<?xml version="1.0" encoding="UTF-8"?>
<schedule>
  <conference>
    <title>24th Chaos Communication Congress</title>
    <subtitle>Volldampf voraus!</subtitle>
    <venue>Berliner Congress Center (bcc)</venue>
    <city>Berlin</city>
    <start>2007-12-27</start>
    <end>2007-12-30</end>
    <days>4</days>
    <release>1.01</release>
    <day_change>10:00</day_change>
    <timeslot_duration>00:15</timeslot_duration>
  </conference>
  <day date="2007-12-27" index="1">
    <room name="Saal 1">
      <event id="2366">
        <start>11:00</start>
        <duration>00:30</duration>
        <room>Saal 1</room>
        <tag>opening_event</tag>
        <title>Opening Event</title>
        <subtitle>Welcome everybody!</subtitle>
        <track>Community</track>
        <type>other</type>
        <language>en</language>
        <abstract>Welcome to the Congress!</abstract>
        <description></description>
        <persons>
          <person id="4">Tim Pritlove</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2338">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>steam_powered_telegraphy</tag>
        <title>Steam-Powered Telegraphy </title>
        <subtitle>A League of Telextraordinary Gentlemen present the marvel of Telex on the Net - driven by a steam engine</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We have built and modified a steam-powered Telex machine and connected it to the new-fangled invention for modern telegraphy known as "the Internet". We will present this steampunkish invention in form of a lecture, thus hoping to enlighten interested ladies and gentlemen on the principles of steam engine physics, 5-bit Baudot encoding, and historic telegraphy in general. </abstract>
        <description>"The Magnetic Telegraph annihilates distance. So complete is this annihilation that the newspapers at Baltimore have made arrangements to report the proceedings of congress by telegraph, so as to have the intelligence from the capital (40 miles distant) as soon even as the Washington papers. A like effect will happen when the line is established between New York and Boston. The news from Europe brought by the Boston packet will be known in New York (220 miles distant) as soon as it is in Boston." -- Albany Argus, The Magnetic Telegraph, 1845.

Telegraphy truly holds the potential to connect the world, from the icy lands of Russian Alaska to the centres of modern progress in Manchester and London and the farest corners of Her Majesty's Empire in India or former colonies in America.

Over the last few months, a League of Telextraordinary Gentlemen at the Chaos Computer Club Cologne, after having acquired a historic Telex machine, have built a steampunkish modification of said machine, making it probably the first steam-powered telegraph connected to the new-fangled invention for modern telegraphy known as "the Internet".

Our technical spectacluar will include all our learnings about the basics of our apparatus:

* steam engineering
* the history of telegraphy and Telex 
* the Telex standard and its 5-bit Baudot encoding
* the embedded list of calculation for machines or "software" we used for making the Telex machine an RSS reader and a Jabber client

While we plan to present this lecture in appropriate dressing (frock coats etc.), we do not plan to give the audience a special dress-code.  </description>
        <persons>
          <person id="13">Jens Ohlig</person>
          <person id="376">Ingo Schwitters</person>
          <person id="1782">Sebastian Velke</person>
          <person id="1783">SkyTee</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2338-en-steam_powered_telegraphy.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2338-en-steam_powered_telegraphy.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2363">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>der_bundestrojaner</tag>
        <title>Der Bundestrojaner</title>
        <subtitle>Die Wahrheit haben wir auch nicht, aber gute Mythen</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Bundestrojaner wird von politischer, juristischer und technischer Seite beleuchtet.
</abstract>
        <description>Die sich nun Monate hinziehende Debatte um die heimliche Ausspionierung von Festplatten ist gekennzeichnet von technischen Fehlinterpretationen und politischen Forderungen, die wenig mit der tats&#228;chlichen Leistungsf&#228;higkeit von Spionageprogrammen zu tun haben und zudem grundgesetzliche Anforderungen ignorieren. 
Der CCC hat vor dem Bundesverfassungsgericht Stellung genommen zu den technischen Fragestellungen hinsichtlich des Schutzes des Kernbereichs privater Lebensgestaltung und tr&#228;gt die Kernpunkte des Gutachtens als Diskussionsgrundlage vor. </description>
        <persons>
          <person id="91">Andreas Bogk</person>
          <person id="381">Constanze Kurz</person>
          <person id="1046">Felix von Leitner</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2363-de-der_bundestrojaner.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2363-de-der_bundestrojaner.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2382">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>tor</tag>
        <title>TOR</title>
        <subtitle></subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Die Vortragenden berichten &#252;ber den Betrieb und das Abuse-Handling des Anonymisierers. </abstract>
        <description>Weitere Aspekte werden er&#246;rtert: Was plant der CCC hinsichtlich Anonymisierungstechniken? Welche Angebote kann der Club Exit-Node-Betreibern machen, wenn sie das Risiko einer Hausdurchsuchung nicht eingehen k&#246;nnen?</description>
        <persons>
          <person id="86">Julius Mittenzwei</person>
          <person id="243">Erdgeist</person>
          <person id="7">Andreas Lehner</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2382-de-tor.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2382-de-tor.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2342">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>it_was_a_bad_idea_anyway</tag>
        <title>It was a bad idea anyway...</title>
        <subtitle>The demise of electronic voting in The Netherlands</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>2007 has been yet another a turbulent year in The Netherlands with regard to electronic voting. If you remember the presentation at 23c3, 2006 saw the emergence of a campaign against the use of non-auditable voting systems. </abstract>
        <description>As a result, two government commissions were appointed, the OSCE monitored a national election and one Windows-based touch screen system with a GPRS-wireless card lost its approval. 2007 saw the re-approval and de-approval of this same system, on grounds that have little to do with the main problems of non-auditability and presumed insecurity. We also got the reports from the OSCE as well as from the two government commissions. For a long time, the dutch government tried desperately to keep the Nedap systems around until something new could be built. We fought back, both in the political arena and in court. This past september, government gave up, and announced decertification of the last remaining electonic voting systems made by Nedap.

This is true victory worth celebrating. But dutch people abroad can still vote over the Internet and we need to watch the new electronic voting system the dutch government seems to want to develop. And we need to make sure e-voting doesn't return as a pan-European project.
</description>
        <persons>
          <person id="235">Rop Gonggrijp</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2342-en-it_was_a_bad_idea_anyway.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2342-en-it_was_a_bad_idea_anyway.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2380">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>nedap_wahlcomputer_in_deutschland</tag>
        <title>NEDAP-Wahlcomputer in Deutschland</title>
        <subtitle></subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wir bringen Euch auf den neuesten Stand, was den Einsatz der NEDAP-Wahlcomputer in Deutschland betrifft.</abstract>
        <description></description>
        <persons>
          <person id="9">Frank Rieger</person>
          <person id="381">Constanze Kurz</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2380-de-nedap_wahlcomputer_in_deutschland.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2380-de-nedap_wahlcomputer_in_deutschland.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2381">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>what_is_terrorism</tag>
        <title>What is terrorism?</title>
        <subtitle>And who is terrorising whom?</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Life as the partner of a terrorism suspect means living with police and secret service surveillance: phone tapping, video cameras pointing at your doors, plain-clothed police following your every step, e-mail and internet access being monitored etc etc.</abstract>
        <description>My partner Andrej Holm was arrested July 31 this year because roughly one year before German police found his writings on gentrification, together with him being a political activist and not always taking his mobile phone along, suspicious enough to start a terrorism investigation. It's a bit more complicated than that, but that's basically it. After he was arrested at gunpoint in our apartment at 7 am in the morning I realised that I, too, was the focus of surveillance. As were colleagues, friends
and family. It was made quite clear that we were meant to notice.

My partner was released from prison after three weeks and by now the terrorism charges were taken back and turned into accusations of having formed a 'criminal organisation'.

After the initial shock I started blogging about everyday life with surveillance.</description>
        <persons>
          <person id="1834">Anne Roth</person>
        </persons>
        <links>
          <link href="http://annalist.noblogs.org">Blog: annalist</link>
          <link href="http://einstellung.so36.net/en">End to the &#167;129a proceedings</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2381-en-what_is_terrorism.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2381-en-what_is_terrorism.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2258">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>design_noir</tag>
        <title>Design Noir</title>
        <subtitle>The seedy underbelly of electronic engineering</subtitle>
        <track>Culture</track>
        <type></type>
        <language>en</language>
        <abstract>Design noir is what happens when engineers, artists and hackers get together to design consumer electronics.
I'll present some examples, including my own projects and collaborations
Cell phone jammers, TV-B-Gone devices, high-voltage jackets...lots of fun!</abstract>
        <description>"In contemporary Western society, electronic devices are becoming so prevalent that many people find themselves surrounded by technologies they find frustrating or annoying. The electronics industry has little incentive to address this complaint; I designed two counter-technologies to help people defend their personal space from unwanted electronic intrusion. Both devices were designed and prototyped with reference to the culture-jamming &#8220;Design Noir&#8221; philosophy. The first is a pair of glasses that darken whenever a television is in view. The second is low-power RF jammer capable of preventing cell phones or similarly intrusive wireless devices from operating within a user&#8217;s personal space. By building functional prototypes that reflect equal consideration of technical and social issues, I identify three attributes of Noir products: Personal empowerment, participation in a critical discourse, and subversion."</description>
        <persons>
          <person id="1733">ladyada</person>
        </persons>
        <links>
          <link href="http://www.ladyada.net/make/wavebubble/">http://www.ladyada.net/make/wavebubble/</link>
          <link href="http://www.ladyada.net/make/tvbgone/">http://www.ladyada.net/make/tvbgone/</link>
          <link href="http://www.ladyada.net/pub/research.html">http://www.ladyada.net/pub/research.html</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2258-en-design_noir.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2258-en-design_noir.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2329">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>change_me</tag>
        <title>Programming DNA</title>
        <subtitle>A 2-bit language for engineering biology</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Biological engineering does not have to be confined to the laboratories of high-end industry laboratories. Rather, it is desirable to foster a more open culture of biological technology. This talk is an effort to do so; it aims to equip you with basic practical knowledge of biological engineering.</abstract>
        <description>Genetic engineering is now a thirty year old technology. For reference, over a similar period of time, modern computing machines went from exclusive objects used to design weapons of mass destruction, to the now ubiquitous panoply of personal computing devices that support mass communication and construction. 
Inspired by this and many other past examples of the overwhelmingly constructive uses of technology by individuals, we have been working over the past five years to develop new tools that will help to make biology easy to engineer. We have also been working to foster a constructive culture of future biological technologists, who can reliably and responsibly conceive, develop, and deliver biological technologies that solve local problems.  

This talk will introduce current best practice in biological engineering, including an overview of how to order
synthetic DNA and how to use and contribute standard biological parts to an open source collection of genetic functions. The talk will also discuss issues of human practice, including biological safety, biological security, ownership, sharing, and innovation in biotechnology, community organization, and perception across many
different publics. My hope is that the conferees of 24C3 will help me to understand how to best enable an overwhelmingly constructive hacker culture for programming DNA.
</description>
        <persons>
          <person id="1770">Drew Endy</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2329-en-change_me.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2329-en-change_me.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2393">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>dns_rebinding_packet_tricks</tag>
        <title>DNS Rebinding And More Packet Tricks</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>DNS Rebinding has proved itself to be an effective mechanism for turning standard web browsers into proxy servers.  This talk will go into further depth regarding mechanisms for hijacking browser connectivity, and will illustrate some new tricks for measuring network neutrality.</abstract>
        <description>Having already shown some basic aspects of this attack at previous conferences, we'll be expanding DNS rebinding to show demos not dependent on Flash - specifically, we'll be going after home routers that really, really need to stop having default passwords.
</description>
        <persons>
          <person id="154">Dan Kaminsky</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2393-en-dns_rebinding_packet_tricks.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2393-en-dns_rebinding_packet_tricks.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2356">
        <start>00:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>computer_popsongs</tag>
        <title>"I can count every star in the heavens above but I have no heart I can't fall in love&#8230;".</title>
        <subtitle>The image of computers in popular music</subtitle>
        <track>Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>A talk (with examples) by monochrom, presented by Johannes Grenzfurthner</abstract>
        <description>Bourgeois culture was paralyzed and finally overrun by modern technologies which broke through the traditional class barriers. It went into a panic and produced these very stupid technophobic manifestos and images e.g. of  &#8220;the computer&#8221;.
Pop music discovered and explored the computer not only as a musical instrument but also as something to sing and reflect about in a less aversive way. In doing so it influenced the conception people had of computers. The public image of computers was shaped by groups such as Kraftwerk as well as through obscure Schlager songs such as France Gall's &#8220;Computer No. 3&#8221;. Not only was that image influenced by high culture computer panic but also by na&#239;ve technomania,  and so it delivered the very dialectics of the computer as a means of cultural technology in capitalist society.

------------

Speaker: Johannes Grenzfurthner (monochrom)

Various music examples. </description>
        <persons>
          <person id="962">Johannes Grenzfurthner</person>
        </persons>
        <links>
          <link href="http://www.monochrom.at/english">monochrom</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2356-en-computer_popsongs.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2356-en-computer_popsongs.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 2">
      <event id="2359">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>brilliant_deviants</tag>
        <title>The Role of Brilliant Deviants in the Liberalization of Society</title>
        <subtitle>How People Like Us Make People Like Them Accept Us</subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>I'm planning to look at how hackers and other "folks like us" get the "real world" to let us be crazy deviants, and continue to pay us anyway.</abstract>
        <description>Clearly not everyone is able to do this - hence the sort of person who says, "I'd love to [go to Burning Man] [blow things up] [dress eccentrically]" but never does any of it. But some of us *are* able to get the world to play along, and I am looking at that from a sociological point of view.</description>
        <persons>
          <person id="1777">Rose White</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2225">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>paparazzi</tag>
        <title>Paparazzi - The Free Autopilot</title>
        <subtitle>Build your own UAV</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Autonomous unmanned aerial vehicles are becoming more and more popular as suitable electronics and sensors are available and affordable. This talk will describe Paparazzi, a complete system enabling you to build and control your own UAV.</abstract>
        <description>Paparazzi is a free and open-source hardware and software project intended to create an exceptionally powerful and versatile autopilot system by allowing and encouraging input from the community. The project includes not only the airborne hardware and software, from voltage regulators and GPS receivers to Kalman filtering code, but also a powerful and ever-expanding array of ground hardware and software including modems, antennas, and a highly evolved user-friendly ground control software interface. All hardware and software is open-source and freely available to anyone under the GPL. The key feature of the Paparazzi autopilot is its unique combination of infrared thermopiles and inertial measurement for attitude sensing, providing a robust and accurate attitude estimate that requires no ground calibration and can recover from any launch attitude.</description>
        <persons>
          <person id="1696">Martin M&#252;ller</person>
          <person id="1843">Antoine Drouin</person>
        </persons>
        <links>
          <link href="http://paparazzi.enac.fr/">Paparazzi Project Page</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2225-en-paparazzi.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2225-en-paparazzi.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2401">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>anonymity_for_2015</tag>
        <title>Anonymity for 2015</title>
        <subtitle>Why not just use Tor?</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In recent years, an increasing amount of academic research has been focused on secure anonymous communication systems. In this talk, we briefly review the state of the art in theoretical anonymity systems as well as the several deployed and actively used systems such as Tor and Mixmaster, and explain their advantages and limitations.

</abstract>
        <description>We will then describe the pseudonym system we are developing as an example for a new paradigm for low-latency anonymous communications, based on an information-theoretic secure private information retrieval protocol. This protocol is designed to be secure against an adversary with unbounded computing power as long as (as little as) a single honest server exists in the network of servers operating this system. We will explain the design decisions behind the architecture of the system, intended to be operated by volunteers with a limited resource pool. We will discuss the usability considerations in designing a system intended to be accessible to a more naive user-base than simply "hackers and cypherpunks", and explain why user accessibility is critical to the security of anonymity systems in general.

Finally, we will speculate on the potential to utilize these anonymity primitives for low-latency systems, which, if possible, could provide a more reliable and secure alternative to circuit-based or mix-based anonymity network systems.</description>
        <persons>
          <person id="1854">Len Sassaman</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2324">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>aes_side_channel_attacks</tag>
        <title>AES: side-channel attacks for the masses</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>AES (Rijndael) has been proven very secure and resistant to cryptanalysis, there are not known weakness on AES yet. But there are practical ways to break weak security systems that rely on AES.</abstract>
        <description>In this lecture we will see how easy it could be to retrieve AES keys attacking the implementations. When you have physical access to the box that tries to hide a key you can easily spot it, such kind of security could be just named obfuscation but is widely used in DRM technologies like AACS.
This is just a demonstration that using a strong security algorithm like AES is not of much sense when give the key somehow obfuscate to the attacker. Remember that the security chain is as strong as the weakest of their components.

</description>
        <persons>
          <person id="1752">Victor Mu&#241;oz</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2355">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>tracker_fahrn</tag>
        <title>Tracker fahrn</title>
        <subtitle>We Track Harder - We Track More! Take the pain out of running a Bittorrent-Tracker!</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Bittorrent aus der Sicht von Bittorrent-Tracker Betreibern.</abstract>
        <description>Eine Einf&#252;hrung in die Protokolle und eine lustige Reise durch die Unw&#228;gbarkeiten, die sich einem freien und offenen Projekt f&#252;r die Community so in den Weg stellen.</description>
        <persons>
          <person id="231">Denis</person>
          <person id="243">Erdgeist</person>
          <person id="291">Cristian Yxen</person>
        </persons>
        <links>
          <link href="http://erdgeist.org/arts/software/opentracker">Opentracker Projektseite</link>
          <link href="http://opentracker.blog.h3q.com/">Opentracker Blog</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2355-de-trecker_fahrn.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2355-de-trecker_fahrn.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2189">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>hidden_trojan</tag>
        <title>Crouching Powerpoint, Hidden Trojan</title>
        <subtitle>An analysis of targeted attacks from 2005 to 2007</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Targeted trojan attacks first attracted attention in early 2005, when the UK NISCC warned of their wide spread use in attacks on UK national infrastructure. Incidents such as "Titan Rain" and the compromise of US Department of State computer systems have increased their profile in the last two years. This presentation will consist of hard, technical information on attacks in the form of a case study of an actual attack ongoing since 2005. It covers exploitation techniques, draws general conclusions on attack methodologies and focuses on how to defend against the dark arts.</abstract>
        <description>June 16th, 2005. The NISCC or National Infrastructure Security Co-ordination Centre in the United Kingdom issued a briefing stating that parts of the UK Critical National Infrastructure were under attack by ongoing email-borne electronic attacks. This warning was echoed shortly after by the Australian Defence Signals Directorate and Canada&#8217;s CCIRC. A second warning was released by the US Computer Emergency Readiness Team in July, 2005. They reported ongoing attacks dating back to January 2005.

April 2007. E-mail security firm Messagelabs releases a public report on the amount of targeted attacks they had uncovered during the month of March. The report  coincides with a US House Committee hearing on a major 2006 e-mail borne information security compromise at the Department of State. 

September 2007. Chancellor Merkel's visit to China prompts several German news outlets to report on attacks against government information systems originating from China. Simultaneously, reports appear on similar attacks originating from Iran.

This presentation does not deal with 98% of keyloggers and trojans out on the internet. To the contrary, it deals with the small percentage of attacks that currently uses advanced techniques to compromise industrial networks with as goal to gather intelligence - information that helps gain competitive advantage.

This presentation presents a gradual increase in the complexity of targeted attacks, and includes detail both on the exploitation techniques used as well as the overall attack methodology. Using a real-life case study with samples, it covers the move from relatively simple, screen-saver mimicking executables in 2005 to the use of advanced, sometimes 0-day, file format exploits in 2007, and investigates how an organization can protect itself against the zero day threat.</description>
        <persons>
          <person id="1548">Maarten Van Horenbeeck</person>
        </persons>
        <links>
          <link href="http://www.daemon.be/maarten/targetedattacks.html">A brief introduction to targeted attacks</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2189-en-hidden_trojan.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2189-en-hidden_trojan.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2351">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>anonaccess</tag>
        <title>AnonAccess</title>
        <subtitle>Ein anonymes Zugangskontrollsystem</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>AnonAccess ist ein elektronisches System, welches anonymen Zugang nicht nur zu Hackerspaces erm&#246;glicht. </abstract>
        <description>Mit Hilfe kryptographischer Verfahren kann das Mikrocontroller-basierende System verbl&#252;ffend einfach sicheren und anonymen Zugang kontrollieren.
Es wird das Zusammenspiel verschiedener Primitiven unter Ber&#252;cksichtigung der Limitierungen eingebetteter Systeme gezeigt. Angriffsszenarien und Anforderungen an derartige Systeme stellen einen weiteren Beobachtungsgegenstand da.
Gezeigt wird das komplette System von der ICC-Speicherkarte &#252;ber die gesicherte Kommunikation bis zur verschl&#252;sselten Datenbank.</description>
        <persons>
          <person id="1773">Daniel Otte</person>
          <person id="1790">S&#246;ren Heisrath</person>
        </persons>
        <links>
          <link href="http://www.das-labor.org/wiki/AnonAccess">AnonAccess im Labor wiki</link>
        </links>
      </event>
      <event id="2257">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>ipv6</tag>
        <title>IPv6: Everywhere they don't want it</title>
        <subtitle>Global connectivity even in the places that you are not supposed to have it</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will discuss a new feature in AICCU which allows one to have IPv6 virtually everywhere, including most places where a lot of network operators will not want to have it.</abstract>
        <description>AICCU (Automatic IPv6 Connectivity Client Utility) is an award winning tool for setting up IPv6 connectivity on hosts that don't receive IPv6 connectivity from their local network.

The connectivity provided by AICCU, using the AYIYA protocol, works in most cases where UDP is not being firewalled. In some cases though, like at airports or other closed networks, UDP is also firewalled and one might want to be able to fully communicate with hosts on the Internet without much ado of how it happens.

This new version of AICCU allows this: it gracefully downgrades from a so called proto-41 (IPv6 over IPv4) to AYIYA/UDP, AYIYA/TCP, AYIYA/HTTPS, AYIYA/HTTP and finally AYIYA/DNS, thus picking the fastest possible connectivity option that works and downgrading till it actually gets connectivity, and never really giving up. This feature will be available to all users, thus allowing them to use IPv6 anywhere they want. As one gets a fully working and unfiltered IPv6 address and optionally a /48 routed towards it, this allows one to run a webserver or do VoIP chats while sitting at an airport behind closed infrastructure where one normally would have to pay. Of course one should not use it to bypass local security policies.

As such the talk will cover amongst others:
 - Briefly: SixXS 5th anniversary: little bit of history, what is now, what is coming and a short moment for audience constructive feedback, Q&amp;A etc.
 - Problems while trying to get IPv6 connectivity and how to get it anywhere.
 - The new AICCU edition, protocol overview and how it works.
</description>
        <persons>
          <person id="1395">Jeroen Massar</person>
        </persons>
        <links>
          <link href="http://www.sixxs.net/tools/aiccu/">AICCU - Automatic IPv6 Connectivity Client Utility</link>
          <link href="http://www.sixxs.net/tools/ayiya/">AYIYA - Anything In Anything</link>
          <link href="http://www.sixxs.net/">SixXS - IPv6 Tunnel Broker and IPv6 Deployment</link>
          <link href="http://unfix.org/~jeroen/">Jeroen Massar's homepage</link>
        </links>
      </event>
    </room>
    <room name="Saal 3">
      <event id="2254">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>freifunkerei</tag>
        <title>Freifunkerei</title>
        <subtitle>And a Do-It-Yourself society against the state</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The term Freifunk Firmware has found a place on the shelfs in the life of numerous people. It has become an immense knot of activities, not just sitting silently like a dusty heirloom. &#8220;Freifunkerei&#8221; has become an example of how DIY-cultures can act and re-create alternatives in a world which seems both confronted and abandoned by the state.  </abstract>
        <description>This talk/discussion will be about how the Freifunk movement can be an example of a Do-It-Yourself society against the state.

The background of Freifunk is Berlin in the 90's, the years after the fall of the wall and unification. Suddenly the city was turned into a vast borderland between what had been and what was to become. People began with a hectic process of exploring this new space, squatting buildings and creating experimenting initiatives. Also commercial and state interests threw themselves at this new frontier. One focal area was the building of a completely new information infrastructure, based on optical fibre. Then the big bubble blew, and a new term was instated: Opal areas. Large parts of Berlin was abandoned by both state and commercial interests without functional broadband infrastructure. 
The response came as a horizontal movement, influenced by Consume in London, a burst in wireless technology and the day-to-day activities of people meeting and helping each other. The state was passive and people had to do-it-themselves, and the result was a new way of &#8220;growing&#8221; infrastructure. The manifestation of a mesh without a central-node, and doing away with the normal vertical management. 

The French anthropologist Pierre Clastres asked in the early 70's the essential question: Is it possible to imagine a society without a state? His answer was based on extensive ethnographic work and stated: It is a reality that other and different regimes have existed. Large scale societies who are not submissive to the state model, but actively avert it and render its conditions impossible, have been there long before the rise of the Western world. This opposes the present dogma that society is un-imaginable without a central power, and a class of powerful leaders. Today Clastres analysis resonates in response to the recent, and accelerating, verticalization of the state and the dominance of the market-economic model. New large scale societies are infecting both cities, landscape and the world with cultural and technological models in a horizontal mode. 

This presentation will weave the Freifunk reality together with the (re-)asking of Pierre Clastres seminal question and discuss the emergence of a new horizontalism taking the form of DIY societies against the state. 
The (re)production of &#8220;chaotic communication&#8221; plays a central role in this discussion. Access to, and free flow of, information becomes the basis of a mash-up where people, technology and ideas converge &#8211; resulting in energetic DIY solutions. Hereby solving questions which prior had no answers. Mutual aid is re-emerging as praxis, and it reaches across and beyond boundaries and borders with a tactical stand based on many small steps. The present results show that, when people are able to control major decisions and are free to make their own contribution to the design, construction and management of infrastructure then both the process and the environment produced stimulate individual and social well-being. People are building affirmative alternatives celebrating life while opposing the continuation of despotic power. The example of Freifunk will help with the painting of this new landscape. 
</description>
        <persons>
          <person id="1724">Gregers Petersen</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2155">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>universe_on_supercomputers</tag>
        <title>Simulating the Universe on Supercomputers</title>
        <subtitle>The evolution of cosmic structure</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The evolution of structure in the Universe is one of the hottest topics in Cosmology and Astrophysics. In the last years the so-called $\Lambda$-CDM-model could be established also with great help of very large computer simulations. This model describes a Universe that consists mainly of dark components: 96% are made of dark energy and dark matter. Ordinary matter made up of baryons give only 4% to the total content of the Universe. The talk will present recent results with the main focus on computational methods and challenges in that field. A state-of-the-art computer code for running these calculations will be presented in detail.</abstract>
        <description>The talk will describe recent progress in the field of cosmic structure formation and will mainly focus on computational problems and methods carrying out such large simulations on the fastest Supercomputers available today. At the end of the talk I will also briefly discuss a new method we developed to access the dark matter structure in the Milky way to a scale that was just impossible some month ago with current Supercomputers.

To describe the evolution of the Universe from the Big Bang to what we see today is a quite hard task. It took many years until we reached an understanding and model that fits the observations we get by telescopes and satellites. Great steps in justifying this model were possible because of computer simulations. These simulations calculate the evolution of the universe from a short time after the Big Bang to present time. 
Comparing the results of these simulations with observations was a major proof for the correctness of the $\Lambda$-CDM model. The simulation itself is highly complicated because the main force driving the evolution of the universe is gravitation in an expanding space. And this force acts over extremely large distances. This makes computations very expensive and large computers and efficient algorithms are needed to handle this problem. The biggest simulation ever done in that field is the Millennium Run, carried out by our institute.
It took one month of computation on a 512-CPU-Cluster at the Max Planck Society Computing Center. Even with this computer power it is only possible to simulate the dark part of the universe. So the simulation only includes dark matter and dark energy. There are no galaxies, stars, planets or even smaller objects. The dynamical range that would be needed to simulate all together is just so large, that it is totally impossible to run this on any computer today or in the future. Nevertheless to get real galaxies in the Millennium simulation they are added in a post processing by so called Galaxay-Formation-Algorithms. These take the dark matter distribution given by the simulation and populate it with galaxies based on some astrophysical models. This way one can create a universe with shining galaxies a so called Mock Universe.
From the dark matter distribution itself one can also learn a lot, make statistics and compare them to observational data. It is quite impressive that the structures
forming in the computer simulation look exactly like the structure galaxies and clusters of galaxies in the real universe. 
Recently a researcher group simulated a Milky Way like dark matter structure with an extremely high
resolution to get more insights into the Dark Matter around us. This so called Via Lactea Simulations
used NASA's fastest project Colombia Supercomputer for about one month to finish the calculation. 

The talk will mainly focus on numerical techniques how to run such a simulation. As an example the
state-of-the-art code Gadget (Springel, 2005) will be presented. This code was used to calculate
the Millennium Simulation. It is at the moment the leading code for cosmological simulations.

At the end of the talk a new method will be presented that increases the resolution of all simulations done
so far by an enormous factor.</description>
        <persons>
          <person id="1603">Mark Vogelsberger</person>
        </persons>
        <links>
          <link href="http://www.mpa-garching.mpg.de/galform/presse/">Millennium Simulation done by the Max Planck Institute for Astrophysics</link>
          <link href="http://www.ucolick.org/~diemand/vl/">A recent Simulation carried out on one of NASA's Supercomputers</link>
          <link href="http://de.wikipedia.org/wiki/Millennium-Simulation">Wikipedia entry for the Millennium Simulation</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2155-en-universe_on_supercomputers.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2155-en-universe_on_supercomputers.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2133">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>building_a_hacker_space</tag>
        <title>Building a Hacker Space</title>
        <subtitle>A Hacker Space Design Pattern Catalogue</subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>With the help of Design Patterns we will show you how to set up your own Hacker Space.  The Design Patterns are based on more than 10 years of experience with setting up and running a Hacker Space.</abstract>
        <description>Before the Chaos Communication Camp 2007 the Chaos Computer Club received a question from the US-based Hacker Foundation that we should help them in setting up Hacker Spaces (or club rooms) in the USA.  After the Camp they did a tour through Germany and Austria and visited a couple of Hacker Spaces.  Each of them gave a presentation about their history and how they managed to set up the Hacker Space and keep it running.  In Cologne we prepared a Design Pattern Catalogue with the usual problem you encounter while finding the perfect location and managing the community.

This presentation received a large acknowledgment from the Hacker Foundation.  Now we will present the Ultimate Hacker Space Design Pattern Catalogue including comments and enhancements from other local Chaos Computer Clubs.

Attend this talk when you are about to start your local Chaos Computer Club or Hacker Space somewhere else on earth and learn from our experience!</description>
        <persons>
          <person id="18">Lars Weiler</person>
          <person id="13">Jens Ohlig</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2285">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>10ge_monitoring_live</tag>
        <title>10GE monitoring live!</title>
        <subtitle>How to find that special one out of millions</subtitle>
        <track>Hacking</track>
        <type></type>
        <language>en</language>
        <abstract>There are many open source tools available to do packet capturing and analysis. Virtually all networkers use these tools. However millions of packets per seconds are just too much for general-purpose hardware. This is a problem as 10 Gigabit networks allow for millions of packets per second. 

The obvious solution for that issue is to lower the data rates by filtering out &#8217;uninteresting&#8217; data out before it gets processed by the general purpose computer hardware.
</abstract>
        <description>This can be accomplished in a specialised Network Interface Card (NIC). The specialised NIC presented in this talk was originally developed for security purposes, but it allows for modifications since it is built around programmable logic (FPGAs). This was presented as slide-ware during last years congress as most of it was not working back then. This year it is possible to demonstrate results.

This presentation will consist of three parts, namely:

1/ Introduction 10 Gigabit Ethernet frame and data rates. Problem description, with some empirical data on the performance of modern generic computer hardware.

2/ Overview of the architecture of the proposed solution, its MISD architecture and the homegrown firm and software.

3/ Technical details and demonstrations on the implemented features.
</description>
        <persons>
          <person id="1169">Arien Vijn</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2285-en-10ge_monitoring_live.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2285-en-10ge_monitoring_live.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2248">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>desperate_house_hackers</tag>
        <title>Desperate House-Hackers</title>
        <subtitle>How to Hack the Pfandsystem</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wie funktionieren eigentlich diese Pfandflaschenr&#252;cknahmeautomaten?</abstract>
        <description>Wir finden es heraus.

</description>
        <persons>
          <person id="1720">Nils Magnus</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2248-de-desperate_house_hackers.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2248-de-desperate_house_hackers.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2214">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>make_cool_things_with_microcontrollers</tag>
        <title>Make Cool Things with Microcontrollers</title>
        <subtitle>Hacking with Microcontrollers</subtitle>
        <track>Making</track>
        <type>workshop</type>
        <language>en</language>
        <abstract>Learn how to make cool things with microcontrollers by actually making fun projects at the Congress -- blink lights, hack your brain, move objects, turn off TVs in public places -- microcontrollers can do it all.  Ongoing workshops each day of the Congress.
</abstract>
        <description>Learn to hack with microcontrollers!
Starting with an inexpensive kit (MiniPOV, by Limor Fried, aka Ladyada), this hands-on workshop will teach you to do almost anything with microcontrollers.
Throughout the days of the Congress, Mitch, the inventor of TV-B-Gone, will be giving ongoing workshops on hacking with microcontrollers.  Learn to make cool devices!
Projects that you can build include:
  * Make your own trippy colored-light-blinking thingy
  * Make your own device to meditate and hallucinate with brainwaves (as seen in MAKE Magazine issue #10)
  * Make your own simplified TV-B-Gone
  * Make your own bug robot that sings and dances
  * Light up and sequence EL-wire
  * Learn how to solder
  * Learn how to program with firmware
  * Learn how to use microcontroller development tools on your laptop
  * Tips, tricks, and more...
All the parts you need, handouts, plus all tools will be available at the workbench at the Congress.
</description>
        <persons>
          <person id="1268">Mitch</person>
        </persons>
        <links>
          <link href="http://www.tvbgone.com/cfe_mfaire.php">Documentation for Projects</link>
          <link href="http://makezine.com/10/brainwave/">Brainwave Machine in MAKE</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2214-en-make_cool_things_with_microcontrollers.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2214-en-make_cool_things_with_microcontrollers.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2318">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>cybercrime20</tag>
        <title>Cybercrime 2.0</title>
        <subtitle>Storm Worm</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Not only the Web has reached level 2.0, also attacks against computer systems have advanced in the last few months: Storm Worm, a peer-to-peer based botnet, is presumably one of the best examples of this development.</abstract>
        <description>Instead of a central command &amp; control infrastructure, Storm uses a distributed, peer-to-peer based communication channel on top of Kademlia / Overnet. Furthermore, the botherders use fast-flux service networks (FFSNs) to host some of the content. FFSNs use fast-changing DNS entries to build a reliable hosting infrastructure on top of compromised machines. Besides using the botnet for DDoS attacks, the attackers also send lots of spam - most often stock spam, i.e., spam messages that advertise stocks. This talk presents more information about Storm Worm and other aspects of modern cybercrime.

The first part of the talk provides a brief history of Storm Worm (Peacomm, Nuwar, Zhelatin, ...), focusing on the actual propagation phase. Afterwards, we describe the network communication of the bot in detail and show how we can learn more about the botnet. We were able to infiltrate and analyze in-depth the peer-to-peer network used by Storm Worm and present some measurement results.</description>
        <persons>
          <person id="144">Thorsten Holz</person>
        </persons>
        <links>
          <link href="http://honeynet.org/papers/ff/">Fast-Flux Service Networks</link>
          <link href="http://honeyblog.org">My blog</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2318-en-cybercrime20.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2318-en-cybercrime20.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2245">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>how_to_reach_digital_sustainability</tag>
        <title>Digital Sustainability</title>
        <subtitle>Scarcity is Entering the Net</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Happy digital world: Everything is information, and it grows by sharing. Scarcity seems to be a problem of the "meatspace". On the internet, there is space for everybody, for every activity and for every opinion. Really? This lectures explores the power of intellectual property rights, the principle of net neutrality and surveillance issues and explains their impact on everyday (digital) life. The net as we know it is in danger. What is needed to make it stay a resource which is valuable, open and free for everybody? How could a concept of digital sustainability look like?</abstract>
        <description>What makes life worth living happens more and more online: We communicate with friends, look for entertainment, find information. The net functions as our outsourced brain &#8211; everything we need to know we can google. The digital data space is our inexhaustible resource. This is about to change. Politics and entertainment industry do not accept free copying as a main characteristic of the net, but as a threat, because the net destroys business models which are designed for the analogue world. But instead of developing new models, these forces try to control and reshape the net after their private interests &#8211; e.g. with the help of intellectual property rights (IPR) like copyright.

These laws form the frame of what people are allowed to do on the net: distribute music, give access to teaching materials, express opinions, play around with digital technologies and software. "The intellectual property regime could make - or break - the educational, political, scientific and cultural promise of the net", wrote law-professor James Boyle 10 years ago. He asked for a broad political movement in order to keep the web as we love it. But today still, only a small circle of people discusses these issues. 

IPR are not the only threat: As the principle of net neutrality is eroding, certain content and applications are discriminated, the flow of information slows down. Excessive surveillance of digital data spaces is responsible for the fact that political engagement freezes. This lectures outlines what's at stake and explores how a concept of digital sustainability could look like. </description>
        <persons>
          <person id="1704">Meike Richter</person>
        </persons>
        <links>
          <link href="http://www.commonspage.net">Blog of Meike Richter</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2245-en-how_to_reach_digital_sustainability.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2245-en-how_to_reach_digital_sustainability.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2233">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>vx</tag>
        <title>VX</title>
        <subtitle>The Virus Underground</subtitle>
        <track>Culture</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The listeners will be introduced in the world of virus coding. They will understand how this can be seen as a way of expressing yourself and why it is a way of hacking. Furthermore they will get to know, which important groups, authors and viruses have been there in the last years and which are still active nowadays. Important technical terms will be explained as well as trends of the last years and the future. And more.</abstract>
        <description>The aim of the lecture shall be to introduce the listeners to the world of the virus underground. They shall understand how this little community of about fifty people think and act and why they code viruses. The audience may understand coding of viruses as a type of hacking and a way of expressing it as art. Furthermore it is the aim to make them familiar with different words, that are typically used by VXers (Virus Coders), for example Appender, Prepender and Overwriter Virus. Even more different aspects of multiplatform malware and payloads shall be explained. Then the audience shall be introduced to different authors and groups of the scene, that are somehow the idols of many VXers, groups like EOF, DoomRiderz and more. People like Roy G Biv, Virusbuster and Benny and more. Going on, the lecture will describe the relationship between VXers and the AntiVirus companies, even it does not seem so, there is something like a connection between both groups. Then it is planned to show how VXers communicate with each other, typical IRC channels and the so called electronic magazines or short E-Zines. Not to be forgotten also the programming languages of the scene will be described and trends, that can be seen over the last years. In the way, which programming languages are used and in general. Last but not least the problems of the VX Underground will be described.</description>
        <persons>
          <person id="1702">SkyOut</person>
        </persons>
        <links>
          <link href="http://vx.netlux.org/">Virus database</link>
          <link href="http://vxchaos.official.ws/">VX File Server</link>
          <link href="http://www.smash-the-stack.net">Smash-The-Stack</link>
          <link href="http://www.freewebs.com/purgatory-vx/">Purgatory Virus Team</link>
          <link href="http://www.eof-project.net/">EOF-Project</link>
          <link href="http://vx.eof-project.net/">&#916;</link>
          <link href="http://vx.netlux.org/">VX Heavens</link>
          <link href="http://www.29a.net/">29A Labs</link>
          <link href="http://www.rrlf.de.vu/">Ready Rangers Liberation Front</link>
          <link href="http://vxchaos.official.ws/">VX CHAOS File Server</link>
          <link href="http://www.doomriderz.co.nr/">Doomriderz VX Team</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2233-en-vx.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2233-en-vx.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
  </day>
  <day date="2007-12-28" index="2">
    <room name="Saal 1">
      <event id="2192">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>elektronische_dokumente</tag>
        <title>Elektronische Dokumente und die Zukunft des Lesens</title>
        <subtitle>Warum es so ewig gedauert hat, bis B&#252;cher auf geeigneten Ger&#228;ten lesbar wurden, und was uns noch erwartet</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>E-book devices versuchen seit Ewigkeiten, aus dem Sumpf der Bedeutungslosigkeit den Weg in den Massenmarkt zu finden. Bisher ohne Erfolg.
Warum das so lange ein so gro&#223;es Problem war und warum das jetzt anders werden wird, behandelt dieser Vortrag</abstract>
        <description>Nachdem schon vor ewigen Zeiten die ersten e-book devices auf den Markt kamen und immer wieder neue Versuche gestartet wurden, digitale B&#252;cher zu etablieren, dies aber immer und immer wieder scheiterte, wollen wir nun analysieren, warum das so grandios schiefgegangen ist (obwohl es ja f&#252;r Text viel leichter h&#228;tte sein m&#252;ssen als f&#252;r Filme oder Musik). 
Es wird au&#223;erdem darum gehen, warum und was jetzt anders ist und welche Revolution uns da erwartet, die vermutlich noch umfassender und nachhaltiger sein wird, als die Digitalisierung von Musik und Film.</description>
        <persons>
          <person id="284">Steini</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2192-de-elektronische_dokumente.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2192-de-elektronische_dokumente.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2383">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>data_retention</tag>
        <title>Data Retention and PNR</title>
        <subtitle>The Brussels Workshop</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>New EU legislation emphasises and in some cases creates new crimes of consumer infringement of intellectual property laws. Consumer Warnings about consumers' requirements to respect copyright could become mandatory; worse, such infringement cases could move from civil cases to criminal ones across the EU. But nowhere is there legislation either clarifying or defending consumers' rights under IP law, in our changing digital environment.</abstract>
        <description>Consumer privacy suffers from the same trend. Telecommunications companies now must store private information on consumer phone calls and e-mails for the use of European law enforcement. A recent proposal would also store consumers' air travel data for 13 years, providing access to governments both here and outside the EU. But where are the laws forcing IT companies to respect our privacy?

This session will have a closer look at these proposals, and what you can do about them.</description>
        <persons>
          <person id="1504">Ricardo Cristof Remmert-Fontes</person>
          <person id="1822">Erik Josefsson</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2383-en-data_retention.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2383-en-data_retention.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2275">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>quantum_cryptography_and_possible_attacks</tag>
        <title>Quantum Cryptography and Possible Attacks</title>
        <subtitle></subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Quantum cryptography is the oldest and best developed application of the field of quantum information science. Although it is frequently perceived as an encryption method, it is really a scheme to securely distribute correlated random numbers between the communicating parties and thus better described as quantum key distribution (QKD). Any attempt at eavesdropping from a third party is guarantied to be detected by the laws of physics (quantum mechanics) and shows up as an increased error rate in the transmission (the QBER).</abstract>
        <description>There are two basic families of quantum cryptography schemes, the *rst is based on preparation of a quantum
state by one party (Alice) and its measurement by a second (Bob). The most well known example is the Bennett and Brassard protocol (known as BB84 [1]). Another important version was introduced by Ekert (E91 [2]) and relies on quantum correlations of entangled photons to generate the random numbers and to reveal any eavesdropping attempt. 

In this talk we will review how a modi*ed version of this protocol works and the type of advantages that it confers over prepare and measure schemes [3]. Additionally, we will demonstrate the hardware of a full working kit [4] developed in the National University of Singapore for entanglement based QKD over a free space channel. 

Finally we will review some of the vulnerabilities of practical QKD systems as they currently exist. Although on paper these protocols are perfectly secure, they rely on assumptions about the hardware and the implementation. We will explicitly show how seemingly trivial modi*cation can give rise to information leakage which renders the system insecure [5].

[1] C. Bennett and G. Brassard, Proceedings of IEEE International Conference on Computers Systems and Signal Processing pp. 175{179 (1984).
[2] A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
[3] A. Acin, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Physical Review Letters 98, 230501 (2007), URL http://arXiv.org/abs/0702152.
[4] I. Marcikic, A. Lamas-Linares, and C. Kurtsiefer, Applied Physics Letters 89, 101122 (pages 3) (2006), URL http://arxiv.org/abs/quant-ph/0606072.
[5] A. Lamas-Linares and C. Kurtsiefer, Optics Express 15, 9388 (2007), URL http://arxiv.org/abs/0704.3297.</description>
        <persons>
          <person id="1849">Alexander Ling</person>
          <person id="1774">Antia Lamas</person>
          <person id="1741">Ilja Gerhardt</person>
          <person id="264">Christian Kurtsiefer</person>
        </persons>
        <links>
          <link href="http://arXiv.org/abs/0702152">A. Acin, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Physical Review Letters 98, 230501 (2007)</link>
          <link href="http://arxiv.org/abs/quant-ph/0606072">I. Marcikic, A. Lamas-Linares, and C. Kurtsiefer, Applied Physics Letters 89, 101122 (pages 3) (2006)</link>
          <link href="http://arxiv.org/abs/0704.3297">A. Lamas-Linares and C. Kurtsiefer, Optics Express 15, 9388 (2007)</link>
          <link href="http://quantumlah.org/">Center for Quantum Technologies, National University of Singapore</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2275-en-quantum_cryptography_and_possible_attacks.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2275-en-quantum_cryptography_and_possible_attacks.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2279">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>deconstructing_xbox_360_security</tag>
        <title>Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security</title>
        <subtitle>Console Hacking 2007</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The Xbox 360 probably is the video game console with the most sophisticated security system to date. Nevertheless, is has been hacked, and now Linux can be run on it. This presentation consists of two parts.</abstract>
        <description>In the first part, we describe the motivation and the design of the Xbox 360 security system from a very high-legel point of view, present the hack and what is possible with Linux, and discuss how the situation can be improved both for the manufacturer and for hobbyists with future devices.

In the second, very technical part, we will discuss the design and implementation details of the Xbox 360 system and security architecture and describe in detail how and why it was hacked, as well as how Linux was ported to this new platform.</description>
        <persons>
          <person id="283">Michael Steil</person>
          <person id="373">Felix Domke</person>
        </persons>
        <links>
          <link href="http://www.free60.org/">Free60 Project</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2279-en-deconstructing_xbox_360_security.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2279-en-deconstructing_xbox_360_security.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2203">
        <start>17:15</start>
        <duration>02:15</duration>
        <room>Saal 1</room>
        <tag>chaos_jahresrueckblick</tag>
        <title>Chaos Jahresr&#252;ckblick</title>
        <subtitle>Ein &#220;berblick &#252;ber die Aktivit&#228;ten des Clubs 2007</subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wir stellen die Aktivit&#228;ten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen sowohl die Kampagnen des CCC, die Lobbyarbeit sowie Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vortr&#228;ge und Konferenzen, an denen CCC-Vertreter teilgenommen haben.</abstract>
        <description>Ein zweist&#252;ndiger &#220;berblick, was den Club bewegt hat.</description>
        <persons>
          <person id="381">Constanze Kurz</person>
          <person id="9">Frank Rieger</person>
          <person id="45">Andy M&#252;ller-Maguhn</person>
          <person id="216">Frank Rosengart</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2203-de-chaos_jahresrueckblick.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2203-de-chaos_jahresrueckblick.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2273">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>toying_with_barcodes</tag>
        <title>Toying with barcodes</title>
        <subtitle>Jemandem einen Strich auf die Rechnung machen</subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The talk focuses on 1D and 2D barcode applications with interference possibilities for the ordinary citizen. Ever wondered what is in these blocks of squares on postal packages, letters and tickets? Playing with them might have interesting effects, reaching from good old fun to theft and severe impact.</abstract>
        <description>Barcodes have been around for ages, but most of the time were used as simple tags with a number. The rise of 2D barcodes started to put them into customer hands as authentication, authorization, payment method and other arbitrary data transport. The implicit trust in them is enormous. The talk gives a very quick intro into barcodes and then proceeds to review the contents of selected samples, including their usage in the real world. This is going to be fun, tool release included.</description>
        <persons>
          <person id="134">FX of Phenoelit</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2273-en-toying_with_barcodes.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2273-en-toying_with_barcodes.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2131">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>port_scanning_improved</tag>
        <title>Port Scanning improved</title>
        <subtitle>New ideas for old practices</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Port-Scanning large networks can take ages. Asking yourself how much
of this time is really necessary and how much you can blame on the
port-scanner, you may find yourself integrating your own scanner into
the linux-kernel. Or at least we did.</abstract>
        <description>How fast a port-scan can be is largely dependent on the performance of
the network in question. Nonetheless, it is clear that choosing the
most efficient scanning-speed is only possible based on sufficient
information on the network's performance. We have thus designed and
implemented a port-scanning method which provokes extra
network-activity to increase the amount of information at our disposal
in an attempt to gain speed on the long run. Further tweaking the
actual implementation by integrating it into the linux-kernel left us
with a port-scanner ready to tackle big networks at an impressive speed.

The presentation will also include thoughts and motivations why we 
decided to work on topics that are largely considered "done" by the
community and why such considerations may be interesting to other
researchers.</description>
        <persons>
          <person id="1663">Fabian Yamaguchi</person>
          <person id="134">FX of Phenoelit</person>
        </persons>
        <links>
          <link href="http://www.recurity-labs.com">Who we are</link>
          <link href="http://recurity-labs.com/portbunny/portbunny.html">Recurity Labs PortBunny</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2131-en-port_scanning_improved.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2131-en-port_scanning_improved.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2326">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>diy_survival</tag>
        <title>DIY Survival</title>
        <subtitle>How to survive the apocalypse or a robot uprising</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The apocalypse could happen any day. You're going to need things to survive and your going have to make them yourself.  </abstract>
        <description>Whether it's a red button, volcano, avian bird flu, meteor, cosmic superhighway or economic collapse, this lecture will give you the information you need to make things that will increase your chances of survival. This lecture will present a broad array of projects that will be both practical and humorous. Some projects are projects that I have made and will have on hand to demonstrate including a diy water purifier and steam-engine powered battery charger. I'll also point the way to over the top projects like making an EMP Generator to deal with the robot uprising.  
</description>
        <persons>
          <person id="1759">Bre</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2326-en-diy_survival.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2326-en-diy_survival.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2335">
        <start>00:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>rule_34_contest</tag>
        <title>Rule 34 Contest</title>
        <subtitle>There is porn of it.</subtitle>
        <track>Culture</track>
        <type>contest</type>
        <language>en</language>
        <abstract>Rule 34 says: There is porn of it.</abstract>
        <description>This contest will challenge the best and brightest to prove the rule under adverse circumstances in a race against the clock.</description>
        <persons>
          <person id="91">Andreas Bogk</person>
          <person id="832">nibbler</person>
          <person id="243">Erdgeist</person>
          <person id="1039">tina</person>
        </persons>
        <links>
        </links>
      </event>
    </room>
    <room name="Saal 2">
      <event id="2385">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>lightning_talks_2007_day_2</tag>
        <title>Lightning Talks Day 2</title>
        <subtitle></subtitle>
        <track></track>
        <type>lightning</type>
        <language>en</language>
        <abstract></abstract>
        <description></description>
        <persons>
          <person id="106">Hannes</person>
        </persons>
        <links>
        </links>
      </event>
      <event id="2340">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>absurde_mathematik</tag>
        <title>Absurde Mathematik</title>
        <subtitle>Paradoxa wider die mathematische Intuition</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Ein kleiner Streifzug durch die Abgr&#252;nde der Mathematik. 
Eigentlich ist der Mensch mit einer recht gut funktionierenden Intuition ausger&#252;stet. Dennoch gibt es Paradoxa, welche mathematisch vollkommen korrekt und beweisbar sind, jedoch unserer Intuition widersprechen. Der Vortrag bietet einen Streifzug durch einige dieser Paradoxa, die kurz und anschaulich erkl&#228;rt werden.</abstract>
        <description>Nicht alles, was mathematisch beweisbar ist, ist auch intuitiv und verst&#228;ndlich zu erfassen. Wie kann beispielsweise ein einfacher K&#246;rper wie Gabriels Horn ein begrenztes Volumen, aber eine unendlich gro&#223;e Oberfl&#228;che haben? Oder warum ist es bei einem Triell, einem Duell mit drei Sch&#252;tzen, als schlechter Sch&#252;tze f&#252;r das eigene &#220;berleben von Vorteil, wenn man als letztes schie&#223;en darf? Woher kommt das Braess'sche Paradoxon, bei dem die Verbesserung eines Verkehrsstreckenabschnittes zum Zusammenbruch des gesamten Verkehrsflusses f&#252;hren kann? Wie kann bei Penney-Ante ein unfaires Spiel entstehen, wo doch eine absolut faire M&#252;nze geworfen wird?

Und wie lief das genau mit dem bekannten Ziegenproblem, soll man sich nach &#214;ffnen der ersten T&#252;r mit der Niete zwischen den anderen beiden T&#252;ren umentscheiden?

</description>
        <persons>
          <person id="1785">Anoushirvan Dehghani</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2340-de-absurde_mathematik.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2340-de-absurde_mathematik.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2321">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>d_libd_and_the_slate_project</tag>
        <title>After C: D, libd and the Slate project</title>
        <subtitle>A clean slate for operating systems</subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We present libd, a high-level runtime for the D programming language and the Slate project, an attempt at a high-level OS and environment built upon libd, as the next major step in improving the state of programming environments and operating systems. With high-level abstractions, and sensible design, the state of implementation of open-source OSes can improve. We leverage existing kernels when implementing Slate, and put an extensive (abstraction-oriented) architecture above the kernel to present the user (or programmer) with a system they can use by having to do less to perform a specific function. Our virtual machine approach also allows for security verification on a level not seen in *nix OSes before.</abstract>
        <description>libd is a high-level runtime library for the D programming language. It is completely independent from existing C code except the *nix kernels it runs on, and of any compatibility issues with legacy code. This enables libd to establish support for various programming models (such as event-driven programming, traditional semi-OO procedural programming), message-passing, object persistence, task load balancing etc. The library has a very pluggable interface, and is therefore customizable.

On the basis of libd, we present the design of the Slate project, an advanced OS and environment. On the most basic level, we have a virtual machine, a vpn and a relational database store (with a unique twist) to enable further system services to build on top...</description>
        <persons>
          <person id="1766">Vladsharp</person>
        </persons>
        <links>
          <link href="http://www.slate-project.org/res/os_2_0_talk.pdf">Slides</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2321-en-d_libd_and_the_slate_project.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2321-en-d_libd_and_the_slate_project.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2284">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>linguistic_hacking</tag>
        <title>Linguistic Hacking</title>
        <subtitle>How to know what a text in an unknown language is about?</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>It is sometimes necessary to know what a text is about, even if it is written in a language you don't know. This can be quite problematic, if you do not even know in what language it is written. This talk will show how it is possible to identify the language of a written text and get at least some information about the contents, in order to decide whether a specialist and which specialist is needed to know more.</abstract>
        <description>The talk deals with the following issues:

1 How to identify a language

* texts in non-Roman writing systems and how the writing system can show what language we deal with,
* how to identify languages with the help of sample texts, 
* tricks that help to make at least an intelligent guess.

2 How to get an idea about the contents of a text

* identifying (important) content words and grammar,
* quick and dirty translations,
* how to translate a text from a language you hardly know.

The talk will introduce a variety of means, ranging from pre-internet (and pre-computational) approaches to contemporary web resources.</description>
        <persons>
          <person id="47">Martin Haase/maha</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2284-en-linguistic_hacking.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2284-en-linguistic_hacking.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2260">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>to_be_or_i2p</tag>
        <title>To be or I2P</title>
        <subtitle>An introduction into anonymous communication with I2P</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>I2P is a message-based anonymizing network. It builds a virtual network between the communication endpoints. This talk will introduce the technical details of I2P and show some exemplary applications.</abstract>
        <description>I2P has a different approach than most other known anonymous applications. Maybe you know about the anonymisation network Tor. Here you have central directory servers, onion routers (relaying traffic), onion proxies (send and receive data from the user) and other software roles within the network. I2P calls every software a router and it can send and receive data for the user as well as relay traffic for other users. Furthermore I2P uses no central server for distributing information about routers. You'll get the information from I2P's network database. This is a pair of algorithms which share the network metadata. The routers participate in the Kademlia algorithm. It is derived from distributed hash table.

My talk will tell you in detail how I2P work, what roles routers, gateways, netDb etc. plays. Furthermore I'll show differences and similarities to other anonymizing networks e. g. Tor and introduce some exemplary applications.</description>
        <persons>
          <person id="204">Jens Kubieziel</person>
        </persons>
        <links>
          <link href="http://www.i2p.net/">I2P website</link>
          <link href="http://qbi.i2p/">eepsite with informations about I2P and notes for my talk</link>
          <link href="https://www.opensourcepress.de/index.php?26&amp;backPID=178&amp;tt_products=159">My book: "Anonym im Netz"</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2260-en-to_be_or_i2p.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2260-en-to_be_or_i2p.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2277">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>automatic_memory_management</tag>
        <title>Automatic memory management</title>
        <subtitle>Why should I care about something that a computer could handle better, anyway?</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Since Java is widespread, automatic memory management is a commonly used technology. There are several approaches to memory management, realtime, parallel, probabilistic algorithms. The lecture will give an overview of different algorithms and current research topics.</abstract>
        <description>Doing memory management by hand is a hard task, most programmers fail to do it correctly, which leads to memory leaks. There are automated algorithms which collect no longer needed memory. This lecture will give a brief overview of used algorithms in different programming language implementations/virtual machines, their deficiencies as well as current research topics in this field.

The history of garbage collection starts in 1960, where McCarthy used mark and sweep garbage collector for Lisp at MIT. Reference counting (Collins, 1960, IBM) has been seen as an alternative to garbage collection. Nowadays, everything which reclaims memory automatically is considered garbage collection.

A real-time garbage collector was developed by Baker in 1978 ("List Processing in Real Time on a Serial Computer"). It was a copying collector, doing incremental, but not concurrent collection. It had several deficiencies, required special hardware, didn't consider variable-sized requests for memory... but was extended by several researchers during the years.

The Boehm GC is a conservative garbage collector for C and C++. It uses a mark and sweep algorithm.

The memory pool system is a garbage collection framework, which integrates different algorithms for different purposes. There is no need to sweep through strings in the hope of finding pointers to somewhere else. This garbage collector is highly optimized and well designed and tested (implemented with Capability Maturity Model level 3), really few defects.

Different programming language implementations use a custom garbage collector, an overview of selected language implementations and their garbage collector will be given.</description>
        <persons>
          <person id="106">Hannes</person>
        </persons>
        <links>
          <link href="http://www.cs.kent.ac.uk/people/staff/rej/gc.html">Richard jones GC page</link>
          <link href="http://www.ravenbrook.com/project/mps/">Memory Pool System</link>
          <link href="http://www.hpl.hp.com/personal/Hans_Boehm/gc/">Boehm GC</link>
          <link href="http://www.research.ibm.com/people/d/dfb/papers/Vechev05Derivation.pdf">Derivation and Evaluation of Concurrent Collectors</link>
          <link href="http://www.acmqueue.org/modules.php?name=Content&amp;pa=showpage&amp;pid=454">Realtime Garbage Collection</link>
          <link href="http://www.memorymanagement.org/">The Memory Management Reference</link>
        </links>
      </event>
      <event id="2333">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>spiel_freude_eierkuchen</tag>
        <title>Spiel, Freude, Eierkuchen?</title>
        <subtitle>Die Gamerszene und ihre Reaktion auf kritische Berichterstattung </subtitle>
        <track>Society</track>
        <type>podium</type>
        <language>de</language>
        <abstract>Der Journalist Rainer Fromm berichtet &#252;ber seine Erfahrungen mit der Gamerszene, mit Filmbeispielen und anschlie&#223;ender Diskussion.</abstract>
        <description>Nachdem das ZDF einen Magazinbeitrag &#252;ber die Auswirkungen von Computerspielen mit &#252;berwiegend gewaltt&#228;tigen Handlungen ausgestrahlt hatte, ging eine Welle der Emp&#246;rung durch die Gamerszene. Man f&#252;hlte sich falsch dargestellt, und die herangezogenen Studien seien einseitig ausgew&#228;hlt. W&#252;tende Beitr&#228;ge in den einschl&#228;gigen Foren waren die Folge, es gab jedoch auch konkrete Gewaltdrohungen gegen den Autor des Beitrages und seine Familie.
Wie friedlich ist der Gamerszene wirklich und gibt es Grenzen bei Spielen, die vielleicht besser nicht &#252;berschritten werden sollten - eine kontroverse Diskussion jenseits der &#252;blichen Verbotsdiskussion.</description>
        <persons>
          <person id="216">Frank Rosengart</person>
          <person id="1776">Rainer Fromm</person>
        </persons>
        <links>
          <link href="http://www.zdf.de/ZDFde/inhalt/26/0,1872,2285338,00.html">ZDF Frontal21: Gewalt ohne Grenzen</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2333-de-spiel_freude_eierkuchen.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2333-de-spiel_freude_eierkuchen.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2303">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>inside_the_macosx_kernel</tag>
        <title>Inside the Mac OS X Kernel</title>
        <subtitle>Debunking Mac OS Myths</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Many buzzwords are associated with Mac OS X: Mach kernel, microkernel, FreeBSD kernel, C++, 64 bit, UNIX... and while all of these apply in some way, "XNU", the Mac OS X kernel is neither Mach, nor FreeBSD-based, it's not a microkernel, it's not written in C++ and it's not 64 bit - but it is UNIX... but just since recently.

This talk intends to clear up the confusion by presenting details of the Mac OS X kernel architecture, its components Mach, BSD and I/O-Kit, what's so different and special about this design, and what the special strengths of it are.</abstract>
        <description>The talk first illustrates the history behind BSD and Mach, how NEXT combined these technologies in the 1980s, and how Apple extended them in the late 1990 after buying NEXT. It then goes through the parts of the kernel: Mach, which does the typical kernel work like memory management, scheduling and interprocess communication, BSD, which provides the POSIX-style syscall interface, file systems and networking to user mode, and I/O-Kit, the driver infrastructure written in C++. In the end, a short overview on how to extend the kernel with so-called KEXT will be given, as well as an introduction on how to hack the (Open Source) kernel code itself.</description>
        <persons>
          <person id="1757">lucy</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2303-en-inside_the_macosx_kernel.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2303-en-inside_the_macosx_kernel.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2241">
        <start>23:00</start>
        <duration>02:00</duration>
        <room>Saal 2</room>
        <tag>das_panoptische_prinzip</tag>
        <title>Das Panoptische Prinzip - Filme &#252;ber die Zeit nach der Privatsph&#228;re</title>
        <subtitle>Ergebnisse des Minutenfilmwettbewerbs des C4 und des K&#246;lner Filmhauses</subtitle>
        <track>Society</track>
        <type>movie</type>
        <language>de</language>
        <abstract>In den letzten Jahren &#8211; nicht zuletzt seit dem 11. September &#8211; ist es zu einem Abbau von B&#252;rgerrechten und einer immer umfassender werdenden &#220;berwachung seitens des Staates, aber auch der Wirtschaft gekommen. Erkennungsdienstliche Verfahren, wie z. B. die Abnahme von Fingerabdr&#252;cken oder andere biometrische Verfahren, treffen zunehmend auch Normalb&#252;rger. Das rechtsstaatlich garantierte Paradigma der Unschuldsvermutung wird demontiert: Jeder ist potenziell verd&#228;chtig. </abstract>
        <description>Mitglieder des Produktionsarbeitskreises (PAK) aus dem K&#246;lner Filmhaus e. V. (KFh) und des Chaos Computer Club Cologne e. V. haben sich im Sommer 2007 zusammengefunden, um zu einer breiteren Diskussion des Themas in der &#214;ffentlichkeit beizutragen.

Unsere Idee war es, FilmemacherInnen und AutorInnen zu ermutigen, sich mit dem Thema &#8222;&#220;berwachung&#8220; filmisch auseinanderzusetzen. Es sollen Kurzfilme entstehen, die wachr&#252;tteln, verst&#246;ren, zur Diskussion anregen und dem derzeit vorherrschenden Diskurs (um das Begriffspaar Sicherheit &#8211; Angst) weitere Perspektiven hinzuf&#252;gen.   
Die dabei entstandenen Filme sollen nun auf dem 24C3 in Berlin einer breiten &#214;ffentlichkeit vorgestellt werden.</description>
        <persons>
          <person id="281">Stefan Sels</person>
          <person id="1693">Ralph Kusserow</person>
          <person id="1833">Yvette Krause</person>
          <person id="899">Christine Ketzer</person>
        </persons>
        <links>
          <link href="http://www.panoptisches-prinzip.de/">Das panoptische Prinzip</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2241-de-das_panoptische_prinzip.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2241-de-das_panoptische_prinzip.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 3">
      <event id="2389">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>hacking_icann</tag>
        <title>Hacking ICANN</title>
        <subtitle>tactics to hack the individual into the ICANN system</subtitle>
        <track>Society</track>
        <type>podium</type>
        <language>en</language>
        <abstract>The Internet Corporation for Assigned Names and Numbers (ICANN) needs to include users in its policy making: We propose and discuss tactics to hack the individual into the system.</abstract>
        <description>Finding unexplored routes to impower the individual internet user.

Start setting up an internet users bill of rights: What is missing from ICANNs charta.

Join the At-Large - come to Paris! ...and make the first internet user's summit happen in summer 2008.
</description>
        <persons>
          <person id="45">Andy M&#252;ller-Maguhn</person>
          <person id="1831">Annette Muehlberg</person>
          <person id="1832">Wendy Seltzer</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2389-en-hacking_icann.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2389-en-hacking_icann.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2216">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>erlang</tag>
        <title>Konzeptionelle Einf&#252;hrung in Erlang</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>A jump-start into the world of concurrent programming</abstract>
        <description>Originally developed by Ericson, Erlang was eventually released as open source in 1998. Although Erlang has been around for almost ten years now, it became a rather popular programming environment for communication platforms only recently.

The talk will equip the open-minded programmer with concepts of concurrent programming in a functional programming environment supported by real-world examples.

Despite the fact that actual code fragments will be in display, there is no need for novices and non-programmers to be scared away.</description>
        <persons>
          <person id="1688">Stefan Strigler</person>
          <person id="659">BeF</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2216-de-erlang.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2216-de-erlang.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2292">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>wireless_kernel_tweaking</tag>
        <title>Wireless Kernel Tweaking</title>
        <subtitle>or how B.A.T.M.A.N. learned to fly</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Kernel hacking definitely is the queen of coding but in order to bring mesh routing that one vital step further we had to conquer this, for us, unchartered territory.  Working in the kernel itself is a tough and difficult task to manage, but the results and effectivity to be gained justify the long and hard road to success. We took on the mission to go down that road and the result is B.A.T.M.A.N. advanced which is a kernel land implementation of the B.A.T.M.A.N. mesh routing protocol specifically designed to manage Wireless MANs.</abstract>
        <description>During the last years the number of deployed mesh networks has increased dramatically and their constant growth drove us around the edge of what we thought was possible. To cope with this rapid development we had to leave the slow and limited track of tweaking existing approaches and take an evolutionary step forward by porting the B.A.T.M.A.N. protocol into the kernel land and going down to layer 2. Using B.A.T.M.A.N. advanced as a showcase we will, in our lecture, deliver a detailed review on how one can go about developing linux kernel modules, give insights in what difficulties to expect and provide practical tips on how to go about this challenge without experiencing a damaging kernel freeze in due process. We will describe what problems we faced migrating down to layer 2 and how we went about solving them for example how we moved away from the kernel routing and handle the actual routing and data transport in B.A.T.M.A.N. itself. Also moving to layer 2 meant to leave IPs behind and solely rely on MAC-routing enabling features like DHCP, IPX, IPv6, etc which up to now was not possible and therefore comes as a big plus. On the other hand there were little if none diagnostic tools at all for routing on that level so we had to go back one step and develop the tools we needed ourselves.

These and other things we will cover in our presentation and also give an outlook into the future of mesh-routing, which will bring it even closer to the source of wifi - the wireless stack and its drivers and thereby improving the overall performance even more. </description>
        <persons>
          <person id="1821">Simon Wunderlich</person>
          <person id="1265">Marek</person>
        </persons>
        <links>
          <link href="http://www.open-mesh.net">www.open-mesh.net</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2292-en-wireless_kernel_tweaking.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2292-en-wireless_kernel_tweaking.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2294">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>23_ways_to_fight_for_your_rights</tag>
        <title>23 Wege f&#252;r Deine Rechte zu k&#228;mpfen</title>
        <subtitle>Wie man sich selbst mit den eigenen St&#228;rken f&#252;r unsere B&#252;rgerrechte einsetzen kann</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>B&#252;rgerrechtsabbau steht auf der Tagesordnung. Bei der Vielzahl an Vorhaben und Gesetzesinitiativen haben viele mittlerweile das Gef&#252;hl, dass sich politisches Engagieren nicht mehr lohnt.</abstract>
        <description>Dabei war es eigentlich noch nie so einfach wie zuvor: wir haben das Netz und k&#246;nnen es auch nutzen. Aber nicht alles findet im Netz statt, und nur wenige haben Lust, sich in einer Partei oder Organisation langfristig zu verpflichten. Trotzdem kann man was tun.  

In diesem Vortrag mit anschlie&#223;ender Diskussion sollen 23 Wege aufgezeigt werden, wie man sich konkret mit den eigenen F&#228;higkeiten engagieren kann. Nicht jeder Punkt ist was f&#252;r jeden, aber jeder kann sich mit den eigenen F&#228;higkeiten einbringen.
</description>
        <persons>
          <person id="1755">Markus Beckedahl</person>
        </persons>
        <links>
          <link href="http://www.netzpolitik.org">netzpolitik.org</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2294-de-23_ways_to_fight_for_your_rights.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2294-de-23_ways_to_fight_for_your_rights.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2247">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>breaking_a_vm</tag>
        <title>Just in Time compilers - breaking a VM</title>
        <subtitle>Practical VM exploiting based on CACAO</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>We will present state of the art JIT compiler design based on CACAO, a GPL licensed multiplatform Java VM. After explaining the basics of code generation, we will focus on "problematic" instructions, and point to possible ways to exploit stuff.</abstract>
        <description>A short introduction into just-in-time compiler techniques is given: Why JIT, about compiler invocation, runtime code modification using signals, codegeneration. Then theoretical attack vectors are elaborated: language bugs, intermediate representation quirks and assembler instruction inadequacies.
With these considerations in mind the results of a CACAO code review are presented. For each vulnerability possible exploits are discussed and two realized exploits are demonstrated.</description>
        <persons>
          <person id="1845">Peter Molnar</person>
          <person id="1713">Roland Lezuo</person>
        </persons>
        <links>
          <link href="http://cacaojvm.org">http://cacaojvm.org</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2247-en-breaking_a_vm.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2247-en-breaking_a_vm.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2322">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>infectious_diseases</tag>
        <title>Modelling Infectious Diseases in Virtual Realities</title>
        <subtitle>The "corrupted blood" plague of WoW from an epidemiological perspective</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>World of Warcraft is currently one of the most successful and complex virtual realities. Apart from gaming, it simulates personality types, social structures and a whole range of group dynamics.</abstract>
        <description>In 2005, courtesy of its creators at Blizzard Entertainment, the ancient Blood God "Hakkar the Soulflayer" unleashed a devastating plague, "corrupted blood", upon a totally unprepared population of avatars. Unintentionally, the digital "black death" spread to cities and depopulated whole areas. The epidemic could only be controlled by shutting down and restarting the game world, a measure unfortunately not available in the "real" world. 
However, other measures such as quarantine or improved treatment are available in the real world and can be simulated by disease modelling. Disease modelling is essentially a virtualisation of reality that tries to gain insights into hitherto unknown inderdependencies and to simulate intervention scenarios.

I will give a brief overview of the use of infectious disease modelling in a population and explain the disease dynamics of the "corrupted blood" epidemic in WoW. I will focus on cross references to the "real world" and illustrate why Blizzard, in effect, had created sexually transmitted measles for online denizens.
</description>
        <persons>
          <person id="1751">floX</person>
        </persons>
        <links>
          <link href="http://www.burckhardt.de/24c3_modelling_infdis_in_vr.pdf">conference talk</link>
          <link href="http://www.disease-detectives.org">Disease Detectives (comic)</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2322-en-infectious_diseases.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2322-en-infectious_diseases.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2227">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>hacking_scada</tag>
        <title>Hacking SCADA</title>
        <subtitle>how to own critical infrastructures</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>SCADA acronym stand for &#8220;Supervisory Control And Data Acquisition&#8221;, and it's related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices.</abstract>
        <description>We will analyze a real world case study related to industry. We will describe the most common security mistakes and some of the direct consequences of such mistakes to a production environment. In addition, attendees will be shown a video of real SCADA machines reacting to these attacks in the most &#8220;interesting&#8221; of ways! :)

</description>
        <persons>
          <person id="1461">mayhem</person>
          <person id="1661">Raoul "Nobody" Chiesa</person>
        </persons>
        <links>
          <link href="http://conference.hitb.org/hitbsecconf2007kl/materials/D1T2%20-%20Raoul%20Chiesa%20and%20Mayhem%20-%20Hacking%20SCADA%20-%20How%20to%200wn%20Critical%20National%20Infrastructure.pdf">Our slides @hitb07</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2227-en-hacking_scada.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2227-en-hacking_scada.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2347">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>c64_dtv_hacking</tag>
        <title>C64-DTV Hacking</title>
        <subtitle>Revisiting the legendary computer in a joystick</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The C64-DTV is a remake of the classic homecomputer sold as a joystick-contained videogame. The talk gives an overview about the structure of the DTV, and shows different hardware and software modifications that can be done.</abstract>
        <description>I'll give an overview of the structure of the DTV:
- main structure of the system
- what is copied from the C64, and which new features were added
- what the memorymap looks like and how the bank-switching works
- some of the added special function registers

I'll show and explain some hardware-hacks:
- how to attach a keyboard
- IEC (floppy) interface
- video mod for better picture
- making the SST-Flash reflashable

I'll show some software-tools to modify the flashrom, add new games, upload/download and debug stuff.</description>
        <persons>
          <person id="1792">Peter Fuhrmann</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2347-en-c64_dtv_hacking.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2347-en-c64_dtv_hacking.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2378">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>mifare_security</tag>
        <title>Mifare</title>
        <subtitle>Little Security, Despite Obscurity</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Mifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.</abstract>
        <description></description>
        <persons>
          <person id="1317">Karsten Nohl</person>
          <person id="995">Henryk Pl&#246;tz</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2378-en-mifare_security.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2378-en-mifare_security.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
  </day>
  <day date="2007-12-29" index="3">
    <room name="Saal 1">
      <event id="2293">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>what_can_we_do_to_counter_the_spies</tag>
        <title>What can we do to counter the spies?</title>
        <subtitle></subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>A presentation about the role of intelligence agencies in the current era of the unending &#8220;war on terror&#8221;, how they monitor us, the implications for our democracies, and what we can do to fight back.</abstract>
        <description>In the name of protecting national security, spy agencies are being given sweeping new powers and resources. Their intelligence has been politicised to build a case for the disastrous war in Iraq, they are failing to stop terrorist attacks, and they continue to collude in illegal acts of internment and torture, euphemistically called &#8220;extraordinary rendition&#8221;. Most western democracies have already given so many new powers to the spies that we are effectively living in police states. As an informed community, what can we do about this?

1. What it was like to be recruited and work for MI5?

2. The crimes of MI5 and MI6. These include:
MI5 files held on government ministers, 
IRA bombs that could and should have been prevented,
Illegal MI5 phone taps, 
Lying to go government,
The 1994 bombing of the Israeli embassy in London by Mossad, and the subsequent wrongful imprisonment of two innocent people,
The illegal MI6 assassination attempt against Colonel Gaddafi of Libya.

3. How to go &#8220;on the run&#8221;, what it&#8217;s like to cross the secret state, and how to survive.

4. The lack of accountability and oversight. The spies literally get away with murder.

5. The current situation. Despite glaring intelligences failures, both in the run-up to the Iraq war and in a number of recent terrorist attacks on the UK, our government still continues to grant more resources and powers to the spies. Why?

6. The implications of these new laws for our democracy.

7. The interception of our communications &#8211; ECHELON and beyond.

8. On a lighter and more hopeful note &#8211; examples of the spies&#8217; technological ineptitude.

9. The failure of the mainstream media to effectively hold the spies to account.

What can we do?  We have a (probably limited) window of opportunity to halt this slide towards totalitarianism.  It&#8217;s time for our fight back.

&#8220;All that is necessary for the triumph of evil is for good men to do nothing.&#8221;
Edmund Burke, MP</description>
        <persons>
          <person id="1711">Annie Machon</person>
        </persons>
        <links>
          <link href="http://www.amazon.com/Spies-Lies-Whistleblowers-Shayler-Affair/dp/185776952X">My book: Spies, Lies and Whistleblowers</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2293-en-what_can_we_do_to_counter_the_spies.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2293-en-what_can_we_do_to_counter_the_spies.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2311">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>hacking_ideologies_2</tag>
        <title>Hacking ideologies, part 2: Open Source, a capitalist movement</title>
        <subtitle>Free Software, Free Drugs and an ethics of death</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.</abstract>
        <description>---------------------------------------------------------
     Believe. "The World is Yours." (Ian Brown, 2007)
---------------------------------------------------------

What is Re-interpretation of FS by Open Source ?

In The Revenge of the Hackers, Eric Raymond talks about Open Source
goals in clear terms: "In conventional marketing terms, our job was
to re-brand the product, and build its reputation into one the 
corporate world would hasten to buy."

====

The move of the Open Source initiative to bring Free Software
closer to capitalism shows that:

a) there is a gap between the Free Software movement and capitalism;

b) without a significant institutional intervention and
   re-interpretation that gap can not be overcome;

c) it is the founding documents (practice of Open Source doesn't differ),
   ethics that Richard Stallman stands by so fiercely, that are
   the bite that capitalism can not subsume, swallow in its original form.

====

Open Source is a neo-liberal, parliamentary capitalist social movement.

Neo-liberalism claims they're "just doing it" for the sake of a better
economy, without any ideological beliefs. As if any economy, or any act,
was possible without decisions determined by a set of ideas and beliefs.

This is why Nike's slogan "just do it"
is the best summary of the capitalist ideology ever.

And this is why "Open source is a development methodology;
free software is a social movement" (Stallman), misses the crucial point.

Open Source is not just a development methodology, but a social
movement too, a social movement of a different kind, with different,
parliamentary capitalist, goals.

Another problem lies in the claims that Open Source separates ethics from the
technical side of Free Software (Stallman, "Why 'Open Source' misses
the point about Free Software"), thus making it acceptable to corporations.

This implies two wrong statements about Open Source:

  a) it has no ethics of its own;

  b) there are purely technical solutions which can be used without
     any ethical, political, or ideological commitments.

The result of these mistakes is widespread comparison of Free
Software and Open Source on false, crucially misleading terms:

  - one (FS) operating under the weight and demand of its ethics;

  - the other (OS) getting away without being examined at all, basking in
    the purity of its technical attributes and various business-friendly tags

This is how the ethics, the ideology and, indeed, the politics of Open Source
slip through unexamined and unchallenged -- like the capitalist ideologies
whose key strategy has historically been to accuse any political opponents
of ethical commitments, while insisting on their own "pragmatism" and
on the purely technical aspect of "just getting things done".</description>
        <persons>
          <person id="1830">Tomislav Medak</person>
          <person id="1739">Toni Prug</person>
          <person id="1094">Marcell Mars</person>
          <person id="1847">Dmytri Kleiner</person>
        </persons>
        <links>
          <link href="http://publication.nodel.org/The-Mirrors-Gonna-Steal-Your-Soul">The Mirror's Gonna Steal Your Soul</link>
          <link href="http://rabelais.socialtools.net/FreeSoftware.ToniPrug.Aug2007.pdf">Free Software</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2311-en-hacking_ideologies_2.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2311-en-hacking_ideologies_2.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2358">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>guerilla_knitting</tag>
        <title>The history of guerilla knitting</title>
        <subtitle></subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>"Guerrilla knitting" has a couple of meanings in the knitting community - to some, it merely means knitting in public, while to others, it means creating public art by knitted means. 
</abstract>
        <description>Contemporary knitters feel very clever for coming up with edgy language to describe their knitting, but the truth is that for decades there have been knitters and other textile artists who are at least as punk rock as today's needle-wielders. This talk will cover the vibrant history of contemporary knitting, with a focus on projects that will make you say, "Wow, that's knitted?" 
Feel free to bring knitting projects to the talk - let's get some public knitting going on at the conference!</description>
        <persons>
          <person id="1777">Rose White</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2358-en-guerilla_knitting.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2358-en-guerilla_knitting.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2334">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>die_wahrheit_und_was_wirklich_passierte</tag>
        <title>Die Wahrheit und was wirklich passierte</title>
        <subtitle>Jede Geschichte hat vier Seiten. </subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Jede Geschichte hat vier Seiten. Deine Seite, Ihre Seite, die Wahrheit und das, was wirklich passiert ist.</abstract>
        <description>Die Wahrheit ist am Ende das, was Bruce Sterling als "major consensus narrative" beschrieben hat, die Version, die sich im Bewu&#223;tsein der Mehrheit festfri&#223;t. Wir werden anhand von Beispielen aus der j&#252;ngeren Vergangenheit betrachten, welche Faktoren und Ereignisse beeinflussen, wie diese Mehrheitserinnerung zustande kommt, wie sie beeinflu&#223;t werden kann und was wir daraus f&#252;r unsere Arbeit lernen k&#246;nnen. </description>
        <persons>
          <person id="129">Ron</person>
          <person id="9">Frank Rieger</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2334-de-die_wahrheit_und_was_wirklich_passierte.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2288">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>verschwoerungstheorien</tag>
        <title>Agenten des B&#246;sen</title>
        <subtitle>Verschw&#246;rungstheorien</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wolfgang Wippermann hat 2007 unter dem Titel "Agenten des B&#246;sen" ein Buch &#252;ber "Verschw&#246;rungstheorien von Luther bis heute" ver&#246;ffentlicht. Darin geht es unter anderem auch um Verschw&#246;rungstheorie, die in Hackerkreisen auf Interesse sto&#223;en (Illuminanten, 9/11...). Interessant ist seine Einordnung solcher Verschw&#246;rungstheorien in gr&#246;&#223;ere Zusammenh&#228;nge.</abstract>
        <description>Aus der Buchbesprechung des Deutschlandradios Kultur: "Wann immer Menschen sich mit au&#223;ergew&#246;hnlichen Missetaten konfrontiert sehen, mit Katastrophen, Kriegen, Attentaten, glauben sie an das geheimb&#252;ndlerische Werk unbekannter Dritter, an ein Komplott finsterer M&#228;chte. Solche Phantasien erkl&#228;ren komplexe Abl&#228;ufe auf schlichte Weise. Der Glaube an Konspiration hebt banale Fakten obendrein in die Sph&#228;re des Geheimnisvollen."
</description>
        <persons>
          <person id="1750">Wolfgang Wippermann</person>
        </persons>
        <links>
          <link href="http://www.dradio.de/dkultur/sendungen/kritik/645433/">Buchkritik Agenten des B&#246;sen (dradio)</link>
          <link href="http://www.media-mania.de/index.php?PHPSESSID=cd7e73d2ef22df76bdded374d65350ca&amp;action=rezi&amp;p=2&amp;id=5770">Buchkritik Agenten des B&#246;sen</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2288-de-verschwoerungstheorien.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2288-de-verschwoerungstheorien.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2289">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>card_payment</tag>
        <title>Relay attacks on card payment: vulnerabilities and defences</title>
        <subtitle>Keeping your enemies close</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today's electronic payment systems. This talk will show how using easily available electronics, it is possible to carry out such attacks. Also, we will describe techniques for improving payment systems, developed by Saar Drimer and me, in order to close this vulnerability.</abstract>
        <description>The UK, like many other countries, has moved from comparatively insecure magnetic stripe cards to smartcards, for electronic payment. These smartcards, capable of sophisticated cryptography, provide a high assurance of tamper resistance and while implementation standards varies, have the potential to provide good security. Although extracting secrets out of smartcards requires resources beyond the means of many would-be thieves, the manner in which they are used can still be exploited for fraud. 

Cardholders authorize financial transactions by presenting the card and disclosing a PIN to a terminal without any assurance as to the amount being charged or who is to be paid, and have no means of discerning whether the terminal is authentic or not. Even the most advanced smartcards cannot protect customers from being defrauded by the simple relaying of data from one location to another. We describe the development of such an attack, and show results from live experiments on the UK's EMV implementation, Chip &amp; PIN. We discuss previously proposed defences, and show that these cannot provide the required security assurances. A new defence based is described and implemented, which requires only modest alterations to current hardware and software. This allows payment terminals to securely establish a maximum distance bound between itself and the legitimate card. As far as we are aware, this is the first complete design and implementation of a secure distance bounding protocol. Future smartcard generations could use this design to provide cost-effective resistance to relay attacks, which are a genuine threat to deployed applications.

This work was done with Saar Drimer, University of Cambridge Computer Laboratory.</description>
        <persons>
          <person id="143">Steven J. Murdoch</person>
        </persons>
        <links>
          <link href="http://www.cl.cam.ac.uk/~sjm217/papers/usenix07bounding.pdf">Academic paper</link>
          <link href="http://www.cl.cam.ac.uk/research/security/projects/banking/relay/">Summary website</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2289-en-card_payment.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2289-en-card_payment.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2360">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>all_tomorrows</tag>
        <title>All Tomorrow's Condensation</title>
        <subtitle>A steampunk puppet extravaganza by monochrom and friends</subtitle>
        <track>Culture</track>
        <type></type>
        <language>en</language>
        <abstract>A steampunk theatre play extravaganza. With puppets!</abstract>
        <description>In 1887 the Indian Empire of the British Nation was formed. How did that happen you ask? A good question, deserving of a good answer and, although the Britons don&#8217;t like to talk about it, the incident uprooted some entrenched colonial mindsets. Indeed, Samosas proved to be more tasteful than Fish and Chips, and the importance of the nation states was in decline, anyways. 
 
The true masters of the times were the powerful steam barons, men who controlled the planet by controlling the energy. Their boots were placed firmly on the necks of the people they ruled. People who gladly payed for the privilege. Woe be to those foolish enough to tamper with their patents&#8230; the results were&#8230; well&#8230; let us just say that those foolhardy wretches would most certainly NOT be enjoying their final rest under a standard tombstone. 
 
Energy was what mankind needed, hungered for, lusted after... energy. For airboats and cellular calculation machines, for geostationary weather factories and the energy to fuel the Infodampfbahn, the transcontinental data-steam network.

Societal business as usual. But can there be a better tomorrow?

monochrom try to reinterpret the steampunk genre in form of a steamy puppet extravaganza. A journey into the backwaters of imagination!

------------

With Roland Gratzer, Johannes Grenzfurthner, Evelyn Fuerlinger, David Dempsey, Sean Bonner, Dan Kaminsky and Bre Pettis.

Puppet and audio team: Clemens Kindermann, Franz Ablinger und Guenther Friesinger</description>
        <persons>
          <person id="962">Johannes Grenzfurthner</person>
        </persons>
        <links>
          <link href="http://www.monochrom.at/english">monochrom</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2360-en-all_tomorrows.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2360-en-all_tomorrows.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2287">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>sex20</tag>
        <title>Sex 2.0</title>
        <subtitle>Hacking Heteronormativity</subtitle>
        <track>Society</track>
        <type></type>
        <language>de</language>
        <abstract>Der lange Schwanz der Dating-Communities sowie die De- und Rekonstruktion von Geschlecht und sexueller Orientierung haben ungeahnte Auswirkungen auf unser Sexualleben. Ein &#220;berblick dar&#252;ber, was Sex ist, wie Dating-Communities funktionieren und wie man zu einem erf&#252;llten Sexualleben kommen kann.</abstract>
        <description>* Vergleich von Dating-Communities
* Live-Hack: Massive Parallel Dating mit ELIZA
* Unterschiede und Gemeinsamkeiten zwischen m&#228;nnlicher/weiblicher Sexualit&#228;t sowie Hetero- und Homosexualit&#228;t
* Soziale Auswirkungen des Online-Datings

</description>
        <persons>
          <person id="1681">Florian Bischof</person>
        </persons>
        <links>
          <link href="http://www2.gender.hu-berlin.de/gendermediawiki/index.php/Hauptseite">Gender@Wiki </link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2287-de-sex20.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2287-de-sex20.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2352">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>hacker_jeopardy</tag>
        <title>Hacker Jeopardy</title>
        <subtitle>Die ultimative Hacker-Quizshow</subtitle>
        <track>Community</track>
        <type>contest</type>
        <language>de</language>
        <abstract>Das bekannte Quizformat - aber nat&#252;rlich mit Themen, die man im Fernsehen nie zu sehen bek&#228;me.</abstract>
        <description>Simultan&#252;bersetzung ins Englische / Immediate english translation available on DECT 8101

Hacker Jeopardy ist ein Quiz nach dem bekannten umgedrehten Antwort-Frage-Schema. Heise hat es mal "Zahlenraten f&#252;r Geeks" genannt, was nat&#252;rlich eine unfair vereinfachte Darstellung ist &#8211; es m&#252;ssen auch Buchstaben und Sonderzeichen erraten werden. :)

Es werden drei Auswahlrunden gespielt, deren Sieger im Finale gegen den Titelverteidiger des Vorjahres antreten m&#252;ssen. Wer war das noch?</description>
        <persons>
          <person id="101">Stefan 'Sec' Zehl</person>
          <person id="933">Ray</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2352-de-hacker_jeopardy.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2352-de-hacker_jeopardy.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 2">
      <event id="2371">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>wahlstift</tag>
        <title>Hamburger Wahlstift</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Am 24. Februar wollte Hamburg als Pilotprojekt mit dem Digitalen Wahlstift w&#228;hlen.</abstract>
        <description>Wir haben das System durchleuchtet und zeigen den technischen Aufbau sowie Risiken und Nebenwirkungen. Einem Angreifer stehen verschiedene Methoden zur Manipulation offen, die erl&#228;utert und hinsichtlich ihres praktischen Wertes f&#252;r Wahlmanipulierer bewertet werden.</description>
        <persons>
          <person id="1337">Jens Muecke</person>
          <person id="9">Frank Rieger</person>
          <person id="1185">Sven &#220;belacker</person>
        </persons>
        <links>
          <link href="http://www.24-februar.de">Werbeseite zur Wahl</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2371-de-wahlstift.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2371-de-wahlstift.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2271">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>distributed_campaigns</tag>
        <title>Distributed campaigns for promoting and defending freedom in digital societies</title>
        <subtitle>Sharing experience about campaigning on the political field in France</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>A presentation of a few successful campaigns in France lead by libre software activists for defending freedom in a digital world: bringing awareness of the politicians about the dangers of the EUCD transposition and DRM, and their economical, social and political impact and influencing the candidates at a presidential election to talk about Libre Software, software patents, DRM, etc. How did we do that? What have we learned? Maybe for political action _too_, sharing is a way of just doing it better.</abstract>
        <description>Our french libre software association, APRIL, is getting bigger. We just passed the 1700th individual member, and got over the last years corporate members such as SUN Microsystems, Thal&#232;s, Neuf/Cegetel, Wengo, Fon, Adacore, Mandriva, etc. We now have three persons working full-time. Our main objectives are to raise awareness about Libre Software and defend it whenever it's in danger.

For the last few years, the menaces became more and more threatening for our freedom in the digital world. We had to build campaigns and tools to structure our efforts and cooperation between individuals and organizations.

- EUCD.INFO : For 3 years, 1 to 3 persons worked full-time to build solid documentation, contact politics, 
write amendments, contact journalists, etc. about the French transposition of the EUCD directive (DADVSI law). 
Over the criminalizing of DRM circumvention, this transposition brought very specific legal weapons supposed to 
"fight piracy" that were among the most radical, impressive and nefarious ever seen. Some of them were pushed back
 thanks to our efforts, but many of them may come back again very soon : private police and filtering of the Internet,
 censorship of authors of software "mainly used for distributing content without their author's consent", etc. Nevertheless, 
around the legal text in the parliament, our efforts brought many "collateral benefits".

- CANDIDATS.FR: This campaign goal was to influence the candidates at elections so they think and work and talk about 
libre software, interoperability, DRM, software patents, open standards, etc. (Candidats.fr). Thanks to some political 
acrobatics, 9 out of the 12 candidates, including the 5 first ones, replied to our very precise questionnaire.

During the legislative campaign (for electing the deputies), we built a distributed web platform where volunteers 
took responsibility and reported about contacting their local candidates to make them sign a "Pacte du Logiciel Libre" 
(pact of free-as-free-speech software). This very short and precise document acknowledges the benefits of our freedom for 
economics, society and innovation, and their need for protection when they're endangered. Out of the 7600 candidates, 
more than 500 signed our pact. 66 of the 577 elected signed it, thanks to the help of 600 volunteers. 

- StopDRM.info is a group of activists born during the storm caused on a french part of internet during the 
longer-than-expected examining of the DADVSI law. Their aim is to educate regular consumers about DRM. They organised 
flashmobs in music/video superstores with up to 100 persons and later turned themselves to the police for having 
circumvented DRM under the new DADVSI law. (They are still waiting for their trial ! ;)

-&gt; How did we build these campaigns? 
-&gt; What have we learned from them? 
-&gt; What are the common pitfalls to avoid? 
-&gt; How to reach journalists, politicians, general public? 
-&gt; How to "spin" a campaign? 
-&gt; How could we achieve better cooperation between individuals and non-profits to share this knowledge?</description>
        <persons>
          <person id="1505">j. Zimmermann</person>
        </persons>
        <links>
          <link href="http://www.april.org">APRIL, french non-profit organization for promoting and defending libre software</link>
          <link href="http://www.eucd.info">Campaign for raising awareness about DRM, the criminalization of their circumvention, and their effects on economics, law, innovation</link>
          <link href="http://www.candidats.fr">Campaigns to make the candidates to elections work on freedom in the digital world</link>
          <link href="http://www.stopDRM.info">campaigns to educate consumers about music and video locked-down with DRM</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2271-en-distributed_campaigns.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2271-en-distributed_campaigns.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2255">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>wahlchaos</tag>
        <title>Wahlchaos</title>
        <subtitle>Paradoxien des deutschen Wahlsystems</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Wahlchaos besch&#228;ftigt sich mit Wahlverfahren aus mathematischer und politischer Sicht. So wurden die Wahlen von 1998, 2002 und 2005 betrachtet und a-postpriori manipuliert und ihre Auswirkungen diskutiert.</abstract>
        <description>Wir haben mit "Stimmst&#246;rungstheorie der Bundestagswahl" verschiedene Szenarien betrachtet und einige Paradoxien unter die Lupe genommen. Genauer werden Themen wie Zuteilungsverfahren, &#220;berhangmandate, Erst- und Zweitstimmen, Wahlkreisreorganisation betrachtet.
Au&#223;erdem wird die Frage analysiert, wo und wie viele Stimmen man &#228;ndern muss, um einen Patt bei der Regierungsbildung zu erreichen.
</description>
        <persons>
          <person id="1723">Markus Schneider</person>
        </persons>
        <links>
          <link href="http://univis.uni-magdeburg.de/form?__s=2&amp;dsc=anew/lecture_view&amp;lvs=fgse/ipw/zentr/psy_0&amp;anonymous=1&amp;founds=fgse/ipw/zentr/psy_0,fma/iag/zentr/comput,/linear,/mab,/oberse&amp;nosearch=1&amp;ref=main&amp;sem=2006s&amp;__e=876">Seite des Seminars aus dem Universit&#228;tsinformationssystem</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2255-de-wahlchaos.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2255-de-wahlchaos.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2270">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>sputnik_data_analysis</tag>
        <title>Analysis of Sputnik Data from 23C3</title>
        <subtitle>Attempts to regenerate lost sequences</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>In December 2006, in BCC 1000 attendees were wearing Sputnik Tags. Data was stored, and then made available for analysis. Unfortunately, all IDs of tags were lost. This lecture presents what was stored, what happened to it, and attempts of reconstructing IDs and sequences of movements.</abstract>
        <description>Presentation shows simple statistics of Sputnik data. The main part is description of ways of generating sequences of packets generated by tags. Two methods, local and global are described, with few variants. Problems with using those methods are presented.
</description>
        <persons>
          <person id="1731">Tomasz Rybak</person>
        </persons>
        <links>
          <link href="http://www.openbeacon.org/">Main page of Sputnik Project</link>
          <link href="http://www.bogomips.w.tkb.pl/sputnik.html">My page with some analysis</link>
          <link href="http://pmeerw.net/23C3_Sputnik/">Page with analysis made by Peter Meerwald</link>
          <link href="http://wiki.openbeacon.org/wiki/Datamining">Open Beacon Wiki about analysing data</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2270-en-sputnik_data_analysis.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2270-en-sputnik_data_analysis.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2325">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>current_events_in_tor_development</tag>
        <title>Current events in Tor development</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Come talk with Roger Dingledine, Tor project leader, about some of the challenges in the anonymity world.
</abstract>
        <description>How do we get enough users? How do we get enough servers? How does public perception impact the level of anonymity a system can provide? How should we be interacting with law enforcement? How can we patch Wikipedia so it no longer needs to fear anonymous users -- or can we do it without changing Wikipedia at all? Can we protect Tor users who want to keep running their active content plugins? When are we going to see well-documented and well-analyzed LiveCD, USB, virtual machine, and wireless router images for easier and safer deployment?

Should Tor switch to transporting IP packets, or should it continue to work at the TCP layer? How do we scale the directory system while handling heterogeneous and unreliable nodes, and without sacrificing security? Are three-hop paths really still better than two hops?

What are the performance/legal/security tradeoffs of caching content at the exit nodes? Are padding and traffic shaping still bad ideas? Why aren't more people using hidden services and censorship-resistant publishing? Is everybody comfortable with having corporate and government users on the same network? How's it going with China and Saudi Arabia? What development projects does The Tor Project need your help with?

Roger will give you his best answers for some of these topics and more, but you are encouraged to bring your own questions too.</description>
        <persons>
          <person id="199">Roger Dingledine</person>
        </persons>
        <links>
          <link href="https://tor.eff.org/">Tor</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2325-en-current_events_in_tor_development.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2325-en-current_events_in_tor_development.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2272">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>hacking_in_the_age_of_declining_everything</tag>
        <title>Hacking in the age of declining everything</title>
        <subtitle>What can we do when everything we thought turns out to be wrong</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?</abstract>
        <description>1) A Challenge to everything we know: Peak Oil/Gas and Climate Change

A quick run down of some of the core ideas and concepts behind these threats to industrial society and the human species as a whole.

2) A Hacker's view of our choices and our role in the process of change

If Climate change and Peaking fossil fuel production pose threats to human society, how can hackers help to make the change to a more sustainable way of being less traumatic. Does the future have a place for the technology abusers and tweakers?

3) One Hacker's personal recollection of a trip into one possible future

I had the chance to go to Kenya's border with Somalia with the UN aid effort in 2006. In this place many of the catastrophes that are foretold for the rest of the world have already happened, with governmental  collapse, lack of resources and war. Rather weirdly, many many people displayed all kinds of traits one would expect to find in Hackers... </description>
        <persons>
          <person id="1575">Emerson</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2272-en-hacking_in_the_age_of_declining_everything.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2272-en-hacking_in_the_age_of_declining_everything.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2346">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>meine_finger_gehoeren_mir</tag>
        <title>Meine Finger geh&#246;ren mir</title>
        <subtitle>Die n&#228;chste Stufe der biometrischen Vollerfassung</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Zum 1. November 2007 ging der biometrische Reisepass in die n&#228;chste Ausbaustufe. Seitdem m&#252;ssen reisewillige B&#252;rger neben dem frontalen Gesichtsbild auch noch ihre Fingerabdr&#252;cke abgeben. </abstract>
        <description>Wir wollen in dem Vortrag auf die Probleme eingehen, die es seit der Einf&#252;hrung des ePasses gab. Fingerabdr&#252;cke werden nun f&#252;r Kinderreisep&#228;sse bereits ab dem 6. Lebensjahr aufgenommen, obwohl bekannterma&#223;en die biometrischen Merkmale Heranwachsender f&#252;r die Erkennungssysteme ungeeignet sind. Auch die Schwierigkeiten &#228;lterer Menschen mit den Systemen haben sich im realen Einsatz als noch gr&#246;&#223;er als erwartet erwiesen.
Besonderes Augenmerk legen wir auf die praktische Handhabung der Abgabe der Fingerabdr&#252;cke sowie Studien und Berichte von Melde&#228;mtern und Grenz&#252;berg&#228;ngen.</description>
        <persons>
          <person id="381">Constanze Kurz</person>
          <person id="63">starbug</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2346-de-meine_finger_gehoeren_mir.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2346-de-meine_finger_gehoeren_mir.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2387">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>open_source_lobbying</tag>
        <title>Open Source Lobbying, tips from the trenches</title>
        <subtitle>From one angry e-mail to writing national policy on open source</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>On January 1st, 2002 I tried to use the website of the Dutch national railway (www.ns.nl) using Linux. The site refused me access, it was IE-only. This sparked a conversation with members of parliament about the need for open standards. Over a five year period I progressed from talking to opposition-MP's to meeting the economics minister directly and was able to significantly influence national policy despite total lack of funding or any specific mandate.</abstract>
        <description>On December 12th we achieved a stunning victory, the Dutch public sector will move to standardize on Open Documents Format and use opensource where comparable functionality is available in all new procurements as of 2008. Use of ODF as a public sector document standard will be mandatory in 2009. My talk will tell the tale of why we did it but mostly how we did it and how others can do it too in other countries around the world. How to get access to the power-that-be, how to get non-technical people interested in the subject. How to align your policy proposals with existing policies. While I'll do a short lead-in with some of the political reasons for wanting open standards and opensource in government IT I'll focus mainly on how to get results. From having no policy at all in 2002 the Dutch government has recently decided to mandate the use of open standards for all government institutions, health care, education, libraries and any other tax-funded organizations. Opensource software will receive preferential treatment.

Details:

1. Why; opensource and open standards in government-IT
Why this vital to our democracies,
Good for our economy,
Ultimately good for the effectiveness and efficiency of government,

2. Small beginnings; the importance of a trigger-events
The Dutch situation &#8211; laggards in Europe,
Access denied; being forced to buy proprietary software by government,
Action; don't get mad, get even

3. Moving up; from the digital barricades to playing in parliament,
Translating what you know is wrong with the world into viable policy,
Cars &amp; TV's; using analogies to explain concepts,
Building relationships with key people,
Machiavelli; being politically smart without losing your idealism

4. Having an impact; creating actual policy, 
So you finally got your 45 minute meeting with the minister, now what?
Helping the politico's to shine, 
Building trust with the civil servants

5. Wrap-up
Ghandi was right (ignore, laugh, fight, win),
The Dutch policy in EU-context, exporting a good idea,
Get ready for the counter-attack!

The slide presentation and an English translation of the official policy document will be made available under Creative Commons licence.
</description>
        <persons>
          <person id="1732">Arjen Kamphuis</person>
        </persons>
        <links>
          <link href="http://linux.slashdot.org/article.pl?sid=07/12/10/2317232"> The Dutch plan in Slashdot</link>
          <link href="http://www.heise.de/newsticker/meldung/100482">Heisse in the Dutch plan (in German)</link>
          <link href="http://money.cnn.com/news/newsfeeds/articles/djf500/200712131132DOWJONESDJONLINE000888_FORTUNE5.htm">CNN Money report on business impact</link>
          <link href="http://www.msnbc.msn.com/id/22245923/">Even MSNBC reports it!</link>
          <link href="http://opensourcelearning.info/blog/?p=704">Nice english summary of the parlaiments desicions</link>
          <link href="http://appz.ez.nl/publicaties/pdfs/07ET15.pdf">English translation of the policy document</link>
          <link href="http://virtuelvis.com/archives/2007/12/norway-mandates-html-pdf-odf">Norway doing the same thing</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2387-en-open_source_lobbying.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2387-en-open_source_lobbying.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
          <link href="http://video.google.nl/videoplay?docid=-8191379698144025925&amp;hl=nl">The talk in Google Video</link>
        </links>
      </event>
      <event id="2276">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>space_communism</tag>
        <title>Space Communism</title>
        <subtitle>Communism or Space first?</subtitle>
        <track>Culture</track>
        <type>other</type>
        <language>en</language>
        <abstract>Following "Chaos und Kritische Theorie" from 23C3, another verbal battle: Oona Leganovic (aka Ijon Tichy) will promote the idea to sublate the capital relation and bring about communism first and only then to go to Space, because otherwise the earthly problems will be spread everywhere. Daniel Kulla (impersonating Captain Kathryn Janeway) will, on the other hand, defend the exploration humanism that once already ended the middle ages and of which can be expected to do the same to the crusted planetary commodity circus.</abstract>
        <description>No doubt, Earth is humanity's cradle once to be left behind for outer space. But should we do that as soon as possible hoping it will solve our social problems in the process? Or would it be better to solve them first, could it be these problems that won't allow us to pursue space exploration at all?

Ijon Tichy from Stanislaw Lem's "Star Diaries" will exemplify the omnipresence of human error and improvisation. This will make for a strong argument to establish a society shaped by human condition rather than the exchange value, before going anywhere else.

Captain Kathryn Janeway from Star Trek Voyager portrays the attempt to keep control over technology and social relations. While aiming at universal emancipation as well, she advocates a "first things first" doctrine and stresses the importance of horizon expansion, both in exploration and the quest for self-awareness.  </description>
        <persons>
          <person id="664">Oona Leganovic</person>
          <person id="476">Daniel Kulla</person>
        </persons>
        <links>
          <link href="http://events.ccc.de/camp/2007/Fahrplan/events/1856.en.html">"Weltraumkommunismus" auf dem Camp '07</link>
          <link href="http://dewy.fem.tu-ilmenau.de/CCC/CCCamp07/video/m4v/cccamp07-de-1856-Weltraumkommunismus.m4v">Videomitschnitt vom Camp (m4v, 144 MB)</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2276-en-space_communism.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2276-en-space_communism.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 3">
      <event id="2344">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>grundlagen_der_sicheren_programmierung</tag>
        <title>Grundlagen der sicheren Programmierung</title>
        <subtitle>Typische Sicherheitsl&#252;cken</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Dieser Vortrag bietet eine &#220;bersicht &#252;ber einige Dinge, welche man im Kopf behalten sollte, wenn man Software schreibt - vorausgesetzt, diese soll nachher nur von der Person benutzt werden, die sie auch betreibt. Die theoretischen Aspekte der Sicherheit werden mit Codebeispielen untermalt.</abstract>
        <description>In der Programmierung gilt Sicherheit oft als ein von Schamanen betriebenes und mit Zauberkraft gesichertes Geheimnis. Viele Leute predigen verschiedene Wege, sicheren Code zu schreiben. Die meisten dieser Wege laufen auf die Verwendung bestimmter Programmiersprachen hinaus.

Im Laufe des Vortrages wird allerdings gezeigt, dass nur Sachkenntnis &#252;ber die potentiell auftauchenden Probleme der Schl&#252;ssel zu einem sicheren Programm ist. Dabei richtet sich der Vortrag haupts&#228;chlich an Leute, die sich nicht in ihrem allt&#228;glichen Leben mit dem Finden von Sicherheitsl&#252;cken in Software besch&#228;ftigen.</description>
        <persons>
          <person id="1124">Tonnerre Lombard</person>
        </persons>
        <links>
          <link href="http://vulns.bsdprojects.net/">Webseite mit den gezeigten Codefragmenten</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2344-de-grundlagen_der_sicheren_programmierung.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2344-de-grundlagen_der_sicheren_programmierung.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2190">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>introduction_in_mems</tag>
        <title>Introduction in MEMS</title>
        <subtitle>Skills for very small ninjas</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>MicroElectroMechanical Systems or MEMS are as part of micro system technology, systems with electrical and mechanical subsystems at the micro scale. It is basically an introduction in the technology and in its potential for hardware hacks and potential ways of homebrew devices.</abstract>
        <description>Compared to a micro processor, a small sensor or actuator, which normally consists of just one function a micro system combines the data acquisition, processing, and forwarding in itself. If this micro system now contains mechanical part to interact with its environment it is considered to be a MEMS. 
With constantly increasing experience in MEMS manufacturing the prices per system dropped and the use of the highly sophisticated devices move from strictly automotive, R&amp;D and military applications into consumer products. The wiimote and the iPhone are just two well known products which improve the user experience by the intelligent use of the smart systems.
The delay of invention and market introduction of MEMS is mostly caused by the substantial investments to be done to produce this kind of device. The most technologies commonly used until now are transfered from the microchip manufacturing. The so called silicon micromachining uses silicon single crystal disks (Wafers) in combination with batch lithography and etch processing to form the today available systems.
This limitation to very difficult and expensive processes restricts the potential manufacture to companies already in the semiconductor business or companies with huge financial backup. Further more the limitation to a very few materials slows down the whole development in the micro scale because of the laking design freedom for the system developer. 
This is the reason that researcher all over the world try to move from Si to alternative material and work out processes and combination out of those that allow further miniaturization, bigger material lineup, dramatically decrease in investment costs.

This talk is giving you an overview of available MEMS, there processes and  restriction as well as future developments and the possibility of start of your own MEMS farm. 
</description>
        <persons>
          <person id="1657">Jens Kaufmann</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2190-en-introduction_in_mems.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2190-en-introduction_in_mems.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2256">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>openser_sip_server</tag>
        <title>OpenSER SIP Server</title>
        <subtitle>VoIP-Systeme mit OpenSER</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Der Vortrag stellt OpenSER und das Open Source Projekt dahinter vor. OpenSER ist ein flexiber und leistungsf&#228;higer SIP Server, mit dem alle Arten von Voice over IP Infrastrukturen realisiert werden k&#246;nnen. Er ist sowohl im DSL Router als Telefonanlage f&#252;r die Wohngemeinschaft als auch von Carriern mit mehreren Millionen Kunden einsetzbar. Anhand dieser Beispiele werden einige gebr&#228;uchliche Einsatzszenarien aufgezeigt. Daf&#252;r ist es notwendig, kurz auf die Konfiguration, die Anbindung an Datenbanken und die wichtigsten Module einzugehen. Abschlie&#223;end wird anhand des aktuellen Release 1.3 und der Roadmap die weitere Entwicklung des Projektes vorgestellt.</abstract>
        <description>Der OpenSER SIP Server ist eine leistungf&#228;hige Komponente zur Realisierung von Voice over IP Systemen. Im Gegensatz zu Asterisk ist OpenSER nur in der Lage, SIP Nachrichten zu verarbeiten, dies allerdings mit sehr effektiv.

Der Server ist mit Hilfe seines Konfigurationsskripts und durch zahlreiche Module individuell an die verschiedensten Aufgaben anzupassen. Wichtige Bausteine eines VoIP Systems, wie Registrar, Proxy, Balancer, Location lassen sich einfach aufsetzen, es sind aber auch komplexe Applikationsserver mit vergleichsweise wenig Aufwand zu realisieren.

Der Kern von OpenSER k&#252;mmert sich um grundlegende Aufgaben wie die Initialisierung von Modulen, die Speicherverwaltung und das Parsen von Nachrichten. Komplexere Dienste, wie beispielsweise die Datenbankanbindung oder Benutzerauthentifizierung sind &#252;ber Module angebunden. 

Nun wird zun&#228;chst ein einfaches VoIP System mit den wichtigsten Bestandteilen vorgestellt, wie es f&#252;r kleinere Benutzergruppen und geringere Anforderungen an die Verf&#252;gbarkeit gut geeignet ist. Beispielhaft werden anschlie&#223;end weitere Komponenten hinzugef&#252;gt, wie ein Gateway zum Festnetz oder XMMP, oder ein Loadbalancer. Auf eine detaillierte Diskussion der Konfiguration oder Einrichtung wird verzichtet, der Fokus liegt mehr auf einer allgemeinen Darstellung der Herangehensweise bei der Implementierung von VoIP Diensten.

Nach Darstellung des Servers wird noch kurz auf das dahinter stehende Projekt eingegangen. Am Beispiel des aktuellen Release 1.3 l&#228;sst sich gut die Projektphilosophie erkennen. Die Offenheit gegen&#252;ber Beteiligungen, sowohl von Einzelpersonen als auch professionellen Entwicklern, und regelm&#228;&#223;ige und h&#228;ufige Releases zeichnen das Projekt aus. Abschlie&#223;end steht ein kurzer &#220;berblick &#252;ber die Neuigkeiten im aktuellen Release und ein Ausblick auf interessante anstehende Entwicklungen.</description>
        <persons>
          <person id="1721">Henning Westerholt</person>
        </persons>
        <links>
          <link href="http://openser.org/dokuwiki/">OpenSER Dokumentation</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2256-de-openser_sip_server.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2256-de-openser_sip_server.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2213">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>getting_things_done</tag>
        <title>Getting Things Done</title>
        <subtitle>Der Antiverpeil-Talk</subtitle>
        <track>Culture</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Eine Einf&#252;hrung ins Antiverpeilen mit Tools und Techniken rund um David Allens "Getting Things Done"-Methodik.</abstract>
        <description>Verpeilen hei&#223;t etwas nicht auf die Reihe zu bekommen, obwohl man dazu in der Lage gewesen w&#228;re. Die grundlegenden Ursachen des Verpeilens sind ein st&#228;ndig durch Hintergrundtasks belegter Kopf und die Unentschlossenheit dar&#252;ber, was man eigentlich machen wollte. Die naheliegende L&#246;sung ist es, sein Gehirn auszulagern.

Techniken, um dies zu erreichen, sind David Allens "nat&#252;rliches Planungsmodell" und die Etablierung eines generischen Workflows. Zur Unterst&#252;tzung dieser Techniken werden die Tools ThinkingRock, PocketMod und Freemind vorgestellt.

ThinkingRock ist eine Art Todo-Liste auf Anabolika, PocketMods stellen sowas wie Papier-PDAs dar und Freemind ist eine Mindmapping-Software.
Die vorgestellten Tools sind "plattformunabh&#228;nhig", d. h. zumindest f&#252;r Mac, Linux und Windows verf&#252;gbar.</description>
        <persons>
          <person id="222">Stephan Schmieder</person>
        </persons>
        <links>
          <link href="http://unixgu.ru/papers/gtd.html">Keylearnings mindmap</link>
          <link href="http://www.amazon.de/dp/0142000280">The Manual bei Amazon</link>
          <link href="http://unixgu.ru/lib/exe/fetch.php?id=papers&amp;cache=cache&amp;media=gtd-mrmcd-slides.pdf">Slides from the same talk at mrmcd110b</link>
          <link href="http://www.thinkingrock.com.au">ThinkingRock - related tool</link>
          <link href="http://freemind.sf.net">Freemind - related tool</link>
          <link href="http://www.lifehack.org">Lifehack - related blog</link>
          <link href="http://www.zenhabits.net">Zen Habits - related blog</link>
          <link href="http://www.lifeoptimizer.org">Life Optimizer - related blog</link>
          <link href="http://www.imgriff.com">im Griff - related blog</link>
          <link href="http://www.structuredprocrastination.com/">das im Vortrag erw&#228;hnte Anti-Procrastination Tutorial</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2213-de-getting_things_done.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2213-de-getting_things_done.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2353">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>from_ring_zero_to_uid_zero</tag>
        <title>From Ring Zero to UID Zero</title>
        <subtitle>A couple of stories about kernel exploiting </subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted. </abstract>
        <description>Due to the intrinsic complexity of the kernel, each exploit has been mostly a story on itself, and very little work has been done into finding a general modelization and presenting general exploiting approaches for at least some common categories of bugs. Moreover, the main target has usually been the Linux operating system on the x86 architecture. 

This talk reprises and continues the attempt done in this direction with the Phrack64 paper &#8220;Attacking the Core: Kernel Explotation Notes&#8221; that we released six months ago. A more in-depth discussion of some Solaris kernel issue (both on x86 and SPARC) and a more detailed analysis of Race Conditions will be presented.    </description>
        <persons>
          <person id="1772">sgrakkyu</person>
          <person id="1771">twiz</person>
        </persons>
        <links>
          <link href="http://www.phrack.org/issues.html?issue=64&amp;id=6#article">Phrack #64: Attacking the Core : Kernel Exploiting Notes</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2353-en-from_ring_zero_to_uid_zero.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2353-en-from_ring_zero_to_uid_zero.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2281">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>haxe</tag>
        <title>haXe</title>
        <subtitle>hacking a programming language</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>haXe is a programming language for developing both server AND client side of a website. haXe can do Javascript/AJAX, Database access and even Flash and video streaming. All with one single programming language.</abstract>
        <description>Nicolas will introduce the basic concepts of haXe, show how to use haXe to create the different parts of a website or application and how we can tie them together elegantly. He will also introduce some tools that have been developed in haXe, such as the haxeVideo streaming server, the hxASM library for doing Flash9 assembler, and some games. He will finally talk about the possible futures of web development and how haXe is related to them.</description>
        <persons>
          <person id="1747">Nicolas Cannasse</person>
        </persons>
        <links>
          <link href="http://haxe.org">haXe website</link>
          <link href="http://nekovm.org">neko website</link>
          <link href="http://haxe.org/hxasm">hxASM website</link>
          <link href="http://haxevideo.org">haxeVideo website</link>
        </links>
      </event>
      <event id="2166">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>embedded_devices_reverse_engineering</tag>
        <title>Reverse Engineering of Embedded Devices</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The event aims on reverse engineering small boxes you can buy at your local Saturn or Media Market like SOHO Routers.</abstract>
        <description>It will be presented what you can do to get access on a box. This lecture includes firmware reversing as well as opening the box, voiding the warranty and see what you can do.</description>
        <persons>
          <person id="1624">dash</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2166-en-embedded_devices_reverse_engineering.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2166-en-embedded_devices_reverse_engineering.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2286">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>openstreetmap</tag>
        <title>OpenStreetMap, the free Wiki world map</title>
        <subtitle>3 years done - 10 to go?</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The OpenStreetMap project has achieved remarkable successes in creating a free world map, and is growing fast. This talk gives an overview of what we do, why we do it, and what our data can be used for.</abstract>
        <description>The year 2007 has seen a lot of money thrown around for the acquisition of the world's two largest Geodata providers: TeleAtlas have been bought by TomTom for EUR 1.8 billion, and NavTeq by Nokia for EUR 5.7 billion.

These transactions have revived the fear that the world may end up with a digital map monopoly, with users migrating to the provider with the most comprehensive data and then further strengthening its position by
adding their own information.

OpenStreetMap is the free and open alternative to commercial providers - where users collect GPS tracks and additional information and make that into a high-quality map. The Economist concluded an article about the
aforementioned geodata big guns saying: "In time, such [OpenStreetMap] contributions could create a detailed, free map of the world. If so, TomTom's and Nokia's acquisitions would look very overpriced."

This talk intends to give an overview about the technology, the methods and the community behind OpenStreetMap, explain what we've achieved so far, and of course why OpenStreetMap is twice as cool as anything you can buy for money. In true hacking spirit we will also demonstrate a few rather unconventional uses of our data.</description>
        <persons>
          <person id="1738">Frederik Ramm</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2286-en-openstreetmap.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2286-en-openstreetmap.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2400">
        <start>23:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>camp_film</tag>
        <title>Chaos Communication Camp '07: The Movie</title>
        <subtitle></subtitle>
        <track>Community</track>
        <type>movie</type>
        <language>en</language>
        <abstract>The Chaos Communication Camp 2007 was an international, five-day open-air event for hackers and associated life-forms... let's see what the documentation team made out of it.   </abstract>
        <description></description>
        <persons>
          <person id="1853">Kirian Scheuplein</person>
          <person id="491">fh</person>
          <person id="8">Julia L&#252;ning</person>
        </persons>
        <links>
          <link href="http://www.creatmosfairy.tv/">CreAtmosFairy 2-4 dimensions design</link>
          <link href="http://events.ccc.de/camp/2007/Intro/">Chaos Communication Camp 2007 Website</link>
        </links>
      </event>
    </room>
  </day>
  <day date="2007-12-30" index="4">
    <room name="Saal 1">
      <event id="2331">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>spotter_guide_to_aacs_keys</tag>
        <title>A Spotter's Guide to AACS Keys</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images).
</abstract>
        <description>AACS has been repeatedly cracked. Its revocation mechanisms are intended to ensure that none of these cracks is permanent, but the evidence so far suggests that crackers will continue to win against it. The talk will explain the many types of AACS keys, how the system fits together, why it will keep breaking, and what Hollywood gains by using it anyway.  

We will also consider whether it is possible for DRM to be any more evil. Is BD+ (an optional, Blu-Ray only DRM system) going to be worse for users? Will future generations of DRM be worse? Or, if the free world can survive AACS, can it survive anything?</description>
        <persons>
          <person id="1701">Peter Eckersley</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2331-en-spotter_guide_to_aacs_keys.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2331-en-spotter_guide_to_aacs_keys.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2158">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>the_arctic_cold_war</tag>
        <title>The Arctic Cold War</title>
        <subtitle>The silent battle for claiming and controlling the Arctic</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Russia, Canada, the United States and Denmark are each pushing for more control and access to the resources of the Arctic. In the balance hangs the future of an entire ecosystem and our planet.</abstract>
        <description>In August of 2007, a Russian submarine planted a flag under water claiming more territory on the sea bed of the arctic for Russia. Back home they were welcomed as heros, like cosmonauts returning from the moon. In the boardrooms of the state owned oil company, executives were already salivating about the alleged oil and gas reserves that lay untapped below their chunk of the arctic.

Meanwhile in North America, similar salivating is taking place, as both Canada and the United States send military and civilian ships to claim their piece of the alleged pie.

In between there's Greenland, administered by the Danes, who also realize there's money to made and national pride at stake.  

But what about the people of the earth? The communities, the ecosystem, both in the arctic and throughout the globe... What will happen to them if the Arctic meltrush goes into full throttle?

This talk is about the new cold war, where nations and corporations carve up one of the most important regions on earth and fight amongst themselves for control.. for money.. for power. And as the melt-rush goes forward, citizens of the world are left in the dark about just what plans their governments have and what is at stake for every living thing on earth. </description>
        <persons>
          <person id="910">Bicyclemark</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2158-en-the_arctic_cold_war.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2158-en-the_arctic_cold_war.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2296">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>random_things</tag>
        <title>A collection of random things</title>
        <subtitle>Look what I found under the carpet</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will be similar to my unusual bugs talk last year. I'll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.</abstract>
        <description>Here's a short summary of the things I'll cover:

* Using OOB data to bypass IDS
OOB data is an obscure feature of TCP. Although there are RFC's describing how this should be handled, the implementations of it vary, and it makes for an excellent candidate to hide data from IDS'. 
The most common case with OOB data is that applications don't have any measures in place to handle them, and it's up to the OS to decide what to do with it. The RFC says to just queue it up till the next OOB you get and then discard it, but not all operating systems do this.
Another case is where an application does handle OOB data, and it's delivered to the application, which'll deal with it in its application specific way, there is _NO_ way an IDS can predict how the application deals with it. 

* /dev/[k]mem race conditions in suids
Reading from /dev/[k]mem is tricky, it always has been. There is absolutely no way you can guarantee what you just read is still valid the nanosecond after you read it. 
Mostly because you can't lock the kernel from userspace (and rightfully so !). This leads to interesting synchronization issues where suid applications read certain kinds of data from /dev/[k]mem. Most interestingly it can lead to information leaks from the kernel, such as reading parts of the buffer cache, sniffing a person's tty, ...
	
* TCP Fuzzer that goes beyond the 3-way-handshake
Ah, fuzzers, my favorite tools for easy bughunting. Somewhere last year it occurred to me that there really aren't any decent fuzzers for fuzzing low level TCP handling.
At least nothing that goes beyond the 3-way-handshake (commercial fuzzers that cost a metric asston of money don't count), which is quite a shame since handling all the cases correctly is quite complex and difficult to accomplish, surely some bugs are still leftover in this department. 
In this part of the talk I'll give a rundown of all the things taken into consideration for TCP fuzzing, and I'll present the preliminary results. This part of my talk is a joint cooperation with Dan Kaminsky.

* snprintf() corner cases
The safe alternative !!1! or maybe not. snprintf() is kind of an oddball. Certainly it's better than its older brother, but it does have its corner cases. The c99 spec is very clear on some of its properties (for example, guaranteeing 0-byte termination), but then also leaves open a lot (in case of errors occurring). 
Here I'll present all the corner cases I've ran into, some of them are very os specific, and show a couple of examples. c99 is assumed, any implementation that doesn't comply to it isn't considered (those are usually far more broken).</description>
        <persons>
          <person id="50">Ilja</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2296-en-random_things.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2296-en-random_things.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2235">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>one_token_to_rule_them_all</tag>
        <title>One Token to Rule Them All</title>
        <subtitle>Post-Exploitation Fun in Windows Environments</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The defense techniques employed by large software manufacturers are getting better. This is particularly true of Microsoft who have improved the security of the software they make tremendously since their Trustworthy Computing initiative. Gone are the days of being able to penetrate any Microsoft system by firing off the RPC-DCOM exploit. The consequence of this is that post-exploitation has become increasingly important in order to "squeeze all the juice" out of every compromised system. Windows access tokens are integral to Microsoft's concept of single sign-on in an active directory environment. Compromising a system that has privileged tokens can allow for both local and domain privilege escalation.</abstract>
        <description>This talk aims to demonstrate just how devastating attacks of this form can be and introduces a new, open-source tool for penetration testers that provides powerful post-exploitation options for abusing tokens found residing on compromised systems. The functionality of this tool is also provided as a Meterpreter module for the Metasploit Framework to allow its use to be combined with the existing power of Metasploit. In addition, a complete methodology will be given for its use in penetration testing. This will include identifying tokens that can be used to access an otherwise secure target and then locating other systems that may house those tokens. A new vulnerability will also be revealed that appears to have been silently patched by Microsoft. The impact of this vulnerability is that privileged tokens can be found on systems long after the corresponding users have logged off.

The talk will focus on introducing the audience to the concept of windows access tokens and how they are utilised within windows with a particular focus on their importance within windows forest/domain environments. The talk will then move on to demonstrate how their functionality can be abused for powerful post-exploitation options, culminating in a live demo of my tool being used to escalate privileges significantly after system compromises both locally and across a domain. Interesting, important and unexpected nuances of how these tokens behave will then be discussed to demonstrate how risk could be unknowingly exposed even by those who think they already have a grasp of these issues. 

The talk will then move focus towards the advantages of combining these techniques with the existing post-exploitation focussed meterpreter, which comes with the metasploit framework. Another live demo will then be given, showing how these techniques can be utilised from within a meterpreter session after having exploited a system with metasploit. 

The focus of the talk will then be shifted again to discuss how systems housing tokens with desirable privileges can be located on large networks, such that penetration attempts can be focussed on these. A live demo will be given of how this can achieved with my tool and then it will be discussed how these techniques can be incorporated into standard penetration testing methodologies such that it will often be possible to expose gaping holes in networks that would have otherwise been considered relatively secure.

Finally, defence strategies will be dicussed in order for the audience to understand how best to defend themselves against these attacks.</description>
        <persons>
          <person id="1706">Luke Jennings</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2235-en-one_token_to_rule_them_all.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2235-en-one_token_to_rule_them_all.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2209">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>playstation_portable_cracking</tag>
        <title>Playstation Portable Cracking</title>
        <subtitle>How In The End We Got It All!</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved.

</abstract>
        <description>As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience.

The Playstation Portable has been the battle ground between Sony and a small group of hackers for close
on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one.

The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information.

The final part will describe roughly how in the end the security was completely defeated culminating in
Pandora's Battery and the customised initial program loader (IPL).

A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
</description>
        <persons>
          <person id="1676">TyRaNiD</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2209-en-playstation_portable_cracking.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2209-en-playstation_portable_cracking.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2354">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>latest_trends_in_oracle_security</tag>
        <title>Latest trends in Oracle Security</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Oracle databases are the leading databases in companies and organizations. In the last 3 years Oracle invested a lot of time and engery to make the databases more secure, adding new features ... but even 2007 most databases are easy to hack.</abstract>
        <description>This talk will describe the current status, the typical problems in customer installations and the trends for the future for Oracle Security.

I will show some scenarios how to attack (and prevent) databases, abuse Oracle security features (like Oracle Transparent Database Encryption (TDE)) and the latest trends in SQL Injection (e.g. why a table "!rm -rF /" sometimes executes code).</description>
        <persons>
          <person id="1793">Alexander Kornbrust</person>
        </persons>
        <links>
          <link href="http://www.red-database-security.com/">Homepage Red-Database-Security GmbH</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2354-en-latest_trends_in_oracle_security.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2354-en-latest_trends_in_oracle_security.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2336">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>security_nightmares</tag>
        <title>Security Nightmares 2008</title>
        <subtitle>Oder: wor&#252;ber wir n&#228;chstes Jahr lachen werden</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Security Nightmares - der j&#228;hrliche R&#252;ckblick auf die IT-Sicherheit und der Security-Glaskugelblick f&#252;r's n&#228;chste Jahr.</abstract>
        <description>Security Nightmares betrachtet die Vergangenheit, Gegenwart und Zukunft von Sicherheitsvorf&#228;llen in der IT. Wir machen eine R&#252;ckschau auf unsere Vorhersagen vom letzten Jahr, unterhalten uns dar&#252;ber, was sonst noch passiert ist, und wagen dann die Vorschau ins n&#228;chste Jahr.</description>
        <persons>
          <person id="129">Ron</person>
          <person id="9">Frank Rieger</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2336-de-security_nightmares.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2336-de-security_nightmares.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2367">
        <start>21:45</start>
        <duration>01:00</duration>
        <room>Saal 1</room>
        <tag>closing_event</tag>
        <title>Closing Event</title>
        <subtitle></subtitle>
        <track>Community</track>
        <type>lecture</type>
        <language>en</language>
        <abstract></abstract>
        <description></description>
        <persons>
          <person id="4">Tim Pritlove</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2367-en-closing_event.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2367-en-closing_event.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 2">
      <event id="2345">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>gplv3_auswirkungen</tag>
        <title>GPLv3 - Praktische Auswirkungen</title>
        <subtitle></subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Was der Umstieg auf die GPLv3 an Neuerungen mit sich bringt, welche Fehler beim Wechsel vermieden werden k&#246;nnen und an welchen Stellen rechtliche Fragestellungen lauern, f&#252;r deren Kl&#228;rung technische &#220;berlegungen nicht ausreichen, schildert dieser Vortrag.</abstract>
        <description>Im Sommer 2007 wurde die aktuelle Version 3 der GPL ver&#246;ffentlicht. Dieser Vortrag wendet sich an Open-Source-Interessierte ohne rechtliche Vorkenntnisse, die vor der Entscheidung stehen, die GPL in der einen oder anderen Version einzusetzen.

Bisher haben einige Open-Source-Projekte, darunter Samba, auf die neue Version gewechselt. Weitere wichtige Projekte werden folgen, sodass &#252;ber kurz oder lang jeder Anwender und Entwickler damit rechnen muss, mit GPLv3-Software in Ber&#252;hrung zu kommen.

Das Potential der GPL, rechtliche Auseinandersetzungen zu provozieren, ist deutlich gewachsen. Das liegt an neuen Klauseln, die Umgehungsversuche und Schw&#228;chungen der GPL unterbinden sollen. Die Umsetzung dieses Zieles f&#252;hrte zu einer Verrechtlichung von Sprache und Inhalt der GPL. Erstmals ist es m&#246;glich, die GPLv3 in manchen Punkten durch eigene Klauseln zu erg&#228;nzen, ohne sie zwingend verletzen zu m&#252;ssen. Was im Einzelnen m&#246;glich und was davon ratsam ist, wird anhand einer Checkliste dargestellt. Schon der blo&#223;e Umstieg von der GPLv2 zur GPLv3 bietet ein paar Fallstricke, die zu vermeiden sind. 

Alle angesprochenen Themen werden aus der Sicht des deutschen Zivil- und Lizenzrechtes erl&#228;utert, welches nicht in allen Punkten mit dem US-amerikanischen Recht &#252;bereinstimmt. Rechtliche Vorkenntnisse werden nicht vorausgesetzt. Empfehlenswert sind allgemeine Vorkenntnisse &#252;ber die GPL. </description>
        <persons>
          <person id="1231">Peter Voigt</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2345-de-gplv3_auswirkungen.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2345-de-gplv3_auswirkungen.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2364">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>smartcard_protocol_sniffing</tag>
        <title>Smartcard protocol sniffing</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will introduce you to the theoretical and practical issues involved in cloning/simulating existing smartcards. It is based on the lessons learned from cloning the Postcard (swiss debit card) issued by PostFinance.</abstract>
        <description>After a brief introduction into the syntax of smartcard protocols (basically ISO 7816-4), the talk will demonstrate techniques to capture the communication between a smartcard and a terminal with the help of a Javacard-based logger cardlet. The gathered information (the semantics of the protocol) can then be used for cloning the smartcard under investigation.</description>
        <persons>
          <person id="1798">Marc-Andr&#233; Beck</person>
          <person id="614">Bernd R. Fix</person>
        </persons>
        <links>
          <link href="http://postcard-sicherheit.ch">postcard-sicherheit.ch</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2364-en-smartcard_protocol_sniffing.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2364-en-smartcard_protocol_sniffing.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2252">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>ruby_on_rails_security</tag>
        <title>Ruby on Rails Security</title>
        <subtitle></subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk will focus on the security of the Ruby on Rails Web Framework. Some dos and don&#8217;ts will be presented along with security Best Practices for common attacks like session fixation, XSS, SQL injection, and deployment weaknesses.</abstract>
        <description>Even though Ruby on Rails introduces a lot of best practices to the developer, it is still quite easy for an imprudent programmer to forget that every web application is a potential target. Web application attacks like Cross Site Scripting or Cross Site Request Forgery are very popular these days and every Rails developer should have an idea about the different possibilities that his application presents to an attacker.

This talk will cover most of the common web application vulnerabilities like Cross Site Scripting and Cross Site Request Forgery, SQL and Code injection, and deployment security and how they apply to Rails. Further Ruby on Rails specific issues like Rails plugin security, JavaScript/Ajax security, and Rails configuration will be examined and best practices introduced.
</description>
        <persons>
          <person id="1729">Jonathan Weiss</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2252-en-ruby_on_rails_security.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2252-en-ruby_on_rails_security.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2396">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>eu_rfid_policy</tag>
        <title>EU Policy on RFID &amp; Privacy</title>
        <subtitle>Developments 2007, Outlook 2008</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Following the public consultation on Radio Frequency Identification (RFID) carried out in 2006 the European Commission set up an RFID Expert Group in July 2007, focussing on Privacy and Security. One of the groups tasks is to provide advice to the Commission on the content of a Recommendation to the member states, which shall set out the principles that public authorities and other stakeholders should apply in respect of RFID usage. European Digital Rights (EDRi) participates in this task as a member of the Expert Group.</abstract>
        <description>This session will provide an overview of the EU policy activities regarding RFID and Privacy in 2007 and give an outlook to activities planned for 2008. EDRi's positions on RFID and Privacy will be presented and, when published by the Commission before the event, the contents of the Recommendation to the member states will be presented and discussed in detail. </description>
        <persons>
          <person id="1846">Andreas Krisch</person>
        </persons>
        <links>
          <link href="http://www.edri.org">edri.org</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2396-en-eu_rfid_policy.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2396-en-eu_rfid_policy.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2212">
        <start>17:15</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>unusual_web_bugs</tag>
        <title>Unusual Web Bugs</title>
        <subtitle>A Web Hacker's Bag O' Tricks</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>While many issues in web apps have been documented, and are fairly well known, I would like to shine some light on mostly unknown issues, and present some new techniques for exploiting previously unexploitable bugs.</abstract>
        <description>This lecture will not be an introduction to webappsec as many lectures are, so I will assume that everyone knows about common web vulnerabilities/exploits and why they are bad, and I will present a bunch of esoteric and previously unknown knowledge about how to exploit webapps, primarily those written in PHP, but some techniques are applicable to other languages, etc.</description>
        <persons>
          <person id="1683">kuza55</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2212-en-unusual_web_bugs.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2212-en-unusual_web_bugs.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2280">
        <start>18:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>i_know_who_you_clicked_last_summer</tag>
        <title>I know who you clicked last summer</title>
        <subtitle>A swiss army knife for automatic social investigation</subtitle>
        <track>Hacking</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>This talk introduces some techniques of social network analysis and graph theory. It aims at using simple approaches for getting interesting facts about networks. I will use the data of a popular community to demonstrate some of the techniques.</abstract>
        <description>'I'm not stalking, I'm just investigating' - Who hasn't ever heard this sentence from one of their friends? Whether it concerns connecting people and interest groups or item recommendations - most of the possibilities of the WWW today are based on the idea of networking. MySpace, Facebook or its German counterpart StudiVZ, just to name a few, are very popular communities these days, which aim at connecting people. All of those communities can be modelled as social networks allowing an automatic analysis to reveal interesting facts.

In this talk I would like to introduce some of the technologies one could use to analyze such a network. While the list of algorithms and approaches is long, I want to emphasize on the things one can find out even using simple techniques. In order to do so, I will work on some data collected from a popular community to show some possibilities of analyzing. 

My procedure will include an introduction to:

* basic concepts of graphs and (social) networks
* types of networks and possibilities for modelling
	* one-mode and two-mode networks
	* modelling possibilities
* basic measures of networks and some algorithms of network and graph theory 
	* connectivity
	* importance
	* paths and distances
* fancy things you can do by enhancing everything with an ontology
* example network analysis on the basis of a real community

So, if you ever wanted to get an introduction to social network analysis, graph theory and its potentials, attend this talk!</description>
        <persons>
          <person id="1745">Svenja Schr&#246;der</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2280-en-i_know_who_you_clicked_last_summer.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2280-en-i_know_who_you_clicked_last_summer.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2250">
        <start>20:30</start>
        <duration>01:00</duration>
        <room>Saal 2</room>
        <tag>abschlussbericht_fem</tag>
        <title>FeM-Streaming und Encoding</title>
        <subtitle>Abschlussbericht</subtitle>
        <track>Making</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Das Streaming-Team der FeM e.V. m&#246;chte zum Abschluss des 24C3 einen &#220;berblick &#252;ber die Streaming-Aktivit&#228;ten geben, ein paar Statistiken jonglieren und sonstige (Un-)Auff&#228;lligkeiten und Stories berichten.</abstract>
        <description>Au&#223;erdem gibt es einen Bericht des Encoding-Teams &#252;ber die eingesetzten Techniken zur Bereitstellung der 24C3-Videos.</description>
        <persons>
          <person id="1844">Sway</person>
          <person id="1046">Felix von Leitner</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2250-de-abschlussbericht_fem.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2250-de-abschlussbericht_fem.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
    <room name="Saal 3">
      <event id="2332">
        <start>11:30</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>no_ooxml</tag>
        <title>&lt;NO&gt;OOXML - A 12 euros campaign</title>
        <subtitle>Against Microsoft Office's broken standard</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Microsoft is currently trying to buy an ISO stamp for their flawed Office OpenXML (OOXML) specification. </abstract>
        <description>While there is already another ISO standard for the same purpose (ODF or ISO26300), Microsoft has decided to not implement it, and push for its own standard instead. Doug Mahugh, Microsoft's Open XML campaign leader, clearly explained Microsoft's motivations: "Office is a USD$10 billion revenue generator for the company." 
When ODF was made an ISO standard, Microsoft had to react quickly as certain governments have procurement policies which prefer ISO standards. Ecma and OASIS are "international standards", but ISO is the international "Gold Standard". Microsoft therefore had to rush this standard through. It's a simple matter of commercial interests!</description>
        <persons>
          <person id="1737">Benjamin Henrion</person>
        </persons>
        <links>
          <link href="http://www.noooxml.org">Say NO to Microsoft Office broken standard</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2332-en-no_ooxml.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2332-en-no_ooxml.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2290">
        <start>12:45</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>overtaking_proprietary_software</tag>
        <title>Overtaking Proprietary Software Without Writing Code </title>
        <subtitle>"a few rough insights on sharpening free software"</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Free or "Open-Source" software, and in particular Linux, is doing extremely well technically. However, it fails to secure a significant portion of the protected, lucrative software market, especially for end-users. 
Can Free Software finally make a full entry into our society? The main obstacles to overcoming the domination of proprietary software, most of them non-technical, require thinking outside of code-writing. "Overtaking Proprietary Software Without Writing Code" will relate experience gained from the activities of the GNU/Linux Matters non-profit, and provide some hands-on advice for community members, taking a handful of relevant examples.</abstract>
        <description>Pre-requisites are: A good understanding of the notion of Free/"open-source" Software and some of the main themes that surround it, such as DRM. There is no particular technical knowledge required.</description>
        <persons>
          <person id="1753">Olivier Cleynen</person>
        </persons>
        <links>
          <link href="http://www.gnulinuxmatters.org/">GNU/Linux Matters non-profit</link>
          <link href="http://www.ariadacapo.net/">Speaker personal page</link>
          <link href="http://people.gnulinuxmatters.org/olivier/conferences/24C3/24c3-2290-en-overtaking_proprietary_software.mkv">Video recording of talk (MKV file)</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2290-en-overtaking_proprietary_software.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2290-en-overtaking_proprietary_software.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2253">
        <start>14:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>dining_cryptographers</tag>
        <title>Dining Cryptographers, The Protocol</title>
        <subtitle>Even slower than Tor and JAP together!</subtitle>
        <track>Science</track>
        <type>lecture</type>
        <language>en</language>
        <abstract>Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration!</abstract>
        <description>Back in 1988, David Chaum proposed a protocol for perfect untracable communication. And it was completly different to the (former invented) Mix Cascades. While the Mixes got all the press (heard of "Tor" and "JAP"? Told you!), the idea of DC networks were silently ignored by the majority of the community.

This talk is to show how DC networks work, why they are secure and presents an implementation.</description>
        <persons>
          <person id="1730">Immanuel Scholz</person>
        </persons>
        <links>
          <link href="http://www.eigenheimstrasse.de/~imi/dc">DC Network Client (Java WebStart)</link>
          <link href="http://www.eigenheimstrasse.de/svn/dc/">Source Code to the DC Network Client</link>
          <link href="http://www.eigenheimstrasse.de/svn/dc/doc/dcnetwork.pdf">Slides</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2253-en-dining_cryptographers.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2253-en-dining_cryptographers.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2228">
        <start>16:00</start>
        <duration>01:00</duration>
        <room>Saal 3</room>
        <tag>lieber_cyborg_als_goettin</tag>
        <title>Lieber Cyborg als G&#246;ttin</title>
        <subtitle>Politischer Hacktivismus und Cyborgfeminismus</subtitle>
        <track>Society</track>
        <type>lecture</type>
        <language>de</language>
        <abstract>Das Cyborgmanifest verbindet die Analyse der heutigen Gesellschaft als "Informatik der Herrschaft" mit dem Aufruf von politischem, kreativem Umgang mit Technik, der M&#246;glichkeit des Angreifens von Machtstrukturen und mit der &#220;berwindung der starren Grenzen zwischen den Geschlechtern.
</abstract>
        <description>Donna Haraway ist in Wissenschaftsbereichen wie Biologie und Gender durchaus bekannt. Sie gilt als Naturwissenschaftshistorikerin, Biologin und ist Professorin f&#252;r feministische Theorien und Technoscience.
Doch wenn sie Professorin f&#252;r Technoscience ist und durchaus in der Wissenschaft keine Unbekannte, warum hat sie noch keinen Eingang bei Technik- und insbesondere Hackerkonferenzen gefunden? Und insbesondere nicht ihr Cyborg-Manifest, wo es doch selbst im Titel schon Ankn&#252;pfungspunkte zu Technikfreaks hat?

Im Vortrag soll versucht werden, die wichtigsten Thesen Donna Haraways Cyborg-Manifests zu erl&#228;utern:
* Wir sind alle Cyborgs
* Cyborgs und der jetzige Stand der Naturwissenschaften verhelfen zu Grenz&#252;berschreitungen (und damit zum "Postfeminismus")
* Wir leben inzwischen in der "Informatik der Herrschaft"
* politischer Aktivismus durch Bildung partieller Identit&#228;ten

Doch was hat das Ganze mit Hackerinnen und Hackern zu tun?
Im Cyborg-Manifest scheinen diese direkt angesprochen zu werden: als Hoffnungstr&#228;ger zur Ver&#228;nderung der Welt, da Hackerinnen/Hacker, wenn sie nur wollten, zur Ver&#228;nderung der Welt beitragen k&#246;nnten. Insofern soll der Vortrag nicht nur einfach auf wissenschaftlicher Ebene das Cyborg-Manifest mit all den Hoffnungen auf eine bessere Welt vorstellen, sondern auch versuchen, diese Theorie auf eine praktische Ebene zu holen und Hacker/Hackerinnen zu politischen Aktivismus
aufzufordern.</description>
        <persons>
          <person id="1224">Cyworg</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2228-de-lieber_cyborg_als_goettin.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2228-de-lieber_cyborg_als_goettin.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
      <event id="2402">
        <start>17:15</start>
        <duration>02:15</duration>
        <room>Saal 3</room>
        <tag>lightning_talks_2007_day_4</tag>
        <title>Lightning Talks Day 4</title>
        <subtitle></subtitle>
        <track></track>
        <type>lightning</type>
        <language>en</language>
        <abstract></abstract>
        <description></description>
        <persons>
          <person id="106">Hannes</person>
        </persons>
        <links>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2402-en-lightning_talks_2007_day_4.mkv.torrent">Torrent of the video recording for this event in Matroska / Vorbis / H.264</link>
          <link href="http://outpost.h3q.com/fnord/24c3-torrents/24c3-2402-en-lightning_talks_2007_day_4.mp4.torrent">Torrent of the video recording for this event in MPEG-4 / AAC-LC / H.264</link>
        </links>
      </event>
    </room>
  </day>
</schedule>
