Version mkdir
Events
Friday
11:00
11:30
Security Track Keynote
Ada
(en)
How Betrusted Aims to Close the Hardware TOCTOU Gap
Clarke
(en)
Reducing carbon footprint of network services with MirageOS unikernels
Dijkstra
(en)
12:50
Humanitäre Hilfe zwischen Propaganda, Information und Spendenwerbung
Borg
(de)
Everything about the Archimedes computer (with zero 'Eureka!' jokes)
Dijkstra
(en)
Einblicke in die Forschung und Ausblick in die Umweltzertifizierung!
Clarke
(de)
Spoiler: Apple is bad at patching
Eliza
(en)
14:10
Gesellschaftlicher Wandel in den Reden im Bundestag
Borg
(de)
An open source project for education, research and tinkering
Eliza
(en)
Wohin eigentlich mit all der erneuerbaren Energie?
Clarke
(de)
Exploring a new attack surface on the 3DS
Dijkstra
(en)
16:10
Pleiten, Pech und Pannen in der Zahlungsdiensteregulierung
Dijkstra
(de)
Breaking PDF Encryption and PDF Signatures
Borg
(en)
17:30
David Graeber
Borg
()
Fables from building a startup in Silicon Valley
Eliza
(en)
The Science Behind Climate Reports
Dijkstra
(en)
18:50
A review of the best art & tech projects from 2019. With a focus on e-waste
Clarke
(en)
Understanding the ME at the OS and hardware level
Borg
(en)
20:50
Von Handyauswertung, intelligenten Grenzen und Datentöpfen
Clarke
(de)
From Unanimity to Anonymity
Ada
(en)
show + tell
Eliza
(de)
What we can and need to change to keep climate change low - the scientist view
Dijkstra
(en)
Breaking Out of a Sandboxed Virtual Machine
Borg
(en)
22:10
Looking back at the perhaps most dramatic instance of hacking of the 1980s and the role it had in shaping the public image of the CCC.
Clarke
(en)
Was müssen Medizinproduktehersteller einhalten (und was nicht)?
Dijkstra
(de)
Ein nicht nuklearer Blick auf das Ende der Welt
Eliza
(de)
22:30
23:30
Decoding The Cultures of Hacking One Video at a Time
Eliza
(en)
Wie die radikale Rechte (ihre) Politik gamifiziert
Clarke
(de)
How thousands of Facebook, You Tube and Instagram pages benefited from purchased likes and how we reverse engineered facebooks user IDs
Borg
(en)
--Gaining code execution using a malicious SQLite database
Dijkstra
(en)
00:50
Zahlenraten für Geeks
Ada
(de)
Saturday
11:30
Wie gründe ich einen Betriebsrat, bevor die Kacke dampft?
Eliza
(de)
Die Luftschnittstelle und das Core im Wandel der Zahlen
Ada
(de)
A security study of turbine control systems in power generation
Dijkstra
(en)
12:50
How to understand the environmental impact of the digital products you build, and take measurable steps to “green your stack”
Clarke
(en)
Featuring the shortest movies and the largest lasers
Eliza
(en)
Reducing the attack surface with pure embedded Go.
Dijkstra
(en)
Signal overshadowing attack on LTE and its applications
Ada
(en)
14:10
E-ID, E-Voting, Netzsperren und andere netzpolitische Schauplätze
Eliza
(de)
Hardware attacks on the latest generation of ARM Cortex-M processors.
Dijkstra
(en)
Wie lange kann es so weitergehen?
Ada
(de)
Attacks against privacy-preserving systems
Clarke
(en)
Können wir Software bauen, die nützlich /und/ unbedenklich ist?
Borg
(de)
16:10
Challenges for distributed and decentralized technology from the perspective of Signal development
Ada
(en)
Schule schwänzen für das Klima
Clarke
(de)
Psychedelic Therapy as a fundamentally new approach to mental health issues
Borg
(en)
17:10
Jahresrückblick 2019
Clarke
(de)
Cybercrime-Ermittlungen: Vorsicht vor der Polizei! Oder: Nicht im falschen Forum posten
Borg
(de)
18:10
How an agency implements Fortress Europe by degrading Non-Europeans to second-rate people
Eliza
(en)
The environmental costs of digital industry and pathways to sustainability
Clarke
(en)
Taking a look at a covert CIA virtual fencing solution
Ada
(en)
19:10
The Sound of Surveillance
Eliza
(en)
Break Isolation and Sandbox in the Instant Apps
Clarke
(en)
20:50
Mediterranean Migration Monologues
Dijkstra
(de)
How to understand this historic challenge and what we can do to defend ourselves
Clarke
(en)
Military warheads as a source of nuclear fuel
Borg
(de)
22:10
A rough guide to over-regulating free speech with anti-terrorist measures
Eliza
(en)
Be prepared for the coming Digital Winter. And play Impossible Mission.
Clarke
(en)
23:30
Lesung des öffentlichen Sourcecodes
Eliza
(de)
Leaking Your Recent Memory Operations on Intel CPUs
Ada
(en)
3 different RCE vulnerabilities on Ruckus Wireless access points devices.
Dijkstra
(en)
Uncovering and assessing a second authentication mechanism in modern vehicle immobilization systems
Borg
(en)
00:50
Sunday
11:30
Von E-Bikes in der Connected Mobility zur Entstehung eines nachhaltigen Open-Source-E-Bike-Projekts
Dijkstra
(de)
Conservation Genomics between Taxonomy, Big Data, Statistics and IT-Security
Eliza
(en)
12:50
Eine erste Bilanz
Ada
(de)
Evolve your hack into robust software!
Dijkstra
(en)
where artifacts come from, and how constructive math may help
Eliza
(en)
14:10
Warum wir zivilen Ungehorsam und Subversion mehr brauchen denn je
Ada
(de)
How to convert standard wifi dongles into digital broadcast transmitters
Dijkstra
(en)
Open Soil Research
Eliza
(en)
An introduction without maths
Borg
(en)
When SPF is not enough
Clarke
(en)
16:10
Mit künstlicher Intelligenz zu neuer Kunst zum kybernetischen Verstand
Dijkstra
(de)
Rechtsbrüche beim Export von Überwachungssoftware
Ada
(de)
An introduction to quantum computing and a review of the progress we made in the last 5 years.
Borg
(en)
17:30
Whistleblowers and the Cases of The Snowden Refugees and Edward Snowden
Ada
(en)
DECT is korrekt.
Dijkstra
(de)
18:50
Social, artistic & theoretical experiments with decentralized festivals
Eliza
(en)
The Not-So Secret Data Sharing Practices Of Menstruation Apps
Clarke
(en)
How simulations help us understand the Universe
Dijkstra
(en)
Underestimating the dangers of designing a protection system
Ada
(en)
Auditing Boot Loaders by Example
Borg
(en)
20:50
(Eine Gemeinschaftsproduktion der Haecksen, der tuwat-Gruppe Bildung und Chaos Siegen)
Eliza
(de)
War alles schon mal besser
Borg
(de)
Warum unser Web nachhaltiger werden muss und wie wir das anstellen!
Clarke
(de)
Human agreements, comunication infrastructures, services in Campi Aperti, Bologna, Italy
Dijkstra
(en)
21:50
Graffiti in the ruins of the feed and the party-info-capital is emigrating
Eliza
(en)
Egypt's Civil Society Under Attack
Dijkstra
(en)
Früher war mehr Schnee
Borg
(de)
Don't ask what you can do for TPMs, Ask what TPMs can do for you
Clarke
(en)
Menschliche Faktoren der IT-Sicherheit
Ada
(de)
22:50
Strategies and tactics to ‘hack’ public spaces and social conventions
Eliza
(en)
8 Mikrokosmen, 8 Expert*innen, je 8 Minuten zu Digitalisierung und Nachhaltigkeit
Borg
(de)
EU plans to swipe our freedom of expression under the carpet
Clarke
(en)
Die Realität beim Arztbesuch nach 15 Jahren Entwicklung einer medizinischen Digitalstrategie
Ada
(de)
23:50
Status of the Net Neutrality Reform in Europe
Clarke
(en)
00:50
The sumo robot fight for the technically ungifted
Ada
(en)
Monday
11:30
Makroökonomische Auswirkungen der Digitalisierung auf den Globalen Süden
Eliza
(de)
A dive into the foundations of hardware reverse engineering and our netlist analysis framework HAL
Ada
(en)
A Tool for Analyzing the Fairness of Electronic Devices
Clarke
(en)
12:30
How to Stop the Dubious Use of Passenger Name Records by Law Enforcement
Clarke
(en)
Details about the man hunt for Julian Assange and Wikileaks
Eliza
(en)
Resilient. Trustworthy. Sustainably Open.
Dijkstra
(en)
12:50
Introduction to IC reverse engineering for non-chip-reverse-engineers.
Ada
(en)
13:30
A media-art project which automates the search for flats in Berlin and challenges automation narratives
Clarke
(en)
13:50
Governments around the world are implementing digital identity programs that don't work
Eliza
(en)
In welcher digitalen Welt werden wir leben?
Ada
(de)
14:30
15:10
Best of Informationsfreiheit
Ada
(de)
Eine industrielle Perspektive für die Lausitz?
Borg
(de)
16:10
Was Sie schon immer nicht über darüber wissen wollten wer Ihre Geräte wirklich kontrolliert.
Ada
(de)