BEGIN:VCALENDAR PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN CALSCALE:GREGORIAN VERSION:2.0 BEGIN:VTIMEZONE TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin BEGIN:STANDARD DTSTART:20181028T030000 RDATE:20181028T030000 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 TZNAME:CET END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T113000 DTSTAMP;VALUE=DATE-TIME:20190103T173342Z UID:a13bb3ac-fde1-4b82-833e-1fcf1f8f25dd@frab.cccv.de DESCRIPTION:From Cyberfeminism to XenoFeminism - a short history of radic al appropriations of media. This discussion will question how media is m ade (for whom and for what) and how meaning is produced through differen t contexts. it will feature media hacks and productions spanning a centu ry and three continents. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10026.ht ml SUMMARY: C2X: The television will not be revolutionized. - Rama Thiaw\, d ia LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T183000 DTSTAMP;VALUE=DATE-TIME:20190108T232444Z UID:809b164e-a331-4005-a1d8-ebe55d61d64c@frab.cccv.de DESCRIPTION:A variety of initiatives aims at encouraging female engagemen t in the hacker and maker scene. We present there some promising approac hes and key learnings in a joint panel discussion. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10028.ht ml SUMMARY: Feminist Perspectives - Geraldine de Bastion\, Em O'Sullivan\, L ena Mohr\, Hong Phuc Dang\, Le RESET\, feminist hackerspace LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T185000 DTSTAMP;VALUE=DATE-TIME:20190113T135953Z UID:a12d17e9-3758-4fa0-b612-0c6ba22ea773@frab.cccv.de DESCRIPTION:Sieben Jahre lang musste den Behörden jedes Stück der verspro chenen Aufklärung des NSU-Komplexes abgerungen werden. Das Urteil im ers ten NSU-Prozess zeigt: Deutschland ist nur sehr eingeschränkt bereit\, r echtem Terror entgegenzutreten und ihn aufzuarbeiten\, den Betroffenen\, Geschädigten und Überlebenden zuzuhören und ihnen Schutz zu garantieren . Das zu leisten ist unsere Aufgabe: die Aufgabe der Gesellschaft\, die Aufgabe einer antifaschistischen und antirassistischen Linken. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9766.htm l SUMMARY:"Das ist mir nicht erinnerlich." − Der NSU-Komplex heute - Caro K eller (NSU-Watch) LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T125000 DTSTAMP;VALUE=DATE-TIME:20190120T140438Z UID:d995955c-319f-4228-b3f4-080868bbfdf8@frab.cccv.de DESCRIPTION:The Chinese Social Credit System (SCS) has been discussed a l ot in Western media. However\, we do not know currently how the system t hat is supposed to take nationwide effect by 2020 will look like\, as th ere are more than 70 pilot projects currently undertaken. These pilots r ank from commercial royalty and rewards programs (Sesame Credit) to an O rwellian system\, where each action has a predetermined associated score (Rongcheng). In-between\, there’s nebulous algorithmic systems that bas ically act as a Black Box (Honesty Shanghai). This talk\, therefore\, lo oks at some of these pilots and their implementation details\, and throu gh an agent-based modeling framework\, discusses the likely effects of d ifferent implementations. In doing so\, it shows that most of the system s currently being tested are prone to manipulation by leaders from all l evels of government\, and that the ostensible goal of allocating scarce resources more efficiently is unlikely to be served by the new system(s) . URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9904.htm l SUMMARY:"The" Social Credit System - Toni LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T233000 DTSTAMP;VALUE=DATE-TIME:20190103T224142Z UID:fb15f53a-ca5b-4c29-b901-89398e9aab72@frab.cccv.de DESCRIPTION:Im Mai 2018 initiierte Reclaim Club Culture (RCC) in Berlin e inen Protest gegen einen Aufmarsch der AfD und die AFDsierung der Gesell schaft. Zusammen mit mehr als 170 Techno Clubs\, Festivals und Veranstal ter*innen organisierten wir innerhalb von zwei Wochen drei Demozüge\, au f denen sich mehr als 60.000 Demonstrant*innen versammelten. Dies ereign ete sich in einem politischen Klima\, in dem die Linke von den Erfolgen der Faschist*innen wie gelähmt schien und ein großer Teil der Gesellscha ft immer weiter nach rechts abdriftete. Ausgehend von einer selbstkritis chen Praxis werden wir der Frage nachgehen\, wie und warum dies (scheinb ar) plötzlich gelang. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9943.htm l SUMMARY:#afdwegbassen: Protest\, (Club-)Kultur und antifaschistischer Wid erstand - Reclaim Club Culture\, Rosa Rave\, Rosa Rave* LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T165000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T161000 DTSTAMP;VALUE=DATE-TIME:20190105T234623Z UID:4db8970f-bbfe-4541-90a8-31a05d599ffb@frab.cccv.de DESCRIPTION:
Von unerwünschten Nachrichten über Bedrohungen bis hin zum Intimizid. Allein im Jahr 2017 wurden rund 18.483 Fälle von Stalking po lizeilich erfasst\, die Dunkelziffer wird auf 600.000-800.000 Betroffene geschätzt. Unter dem Begriff Stalking wird allgemein das „wiederholte\, widerrechtliche Verfolgen und Belästigen eines Menschen\, so dass desse n Sicherheit bedroht und er/sie in seiner/ihrer Lebensgestaltung schwerw iegend beeinträchtig wird“ verstanden. Die Ausführungsformen und Intensi tät des Stalkings oder Cyberstalkings sind sehr heterogen\, sodass sich oft die Frage nach der Grenze zur Strafbarkeit stellt.<\\p> URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10027.ht ml SUMMARY:(Cyber-)Stalking: Wenn Grenzen verschwimmen - Jan Kalbitzer\, Kor ina Winter LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T161000 DTSTAMP;VALUE=DATE-TIME:20190105T220634Z UID:9e340a17-98f7-4ac2-8fd4-2f195c60c212@frab.cccv.de DESCRIPTION:35C3 is run by teams of volunteers. In this event\, they will provide some insight into the challenges they faced while building the GSM\, DECT and IP networks\, running video streams\, or organizing ticke t sales. All graphs will be pointing up and to the right. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9576.htm l SUMMARY:35C3 Infrastructure Review - Leon\, Kévin Redon LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T191000 DTSTAMP;VALUE=DATE-TIME:20190105T223223Z UID:07f5d97a-161c-4435-abad-6ef08107df15@frab.cccv.de DESCRIPTION:Where is the blockchain\, how long is it\, and what does it h ave to do with cryptography? And is it really something completely new? I spent a lot of time in pubs explaining to people what this blockchain hype is all about. It turns out that the best way to do that is to use i mages - literally.\nThe idea behind this talk is to give you a rough und erstanding of the scientific background behind the Blockchain technolog y. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9573.htm l SUMMARY:A Blockchain Picture Book - Alex Dirksen LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T205000 DTSTAMP;VALUE=DATE-TIME:20190111T223609Z UID:feb18113-3325-4053-93a0-76d4980b137c@frab.cccv.de DESCRIPTION:With the beginning of last year\, two major security vulnerab ilities have been disclosed: Meltdown and Spectre. While mitigations in software and hardware have been rolled out right away\, new variants hav e been continuously released in the following months. With all those con fusing names\, how can you possibly still have a clear overview of all t hose vulnerabilities (SpectreV1\, SpectreV2\, Meltdown\, Spectre-NG\, Sp ectreRSB\, L1TF\, Foreshadow\, ...)? With this talk\, we present a novel classification that will ease the naming complexity of the current jung le of variants. Along with all different attacks\, we will give an overv iew of all proposed mitigations and show how an attacker still can mount an attack despite the presence of implemented countermeasures. Furtherm ore\, we will present new variants of the Meltdown attack\, exploiting d ifferent parts of the CPU. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9893.htm l SUMMARY:A Christmas Carol - The Spectres of the Past\, Present\, and Futu re - Moritz Lipp\, Michael Schwarz\, Daniel Gruss\, Claudio Canella LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T191000 DTSTAMP;VALUE=DATE-TIME:20190108T105120Z UID:d7aa8828-4e06-4029-b962-1009815efa58@frab.cccv.de DESCRIPTION:This lecture tells the story of Internet infrastructure trans formations in Crimea\, the peninsula disputed between Russia and Ukraine between 2014 and 2018. It is based on an extensive year-long study invo lving network measurements and interviews with key players. Crimea has b ecome a "laboratory" where we can observe\, in just 4 years\, a rapid an d profound transition of infrastructure\, that deeply impacted the Inter net Service Provider market\, routing trajectories\, Internet censorship practices in the region. Annexation has transformed the way Crimea is p lugged to the "outer world" - in terms of peering and transit relations between various autonomous systems\, creating a much more centralized in frastructure and monopolized market. This\, in its turn\, had an importa nt impact for Crimean end-users - in terms of quality\, speed\, price of Internet service\, as well as in terms of Internet censorship and vario us traffic anomalies that they experience. Moreover\, server-side geoblo cking by online payment platforms\, Google Play\, Apple and other import ant services\, is imposed on Crimean users\, because of international sa nctions that have a controversial impact\, including a risk of overblock ing\, further isolation of Crimean civil society and reinforcing a more general trend towards "balkanization" of the Internet(s). [1] URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9864.htm l SUMMARY:A Routing Interregnum: Internet infrastructure transition in Crim ea after Russian annexation - Xenia LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T205000 DTSTAMP;VALUE=DATE-TIME:20190105T224854Z UID:0a4a43e0-2b8d-424c-aaa3-101c843de75c@frab.cccv.de DESCRIPTION:A Web Page in Three Acts is a live coding performance which c ombines principles of choreography within the formal structures of codin g. An assemblage of semi-improvised visuals and composition experiments in web environments. The screen becomes an open stage for the hybrid cod e which links choreography and web programming as well as body and langu age. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9598.htm l SUMMARY:A WebPage in Three Acts - Joana Chicau LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T233000 DTSTAMP;VALUE=DATE-TIME:20190104T125133Z UID:2375222b-7dae-4bca-a5b0-aea227ab0d76@frab.cccv.de DESCRIPTION:It is now 27 years since MS-DOS 5.0 was released. During its day there was the threat of viruses breaking your system or making it ac t in unpredictable ways. Due to its age and near total lack of consumer use it is safe to assume that all of the viruses for MS-DOS have been wr itten. Using community archives and modern analysis methods we can uncov er how they worked and reflect on how things have changed. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9617.htm l SUMMARY:A deep dive into the world of DOS viruses - Ben Cartwright-Cox LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T113000 DTSTAMP;VALUE=DATE-TIME:20190112T172341Z UID:de977841-8510-4172-9622-dd0563c2cb82@frab.cccv.de DESCRIPTION:A major part of software development is maintenance\, i.e. ti nkering with software that should already be completed but still somehow does not work as it should. Software developed by tinkering is the anti thesis to resilient technology\, and a growing threat to our profession and our lives. Working on this kind of software crushes the soul. Yet th is is exactly how most IoT devices (and computers in general) are progra mmed these days. We need to replace the dead technology-oriented objects of the past with supple models enriching our domains and our souls. Thi s talk shows how it is done.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9812.htm l SUMMARY:A farewell to soul-crushing code - Mike Sperber\, Nicole Rauch LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T205000 DTSTAMP;VALUE=DATE-TIME:20190113T195237Z UID:6c44067f-a011-48ec-b302-fbaff1260b78@frab.cccv.de DESCRIPTION:Performance lecture by Cornelia Sollfrank that makes a (techn o-)feminist comment on the entanglements of gender\, technology and info rmation politics exemplified by the case of Julian Assange and Wikileaks . The artist takes us in her text assemblage on an adventurous trip into the realm of zeros and ones\, of data and pure information\, of ciphers \, signifiers and figures. On the other side of reality we encounter sus pected heroes\, leaks and phreaks\, engineers of escape who control our secret desires. Rape can be performed in many ways. In a state of total transparency: what shall we eat\, when society feeds upon the repressed? Knowing yourself means knowing what to look for. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9654.htm l SUMMARY:A la recherche de l'information perdue - Coco Sollfrank LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T185000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T181000 DTSTAMP;VALUE=DATE-TIME:20190110T202627Z UID:4dcbb9c4-8f93-40ed-85c0-90474f4ea623@frab.cccv.de DESCRIPTION:Let's think "Beyond Slavery": Afroroutes is a one-of-a-kind V R experience conceived as a journey through 3 displaced African heritage s\, immersing users in Rituals and Ceremonies to experience that well-co nserved memory form\, but also to feel the power of Music as a strong an thropological tool. Connecting Afro-diasporic narratives: alterity and h eritage transcendence within the digital era\, Afroroutes is a trigger t o open a crucial debate about diasporic identity.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10009.ht ml SUMMARY:Afroroutes: Africa Elsewhere - Sélim Harbi LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T023000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTAMP;VALUE=DATE-TIME:20190114T181628Z UID:93c1500d-c639-4247-854e-6e51e167dbeb@frab.cccv.de DESCRIPTION:"All Creatures Welcome sketches a utopian image of society in the digital era. Accompanied by the appeal to “use hacking as a mindset \,” the viewers immerse themselves\, together with the filmmaker\, in a documentary adventure game and explore the world of digital communities at the events held by the Chaos Computer Club\; a real-world reflection of the virtual spectrum." – after the rough cut screening at the 34c3 we will show now the final version. \nJoin us and be part of the moment wh en we put the movie online and make it freely available under a creative commons license at the beginning of the screening! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9873.htm l SUMMARY:All Creatures Welcome - Sandra Trostel\, Thies Mynther LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T221000 DTSTAMP;VALUE=DATE-TIME:20190114T185503Z UID:71bdcf60-c567-4cf6-94f4-5681b1d008b4@frab.cccv.de DESCRIPTION:Plötzlich geht alles ganz schnell: Online-Behandlungen und el ektronische Gesundheitsakten sind dieses Jahr für Millionen Krankenversi cherte Wirklichkeit geworden. Zu einem hohen Preis: Bereits einfache Ang riffe lassen das Sicherheitskonzept der Apps und Plattformen zusammenbre chen. Warum das so ist\, welche kritischen Fehler Vivy & Co. gemacht hab en und wie das möglicherweise verhindert werden kann\, das soll dieser V ortrag zeigen - denn in spätestens drei Jahren sollen auch die Gesundhei tsdaten aller übrigen Versicherten zentral gespeichert und online abrufb ar sein. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9992.htm l SUMMARY:All Your Gesundheitsakten Are Belong To Us - Martin Tschirsich LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T185000 DTSTAMP;VALUE=DATE-TIME:20190101T203311Z UID:a9504e38-7f8e-4e2d-bf50-6cd69dbb60f9@frab.cccv.de DESCRIPTION:Facebook monopoly is an issue\, but looking for replacements it is not enough. We want to develop critical judgment on algorithms\, o n why data politics matter and educate\, raise awareness for a broad aud ience. With our tool\, we enable an individual to collect evidence and see how Facebook's algor ithm truly shares their data. Not data about themselves\, but the bias o f facebook treats data\, re-shares certain content over other content. C ollectively we can analyze the algorithm\, understand Facebooks agendas and show how little agency users have. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9797.htm l SUMMARY:Analyze the Facebook algorithm and reclaim data sovereignty - Cl audio Agosti LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T165000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T161000 DTSTAMP;VALUE=DATE-TIME:20190114T182046Z UID:4f6f4278-1cfb-4e8d-935d-ec0ac2adefc5@frab.cccv.de DESCRIPTION:Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Ko pie seiner Daten anzufordern. Doch wer macht das schon? Wir haben genau das getan. Das Ergebnis war nicht nur eine intensive und emotionale Brie ffreundschaften mit der Datenschutz-Abteilung von Amazon. Das Ganze hat auch sehr viel Datenmüll zu Tage befördert. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9858.htm l SUMMARY:Archäologische Studien im Datenmüll - Letty\, Katharina Nocun LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T113000 DTSTAMP;VALUE=DATE-TIME:20190106T165642Z UID:093eca9c-c084-462a-8ed2-b95954782b06@frab.cccv.de DESCRIPTION:Why do navigation systems have feminine voices? We know Tay\, Eliza\, Siri not only as female names\, but also as chatbots and softwa re\, which directly interact with humans. Although computer programs are per se genderless\, gender seems not to be cancelled out in human-machi ne interaction\, but why? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9905.htm l SUMMARY:Are machines feminine? - Polaris LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T121000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T113000 DTSTAMP;VALUE=DATE-TIME:20190111T201717Z UID:2912b643-f5a8-4bbd-8b24-74983bc55754@frab.cccv.de DESCRIPTION:When a electrical device needs to be a piece of art or used a s a mechanical component\, a printed circuit board is more than a piece of fiberglass with wires embedded in it. In chemical engineering applica tions internal holes which allow fluids to be transported through the PC B need to be placed in complex precise patterns. As art\, holes can be u sed to create positive and negative space\, allowing you to see a charli eplexed LED display as a snowflake. Creating complex shapes in PCB desig n software is difficult to impossible. However\, it is easy in CAD softw are. In this talk I will present the project workflow I use to design an d manufacture my PCBs. Additionally\, I will discuss the problems I have run into during manufacturing and how these problems were resolved. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9529.htm l SUMMARY:Artistic PCB Design and Fabrication - hammes hacks LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T185000 DTSTAMP;VALUE=DATE-TIME:20181231T191422Z UID:4fff6281-e452-4d64-bf9a-bc677614776a@frab.cccv.de DESCRIPTION:In this talk\, I discuss how to reliably find bugs in the Chr ome IPC system with the goal of escaping the sandbox. I show how to enum erate the attack surface\, how to identify the weak areas\, and how to f uzz those areas efficiently to consistently produce bugs. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9579.htm l SUMMARY:Attacking Chrome IPC - nedwill LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T205000 DTSTAMP;VALUE=DATE-TIME:20190105T155902Z UID:c85de43e-107e-4247-b550-946f376e2ec4@frab.cccv.de DESCRIPTION:In this talk\, I’ll present several attacks that leak the pla intext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting\, i.e. the two different efail atta cks\, some are somewhat silly\, yet effective. Some abuse HTML emails\, some also work with plain ASCII emails. Furthermore\, I’ll discuss our l essons learned and describe the efail-related changes to mail clients an d the OpenPGP and S/MIME standards. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9463.htm l SUMMARY:Attacking end-to-end email encryption - Sebastian Schinzel LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T141000 DTSTAMP;VALUE=DATE-TIME:20190105T233338Z UID:ba68f092-89bd-4348-9f81-7a05317a0497@frab.cccv.de DESCRIPTION:There has been a lot of talk about Virtual Reality (VR)\, but still there are very little applications to enhance our everyday lives outside of entertainment. Augmented Reality (AR)\, the less known siblin g of VR\, has the power to have a more profound impact on our lives than VR ever could. Instead of replacing the real world with a virtual one\, AR enhances the reality with virtual content. Therefore\, AR can be a g ateway for people in accessing and understanding todays technology and c ould provide vast possibilities to support our everyday lives\, e.g.\, f or navigation\, traveling\, or education.\nThis talk will give an overvi ew on AR in general and explain its possible benefits and use cases\, as well as the issues that may arise\, e.g.\, regarding privacy\, data sec urity\, as well as psychological and sociological challenges. The talk r equires no special knowledge and is suited for people with little exposu re to AR and mixed reality\, but it will also give insights into current relevant research and development. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9623.htm l SUMMARY:Augmented Reality: Bridging the gap between the physical and the digital world - preip LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T141000 DTSTAMP;VALUE=DATE-TIME:20190118T152026Z UID:787007cf-828d-4409-94b0-90a0b8d727a0@frab.cccv.de DESCRIPTION:Mit (u. a.): Rainer Rehak\, Anna Biselli\, Andre Meister\, .. .\n\nWas für die Breitbandversorgung in Deutschland gilt\, gilt auch für Transparenz: Überall Demokratie-Funklöcher\, die man stopfen muss\, am besten mit Klagen. Wir erzählen\, was das Informationsfreiheitsgesetz in diesem Jahr für die Demokratie-Infrastruktur getan hat\, welche Rolle d abei Klagen gespielt haben und was die IFG-Meisterschaften damit zu tun haben. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9507.htm l SUMMARY:Best of Informationsfreiheit - Arne Semsrott\, Rainer Rehak\, And re Meister\, Anna Biselli LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T205000 DTSTAMP;VALUE=DATE-TIME:20190119T165111Z UID:a875f05c-5eeb-4478-9e6f-863fc52b8868@frab.cccv.de DESCRIPTION:Ich möchte euch zeigen\, wie ich mir aus einem Raspberry PI e in Smartphone baue. Auf welche Probleme und Schwierigkeiten ich dabei ge stoßen bin und welche Lösungen ich gefunden habe. Das Projekt ist noch n icht abgeschlossen\, es fehlen noch ein paar Kleinigkeiten. Trotzdem wil l ich euch schon mal mein Smartphone in der praktischen Butterbrotdose z eigen und euch erzählen wie es entstanden ist. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9681.htm l SUMMARY:Butterbrotdosen-Smartphone - bücherratten LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T150000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T141000 DTSTAMP;VALUE=DATE-TIME:20190107T224647Z UID:b11ac9c0-8a4d-47ae-a584-f5c01fa2a01c@frab.cccv.de DESCRIPTION:The deepening of global Internet infrastructure comes accompa nied with an invigorated capacity and intent by adversaries to control t he information that flows across it. Inextricably\, political motivation s and embedded power structures underlie the networks through which we i nterpret and understand our societies and our world - censorship threate ns the integrity of the public sphere itself. The increasing technical s ophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and resear ched by circumvention tool providers\, whose work continues to preserve access to the open Internet for all communities. Through this presentati on\, we endeavour to share insights gained from the front lines of this technical contest. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9964.htm l SUMMARY:Cat & Mouse: Evading the Censors in 2018 - kmc LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T141000 DTSTAMP;VALUE=DATE-TIME:20181231T133920Z UID:94b77e5a-c826-45a9-a8bd-bbb8e5e7c9ff@frab.cccv.de DESCRIPTION:Six years ago the idea behind CensoredPlanet started\, that i s now launched at censoredplanet.org. We had a simple (yet essential) gu iding principle: measurements that may be politically sensitive should b e done without volunteer participation. In this talk\, besides a detaile d scientific overview of the techniques and the current state of Censore dPlanet\, I plan to talk about my experience in developing the project f rom the ground up.\n\nDespite the pervasive nature of Internet censorshi p and the continuous evolution of how and where censorship is applied\, measurements of censorship remain comparatively sparse. Current censorsh ip projects\, including OONI\, depend on participants within countries t o help them collect measurements. While these projects are valuable\, we have empirically seen that there are issues relating to continuity in t erms of measurement\, coverage of the geographical area\, and ethical di lemmas when user participation is a requirement. Censored Planet use ten s of thousands of *remote infrastructural and organizational vantage poi nts* from over 170 countries to conduct it’s measurements\, thereby remo ving the need for user participation. This allows us to regularly measur e Internet disruptions over a longer period of time in significantly mor e countries in a safer way. \n\nThe research we conduct at Censored Plan et provides unique insights and data points on Internet disruptions. Thi s information is extremely valuable to researchers in diverse fields fro m political science to computer science as well as to activists and jour nalists living and operating in countries where Internet disruptions are prevalent. By making our data easily accessible to the public\, we aim to encourage future research in the field. Link to our data: https://cen soredplanet.org/data/raw. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9877.htm l SUMMARY:Censored Planet: a Global Censorship Observatory - Roya Ensafi LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T024000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T011000 DTSTAMP;VALUE=DATE-TIME:20190106T135538Z UID:e4dbae08-779a-4972-a099-7c85df141fa4@frab.cccv.de DESCRIPTION:Chaos meets Poetry Slam. \nDer humoristische Dichterwettstrei t mit Informatikhintergrund. Mitmachen ausdrücklich erwünscht. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9911.htm l SUMMARY:Chaos Communication Slam - Thorben Dittmar LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T205000 DTSTAMP;VALUE=DATE-TIME:20190108T153507Z UID:a9c0c28c-4f40-4d06-99da-d73fbb2655c4@frab.cccv.de DESCRIPTION:Seit Juli 2016 darf ich – nominiert unter anderem vom CCC – d en Bereich "Internet" im Fernsehrat des ZDF vertreten. Nach gut zwei Jah ren ist es Zeit für eine Zwischenbilanz: Was macht ein Fernsehrat\, was machen öffentlich-rechtliche Angebote im Netz\, und was sollten sie eige ntlich tun? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9358.htm l SUMMARY:Chaos im Fernsehrat - Leonhard Dobusch LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T233000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T225000 DTSTAMP;VALUE=DATE-TIME:20190118T161449Z UID:84be4017-78a0-444b-8b6f-5a14089bb0f7@frab.cccv.de DESCRIPTION:Video identification is the process of establishing the ident ity of a person via video chat. The person to be identified has to show his face as well as her official ID card to the camera. This lecture giv es a step-by-step tutorial on how such video streams can be augmented wi th computer-generated official ID cards\, including all visible watermar ks. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9616.htm l SUMMARY:Circumventing video identification using augmented reality - Jan Garcia LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T185000 DTSTAMP;VALUE=DATE-TIME:20190110T144647Z UID:eff16504-08ce-4de0-bf44-d877d286aac9@frab.cccv.de DESCRIPTION:Technology is the solution: What is the problem? This seems t o be the motto. Algorithms may be about to control our free speech whil e tracking technologies could control our bodies and communications. Wi ll we react or stay quiet? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9372.htm l SUMMARY:Citzens or subjects? The battle to control our bodies\, speech an d communications - Diego Naranjo (EDRi)\, Andreea Belu (EDRi) LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T181000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T171000 DTSTAMP;VALUE=DATE-TIME:20190106T170617Z UID:46b7c5d8-318d-4f6c-a17e-73f2638ab46a@frab.cccv.de DESCRIPTION:Hier hört es auf. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9986.htm l SUMMARY:Closing Event - rufus\, rixx LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T185000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T181000 DTSTAMP;VALUE=DATE-TIME:20190110T093411Z UID:8a3e490c-30a5-46a6-ab4f-45ef3b23b1a1@frab.cccv.de DESCRIPTION:Voicemail systems can be compromised by leveraging old weakne sses and top of current technology. The impact goes way beyond having yo ur messages exposed. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9383.htm l SUMMARY:Compromising online accounts by cracking voicemail systems - Mart in Vigo LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T185000 DTSTAMP;VALUE=DATE-TIME:20190118T181901Z UID:6e25dd44-763f-494b-bae5-75b409dcf1d0@frab.cccv.de DESCRIPTION:Welchen Dialekt spricht eine Geflüchtete aus Syrien? Was verr ät das Handy eines Asylsuchenden aus dem Irak darüber\, wo er herkommt? Und ist der Name Wasef eigentlich typisch für Afghanistan? Über diese Fr agen entscheiden im Bundesamt für Migration und Flüchtlinge (BAMF) zuneh mend Computer. Sie spucken Wahrscheinlichkeiten für Herkunftsländer aus\ , die entscheidend dafür sind\, ob Geflüchtete Asyl bekommen - oder nich t. Kurz: Menschliche Schicksale hängen von Maschinen ab. Diese Maschinen wissen nichts darüber\, ob einem Menschen in seiner alten Heimat Verfol gung\, Folter und Tod drohen. Mitarbeiter des BAMF verlassen sich auf di ese Ergebnisse\, auch wenn sie falsch sein können. Recherchen und bisher unveröffentlichte Dokumente zeigen\, warum das schiefgehen muss und wel che schweren Folgen für Schutzsuchende das haben kann.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9658.htm l SUMMARY:Computer\, die über Asyl (mit)entscheiden - Anna Biselli LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T205000 DTSTAMP;VALUE=DATE-TIME:20190114T214642Z UID:5909125c-6118-4cda-931a-8b936f81dda0@frab.cccv.de DESCRIPTION:We are going to outline the ingredients necessary to perform measurements at the LHC\, starting from an ordinary bottle of hydrogen. Let us take you on a journey following the path of the protons from this bottle to being ready for collisions in one of the detectors. Once the collisions are recorded we show the approaches and tools on how to extra ct the metaphorical needle in the haystack. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9851.htm l SUMMARY:Conquering Large Numbers at the LHC - Carsten Bittrich\, Stefanie Todt LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T131000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T123000 DTSTAMP;VALUE=DATE-TIME:20190121T091209Z UID:52ce1398-fa9b-4bd3-aa9e-6a49a764ac2c@frab.cccv.de DESCRIPTION:Private Unternehmen müssen nicht so transparent sein wie Behö rden - selbst wenn sie sich wie Behörden benehmen. \nWelche Mittel könne n wir nutzen\, um trotzdem Lichts ins Dunkel der Konzerne zu bringen? Wi r stellen zwei Projekte mit unterschiedlichen Herangehensweise vor: Zum einen OpenSchufa\, das das Scoring-Verfahren der Schufa rekonstruieren s oll und erste Ergebnisse vorstellen kann. Zum anderen OffeneGesetze\, da s alle Bundesgesetzblätter seit 1949 erstmals kostenfrei und zur freien Weiterverwendung bereitstellt und jetzt dafür möglicherweise verklagt wi rd. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9343.htm l SUMMARY:Court in the Akten - Arne Semsrott LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T233000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T225000 DTSTAMP;VALUE=DATE-TIME:20181227T201941Z UID:2536bba3-b95f-4cec-9a95-7aa756db7edb@frab.cccv.de DESCRIPTION:Through the hacking of surveillance techniques\, machine lear ning\, and big-data analytics\, DISNOVATION.ORG’s trilogy of internet bo ts is uncovering and repurposing some of the influential and opaque oper ating systems of our online environment. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9939.htm l SUMMARY:DISNOVATION.ORG - DISNOVATION.ORG LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T143000 DTSTAMP;VALUE=DATE-TIME:20190102T115902Z UID:1601bf3b-ce4a-44c9-993f-7d28fa65168d@frab.cccv.de DESCRIPTION:Der Datenschutz ist als erst relativ frisch erkämpftes Abwehr recht von Bürgern gegen Firmen und Staat ein wichtiges\, aber häufig mis sverstandenes Rechtsgebiet. Zuletzt ist es durch die Grundverordnung auf europäischer Ebene in den Blick der Netzöffentlichkeit geraten.\n\nDies er Vortrag soll einen niedrigschwelligen Einstieg in den Datenschutz geb en und aus Perspektive einer Datenschützerin mit zehnjähriger Erfahrung im Gebiet die aufregenden Aspekte und Herausforderungen aufzeigen\, dem Bürgerrecht Leben einzuhauchen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9809.htm l SUMMARY:Datenschutz für Neulandbürger - Beata Hubrig LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T235000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T231000 DTSTAMP;VALUE=DATE-TIME:20190117T101251Z UID:a667d070-483e-4e2b-9bf9-d9a5475b6356@frab.cccv.de DESCRIPTION:Für Journalisten bieten soziale Netzwerke eine Vielzahl von Q uellen und Informationen\, in einem Ausmaß\, das vor Jahren unvorstellba r war. Doch damit steigt auch das Risiko immer weiter\, auf Manipulation en und „Fake News“ hereinzufallen. In Zeiten von „Lügenpresse“-Rufen ste llt das Journalisten vor neue Herausforderungen. Der Vortrag zeigt\, wie die Verifizierung von Bildmaterial bei großen Medienhäusern abläuft – u nd warum auch normale Nutzer diese Möglichkeiten kennen und benutzen sol lten. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9667.htm l SUMMARY:Desinformation und Fake News - Bekämpfung und Verifizierung leich t gemacht - Robert Clausen LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T233000 DTSTAMP;VALUE=DATE-TIME:20190114T181403Z UID:9a91d92b-0691-46b2-ba73-112bc598342f@frab.cccv.de DESCRIPTION:Ein kurzer Grundlagenabriss über die Institution der Europäis chen Union\, insbesondere zur Funktionsweise und Zusammenarbeit URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10010.ht ml SUMMARY:Die EU und ihre Institutionen - Dustin Hoffmann LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T171000 DTSTAMP;VALUE=DATE-TIME:20190114T182552Z UID:9f27a4c2-f957-4bad-81a8-988a37429d5c@frab.cccv.de DESCRIPTION:Wir wenden uns gegen Gentrifizierung\, Luxussanierung und Spe kulation mit Häusern. Das Mietshäuser Syndikat ist ein bundesweiter Verb und linker\, selbstverwalteter Hausprojekte mit dem Ziel der Initiierung und dauerhaften Erhaltung von gemeinschaftlich genutztem und bezahlbare m Wohn- und Gewerberaum. Der Grundgedanke: Gemeineigentum wird geschaffe n und dauerhaft dem Markt entzogen. Die Mieter*innen sind zugleich Besit zer*innen ohne private Gewinnerzielungsabsichten\, sie transferieren Kno whow und oft auch Direktkredite an andere Hausprojekte. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9804.htm l SUMMARY:Die Häuser denen\, die darin wohnen! - Elke Manz\, fuzzle/fr\, Sc hmidt\, Lina Hurlin LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T113000 DTSTAMP;VALUE=DATE-TIME:20190115T183812Z UID:a750228d-a37d-43c0-8e2f-d46137a991dc@frab.cccv.de DESCRIPTION:Kann man empirischen Studien trauen oder nicht? Wie kann ich gute Studien von schlechten unterscheiden? Und was mache ich\, wenn es z u einem Thema Studien mit gegensätzlichen Befunden gibt? Der Vortrag sol l helfen\, Antworten auf diese Fragen zu finden und empirische Studien b esser zu verstehen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9686.htm l SUMMARY:Die dreckige Empirie - Aiko LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T125000 DTSTAMP;VALUE=DATE-TIME:20190120T172845Z UID:d0d6d058-f117-4ccb-ba6a-c41d9290a287@frab.cccv.de DESCRIPTION:Der Vortrag beleuchtet die Einflüsse auf den geheimnisvollen Teil des Mobilfunks – Störquellen im Uplink und deren Auswirkungen auf d ie Mobilfunk-Kommunikation sowie Praktiken zum Aufspüren von HF-Störquel len.\n\nDie Feldstärke-Balkenanzeige eines Smartphones (die Downlink-Emp fangsfeldstärke) ist nur die Hälfte der Wahrheit zur Bewertung einer Mob ilfunkversorgung. Die andere Hälfte ist der weithin unsichtbare aber geg en Störeinflüsse hochempfindliche Uplink\, die Richtung vom Endgerät zu den Basisstationen. In diesem Vortrag werden Uplink-Störquellen\, deren Auswirkungen sowie Mess- und Analysemöglichkeiten erläutert. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9407.htm l SUMMARY:Die verborgene Seite des Mobilfunks - Peter Schmidt LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T173000 DTSTAMP;VALUE=DATE-TIME:20190114T214019Z UID:385ac419-50f5-49b5-b571-701691d2734f@frab.cccv.de DESCRIPTION:Encoding or decoding random radio-waveforms doesn't need incr edible expensive hardware anymore which offers new possibilities for bui lding up over-the-air communication systems. There are Software Defined Radios providing affordable cellular radio to remote villages\, Communit y Radios are using SDR to build up digital radio networks and other cool stuff.\n\nSome basic knowledge what is going on in SDR Hard/Software as the influence of the samplerate\, I/Q-data of the math behind the water fall-diagram is helpful to have fun with SDR. Some theory on modulation techniques helps you to decode or encode your waveforms. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9508.htm l SUMMARY:Digital Airwaves - Friederike LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T143000 DTSTAMP;VALUE=DATE-TIME:20190105T092242Z UID:8bd222ad-34a7-468a-9e83-11767dcfa809@frab.cccv.de DESCRIPTION:Broadcom's Bluetooth firmware on popular devices – such as Ne xus 5\, Nexus 6P\, Raspberry Pi 3\, and Raspberry Pi 3+ – shares the sam e firmware update mechanisms\, which allows for local firmware modificat ions. With InternalBlue we published a framework to change lower Bluetoo th layers. In this talk we go even further and demonstrate a remote expl oit in the Broadcom firmware. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9498.htm l SUMMARY:Dissecting Broadcom Bluetooth - jiska\, mantz LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T171000 DTSTAMP;VALUE=DATE-TIME:20190110T210324Z UID:089b7fec-3ee1-493c-9b90-782c0514ffb4@frab.cccv.de DESCRIPTION:Whenever you enter a name into your computer\, it resolves it to a numerical IP address. This resolution uses the Domain Name System (DNS)\, which is a hierarchical decentralised naming system used on the Internet. DNS is organised in a way that top-level domain (e.g. .com\, . org) are delegated to registrars\, which delegate subdomains (e.g. foo.c om). This delegation is done as well via the DNS protocol via nameserver (NS) records. Since different types of data are kept in DNS\, it can as well be seen as a distributed (and cached!) key-value store - which is fault-tolerant.\n\nI will explain the basic usage of DNS\, including stu b and recursive resolver\, server\, various protocol extensions (zone tr ansfer\, dynamic updates\, authentication\, notifications\, ...)\, priva cy extensions (query path minimisation\, DNS-over-TLS)\, provisioning le t's encrypt certificates. I will talk about attacks (poisoning\, amplifi cation\, ...) and implementation pitfalls (not get stuck in the recursiv e resolver). I implemented DNS with above mentioned extensions as minimi zed MirageOS unikernels over past years. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9674.htm l SUMMARY:Domain Name System - Hannes Mehnert LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T205000 DTSTAMP;VALUE=DATE-TIME:20190116T181304Z UID:48ed6dea-e67d-4866-8c35-318e9d892363@frab.cccv.de DESCRIPTION:Schon Wladimir Wladimirowitsch Putin wusste: "Hacker\, das si nd freie Menschen\, so wie Künstler." Wie wollen dafür sorgen\, dass es so bleibt. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9716.htm l SUMMARY:Du kannst alles hacken – du darfst dich nur nicht erwischen lasse n. - Linus Neumann\, Thorsten Schröder LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T125000 DTSTAMP;VALUE=DATE-TIME:20190106T162908Z UID:87083bf8-f1e8-433d-8b51-ffece756bbd7@frab.cccv.de DESCRIPTION:Recent attacks against elections in the U.S. and Europe demon strate that nation-state attackers are becoming more aggressive\, even a s campaigning and voting are becoming increasingly reliant on computers. How much has changed since 2016\, when the U.S. experienced unpreceden ted attacks on its election infrastructure? What has to happen to ensur e that the 2020 presidential election is secure? In this talk\, I'll gi ve a progress report on election security in the U.S. and around the wor ld\, informed by results from my own research and my work with legislato rs and election officials over the past two years. I'll also hold a moc k election with a current U.S. voting machine to demonstrate how cyberat tacks on election infrastructure could potentially change the results of national elections. Finally\, I'll explain what everyone can do to get involved and help safeguard the foundations of democracy.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9917.htm l SUMMARY:Election Cybersecurity Progress Report - J. Alex Halderman LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T230000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T221000 DTSTAMP;VALUE=DATE-TIME:20181230T191128Z UID:1c64358f-3bdd-484e-a28e-58dc7baa4480@frab.cccv.de DESCRIPTION:The lecture will give an introduction into the "EC Proposal f or a Regulation on European Production and Preservation Orders for Elect ronic Evidence in Criminal Matters (COM (2018) 225 final)" and .\nthe im pact to civil liberties of the users as well as the challenges for servi ce providers of the diverse range of services covered by the proposal.\nUrgent action is required now by diverse groups to fight the existing proposal and prevent it from becoming binding law throughout th e EU.. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10017.ht ml SUMMARY:Electronic Evicence in Criminal Matters - Klaus Landefeld LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T161000 DTSTAMP;VALUE=DATE-TIME:20190103T093813Z UID:8703c4a7-981c-4aa5-8f4c-36da54d5b435@frab.cccv.de DESCRIPTION:We are presenting an innovative technology\, which allows ver ifying the authenticity\, integrity and/or the physical state of an item by employing the propagation behaviour of electromagnetic waves. In par ticular\, it enables to check for any tamper attempts for larger structu res\, such as off-the-shelf computers and their periphery. The technolog y extends existing tamper proof approaches from the chip/PCB to a system level and is easily retrofittable.\nIn this presentation\, we are demon strating exemplary tamper proofing in order to protect secret informatio n without an attack-detection or data-deletion circuit (!)\, which is a known difficult problem and an imperfect undertaking. Therefore\, we dem onstrate the simplicity and effectiveness using a very cheap self-made t estbed (using alumium foil) to protect standard hardware against invasiv e attacks\, such as needle probing through the case. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9611.htm l SUMMARY:Enclosure-PUF - Christian Zenger\, David Holin\, Lars Steinschult e LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T141000 DTSTAMP;VALUE=DATE-TIME:20190103T092819Z UID:76417167-e13b-43cd-a089-841ff78266e8@frab.cccv.de DESCRIPTION:Over the summer Facebook\, Google\, and Twitter have started making transparent United States political ads shown on their platforms. We have been collecting and analyzing these political ads to understand how candidates\, elected officials\, PACs\, non-profits\, for-profit co mpanies\, and individual citizens are disseminating U.S. political conte nt using these advertising platforms. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9419.htm l SUMMARY:Explaining Online US Political Advertising - Damon McCoy LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T113000 DTSTAMP;VALUE=DATE-TIME:20190103T092509Z UID:30278963-3b07-49a8-96a7-2b24a8cf573b@frab.cccv.de DESCRIPTION:Telephone networks form the oldest large scale network that h as grown to\ntouch over 7 billion people. Telephony is now merging many complex\ntechnologies (PSTN\, cellular and IP networks) and enabling num erous\nservices that can be easily monetized. However\, security challe nges for\ntelephony are often neither well understood\, nor well address ed. As a\nresult\, telephone networks attract a lot of fraud. In this ta lk\, we will\nsystematically explore the fraud in telephone networks\, f ocusing on\nvoice telephony. We will present a taxonomy of fraud\, and a nalyze two\nprevalent fraud schemes in more detail: looking into the eco system of\nInternational Revenue Share Fraud (IRSF)\, and discussing a n ew\ncountermeasure to the well-known problem of voice spam. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9852.htm l SUMMARY:Exploring fraud in telephony networks - Merve Sahin\, Aurélien Fr ancillon LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T141000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T133000 DTSTAMP;VALUE=DATE-TIME:20181230T225824Z UID:4cc5cf9a-214f-4e7d-991f-199e9f0db8cc@frab.cccv.de DESCRIPTION:UEFI rootkits have been researched and discussed heavily in t he past few years\, but sparse evidence has been presented of real campa igns actively trying to compromise systems at this level. Our talk will reveal such a campaign successfully executed by the Sednit group. We wil l detail the full infection chain showing how Sednit was able to install their custom UEFI module on key targets' computers. Additionally\, we w ill provide an in-depth analysis of their UEFI module and the associated trojanized LoJack agent. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9561.htm l SUMMARY:First Sednit UEFI Rootkit Unveiled - Frédéric Vachon LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T185000 DTSTAMP;VALUE=DATE-TIME:20181230T092706Z UID:7030e406-2e1f-4d4d-8b1b-c68aa22a3434@frab.cccv.de DESCRIPTION:Der Talk gibt einen Überblick über die Arbeit der Gesellschaf t für Freiheitsrechte (GFF): Wir klagen\, um Grund- und Menschenrechte v or Gesetzgebern und Behörden zu schützen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9973.htm l SUMMARY:Freedom needs fighters! - Ulf Buermeyer\, Nora Markard LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T014000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T004000 DTSTAMP;VALUE=DATE-TIME:20190116T213725Z UID:462f9320-3a0e-4785-82de-15343803c2ba@frab.cccv.de DESCRIPTION:Nico Semsrott hat in Zeiten des globalen Rechtsrucks den über flüssigsten Job der Welt: Er ist Demotivationstrainer. Mit Powerpointprä sentationen und viel Pessimismus schafft er es\, komplexe Themen zu vere infachen\, ohne dabei auf alternative Fakten zurückgreifen zu müssen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9506.htm l SUMMARY:Freude ist nur ein Mangel an Information - Nico Semsrott LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T113000 DTSTAMP;VALUE=DATE-TIME:20190105T212559Z UID:4e6ab724-8663-456a-ac01-1cfdfc94c27f@frab.cccv.de DESCRIPTION:In this talk I will share my story of how in a little over a year\, a high school student with almost zero knowledge in security rese arch found his first RCE in Edge. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9657.htm l SUMMARY:From Zero to Zero Day - Jonathan Jacobi LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T141000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T133000 DTSTAMP;VALUE=DATE-TIME:20190112T230731Z UID:c8b34953-b60f-4ed0-8784-dc20153e0725@frab.cccv.de DESCRIPTION:Die EU-Grenzagentur Frontex nimmt eine Reihe neuer Überwachun gsmethoden im Mittelmeer in Betrieb. Die Fähigkeiten zur Beobachtung des sogenannten Grenzvorbereichs gehören zum Grenzüberwachungssystem EUROSU R\, das die Europäische Union vor fünf Jahren gestartet hat. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9720.htm l SUMMARY:Frontex: Der europäische Grenzgeheimdienst - Matthias Monroy LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T221000 DTSTAMP;VALUE=DATE-TIME:20190114T182058Z UID:400622c5-3754-43fd-aaf3-0ca00e9ad551@frab.cccv.de DESCRIPTION:Polizei und Geheimdienste sammeln per "Funkzellenabfrage" Tag für Tag Millionen von Standort-Daten. Netzbetreiber liefern den Behörde n regelmäßig Datensätze aller Mobilfunknummern\, die zu einem bestimmten Zeitpunkt in bestimmten Funkzellen waren. Entgegen den gesetzlichen Bes timmungen erfahren Betroffene nicht davon. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9972.htm l SUMMARY:Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handyda ten - Ulf Buermeyer\, Andre Meister LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T205000 DTSTAMP;VALUE=DATE-TIME:20190111T230750Z UID:f010dc03-13bc-413d-95ec-e8786626a2f1@frab.cccv.de DESCRIPTION:Der Vortrag behandelt die Klage des Internetknotens DE-CIX ge gen die strategische Fernmeldeüberwachung des BND vor dem Bundesverwaltu ngsgericht in Leipzig\, was wir aus dem Urteil über den Rechtsschutz der Bürger lernen können und wieso der Fall nun das Bundesverfassungsgerich t in Karlsruhe beschäftigt. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10016.ht ml SUMMARY:G10\, BND-Gesetz und der effektive Schutz vor Grundrechten - Klau s Landefeld LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T215000 DTSTAMP;VALUE=DATE-TIME:20190106T163240Z UID:5f5d8fd7-45a7-44e4-8d82-dfb8ee692f8b@frab.cccv.de DESCRIPTION:CRISPR/Cas hat die Genforschung revolutioniert und könnte bal d in großem Stil gentechnisch eingesetzt werden. Aber was ist CRISPR und wie funktioniert es? Kurz gesagt: Teile des adaptiven Immunsystems von Bakterien werden genutzt\, um Gene zu verändern. Und das funktioniert pr äziser als mit jedem anderen Werkzeug zuvor und offenbar in allen Tier- und Pflanzenarten. Damit ist CRISPR anders als die herkömmlichen Methode n der Gentechnik. Es ist einfach anzuwenden\, preiswert\, schnell\, extr em vielseitig und damit in jedem Biologielabor erhältlich. Bio-Hacker ha ben sogar begonnen\, CRISPR zu Hause zu nutzen. CRISPR wird bereits eing esetzt\, um mehr über Genfunktionen und -dysfunktionen zu erfahren. So k önnte es realistischerweise zur Behandlung einiger Krankheiten eingesetz t werden. Aber welche Hürden gibt es noch und welche ethischen Fragen wü rden sie mit sich bringen? Wie kann (oder sollte?) CRISPR in der Landwir tschaft eingesetzt werden\, wenn der Klimawandel die Erträge verringert und die Biodiversität gefährdet? \nUnser Vortrag gibt einen Überblick da rüber\, was mit dem CRISPR/Cas-System möglich ist. Wir möchten genügend Informationen liefern\, um zwischen Pseudowissenschaften und dem\, was t atsächlich möglich ist\, unterscheiden zu können.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9838.htm l SUMMARY:Genom-Editierung mit CRISPR/Cas - _Adora_Belle_\, André Lampe\, K aLeiMai LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T113000 DTSTAMP;VALUE=DATE-TIME:20190113T161550Z UID:bfdac26a-86bf-4a80-99c6-a9a0be15f003@frab.cccv.de DESCRIPTION:Neutrinos are “ghost-like” elementary particles that can lite rally go through walls. They can bring information from places that are impossible to observe through other means.\nThis talk provides a glimpse behind the scenes of a next-generation neutrino detector called Hyper-K amiokande – a cylindrical water tank the size of a high-rise building. I will describe some of the problems you encounter when planning a subter ranean detector of this size\, and explain how this detector helps us fi gure out why the sun shines and how giant stars explode. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9913.htm l SUMMARY:Going Deep Underground to Watch the Stars - Jost Migenda LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T185000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T181000 DTSTAMP;VALUE=DATE-TIME:20190114T180045Z UID:686c1387-e761-4df6-b395-f9ddf92d46e7@frab.cccv.de DESCRIPTION:Die Hackerethik ist die Grundlage für den Umgang mit den dive rsen ethischen Problemen\, die sich beim schöpferisch-kritischen Umgang mit Technologie (auch "hacking" genannt) stellen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10011.ht ml SUMMARY:Hackerethik - eine Einführung - frank LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T233000 DTSTAMP;VALUE=DATE-TIME:20190101T133001Z UID:1dc4f8d0-e5f6-4e49-b647-1a5e0cabbb00@frab.cccv.de DESCRIPTION:As humans have a large negative impact on ecosystems all arou nd the globe\, we are approaching a major extinction event in which arou nd 70% of all species will go extinct. This talk will give an introducti on to a data-driven and system-based view of ecology. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9456.htm l SUMMARY:Hacking Ecology - Theodor Sperlea LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T113000 DTSTAMP;VALUE=DATE-TIME:20181230T111548Z UID:49fe1044-4038-4cec-8e80-71621c9e7d6e@frab.cccv.de DESCRIPTION:We mostly see with the mind\, and the mind is flexible. For t he four hundred million people with amblyopia (lazy eye)\, their brain e ncountered an installation error when linking both eyes as babies. As a "Plan B"\, their brain switched one eye off.\n\nI'll talk a bit about h ow the visual system works\, and how our open-source virtual reality sof tware (backed by social impact lab Leipzig and the prototypefund.de) can hack through that suppression and provide a chance to "re-install" full sight with two eyes. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9370.htm l SUMMARY:Hacking how we see - Ben Senior LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T215000 DTSTAMP;VALUE=DATE-TIME:20190111T205726Z UID:3745513b-c2e6-449a-abd0-2e32f738f168@frab.cccv.de DESCRIPTION:The human microbiome is a diverse community of bacteria that lives inside us. Their contribution towards our personal well-being or s ickness is controversially discussed within the scientific world and\, l ikewise\, in our society. First attempts to rationally (reverse-)enginee r the human microbiome are hyped in medicine and within the DIY biohacki ng scene. The implications of these endeavours potentially concern sever al aspects of our life: eating habits\, fitness state\, susceptibility f or infections\, aging\, and cancer. But what about ethical aspects of ha cking the human microbiome? How can biosafety be maintained? Are there a ny data security issues? I will seriously discuss the state-of-the-art a nd future directions of the research to show whether actual hacking of t he human microbiome is rather science or fiction. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9758.htm l SUMMARY:Hacking the Human Microbiome - LorenzAdlung LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T011000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T001000 DTSTAMP;VALUE=DATE-TIME:20190111T213804Z UID:1f290832-c93f-453b-9966-83ecbda4c1c3@frab.cccv.de DESCRIPTION:We let the technically ungifted build robots and to fight eac h other for the laughs. \n\nPlease contact @honky in RocketChat or visit the ChaosZone Hall 2 if you want to participate. We need at least 8 Rob ots to participate\, if we have more\, we'll bring this to the battlefie ld. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9486.htm l SUMMARY:Hebocon - honky LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T235000 DTSTAMP;VALUE=DATE-TIME:20190111T202324Z UID:ea00d1e0-a580-415f-a8cf-f02883d939dc@frab.cccv.de DESCRIPTION:
In this talk\, we’re looking at third party tracking on An droid. We’ve captured and decrypted data in transit between our own devi ces and Facebook servers. It turns out that some apps routinely send Fac ebook information about your device and usage patterns - the second the app is opened. We’ll walk you through the technical part of our analysi s and end with a call to action: We believe that both Facebook and devel opers can do more to avoid oversharing\, profiling and damaging the priv acy of their users.
URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9941.htm l SUMMARY:How Facebook tracks you on Android - Frederike Kaltheuner\, Chris topher Weatherhead LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T161000 DTSTAMP;VALUE=DATE-TIME:20190115T135459Z UID:f0d70663-0769-4462-ad27-bc516d9cb141@frab.cccv.de DESCRIPTION:This Foundations talk explains the systems and protocols that make up the Internet\, starting from a laptop with a Wi-Fi connection. No particular technical knowledge required. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10005.ht ml SUMMARY:How does the Internet work? - Peter Stuge LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T161000 DTSTAMP;VALUE=DATE-TIME:20190109T213853Z UID:eb71c620-6102-4b08-8ac4-5f71b772a831@frab.cccv.de DESCRIPTION:Men with osteoporosis or depression\, women with heart attack s - these are examples of diseases where medicine still shows a gender b ias. Assuming that men and women have the same bodies\, except when it c omes to the reproductive organs still causes maltreatment up to death. I n the past few years sex- and gender-sensitive medicine has discovered t hat the assumption of the same body has lead to the unnecessary death of patients and needs to be challenged.\nThis is a brief introduction into the paradigm shifting realm of sex- and gender-sensitive medicine showi ng how and where the sexes differ\, that there are actually more than tw o sexes and that your gender also plays a role in how you are being trea ted by medical professionals. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9775.htm l SUMMARY:How medicine discovered sex - Sarah Hiltner LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T173000 DTSTAMP;VALUE=DATE-TIME:20190112T094452Z UID:74b9c748-970f-4693-ac7e-46fcc733d2b4@frab.cccv.de DESCRIPTION:Teaching beginners how to program is often hard. We l ove building programs\, and seeing our loved ones struggle with this is painful. Showing them how to copy-paste a few example programs and chan ge a few parameters is easy\, but bridging from there to building substa ntial programs is a different game entirely. This talk is about how to teach programming successfully\, through comprehensible design recipe s\, which anyone can follow\, using languages and tools designed for beginners. This approach is probably different from how you learned ho w to program\, or how you're used to teaching. It is more effective\, h owever\, as it teaches more material successfully to a broader spectrum of people. It is also more enjoyable.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9800.htm l SUMMARY:How to teach programming to your loved ones - Mike Sperber LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T165000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T161000 DTSTAMP;VALUE=DATE-TIME:20190107T134616Z UID:51ede2da-0f9b-4984-bd58-659c556d20c9@frab.cccv.de DESCRIPTION:Sigfox is an emerging l ow-power wide-area network (LP-WAN) technology for IoT devices\, compara ble to LoRa.\n\nThis talk recou nts my analysis of Sigfox's radio protocol and presents an open referenc e implementation of an alternative Sigfox protocol stack.\n\nIt confirms that while Sigfox ensures authenticity and integrity\, transmitted payl oads are not confidential.\n\nThis presentation is targeted at a technic al audience with some basic knowledge of cryptography (security goals\, AES)\, but no knowledge in RF technology (modulation\, scrambling \, error correction) is required. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9491.htm l SUMMARY:Hunting the Sigfox: Wireless IoT Network Security - Florian Euchn er (Jeija) LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T165000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T161000 DTSTAMP;VALUE=DATE-TIME:20190102T232939Z UID:7ee42591-4f4d-481d-884b-44f5e18e1803@frab.cccv.de DESCRIPTION:The classic spy movie hacking sequence: The spy inserts a mag ic smart card provided by the agency technicians into the enemy's comput er\, … the screen unlocks … What we all laughed about is possible! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9346.htm l SUMMARY:In Soviet Russia Smart Card Hacks You - Eric Sesterhenn LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T171000 DTSTAMP;VALUE=DATE-TIME:20181230T212934Z UID:ee26ac2f-4727-4f29-9d0f-a31669e2c0ed@frab.cccv.de DESCRIPTION:How to apply Shannon's information theory to biology. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9734.htm l SUMMARY:Information Biology - Investigating the information flow in livin g systems - Jürgen Pahle LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T235000 DTSTAMP;VALUE=DATE-TIME:20190104T173823Z UID:e8385c89-d33a-42d8-afb6-8ae28fe5c89d@frab.cccv.de DESCRIPTION:Microcode runs in most modern CPUs and translates the outer i nstruction set (e.g. x86) into a simpler form (usually a RISC architectu re). It is updatable to fix bugs in the silicon (see Meltdown/Spectre)\, but these updates are encrypted and signed\, so no one knows how microc ode works on conventional CPUs. We successfully reverse engineered part of the microde semantics of AMD CPUs and are able to write our own progr ams. We also recovered the mapping between the physical readout (electro n microscope) and the "virtual" addresses used by microcode itself. In t his talk we present background on microcode\, our findings\, our open so urce framework to write custom microcode and our custom defensive measur es implemented in microcode.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9614.htm l SUMMARY:Inside the AMD Microcode ROM - Benjamin Kollenda\, Philipp Koppe LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T113000 DTSTAMP;VALUE=DATE-TIME:20190111T201852Z UID:6beabddc-2dd6-43d2-9936-618d41d42cde@frab.cccv.de DESCRIPTION:This talk investigates fake science factories\; international twilight companies whose sole purpose is to give studies an air of scie ntific credibility while cashing in on millions of dollars in the proces s. We present the findings\, outcomes and methodology from a team of inv estigative journalists\, hackers and data scientists who delved into the parallel universe of fraudulent pseudo-academic conferences and journal s. The story was published in Germany (ARD and Süddeutsche Zeitung Magaz in) in mid of July and then went around the world. How did it begin? Wha t did we learn in the process? And: What happened since the story got pu blished? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9744.htm l SUMMARY:Inside the Fake Science Factories - @sveckert\, @tillkrause\, Pet er Hornung LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T233000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T225000 DTSTAMP;VALUE=DATE-TIME:20190106T110140Z UID:3a571c21-31ed-453b-886d-7dea7b5751cd@frab.cccv.de DESCRIPTION:With great pleasure comes great responsibility. A responsibil ity\, which is not taken enough into consideration by the smart sex toy manufacturers as they should\, while handling extremely sensitive data. As long as there is no serious breach\, there is no problem\, right? Thi s was the basis for a research project (Master Thesis) called “Internet of Dildos\, a long way to a vibrant future”\, dealing with the assessmen t of smart sex toys and identification of vulnerabilities in those produ cts\, including mobile apps\, backends and the actual hardware. \nAfter the assessment of a selection of multiple smart sex toys an abyss of vul nerabilities was revealed. The identified vulnerabilities range from tec hnically interesting vulnerabilities to vulnerabilities which affect the privacy of the users in extreme and explicit ways.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9523.htm l SUMMARY:Internet of Dongs - Werner Schober LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T113000 DTSTAMP;VALUE=DATE-TIME:20190103T141211Z UID:f16f2242-d265-42d2-91d0-632243013b3f@frab.cccv.de DESCRIPTION:Net neutrality\, a big buzzword in the last years. It is not only a buzzword? There are economic reasons why it is a stake. This talk tries to give an overview and explain how money is made in the "interne t" and how it is related to net neutrality. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10019.ht ml SUMMARY:Internet\, the Business Side - swaio LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T171000 DTSTAMP;VALUE=DATE-TIME:20190121T061807Z UID:527b56af-8d56-4edb-9027-9ca60767c742@frab.cccv.de DESCRIPTION:This talk will teach you the fundamentals of machine learning and give you a sneak peek into the internals of the mystical black box. You'll see how crazy powerful neural networks can be and understand why they sometimes fail horribly. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9386.htm l SUMMARY:Introduction to Deep Learning - teubi LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T233000 DTSTAMP;VALUE=DATE-TIME:20190103T092404Z UID:07cbfcb7-08de-4965-b70f-f904d39f7c78@frab.cccv.de DESCRIPTION:This talk will discuss all about the Five Eyes\, the espionag e alliance between Australia\, Canada\, New Zealand\, the United Kingdom and the United States. It is one of the largest intelligence operations in the world\, which monitors billions of communications around the glo be in the name of security. Yet the Five Eyes propose to weaken security \, privacy and eroded the possibility of secure systems. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9951.htm l SUMMARY:It Always Feels Like the Five Eyes Are Watching You - Kurt Opsahl LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T125000 DTSTAMP;VALUE=DATE-TIME:20190114T181341Z UID:f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12@frab.cccv.de DESCRIPTION:Biometrische Videoüberwachung\, Hausdurchsuchungen\, Polizeia ufgabengesetze\, Staatstrojaner und ganz viel Cyber: Wir geben einen Übe rblick über die Themen\, die den Chaos Computer Club 2018 beschäftigt ha ben. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9975.htm l SUMMARY:Jahresrückblick des CCC 2018 - Linus Neumann\, Constanze Kurz\, f rank\, erdgeist\, nexus LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T205000 DTSTAMP;VALUE=DATE-TIME:20181231T163346Z UID:948fee49-de6f-42b1-82f8-045af2aa155e@frab.cccv.de DESCRIPTION:This talk aims to give a general overview of iOS Jailbreaking by starting at what jailbreaking was back in the days and how it evolve d up until today\, while also taking a quick look at how it might evolve in future.\n \nTherefore the following topics are covered:\n- Jailbreak ing goals (technical)\n- Types of jailbreak and it's origins (tethered\, untethered\, semi-tethered\, semi-untethered)\n- Exploit mitigations (A SLR\, iBoot-level AES\, KPP\, KTRR\, PAC)\n- Kernel patches (h3lix)\n- K ppless jailbreaks\n\nThe goal is to give an insight into the jailbreak t erminology\, exploit mitigations and how these are dealt with in past an d modern jailbreaks. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9618.htm l SUMMARY:Jailbreaking iOS - tihmstar LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T125000 DTSTAMP;VALUE=DATE-TIME:20190102T113325Z UID:362172c1-b637-48e8-ae2a-1fa40391b160@frab.cccv.de DESCRIPTION:Have you ever wanted to trace all syscalls or dump all IPC tr affic across a Linux system? Until recently\, doing so may have required some significant setup involving a half-baked tracing kernel module\, a custom kernel module\, or even using a kernel debugger. This talk will introduce the eBPF functionality of the Linux kernel and cover practical uses of the technology beyond mere code profiling. We will show how eBP F can be used both defensively and offensively to protect\, or compromis e\, a system.\n\nThis talk will primarily focus on using eBPF to dynamic ally instrument kernel functionality and gain deep insight on the workin gs of both kernel and userspace code across a running system. Attendees will leave with practical knowledge for using eBPF to (performantly) wat ch every action taken on a running system and make processes reveal thei r secrets. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9532.htm l SUMMARY:Kernel Tracing With eBPF - Jeff Dileo\, Andy Olsen LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T143000 DTSTAMP;VALUE=DATE-TIME:20190103T102608Z UID:23d0c7cd-5472-4e73-ace6-94209981ecf8@frab.cccv.de DESCRIPTION:Laut Mythos wurde der CCC nur zu einem Verein\, weil als einz ige andere Rechtsform nur noch die kriminelle Vereinigung zur Alternativ e stand. Damit es bei euch nicht soweit kommt zeigen wir euch wie ihr be quem aus eurem Interessensverband\, der Brettspielgruppe oder dem Nerdst ammtisch einen guten deutschen e.V. macht. Alles mit einer Prise Humor a us unserem eigenen Versagen und einer Gemeinnützigkeit als Kirsche obend rauf. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9868.htm l SUMMARY:Kickstart the Chaos: Hackerspace gründen für Anfänger - Thorben D ittmar\, Samuel Brinkmann LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T125000 DTSTAMP;VALUE=DATE-TIME:20190109T200021Z UID:cf86e707-27a6-4839-a03f-438413e7756f@frab.cccv.de DESCRIPTION:Vor 5.7 Milliarden Jahren emittierte der Blazar TXS0506+056 e ine große Menge schwach wechselwirkender Neutrinos. Von dem durch ein su permassives schwarzes Loch im Zentrum seiner Galaxie angetriebenen kosmi schen Teilchenbeschleuniger fand eines dieser Teilchen seinen Weg zur Er de und interagierte mit Wassermolekülen im antarktischen Eis. Durch eine n glücklichen Zufall konnte das IceCube Neutrino Observatory\, ein Kubik kilometer großer Detektor aus instrumentiertem Eis\, am 22. September 20 17 eine Lichtspur aufzeichnen\, die direkt zur Quelle zurück zeigte. Dam it konnte erstmals ein bekanntes astrophysikalisches Objekt mit dem Ursp rung eines kosmischen Neutrinos assoziert werden und das Ereignis IceCub e-170922A schrieb Geschichte. Ein näherer Blick auf die während 2014-201 5 gesammelten Daten zeigte\, dass die Neutrino-Emission von TXS0506+056 phasenweise erhöht ist. Dies unterstützt die These\, dass das Ereignis v on 2017 tatsächlich dem Blazar zugeordnet werden kann und die Entdeckung wurde zu einem großer Erfolg für die Multi-Messenger Astrophysik. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9664.htm l SUMMARY:Kosmische Teilchenbeschleuniger und ihre Spuren in der Antarktis - Anni LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T141000 DTSTAMP;VALUE=DATE-TIME:20190108T211531Z UID:c293b397-9fad-45ff-9ffe-716503c6c095@frab.cccv.de DESCRIPTION:There is four times more dark matter and over fifteen times m ore dark energy than regular matter in the universe. And we have absolut ely no idea what these invisible dark substances might be. This talk wil l show how we know that dark energy and dark matter exist\, although we cannot see them directly. This kind of reverse enigneering of the univer se already revealed some interesting features of the dark parts. However \, the true nature of dark matter and dark energy are literally in the d ark. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9925.htm l SUMMARY:Let's reverse engineer the Universe - Sara Konrad LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T125000 DTSTAMP;VALUE=DATE-TIME:20190102T115332Z UID:9d8d4506-03b2-483d-aee5-d106f0a3eef5@frab.cccv.de DESCRIPTION:While a lot of projects are currently developing their own pr ocessors\, mostly as open source in Verilog\, VHDL or even Chisel\, we m iss the free process that actually manufactures these chips. So we're de veloping the "Libre Silicon" project\, a portable semiconductor manufact uring process and technology\, using only free and open source tools: We would like to introduce the project\, who we are\, what we are doing an d where we are now. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9410.htm l SUMMARY:LibreSilicon - leviathan\, hsank\, Andreas Westerwick LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T113000 DTSTAMP;VALUE=DATE-TIME:20181230T140039Z UID:e96ff77d-7247-48a8-839b-554ee37328d6@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9566.htm l SUMMARY:Lightning Talks Day 2 - gedsic\, bigalex LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T113000 DTSTAMP;VALUE=DATE-TIME:20181230T140019Z UID:ed525209-a9e5-4082-810a-3bd466ca8ca0@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9567.htm l SUMMARY:Lightning Talks Day 3 - gedsic\, bigalex LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T113000 DTSTAMP;VALUE=DATE-TIME:20190101T184534Z UID:8580bb67-f3f8-4978-aba8-abad02ecceec@frab.cccv.de DESCRIPTION:Lightning Talks are short lectures (almost) any congress part icipant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program\, system or technique! Pitch yo ur projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring\, make it quick! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9568.htm l SUMMARY:Lightning Talks Day 4 - gedsic\, bigalex LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T121000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T113000 DTSTAMP;VALUE=DATE-TIME:20190115T144819Z UID:e9095f5f-a38a-48da-b3d7-20da141b8b14@frab.cccv.de DESCRIPTION:Restricting access to knowledge and science is not beneficial for society. So why are scientific results still locked up behind paywa lls? Even though the answer to this question is enlightening\, the story is quickly told. Much more important is the knowledge on how to change this. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9599.htm l SUMMARY:Locked up science - Claudia Frick - @FuzzyLeapfrog LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T165000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T161000 DTSTAMP;VALUE=DATE-TIME:20190117T141517Z UID:e77ef54a-5dd7-4be1-80c7-42726b273e6f@frab.cccv.de DESCRIPTION:Matrix is an open standard for communication over the Interne t. I will talk about the matrix standard\, both the technical implementa tion and the reasons for its creation. We will focus on the changes and progress that has been made in the previous year\, particularly getting the specification out of beta\, and the growth of the ecosystem. Finally \, the Matrix environment continues to develop\, and we’ll look at the r oadmap for the future. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9400.htm l SUMMARY:Matrix\, the current status and year to date - Ben Parsons from M atrix LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T215000 DTSTAMP;VALUE=DATE-TIME:20181230T222514Z UID:70b257cc-d26a-4044-b95e-5d3e6d8c7597@frab.cccv.de DESCRIPTION:Visual culture dominates our societies\, every day encouragin g and rewarding corporations and their users to create more visual conte nt to populate their digital spaces and build their digital lives. But w hat if there was an unseen method of disruption to these powers? What ca n we learn from the blind and their increased awareness of sound and vib ration to disrupt and circumvent these powers without detection? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9993.htm l SUMMARY:Media Disruption Led By The Blind - Sabio LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T185000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T181000 DTSTAMP;VALUE=DATE-TIME:20190104T153451Z UID:020051ff-2594-46ce-b92a-0786743e4624@frab.cccv.de DESCRIPTION:Reverse Engineering zum Aufspüren von Schwachstellen ist gäng ige Praxis. Umso überraschender kam für 2 Forschungsteams die Abmahnung durch Rechtsanwälte eines Herstellers. Sie hatten Schwachstellen aufgede ckt und damit\, so der Hersteller\, seine Rechte verletzt. Vorwurf? Vom Verstoß gegen das Urheberrecht bis zum Verrat von Geschäftsgeheimnissen war alles dabei.\nNach hunderten Seiten an Schriftsätzen\, einem zurückg ehaltenen Paper sowie 7 Stunden Marathon-Prozess konnte ein Vergleich ge schlossen werden\, bei dem wir mit einer Verpflichtung zum Responsible D isclosure davon kamen - die Kernfragen bleiben jedoch offen: Welche Teil e des Reverse Engineering sind rechtswidrig? Verstößt Reversing auch zum Zwecke der IT-Sicherheitsforschung gegen das Urheberrechtsgesetz? Was s chützt in Zukunft Sicherheitsforscher vor rechtlichen Schritten des Hers tellers? Wie können sich Unternehmen verhalten und welche Abwägungen müs sen vor der Veröffentlichung getroffen werden? \nWir berichten vom Ablau f eines solchen Prozesses inklusive Anekdoten\, weisen auf die Unklarhei ten in geltendem Recht hin und schaffen ein Bewusstsein für die Problema tik. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9898.htm l SUMMARY:Mehr schlecht als Recht: Grauzone Sicherheitsforschung - domenukk \, Fabian Franzen LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T013000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTAMP;VALUE=DATE-TIME:20190114T181408Z UID:72c63924-b94d-4c83-b986-9e3e95ae91c0@frab.cccv.de DESCRIPTION:Bei der Europawahl 2014 wurde ich als Spitzenkandidat der Par tei für Arbeit\, Rechtsstaat\, Tierschutz\, Elitenförderung und basisdem okratische Initiative in das Europäische Parlament gewählt. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10038.ht ml SUMMARY:Meine Abenteuer im EU-Parlament - Martin Sonneborn LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T173000 DTSTAMP;VALUE=DATE-TIME:20190106T045656Z UID:83bf042d-7382-4975-a3f8-92229944b8fc@frab.cccv.de DESCRIPTION:This presentation will start off with a simple problem (how d o you clear memory that holds sensitive content). It explores numerous p ossible solutions\, and presents real live facts and figures. bugs in co mmon applications will be shown. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9788.htm l SUMMARY:Memsad - Ilja van Sprundel LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T141000 DTSTAMP;VALUE=DATE-TIME:20190103T111901Z UID:e66cded3-7336-42bd-a7c8-d77073465ad2@frab.cccv.de DESCRIPTION:MicroPython is a lean and efficient implementation of the Pyt hon 3 programming language that includes a small subset of the Python st andard library and is optimised to run on microcontrollers and in constr ained environments.We have analyzed the hardware full-disk encryption impleme ntation of several Self-Encrypting Drives (SEDs) from Samsung and Crucia l (Micron) by reverse engineering their firmwares. The vendors combined cover a majority of the market share of SEDs sold today.
\n\nIn th eory\, the security guarantees offered by hardware encryption are simila r to those of software implementations. In reality\, we found that many hardware implementations have critical security weaknesses\, for many mo dels allowing for complete recovery of the data without knowledge of any secret.
\n\nBitLocker\, the encryption software built into Micros oft Windows will rely exclusively on hardware full-disk encryption if th e drive advertises supported for it. Thus\, for these drives\, data prot ected by BitLocker is also compromised.
\n\nThis challenges the vi ew that full-disk encryption implemented in hardware is preferable over software. We conclude that one should not rely solely on hardware encryp tion offered by SEDs.
URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9671.htm l SUMMARY:Self-encrypting deception - Carlo Meijer LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T141000 DTSTAMP;VALUE=DATE-TIME:20190113T224818Z UID:ef9c53e5-b01b-431a-b141-9218f79b6c5a@frab.cccv.de DESCRIPTION:Learn to see the world without your eyes. Wonder what it's li ke to navigate while blind? Want to learn to use your everyday senses in ways you don't know you don't know? In this talk\, I hack you with permanently enhanced sensory perceptions. \n\nThis is very particip atory\, not just "sit and listen"\, and workshops are even more hands-on (blindfolded w/ cane in hand).\n\nWorkshop & volunteer signup: https://s.ai/ccc/ws\nTag plz: #BlindNavigation @saizai #35c3 URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9414.htm l SUMMARY:Sense without sight: a crash course on #BlindNavigation - Sai LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T141000 DTSTAMP;VALUE=DATE-TIME:20190105T183323Z UID:6a5007f4-e7d6-4c63-9a10-26dd48a6eb6c@frab.cccv.de DESCRIPTION:Meet SiliVaccine – North Korea's national Anti-Virus solution . SiliVaccine is deployed widely and exclusively in the DPRK\, and has b een continuously in development by dedicated government teams for over f ifteen years. When we heard of this strange software\, we were immediate ly driven to investigate it: it's not every day that you can catch a gli mpse of the malware landscape inside the closed garden of the DPRK's int ranet.\n\nIn this talk\, we will describe how we were able to obtain a r are copy of SiliVaccine\; how we reverse-engineered it\, despite the hai r-tearing obstacles\; and what surprising discoveries we made about its program architecture – all the way down to the file scanning engine\, th e system level drivers\, the user mode utilities\, and the most bizarre and puzzling implementation details. As it turns out\, there is plenty g oing on behind the scenes of this product\, away from the public eye.\n\ nHow was SiliVaccine created? Who created it? What was the game plan? We will try to shed light on these questions\, and on the sheer effort tha t must have gone into developing this product. If there is anything we l earned from this research\, it's that DPRK state-sponsored software is a secretive industry underlied by incredibly shady practices\, and that i f Kim Jong-Un sends you a free trial of his latest security solution\, t he correct answer is "thank you but no thank you".\n\nDisclaimer: No sig nificant knowledge in reverse engineering is required to understand the talk. We break down our thought process and methodology to its very basi cs\, so that this talk can relate to both technical and non-technical au diences.\n\nAnother Disclaimer: We guarantee an entertaining talk. :) URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9375.htm l SUMMARY:SiliVaccine: North Korea's Weapon of Mass Detection - Mark Lechti k LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T221000 DTSTAMP;VALUE=DATE-TIME:20190115T225455Z UID:3d5774f7-7f42-40bb-a318-4a2c6357dd9b@frab.cccv.de DESCRIPTION:In this talk I want to present the computational undertakings in the field of cosmological structure formation and galaxy formation. Here\, sometimes gigantic simulations help us to unravel the processes t hat led to the Universe that we can see today. I will give a short overv iew of our current understanding of the evolution of the Universe\, the history and techniques of the simulations and their current state and fu ture. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9451.htm l SUMMARY:Simulating Universes - Philipp Busch LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T173000 DTSTAMP;VALUE=DATE-TIME:20190113T211526Z UID:f58a2b6d-bde0-483b-a8db-043ea9371cb6@frab.cccv.de DESCRIPTION:GERMAN:\nMehr als 10.000 unterschiedliche Device-Hersteller a us aller Welt verwenden die Basis-Plattform (WIFI-Modul\, Cloud\, App) e ines einzigen Unternehmens zur technischen Umsetzung ihrer Smart-Home-Pr odukte.\nDie Analyse dieser Basis zeigt erhebliche Sicherheitsmängel auc h konzeptioneller Natur und somit diverse Angriffspunkte\, von denen meh rere Millionen Smart Devices betroffen sind.\nDer Vortrag stellt die Fun ktionsweise smarter Geräte im Zusammenhang mit der genannten Basis-Platt form dar\, zeigt das Ausmaß der Sicherheitslücken anhand diverser Angrif fsszenarien und bietet der Community eine Lösung für die sichere Nutzung der betroffenen Geräte.\n\nENGLISH:\nMore than 10\,000 different device manufacturers from all over the world use the basic platform (WIFI modu le\, cloud\, app) of a single company to technically implement their sma rt home products.\nThe analysis of this base shows considerable security deficiencies\, also of a conceptual nature\, and thus various points of attack\, which affects millions of smart devices.\nThe lecture will pre sent the functionality of smart devices in relation with the above-menti oned basic platform\, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9723.htm l SUMMARY:Smart Home - Smart Hack - Michael Steigerwald LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T215000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T205000 DTSTAMP;VALUE=DATE-TIME:20190105T111808Z UID:8c84a37f-a8a5-4061-bfde-8da074ea8693@frab.cccv.de DESCRIPTION:\nThis talk will present a historical narrative of the bac kground behind how the NeTV + Milkymist inspire the HDMI2USB a> then helped the NeTV2 projects and how they all became interlinked through events li ke Congress! From the study of this history\, we will attempt to distill a few core lessons learned that can hopefully be applied to other open hardware projects.\n
URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9629.htm l SUMMARY:Snakes and Rabbits - How CCC shaped an open hardware success - Ti m 'mithro' Ansell\, bunnie LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T173000 DTSTAMP;VALUE=DATE-TIME:20190103T184232Z UID:5b7f01a6-f762-4c28-961c-7f6ab2f70fb4@frab.cccv.de DESCRIPTION:Highly compartmentalized network segmentation is a long-held goal of most blue teams\, but it's notoriously hard to deploy once a sys tem has already been built. We leveraged an existing service discovery f ramework to deploy a large-scale TLS-based segmentation model that enfor ces access control while automatically learning authorization rules and staying out of the way of developers. We also did it without scheduling downtime or putting a halt to development. This talk covers how we engin eered this\, and shares lessons learned throughout the process. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9603.htm l SUMMARY:Sneaking In Network Security - Maximilian Burkhardt LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T161000 DTSTAMP;VALUE=DATE-TIME:20190115T190630Z UID:5b947f86-8ba1-4b99-adbe-7c5030deea0c@frab.cccv.de DESCRIPTION:After launching a spacecraft into orbit the actual work for m ission control starts. Besides taking care of the position and speed of the spacecraft this includes e.g. detailed modeling of the power usage\, planning of ground station contacts\, payload operations and dealing wi th unexpected anomalies. In this talk we will see many examples of probl ems particular to space crafts and how they influence the way space craf t mission operations works. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9923.htm l SUMMARY:Space Ops 101 - sven LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T171000 DTSTAMP;VALUE=DATE-TIME:20190117T101958Z UID:a5de31e6-0223-4b1f-953c-558e2fd39bd9@frab.cccv.de DESCRIPTION:Digitale Formen von Gewalt gegen Frauen sind keine eigenständ igen Phänomene\, sondern in der Regel Weiterführungen oder Ergänzungen v on anderen Gewaltformen. Stalking\, Kontrolle\, Bedrohung\, Erpressung\, Beleidigung\, Überwachung sind altbekannte Aspekte häuslicher Gewalt. F ür alle diese Phänomene gibt es digitale Entsprechungen\, allerdings ist wenig darüber bekannt\, wie oft sie ausgeübt werden\, wann und von wem. Das macht es für die Betroffenen schwer\, sich zu wehren\, auch weil Po litik und Justiz hier genauso verständnislos reagieren wie bei anderen d igitalen Entwicklungen. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10023.ht ml SUMMARY:Stalking\, Spy Apps\, Doxing: Digitale Gewalt gegen Frauen - Anne Roth LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T221000 DTSTAMP;VALUE=DATE-TIME:20190103T091616Z UID:f76415ac-d07b-4c5a-bedf-460470711712@frab.cccv.de DESCRIPTION:Der nationale Höchstleistungsrechner SuperMUC-NG unterstützt die öffentliche Wissenschaft in Deutschland. Wie ist er aufgebaut\, was kann man damit tun\, und wo steht er im Vergleich mit den schnellsten Su percomputern der Welt? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9703.htm l SUMMARY:SuperMUC-NG - Dieter Kranzlmueller LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T125000 DTSTAMP;VALUE=DATE-TIME:20190104T111510Z UID:14281f92-873c-478c-a962-f1eb8b6c15d9@frab.cccv.de DESCRIPTION:The SymbiFlow project aims to be the "GCC of FPGAs" - a fully open source toolchain supporti ng\, multiple FPGAs from different vendors. Allowing compilation from Ve rilog to bitstream without touching vendor provided tools\, it includes support for large modern FPGAs like the Lattice ECP5 and Xilinx 7 series . These FPGAs can be used for things previously out of reach of FOSS too ls\, things like high resolution video and many gigabit networking. We h ave also documented the FPGA bitstreams to allow other new tools and a p rocess for replicating this effort on new types of FPGAs! URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9631.htm l SUMMARY:SymbiFlow - Finally the GCC of FPGAs! - Tim 'mithro' Ansell LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T221000 DTSTAMP;VALUE=DATE-TIME:20190101T133617Z UID:85ec8360-737b-4ee3-be2d-d8e050b1d117@frab.cccv.de DESCRIPTION:During her talk “Tactical Embodiment\,” artist and activist A ngela Washko will present several different strategies for performing\, participating in and transforming online environments that are especiall y hostile toward women. She will introduce her long-term performative in tervention “The Council on Gender Sensitivity and Behavioral Awareness i n World of Warcraft” alongside several interventions\, interviews\, perf ormances\, written works and video games works she has created with the manosphere and online men’s seduction communities. In addition to walk ing the audience through her research\, Washko will screen excerpts from her interview with a seduction coach who has been dubbed “The Web’s Mos t Infamous Misogynist” and highlight instructional DVDs\, books\, and hi dden-camera videos created by a community of pick-up artists who teach m en how to interact with and seduce women. The talk will close with an au dience-participation based performative play-through of her most recent project “The Game: The Game\,” a dating simulator video game presenting the practices of several infamous pick-up artists. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10024.ht ml SUMMARY:Tactical Embodiment - Angela Washko LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T141000 DTSTAMP;VALUE=DATE-TIME:20190111T093632Z UID:9629fcf4-6810-48d7-bd17-d81f924e6b47@frab.cccv.de DESCRIPTION:We rely on mainstream computer engineering every day\, but it 's insanely complex\, poorly understood\, unreliable\, and\, as CCC remi nds us every year\, chronically insecure. This talk will explain some w ays that we can do better: taming parts of this this chaos with precise understanding - illustrated with disturbing facts and clean models for c urrent architectures and the C language\, from the REMS project\, and principled but pragmat ic new alternatives\, that build in more hardware and software security protection\,as developed in the CHERI project. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9647.htm l SUMMARY:Taming the Chaos: Can we build systems that actually work? - Pete r Sewell LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T141000 DTSTAMP;VALUE=DATE-TIME:20181231T193858Z UID:a35c6c71-1f67-445c-bf13-11a586dff32c@frab.cccv.de DESCRIPTION:Critical Thinking + Making = Critical Making. Around the worl d\, academics and grassroots communities alike are engaging in critical making. With roots in critical design and critical engineering\, etc.\, the point is to re-politicise making\, help people understand that it ne eds to be more than printing cheap plastic knickknacks and can be used f or activism and social innovation to improve peoples' lives. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9971.htm l SUMMARY:The Critical Making Movement - Regina M. Sipos\, Saad Chinoy\, Ri cardo Ruiz LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T185000 DTSTAMP;VALUE=DATE-TIME:20181228T183116Z UID:520b7c92-8bd1-424e-acc4-7cf15dd168a4@frab.cccv.de DESCRIPTION:The Enemy brings you face-to-face with combatants from three conflict zones: with the Maras in Salvador\, in the Democratic Republic of the Congo\, and in Israel and Palestine. Their testimonies and confes sions about their lives\, experiences\, and perspectives on war will all ow you to better understand their motivations… and their humanity. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9999.htm l SUMMARY:The Enemy - Karim Ben Khelifa LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T221000 DTSTAMP;VALUE=DATE-TIME:20190109T164741Z UID:8943659a-536d-4afb-85de-f1b8b29a7902@frab.cccv.de DESCRIPTION:Artificial Intelligence gives us a uniquely fascinating and c lear perspective at the nature of our minds and our relationship to real ity. We will discuss perception\, mental representation\, agency\, consc iousness\, selfhood\, and how they can arise in a computational system\, like our brain. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10030.ht ml SUMMARY:The Ghost in the Machine - Joscha LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T231000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T221000 DTSTAMP;VALUE=DATE-TIME:20190116T172042Z UID:9f8b19eb-31cb-4250-80d4-5caf4e0b33dd@frab.cccv.de DESCRIPTION:There's a certain allure to zero-day exploits. At the apex of the security industry\, these elusive technologies are engineered by a persistent few to open doors of software systems that were never meant t o exist. We go behind-the-scenes to provide an inside look at the zero-d ay development lifecycle\, breaking common misconceptions regarding this increasingly difficult tradecraft. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9979.htm l SUMMARY:The Layman's Guide to Zero-Day Engineering - Markus Gaasedelen\, Amy (itszn) LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T191000 DTSTAMP;VALUE=DATE-TIME:20190108T214956Z UID:94447a62-a3ba-4f6d-a3b7-b5318a954651@frab.cccv.de DESCRIPTION:Mars Rover Curiosity is one of the most sophisticated pieces of hardware ever launched into space. Because of the communication delay from Earth to Mars\, it needs to accomplish most of its tasks completel y autonomously: landing\, navigation\, exploration and singing birthday songs to itself. To do all this\, it only has one central onboard comput er. Let's look at that computer and the software it runs in detail. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9783.htm l SUMMARY:The Mars Rover On-board Computer - breakthesystem LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T113000 DTSTAMP;VALUE=DATE-TIME:20190111T202403Z UID:9dde571b-4d49-4b44-8329-42e354bcc24b@frab.cccv.de DESCRIPTION:The combination of the ongoing technological revolution\, glo balisation and what are usually called 'neo-liberal' economic policies h as generated a global system of rentier capitalism in which property rig hts have supplanted free market principles and in which a new global cla ss structure has taken shape. The 20th century income distribution syste m has broken down irretrievably\, and a new mass class\, the precariat h as been growing dramatically fast in every part of the world. What are t he deeper reasons for these developments? How does an ecologically susta inable strategy look like? Is it possible to restore a balanced market e conomy in which inequalities and insecurities will lessen and in which t he drift to populist and even neo-fascist politics will be reversed? Thi s talk will try to provide answers. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10021.ht ml SUMMARY:The Precariat: A Disruptive Class for Disruptive Times. - Guy Sta nding LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T123000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T113000 DTSTAMP;VALUE=DATE-TIME:20190106T121632Z UID:c0e4f528-92c7-4170-aff3-d4dd5cd74b2c@frab.cccv.de DESCRIPTION:Since a few months we have a new version of TLS\, the most im portant encryption protocol on the Internet. From the vulnerabilities th at created the need of a new TLS version to the challenges of deploying it due to broken devices this talk will give an overview of the new TLS 1.3. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9607.htm l SUMMARY:The Rocky Road to TLS 1.3 and better Internet Encryption - hanno LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T161000 DTSTAMP;VALUE=DATE-TIME:20181231T213920Z UID:513a2aeb-79b0-4222-ba5e-09d1d9057122@frab.cccv.de DESCRIPTION:An update on the circumstances of the Snowden Refugees will b e provided at the 35C3 event and venue in December 2018. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9791.htm l SUMMARY:The Surveillance State limited by acts of courage and conscience - Robert Tibbo LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T125000 DTSTAMP;VALUE=DATE-TIME:20190101T133731Z UID:8cbe8908-4040-402f-93b5-5a4a64cf6f09@frab.cccv.de DESCRIPTION:This talk will engage the practises and protocols of hacking in the context of Hong Kong\, drawing parallels from the stigmergic resp onses of the city (consensus network organisation) and the peer-producti on (or attempt) of the hackerspace\, Dim Sum Labs.\n\nPerspectives on th is will also draw from the publication\, The Field Guide to Hacking (_TF GTH)\, a collection of (project and essay) snapshots generated from the hackerspace and its surrounding community. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9762.htm l SUMMARY:The Urban Organism - mp_ttaa LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T233000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T225000 DTSTAMP;VALUE=DATE-TIME:20181230T185648Z UID:51bb6adc-c0e7-4675-8f93-cf0e2dbd9587@frab.cccv.de DESCRIPTION:When you're fighting for a cause\, you need tools that reflec t your values. While venture capital-backed tools are seductive\, especi ally at the beginning of your movement\, they can be harmful in the long -term. This session shows how co-operatively owned\, non-hierarchically built Free and Open Source Software (FOSS) provides a more sustainable\, and equitable\, solution. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9882.htm l SUMMARY:The foodsaving grassroots movement - Tilmann Becker\, Nick sellen \, Janina Abels LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T173000 DTSTAMP;VALUE=DATE-TIME:20190104T111638Z UID:622c9585-e332-4915-a9ac-987a34da4d14@frab.cccv.de DESCRIPTION:What's been good\, exciting\, spooky and challenging in art a nd science/technology over this past year. With a short incursion into t he ugly because even artists have the right to be awful.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9998.htm l SUMMARY:The good\, the strange and the ugly in 2018 art &tech - Régine D ebatty LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T141000 DTSTAMP;VALUE=DATE-TIME:20190104T111524Z UID:a24c67d2-9cad-41a5-ada4-eff706d29920@frab.cccv.de DESCRIPTION:Project IceStorm provides the first end-to-end open source FP GA toolchain\, was originally presented at 32c3\, and only targetted Lat tice iCE40 FPGAs. nextpnr is the next big step for open source FPGA tool s\, providing a retargetable open source FPGA place-and-route tool that will enable open source flows for many different FPGAs from many differe nt vendors. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9612.htm l SUMMARY:The nextpnr FOSS FPGA place-and-route tool - Clifford Wolf LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T233000 DTSTAMP;VALUE=DATE-TIME:20190109T172038Z UID:bc545b26-8319-43fb-abc2-f624ef414ee8@frab.cccv.de DESCRIPTION: The world is finally catching on to the urgency\n of deplo ying post-quantum cryptography:\n cryptography designed to survive atta cks by quantum computers.\n NIST's post-quantum competition is in full swing\,\n and network protocols are exploring post-quantum extensions.\ n This talk will take the audience on a journey\n through selected rec ent highlights\n from the post-quantum world. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9926.htm l SUMMARY:The year in post-quantum crypto - djb\, Tanja Lange LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T161000 DTSTAMP;VALUE=DATE-TIME:20181230T171831Z UID:663a4b68-bb0d-493d-826c-07c609883b86@frab.cccv.de DESCRIPTION:Seit 2010 ist die Sehnsucht des Schauspiel Dortmund\, ein geg enwärtiges und wagemutiges Schauspiel für ein Publikum des 21. Jahrhunde rts zu schaffen\, ein Volkstheater für die Digitale Moderne. Intendant K ay Voges\, Videokünstler Mario Simon und Engineer Lucas Pleß berichten ü ber Dortmunder Theaterarbeiten zum Menschsein im Digitalen Zeitalter\, s peziell über die Stückentwicklung "Die Parallelwelt"\, die im September 2018 am Berliner Ensemble und am Schauspiel Dortmund gleichzeitig Premie re hatte\, sowie über die "Akademie für Digitalität und Theater"\, die 2 020 in Dortmund gegründet werden soll. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10039.ht ml SUMMARY:Theater und Quantenzeitalter - Kay Voges\, Mario Simon\, Lucas Pl eß LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T135000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T125000 DTSTAMP;VALUE=DATE-TIME:20190110T202825Z UID:6d23f2dc-988a-4877-a6e5-3a43ea6dc8bb@frab.cccv.de DESCRIPTION:The meeting point of art and science as a place of inspiratio n\, exchange of knowledge and creation is the main focal point of the ta lk. Together with Prof. Oliver Deussen\, the PhD candidate Marvin Guelzo w\, and Liat Grayver we will discuss both the technical challenges and i nnovation aspects in the development of the e-David robot\, alongside th e the social and artistic practice its offers. Topics as such “paradigm s of creativity” under the title “New Materialism / Anthropocentrism / P osthumanism” will be presented with the goal to position and understand machine-assisted creative interfaces within the broader field of media a rt and painting traditions. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10012.ht ml SUMMARY:Transhuman Expression - Liat_Grayver LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T191000 DTSTAMP;VALUE=DATE-TIME:20181230T195330Z UID:ffdc92f3-1a39-4931-9409-f8bfabe9f628@frab.cccv.de DESCRIPTION:TCP/IP is the most widely used protocol on the Internet for t ransmitting data. But how does it work in detail? This talk will explain the TCP protocol\, from handshake over established to teardown in detai l - and elaborate a bit on protocol adjustments over time and congestion control. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9675.htm l SUMMARY:Transmission Control Protocol - Hannes Mehnert LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T175000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T171000 DTSTAMP;VALUE=DATE-TIME:20190106T110739Z UID:240fe8a1-ee33-4f07-88d0-34b8bb04db71@frab.cccv.de DESCRIPTION:Pursuit of “good customers’ experience“ not only leads to new customers\, but also attract criminals of all sorts. Presentation will give overview of current security situation of ATMs with different auxil iary devices allowing cardless transactions. Cardless is new sexy for cr iminals. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9761.htm l SUMMARY:Truly cardless: Jackpotting an ATM using auxiliary devices. - Olg a Kochetova\, Alexey Osipov LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T151000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T143000 DTSTAMP;VALUE=DATE-TIME:20190107T201948Z UID:65563dfd-db48-41ea-85a9-e889dd673d09@frab.cccv.de DESCRIPTION:Als Organisation für Menschenrechtsbeobachtungen geben wir Eu ch einen Überblick der aktuellen Entwicklungen an der EU-Außengrenze auf dem Mittelmeer. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9909.htm l SUMMARY:Updates von der europäischen Außengrenze - Nico\, Nina Gassmann LOCATION:Dijkstra END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T191000 DTSTAMP;VALUE=DATE-TIME:20190114T180059Z UID:ea7c532f-cc2d-4cb1-8f15-1933df7fd523@frab.cccv.de DESCRIPTION:Die Venenerkennung ist eine der letzten Bastionen biometrisch er Systeme\, die sich bisher der Eroberung durch Hacker widersetzt hat. Dabei ist sie ein lohnendes Ziel\, schützt sie doch Bankautomaten und Ho chsicherheitsbereiche. In diesem Talk machen wir die Verteidigungsanlage n dem Erdboden gleich. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9545.htm l SUMMARY:Venenerkennung hacken - starbug\, Julian LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T161000 DTSTAMP;VALUE=DATE-TIME:20190114T175924Z UID:23e85d7a-9645-4ae2-9954-63b71abc08d4@frab.cccv.de DESCRIPTION:Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner Wohnungstür. Was solltest du bis dahin getan haben und was sollt est du jetzt tun? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10018.ht ml SUMMARY:Verhalten bei Hausdurchsuchungen - qbi\, Kristin Pietrzyk LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T161000 DTSTAMP;VALUE=DATE-TIME:20190104T194241Z UID:7228f88d-8d6f-40a9-a5dd-b5c91b823ada@frab.cccv.de DESCRIPTION:Since its release in 2012\, the PlayStation Vita has remained one of the most secure consumer devices on the market. We will describe the defenses and mitigations that it got right as well as insights into how we finally defeated it. The talk will be broken into two segments: software and hardware. First\, we will give some background on the propr ietary security co-processor we deem F00D\, how it works\, and what we h ad to do to reverse an architecture with minimal public information. Nex t\, we will talk about hardware attacks on a real world secure hardware and detail the setup process and the attacks we were able to carry out. This talk assumes no prior knowledge in hardware and a basic background in system software. Focus will be on the methods and techniques we've de veloped along the way. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9364.htm l SUMMARY:Viva la Vita Vida - Yifan Lu\, Davee LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T223000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T215000 DTSTAMP;VALUE=DATE-TIME:20190107T122310Z UID:86b96f3f-a6b5-49c0-a189-69912c016916@frab.cccv.de DESCRIPTION:There are multiple different ways to store cryptocurrency sec ret keys. This talk will investigate advantages and disadvantages of dif ferent methods with regards to cryptographic backdoors known as kleptogr ams. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9492.htm l SUMMARY:Wallet Security - Stephan Verbücheln LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T195000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T185000 DTSTAMP;VALUE=DATE-TIME:20190114T181810Z UID:2d71612c-7f40-484b-a939-10b809aedd80@frab.cccv.de DESCRIPTION:Beim Datenschutz geht es mitnichten um Privatsphäre\, um das eigene Schlafzimmer oder um das Teilen privater Daten bei Facebook. Es g eht gleichermaßen um den Erhalt einer demokratischen Gesellschaftsordnun g wie um den Erhalt individueller Handlungsalternativen im digitalen Zei talter. Wir dürfen also nicht so sehr über Einzelpersonen und ihre höchs t subjektiven Privatheitswünsche sprechen\, sondern viel mehr von Machta symmetrien\, Durchsetzungsmacht\, sowie „starken“ und „schwachen“ Akteur en. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9733.htm l SUMMARY:Was schützt eigentlich der Datenschutz? - Rainer Rehak LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T185000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T181000 DTSTAMP;VALUE=DATE-TIME:20190120T182313Z UID:955e9c12-cd90-4f48-88f0-b879269a5421@frab.cccv.de DESCRIPTION:A cryptojacking website abuses the computing resources of its visitors to covertly mine for cryptocurrencies in the browser. In this talk\, we explore this phenomenon and answer\, amongst others\, the foll owing questions: How does the mining script work under the hood? How com mon is this attack? How much money do the attackers earn? And how can I defend myself against such attacks? URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9483.htm l SUMMARY:Web-based Cryptojacking in the Wild - Marius Musch LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T213000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T205000 DTSTAMP;VALUE=DATE-TIME:20190116T223736Z UID:42650545-4394-4455-a5f5-9efad111fedc@frab.cccv.de DESCRIPTION:We all know what FAX is\, and for some strange reason most of us need to use it from time to time. Hard to believe its 2018\, right?\ n\nBut can FAX be something more than a bureaucratic burden? Can it actu ally be a catastrophic security hole that may be used to compromise your entire network? Come watch our talk and find out … URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9462.htm l SUMMARY:What The Fax?! - Yaniv Balmas\, Eyal Itkin LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T233000 DTSTAMP;VALUE=DATE-TIME:20181228T225620Z UID:3e75c48f-3a58-4afe-bafb-0670dd2b15cc@frab.cccv.de DESCRIPTION:The last years\, we all have felt the impact of applying tech nologies like machine learning\, social networks and data-driven decisio n making on a massive scale to our societies. Yet all that technology ha s been developed by engineers like us. It's become clear that we have to do more than chase the ever evolving technological challenges and start to assume responsibility for our creations - or we too will wake up one day to the realization that technology we helped develop has done more harm than good. \nWe want to present practical\, every day guidelines an d principles that can help engineers and organizations to build technolo gy that not only serves the application and business purpose\, but also minimizes negative long-term effects on society and the people that use it. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9965.htm l SUMMARY:What is Good Technology? - Yann Leretaille LOCATION:Clarke END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T121000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T113000 DTSTAMP;VALUE=DATE-TIME:20190105T022819Z UID:54c671a2-1803-4085-a923-a875ca11723a@frab.cccv.de DESCRIPTION:Every year since 2011 on the 28C3 we organize a Capture the F lag contest for people on the Congress and from all over the world. This year we want to give you an overview about what a CTF is\, the challeng es\, the players\, the community and how much fun it is to play (not onl y our) CTF. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9989.htm l SUMMARY:What the flag is CTF? - Andy LOCATION:Adams END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T171000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181228T161000 DTSTAMP;VALUE=DATE-TIME:20181230T131950Z UID:3ff227f1-93cc-4a1d-8f0e-68fc12aea2c9@frab.cccv.de DESCRIPTION:The internet has become essential services\, and offline meth ods of sharing data are rapidly disappearing. Other possible networks a re often better suited when connectivity is not available or affordable. Radios\, sensors\, and computing are available in the cheapest of smar tphones and routers. Wind is integrating nearby/offline data exchange w ith the internet services that we all rely on.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9595.htm l SUMMARY:Wind: Off-Grid Services for Everyday People - Hans-Christoph Stei ner LOCATION:Eliza END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T183000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181227T173000 DTSTAMP;VALUE=DATE-TIME:20190120T182305Z UID:a42e5a4f-fd9b-4571-bf17-483978afecb3@frab.cccv.de DESCRIPTION:In this presentation we will take a look at how to break the most popular cryptocurrency hardware wallets. We will uncover architectu ral\, physical\, hardware\, software and firmware vulnerabilities we fou nd including issues that could allow a malicious attacker to gain access to the funds of the wallet. The attacks that we perform against the har dware wallets range from breaking the proprietary bootloader protection\ , to breaking the web interfaces used to interact with wallets\, up to p hysical attacks including glitching to bypass the security implemented i n the IC of the wallet. Our broad look into several wallets demonstrates systemic and recurring issues. We provide some insight into what needs to change to build more resilient hardware wallets.\n URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9563.htm l SUMMARY:wallet.fail - Thomas Roth\, Dmitry Nedospasov\, Josh Datko LOCATION:Borg END:VEVENT BEGIN:VEVENT DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20181230T003000 DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20181229T235000 DTSTAMP;VALUE=DATE-TIME:20190101T180538Z UID:13d40859-635a-49e6-91bd-0f64bfcfe64c@frab.cccv.de DESCRIPTION:In Österreich regiert seit einem Jahr eine Koalition aus der rechtskonservativen ÖVP und der rechtsextremen FPÖ. Eine ihrer ersten Ma ßnahmen war eine vollkommen überzogene Verschärfung von Überwachungsbefu gnissen: Bundestrojaner\, Anlassdatenspeicherung\, verstärkte Videoüberw achung\, Straßenüberwachung. Registrierungspflicht für SIM-Karten\, etc. Zugleich wurde versucht\, die Datenschutzgrundverordnung (DSGVO) zu unt ergraben. Betroffenenrechte wurden ausgeschlossen\, weite Ausnahmen gesc haffen und Strafen sollen am besten gleich gar nicht angewendet werden. In diesem Talk geben wir ein Update über die netzpolitische Lage in Öste rreich. URL:https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9680.htm l SUMMARY:Österreich: Überwachungsstaat oder doch nur Digitalisierung für A nfänger? - Thomas Lohninger\, Angelika Adensamer LOCATION:Dijkstra END:VEVENT END:VCALENDAR