Version mkdir

Schedule – 2019-12-28


Ada Borg Clarke Dijkstra Eliza

11:00

         
         
         
Die Luftschnittstelle und das Core im Wandel der Zahlen (de)
A security study of turbine control systems in power generation (en)
Wie gründe ich einen Betriebsrat, bevor die Kacke dampft? (de)

12:00

       
       
Signal overshadowing attack on LTE and its applications (en)
How to understand the environmental impact of the digital products you build, and take measurable steps to “green your stack” (en)
Reducing the attack surface with pure embedded Go. (en)
Featuring the shortest movies and the largest lasers (en)

13:00

         

14:00

         
Wie lange kann es so weitergehen? (de)
Können wir Software bauen, die nützlich /und/ unbedenklich ist? (de)
Attacks against privacy-preserving systems (en)
Hardware attacks on the latest generation of ARM Cortex-M processors. (en)
E-ID, E-Voting, Netzsperren und andere netzpolitische Schauplätze (de)

15:00

         
         
         
         
         

16:00

         
Challenges for distributed and decentralized technology from the perspective of Signal development (en)
Psychedelic Therapy as a fundamentally new approach to mental health issues (en)
Schule schwänzen für das Klima (de)
         

17:00

         
Cybercrime-Ermittlungen: Vorsicht vor der Polizei! Oder: Nicht im falschen Forum posten (de)
Jahresrückblick 2019 (de)
         

18:00

         
Taking a look at a covert CIA virtual fencing solution (en)
The environmental costs of digital industry and pathways to sustainability (en)
How an agency implements Fortress Europe by degrading Non-Europeans to second-rate people (en)
       

19:00

       
Break Isolation and Sandbox in the Instant Apps (en)
       

20:00

       
       
       
         
         
Military warheads as a source of nuclear fuel (de)
How to understand this historic challenge and what we can do to defend ourselves (en)
Mediterranean Migration Monologues (de)

21:00

       

22:00

       
Be prepared for the coming Digital Winter. And play Impossible Mission. (en)
A rough guide to over-regulating free speech with anti-terrorist measures (en)

23:00

       
         
Leaking Your Recent Memory Operations on Intel CPUs (en)
Uncovering and assessing a second authentication mechanism in modern vehicle immobilization systems (en)
3 different RCE vulnerabilities on Ruckus Wireless access points devices. (en)
Lesung des öffentlichen Sourcecodes (de)

00:00

         
         
       

01:00

       
       
       
       
       
         

02:00

         
         
         
         
         
         

03:00