Version Voltron
Events by track
CCC
title | track | speakers | |
---|---|---|---|
35C3 Infrastructure Review
35C3 is run by teams of volunteers. In this event, they will provide some... |
CCC | ||
All Creatures Welcome
"All Creatures Welcome sketches a utopian image of society in the digital... |
CCC | ||
Closing Event
Hier hört es auf. |
CCC | ||
Jahresrückblick des CCC 2018
Biometrische Videoüberwachung, Hausdurchsuchungen, Polizeiaufgabengesetze,... |
CCC | ||
Kickstart the Chaos: Hackerspace gründen für Anfänger
Laut Mythos wurde der CCC nur zu einem Verein, weil als einzige andere... |
CCC | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Opening Event
Hier geht es los. |
CCC | ||
Security Nightmares 0x13
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
CCC | ||
Stalking, Spy Apps, Doxing: Digitale Gewalt gegen Frauen
Digitale Formen von Gewalt gegen Frauen sind keine eigenständigen Phänomene,... |
CCC | ||
Verhalten bei Hausdurchsuchungen
Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner... |
CCC |
Science
title | track | speakers | |
---|---|---|---|
A Blockchain Picture Book
Where is the blockchain, how long is it, and what does it have to do with... |
Science | ||
Augmented Reality: Bridging the gap between the physical and the digital world
There has been a lot of talk about Virtual Reality (VR), but still there are... |
Science | ||
Conquering Large Numbers at the LHC
We are going to outline the ingredients necessary to perform measurements at... |
Science | ||
Die dreckige Empirie
Kann man empirischen Studien trauen oder nicht? Wie kann ich gute Studien von... |
Science | ||
Die verborgene Seite des Mobilfunks
Der Vortrag beleuchtet die Einflüsse auf den geheimnisvollen Teil des... |
Science | ||
Genom-Editierung mit CRISPR/Cas
CRISPR/Cas hat die Genforschung revolutioniert und könnte bald in großem Stil... |
Science | ||
Going Deep Underground to Watch the Stars
Neutrinos are “ghost-like” elementary particles that can literally go through... |
Science | ||
Hacking Ecology
As humans have a large negative impact on ecosystems all around the globe, we... |
Science | ||
Hacking how we see
We mostly see with the mind, and the mind is flexible. For the four hundred... |
Science | ||
Hacking the Human Microbiome
The human microbiome is a diverse community of bacteria that lives inside us.... |
Science | ||
How medicine discovered sex
Men with osteoporosis or depression, women with heart attacks - these are... |
Science | ||
Information Biology - Investigating the information flow in living systems
How to apply Shannon's information theory to biology. |
Science | ||
Inside the Fake Science Factories
This talk investigates fake science factories; international twilight... |
Science | ||
Introduction to Deep Learning
This talk will teach you the fundamentals of machine learning and give you a... |
Science | ||
Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis
Vor 5.7 Milliarden Jahren emittierte der Blazar TXS0506+056 eine große Menge... |
Science | ||
Let's reverse engineer the Universe
There is four times more dark matter and over fifteen times more dark energy... |
Science | ||
Quantum Mechanics
An (almost) self-contained introduction to the basic ideas of quantum... |
Science | ||
Simulating Universes
In this talk I want to present the computational undertakings in the field of... |
Science | ||
Space Ops 101
After launching a spacecraft into orbit the actual work for mission control... |
Science | ||
SuperMUC-NG
Der nationale Höchstleistungsrechner SuperMUC-NG unterstützt die öffentliche... |
Science | ||
Transmission Control Protocol
TCP/IP is the most widely used protocol on the Internet for transmitting... |
Science |
Security
title | track | speakers | |
---|---|---|---|
A Christmas Carol - The Spectres of the Past, Present, and Future
With the beginning of last year, two major security vulnerabilities have been... |
Security | ||
A deep dive into the world of DOS viruses
It is now 27 years since MS-DOS 5.0 was released. During its day there was... |
Security | ||
All Your Gesundheitsakten Are Belong To Us
Plötzlich geht alles ganz schnell: Online-Behandlungen und elektronische... |
Security | ||
Attacking Chrome IPC
In this talk, I discuss how to reliably find bugs in the Chrome IPC system... |
Security | ||
Attacking end-to-end email encryption
In this talk, I’ll present several attacks that leak the plaintext of OpenPGP... |
Security | ||
Circumventing video identification using augmented reality
Video identification is the process of establishing the identity of a person... |
Security | ||
Compromising online accounts by cracking voicemail systems
Voicemail systems can be compromised by leveraging old weaknesses and top of... |
Security | ||
Dissecting Broadcom Bluetooth
Broadcom's Bluetooth firmware on popular devices – such as Nexus 5, Nexus 6P,... |
Security | ||
Domain Name System
Whenever you enter a name into your computer, it resolves it to a numerical... |
Security | ||
Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
Schon Wladimir Wladimirowitsch Putin wusste: "Hacker, das sind freie... |
Security | ||
Enclosure-PUF
We are presenting an innovative technology, which allows verifying the... |
Security | ||
Exploring fraud in telephony networks
Telephone networks form the oldest large scale network that has grown... |
Security | ||
First Sednit UEFI Rootkit Unveiled
UEFI rootkits have been researched and discussed heavily in the past few... |
Security | ||
From Zero to Zero Day
In this talk I will share my story of how in a little over a year, a high... |
Security | ||
Inside the AMD Microcode ROM
Microcode runs in most modern CPUs and translates the outer instruction set... |
Security | ||
In Soviet Russia Smart Card Hacks You
The classic spy movie hacking sequence: The spy inserts a magic smart card... |
Security | ||
Internet of Dongs
With great pleasure comes great responsibility. A responsibility, which is... |
Security | ||
Jailbreaking iOS
This talk aims to give a general overview of iOS Jailbreaking by starting at... |
Security | ||
Kernel Tracing With eBPF
Have you ever wanted to trace all syscalls or dump all IPC traffic across a... |
Security | ||
Memsad
This presentation will start off with a simple problem (how do you clear... |
Security | ||
Modchips of the State
Hardware implants and supply chain attacks have been in the news recently,... |
Security | ||
Modern Windows Userspace Exploitation
In this talk we will go through the different mitigations in Windows 10 and... |
Security | ||
Provable Security
Modern cryptography is based on security-proofs. We will demonstrate how... |
Security | ||
SD-WAN a New Hop
The software defined wide-area network is technology based on SDN approach... |
Security | ||
Self-encrypting deception
<p>We have analyzed the hardware full-disk encryption implementation of... |
Security | ||
SiliVaccine: North Korea's Weapon of Mass Detection
Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine is... |
Security | ||
Smart Home - Smart Hack
GERMAN: Mehr als 10.000 unterschiedliche Device-Hersteller aus aller Welt... |
Security | ||
Sneaking In Network Security
Highly compartmentalized network segmentation is a long-held goal of most... |
Security | ||
The Layman's Guide to Zero-Day Engineering
There's a certain allure to zero-day exploits. At the apex of the security... |
Security | ||
The Rocky Road to TLS 1.3 and better Internet Encryption
Since a few months we have a new version of TLS, the most important... |
Security | ||
The year in post-quantum crypto
The world is finally catching on to the urgency of deploying... |
Security | ||
Truly cardless: Jackpotting an ATM using auxiliary devices.
Pursuit of “good customers’ experience“ not only leads to new customers, but... |
Security | ||
Venenerkennung hacken
Die Venenerkennung ist eine der letzten Bastionen biometrischer Systeme, die... |
Security | ||
Viva la Vita Vida
Since its release in 2012, the PlayStation Vita has remained one of the most... |
Security | ||
wallet.fail
In this presentation we will take a look at how to break the most popular... |
Security | ||
Wallet Security
There are multiple different ways to store cryptocurrency secret keys. This... |
Security | ||
Web-based Cryptojacking in the Wild
A cryptojacking website abuses the computing resources of its visitors to... |
Security | ||
What The Fax?!
We all know what FAX is, and for some strange reason most of us need to use... |
Security | ||
What the flag is CTF?
Every year since 2011 on the 28C3 we organize a Capture the Flag contest for... |
Security |
Resilience
title | track | speakers | |
---|---|---|---|
A farewell to soul-crushing code
A major part of software development is maintenance, i.e. tinkering with... |
Resilience | ||
Analyze the Facebook algorithm and reclaim data sovereignty
Facebook monopoly is an issue, but looking for replacements it is not enough.... |
Resilience | ||
Cat & Mouse: Evading the Censors in 2018
The deepening of global Internet infrastructure comes accompanied with an... |
Resilience | ||
Censored Planet: a Global Censorship Observatory
Six years ago the idea behind CensoredPlanet started, that is now launched at... |
Resilience | ||
How does the Internet work?
This Foundations talk explains the systems and protocols that make up the... |
Resilience | ||
Matrix, the current status and year to date
Matrix is an open standard for communication over the Internet. I will talk... |
Resilience | ||
No evidence of communication and morality in protocols: Off-the-Record protocol version 4
OTRv4 is the newest version of the Off-The-Record protocol. It is a protocol... |
Resilience | ||
Planes and Ships and Saving Lives
The death rate at Europes seaborder reached a historical record: One out of... |
Resilience | ||
Remo2hbo -Robustes und reparierbares Vitalparametermonitoring
Moderne Medizintechnik ist teuer und wenn sie kaputt geht, dann kann man sie... |
Resilience | ||
Repair-Cafés
Die Repaircafé-Bewegung rollt über unser Land herein. Wie können wir uns... |
Resilience | ||
Safe and Secure Drivers in High-Level Languages
Drivers are usually written in C for historical reasons, this can be bad if... |
Resilience | ||
Scuttlebutt
In this talk @zelf invites to the world of Scuttlebutt, the decentralized P2P... |
Resilience | ||
Sense without sight: a crash course on #BlindNavigation
Learn to see the world without your eyes. Wonder what it's like to navigate... |
Resilience | ||
Taming the Chaos: Can we build systems that actually work?
We rely on mainstream computer engineering every day, but it's insanely... |
Resilience | ||
The foodsaving grassroots movement
When you're fighting for a cause, you need tools that reflect your values.... |
Resilience | ||
Wind: Off-Grid Services for Everyday People
The internet has become essential services, and offline methods of sharing... |
Resilience |
Ethics, Society & Politics
title | track | speakers | |
---|---|---|---|
#afdwegbassen: Protest, (Club-)Kultur und antifaschistischer Widerstand
Im Mai 2018 initiierte Reclaim Club Culture (RCC) in Berlin einen Protest... |
Ethics, Society & Politics | ||
Archäologische Studien im Datenmüll
Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten... |
Ethics, Society & Politics | ||
A Routing Interregnum: Internet infrastructure transition in Crimea after Russian annexation
This lecture tells the story of Internet infrastructure transformations in... |
Ethics, Society & Politics | ||
Best of Informationsfreiheit
Mit (u. a.): Rainer Rehak, Anna Biselli, Andre Meister, ... Was für die... |
Ethics, Society & Politics | ||
Chaos im Fernsehrat
Seit Juli 2016 darf ich – nominiert unter anderem vom CCC – den Bereich... |
Ethics, Society & Politics | ||
Citzens or subjects? The battle to control our bodies, speech and communications
Technology is the solution: What is the problem? This seems to be the motto.... |
Ethics, Society & Politics | ||
Computer, die über Asyl (mit)entscheiden
Welchen Dialekt spricht eine Geflüchtete aus Syrien? Was verrät das Handy... |
Ethics, Society & Politics | ||
Court in the Akten
Private Unternehmen müssen nicht so transparent sein wie Behörden - selbst... |
Ethics, Society & Politics | ||
(Cyber-)Stalking: Wenn Grenzen verschwimmen
<p>Von unerwünschten Nachrichten über Bedrohungen bis hin zum Intimizid.... |
Ethics, Society & Politics | ||
"Das ist mir nicht erinnerlich." − Der NSU-Komplex heute
Sieben Jahre lang musste den Behörden jedes Stück der versprochenen... |
Ethics, Society & Politics | ||
Datenschutz für Neulandbürger
Der Datenschutz ist als erst relativ frisch erkämpftes Abwehrrecht von... |
Ethics, Society & Politics | ||
Desinformation und Fake News - Bekämpfung und Verifizierung leicht gemacht
Für Journalisten bieten soziale Netzwerke eine Vielzahl von Quellen und... |
Ethics, Society & Politics | ||
Die EU und ihre Institutionen
Ein kurzer Grundlagenabriss über die Institution der Europäischen Union,... |
Ethics, Society & Politics | ||
Die Häuser denen, die darin wohnen!
Wir wenden uns gegen Gentrifizierung, Luxussanierung und Spekulation mit... |
Ethics, Society & Politics | ||
Election Cybersecurity Progress Report
Recent attacks against elections in the U.S. and Europe demonstrate that... |
Ethics, Society & Politics | ||
Electronic Evicence in Criminal Matters
The lecture will give an introduction into the "EC Proposal for a Regulation... |
Ethics, Society & Politics | ||
Explaining Online US Political Advertising
Over the summer Facebook, Google, and Twitter have started making transparent... |
Ethics, Society & Politics | ||
Feminist Perspectives
A variety of initiatives aims at encouraging female engagement in the hacker... |
Ethics, Society & Politics | ||
Freedom needs fighters!
Der Talk gibt einen Überblick über die Arbeit der Gesellschaft für... |
Ethics, Society & Politics | ||
Frontex: Der europäische Grenzgeheimdienst
Die EU-Grenzagentur Frontex nimmt eine Reihe neuer Überwachungsmethoden im... |
Ethics, Society & Politics | ||
Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
Polizei und Geheimdienste sammeln per "Funkzellenabfrage" Tag für Tag... |
Ethics, Society & Politics | ||
G10, BND-Gesetz und der effektive Schutz vor Grundrechten
Der Vortrag behandelt die Klage des Internetknotens DE-CIX gegen die... |
Ethics, Society & Politics | ||
Hackerethik - eine Einführung
Die Hackerethik ist die Grundlage für den Umgang mit den diversen ethischen... |
Ethics, Society & Politics | ||
How Facebook tracks you on Android
<p>In this talk, we’re looking at third party tracking on Android. We’ve... |
Ethics, Society & Politics | ||
Internet, the Business Side
Net neutrality, a big buzzword in the last years. It is not only a buzzword?... |
Ethics, Society & Politics | ||
It Always Feels Like the Five Eyes Are Watching You
This talk will discuss all about the Five Eyes, the espionage alliance... |
Ethics, Society & Politics | ||
Locked up science
Restricting access to knowledge and science is not beneficial for society. So... |
Ethics, Society & Politics | ||
Mehr schlecht als Recht: Grauzone Sicherheitsforschung
Reverse Engineering zum Aufspüren von Schwachstellen ist gängige Praxis. Umso... |
Ethics, Society & Politics | ||
Meine Abenteuer im EU-Parlament
Bei der Europawahl 2014 wurde ich als Spitzenkandidat der Partei für Arbeit,... |
Ethics, Society & Politics | ||
Microtargeting und Manipulation
Die Möglichkeiten des Microtargetings, aber auch der Desinformation mit Hilfe... |
Ethics, Society & Politics | ||
Mind the Trap: Die Netzpolitik der AfD im Bundestag
Die AfD-Bundestagsfraktion wird in der Öffentlichkeit vor allem mit ihren... |
Ethics, Society & Politics | ||
Netzpolitischer Wetterbericht 2018
Das Jahr 2018 bietete wieder zahlreiche Beispiele für einen netzpolitischen... |
Ethics, Society & Politics | ||
Polizeigesetze
Heimatminister Horst Seehofer und seine Amtskollegen in den Ländern erweitern... |
Ethics, Society & Politics | ||
Russia vs. Telegram: technical notes on the battle
It's time to highlight facts and epic fails that were observed on the wire... |
Ethics, Society & Politics | ||
Schweiz: Netzpolitik zwischen Bodensee und Matterhorn
Datenreichtum, E-Voting, Massenüberwachung und andere netzpolitische... |
Ethics, Society & Politics | ||
Österreich: Überwachungsstaat oder doch nur Digitalisierung für Anfänger?
In Österreich regiert seit einem Jahr eine Koalition aus der... |
Ethics, Society & Politics | ||
The Precariat: A Disruptive Class for Disruptive Times.
The combination of the ongoing technological revolution, globalisation and... |
Ethics, Society & Politics | ||
"The" Social Credit System
The Chinese Social Credit System (SCS) has been discussed a lot in Western... |
Ethics, Society & Politics | ||
The Surveillance State limited by acts of courage and conscience
An update on the circumstances of the Snowden Refugees will be provided at... |
Ethics, Society & Politics | ||
Updates von der europäischen Außengrenze
Als Organisation für Menschenrechtsbeobachtungen geben wir Euch einen... |
Ethics, Society & Politics | ||
Was schützt eigentlich der Datenschutz?
Beim Datenschutz geht es mitnichten um Privatsphäre, um das eigene... |
Ethics, Society & Politics | ||
What is Good Technology?
The last years, we all have felt the impact of applying technologies like... |
Ethics, Society & Politics |
Art & Culture
title | track | speakers | |
---|---|---|---|
Afroroutes: Africa Elsewhere
Let's think "Beyond Slavery": Afroroutes is a one-of-a-kind VR experience... |
Art & Culture | ||
A la recherche de l'information perdue
Performance lecture by Cornelia Sollfrank that makes a (techno-)feminist... |
Art & Culture | ||
Are machines feminine?
Why do navigation systems have feminine voices? We know Tay, Eliza, Siri not... |
Art & Culture | ||
A WebPage in Three Acts
A Web Page in Three Acts is a live coding performance which combines... |
Art & Culture | ||
C2X: The television will not be revolutionized.
From Cyberfeminism to XenoFeminism - a short history of radical... |
Art & Culture | ||
DISNOVATION.ORG
Through the hacking of surveillance techniques, machine learning, and... |
Art & Culture | ||
Media Disruption Led By The Blind
Visual culture dominates our societies, every day encouraging and rewarding... |
Art & Culture | ||
Mondnacht
"Mondnacht" von Stanislav Lem. Das berühmte SF Rundfunk-Hörspiel als Lesung... |
Art & Culture | ||
Never Forgetti
|
Art & Culture | ||
Radical Digital Painting
Radical Digital Painting groups and presents several ideas and artifacts... |
Art & Culture | ||
Reality Check! Basel/Lagos?? In virtual reality?
This talk will share the experience of a leading African extended reality lab... |
Art & Culture | ||
Tactical Embodiment
During her talk “Tactical Embodiment,” artist and activist Angela Washko will... |
Art & Culture | ||
Theater und Quantenzeitalter
Seit 2010 ist die Sehnsucht des Schauspiel Dortmund, ein gegenwärtiges und... |
Art & Culture | ||
The Enemy
The Enemy brings you face-to-face with combatants from three conflict zones:... |
Art & Culture | ||
The Ghost in the Machine
Artificial Intelligence gives us a uniquely fascinating and clear perspective... |
Art & Culture | ||
The good, the strange and the ugly in 2018 art &tech
What's been good, exciting, spooky and challenging in art and... |
Art & Culture | ||
The Urban Organism
This talk will engage the practises and protocols of hacking in the context... |
Art & Culture | ||
Transhuman Expression
The meeting point of art and science as a place of inspiration, exchange of... |
Art & Culture |
Hardware & Making
title | track | speakers | |
---|---|---|---|
Artistic PCB Design and Fabrication
When a electrical device needs to be a piece of art or used as a mechanical... |
Hardware & Making | ||
Butterbrotdosen-Smartphone
Ich möchte euch zeigen, wie ich mir aus einem Raspberry PI ein Smartphone... |
Hardware & Making | ||
Digital Airwaves
Encoding or decoding random radio-waveforms doesn't need incredible expensive... |
Hardware & Making | ||
How to teach programming to your loved ones
Teaching beginners how to program is often <i>hard</i>. We love building... |
Hardware & Making | ||
Hunting the Sigfox: Wireless IoT Network Security
<a href="https://www.sigfox.com/">Sigfox</a> is an emerging low-power... |
Hardware & Making | ||
LibreSilicon
While a lot of projects are currently developing their own processors, mostly... |
Hardware & Making | ||
MicroPython – Python for Microcontrollers
MicroPython is a lean and efficient implementation of the Python 3... |
Hardware & Making | ||
Modeling and Simulation of Physical Systems for Hobbyists
This is a foundations talk about modeling and simulation as tools for... |
Hardware & Making | ||
Open Source Firmware
Open Source firmware ist ein Begriff seit 1999 wo LinuxBIOS (coreboot) und... |
Hardware & Making | ||
Open Source Orgelbau
Spaß und ein kleines Bisschen Wissenschaft mit 3D-gedruckten Orgelteilen |
Hardware & Making | ||
Projekt Hannah
Um das Entwickeln von eigenen Laufrobotern zu erleichtern, brauchen wir... |
Hardware & Making | ||
Snakes and Rabbits - How CCC shaped an open hardware success
<p> This talk will present a historical narrative of the background behind... |
Hardware & Making | ||
SymbiFlow - Finally the GCC of FPGAs!
The <a href="http://symbiflow.github.io">SymbiFlow project</a> aims to be the... |
Hardware & Making | ||
The Critical Making Movement
Critical Thinking + Making = Critical Making. Around the world, academics and... |
Hardware & Making | ||
The Mars Rover On-board Computer
Mars Rover Curiosity is one of the most sophisticated pieces of hardware ever... |
Hardware & Making | ||
The nextpnr FOSS FPGA place-and-route tool
Project IceStorm provides the first end-to-end open source FPGA toolchain,... |
Hardware & Making |
Entertainment
title | track | speakers | |
---|---|---|---|
Chaos Communication Slam
Chaos meets Poetry Slam. Der humoristische Dichterwettstreit mit... |
Entertainment | ||
Freude ist nur ein Mangel an Information
Nico Semsrott hat in Zeiten des globalen Rechtsrucks den überflüssigsten Job... |
Entertainment | ||
Hebocon
We let the technically ungifted build robots and to fight each other for the... |
Entertainment |