BEGIN:VCALENDAR PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN CALSCALE:GREGORIAN VERSION:2.0 BEGIN:VTIMEZONE TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin BEGIN:STANDARD DTSTART:20171029T030000 RDATE:20171029T030000 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 TZNAME:CET END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T134500 DTSTAMP;VALUE=DATE-TIME:20171230T232753Z UID:bf23997f-20bb-40a5-96f9-5f43f453e9dd@frab.cccv.de DESCRIPTION:Die Dynamik der globalen Agrarmärkte hat sich in den letzten Jahren verstärkt und birgt neue Herausforderungen für die Landwirte. Hof fnungsträger sind ähnlich wie in anderen Branchen auch Sensor- & Datenve rarbeitungstechnik sowie das Internet: Produktionsprozesse steuern sich selbst\, Anhänger werden halbautomatisch mittels Bilderkennung beladen\, Maschinen kommunizieren mittels Maschinen und Fahrzeuge steuern sich we itestgehend schon jetzt autonom. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8961.htm l SUMMARY:0en & 1en auf dem Acker - Fritz - Dietrich Burghardt LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T163000 DTSTAMP;VALUE=DATE-TIME:20171227T213728Z UID:4c4af291-e9ed-4dc9-8b2e-9062db9924fa@frab.cccv.de DESCRIPTION:Year 2017 was rich in vulnerabilities discovered for Cisco ne tworking devices. At least 3 vulnerabilities leading to a remote code ex ecution were disclosed. This talk will give an insight on exploit develo pment process for Cisco IOS for two of the mentioned critical vulnerabil ities. Both lead to a full takeover of the target device. Both PowerPC a nd MIPS architectures will be covered. The presentation will feature an SNMP server exploitation demo. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8936.htm l SUMMARY:1-day exploit development for Cisco IOS - Artem Kondratenko LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T151500 DTSTAMP;VALUE=DATE-TIME:20171230T150735Z UID:2e0125ef-679c-4eb3-9de6-f5e56e27fbca@frab.cccv.de DESCRIPTION:In this traditional lecture\, various teams provide an inside look at how this Congress‘ infrastructure was planned and built. You’ll learn what worked and what went wrong\, and some of the talks may even contain facts! Also\, the NOC promises to try and not have the network f ail in the middle of the NOC presentation this time. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8911.htm l SUMMARY:34C3 Infrastructure Review - Leon LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T183000 DTSTAMP;VALUE=DATE-TIME:20171231T163633Z UID:8b136e88-ea36-4398-bac2-13cf2a509d5e@frab.cccv.de DESCRIPTION:Climate change has long ceased to be news to many people\, bu t it is increasingly shaping humanity's reality.\n\nThis talk sheds ligh t on the changes in the climate system and their consequences.\n\nWe int roduce the basics and discuss possible actions in response. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9184.htm l SUMMARY:A hacker's guide to Climate Change - What do we know and how do w e know it? - Katja Bigge (seyru)\, Sven Willner\, Robert Gieseke LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T221500 DTSTAMP;VALUE=DATE-TIME:20171231T001500Z UID:86c60da2-fefc-4750-ad22-fa821ce619b1@frab.cccv.de DESCRIPTION:Address Space Layout Randomization (ASLR) is fundamentally br oken on modern hardware due to a side-channel attack on the Memory manag ement unit\, allowing memory addresses to be leaked from JavaScript. Th is talk will show how. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9135.htm l SUMMARY:ASLR on the line - brainsmoke LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T181500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T173000 DTSTAMP;VALUE=DATE-TIME:20180101T003524Z UID:9a0efbf6-94d6-4c86-864c-caa1f3e929c7@frab.cccv.de DESCRIPTION:DE: Damit wir als Komputerfrieks nicht länger unkoordiniert v or uns hinwuseln\, tun wir wat und treffen uns! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9293.htm l SUMMARY:Abschluss - sva LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T201500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T194500 DTSTAMP;VALUE=DATE-TIME:20180101T135053Z UID:6588e4a4-d0ac-4082-ad9e-7a13329217ee@frab.cccv.de DESCRIPTION:Cyborgs und Body Enhancement sind typisch männlich dominierte Thematiken (Terminator etc). Im Gegensatz dazu ist zB die weiblich kono tierte Beautybranche auch hochtechnisiert. Körper und Technologie sind a uf verschiedenen Ebenen hier schon eng verzahnt. Diese beiden Bereiche z usammenzubringen ist FUN. Stehen Computer eigentlich auf rosa? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9040.htm l SUMMARY:Access To Bodies - Nadja Buttendorf LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T210000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T203000 DTSTAMP;VALUE=DATE-TIME:20171231T033647Z UID:5cbe3344-f83a-492d-afc2-f1697959ff5e@frab.cccv.de DESCRIPTION:Inke Arns will present speculative projections of the future and current developments in the field of digital technologies by artists and inventors from different countries in Africa\, the African diaspora and many other actors in the USA and Europe. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9275.htm l SUMMARY:Afro TECH - Inke Arns LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T160000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T153000 DTSTAMP;VALUE=DATE-TIME:20171230T085100Z UID:2024d7d1-4510-4371-a923-3dabdb408475@frab.cccv.de DESCRIPTION:Quantitative science evaluation\, such as university rankings \, rely on man-made algorithms and man-made databases. The modelling dec isions underlying this data-driven algorithmic science evaluation are\, among other things\, the outcome of a specific power structure in the sc ience system. Power relations are especially visible\, when negotiated d uring processes of boundary work. Therefore\, we use the discourse on 'c itation cartels'\, to shed light on a specific perception of fairness in the scientific system\, as well as on the actors who are in charge. Whi le doing so\, we draw analogies to the discourse on search engine optimi zation. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9030.htm l SUMMARY:Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels' - J. Hartstein\, Teresa Is igkeit\, Franziska Sörgel LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T233000 DTSTAMP;VALUE=DATE-TIME:20171231T192515Z UID:949bee69-3be0-4cc8-915b-5f1167141dcc@frab.cccv.de DESCRIPTION:Im August 2017 wurde Indymedia linksunten vom Bundesinnenmini ster verboten. Rechtsanwältin Kristin Pietrzyk berichtet von den Razzien \, von der Zusammenarbeit zwischen Polizei und Geheimdiensten und gibt E inblick in das juristische Vorgehen gegen Verbot und Zensur. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8955.htm l SUMMARY:All Computers Are Beschlagnahmt - Kristin Pietrzyk LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T021500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T004500 DTSTAMP;VALUE=DATE-TIME:20171231T233751Z UID:84aa5c72-393c-4f06-8933-4178981ac6f7@frab.cccv.de DESCRIPTION:ALL CREATURES WELCOME is a documentary film about the commun ities of the digital age. It shows the possibilities of new paths and ne w perspectives for society by using hacking as a mind-set.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9091.htm l SUMMARY:All Creatures Welcome - Sandra Trostel LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T143000 DTSTAMP;VALUE=DATE-TIME:20171231T192654Z UID:117a52b4-f675-49dd-aafe-659c07b6bc9c@frab.cccv.de DESCRIPTION:Anhand von Anekdoten aus 20 Jahren Softwareentwicklung versuc ht der Vortrag herauszuarbeiten\, was in der Praxis zu scheiternden Proj ekten führt.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9095.htm l SUMMARY:Antipatterns und Missverständnisse in der Softwareentwicklung - F efe LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T194500 DTSTAMP;VALUE=DATE-TIME:20180101T125238Z UID:956cf3ed-c342-4c1d-b636-29ec3d4578d2@frab.cccv.de DESCRIPTION:In this presentation I start off asking the question „How com e there are only a handful of BSD security kernel bugs advisories releas ed every year?“ and then proceed to try and look at some data from sever al sources. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8968.htm l SUMMARY:Are all BSDs created equally? - Ilja van Sprundel LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T151500 DTSTAMP;VALUE=DATE-TIME:20171231T221830Z UID:f5245c8c-5020-4bfc-914b-b0c161ff794b@frab.cccv.de DESCRIPTION:This talk explains how individuals were able to communicate g lobally in the 1990ies using self-organized networks of BBSsin networks like FIDO and Z-Netz\, before individual access to the Internet was poss ible. It also covers the efforts of non-profit organizations to provide individual access to Internet Mail+News via UUCP and later via IP durin g that period. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9034.htm l SUMMARY:BBSs and early Internet access in the 1990ies - LaForge LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T224500 DTSTAMP;VALUE=DATE-TIME:20171231T222916Z UID:d5d27820-0e97-4c19-bf57-b470cbbd97ef@frab.cccv.de DESCRIPTION:When bad actors can simply move servers from country to count ry\, why does the internet remain reasonably civil ?\nHow does one get o n\, or get kicked off\, of the internet ?\nWhy do fraud and child abuse websites regularly get shut down but thepiratebay remains living ?\nI wi ll explain BGP\, the protocol that knits the internet together\, also co vering the world of last resort hosting\, bulletproof hosting and high p rofile cases of servers that were taken offline and servers which could not be taken offline despite significant effort. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9072.htm l SUMMARY:BGP and the Rule of Custom - Caleb James DeLisle LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T134500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T124500 DTSTAMP;VALUE=DATE-TIME:20171231T234227Z UID:acab4111-aba7-44f7-b56e-ef805dcacd00@frab.cccv.de DESCRIPTION:Eine wissenschaftliche Perspektive auf die achtlose Anwendung der Algorithmen des maschinellen Lernens und der künstlichen Intelligen z\, z.B. in personalisierten Nachrichtenempfehlungssystemen oder Risikos oftware im US-Justizsystem. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8811.htm l SUMMARY:Beeinflussung durch Künstliche Intelligenz - Hendrik Heuer\, KRN LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T183000 DTSTAMP;VALUE=DATE-TIME:20180101T134920Z UID:043eab4c-751b-4f60-b849-daa81cd83997@frab.cccv.de DESCRIPTION:An unseren Schulen besteht ein großes Defizit hinsichtlich de r Vermittlung digitaler Mündigkeit. Da mittlerweile weitgehender Konsens besteht\, dass an Schulen bezüglich digitaler Technologien mehr passier en muss\, reagiert die Bildungspolitik und integriert neue Medien in die Bildungspläne. Auf Basis unserer Erfahrungen\, die wir im Rahmen vom Ch aos Macht Schule gesammelt haben\, diskutieren wir die aktuellen bildung spolitischen Entwicklungen. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9194.htm l SUMMARY:Bildung auf dem Weg ins Neuland - benni\, dorina\, steffen LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T163000 DTSTAMP;VALUE=DATE-TIME:20171231T084017Z UID:801e92bc-c2a2-4f89-bf60-c76a44b0b8b5@frab.cccv.de DESCRIPTION:The Blinkenrocket is a DIY SMD Soldering Kit that was designe d to teach different manufacturing and soldering skills.\n\nA lot of wor k on both Hardware and Software was done in CCC erfas namely shackspace\ , chaosdorf and metalab.\n\nThe kit is used in workshops since 1.5 years at the chaos macht schule events and is very successful in its purpose. Creating this project was plenty of work and there is so much to show a nd tell around it\, it will blow your mind. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8721.htm l SUMMARY:Blinkenrocket! - overflo\, muzy LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T220000 DTSTAMP;VALUE=DATE-TIME:20171229T152807Z UID:c1acc5c2-58b2-4ed5-a504-351b8b93c171@frab.cccv.de DESCRIPTION:In our paper we present a novel tool called BootStomp able to identify security vulnerabilities in Android bootloaders (such as memor y corruptions) as well as unlocking vulnerabilities. During its evaluati on\, BootStomp discovered 6 previously unknown vulnerabilities across 4 different bootloaders. Finally BootStomp has been open-sourced to help t he security community. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9205.htm l SUMMARY:BootStomp: On the Security of Bootloaders in Mobile Devices - Aud rey Dutcher LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T134500 DTSTAMP;VALUE=DATE-TIME:20171231T180637Z UID:aa99c1b2-80cf-4a67-8106-55e7a097294e@frab.cccv.de DESCRIPTION:Briar is a peer-to-peer messaging app that is resistant to ce nsorship and works even without internet access. The app encrypts all da ta end-to-end and also hides metadata by utilizing Tor onion services. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8937.htm l SUMMARY:Briar - Torsten Grote LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T124500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T121500 DTSTAMP;VALUE=DATE-TIME:20171229T191137Z UID:c5bfac96-8290-438a-a47a-ebdbf0ab5365@frab.cccv.de DESCRIPTION:The NERF and Heads projects bring Linux back to the cloud ser vers' boot ROMs by replacing nearly all of the vendor firmware with a re producible built Linux runtime that acts as a fast\, flexible\, and meas ured boot loader. It has been years since any modern servers have suppo rted Free Firmware options like LinuxBIOS or coreboot\, and as a result server and cloud security has been dependent on unreviewable\, closed so urce\, proprietary vendor firmware of questionable quality. With Heads on NERF\, we are making it possible to take back control of our systems with Open Source Software from very early in the boot process\, helping build a more trustworthy and secure cloud. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9056.htm l SUMMARY:Bringing Linux back to server boot ROMs with NERF and Heads - Tra mmell Hudson LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T220000 DTSTAMP;VALUE=DATE-TIME:20171230T195146Z UID:6abb1f81-c163-4382-8838-8b684147d10c@frab.cccv.de DESCRIPTION:Activists in Saudi Arabia have been able to celebrate importa nt victories like the recent lifting of the ban on women driving in Sept ember 2017 but have to fight on a lot of other front lines at the same t ime. Websites are blocked on a large scale and many activists are sent t o jail on the grounds of a loosely used cybercrime law. This talk will g ive some insight into the current social and political strife happening on the Saudi Internet from a first-hand-perspective using some of the da ta collected in a collaboration with the OONI project. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9190.htm l SUMMARY:Catch me if you can: Internet Activism in Saudi Arabia - Noujoum LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T221500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T214500 DTSTAMP;VALUE=DATE-TIME:20171229T220414Z UID:f64a902e-db0e-4a8e-b5b7-b6e3136a4dea@frab.cccv.de DESCRIPTION:International commitment to the appropriately ambitious Paris climate agreement and the United Nations Sustainable Development Goals in 2015 has pulled into the limelight the urgent need for major scientif ic progress in understanding and modelling the Anthropocene\, the tightl y intertwined social-techno-ecological planetary system that humanity no w inhabits. The Anthropocene qualitatively differs from previous eras in Earth’s history in three key characteristics: (1) There is planetary-sc ale human agency. (2) There are social and economic networks of teleconn ections spanning the globe. (3) It is dominated by planetary-scale socia l-ecological feedbacks. Bolting together old concepts and methodologies cannot be an adequate approach to describing this new geological era. In stead\, we need a new paradigm in Earth System science that is founded e qually on a deep understanding of the physical and biological Earth Syst em – and of the economic\, technological\, social and cultural forces th at are now an intrinsic part of it. It is time to close the loop and bri ng socially mediated dynamics and the technosphere explicitly into theor y\, analysis and computer models that let us study the whole Earth Syste m. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9138.htm l SUMMARY:Closing the loop: Reconnecting social-technologial dynamics to Ea rth System science - Jonathan Donges LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T134500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T124500 DTSTAMP;VALUE=DATE-TIME:20171230T164422Z UID:bdccda64-ee80-43fb-8e56-931199444188@frab.cccv.de DESCRIPTION:Most working engineers view machine-checked mathematical proo fs as an academic curiosity\, if they have ever heard of the concept at all. In contrast\, activities like testing\, debugging\, and code revie w are accepted as essential. They are woven into the lives of nearly al l developers. In this talk\, I will explain how I see machine-checked p roofs enabling new everyday activities for developers of computer softwa re and hardware. These activities have the potential to lower developme nt effort dramatically\, at the same time as they increase our assurance that systems behave correctly and securely. I will give a cosmological overview of this field\, answering the FAQs that seem to stand in the w ay of practicality\; and I will illustrate the principles with examples from projects that you can clone from GitHub today\, covering the comput ing stack from digital hardware design to cryptographic software and app lications. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9105.htm l SUMMARY:Coming Soon: Machine-Checked Mathematical Proofs in Everyday Soft ware and Hardware Development - Adam Chlipala LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T194500 DTSTAMP;VALUE=DATE-TIME:20171231T173711Z UID:03ba9edb-1d3a-4774-9384-7548c0696df7@frab.cccv.de DESCRIPTION:Nintendo has a new console\, and it's more secure than ever. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8941.htm l SUMMARY:Console Security - Switch - plutoo\, derrek\, naehrwert LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T224500 DTSTAMP;VALUE=DATE-TIME:20180101T012608Z UID:22027440-b3fb-49d5-a35b-b86e7d77cfb9@frab.cccv.de DESCRIPTION:The DPRK has largely succeeded at hiding its consumer technol ogy. While versions of the desktop operating system\, Red Star\, have le aked\, the mobile equivalent hasn't\, and there remains little knowledge of the content available on the intranet. Let's fix that! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9279.htm l SUMMARY:DPRK Consumer Technology - Will Scott\, Gabe Edwards LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T221500 DTSTAMP;VALUE=DATE-TIME:20171231T163229Z UID:8c303809-3c7c-4532-ab1e-c9a4e7c38245@frab.cccv.de DESCRIPTION:This talk will dive into the techniques and protocols that dr ive contactless card payments at the Point of Sale. We will explore how Apple Pay works on a technical level and why you are able to 'clone' you r credit card onto your phone. Building upon previous C3 talks on the to pics of EMV and ICC payments\, we will learn about different NFC payment options\, why legacy will never die and how the individual card brands have specified their payment workflows. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8965.htm l SUMMARY:Decoding Contactless (Card) Payments - Simon Eumes LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T233000 DTSTAMP;VALUE=DATE-TIME:20171230T182049Z UID:bb975ea3-1b67-4a0d-a166-48f435dc9515@frab.cccv.de DESCRIPTION:Darsha Hewitt is a Canadian artist working in new media and s ound. She is known for her examinations of communication technology in t he domestic sphere and her use of DIY aesthetics and practices as an art istic method. She makes electromechanical sound installations\, drawings \, audio-visual works\, how-to videos and experimental performances with handmade electronics. Through deconstruction and experimentation with f ailed and obsolete technology\, her work demystifies hidden systems with in machines as a way to trace-out structures of economy\, power and cont rol embedded throughout capitalist culture. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9288.htm l SUMMARY:Deconstructing a Socialist Lawnmower - Darsha Hewitt LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T140000 DTSTAMP;VALUE=DATE-TIME:20180101T012710Z UID:aed02b65-9a16-4a42-ac28-2883da680d0a@frab.cccv.de DESCRIPTION:In the past decade\, machine learning researchers and theoris ts have created deep learning architectures which seem to learn complex topics with little intervention. Newer research in adversarial learning questions just how much “learning" these networks are doing. Several the ories have arisen regarding neural network “blind spots” which can be ex ploited to fool the network. For example\, by changing a series of pixel s which are imperceptible to the human eye\, you can render an image rec ognition model useless. This talk will review the current state of adver sarial learning research and showcase some open-source tools to trick th e "black box." URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8860.htm l SUMMARY:Deep Learning Blindspots - Katharine Jarmul LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T210000 DTSTAMP;VALUE=DATE-TIME:20180101T012545Z UID:c7b3314c-165c-446d-963c-609922ea990f@frab.cccv.de DESCRIPTION:In this presentation we will outline our findings about (Not) Petya's crypto flaws and how we were able to exploit them to decrypt inf ected computers.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8724.htm l SUMMARY:Defeating (Not)Petya's Cryptography - Sebastian Eschweiler LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T131500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T124500 DTSTAMP;VALUE=DATE-TIME:20180101T133941Z UID:19b7e5d7-bba7-46da-afbc-f16d43fe395f@frab.cccv.de DESCRIPTION:Network cards are often seen as black boxes: you put data in a socket on one side and packets come out at the other end - or the othe r way around.\nLet's have a deeper look at how a network card actually w orks at the lower levels by writing a simple user space driver from scra tch for a 10 Gbit/s NIC.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9159.htm l SUMMARY:Demystifying Network Cards - Paul Emmerich LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T194500 DTSTAMP;VALUE=DATE-TIME:20180101T081725Z UID:4d3d9d56-7617-44da-b620-21ce5389a0b2@frab.cccv.de DESCRIPTION:Hacker des Chaos Computer Clubs (CCC) haben eine in mehreren Bundesländern zur Erfassung und Auswertung der kommenden Bundestagswahl verwendete Software auf Angriffsmöglichkeiten untersucht. Die Analyse er gab eine Vielzahl von Schwachstellen und mehrere praktikable Angriffssze narien. Diese erlauben die Manipulation von Wahlergebnissen auch über di e Grenzen von Wahlkreisen und Bundesländern hinweg. Die untersuchte Soft ware „PC-Wahl“ wird seit mehreren Jahrzehnten für die Erfassung\, Auswer tung und Präsentation von Wahlen auf Bundes-\, Landes- und Kommunalebene eingesetzt. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9247.htm l SUMMARY:Der PC-Wahl-Hack - Linus Neumann\, Martin Tschirsich\, Thorsten S chröder LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T144500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T141500 DTSTAMP;VALUE=DATE-TIME:20171230T192034Z UID:af65b0d3-5e43-49e3-9ec0-c225f6c57d46@frab.cccv.de DESCRIPTION:Deutschland hat gewählt\, man weiß nur noch nicht\, wer regie ren wird. Bis Weihnachten könnte ein Koalitionsvertrag verhandelt worden sein\, vielleicht auch später. Was sind die zu erwartenden großen Debat ten der neuen Legislaturperiode? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8916.htm l SUMMARY:Der netzpolitische Wetterbericht - Markus Beckedahl LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T130000 DTSTAMP;VALUE=DATE-TIME:20171231T210231Z UID:f552b4b5-7446-4cc4-836b-0aa3639b994f@frab.cccv.de DESCRIPTION:An overview and history of various tools and languages that a llow you to use code rather than CAD software to design circuits. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8818.htm l SUMMARY:Designing PCBs with code - Kaspar LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T163000 DTSTAMP;VALUE=DATE-TIME:20171231T222009Z UID:f2ca3661-30c8-476e-9d6b-920bb20b21eb@frab.cccv.de DESCRIPTION:Der NSA-BND-Untersuchungsausschuss des Deutschen Bundestags i st zu Ende. Da bietet es sich an\, nun auf die gesammelten Geheimdiensts kandale und die Reaktionen auf die Enthüllungen zurückzublicken. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9289.htm l SUMMARY:Die Lauschprogramme der Geheimdienste - Hans-Christian Ströbele\, Constanze Kurz LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T214500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T211500 DTSTAMP;VALUE=DATE-TIME:20171231T112332Z UID:59c664ea-425d-44e0-957c-09317cbfd382@frab.cccv.de DESCRIPTION:So intensiv wie 2017 wurde der Themenkomplex rund um Sicherhe it und Überwachung in Österreich noch nie diskutiert. Das Thema ist in H auptabendnachrichten und Leitartikeln angekommen. Die Diskussion rund um die geplante Einführung eines Sicherheitspakets\, das sich bei näherer Betrachtung als ein reines Überwachungspaket entpuppt\, bietet jede Meng e Analysematerial: Öffentlich ausgetauschte (Schein-)Argumente\, falsche Analogien und unpassende Sprachbilder haben die Debatte geprägt. In die sem Talk werden die Sprache der so genannten Sicherheitspolitiker (es si nd in der Tat nur Männer) analysiert und ihre Argumente auf den Prüfstan d gestellt. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8969.htm l SUMMARY:Die Sprache der Überwacher - Thomas Lohninger\, Werner Reiter\, A ngelika Adensamer LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T220000 DTSTAMP;VALUE=DATE-TIME:20171231T222435Z UID:a2887b4a-0c9d-4220-a52f-c65c20ae25d7@frab.cccv.de DESCRIPTION:Bisher wurden Angriffe gegen App-basierte TAN-Verfahren und M obilebanking von betroffenen Banken eher als akademische Kapriole abgeta n. Sie seien\, wenn überhaupt\, nur unter Laborbedingungen und dazu unte r wiederkehrend hohem manuellen Aufwand zu realisieren. Um diese Sichtwe ise zu korrigieren\, haben wir das Programm Nomorp entwickelt\, das in d er Lage ist\, zentrale Sicherungs- und Härtungsmaßnahmen in weltweit 31 Apps vollautomatisch zu deaktivieren und somit Schadsoftware Tür und Tor öffnet. Unter den Betroffenen stellen deutsche Unternehmen mit 20 Finan z-Apps die größte Fraktion. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8805.htm l SUMMARY:Die fabelhafte Welt des Mobilebankings - Vincent Haupert LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T233000 DTSTAMP;VALUE=DATE-TIME:20171230T181601Z UID:991aceeb-d25f-4f59-9317-bf438775a215@frab.cccv.de DESCRIPTION:Die Informatik ist scheinbar das neue Göttliche\, das den Kli mawandel\, die Kriminalität\, unser fehlendes Wissen über das Gehirn\, d en globalen Terror\, dichter werdenden Stadtverkehr\, die Energieproblem e und die Armut der Welt lösen kann\; und zwar mit der Blockchain\, mit künstlicher Intelligenz\, mit der Cloud und mit Big-Data. Doch inwiefern ist die Informatik überhaupt in der Lage\, derartige Probleme hoher ges ellschaftlicher Relevanz anzugehen? In diesem Vortrag soll versucht werd en\, Teile der riesigen Wunschliste an die Informatik mit ihren tatsächl ichen aktuellen Möglichkeiten in Einklang zu bringen sowie die ökonomisc hen Motivationen und Rahmenbedingungen einzubeziehen.\n\nComputer science seems to be the new divine element that can solve climate change\, crime\, our lack of knowledge about the brain\, global terror\, urban traffic\, our energy issues and world poverty\; wi th blockchain\, with artificial intelligence\, with the cloud and big da ta. But to what extent is computer science even able to address such pro blems of high societal relevance? In this lecture an attempt will be mad e to reconcile parts of the huge wish list to computer science with its actual current possibilities and to include the economic motivations and conditions. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8998.htm l SUMMARY:Die göttliche Informatik / The divine Computer Science - Rainer R ehak LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T130000 DTSTAMP;VALUE=DATE-TIME:20171229T160424Z UID:ed1d9ef6-23e1-4213-be8d-b97625ff20da@frab.cccv.de DESCRIPTION:„5.-Klässlerinnen\, die über die Millisekunden für einen dela y()-Aufruf diskutieren!\nGibt es nicht? Doch\, gibt es!“ Ein Modellproje kt mit sieben Schulen in Aachen hat diese Frage untersucht – wir haben d ie Schülerinnen und Schüler begleitet und würden gerne darüber berichten \, denn wir wissen jetzt: Programmieren macht ihnen Spaß! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8865.htm l SUMMARY:Digitale Bildung in der Schule - Katja Bach LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T163000 DTSTAMP;VALUE=DATE-TIME:20171229T163328Z UID:d9421381-5934-46ba-9fe8-3f4cc0a3f187@frab.cccv.de DESCRIPTION:This talk will report on my current research in bringing to b ear multiple knowledges on problem spaces around the environment and dig ital culture\, and in so doing questioning both the prevailing knowledge hierarchy and the institutionalisation of knowledge production. To conn ect with the environment\, for instance\, do we need to connect with how it feels? This talk draws on works exploring both the marine environmen t and food\, using knowledge from science\, art\, culture\, instinct and history to create happenings and instances that break out the border of "me" and "my environment" to create an empathic response linking what w e traditionally consider to be inside and outside. This will be demonstr ated in the context of two artistic works - The Coral Empathy Device and Vital | Flows. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8851.htm l SUMMARY:Don't stop 'til you feel it - iamkat LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T224500 DTSTAMP;VALUE=DATE-TIME:20171231T103837Z UID:7edaed35-e938-4a13-b21c-aac4bb0ebf94@frab.cccv.de DESCRIPTION:Security architectures for wearables are challenging. We take a deeper look into the widely-used Fitbit fitness trackers. The Fitbit ecosystem is interesting to analyze\, because Fitbit employs security me asures such as end-to-end encryption and authentication to protect user data (and the Fitbit business model). Even though this goes beyond secur ity mechanisms offered by other fitness tracker vendors\, reverse-engine ering the trackers enables us to launch practical attacks against Fitbit . In our talk\, we demonstrate new attacks including wireless malware fl ashing on trackers as well as “unlocking” the trackers to work independe nt from the Fitbit cloud. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8908.htm l SUMMARY:Doping your Fitbit - jiska\, DanielAW LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T154500 DTSTAMP;VALUE=DATE-TIME:20171231T192800Z UID:4b1c06a3-d870-4740-9f77-832768d41fae@frab.cccv.de DESCRIPTION:Airborne wind energy is the attempt to bring the digital revo lution to the production of energy. It means that we convert the power o f high-altitude winds into electricity by autonomously controlled aircra ft which are connected to the ground via a tether.\nThis technology can be a key element to finally power the world by clean energy only. In thi s talk we will explain the physical foundations\, give an overview of th e current status and show you how to build an experimental system by you rself: it involves hacking an off-the-shelf model aircraft and its autop ilot based on the open and free Ardupilot framework. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8877.htm l SUMMARY:Drones of Power: Airborne Wind Energy - Christoph LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T113000 DTSTAMP;VALUE=DATE-TIME:20171231T225749Z UID:2ef3b60f-6e5c-4c23-a145-d263685ec13e@frab.cccv.de DESCRIPTION:We're living in yesterday's future\, and it's nothing like th e speculations of our authors and film/TV producers. As a working scienc e fiction novelist\, I take a professional interest in how we get predic tions about the future wrong\, and why\, so that I can avoid repeating t he same mistakes. Science fiction is written by people embedded within a society with expectations and political assumptions that bias us toward s looking at the shiny surface of new technologies rather than asking ho w human beings will use them\, and to taking narratives of progress at f ace value rather than asking what hidden agenda they serve.\n\nIn this t alk\, author Charles Stross will give a rambling\, discursive\, and angr y tour of what went wrong with the 21st century\, why we didn't see it c oming\, where we can expect it to go next\, and a few suggestions for wh at to do about it if we don't like it. \n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9270.htm l SUMMARY:Dude\, you broke the Future! - Charles Stross LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T210000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T203000 DTSTAMP;VALUE=DATE-TIME:20171230T141525Z UID:edd02e52-28f8-4f3e-8b17-75cffecb6d7f@frab.cccv.de DESCRIPTION:Artists !Mediengruppe Bitnik talk about recent works around b ots and the online ecosystems that has been forming around them. Through the lens of their recent works around algorithms and bots\, !Mediengrup pe Bitnik offer a look into some of the technologies shaping our day-to- day. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9278.htm l SUMMARY:Ecstasy 10x yellow Twitter 120mg Mdma - !Mediengruppe Bitnik\, !M ediengruppe Bitnik LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T221500 DTSTAMP;VALUE=DATE-TIME:20171230T102147Z UID:ca89efbd-5061-436d-91e6-1e7e376ee77a@frab.cccv.de DESCRIPTION:Erfahrungen und Details zu den zwei kritischen Medienprojekte n FC/MC (alternatives Medienzentrum im Herzen der Stadt) und THERE IS NO TIME (Live-Talks am Rande des Sperrgebiets und über die Stadt verteilte Video-Empfangsstationen) und ihrer Kollaboration mit dem VOC zum G20 Gi pfel in Hamburg. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9119.htm l SUMMARY:Ein Festival der Demokratie - Daniel Möring (TINT Kollektiv)\, h0 1ger\, nuriye@thereisnotime.net\, maren@nadir.org\, Oliver Gemballa LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T221500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T214500 DTSTAMP;VALUE=DATE-TIME:20171231T104756Z UID:2d374ca6-9f86-49d1-bfc6-8084f61c4db3@frab.cccv.de DESCRIPTION:Electroedibles is an experiment with “edible” hardware that e xplores the limits of interaction between our tongue and circuits to moc k the present fantasies of Internet of (Every)thing. This project initi ated by the hardware lab at Shenkar College of Arts and Tel Aviv Makersp ace consists from series of workshops\, in which participants combine si mple circuits (lickometer with LED\, vibration motor or piezo) with reci pes for candy making (hard candy based on syrups or gummy or corn starch molds). The circuits are casted in candy “molds” to serve different ide as defined by the participants: extreme hardware fetishist lollipops\, p hilosophical props into sensory perception\, post-colonial critique of t he sugar cane addiction and slavery\, scientific interest in triggering taste buds etc. This probe into the edible hardware is also a celebratio n of the DIY culture of sharing behind cooking\, but also Open Source Ha rdware that bridges the divisions between the kitchen\, the hardware stu dio and the science lab. Instead of applying science and technology to c ooking and tasting (typical for molecular gastronomy & haute cuisine)\, the electroedibles use the experiences of candy cooking and to engage wi th different science and technology issues in enjoyable and funny ways. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9025.htm l SUMMARY:Electroedibles - Denisa Kera\, yair reshef\, Zohar Messeca-Fara LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T151500 DTSTAMP;VALUE=DATE-TIME:20171231T205719Z UID:a39634b4-d220-4c84-bf5a-e52c375827c5@frab.cccv.de DESCRIPTION:For non specialists\, Electromagnetic Pulse weapons (EMP) are fantasy weapons in science fiction movies. Interestingly\, the suscepti bility of electronic devices to electromagnetic interference has been ad vertised since the 90’s. Regarding the high integration of sensors and d igital systems to control power-grids\, telecom networks and automation infrastructures (e.g. Smart-grids\, Industrial Control Systems)\, the in trinsic vulnerability of electronic devices to electromagnetic interfere nce is of fundamental interest. In the context of IT Security\, few stud ies have been carried out to understand how the effects may be a signifi cant issue especially in the far-field region (distance between the tran smitter’s antenna and the target with regard to the wavelength/central f requency). Most studies in Emanation Security (EMSEC) are related to nea r-field probing for side-channel and fault injection attacks assuming a close physical access to the targeted devices. In this paper\, we propos e a methodology to detect\, classify and correlate the effect induced du ring the intentional exposure of analogue and digital systems to electro magnetic interference. Applying this methodology\, the implication of th e effects for the IT security world will be discussed with regards to th e attacker profile needed to set-up a given scenario. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8920.htm l SUMMARY:Electromagnetic Threats for Information Security - @EMHacktivity \, José Lopes Esteves LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T131500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T124500 DTSTAMP;VALUE=DATE-TIME:20171231T210308Z UID:825add58-9218-4afe-a489-4dd8c4408e45@frab.cccv.de DESCRIPTION:Formal hardware verification (hardware model checking) can pr ove that a design has a specified property. Historically only very simpl e properties in simple designs have been provable this way\, but improve ments in model checkers over the last decade enable us to prove very com plex design properties nowadays. riscv-formal is a framework for formall y verifying RISC-V processors directly against a formal ISA specificatio n. In this presentation I will discuss how the complex task of verifying a processor against the ISA specification is broken down into smaller v erification problems\, and other techniques that I employed to successfu lly implement riscv-formal. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8768.htm l SUMMARY:End-to-end formal ISA verification of RISC-V processors with risc v-formal - Clifford Wolf LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T230000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T223000 DTSTAMP;VALUE=DATE-TIME:20171229T215955Z UID:e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4@frab.cccv.de DESCRIPTION:How do we keep important environmental and climate data acces sible amidst political instability and risk? What even counts as an “acc essible” dataset? Could we imagine better infrastructures for vital data ? By describing the rapid data preservation efforts of U.S. environmenta l data that started in the wake of the recent election\, I’ll address th ese questions and the new and existing issues that preservation surfaced about the vulnerability of data infrastructures. I'll focusing on speci fic projects\, including the work of EDGI\, that is trying to address th ese challenges by creating alternate forms of access and infrastructure! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9063.htm l SUMMARY:Ensuring Climate Data Remains Public - dcwalk LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T113000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T110000 DTSTAMP;VALUE=DATE-TIME:20180101T115204Z UID:b036385c-ec1a-44e5-ae48-af703ce9b5d3@frab.cccv.de DESCRIPTION:Daß sich mit Kleinkomputern trotzalledem sinnvolle Sachen mac hen lassen\, die keine zentralisierten Großorganisationen erfordern\, gl auben wir. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9292.htm l SUMMARY:Eröffnung: tuwat - Tim Pritlove LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T234500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T231500 DTSTAMP;VALUE=DATE-TIME:20180101T001853Z UID:e4eaa421-652a-4309-9e04-fe46aa3da50d@frab.cccv.de DESCRIPTION:Jeder weiß ungefähr was man mit einem Mikroskop tun kann: Kle ine Dinge ansehen. Aber wie geht das genau\, was braucht man dafür und g ibt es da nicht eine Möglichkeit\, dass da digitale Bilder rauspurzeln? Das hier soll eine Einführung sein\, und zwar in die Grundlagen von Mikr oskopen\, wo der Unterschied zu anderen Optiken (Fotografie\, Teleskope) ist und wie man zu Hause mit einfachen Mitteln schöne Bilder machen kan n. Was kann man sinnvolles an den Nachwuchs verschenken\, was taugen Ans treck-Dinger für das Smartphone oder USB-Mikroskope\, wie fange ich zu H ause mit Mikroskopie an und was kann man überhaupt so alles betrachten? Quasi Micsorcopy 101. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9134.htm l SUMMARY:Es sind die kleinen Dinge im Leben II - André Lampe LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T183000 DTSTAMP;VALUE=DATE-TIME:20171231T205120Z UID:e1a60f7b-6a56-4dce-ab3a-c686fa940aa8@frab.cccv.de DESCRIPTION:Microcode is an abstraction layer on top of the physical comp onents of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism\, very lit tle is known about its inner workings given that microcode and the updat e mechanism itself are proprietary and have not been throughly analyzed yet. We close this gap by both analyzing microcode and writing our own p rograms for it. This talk will give an insight into our results and how we achieved them\, including live demos of what we can do and technical details. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9058.htm l SUMMARY:Everything you want to know about x86 microcode\, but might have been afraid to ask - Benjamin Kollenda\, Philipp Koppe LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T230000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T223000 DTSTAMP;VALUE=DATE-TIME:20171230T165037Z UID:44949d62-284f-46b6-ad7b-2359aa1f7a0b@frab.cccv.de DESCRIPTION:In 2017\, the federal states of Baden-Wurttemberg and Bavaria suggested the extension of the law on the analysis of forensic DNA. Up to now\, DNA fingerprinting in forensic settings may\, in addition to n on-coding features of DNA\, only analyze the chromosomal sex of the pers on\, but not any other openly visible feature. Bavaria and Baden-Wurttem berg\, under the leadership of CSU and the Green party\, are pushing for ward to analyze DNA found at crime scenes regarding hair color\, eye col or\, skin color and in the case of Bavaria even geographical ethnicity. Extended DNA analysis\, or “DNA facial composite” is seen as an imparti al witness to the crime and\, in the eyes of the states’ government\, wo uld help solve crimes. But would it? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9045.htm l SUMMARY:Extended DNA Analysis - _Adora_Belle_ LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T194500 DTSTAMP;VALUE=DATE-TIME:20171231T234758Z UID:664f6c37-2fab-4191-a5d6-042aba7518c3@frab.cccv.de DESCRIPTION:Faced with new responsibilities to prevent terrorism and mone y laundering\, banks have built a huge surveillance infrastructure sweep ing up millions of innocent people. Investigative journalists Jasmin Klo fta and Tom Wills explain how\, as part of an international collaboratio n\, they exposed World-Check\, the privately-run watchlist at the heart of the system. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9070.htm l SUMMARY:Financial surveillance - Jasmin Klofta\, Tom Wills LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T113000 DTSTAMP;VALUE=DATE-TIME:20171231T173036Z UID:34fb21bd-34f5-40cc-b081-7fc427c452b6@frab.cccv.de DESCRIPTION:In recent years\, the group Forensic Architecture began using novel research methods to undertake a series of investigations into hum an rights abuses. The group uses architecture as an optical device to in vestigate armed conflicts and environmental destruction\, as well as to cross-reference a variety of evidence sources\, such as new media\, remo te sensing\, material analysis\, witness testimony\, and crowd-sourcing. \n \nIn this talk\, Eyal Weizman provides\, for the first time\, an in-d epth introduction to the history\, practice\, assumptions\, potentials\, and double binds of this practice. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9276.htm l SUMMARY:Forensic Architecture - Eyal Weizman LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T163000 DTSTAMP;VALUE=DATE-TIME:20171228T161755Z UID:f068c5df-f969-4206-befb-540326e3d053@frab.cccv.de DESCRIPTION:Wouldn’t it be awesome to have a microscope which allows scie ntists to map atomic details of viruses\, film chemical reactions\, or s tudy the processes in the interior of planets? Well\, we’ve just built o ne in Hamburg. It’s not table-top\, though: 1 billion Euro and a 3km lon g tunnel is needed for such a ‘free electron laser’\, also called 4th ge neration synchrotron light source. I will talk about the basic physics a nd astonishing facts and figures of the operation and application of the se types of particle accelerators. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8832.htm l SUMMARY:Free Electron Lasers - Thorsten LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T143000 DTSTAMP;VALUE=DATE-TIME:20171230T143357Z UID:ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3@frab.cccv.de DESCRIPTION:Dutch intelligence agencies will soon be allowed to analyse b ulk data of civilians on a massive scale\, by intercepting internet traf fic and through real-time access to all kinds of databases. They will al so start hacking third-parties. My friends and I want to stop this. We s tarted an action to enforce a referendum on the law. Surprisingly\, it w orked! How do we get most out of this opportunity? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9172.htm l SUMMARY:Fuck Dutch mass-surveillance: let's have a referendum! - niinja LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T140000 DTSTAMP;VALUE=DATE-TIME:20180101T134015Z UID:a890dbd3-8859-4788-a72f-ded5c5c08e5f@frab.cccv.de DESCRIPTION:In 2014 China’s government announced the implementation of bi g data based social credit systems (SCS). The SCS will rate online and o ffline behavior to create a score for each user. One of them is planned to become mandatory in 2020. This lecture will review the current state of governmental and private SCS and different aspects of these systems. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8874.htm l SUMMARY:Gamified Control? - Katika Kühnreich LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T234500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T231500 DTSTAMP;VALUE=DATE-TIME:20180101T012833Z UID:832b8fb8-beb1-4d92-93d0-ba3b7568905a@frab.cccv.de DESCRIPTION:Hacker culture overcomes limitations in computer systems thro ugh\ncreativity and tinkering. At the same time\, hacker culture has sh aped\nthe practice of software development to this day. This is\nproble matic - techniques effective for breaking (into) a computer\nsystems are not necessarily suitable for developing resilient and\nsecure systems. It does not have to be this way: We can approach\nsoftware development as a methodical\, systematic activity rather than\ntinkering\, and teach it accordingly. I'll review my experience\nteaching these methods for the past 18 years and give some suggestions\non what *you* may do.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9044.htm l SUMMARY:Growing Up Software Development - Mike Sperber LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T024500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T004500 DTSTAMP;VALUE=DATE-TIME:20171231T104040Z UID:2cb8f405-10be-40f5-ae95-579f024a0c84@frab.cccv.de DESCRIPTION:The Hacker Jeopardy is a quiz show. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9007.htm l SUMMARY:Hacker Jeopardy - Sec\, Ray LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T024500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T004500 DTSTAMP;VALUE=DATE-TIME:20171228T232416Z UID:67680f81-cda8-4f5f-9ee1-5b2c6ed2db43@frab.cccv.de DESCRIPTION:The Hacker Jeopardy is a quiz show. -- Stream URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9298.htm l SUMMARY:Hacker Jeopardy Stream - LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T143000 DTSTAMP;VALUE=DATE-TIME:20180101T002556Z UID:9e774be1-eb68-4ccc-94bd-a65f9abd752d@frab.cccv.de DESCRIPTION:
As authors it is our responsibility to build secure softwa re and give each other the chance to verify and monitor our work.\nVario us flaws in development toolchains that allow code execution just by vie wing or working in malicious repositories question the integrity of deve lopment environments and as such our projects as a whole.
\nThis t alk will discuss practical solutions for both technical and social chall enges of collaboration.
URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9249.htm l SUMMARY:Hardening Open Source Development - gronke LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T134500 DTSTAMP;VALUE=DATE-TIME:20171231T104107Z UID:6dcdb702-ce9b-4351-aab9-2a2ac3780a17@frab.cccv.de DESCRIPTION:Digital Restrictions Management (DRM) is found everywhere fro m music to cars and\, most recently\, World Wide Web Consortium recommen dations. How did we get here and where are we going with DRM? Who really owns not just your tools\, but your experiences when someone (or someth ing) else is controlling access to the data and access around them? We' ll attempt to answer these questions\, and more\, in a historical overvi ew\, contemporary analysis\, and look towards the future. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9110.htm l SUMMARY:History and implications of DRM - Molly de Blanc LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T113000 DTSTAMP;VALUE=DATE-TIME:20180101T012907Z UID:95f6e79b-e6a5-4d93-b4ba-cb70470ed819@frab.cccv.de DESCRIPTION:Holography of Wi-Fi radiation\nPhilipp Holl [1\,2] and Friede mann Reinhard [2]\n\n[1] Max Planck Institute for Physics\n[2] Walter Sc hottky Institut and Physik-Department\, Technical University of Munich\n \nWhen we think of wireless signals such as Wi-Fi or Bluetooth\, we usua lly think of bits and bytes\, packets of data and runtimes. \n\nInteres tingly\, there is a second way to look at them. From a physicist's persp ective\, wireless radiation is just light\, more precisely: coherent ele ctromagnetic radiation. It is virtually the same as the beam of a laser\ , except that its wavelength is much longer (cm vs µm). \n\nWe have deve loped a way to visualize this radiation\, providing a view of the world as it would look like if our eyes could see wireless radiation. \n\nOur scheme is based on holography\, a technique to record three-dimensional pictures by a phase-coherent recording of radiation in a two-dimensional plane. This technique is traditionally implemented using laser light. W e have adapted it to work with wireless radiation\, and recorded hologra ms of building interiors illuminated by the omnipresent stray field of w ireless devices. In the resulting three-dimensional images we can see bo th emitters (appearing as bright spots) and absorbing objects (appearing as shadows in the beam). Our scheme does not require any knowledge of t he data transmitted and works with arbitrary signals\, including encrypt ed communication. \n\nThis result has several implications: it could pro vide a way to track wireless emitters in buildings\, it could provide a new way for through-wall imaging of building infrastructure like water a nd power lines. As these applications are available even with encrypted communication\, it opens up new questions about privacy.\n\n\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9024.htm l SUMMARY:Holography of Wi-Fi radiation - Friedemann Reinhard LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T000000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T233000 DTSTAMP;VALUE=DATE-TIME:20171231T235732Z UID:9ba995df-b1ca-402d-b1c8-c21e5faacd3b@frab.cccv.de DESCRIPTION:This talk covers the theory\, legality and economics of home distilling. We present the theoretical background of mashing\, fermentin g and distilling alcohol as well as the legal framework for home distill ing in Germany from 2018 on. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8938.htm l SUMMARY:Home Distilling - freibrenner LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T210000 DTSTAMP;VALUE=DATE-TIME:20180101T004536Z UID:6c4b2648-3840-476c-b966-c008010bca66@frab.cccv.de DESCRIPTION:There exists no such thing as a perfect anonymity network wit h low latency\, low bandwith consumption which provides strong anonymity . \nPopular anonymisation networks rightfully focus on Web browsing\, b ecause that is the most popular application on todays Internet. The mos t popular anonymisation network is\, rightfully so\, Tor. You might\, ho wever\, not have the requirements that mandate the use of the Tor networ k and thus are looking for alternatives.\nIn this talk\, we present alte rnatives to the popular Tor anonymisation network and examine what they achieve and how they differ. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9104.htm l SUMMARY:How Alice and Bob meet if they don't like onions - Tobias Mueller \, Erik\, Matthias LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T153000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T150000 DTSTAMP;VALUE=DATE-TIME:20171231T000310Z UID:44e7cb13-011e-4242-b26a-1edf4ac15b83@frab.cccv.de DESCRIPTION:Formal verification of software has finally started to become viable: we have examples of formally verified microkernels\, realistic compilers\, hypervisors etc. These are huge achievements and we can expe ct to see even more impressive results in the future but the correctness proofs depend on a number of assumptions about the Trusted Computing Ba se that the software depends on. Two key questions to ask are: Are the s pecifications of the Trusted Computing Base correct? And do the implemen tations match the specifications? I will explore the philosophical chall enges and practical steps you can take in answering that question for on e of the major dependencies: the hardware your software runs on. I will describe the combination of formal verification and testing that ARM use s to verify the processor specification and I will talk about our curren t challenge: getting the specification down to zero bugs while the archi tecture continues to evolve. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8915.htm l SUMMARY:How can you trust formally verified software? - Alastair Reid LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T151500 DTSTAMP;VALUE=DATE-TIME:20171230T220618Z UID:a13dc0d2-55af-4b60-a07c-1786094da593@frab.cccv.de DESCRIPTION:Software vendors like to claim that their software is secure\ , but the effort and techniques applied to this end vary significantly a cross the industry. From an end-user's perspective\, how do you identify those vendors who are effective at securing their software? From a vend or's perspective\, how do you identify those techniques which are effect ive at improving security? Presenting joint work with Sarah Zatko\, mudg e\, Patrick Stach\, and Parker Thompson. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9225.htm l SUMMARY:How risky is the software you use? - Tim Carstens & Parker Thomp son LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T183000 DTSTAMP;VALUE=DATE-TIME:20180101T012746Z UID:275f85de-d612-4440-8755-85dee5912f12@frab.cccv.de DESCRIPTION:Lots of research are arising from the fairly unexplored world of automative communications. Cars are no longer becoming computers\, t hey are fully connected networks where every ECU exchanges and operates the vehicles at some point.\nHere is an introduction of my immersion and discussions with my car\, and how I finally managed to drift (a bit) wi th my mom's FWD Fiat 500c. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8758.htm l SUMMARY:How to drift with any car - Guillaume Heilles\, P1kachu LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T201500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T194500 DTSTAMP;VALUE=DATE-TIME:20171228T201221Z UID:6cccf75c-93a1-48df-b9fc-843da8359bd3@frab.cccv.de DESCRIPTION:While technology is often described as an extension of our bo dies\, this talk will explore a reversed relationship: Bodies and minds of digital laborers (you and me and basically everybody else) as softwar e extensions that can be easily plugged in\, rewired\, and discarded. I will approach this topic from an artist's point of view. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9077.htm l SUMMARY:Humans as software extensions - Sebastian Schmieg LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T230000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T220000 DTSTAMP;VALUE=DATE-TIME:20171231T001311Z UID:c38ddf1b-10d7-462c-a934-e69e9259ab19@frab.cccv.de DESCRIPTION:This talk will go over our efforts to implement a new open so urce DBI framework based on LLVM. We'll explain what DBI is used for\, h ow it works\, the implementation challenges we faced and compare a few o f the existing frameworks with our own implementation. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9006.htm l SUMMARY:Implementing an LLVM based Dynamic Binary Instrumentation framewo rk - Charles Hubain\, Cédric Tessier LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T203000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T183000 DTSTAMP;VALUE=DATE-TIME:20171230T050336Z UID:3be879a7-3b41-4a05-aafc-f06f34585984@frab.cccv.de DESCRIPTION:Herbst 2017. Irgendwo in Deutschland. Die führenden Köpfe der AfD träumen von der parlamentarischen Machtübernahme und dem schleichen den Sieg im Kampf um die Deutungshoheit von Begrifflichkeiten. Doch dann kommt alles ganz anders. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9253.htm l SUMMARY:Inside AfD - Felix Höfner\, Lucia\, Marek\, Janosch\, Slim LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T183000 DTSTAMP;VALUE=DATE-TIME:20171230T232107Z UID:c35e099a-f620-41ea-8e99-16cade147196@frab.cccv.de DESCRIPTION:SafetyNet Attestation is the primary platform security servic e on Android. Until recently you had to use third party tools or impleme nted your own app integrity checks and device rooting checks. Today you can use Android's SafetyNet Attestation infrastructure to ensure the int egrity of your application and the user's device. Unfortunately\, Safety Net Attestation is not well documented by Google. This talk is split int o three parts. Part one provides a deep dive into SafetyNet Attestation how it works. Part two is a guide on how to implement and use it for rea l world applications. This is based on the lessons learned from implemen ting SafetyNet Attestation for an app with a large install base. The tal k will provide you with everything you need to know about Android’s Safe tyNet Attestation and will help you to implement and use it in your app. Part three presents attacks and bypasses against SafetyNet Attestation. The attack method targets not only SafetyNet but other similar approach es. New tools and techniques will be released at this talk. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8725.htm l SUMMARY:Inside Android’s SafetyNet Attestation: Attack and Defense - Coll in Mulliner LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T163000 DTSTAMP;VALUE=DATE-TIME:20171231T154203Z UID:65a25dfd-56dd-4e87-a910-334e2dc25a9c@frab.cccv.de DESCRIPTION:Positive Technologies researchers Maxim Goryachy and Mark Erm olov have discovered a vulnerability that allows running unsigned code. The vulnerability can be used to activate JTAG debugging for the Intel M anagement Engine processor core. When combined with DCI\, this allows de bugging ME via USB. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8762.htm l SUMMARY:Inside Intel Management Engine - Maxim Goryachy\, Mark Ermolov LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T210000 DTSTAMP;VALUE=DATE-TIME:20171230T232200Z UID:581ccbad-4bbf-47a2-8845-f52278d61061@frab.cccv.de DESCRIPTION:Many claims were made recently about purpose and capabilities of the Intel ME but with all the buzz it is not always clear what are f acts and what is just speculation. We'll try to clear the fog of misunde rstanding with research based on investigations of ME firmware and pract ical experiments on ME-equipped hardware. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8782.htm l SUMMARY:Intel ME: Myths and reality - Igor Skochinsky\, Nicola Corna LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T120000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T113000 DTSTAMP;VALUE=DATE-TIME:20171230T113356Z UID:02dbb8e3-54ed-42ac-b26d-dfcb5fe5a70c@frab.cccv.de DESCRIPTION:Neue Standards wie IIIF (http://iiif.io) ermöglichen es\, dig italisiertes Kulturgut (Gemälde\, Bücher\, Handschriften\, Fotografien\, Karten u.s.w.) interoperabel und maschinenlesbar verfügbar zu machen. D arauf aufsetzend können nicht nur ansehnliche Präsentationen erstellt we rden\, insbesondere ermöglicht IIIF es\, institutionsübergreifend Daten verknüpfbar zu machen und virtuelle Arbeitsoberflächen einrichtungsunabh ängig zu realisieren. Dem Linked Data Prinzip folgend\, sind alle Daten standardisiert identifizierbar und nutzbar. Es existieren bereits viele leistungsfähige Open Source Anwendungen für IIIF. Der Talk führt in IIIF ein und zeigt viele anschauliche Beispiele\, die bedeutende Werke aus n amhaften Einrichtungen weltweit enthalten. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8853.htm l SUMMARY:International Image Interoperability Framework (IIIF) – Kulturins titutionen schaffen interoperable Schnittstellen für digitalisiertes Kul turgut - Leander Seige LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T151500 DTSTAMP;VALUE=DATE-TIME:20171229T150728Z UID:8453f8f1-d934-4d10-bcfa-a857fa65b8df@frab.cccv.de DESCRIPTION:On October 1st the Catalan society held a referendum to decid e if they wanted to stay part of the Spanish state or create an independ ent state. This talk will explain the internet censorship which took pla ce in the weeks before the referendum\, on the very same day as well as in the timer after the referendum. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9028.htm l SUMMARY:Internet censorship in the Catalan referendum - Matthias LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T163000 DTSTAMP;VALUE=DATE-TIME:20171231T200459Z UID:16645200-2036-4a3c-a44d-a5ff44ac2991@frab.cccv.de DESCRIPTION:Expect current examples of IoT fails that I collected during my work as a journalist in regards of privacy and security. What do such fails mean for society? What are possible solutions and what can custom ers do? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9193.htm l SUMMARY:Internet of Fails - Barbara Wimmer LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T130000 DTSTAMP;VALUE=DATE-TIME:20180101T123110Z UID:1a4ac7bc-1ca5-4674-a736-38d796b0c36a@frab.cccv.de DESCRIPTION:This project aims to take advantage of the availability of pu blic procurement data sets\, required by anticorruption transparency law s\, to discover government surveillance capabilities in Italy.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9148.htm l SUMMARY:Italy's surveillance toolbox - boter LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T174500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T151500 DTSTAMP;VALUE=DATE-TIME:20171231T234415Z UID:4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7@frab.cccv.de DESCRIPTION:Staatstrojaner\, Vorratsdaten\, automatisierte Biometriesamml ungen\, PC-Wahl – wir geben einen Überblick über die Themen\, die den Ch aos Computer Club 2017 beschäftigt haben. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9262.htm l SUMMARY:Jahresrückblick des CCC 2017 - frank\, Constanze Kurz\, nexus\, L inus Neumann LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T233000 DTSTAMP;VALUE=DATE-TIME:20171230T134416Z UID:ff24373e-ebe2-4077-9db0-eae5ab003538@frab.cccv.de DESCRIPTION:We introduce key reinstallation attacks (KRACKs). These attac ks abuse features of a protocol to reinstall an already in-use key\, the reby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9273.htm l SUMMARY:KRACKing WPA2 by Forcing Nonce Reuse - Mathy Vanhoef LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T134500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T124500 DTSTAMP;VALUE=DATE-TIME:20180101T120119Z UID:da934433-0092-4749-b606-56b65e84214f@frab.cccv.de DESCRIPTION:Wir retten das Klima mit Elektroautos — und bauen die Ladeinf rastruktur massiv aus. Leider werden dabei auch Schwachstellen auf allen Ebenen sichtbar: Von fehlender Manipulationssicherheit der Ladesäulen b is hin zu inhärent unsicheren Zahlungsprotokollen und kopierbaren Zahlka rten. Ladesäulenhersteller und Ladenetzbetreiber lassen ihre Kunden im R egen stehen — geht das schnelle Wachstum des Marktanteils zu Lasten der Kundensicherheit? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9092.htm l SUMMARY:Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit - Mat hias Dalheimer LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T221500 DTSTAMP;VALUE=DATE-TIME:20171230T232231Z UID:5c5e888e-4556-405b-a205-e59b97db99e1@frab.cccv.de DESCRIPTION:Lattices are an extremely useful mathematical tool for crypto graphy.\nThis talk will explain the basics of lattices in cryptography a nd cryptanalysis. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9075.htm l SUMMARY:LatticeHacks - djb\, Tanja Lange\, Nadia Heninger LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T183000 DTSTAMP;VALUE=DATE-TIME:20171231T075539Z UID:5cf8c222-47d3-4741-9324-be182b4d0fb8@frab.cccv.de DESCRIPTION:Do you want to learn how modern binary code obfuscation and d eobfuscation works? Did you ever encounter road-blocks where well-known deobfuscation techniques do not work? Do you want to see a novel deobfus cation method that learns the code's behavior without analyzing the code itself? Then come to our talk and we give you a step-by-step guide. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8789.htm l SUMMARY:Lets break modern binary code obfuscation - Tim Blazytko\, Moritz Contag LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T113000 DTSTAMP;VALUE=DATE-TIME:20171214T210359Z UID:6be7c907-103c-4c96-969a-32890c98a8cd@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9256.htm l SUMMARY:Lightning Talks Day 2 - gedsic\, bigalex LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T113000 DTSTAMP;VALUE=DATE-TIME:20171229T195816Z UID:439d7085-4f24-45ac-843f-987f89c4446d@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9257.htm l SUMMARY:Lightning Talks Day 3 - gedsic\, bigalex LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T113000 DTSTAMP;VALUE=DATE-TIME:20171231T084310Z UID:edfd7686-0117-43c4-8e42-030408de5e91@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9258.htm l SUMMARY:Lightning Talks Day 4 - gedsic\, bigalex LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T113000 DTSTAMP;VALUE=DATE-TIME:20171231T054721Z UID:12f2dd5b-5e3d-4098-9f10-6c277672b2e0@frab.cccv.de DESCRIPTION:In der EU wird gerade über eine Verordnung verhandelt\, die f ür die Vertraulichkeit der elektronischen Kommunikation verbindliche und zeitgemäße Regeln schaffen soll. Diese „ePrivacy-Verordnung“ könnte in absehbarer Zeit die letzte Möglichkeit sein\, dem informationellen Kontr ollverlust EU-weit politisch etwas entgegenzusetzen. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9271.htm l SUMMARY:Lobby-Schlacht um die ePrivacy-Verordnung - Ingo Dachwitz LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T210000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T203000 DTSTAMP;VALUE=DATE-TIME:20171231T102119Z UID:684193b5-696e-495f-88eb-04f8d3114e01@frab.cccv.de DESCRIPTION:An open source biomedical imaging project using electrical im pedance tomography. Imagine a world where medical imaging is cheap and a ccessible for everyone! We'll discuss this current project\, how it work s\, and future directions in medical physics. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8948.htm l SUMMARY:Low Cost Non-Invasive Biomedical Imaging - Jean Rintoul LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T151500 DTSTAMP;VALUE=DATE-TIME:20171230T151722Z UID:a1449c4d-79cd-46d8-8eb3-305707ef026a@frab.cccv.de DESCRIPTION:Master Quality Authenticated (MQA) is a new audio format prom ising studio sound at home and no DRM. We take a critical look both at t he sound-quality aspects as well as on the DRM story of MQA. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9113.htm l SUMMARY:MQA - A clever stealth DRM-Trojan - Christoph Engemann\, Anton.sc hlesinger@studio-singer.de LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T124500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T121500 DTSTAMP;VALUE=DATE-TIME:20171228T122536Z UID:57d3ba9e-49c8-440e-a30a-c0297204848a@frab.cccv.de DESCRIPTION:Over the past year\, we have been developing open source whee lchair add-ons through user research\, ideation\, design\, prototyping a nd testing. We present the outcome and insights from the process. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8814.htm l SUMMARY:Making Experts Makers and Makers Experts - Daniel Wessolek\, Isab elle Dechamps LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T143000 DTSTAMP;VALUE=DATE-TIME:20171230T192521Z UID:c02f6777-5e55-46ca-8d60-1810a8d5f3c7@frab.cccv.de DESCRIPTION:Systems are getting increasingly complex and it's getting har der to understand what they are actually doing. Even though they are bui lt by human individuals they often surprise us with seemingly bizarre be havior. DTrace lights a candle in the darkness that is a running product ion system giving us unprecedented insight into the system helping us to understand what is actually going on. \n\nWe are going implement `strac e`-like functionality\, trace every function call in the kernel\, watch the scheduler to its thing\, observer how FreeBSD manages resources and even peek into runtime systems of high level programming languages. If y ou ever wondered what software is doing when you are not looking\, this talk is for you. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9196.htm l SUMMARY:May contain DTraces of FreeBSD - raichoo LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T113000 DTSTAMP;VALUE=DATE-TIME:20180101T100304Z UID:dec6a7e0-2651-4bb5-8300-977795e901ed@frab.cccv.de DESCRIPTION:Der IgNobelpreis ist eine Auszeichnung\, um wissenschaftliche Leistungen zu ehren\, die „Menschen zuerst zum Lachen\, dann zum Nachde nken bringen“ („to honor achievements that first make people laugh\, and then make them think“). Wir erklären die Preisträger 2017 in gewohnter Minkorrekt-Manier. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8922.htm l SUMMARY:Methodisch inkorrekt! - Nicolas Wöhrl\, @ReinhardRemfort LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T221500 DTSTAMP;VALUE=DATE-TIME:20171227T221637Z UID:16c756dd-cb07-4c0e-9885-98243026f7cf@frab.cccv.de DESCRIPTION:Trusted Execution Environments (TEEs)\, like those based on A RM TrustZone or Intel SGX\, intend to provide a secure way to run code b eyond the typical reach of a computer’s operating system.\nHowever\, whe n trusted and untrusted code runs on shared hardware\, it opens the door to the same microarchitectural attacks that have been exploited for yea rs. This talk provides an overview of these attacks as they have been ap plied to TEEs\, and it additionally demonstrates how to mount these atta cks on common TrustZone implementations. Finally\, we identify new techn iques which allow us to peer within TrustZone TEEs with greater resoluti on than ever before. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8950.htm l SUMMARY:Microarchitectural Attacks on Trusted Execution Environments - Ke egan Ryan LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T120000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T113000 DTSTAMP;VALUE=DATE-TIME:20171231T193144Z UID:f68f2747-1c57-4531-a574-3ebe77d80135@frab.cccv.de DESCRIPTION:Das Mietshäusersyndikat ist eine nicht-kommerzielle Kooperati ve mit dem\nZiel\, Bereiche von selbstorganisiertem Wohnen zu schaffen\, ohne selbst\nVermieter zu werden. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9031.htm l SUMMARY:Mietshäusersyndikat: den Immobilienmarkt hacken - Anita Hopes LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T113000 DTSTAMP;VALUE=DATE-TIME:20171231T233915Z UID:95f7fa6a-c6a4-42eb-8c04-e5c82d696539@frab.cccv.de DESCRIPTION:Many mobile network operators rush to upgrade their networks to 4G/LTE from 2G and 3G\, not only to improve the service\, but also th e security. The Diameter protocol - the successor of SS7 in Long Term Ev olution (LTE) networks is believed to offer more protection to the netwo rk itself and to the end-users. However\, also Diameter offers a rich fu nctionality set\, which can be also exploited and misused\, if the netwo rk is not properly protected. We will show in this lecture\, how data in terception (MiM) can be done via the diameter based interconnection link . URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8879.htm l SUMMARY:Mobile Data Interception from the Interconnection Link - Dr. Silk e Holtmanns LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T124500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T121500 DTSTAMP;VALUE=DATE-TIME:20171230T232732Z UID:85d76a77-0d89-4820-8d99-8c5a8509eb24@frab.cccv.de DESCRIPTION:ClaimChain is a Public Key Infrastructure unique in that it c an operate in fully decentralized settings with no trusted parties. A vo uching mechanism among users\, similar to the Web of Trust\, assists wit h social authentication but without revealing the users' social graph. H igh-integrity data structures prevent equivocation and help detect compr omises\; the protocol can support generic claims (conventional PGP\, mod ern OTR/Signal etc.)\; and a prototype evaluation indicates that ClaimCh ain can scale. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9094.htm l SUMMARY:Modern key distribution with ClaimChain - prometheas LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T143000 DTSTAMP;VALUE=DATE-TIME:20171229T162432Z UID:8d87b905-24e0-461e-bff8-d122207ea2e4@frab.cccv.de DESCRIPTION:After four years of advocacy and lobbying to enshrine net neu trality principles in law in Europe\, we can now examine the first full year of enforcement of the new rules. We will compare the enforcment of net neutrality in the individual EU member states\, showcase a few of th e more creative net neutrality violations and demonstrate what civil soc iety can do to keep the Internet neutral. Enforcing net neutrality also requires network measurement tools that can detect discrimination\; we w ill discuss what progress Europe has made in this regard. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9125.htm l SUMMARY:Net Neutraliy Enforcement in the EU - Thomas Lohninger LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T151500 DTSTAMP;VALUE=DATE-TIME:20180101T100053Z UID:5d255692-ae5e-4f96-b10e-55929d570813@frab.cccv.de DESCRIPTION:Gleich in drei Gesetzen drohen Netzsperren. Staatstrojaner un d Massenüberwachung bis ins WLAN sind mit der Einführung der Überwachung sgesetze BÜPF und NDG vorgesehen. E-Voting soll auf Biegen und Brechen d urchgesetzt werden. Nur garantierte Netzneutralität lässt weiter auf sic h warten. Im Vortrag versuchen wir\, Einsichten in die aktuellen netzpol itischen Auseinandersetzungen in der Schweiz zu geben und Handlungsmögli chkeiten aufzuzeigen. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8980.htm l SUMMARY:Netzpolitik in der Schweiz - Kire\, Patrick Stählin\, Martin Stei ger LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T021500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T004500 DTSTAMP;VALUE=DATE-TIME:20171230T161102Z UID:c02bcac2-4df7-4264-83e3-c7277913cbd8@frab.cccv.de DESCRIPTION:Zwei Teams mit rauchenden Köpfen und ein johlendes Publikum r aten sich durch unsere dritte Wortspielhölle der IT\, Informatik und dig italen Gesellschaft. Wer bei vielschichtigen (Anm. d. R.: „haarsträubend en“!) Assoziazionsbilderrätseln freudiges Synapsenfunkeln und feuchte Au gen bekommt oder aber bei Gehirnschmerz und Um-die-Ecke-Denk-Beulen trot zdem feiert\, ist bei uns zu Hause. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8993.htm l SUMMARY:Nougatbytes 11₂ - Rainer Rehak\, Benks LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T143000 DTSTAMP;VALUE=DATE-TIME:20171231T103836Z UID:07d5227a-169e-4b1e-8123-cd6f2c6445e5@frab.cccv.de DESCRIPTION:How can we take a stand against the increasing shadow of Inte rnet censorship? With OONI Probe you can join us in uncovering evidence of network interference! URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8923.htm l SUMMARY:OONI: Let's Fight Internet Censorship\, Together! - Arturo Filast ò (hellais) LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T194500 DTSTAMP;VALUE=DATE-TIME:20171230T183941Z UID:2541602b-f58c-4dec-9722-db72b1dea19e@frab.cccv.de DESCRIPTION:The representation of thunderstorms (deep convection) and rai n showers in climate models represents a major challenge\, as this proce ss is usually approximated with semi-empirical parameterizations due to the lack of appropriate computational resolution. Climate simulations us ing kilometer-scale horizontal resolution allow explicitly resolving dee p convection and thus allow for an improved representation of the water cycle. We present a set of such simulations covering Europe and global c omputational domains. Finally\, we discuss challenges and prospects clim ate modelers face on heterogeneous supercomputers architectures. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9178.htm l SUMMARY:On the Prospects and Challenges of Weather and Climate Modeling a t Convection-Resolving Resolution - David Leutwyler LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T151500 DTSTAMP;VALUE=DATE-TIME:20171231T020846Z UID:c26fa336-680b-49e5-80e6-24432305e94d@frab.cccv.de DESCRIPTION:Collaborative and interdisciplinary research\, Open Source Es trogen combines biohacking and artistic intervention to demonstrate the entrenched ways in which estrogen is a biomolecule with institutional bi opower. It is a form of biotechnical civil disobedience\, seeking to sub vert dominant biopolitical agents of hormonal management\, knowledge pro duction\, and anthropogenic toxicity. Thus\, the project initiates a cul tural dialogue through the generation of DIY/DIWO (do-it-yourself/do-it- with-others) for the detection and extraction of estrogen\, and contextu alized as kitchen performance and queer body worship. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9036.htm l SUMMARY:Open Source Estrogen - maggic LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T231500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T221500 DTSTAMP;VALUE=DATE-TIME:20171228T215404Z UID:c21cb389-aba3-4eaa-ba1f-76f966b1686e@frab.cccv.de DESCRIPTION:Systems that hide their firmware-- often deep in readout-prot ected flash or hidden in encrypted ROM chips-- have long stymied reverse engineers\, who often have to resort to inventive methods to understand closed systems. To help reduce the effort needed to get a foothold into a new system\, we present GlitchKit-- an open source hardware and firmw are solution that significantly simplifies the process of fault-injectin g your way into a new system -- and of fault-injecting firmware secrets out! This talk presents the development completed thus far\, demonstrate s the use of GlitchKit in simple attacks\, and invites participation in the development of our open-source tools. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9207.htm l SUMMARY:Opening Closed Systems with GlitchKit - ktemkin\, dominicgs LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T143000 DTSTAMP;VALUE=DATE-TIME:20171231T174008Z UID:15858ba2-f109-48f3-9934-a4362a0f5e78@frab.cccv.de DESCRIPTION:What kind of organisational structures exist for free softwar e projects? What funding sources? How can you avoid pitfalls with fundin g\, support volunteers\, and stay a happy family? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9087.htm l SUMMARY:Organisational Structures for Sustainable Free Software Developme nt - mo LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T194500 DTSTAMP;VALUE=DATE-TIME:20180101T135044Z UID:de1b5916-8052-4a25-bded-25d96a43aff7@frab.cccv.de DESCRIPTION:The German election in September 2017 brought a tectonic shif t to the layout of German politics. With the AfD in parliament far-right illiberalism has reached the mainstream. We investigate the communicati ve developments underlying this rise. Using web-scraping and automated c ontent analysis\, we collected over 10.000 articles from mainstream-news and far-right blogs\, along with over 90GBs of Tweets and thousands of Facebook-Posts. This allows us a deep insight into how public discourse works in 2017 Germany. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9106.htm l SUMMARY:Pointing Fingers at 'The Media' - alebey LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T140000 DTSTAMP;VALUE=DATE-TIME:20180101T000900Z UID:d86672a7-22fc-44a1-b6d3-20fd9bb51cfa@frab.cccv.de DESCRIPTION:What does policing look like in the age of data exploitation? This is the question we at Privacy International have been exploring fo r the past two years. Our research has focused on the UK where the popul ation has been used as guinea pigs for ever more invasive modern approac hes to policing. In this talk we will discuss our findings with you and avenues for change. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8940.htm l SUMMARY:Policing in the age of data exploitation - Eva Blum--Dumontet\, M illie Wood LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T233000 DTSTAMP;VALUE=DATE-TIME:20180101T012624Z UID:79c1ee55-8004-4dcd-9282-9f7acae9c94a@frab.cccv.de DESCRIPTION:We shall explain the renewed interest in mix networks. Like T or\, mix networks protect metadata by using layered encryption and routi ng packets between a series of independent nodes. Mix networks resist va stly more powerful adversary models than Tor though\, including global p assive adversaries. In so doing\, mix networks add both latency and cove r traffic. We shall outline the basic components of a mix network\, touc h on their roles in resisting active and passive attacks\, and discuss h ow the latency impacts reliability\, application design\, and user exper ience. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8974.htm l SUMMARY:Practical Mix Network Design - David Stainton\, jeffburdges LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T143000 DTSTAMP;VALUE=DATE-TIME:20171231T193251Z UID:57f82be5-77f2-46aa-ba55-94e922e6cb77@frab.cccv.de DESCRIPTION:In 2015 the Court of Justice of the European Union (CJEU) ha s overturned the EU-US data sharing system called „Safe Harbor“ over US mass surveillance\, as disclosed by Edward Snowden. Only months later th e European Commission agreed with the US government to replace it with t he so-called “Privacy Shield”\, despite the existence of PRISM and Upstr eam surveillance. Why the new deal is nothing but the old “Safe Harbor”\ , what we can learn for the documents exchanged between the EU and the U S and why it will very likely be overturned as soon as it reached the CJ EU again. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9295.htm l SUMMARY:Privacy Shield - Lipstick on a Pig? - Max Schrems LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T183000 DTSTAMP;VALUE=DATE-TIME:20171231T104520Z UID:00e9a3f8-16b5-45db-a4e3-312fda04c7df@frab.cccv.de DESCRIPTION:Our lives are on our laptops – family photos\, medical docume nts\, banking information\, details about what websites we visit\, and s o much more. Digital searches at national borders can reach our personal correspondence\, health information\, and financial records\, allowing an affront to privacy and dignity which is inconsistent with the values of a free society. While privacy and security is important for any trave ler\, this has become a critical issue for international conferences and their attendees\, who shouldn’t need to trade off an invasive search fo r participating in important conversations. This talk will discuss the b oth the legal and policy issues with border searches\, as well as techno logical measures people can use in an effort to protect their data. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9086.htm l SUMMARY:Protecting Your Privacy at the Border - Kurt Opsahl\, William Bud ington LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T000000 DTSTAMP;VALUE=DATE-TIME:20171231T175219Z UID:d30b21b9-726d-4ceb-bc68-6858cd158e36@frab.cccv.de DESCRIPTION:Most thought Direct Memory Access (DMA) attacks were a thing of the past after CPU vendors introduced IOMMUs and OS vendors blocked F irewire DMA. At least until the PCILeech direct memory access attack too lkit was presented a year ago and quickly became popular amongst red tea mers and governments alike. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9111.htm l SUMMARY:Public FPGA based DMA Attacking - Ulf Frisk LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T183000 DTSTAMP;VALUE=DATE-TIME:20180101T095829Z UID:947f946e-3dd9-4911-b4de-f9bbd87058ee@frab.cccv.de DESCRIPTION:Willkommen in QualityLand\, in einer nicht allzu fernen Zukun ft: Alles läuft rund - Arbeit\, Freizeit und Beziehungen sind von Algori thmen optimiert. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9285.htm l SUMMARY:QualityLand - Marc-Uwe Kling LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T134500 DTSTAMP;VALUE=DATE-TIME:20171231T192630Z UID:82d8204a-7147-452d-b5a3-91969e3a3ac6@frab.cccv.de DESCRIPTION:Depending on the definition\, autonomous weapon systems do no t and might never exist\, so why should we care about killer robots? It is the decline of human control as an ongoing trend in military systems and the incapacity of computing systems to „understand“ human beings and the nature of war that is worrisome. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9291.htm l SUMMARY:Regulating Autonomous Weapons - Anja Dahlmann LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T214500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T211500 DTSTAMP;VALUE=DATE-TIME:20171231T192008Z UID:8d29d28d-a222-4731-bdfc-fde590385cae@frab.cccv.de DESCRIPTION:Jeder kennt sie\, kaum jemand versteht sie wirklich\, die vie lleicht berühmteste Gleichung der Welt: E=mc^2 \nWas hat es damit auf si ch\, was ist die spezielle- und was die allgemeine Relativitätstheorie? Wie kann man sicher sein\, dass das wirklich stimmt? Bleibt die Zeit ste hen\, wenn man sich mit Lichtgeschwindigkeit bewegt? Was ist das Zwillin gs-Paradoxon und dehnt sich das Universum aus\, oder werden wir einfach nur immer kleiner? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8710.htm l SUMMARY:Relativitätstheorie für blutige Anfänger - Steini LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T183000 DTSTAMP;VALUE=DATE-TIME:20180101T001244Z UID:ea27b2dc-d558-4fab-8406-a9db30930f8f@frab.cccv.de DESCRIPTION:Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM C hips und bei der Minix 3 basierten Intel ME Implementierung zeigen\, das s das Vertrauen in hardwaregestützte Coputersicherheit grundlegend hinte rfragt werden muss. Die Robustness in feindlicher Umgebung kann mit ansp ruchsvolleren kryptographische Verfahren mathematisch abgesichert erhöht werden.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9142.htm l SUMMARY:Resilienced Kryptographie - ruedi\, cforler LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T140000 DTSTAMP;VALUE=DATE-TIME:20171231T205510Z UID:be19fbe3-e825-4e67-93f9-a6aeda2e31af@frab.cccv.de DESCRIPTION:In this talk I describe the basic makeup of FPGAs and how I r everse engineered the Xilinx 7 Series and Lattice iCE40 Series together with the implications. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9237.htm l SUMMARY:Reverse engineering FPGAs - MathiasL LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T000000 DTSTAMP;VALUE=DATE-TIME:20171230T011736Z UID:68d83e4e-52d8-42be-b01c-c6f425d95c8e@frab.cccv.de DESCRIPTION:Once full automation hits\, we will have a lot of free time o n our hands. This project demonstrates early explorations in computer ge nerated music via robot hands\, old computers and generative algorithms. While the robot performs\, we sit next to it and invite people for a co nversation about robots being “creative” and “stealing our jobs”. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9150.htm l SUMMARY:Robot Music - jacob remin\, goto80 LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T210000 DTSTAMP;VALUE=DATE-TIME:20180101T001711Z UID:416409b8-e09e-4717-bb2d-bba218d6f2f1@frab.cccv.de DESCRIPTION:Since SDR (Software Defined Radio) becomes more popular and m ore available for everyone\, there is a lot of projects based on this te chnology. Looking from the mobile telecommunications side\, at the momen t it's possible to run your own GSM or UMTS network using a transmit cap able SDR device and free software like OsmoBTS or OpenBTS. There is also the srsLTE project\, which provides open source implementation of LTE b ase station (eNodeB) and moreover the client side stack (srsUE) for SDR. Our talk is about the R&D process of porting the existing GSM mobile si de stack (OsmocomBB) to the SDR based hardware\, and about the results w e have achieved. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8952.htm l SUMMARY:Running GSM mobile phone on SDR - Vadim Yanitskiy\, ptrkrysik LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T163000 DTSTAMP;VALUE=DATE-TIME:20171227T203329Z UID:1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc@frab.cccv.de DESCRIPTION:Small gateways connect all kinds of fieldbusses to IP systems . This talk will look at the (in)security of those gateways\, starting w ith simple vulnerabilities\, and then deep diving into reverse-engineeri ng the firmware and breaking the encryption of firmware upgrades. The fo und vulnerabilities will then be demonstrated live on a portable SCADA s ystem. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8956.htm l SUMMARY:SCADA - Gateway to (s)hell - Thomas Roth LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T170000 DTSTAMP;VALUE=DATE-TIME:20171231T175046Z UID:fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc@frab.cccv.de DESCRIPTION:An overview of the SatNOGS project\, a network of satellite g round station around the world\, optimized for modularity\, built from r eadily available and affordable tools and resources. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9189.htm l SUMMARY:SatNOGS: Crowd-sourced satellite operations - Nikos Roussos LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T154500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T151500 DTSTAMP;VALUE=DATE-TIME:20171231T192739Z UID:b4ec41ce-8c36-47a3-87a3-984c111cb2a6@frab.cccv.de DESCRIPTION:Space Solar Power station\, such as SPS Alpha\, could overcom e some issues that renewable energy plants on Earth suffer of structural basis when challenges such as energy transfer from orbit to Earth are s olved. But will this solve the Earth's problems in a peaceful way? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8869.htm l SUMMARY:Saving the World with Space Solar Power - anja\, sjunk LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T000000 DTSTAMP;VALUE=DATE-TIME:20180101T103129Z UID:6d9ee2da-4907-415f-84b4-61ecfa783895@frab.cccv.de DESCRIPTION:This talk covers the theory\, the required tools and how to m ake them\, and the process of turning apples into juice\, ferment them\, and enrich the alcohol content of the product. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8946.htm l SUMMARY:Schnaps Hacking - Nero Lapislucis\, sir wombat LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T124500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T121500 DTSTAMP;VALUE=DATE-TIME:20180101T002211Z UID:8720ee73-f47b-4594-bfab-26206c0d6cfc@frab.cccv.de DESCRIPTION:Wie umgehen mit politischer Ohnmacht? Das Informationsfreihei tsgesetz bietet einige Ansätze: Es macht es auch für juristische Laien m öglich\, gegen Behörden vorzugehen\, die das Recht brechen. Wir kämpfen gegen die Ohnmacht: Dieses Jahr haben wir alle Gesetzentwürfe aller Bund esministerien und Lobby-Stellungnahmen dazu befreit. Wir haben uns mit d er Berliner Partypolizei angelegt - prost! - und 13 Behörden verklagt\, darunter die Polizei Köln\, das Innenministerium und das Verteidigungsmi nisterium. Und wir haben einen Weg gefunden\, zwei Behörden zu verklagen \, die eigentlich sonst keine Auskunft geben ... URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8714.htm l SUMMARY:Schreibtisch-Hooligans - Arne Semsrott LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T153000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T150000 DTSTAMP;VALUE=DATE-TIME:20180101T134837Z UID:0cccbcdd-1e5c-4457-883b-6141c04d754c@frab.cccv.de DESCRIPTION:We're supposed to trust evidence-based information in all are as of life. However disconcerting news from several areas of science mus t make us ask how much we can trust scientific evidence. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9055.htm l SUMMARY:Science is broken - hanno LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T163000 DTSTAMP;VALUE=DATE-TIME:20180101T095348Z UID:8e222759-cd6b-403b-8fe1-3517bf7d2802@frab.cccv.de DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un d Trends waren zu sehen? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8888.htm l SUMMARY:Security Nightmares 0x12 - frank\, Ron LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T210000 DTSTAMP;VALUE=DATE-TIME:20171230T163319Z UID:eaf5d978-ea98-4474-9d40-7f493167d26d@frab.cccv.de DESCRIPTION:How can we feed a growing world population within a resilient Earth System? This session will present results from our cybernetic com puter models that simulate how future trends in population growth\, diet s\, technology and policy may change the global land cover\, freshwater usage\, the nitrogen cycle and the climate system\, and how more sustain able pathways can be reached. We want to discuss how our computer models and our data can be made accessible and usable by a broader community\, and which new ways exist to visualize key insights and provide decision support to our society. We will also showcase some interactive physical installations that have been developed jointly with a group of art stud ents to visualize future scenarios. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8935.htm l SUMMARY:Simulating the future of the global agro-food system - Benjamin L eon Bodirsky LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T113000 DTSTAMP;VALUE=DATE-TIME:20171231T194431Z UID:a9ebf7e3-abc5-49d9-8efe-316b3bc52902@frab.cccv.de DESCRIPTION:„Angriff der Meinungsroboter“ und „Gefangen in der Filterblas e“ titelten die deutschen Medien. Doch was ist wirklich daran? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9268.htm l SUMMARY:Social Bots\, Fake News und Filterblasen - Michael Kreil LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T214500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T211500 DTSTAMP;VALUE=DATE-TIME:20171231T174555Z UID:4f8ec815-f761-4fb5-a786-a9d29cc34d17@frab.cccv.de DESCRIPTION:What does it mean to be free in a world where surveillance is the dominant business model? Behind the scenes databrokers are turning our data into thousands of scores. This digital reputation is increasing ly influencing our chances to find a job\, a loan or even a date. Resear chers are pointing out that\, as people become aware of this reputation economy\, it is generating a culture where self-censorship and risk aver sion are the new normal. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8797.htm l SUMMARY:Social Cooling - big data’s unintended side effect - Tijmen Schep LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T151500 DTSTAMP;VALUE=DATE-TIME:20171231T103923Z UID:bf924a39-2860-4e27-8741-b8fa0c010363@frab.cccv.de DESCRIPTION:In 2015\, artist Ai Weiwei was bugged in his home\, presumabl y by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spying microp hones. Our biggest concern was that most of the knowledge came from fict ional movies. Therefore\, we performed a deep study on the state-of-the- art of microphone bugs\, their characteristics\, features and pitfalls. It included real life experiments trying to bug ourselves and trying to detect the hidden mics. Given the lack of open detection tools\, we deve loped a free software SDR-based program\, called Salamandra\, to detect and locate hidden microphones in a room. After more than 120 experiments we concluded that placing mics correctly and listening is not an easy t ask\, but it has a huge payoff when it works. Also\, most mics can be de tected easily with the correct tools (with some exceptions on GSM mics). In our experiments the average time to locate the mics in a room was 15 minutes. Locating mics is the novel feature of Salamandra\, which is re leased to the public with this work. We hope that our study raises aware ness on the possibility of being bugged by a powerful actor and the coun termeasure tools available for our protection. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8735.htm l SUMMARY:Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Dete ction - Veronica Valeros\, Sebastian Garcia LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T140000 DTSTAMP;VALUE=DATE-TIME:20180101T012303Z UID:23d59026-ab98-4f6c-a46d-0bb3e1788a67@frab.cccv.de DESCRIPTION:The Go implementation of the P-256 elliptic curve had a small bug due to a misplaced carry bit affecting less than 0.00000003% of fie ld subtraction operations. We show how to build a full practical key rec overy attack on top of it\, capable of targeting JSON Web Encryption. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9021.htm l SUMMARY:Squeezing a key through a carry bit - Filippo Valsorda LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T194500 DTSTAMP;VALUE=DATE-TIME:20171228T195805Z UID:7308816a-1e3d-4dc6-99e8-b512da95bcf1@frab.cccv.de DESCRIPTION:In this talk we will present a deep-dive analysis of the anat omy of QNX: a proprietary\, real-time operating system aimed at the embe dded market used in many sensitive and critical systems\, particularly w ithin the automotive industry.\n\nWe will present the first reverse-engi neering and analysis of the exploit mitigations\, secure random number g enerators and memory management internals of QNX versions up to and incl uding 6.6 and the brand new 64-bit QNX 7.0 (released in March 2017) and uncover a variety of design issues and vulnerabilities. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8730.htm l SUMMARY:Taking a scalpel to QNX - Jos Wetzels\, Ali Abbasi LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T120000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T113000 DTSTAMP;VALUE=DATE-TIME:20171231T103746Z UID:81125495-9d1d-481a-8c63-0d3ef9ff0617@frab.cccv.de DESCRIPTION:Taxation\, the most "boring" #34c3 talk\, but hey it's the ec onomy stupid\, and you pay for it! We will a provide a quick overview of the international taxation system. Explaining what a Double Irish Sandw ich is. Why international corporations like Google only pays 2.4% taxes. And how your favourite tech companies (Google\, Amazon\, Apple\, Micros oft\, ... ) evaded billions in taxes. This tax-dodging costs the Europea n Union more than $50 billion. Annually. We bring this numbers into pers pective. And why you pay more.\nAnd how you should discuss that topic\, since it defines how our society will be. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9047.htm l SUMMARY:Taxation - vavoida LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T151500 DTSTAMP;VALUE=DATE-TIME:20180101T002936Z UID:58ffa60d-607b-405f-9363-213097ef3920@frab.cccv.de DESCRIPTION:Internet access in Cuba is notoriously restrictive. ETECSA\, the government-run teleco\, offers 60 wireless hotspots in parks and hot els\, allowing foreigners and citizens alike to "visit" the Internet for only $1/hour… That’s what most tourists know about the Internet in Cuba \, but of course\, that can't be the whole story!\n\nIn this talk\, we'l l take a deeper look at what life is like for Cuban hackers\, and we’ll get to tour a vibrant set of community-driven networks that typical tour ists never see. The story that emerges is an inspiring view of what comm unities can (and can’t) accomplish in the face of adversity.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8740.htm l SUMMARY:The Internet in Cuba: A Story of Community Resilience - Will Scot t\, kopek LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T214500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T211500 DTSTAMP;VALUE=DATE-TIME:20180101T012807Z UID:81530917-cfdd-4a08-bf29-9b71fafb1bc1@frab.cccv.de DESCRIPTION:The Noise Protocol Framew ork is a toolkit for 2-party secure-channel protocols. Noise is use d by WhatsApp for client-server communication\, by the WireGuard VPN pro tocol\, and by the Lightning Network. In this talk I'll describe the ra tionale behind such a framework\, and how you can use it to build simple \, efficient\, and customized secure-channel protocols. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9222.htm l SUMMARY:The Noise Protocol Framework - Trevor Perrin LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T183000 DTSTAMP;VALUE=DATE-TIME:20171231T194537Z UID:2dd1ed02-2a4f-4c15-93e5-6d171fea74df@frab.cccv.de DESCRIPTION:The Snowden Refugees’ actions to protect the world’s most sig nificant whistle blower of the 21st Century\, amounts to an expression o f Political Opinion. Since September 2016\, the Snowden Refugees have be en systematically targeted and persecuted by the Hong Kong government ba sed on that political opinion. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9297.htm l SUMMARY:The Snowden Refugees under Surveillance in Hong Kong - Robert Tib bo\, Edward Snowden LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T233000 DTSTAMP;VALUE=DATE-TIME:20180101T043931Z UID:722ce759-9cde-4e3b-8db5-5a97aa9673d9@frab.cccv.de DESCRIPTION:The Apollo Guidance Computer ("AGC") was used onboard the Apo llo spacecraft to support the Apollo moon landings between 1969 and 1972 . This talk explains "everything about the AGC"\, including its quirky b ut clever hardware design\, its revolutionary OS\, and how its software allowed humans to reach and explore the moon. \n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9064.htm l SUMMARY:The Ultimate Apollo Guidance Computer Talk - Michael Steil\, Chri stian Hessmann LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T140000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T133000 DTSTAMP;VALUE=DATE-TIME:20171230T200329Z UID:c9ae7564-9156-4d31-9f8a-168793a1bb18@frab.cccv.de DESCRIPTION:My talk explores the interconnected nature of war and culture . It does so through the context of technology and political discourse i n contemporary art. With a view from the battle fields of the Middle Eas t\, both real and imagined\, I attempt to dissect how the political disc ourse of academia and the art world trickles down to everyday discussion s. A simple word such as "assassination" becomes rife with racism when i ts etymology can be linked to anti-Muslim propaganda that originated dur ing the Crusades. And today assassination is the primary political tool of the West to negotiate with Muslim radicals\, even violating their own rules of citizenship\, constitutional\, and human rights protections in the process. With this backdrop\, we see how the artistic works of such diverse artists such as Chris Marker\, Chris Burden\, Haroun Farouki\, Anish Kapoor\, and Banksy have evolved to reflect the political discours e of the moment. The digital advancements of the war zone\, I argue\, ar e reflected in the diametrically opposed peaceful spaces of the gallery\ , museum\, or art house cinema. As the digital defeats analogue\, the ac t of killing becomes disconnected from the killer\, with democracies spr eading thei blame over systemic failures rather than facing the reality of death. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9027.htm l SUMMARY:The Work of Art in the Age of Digital Assassination - Saud Al-Zai d LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T210000 DTSTAMP;VALUE=DATE-TIME:20171231T205618Z UID:77aaf0be-d2a8-4531-be02-c91c19b1ca77@frab.cccv.de DESCRIPTION:You are surrounded by ICs. Yet you probably don't know much a bout how such a chip is made. This talk is an introduction to the world of chip fabrication from photolithography over ion implantation to vapor deposition of the connections URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9250.htm l SUMMARY:The making of a chip - Ari LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T143000 DTSTAMP;VALUE=DATE-TIME:20171229T162252Z UID:3ab79865-b681-4d61-8ac5-6d8aa4678d08@frab.cccv.de DESCRIPTION:The ship „Iuventa“ of the organization „Jugend Rettet“ was se ized on August 2nd 2017 by the Italian authorities. The accusations: fac ilitating illegal immigration\, organized crime and possession of weapon s. What followed was a smear campaign that had seldomly been seen before . Against „Jugend Rettet“ and all the other NGOs that do search and resc ue (SAR) in the mediterranean sea. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8806.htm l SUMMARY:The seizure of the Iuventa - Hendrik\, Kathrin LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T134500 DTSTAMP;VALUE=DATE-TIME:20171230T191317Z UID:1d7b2355-60b1-453c-bf0e-64228466d2cc@frab.cccv.de DESCRIPTION:In German nursing science the dominant position on emergent t echnologies demands the removal of machines from caring environments („E ntmaschinisierung“). In contrast to this\, European research policy heav ily focus on developing new health and social technologies to solve soci etal issues like a skill shortage in nursing. Thinking about technology in nursing science cannot but be conflicted. In this talk we first expos e requirements for particularly conceptualizing the application of techn ological systems in care work settings. Further we will give an overview on main arguments against digital technologies in care with an example of a current research project in the field of Augmented Reality in care work. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8953.htm l SUMMARY:Think big or care for yourself - AKO\, Hanna Wüller LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T233000 DTSTAMP;VALUE=DATE-TIME:20171231T105156Z UID:39564fce-b35b-4f9e-a976-ef71c1fa21e8@frab.cccv.de DESCRIPTION:In November 2016 the UK has passed the Investigatory Powers A ct (aka Snooper’s Charter). This act unprecedentedly extends surveillanc e powers of the state – p.e. legalising the hacking of devices or forci ng Internet Service Providers to collect web browsing histories – one do es not even need to be suspected of a crime. This talk investigates the choice of words of the parliamentary debates and reveals how euphemistic and understating terminology discloses the extent of surveillance and j ustifies the causeless intrusion into everyone’s privacy. \n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9176.htm l SUMMARY:This is NOT a proposal about mass surveillance! - Lisa LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T210000 DTSTAMP;VALUE=DATE-TIME:20171231T232704Z UID:fa2a2506-f54d-4e3f-9fc2-e808d0a580b6@frab.cccv.de DESCRIPTION:Flüchtlingsfressende Tiger in Berlin\, zum Diktatorensturz au frufende Flugblätter in Istanbul und ein Mahnmal das den Rechtsextremist en Björn Höcker in seinem Thüringer Dorf heimsucht: Viel ist geschehen\, seit das Zentrum für Politische Schönheit vor 3 Jahren auf dem Kongress gesprochen hat. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8896.htm l SUMMARY:Tiger\, Drucker und ein Mahnmal - Stefan Pelzer\, Philipp Ruch\, Morius Enden LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T163000 DTSTAMP;VALUE=DATE-TIME:20171231T150518Z UID:51f1fe0d-19df-406d-a313-befeab6ac1bb@frab.cccv.de DESCRIPTION:How do Iranians experience the Internet? Various hurdles and risks exist for Iranians and including outside actors like American tech nology companies. This talk will assess the state of the Internet in Ira n\, discuss things like the threats of hacking from the Iranian cyber ar my\; how the government are arresting Iranians for their online activiti es\; the most recent policies and laws for censorship\, surveillance and encryption\; and the policies and relationships of foreign technology c ompanies like Apple\, Twitter and Telegram with Iran\, and the ways they are affecting the everyday lives of Iranians. This talk will effective ly map out how the Internet continues to be a tight and controlled space in Iran\, and what efforts are being done and can be done to make the I ranian Internet a more accessible and secure space. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8900.htm l SUMMARY:Tightening the Net in Iran - Mahsa Alimardani LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T163000 DTSTAMP;VALUE=DATE-TIME:20171208T013316Z UID:4042ac64-4a70-482f-a527-c5509f7694b9@frab.cccv.de DESCRIPTION:Hasan Elahi is an interdisciplinary artist working with issue s in surveillance\, privacy\, migration\, citizenship\, technology\, and the challenges of borders. An erroneous tip called into law enforcement authorities in 2002 subjected Elahi to an intensive investigation by th e FBI and after undergoing months of interrogations\, he was finally cle ared of suspicions. After this harrowing experience\, Elahi conceived “T racking Transience” and opened just about every aspect of his life to th e public. Predating the NSA’s PRISM surveillance program by half a decad e\, the project questions the consequences of living under constant surv eillance and continuously generates databases of imag- ery that tracks t he artist and his points of transit in real-time. Although initially cre ated for his FBI agent\, the public can also monitor the artist’s commun ication records\, banking transactions\, and transportation logs along w ith various intelligence and government agencies who have been confirmed visiting his website. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9281.htm l SUMMARY:Tracking Transience - Hasan Elahi LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T000000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T231500 DTSTAMP;VALUE=DATE-TIME:20180101T001517Z UID:c297bff4-55ca-473c-afef-0064970a47b2@frab.cccv.de DESCRIPTION:Alles was wir jeden Tag tun erzeugt Treibhausgase. Für eine v ernünftige/moralische/ökologische Entscheidung\, um mit anderen Handlung soptionen brauchbar vergleichen zu können\, muss man wissen - wieviel? U ngefähr zumindest? Für Einsteiger. Keine Formeln\, wenig Mathematik/Phys ik. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8741.htm l SUMMARY:Treibhausgasemissionen einschätzen - Gunnar Thöle LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T130000 DTSTAMP;VALUE=DATE-TIME:20171231T120154Z UID:fd734b31-4f79-4d1f-879f-3f7248c60dad@frab.cccv.de DESCRIPTION:This talk deals with embedded systems security and ARM proces sors architecture. Most of us know that we can perform security with the ARM TrustZone framework. I will show that most ARM processors include d ebug components (aka CoreSight components) that can be used to create ef ficient security mechanisms. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8831.htm l SUMMARY:TrustZone is not enough - Pascal Cotret LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T220000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T210000 DTSTAMP;VALUE=DATE-TIME:20180101T100204Z UID:21127aeb-fe1f-4506-a3f0-d747e20419a5@frab.cccv.de DESCRIPTION:Wie steht es um die Sicherheitsversprechen\, die mit dem Eins atz von neuen Überwachungsinstrumenten abgegeben werden?\nWelche Untermi nierung der Sicherheit kann durch Überwachung eigentlich entstehen? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9287.htm l SUMMARY:Trügerische Sicherheit - Peter Schaar LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T163000 DTSTAMP;VALUE=DATE-TIME:20180101T013520Z UID:51b646f8-7afc-46be-8f77-50f7787c1f5d@frab.cccv.de DESCRIPTION:Type confusion\, often combined with use-after-free\, is the main attack vector to compromise modern C++ software like browsers or vi rtual machines. Typecasting is a core principle that enables modularity in C++. For performance\, most typecasts are only checked statically\, i .e.\, the check only tests if a cast is allowed for the given type hiera rchy\, ignoring the actual runtime type of the object. Using an object o f an incompatible base type instead of a derived type results in type co nfusion. Attackers have been abusing such type confusion issues to compr omise popular software products including Adobe Flash\, PHP\, Google Chr ome\, or Firefox\, raising critical security concerns.\n\nWe discuss the details of this vulnerability type and how such vulnerabilities relate to memory corruption. Based on an LLVM-based sanitizer that we developed \, we will show how to discover such vulnerabilities in large software t hrough fuzzing and how to protect yourself against this class of bugs. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8848.htm l SUMMARY:Type confusion: discovery\, abuse\, and protection - gannimo LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T170000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T163000 DTSTAMP;VALUE=DATE-TIME:20171231T174910Z UID:541e74c5-6336-4892-90aa-ce84936b03ca@frab.cccv.de DESCRIPTION:During 2016 Libre Space Foundation a non-profit organization developing open source technologies for space\, designed\, built and del ivered UPSat\, the first open source software and hardware satellite. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9182.htm l SUMMARY:UPSat - the first open source satellite - Pierros Papadeas LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T151500 DTSTAMP;VALUE=DATE-TIME:20171230T205842Z UID:02489143-0b78-4302-9603-605d1c674fbb@frab.cccv.de DESCRIPTION:Over 11 million undocumented immigrants live in the United St ates today. Immediately after taking office\, the Trump administration i ssued two executive orders pumping resources into border and immigration enforcement agencies\, heightening fears of deportation\, harassment\, and family separation among immigrant communities. In the following mont hs reports emerged of increased immigration enforcement activity and hin ts about the deployment of new high-tech methods by the immigration enfo rcement agency. I will discuss the current state of immigration enforcem ent in the US and associated surveillance capabilities\, the results of a study with undocumented immigrants about their technology practices\, and the takeaways for the technology and privacy community in supporting communities of heightened risk. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9085.htm l SUMMARY:Uncertain Concern - Allison McDonald LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T140000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T133000 DTSTAMP;VALUE=DATE-TIME:20180101T134040Z UID:544e7736-6b59-4c05-87a7-c013ef993688@frab.cccv.de DESCRIPTION:The Joint Threat Research Intelligence Group (JTRIG)\, a unit in one of Britain’s intelligence agencies\, is tasked with creating soc kpuppet accounts and fake content on social media\, in order to use "dir ty tricks" to "destroy\, deny\, degrade [and] disrupt" enemies by "discr editing" them. In this talk\, we reveal some of that content\, in relati on to infiltrating activists groups around the world\, including during the Arab spring and Iranian revolution. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9233.htm l SUMMARY:Uncovering British spies’ web of sockpuppet social media personas - Mustafa Al-Bassam LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T233000 DTSTAMP;VALUE=DATE-TIME:20180101T091926Z UID:7f293cf6-6d19-43ed-8aa7-7371e008bd45@frab.cccv.de DESCRIPTION:Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance g ate operators\, door operators\, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often trivi al to break wireless access control systems\, the system should thus mak e it practically infeasible to clone a genuine transmitter so that attac kers can get unauthorized access. We used the low-cost CCC rad1o softwar e defined radio (SDR) platform to intercept and analyze the wireless rad io signal. We took apart several Hoermann BiSecur hand transmitters and subsequently utilized a vulnerability in the microcontroller to successf ully extract the firmware. In order to conduct a security audit\, the ex tracted firmware was disassembled and analyzed so that the encryption me chanism\, the key material\, the cryptographic operations as well as the RF interface could be reverse engineered. Our security analysis shows t hat the overall security design is sound\, but the manufacturer failed t o properly initialize the random seed of the transmitters. As a result\, an attacker can intercept an arbitrary radio frame and trivially comput e the utilized encryption key within less than a second. Once the key is known to the attacker\, a genuine transmitter can be cloned with an SDR platform such as the CCC rad1o. In addition to unauthorized operation o f gates and doors\, there is a likely (although currently untested) impa ct on Smart Home appliances that use the BiSecur system. We tested a tot al of 7 hand transmitters from 3 different model series and with manufac turing dates between 2015 and 2017. All analyzed hand transmitters share d the same static random seed and were found to be vulnerable to our att ack. The vulnerability can easily be fixed so that future hand transmitt ers and radio transmission are protected from our attack. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9029.htm l SUMMARY:Uncovering vulnerabilities in Hoermann BiSecur - Markus Muellner\ , Markus Kammerstetter LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T154500 DTSTAMP;VALUE=DATE-TIME:20180101T134857Z UID:51b586be-500c-436e-b70c-fc433e65c4be@frab.cccv.de DESCRIPTION:Did you ever want to run your own IoT cloud on your IoT devic es? Or did you ever wonder what data your vacuum cleaning robot is trans mitting to the vendor? Why a vacuum cleaning robot needs tcpdump?\nNowad ays IoT devices are getting more and more powerful and contain a lot of sensors. As most devices are connected directly to the vendor and transm it all data encrypted to the cloud\, this may result in privacy issues. An IoT device with no internet connection lacks numerous features or is even unusable. We want to change that.\n\nWe show you how to root a Xiao mi vacuum cleaning robot in order to get access to the underlying Linux operating system(Ubuntu 14.04 LTS)\, **without opening the device or tampering the warranty seals**. Furthermore\, we will have a look in to the vendors cloud interface and its commands\, and will show you how to de-attach the device from the cloud and connect it to your local Smar t Home system. Finally\, we will demonstrate how to run Smart Home softw are directly on the vacuum cleaning robot itself. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9147.htm l SUMMARY:Unleash your smart-home devices: Vacuum Cleaning Robot Hacking - Dennis Giese\, DanielAW LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T161500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T151500 DTSTAMP;VALUE=DATE-TIME:20171229T185731Z UID:68a0f7fd-fb06-4447-b6eb-da17b998d240@frab.cccv.de DESCRIPTION:Eliminating nuclear weapons will require trusted measurement systems to confirm authenticity of nuclear warheads prior to their disma ntlement. A new idea for such an inspection system is to use vintage har dware (Apple IIe/6502) instead of modern microprocessors\, reducing the attack surface through simplicity. In the talk\, we present and demo a c ustom open hardware measurement system based on gamma spectroscopy. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8994.htm l SUMMARY:Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons - Moritz\, ALX LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T120000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T113000 DTSTAMP;VALUE=DATE-TIME:20171211T214545Z UID:f6265504-14b2-41e6-a134-6fec8c00cee4@frab.cccv.de DESCRIPTION:This talk considers the visceral relationship one can have to wards intangible media\, notably sound and network data transmissions. S arah presents a selection of her work demonstrating these synesthetic re lationships\, ranging from experiments in bio and fiber arts to interfac e design and educational tools for demystifying computer networking tech nology. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9290.htm l SUMMARY:Visceral Systems - Sarah Grant LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T124500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T121500 DTSTAMP;VALUE=DATE-TIME:20171231T190051Z UID:e145a0be-1450-4e31-a493-4db81c970f08@frab.cccv.de DESCRIPTION:Vorstellung der Dissertation "WHWP - Walter Höllerer bei Wiki Pedia". Es wurde ein \neinzelner Artikel in der deutschen WikiPedia unte rsucht. Es wird dargestellt\, welchen \nEinfluss die beteiligten Autoren auf die Qualität des WikiPedia-Artikels über Walter \nHöllerer hatten u nd weiterhin haben. Dafür wurden 113 Veränderungen durch 89 Autoren \nei nzeln untersucht und bezüglich ihrer Relevanz bewertet. Es wurden auch \ ndie Entwicklungen berücksichtigt\, die seit der französischen Encyclopé die zur \nOnline-Enzyklopädie WikiPedia geführt haben. Daraus ist eine b isher einzigartige \nArbeit über die Produktion von Wissen und Wissenssa mmlungen entstanden. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9014.htm l SUMMARY:WHWP - friederb LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T144500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T141500 DTSTAMP;VALUE=DATE-TIME:20171229T195048Z UID:0ff9c9c4-a561-4ec0-afa2-93647a740f26@frab.cccv.de DESCRIPTION:France is part of the top countries trying to destroy encrypt ion\, especially through backdoor obligations\, global interceptions\, a nd effort to get access to master keys. French law already criminalises the use of encryption\, imposing heavier penalties on people using it or regarding them as general suspects.\nHow can we oppose this trend? What political role for developers? URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8919.htm l SUMMARY:WTFrance - Agnes\, Okhin LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T201500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T194500 DTSTAMP;VALUE=DATE-TIME:20171231T101915Z UID:a66fa9d5-b12c-4d6b-84f9-f279faf38f86@frab.cccv.de DESCRIPTION:For a few decades by now\, satellites offer us the tools to o bserve the whole Earth with a wide variety of sensors. The vast amount o f data these Earth observations systems collect enters the public discou rse reduced to a few numbers\, numbers like 3 or even 300. So\, how do w e know the amount of ice melting in the arctic or how much rain is falli ng in the Amazon? Are groundwater aquifers stable or are they are being depleted? Are these regular seasonal changes or is there a trend? How ca n we even measure these phenomena on a global scale?\n\nThis talk will p rovide one possible answer: gravity. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8964.htm l SUMMARY:Watching the changing Earth - manuel LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T134500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T124500 DTSTAMP;VALUE=DATE-TIME:20171231T103041Z UID:af131b56-3423-4f8a-87ff-79b9f21e0656@frab.cccv.de DESCRIPTION:Backing up private keys in a secure manner is not straightfor ward. Once a backup has been compromised you need to refresh all your ke y material.\nFor example\, the disclosure of a private key of a Bitcoin wallet gives access to the coins inside. This makes it unattractive to s tore a complete backup of\nyour private key(s) with your bank or your sp ouse. The better option would be to split the key into multiple parts. T he recommended way to do this securely is to use the Shamir secret shari ng scheme. This talk provides a detailed breakdown of how the scheme wor ks and explains how it is implemented in C in a new library called SSS. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8885.htm l SUMMARY:We should share our secrets - Daan Sprenkels LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171228T134500 DTSTAMP;VALUE=DATE-TIME:20171228T131529Z UID:3a957087-9ee2-47e8-b74a-d0a1a18d3673@frab.cccv.de DESCRIPTION:A talk on waiting for the technological rapture in the church of big data. The paralysing effect of hiding the human hand in software through anthropomorphising computers and dehumanising ourselves.\n URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9296.htm l SUMMARY:Why Do We Anthropomorphize Computers?... - Marloes de Valk LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T204500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T194500 DTSTAMP;VALUE=DATE-TIME:20171230T194515Z UID:dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7@frab.cccv.de DESCRIPTION:Die Geschichte des ZAMIR Transnational Network und meines Zag reb-Diary\n(http://www.wamkat.de/diaries1/zagreb-diary) zwischen 1991 un d 1995 im\nfrüheren Jugoslawien. Es war das erste Computernetzwerk in ei ner\nKriegsregion\, das alle Friedens-\, Frauen-\, Menschenrechts- und\n humanitäre Aktivisten und alle anderen Menschen in dem Kriegsgebiet\nmit einander und der Außenwelt verbunden hat. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8842.htm l SUMMARY:Zamir Transnational Network und Zagreb Dairy - Wam (P.J.H.F.) Kat LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T163000 DTSTAMP;VALUE=DATE-TIME:20171229T161938Z UID:0dbbb546-38e6-499f-bb93-a5539d114d1d@frab.cccv.de DESCRIPTION:Avatar² is an open source framework for dynamic instrumentati on and analysis of binary firmware\, which was released in June 2017.\nT his talk does not only introduce avatar²\, but also focuses on the motiv ation and challenges for such a tool. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9195.htm l SUMMARY:avatar² - nsr LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T173000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T163000 DTSTAMP;VALUE=DATE-TIME:20180101T001102Z UID:73bcc647-faa3-4c6c-8a48-8d540de454ee@frab.cccv.de DESCRIPTION:Bitcoin arrived eight years ago\, and has now spawned a dazzl ing array of follow-on technologies\, including smart contracts\, censor ship-resistant computation\, trustless databases (“blockchains”) and mor e. This talk attempts to highlight a few of the most significant develop ments in both technology and in society's response to it\, including som e nation-state governments banning cryptocurrencies and/or launching the ir own cryptocurrencies. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9240.htm l SUMMARY:cryptocurrencies\, smart contracts\, etc.: revolutionary tech? - Zooko LOCATION:Saal Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T134500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T124500 DTSTAMP;VALUE=DATE-TIME:20171231T205731Z UID:02146e03-1a07-44f2-83b3-e1fd261a4214@frab.cccv.de DESCRIPTION:How I hacked Sasmung eMMC chips: from an indication that they have a firmware - up until code execution ability on the chip itself\, relevant to a countless number of devices. It all started when Samsung G alaxy S3 devices started dying due to a bug in their eMMC firmware. I wi ll cover how I figured out there's a firmware inside the chip\, how I ob tained it\, and my journey to gaining code execution on the chip itself &mdash\; up until the point in which I could grab a bricked Galaxy S3\, and fix it by software-only means. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8784.htm l SUMMARY:eMMC hacking\, or: how I fixed long-dead Galaxy S3 phones - orana v LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T113000 DTSTAMP;VALUE=DATE-TIME:20180101T133736Z UID:9326038b-f781-4707-b35a-9ef52f98d35a@frab.cccv.de DESCRIPTION:Gesundheit als entscheidender Teil von Glück und Zufriedenhei t ist bis in ihre kleinsten Teilbereiche „durchkapitalisiert“. Und diese r Prozess macht auch vor humanitärer Hilfe und Krisenintervention nicht halt. In diesem Talk gehen wir auf verschiedene Beispiele ein und erklär en\, wie CADUS mit seinem Makerspace versucht\, dieses Problem auf viele n Ebenen zu hacken. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9188.htm l SUMMARY:hacking disaster - Sebastian Jünemann LOCATION:Saal Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T193000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171227T183000 DTSTAMP;VALUE=DATE-TIME:20171227T221219Z UID:55f921ed-ab90-4553-9903-8658557ac447@frab.cccv.de DESCRIPTION:This talk presents the technical details and the process of r everse engineering and re-implementation of the evasi0n7 jailbreak's mai n kernel exploit. This work was done in late 2013\, early 2014 (hence th e "archaeology" in the title)\, however\, it will provide insight into t he kernel debugging setup for iOS devices (iDevices)\, the encountered d ifficulties and how they were overcome\, all of which can be useful for current iOS kernel vulnerability research. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8720.htm l SUMMARY:iOS kernel exploitation archaeology - argp LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T134500 DTSTAMP;VALUE=DATE-TIME:20171231T021504Z UID:d8db120c-29f7-48f6-b9de-27ea8d1e9a9b@frab.cccv.de DESCRIPTION:The institutions of Resolution Disputes [iRD] call attention to media resolutions. While a ’resolution’ generally simply refers to a standard (measurement) embedded in the technological domain\, the iRD re flect on the fact that a resolution is indeed a settlement (solution)\, but at the same time a space of compromise between different actors (obj ects\, materialities and protocols) who dispute their stakes (framerate\ , number of pixels etc.) within the growing digital territories. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9286.htm l SUMMARY:institutions for Resolution Disputes - Rosa Menkman LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T120000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T113000 DTSTAMP;VALUE=DATE-TIME:20180101T013100Z UID:ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4@frab.cccv.de DESCRIPTION:Traditional models of application development involve talking to an underlying operating system through abstractions of its choosing. These abstractions may or may not be a good fit for your language or a pplication\, but you have no choice but to use them - you can only layer more abstractions on top of them\, to try to lessen the pain of a bad m atch. Library operating systems let you write applications that use bet ter abstractions in your own language - either someone else's abstractio ns\, or your own. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8949.htm l SUMMARY:library operating systems - Mindy Preston LOCATION:Saal Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T133000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171230T130000 DTSTAMP;VALUE=DATE-TIME:20171230T091945Z UID:264c9958-ba75-487e-b23f-703e837336de@frab.cccv.de DESCRIPTION:How does developing future processors with yesterdays capabil ities work out today? CPU development is something out of focus these da ys. In this lecture I would like to show the state-of-the-art processor development flow of POWER processors from the first initial ideas to pos t-silicon testing. Apart from x86 Intel products there have been initiat ives across the hardware industry to form some alternative business mode l. I would like to show if and how this compares to real open principals . URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9202.htm l SUMMARY:openPower - the current state of commercial openness in CPU devel opment - Matteo Michel LOCATION:Saal Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T141500 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20171229T134500 DTSTAMP;VALUE=DATE-TIME:20171230T224126Z UID:0b0a3457-91be-43ea-af21-8e251d8d9322@frab.cccv.de DESCRIPTION:Project “Nabovarme” (meaning “neighbour heating”) has transfo rmed private heating necessity into a social experiment build on OpenSou rce software/hardware and social empowerment by transforming heat consum ers into Nabovarme Users and letting them take ownership to infrastructu re and consumption. URL:https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8989.htm l SUMMARY:“Nabovarme” opensource heating infrastructure in Christiania - Jo hannes Valbjorn\, Emmerik LOCATION:Saal Borg END:VEVENT END:VCALENDAR