection</link>
     <link href="http://www.counterterrorismtraining.gov/pubs/02.html">Publications: Cyberterrorism &amp; Computer Technology</link>
     <link href="http://www.wired.com/news/privacy/0,1848,67223,00.html">Wired News: U.S. Military's Elite Hacker Crew</link>
    </links>
   </event>
   <event id="1603">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>foss_in_india</tag>
    <title>Hacking a Country: FOSS in India</title>
    <subtitle>An Overview Free and Open Source Software efforts and projects in India</subtitle>
    <track>Community</track>
    <type>Podium</type>
    <language>englisch</language>
    <abstract>This talk is about the growth of Free Software in India. It includes an overview of how Free Software has spread not only within the industry but also with in the Government and Education. Includes examples of Indian innovation based on Free Software, including the Simputer.</abstract>
    <description>Atul Chitnis has promoted Free and Open Source Software (FOSS) and driven community initiatives in India since the mid 1990s.

In this talk, he presents an overview of these activities, from pushing a million Linux CDs into the country via the PCQuest Linux Initiative, engaging the community with industry and government through participation in large scale events, to the founding of Asia's best known and most successful FOSS event series (FOSS.IN, formerly known as "Linux Bangalore").

He also presents samples of his current work, which includes the opening of technologies associated with the Simputer, whose future he now guides as part of his work at Geodesic Information Systems. His talk will include demonstrations of the technologies involved.

Finally, he will explain some of the "social hacks" he has resorted to over the years to force the FOSS community, the Indian government and the industry to get talking to each other, and will summarize the direction and future of FOSS not only India but in Asia.</description>
    <persons>
     <person id="1175">Atul Chitnis</person>
    </persons>
    <links>
     <link href="http://foss.in/">FOSS.IN</link>
    </links>
   </event>
   <event id="1543">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>kollaboratives_wissenmanagement</tag>
    <title>Kollaboratives Wissensmanagement im Bildungsbereich</title>
    <subtitle>Die Zitierf&#228;higkeit von Wiki-Wissen</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Im Mittelpunkt des Beitrags steht das wissenschaftliche Zitieren der Wikipedia im Kontext der Diskussion um stabile Versionen, Qualit&#228;tssicherung und die Sicherung von Expertenwissen; welcher Zusammenhang besteht zwischen wissenschaftlichem Arbeiten und dem Wissenskonsens der Wikipedia? Erlaubt die Wikipedia die Bereitstellung von wissenschaftlich verwertbaren Zitaten und wie kann sie wissenschaftlich zitiert werden?</abstract>
    <description>Im Bildungsbereich werden Wikis immer wichtiger &#8211; vor allem die Wikipedia und Wikibooks. Dabei ist klar, dass kollaborativ erworbenem Wissen immer eine gewisse Unsicherheit anhaftet. Der Beitrag gibt einen &#220;berblick &#252;ber die Probleme und &#252;ber Ma&#223;nahmen, die ergriffen worden sind oder noch ergriffen werden k&#246;nnen, um Wikiwissen im Wissenschafts- und Hochschulbereich nutzbar zu machen. Dabei wird deutlich, dass die Probleme keineswegs neu sind und dass mit einfachen Mitteln das Unsichere sicher bzw. sicherer gemacht werden kann. Es geht darum, Argumente zu liefern, warum und wie man Wikiwissen in Schule und Hochschule nutzen kann. Da in K&#252;rze in der deutschen Wikipedia die stabilen (gepr&#252;ften) Versionen kommen werden, geht die Diskussion &#252;ber die Zitierbarkeit der Wikipedia in eine neue Runde.

Wir gehen davon aus, dass die Wikipedia durchaus zitierbar ist &#8211; nicht, um sich weitere Recherchen zu ersparen, sondern als Quelle des Wissenskonsens. Mit der Wiedergabe von Wikipedia-Inhalten ist es in einer wissenschaftlichen Arbeit nat&#252;rlich nicht getan, denn Erkenntnisgewinn muss immer jenseits des Wissenskonsens' liegen. Das gilt nat&#252;rlich nicht nur f&#252;r die Wissenschaft. Auch von einem Journalisten ist zu erwarten, dass er neue Informationen vermittelt. Die Recherche muss also weitergehen, denn was in der Wikipedia steht, ist ohnehin bekannt. Aufgabe der Schule ist es, zu vermitteln, wie Sch&#252;ler sich den Wissenskonsens erschlie&#223;en, hinterfragen und erweitern k&#246;nnen. Schon deshalb hat die Wikipedia ihren Platz im Schulunterricht.

Praktisch zu kl&#228;ren ist vor diesem Hintergrund, wie die Wikipedia sinnvoll zitiert werden kann, denn die traditionelle Zitationsform einer Webseite mit einer URL und der Angabe eines Konsultationsdatums wird der schnellen Ver&#228;nderbarkeit der Inhalte nicht gerecht. Hier m&#252;ssen andere Formen der Zitation verwendet werden. Der Gebrauch universeller Identifikatoren (zum Beispiel URNs) ist denkbar. Mithilfe einfacher Skripte lassen sich verschiedene Zitationsformate voneinander ableiten, wenn sie einmal (zum Beispiel &#252;ber RFCs) standardisiert worden sind.</description>
    <persons>
     <person id="90">R&#252;diger Weis</person>
     <person id="47">Martin Haase/maha</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1605">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>digitale_bildforensik</tag>
    <title>Digitale Bildforensik</title>
    <subtitle>Spuren in Digitalfotos</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Mit der mehr und mehr digitalisierten Fototechnik ist es heute ohne Vorwissen nahezu jedem m&#246;glich, Bilder zu manipulieren. Bekanntgewordene F&#228;lle in den Medien haben auch die &#214;ffentlichkeit f&#252;r dieses Thema sensibilisiert. Verfahren der digitalen Bildforensik bieten die M&#246;glichkeit, die Authentizit&#228;t eines Bildes auch ohne Zugriff auf das Original zu &#252;berpr&#252;fen.</abstract>
    <description>Heute ist es quasi jedem m&#246;glich, digitale Bilder zu manipulieren bzw. deren Aussage zu &#228;ndern. Ein Foto kann somit nur noch bedingt als Abbild der Realit&#228;t gelten. Aktive Ans&#228;tze zum Schutz der Authentizit&#228;t des Bildes (z. B. das Einbetten digitaler Wasserzeichen) sind praktisch nur in wenigen F&#228;llen einsetzbar. In letzter Zeit wurden daher verst&#228;rkt Verfahren entwickelt, die auf Basis von statistischen Analysen des Bildes an sich arbeiten, um selbst nicht sichtbare Ver&#228;nderungen im Bild nachzuweisen oder dessen Ursprung zu identifizieren. Stellvertretend sollen ein Verfahren zur Digitalkamera-Identifikation sowie zur Detektion von Bild-Manipulationen vorgestellt werden.

Einerseits soll gezeigt werden, wie anhand von Sensorrauschen von Digitalkameras sehr zuverl&#228;ssig bestimmt werden kann, mit welcher Kamera das Bild aufgenommen wurde. Weiterhin soll ein Ansatz zur Detektion von Bildmanipulationen, die auf Resampling beruhen (Skalierung, Rotation, Verzerrung), vorgestellt werden. Ein &#220;berblick zu weiteren Verfahren/M&#246;glichkeiten runden den Vortrag ab.</description>
    <persons>
     <person id="1178">Matthias Kirchner</person>
    </persons>
    <links>
     <link href="http://www.ws.binghamton.edu/fridrich/Research/double.pdf">Digitalkamera-Identifikation</link>
     <link href="http://www.cs.dartmouth.edu/farid/publications/sp05.html">Detektion von Manipulation auf Basis von Resampling</link>
    </links>
   </event>
  </room>
  <room name="Saal 4">
   <event id="1607">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>probabilistic_trust_model_for_gnupg</tag>
    <title>A Probabilistic Trust Model for GnuPG</title>
    <subtitle>A new way of evaluating a PGP web of trust by using a probabilistic trust metric</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Ein Vertrauensnetz beschreibt einen typischen dezentralen PKI-Ansatz, welcher in der Verschl&#252;sselungssoftware PGP sowie GnuPG umgesetzt worden ist. Es werden einige Nachteile und Schw&#228;chen des aktuellen PGP-Vertrauensmodells erl&#228;utert. Gleicherma&#223;en wird ein neuer Ansatz sowohl f&#252;r den Umgang mit Vertrauen, als auch f&#252;r die Evaluation der Schl&#252;ssel-Authentizit&#228;t pr&#228;sentiert.</abstract>
    <description>Trust networks are possible solutions for the key authenticity problem in a decentralized public-key infrastructure. A particular trust model, the so-called Web of Trust, has been proposed for and is implemented in the popular e-mail encryption software PGP and its open source derivatives like GnuPG. Some drawbacks and weaknesses of the current PGP and GnuPG trust model are investigated, and a new approach to handle trust and key validity in a more sophisticated is proposed. A prototype of our solution has been implemented and tested with the current GnuPG release.
Distributed trust models allow any user in the network to issue certificates for any other user. The issuers of such certificates are called introducers, who can make them publicly available, typically by uploading them to key servers, from which they are accessible to other users. Someone's personal collection of certificates is called key ring. In this way, responsibility for validating public keys is delegated to people you trust. In comparison with a centralized PKI, this scheme is much more flexible and leaves trust decisions in the hands of individual users. These trust decisions are finally decisive for a user to validate public keys (i.e. to accept them as authentic on the basis of the given local key ring.
First we will give a short overview of the web of trust and the PGP trust model. The main goal is to point out some of its inherent weaknesses and deficiencies. To overcome these difficulties, we will then propose a more flexible PGP trust model, in which we propose to see the key validation problem as a two-terminal network reliability problem in a corresponding stochastic graph. In a last part, we will describe the prototype implementation of this model in GnuPG.

Vertrauensbasierte Netzwerke bieten einen m&#246;glichen L&#246;sungsansatz f&#252;r das Authentizit&#228;tsproblem &#246;ffentlicher Schl&#252;ssel in verteilten Public-Key-Infrastrukturen. Ein besonders prominentes Beispiel eines Vertrauensmodells sind Vertrauensnetze, wie sie in Verschl&#252;sselungssoftware wie PGP und GnuPG zum Einsatz kommen. Es werden einige Nachteile und Schw&#228;chen des aktuellen PGP-Vertrauensmodells erl&#228;utert. Gleicherma&#223;en wird ein neuer Ansatz sowohl f&#252;r den Umgang mit Vertrauen, als auch f&#252;r die Evaluation der Schl&#252;sselg&#252;ltigkeit pr&#228;sentiert. Ein Prototyp unseres L&#246;sungsansatzes wurde implementiert und in die aktuelle GnuPG-Version eingebettet.
In einem verteilten Vertrauensmodell ist es allen NetzwerkteilnehmerInnen erlaubt, Zertifikate f&#252;r andere TeilnehmerInnen auszustellen. Ein Zertifikat auszustellen bedeutet im Wesentlichen, einen Schl&#252;ssel zu signieren und diese Signatur dann beispielsweise via Key Server &#246;ffentlich zug&#228;nglich zu machen. Eine Kollektion solcher Zertifikate wird auch als Schl&#252;sselbund bezeichnet. Auf diese Weise wird die Validierung von &#246;ffentlichen Schl&#252;sseln vom pers&#246;nlichen Vertrauen in andere Mitbenutzer des Vertrauensnetzes abh&#228;ngig gemacht. Dieser Ansatz ist somit um einiges flexibler als eine zentrale PKI insofern, dass Vertauensentscheidungen jedem einzelnen Benutzer &#252;berlassen werden. Diese Vertauensentscheidungen sind letztendlich ausschlaggebend f&#252;r die Validierung &#246;ffentlicher Schl&#252;ssel aufgrund eines lokalen Schl&#252;sselbunds.
Als erstes erfolgt eine kurze &#220;bersicht von Vertrauensnetzen sowie dem PGP-Vertrauensmodell. Eines der Hauptziele besteht darin, gewisse inh&#228;rente Nachteile und Schw&#228;chen dieses Modells aufzuzeigen. Danach wird ein alternatives Modell vorgestellt, welches das Vertrauensproblem flexibler angeht und manche dieser Probleme dadurch umgehen kann. Schlie&#223;lich wird noch eine Prototyp-Implementation dieses Modells diskutiert.</description>
    <persons>
     <person id="1267">Markus W&#252;thrich</person>
     <person id="1177">Jacek Jonczy</person>
    </persons>
    <links>
     <link href="http://leia.unibe.ch/run-gnupg/">Probabilistic Key Validation</link>
     <link href="http://www.iam.unibe.ch/~run/publications.php?link=publi">Publication list of the RUN group</link>
    </links>
   </event>
   <event id="1433">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>design_a_decent_user_interface</tag>
    <title>How To Design A Decent User Interface</title>
    <subtitle>Take a look at software from a user's point of view and improve your applications</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Prepare to be brainwashed! This talk wants you to switch from the developer's perspective to that of an average user to design better UIs.</abstract>
    <description>Let's face it, there's a lot of 'hard to use'-software out there. Worse, we're among those who program it. 
If we now consider that for average users the UI practically _is_ the application (i.e. as much as we may wish to, they don't care whether it's programmed well, only if they can use it) this is a catastrophe. Instead of empowering users, software often leaves them frustrated. 

This talk wants nothing less than to change your view on software and the way you develop it. The talk will introduce 'user-centered' design and show you how to: Know the user - Know the task - Act accordingly!

Disclaimer: This presentation is neither about whether qt or fltk is better, nor about the fancying-up of GUIs.</description>
    <persons>
     <person id="220">pallas (Corinna Habets)</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1619">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>introduction_to_matrix_programming</tag>
    <title>Introduction to matrix programming: trance codes</title>
    <subtitle>How to recognize trance coded communication patterns</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The main communication streams in our realities happen besides the exchange of facts and arguments. "The matrix" is built on emotions! Trance coded communication patterns are a natural thing to exchange emotions between individuals. Using them is as normal, as not to be aware of it. But once you recognize the patterns, it is playtime!</abstract>
    <description>Who do you trust putting you in a trance state?

Our reality is not built on facts. What really matters, what really steers and guides you, as a human individual, are feelings, values and views.

Try that experiment: Remember a very good lecture or talk. A talk you enjoyed, where you really had fun while you listened to it. Take a little time to recall how it looked like, try to remember some sounds. While you remember sitting in the audience, listening and laughing, you can also remember the feelings you had. Where did they come from?
When you look carefully at that situation, you will see that your fun comes from the fun of the speaker. It is he, who gives you your share of his own experience. It is amplified by the communication signals of others in the audience. But as you are linked to the speaker, that communication happens without anyone aware of that communication layer. The speaker's brain communicates, in a covert but completely natural way, to your brain. It is bypassing your consciousness. Of course it does, because that transmission would not work otherwise, and what happens is called: Induction. He induces a part of his mindset into your mindset.

Trance is just such a mindset. A mix of values, views but most of all: feelings. Since before birth everyone changes from one trance into another. You know how it feels when you have a bad day and do not feel good? And on another day, you can do anything and you have that feeling of a fresh and clear mind? It is natural to go from one trance state into another state.

Induction is, simplified, just one mind in trance, communicating his trance state to another in a way so that this person can choose to follow or react. Fun, nervousness, arousal, confidence and all those feelings can travel along aside normal communication. The "mind in trance" embeds the proposals to change to that trance state. Everyone is doing that. We just differ in effectiveness.

This talk will raise your awareness for trance commands in human interaction. While you can improve your own effectiveness a little bit, you will learn to look out for trance codes in communication.</description>
    <persons>
     <person id="1183">ulong</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1610">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>fudging_with_firmware</tag>
    <title>Fudging with Firmware</title>
    <subtitle>Firmware reverse-engineering tactics</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This lecture aims at providing ideas and practical techniques about the reverse-engineering process of equipment firmware images. It touches upon data encoding, compression, bootstraps, deciphering, disassembly, and emulation.</abstract>
    <description>This lecture aims at providing ideas and practical techniques about the reverse-engineering process of equipment firmware images. It focuses exclusively on images susceptible to hosting an operating system of some sort.
The approach taken here includes first a reminder about various data encodings for binary transfers, such as UUENCODE or Intel's HEX format. The talk goes on to further interpret the available data, would it be a bootloader, compressed or a filesystem. At this stage chunks of meaningful data should be available, in which useful information should be reachable.
A more in-depth investigation is then conducted, down to executable file formats or various machine-level assembly bytes. If the operating system used was not determined before this stage, the talk mentions how to extract this information and presents which ones are likely to be found, but not necessarily well-known to the general public.
Finally, a few questions about cryptography are raised, and an overview of disassembly and emulation tools is given, as they may well be the easiest ways to defeat it.</description>
    <persons>
     <person id="1179">khorben</person>
    </persons>
    <links>
     <link href="http://www.uberwall.org/">&#220;berWall security team</link>
     <link href="http://www.nruns.com/">n.runs AG</link>
    </links>
   </event>
   <event id="1419">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>java_wird_groovy</tag>
    <title>Java wird Groovy</title>
    <subtitle>Eine Einf&#252;hrung in die neue, dynamische Sprache f&#252;r das Java-&#214;kosystem</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Groovy ist eine neue, dynamische Sprache f&#252;r die Java-VM. 
Sie greift Konzepte von Smalltalk, Python und Ruby auf und integriert Sie nach Java.
Die Integration ist leichtg&#228;ngig, da die Syntax hinreichend &#228;hnlich zu Java ist und
reibungslos bestehende Java-Bibliotheken genutzt werden k&#246;nnen.</abstract>
    <description>Erster Wurf f&#252;r den Inhalt:
- &#220;berblick zu Groovy
- Konzepte von Groovy
- Integration mit Java
- Entstehungsgeschichte von Groovy
- Anwendungsbeispiele
- Projekte in Groovy</description>
    <persons>
     <person id="1037">tof (Christof Vollrath)</person>
    </persons>
    <links>
     <link href="http://groovy.codehaus.org">Groovy-Homepage</link>
     <link href="http://www.manning.com/koenig/">Erstes Buch zu Groovy</link>
     <link href="http://grails.codehaus.org/">Web-Framework f&#252;r Groovy</link>
    </links>
   </event>
   <event id="1502">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>the_gift_of_sharing</tag>
    <title>The gift of sharing</title>
    <subtitle>A critical approach to the notion of gift economy within the everyday life-world of free and open source software (FOSS).</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This paper will dive into this complex questionmark through a comparison between primitive hunter-gatherer societies and the everyday life-world of FOSS. The discussion will focus on the thesis that FOSS practice is based on social sharing and not on processes of exchange. This will entail a negation of the paradigm of economic logic and instead pull a quest for valuable relationships to the forefront of the FOSS sociality.</abstract>
    <description>It seems to be accepted that there exists strong similarities between archaic societies and the present day world of FOSS. At first people might wonder how it is possible to compare the exchange of shell-necklaces with binary code running on a x86 CPU. Then, after explaining the basic principles of gift-giving and reciprocity the same people suddently understand that "we're all" part of a gift economy. When "we all" take part in the use and development of FOSS we're at the same time part in a complex structure of exchange relations. These exchange relations are driven by a coupling of reciprocity with an economic logic which promotes that individual benifit is greater through free giving and subsequent recieving. But, what if this is a wrong and faulty notion? One essential element seems to be missing - when you look closer at the everyday practice - then what is being transacted, were are the transactions, or economical processes of exchange? 
This paper will dive into this complex questionmark through a comparison between primitive hunter-gatherer societies and the everyday life-world of FOSS. The discussion will focus on the thesis that FOSS practice is based on social sharing and not on processes of exchange. This will entail a negation of the paradigm of economic logic and instead pull a quest for valuable relationships to the forefront of the FOSS sociality.

The distinction drawn between the commonly known and widely accepted notion of gift economy and social sharing needs substantiation. The basic principle of the 'gift' is; that the continuing exchange of gifts underlies all our social structures and interactions. Gifts are in this sense likewise tangible and non-tangible artifacts, spanding from food to symbols and metaphysic concepts - and all have in common that they are culturally produced. The principle itself rests on the simple process that the giving of a gift requires the reciever to reciprocate via giving a gift in return and the giver is required to recieve. This exchange of gifts again changes the positions and transforms the singular situation into an ongoing social process of exchange between 'partners', and systems of reciprocity emerge. Hereby establishing lasting and strong social bond, or valuable relationship, between individuals and groups. But, there is one major problem with the domnant interpretations of the principle of the 'gift', then it is quickly combined into the concept of; gift economy. This might not be a problem if the term is placed solitarily within strict ethnographic analysis of "primitive pre-economic societies", though as soon as it enters modern realms it translates 'gifts' into 'commodities'. Commodities are by nature different from gifts, then they are valued in terms of monetary transactions and not as representations of relationships. The world of FOSS is not directed at creation of commodities, and profit maximization, though as I point out, neither is it clearly an expression of 'gift economy' (in the original sense). A few statements might help clarify this complex:

&#8226;	FOSS is not a simple hobby
&#8226;	FOSS is not a commodity
&#8226;	FOSS is not a gift

As noted above, a gift is based on a personal relationship, which may exist before and/or after a gift is given. Though for most people involved in FOSS, the code itself is as anonymous as a product can be. The obligation to return the gift (recprocity) is an abstract reality which only emerges when a license is both read and understood in detail. Indicating that the using of FOSS creates no obligations for the individual user - a gift normally creates an obligation to return - then there is seldomly a relationship between the original coder and the present user. Added to this, when asked, the producers of FOSS do not think in terms of 'gifts', if at all then as a highly generalized gift to mankind. This line of thought ends with the conclusion; that calling FOSS a gift is wrong, or faulty - but: What is it then?
At this point it becomes inspiring to push ahead into the direct comparison of daily FOSS practice with a model of social organization based on social sharing. 
Two characteristics of sharing in primitive hunter-gatherer societies (such as amongst Kalahari bushmen etc.) are quickly highligthed. First; this particular form of social organization is based on the demand that you share all resources acquired, fx game-animals killed or crops gathered, to such an extent that there are no personal possessions. Secondly; it is not possible in any way to manifest ownership over one specific resource, then as soon as it is shared (added to the network) the channels of re-distribution are outside of control. Turning the gaze towards basic demands of the GPL license does create a pattern of reflection. GPL requires that all additions or changes in the existing code, in this sense new resources, are shared without demands, and the re-distribution is un-controlled and free. 
The answer to the above question is slowly emerging, and if the world of FOSS is to be understood in terms of social sharing then the societal critique becomes evident. Then a model of social organization based on mutual aid, voluntary collaboration and egalitarian decision-making challenges the dominant paradigm of economical commodification. In as much as the production of FOSS relies on practical actions (doing) - doing understood as learning and change - it is evident that a confrontation between opposing political cultures is taking place. One part of this conflict requires a continued attention to how the world of FOSS is to be understood, and I believe a critical approach to the notion of gift economy is needed. As Thomas Franks wrote: We might be witnessing the conquest of cool - and as soon as there is money in it we have lost.</description>
    <persons>
     <person id="1114">Gregers Petersen</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1663">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>tracking_goods_and_tracing_people</tag>
    <title>G&#252;ter und Personen "tracken" - Lokalisierung im Pizzamann-Universum</title>
    <subtitle>Technische Mittel und soziale Aspekte des "Tracking &amp; Tracing"</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Dieser Vortrag gibt einen &#220;berblick und geht auf Details von
unterschiedlichen Tracking &amp; Tracing-Technologien ein. Aufbau und
Funktionsweise von solchen Verfolgungssystemen werden kategorisiert
und aufgezeigt; zudem schafft der Vortrag einen &#220;berblick dar&#252;ber, 
wo solche Tracking-Systeme heute verwendet werden. Dabei werden
insbesondere diverse Sicherheitsaspekte au detail behandelt.

Nachdem aufgezeigt wurde, was alles stattfindet, werden die sozialen
Konsequenzen solcher Systeme beleuchtet. Dabei wird sowohl auf kommerzielle
Aspekte (&#196;nderungen in der Marktmacht) als auch auf den Aspekt der
Konsumentenverfolgung eingegangen, da Konsumenten &#252;blicherweise zwar
wissen sollten, was mit ihren Daten geschieht, das aber h&#246;chst selten
der Fall ist.

Der zweite Teil des Vortrags besch&#228;ftigt sich dann mit lokalisierenden
&#220;berwachungssystemen der Staaten, und welche Gefahren des Missbrauchs
hierbei entstehen.</abstract>
    <description>Dieser Vortrag zeigt einen &#220;berblick auf sowie Details von unterschiedlichen
Techniken von Tracking &amp; Tracing-Systemen, also Systeme, um G&#252;ter, Fahrzeuge
oder Personen zu lokalisieren.

Gezeigt und erkl&#228;rt werden unter anderem Systeme zum Tracken von G&#252;tern
und Beh&#228;ltern in Lagern und Warenh&#228;usern, zum Verfolgen von G&#252;tern,
Beh&#228;ltern und Fahrzeugen im Transportmarkt, sowie Systeme zum Verfolgen
von G&#252;tern, Fahrzeugen und Personen f&#252;r Sicherheitssysteme oder zur Straf-
verfolgung.

Im Vortrag wird aufgezeigt und kategorisiert, wie Tracking-Systeme
heute funktionieren, und wo sie &#252;berall bereits eingesetzt werden.
Dabei wird insbesondere auch auf Sicherheitsaspekte eingegangen.

Die gezeigten Lokalisierungstechniken beinhalten unter anderem GPS,
Cellinfo, Gatewaying, sowie den Kommunikationsaspekt unter Verwendung
von drahtgebundenen und drahtlosen Kommunikationstechniken. Auch das
Identifizierungsproblem wird angesprochen.

Ein "Big Picture", also eine &#220;bersicht rundet diesen Teil ab, aus der
hervorgeht, wie G&#252;ter und Personen durch die Welt verfolgt werden k&#246;nnen.

Anschlie&#223;end werden soziale Konsequenzen diskutiert. Diese sind sowohl
kommerzieller Natur wie beispielsweise das Verschieben von Marktmacht
als auch Konsequenzen f&#252;r Konsumenten, also Jedermann, f&#252;r Leute wie
Dich und mich, die wissen sollten, was mit ihren Daten passiert, das
allerdings &#252;blicherweise eben nicht wissen.

Ein abschlie&#223;ender Blick wird auf die Tracking-Systeme der Staaten geworfen,
mit besonderem Augenmerk auf die Gefahren des Missbrauchs.

Automatische Gesichtserkennung wie auch Fahrzeugverfolgung und
Systeme, um die Bewegung von Strafgefangenen oder Menschen in Hausarrest
zu verfolgen, werden gezeigt sowie ihr Potential und ihre Beschr&#228;nkungen
diskutiert.

Die M&#246;glichkeit f&#252;r automatische Verfolgung mittels des elektronischen
Reisepasses und die M&#246;glichkeiten der Verfolgung &#252;ber das Abh&#246;ren von
Mobilfunknetzen werden dabei ebenfalls betrachtet.</description>
    <persons>
     <person id="77">Volker Birk</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1596">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>openxpki</tag>
    <title>Building an Open Source PKI using OpenXPKI</title>
    <subtitle>Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs, stir, season to taste, enjoy!</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see what OpenXPKI is all about, what you can do with it out-of-the-box and how you can hack it to your liking.</abstract>
    <description>In this talk, the open source trust center software OpenXPKI will be presented.
OpenXPKI aims at creating an enterprise-scale PKI/trust center software supporting well established infrastructure components like RDBMS and Hardware Security Modules (HSMs). It is the successor of OpenCA, and builds on the experience gained while developing it. Currently still under heavy development, OpenXPKI aims to be used in production by mid-October. Thus, a working release will be present before the congress.

Features that are available as of this writing (September 2006):
    - CA rollover: "Normal" trust center software usually does not
                   account for the installment of a new CA certificate,
                   thus if the CA certificate becomes invalid, a complete
                   re-deployment has to be undertaken. OpenXPKI solves
                   this problem by automatically deciding which CA
                   certificate to use at a certain point in time.
    - Support for multiple so-called "PKI realms":
                   Different CA instances can be run in a single
                   installation without any interaction between them,
                   so one machine can be used for different CAs.
    - Private key support both in hardware and software:
                   OpenXPKI has support for professional Hardware
                   Security Modules such as the nCipher nShield or
                   the Chrysalis-ITS Luna CA modules. If such modules
                   are not available, access to a key can be protected
                   by using a threshold secret sharing algorithm.
    - Professional database support:
                   The user can choose from a range of database
                   backends, including commercial ones such as
                   Oracle or DB2, which are typically used in
                   enterprise scenarios.
    - Many different interfaces to the server:
                   Currently, one can access the CA server using
                   a web-interface (which also allows for client-side
                   request generation using SPKAC) or using a command
                   line client. Embedded devices such as routers can
                   use the Simple Certificate Enrollment Protocol (SCEP)
                   to talk to the server and apply for certificates.
    - Workflow Engine:
                   OpenXPKI aims to be extremly customizable by allowing
                   the definition of workflows for any process you can
                   think of in the PKI area. Typical workflows such as
                   editing and approving certificate signing requests,
                   certificate and CRL issuance are already implemented.
                   Implementing your own idea is normally pretty easy
                   by defining a workflow in XML and (maybe) implementing
                   a few lines in Perl.
    - I18N:        Localization of the application and interfaces is
                   easily possible and OpenXPKI can of course deal
                   with the whole range of Unicode characters in
                   certificates.

Features that will be done by the time the congress happens:
    - LDAP publication:
                   It will be possible to publish both certificates
                   as well as Certificate Revocation Lists (CRLs) using
                   LDAP.
    - Self-Service application for token personalization:
                   A web application will be available that allows a
                   user to easily create and install certificates to
                   a SmartCard.

For the future, an integration with management systems such as Tivoli
and Nagios, clustering support for issuance of more than 500.000
certificates/day as well as CMC (the Certificate Management protocol
using CMS) support are planned. Implementing CMC over COM would
be especially useful as it would then be possible to seamlessly
replace a Microsoft CA.
A large financial corporation plans to use OpenXPKI in production
once it is ready for prime-time.</description>
    <persons>
     <person id="422">Alexander Klink</person>
     <person id="1200">Michael Bell</person>
    </persons>
    <links>
     <link href="http://www.openxpki.org/docs/OpenXPKI-Architecture-Overview.pdf">OpenXPKI architecture whitepaper</link>
     <link href="http://www.alech.de/openxpki_mrmcd101b.pdf">Slides of the OpenXPKI lightning talk at mrmcd101b</link>
     <link href="http://www.openxpki.org">The OpenXPKI project website</link>
    </links>
   </event>
  </room>
  <room name="Workshop Area">
   <event id="1741">
    <start>11:30</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>wifi_backpack_strap</tag>
    <title>Wifi Backpack Strap Workshop</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>This will be a hands-on hardware hacking workshop with all materials to build your own Wifi Backpack Strap.  The version built during this workshop will be removable with velcro, not built into the strap. Please contact me at "mail" at "fabienne" dot "us" to sign up for the workshop and note whether you would like me to reserve a kit for you or if you will be bringing your own wifi detector. There will be a fee around thirty-five euros for parts.</abstract>
    <description></description>
    <persons>
     <person id="1053">Fabienne Serriere</person>
    </persons>
    <links>
     <link href="http://www.engadget.com/2005/09/13/how-to-embed-a-wifi-detector-into-a-backpack-strap/">Wifi Backpack Strap</link>
     <link href="http://fabienne.us/index.php?module=news&amp;amp;id=18">More Details</link>
    </links>
   </event>
   <event id="1768">
    <start>14:00</start>
    <duration>01:30</duration>
    <room>Workshop Area</room>
    <tag>vidvox_vdmx5</tag>
    <title>AVIT&gt;C23: Vidvox VDMX5</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Rewritten from scratch as a Universal Binary, Vidvox's latest endeavor VDMX5 combines revolutionary interface design with blazing fast performance.</abstract>
    <description>Using a GPU based processing pipeline, VDMX can now apply stunning visual FX to any number of layers of video, all at high definition. During his presentation, David will show off some of the new features that Vidvox has been developing for this major new release, including movie warp markers, multi-channel audio analysis, complete Quartz Composer support, and a fully customizable user interface to meet the specific needs of each user. David will demo the latest version of the software in a workshop length to be determined by the festival organizers.</description>
    <persons>
     <person id="1327">Visual Berlin</person>
    </persons>
    <links>
     <link href="http://www.visualberlin.org/avitc23/wordpress/">AViTC23</link>
    </links>
   </event>
   <event id="1761">
    <start>15:30</start>
    <duration>01:30</duration>
    <room>Workshop Area</room>
    <tag>dylan_introduction</tag>
    <title>Dylan Introduction</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>What is different in Dylan than in other object-oriented and functional languages? Which development utilities are available? How to use the IDE?</abstract>
    <description></description>
    <persons>
     <person id="106">Hannes Mehnert</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1742">
    <start>17:15</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>machine_learning_in_a_nutshell</tag>
    <title>Machine Learning in a Nutshell</title>
    <subtitle>A hands on workshop</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>The intention is to give a brief overview of how to learn from data, which tools to use and which pitfalls to avoid. The goal is not to give a detailed introduction to the theoretical background but to show general application settings. The first half consists of a brief overview of typical machine learning problems, during the second half participants are asked to address a learning problem themselves. Participants are provided with suitable software but are free to use their own favourite applications.</abstract>
    <description></description>
    <persons>
     <person id="580">Isabel Drost</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1743">
    <start>19:30</start>
    <duration>02:00</duration>
    <room>Workshop Area</room>
    <tag>infon_battle_arena</tag>
    <title>Infon Battle Arena</title>
    <subtitle>An introduction</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>This workshop is an introdutcion to the programming game Infon Battle Arena.</abstract>
    <description>Infon Battle Arena is a networked multiplayer real-time programming game featuring little creatures fighting for food. You upload your Creature Code (written in Lua) to a game server using a telnet Interface. The game server then runs your code. The graphical client can be used to watch running games or replay recorded games.</description>
    <persons>
     <person id="1299">Florian Wesch</person>
    </persons>
    <links>
     <link href="http://infon.dividuum.de">Infon Battle Arena</link>
     <link href="http://www.lua.org">Lua</link>
     <link href="http://events.ccc.de/congress/2006/InfonBattleArena">Infon Battle Arene in 23C3 Wiki</link>
    </links>
   </event>
   <event id="1765">
    <start>21:45</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>snortattack</tag>
    <title>SnortAttack.org</title>
    <subtitle>The IPS CHALLENGE</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Workshop Challenge : Are you ready to hack ?</abstract>
    <description>There will be a device with outdated software (simple LAMP) full of security issue, bugs and so on. This device will be protected with another one that implement only snort_inline. After a small briefing we will let anyone try to hack the server with any tool he or she desires, even self-coded exploit... anything... Prepere yourself, warm up your laptop ... We will be there to give hint and discuss about implementation, configuration, optimization of snort and snort_inline. FEEL FREE TO COME!!!</description>
    <persons>
     <person id="1318">SnortAttack Team</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1756">
    <start>00:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>diac24_net</tag>
    <title>diac24.net</title>
    <subtitle>Practical VPN hacking</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>This is a hands-on VPN "introduction". We'll be walking through tunnel and routing setup, talk about some odds and ends, do some showing-off ;). And hopefully we'll bootstrap some interested people right into the VPN (that can mean you!). Try bringing a terminal to a box with internet, OpenVPN and quagga, but it'll be interesting without that too.</abstract>
    <description></description>
    <persons>
     <person id="1187">David L.</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
 </day>
 <day date="2006-12-28" index="2">
  <room name="Saal 1">
   <event id="1487">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>ccc_jahresrueckblick</tag>
    <title>CCC Jahresr&#252;ckblick</title>
    <subtitle>Ein &#220;berblick &#252;ber die Aktivit&#228;ten des Clubs 2006</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Die Sprecher des CCC stellen die Aktivit&#228;ten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vortr&#228;ge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.</abstract>
    <description></description>
    <persons>
     <person id="381">Constanze Kurz</person>
     <person id="216">Frank Rosengart</person>
     <person id="18">Lars Weiler</person>
     <person id="7">Andreas Lehner</person>
     <person id="45">Andy M&#252;ller-Maguhn</person>
    </persons>
    <links>
     <link href="http://www.ccc.de/">http://www.ccc.de/</link>
    </links>
   </event>
   <event id="1513">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>detecting_temperature_through_clock_skew</tag>
    <title>Detecting temperature through clock skew</title>
    <subtitle>Hot or Not: Defeating anonymity by monitoring clock skew to remotely detect the temperature of a PC</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>By requesting timestamps from a computer, a remote adversary can find out the precise speed of its system clock. As each clock crystal is slightly different, and varies with temperature, this can act as a fingerprint of the computer and its location.</abstract>
    <description>The end of my 22C3 talk showed how a side effect of TCP/IP steganography detection was to precisely measure the error of a computers system clock (skew). This talk will review and expand on that material, showing the various other mechanisms for monitoring clock skew and discussing the tradeoffs involved. Because every computer has a unique clock skew, even ones of the same model, this acts as a fingerprint. Even if that computer moves location and changes ISP, it can be later identified through this clock skew. In addition to varying between computers, clock skew also changes depending on temperature. Thus a remote attacker, monitoring timestamps, can make an estimate of a computers environment, which has wide-scale implications on security and privacy. Through measuring day length and time-zone, the location of a computer could be estimated, which is a particular concern with anonymity networks and VPNs. Local temperature changes caused by air-conditioning or movements of people can identify whether two machines are in the location, or even are virtual machines on one server. The temperature of a computer can also be influenced by CPU load, so opening up a low-bandwidth covert channel. This could be used by processes which are prohibited from communicating for confidentiality reasons and because this is a physical covert channel, it can even cross "air-gap" security boundaries. The talk will demonstrate how to use this channel to attack the hidden service feature offered by the Tor anonymity system. Here, an attacker can repeatedly access a hidden service, increasing CPU load and inducing a temperature change. This will affect clock skew, which the attacker can monitor on all candidate Tor servers. When there is a match between the load pattern and the clock skew, the attacker has linked the real IP address of a hidden server to its pseudonym, violating the anonymity properties Tor is designed to provide. The talk will also present a separate illustration of the temperature covert channel technique, investigating a suspected attack on the Tor network in August 2006, by a well equipped adversary.</description>
    <persons>
     <person id="143">Steven J. Murdoch</person>
    </persons>
    <links>
     <link href="http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf">Academic paper</link>
     <link href="http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/">Summary in blog post</link>
    </links>
   </event>
   <event id="1444">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>tor_and_china</tag>
    <title>Tor and China</title>
    <subtitle>Design of a blocking-resistant anonymity system</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.</abstract>
    <description></description>
    <persons>
     <person id="199">Roger Dingledine</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1597">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>hackers_toolkit_for_rfid_emulation_and_jamming</tag>
    <title>A Hacker's Toolkit for RFID Emulation and Jamming</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a "computer of the future", bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, and kids.</abstract>
    <description>However, many RFID systems rely upon the integrity of RFID tag data for their correct functioning.  It has never been so easy to interfere with RFID systems; we have built a handheld device that performs RFID tag emulation and selective RFID tag jamming (sortof like a personal RFID firewall).  Our device is compatible with the ISO 15693/14443A (13.56 MHz) standards, and fits into a shirt pocket.  This presentation will explain the "nuts and bolts" of how tag spoofing and selective RFID jamming work, and will conclude by demonstrating this functionality.

Detailed Outline:

Part I - Introduction to RFID Technology (25 minutes)

 - What is Radio Frequency Identification?
   (How it works, types of RFID, read ranges, etc..)
 - Typical RFID applications
   (Supply chain management, automated payment, access control, animal tagging, etc..)
 - RFID security/privacy threats
   (Unauthorized tag reading, tag spoofing / cloning, denial of Service)

Part II - RFID Emulation and Jamming (25 minutes)

 - Overall architecture
   - Describe the HW architecture
     - XScale processor, Melexis RFID reader-on-a-chip, custom "tag" receiver/transmitter
   - Describe the SW architecture
     - E-Cos RTOS, ISO 14443/15693 stacks, high-level tasks, application-level code

 - RFID Tag Emulation
   - Decoding incoming RFID queries
   - RFID tag "spoofing"
     - Describe how we produce the correct sideband frequencies

 - Selective RFID jamming
   - Describe the Slotted-Aloha anticollision algorithm
   - Describe our selective (timeslot-specific) jamming method

 - Live demonstration of RFID Guardian
   - RFID tag spoofing demo
   - Selective RFID jamming demo</description>
    <persons>
     <person id="730">Melanie Rieback</person>
    </persons>
    <links>
     <link href="http://www.rfidguardian.org">RFID Guardian Project</link>
    </links>
   </event>
   <event id="1576">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>rfid_hacking</tag>
    <title>RFID hacking</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.</abstract>
    <description>This talk will be about some of the hacking related things (technological and social) that you can do with RFID technology.

Topics will include:
+ electronic passports
+ Mifare cryptography (maybe even some reverse engineering results)
+ tickets for the FIFA World Cup (ca. 15 min)

In this part of the talk, we will show the first real world mass application of RFID-technology at the 2006 FIFA soccer world cup. Some valid tickets are shown, including their data and a look at the payload. After that, we will report a simple and unsuccessful hacking-attempt, where one valid ticket was copied. The lecture is accompanied by pictures of some stadium-entrances to examine FIFA security and ticket manipulation.</description>
    <persons>
     <person id="1317">Karsten Nohl</person>
     <person id="995">Henryk Pl&#246;tz</person>
     <person id="759">z0ccor</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1381">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>stealth_malware</tag>
    <title>Stealth malware - can good guys win?</title>
    <subtitle>Challenges in detecting system compromises and why we&#8217;re so far behind the (smart) bad guys</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The presentation will try to present current challenges in detecting advanced forms of stealth malware and explain why current detection approaches, as used in commercial A/V or IDS products, are insufficient.</abstract>
    <description>The author will try to convince the audience that *detection* is no less important then *prevention* and that we need a *systematic* approach to implement a good compromise detector, instead of a bunch of "hacks" as we have today.</description>
    <persons>
     <person id="208">Joanna Rutkowska</person>
    </persons>
    <links>
     <link href="http://invisiblethings.org/">http://invisiblethings.org/</link>
    </links>
   </event>
   <event id="1606">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>console_hacking_2006</tag>
    <title>Console Hacking 2006</title>
    <subtitle>Xbox 360, Playstation 3, Wii</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>"Next Generation" gaming consoles should not be limited to games, they have powerful hardware which we want to exploit for our needs. The talk gives a hardware overview of each of the 3 consoles, an overview of their security systems, as well as an update on hacking the Xbox 360, which has been on the market for about a year.</abstract>
    <description>The Microsoft Xbox 360, the Sony Playstation 3 and the Nintendo Wii belong to the seventh generation of gaming consoles, having GHz-class CPUs and hundreds of megabytes of RAM. While the Xbox 360 has been released roughly a year ago, and some hacking has already gone on, the Playstation 3 and the Wii will only be released in November 2006, so they will be brand-new at the time of the talk.

Usual news sources focus on the features useful for gaming - this talk of course will focus on what we hackers really need. It evaluates possible attack points to execute homebrew code and professional operating systems. For the two systems that have just been released, you certainly cannot expect a working hack, but the basics of the security system will be explained, and it will be compared to existing systems implemented by previous consoles.</description>
    <persons>
     <person id="373">Felix Domke</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1713">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>black_ops_2006</tag>
    <title>Black Ops 2006 Viz Edition</title>
    <subtitle>Pixel Fuzzing and the Bioinformatic Bindiff</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Tools for visualizing the genome can be repurposed to visualize code. Visualized code can be used as a map for fuzzing efforts, change identification, and showing your mom what you do for a living. I'm going to demonstrate a series of tools that brings a new, half-automated, half-visually driven approach to data manipulation and destruction.</abstract>
    <description>The human genome is a mess. Whats on your hard drive is significantly less so. So what happens when you take a visual pattern representation method -- Dotplots -- built for ACTG and throw it at 0x42424242? Exceedingly ornate imagery erupts. Now, what happens when you start fuzzing the data you're visualizing? Your image gets fuzzy, based on precisely what faults your injecting into the data. This Black Ops talk is going to bounce repeatedly between the domain of information representation and the domain of information corruption. I'm going to discuss the use of a linear time context free grammar generator to create a higher-order file fuzzer, and we're going to visualize the output of that fuzzer in realtime. I'm also going to show off other patterned signals that can potentially be comprehended better through graphical summarization, like execution flow traces. I'll also show a rather unexpected result -- that comparing two different versions of the same file visually makes for exceedingly rapid change detection. Finally, I'll probably find some way to squeeze in the concept of cryptomnemonics; this is where a bit sequence 0x123AFFE2 gets mapped to a series of names ("John and Leia Lindner") that encapsulates arbitrary entropy in human recognizable values.

New tools will absolutely be released at this talk.</description>
    <persons>
     <person id="154">Dan Kaminsky</person>
    </persons>
    <links>
     <link href="http://www.doxpara.com/Black%20Ops%202006-toor.ppt">Black Ops 2006 -- Old Slides From Toorcon</link>
    </links>
   </event>
   <event id="1428">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>you_cant_make_this_stuff_up</tag>
    <title>You can't make this stuff up</title>
    <subtitle>A Stand-Up Comedy Approach to hacking</subtitle>
    <track>Hacking</track>
    <type>Sonstiges</type>
    <language>englisch</language>
    <abstract>Ilja and Felix will attempt a stand-up comedy act about hacking, the security industry, open source projects, big egos in the community, and other related stuff.</abstract>
    <description>The hacking world is much too funny to be taken seriously all the time. We will try to cast away the dark shadows of the year by doing some fast paced comedy about what bizarre and absurd things happened to us (and others we know well), so if you like a good belly laugh, please join us!

We promise not to bash anyone who does not deserve it!</description>
    <persons>
     <person id="1046">Felix von Leitner</person>
     <person id="50">Ilja</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1600">
    <start>00:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>biometrics</tag>
    <title>Biometrics in Science Fiction</title>
    <subtitle>2nd Iteration</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>It is a buzzword at the moment: biometrics. Everyone is talking about it and consumers are buying laptops with shiny finger print scanners. This talk will take a look at biometrics in science fiction films.</abstract>
    <description>In reality, biometric systems often don't work. In the movies, we can see what those recognition systems will look like and how they will work in the future. You can have your eyeball or face scanned and then you can easily walk through high security gates. The biometric system works flawlessly - until your eyeball gets stolen.
Thanks to the movies, we also know biometric scanners are easy to defeat. We will witness movies where the nifty biometric security software is tricked.

We will show short film scenes of appr. fifty movies and comment them.</description>
    <persons>
     <person id="414">Roland Kubica</person>
     <person id="381">Constanze Kurz</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 2">
   <event id="1700">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>router_and_infrastructure_hacking</tag>
    <title>Router and Infrastructure Hacking</title>
    <subtitle>"First we take Manhattan, then we take Berlin..."</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in
their infancy and are still not even used in most penetration tests.
This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary.</abstract>
    <description>While the overall flow of systematically attacking a network's
infrastructure is similar to attacking any network -- recon, find
vulnerable points, gather data, harvest authentication credentials,
attack, recurse -- there are several useful vectors still not common
among network engineers or penetration testers.  This talk will 
outline some useful lateral techniques for backbone and infrastructure
device hacking, as well as discussing how to assess a network and
develop your own attacks if there are no known ones to be found.

When in the reconnaissance phase, there are several differences
between infrastructure analysis and normal network mapping that are
useful to know.  Stack fingerprinting is a bit spottier, making OS
identification somewhat more difficult.  The proliferation of varying
code trains on popular network devices makes using traditional scanners
a bit more uncertain, though efforts are being made to address this.
However, default passwords are much more widely deployed on
infrastructure devices, and brute-force tools are starting to become
more common.  While many of these tools are still young (cisco_torch,
for example), they are easily extensible and will often yield good
results when properly tweaked.  Add to this the network admin's toolkit
-- BGP looking glasses, for example -- and old-school techniques such as
war-dialing, which has new life in finding the out-of-band access modems
so often deployed for high-availability network maintainence.

Poor security practices and the reliance on poorly authenticated
protocols or their fragile dependencies (services with known DoS
conditions, unauthenticated UDP transactions in the clear) allow
authentication tokens to be gleaned, sniffed, and in many cases, faked.
Wireless sniffing has yielded management and authentication backbone
data in 1% of networks sampled, and password reuse makes it easier to
put that data to privilege escalation usage.  In addition, the
ability to knock an authentication server off the wire and replace
it with a compromised authentication server of your own has been an
effective technique in previous pen-testing engagements.

However, the Holy Grail of backbone attack is finding bugs in
the devices themselves.  While denial of service is relatively easy, and
useful if that's your aim (plenty of extortionists are happy with that,
and ditto corporate saboteurs), device takeover is still more likely by
attacking the authentication credentials.  If the devices you're
attacking don't have any known bugs, fear not -- a reasonable grasp of
protocol analysis can often help, and fuzzing the protocols that are
available on the device can often cause DoS bugs at the least to fall
out.  A still more useful attack vector is to authenticate to, join, and
inject routes into the routing protocol in use, and we'll discuss
several easy ways to do that, and the results that can be achieved.

Finally, this talk will look at common audit and logging
behaviours of infrastructure devices, and how that affects the likely
long-term success of the attacks described above.</description>
    <persons>
     <person id="1259">Raven</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1568">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>json_rpc</tag>
    <title>JSON RPC</title>
    <subtitle>Cross Site Scripting and Client Side Web Services</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>JSON RPC is a recently fashionable buzzword in the AJAX context. This lecture explains its principles, specifically the same origin policy for cross site scripting and its relation to JSON RPC, and demonstrates the essential implementation details using the example of the geocoding service in the google maps API.</abstract>
    <description>The collection of technologies on which modern web applications are based is nowadays summarily referred to as AJAX, or "Asynchronous JavaScript and XML". Interestingly, the use of XML as the data format for the transfer between client and server is not only unnecessarily complicated, but in its usual incarnation as XMLHttpRequest it is also subject to restrictions that prevent the direct use of web services from the client side of the web application.

A natural alternative to the transport of XML data structures though the XMLHttpRequest API is the transport of literal JavaScript expressions (nowadays also called JSON, or "JavaScript Object Notation") through dynamically created SCRIPT elements. We discuss practical aspects of the implementation of this approach and the consequences for architecture and software design of web applications.

Because the circumvention of restrictions that were originally meant to maintain security might be frightening at first sight, we recapitulate the principles on which cross site scripting restrictions are based, and we discuss why their circumvention for the purpose of JSON/SCRIPT based data transport doesn't infract the security of a web application.</description>
    <persons>
     <person id="577">(mesch) Steffen Meschkat</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1658">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>bignum_arithmetic</tag>
    <title>How to implement bignum arithmetic</title>
    <subtitle>A short look at my pet project implementation</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Assembly language skills are a bonus, but not strictly required. This lecture will explain how software like OpenSSL and GnuPG do their arithmetic on 1024 bit numbers.  This is not about how RSA works, or about how AES works. This is just about how to add and multiply big numbers. I will explain the algorithms, show some code, and give some timings.</abstract>
    <description>Everyone knows that RSA keys are typically 1024 bits and up, but computers only operate on 32-bit or 64-bit quantities at a time. How does software like OpenSSL or GnuPG then do arithmetic on those long numbers?

This talk will show how it's done.</description>
    <persons>
     <person id="1046">Felix von Leitner</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1515">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>lightning_talks_day_2</tag>
    <title>Lightning Talks Day 2</title>
    <subtitle></subtitle>
    <track></track>
    <type>Lightning-Talk</type>
    <language>englisch</language>
    <abstract>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.</abstract>
    <description></description>
    <persons>
     <person id="193">Sven Guckes</person>
     <person id="136">b9punk</person>
    </persons>
    <links>
     <link href="http://events.ccc.de/congress/2006/Lightning_Talks">Wiki page</link>
    </links>
   </event>
   <event id="1373">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>hacker_foundation</tag>
    <title>The Story of The Hacker Foundation</title>
    <subtitle>Challenges of Organizing a Foundation for Hackers in the USA</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Talk will focus on the three year history of the Hacker Foundation
in the USA including the legal, organizational and motivational
hurdles. Ongoing project successes, failures and the reasons behind each
will be covered.</abstract>
    <description>The Hacker Foundation began in 2003 as an attempt to see if the USA
tax laws could be put to the benefit of the Hacker Community. The
founders wanted independent hacker researchers to have access to the
same tax benefits and funding that academics and corporate-backed
research organizations have. The foundation also wanted to assist
hackers with marketing, organizing and project management tools. The
foundation was recognized as a non-profit foundation by the USA Federal
and State of California taxation authorities in 2005. Now, two years
later, it seems that the feds were more convinced about the idea than
hackers in the USA!

With directors, projects and resources spread throughout the USA, Jake
Applebaum (member of the HF Board of Directors) and Nick Farr (a/k/a
NFF) will lead a four part discussion on the Hacker Foundation in the
USA. Part One will focus on the origins of the Hacker Foundation at
Defcons 8 and 9 and the original idea of &#8220;Hackers Without Borders&#8221;, an
organization loosely pattered after the international medical relief
organization Doctors Without Borders. Part Two will focus on the birth
of the Hacker Foundation in the State of California and the fight to
achieve recognition from government agencies. We will discuss how our
correspondence with the feds and other hackers brought about the
evolution of the original idea to the foundation's present form. Part
Three will focus on our early projects and what we have learned
attempting to organize Hackers and provide services to Hacker projects
in the USA. This part will focus on the inherent difficulties in
organizing hackers in the USA and some of the ideological differences
among hackers in the USA that make organizing difficult. We'll also
cover our efforts to provide laptops to Ugandan non-profit organizations
which were cut short by the Ugandan government. Our closing will focus
on where HF is today and where we plan to go into the future. We will
suggest some methods to internationalize the foundation, include a brief
discussion on the Metasploit fund, preview the services we currently
offer and discuss our fundraising strategies.</description>
    <persons>
     <person id="989">Nick Farr</person>
    </persons>
    <links>
     <link href="http://www.hackerfoundation.org">The Hacker Foundation Home page</link>
    </links>
   </event>
   <event id="1540">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>learn_to_be_honest</tag>
    <title>To live outside the law you gotta be honest</title>
    <subtitle>Ist nicht jedes Passwort eine Manifestation des Mi&#223;trauens?</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>As a dealer of illegal substances in the late 60s, early 70s, I learned how to work without written contracts and without advertising.</abstract>
    <description>In those seven years I lived on trust and some of my then-customers are my best friends today. When I became a publisher I decided to work the same way: on trust. Why go back if you have the experience, that trust works? When Wau Holland contacted me, if I would be willing to publish the first books by the CCC, the HACKER BIBELN, my 'Yes' was all that was needed. We did three publications, I payed the CCC about 140.000,00 DM as royalties and nobody questioned that deal.</description>
    <persons>
     <person id="928">Werner Pieper</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1655">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>elektronische_reisedokumente</tag>
    <title>Elektronische Reisedokumente</title>
    <subtitle>Neue Entwicklungen beim ePass</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Auch dieses Jahr gab es wieder eine Menge Wirbel um den ePass. Neue Studien wurden durchgef&#252;hrt, Entscheidungen wurden getroffen und immer mehr L&#228;nder haben begonnen, elektronische Reisedokumente einzusetzen. Der Vortrag wird den neuesten Stand der Diskussion aufzeigen.</abstract>
    <description></description>
    <persons>
     <person id="63">starbug</person>
     <person id="381">Constanze Kurz</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1495">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>green_phone</tag>
    <title>Mobile phone call encryption</title>
    <subtitle>Encrypting (GSM) mobile phone calls  over VPN with an Asterisk PBX</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>To encrypt all your mobile phones to protect it from overzealous eavesdroppers, you are currently limited to using special hardware such as the Cryptophone. The disadvantage of cryptophone is that it only works with other cryptophones. To work around this, we turn mobile phones from "voice" phones into VOIP phones. Using the SIP protocol for VOIP and IPsec/L2TP or Openvpn as our VPN, Leigh Honeywell and Paul Wouters connect their mobile phones fully encrypted to an Asterisk PBX server.</abstract>
    <description>The presentation, given by Asterisk expert Leigh Honeywell and VPN expert Paul Wouters will start with a description of the demise of the "old" telecom sector and the end of "voice" conversations. The replacement, Voice Over IP promises a lot of good things, but it comes at a price. Hacking VOIP calls on the internet is much easier. We can no longer trust the security of the telecom infrastructure. Forged caller-ID, charging someone else for your calls, breaking through firewalled networks, or abuse via VOIP services like Google, Jajah, Skype or others. We will demonstrate some of these attacks.

To address these problems, we need to be able to both authenticate and encrypt our calls. The solution presented is build with using Freely available
(mostly open source) software and we will explain various aspects and ideas behind our setup and why we choose the various protocols and software packages.

We are currently working with various phones, such as the Linux based GreenPhone, the XDA's and other phones running either Linux or Microsoft Windows PDA phones.

Leigh and Paul will also hold a workshop, where they can go into the deep technical details on how to build your phones and your servers, and where people can try out our phones and secure PBX.</description>
    <persons>
     <person id="370">Paul Wouters</person>
     <person id="1294">Leigh Honeywell</person>
    </persons>
    <links>
     <link href="http://www.trolltech.com/products/qtopia/phone_edition/greenphone">The Green Phone</link>
     <link href="http://www.openswan.org/">Openswan IPsec</link>
     <link href="http://www.asterisk.org">The Asterisk PBX</link>
    </links>
   </event>
   <event id="1735">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>faster_pwning_assured</tag>
    <title>Faster PwninG Assured</title>
    <subtitle>Hardware Hacks and Cracks with FPGAs</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk will go in depth into methods for breaking crypto faster using FPGAs.</abstract>
    <description>FPGA's are chips that have millions of gates that can be programmed and connected arbitrarily to perform any sort of task. Their inherent structure provides a perfect environment for running a variety of crypto algorithms and do so at speeds much faster than a conventional PC. A hand full of new FPGA crypto projects will be presented and will demonstrate how many algorithms can be broken much faster than people really think, and in most cases extremely inexpensively.

Breaking WPA-PSK is possible with coWPAtty, but trying to do so onsite can be time consuming and boring. All that waiting around for things to be computed each and every time we want to check for dumb and default passwords. Well, we're impatient and like to know the password NOW! Josh Wright has recently added support for precomputed tables to coWPAtty -- but how do you create a good set of tables and not have it take 70 billion years? David Hulton has implemented the time consuming PBKDF2 step of WPA-PSK on FPGA hardware and optimized it to run at blazing speeds specifically for cracking WPA-PSK and generating tables with coWPAtty.

What about those lusers that still use WEP? Have you only collected a few hundred interesting packets and don't want to wait till the universe implodes to crack your neighbors key? Johnycsh and David Hulton have come up with a method to offload cracking keyspaces to an FPGA and increasing the speed considerably.

Lanman hashes have been broken for a long time and everyone knows it's faster to do a rainbowtable lookup than go through the whole keyspace. On many PC's it takes years to go through the entire typeable range, but on a small cluster of FPGAs, you can brute force that range faster than doing a rainbowtable lookup. The code for this will be briefly presented and Chipper v2.0 will be released with many new features.

David Hulton will also discuss some of the aspects of algorithms that make them suitable for acceleration on FPGAs and the reasons why they run faster in hardware and touch on some future projects such as optimizations for attacking RSA and other difficult crypto algorithms.</description>
    <persons>
     <person id="1165">David Hulton</person>
    </persons>
    <links>
     <link href="http://www.openciphers.org">OpenCiphers FPGA Crypto Research Project</link>
     <link href="http://www.picocomputing.com">Pico Computing - Manufacturer of tiny FPGA products</link>
    </links>
   </event>
  </room>
  <room name="Saal 3">
   <event id="1738">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>mmorpgs</tag>
    <title>MMORPGs</title>
    <subtitle>The state and future of the World of Warcraft</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk will focus on World of Warcraft, the most popular MMORPG. There will be a brief overview of the game, guilds and guild management, tools and social issues. Other technologies and the possible future of MMORPGs and their impact will be discussed.</abstract>
    <description>Video, images and examples will be used to describe why World of Warcraft is so compelling.

First hand experience and comparisons with experiences and theory from other types of organizations will be used to describe the dynamics of a guild and what we can learn from guild and guild management. Socialization, ranks, personality types, rewards, rules, governance, promotion, recruiting, evolution and out-of-game activities will be discussed among other attributes.

The current technology, supporting technology and possible future technologies will be explored to try to map the future of MMORPGs.</description>
    <persons>
     <person id="187">Joi Ito</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1604">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>tracking_von_personen_in_videoszenen</tag>
    <title>Tracking von Personen in Videoszenen</title>
    <subtitle>Wie trackt man automatisch sich bewegende Objekte?</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Mittels der Computer-Vision-Library OpenCV wird gezeigt, welche Bildverarbeitungsschritte notwendig sind, um bewegte Objekte in Videoszenen zu erkennen und nachzuverfolgen.</abstract>
    <description>Die Anzahl von Videokameras in der &#214;ffentlichkeit nimmt rapide zu. Die dadurch entstandenen Mengen an Video-Material m&#252;ssen nat&#252;rlich ausgewertet werden.
Eine grundlegende Vorverarbeitung ist es, den (interessanten) Vordergrund vom (uninteressanten) Hintergrund zu trennen. Dabei z&#228;hlen Personen zum Vordergrund, der nun weiter analysiert werden kann. Ziel ist das Tracking der einzelnen Personen und die Extrahierung ihrer Position in der Szene. Anhand dieser Trajektorien k&#246;nnen die Bewegungspfade der Personen ausgewertet werden.

Anhand der Computer-Vision-Bibliothek OpenCV soll an einem Beispiel gezeigt werden, wie einfach es ist, Personen automatisiert in Videoszenen zu erkennen und ihre Bewegungen nachzuverfolgen. Ein simpler Algorithmus schafft bereits erstaunliche Resultate. Allerdings wird auch schnell klar, wo die Schwachstellen liegen. Inwieweit lassen sich diese ausnutzen?</description>
    <persons>
     <person id="1176">pille</person>
    </persons>
    <links>
     <link href="http://www.intel.com/technology/computing/opencv/index.htm">OpenCV (Intel)</link>
     <link href="http://de.wikipedia.org/wiki/Bildverarbeitung">Bildverarbeitung (Wikipedia)</link>
     <link href="http://www.chrisoakley.com/the_catalogue.html">The Catalogue (Kurzfilm von Chris Oakley, Gro&#223;britannien, 2004)</link>
     <link href="http://struction.de/projects/23C3/tracking">Folien &amp; Listings</link>
    </links>
   </event>
   <event id="1446">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>secure_network_server_programming_on_unix</tag>
    <title>Secure Network Server Programming on Unix</title>
    <subtitle>Techniques and best practices to securely code your network server</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk describes a software system to securely execute predefined commands over an untrusted network, analyzes the potential attack vectors against this system and defines countermeasures to make it impossible for an attacker to use these attack vectors.</abstract>
    <description>This talk describes a software system to securely execute predefined commands over an untrusted network, using an authentication method and a measure of transport layer security. This software system - called "trapdoor2" - is used as an example to describe a number of ''state of the art'' programming techniques as countermeasures against potential attacks. Techniques that will be described and shown in detail in the presentation will be privilege separation, strict enforcement of the ''principle of least privileges'', preventing attacks against the used SSL/TLS implementation and defeating Denial of Service attacks by employing a simple yet efficient connection limiting algorithm.</description>
    <persons>
     <person id="359">Andreas Krennmair</person>
    </persons>
    <links>
     <link href="http://oss.linbit.com/trapdoor2/">trapdoor2</link>
     <link href="http://bereshit.synflood.at/svn/trapdoor2/trunk/">trapdoor2 SVN repository</link>
    </links>
   </event>
   <event id="1500">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>hackerspaces</tag>
    <title>Hackerspaces</title>
    <subtitle>How we built ours - How you can build yours</subtitle>
    <track>Community</track>
    <type>Podium</type>
    <language>englisch</language>
    <abstract>Hackerspaces are community-run places where you can meet, work on projects, organize events and workshops, or just generally hang out with other hackers. More and more of those open spaces are being created all the time. Some of them are more than a decade old already, some just started out recently, and yet others might become a reality soon.</abstract>
    <description>Building and running a Hacker Lab is a tough thing. This is a talk about problems encountered, and lessons learnt.
In this talk you'll see pictures and hear stories from Hacklabs around the world. Some of them old, some of them new, some big, some small, some squatted, and some of them even government funded, and what problems they've encountered, and how they've dealt with them. These stories are meant to inspire, and convey the mindset and organizational structure some of those hackerspaces have learned, to build and foster their community.</description>
    <persons>
     <person id="1061">bruder</person>
     <person id="1073">t</person>
     <person id="13">Jens Ohlig</person>
     <person id="541">Paul B&#246;hm</person>
    </persons>
    <links>
     <link href="http://metalab.at/">metalab</link>
    </links>
   </event>
   <event id="1629">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>body_hacking</tag>
    <title>Body hacking</title>
    <subtitle>Functional body modification</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>What happens when we leave behind cosmetics and start to modify our bodies and minds to enhance who we are and what we can do? In this talk, journalist Quinn Norton explores how technology and flesh are coming together.</abstract>
    <description>She'll explain what's possible and what people are doing, inside the established medical system and in the growing grey and black markets of body hacking. She'll touch on her own experiences and talk about what's coming next- and the ethical questions we will soon face as people choose to become something post human.

In September of 2005 journalist Quinn Norton began to explore the world of functional body modification with an implanted rare earth magnet that gave her a sense for Electro-Magnetic fields- until it began to go wrong. Since then she's research the edges of what's currently possible and what's likely to become possible in the near term. Technology that was the traditional purview of the medical establishment is migrating into the hands of body hackers, and the medical establishment itself is finding ways to enhance humans, not just cure disease, and faces a new dilemma about whether and who should be enhanced. All of these advancements come with health dangers and unanticipated possibilities, as well as an ethical debate about what it means to be human. This talk will touch on the latest medical advances in neurological understanding and interface as well as physical enhancements in sports and prosthetics. But more time will be given to how the body hackers and renegades of the world are likely to go forward with or without societal permission. Quinn will touch on sensory extension, home surgery, medical tourism, nervous system interfaces, and controlling parts of our bodies and minds once thought to be nature's fate for us. 

How society is likely to react to enhancement technologies or enhanced humans? Early adopters face dangers including pain, disfigurement, and death- how will that shape progress? Technology and flesh are going to come together, but will they come together in you? Bring your own stories of modification, and you own ideas about what constitutes post human- and whether that's a good or bad thing.</description>
    <persons>
     <person id="1188">Quinn Norton</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1740">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>in_the_absence_of_trust</tag>
    <title>In the Absence of Trust</title>
    <subtitle></subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>In 1996, The Surveillance Camera Players started manifesting their
opposition to the culture of surveillance by performing silent, specially
adapted plays directly in front of CCTV cameras. 10 years after, their
work is more relevant than ever. This talk will take you through artists'
strategies to raise the debate on privacy, the society of the spectacle,
the aftermath of September 11th, face recognition software, panopticism,
electronic tagging, etc.</abstract>
    <description></description>
    <persons>
     <person id="622">R&#233;gine D&#233;batty</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1512">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>homegrown_interactive_tables</tag>
    <title>Homegrown Interactive Tables</title>
    <subtitle>Any Technology Sufficiently Advanced is Indistinguishable from Magic</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Technology to build low-cost touch-sensitive tables with high precision is publicly available since the beginning of 2006. The talk will give a practical introduction on building hard- and software of these tables using FTIR sensing pioneered by Jeff Han (see links), based on our experiences in making a table at the c-base.</abstract>
    <description></description>
    <persons>
     <person id="1210">Andre Helwig</person>
     <person id="1326">Christian Bennat</person>
     <person id="1325">Andreas Dietrich</person>
     <person id="108">Ulrich von Zadow</person>
     <person id="1209">Mirco Fichtner</person>
    </persons>
    <links>
     <link href="http://mrl.nyu.edu/~jhan/ftirtouch/index.html">Jeff Hans interactive tables</link>
    </links>
   </event>
   <event id="1651">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>ueberwachen_und_strafen_in_entenhausen</tag>
    <title>&#220;berwachen und Strafen in Entenhausen</title>
    <subtitle></subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Mit Michel Foucault in Entenhausen: Der Vortrag wird einen Blick auf die &#220;berwachungsmethoden und die Strafpraxis in der Gumpenmetropole werfen.</abstract>
    <description>In Entenhausen bevorzugt man die klassischen Methoden der &#220;berwachung wie Beobachten und Belauschen; &#220;berwachung von &#246;ffentlichen Pl&#228;tzen vermittels Kameras ist nicht das Mittel der Wahl, was daran liegen k&#246;nnte, da&#223; die Entenhausener Stra&#223;en nur sp&#228;rlich von Stra&#223;enlaternen beleuchtet sind. Bei der Sanktionierung von Straftaten setzt man ebenfalls auf die bew&#228;hrten Methoden: Sch&#228;ndliche K&#246;rper- und Leibstrafen werden pr&#228;feriert. So zum Beispiel das Einh&#252;llen in G&#246;tterspeise oder das Verhauen von ungehorsamen Kindern mit Ruten. Als origin&#228;r Entenhausener Erfindung sind die Schnellstrafen zu nennen. Eines jedenfalls ist klar: W&#228;re Michel Foucault Donaldist gewesen, dann h&#228;tte er in seinem Buch &#8222;&#220;berwachen und Strafen&#8220; vermutlich nicht geschrieben, da&#223; zu Beginn des 19. Jahrhunderts das &#8222;... gro&#223;e Schauspiel der peinlichen Strafe zu Ende&#8220; geht.</description>
    <persons>
     <person id="17">Henriette Fiebig</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1678">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>kritik_an_den_illuminaten</tag>
    <title>Kritik an den Illuminaten zwischen 1787 und 2006</title>
    <subtitle>Der Stand der Auseinandersetzung zwischen Discordiern und Illuminaten</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Bereits 1787 formulierte der Theologe Benedikt Stattler in seiner Schrift "Das Geheimni&#223; der Bosheit des Stifters des Illuminatismus in Baiern zur Warnung der Unvorsichtigen hell aufgedeckt von einem seiner alten Kenner und Freunde" Kritik an dem von Adam Weishaupt gegr&#252;ndeten Illuminatenorden. Der CCC hat sich in vielen Aspekten in seiner Eigenschaft als discordische Vereinigung ebenfalls in kritischer Art und Weise mit Pl&#228;nen und Aktionen der Illuminaten im Sinne der "New World Order" und Aktionen wie der "Total Information Awareness" auseinandergesetzt.</abstract>
    <description>Sp&#228;testens seitdem Karl Koch mit dem Pseudonym "Hagbard Celine" eine nicht nur lustige Assoziation gew&#228;hlt hat, ist die u. a. von Robert Anton Wilson in "Illuminatus" zur Erleuchtung des Bewusstseins skizzierte Auseinandersetzung zwischen Illuminaten und Discordiern auch mit der Hackerszene verbunden. In Anlehnung an "Illuminatus" und die von R. A. Wilson eingef&#252;hrten Begriffe zur Komplexit&#228;tsreduktion hat u. a. die Nutzung von Fnords in der Kryptodiskussion der sp&#228;ten 90er Jahre eine wichtige Rolle auch in der Arbyte des CCC gespielt.

Mit dem 11.09.2001 hat nun nicht nur die Diskussion um verborgene M&#228;chte und ihren Einfluss eine neue Dimension gewonnen, auch ein Vielzahl von Sachzusammenhangstheorien zwischen Vorg&#228;ngen, Personengruppen und Auseinandersetzungen, die man partiell schon als Komponenten eines nicht-erkl&#228;rten Dritten Weltkrieges zuordnet, entwickelten sich. Der Einfluss des Discordianismus ist hier auch in empfindlicher Art und Weise zur&#252;ckgedr&#228;ngt worden.

Angesichts des 23. Chaos Communication Congress m&#246;chte ich hier den Stand der Debatte zwischen Discordiern und Illuminaten beleuchten. In dieser Abendveranstaltung m&#246;chte ich die Auseinandersetzung zwischen Ordnungs- und Chaoskr&#228;ften sowohl in einem historischen &#220;berblick beleuchten, als auch die Frage nach den Handlungsoptionen stellen, die sich der discordischen Bewegung erschlie&#223;en.</description>
    <persons>
     <person id="45">Andy M&#252;ller-Maguhn</person>
    </persons>
    <links>
     <link href="http://www.2hap.org/Geheime-Gesellschaften/Illuminaten/Illuminaten_texte/BibliographieIlluminatenorden.html">Bibliographie zum Illuminatenorden</link>
     <link href="http://www.2hap.org/Geheime-Gesellschaften/Illuminaten/Illuminaten_texte/wilhelmsbad.htm">Der Wilhelmsbader Freimaurerkonvent im Spiegel der Illuminaten</link>
     <link href="http://www.2hap.org/Geheime-Gesellschaften/Illuminaten/Illuminaten_texte/hoeheremysterien1.html">Adam Weishaupt: Gr&#246;ssere Mysterien / Erste Klasse</link>
     <link href="http://www.2hap.org/Geheime-Gesellschaften/Illuminaten/Illuminaten_texte/hoeheremysterien2.html">Adam Weishaupt: H&#246;here Mysterien / 2te Klasse</link>
     <link href="http://www.db-thueringen.de/servlets/DerivateServlet/Derivate-3064">Der Beitrag Johann Adam Weishaupts zur P&#228;dagogik des Illuminatismus</link>
     <link href="http://berlin.ccc.de/~andy/CCC/GeheimnissderBosheit.pdf">Das Geheimniss der Bosheit des Stifters des Illuminatismus..</link>
    </links>
   </event>
  </room>
  <room name="Saal 4">
   <event id="1420">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>strong_random_number_generator</tag>
    <title>Analysis of a strong Random Number Generator</title>
    <subtitle>by anatomizing Linux' CPRNG</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This paper (and slides) will descibe the inner workings of the the random number generator (/dev/{u}random) of Linux. Additionally some possible security flaws are shown (entropy overestimation, zero'izing the pool, etc.)</abstract>
    <description>Almost all cryptographic protocols depend on random (unpredictable)
values to create keys, cookies, tokens, initialisation vectors, and so
on. The Linux (as well as other Unix flavours) kernel provides a character
device as a source for randomness. This device represents the essential part
needed by various cryptographic protocol implementations for a secure operation
(conditional security), therefore it needs special attention from
security experts.

This paper will give an extract of results taken from analysing the input
sources used by Linux' PRNG implementation. The statistical entropy of each
source and of the whole pool is calculated to get a better picture of the
entropy quality during the boot--process and to spot entropy overestimation
by the kernel. Observation taken by process show a repeating behaviour for
different system startups. This can be used by an attacker to create
profiles and to simulate a more complex system. Even observations of the
events generated by the block-device show timing patterns between
different boot--sequences. To dispel doubts of developers to add untrusted
sources, two kinds of untrusted sources, low-quality and malicious source, were
examined. It will be shown that low--quality sources are not able to reduce
the entropy in the pool that already exists but can lead to an overestimation.
A more dangerous situation exists with the presence of a malicious source
which is theoretically able to led the mixing algorithm produce a stream
of zeros.

The goal of this work is not to show a practical attack against the
random device but to provide more transparency and to ease further analysis.</description>
    <persons>
     <person id="1041">Thomas Biege</person>
    </persons>
    <links>
     <link href="http://www.suse.de/~thomas">http://www.suse.de/~thomas</link>
    </links>
   </event>
   <event id="1492">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>dying_giraffe_recordings</tag>
    <title>Dying Giraffe Recordings: A non-evil recordlabel</title>
    <subtitle>Using the power of creative commons to create an alternative system which is fair for musicians and their fans</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Todays music industry has created a system that is unfair for both the musicians and the music lover. Combined with an agressive prosecution of downloaders, this causes a very strong polarisation between the industry on one hand and music lovers on the other. Nobody wins. We at dying giraffe recordings are trying to break this impasse and create a system where musicans are rewarded for their work and talent, and where music lovers can enjoy music in a fair way. The key element in this is a breakaway from traditional copyright laws and the use of the creative commons license. This combined with new technologies in the field of internet, audio recording and compression gives us the potency to change te system. Thus building a fighting force of extraordinary magnitude we believe that we can beat the system.</abstract>
    <description>Todays music market is a sick place. Consider this:

Musicians often do not get paid for cd sales, only for tours and merchandise. They have to pay the labels for promotion and recording, and often go bankrupt in spite of selling millions. Their music is checked by software for their hitpotential, and if it's potential is limited, the will not be signed. Music that is produced, is compressed to death, so dynamics are effectively eliminated. Money that is earned by copy levy only goed to the big labels,  if at all.

Consumers are getting sued for using p2p, even when they do not own a computer, are dead, or both. IF they buy cd's, the cd's are subject to price fixing, making them ridiculously expensive. Those CD's are protected by DRM or copy protection which makes them unable to be played on a computer, a dvd player, car audio or an mp3 player. 

So why buy cd's at all? Now we have p2p, with which the music lover can download music for free, but illegally.
There are other legal download means, like itunesMS but they have DRM.

So what do we do now?

We started a label, dying giraffe recordings. Where we try to keep our overhad low, where we do the cherry picking, give tips for homerecording, use the creative commons license, and use pdocasts and streaming for promotion, and have connections to cd distribution companies and concert halls.

Of course we encounter a lot of problems, like limited recording facilities, getting money for airplay and form the ocpy levy, cd manufacturing, the traditional industry and organisation fighting us, shady distributors, psychotic musicians and promotion.

For some of these problems we do not have a solution yet, for some we do have some suggestions. We would like to invite other people to think with us, and to build with us a network of netlabels to beat the system.</description>
    <persons>
     <person id="1106">Christian Tan</person>
    </persons>
    <links>
     <link href="http://www.dyinggiraffe-recordings.com">Dying Giraffe Recordings</link>
     <link href="http://www.magnatune.com">Magnatunes, a big inspiration for DGR</link>
     <link href="http://archive.salon.com/tech/feature/2000/06/14/love/print.html">Courtney Love wrote a great article in Salon about this matter</link>
    </links>
   </event>
   <event id="1554">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>ethernet_mit_mikrocontrollern</tag>
    <title>Ethernet mit Mikrocontrollern</title>
    <subtitle>Wie funktioniert TCP mit 2kb RAM?</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Steuer- und Messaufgaben erledigt am besten ein Mikrocontroller.  Wenn zeitgem&#228;&#223; auf dieses Device zugegriffen werden soll, kommt man um Ethernet eigentlich nicht herum. Aber ist ein Mikrocontroller mit nur 2-4Kb RAM in der Lage, TCP/IP zu sprechen?</abstract>
    <description>Jeder Geek kommt irgendwann einmal in die Lage, Ger&#228;te zu steuern (Kaffeemaschine, Licht, &#8230;) oder Messdaten erfassen zu m&#252;ssen (Blumenwasserstand, Raumtemperatur, Fenster offen, &#8230;).  Pr&#228;destiniert dazu sind Mikrocontroller, aber sind diese auch mit sehr beschr&#228;nkten M&#246;glichkeiten (RAM) in der Lage, ein vollwertiges Netzwerkdevice zu implementieren?  Kann man einen Mikrocontroller dazu bringen, bei kritischer D&#252;rre im Blumentopf eine Mail zu schreiben?  Bleibt das ganze dann auch noch bezahlbar (teures Entwicklungsboard, teure Mikrocontroller, aufwendige Fertigung, &#8230;)?

Dieser Vortrag stellt Problematik, L&#246;sungen und Grenzen von TCP/IP auf Atmel Mikrocontrollern (Atmega32, Atmega644) vor und gibt einen Ausblick, was mit solchen Mikrocontrollern machbar ist.  Desweiteren wird eine Implementierung, das etherrape-Projekt, vorgestellt.</description>
    <persons>
     <person id="34">fd0</person>
    </persons>
    <links>
     <link href="http://www.lochraster.org/etherrape">Atmel Mikrocontroller mit Ethernet: "etherrape"</link>
    </links>
   </event>
   <event id="1667">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>jabber_showcase</tag>
    <title>Jabber-Showcase</title>
    <subtitle>XMPP ist viel mehr als nur Instant Messaging</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Jabber wird von vielen nur als "Open-Source"-ICQ-Ersatz wahrgenommen. Dabei kann Jabber bzw. XMPP noch deutlich mehr, es existieren weit &#252;ber 100 Protokollerweiterungen, und es werden t&#228;glich mehr.

Der Vortrag stellt einige interessante Protokoll-Teile sowie Implementationen vor.</abstract>
    <description>Ein Rundumblick durch die Welt der XMPP-Enhancement-Proposals (XEPs) und verschiedener Implementierungen. 

* Pubsub
* Atom/RSS over Pubsub
* Personal Eventing Protocol ("Now playing", User mood, ..)
* Common Altering Protocol - Koordinierungsl&#246;sung f&#252;r Feuerwehr, Polizei und Co.
* HTTP-Polling/HTTP-Binding - Jabber direkt via HTTP sprechen (Ajax,..)
* Virtual Presence (Avatare auf Websiten, siehe z. B. lluna)
* Verschiedene Ans&#228;tze f&#252;r VoIP &#252;ber Jabberinfrastruktur
* Onlinespiele &#252;ber Jabber
* Whiteboard
* Audio/Videochat mit Jingle
* US Army Future Combat System</description>
    <persons>
     <person id="491">fh</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1670">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>barrierefreies_web</tag>
    <title>Barrierefreies Web</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>In diesem Vortrag geht es um die Problematik des barrierefreien Webs. Der Vortragende ist selber blind und hat somit die notwendige Praxiserfahrung. Es wird nicht auf festgeschriebene Normen und Gesetze eingegangen, vielmehr werden Tips aus der Praxis gegeben und anhand von verschiedenen Internetseiten verdeutlicht. Es wird auf bekannte Internet-Angebote wie Bankingportale usw. zur&#252;ckgegriffen.</abstract>
    <description>Das "Behindertengleichstellungsgesetz" fordert
(im Paragraph 11 zu "Barrierefreie Informationstechnik"), dass
"behinderte Menschen die Informationen auf allen Web-Seiten
des &#246;ffentlichen Sektors der Mitgliedstaaten und der
europ&#228;ischen Institutionen erreichen und voll von den
M&#246;glichkeiten der 'Regierung am Netz' profitieren k&#246;nnen."

Das garantiert aber weder Standards noch deren Umsetzung -
weder bei Webseiten, Programmen, noch bei Betriebssystemen.

Ausserdem gibt es einige mobile Ger&#228;te (Handy, Organizer),
die zwar Webseiten darstellen k&#246;nnen, aber nicht
&#252;ber zus&#228;tzliche features wie Javascript verf&#252;gen.

Die Zug&#228;nglichkeit zu Daten ist daher nicht nur f&#252;r
Behinderte ein Problem, sondern f&#252;r *alle* Menschen.

Diese Entwicklungen werfen die Frage auf, wie sinnvoll
&#252;berhaupt die Vorgaben der Barrierefreiheit sind.

In diesem Vortrag geht es um die Praxiserfahrungen eines blinden Nutzers.
Sebastian Andres wirft einen Blick auf verschiedene Webportale und
gibt Beispiele zu sinnvollen und weniger sinnvollen Regelungen.

Dazu geh&#246;ren Gestaltungshinweise wie z.B.
Navigationsleisten, Links, Tabellen und Formulare.
aber auch Alternativen wie z.B. Wap-Portale.</description>
    <persons>
     <person id="854">Sebastian Andres</person>
    </persons>
    <links>
     <link href="http://de.wikipedia.org/wiki/Barrierefreies_Internet">Wikipeadia: Barrierefreies Internet</link>
     <link href="http://www.linaccess.org/">Linux Accessibility (aka LinAccess)</link>
     <link href="http://www.barrierefreiesinternet.de/">http://www.barrierefreiesinternet.de/</link>
    </links>
   </event>
   <event id="1714">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>warum_wir_uns_so_gerne_ueberwachen_lassen</tag>
    <title>Warum wir uns so gerne &#252;berwachen lassen&#8230;</title>
    <subtitle>Erhellendes aus Philosophie und Soziologie zur Kl&#228;rung des Ph&#228;nomens steigender Kontrolle und &#220;berwachung</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Das Ph&#228;nomen steigender &#220;berwachung und Kontrolle ist vielfach beschrieben und diskutiert wurden. Klagen werden allerorts laut und verklingen meist genauso schnell wieder. Innerhalb des Vortrags soll das Ph&#228;nomen - jenseits einer blo&#223;en Zustandsbeschreibung - soziologisch-philosophisch betrachtet und auf aktuelle internationale Forschungsergebnisse eingegangen werden.</abstract>
    <description>Das Ph&#228;nomen steigender &#220;berwachung und Kontrolle ist vielfach beschrieben und diskutiert wurden. Klagen werden allerorts laut und verklingen meist genauso schnell wieder. Innerhalb des Vortrags soll das Ph&#228;nomen - jenseits einer blo&#223;en Zustandsbeschreibung - soziologisch-philosophisch betrachtet und auf aktuelle internationale Forschungsergebnisse eingegangen werden. Bereits Ende der 70er / Anfang der 80er Jahre wurden Theorien entwickelt, die in aktuellen Betrachtungen des Themas Kontrolle und &#220;berwachung immer wieder aufgegriffen werden. Es handelt sich hierbei z.B. um Michel Foucaults Auseinandersetzung mit Macht und dabei insbesondere um das Konzept der Gouvernementalit&#228;t, einem Neologismus Foucaults. Auf soziologischer Seite l&#228;sst sich Ulrich Becks Risikogesellschaft und dessen Folgetheorien als Basis aktueller wissenschaftlicher Auseinandersetzung mit dem Thema lokalisieren. Ziel des Vortrages ist es, theoretische &#8211; aber keinesfalls langweilige &#8211; Einblicke in die  wissenschaftliche Diskussion zu Kontrolle und &#220;berwachung zu geben und dabei auch auf aktuelle politische Entwicklungen einzugehen.</description>
    <persons>
     <person id="899">Christine Ketzer</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1608">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>vehicular_communication_and_vanets</tag>
    <title>Vehicular Communication and VANETs</title>
    <subtitle>The future and security of communicating vehicles</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Vehicle communication is a major research topic, covered by many national and international research projects. Applications promise to make our driving safer, more efficient, and more fun. The talk presents applications, technology, and also addresses security and privacy issues.</abstract>
    <description>The talk will first introduce the concept of vehicle communication. Vehicles can communicate with each other to form so called Vehicular Ad-hoc Networks (VANETs) or with road-side units that allow access to backend systems that provide warnings, traffic information, etc.

Next, there will be a presentation of potential applications to motivate the need for such communication. This includes warning applications, e.g. cars can send warning messages to other cars including their exact position warning them of the danger ahead. As cars receiving such messages will forward them also to other cars, they form a multi-hop ad-hoc network. Other applications can warn cars about dangerous road conditions, increase traffic efficiency at intersections or on highways or may simply be used to send e.g. text messages between cars (did you ever wanted to tell the driver in front of you your oppinion regarding his driving style?;-)

The talk will also cover technical details like position-based routing used in such networks or message dissemination protocols.

It is evident that such systems will also introduce new dangers to security and privacy. Sending e.g. faked warning messages may affect traffic and recording the position information of cars severly affects the privacy of drivers. The speaker is member of the pan-european research project SEVECOM that especially addresses the security and privacy needs in car communication. He will present some results from the that project, describing security requirements, potential attackes, and first ideas for security and privacy mechanisms.</description>
    <persons>
     <person id="1077">Frank Kargl</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1710">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>tap_the_eff</tag>
    <title>Tap the Electronic Frontier Foundation</title>
    <subtitle>EFF staffers answer your questions!</subtitle>
    <track>Society</track>
    <type>Sonstiges</type>
    <language>englisch</language>
    <abstract>EFF staffers answer your questions about American wiretapping, the
latest moves of the *AA, the spread of the DMCA through free trade
agreements, what's up at WIPO, and other dispatches from the US and
elsewhere.</abstract>
    <description>This panel will take a loose question and answer format after a brief
(and entertaining) summary of EFF's work and investigations this year.
They will be representatives of all three aspects of the non-profits
work: activism, technological research and US legal actions. The
emphasis will be on the international aspects of the EFF's work
(including their representation at WIPO, and work on various free trade
agreements and European standards bodies), but we can also go into some
detail on many of the domestic US work, as well as the ramifications of
the recent US elections, and prospects and threats to digital freedom in
the future.</description>
    <persons>
     <person id="1275">Peter Eckersley</person>
     <person id="1256">Seth Schoen</person>
     <person id="1270">Danny O'Brien</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Workshop Area">
   <event id="1744">
    <start>10:00</start>
    <duration>01:30</duration>
    <room>Workshop Area</room>
    <tag>haecksen_plenums_fruehstueck</tag>
    <title>(WOMEN ONLY) Haecksen-Plenums-Fr&#252;hst&#252;ck</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Workshop</type>
    <language></language>
    <abstract>netzwerkeln, projekte planen - WOMAN ONLY ALLE SICH WEIBLICH F&#220;HLENDEN MENSCHEN SIND HERZLICH EINGELADEN</abstract>
    <description></description>
    <persons>
     <person id="1224">Cyworg</person>
    </persons>
    <links>
     <link href="http://www.haecksen.org/">Haecksen</link>
    </links>
   </event>
   <event id="1745">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>web_application_security</tag>
    <title>Web Application Security</title>
    <subtitle>Find the Flaw, or Someone Else Will</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Extensive information on web application security mistakes (and how to avoid them) has been available for quite a while. Yet many web applications still come with flaws that are often easy to find and exploit. The currently hyped AJAX will probably increase the number of buggy applications, since it invites programmers to entrust critical tasks like input validation and access control to the browser - thereby making it easy for malicious users to bypass these checks.</abstract>
    <description>This talk will provide a short overview of how web applications work and then discuss the most common security flaws and attacks (e.g. SQL Injection and Cross Site Scripting). It also presents methods and tools that can be used to test for these issues.</description>
    <persons>
     <person id="1300">Viktoria Polzer</person>
    </persons>
    <links>
     <link href="http://www.haecksen.org/">Haecksen</link>
    </links>
   </event>
   <event id="1746">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>acts_as_cool_ruby_on_rails</tag>
    <title>acts_as_cool</title>
    <subtitle>Ruby on Rails</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>Das Webframework Ruby on Rails steckt - vom Alter und Bekanntheitsgrad her gesehen - noch etwas in den Kinderschuhen. Trotzdem werden bereits jetzt umfangreiche Webprojekte damit realisiert; www.qype.com ist sicher ein gutes Beispiel. Der Vortrag soll potentiellen Umsteigern von PHP oder Java zeigen, wie man mit wenig(er) Code und Zeit wartbare Webanwendungen erstellt - auch ohne bisherige Ruby-Kenntnisse.</abstract>
    <description></description>
    <persons>
     <person id="1301">Beate Paland</person>
    </persons>
    <links>
     <link href="http://www.haecksen.org/">Haecksen</link>
    </links>
   </event>
   <event id="1747">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>why_opensource_needs_professional_marketing</tag>
    <title>Why OpenSource Needs Professional Marketing</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Where is OpenSource-Software today, and where do we want to see it by the end of this decade? Most of us would probably like to see it in the big headlines, see it being used by big companies, by big cities' administrations and by country governments. We would it to be recognized by everyone and make sure that those who are concerned - computer users of this world - at least have an idea, what FOSS is, what free operating systems and free desktops are, and what advantages that kind of software can give them. We want everybody to see what good FOSS can do for them.</abstract>
    <description>So far, not very many "normal" people know what we are dealing with. In their minds, FOSS is something used mostly by computer experts - by people who know what they are doing. Those experts scatter their knowledge, but usually, they reach only a small audience. And, very often, for them, it is hard to communicate their enthusiasm in a way that non-tech people understand what they are talking about. This leads to people shying away from this - in their opinion - geek topic "FOSS".

And this is where marketing comes in. Marketing needs to set a basis for tech people to communicate with non-tech people. It collects information, packages it in a way that makes it understandable for everyday users. It has an eye on the market - on those people who may be interested to use FOSS professionally - and makes sure that the right information in the right phrasing reaches the right audience at the right time. It sets a platform where those involved in the projects can communicate with those interested in their work. With the users and those who make the decisions to use FOSS for the "big business" being convinced by its qualities, it will thrive and prosper and get the recognition we all want it to have.</description>
    <persons>
     <person id="1302">Valerie Hoh</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1748">
    <start>16:00</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>qualitaet_heisst_selber_machen</tag>
    <title>(WOMAN ONLY) Qualit&#228;t hei&#223;t selber machen</title>
    <subtitle>Was kann Medienaktivismus im Netz?</subtitle>
    <track>Community</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>Die eigene Sicht der Dinge - oder konkreter Ereignisse - an ein Massenpublikum bringen: Dieses Ansinnen wird durch die Entwicklung von Blogosph&#228;re und &#8222;citizen journalism&#8220; pl&#246;tzlich f&#252;r viel mehr Menschen m&#246;glich.</abstract>
    <description>Was jedoch nutzt die publizierte Information? Was bedeutet Qualit&#228;t im selbstgemachten Web, welche der aus dem professionellen Journalismus kommenden Kriterien k&#246;nnen angewendet werden und wo werden sie &#252;berfl&#252;ssig und m&#252;ssen durch neue ersetzt werden?</description>
    <persons>
     <person id="1303">Ragni-Serina Zlotos</person>
    </persons>
    <links>
     <link href="http://www.haecksen.org/">Haecksen</link>
    </links>
   </event>
   <event id="1749">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>the_linguistic_fingerprint</tag>
    <title>The linguistic fingerprint</title>
    <subtitle>Silver bullet or mere myth?</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>In the wake of crime science shows like CSI and high profile criminal cases like the JonBenet Ramsey murder, the field of forensic linguistics has come to the attention of the general public. Today many laypersons know the term "linguistic fingerprint" and they have certain expectations about what it implies.

But these expectations are largely unfounded. ...</abstract>
    <description>The lack of real knowledge about this technique are largely due to its ill-chosen "nickname". The term "linguistic fingerprint" puts it into the neighborhood of the "actual", i.e. dactyloscopic fingerprint and the "genetic fingerprint". But this is misleading.
Both in fingerprinting and in DNA analysis there are procedures for collecting samples, for analysing them, for comparing them to samples taken from the suspect(s) and for interpreting the results. These procedures are known for their reliability today, but it took years of research to get to this point. Still, today we are at a point where a fingerprint left at a crime scene can safely be used to to confirm the guilt of a suspect.

The use of the fingerprint metaphor in the context of forensic linguistics and authorship attribution implies that research in this field has reached the same maturity. In reality, some promising results have been found, but so far the linguistic community was not able to prove that a certain set of markers can be reliably used to confirm a person's authorship of a text. Many questions are still left to be answered.
[bearbeiten]
Overview

In this talk I will give definitions of the relevant terms and concepts.

Then I will give an overview over the different fields of interest that are subsumed under "forensic linguistics". From these I chose authorship attribution as the target of a state-of-the-art report.

I will present several interesting approaches, demonstrate their application with the help of real life examples where possible, and discuss their merits and limitations. The main focus here will be

a) on written texts such as blog entries / comments and forum articles and

b) on the source code of software such as viruses

I will show that forensic linguistics procedures are far from having the same accuracy as fingerprinting procedures, but that - at best - they can be used to prove that the same person did or did not write a set of texts. And if that is not possible they can still be used to gather other, more general clues about the author, perhaps about his gender or his education.

For the time being this does not make the linguistic fingerprint the proverbial silver bullet, but rather it makes forensic linguistics one valuable tool in the criminological toolbox.</description>
    <persons>
     <person id="1304">Daniela Berger</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1750">
    <start>19:30</start>
    <duration>02:00</duration>
    <room>Workshop Area</room>
    <tag>bauen_einer_wlan_antenne</tag>
    <title>(WOMEN ONLY) Bauen einer WLAN-Antenne</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>Kleine Einf&#252;hrung in die HF Wellenausbreitung und Funktionsweise verschiedener Antennentypen, dannach Bau von &#8211; unterschiedlichen - Antennen f&#252;r 2.4GHz (z.B WLAN)</abstract>
    <description>Evtl. Netzwerkkarte mit Anschlu&#223;m&#246;glichkeit f&#252;r exteren Antennen mittbringen, gut um selbst nen Anschlu&#223; zu legen sind auch Netzwerkkarten mit ner angel&#246;teten Antenne (keine PCMCIA, da ist die Antenne meist aus der Platine ge&#228;tzt).</description>
    <persons>
     <person id="1305">Fredi</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1762">
    <start>21:45</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>how_to_extend_netword_night_vision</tag>
    <title>How to extend Network Night Vision with protocols</title>
    <subtitle>Discussing design of frame-parser</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>A general description of Network Night Vision (a network protocol analyzer and modifier) is given; afterwards the domain specific language used for describing protocols will be explained. Also, an example protocol will be implemented to get an idea how to design a protocol specification.</abstract>
    <description></description>
    <persons>
     <person id="106">Hannes Mehnert</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
 </day>
 <day date="2006-12-29" index="3">
  <room name="Saal 1">
   <event id="1642">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>unlocking_filevault</tag>
    <title>Unlocking FileVault</title>
    <subtitle>An analysis of Apple's encrypted disk storage system</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X.</abstract>
    <description>We present an analysis of Apple's proprietary disk encryption technology, FileVault. Besides the vendor's claim of 128-bit security
through the use of AES, not much was previously known about its inner workings. This talk will fill in the many missing details in the puzzle and analyse the design decisions.

Besides the cryptographic details, this talk will of show how the relevant parts of the DiskImages framework were reverse-engineered for this project.</description>
    <persons>
     <person id="1192">Ralf-Philipp Weinmann</person>
     <person id="165">Jacob Appelbaum</person>
    </persons>
    <links>
     <link href="http://www.apple.com/macosx/features/filevault/">Apple: MacOS X: FileVault</link>
    </links>
   </event>
   <event id="1721">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>software_protection_and_the_tpm</tag>
    <title>Software Protection and the TPM</title>
    <subtitle>The Mac OS X Story</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Ever since Apple announced the x86 version of Mac OS X, people have been obsessed with running the operating system on non-Apple hardware. The media has given this topic more than its fair share of coverage, with nary a week going by without some discussion of the tussle between Apple and system attackers attempting to "crack" Mac OS X.</abstract>
    <description>Regardless of the periodic outcomes of such tussles (including the so-called hacker victories), widespread myths continue about what happens inside Mac OS X with respect to such protection. Moreover, the presence of trusted platform modules (TPMs) in newer Apple computer models only makes the situation more interesting--trusted hardware is perhaps one of the most untrusted (and misunderstood) entities on earth. In this talk, we will unravel some TPM mysteries and look at the architecture of Mac OS X relevant to software protection.</description>
    <persons>
     <person id="1281">Amit Singh</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1733">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>bluetooth_hacking_revisited</tag>
    <title>Bluetooth Hacking Revisited</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Hacking Bluetooth revisited - This talks goes into the depth of Bluetooth security, we'll show attacks on every possible bluetooth layer including Application Layer, lower layers. We'll break the drivers, the implementation, the applications and the _protocol itself_. At the end of this talk we hope we have achieved a Prardigm shift with regards on how you perceive Bluetooth Security in General. It's not only for toys.

On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough.</abstract>
    <description>Hacking Bluetooth revisited - Kevin Finistere &amp; Thierry Zoller

This talk aims at producing a complete paradigm shift on how you perceive Bluetooth security. During the introduction we'll present what Bluetooth is, what has been left out all these years and how to protect yourself. Well digg into Bluetooth Security from Layer 1 up to Layer 7, from the Baseband up to the Application Level.

We'll show how to get a Remote Root shell over Bluetooth, during CCC 2006 we'll release BTCrack, Software to crack the Bluetooth Pin/Linkkeys with Man in the Middle attack. We'll show you how to steal link-keys, why the PIN is not that important at all, we'll go into detail how to bypass Bluetooth Security and what the future holds for Bluetooth Security.

On the Operational side, we'll go into what risks BT poses for your company, why your policies fail and why your current Security Layers aren't enough.

We'll digg into WHY we have arrived there and WHY nobody seemed to care over all these years.</description>
    <persons>
     <person id="1291">Kevin Finistere</person>
     <person id="1290">Thierry Zoller</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1552">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>nintendo_ds</tag>
    <title>Nintendo DS</title>
    <subtitle>Introduction and hacking</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The Nintendo DS is a mobile gaming console. It was first introduced in
2004. Our talk will give a short introduction of the hardware and
available games. The main focus however lies on homebrew software,
DSLinux, alternative firmware, copy protection, flash cards and online
gaming protocols.</abstract>
    <description>The Nintendo DS is often seen as a direct competitor to the Sony PSP,
but sells at a much lower price.
The DS consists of two ARM CPUs, two displays, one of them functions as
a touchscreen and a wifi interface. Due to its small amount of RAM, 4MB,
the DS provides a real challenge to developers.
We will explain different methods used to circumvent the copy protection
and replace the existing firmware. Afterwards we will introduce the most
common flash cartridges used to run homebrew software and pirated ROMs.
While talking about homebrew applications we will focus on wifi
applications, like scanners and development environments.
At last we will present an analysis of the online gaming protocols.</description>
    <persons>
     <person id="1147">Tobias Gruetzmacher</person>
     <person id="1049">Marcel Klein</person>
     <person id="468">Mario Manno</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1478">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>traffic_analysis</tag>
    <title>An Introduction to Traffic Analysis</title>
    <subtitle>Attacks, Defences and Public Policy Issues...</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk will present an overview of traffic analysis techniques, and
how they can be used to extract data from 'secure' systems. We will
consider both state of the art attacks in the academic literature,
but also practical attacks against fielded systems.</abstract>
    <description>A lot of traditional computer security has focused on protecting the
content of communications by insuring confidentiality, integrity or
availability. Yet the meta data associated with it - the sender, the
receiver, the time and length of messages - also contains important
information in itself. It can also be used to quickly select targets for
further surveillance, and extract information about communications
content. Such traffic analysis techniques have been used in the closed
military communities for a while but their systematic study is an
emerging field in the open security community.</description>
    <persons>
     <person id="133">George Danezis</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1457">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>credit_card_security</tag>
    <title>Security in the cardholder data processing?!</title>
    <subtitle>Experiences and lessons learned with the Payment Card Industry Data Security Standard</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>MasterCard and Visa have jointly released the PCI Data Security Standard which defines security requirements for the processing of card data in face-to-face and card-absent transactions. This presentation will deal with the most critical security gaps.</abstract>
    <description>SRC is an auditor approved by MasterCard and Visa to carry out PCI Security Scans and PCI Security Audits. Currently, SRC serves about 3000 merchants and 40 payment service providers around Germany, Austria, Switzerland, France, Russia, Slovakia and Israel.

The speaker will first briefly introduce the PCI security requirements. Then, he will disclose the company's experiences and lessons learned when conducting PCI Security Scans and PCI Security Audits.</description>
    <persons>
     <person id="374">Manuel Atug</person>
    </persons>
    <links>
     <link href="http://www.pcisecuritystandards.org">PCI Security Standards Council Website</link>
     <link href="http://www.visaeurope.com/aboutvisa/security/ais/main.jsp">Visa EU AIS Program Website</link>
     <link href="http://www.mastercard.com/us/sdp/">MasterCard SDP Program Website</link>
     <link href="http://www.visa.com/cisp">Visa USA CISP Webseite</link>
    </links>
   </event>
   <event id="1760">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>on_free</tag>
    <title>On Free, and the Differences between Culture and Code</title>
    <subtitle></subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract></abstract>
    <description></description>
    <persons>
     <person id="619">Lawrence Lessig</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1694">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>automated_exploit_detection_in_binaries</tag>
    <title>Automated Exploit Detection in Binaries</title>
    <subtitle>Finding exploitable vulnerabilities in binaries</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>In this talk, we will introduce the audience to the concepts
involved in static analysis, and different implementations of those concepts
with advantages and disadvantages of each. We will show how the open source
tool bugreport (http://bugreport.sf.net) implements these concepts and will
demonstrate the tool finding exploitable bugs in real-world binaries.</abstract>
    <description>See attached RT ticket #8514.</description>
    <persons>
     <person id="1255">Luis Miras</person>
    </persons>
    <links>
     <link href="http://bugreport.sf.net">bugreport project page</link>
     <link href="http://wiki.yak.net/712">Some background information on the talk</link>
    </links>
   </event>
   <event id="1567">
    <start>23:00</start>
    <duration>02:00</duration>
    <room>Saal 1</room>
    <tag>hacker_jeopardy</tag>
    <title>Hacker Jeopardy</title>
    <subtitle>The one and only hacker quizshow</subtitle>
    <track>Community</track>
    <type>Sonstiges</type>
    <language>englisch</language>
    <abstract>The well known quizshow format, but of course covering topics not usually seen on television</abstract>
    <description>Hacker Jeopardy is a quiz following the well known inverted answer-question scheme. It was once entitled as "number guessing for geeks", which is of course a very unfair abbreviation: it's also guessing of letters and special characters :) 

The quiz is played in three initial rounds with three candidates each, competing for their seat in the final round, in which last years winner joins in as a fourth candidate.</description>
    <persons>
     <person id="101">Stefan 'Sec' Zehl</person>
     <person id="933">Ray</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 2">
   <event id="1634">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>how_to_squeeze_more_performance_out_of_your_wifi</tag>
    <title>How to squeeze more performance out of your wifi</title>
    <subtitle>Cross-layer optimization strategies for long-range IEEE 802.11e based radio (mesh) networks</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Most of today's long-range wireless mesh or point-to-point links suffer from a high overhead during channel access, frequent link failtures and the lack of taking a real advantage of the mesh network structure. This leads to a really bad performance for TCP-like traffic compared to UDP traffic over this links. We want to present your two different ideas for optimizing throughput and delay without breaking any wifi-standard (or at least not too much ;).</abstract>
    <description>Most of today's wireless mesh networks can be characterised by the use of cheap half-duplex transmission technologies like IEEE 802.11. It suffers from a high overhead during channel access, frequent link failures and the lack of taking a real advantage of the mesh network structure. All
this may result in low throughput and high end-to-end delay. To improve both properties, one may use diversity achieved through multiple channels directional high gain antennas, polarization multiplex and frame aggregation techniques. Additionally -- in order to take an advantage of the mesh network structure -- it is possible to divide the up- and downstream of a wifi point-to-point link into two seperate links. This eliminates the concurrency between both directions. Results of calculations, simulations and measurements show an improved distribution of delay and a significant higher throughput especially for TCP-like applications. Both values can furthermore be improved by an optimization of the IEEE 802.11e quality-of-service parameters.</description>
    <persons>
     <person id="1151">Achim Friedland</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1473">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>large_scale_internet_content_filtering</tag>
    <title>The worst part of censorship is XXXXX</title>
    <subtitle>Investigating large-scale Internet content filtering</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk analyzes large-scale, countrywide Internet content filtering from a technical point of view and investigates the current situation in the People&#8217;s Republic of China. Additionally it discusses techniques to effectively defeat censorship and based on various tests conducted by the author, comments on their applicability in the Chinese part of the Internet.</abstract>
    <description>Nowadays the Internet has become an essential element of the world&#8217;s media landscape and our everyday lives. Thus for many people sending and receiving emails, chatting with friends, researching information or even purchasing goods online is almost as common as watching TV or listening to the radio. Interestingly without being further challenged it is generally taken for granted in the Western world that based on human rights, constitutions, legal systems and moral values, access to the Internet is provided freely, unlimited and most importantly unfiltered. But in reality the situation for millions of users world-wide is completely different: "Chat rooms monitored. Blogs deleted. Websites blocked. Search engines restricted. People imprisoned for simply posting and sharing information" [1]. In an attempt to create virtual frontiers in cyberspace countries such as China, Vietnam, Tunisia, Iran, Saudi Arabia and Syria [1] have installed a multiplicity of technical and non-technical controls to censor the Internet and prevent their citizens from accessing or publishing information the government regards as illegal. Therewith these countries are denying essential human rights to their citizens and specifically violate article 19 of the Universal Declaration of Human Rights which states that "everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers" [2]. In order to gain a further understanding of the functionality and the extent of such censorship, this talk investigates large-scale, countrywide Internet content filtering from a technical point of view. Therefore at first it discusses various means of filtering a government might enforce to perform censoring. Next it investigates the current situation of Internet filtering in the People's Republic of China and presents the implications for Chinese users by providing concrete examples. Finally this presentation particularly highlights techniques to circumvent Internet censorship focusing on practical and easy to use solutions that are applicable in China.

[1] Amnesty International. Irrepressible.info, an amnesty international campaign. Campaign published on website http://irrepressible.info, 2006.
[2] United Nations. Universal declaration of human rights. UN Resolution 217 A (III) of 10 December 1948, 1948.</description>
    <persons>
     <person id="140">Sebastian Wolfgarten</person>
    </persons>
    <links>
     <link href="http://www.devtarget.org">Devtarget.org, contains Sebastian's full master thesis</link>
    </links>
   </event>
   <event id="1418">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>trust_your_eyes</tag>
    <title>Trust Your Eyes</title>
    <subtitle>Grundlagen der Visualisierung und wie man mit Visualisierungen &#8222;faken&#8220; kann</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Vorgestellt werden theoretische Grundlagen der Visualisierung und der menschlichen Wahrnehmung sowie einige Visualisierungstechniken. Im Anschluss wird exemplarisch dargestellt, wie leicht man durch geschickt gew&#228;hlte Visualisierungen verf&#228;lschte Eindr&#252;cke suggerieren kann.</abstract>
    <description>Im Rahmen des Vortrages sollen die wichtigsten Grundlagen und Prinzipien der Visualisierung und der menschlichen Wahrnehmung, wie die Visualisierungspipeline, die Gestaltgesetze und Shneidermans Mantra Of Information Seeking, auszugsweise vorgestellt werden. Nachdem auch einige Visualisierungstechniken, wie Graphen, Treemaps, Cone Trees u. a., kurz aufgezeigt werden, soll im Anschluss anhand einiger Beispiele gezeigt werden, wie leicht es ist, durch die geschickte Wahl visueller Variablen oder Visualisierungstechniken falsche Aussagen auf korrekter Datenbasis zu suggerieren und wie oft im Alltag derartige &#8222;Kleinigkeiten&#8220; &#252;bersehen werden. Ziel ist es, einen kurzen Einblick in die Welt der Visualisierung zu liefern und die Sensibilit&#228;t im Umgang mit visuellen Informationen zu erh&#246;hen.</description>
    <persons>
     <person id="1035">Sonja</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1516">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>lightning_talks_day_3</tag>
    <title>Lightning Talks Day 3</title>
    <subtitle></subtitle>
    <track></track>
    <type>Lightning-Talk</type>
    <language></language>
    <abstract>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.</abstract>
    <description></description>
    <persons>
     <person id="136">b9punk</person>
     <person id="193">Sven Guckes</person>
    </persons>
    <links>
     <link href="http://events.ccc.de/congress/2006/Lightning_Talks">Wiki page</link>
    </links>
   </event>
   <event id="1622">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>void_the_warranty</tag>
    <title>Void the warranty!</title>
    <subtitle>How to start analyzing blackboxes</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>We're surrounded by blackboxes containing digital technology nowadays.
There are complex devices like cell phones as well as more simple ones that don't look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.</abstract>
    <description>The intention of this lecture is showing the listener that it's possible to analyse and mess around with a wide range of devices at home and how to do this.

Thus low-cost and homebrewn hardware tools are used as far as possible. Enabling the listener to design such hardware is also an ambition of this talk. The JTAG-Finder can be given as an example here.

The lecture will also point out some of the common problems during the research, and ideas on how to deal with them (e.g. acquiring data in realtime and getting it into a PC for the analysis). Various example projects of different complexities along with the procedure of analysis and modification will be explained throughout the lecture.

Recovering a lost PIN-number from a DECT-station or circumventing a printer's anti-refill technology are less complex examples while connecting a (non-DMA) PCMCIA (or CompactFlash) card to a common microcontroller is a more complex one.</description>
    <persons>
     <person id="1158">Hunz</person>
    </persons>
    <links>
     <link href="http://hunz.org/avrolus/">AVRolus</link>
     <link href="http://c3a.de/wiki/index.php/JTAG_Finder">the JTAG-Finder</link>
    </links>
   </event>
   <event id="1646">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>dvb_t</tag>
    <title>DVB-T - From Pixeldata to COFDM Transmission</title>
    <subtitle>How to build a complete FPGA-based DVB-T transmitter</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>As DVB-T is the key technology for terrestrial broadcasting for the next decades, this lecture tries to explain how it works: It covers the way of raw pixel data over MPEG2 video and audio encoding and via multiplexing of several streams and programs to the actual generation of the COFDM signal used for transmission. As the team has built a DVB-T transmitter, we will give a in-depth insight in how things are really done - including a demonstration of the transmitter.
-&gt; For that we plan to stream the content of the 23C3 lectures locally on Alexanderplatz using TV channel 22. Don't forget to bring your DVB-T stick. For more information look at &lt;a href="http://events.ccc.de/congress/2006/DVB-T"&gt;the DVB-T project description.&lt;/a&gt;</abstract>
    <description>Analog PAL based TV transmission is no more - DVB has taken over in Germany. This should be legitimate reason to take a really deep look into how the new technology works and what needs to be done to get your own transmission into the air. The base for our lecture is a standard FBAS signal coming from a video camera. From there we will go with it through all the necessary stages of encoding, framing, multiplexing and modulating.

First step is the A/D conversion of the picture and the sound. The resulting 240MBit/s stream is fed into the MPEG2 encoder where video and audio is encoded using the given parameters resulting in a bitstream of defined datarate. To achieve that, the video is divided into single blocks, movement relative to earlier and later frames is detected, and then the data is transferred into the frequency domain and then encoded. A relatively similar thing is done to audio: It is split into several frequency bands and for every band it is decided if the listener will hear this band or not using a psycho accoustical model. Then the remaining data is encoded into a bitstream as well.

After that a program clock reference is generated to enable the receiver to keep video and audio in sync while playing back the stream.

During the next stage, all video- and audio-streams are multiplexed into one big transport stream and several data tables are added. These tables define, which programs belong to this transport stream and assign video and audio streams to these programs. Electronic program guide and teletext are added and finally the COFDM modulator has the job to generate a base band signal for transmission.

Here data is scrambled and interleaved several times, two types of forward error correction are added and then the bits are distributed to the up to 8000 distinct carriers which compose the final signal.

As we have built a complete OFDM modulator we will then demonstrate how all these things work together and finally you will be able to watch our transmission using your own DVB-T stick.</description>
    <persons>
     <person id="711">Thomas Kleffel</person>
     <person id="713">Christian Daniel</person>
    </persons>
    <links>
     <link href="http://events.ccc.de/congress/2006/DVB-T">DVB-T im 23C3-Wiki</link>
    </links>
   </event>
   <event id="1679">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>ueberwachungsdruck</tag>
    <title>&#220;berwachungsdruck - einige Experimente</title>
    <subtitle>Wie wirkt &#220;berwachung?</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Wie wirkt &#220;berwachung? Was &#228;ndert es am Verhalten von Passanten? Wir haben Experimente im &#246;ffentlichen Raum durchgef&#252;hrt und pr&#228;sentieren die Ergebnisse.</abstract>
    <description>Wie wirkt &#220;berwachung auf normale Menschen - wir machten Experimente im &#246;ffentlichen Raum und beobachteten das Verhalten. Entstanden sind zum Teil skurile Bilder: z. B. bei ausgeh&#228;ngten Sonntagszeitungen: Alle Zeitungsst&#228;nder einer Wiener Kreuzung wurden mit Hinweisschildern ob einer Video&#252;berwachung zur Steigerung der "Sicherheit" ausgestattet. Ertappte B&#252;rger brachten Ihre Zeitungen zur&#252;ck, gingen mehrfach vorbei bis sie doch unauff&#228;llig eine Zeitung mitnahmen, usw. Gegen Abend war dies eine der wenigen Kreuzungen ohne "ausverkaufte" Zeitungen.
Den Effekten des &#220;berwachungsdrucks auf der Spur.</description>
    <persons>
     <person id="497">Adrian Dabrowski</person>
     <person id="715">Martin Slunsky</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1422">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>pornography_and_technology</tag>
    <title>Pornography and Technology</title>
    <subtitle>a love affair</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Pornography is an abstract phenomenon. It cannot exist without a medium to propagate it, and it has very little (if anything at all) to do with sex. The relationship between pornography, which is entirely fictional and sex, which is very real, very sweaty and mostly not a very aesthetic thing is something like the correlation of science-fiction literature and technological innovation: sometimes the ideas are bizarre, completely nuts and would never work without a Heisenberg Compensator - but sometimes some fragment lasts and is taken to the real world.</abstract>
    <description>The key to pornography is perception; perception is passive and naturally conceptional, since the eye and the brain have to translate the image (be it letters, a painting or a frame from a movie) into sexual stimulations and 'make something of it'. This is hard cognitive work that requires media competence and a high degree of ability to abstract. Contrary to the strong wish of authenticity and realism that prevails in most of the consumers, the techniques of sexual stimulation by pornography (and its side products like sex toys, for example) have become ever more fictional and not corporeal. We had to learn how to be sexually stimulated by something so far away from sex and all that precedes it that it seems almost impossible we managed it.  


The relationship between pornography and technology has always been a love story of sorts: new developments in technology were an inviting incentive for the emerging porno industry which in turn, as it became more powerful, was supposed to have had enough weight to influence specific technological innovations. In all this, idealism did not surface; the power of what worked and therefore paid and what did not was entirely in the hands of the (predominantly male) customers, who were assumed to be techno-savvy. The porno industry was very open-minded and experimental, and in the quest of the next hot thing that sells, interesting approaches were made. 

Typically, it's the porno industry that makes new developments interesting and available for the masses: one of the first fields of application of proprietary streaming solutions for example was the Cam Girls phenomenon: girls at home on their beds, who streamed their stamp-sized webcam pictures to dozens and hundreds of customers at the same time in real time. And just think of the remote-controlled dildo operated via online interface by a customer thousands of miles away at his computer. 

Although Pornography may not be the number one factor geeks think about when they dream up new products and new standards (they usually dream about porn seperately, if they are not Zwiebeltuete fetishists), it features largely in the consideration if something new is going to be hot or not.</description>
    <persons>
     <person id="1039">Tina Lorenz</person>
    </persons>
    <links>
     <link href="http://www.haecksen.org/~tina/blog">That ain't straw - blog on pornography</link>
    </links>
   </event>
   <event id="1683">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>powerpoint_karaoke</tag>
    <title>Powerpoint Karaoke</title>
    <subtitle></subtitle>
    <track>Culture</track>
    <type>Wettkampf</type>
    <language>deutsch</language>
    <abstract>Dieser Wettbewerb hat ein einfaches Prinzip: der Vortragende sieht die Folien seiner Pr&#228;sentation bei Beginn seines Vortrages zum ersten Mal.</abstract>
    <description>Whitfield Diffie entwickelte einst den Prototypen der Software, deren Siegeszug seit den 90er Jahren seinesgleichen sucht. Optisch nicht immer vollkommene Powerpoint-Pr&#228;sentationen mit oder ohne Nutzwert sind inzwischen zur allgegenw&#228;rtigen Gewohnheit geworden - kein Vortrag, der noch ohne die unvermeidlichen Folien ausk&#228;me. Von den vielen Milliarden Pr&#228;sentationen pro Jahr haben wir einige hundert ausgew&#228;hlt, denn die zuweilen kulturzersetzende Wirkung von Powerpoint kann auch ihre lustigen Seiten haben. Die Berieselung wird so zur Performance.</description>
    <persons>
     <person id="751">Verena Hafner</person>
     <person id="381">Constanze Kurz</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 3">
   <event id="1638">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>freie_software</tag>
    <title>Freie Software - Eine Chance f&#252;r Afrika?</title>
    <subtitle>Ein Erfahrungsbericht aus Malawi</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>In einem Dokumentationsbericht &#252;ber ein "Free Software Projekt" erz&#228;hlt Alex Antener von seinen Reisen nach Malawi in Zentralafrika und berichtet &#252;ber die Erfahrungen des kultur&#252;bergreifenden Engagements an der Universit&#228;t in Malawi. Der Erfahrungsbericht zeigt M&#246;glichkeiten, Einfl&#252;sse und m&#246;gliche Alternativl&#246;sungen zu den neoimperialistischen Machenschaften der Monopolisten in der dritten Welt.</abstract>
    <description>Die Zusammenstellung der Inhalte zu diesem Vortrag geschieht erst im Oktober 2006, w&#228;hrend des Aufenthaltes f&#252;r das besagte Projekt. Das Projektpaper wird auf der Webseite online gestellt.

Voraussichtliche Themenbereiche:
- Dokumentationen und Vortr&#228;ge an der Universit&#228;t von Malawi
- Technische Umsetzung der GNU/Linux L&#246;sung mit LTSP
- Strategien neo-imperialistischer NGO's und Monopolfirmen, Drittweltl&#228;nder in &#214;konomische Abh&#228;ngikeiten zu man&#246;vrieren
- Technische und soziale Engp&#228;sse
- Brain Drain &amp; Digital Divide</description>
    <persons>
     <person id="1170">Alex Antener</person>
    </persons>
    <links>
     <link href="http://lix.cc/malawi">Malawi Projekt</link>
     <link href="http://lix.cc/gallery/main.php?g2_itemId=3515">Malawi Bilder Gallerie</link>
    </links>
   </event>
   <event id="1563">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>funkerspuk</tag>
    <title>Funkerspuk</title>
    <subtitle>radio politics in the USA and Germany in the first half of the 20th century</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing?</abstract>
    <description>The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries:

The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.</description>
    <persons>
     <person id="664">Oona Leganovic</person>
    </persons>
    <links>
     <link href="http://playinprogress.net/text/2006/distributing-soundwaves-radio/">distributing soundwaves - radio</link>
    </links>
   </event>
   <event id="1640">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>10ge_monitoring_system</tag>
    <title>A 10GE monitoring system</title>
    <subtitle>Hacking a 10 Gigabit Intrusion detection and prevention system into a network troubleshooting tool.</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Capturing network packets is a valuable technique for troubleshooting network problems. Capturing at network speeds less, or up to one gigabit per second is feasible with a fast general purpose computer hardware. 

But that hardware is to slow for Ten gigabit per second ethernet (10GE). Hence, special hardware is required. 

This topic describes the modification of a commercially available 10GE  networks security system, into a network analyser.</abstract>
    <description>Who can you trust? - Nobody, when it come to trouble-shooting network issues at an internet exchange point. An Internet Exchange (IX) operates by definition in-between different network providers. These providers are often competitors, each with their cultural and technical differences.

Troubleshooting network issues at an IX involves at least three parties. Namely, the internet exchange operator and two or more ISPs. Each with its own systems, knowhow, procedures and culture. Such an environment is very different from networks were operators have control over the network components.

Therefore an internet exchange operator must be able to identify and isolate network problems, without relying too much on the other parties involved, while the exchange stays in full operation. For this, the technique of passive monitoring - watching the traffic as it passes by - has proven to be extremely valuable.

Passive monitoring for speeds less than 1 Gbps is possible with a fast general purpose computer and generic NICs. Numerous open source applications have been made for this. Ten gigabit per second ethernet (10GE) is another game. Special hardware is required to achieve that.

The Amsterdam Internet Exchange (AMS-IX) modified Force10's P10 system to monitor 10GE connections. This system was originally designed for security applications at 10GE wire speeds. But since it is build around programmable logic, it is possible to adapt it to a useful trouble-shooting tool. Such a tool has the following features:

* Ad-hoc filtering on the ethernet layer, IDS applies to the higher network layers.
	
* Programmable counters, it is not always needed to grep the frames. Counting events is often just as useful.

* Sampling, the possibility to randeomly grep frames for analysis. Useful when the exact nature of the issue is unknown.

* Triggering and filtering on checksums. IDS system only filters on patterns.

* Triggering and a history buffer, the possibility to capture frames transmitted before and after a certain condition was met.

Not all features have been realized at this moment. But there is enough to compile an interesting presentation on what has been achieved. How that is done and the design for the missing features.

Lecture and paper consists of three parts, namely:

1. Introduction to the role of an internet exchange (IX). This will not be marketing for AMS-IX. It is needed to place things into context.

2. The problem to be solved. This can be clarified with some real life examples in the lecture.

3. The chosen solution for that problem. Consisting of the Force10's P10 IDS/IPS card with modified firmware in combination with photonic cross connects (all optical switches). This will be the main part of both lecture and paper.</description>
    <persons>
     <person id="1169">Arien Vijn</person>
    </persons>
    <links>
     <link href="http://www.force10networks.com/products/p-series_overview.asp">Force 10 P10 IDS/IPS system</link>
     <link href="http://www.ams-ix.net">AMS-IX</link>
    </links>
   </event>
   <event id="1459">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>sip_security</tag>
    <title>SIP Security</title>
    <subtitle>Status Quo and Future Issues</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The presentation will give an overview on SIP security issues and show possible weaknesses in current implementations using SIP (Hardphones, Softphones, Gateways). Further, an outlook on the security of future, serverless SIP systems (P2P-SIP) will be given.</abstract>
    <description>The presentation will give the audience an overview of VoIP security issues, both current and future, focusing on the session initiation protocol (SIP). Today, SIP is the predominant protocol for VoIP signalling in consumer markets. The talk will present the status quo in SIP security and give an outlook on future security challenges.

First, the talk will introduce signalling with SIP. Fundamental differences to the PSTN will be shown and the consequences for security will be discussed. Among these problems are: Spam over Internet (SPIT), Lawful Interception, Security of Terminals &amp; Servers, Anonimity / Privacy, Identity Assertion &amp; Spoofing. These problems will be explained, including the current status quo on how to mitigate these problems.

Then, the talk will focus on the security of SIP terminals (softphones and hardphones) and SIP servers. We are currently testing several implementations of the session initiation protocol (SIP) in our security lab. We have designed a test framework using existing tools and developments of our own. During the presentation it will be shown how these devices (Softphones, Hardphones, PSTN-Gateways) are being tested and some results will be given.

Finally, the talk will give the audience an outlook on security issues in future VoIP scenarios (e.g. Peer-To-Peer setting). P2P-SIP is currently discussed in the IETF and several internet drafts exist (see www.p2psip.org). This infrastructure change will have some serious implications on security for VoIP communications. The P2P paradigm introduces new security threats to SIP that will be explained. For instance, the lack of a central authority in a serverless setting makes authentication of end-users difficult. Options to mitigate this and other problems for P2P-SIP will (briefly) be outlined.</description>
    <persons>
     <person id="676">Jan Seedorf</person>
    </persons>
    <links>
     <link href="http://www.informatik.uni-hamburg.de/SVS/research/projects/voip/index.php">VoIP Security @University of Hamburg</link>
     <link href="http://www.p2psip.org/">P2P SIP Projects Overview</link>
    </links>
   </event>
   <event id="1602">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>subverting_ajax</tag>
    <title>Subverting AJAX</title>
    <subtitle>Next generation vulnerabilities in 2.0 Web Applications</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Ajax and the new dynamic extensions leverage new threats that lead to innovative attack scenarios against web applications.</abstract>
    <description>In a world where the user learned to behave properly in his interaction with the old web interfaces, many innovative technologies are emerging.
Ajax and new dynamic web extensions empower web browsers and client-server communications as well as they leverage new threats and undisclosed attack scenarious.
Web 2.0 is going to be the first choice in upcoming web projects and many companies are migrating to new dynamic front-ends to increment value to their institutional sites, intranet corporates and Online Banking portals.
After a quick overview of simple Cross Site Scripting attacks, the speech will focus on security aspects of Web 2.0 technologies exploring unconventional and undisclosed attacking techniques.
During the presentation we will show the next step in content/request hijacking and the next generation of client-side and server-side injection.
Specifically, by applying advanced Javascript techniques like prototyping we'll see how to hijack functions and objects in order to have transparent attacks without breaking javascript code in Ajax web pages.
Moreover, will be shown non trivial ways to attack web pages and inject code by taking advantage of other kinds of vulnerabilities in a cross domain environment. 
Finally,  we will see how poor design choices in web browsers would bring to new kind of attacking vectors like UXSS through plugins and sandbox framework flaws.</description>
    <persons>
     <person id="1155">Stefano Di Paola</person>
     <person id="1152">Giorgio Fedon</person>
    </persons>
    <links>
     <link href="http://www.wisec.it">Project Site</link>
    </links>
   </event>
   <event id="1498">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>mining_aol_search_queries</tag>
    <title>Mining Search Queries</title>
    <subtitle>How to discover additional knowledge in the AOL query logs</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>AOL recently published over 34M weakly anonymized search queries from their users by intension. This lecture gives an overview on the results of an extensive statistical analysis and data mining procedure on this dataset. Thereby, a methodology for frequency analysis, search trend mining, topic detection and even user profiling and identification will be presented.</abstract>
    <description>The lecture will give an overview on knowledge discovery techniques on a sample dataset of real search queries released by AOL. Although AOL anonymized the records by hiding the user name of the sender, this lecture will show how much knowledge you can already gain out of those web logs. The lecture targets on showing the dangers of progressional data collection and aggregation, particulary of rich user profile mining from search query logs. 


This talk split into the following paragraphs:

Introduction:
- Origin of the data
- Aftermaths of publication

General analysis of dataset:
- Structure, Size
- Representativeness
- Distribution over time 
- Distribution over user
- Clickthrough of ranked sites

Topic analysis:
- What topics do users search for?
- Query distribution follows zipf's law
- Statistical analysis of topic categories 

Search trend mining:
- Time slicing the dataset
- Difference analysis of search queries in consecutive slices
- Do search queries correlate with current events of time?

User profiling:
- Generating user profiles out of search queries
- Categorization of usage frequency, user's interests, competencies
- Methods of user identification 
- Possible identification patterns

Summary:
- A broad spectrum of additional knowledge can be derived despite anonymization of data
- User identification possible 
- Consequences for your searching behavior</description>
    <persons>
     <person id="1000">Robert</person>
    </persons>
    <links>
     <link href="http://www.gregsadetsky.com/aol-data/">data sources</link>
     <link href="http://www.aolpsycho.com/">manual user profiling</link>
     <link href="http://blog.outer-court.com/archive/2006-08-07-n22.html">short toplist analysis</link>
    </links>
   </event>
   <event id="1699">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>drm_comes_to_european_digital_tv</tag>
    <title>DRM comes to European digital TV</title>
    <subtitle>How the DVB project is locking down TV standards and importing U.S. mistakes.</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>European digital television standards (both free-to-air broadcast and
pay TV) developed by the DVB project are exemplary for including
no digital rights management.  But now DVB is rushing to change that
and impose new restrictions on receiving equipment.</abstract>
    <description>EFF has participated in DVB meetings on DRM for the past two years.
We've learned how the broadcasting and movie industries consider
existing standards (including the pro-competitive Common Interface,
which can give free/open source software legal access to pay TV
programming) obsolete because they were designed in the 1990s before
the DRM revolution.  Now these standards are being rewritten and
retrofitted with DRM.  Even unencrypted free-to-air broadcasts may
be restricted with the European equivalent of the U.S. broadcast flag
policy.  And pay TV programming will be restricted by DRM even after
you've paid for it and received it in your house, intentionally erasing
the distinction between making people pay for TV and controlling what
kinds of devices they can receive it on.  The industry is explicitly
looking to the U.S. models for post-reception DRM and device reguations:
the broadcast flag rule for over-the-air broadcasts and the cable
plug-and-play regime for pay TV.  Both of these schemes require
receiving equipment to be licensed, certified, and tamper-resistant,
and both of them are a disaster for compatibility with software on
the PC.

Here, for the first time, we present a detailed account of exactly
what DVB is up to in these areas, and how this work is inspired by
U.S. industry demands.  The plan to embed DRM into European TV
standards has a lot of momentum, but maybe we can stop it in its
tracks.  We need to make clear that DRM-free standards are a feature,
not a bug, and that standards should be made more compatible, not
less compatible.</description>
    <persons>
     <person id="1256">Seth Schoen</person>
    </persons>
    <links>
     <link href="http://www.eff.org/IP/DVB/">http://www.eff.org/IP/DVB/</link>
    </links>
   </event>
   <event id="1346">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>sie_haben_das_recht_zu_schweigen</tag>
    <title>Sie haben das Recht zu schweigen</title>
    <subtitle>Durchsuchung, Beschlagnahme, Vernehmung - Strategien f&#252;r den Umgang mit Polizei und Staatsanwalt</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Wer online lebt und arbeitet, tut dies unter den Augen der Strafverfolger. Der Vortrag schildert, wie Durchsuchungen, Vernehmungen und Ermittlungsverfahren ablaufen. Er erkl&#228;rt, wie man sich gegen&#252;ber Polizei und Staatsanwaltschaft richtig verh&#228;lt.</abstract>
    <description>"Sie haben das Recht zu schweigen"

Server beschlagnahmt. Firma durchsucht. Filesharer angeklagt. Meldungen &#252;ber strafprozessuale Ma&#223;nahmen gegen User geh&#246;ren l&#228;ngst zum Alltag. Internet und EDV sind f&#252;r die Ermittlungsbeh&#246;rden kein unbekanntes Terrain mehr. Equipment, Manpower und Knowledge reichen in Deutschland l&#228;ngst aus, um effektiv jedem Tatverdacht nachzugehen.

F&#252;r Durchsuchungs- und Beschlagnahmebeschl&#252;sse reicht Richtern h&#228;ufig ein Anfangsverdacht. Das kann auch eine haltlose, anonyme Anzeige sein. Im Computerbereich hat das f&#252;r den User regelm&#228;&#223;ig fatale Folgen. Die Fahnder kassieren seine gesamte Hardware und den greifbaren Datenbestand. Sie bem&#252;hen sich nach Kr&#228;ften, an Passworte f&#252;r externe Dienste zu kommen.

W&#228;hrend der Privatmann sich ins Internetcaf&#233; rettet, l&#246;sen solche Zugriffe f&#252;r Firmen oftmals eine existenzielle Krise aus. Mit panischen Reaktionen, psychologisch ungeschicktem Verhalten, gar keinen (oder falschen) juristischen Schritten kann jeder Betroffene die Sache noch viel schlimmer machen.

Der Vortrag zeigt, welche Rechte Betroffene haben und wie sie das Beste aus der Situation machen.


I. Die Durchsuchung

Fahnder kommen immer ungelegen. Umso wichtiger ist, einen k&#252;hlen Kopf zu bewahren und seine Rechte zu kennen

* Still dulden oder helfen?
* Reden oder schweigen?
* Was d&#252;rfen/m&#252;ssen Angeh&#246;rige bzw. Mitarbeiter ( = Zeugen) an Ort und Stelle sagen?
* Kontaktaufnahme mit Rechtsbeistand?
* Was darf mitgenommen werden?
* Drohung mit Untersuchungshaft?
 

II. Das Ermittlungsverfahren

Mit dem Abzug der Ermittler er&#246;ffnen sich Handlungsspielraum und Handlungsbedarf f&#252;r den Beschuldigten:

* Kontakt mit Polizei/Staatsanwalt;
* Akteneinsicht;
* Verteidungsschrift;
* Dr&#228;ngen auf (teilweise) Herausgabe;
* H&#246;chstfristen f&#252;r Beschlagnahme;
* Weitergabe von Informationen/&#8222;Verdunkelung&#8220;;
* &#214;ffentlichkeitsarbeit;
* M&#246;glichkeiten f&#252;r eine fr&#252;hzeitige Verst&#228;ndigung (Deal).

III. Einzelfragen

* Untersuchungshaft;
* Einziehung/Verfall;

III. (K)ein dickes Ende

W&#228;hrend Ermittlungsverfahren h&#228;ufig mit Paukenschl&#228;gen beginnen, l&#228;utet am Ende meist nur ein Warngl&#246;ckchen &#8211; wenn &#252;berhaupt.

Was gibt es wof&#252;r? Ein aus Erfahrung gespeister &#220;berblick &#252;ber Straferwartungen bei Internetdelikten.</description>
    <persons>
     <person id="961">Udo Vetter</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1759">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>schlossoeffnung_staatssicherheit</tag>
    <title>Schloss&#246;ffnung bei der Staatssicherheit der DDR</title>
    <subtitle>Werkzeuge und Vorgehen der STASI</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Arthur Meister erl&#228;utert das operative Vorgehen und die speziellen Werkzeuge zur Schloss&#246;ffnung,
die von der Staatssicherheit der DDR verwendet wurden. Von der opartiven Vorbereitung, &#252;ber die Erst&#246;ffnung bis zur Herstellung von Nachschl&#252;sslen werden speziell von der STASI entwicklete Werkzeuge und deren Einsatz gezeigt.</abstract>
    <description></description>
    <persons>
     <person id="1312">Arthur Meister</person>
    </persons>
    <links>
     <link href="http://www.lockpicking.org">Lockpicking.ORG</link>
    </links>
   </event>
   <event id="1586">
    <start>00:00</start>
    <duration>04:00</duration>
    <room>Saal 3</room>
    <tag>capture_the_flag</tag>
    <title>23C3 CTF</title>
    <subtitle>Capture the Flag Hacking Contest</subtitle>
    <track>Hacking</track>
    <type>Wettkampf</type>
    <language>englisch</language>
    <abstract></abstract>
    <description></description>
    <persons>
     <person id="313">mc.fly</person>
     <person id="592">Lexi Pimendis</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 4">
   <event id="1454">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>natural_language_database_interface</tag>
    <title>A Natural Language Database Interface using Fuzzy Semantics</title>
    <subtitle></subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>We give a thorough exposition of our natural language database interface that
produces result sets ranked according to the degree to which database records
fulfill our intuitions about vague expressions in natural language such as
`a small rainy city near San Francisco'. We present our toolset supporting the
rapid prototyping of such database interfaces by means of a meta-level
description of a data model and a lexicon for a query language.</abstract>
    <description>This talk is based on my M.Phil. thesis about Fuzzy Semantics which I submitted
to the University of Cambridge Computer Lab. The thesis introduces a model of fuzzy
semantics and provides some empirical evidence in support of this model.

We also applied this model to produce a working natural language interface to a
database which produces a ranking of all records in a database that match our
intuition of, for instance, a `small rainy city near San Francisco'.

In the proposed talk we will demonstrate the general background of this work,
and will go into detail about one particular aspect which might be of broader
interest to a hacker community: The linguistic data modelling language that
we used to provide a meta-level description of a data model, together with
a description of how linguistic expressions are to be interpreted with respect
to the defined data model.

The attachment of this submission is my thesis plus an "APPENDIX A". This
APPENDIX A will constitute the focus of attention for my proposed talk.</description>
    <persons>
     <person id="51">Richard Bergmair</person>
    </persons>
    <links>
     <link href="http://www.cl.cam.ac.uk/Research/NL/">http://www.cl.cam.ac.uk/Research/NL/</link>
     <link href="http://richard.bergmair.eu/">http://richard.bergmair.eu/</link>
    </links>
   </event>
   <event id="1758">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>fuzzing_corporate_world</tag>
    <title>Fuzzing in the corporate world</title>
    <subtitle>The use of fuzzing in the corporate world over the years and recent implementation of fuzzing tools into the development cycle and as a requirement before purchase</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>We will discuss fuzzing uses by software vendors and in the corporate world, for security auditing ("fuzzing before release") and third party testing ("fuzzing before purchase"). We will look at what contributed to this change in the use of fuzzing tools from home-grown hacking tools to commercial products, as well as how these organizations implement fuzzing into their development cycle.</abstract>
    <description>Fuzzing has been used for a long time in the hacker scene. Mostly, these tools have been home-grown. In the recent year, several commercial fuzzing tools appeared. These in turn are now utilized by organizations in the development cycle under the moto of "fuzzing before release", or "find the vulnerability before hackers do".
Another interesting and somewhat unexpected development in the field is that end-clients are the largest consumers of advanced fuzzing technology, performing tests on software before purchase. Further, some large telcos and financial institutions now demand for products to be certified (even if not by an official seal) by fuzzing products which they authorize.

Is fuzzing finally a solution to reduce vulnerabilities in products rather than just later discover them? How is it used by these corporations and third-party organizations?
Some methodologies as well as examples will be presented, and we will also try to look into what the future holds.</description>
    <persons>
     <person id="1309">Gadi Evron</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1520">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>counter_development</tag>
    <title>Counter-Development</title>
    <subtitle>The Accessibility of Technology as an Addendum to Engineering Ethics in the Knowledgeable Society</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Civil disobedience is a fundamental human right in all democracies, and it has to be accessible for everyone.</abstract>
    <description>This includes the accessibility of politically laden technologies which have to be understandable and destructible. Many current technologies however refuse accessibility to lay people. Thus it becomes the ethical obligation of the technical expert to provide understanding and accessible means for the destruction of potentially dangerous technologies.</description>
    <persons>
     <person id="110">Sandro Gaycken</person>
    </persons>
    <links>
     <link href="http://www.uni-stuttgart.de/philo/index.php?id=641">http://www.uni-stuttgart.de/philo/index.php?id=641</link>
     <link href="http://www.uni-bielefeld.de/iwt/gk/personen/mitglieder/">http://www.uni-bielefeld.de/iwt/gk/personen/mitglieder/</link>
    </links>
   </event>
   <event id="1566">
    <start>16:00</start>
    <duration>02:15</duration>
    <room>Saal 4</room>
    <tag>openpcd_openpicc</tag>
    <title>OpenPCD / OpenPICC</title>
    <subtitle>Free RFID reader and emulator</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This presentation will introduce and demonstrate OpenPCD and OpenPICC.  The purpose of those projects is to develop free hardware designs and software for 13.56MHz RFID reader and transponder simulator. OpenPICC can be used to e.g. simulate ISO 14443 or ISO 15693 transponders, such as those being used in biometric passports and FIFA worldcup tickets.</abstract>
    <description>The OpenPCD project is a 100% Free Licensed RFID reader hardware and software design.  It has first been released on September 13, 2006.  Using OpenPCD, interested hackers can directly access the lowest layers of 13.56MHz based RFID protocols.  The hardware offers a number of digital and analog interfaces, and the firmware source code is available and can be modified and compiled using arm-gcc.

The OpenPICC project is the counterpart to OpenPCD.  It is a device that emulates 13.56MHz based RFID transponders / smartcards.  Like OpenPCD, the hardware design and software are available under Free Licenses. It has not been released yet, but the first prototypes are working and it is expected to be released before 23C3.

The presentation will introduce and explain the OpenPCD and OpenPICC hardware as well as software design.</description>
    <persons>
     <person id="269">Milosch Meriac</person>
     <person id="62">Harald Welte</person>
    </persons>
    <links>
     <link href="http://www.openpcd.org/">OpenPCD homepage</link>
     <link href="http://wiki.openpcd.org/">OpenPCD wiki</link>
    </links>
   </event>
   <event id="1652">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>geschichte_der_automaten</tag>
    <title>Geschichte der Automaten, Androiden und Homunculi</title>
    <subtitle></subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Die Schachspieler und Musikautomaten des 18. Jahrhunderts sind bekannt: Weniger bekannt sind die Automaten der Antike und des Mittelalters.</abstract>
    <description>Der Vortrag wird einen Blick auf die Geschichte der t&#246;nenden und bewegten und meist durch Wasserkraft angetriebenen Automaten und Maschinen der Antike und des Mittelalters werfen. Ein Ausflug in die alchimistische Praxis der Erzeugung von Homunculi darf nat&#252;rlich nicht fehlen.</description>
    <persons>
     <person id="17">Henriette Fiebig</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1545">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>advanced_attacks_against_pocketpc_phones</tag>
    <title>Advanced Attacks Against PocketPC Phones</title>
    <subtitle>0wnd by an MMS</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Smart phones are the new favorite target of many attackers. Also most current attacks are harmless, since these mostly rely on user mistake or lack of better knowledge. Current attacks are mostly based on logic errors rather then code inject and often are only found by accident. The talk will show some real attacks against smart phones and the kind of vulnerability analysis which lead to their discovery.</abstract>
    <description>This talk is about a security analysis of the PocketPC MMS (Multimedia Messaging Service) client. 

We will start with some background information about some older attacks against mobile phones. In the next
step we will introduce to PocketPC-based phones and their security. Further we will introduce to the
Multimedia Messaging Service. Here we will show how it works and how MMS messages look like under the
microscope.

In the main part we analyze the PocketPC MMS client and build a fuzzer for it. Since we want avoid costs 
by sending real MMS messages we build our own virtual mms system and make PocketPC believe that this
is the real thing.

In the end we will present the bugs and vulnerabilities we found, including the methods for exploiting
them such as how to build your own MMS-client.

So far I planned to release all information that I have kept back at defcon (exploit code, mms-client, etc...).

Come to this talk if you enjoy any of the following:

 networking
 mobile phones
 security
 fuzzing
 hex dumps
 ping floods
 standards</description>
    <persons>
     <person id="1142">Collin Mulliner</person>
    </persons>
    <links>
     <link href="http://www.heise-security.co.uk/news/76493">heise security about this talk at defcon</link>
     <link href="http://www.mulliner.org/pocketpc/">pocketpc security</link>
    </links>
   </event>
   <event id="1688">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>rootkits_as_reversing_tools</tag>
    <title>Rootkits as Reversing Tools</title>
    <subtitle>An Anonymous Talk</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>This talk will cover two rootkits used as reverse engineering tools, one rootkit support library, one IDA plugin, and talk setup material. The talk itself will be given over VOIP and VNC running over the Tor network to demonstrate a proof of concept on anonymous public speech.</abstract>
    <description>This talk will present Tron, an extension of the Shadow Walker memory cloaker technique. Tron is a kernel driver who can cloak userland memory, and provides an API that allows the user to cloak arbitrary process memory, set permissions, signal changes of trust, conceal DLLs, and read/write hidden memory. An accompanying IDA plugin that uses this API to conceal software breakpoints will be discussed, and Another Debugger Hiding Driver, or ADHD will be presented as well.

While these tools have many legitimate uses from malware analysis to legal reverse engineering and program modding, it is possible that Tron in particular can be used as a component of a "copyright circumvention device", which renders it prohibited by the USA DMCA. For this reason, but more so out of a desire to demonstrate a "proof of concept" for how to 
anonymously speak publicly, the speaker will be giving the talk over VOIP and VNC relayed through the Tor network. In addition to taking questions over VOIP, the speaker will also be briefly available on IRC afterwords for questions + discussion about Tron, reverse engineering, and the speech setup.</description>
    <persons>
     <person id="1242">Alan Bradley</person>
    </persons>
    <links>
     <link href="http://wiki.noreply.org/noreply/TheOnionRouter/AnonymousPublicSpeech">How To Speak Anonymously In Public</link>
    </links>
   </event>
  </room>
  <room name="Workshop Area">
   <event id="1751">
    <start>12:45</start>
    <duration>02:15</duration>
    <room>Workshop Area</room>
    <tag>secure_voip</tag>
    <title>Secure VOIP</title>
    <subtitle>using GSM phones, Asterisk and IPsec/openvpn</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Workshop about how to configure all the parts to get the GreenPhone/XDA/Motorola phones working with VPN software and SIP to an Asterisk on VPN. This workshop goes deeply into software/tech bits that cannot be delved into during the presentation on 28.12.2006. The presentation focusses more on VOIP security issues in general and our overal design of the secure phone infrastructure.. This workshop takes place a day after that presentation. Bring your phones and/or laptops and connect to our secure PBX!</abstract>
    <description></description>
    <persons>
     <person id="370">Paul Wouters</person>
     <person id="1294">Leigh Honeywell</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1752">
    <start>15:00</start>
    <duration>02:00</duration>
    <room>Workshop Area</room>
    <tag>opensearch</tag>
    <title>Opensearch</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Who controls the information? In this modern age, search engines have a distinct influence on the retrieval of information from the internet. Another concern with the concentration of information and information about who requests that information is that non-benign parties might use this information to prosecute people. In order to remedy this situation, we came up with the OpenSearch idea: a search engine that is distributed, not under central control and therefore difficult to manipulate.</abstract>
    <description>In the past year, we have savoured the project idea and are now really starting to build, at first, a prototype and, later on, a full-fledged distributed search engine client. Currently, funding is being secured to give the project, which will be completely open and hopefully community driven. As part of the project, workshops and lectures are being organised in conferences and meetings primarily in Holland, Belgium and Germany.

This workshop has a twofold purpose: on the one hand we hope to interest people in the project, on the other hand we want to talk about the concept, its implications and possible solutions to problems with our approach.</description>
    <persons>
     <person id="1334">Robin Gareus</person>
    </persons>
    <links>
     <link href="https://twiki.sonologic.nl/twiki/bin/view/Opensearch/">WebHome  Opensearch</link>
     <link href="http://www.open-search.net">open-search project pages</link>
    </links>
   </event>
   <event id="1753">
    <start>17:00</start>
    <duration>01:15</duration>
    <room>Workshop Area</room>
    <tag>lobjan_workshop</tag>
    <title>Lojban Workshop</title>
    <subtitle></subtitle>
    <track>Culture</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>A short introduction into lojban, the logical language, for beginners who want to learn the language.</abstract>
    <description></description>
    <persons>
     <person id="1306">Alexander Koch</person>
    </persons>
    <links>
     <link href="https://events.ccc.de/congress/2005/fahrplan/events/569.en.html">Lojban - A Hackers' Spoken Language</link>
     <link href="http://de.wikipedia.org/wiki/Lojban">http://de.wikipedia.org/wiki/Lojban</link>
     <link href="http://en.wikipedia.org/wiki/Lojban">http://en.wikipedia.org/wiki/Lojban</link>
    </links>
   </event>
   <event id="1754">
    <start>18:30</start>
    <duration>02:00</duration>
    <room>Workshop Area</room>
    <tag>erfakreis_meeting</tag>
    <title>Erfakreis-Meeting</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>Die Erfakreise des CCC treffen sich.</abstract>
    <description></description>
    <persons>
     <person id="491">fh</person>
    </persons>
    <links>
     <link href="http://www.ccc.de/regional/">Regionale Gruppen des CCC</link>
    </links>
   </event>
   <event id="1775">
    <start>20:30</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>a_not_so_smart_card</tag>
    <title>A not so smart card</title>
    <subtitle>getting the card issuer's secret key</subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Everyone is invited; Swiss may be a special interest group - as it affects them directly. So, if you want to turn up on the Swiss Gettogether (at 21:45) anyway, show up a little bit earlier. Consider it a warm-up!</abstract>
    <description>Everyone is invited; Swiss may be a special interest group - as it affects them directly. So, if you want to turn up on the Swiss Gettogether (at 21:45) anyway, show up a little bit earlier. Consider it a warm-up!</description>
    <persons>
     <person id="1266">$speaker</person>
    </persons>
    <links>
     <link href="https://chaostreff-zh.tuners.ch/Hauptseite">https://chaostreff-zh.tuners.ch/Hauptseite</link>
    </links>
   </event>
   <event id="1766">
    <start>21:45</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>swiss_gettogether</tag>
    <title>Swiss Gettogether</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Workshop</type>
    <language>deutsch</language>
    <abstract>Alle willkommen!</abstract>
    <description></description>
    <persons>
     <person id="1266">$speaker</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1763">
    <start>23:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>nintennde_hacking_teatime</tag>
    <title>Nintendo hacking teatime</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>A nice and cozy get-together for DS homebrew hackers, wannabe DS homebrew hackers, and everyone else interested. There won't be a fixed program, just some chit-chat about the DS, the Wii and everything.</abstract>
    <description>If you want to

* present a project of yours 

* know what hardware is required for running DS homebrew such as DSLinux, Moonshell, or Nitrotracker

* have FlashMe installed

* or just sit and watch 

you're invited to come over and have a tea or two. (or beer)</description>
    <persons>
     <person id="1314">Tobias Weyand</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1773">
    <start>00:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>hacking_xmpp_and_jabber</tag>
    <title>Hacking XMPP and Jabber</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Doing wonderful stuff in angle brackets. Brainstorming about things to do with Jabber/XMPP beyond chatting. Relaxing and hacking.</abstract>
    <description></description>
    <persons>
     <person id="491">fh</person>
     <person id="13">Jens Ohlig</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
 </day>
 <day date="2006-12-30" index="4">
  <room name="Saal 1">
   <event id="1456">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>unusual_bugs</tag>
    <title>Unusual bugs</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>In this presentation I'll present a series of unusual security bugs. Things that I've ran into at some point and went "There's gotta be some security consequence here". None of these are really a secret, and most of them are even documented somewhere. But apparently most people don't seem to know about them.</abstract>
    <description>What you'll see in this presentation is a list of bugs and then some explanation of how these could be exploited somehow. Some of the things I'll be talking about are (recursive) stack overflow, NULL pointer dereferences, regular expressions and more.</description>
    <persons>
     <person id="50">Ilja</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1257">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>podjournalism</tag>
    <title>Podjournalism</title>
    <subtitle>The Role of Podcasting in Critical and Investigative Journalism</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Throughout the world, major media companies are cutting their budgets for investigative reporting.  Most journalists will soon be freelancers, losing their freedom to investigate the more controversial or difficult topics.  Yet at the same time, podcasting as a form of citizen journalism has risen, free of the constraints of organizations and editors.  But without the funding that the tradional media enjoyed, how are podcasting journalists carrying out their work, and what does it mean for the media consumer?</abstract>
    <description>Pojournalism

A talk led by Mark Fonseca Rendeiro aka Bicyclemark

I. The media landscape prior to 2004, the desert of information
a. Consolidation
b. Sensationalism
c. Profit Above all
d. Top-Down news reporting
II. The Emergence of podcasting
a. Mp3 player market
b. Increasing appetite for media on demand
c. Desire to hear unpolished genuine voices
d. Broadband, bandwith and  all things band.
III. Podjournalism Defined
a. In relation to radio journalism.
b. Regarding objective versus subjective
c. As citizen reporting, bottom up
IV. Present day podjournalists and the key moments in our short history.
a. Josh Wolf against the federal government
b. MacDocMan versus the Dutch health system
c. Macaca, caught on tape
V. Future Prospects and Pitfalls for citizen reporters using podcasting
a. Business models and the obsession with business models
b. Being acquired by big media
c. Drop-out rate, pressures from 9-5 jobs.
d. Punditry.
VI. Earth Shattering Conclusion</description>
    <persons>
     <person id="910">Bicyclemark</person>
    </persons>
    <links>
     <link href="http://www.joshwolf.net/blog/">Josh Wolf</link>
     <link href="http://www.mikeypod.com">Mikeypod</link>
     <link href="http://www.bicyclemark.org/blog">Bicyclemark's Communique</link>
     <link href="http://www.democracynow.org">Democracy Now</link>
     <link href="http://www.radioopensource.org">Radio Open Source</link>
    </links>
   </event>
   <event id="1708">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>tv_b_gone</tag>
    <title>TV-B-Gone</title>
    <subtitle>Better Living Through Inventing</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>It is possible and desirable and fun to invent and create technologies that help our world. Have you ever wanted to shut off a TV that was annoying you in a public place?  My extraordinarily popular invention, TV-B-Gone has made it fun to turn off TVs in restaurants, pubs, airports...</abstract>
    <description>Using my invention TV-B-Gone as a demonstration, I'll talk about the following interrelated topics: the inventing process, technical details about how TV-B-Gone works, how to have fun changing the world, using cool inventions as a fabulous way to be an effective media-whore, as well as some possibilities for living a fulfilling existence on our modern world.

And I'll have plenty of TV-B-Gone remotes with me.</description>
    <persons>
     <person id="1268">Mitch</person>
    </persons>
    <links>
     <link href="http://www.TVBGone.com">TV-B-Gone</link>
    </links>
   </event>
   <event id="1682">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>security_nightmares</tag>
    <title>Security Nightmares 2007</title>
    <subtitle>Oder: wor&#252;ber wir n&#228;chstes Jahr lachen werden</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Security Nightmares - der j&#228;hrliche R&#252;ckblick auf die IT-Sicherheit und der Security-Glaskugelblick f&#252;r's n&#228;chste Jahr.</abstract>
    <description>Security Nightmares betrachtet die Vergangenheit, Gegenwart und Zukunft von Sicherheitsvorf&#228;llen in der IT. Wir machen eine R&#252;ckschau auf unsere Vorhersagen vom letzten Jahr, unterhalten uns dar&#252;ber, was sonst noch passiert ist, und wagen dann die Vorschau ins n&#228;chste Jahr.</description>
    <persons>
     <person id="9">Frank Rieger</person>
     <person id="129">Ron</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1429">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>fnord_jahresrueckblick</tag>
    <title>Fnord Jahresr&#252;ckblick</title>
    <subtitle>Wir helfen Euch, die Fnords zu sehen</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>This talk will be held in German.

Der Fnord-Jahresr&#252;ckblick widmet sich der politischen und sozialen Entwicklung der Welt im letzten Jahr im Zeitraffer. Mainstream-Nachrichten finden dabei nur Beachtung, wenn sie besonders sch&#246;ne Fnords enthalten. Strukturen, Verschw&#246;rungen und lustige neue Trends, die Euch sonst entgangen w&#228;ren oder schon wieder vergessen sind.</abstract>
    <description>This is a news show about events you might have missed in the mainstream news media.</description>
    <persons>
     <person id="9">Frank Rieger</person>
     <person id="1046">Felix von Leitner</person>
    </persons>
    <links>
     <link href="http://blog.fefe.de/">Fefe's Blog</link>
    </links>
   </event>
   <event id="1698">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>culture_jamming_discordianism</tag>
    <title>Culture Jamming &amp; Discordianism</title>
    <subtitle>Illegal Art &amp; Religious Bricolage</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Discordianism is somewhere between a joke and a religion, and at the same time manages to be something else entirely: social bricolage. This presentation will cover the roots of culture jamming in early art and theatrical movements, and then move through the history of prankster groups and on to Discordianism where the pranksters are prophets.</abstract>
    <description>If you're at the CCC, you probably have some idea of what Discordianism is about. This presentation will show the rich cultural web of influences on Discordianism and show where it seems to be heading in the future.

For those not in the know, Discordianism is something between a joke and a religion. Founded by a couple of beatniks about fifty years ago, Discordianism venerates the ancient Greek goddess of chaos, Eris, and her Roman counterpart Discordia. Robert Anton Wilson popularized Discordianism with his Illuminatus! Trilogy and Schroedinger's Cat Trilogy. 

Culturally, Discordianism often winds up being the religion of the surrealists and reality hackers, poking fun at the solemnity of others as they seek to connect with the divine. Still, many people are devout esoteric Discordians (for all that seems to be a contradiction), and this presentation hopes to show some of Discordianism's influences and history. Before we're done, we'll take a look at where Discordianism is today, and where it seems to be headed in the future.

It is important to start at the begining, so we'll look to the Surrealists and Dadaists to get an idea of some of Discordianism's earliest influences. Satire has always been a part of society, but the Surrealists and Dadaists took it to a new level by learning to live in satire and social commentary.

Bricolage and pastiche define a sort of social collage-making, where diverse ideas are patched together to form something new and often critical of the original. Discordianism relates to many of the new illegal art movements by doing the same thing with religion. We'll cover billboard liberation, mashups, and other forms of illegal art as related movements.

Prankster movements have had a sort of infinite loop of influence on Discordianism. We'll talk about prankster movements from the Situationists to the Cacophony Society and glamourbombing. 

Discordianism needs all of these influences to remain whole and healthy as our ideological parents die off and we ourselves must replace them. Discordian.com strives to create Discordianism as a rich subcultural untradition where everyone consults their pineal glands. We'll talk about the current state of Discordianism in the world, from events such as KallistiCon and the Free Spirit Gathering to online fora and meeting places for Discordians. These days, Discordianism is taking its influences from both art and the esoteric, moving into a quasi-magical paradigm where reality hacking can happen just as much with a couple of candles and incantations as it can with a computer.</description>
    <persons>
     <person id="1258">Autumn Tyr-Salvia</person>
     <person id="1278">Fox Magrathea</person>
    </persons>
    <links>
     <link href="http://www.discordian.com">Discordian.com</link>
     <link href="http://en.wikipedia.org/wiki/Discordianism">WikiPedia on Discordianism</link>
    </links>
   </event>
   <event id="1727">
    <start>19:30</start>
    <duration>01:00</duration>
    <room>Saal 1</room>
    <tag>closing_ceremony</tag>
    <title>Closing Ceremony</title>
    <subtitle>Who did you trust?</subtitle>
    <track>General</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract></abstract>
    <description></description>
    <persons>
     <person id="4">Tim Pritlove</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 2">
   <event id="1342">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>botnet_detection</tag>
    <title>Automated Botnet Detection and Mitigation</title>
    <subtitle>How to find, invade and kill botnets automated and effectively</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Botnets are one of the most buzzy buzzwords out there today in the computer security world. The presented approach allows us to take reliably care of these, such that managers hopefully will not react on ``botnet'' in 2008 any more. This technology allows for automated catching of malware with the now somewhat known nepenthes daemon, automated analysis with CWSandbox and other sandboxes, automated botnet snooping with the botsnoopd daemon and finally (semi-)automated mitigation using various weapons. Hopefully, our autonomous approach will never turn against the human race and begin the final war...</abstract>
    <description>This presentation explains the various components of our approach to botnet detection and mitigation from the beginning to the end in detail.

First, we will have a look at nepenthes; see how it has evolved, works and also point out some weaknesses. nepenthes is a versatile tool for malware collection and available under the GPL license at &lt;http://nepenthes.mwcollect.org/&gt;. Although, people have presented on it on various conferences, this tool is still not known by a lot of malware researchers. Additionally, most presentation focus on the results you can achive with nepenthes, whereas this presentation will show you how it really works.

The next step in botnet mitigation then is to sandbox the malware to gather information about the botnet itself, e.g. server hostname, channel names or for other types of botnet, the other relevant information for connecting to it. Our current approach is based on the CWSandbox developed by Carsten Willems at the RWTH Aachen, not available to the public. We however also work with the Chinese Honeynet Project's work (MWSniffer), experiment with Norman's work (Norman Sandbox) and plan to include Emsi's work in the future (CodeKnigge).

After sandboxing the malware, we automatically connect into the botnet and snoop all relevant commands, traffic and generate statistics (some fancy charts that is). This allows us to generate statistics about DDoS attacks carried out throug monitored botnets, gather intelligences about identity theft and provide LEOs with relevant information (the most reliable way to mitigate botnets). We closely cooperate with the ShadowServer crew for botnet monitoring.

Once a botnet has been identified as a severe threat to the Internet, it can be shut down (semi-) automatically. Since we wanted to stay away from a solely automated atomar weapon, which might be fooled to be autonomously fired at Washington, D.C., we still have to confirm the mitigation process. Mitigation involves notification of involved ASNs, botnet sinkholing and DNS poisoning.
Additionally, cooperation with some German ISPs will hopefully enable us to cut off infected clients from the Internet in the future.</description>
    <persons>
     <person id="958">Georg 'oxff' Wicherski</person>
    </persons>
    <links>
     <link href="http://ph-neutral.darklab.org/0x7d6/workshops/index.html">Vortrag mit Teil&#252;berschneidung auf der ph-neutral 2006</link>
     <link href="http://www.blackhat.com/html/bh-japan-06/bh-jp-06-en-speakers.html#Wicherski">&#196;hnlicher Vortrag auf BH Asia</link>
    </links>
   </event>
   <event id="1493">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>virtuelle_sicherheit</tag>
    <title>Virtuelle Sicherheit</title>
    <subtitle>Mandatory Access Control und TPM in Xen</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Xen bietet aufregende neue Sicherheitsfunktionen: Mandatory Access Control und virtuelle TPMs. Der Vortrag stellt diese Funktionen vor, berichtet von ersten Erfahrungen und zeigt ihre Grenzen auf.</abstract>
    <description>Der Trend zur Virtualisierung ist ungebrochen. Verschiedenste Hersteller bieten Software- und Hardware-basierte Virtualisierungsl&#246;sungen an. Mit XEN ist auch eine OpenSource-L&#246;sung verf&#252;gbar, die inzwischen auch Einzug in Rechenzentren gefunden hat. H&#228;ufig wird jedoch bei diesen L&#246;sungen die Sicherheit vernachl&#228;ssigt.

Xen bietet in zwei vollkommen neue Ans&#228;tze, die ich in diesem Vortrag vorstellen m&#246;chte.
1. Xen bietet die M&#246;glichkeit den virtuellen Gastsystemen ein virtuelles Trusted Plattform Module zur Verf&#252;gung zu stellen. Dabei kann Xen im Hintergrund auf ein physikalisches TPM zur&#252;ckgreifen. Steht dies nicht zur Verf&#252;gung kann Xen jedoch auch das TPM komplett simulieren. Speziell f&#252;r TPM-Versuche ohne TPM-Hardware ist dies recht interessant. Auch als m&#246;glicher Angriffsvektor auf ein Betriebssystem, welches TPM verwendet bietet sich der Simulator an.

2. Xen bietet mit sHype ein Mandatory Access Control Framework. Hiermit kann der Zugriff auf Ressourcen und die Kommunikation der unterschiedlichen Dom&#228;nen eingeschr&#228;nkt werden. Mit Hilfe dieses MAC ist es m&#246;glich die Dom&#228;nen untereinander zu sch&#252;tzen. Dies ist insbesondere wichtig, wenn Xen im Rechenzentrum in einem Cluster eingesetzt wird. Im Cluster kann der Xen-Gast auf einem beliebigen physikalischem Host betrieben werden. H&#228;ufig d&#252;rfen aber aus Sicherheitsgr&#252;nden nicht zwei bestimmte G&#228;ste gleichzeitig auf demselben physikalischem Host laufen oder auf dieselbe Resource zugreifen. sHype bietet hier die M&#246;glichkeit Einschr&#228;nkungen zu definieren. sHype befindet sich noch in der Weiterentwicklung. Einschr&#228;nkungen bei dem Zugriff auf das Netzwerk und Netzwerkspeicher sind im Moment in der Entwicklung.

Der Vortrag stellt die neuesten Entwicklungen und die Erfahrungen bei der Anwendung dieser Sicherheitsfunktionen vor.</description>
    <persons>
     <person id="177">Ralf Spenneberg</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1592">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>inside_vmware</tag>
    <title>Inside VMware</title>
    <subtitle>How VMware, VirtualPC and Parallels actually work</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>Virtualization is rocket science. In cooperation with the host operating system, VMware takes over complete control of the machine hundreds of times a second, handles pagetables completely manually, and may chose to wire (make-non-pageable) as much memory as it chooses. This talk explains why it still works.</abstract>
    <description>In 1999, VMware was the first virtualization solution for x86. 7 years later, there are only two competitors: Microsoft with VirtualPC (by dynarec genius Eric Traut of Apple DR fame) and that obscure Russian company that seems to offer the same product unter 3 different names (SVISTA, 2ON2, Parallels). The open source plex86 by Bochs creator Kevin Lawton failed. All this suggests that x86 virtualization is rocket science.

This talk first summarizes some basic operating system features, like scheduling, managing page tables, and providing a system call interface, in order to have a common basis that can be talked about.

The main part is about the tricks a conventional virtualization solution has to apply to run the guest operating system as a user mode process: The virtual machine monitor (VMM) has to set up address spaces for guest code, handle two-level pagetables, switch between the host and the guest(s), trap I/O accesses, and help cooperate in memory management between the host and the guest(s).

The third part of the talk explains why the x86 architecture is not strictly virtualizable, what tricks VMware, VirtualPC and Parallels use to still make it possible, and what in what way Intel VT (Vanderpool) and AMD SVN (Pacifica) help to make x86 virtualization easier or possibly more efficient.</description>
    <persons>
     <person id="283">Michael Steil</person>
    </persons>
    <links>
     <link href="http://www.vmware.com/pdf/asplos235_adams.pdf">A Comparison of Software and Hardware Techniques for x86</link>
    </links>
   </event>
   <event id="1644">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>sflow</tag>
    <title>sFlow</title>
    <subtitle>I can feel your traffic</subtitle>
    <track>Science</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The explosion of internet traffic is leading to higher bandwidths and an increased need for high speed networks. To analyze and optimize such networks an efficient monitoring system is required. The sFlow standard describes a mechanism to capture traffic data in switched or routed networks. It uses a sampling technology to collect statistics from the device and is for this reason applicable to high speed connections (at gigabit speeds or higher).</abstract>
    <description>sFlow is a sampling mechanism suitable for collecting traffic data of high speed networks. A relative small stream of sFlow datagrams provides enough information for statistical analysis of traffic flows. 

An Internet Exchange (IX) interconnects various network providers, for example ISP's. The Amsterdam Internet Exchange (AMS-IX) is by its amount of traffic the biggest Internet Exchange in the world. To give the AMS-IX members more insight into their peering traffic and provide information to optimize the network structure, AMS-IX is using sFlow for its traffic analysis.

A throughput average of more then 100 Gb/s gets analyzed by an open source software developed in perl. Due to sFlow providing a whole captured packet (layer 2 - 7) AMS-IX also provides information for example on the growth (or lack off) of IPv6. Information about the sort of traffic might be misunderstood and politically misused therefore AMS-IX restrains itself to layer 2 and the developed software doesn't decode the provided packets above L2.

This topic will contain an introduction to the sFlow sampling mechanism, the information provided by the sFlow datagrams and how they can get analyzed. Besides that, existing tools and the software developed and used at AMS-IX will be presented, and some results of the analysis will be shown. 

The software will be hopefully also deployed at the 23C3, and finally we will also see  statistics about the network traffic of the conference.</description>
    <persons>
     <person id="454">Elisa Jasinska</person>
    </persons>
    <links>
     <link href="http://jasinska.de/sFlow/">jasinska.de/sFlow</link>
     <link href="http://sflow.org/">sflow.org</link>
     <link href="http://www.ams-ix.net/">ams-ix.net</link>
    </links>
   </event>
   <event id="1728">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 2</room>
    <tag>23c3_network_review</tag>
    <title>23C3 Network Review</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>An Introduction into the structure and design of the congress network -
featuring a description of hardware setup and focusing on the Backbone Network infrastructure and Wireless LAN.</abstract>
    <description>Building a high-demand network in less than 72hrs is a job that requires
sufficient planning in advance. It starts with organizing hardware that
is capable to serve the usage profile of about 2342 power-users and ends
in asking providers to contribute in upstream connectivity.
This talk will give you an outline of what the NOC people do - beginning
month before congress doors open.

23c3 network concept is based on the experiences of the last congresses So this
talk will show you, why network is the way it is.
Focus of this talk is wired network from access layer to the backbone
and our Wireless LAN.
It intends to give network administrators a brief overview of our
approach to meet all requirements.</description>
    <persons>
     <person id="290">Stefan Wahl</person>
     <person id="1310">Niels Bakker</person>
     <person id="610">Maxim Salomon</person>
     <person id="454">Elisa Jasinska</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 3">
   <event id="1560">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>csrf</tag>
    <title>CSRF, the Intranet and You</title>
    <subtitle>Causes, Attacks and Countermeasures</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>A detailed introduction to Cross Site Request Forgery. This talk presents the fundamental cause of this vulnerability class and examples of potential attack consequences. The second half of the talk is devoted to avoiding and countering CSRF: Implementing CSRF proof session handling, transparent retrofitting of legacy applications and methods for client side protection.</abstract>
    <description>Cross Site Request Forgery (CSRF, a.k.a. Session Riding) attacks are public at least since 2001. However this class of web application vulnerabilities is rather obscure compared to attack vectors like Cross Site Scripting or SQL Injection. As the trend towards web applications continues and an increasing number of local programs and appliances like firewalls rely on web based frontends, the attack surface for CSRF grows continuously. 

While being is some cases as dangerous as e.g. Cross Site Scripting, CSRF vulnerabilities are often regarded as negligible. Moreover, this vulnerability class is often simply unknown to some web application developers. Many misconceptions on countering CSRF exist because of this obscurity. The talk will not only show how to avoid XSRF but also how NOT to do it. Furthermore, most presentations on CSRF only address attacks on cookie based session management. This talk will also cover attacks on http authentication, client side SSL and IP/Mac based access control.  

CSRF is an attack that targets the user rather than the web application. As long as web applications do not take measures to protect their users against this threat, it is important to investigate possibilities to implement client side mechanisms. This talk will cover a new anti-CSRF Firefox Extension, which is currently under development as well as "RequestRodeo" - a client side proxy, which was, to the best of our knowledge, the first client-side solution for protection against XSRF attacks.</description>
    <persons>
     <person id="1214">Justus Winter</person>
     <person id="683">Martin Johns</person>
    </persons>
    <links>
     <link href="https://www.isecpartners.com/documents/XSRF_Paper.pdf">Cross Site Reference Forgery - An introduction to a common web application weakness</link>
     <link href="http://www.informatik.uni-hamburg.de/SVS/papers/2006_owasp_RequestRodeo.pdf">RequestRodeo - Client Side Protection against Session Riding</link>
     <link href="http://www.seclab.tuwien.ac.at/papers/noforge.pdf">NoForge - Preventing Cross Site Request Forgery Attacks</link>
    </links>
   </event>
   <event id="1627">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>software_reliability</tag>
    <title>Software Reliability in Aerospace</title>
    <subtitle>An overview on design and generation of safe and reliable Software</subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>The challenge of designing reliable is managed different in every
industry. This lecture will give an overview how safety critical and
reliable software is designed and produced in the area of aerospace
industry and why this could also be interesting for other
applications (like web-design)</abstract>
    <description>"The greatest of faults, I should say, is to be conscious of none. " - Thomas Carlyle

It is the humans most valuable gift to be unprescise &#8211; as many new things would not be discovered otherwise. But for reliable (software) development this evolutionary gift turns to be a big challenge as the final product shall not contain any faults. 
This lecture is about preventing development faults on the example of the aerospace and automotive industry.

Part one of this lecture is a basic introduction why reliability is an issue at all. It is obvious that a failure in the primary flight control will seriously endanger the live of people. But buried under  functionality of a e.g. Web-application the criticality of these application cannot easily recognized. Often these application are not directly live threatening, but the loss of the income source also endangers lives (at least the quality). 

Part two will introduce the DO-178B standard with which the aerospace industry tries to handle the reliability challenge. The basic idea of this quality standard is very simple: &#8220;SW shall contain only functionality it has to&#8221;. To achieve this postulate the DO-178B specifies a series of processes and documents (which can be seen as artefacts of these processes). Of course some examples will illustrate this part.

The last part will summarize the lecture and gives some ideas on the (re-)usage of the described methods for &#8220;classic&#8221; (non-safety critical) application.</description>
    <persons>
     <person id="692">Erwin Erkinger</person>
    </persons>
    <links>
     <link href="http://www.heise.de/newsticker/result.xhtml?url=/newsticker/meldung/63304&amp;words=Fehler%20Dell">Dell Webshop &#8211; PC for 5,33&#8364;</link>
     <link href="http://en.wikipedia.org/wiki/Apollo_Guidance_Computer">Apollo Guidance Computer</link>
     <link href="http://www.ustinov.at/institut.htm">Sir Peter Ustinov Institut zur Erforschung und Bek&#228;mpfung von Vorurteilen</link>
     <link href="http://www.rvs.uni-bielefeld.de/publications/compendium/index.html">Computer-Related Incidents with Commercial Aircraft</link>
     <link href="http://www.leshatton.org/">Les Hatton &#8211; Safer C</link>
     <link href="http://www.easa.eu.int/level1/index.php">EASA</link>
     <link href="http://highrely.com/do178b_questions.php">DO-178B FAQ</link>
    </links>
   </event>
   <event id="1347">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>we_are_great_together</tag>
    <title>"We are great together, the liberal society and its enemies!"</title>
    <subtitle>monochrom</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>englisch</language>
    <abstract>A talk medley from monochrom, a worldwide operating collective from Vienna dealing with technology, art, context hacking, and philosophy which was founded in 1993. They specialize in an unpeculiar mixture of proto-aesthetic fringe work, pop attitude, subcultural science, and political activism. Their mission is conducted everywhere, but first and foremost "in culture-archaeological digs into the seats (and pockets) of ideology and entertainment".</abstract>
    <description>This session will be a little tour-de-farce about their projects and political motivation. A joyful bucket full of good clean fanaticism, crisis, language, culture, self-content, identity, utopia, mania and despair, condensed into the well known cultural technique of a gala show.

Among their projects, monochrom has released a leftist retro-gaming project, established a one baud semaphore line through the streets of San Francisco, started an illegal space race through Los Angeles, buried people alive in Vancouver, and cracked the hierarchies of the art system with the Thomann Project. In Austria they ate blood sausages made from their own blood in order to criticize the grotesque neoliberal formation of the world economy. Sometimes they compose melancholic pop songs about dying media and they have hosted the first annual festival concerned with cocktail robotics. At the moment they're planning a conference about pornography as one of the driving forces of technological innovation. They also do international soul trade, propaganda camps, epic puppet theater, aesthetic pregnancy counseling, food catering, and - sorry to mention - modern dance.</description>
    <persons>
     <person id="962">Johannes Grenzfurthner</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1452">
    <start>16:00</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>critical_theory_and_chaos</tag>
    <title>Chaos und Kritische Theorie</title>
    <subtitle>Adorno, Wilson und Diskordianismus</subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Kritische Theorie, wie sie sich vor allem an Adorno festmachen l&#228;sst, und Diskordianismus, der als Philosophie des Chaos zum Namensgeber des veranstaltenden Vereins wurde, geh&#246;ren zu den am weistesten verbreiteten Elementen des 'social hacking'. Jedoch ist gerade in den letzten Jahren des Adbusting und des Hacktivism un&#252;bersehbar geworden, da&#223; von beiden Denktraditionen in der Hauptsache stark vereinfachte und oft auch ideologisch abgeschlossene Formen Verwendung finden: Kritische Theorie wird zumeist auf ein unbestimmtes Unbehagen an der Kulturindustrie, der Globalisierung und den technologischen Entwickungen reduziert, w&#228;hrend Diskordianismus zur Illustration oft bedenklicher Parteinahmen f&#252;r irrationale politische Auffassungen dient. Im Vortrag wird der Versuch unternommen, die Kritische Theorie dem diskordischen Witz auszusetzen und den Diskordianismus der Ideologiekritik.</abstract>
    <description>W&#228;hrend Wilson sich zahllosen Realit&#228;tstunneln in Teilnehmender Beobachtung aussetzt, in jeden Abgrund schaut und sich m&#246;glicherweise experimentell hineinfallen l&#228;sst, denkt die Kritische Theorie vom Wissen um den Holocaust, dem einen gro&#223;en Abgrund aus, dessen Wiederholung es unbedingt zu vermeiden gilt. Und w&#228;hrend vieles ihrem Blick entgeht, kann man Wilsons Neophilie und Optimismus, seinem Vorspielen von M&#246;glichkeiten und nichts zuletzt der teilweise an Selbsthilfe-Handb&#252;cher gemahnenden Aufforderung, neue M&#246;glichkeiten des eigenen Nervensystems zu spielen, vorwerfen, den Fokus von den gesellschaftlichen Verh&#228;ltnissen weg und auf die (Eigen-)Schuld des Einzelnen zu richten. Wobei auch der Kritischen Theorie klar ist, dass die Verh&#228;ltnisse so sind, wie sie sind, weil sie von jedem einzelnen st&#228;ndig reproduziert werden. Eine Huhn-oder-Ei-Frage also? Alles blo&#223; eine Frage der Perspektive?

Wenn nun der Versuch unternommen wird, die Kritische Theorie dem diskordischen Witz auszusetzen und den Diskordianismus der Ideologiekritik, soll es dabei um zweierlei gehen:

Erstens um eine Freilegung des jeweiligen Potentials, um die Frage danach, worin sich die popul&#228;re Version von diesem Potential unterscheidet oder ihm gar entgegensteht. Hierzu wird die diskordische Infragestellung des je eigenen Standpunktes der intellektuellen Autorit&#228;tsvorstellung der Kritischen Theorie entgegengehalten und andersherum die vermeintliche diskordische Offenheit, etwa im verschw&#246;rungstheoretischen Diskurs, ideologiekritisch betrachtet. Es wird diskordische Witze &#252;ber Adorno geben und in der Gegenrichtung adornitische Humorkritik.

Zweitens soll es um die M&#246;glichkeiten der wechselseitigen Anregung gehen, wobei zu diskutieren sein wird, inwiefern diese Wechselwirkung wegen der verschiedenen sozialen und politischen Hintergr&#252;nde der beiden Denktraditionen nicht zustande kommt. Hier wird das jeweilige Bild vom andern interessieren und die Frage, welche Szenen und Bewegungen sich jeweils aus welchen Motiven f&#252;r eine der beiden Ideengeb&#228;ude entschieden haben. Zur Diskussion stellen sich die M&#246;glichkeiten einer kritischen Bewaffnung des Chaos und eine Psychedelisierung der Kritischen Theorie.</description>
    <persons>
     <person id="476">Daniel Kulla</person>
     <person id="664">Oona Leganovic</person>
    </persons>
    <links>
     <link href="http://www.classless.org">Daniel Kulla weblog</link>
     <link href="http://www.scrupeda.net/wordpress">Oona Leganovic weblog</link>
    </links>
   </event>
   <event id="1593">
    <start>17:15</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>krypta</tag>
    <title>Krypta: DIY Serverhousing</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Funkfeuer (0xFF), als freie Netzwerkinitiative in Wien eine Schwester von Freifunk, begann vor 2 Jahren damit ein "Community Serverhousing" aufzubauen. Wie beim Aufstellen von WLan Router, stoesst man dabei auf logistische, technische und soziale Aufgaben, die es zu loesen gilt um erfolgreich kostendeckend in Betrieb gehen zu koennen.</abstract>
    <description>Dieser Vortrag soll vermitteln wie es moeglich werden kann, mit wenigen Mitteln und viel Lobbying zu einem kuehlen, dunkeln Ort zu kommen in dem Rechner zusammenfinden und sich wohlfuehlen. 

Das "wenige Mittel" sollte vielleicht ein bisserl relativiert werden - wir haben hier 1 GBit ueber Glas zum VIX (vienna internet exchange). Der Titel sollte moeglicherweise geaendert werden in "DIY lowcost ISPgrade Housing". Wir (ich hoff ich mach das nicht allein) haben da auch ein paar Filmchen vom Wandeinreissen, ner Fuehrung durch die Lokatino, Schotter der ueber die Rutsche runterkommt, usw. usf.

Folgende Punkte haetten wir gern erlaeutert

.) Uebersicht ueber die Technik wir arbeiten 
   - warum willst du Fiber nicht selbst splicen wenn du es noch nie getan hast (Don'ts)
   - wie wir BGP fahren und warum da OS-Wars egal werden. (HW Auswahl, Konfig, VLans und der ganze Schmafu)
   - Staub ist boese, reiss keine Waende ein ohne vorher zu ueberlegen.
   - Warum du nen Physiker dabei haben willst (Stroemungslehre fuer arme) - Ventilation
   - Medienkonverter sind gemeine kleine Biester
   - The Redeemer unser Provisioning - http://sourceforge.net/projects/redeemer/

.) Soziale und Logistische Aufgabenstellungen:
   - wie wir zur eigenen AS gekommen sind. (RIPE, lobbying bei den ISPs)
     - was macht RIPE ueberhaupt, wieso IP Adressen nicht unbedingt zuhauf fuer jeden verfuegbar sind und ab wann ihr zahlt
   - warum kosten 20GB Transfer in .at 39,90 &#8364; und was 1 TB internationaler/nationaler Traffic kostet
   - auswahl der Lokation - Gegengeschaeft rentieren sich
   - Die natuerliche Grenze unserer Farm
   - Irgendjemand muss das zahlen - und warum du daraus kein Termingeschaeft mit "Kunden" machen moechtest
     - Worauf und Mit wem du dich nicht einlassen moechtest
   - Warum wir das machen - und "Kabelsalat ist gesund" nur eine Motivation ist.

.) Zukunft, laufende Projekte
   - KaOS - KryptaOS  Umweltkontrollsystem, LART Tool, Schliess- und Ueberwachungsystem ueber ne Konsole
   - GBit to every NIC (or at least to our Router)</description>
    <persons>
     <person id="1328">Chris Kummerer</person>
     <person id="1293">Markus Sulzbacher</person>
     <person id="1292">Andreas Marksteiner</person>
     <person id="904">Teemu Schaabl</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1729">
    <start>18:30</start>
    <duration>01:00</duration>
    <room>Saal 3</room>
    <tag>gesundheitskarte_101</tag>
    <title>Gesundheitskarte 1.01</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Haben die Gesundheitskarte-Projektleiter aus den bisherigen Fehlern gelernt oder machen sie alles nur noch schlimmer?

Die Projekt-Firma (gematik) hat sich jetzt den Gesch&#228;ftsf&#252;hrer von FISCUS (dem monstr&#246;s verkackten Finanzamt-Software-Gro&#223;projekt) als Gesch&#228;ftsf&#252;hrer ins Boot geholt.  Es ist nicht auf Anhieb klar, wie man das als gutes Zeichen auslegen kann.</abstract>
    <description></description>
    <persons>
     <person id="470">ThoMaus</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
  <room name="Saal 4">
   <event id="1494">
    <start>11:30</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>ego_striptease</tag>
    <title>Ego Striptease - Ich zeig dir, wer du bist</title>
    <subtitle>Blogs, flickr, etc: warum machen wir es ihnen so einfach?</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Als Orkut aufkam, gab es zwei Sorten Menschen: die einen wetteiferten um die meisten Invitations, die anderen sch&#252;ttelten den Kopf ob der Bereitwilligkeit, eine Datenkrake zu f&#252;ttern. Heute manifestiert sich das Ph&#228;nomen als flickr, del.icio.us, upcoming.org und blog - kurz gesagt "soziale Web 2.0 Anwendungen". Wieso lassen wir uns alle so bereitwillig taggen, kommentieren und outen?</abstract>
    <description>In Kreisen, in welchen Datenschutz und Informationsfreiheit am meisten diskutiert werden, finden sich verst&#228;rkt jene, die einen wahres Datensammelsurium ihrer selbst hinterlassen - sei es in ihrem Blog, in dem sie ueber ihren Umzug und die neue Wohnung berichten, sei es in kollaborativen Fotogallerien, in denen sie sich mit anderen Hackern beim Grillen ablichten lassen, sei es in Form von Favoritenlisten von Heimvideoseiten oder in kollaborativen Linksammlungen. Dies erscheint wahrscheinlich nicht nur uns paradox. 

Wie kommt es, dass wir, die es besser wissen muessten, uns so bereitwillig all jenen ausliefern, die mit diesen Daten etwas anzufangen wissen? Ist es wirklich nur Technikverliebtheit, um beim neusten, tollsten, buntesten Tool ganz vorne mit dabei zu sein? Unerkannt und anonym zu bleiben war doch mal wichtig. Hat es $agency wirklich n&#246;tig, uns abzuh&#246;ren, um zu wissen mit wem wir wann wo reden oder wie unsere politische Gesinnung ist?</description>
    <persons>
     <person id="904">Teemu Schaabl</person>
     <person id="439">Jule Riede-Buechele</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1416">
    <start>12:45</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>juristische_fragen_um_die_mitbenutzung_fremder_wlans</tag>
    <title>Juristische Fragen um die Mitbenutzung fremder WLANs</title>
    <subtitle>Zivilrechtliche und strafrechtliche Haftung</subtitle>
    <track>Society</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>Der Vortrag gibt einen &#220;berblick &#252;ber den rechtlichen Rahmen des WLAN-Surfens im Zivil- und Strafrecht mit aktueller Rechtsprechungs&#252;bersicht.</abstract>
    <description>Der Vortrag besch&#228;ftigt sich mit den rechtlichen Problemen im Zivil- und Strafrecht der unerlaubten Mitbenutzung von Funknetzen. Differenziert nach gesch&#252;tzen und ungesch&#252;tzten Netzen hat der Schwarzsurfer mit Schadens-, Bereicherungs- und Unterlassungsanspr&#252;chen zu rechnen, teilweise sogar mit strafrechtlichen Sanktionen. Ein &#220;berblick &#252;ber die aktuelle Rechtsprechung rundet den Vortrag ab. Die aktuellen &#196;nderungen durch das bevorstehende Computerstrafrechts-&#196;nderungsgesetz werden in einem Ausblick vorgestellt.</description>
    <persons>
     <person id="1032">soeren</person>
    </persons>
    <links>
     <link href="http://www.opus-bayern.de/uni-regensburg/volltexte/2006/626/html/schwarzsurfen.pdf">Die zivilrechtliche Haftung f&#252;r die unerlaubte Mitbenutzung privater Funknetze</link>
     <link href="http://www.andreas-gietl.de">Homepage des Referenten</link>
    </links>
   </event>
   <event id="1616">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Saal 4</room>
    <tag>nerds_und_geeks</tag>
    <title>Nerds und Geeks zwischen Stereotyp und Subkultur</title>
    <subtitle>Eine kulturanthropologische Untersuchung</subtitle>
    <track>Culture</track>
    <type>Vortrag</type>
    <language>deutsch</language>
    <abstract>In dem Vortrag sollen die Ergebnisse einer kulturwissenschaftlichen Forschungsarbeit vorgestellt und diskutiert werden. Dabei wird der Begriff Nerd eher als Konstrukt, und weniger als gegeben betrachtet. Vorgestellt werden vor allem die Ergebnisse aus Interviews, teilnehmender Beobachtung und einer qualitativen Umfrage.</abstract>
    <description>&#8222;Vor einem Jahr h&#246;rte ich erstmals das Wort Nerd. Von einer Amerikanerin erfuhr ich, dass man w&#228;hrend ihrer Highschool-Zeit vor zwanzig Jahren zuerst kein passendes f&#252;r diese, bei den Studentinnen weniger beliebten Kommilitonen gekannt habe, aber pl&#246;tzlich w&#228;re Nerd aufgetaucht und alle w&#228;ren f&#252;r dieses dringend ben&#246;tigte Word dankbar gewesen wie f&#252;r einen lang ersehnten Regenschauer.&#8220; 
Diese Feststellung, die Max Goldt in seinem Aufsatz aus dem Jahre 1998 &#252;ber das Wesen des Begriffs &#8222;Nerd&#8220; macht, charakterisiert im Ansatz die Diffusit&#228;t der Konnotationen, die im Zusammenhang mit diesem, im deutschen Sprachraum relativ jungen Begriff anklingen. 
Im englischsprachigen Raum hat er eine l&#228;ngere Geschichte und findet dadurch auch im wissenschaftlichen Diskurs Niederschlag. Eine Definition des Konstruktes ist dort also viel eher m&#246;glich. In Deutschland ist der Begriff deutlich j&#252;nger und dadurch wesentlich schlechter zu definieren. Und umgekehrt ist das Konstrukt in keiner Weise begrifflich greifbar oder definierbar. Vielmehr existieren mehrere Begriffe nebeneinander. Also stehen wir vor zwei Problemen: Einerseits bestehen f&#252;r denselben Begriff verschiedene Bedeutungen, die von dem klassischen US-amerikanischen Bild des Strebers bis hin zu dem einsamen, autistischen Computer-Freak reichen. Andererseits existieren unterschiedliche Stereotype, die im Sprachgebrauch oft nur unklar und diffus umrissen sind.
Als Folge der immer gr&#246;&#223;er werdenden Bedeutung von Computern und Technik in unserem Leben, hat sich ein neues Stereotypbild herausgebildet, das, obwohl nicht immer namentlich bekannt, doch eine weite Verbreitung gewonnen hat. Das Bild des oft langhaarigen, blassen, bebrillten Einzelg&#228;ngers, der nur vor dem Computer sitzt, wird meist durch wenige Schl&#252;sselw&#246;rter erkannt und eingeordnet und hat somit einen hohen Wiedererkennungswert. Dabei nimmt der Computer mittlerweile eine Schl&#252;sselrolle ein. Ein Nerd wird, dem Stereotyp zufolge, in erster Linie &#252;ber die intensive Besch&#228;ftigung mit seinem Computer definiert, die jeglichen Bet&#228;tigungen im sozialen Umfeld, beziehungsweise mit der eigenen K&#246;rperkultur, unterbindet. &#220;berspitzt formuliert: F&#252;r soziale Kontakte oder K&#246;rperpflege fehlt dem Nerd die Zeit.
Es w&#228;re allerdings falsch, im Rahmen einer m&#246;glichst umfassenden Betrachtung nur dem Stereotyp Aufmerksamkeit zu widmen. Vielmehr hat sich in den letzten Jahren auch eine Art Subkultur gebildet, f&#252;r die der Begriff &#8222;Nerd&#8220; nichts Abwertendes mehr darstellt, sondern vielmehr die Gelegenheit gibt, eine eigene Identit&#228;t zu schaffen und sich dadurch aufzuwerten.
In diesem Vortrag soll versucht werden, sich dem Konstrukt und auch dem Ph&#228;nomen des Nerds auf Basis einer empirischen-kulturwissenschaftlichen Analyse, vorsichtig anzun&#228;hern und dem Konstrukt und Ph&#228;nomen &#8222;Nerd&#8220; im deutschsprachigen Raum einen zumindest partiellen volkskundlichen Zugang zu verschaffen. Es sollen die Ergebnisse aus Interviews, Umfragen und teilnehmender Beobachtung erl&#228;utert und gerne auch diskutiert werden.</description>
    <persons>
     <person id="1181">Mareike Gl&#246;&#223;</person>
    </persons>
    <links>
    </links>
   </event>
   <event id="1517">
    <start>16:00</start>
    <duration>02:00</duration>
    <room>Saal 4</room>
    <tag>lightning_talks_day_4</tag>
    <title>Lightning Talks Day 4</title>
    <subtitle></subtitle>
    <track></track>
    <type>Lightning-Talk</type>
    <language></language>
    <abstract>Definition: Lightning Talks is a daily event. which consists in one
hour of several short talks. Each talk is limited to five minutes.

Goal: There is one slot for Lightning Talks each day of the
congress.  The goal is to present 10 talks within each slot.
So this might be up to 40 interesting talks in total.

See the Wiki page for current info.</abstract>
    <description></description>
    <persons>
     <person id="193">Sven Guckes</person>
     <person id="136">b9punk</person>
    </persons>
    <links>
     <link href="http://events.ccc.de/congress/2006/Lightning_Talks">Wiki page</link>
    </links>
   </event>
  </room>
  <room name="Workshop Area">
   <event id="1774">
    <start>11:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>one_laptop_per_chilp</tag>
    <title>One Laptop per Child</title>
    <subtitle>project proposals</subtitle>
    <track>Society</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>What tools do children need to learn to understand and hack their own environment? Specific proposals of collections of beauty, stories, visualizations, tools, games and more.</abstract>
    <description></description>
    <persons>
     <person id="1333">sj</person>
    </persons>
    <links>
     <link href="http://laptop.org/">One laptop per child website</link>
    </links>
   </event>
   <event id="1720">
    <start>12:00</start>
    <duration>01:45</duration>
    <room>Workshop Area</room>
    <tag>gephex</tag>
    <title>AVIT&gt;C23: gephex - VJing on Linux</title>
    <subtitle>workshop by sMIG</subtitle>
    <track>Science</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>Gephex is a modular video jockey software. The base visuals can be chosen from sources like video files or cameras. Then they can be modified by filters and mixers. Each modifier has several parameters, that can be controlled by signal-generators, input devices like joysticks, sound cards, or midi-devices.</abstract>
    <description>Gephex runs on GNU/Linux, Win32, Mac OS X, and FreeBSD. The effect engine is independent from the user interface, which can be de- and attached at runtime. All effects and media streams are extendible by plugins. Gephex is written in C++.</description>
    <persons>
     <person id="1327">Visual Berlin</person>
    </persons>
    <links>
     <link href="http://svens.ath.cx/darcs/gephex&#8211;svens">http://svens.ath.cx/darcs/gephex&#8211;svens</link>
    </links>
   </event>
   <event id="1755">
    <start>14:00</start>
    <duration>01:00</duration>
    <room>Workshop Area</room>
    <tag>german_lobjan_meeting</tag>
    <title>German Lojban meeting</title>
    <subtitle></subtitle>
    <track>Community</track>
    <type>Treffen</type>
    <language>englisch</language>
    <abstract>A chance to meet other European lojbanists and to discuss actions to build up a stronger German lojban community.</abstract>
    <description></description>
    <persons>
     <person id="1306">Alexander Koch</person>
    </persons>
    <links>
     <link href="https://events.ccc.de/congress/2005/fahrplan/events/569.en.html">Lojban - A Hackers' Spoken Language</link>
     <link href="http://de.wikipedia.org/wiki/Lojban">http://de.wikipedia.org/wiki/Lojban</link>
     <link href="http://en.wikipedia.org/wiki/Lojban">http://en.wikipedia.org/wiki/Lojban</link>
    </links>
   </event>
   <event id="1777">
    <start>16:00</start>
    <duration>01:30</duration>
    <room>Workshop Area</room>
    <tag>3l</tag>
    <title>AVIT&gt;C23: 3L ('thrill') VJ Software</title>
    <subtitle></subtitle>
    <track>Hacking</track>
    <type>Workshop</type>
    <language>englisch</language>
    <abstract>artificialeyes.tv have been working for over one year on a new software for commercial release, coded in c, java, and utilizing the max/msp/jittter programming environment to create a universal binary release taking advantage of the latest intel processor power advances recently integrated into the apple platform. 3L stands for 3 levels of 3D creation and compositing, with granular control over all aspects of analysis and manipulation of mesh objects mapped with video in real time.</abstract>
    <description>The software attempts to bridge the divide between tools such as processing and vvvv with more user friendly live performance toolboxes such as modul8 and grid pro. With it's revolutionary slider design, which allows not only micro-granular control over all data streams but allows the linking of sliders and parameters in a manner similar to audio programs such as ableton live or cubase, 3L puts all controls at the performer's fingertips with a minimum of effort. Standard features include a full featured preset system allowing interpolation between any two presets of multiple parameters. Mesh objects and 3D models can be mapped with any selection of four individual movie players, text and gradient synthesizers, as well as live inputs. A feature rich shader set takes all graphic processing off of the CPU and puts it on the GPU where it belongs for blazing fast fx performance. Scheduled for commercial release in January 2007, this will be the first public presentation of this unique new real-time 3d performance tool for VJ's and generative visual artists.</description>
    <persons>
     <person id="1327">Visual Berlin</person>
    </persons>
    <links>
    </links>
   </event>
  </room>
 </day>
</schedule>
