<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.3.1+38c3. -->
<schedule>
    <generator name="pretalx" version="2024.3.1+38c3" />
    <version>1.1</version>
    <conference>
        <title>38C3</title>
        <acronym>38c3</acronym>
        <start>2024-12-27</start>
        <end>2024-12-30</end>
        <days>4</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.cccv.de</base_url>
        <logo>https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/img/logo-simple_rVUHGCc.svg</logo>
        <time_zone_name>Europe/Berlin</time_zone_name>
        
        
        <track name="Entertainment" slug="3-entertainment"  color="#4d4d4c" />
        
        <track name="Ethics, Society &amp; Politics" slug="7-ethics-society-politics"  color="#e40429" />
        
        <track name="Science" slug="5-science"  color="#00a356" />
        
        <track name="CCC" slug="2-ccc"  color="#f2f006" />
        
        <track name="Security" slug="6-security"  color="#0347b4" />
        
        <track name="Hardware &amp; Making" slug="4-hardware-making"  color="#685b9d" />
        
        <track name="Art &amp; Beauty" slug="1-art-beauty"  color="#f9b000" />
        
    </conference>
    <day index='1' date='2024-12-27' start='2024-12-27T04:00:00+01:00' end='2024-12-28T03:59:00+01:00'>
        <room name='Saal 1' guid='ba692ba3-421b-5371-8309-60acc34a3c05'>
            <event guid='270fa44c-821a-577f-8ca3-33e8d4a8c2a7' id='2'>
                <room>Saal 1</room>
                <title>38C3: Opening Ceremony</title>
                <subtitle></subtitle>
                <type>Ceremony</type>
                <date>2024-12-27T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:30</duration>
                <abstract>Glad you could make it! Take a seat and buckle up for a ride through four days of chaotic adventures.</abstract>
                <slug>38c3-2-38c3-opening-ceremony</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='461'>Gabriela Bogk</person><person id='277'>Aline Blankertz</person>
                </persons>
                <language>en</language>
                <description>This ceremony will prepare you for the 38C3 in all its glory, underground and above, hacks and trolls, art and radical ideas. Let&apos;s kick this thing off together!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HQCCYH/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HQCCYH/feedback/</feedback_url>
            </event>
            <event guid='48d32c48-214a-5387-9b87-ae7338bc181f' id='91'>
                <room>Saal 1</room>
                <title>Correctiv-Recherche &quot;Geheimplan gegen Deutschland&quot; &#8211; 1 Jahr danach</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Vor einem Jahr ver&#246;ffentlichte Correctiv die Recherche &#8220;Geheimplan gegen Deutschland&#8221;, die ein geheimes Treffen von Rechtsextremen, AfD-Funktion&#228;ren und CDU-Mitgliedern enth&#252;llte. Diese Enth&#252;llung f&#252;hrte zu massiven Demonstrationen, w&#228;hrend rechtsextreme Gruppen versuchten, das Geschehen zu relativieren. Die politische Reaktion blieb jedoch verhalten, und die AfD setzte die demokratischen Parteien weiter unter Druck. In diesem Vortrag gibt Jean Peters, leitender Reporter der Recherche, einen &#220;berblick &#252;ber die Recherchemethoden, analysiert den medialen Diskurs und zeigt zuk&#252;nftige Perspektiven zur Berichterstattung &#252;ber Rechtsextremismus auf.</abstract>
                <slug>38c3-91-correctiv-recherche-geheimplan-gegen-deutschland-1-jahr-danach</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='82'>Jean Peters</person>
                </persons>
                <language>de</language>
                <description>Vor einem Jahr enth&#252;llte Correctiv in der investigativen Recherche &quot;Geheimplan gegen Deutschland&quot; ein brisantes Treffen in Potsdam, an dem Rechtsextreme, AfD-Funktion&#228;re, CDU-Mitglieder aus unteren R&#228;ngen sowie bedeutende Geldgeber teilnahmen. Diese Ver&#246;ffentlichung schlug in der deutschen &#214;ffentlichkeit hohe Wellen und f&#252;hrte zu den gr&#246;&#223;ten Demonstrationen, die die Bundesrepublik seit ihrer Gr&#252;ndung erlebt hat. Menschen in ganz Deutschland gingen auf die Stra&#223;e, um gegen die rechtsextreme Bedrohung und die wachsende politische Einflussnahme dieser Kreise zu protestieren.

Die Rechtsextremen hingegen versuchten, die Bedeutung dieses Treffens herunterzuspielen und die Enth&#252;llungen als &#252;berzogen darzustellen. Sie bem&#252;hten sich, ihre Pl&#228;ne zu relativieren. Gleichzeitig trieb die AfD die demokratischen Parteien bei den Landtagswahlen der neuen Bundesl&#228;nder weiter vor sich her und konnte in mehreren Bundesl&#228;ndern beachtliche Wahlerfolge feiern. Die Reaktionen auf Bundesebene waren in vielen Augen entt&#228;uschend: Statt die Warnungen aus der Zivilgesellschaft und den Demonstrationen ernst zu nehmen, schien die Bundespolitik in Teilen auf AfD-freundliche Ma&#223;nahmen zu setzen.

Jean Peters, der leitende Reporter der Recherche, wird in seinem Vortrag detaillierte Einblicke in die Vorgehensweise und die Methodik der Enth&#252;llung geben. Er wird erl&#228;utern, wie Correctiv die Verbindungen zwischen den rechtsextremen Akteuren und den finanziellen Unterst&#252;tzern aufdeckte, welche Herausforderungen es nach der Recherche gab und wie das Team mit der enormen &#246;ffentlichen Resonanz umging. Zudem wird er den medialen Diskurs kritisch einordnen: Welche Rolle spielten die Medien bei der Verbreitung und der Einordnung der Informationen? Wie reagierte die &#214;ffentlichkeit auf die Berichterstattung? Und welche Konsequenzen ergaben sich daraus f&#252;r die politische Debatte in Deutschland?

Abschlie&#223;end wird Peters m&#246;gliche n&#228;chste Schritte und Ans&#228;tze f&#252;r die weitere Berichterstattung &#252;ber Rechtsextremismus und den Stand der Debatte rund um ein potenzielles AfD Verbot aufzeigen. Er wird darlegen, wie der investigative Journalismus weiterhin dazu beitragen kann, diese Netzwerke aufzudecken, und welche Hacks die Demokratie bietet, um Autoritarismus zu bek&#228;mpfen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8ZPHSP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8ZPHSP/feedback/</feedback_url>
            </event>
            <event guid='01317302-ef6d-538c-b8ee-b6d16ac4a6f5' id='50'>
                <room>Saal 1</room>
                <title>&quot;Nat&#252;rlich bin ich 18!&quot; - Alterspr&#252;fungen im Netz aus Datenschutzperspektive</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>&#8222;Um nach diesem Begriff zu suchen, dich auf dieser Website anzumelden oder dieses Video anzuschauen, halte bitte deinen Personalausweis bereit, damit wir dein Alter &#252;berpr&#252;fen k&#246;nnen.&#8220;

Solche Aufforderungen k&#246;nnten uns in Zukunft h&#228;ufiger begegnen, denn immer mehr Websites wollen unser Alter wissen. Doch woher kommt dieses Interesse und ist das eigentlich zul&#228;ssig? Gemeinsam setzen wir die Datenschutzbrille auf und gehen folgenden Fragen auf den Grund: Welche Methoden der Alterspr&#252;fung gibt es und wie funktionieren sie? K&#246;nnen oder sollten Methoden der Alterspr&#252;fungen eingesetzt werden und gibt es F&#228;lle, in denen sie sogar eingesetzt werden m&#252;ssen? Sind Datenschutz und Kinderschutz tats&#228;chlich Gegens&#228;tze oder haben sie doch mehr gemeinsam, als oft vermutet wird? Und was sagt eigentlich die Bundesbeauftragte f&#252;r den Datenschutz und die Informationsfreiheit (BfDI) dazu?</abstract>
                <slug>38c3-50--natrlich-bin-ich-18-altersprfungen-im-netz-aus-datenschutzperspektive</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='37'>Aline Sylla</person><person id='247'>Dr. Carsten Adrian</person>
                </persons>
                <language>de</language>
                <description>Hand aufs Herz &#8211; hast du, bevor du 18 warst, Webseiten besucht, die nur f&#252;r Erwachsene bestimmt waren? Welche Mechanismen haben versucht dich davon abzuhalten? Wie h&#228;ufig begegnest du diesen Mechanismen heute? 

Alterspr&#252;fungen sind nicht zuletzt durch die Bestimmungen des Digital Services Act (DSA) und die Diskussionen um die Alterstauglichkeit von Social Media hei&#223; diskutiert. Dabei geht es l&#228;ngst nicht mehr allein um Ab-18-Inhalte. Die Idee ist einfach: Wer zu jung ist, darf bestimmte Bereiche des Internets nicht betreten &#8211; wie fr&#252;her in der Videothek - oder wer zu alt ist, bekommt keinen Zutritt &#8211; wie auf manchen Spielpl&#228;tzen. Aber k&#246;nntest du dir vorstellen, in der Videothek eine Kopie deines Personalausweises abzugeben, zusammen mit der Liste der Filme, die du ausgeliehen hast?
Der wichtige Unterschied ist: Um in digitalen Diensten das Alter einer Person pr&#252;fen zu k&#246;nnen, m&#252;ssen mehr Daten verarbeitet werden als bei einem kurzen Blick auf den Ausweis, und das ist nicht ohne weiteres zul&#228;ssig!  

Der Umgang mit Methoden der Alterspr&#252;fung wird einen erheblichen Teil dazu beitragen, wie das Internet in Zukunft aussehen wird und wie frei es sein wird. Es geht nicht nur darum, wie Kinderschutz im Netz umgesetzt wird, sondern auch, wie viel Teilhabe im Digitalen m&#246;glich ist &#8211; nicht nur f&#252;r Kinder. 

In diesem Vortrag erwarten euch ein &#220;berblick &#252;ber aktuelle (politische) Forderungen nach Alterspr&#252;fungen im Internet und den verschiedenen Methoden, die dabei zum Einsatz kommen. Wir machen einen kurzen Exkurs ins Datenschutzrecht und gehen der Frage nach, wie Alterspr&#252;fungen, Kinderschutz und Datenschutz zusammenspielen. Nicht zuletzt bekommt ihr die Einsch&#228;tzung der Bundesbeauftragten f&#252;r den Datenschutz und die Informationsfreiheit zu h&#246;ren.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SJ8PGD/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SJ8PGD/feedback/</feedback_url>
            </event>
            <event guid='ab1e5592-c1c7-54ea-8170-687e3f73b2d0' id='226'>
                <room>Saal 1</room>
                <title>Liberating Wi-Fi on the ESP32</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Reverse engineering the Wi-Fi peripheral of the ESP32 to build an open source Wi-Fi stack.</abstract>
                <slug>38c3-226-liberating-wi-fi-on-the-esp32</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='236'>Frostie314159</person><person id='947'>Jasper Devreker</person>
                </persons>
                <language>en</language>
                <description>During the 38c3, there are probably multiple thousands of ESP32s in the CCH, all of which run a closed source Wi-Fi stack.  And while that stack works, it would be nicer to have an open source stack, which would grant us the ability to modify and audit the software, which carries potentially sensitive data.

So we set to work, reverse engineering the proprietary stack and building a new open source one. We soon discovered just how versatile the ESP32 can be, both as a tool for research and IoT SoC, when its capabilities are fully unlocked. This includes using it as a pentesting tool, a B.A.T.M.A.N. mesh router or an AirDrop client.

You&apos;ll learn something about Wi-Fi, the ESP32, reverse engineering in general and how to approach such a project.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/C38ZK7/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/C38ZK7/feedback/</feedback_url>
            </event>
            <event guid='573d7919-142b-5856-86b7-f83ecba62e59' id='344'>
                <room>Saal 1</room>
                <title>Was lange w&#228;hrt, wird endlich gut? Die Modernisierung des Computerstrafrechts</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>Die Reform des Computerstrafrechts ist l&#228;ngst &#252;berf&#228;llig. Die bestehende Gesetzgebung ist zunehmend veraltet und entspricht nicht mehr den Anforderungen unserer digitalen Welt. Sp&#228;testens seit der Ver&#246;ffentlichung des aktuellen Koalitionsvertrags hat sich die Bundesregierung die Modernisierung dieses vielfach kritisierten Rechtsbereichs auf die Fahnen geschrieben. Doch was ist seitdem wirklich passiert? Wie sieht der aktuelle Stand der Reformbem&#252;hung aus? Was wird sich konkret &#228;ndern und welche Auswirkungen wird dies auf die Hacker-Community und die Sicherheitsforschung haben? Und wird das endlich gut?</abstract>
                <slug>38c3-344-was-lange-whrt-wird-endlich-gut-die-modernisierung-des-computerstrafrechts</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='311'>Florian Hantke</person><person id='375'>Prof. Dr. Dennis-Kenji Kipker</person>
                </persons>
                <language>de</language>
                <description>Das Computerstrafrecht steht seit vielen Jahren in der Kritik &#8211; nicht nur von Seiten der Hacker-Community, sondern auch aus der Wissenschaft, der Wirtschaft und sogar von Strafrechtsexperten. Ein zentraler Kritikpunkt ist die Kriminalisierung von Hacking mit guter Absicht, sogenannten ethischen Hackern. Aktuell ist auch diese Form des Hacking strafbar. Initiativen wie Bug Bounty Programme und Disclosure Policies zeigen, dass die Industrie durchaus ein Interesse daran hat, von ethischen Hackern zu profitieren, die Schwachstellen verantwortungsbewusst aufdecken und melden. Seit Ende Oktober ist nun ein Gesetzesentwurf im Umlauf, welcher die Modernisierung des Computerstrafrechts vorsieht.
 
Dieser Vortrag gibt einen Einblick in die Entwicklung dieses Gesetzesentwurfs, den aktuellen Stand der Debatte und die n&#228;chsten Schritte. Wir erkl&#228;ren dabei die geplanten &#196;nderungen anhand von praktischen Beispielen und erl&#228;utern, welche Aktivit&#228;ten zuk&#252;nftig legal w&#228;ren und welche weiterhin verboten bleiben.
 
Ziel des Vortrags ist es, die Zuh&#246;renden &#252;ber den Prozess der Gesetzes&#228;nderungen zu informieren. Sie erkennen, welche M&#246;glichkeiten sich aus dem reformierten Computerstrafrecht ergeben und lernen, was beim verantwortungsvollen Aufdecken von Sicherheitsl&#252;cken beachtet werden muss und welche rechtlichen Grenzen weiterhin bestehen. Zudem wird der Vortrag verdeutlichen, inwieweit die geplante Gesetzesreform als Gewinn f&#252;r die Hacker-Community angesehen werden kann &#8211; oder ob es noch immer Nachbesserungsbedarf gibt.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7GVNYD/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7GVNYD/feedback/</feedback_url>
            </event>
            <event guid='dbf59b24-24ac-55a4-bad7-4b2ff5dae02f' id='135'>
                <room>Saal 1</room>
                <title>&#8222;Konnte bisher noch nie gehackt werden&#8220;: Die elektronische Patientenakte kommt - jetzt f&#252;r alle!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>In wenigen Wochen werden die Gesundheitsdaten von rund 73 Millionen in Deutschland Krankenversicherten ohne deren Zutun &#252;ber Praxis- und Krankenhausgrenzen hinweg zentral in einer Akte zusammengef&#252;hrt - in der [&#8222;elektronischen Patientenakte f&#252;r alle&#8220;](https://www.bundesgesundheitsministerium.de/themen/digitalisierung/elektronische-patientenakte/epa-fuer-alle.html).

Fortsetzung von 36C3 - [&#8222;Hacker hin oder her&#8220;: Die elektronische Patientenakte kommt!](https://media.ccc.de/v/36c3-10595-hacker_hin_oder_her_die_elektronische_patientenakte_kommt)</abstract>
                <slug>38c3-135--konnte-bisher-noch-nie-gehackt-werden-die-elektronische-patientenakte-kommt-jetzt-fr-alle-</slug>
                <track>Security</track>
                
                <persons>
                    <person id='134'>Martin Tschirsich</person><person id='948'>Bianca Kastl</person>
                </persons>
                <language>de</language>
                <description>In wenigen Wochen startet die [&#8222;elektronische Patientenakte (ePA) f&#252;r alle&#8220;](https://www.bundesgesundheitsministerium.de/themen/digitalisierung/elektronische-patientenakte/epa-fuer-alle.html): Medizinische Befunde, Medikationslisten und weitere Gesundheitsdaten von rund 73 Millionen in Deutschlang Krankenversicherten werden dann ohne deren Zutun &#252;ber Praxis- und Krankenhausgrenzen hinweg in einer zentralen Akte zusammengef&#252;hrt.

Bisher musste die ePA explizit beantragt werden. Ab Januar 2025 dagegen erhalten alle gesetzlich Versicherten, die nicht widersprechen, automatisch eine solche ePA.

Eine moderne Sicherheitsarchitektur erm&#246;glicht dabei, dass die enthaltenen Gesundheitsinformationen in der ePA mit den h&#246;chsten Sicherheitsstandards gesch&#252;tzt werden.

&#8222;Der Datenschutz und die Datensicherheit waren uns zu jedem Zeitpunkt das wichtigste Anliegen&#8220;, so Gesundheitsminister Karl Lauterbach. &#8222;Ein solches System konnte bisher noch nie gehackt werden&#8220;.

Doch die Vergangenheit hat gezeigt: [&#8222;Vertrauen l&#228;sst sich nicht verordnen&#8220;](https://www.ccc.de/en/updates/2023/digitalegesundheit).

Fortsetzung von 36C3 - [&#8222;Hacker hin oder her&#8220;: Die elektronische Patientenakte kommt!](https://media.ccc.de/v/36c3-10595-hacker_hin_oder_her_die_elektronische_patientenakte_kommt)</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SRXRMA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SRXRMA/feedback/</feedback_url>
            </event>
            <event guid='7586d408-8e63-5734-889c-acf80bec8760' id='158'>
                <room>Saal 1</room>
                <title>Investigating the Iridium Satellite Network</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>The Iridium satellite (phone) network is evolving and so is our understanding of it. Hardware and software tools have improved massively since our last update at 32C3. New services have been discovered and analyzed. Let&apos;s dive into the technical details of having a lot of fun with listening to satellites.</abstract>
                <slug>38c3-158-investigating-the-iridium-satellite-network</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='162'>Sec</person><person id='708'>schneider</person>
                </persons>
                <language>en</language>
                <description>We&apos;ll cover a whole range of topics related to listening to Iridium satellites and making sense of the (meta) data that can be collected that way:

 - Overview of new antenna options for reception. From commercial offerings (thanks to Iridium Time and Location) to home grown active antennas.
 - How we made it possible to run the data extraction from an SDR on just a Raspberry Pi.
 - Running experiments on the Allen Telescope Array.
 - Analyzing the beam patterns of Iridium satellites.
 - Lessons learned in trying to accurately timestamp Iridium transmissions for future TDOA analysis.
 - What ACARS and Iridium have in common and how a community made use of this.
 - Experiments in using Iridium as a GPS alternative.
 - Discoveries in how the network handles handset location updates and the consequences for privacy.
 - Frame format and demodulation of the Iridium Time and Location service.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GDPEUA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GDPEUA/feedback/</feedback_url>
            </event>
            <event guid='a1388d6c-121a-5c73-8e0e-d5100811e32b' id='452'>
                <room>Saal 1</room>
                <title>KLARHEIT ALS WAFFE</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>UBERMORGEN infiltriert Kunst, Medien und digitale Monokulturen mit subversiver Affirmation. Wie Donald Trump auch, zerst&#246;ren sie t&#228;glich ihr Gesch&#228;ftsmodell, um daraus radikal neue L&#246;sungen zu schaffen. Anhand von Projekten wie Vote-Auction, Google Will Eat Itself und PMC Wagner Arts dokumentieren sie ihre k&#252;nstlerische Evolution im Never-Ending Now. Chaos ist ihre Methode, Kunst ihre Neue Ehrlichkeit, Klarheit ihre Waffe.</abstract>
                <slug>38c3-452-klarheit-als-waffe</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/HWSQQG/thielboi_4hDkUKJ.png</logo>
                <persons>
                    <person id='488'>Luzius Bernhard</person><person id='791'>lizvlx (UBERMORGEN)</person>
                </persons>
                <language>de</language>
                <description>Der Vortrag, eine Mischung aus emotionalem Appell und intellektueller Analyse, thematisiert die Notwendigkeit von Klarheit und bewusster Simplifizierung als Gegengewicht zum Streben nach Perfektion in einer Welt der wahrgenommenen und effektiven Hyperkomplexit&#228;t. UBERMORGEN stellt infrage, wie viel k&#252;nstlerische Freiheit im aktuellen Zeitalter der &#8222;Happy Dystopia&#8220; noch bleibt, respektive was &#8216;Radikaler Universalismus&#8217; (Abstraktion zwecks Mustererkennung) f&#252;r weitl&#228;ufige M&#246;glichkeiten in der Praxis er&#246;ffnen, und beleuchtet, wie ihre neuesten Werke das Potenzial kritischer &#196;sthetik und radikaler Experimente inmitten einer fragmentierten Informationslandschaft erm&#246;glichen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HWSQQG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HWSQQG/feedback/</feedback_url>
            </event>
            <event guid='78910469-adfa-5c79-8529-1a9d66ef9e6a' id='316'>
                <room>Saal 1</room>
                <title>BioTerrorism Will Save Your Life with the 4 Thieves Vinegar Collective</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>Governments have criminalized the practice of managing your own health. Despite the fact that for most of human history bodily autonomy, and self-managed health was the norm, it is now required that most aspects of your health must be mediated by an institution deputized by the state. Taking those rights back for yourself is then labeled &quot;BioTerrorism&quot;. So be it. Let&apos;s learn how.</abstract>
                <slug>38c3-316-bioterrorism-will-save-your-life-with-the-4-thieves-vinegar-collective</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/ASBXWW/Four_Thieves_Vinegar_Collective_logo.svg_IApIM0n.png</logo>
                <persons>
                    <person id='339'>Dr. Mix&#230;l Swan Laufer</person>
                </persons>
                <language>en</language>
                <description>We all know that custom, hand-made, artisan-crafted, boutique tools are always better than something factory made. A guitar, a wood chisel, a chef&apos;s knife, a built racing engine, a firearm, a suit, a pair of shoes. Given that this is so well-known, and so universally understood, it&apos;s peculiar at best that this is not seen by most people when it comes to medicine. It is however also true. 

Given, however, that the traditional r&#244;le of pharmacists who used to have the freedom to compound custom medicines for the people they were serving has been revoked, and now despite their extensive training, have been limited to being able to do little more than count pills in most cases, we have to do this ourselves. 

The problem is that this has been criminalized. The moment you stop groveling for permission from medical authorities, and start becoming actively involved in managing your own health, you are a criminal in most countries in the world. Practicing medicine without a license, manufacture of drugs, possession of laboratory tools, possession of precursor chemicals... the list of felonies goes on. 

The choice is yours. Would you like to be the sickest law-abiding citizen, or the healthiest BioTerrorist? If you want the red pill, you&apos;ll have to manufacture it yourself. The blue pill is prescription-only, and if you manage to get a prescription, and you&apos;re rich maybe you can afford to buy it. 

Come learn about the long list of medications which went through the research and development processes, but are never going to be commercially available. Learn how to find more of these, and learn the many ways you can make them yourself.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ASBXWW/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ASBXWW/feedback/</feedback_url>
            </event>
            <event guid='9cedf158-d649-54dc-bbe6-f4c46ad175be' id='282'>
                <room>Saal 1</room>
                <title>Der Th&#252;ring-Test f&#252;r Wahlsoftware</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>W&#228;hle Dein Risiko!</abstract>
                <slug>38c3-282-der-thring-test-fr-wahlsoftware</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='116'>Linus Neumann</person><person id='312'>Thorsten (THS) Schr&#246;der</person>
                </persons>
                <language>de</language>
                <description>Vor der Bundestagswahl 2017 ver&#246;ffentlichten wir unsere Analyse &#252;ber haarstr&#228;ubende Sicherheitsl&#252;cken in einer weit verbreiteten Wahlsoftware.

Seitdem ist einiges passiert: Der Hersteller hat die Probleme nicht behoben, das BSI hat einen Stapel Papier produziert, die deutschen Anbieter von Wahlsoftware haben ihr Kartell vergr&#246;&#223;ert und unterschiedliche Wahl-Pannen untergraben weiterhin das Vertrauen in die Demokratie.

Wurden unsere Empfehlungen von 2017 umgesetzt?
Wir nehmen den Decompiler und schauen mal nach.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MDN3PU/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MDN3PU/feedback/</feedback_url>
            </event>
            <event guid='3fe97197-feee-5191-81c8-51aeff348868' id='676'>
                <room>Saal 1</room>
                <title>Feelings are Facts: Love, Privacy, and the Politics of Intellectual Shame</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>A debut of new research and analysis, focused on emotions and the affective register&#8212;love! shame! intimacy!</abstract>
                <slug>38c3-676-feelings-are-facts-love-privacy-and-the-politics-of-intellectual-shame</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='693'>Meredith Whittaker</person>
                </persons>
                <language>en</language>
                <description>What happens when we put love and intimacy at the center of our understanding of privacy, and what are the consequences of their disavowal, in favor of a more familiar technocratic definition of privacy-as-absense? What role does our deep desire for love and belonging, and our concomitant fear of shame and rejection, have to do with the (mis)direction of tech capital and the current, warped shape of the tech industry and its products? We take these questions seriously, and work through their implications together in Hamburg during that brief, liminal window between the winter holidays and the new year.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3UWT9A/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3UWT9A/feedback/</feedback_url>
            </event>
            <event guid='cddb9e32-0503-5ad5-adbe-3e8d63f6e51f' id='598'>
                <room>Saal 1</room>
                <title>Wir wissen wo dein Auto steht - Volksdaten von Volkswagen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T22:05:00+01:00</date>
                <start>22:05</start>
                <duration>00:40</duration>
                <abstract>Bewegungsdaten von 800.000 E-Autos sowie Kontaktinformationen zu den Besitzern standen ungesch&#252;tzt im Netz. Sichtbar war, wer wann zu Hause parkt, beim BND oder vor dem Bordell.</abstract>
                <slug>38c3-598-wir-wissen-wo-dein-auto-steht-volksdaten-von-volkswagen</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/Q8ZAV9/europe_52dSHqZ.png</logo>
                <persons>
                    <person id='525'>Michael Kreil</person><person id='524'>Fl&#252;pke</person>
                </persons>
                <language>de</language>
                <description>Welche Folgen hat es, wenn VW massenhaft Fahrzeug-, Bewegungs- und Diagnosedaten sammelt und den Schl&#252;ssel unter die Fu&#223;matte legt?

Was verraten Fahrzeugdaten &#252;ber die Mobilit&#228;t von Beh&#246;rden, &#196;mtern, Ministerien, Lieferdiensten, Mietwagenfirmen, etc.?

Wof&#252;r werden diese Daten &#252;berhaupt gesammelt?

Wir zeigen Kurioses bis Bedenkliches - nat&#252;rlich mit mehr Respekt f&#252;r den Datenschutz, als diejenigen, die die Daten gesammelt haben.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Q8ZAV9/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Q8ZAV9/feedback/</feedback_url>
            </event>
            <event guid='233cb1d4-4833-5384-aeee-d99344433e0b' id='336'>
                <room>Saal 1</room>
                <title>We&apos;ve not been trained for this: life after the Newag DRM disclosure</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>You&apos;ve probably already heard the story: we got contracted to analyze a bunch of trains breaking down after being serviced by independent workshops. We reverse engineered them and found code which simulated failures when they detected servicing attempts. We presented our findings at 37C3&#8230; and then shit hit the fan.</abstract>
                <slug>38c3-336-we-ve-not-been-trained-for-this-life-after-the-newag-drm-disclosure</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='347'>Micha&#322; Kowalczyk</person><person id='358'>q3k</person><person id='391'>Jakub Stepniewicz</person>
                </persons>
                <language>en</language>
                <description>This talk will be an update about what happened since our 37C3 presentation. We&#8217;ll talk about:
- Three parliamentary workgroup sessions with dirty bathroom photos on Newag&#8217;s offtopic slides, train operators revealing that they paid Newag more than 20k EUR for unlocking a single train, which Newag was able to unlock in 10 minutes, and at the same time saying that they don&#8217;t know anything about the locks.
- 140-page lawsuits, accusing us of _copyright violation and unfair competition_ (sic!) with a lot of logical gymnastics.
- How it&#8217;s like to repeatedly explain reverse engineering concepts to journalists.
- 6 official investigations, two of them criminal.
- New cases revealed since then (from different train operators).
- and much more!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HTWLCG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HTWLCG/feedback/</feedback_url>
            </event>
            <event guid='1c8f06f9-ce0d-51bc-9bf3-0a1f71e8e484' id='248'>
                <room>Saal 1</room>
                <title>Desiring Technology. &#220;ber Porno, Abh&#228;ngigkeit und Fortschritt</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>00:40</duration>
                <abstract>Eine wachsende Zahl von Menschen eignet sich ihre empfundene Abh&#228;ngigkeit von digitaler Pornografie als mystischen Fetisch an &#8211; sie konsumieren ihren Konsum. Was ist Gooning, wie hat es sich entwickelt und was kann es uns &#252;ber unser Verh&#228;ltnis zu Medientechnologie im weiteren Sinn erz&#228;hlen?</abstract>
                <slug>38c3-248-desiring-technology-ber-porno-abhngigkeit-und-fortschritt</slug>
                <track>Entertainment</track>
                
                <persons>
                    <person id='68'>Arne Vogelgesang</person>
                </persons>
                <language>de</language>
                <description>Pornografie gilt als wichtiger Treiber von Digitalisierung. Ihre Nutzung ist damit auch ein kulturelles Labor digitaler Konsumgesellschaft - aber eines, &#252;ber das relativ wenig gesprochen wird. Was genau machen Leute eigentlich mit Pornos? Wie Pornos konsumiert werden, gibt mehr als nur Aufschluss &#252;ber den Stand dessen, was wir &#8220;Sexualit&#228;t&#8221; nennen. Menschliches Begehren ist die wichtigste Ressource f&#252;r technische Entwicklung schlechthin, und in den Lustfarmen der Pornokonsumindustrie findet dieser Zusammenhang nur einen besonders deutlichen Ausdruck.

Dieser Vortrag erz&#228;hlt die Geschichte einer relativ jungen Form digitalisierter Sexualit&#228;t rund um Pornografiekonsum: Gooning. Er beschreibt, wie &#252;ber die letzten zehn Jahre diese Form der Lust an sich selbst eine innige Verbindung mit digitalen Medien eingegangen ist. Und er nutzt dieses Beispiel, um eine weitere Geschichte zu erz&#228;hlen: eine Geschichte &#252;ber menschliche und vor allem m&#228;nnliche K&#246;rper, die nicht anders k&#246;nnen, als das Neue zu begehren &#8211; selbst angesichts der unerw&#252;nschten Zuk&#252;nfte, mit denen die technologisierte Welt, von der sie abh&#228;ngig geworden sind, sie konfrontiert.

Inhaltshinweis Themen: Sexualit&#228;t, Sucht. Nacktheit im Bildmaterial ist verpixelt. Dennoch nicht empfohlen f&#252;r Personen unter 18 Jahren.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9C3JXS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9C3JXS/feedback/</feedback_url>
            </event>
            <event guid='19b141f2-0f27-5d84-9e90-0d2474d37b7e' id='215'>
                <room>Saal 1</room>
                <title>Fnord-Nachrichtenr&#252;ckblick 2024</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T01:10:00+01:00</date>
                <start>01:10</start>
                <duration>01:30</duration>
                <abstract>Wir zeigen euch die Fnords in den Nachrichten des Jahres.</abstract>
                <slug>38c3-215-fnord-nachrichtenrckblick-2024</slug>
                <track>Entertainment</track>
                
                <persons>
                    <person id='220'>Fefe</person><person id='737'>Atoth</person>
                </persons>
                <language>de</language>
                <description>Endlich wieder ein normaler Ausklang f&#252;rs Jahr!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GUFA37/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GUFA37/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal ZIGZAG' guid='62251a07-13e4-5a72-bb3c-8528416ee0f2'>
            <event guid='5ce039da-1667-52c0-8676-fa1d36423033' id='395'>
                <room>Saal ZIGZAG</room>
                <title>Typing Culture with Keyboard: Okinawa - Reviving the Japanese Ryukyu-Language through the Art and Precision of Digital Input</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>In a world dominated by digital communication and the drive toward linguistic unification, the simple act of &apos;typing&apos; varies significantly across languages and writing systems. For European languages like English and German, typing typically involves a set of about 100 letters and symbols. In contrast, Japanese&#8212;and by extension, Okinawan&#8212;requires three distinct scripts: hiragana, katakana, and kanji. Each of these adds layers of complexity and cultural depth to written expression.

This presentation delves into the development of an input method engine (IME) for Okinawan, an endangered language spoken in Japan&apos;s Ryukyuan archipelago. Moving beyond technical challenges, this project reveals how modern digital &#8216;calligraphy&#8217; intersects with language preservation. Every keystroke becomes a deliberate cultural choice, as the IME reflects the aesthetic and linguistic essence of Okinawan language.

Highlighting linguistic expression, cultural significance, and the urgent need for language preservation, this talk presents a model for future digital tools that empower endangered languages and cultures to thrive in the digital realm.</abstract>
                <slug>38c3-395-typing-culture-with-keyboard-okinawa-reviving-the-japanese-ryukyu-language-through-the-art-and-precision-of-digital-input</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='426'>Daichi Shimabukuro</person>
                </persons>
                <language>en</language>
                <description>This presentation begins by illustrating how different languages transliterate speech globally and then shifts focus to the Ryukyu-Japonic language family, showcasing how over 10,000 characters can be input on a QWERTY keyboard. The Input Method Engine (IME) has played a unique role in facilitating character input for Chinese, Japanese, and Korean (CJK) languages. This talk explores expanding the CJK family to include Okinawan, addressing how phonologically distinct sounds are recorded and encoded. This addition lays the groundwork for other Okinawan speakers to express themselves and document their lives in today&#8217;s interconnected, digital world.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/FQESP3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/FQESP3/feedback/</feedback_url>
            </event>
            <event guid='c385af7d-d4af-5c80-84bf-a2aac5379dac' id='359'>
                <room>Saal ZIGZAG</room>
                <title>Police 2.0: Peaceful activism is terrorism and fakenews are facts</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>On 23 October 2019 peaceful activist Frank van der Linde found out the Dutch Police was associating him with terrorism to other countries&apos; law enforcement.
 
This talk goes over the bizarre, worrying and, frankly, quite funny journey that Frank van der Linde has embarked on, hoping on a litigation frenzy to seek justice and fight back against the institutional intimidation of activists.</abstract>
                <slug>38c3-359-police-2-0-peaceful-activism-is-terrorism-and-fakenews-are-facts</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='386'>Lori</person><person id='546'>Frank van der Linde</person>
                </persons>
                <language>en</language>
                <description>In 2014 the Dutch police started monitoring Frank van der Linde after he demonstrated and publicly opposed racism, climate change, animal cruelty, homelessness, and other social injustices. By 2019 the Dutch law enforcement had put him on a terror list and shared his personal data with the German Federal Criminal Police Office, Europol and Interpol. Frank challenged the police for sharing his data and categorising him as &quot;terrorist&quot;, they responded &quot;The term &#8216;terrorism&#8217; is a broad term, and they don&apos;t really mean it.&quot; The Police maintained the categorisation. 
 
Last year, a Dutch police officer blew the whistle and spoke out in favor of Frank during a hearing in court. He told the court that the police file about Frank  contained grossly mischaracterised and biased information.
 
Overall is seems that wherever van der Linde data is processed, data gets lost and accountability processes cave in. To quote Frank, &#8220;What do they have to hide?!&#8221;
 
Speakers: 
Frank van der Linde
Lori Roussey, Director of Data Rights, who participates in supporting Frank courageous journey</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MJYTSS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MJYTSS/feedback/</feedback_url>
            </event>
            <event guid='b60289a7-f1dc-5026-89d6-406341911917' id='534'>
                <room>Saal ZIGZAG</room>
                <title>Die Geschlechter denen die sie hacken: Selbstbestimmungsgesetz, Pinke Listen, &#220;berwachungsstaat</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Selbstbestimmung ein grundlegendes Prinzip des Hacken, ob technologisch oder geschlechtlich. Doch was wenn Selbstbestimmung nur bedingt umsetzbar ist- im besten Fall und mit staatlicher Repression als Standard?
Selbstbestimmung selbst gemacht ist eine trans, inter, nonbin&#228;re Aktionsgruppe deren Name Programm ist. Wir wollen das System hacken um wir selbst zu sein, &#220;berwachungsfrei und mit (Kranken)Versicherung. Ob m&#246;gliche Informationsweitergabe/Offenbarungsgebot, f&#252;r alle Menschen, ob Cis oder TIN*, das in letzter Minute f&#252;r die Bezahlkarte aus dem mangelhaften &#8222;Selbstbestimmungs&#8220;Gesetz (SBSG) genommen wurde oder die Sabotage und Unm&#246;glichmachung von geschlechtaffirmierender Gesundheitsversorgung- wir stehen wie migrantische Menschen im Mittelpunkt von staatlicher &#220;berwachungsliebe und faschistischer Ausl&#246;schungsfantasien, jedoch unbeachtet im Chaos.
Wir wollen dies &#228;ndern- hier, dieses Jahr und f&#252;r alle Zeit. Wir werden den Prozess des SBSG ergr&#252;nden, den Zusammenhang von (Un)Sicherheitspaket, &#220;berwachungsma&#223;nahmen und Transsein herstellen wie auch ganz nebenbei illegalisierte Praktiken versichern, durch die Geschlechts-zusatzversicherung. Nur eure B&#252;hne wird gebraucht und die Tastaturen unser aller Geschwister.</abstract>
                <slug>38c3-534-die-geschlechter-denen-die-sie-hacken-selbstbestimmungsgesetz-pinke-listen-berwachungsstaat</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='410'>Jyn</person><person id='824'>Nephthys</person><person id='953'>Luce deLire</person>
                </persons>
                <language>de</language>
                <description>Trans*, inter*, nicht-bin&#228;re (TIN*) Rechte und Datensicherheit gehen Hand in Hand. Das wollen wir in diesem Beitrag konkretisieren und f&#252;r mehr Vernetzung zwischen Digitaler (Grund)rechte-/Datensicherheits-szene und TIN* Aktivismus eintreten. Dabei werden Zusammenh&#228;nge zwischen (Un)Sicherheitspaket, &#220;berwachungsma&#223;nahmen und trans Geschlechtlichkeit erkundet und mit konkreten Gesetzesvorschl&#228;gen und aktivistischen Aktionen beantwortet, wie auch ein Einblick in die Teils starken parallelen In den Gesetzgebungsprozessen erm&#246;glicht.

Seit 01.11.2024 ist in Deutschland das neue Selbstbestimmungsgesetz (SBGG) in Kraft, das die &#196;nderung von Namens- und Geschlechtseintr&#228;gen f&#252;r TIN* Personen erleichtern soll. Drei Tage vor der Verabschiedung des SBGG am 12.4.2024 wurde dabei das sogenannte &#8220;Offenbarungsgebot&#8221; im Tausch f&#252;r die Bezahlkarte f&#252;r Asylbewerbende aus dem Gesetz herausverhandelt: Insbesondere das Bundesinnenministerium wollte gern eine automatische Weiterleitung pers&#246;nlicher Daten, darunter Adresse, alter und neuer Geschlechtseintrag, an elf staatliche Institutionen, darunter BKA, Verfassungsschutz, [wie hei&#223;en die nochmal richtig: Schwarzgelddezernat und illegale Waffen]. Zu den daraus resultierenden &#8220;pinken Listen&#8221; ist es nicht gekommen. Allerdings nur unter der Zusicherung, dass die entsprechende &#220;berwachungsma&#223;nahme f&#252;r alle Personenstands&#228;nderungen verbindlich wird - das umfasst Eheschlie&#223;ungen, Adoption etc. Eine entsprechende Absichtserkl&#228;rung sollte im Dezember in den Bundestag gegeben und beschlossen werden, letztlich und vermutlich aber durch das Ende der Ampel vereitelt wurde. Ob, wie und in welcher Form dieses Vorhaben weiterbesteht ist zum jetzigen Zeitpunkt unklar.

Datensicherheit und TIN* Rechte &#252;berschneiden sich hier unmittelbar. TIN* Personen werden gegen die Privatsph&#228;re aller Menschen instrumentalisiert. In diesem Beitrag wollen wir darlegen, wie es dazu gekommen ist. Wir wollen auch er&#246;rtern, was daran schlecht ist und was wir tun k&#246;nnen. Dazu werden wir unter andere die Abschnitte und Anschlussm&#246;glichkeiten zur Datensicherheit aus unserem selbst geschriebenen, community produzierten Selbstbestimmungsgesetz 2.0 vorstellen. Wir wollen aber auch Vorschl&#228;ge zu konkreten aktivistischen Aktionen machen. Daf&#252;r brauchen wir eure B&#252;hne - und die Tastaturen unser aller Geschwister.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/FSZBSE/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/FSZBSE/feedback/</feedback_url>
            </event>
            <event guid='0fef4804-3cd8-5202-a0c1-2d2c7a15a149' id='680'>
                <room>Saal ZIGZAG</room>
                <title>Clay PCB</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>We built an Ethical Hardware Kit with a PCB microcontroller made of wild clay retrieved from the forest in Austria and fired on a bonfire. Our conductive tracks use urban-mined silver and all components are re-used from old electronic devices. The microcontroller can compute different inputs and outputs and is totally open source.</abstract>
                <slug>38c3-680-clay-pcb</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/XNB7SG/StufeIII-190224-4_kTiUlNp.jpg</logo>
                <persons>
                    <person id='706'>Patr&#237;cia J. Reis</person><person id='1031'>Stefanie Wuschitz</person>
                </persons>
                <language>en</language>
                <description>It is an open secret that the hardware in our smart devices contains not only plastics but also &#8216;conflict minerals&#8217; such as copper and gold. Technology is not neutral. We investigate alternative hardware from locally sourced materials from a feminist perspective, to develop and speculate upon renewable practices. We call it Feminist Hardware! Feminist Hardware is developed without mining in harmful ways, in an environmentally friendly way, under fair working conditions, and is manufactured from ubiquitously available materials, without generating e-waste, with consent, love and care.

We researched on fair-traded, ethical, biodegradable hardware for environmental justice, building circuits that use ancient community-centered crafts encouraging de-colonial thinking, market forces to be disobeyed, and future technologies to be imagined. Our artistic outcome is an Ethical Hardware Kit with a PCB microcontroller at its core. Our PCB is made of wild clay retrieved from the forest in Austria and fired on a bonfire. Our conductive tracks used urban-mined silver and all components are re-used from old electronic devices. The microcontroller can compute different inputs and outputs and is totally open source.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XNB7SG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XNB7SG/feedback/</feedback_url>
            </event>
            <event guid='13d09061-168d-5e30-8ac8-eb73a3dbb35f' id='150'>
                <room>Saal ZIGZAG</room>
                <title>Breaking NATO Radio Encryption</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>We present fatal security flaws in the HALFLOOP-24 encryption algorithm, which is used by the US military and NATO. HALFLOOP-24 was meant to safeguard the automatic link establishment protocol in high frequency radio, but our research demonstrates that merely two hours of intercepted radio traffic are sufficient to recover the secret key. In the talk, we start with the fundamentals of symmetric key cryptography before going into the details of high frequency radio, HALFLOOP-24, and the foundation of our attack.</abstract>
                <slug>38c3-150-breaking-nato-radio-encryption</slug>
                <track>Security</track>
                
                <persons>
                    <person id='152'>Lukas Stennes</person>
                </persons>
                <language>en</language>
                <description>High frequency (HF) radio, also known as shortwave radio, is commonly used by the military, other government agencies and industries that need highly robust long-distance communication without any external infrastructures. HF radio uses frequencies between 3 and 30 MHz. These frequencies enable skywave propagation, where the radio signals are reflected by electrically charged particles in the upper atmosphere. While this effect enables communication across very large distances, historically, it required trained and experienced operators to establish a radio link.

This dependence on operators was reduced by the introduction of the automatic link establishment (ALE) protocol. In a nutshell, an ALE-enabled radio establishes a link to another radio by selecting a suitable frequency according to a propagation model and then transmitting a call frame. If the frequency is good, the other radio receives the frame and the two radios perform a handshake to set up a link. The encryption of these ALE frames is known as linking protection. It is primarily meant to protect unauthorized users from establishing links with radios in a network or interfering with established links. Additionally, encryption of ALE frames also protects the network from certain types of traffic analysis, which is the analysis of operating data such as network structure, frequencies, callsigns and schedules. The first ALE standard did not specify a cipher, but specified how to integrate a stream cipher with ALE. Later standards introduced the 56-bit key Lattice/SoDark cipher, which is now recommended to be replaced with HALFLOOP whenever possible.

HALFLOOP, which is standardized in US standard [MIL-STD-188-14D](https://quicksearch.dla.mil/qsDocDetails.aspx?ident_number=67563) since 2017, is essentially a downscaled version of the Advanced Encryption Standard (AES), which effectively is the most used encryption algorithm today. While this downscaling led to many strong components in HALFLOOP, a fatal flaw in the handling of the so-called tweak enables devastating attacks. In a nutshell, by applying a technique known as differential cryptanalysis, an attacker can skip large parts of the encryption process. In turn, this makes it possible to extract the used secret key and hence enables an attacker to break the confidentiality of the ALE handshake messages and also makes an efficient denial-of-service attack possible.

These attacks are described in the two research papers, [Breaking HALFLOOP-24](https://doi.org/10.46586/tosc.v2022.i3.217-238) and [Destroying HALFLOOP-24](https://doi.org/10.46586/tosc.v2023.i4.58-82). They were initiated by the presentation of the [Cryptanalysis of the SoDark Cipher](https://doi.org/10.46586/tosc.v2021.i3.36-53), the predecessor of HALFLOOP.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KETTLY/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KETTLY/feedback/</feedback_url>
            </event>
            <event guid='4c2e05d6-f32f-55ae-8d48-9167bbd84a34' id='503'>
                <room>Saal ZIGZAG</room>
                <title>What the PHUZZ?! Finding 0-days in Web Applications with Coverage-guided Fuzzing</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>PHUZZ is a framework for Coverage-Guided Fuzzing of PHP Web Applications

Fuzz testing is an automated approach to vulnerability discovery. Coverage-guided fuzz testing has been extensively researched in binary applications and the domain of memory corruption vulnerabilities.
However, many web vulnerability scanners still rely on black-box fuzzing (e.g., predefined sets of payloads or basic heuristics), which severely limits their vulnerability detection capabilities.
In this talk, we present our academic fuzzing framework, &quot;PHUZZ,&quot; and the challenges we faced in bringing coverage-guided fuzzing to PHP web applications. Our experiments show that PHUZZ outperforms related works and state-of-the-art vulnerability scanners in discovering seven different vulnerability classes.
Additionally, we demonstrate how PHUZZ uncovered over 20 potential security issues and two 0-day vulnerabilities in a large-scale fuzzing campaign of the most popular WordPress plugins.</abstract>
                <slug>38c3-503-what-the-phuzz-finding-0-days-in-web-applications-with-coverage-guided-fuzzing</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/MAUBFS/chatgpt-phuzz_mMG6NU6.png</logo>
                <persons>
                    <person id='529'>Sebastian Neef (gehaxelt)</person>
                </persons>
                <language>en</language>
                <description>The World Wide Web has become a fundamental part of modern society, providing crucial services such as social networks, online shopping, and other web applications. To this day, web vulnerabilities continue to be discovered, and data breaches are reported, even on high-profile websites. While several viable methods exist to detect web vulnerabilities, such as penetration tests, source code reviews, and bug bounty programs, these approaches are typically costly and time-intensive. Therefore, discovering web vulnerabilities in an automated and cost-effective fashion is desirable.

One method to approach this problem is coverage-guided &quot;fuzzing&quot;, which has been successfully used to identify memory corruption bugs in binary applications, but has seen limited application to web applications. Our academic research has resulted in an open-source prototype called &quot;PHUZZ,&quot; which outperforms classic black-box vulnerability scanners in detecting web vulnerabilities with its fuzzing approach.

This talk will first introduce the concept of coverage-guided fuzzing and the differences from black-box web fuzzing performed by vulnerability scanners. After diving into the challenges of applying coverage-guided fuzzing to web applications, we will introduce PHUZZ and explain how its approach allows the detection of a wide variety of web vulnerabilities, including SQLi, RCE, XSS, XXE, open redirection, insecure deserialization, and path traversal in PHP web applications.

Our comparison of PHUZZ with state-of-the-art black-box vulnerability scanners, using a diverse set of artificial and real-world web applications containing known and unknown vulnerabilities, showed surprising results. Not only does PHUZZ outperform the other vulnerability scanners in the number of discovered vulnerabilities, but it also discovers over a dozen new potential vulnerabilities and two 0-days, which we will discuss in our talk. Finally, we will motivate the use of PHUZZ [1] and coverage-guided fuzzing methods to discover web vulnerabilities.

This presentation is based on our academic publication &quot;What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications&quot; [0].

[0] https://dl.acm.org/doi/10.1145/3634737.3661137
[1] https://github.com/gehaxelt/phuzz</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MAUBFS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MAUBFS/feedback/</feedback_url>
            </event>
            <event guid='7f4f44d8-89ea-5a84-8014-090b6ea88f3c' id='178'>
                <room>Saal ZIGZAG</room>
                <title>From fault injection to RCE: Analyzing a Bluetooth tracker</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>00:40</duration>
                <abstract>The Chipolo ONE is a Bluetooth tracker built around the Dialog (now Renesas)
DA14580 chip. This talk will present the research made on this device, from
extracting the firmware from the locked down chip using fault injection up to
getting remote code execution over Bluetooth.
The talk will also present the disclosure process and how the vendor reacted to
an unpatchable vulnerability on their product.</abstract>
                <slug>38c3-178-from-fault-injection-to-rce-analyzing-a-bluetooth-tracker</slug>
                <track>Security</track>
                
                <persons>
                    <person id='174'>Nicolas Oberli</person>
                </persons>
                <language>en</language>
                <description>This talk will present the journey through the analysis of the Chipolo ONE
Bluetooth tracker. As for lots of IoT devices, this analysis mixes both hardware
and software attacks so this talk will be packed with lots of techniques that
can be applied to other devices as well:

 - Using fault injection to bypass the debug locking mechanism on a chip that has
   apparently never been broken before.
 - Reverse engineering an unknown firmware with Ghidra, a PDF and parts of a SDK
 - Analyzing weak cryptographic algorithms to be able to authenticate to any
   device
 - Finding a buffer overflow and achieve code execution over Bluetooth
 - Disclosing an unpatchable vulnerability to the vendor</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YM3UTV/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YM3UTV/feedback/</feedback_url>
            </event>
            <event guid='98c72b58-744d-5dc7-bf58-45254ce87c00' id='410'>
                <room>Saal ZIGZAG</room>
                <title>From Silicon to Sovereignty: How Advanced Chips are Redefining Global Dominance</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>Recent breakthroughs in machine learning have dramatically heightened the demand for cutting-edge computing chips, driving advancements in semiconductor technologies. At the forefront of this progress is Extreme Ultraviolet (EUV) lithography&#8212;a transformative method in microchip fabrication that enables the creation of ultra-small, high-performance devices. However, the path from raw materials to these state-of-the-art chips navigates a complex global supply chain riddled with technical challenges and geopolitical tensions. As nations vie for dominance in computing power, control over this supply chain has emerged as a strategic priority, featuring prominently in a high-stakes competition with global implications. Designed for all audiences, this talk explores the critical intersection of science, technology and global affairs shaping our future.</abstract>
                <slug>38c3-410-from-silicon-to-sovereignty-how-advanced-chips-are-redefining-global-dominance</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='444'>Thorsten Hellert</person>
                </persons>
                <language>en</language>
                <description>This talk centres on the advanced technical processes required to manufacture state-of-the-art computer chips, tracing the journey from raw materials to ultra-miniaturized circuits. We will explore each critical stage in this complex process, beginning with the refinement of ultrapure quartz and progressing through wafer production to the advanced lithography techniques that enable feature sizes down to just a few nanometers&#8212;all executed not merely in a laboratory but at an industrial scale that pushes the boundaries of what is technologically possible.

A particular emphasis will be placed on Extreme Ultraviolet (EUV) lithography, a revolutionary technique essential for achieving these ultra-small scales. EUV lithography not only represents the core technological challenge in chip fabrication but also holds a pivotal position in the global semiconductor supply chain, placing it at the intersection of scientific innovation and international politics. The talk will address both the underlying physics and the geopolitical significance of this technology, as nations increasingly view control over semiconductor production as a strategic asset.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ANJUV8/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ANJUV8/feedback/</feedback_url>
            </event>
            <event guid='da83bd0a-bbbb-51e6-af01-9295ce0eebbb' id='230'>
                <room>Saal ZIGZAG</room>
                <title>Spatial Interrogations Or the Color of the Sky</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>Modern 3D capture through Gaussian Splatting and human memory reveal parallel landscapes &#8211; where precise centers fade into probabilistic smears at the edges, and gaps hold as much meaning as detail. This is about the preservation of an ephemeral present in digital amber, an interrogation of how we reconstruct both digital and remembered spaces.</abstract>
                <slug>38c3-230-spatial-interrogations-or-the-color-of-the-sky</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/WADJP3/SIOTCOTS_Thumb_3_mKfgvDc.jpg</logo>
                <persons>
                    <person id='234'>Artur Neufeld</person>
                </persons>
                <language>en</language>
                <description>In July 2023, a new method of reconstructing reality was published in a paper called &quot;3D Gaussian Splatting for Real-Time Radiance Field Rendering.&quot; Three months later, the first apps provided this technology in their pseudo social-networks. Gaussian Splatting produces a navigable, though static, 3D reconstruction of events from video footage &#8211; but also an intriguing aesthetic. Areas of sharp details are surrounded by calculated uncertainty, creating digital spaces that inadvertently mirror how human memory operates.

The talk presents a video essay of the same name, exploring this resonance between technology and memory through a crafted blend of found footage, open-source media, and AI-generated elements. By developing custom tools for VR exploration and capture, the work documents these digital spaces from within, creating a choreographed journey through both technical and remembered landscapes. It is both a technical documentation and a poetic interpretation; it&#8217;s an interrogation of an emerging technology and a meditation on how we process and reconstruct our experiences, digital and remembered alike. 

The lecture will focus on the technical background, as well as the artistic practices used to create the video essay. From working with virtual reality and experimenting with AI-generated content, to making decisions and non-decisions &#8211; it traces the development of a work in the parallel landscapes of emergent technology and lingering memory, of imminent nostalgia and nascent futures.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WADJP3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WADJP3/feedback/</feedback_url>
            </event>
            <event guid='8b046ea5-bf0a-58fd-9c2a-4f6ee9e87bd3' id='137'>
                <room>Saal ZIGZAG</room>
                <title>Was macht ein IT-Systemadministrator in einem Alu-Schmelzwerk (Schafft die Deutsche Industrie die Digitalisierung)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>In diesem Vortrag ziehe ich ein schonungsloses Res&#252;mee aus meinen mittlerweile fast drei Jahren in der Deutschen Industrielandschaft. Ich erz&#228;hle &#252;ber katastrophale und gef&#252;hlt un&#252;berwindbare R&#252;ckst&#228;nde, &#252;ber l&#228;cherlich hohe Anforderungen bei Zertifizierungen, aber auch &#252;ber gro&#223;e Hoffnungen, Bem&#252;hungen und eine gef&#252;hlt vollst&#228;ndige Abwesenheit des Staats und was das bedeutet.</abstract>
                <slug>38c3-137-was-macht-ein-it-systemadministrator-in-einem-alu-schmelzwerk-schafft-die-deutsche-industrie-die-digitalisierung-</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/7RBKND/20231130_163038_25d4jkc.jpg</logo>
                <persons>
                    <person id='136'>Johannes Bernstein</person>
                </persons>
                <language>de</language>
                <description>Der Talk behandelt den Kampf eines einsamen Administrators, der alleine versucht einen fast 100 Personen starken Standort im Herzen des Potts ins 21. Jahrhundert zu f&#252;hren und irgendwie sicher zu bekommen. Wir beginnen mit witzigen Anekdoten &#252;ber 20 Jahre alte Server, DOS-Anwendungen, beleuchten ein wenig das fragw&#252;rdige Gesch&#228;ft mit Zertifizierungen beziehungsweise Audits und landen am Ende der Reise bei der Frage, was der Gesetzgeber eigentlich tut und was das f&#252;r Auswirkungen hat. Es ist ein kleiner Appell und Handlungsleitfaden an alle Administratoren in der Privatwirtschaft, wie sie dem Vorstand und ihren Chefs einen verantwortungsbewussteren Umgang mit Datenschutz und Datensicherheit vermitteln k&#246;nnen. Es liegt jetzt an uns (den nachkommenden Generationen), Verantwortung zu &#252;bernehmen und diese digitale Welt sicher f&#252;r alle zu gestalten. 
Denn der Vortragende geht davon aus, dass wir in den n&#228;chsten Jahren viele Firmen verlieren werden, weil sie schlicht und ergreifend den Anschluss verpassen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7RBKND/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7RBKND/feedback/</feedback_url>
            </event>
            <event guid='18d1847b-c929-5c98-93ed-f0826a0e08ca' id='652'>
                <room>Saal ZIGZAG</room>
                <title>Wie wird gleich?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T22:05:00+01:00</date>
                <start>22:05</start>
                <duration>00:40</duration>
                <abstract>Welchen Einfluss hat die Form der Dinge? Wie wirken wir durch die Gestaltung unseren kulturellen Praxen, Architekturen, Sprachen und Strukturen auf uns und die uns umgebende Zukunft ein? Und warum findet sich in zeitgen&#246;ssischer Design Theorie ein Verb wie *Futuring*?</abstract>
                <slug>38c3-652-wie-wird-gleich-</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/TEAHVC/IMAG0015_cxP9iRb.JPG</logo>
                <persons>
                    <person id='657'>kathia</person>
                </persons>
                <language>de</language>
                <description>Basierend auf der Annahme, dass alles mit allem zusammen h&#228;ngt und ein gemeinsames Interesse besteht, die gesamte Schei&#223;e zum Guten zu wenden, lade ich dazu ein, anhand von Praxisbeispielen aus meiner k&#252;nstlerischer Forschung und einfachen Live-Experimenten, zu erfahren, wie wir alle Welt gestalten. Und wie wir aus diesem Beteiligt sein Mut ziehen k&#246;nnen, einer lebenswerten Zukunft f&#252;r alle n&#228;her zu kommen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TEAHVC/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TEAHVC/feedback/</feedback_url>
            </event>
            <event guid='9285ab89-97ce-5457-8eaa-1de6b5c4848a' id='625'>
                <room>Saal ZIGZAG</room>
                <title>Hacking the RP2350</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>Raspberry Pi&apos;s RP2350 microcontroller introduced a multitude of new hardware security features over the RP2040, and included a Hacking Challenge which began at DEF CON to encourage researchers to find bugs. The challenge has been defeated and the chip is indeed vulnerable (in at least one way). This talk will cover the process of discovering this vulnerability, the method of exploiting it, and avenues for deducing more about the relevant low-level hardware behavior.</abstract>
                <slug>38c3-625-hacking-the-rp2350</slug>
                <track>Security</track>
                
                <persons>
                    <person id='605'>Aedan Cullen</person>
                </persons>
                <language>en</language>
                <description>The RP2350 security architecture involves several interconnected mechanisms which together provide authentication of code running on the chip, protected one-time-programmable storage, fine-grained control of debug features, and so on. An antifuse-based OTP memory serves as the root of trust of the system, and informs the configuration of ARM TrustZone as well as additional attack mitigations such as glitch detectors. Raspberry Pi even constructs an impressive, bespoke Redundancy Coprocessor (RCP), which hardens execution of boot ROM code on the Cortex-M33 cores with stack protection, data validation, and instruction latency randomization.

Since there are many potential incorrect guesses to be made about where problems might lie, here I begin with the most fundamental features of the chip logic, including the reset process. Even small oversights at this level can entirely defeat sophisticated security efforts if higher-level mechanisms place complete trust in seemingly simple hardware operations. I show how cursory research into the design details of IP blocks used in the SoC can help inform an attack, and demonstrate the importance of fully testing new features which are built atop older IP. Ultimately, the significant amount of luck (or lack thereof) involved is a reminder of the need to meticulously understand and validate complex systems.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/39HFD9/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/39HFD9/feedback/</feedback_url>
            </event>
            <event guid='b1740c2f-0c44-5f1b-89ed-456a9eecf0b8' id='42'>
                <room>Saal ZIGZAG</room>
                <title>A Competitive Time-Trial AI for Need for Speed: Most Wanted Using Deep Reinforcement Learning</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>00:40</duration>
                <abstract>All challenges and achievements in creating a competitive time-trial AI in NFS:MW.</abstract>
                <slug>38c3-42-a-competitive-time-trial-ai-for-need-for-speed-most-wanted-using-deep-reinforcement-learning</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/TPGRNN/Screenshot_from_2024-10-19_17-05-41_OmPkGCO.png</logo>
                <persons>
                    <person id='26'>Sebastian &quot;Schw4rz&quot; Schwarz</person>
                </persons>
                <language>en</language>
                <description>15 years ago, at the height of my eSports career, I uploaded an (unofficial) ESL record at Need for Speed: Most Wanted (2005) (NFS:MW) to Youtube. In the meantime Deep Reinforcement Learning became popular and ever since I have dreamt of creating a competitive AI for my favorite racing game of all time: NFS:MW. Now finally the time was right: The hardware is fast enough, good software is available, and Sony&apos;s AI research has proven the task is actually doable. Hence I thought: &quot;How hard can it possibly be?&quot;.

This talk will present in detail all challenges and achievements in creating a competitive time-trial AI in NFS:MW from scratch - including but not limited to - hacking of the game to create a custom API, building a custom (real-time) OpenAI gym environment, steering the game using a virtual controller, and finally successfully training an AI using the Soft-Actor-Critic algorithm. All code including the API is written in Python and is open source.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TPGRNN/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TPGRNN/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal GLITCH' guid='7202df07-050c-552f-8318-992f94e40ef0'>
            <event guid='59022846-b130-581e-a89f-ecf6e7e43940' id='66'>
                <room>Saal GLITCH</room>
                <title>libobscura: Cameras are difficult</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>I&apos;m not big-brained enough to use cameras on Linux, so I decided to write my own camera stack (based on a real story).</abstract>
                <slug>38c3-66-libobscura-cameras-are-difficult</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/QSC7YF/text_o_1iuq1Lj.png</logo>
                <persons>
                    <person id='52'>DorotaC</person>
                </persons>
                <language>en</language>
                <description>The libobscura experiment exists to find out what a point-and-shoot API abstracting Video4Linux should look like. It has its roots on one hand in the Librem 5 project, where I wrote some 70% of the camera stack, and on the other hand in libcamera, which I found too difficult to use.

You think controlling a modern camera is easy? Think again. Between pixel formats, depths, media entities, pads and links, sensitivity, denoising, phase detection, shutter lengths, DMAbuf, OpenGL, feedback loops, requests, and statistics, there&apos;s enough opportunities to get lost in the detail.

Thankfully, Prototype Fund thinks I&apos;m up for the challenge, so they are funding me through libobscura in order to get lost, and maybe find something in the process.

Project repo: https://codeberg.org/libobscura/libobscura</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QSC7YF/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QSC7YF/feedback/</feedback_url>
            </event>
            <event guid='1329fc5a-94bf-529e-b18b-da53ebfda3bb' id='543'>
                <room>Saal GLITCH</room>
                <title>ACE up the sleeve: Hacking into Apple&apos;s new USB-C Controller</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>With the iPhone 15 &amp; iPhone 15 Pro, Apple switched their iPhone to USB-C and introduced a new USB-C controller: The ACE3, a powerful, very custom, TI manufactured chip.

But the ACE3 does more than just handle USB power delivery: It&apos;s a full microcontroller running a full USB stack connected to some of the internal busses of the device, and is responsible for providing access to JTAG of the application processor, the internal SPMI bus, etc.

We start by investigating the previous variant of the ACE3: The ACE2. It&apos;s based on a known chip, and using a combination of a hardware vulnerability in MacBooks and a custom macOS kernel module we managed to persistently backdoor it - even surviving full-system restores.

On the ACE3 however, Apple upped their game: Firmware updates are personalized to the device, debug interfaces seem to be disabled, and the external flash is validated and does not contain all the firmware. However using a combination of reverse-engineering, RF side-channel analysis and electro-magnetic fault-injection it was possible to gain code-execution on the ACE3 - allowing dumping of the ROM, and analysis of the functionality.

This talk will show how to use a combination of hardware, firmware, reverse-engineering, side-channel analysis and fault-injection to gain code-execution on a completely custom chip, enabling further security research on an under-explored but security relevant part of Apple devices. It will also demonstrate attacks on the predecessor of the ACE3.</abstract>
                <slug>38c3-543-ace-up-the-sleeve-hacking-into-apple-s-new-usb-c-controller</slug>
                <track>Security</track>
                
                <persons>
                    <person id='563'>stacksmashing</person>
                </persons>
                <language>en</language>
                <description>The Lightning and USB-C ports on Apple devices have been well known to &quot;hide&quot; secrets beyond just exposing USB and charging functionality: For example last year at CCC, we showed how we can gain access to JTAG on the iPhone 15 using a custom-build PCB (&quot;Tamarin-C&quot;).

All this is handled on new Apple devices using a chip called the ACE3: While previous Apple USB-C devices used a slightly modified Texas Instruments TPS65986, the ACE3 is significantly more custom - and significantly more powerful: It runs a full USB stack (implementing the &quot;Port DFU&quot; mode) and is connected to different internal busses of the phone, making it an interesting target for persistent firmware-implant style attacks. Imagine modifying/backdooring the USB-C controller in a way where it will automatically compromise the main operating-system - essentially making (potential) USB jailbreaks untethered.

But how do we approach a custom chip without any documentation and which has its firmware in an internal ROM?

With the ACE2 it was possible to dump the integrated ROM using JTAG/SWD, which allowed us to identify &amp; exploit a hardware (on all MacBooks except the M3 Pro &amp; Max) vulnerability to persistently modify the ACE2.


However the ACE3 is different: We don&apos;t even have a pinout for the chip (which has 120 pins), JTAG seems disabled, and the external flash does not even contain the actual firmware, but only tiny patches for the actual firmware in the chip - and the contents are cryptographically validated!

After attempting different software avenues of attacking the ACE3 (including building a small fuzzer and finding a timing side-channel attack to enumerate available commands) with no success, and seeing that the ACE3 implements firmware personalization, it was time for the ace up the sleeve: Hardware attacks.

After reverse-engineering the external flash layout (including CRCs) and finding that the flash is cryptographically verified (and that a secure-boot bypass vulnerability we found on the ACE2 does not work on the ACE3), the idea was born to use electro-magnetic measurements to determine when during the startup of the chip the validation fails.

And by triggering a software-defined radio on the activity of the external flash, it was possible to gather a very precise point in time where the check is being done - perfect to try some fault injection!

Unfortunately no good isolated power-supply for the ACE3 could be found to use with voltage fault injection, and so instead I decided to try electro-magnetic fault injection: By &quot;blasting&quot; the chip with strong electro-magnetic fields at just the point in time determined during the EM measurement I was hoping to be able to bypass the check - and after hours of trying, debugging, moving the injection tip, more debugging, and more time, it eventually succeeded: A modified patchset could be booted into the CPU.

But &#8230; How do we make sure our &quot;patch&quot; actually gets executed? How do we dump the ROM without having any IO? And how do we even know what (in the 32-bit address space of the processor) we should dump? And can we implement the attack without thousands of dollars of hardware? We will look at all of these things during the talk.

Itemized progression draft:
- Introduction
	- whoami
	- History of Lightning/USB-C secrets on Apple devices
- A quick look at ACE2
	- Technical details &amp; usage
	- Dumping the ACE2
	- Analyzing the MacBook hardware
	- Building a kernel-level SWD probe to hack the ACE2 without opening the device
	- Disabling the secure-update functionality of the ACE3
- The ACE3
	- iPhone 15 vs iPhone 16 vs MacBook with M3 Pro/Max
	- No matching Texas Instruments chip, no public documentation, no schematics
	- Software exploration
		- Apple&apos;s HPM bus
		- Discovering a timing-sidechannel for supported commands
	- Hardware exploration
		- Trying to find SWD (with which I think I succeeded - however it seems to be disabled)
		- Dumping the external flash
	- Flash exploration
		- No full firmware, just patches
		- Some CRCs found, but also firmware personalization (IM4M)
		- Seems to be cryptographically verified
	- Attempting to flash modified dumps (with fixed CRCs) unsuccessfully
	- Electro-magnetic measurement
		- Setup: HackRF + small inductor as antenna
		- Building a reliable Trigger signal for the SDR: Flash chip-select line
		- Compare when the chip-boot fails with correct and invalid CRCs in the flash
		- Identified point in time where the boot seems to abort
		  (Screenshots for this can be found in the attachments)
	- Fault injection
		- Quick primer: Voltage FI vs EMFI
		- Setup: ChipSHOUTER on MacBook, ChipWhisperer Husky for trigger-generation, software to reboot the chip &amp; arm the glitcher
		- Experimenting to determine correct parameters by attempting to fail the boot with correct firmware
	- The actual attack
		- Flash modified patchset (Changed version-string)
		- Reboot chip
		- Glitch chip at the right time
		- Test for success, repeat
	- Success - but what now?
		- Getting actual code-execution through the attack by overwriting a patched command
		- Using HPM bus to execute the command and dump 64 bytes at a time
		- A look at the dumped firmware
	- Reducing the attack-costs: Performing the attack with &lt;$100 of equipment
- How could this have been prevented?
- What&apos;s next?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/RUBQ88/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/RUBQ88/feedback/</feedback_url>
            </event>
            <event guid='33ec3f8d-2734-5ca8-be30-3f458b539afb' id='372'>
                <room>Saal GLITCH</room>
                <title>Transparency? Not from the European Commission</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>The European Commission is the executive branch of the European Union with the duty to uphold the law. The transparency of the Commission&#180;s actions and decisions range from questionable to abysmal. Attempts by the public to access information are often thwarted. This talk will cover the Commission&#180;s lack of transparency, challenges faced by the public in accessing information, Commission&#180;s tactics and examples of the European Ombudsman&#180;s interventions to improve the situation. Whether you are interested in ChatControl, AI or public procurement, this talk will have you covered.</abstract>
                <slug>38c3-372-transparency-not-from-the-european-commission</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='260'>Kris Shrishak</person>
                </persons>
                <language>en</language>
                <description>~~Redacted~~</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7L7TBY/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7L7TBY/feedback/</feedback_url>
            </event>
            <event guid='e3bb8bc4-a3e2-5968-b1d3-ec61fff42810' id='418'>
                <room>Saal GLITCH</room>
                <title>Life in the Lager: How it is &amp; how to support</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>Was ist ein Lager und warum ist es so schrecklich und unmenschlich? Wir werden einen &#220;berblick &#252;ber betroffene Perspektiven mit Selbst&#173;erfahrungen geben, wie man in Lagern (Wohnheimen, EAE) lebt.

Wir geben einen &#220;berblick &#252;ber die rassistische Bezahlkarte, sowie die Einschr&#228;nkung der Freiheit wie schwer ist  und &#252;ber das Leben von Jugendliche in Lagern.
Was machen wir? Wie k&#246;nnen wir unterst&#252;tzen und worauf sollte man achten?</abstract>
                <slug>38c3-418-life-in-the-lager-how-it-is-how-to-support</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='452'>Hafid Shaaib</person>
                </persons>
                <language>de</language>
                <description>Wir sind eine selbstorganisierte Initiative von Migrantinnen mit Fluchterfahrung, die in Ostdeutschland Rassismus im Alltag erlebt haben. Wir wollen ihre Lebenssituation sichtbarer machen und langfristig mehr gesellschaftliche Solidarit&#228;t erreichen. In dieser Pr&#228;sentation sprechen wir &#252;ber das harte Leben in den Lagern und l&#228;ndlichen Regionen, &#252;ber den allt&#228;glichen Rassismus in Beh&#246;rden, am Arbeitsplatz &#8230;, Wir werden auch &#252;ber die Bezahlkarte und Essensscheine sprechen, basierend auf unseren eigenen Erfahrungen. Diese Ma&#223;nahmen sind nicht nur rassistisch, sie entmenschlichen die Betroffenen &#8211; besonders Jugendliche. Sie verletzen ihre W&#252;rde,  Wir geben auch Beispiele, wie jeder von euch konkret unterst&#252;tzen und Solidarit&#228;t zeigen kann.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7KYFDQ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7KYFDQ/feedback/</feedback_url>
            </event>
            <event guid='922cc80e-c00a-5da0-b7c5-cdccfec9fa2c' id='191'>
                <room>Saal GLITCH</room>
                <title>Demystifying Common Microcontroller Debug Protocols</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>Many developers know that the answer to &quot;How do I debug this microcontroller&quot; is either &quot;JTAG&quot; or &quot;SWD&quot;. But what does that mean, exactly? How do you get from &quot;Wiggling wires&quot; to &quot;Programming a chip&quot; and &quot;Halting on breakpoints&quot;? This talk will cover how common debug protocols work starting from signals on physical wires, cover common mechanisms for managing embedded processors, and ending up at talking to various common microcontrollers.</abstract>
                <slug>38c3-191-demystifying-common-microcontroller-debug-protocols</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='112'>Sean &quot;xobs&quot; Cross</person>
                </persons>
                <language>en</language>
                <description>Embedded programming is the art of shrinking complex programs in tiny packages by throwing away unnecessary features. With modern microcontrollers, debugging need not be one of the features thrown away. Most modern chips include some form of low-level access, but the technical details aren&apos;t widely understood. Many users of embedded firmware will use their preferred debugger without thinking too hard about what&apos;s going on underneath.

We&apos;ll start by covering what it means to debug embedded software. The primitives required to have an interactive debug session are surprisingly minimal. From this, we&apos;ll build up a list of requirements and &quot;nice to haves&quot; to make a debugging environment comfortable, and reference existing &quot;bespoke&quot; debug approaches. We&apos;ll cover several examples of debug engines ranging from cores designed to go into FPGAs to tiny 8-bit microcontrollers.

Next, we&apos;ll take a step back and describe the common lower-level protocols such as JTAG and SWD. These describe physical signals that go between the host and the target. We&apos;ll compare various protocols and see how they map onto the higher-level primitives discussed earlier. Armed with examples, we&apos;ll see how the protocol stack is formed.

Next, we&apos;ll use the knowledge of low-level protocol implementations and the requirements for debugging to look at common abstractions on top of physical transports to implement core control. This will bridge the gap between &quot;JTAG or SWD are the protocol&quot; to &quot;Poking a value in memory on a microcontroller&quot;. In this section, we&apos;ll cover the more common and generic uses such as Arm&apos;s ADI and the RISC-V DMI and see how complex and cross-target configurations are built to be rigid enough to have rich debug features while flexible enough to handle a wide range of processor configurations.

Finally, we&apos;ll cover common tasks such as programming flash memory, watchpoints, and single-step debugging -- things that we take for granted in the desktop world and would like to have when programming for a potato that costs less than an actual potato.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8MSZTT/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8MSZTT/feedback/</feedback_url>
            </event>
            <event guid='a0f85732-adef-50bb-a90f-a64129036df1' id='360'>
                <room>Saal GLITCH</room>
                <title>Als die Kommentarspalten brannten &#8211; 11 Monate Einsatz in Gaza</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>Der Krieg in Gaza als Reaktion auf die Terrorattacke vom 7. Oktober l&#228;uft mittlerweile &#252;ber ein Jahr. Cadus ist seit Februar diesen Jahres in Gaza im Einsatz. Auch seit Februar diesen Jahres teilen wir wie so viele andere die Erfahrung, das vor dem Hintergrund unseres Einsatzes fernab von Gaza sich leidenschaftlich &#8222;politisch&#8220; auseinandergesetzt wird. Nicht &#220;BER unseren Einsatz wohlgemerkt, sondern dar&#252;ber, ob wir jetzt die eine oder andere Seite genug verurteilen w&#252;rden f&#252;r die Art und Weise wie der Krieg gef&#252;hrt wird. In unserem Talk &#8222;Als die Kommentarspalten brannten &#8211; 11 Monate Einsatz in Gaza&#8220; sprechen wir &#252;ber die Herausforderungen, die unseren Einsatz tats&#228;chlich begleiten.</abstract>
                <slug>38c3-360-als-die-kommentarspalten-brannten-11-monate-einsatz-in-gaza</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='385'>Sebastian J&#252;nemann</person><person id='388'>Anna-Lea G&#246;hl</person><person id='1098'>Nic Zemke</person>
                </persons>
                <language>de</language>
                <description>Cadus ist seit Februar 2024 in Gaza im Einsatz. Unsere Arbeit dort umfasst die Stabilisierung schwerstverletzter Zivilist*innen, medical evacuations und Unterst&#252;tzung/medizinische Absicherung der Eins&#228;tze des United Nations Mine Action Service. Dieser Einsatz ist in Bezug auf die Herausfoderungen auf vielen Ebenen noch einmal deutlich anspruchsvoller als das, was wir als CADUS aus anderen Kriegsgebieten gewohnt sind. Seit Februar haben wir mehr als 3500 schwerstverletzte Patient*innen behandelt und mehrere hundert Menschen innerhalb Gazas und aus Gaza heraus evakuiert.

Wir beleuchten unseren Katastrophenhilfe-Einsatz aus drei unterschiedlichen Blickwinkeln. Sebastian wird &#252;ber die logistischen und administrativen Herausforderungen unseres Einsatzes reden. Wie geht das, in einem der aktuell gef&#228;hrlichsten Kriegsgebiete einen Hilfseinsatz zu starten und am laufen zu halten? Vor allem unter Ber&#252;cksichtigung der bestehenden umfassenden Embargos und der Behinderungen humanit&#228;rer Hilfe

Anna-Lea berichtet dar&#252;ber, wie wir unsere Teams auf den Einsatz vorbereiten, wie wir versuchen sie w&#228;hrend des Einsatzes zu unterst&#252;tzen, und wie ein Nachsorgeangebot aussehen kann (und muss) f&#252;r Leute die freiwillig in so einen Einsatz gehen.

Mit Nic Zemke hatten wir passend zum 38c3 einen echten Nerd im Einsatz, der dar&#252;ber sprechen wird wie derzeit Hilfsorganisationen und Vereinte Nationen KML-Files mit &#252;berlebenswichtigen Informationen &#252;ber WhatsApp hin und her schicken und wie wir ein f&#252;r die Seenotrettung entwickeltes Geoinformationssystem in k&#252;rzester Zeit so umgebaut haben, dass die Koordination von Hilfseins&#228;tzen bald hoffentlich weniger Fehleranf&#228;llig l&#228;uft.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KNG7P3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KNG7P3/feedback/</feedback_url>
            </event>
            <event guid='efab535f-22b0-50a3-b6cc-4b61097ab4d0' id='462'>
                <room>Saal GLITCH</room>
                <title>An open-source guide to the galaxy: Our journey with Ariane 6</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>The 530 tons and 63 meter tall Ariane 6 rocket finally launched on July 9th 2024 carrying our open-source developed payloads &#8211; the SIDLOC experiment and the satellite Curium One &#8211; into space. SIDLOC tested a new, open, low-power standard for identifying and precisely locating spacecraft whilst our satellite Curium One established an open-source baseline for larger CubeSat systems and allowed us to test a bunch of new technologies. From sourcing a launch opportunity to the final integration onto the rocket at the spaceport in French Guiana we tell you about our biggest challenges and exceptional experiences of this adventure.</abstract>
                <slug>38c3-462-an-open-source-guide-to-the-galaxy-our-journey-with-ariane-6</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/BMDSF7/Manolis_Surligas_Manthos_Papamatthaioumanthos_and_Paul_Koetter_a_2CrKxyz.jpg</logo>
                <persons>
                    <person id='490'>Manthos Papamatthaiou</person><person id='494'>Paul Koetter</person>
                </persons>
                <language>en</language>
                <description>In this talk members of the Libre Space Foundation will take you on the journey of a rocket&apos;s payload: beginning with how the SIDLOC experiment and the satellite Curium One were developed, integrated and finally launched on the Ariane 6 maiden flight into space.

1. **SIDLOC** (Spacecraft Identification and Localization):
Developed in collaboration with ESA, SIDLOC aims to improve space safety and mission success rate by establishing an open beaconing standard for spacecraft identification and localization. SIDLOC uses a low power beacon that utilizes the Spread Spectrum modulation and the cross-correlation properties of the Gold sequences, ensuring proper operation in extremely low SNR environments and identification of the transmitting space object. In addition, SIDLOC can provide localization and orbit determination, utilizing the Doppler frequency offset estimation mechanism that it implements. To  achieve that, the open and crowd-sourced SatNOGS network is used, contributing to an independent source of orbital elements and spacecraft identifications, disrupting the existing model. The SIDLOC protocol has been implemented in such a way, so it is easy to integrate to a space object, regardless of its size, with minimal effort.

2. **Curium One**:
The satellite Curium One is designed to establish an open-source framework for satellite systems. It features 15 newly designed open-hardware PCBs. From solar generators to the on board computer and high frequency communication boards everything was designed, tested and qualified by the community with the help of Planetary Transportation Systems. Its first signal acquisition was performed by the formerly world&apos;s largest radio telescope built in 1956 &#8211; the 25m diameter Dwingeloo Radio Observatory.

We want to tell you about the development and implementation of the core technologies, the biggest challenges we faced during the missions, and the wild jungle experiences at the spaceport in Kourou. We aim to provide an overview of how open-source principles are being applied in space exploration and the benefits and problems of this approach within the space industry.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/BMDSF7/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/BMDSF7/feedback/</feedback_url>
            </event>
            <event guid='1f094de4-6b22-5484-9b43-9b51f2d40d11' id='722'>
                <room>Saal GLITCH</room>
                <title>Dead Man&#8217;s Switch. An art shield to protect the life of Julian Assange</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>Artist Andrei Molodkin held $45million of art hostage to free Julian Assange. He vowed to dissolve Picasso, Rembrandt, Warhol and other masterpieces in acid using a dead man&#8217;s switch device inside a 29-tonne Grade 5 Safe Room if Julian Assange was to die in prison. The talk will explain the process and methodology.</abstract>
                <slug>38c3-722-dead-man-s-switch-an-art-shield-to-protect-the-life-of-julian-assange</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/XCLUY7/IMG_4788_mIwV6rg.jpg</logo>
                <persons>
                    <person id='778'>Andrei Molodkin</person><person id='903'>Arianna Mondin</person>
                </persons>
                <language>en</language>
                <description>Dead Man&#8217;s Switch is an art shield. It is not a human shield: that is what terrorists produce. Dead Man&#8217;s Switch, on the contrary, is a tool for negotiation. 
&#8220;Taking hostage&#8221; is one of the most common languages used by the power structure. In his artistic career, Andrei Molodkin, developed the method of mirroring the language of power within the formal parameters of Political Minimalism. In the case of the Dead Man&#8217;s Switch, the Medusa Gorgon mirror used to hit the power structure has been done by taking hostage the most important of capitalistic symbols, its icons and values. In this catastrophic time, to destroy art is much more taboo than to destroy the life of a person. Arianna Mondin, applied Interpol&#8217;s criminal investigation method to the field of architecture in her PhD to unveil the connection between architecture and oil. She used this method in the development strategy of Dead Man&#8217;s Switch.
The talk will focus on the process of realizing the Dead Man&#8217;s Switch to mirror the language of power to release Julian Assange from prison. In particular, it will clarify the operation to involve artists and collectors in participating by donating their artworks to secure the survival of the most consequential political prisoner of our times. The project involved also specialists in security, negotiation, hardware and software, all together organised in a system aimed at reprogramming the power structure.
The talk will conclude by explaining the technical details, software and hardware, and the conceptualisation of the counter as a method of escalation and resetting the system.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XCLUY7/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XCLUY7/feedback/</feedback_url>
            </event>
            <event guid='20224ba0-dbaa-5631-82dc-70a751aa799c' id='528'>
                <room>Saal GLITCH</room>
                <title>EU&apos;s Digital Identity Systems - Reality Check and Techniques for Better Privacy</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>Digital identity solutions, such as proposed through the EU&apos;s eIDAS regulation, are reshaping the way users authenticate online. In this talk, we will review the currently proposed technical designs, the impact such systems will have, and provide an outlook on how techniques from modern cryptography can help to improve security and privacy.</abstract>
                <slug>38c3-528-eu-s-digital-identity-systems-reality-check-and-techniques-for-better-privacy</slug>
                <track>Security</track>
                
                <persons>
                    <person id='557'>Anja Lehmann</person><person id='145'>Thomas Lohninger</person>
                </persons>
                <language>en</language>
                <description>Digital Identity solutions are on the rise all around the world. In particular the European Union is establishing a range of ambitious proposals like eIDAS to establish a general purpose platform for identification, authentication and transfer of personal data that will be used by eGovernment, logging into Facebook, public transport, eCommerce and doctor visits. With the Digital Euro, the EU Digital Travel App, Age Verification Apps and many other proposals we can see the scary trajectory the EU is headed towards. This talk provides a critical reality check about the underlying technology, the impact these systems will have on our privacy on a daily basis and what security (hell) we can expect.  

The talk will also give an overview of the proposed technical eIDAS architecture, and the [Cryptographers&apos; Feedback on the EU Digital Identity&#8217;s ARF](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/issues/200). We will also provide a brief introduction into zero-knowledge proofs, the security and privacy properties they can provide for Digital Identities, and what is missing to bring these technologies into reality.

Thomas Lohninger has worked for the digital rights NGO epicenter.works to advocate for [strong privacy in the eIDAS law](https://epicenter.works/en/thema/eid-digital-public-infrastructures) on EU level. He is a member of the [Ad-Hoc Technical Advisory Group of the EU-Commission on eIDAS Wallet](https://epicenter.works/en/content/nda-of-the-ad-hoc-technical-advisory-group-of-the-eu-commission-on-eidas-wallet) and the only civil society Jury member of the SPRIND Funke on [EUDI WALLET Prototypes](https://epicenter.works/en/content/germany-eidas-wallet-jury-agreement-nda) of the German government.

Anja Lehmann is a professor for cryptography at the Hasso-Plattner-Institute, University of Potsdam, with a focus on developing privacy-enhancing technologies, in particular enabling privacy-preserving authentication. She is a Jury member of the SPRIND Funke on [EUDI WALLET Prototypes](https://www.sprind.org/impulse/challenges/eudi-wallet-prototypes#anchor-jury) and also supports the SPRIND EUDI project on the integration of zero-knowledge proofs since October 2024.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QR7CRG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QR7CRG/feedback/</feedback_url>
            </event>
            <event guid='68ded9c9-72a2-56b7-8191-4cb235bef513' id='691'>
                <room>Saal GLITCH</room>
                <title>How to Spec - Fun with dinosaurs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>The public image of dinosaurs is largely shaped by art. While paleontology is a dynamic and productive science, it is primarily through paleoart that our perception of prehistoric life takes form. By combining informed speculation with a deep understanding of anatomy, ecology, and geology, paleoartists continuously reimagine extinct organisms in innovative ways.</abstract>
                <slug>38c3-691-how-to-spec-fun-with-dinosaurs</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='734'>Joschua Kn&#252;ppe</person>
                </persons>
                <language>en</language>
                <description>The public image of dinosaurs is largely shaped by art. While paleontology is a dynamic and productive science, it is primarily through paleoart that our perception of prehistoric life takes form. This tradition of science informed art form, rooted in a 200-year history, finds its inspiration in the fossil record and the interpretations it offers.
The gaps in our knowledge are as influential as the fossils themselves. Through informed speculation and a fundamental understanding of anatomy, ecology and geology a paleoartist is able to bring back extinct organisms in ever new ways.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WFEH8C/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WFEH8C/feedback/</feedback_url>
            </event>
            <event guid='7010639d-b24b-58f7-9d29-954ff445ca6c' id='492'>
                <room>Saal GLITCH</room>
                <title>Proprietary silicon ICs and dubious marketing claims? Let&apos;s fight those with a microscope!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T22:05:00+01:00</date>
                <start>22:05</start>
                <duration>00:40</duration>
                <abstract>Custom silicon chips are black boxes that hold many secrets, like internal ROMs, security features and audio DSP algorithms. How does one start reverse engineer them? Let&apos;s look at the basics of silicon reverse engineering, what gate array chips are, and how some tooling can generate Verilog code automatically from a die shot.</abstract>
                <slug>38c3-492-proprietary-silicon-ics-and-dubious-marketing-claims-let-s-fight-those-with-a-microscope-</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='472'>giulioz</person>
                </persons>
                <language>en</language>
                <description>A digital synthesizer from 1986 was completely shrouded in mystery and dubious marketing claims. Being that old, eventually every working unit will break, leaving us with the no info about its inner workings. I could not accept this, so I decided to get into silicon reverse engineering. By dissolving its undocumented custom chips into acid and looking at them through a microscope, I was able to get an understanding of what was going on internally, to be able to preserve it and emulate it in the future.

This is possible because lot of custom silicon chips from that era (80s and 90s) are of the &quot;gate array&quot; type: a grid-like structure that contains thousands of digital logic gates. By looking at them closely we can understand what those gates do, and by following the wiring between them we can reconstruct the entire system. This method allowed people to understand and recreate perfect emulations of arcade games, sound chips, security ICs and more.

In this talk I want to tell my journey into silicon reverse engineering from my perspective of a complete beginner and software guy, and what I learned in the process. I will go through the different kinds of custom chips, how they look under a microscope, their different parts, what can be easily reverse engineered and what can not. Those chips do not only contain logic, but also RAM and ROM parts, and knowing how to identify them can give clues when looking at the logic is too complicated. Sometimes a chip can be completely understood even without knowing that a MOSFET is.

I will also cover the process I used for reverse engineer them, some techniques that worked and some that didn&apos;t, and some tools I built to automatically extract mask ROMs and generate Verilog code from die shots.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CMQST8/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CMQST8/feedback/</feedback_url>
            </event>
            <event guid='9548a3ab-e637-5940-b923-3008af58eee6' id='39'>
                <room>Saal GLITCH</room>
                <title>IRIS: Non-Destructive Inspection of Silicon</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-27T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>IRIS (Infra-Red, *in situ*) is a technique for non-destructively inspecting the construction of a select but common type of chip. It can improve visibility into our hardware and provide supporting evidence of its correct construction, without desoldering chips or expensive analytical gear. This talk covers the theory behind IRIS, as well as some embodiments of the technique. I will also frame the relevance of IRIS in the face of various threat scenarios. Time permitting, I&#8217;ll also show how you can do it at home by peeking around a few chips as a demo.</abstract>
                <slug>38c3-39-iris-non-destructive-inspection-of-silicon</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='23'>Andrew &apos;bunnie&apos; Huang</person>
                </persons>
                <language>en</language>
                <description>Do we really know what chips are inside our devices? To a first order, the answer is &#8220;no&#8221;. We can read the label printed on the chip&apos;s package, but most of us have no way to determine if the silicon actually matches what&#8217;s on the label.

This lack of transparency has lead to much hand-wringing about the safety of our global supply chains, as chips zig-zag the globe on their way to our doorstep: each stop is an opportunity for bad actors to inject malicious hardware, and those of us without access to million-dollar analytical gear have no way of detecting this.

IRIS (Infra-Red, *in situ*) is a technique I have been developing that aims to democratize the inspection of silicon. It turns out that for a select but fairly common type of chip - those in chip-scale packages - a simple modification to an off the shelf microscope camera can enable the visualization of micron-scale features within &#8211; without requiring any nasty chemicals or desoldering chips. I will also show how the basic everyday technique can be combined with a Jubilee 3D motion platform to create detailed, full-chip images.

This talk will cover the basic theory behind the technique, and frame it in the context of several hypothetical threat scenarios that highlight its strengths and limitations. It is important to understand that IRIS is not a panacea for chip verification, but it is a significant step forward in improving transparency. I will also discuss its potential as a new tool for system designers who are serious about enabling user-level hardware verification.

Finally, time permitting and equipment cooperating, I would like to share the simple pleasure of being able to take a peek inside the chips of some common mobile phone motherboards with a live demo.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/P9WRAY/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/P9WRAY/feedback/</feedback_url>
            </event>
            <event guid='4bf7f17e-2158-5b5b-b274-0b595f800371' id='260'>
                <room>Saal GLITCH</room>
                <title>Bl&#229;mba! &#9742;&#65039; Behind the scenes of a 2000s-style ringtone provider</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>00:40</duration>
                <abstract>A Deep Dive into WAP, SMS, monophonic ringtones and 1-bit graphics.</abstract>
                <slug>38c3-260-blmba-behind-the-scenes-of-a-2000s-style-ringtone-provider</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/JKACDE/cedb4a431bad1b87_tDPbPbg.png</logo>
                <persons>
                    <person id='273'>Manawyrm</person>
                </persons>
                <language>en</language>
                <description>A key part of early 2000s advertisements were hyperactive frogs and annoying crocodiles trying to lure people into subscribing to overpriced ringtones and silly graphics for their mobile phones.

Apart from shady business practices -- how exactly do you send pictures and ringtones to vintage GSM mobile phones (most of which don&apos;t even support TCP/IP)?
In our quest to learn more, we stumbled across WAP-Push, User Data Headers, Concatenated SMS, SMPP, User Agent Profiles and many more forgotten technologies.

To put all this knowledge to good use, we built Bl&#229;mba -- a Chaos ringtone provider, clearly inspired by the (now long defunct) historic ones. 

Then at Chaos Communication Camp 2023 with the C3GSM network, we had the first public instalment of Bl&#229;mba.
The Chaos community uploaded lovely artwork and new ringtones, sent patches for the software, and had a fun time reviving their old Nokia phones.

This talk will tell the story behind Bl&#229;mba, explain how ringtones (and more) made their way onto your phone, what a WAP gateway did, and what other cool tricks mobile phones could do (if you had the money to pay for GPRS traffic 20 years ago).</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JKACDE/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JKACDE/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2024-12-28' start='2024-12-28T04:00:00+01:00' end='2024-12-29T03:59:00+01:00'>
        <room name='Saal 1' guid='ba692ba3-421b-5371-8309-60acc34a3c05'>
            <event guid='e81b264f-8337-58a1-87f8-6be92778c8b4' id='313'>
                <room>Saal 1</room>
                <title>Illegal instructions by legals - Anweisungen f&#252;r den anwaltlich begleiteten Rechtsbruch</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Tracker an Tiertransporter, Kameras vor einer Steueroase, Ver&#246;ffentlichungen von Verschlusssachen, Frontex verpetzen oder sich selbst verpetzen lassen, Menschen in Seenot retten. Zwei Anw&#228;ltinnen, die Recht(sbruch) studiert haben, teilen mit euch ihre Erfahrungen aus juristischer out of Action preparation, Whistleblowing-Schutz und Anti-Repressions-Arbeit.</abstract>
                <slug>38c3-313-illegal-instructions-by-legals-anweisungen-fr-den-anwaltlich-begleiteten-rechtsbruch</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='333'>Vivian Kube</person><person id='337'>Vera Magali Keller</person>
                </persons>
                <language>de</language>
                <description>Tracker an Tiertransporter, Kameras vor einer Steueroase, Ver&#246;ffentlichungen von Verschlusssachen, Frontex verpetzen oder sich selbst verpetzen lassen, Menschen in Seenot retten. Zwei Anw&#228;ltinnen, die Recht(sbruch) studiert haben, teilen mit euch ihre Erfahrungen aus juristischer out of Action preparation, Whistleblowing-Schutz und Anti-Repressions-Arbeit. 

Was immer du recherchieren m&#246;chtest, welche Missst&#228;nde du aufdecken m&#246;chtest, wir zeigen wie es geht. Wir spielen mit euch eine fiktive Aktion durch: Von der Planung &#252;ber die Durchf&#252;hrung bis zur Sicherung der Erkenntnise und Vorbereitung auf Ermittlungsma&#223;nahmen. 

Bonusmaterial - Plan B: Was tun, wenn was schief geht? Neuorientierung when shit hits the fan oder wie mensch sich Repressionen und Kriminalisierung zu nutze machen kann.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/S3WJCS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/S3WJCS/feedback/</feedback_url>
            </event>
            <event guid='f7a65ad7-da22-5821-b071-ded5e66ef6fe' id='599'>
                <room>Saal 1</room>
                <title>Digitalisierung mit der Brechstange</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>F&#252;nf Prozent der Bev&#246;lkerung im Alter von 16 bis 74 Jahren in Deutschland sind offline. Daf&#252;r gibt es verschiedenen Gr&#252;nde: Manche wollen nicht ins Netz und manche k&#246;nnen nicht. Dennoch gibt es zunehmend auch &#246;ffentliche Dienstleistungen nur noch digital.

Das w&#228;re kein Problem, wenn gew&#228;hrleistet w&#228;re, dass alle Zugang zu Ger&#228;te, zum Netz und die n&#246;tige Unterst&#252;tzung haben, um die Angebote nutzen zu k&#246;nnen. Und wenn wir darauf vertrauen k&#246;nnten, dass unsere Daten dort sicher sind. 

Solange beides nicht gegeben ist, darf niemand ausgeschlossen werden, weil der Zugang fehlt.</abstract>
                <slug>38c3-599-digitalisierung-mit-der-brechstange</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='577'>Anne Roth</person>
                </persons>
                <language>de</language>
                <description>Menschen, die noch immer nicht online sind, sind &#228;lter, arm, h&#228;ufig weiblich, manchmal behindert, sind keine Akademiker*innen oder arbeiten in Jobs, bei denen sie nicht vor Computern sitzen. 

Aber auch durchaus IT-affine Menschen geraten mal ins Straucheln, wenn der Akku vom Ger&#228;t mit dem digitalen Ticket nicht mehr mitmacht oder das Funkloch verhindert, dass die digitale Bahncard aktualisiert werden kann, wenn die Kontrolle kommt. 

Statt daf&#252;r zu sorgen, dass die n&#246;tige Infrastruktur l&#228;uft und alle die Unterst&#252;tzung bekommen, die sie brauchen, um die immer anders aussehenden digitalen Beh&#246;rdeng&#228;nge erledigen zu k&#246;nnen, setzt die Bundesregierung auf Zuckerbrot und Peitsche. Es gab Geschenke wie den Kulturpass f&#252;r 18-J&#228;hrige oder eine 200-Euro-Einmalzahlung f&#252;r Studierende, aber die gab es nur f&#252;r die, die sie online beantragten. Es wird akzeptiert, dass Post- und Bankfilialen durch Online-Angebote ersetzt werden. Alle, die damit nicht klarkommen, werden h&#246;chstens bel&#228;chelt. Aber das betrifft nicht wenige Menschen, die angesichts dieser Digitalisierung mit der Brechstange im Regen stehen. Sie sind oft so schon auf die eine oder andere Weise benachteiligt und nun durch rein digitale Angebote noch weiter abgeh&#228;ngt. Im Idealfall sollte Digitalisierung das Leben vereinfachen. Tats&#228;chlich tr&#228;gt diese Digitalisierung zu noch mehr gesellschaftlicher Spaltung bei. 

Dieser Talk beleuchtet, wen das betrifft und warum, und zeigt Beispiele f&#252;r Dienstleistungen und Angebote, die nur online zu haben sind &#8211; und f&#252;r die, die keine Skrupel haben angesichts der h&#228;ufig wenig vertrauenserweckenden Umsetzung. Schlie&#223;lich wird es auch darum gehen, was n&#246;tig w&#228;re, um diese Situation zu &#228;ndern.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MWGDZZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MWGDZZ/feedback/</feedback_url>
            </event>
            <event guid='ceb37502-7b3f-5ce0-940c-ffc840ff9cbc' id='167'>
                <room>Saal 1</room>
                <title>Erpressung aus dem Internet - auf den Spuren der Cybermafia</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Manchmal sind es tausende, manchmal sind es zehntausende von Euros, um die vor allem junge M&#228;nner aus Deutschland bei Onlinescams betrogen werden. Die Scham ist zu gro&#223;, um dar&#252;ber zu sprechen, schlie&#223;lich ist &#8222;Mann&#8220; selbst schuld daran. Es geht um Erpressung mit Nacktfotos, Liebes-Fallen und zweifelhafte Investments, die auf dem Vormarsch sind. Der Vortrag folgt den Spuren der T&#228;ter:innen und enth&#252;llt eine prosperierende Scam-Industrie in Asien, fest in den H&#228;nden der chinesischen Mafia.</abstract>
                <slug>38c3-167-erpressung-aus-dem-internet-auf-den-spuren-der-cybermafia</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='166'>Svea Eckert</person><person id='165'>Ciljeta Bajrami</person>
                </persons>
                <language>de</language>
                <description>Aus Scham wollte er eigentlich gar nicht dar&#252;ber sprechen. Sebastian (26 Jahre) flirtet mit einer Unbekannten aus dem Internet, sie schickt ihm Nacktfotos, fragt, ob auch er sich vor der Kamera f&#252;r sie auszieht. Er f&#252;hlt sich geschmeichelt, sie verabreden sich zum Videocall, er masturbiert vor laufender Kamera. Davon werden Screenshots erstellt und eine M&#228;nnerstimme fordert ihn auf 2.000 Dollar zu bezahlen, sonst w&#252;rden die Bilder an all seine Instagram Freunde gehen. &#8222;Ich habe zu leichtsinnig im Internet vertraut&#8220;, sagt er r&#252;ckblickend. F&#252;r viele Betroffene folgen neben der Scham und dem finanziellen Verlust Angstzust&#228;nden und Depressionen, immer gepaart mit dem Gef&#252;hl gro&#223;er Hilflosigkeit, weil sich die Spuren im Netz verlieren.

Ausgehend von den Opfern folgen wir den Spuren von Onlineverbrechern, bei denen vor allem (junge) M&#228;nner ausgenommen werden. Es gelingt uns Kontakt aufzubauen, zu einem der selbst T&#228;ter war. &#8222;Neo&#8220; nennt er sich: Der junge Chinese war auf ein verlockend klingendes Jobangebot als englisch &#220;bersetzer eingegangen, wurde gekidnapped und in eine sogenannte Betrugsfabrik verschleppt.

Er berichtet und belegt mit Fotos sowie zahlreichen Unterlagen, wie in Myanmar entlang der Grenze von Thailand hunderttausende Menschen gefangen gehalten und ausgebeutet werden. Der junge Chinese erz&#228;hlt von Folter und davon, wie sie dort hunderte Menschen im Internet und am Telefon pro Tag abzocken mussten. &#8222;Wer nicht gehorchte, bekam Schl&#228;ge&#8220;, sagt er.

NGOs und andere &#220;berlebende berichten von Elektroschocks und einem ausgekl&#252;gelten System von Menschenhandel und Ausbeutung. Interpol spricht inzwischen von einer aufsteigenden Industrie, die in der gesamten Region S&#252;dostasien an Umsatz inzwischen den Drogenhandel abgel&#246;st hat. Rasante technische Entwicklungen, wie &#220;bersetzungsprogramme, Bots und mit KI generierte Fotos und Videos sorgen daf&#252;r, dass sich der Betrug immer weiter globalisiert und nach Deutschland strahlt.

&quot;Neo&quot; gelingt es schlie&#223;lich zu fliehen und hunderte interne Dokumente und Fotos aus der &quot;Betrugsfabrik&quot; heraus zu schmuggeln. Der Talk gibt einen Einblick in diese verborgene Welt.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SSEEUQ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SSEEUQ/feedback/</feedback_url>
            </event>
            <event guid='ac3b54f0-672b-5f1d-bbf9-593364fb7fe2' id='149'>
                <room>Saal 1</room>
                <title>Wann klappt der Anschluss, wann nicht und wie sagt man Chaos vorher?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>Gut 1 Mrd. Datenpunkte zu Zugfahrten, wie kann man damit das Zugfahren verbessern? Wir versuchen, die Zuverl&#228;ssigkeit von Zugverbindungen vor der Buchung zu prognostizieren.</abstract>
                <slug>38c3-149-wann-klappt-der-anschluss-wann-nicht-und-wie-sagt-man-chaos-vorher-</slug>
                <track>Science</track>
                
                <persons>
                    <person id='149'>Theo D&#246;llmann</person>
                </persons>
                <language>de</language>
                <description>Um allen Bahnfahrenden zu helfen, wollen wir auf Basis eines Kriesel-Artigen Datensatz vorhersagen, welche Anschlusszug verpasst wird und welcher nicht. Daf&#252;r schauen wir uns die Versp&#228;tungsdaten ganz genau an, um pr&#228;diktive Faktoren f&#252;r Versp&#228;tungsvorhersagen zu finden. Wir schauen uns ein paar Techniken f&#252;r kategorische Datentypen an, bauen ein Machine-Learning-Modell und werden dann nachweisen, ob dieses etwas taugt.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MUZZ7C/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MUZZ7C/feedback/</feedback_url>
            </event>
            <event guid='3ea9436f-8c47-5a7b-afb7-e1bb84a72050' id='32'>
                <room>Saal 1</room>
                <title>Fearsome File Formats</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>Specifications are enough, they say&#8230;

10 years after 31c3&apos;s &quot;Funky File Formats&quot; &#8230;

Have things improved?</abstract>
                <slug>38c3-32-fearsome-file-formats</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/QS9AXX/fff38c3logo_AuoU29u.png</logo>
                <persons>
                    <person id='11'>Ange Albertini</person>
                </persons>
                <language>en</language>
                <description>With so many open-source parsers being tested and fuzzed, and widely available specs,
what could go wrong with file formats nowadays ? Nothing to fear, right?

Let&apos;s explore even darker corners of their landscape!
Even extreme simplicity can misleadingly lead to unexpected challenges.
And at the other end of the spectrum, new complex constructs appeared over the years:
near-polyglots, timecryption, hashquines &#8230;  Even AI is an element of the game now.

Let&apos;s play FileCraft, and enjoy the ride!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QS9AXX/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/QS9AXX/feedback/</feedback_url>
            </event>
            <event guid='05e31b15-63a5-5daf-819d-2cade987e5f9' id='1'>
                <room>Saal 1</room>
                <title>Der CCC-Jahresr&#252;ckblick</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>02:00</duration>
                <abstract>Wir geben einen &#220;berblick &#252;ber die Themen, die den Chaos Computer Club 2024 besch&#228;ftigt haben.

Neben der Zusammenfassung und der R&#252;ckschau auf das vergangene Jahr wollen wir aber auch &#252;ber zuk&#252;nftige Projekte und anstehende Diskussionen reden.</abstract>
                <slug>38c3-1-der-ccc-jahresrckblick</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='1'>erdgeist</person><person id='393'>Matthias Marx</person><person id='8'>khaleesi</person><person id='116'>Linus Neumann</person><person id='456'>Constanze Kurz</person>
                </persons>
                <language>de</language>
                <description>Von der Ampel &#252;ber den epa bis zur Chatkontrolle, welche Themen haben den CCC in 2024 auf Trab gehalten?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LE7FJL/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LE7FJL/feedback/</feedback_url>
            </event>
            <event guid='716710bb-bda3-55b4-9794-e1a5a3e17b18' id='340'>
                <room>Saal 1</room>
                <title>Hacking yourself a satellite - recovering BEESAT-1</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>01:00</duration>
                <abstract>In 2013, the satellite BEESAT-1 started returning invalid telemetry, rendering it effectively unusable. Because it is projected to remain in orbit for at least another 20 years, recovering the satellite and updating the flight software would enable new experiments on the existing hardware. However, in addition to no access to telemetry, the satellite also has no functional software update feature. This talk will tell the story of how by combining space and computer security mindsets, the fault was correctly diagnosed without telemetry, software update features were implemented without having them to begin with, and the satellite was recovered in September of 2024.</abstract>
                <slug>38c3-340-hacking-yourself-a-satellite-recovering-beesat-1</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/DSQ9FN/beesat_square_FPIv8lk.png</logo>
                <persons>
                    <person id='364'>PistonMiner</person>
                </persons>
                <language>en</language>
                <description>In 2009, BEESAT-1 was launched into low earth orbit as the first 1U CubeSat of Technische Universit&#228;t Berlin. In 2011, the satellite started returning invalid telemetry data. After a short amount of time spent diagnosing the issue, operators switched to the redundant on-board computer, which initially resolved the issue. However in 2013 the issue reoccurred on the second computer. With no other on-board computer available to switch to, operations largely ceased besides occasional checks every few years to see whether the satellite was still responding to commands at all.

A recovery of BEESAT-1 back into an operational state was made particularly attractive considering that due to its higher orbit, it is currently estimated to remain in space for another 20 years or more, while many of the other spacecraft of the BEESAT series have since burned up in the atmosphere. Additionally, the spacecraft is equipped with a number of sensors and actuators which were not fully utilized during the primary mission and could be used in an extended mission. However, to fully utilize all the available hardware on the spacecraft, a software update is required. Unfortunately, the software update functionality was not completed at the time of launch and as a consequence is in a nonfunctional state. An alternate solution must be devised.

Following an extensive effort that diagnosed the telemetry problem, developed a solution that would remedy both the telemetry problem and allow the upload of new flight software, and implemented this solution on the actual spacecraft in orbit, the satellite was finally recovered into an operational state with the ability to perform a software update in September 2024.

This talk will cover the recovery process from beginning to end, including:
- A crash course in spacecraft operations, including
	- a brief overview of the typical subsystems of satellites and BEESAT-1 in particular
	- the practicalities of operating a small satellite like BEESAT-1 in a sun-synchronous low earth orbit
- Diagnosing the loss of telemetry without access to said telemetry
- Engineering a solution to the diagnosed issue, including:
	- figuring out how to upload new software without a feature intended for that task
	- establishing a development and testing setup for flight software development years after the original setup was dismantled
	- developing a patch to enable returning the satellite to an operational state and establish the ability to upload new flight software, while under the constraints posed by the lack of a proper upload method and without compromising the safety of the spacecraft
- Implementing this solution on the actual spacecraft in space
- A brief look at the current state of the spacecraft and remaining future tasks

Along the way, some of the fun and unexpected moments experienced while working with the 15 year old software and hardware will be shared. The talk is likely to be a mix of technical and non-technical. I hope to provide enough context so that you can follow without a background in space systems or computer security.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DSQ9FN/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DSQ9FN/feedback/</feedback_url>
            </event>
            <event guid='1c6eb229-0988-53f4-8aa3-1d68cda60206' id='521'>
                <room>Saal 1</room>
                <title>Fake-Shops von der Stange: BogusBazaar</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T20:30:00+01:00</date>
                <start>20:30</start>
                <duration>01:00</duration>
                <abstract>Du bestellst im Internet? Nat&#252;rlich bestellst Du im Internet. Aber dieses Mal wird Deine Ware nicht geliefert. Stattdessen sind Dein Geld und Deine Kreditkartendaten nun in China. Das ist BogusBazaar. Wir teilen unsere Einblicke in die Arbeitsweise dieser Bande.</abstract>
                <slug>38c3-521-fake-shops-von-der-stange-bogusbazaar</slug>
                <track>Security</track>
                
                <persons>
                    <person id='393'>Matthias Marx</person><person id='690'>Kai Biermann</person>
                </persons>
                <language>de</language>
                <description>In den vergangenen drei Jahren hat allein diese eine kriminelle Organisation, die wir BogusBazaar nennen, auf mehr als 75.000 Domains gef&#228;lschte Markenshops aufgesetzt und damit eine Million Bestellungen mit einem Auftragsvolumen von mehr als 50 Millionen USD abgewickelt.

Ein ausgekl&#252;geltes und &#252;ber die Jahre gewachsenes Setup erm&#246;glicht einen reibungslosen Prozess vom Kopieren der originalen Markenl&#228;den, &#252;ber das Aufsetzen gef&#228;lschter Webshops und dem Konfigurieren der Produkte, bis hin zum Orchestrieren der Zahlungsinfrastruktur.

Wir hatten einen einmaligen Einblick in dieses Setup und in die Arbeitsweise dieser Bande. Neben Kundendaten und Quellcode konnten wir auch Vertr&#228;ge und Dokumentation studieren und mit den Opfern &#252;ber ihre Erfahrungen sprechen. In diesem Talk berichten wir &#252;ber die Hintergr&#252;nde unserer Recherche. [Die Zeit](https://www.zeit.de/2024/21/gefaelschte-online-shops-fake-shops-betrug-china), [The Guardian](https://www.theguardian.com/money/article/2024/may/08/chinese-network-behind-one-of-worlds-largest-online-scams) und [Le Monde](https://www.lemonde.fr/en/pixels/article/2024/05/08/online-scams-behind-the-scenes-of-the-world-s-largest-network-of-fake-online-retailers_6670775_13.html) berichteten.

Der Vortrag ist ein Spin-Off aus der Reihe &#8222;[Hirne Hacken](https://media.ccc.de/v/36c3-11175-hirne_hacken)&quot; (36C3), &#8222;[Hirne Hacken - Hackback Edition](https://media.ccc.de/v/37c3-12134-hirne_hacken_hackback_edition)&#8220; (37C3) und &#8222;[Disclosure, Hack und Back](https://media.ccc.de/v/camp2023-57272-disclosure_hack_and_back)&#8220; (Chaos Communication Camp &apos;23) und will Einblicke in das Handeln von Kriminellen geben, die auch weiterhin aktiv sind. Damit Ihr nicht auf sie hereinfallt.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VPZWZK/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VPZWZK/feedback/</feedback_url>
            </event>
            <event guid='514a24bc-31db-5a04-8e33-8c777742e575' id='198'>
                <room>Saal 1</room>
                <title>BlinkenCity: Radio-Controlling Street Lamps and Power Plants</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T21:45:00+01:00</date>
                <start>21:45</start>
                <duration>01:00</duration>
                <abstract>A significant portion of Europe&apos;s renewable energy production can be remotely controlled via longwave radio. While this system is intended to stabilize the grid, it can potentially also be abused to destabilize it by remotely toggling energy loads and power plants. 

In this talk, we will dive into radio ripple control technology, analyze the protocols in use, and discuss whether its weaknesses could potentially be leveraged to cause a blackout, or &#8211; more positively &#8211; to create a city-wide Blinkenlights-inspired art installation.</abstract>
                <slug>38c3-198-blinkencity-radio-controlling-street-lamps-and-power-plants</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/HSNZGR/38c3_blinkencity_banner_OT0H9Mo.png</logo>
                <persons>
                    <person id='197'>Fabian Br&#228;unlein</person><person id='198'>Luca Melette</person>
                </persons>
                <language>en</language>
                <description>With three broadcasting towers and over 1.3 million receivers, the radio ripple control system by *EFR (Europ&#228;ische Funk-Rundsteuerung) GmbH* is responsible for controlling various types of loads (street lamps, heating systems, wall boxes, &#8230;) as well as multiple gigawatts of renewable power generation (solar, wind, biogas, &#8230;) in Germany, Austria, Czechia, Hungary and Slovakia. 

The used radio protocols Versacom and Semagyr, which carry time and control signals, are partially proprietary but completely unencrypted and unauthenticated, leaving the door open for abuse. 

This talk will cover:   
- An introduction to radio ripple control 
- Detailed analysis of transmitted radio messages, protocols, addressing schemes, and their inherent weaknesses 
 - Hardware hacking and reversing 
 - Implementation of sending devices and attack PoCs 
 - (Live) demonstrations of attacks 
 - Evaluation of the abuse potential 
 - The way forward</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HSNZGR/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HSNZGR/feedback/</feedback_url>
            </event>
            <event guid='f05ded86-d09a-59b9-8023-2ef500f626f9' id='561'>
                <room>Saal 1</room>
                <title>Wie fliegt man eigentlich Flugzeuge?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>00:40</duration>
                <abstract>Etwas wie die &quot;Sendung mit der Maus&quot;, daf&#252;r mit tiefer fachlicher Ausf&#252;hrung und allen Details. Es handelt vor allem um Technik und Abl&#228;ufe, die man als Laie oder Fluggast nicht sehen und wissen kann.</abstract>
                <slug>38c3-561-wie-fliegt-man-eigentlich-flugzeuge-</slug>
                <track>Science</track>
                
                <persons>
                    <person id='581'>Christian L&#246;lkes</person><person id='664'>kleinsophie</person>
                </persons>
                <language>de</language>
                <description>Flugzeuge k&#246;nnen fliegen, das muss man nicht mehr erkl&#228;ren. Aber hat ein Flugzeug wirklich einen Schl&#252;ssel wie ein Auto? Kann ich einfach einsteigen und losfliegen? Die Antwort lautet: Es kommt darauf an.

Fliegen ist ein komplexes Zusammenspiel von Technik, Physik, Menschen und Prozessen. Und je nachdem, wie und was man fliegt, was hat ein A380 mit einer Cessna 152 gemeinsam?

Wir nehmen euch mit auf einen fiktiven Flug von Frankfurt nach Mumbai und zur&#252;ck und erkl&#228;ren euch, was alles im Hintergrund passiert und wovon ihr nichts mitbekommt. 

Es erwartet euch eine Mischung aus Vortrag, lustigen Geschichten und auch Yak-Shaving, damit wir gemeinsam verstehen, was da eigentlich genau passiert.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TJ8QVD/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TJ8QVD/feedback/</feedback_url>
            </event>
            <event guid='99379f6c-0172-555f-a310-300978026f36' id='638'>
                <room>Saal 1</room>
                <title>KI-Karma next Level: Spiritueller IT-Vertrieb</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:55:00+01:00</date>
                <start>23:55</start>
                <duration>00:40</duration>
                <abstract>Der IT-Vertrieb ist ein Feld voll dorniger Chancen. Ein Grund mehr, gemeinsam von innovativen Branchen in Form von &quot;Neuen Religi&#246;sen Bewegungen&quot; (Sekten) zu lernen, um unseren erwachten beruflichen Neustart zu pitchen.</abstract>
                <slug>38c3-638-ki-karma-next-level-spiritueller-it-vertrieb</slug>
                <track>Entertainment</track>
                
                <persons>
                    <person id='436'>Katharina Nocun</person>
                </persons>
                <language>de</language>
                <description>Haben Sie schon einmal einer Messe evangelikaler fundamentalistischer Splittergruppen beigewohnt und sich gefragt, wie sie Menschen dazu bringen k&#246;nnten in Code zu reden wenn sie &#196;nderungsw&#252;nsche &#228;u&#223;ern, statt in Zungen? W&#228;re es nicht ein echter game-changer, wenn Wunderheilungen auch im Au&#223;endienst einsetzbar w&#228;ren? Sind Sie neidisch, weil jeder gew&#246;hnliche Doomsday-Kult trotz falscher Prophezeiungen seine Kundenbindung stabil h&#228;lt, w&#228;hrend Sie f&#252;r alles m&#246;gliche haftbar gemacht werden? Haben Sie manchmal das Gef&#252;hl, ihr Team schwingt nicht auf derselben feinstofflichen Ebene wie Sie? 

**** Dann sind SIE hier genau RICHTIG!1 ***

Im Rahmen des 42-Stufen-Programms f&#252;r feinstoffliche IT tauchen wir diesmal in den Code von Gruppendynamiken ein. In diesem Kompaktseminar lernen Sie zentrale Erfolgsstrategien bekannter Leader der bekanntesten Spiritualit&#228;ts-Startups der letzten Jahrzehnte kennen. Erweitern Sie ihre Wissens-Meridiane und werden Sie Teil einer schwingenden Gemeinschaft, die sich mit dem feinstofflichen Wissen inspirierender Datenbanken vernetzt.

Die Chakra-Bausteine des Kurses sind wie folgt:

* Software Wunderheilung 
* Energetisches Community-Building
* Code-Channeling 
* Cyber-Marketing

Anhand von Praxisbeispielen aus den Branchen IT und Spiritualit&#228;t erarbeiten wir ein Erfolgskonzept, das Sie im Handumdrehen zum erfolgreichen erwachten Entrepreneur machen kann. 

Hinweis:

Dieser Kurs ist der zweite Teil eines 42-Stufenprogramms, kann aber auch ohne Vorwissen von Einsteigern gebucht werden.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LUW3YS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LUW3YS/feedback/</feedback_url>
            </event>
            <event guid='fdb48d2b-748c-52ec-bf44-da974653fed9' id='508'>
                <room>Saal 1</room>
                <title>0, 1 oder 2 - Hackerei und Cyberbrei</title>
                <subtitle></subtitle>
                <type>Game show</type>
                <date>2024-12-29T00:55:00+01:00</date>
                <start>00:55</start>
                <duration>01:30</duration>
                <abstract>Der Quizshow-Klassiker f&#252;r die ganze Chaosfamilie: Bei uns sind nicht nur pfiffige Hacker:innen, sondern auch flinke Beine gefragt. 0, 1 oder 2? Wer es wei&#223;, ist dabei! Nur echt mit dem Kamera-Nerd!</abstract>
                <slug>38c3-508-0-1-oder-2-hackerei-und-cyberbrei</slug>
                <track>Entertainment</track>
                
                <persons>
                    <person id='1016'>Erisvision</person>
                </persons>
                <language>de</language>
                <description>Auf einzigartige Weise wird Wissensvermittlung mit Bewegung verkn&#252;pft und bietet Nerds anspruchsvolle Unterhaltung. Das Beste aus Besserwisserei und Tele-Aerobic. Drei Teams aus dem Publikum treten gegeneinander an. 

Die Kandidat:innen m&#252;ssen Fragen rund um IT-Sicherheit, CCC, Netzpolitik, Hacking-Kultur, Raketenwissenschaft oder Frickeln beantworten und damit ihr Wissen unter Beweis stellen. F&#252;r jedes Thema gibt es Spezial-Expert:innen auf der Couch sowie Show- und Musikeinlagen. Dem besten Team winkt der begehrte &quot;0, 1 oder 2&quot;-&#220;berraschungspreis.

Die Rate-Show wird von Erisvision in Koproduktion mit C3VOC, CCH und Gefahrengebiet TV Productions pr&#228;sentiert.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9QB89V/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9QB89V/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal ZIGZAG' guid='62251a07-13e4-5a72-bb3c-8528416ee0f2'>
            <event guid='c91fe123-e94d-5cc7-8f89-a884d961bef3' id='270'>
                <room>Saal ZIGZAG</room>
                <title>Role Play as Resistance: Challenging Securitization Through Activism in a place in EastAfrica</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Using role playing, we shall explore the movements who are proactively fighting back the impact of surveillance and challenges Internet-related rights.</abstract>
                <slug>38c3-270-role-play-as-resistance-challenging-securitization-through-activism-in-a-place-in-eastafrica</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='283'>Wawan</person>
                </persons>
                <language>en</language>
                <description>How I see securitization in my reality:
The authorities check on the social media pages where there is any sort of advocating for LGBTQIA+ rights. Digital activism has declined. Even the positive and peaceful social media campaigns that offer a counter narrative and talk about diversity/inclusion are met with harassment or legal action against those involved.
When I train these communities, they express fears about being outed on a dating app or in the media because it has already happened several times. This violates their right to privacy and puts them at a higher risk of online and physical attacks, it can affect their work situation, community and even family members. 
Vital information about sexual and reproductive health and rights and much of the information regarding queer health resources is blocked or censored because it is seen as harmful or dangerous for the community. So basically in some cases people have to rely on uninformed sources to get their sexual education and this can have disastrous effects 

How I have witnessed a proactive stance: 
-Developing materials that help activists remain motivated and focused on the goals
Case study Feminist Principles of the Internet
-Creating free and open learning methodologies about online privacy rights and responsibilities. Case Study Safe Sisters
-Building strategic alliance with partners to continue to challenge the right and securitization discourse and raise a struggle against authoritarianism: Case study A coalition to end online violence and promote digital rights and inclusion</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XR9FGQ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XR9FGQ/feedback/</feedback_url>
            </event>
            <event guid='d05bfa58-e6b8-5c35-b271-191e1d09de6a' id='460'>
                <room>Saal ZIGZAG</room>
                <title>Gemeinwohlorientierte Forschung mit KI: Missbrauch eind&#228;mmen durch Zweckbindung f&#252;r KI-Modelle</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>Trainierte KI-Modelle sind m&#228;chtige Werkzeuge, die in Wissenschaft und Forschung oft f&#252;r gute Zwecke gebaut werden. Aber wie alle Werkzeuge k&#246;nnen sie auch zweckentfremdet werden &#8211; in Bereichen, f&#252;r die sie nicht gedacht waren, in denen sie profitgierigen Interessen dienen und gesellschaftlichen Schaden anrichten. Vor dem Hintergrund des Trends von &quot;open source&quot; AI ist die Gefahr der unkontrollierten Zweckentfremdung von KI-Modellen enorm gestiegen. Wir zeigen: Das Risiko einer missbr&#228;uchlichen Sekund&#228;rnutzung von f&#252;r Forschungszwecke trainierten KIs ist aktuell die gr&#246;&#223;te regulatorische L&#252;cke, trotz DSGVO und AI-Act. Zugleich erm&#246;glicht das Zweckentfremden von Modellen die immer weiter wachsende Machtposition von Big Tech. Um das Problem zu bek&#228;mpfen, muss das Prinzip &quot;Zweckbindung&quot; f&#252;r das Zeitalter der KI geupdated werden.</abstract>
                <slug>38c3-460-gemeinwohlorientierte-forschung-mit-ki-missbrauch-eindmmen-durch-zweckbindung-fr-ki-modelle</slug>
                <track>Science</track>
                
                <persons>
                    <person id='317'>Rainer M&#252;hlhoff</person><person id='295'>Hannah Ruschemeier</person>
                </persons>
                <language>de</language>
                <description>Skandale wie die Weitergabe von Forschungsdaten der UK Biobank an Versicherungsunternehmen zeigen ein typisches, aber oft &#252;bersehenes Risiko im Zusammenhang mit KI: Modelle und Trainingsdaten, die eigentlich dem Gemeinwohl dienen sollten, werden im Schatten der &#246;ffentlichen Aufmerksamkeit, jedoch ohne geltendes Recht zu verletzen, f&#252;r diskriminierende, manipulative und profitorientierte Zwecke zweitverwendet. Wer etwa in der medizinischen Forschung ein Modell zur Erkennung von psychischen Krankheiten anhand von Audiodaten (Stimmaufzeichnung) baut, kann dieses Modell auch au&#223;erhalb des medizinischen Kontexts auf beliebige Individuen anwenden &#8211; und zum Beispiel bei Video-Bewerbungsgespr&#228;chen ein automatisiertes Risiko Scoring damit machen (unsere Beispiele zeigen, dass daran gerade gro&#223;es Interesse besteht). Der Besitz trainierter KI-Modelle stellt eine enorme Konzentration von Informationsmacht dar &#8211; und mit dieser Macht geht ein Missbrauchspotenzial einher, wenn die Tools z.B. in einen kommerziellen Kontext &#252;bertragen werden. 
Zum Schutz unserer Gesellschaft vor Missbrauch KI-basierter Forschung m&#252;ssen wir deshalb die Zirkulation trainierter KI-Modelle und anonymisierter Trainingsdaten unter demokratische Kontrolle stellen. Wir brauchen ein Regulierungskonzept, das offene Forschungszwecke erm&#246;glicht und gleichzeitig kommerziellen Missbrauch verhindert. Modelle mit allgemeinem Verwendungszweck wie sie die KI-VO legitimiert, sollte es nicht geben. Als L&#246;sung holen wir das alte, bei der Industrie verhasste und in der Politik fast schon vergessene Datenschutzprinzip der Zweckbindung aus der Mottenkiste und aktualisieren es f&#252;r die Kontrolle von KI. 
Unser Regulierungsvorschlag einer &quot;Zweckbindung f&#252;r KI-Modelle&quot; beruht auf unserer mehrj&#228;hrigen interdisziplin&#228;ren Forschung zwischen Ethik, Rechtswissenschaft und Informatik.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MGSXPN/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MGSXPN/feedback/</feedback_url>
            </event>
            <event guid='f9ec494e-9023-5175-8dac-235ad52705f1' id='285'>
                <room>Saal ZIGZAG</room>
                <title>A policy black hole. How Europol and Frontex anticipated their high tech future and why this matters to you.</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>This is the story of how a group of journalists and researchers started examining how the transformative introduction of novel technologies was reshaping the policy priorities of EU&apos;s law enforcement agencies. Very early on, this was like diving deep into the ocean without an underwater flashlight. And it didn&apos;t get much easier with time. 
What are the risks for civil liberties and privacy that lie in the dark while this agenda is unfolding and how hard is it to make them more transparent?</abstract>
                <slug>38c3-285-a-policy-black-hole-how-europol-and-frontex-anticipated-their-high-tech-future-and-why-this-matters-to-you-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='110'>Apostolis Fotiadis</person>
                </persons>
                <language>en</language>
                <description>Four years ago, a rather small group of complicated individuals set to explore why Europol was so interested in gathering and keeping the data of people even if they were not directly linked with criminal investigations. And why it was prepared to go to war with the EU&apos;s data protection watchdog over the issue. They wanted to keep everything and for as long as they could. The only problem was that at the time this was not exactly legal. Politicians would fix that afterwards but questions about the priorities of the agency had emerged and would stay. This is how an investigation into the EU&apos;s law enforcement agencies (Europol/Frontex) kick started, trying to understand what the agenda of the institutions in question was and how it shaped their approach to novel technologies introduced into the work of policing. Many complicated things happened since then which brought the spotlight over the effort of the EU border agency to introduce an indiscriminate data retention system for migrants while circumventing basic data protection safeguards, and then also over the formation of an alliance supporting the Commission&apos;s CSAM regulation and lately towards the experimentation of Europol with automated aspects of police work. What was common over all these cases was the opacity that clothed developments which made impossible to see the shape of things to come. 

The presentation will explain how the investigation has unfolded, the challenges it was met with when attempting to access information, the push-back and impact caused by publications and what are the lessons learned from the experience of attempting to analyse and journalistically scrutinize some of the EU&apos;s most introvert institutions.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YWU87Y/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YWU87Y/feedback/</feedback_url>
            </event>
            <event guid='efefe020-fecb-5dda-a262-ae051e30f9d5' id='474'>
                <room>Saal ZIGZAG</room>
                <title>Pirouette Machines. Fluid Components</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>This lecture follows the path of an ex-ballerina through fluid computers, handmade semiconductors, and cosmetic synthesisers. We will tackle the seductive side and hidden narratives of circuitry to natural systems, salty fluids, and minerals and discuss the importance of alternative hardware morphologies.</abstract>
                <slug>38c3-474-pirouette-machines-fluid-components</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/WFHKTR/Lipstickfullbackground_fLzpeP7.jpg</logo>
                <persons>
                    <person id='505'>Ioana Vreme Moser</person>
                </persons>
                <language>en</language>
                <description>Pirouette Machines. Fluid Components embarks on an intimate visual essay on an alternative history of computer hardware in which minerals, cosmetics and fluids mingle in tactile experiments. 

A lipstick converted into a strident sound generator resonates through toxic entanglements with one of its main historical ingredients: lead. Following a radioactive decay chain, lead ore or galena is found on our lips and in our early 20th-century technologies such as crystal radio demodulation frenzy.


This talk draws parallels between different types of hardware materialities and personal stories surrounding computing components in their use. Starting with the beauty industry, the talk serpents amongst toxic concoctions filled with heavy metals oscillating to become predecessors to the first transistors and their alternative fluidic siblings that use air and water instead of electricity.


Fluidics is a technology lost in history. To operate, it requires only simple fluid matter guided by natural phenomena. Much like its mineral counterpart: electronics, fluidics builds circuits for computing. This talk concludes by following the seductive forms that fluidic circuits assume, forms, that can reimagine the morphologies of our current electronic machines.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WFHKTR/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WFHKTR/feedback/</feedback_url>
            </event>
            <event guid='ba90dd9a-cc5f-5701-a585-caca032ed346' id='388'>
                <room>Saal ZIGZAG</room>
                <title>State of Surveillance: A year of digital threats to civil society</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>The digital arms race between activists and government spies continues to shift and evolve. Through a series of cases studies, researchers from Amnesty International&apos;s Security Lab will share surveillance wins, the ongoing challenges, and the new threats on the digital horizon.</abstract>
                <slug>38c3-388-state-of-surveillance-a-year-of-digital-threats-to-civil-society</slug>
                <track>Security</track>
                
                <persons>
                    <person id='420'>Jurre van Bergen</person>
                </persons>
                <language>en</language>
                <description>Drawing on research by Amnesty International and partners over the past year, we will examine how the digital threats facing activists and journalists continue to evolve and adapt.

Progress has been made in reigning in abuses from highly invasive spyware, with vendors going out of business and others being hit by lawsuits and sanctions. The technical arms race between defenders and the exploit industry also shows signs for cautious optimism.  However notorious spyware companies, occasionally with active government protection, continue taking steps to block much needed accountability efforts.

Amnesty International will also the findings of a brand new investigation into the misuse of surveillance technology.

The work for civil society to defend against these threats remains challenging. Surveillance vendors continue to deploy increasing murky webs of brokers and complex corporate structures to hide their activities, although we will show tactics that can be used to map these. 

The emerging surveillance threats at the intersection of mass surveillance, ad tech, and artificial intelligence are becoming all too real, and surveillance tactics continues to unequally and dangerously impact already marginalized people including woman and LGBTQI activists.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LR3GTU/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LR3GTU/feedback/</feedback_url>
            </event>
            <event guid='3a2591c9-e61e-597e-949c-dff77a5e1f12' id='122'>
                <room>Saal ZIGZAG</room>
                <title>Self Models of Loving Grace</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>Artificial Intelligence is not just an engineering discipline, but also the most fascinating and important philosophical project ever attempted: the explanation of the mind, by recreating it. This part of the series &quot;From Computation to Consciousness&quot; focuses on the nature of the self, agency and identity.</abstract>
                <slug>38c3-122-self-models-of-loving-grace</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/3TSPQW/plinz._a_conscious_vibration_digital_abstract_eye_feedback_loop__5ECUnmK.png</logo>
                <persons>
                    <person id='122'>Joscha Bach</person>
                </persons>
                <language>en</language>
                <description>When we recognize the paradigm of Artificial Intelligence as a philosophical and scientific framework for understanding the nature of minds like ours, we may begin with an essential question: What does it mean for a machine to feel? How do emotions arise at the intersection between a self and its world&#8212;or more precisely, within an a reflexive self model, in response to being dynamically reconfigured by a motivational system, in response to shifts in its alignment to a model of its environment, all within the same mind? 

This inquiry takes us to the core of our own psychological architecture. Who are we when our self-perception alters? What does it mean to depersonalize, to dissolve the boundaries of the self? Can we reverse engineer, debug and reconstruct our identities to become who we want to be? Is there free will? Is it possible to recreate self and sentience in nonbiological substrates? Can AI be conscious? Could we perhaps even extend our own self to non biological substrates?

This presentation is part of the philosophical series &#8220;From Computation to Consciousness,&#8221; which draws on insights from AI and cognitive science to explore the nature of intelligence, consciousness, and their realization in the physical universe.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3TSPQW/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3TSPQW/feedback/</feedback_url>
            </event>
            <event guid='91f0bb90-fb4a-585f-920e-155fb8a01cb4' id='653'>
                <room>Saal ZIGZAG</room>
                <title>arafed futures - An Artist Dialogue on Chip Storage and AI Accelerationism</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>The global chip shortage during the COVID-19 pandemic brought semiconductor production into focus, sparking accelerated efforts to meet the surging demand for digital infrastructure. This phenomenon not only expanded AI capabilities but also introduced unexpected computational artifacts. 
One such artifact is the word &#8220;arafed&#8221;, a term absent from any dictionary yet mysteriously appears across contexts from image prompts to Amazon product descriptions. Such unintended linguistic artifacts, born from transformer-based AI models, exemplify how digital artifacts emerge into realities with which we cohabitate.
The talk investigates how supply-chains break and AI-words spread from an artistic research perspective. Mapping both the abstract landscapes of embedding spaces, that are filled with emergent words and images, and the tangible, geopolitical realities of global semiconductor supply chains.</abstract>
                <slug>38c3-653-arafed-futures-an-artist-dialogue-on-chip-storage-and-ai-accelerationism</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/Z7TFKB/arafed_futures_-_An_Artist_Dialogue_on_Chip_Storage_and_AI_Accel_CFEdVTZ.png</logo>
                <persons>
                    <person id='624'>Ting-Chun Liu</person><person id='647'>Leon-Etienne K&#252;hr</person>
                </persons>
                <language>en</language>
                <description>The accelerating pace of generative AI has put a strain on the interconnected software and hardware systems necessary for generative AI. The artist duo explores the media specificity of generative artificial intelligence. The talk consists of two parts: The material aspects of AI, specifically the story of semiconductor and chip shortage. And the spread of hallucinations like terms that escaped their embedding space into language.
The working of LLMs is often limited by computational power. These obstacles tethered abstract computation to the physical world, exposing how materiality plays a critical role in the implementation of AI. The investigation begins by examining the causes of the chip shortage &#8212; a disruption that brought the semiconductor industry and its surrounding geopolitical tensions into discourse. 
On the hardware level, NVIDIA&#8217;s A100 chips, produced using Taiwan&#8217;s TSMC 7nm process, exemplify this intersection, providing the power to expand large language models (LLMs) and image generators. On the software level, the increasing demand for ai-as-service accelerates the use of models with complex pipelines. This interconnected use of models, in turn, leads to the emergence of unexpected artifacts that are morphing back into everyday reality.
While browsing AI-generated images on social media, one might come across the word &quot;arafed&quot; in image descriptions, such as, &quot;an arafed man in a white robe riding on top of a blue car.&quot;. Yet, a dictionary definition is nowhere to be found. An image search for &quot;arafed&quot; reveals something striking: all resulting images appear AI-generated, spread across various image-sharing and stock photography platforms.
The term &quot;arafed&quot; seems to lack a clear origin, but a few posts attribute it to the BLIP-2 model, an image-captioning system that generates descriptive text from image inputs. However, the BLIP-2 paper doesn&apos;t mention &quot;arafed&quot; but  running BLIP-2 clearly produces descriptions containing this artifact-like word, as if &quot;arafed&quot; has embedded itself in the model&apos;s vocabulary. Through the widespread and often unintentional use of BLIP-2 in libraries, extensions, and services, the interconnected nature of software has spread the word into research papers, Amazon descriptions, and even other datasets, further revealing the brittle infrastructure generative-ai systems are built upon.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Z7TFKB/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Z7TFKB/feedback/</feedback_url>
            </event>
            <event guid='db8fddb5-6446-5ee3-9c9f-126e49508340' id='405'>
                <room>Saal ZIGZAG</room>
                <title>The master key</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>01:00</duration>
                <abstract>This is the story of the HDCP master key that we derived back in 2010.</abstract>
                <slug>38c3-405-the-master-key</slug>
                <track>Security</track>
                
                <persons>
                    <person id='435'>segher</person><person id='1074'>Wanda</person>
                </persons>
                <language>en</language>
                <description>This is the story of the HDCP master key.  How in 2010 we derived it from various public sources and from a bunch of cheapish hardware (and how we made money in the process!), and then published it on pastebin.  After that it was just wait-and-see what Intel and the rest of the world would do.

With the master key anyone can make source and sink keys that interoperate with any HDCP device.

Oh, and how I learnt how to spell &quot;forty&quot;.



HDCP MASTER KEY (MIRROR THIS TEXT!)

This is a forty times forty element matrix of fifty-six bit
hexadecimal numbers.

To generate a source key, take a forty-bit number that (in
binary) consists of twenty ones and twenty zeroes; this is
the source KSV.  Add together those twenty rows of the matrix
that correspond to the ones in the KSV (with the lowest bit
in the KSV corresponding to the first row), taking all elements
modulo two to the power of fifty-six; this is the source
private key.

To generate a sink key, do the same, but with the transposed
matrix.


6692d179032205 b4116a96425a7f ecc2ef51af1740 959d3b6d07bce4 fa9f2af29814d9
82592e77a204a8 146a6970e3c4a1 f43a81dc36eff7 568b44f60c79f5 bb606d7fe87dd6
1b91b9b73c68f9 f31c6aeef81de6 9a9cc14469a037 a480bc978970a6 997f729d0a1a39
b3b9accda43860 f9d45a5bf64a1d 180a1013ba5023 42b73df2d33112 851f2c4d21b05e
2901308bbd685c 9fde452d3328f5 4cc518f97414a8 8fca1f7e2a0a14 dc8bdbb12e2378
672f11cedf36c5 f45a2a00da1c1d 5a3e82c124129a 084a707eadd972 cb45c81b64808d
07ebd2779e3e71 9663e2beeee6e5 25078568d83de8 28027d5c0c4e65 ec3f0fc32c7e63
1d6b501ae0f003 f5a8fcecb28092 854349337aa99e 9c669367e08bf1 d9c23474e09f70

(and 39 more lines like that).</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ADE7AG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ADE7AG/feedback/</feedback_url>
            </event>
            <event guid='01c7b0de-ba15-5141-9c7b-1c6e4549c65e' id='302'>
                <room>Saal ZIGZAG</room>
                <title>Guardians of the Onion: Ensuring the Health and Resilience of the Tor Network</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T20:30:00+01:00</date>
                <start>20:30</start>
                <duration>01:00</duration>
                <abstract>Millions of internet users around the world rely on Tor to protect themselves from surveillance and censorship. While Tor-powered applications and the Tor protocol are widely known, the community behind it much less so. This talk will highlight the efforts to maintain a healthy and resilient Tor network, emphasizing the crucial role of a diverse, engaged community of relay operators.

We&#8217;ll discuss some recent news, the current state of the network, how we determine its health, and the strategies to strengthen its resilience, addressing challenges around sustainability and governance. If you&apos;re interested in understanding the inner workings of the Tor network, this talk is for you.</abstract>
                <slug>38c3-302-guardians-of-the-onion-ensuring-the-health-and-resilience-of-the-tor-network</slug>
                <track>Security</track>
                
                <persons>
                    <person id='323'>Hiro</person><person id='334'>Gus</person>
                </persons>
                <language>en</language>
                <description>This talk is designed to give an overview of Tor&apos;s &apos;new and not-so-new&apos; network health initiatives in response to some of the pressing questions that emerged from the recent reporting about Tor in Germany. After a brief introduction to &quot;Tor,&quot; we will primarily focus on issues relating to the Tor network and its community, underscoring the critical importance of distributed trust, transparency, and engagement in maintaining a robust and healthy ecosystem.

We will provide a short overview of the fundamental components of the Tor network, detailing the different types of relays that constitute its infrastructure and the role these can have through their lifetime. We will emphasize that the network operates independently of the Tor Project, sustained by a decentralized, global community of contributors. By analyzing network metrics&#8212;such as relay distribution across countries and Autonomous Systems (AS)&#8212;we will highlight the current state of the network and identify opportunities for increasing geographic and technical diversity.

This is followed by an introduction to the concept of network health. We will define the term, assess the current condition of the Tor network, and showcase the different modes of participation. We will primarily consider this through the lens of an &apos;alleged&apos; over-reliance on relay concentration in specific regions, such as Europe and the United States. These insights will inform a discussion on how a more geographically distributed network could improve resilience, enhance security, and increase overall functionality.

The talk will also address the primary challenges facing the Tor network: Sustainability remains a central concern, particularly with regard to maintaining a stable, secure, and decentralized network over time. Additionally, ensuring trust within the community is essential, especially in the face of potential misuse by malicious actors. We will explore the need for incentive structures that encourage the operation of relays while preserving the network&#8217;s independence and autonomy. We will review and debate initiatives the Tor Project has proposed to support a decentralized network without imposing centralized control.

In response to these challenges, we will propose several potential solutions. Expanding outreach efforts to regions outside the Global North could promote greater diversity in the relay community, thereby strengthening the network&#8217;s ability to resist censorship and external threats. We will also examine existing incentive frameworks that support relay operators. Furthermore, we will discuss the success of Snowflake proxies&#8212;widely adopted in regions with restrictive internet environments&#8212;and how it demonstrates how lowering the barrier to entry for running nodes can encourage broader participation from the community.

Finally, we will outline our strategy for ensuring the long-term health of the Tor network, focusing on governance, community engagement, and sustaining the network&#8217;s decentralized nature. We will conclude with a call to action, inviting participants to contribute to the continued sustainability and development of the Tor network.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WQ9SLQ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WQ9SLQ/feedback/</feedback_url>
            </event>
            <event guid='ae5a41fd-637f-58d6-8d65-23302a821cdc' id='591'>
                <room>Saal ZIGZAG</room>
                <title>Feelings of Structure in Life, Art, and Neural Nets</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T21:45:00+01:00</date>
                <start>21:45</start>
                <duration>01:00</duration>
                <abstract>&apos;Poetry&apos; as the name of a special human relation to the world -- some special kind of knowing, grasping, challenging or asking we effect through art -- came into focus in 18th century Europe alongside the first blushings of a theory of computation and a computational analysis of mind. This talk proposes that for all of their outward hostilities, the Romantic-and-on idea of poetry and computational approaches to thought, language, and meaning are deeply connected: starting from Kant&apos;s doctrine of the productive imagination, we will develop one historical thread that runs to the Romantic poets, Phenomenology, and literary theory, and one historical thread that runs to information theory, machine learning, and the science of neural network models. Comparing the two threads, I&apos;ll argue that poetics and the science of neural network models have genuinely (if partially) overlapping subject-matter.  

Peli Grietzer is a researcher and writer specializing in ML, philosophy, and literary studies. Grietzer received his PhD from Harvard Comparative Literature in collaboration with the HUJI Einstein Institute of Mathematics.</abstract>
                <slug>38c3-591-feelings-of-structure-in-life-art-and-neural-nets</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='732'>Peli Grietzer</person>
                </persons>
                <language>en</language>
                <description>&apos;Poetry&apos; as the name of a special human relation to the world -- some special kind of knowing, grasping, challenging or asking we effect through art -- came into focus in 18th century Europe alongside the first blushings of a theory of computation and a computational analysis of mind. This talk proposes that for all of their outward hostilities, the Romantic-and-on idea of poetry and computational approaches to thought, language, and meaning are deeply connected: starting from Kant&apos;s doctrine of the productive imagination, we will develop one historical thread that runs to the Romantic poets, Phenomenology, and literary theory, and one historical thread that runs to information theory, machine learning, and the science of neural network models. Comparing the two threads, I&apos;ll argue that poetics and the science of neural network models have genuinely (if partially) overlapping subject-matter.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VL9VZ9/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VL9VZ9/feedback/</feedback_url>
            </event>
            <event guid='9c13c191-bf48-5ef5-aeb1-74d75600986d' id='585'>
                <room>Saal ZIGZAG</room>
                <title>Projekt Bucketchallenge</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>00:40</duration>
                <abstract>S3 Buckets mit k&#252;belweise privaten Daten: Finden, melden, kein Problem. Aber grundlegend was &#228;ndern? Denkste!</abstract>
                <slug>38c3-585-projekt-bucketchallenge</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/ETSHKS/logo_KPsY77A.png</logo>
                <persons>
                    <person id='608'>Kaspar</person>
                </persons>
                <language>de</language>
                <description>Amazon S3 erlaubt es gro&#223;e Datenmengen f&#252;r kleines Geld in der Cloud abzulegen. Mit dabei: Die technisch langweiligste Fehlkonfiguration gigantisch skaliert.

Frei zug&#228;ngliche S3-Buckets mit privaten Daten haben in den letzten Jahren h&#228;ufig f&#252;r Schlagzeilen gesorgt. Beispiele aus diesem Jahr sind Multifaktor-SMS oder Dokumente von Finanzdienstleistern. Wir haben uns auf den Weg gemacht um die Situation zu verstehen und zu verbessern. Dazu erkl&#228;ren wir, welche einzigartigen Eigenschaften wir von AWS ausgenutzt haben, um etwa 100 000 offene Buckets zu finden. Mit dabei:  medizinische Daten, personenbezogene Daten, Kreditkartendaten, und und und. Wir erkl&#228;ren Ans&#228;tze, wie wir anhand von Dateinamen eine Idee bekommen, welche Buckets wir uns ansehen und melden sollten und welche uns nicht interessieren.

Der Versuch die Situation zu verbessern l&#228;sst uns mit einer gro&#223;en Entt&#228;uschung zur&#252;ck: Verantwortliche Nutzer der Cloud-Services sind nur m&#252;hsam zu ermitteln, und die Cloud-Betreiber sind leider auch keine signifikante Hilfe. Einzig die DSGVO scheint den Verantwortlichen ein kleiner Ansporn. Wir stellen dar, was unserer Erfahrung nach hilft Bucket offline zu bekommen, und wann es so gut wie aussichtslos ist.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ETSHKS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ETSHKS/feedback/</feedback_url>
            </event>
            <event guid='49299a2f-a365-5595-a0f9-5fe88deebf14' id='106'>
                <room>Saal ZIGZAG</room>
                <title>Escaping Big Brother (or Your Ex) - counter surveillance for women&apos;s shelters</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:55:00+01:00</date>
                <start>23:55</start>
                <duration>00:40</duration>
                <abstract>Maintaining privacy and security when those closest to you is exploiting the worst of surveillance capitalism and patriarchy to pwn you is a user case no one planned for. Or should Big Tech have known better? 
Gender-based violence has existed in all societies and centuries, but in the 21st one the digital arena is proving to be especially tricky for victims. 
When (primarily) women leave their abusive (primarily) male partners or family members they often have to leave behind everything and make a clean break - including from their digital identities. This is way easier said than done. (Ever tried unsubscribing from.. anything?) Surveillance capitalism has further exacerbated this challenge, as stalker-ware is becoming increasingly prevalent and easy to use, if not a default feature. Stalking As A Service is of course already a thing, and why should you watch someones house in the rain all night when you can let your Tesla do it for you? 
Lost your wife? Hide an AirTag in the lining of her bag and have two billion iPhones keep track of her across the planet. Apple won&apos;t tell.
 
It&apos;s almost like society is fundamentally misogynistic and internet accelerated the opportunity for patriarchal control..?
 
This talk shares experiences working with women&apos;s shelters and training victims as well as activists and professionals in cyber security and opsec.
The situation&apos;s bad and it&apos;s getting worse, fast.</abstract>
                <slug>38c3-106-escaping-big-brother-or-your-ex-counter-surveillance-for-women-s-shelters</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='102'>erlern</person>
                </persons>
                <language>en</language>
                <description>Digital violence, or gender-based violence using digital means, is expressed in control and abuse. Control of finance, social life, the children, the photos, the conversation, relationships, life. Emotional, sexual, financial, psychological abuse - online. Mark Zuckerberg is not the first stalker to creep the Earth but probably the first to become a billionaire scaling his methods and monetizing his crimes.

Sharing war stories of practical feminist threat intel with literally lifesaving tech, Elin has advised women&apos;s shelters how to protect their clients and Escape Big Brother in Sweden for the past couple of years. This includes perverse exploits, institutional failures, psyops, and how any and everything can be used against you - if the threat actor is persistent enough.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DTH9RS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DTH9RS/feedback/</feedback_url>
            </event>
            <event guid='5905ae5a-406e-594b-b7bc-c4144bb09ef5' id='972'>
                <room>Saal ZIGZAG</room>
                <title>Kein Spa&#223; am Ger&#228;t auf einem toten Planeten!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T00:55:00+01:00</date>
                <start>00:55</start>
                <duration>00:40</duration>
                <abstract>Seit Jahren k&#228;mpft das Bits-&amp;-B&#228;ume-B&#252;ndnis, dem auch der CCC seit Beginn angeh&#246;rt, f&#252;r eine &#246;kologische und sozial gerechte Digitalpolitik &#8211; 2024 war dabei ein Jahr voller Hochs und Tiefs: von erstmals sinkenden CO&#8322;-Emissionen in Industriel&#228;ndern, &#252;ber den weiterbrennenden KI-Boom mit Nachhaltigkeitsanstrich, die Rolle von digitalen Plattformen f&#252;r anti-demokratische und nicht-nachhaltige Bewegungen, den &#246;kologischen Fu&#223;abruck von Profiling bis hin zum Tech-Solutionismus von Elon Musk jetzt im Wei&#223;en Haus.</abstract>
                <slug>38c3-972-kein-spa-am-gert-auf-einem-toten-planeten-</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='944'>Anja H&#246;fner</person><person id='203'>Rainer Rehak</person>
                </persons>
                <language>de</language>
                <description>In diesem Vortrag pr&#228;sentieren Anja und Rainer von Bits&amp;B&#228;ume einen kleinen Jahresr&#252;ckblick, stellen die spannenden neuen Ideen f&#252;r sozial-&#246;kologische Digitalpolitik vor, blicken kritisch auf die Ampel und pr&#228;sentieren Bits-&amp;-B&#228;ume-Forderungen an die n&#228;chste Bundesregierung. Zum Abschluss ist Esther Mwema aus Zambia zugeschaltet und wirft einen Blick auf die neokoloniale Macht von BigTech auf dem afrikanischen Kontinent und skizziert neue Ideen von lokalen, demokratisch-selbstbestimmten digitalen Infrastrukturen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8Q9JXV/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8Q9JXV/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal GLITCH' guid='7202df07-050c-552f-8318-992f94e40ef0'>
            <event guid='10016a60-2556-5f95-89f6-31c2a976eb12' id='1094'>
                <room>Saal GLITCH</room>
                <title>Junghacker:innentag Einf&#252;hrung</title>
                <subtitle></subtitle>
                <type>Ceremony</type>
                <date>2024-12-28T10:00:00+01:00</date>
                <start>10:00</start>
                <duration>00:45</duration>
                <abstract>Zu unserer Freude haben sich in den letzten Jahren immer mehr Junghacker:innen auf dem Congress eingefunden. Daher bieten wir auch diesmal, wie schon in den Vorjahren, einen speziell auf Kinder und Jugendliche zugeschnittenen Junghacker:innentag an. Am zweiten Congresstag, dem 28. Dezember 2024, organisieren Freiwillige aus vielen Assemblies von etwa 10 bis 17 Uhr ein vielseitiges Workshop-Programm f&#252;r angehende Hacker:innen.</abstract>
                <slug>38c3-1094-junghacker-innentag-einfhrung</slug>
                <track>CCC</track>
                
                <persons>
                    
                </persons>
                <language>de</language>
                <description>Weitere Informationen siehe [https://events.ccc.de/2024/11/08/38c3-junghackerinnentag/](https://events.ccc.de/2024/11/08/38c3-junghackerinnentag/)</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/H79XHC/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/H79XHC/feedback/</feedback_url>
            </event>
            <event guid='458f0e44-f4f2-595e-811b-698763b86baa' id='77'>
                <room>Saal GLITCH</room>
                <title>Lightning Talks Day 2</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>02:00</duration>
                <abstract>Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!</abstract>
                <slug>38c3-77-lightning-talks-day-2</slug>
                <track>CCC</track>
                
                <persons>
                    
                </persons>
                <language>de</language>
                <description>To get involved and learn more about what is happening please see the Links for this event. The second session will take place in another Hall and is not on the Fahrplan. See the Schedule link.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NAGY9B/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NAGY9B/feedback/</feedback_url>
            </event>
            <event guid='b563ba18-dcba-57a4-aec5-969ea621ec52' id='603'>
                <room>Saal GLITCH</room>
                <title>From Pegasus to Predator - The evolution of Commercial Spyware on iOS</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T13:30:00+01:00</date>
                <start>13:30</start>
                <duration>01:00</duration>
                <abstract>My talk explores the trajectory of iOS spyware from the initial discovery of Pegasus in 2016 to the latest cases in 2024.

The talk will start with an analysis how exploits, infection vectors and methods of commercial spyware on iOS have changed over time.

The second section of the talk is all about advances in detection methods and the forensic sources which are available to discover commercial spyware. This talk will also include a Case Study about the discovery and analysis of BlastPass (one of the latest NSO Exploits).

The third part will discuss technical challenges and limitations of the detections methods and data sources.

Finally, I will conclude the talk with open research topics and suggestions what Apple or we could technically do to make the detection of commercial spyware better.</abstract>
                <slug>38c3-603-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios</slug>
                <track>Security</track>
                
                <persons>
                    <person id='572'>Matthias Frielingsdorf</person>
                </persons>
                <language>en</language>
                <description>The commercial spyware landscape on iOS has evolved significantly since the discovery of Pegasus in 2016. In this talk, we&#8217;ll explore that evolution through four main areas:

1. Spyware Evolution (2016-2024): By analyzing key exploits, tactics, techniques, and procedures (TTPs), infection vectors, and indicators of compromise (IOCs), we&#8217;ll trace how spyware has advanced in sophistication, highlighting changes that have led to today&#8217;s complex threats.
2. Advancements in Detection: As spyware has grown more sophisticated, so too have detection capabilities. We&#8217;ll review the main actors, public organizations and tools that have shaped spyware detection. This part will also include a case study on my discovery and analysis of a sample NSO&#8216;s BlastPass Exploit chain.
3. Current and Future Challenges: Looking forward, we&#8217;ll examine the pressing challenges in spyware detection and speculate on how commercial spyware might evolve in response to new security measures and technologies.
4. Recommendations for Research and Detections: Finally, I&#8217;ll offer recommendations for advancing research and detection methods and capabilities to combat commercial spyware.

Attendees will gain a comprehensive view of the past, present, and future of spyware on iOS, along with actionable strategies for future research and collaboration.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CUFLJP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CUFLJP/feedback/</feedback_url>
            </event>
            <event guid='d2e4cfa2-e882-5345-b480-e3470df55588' id='656'>
                <room>Saal GLITCH</room>
                <title>MacOS Location Privacy Red Pill: A Rabbit Hole Resulting in 24 CVEs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>User location information is inherently privacy sensitive as it reveals a lot about us: Where do we work and live? Which cities, organizations &amp; institutions do we visit? How does our weekly routine look like? When are we on a vacation and not at home?
MacOS has introduced multiple layers of security mitigations to protect sensitive user location information from attackers and malicious applications over the years &#8212; but are these enough?</abstract>
                <slug>38c3-656-macos-location-privacy-red-pill-a-rabbit-hole-resulting-in-24-cves</slug>
                <track>Security</track>
                
                <persons>
                    <person id='663'>Adam M.</person>
                </persons>
                <language>en</language>
                <description>&#173;&#173;&#173;&#173;&#173;&#173;In this talk, we dive into how attackers could have exploited multiple design flaws, information disclosures and logic vulnerabilities spread all across the macOS stack, leading to all kinds of ways to bypass the macOS TCC Location Services privacy protection and precisely localize the user without consent. 
We will show how attackers could have retrieved precise real time &amp; historical geographic user locations hiding in various components of the persistence layer, within application state restoration files and error log messages that could be triggered via reliably exploitable HTTP response callback race conditions. 
Digging deeper, we find that the precise user location can be reconstructed with lossless precision by combining various sources of metadata, which were accessible through different pathways and quirks of the operating system, such as: Access point SSID&#8217;s + signal strength data, Apple Maps location query data caches, custom application binary plists and even Find My widget UI structure metadata enabling to precisely reconstruct the victims AirTag locations. 
These issues have been responsibly reported in the scope of the Apple Security Research program and resulted in 24 CVE entries in Apple&#8217;s security advisories for macOS.

We will finish of by investigating how we can prevent such issues in the future: Extended automated privacy focused integration testing, shifting responsibility of privacy preservation from developers to the system framework level and a more privacy focused API architecture of localization relevant frameworks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DJR7VP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DJR7VP/feedback/</feedback_url>
            </event>
            <event guid='86cc5d3d-20da-5d3e-99e6-6e790bb8fea4' id='206'>
                <room>Saal GLITCH</room>
                <title>10 years of emulating the Nintendo 3DS: A tale of ninjas, lemons, and pandas</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>How is 3DS preservation faring 10 years after the release of the first emulator? What technical obstacles have we overcome, which ones remain? What hidden gems have we discovered beyond games? Join us on a journey through the struggles, the successes, and the future of 3DS emulation!</abstract>
                <slug>38c3-206-10-years-of-emulating-the-nintendo-3ds-a-tale-of-ninjas-lemons-and-pandas</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='208'>neobrain</person>
                </persons>
                <language>en</language>
                <description>The 3DS marks a key point in the evolution of handheld consoles from embedded systems to more powerful PC-like architectures, which makes it particularly interesting as a target for emulation: We&apos;ll look at the technical challenges presented by its unique hardware components and the custom microkernel-based software stack built on top of it, the various approaches taken to emulate them (low-level vs. high-level), and the trends we&apos;re seeing for the future.

These technical challenges are put into historical context by looking at the emulator Citra, its initial way to success, the interplay between emulator developers and console hackers, and the impact of a prominent lawsuit that ultimately led to Citra&apos;s shutdown. Additionally we&apos;ll highlight broader community efforts like Pretendo that help preserve the platform beyond emulation. Finally we&apos;ll provide a status update for our ongoing emulation project Mikage and discuss the future outlook of 3DS preservation.

This talk will be accessible to a technical audience and gaming enthusiasts alike. We particularly hope to spark new interest in preserving the 3DS legacy and foster new ideas for pushing the boundaries of emulation technology.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UVYCZZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UVYCZZ/feedback/</feedback_url>
            </event>
            <event guid='a97720dc-86e7-5447-be4e-1ca3cc1b360f' id='338'>
                <room>Saal GLITCH</room>
                <title>io_uring, eBPF, XDP and AF_XDP</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>Modern high-performance networking APIs on Linux - beyond the classic BSD sockets API.</abstract>
                <slug>38c3-338-iouring-ebpf-xdp-and-afxdp</slug>
                <track>Security</track>
                
                <persons>
                    <person id='360'>Harald Welte</person>
                </persons>
                <language>en</language>
                <description>For many decades, application software programmers have been using the venerable BSD sockets API to make their applications communicate over (at least IP based) networks.  Linux has supported TCP/UDP sockets ever since it had a network stack back in the 1990s.  While those socket system call APIs are simple and straight-forward, they were designed at a time when internet access happened over dial-up modems and LANs had no more than 10 MBit/s, if at all.

With today&apos;s Multi-Gigabit speeds even in consumer equipment and 40GE/100GE network interface cards for servers being a reality, using those 1980s BSD/POSIX socket interfaces comes with a huge performance penalty.

Some specific use cases like single-flow high-throughput TCP on an end-node have seen optimizations that are transparent to the user (TCP segmentation offloading).  But there&apos;s only so far you can go with that.

Parts of the industry have proposed user-space network stacks built on DPDK - but then basically you do no longer use the Linux kernel network stack at all, and subsequently have none of its features.  Yes, that can be fast, but Linux becomes nothing but a bootloader, and you have to implement everything from Ethernet to ARP and IP+TCP in your application.

The answer of the Linux kernel community over the last 5+ years has been various new mechanisms and interfaces in the Linux kernel that revolutionize the way how applications can achieve higher network I/O
throughput - whether an end host (server/client) or a packet-forwarding router/bridge/firewall.

This talk provides a brief but deeply technical introduction into the problem space, the new mechanisms and their use cases.

While the talk discusses features of the Linux kernel, we do not discuss their internals; the focus is on how those mechanisms can be used by applications.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LNDJX3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LNDJX3/feedback/</feedback_url>
            </event>
            <event guid='a09d44c7-c73b-538e-9cff-5a43d9dfb6f8' id='366'>
                <room>Saal GLITCH</room>
                <title>Autorit&#228;re Zeitenwende im Zeitraffer</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>01:00</duration>
                <abstract>Die mittlerweile zerbrochene &#8222;Fortschrittskoalition&#8220; hat zuletzt mit dem Bohrhammer Grundrechte abgetragen, als g&#228;be es einen Preis zu gewinnen. Wer als n&#228;chstes das Land regiert, ist offen. Aber progressiver wird es wohl kaum. Warum das keine pl&#246;tzliche Entwicklung ist und was wir jetzt dagegen tun m&#252;ssen.</abstract>
                <slug>38c3-366-autoritre-zeitenwende-im-zeitraffer</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='107'>anna</person><person id='676'>Chris K&#246;ver</person>
                </persons>
                <language>de</language>
                <description>Was die Ampel-Koalition kurz vor ihrem Ende noch mit dem sogenannten &#8222;Sicherheitspaket&#8220; einf&#252;hrte, davon h&#228;tte ein CSU-Hardliner wie Horst Seehofer vor einigen Jahren nur tr&#228;umen k&#246;nnen: Gefl&#252;chteten die Sozialleistungen streichen, biometrische Datenbanken anlegen, alle m&#246;glichen Datent&#246;pfe zusammenr&#252;hren und analysieren. Ein Teil des Pakets scheiterte am Bundesrat - aber nur, weil es den meisten L&#228;ndern nicht weit genug ging.

So etwas galt noch vor wenigen Monaten als tabu. In einer offenen Demokratie, dachte man, wird so etwas nicht kommen. Doch der autorit&#228;re &#220;berbietungswettbewerb im Namen der Sicherheit ist sp&#228;testens seit dem Anschlag von Solingen in vollem Gang.

Politiker:innen konnten ein mutma&#223;lich islamistisches Attentat und Migration miteinander verr&#252;hren, als g&#228;be es da einen logischen Zusammenhang. Im Sturm der rassistischen Hetze und Kontroll-Fantasien waren Stimmen f&#252;r Freiheits- und Menschenrechte kaum mehr zu h&#246;ren. Jetzt, wo die Bundestagswahl fr&#252;her kommt als geplant, ist das besonders fatal.

Wir zeigen in unserem Vortrag, dass diese autorit&#228;re Wende nicht pl&#246;tzlich gekommen ist. Die j&#252;ngst geplanten Ma&#223;nahmen sind der Tiefpunkt einer Entwicklung, die schon seit Jahren von der Ampel vorangetrieben wurde. Und sie sind der H&#246;hepunkt der Desillusionierung mit einer Regierung, die einst als &#8222;Fortschrittskoalition&#8220; angetreten ist.

Wir zeigen auch, dass es Zeit ist f&#252;r radikalere Widerworte. Denn wir m&#252;ssen unsere Freiheit heute daf&#252;r nutzen, dass auch morgen noch etwas davon bleibt.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XDWNRG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XDWNRG/feedback/</feedback_url>
            </event>
            <event guid='ea98a34a-dca0-5e83-91e4-d0d700236a2c' id='550'>
                <room>Saal GLITCH</room>
                <title>Vectors, Pixels, Plotters and Public Participation</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T20:30:00+01:00</date>
                <start>20:30</start>
                <duration>01:00</duration>
                <abstract>The talk introduces technology-driven urban art projects that emphasize public participation and creativity. Each project employs a DIY machine to transform public spaces and create art collaboratively. How were these machines built? How do ideas evolve, and how can creative machines foster community connections? Find the answers and get some inspirations in this entertaining and insightful talk by Niklas a.k.a. royrobotiks.</abstract>
                <slug>38c3-550-vectors-pixels-plotters-and-public-participation</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/Q98U7B/mosaik_eTMpDOX.jpg</logo>
                <persons>
                    <person id='579'>Niklas Roy a.k.a. royrobotiks</person>
                </persons>
                <language>en</language>
                <description>In his talk, Niklas will highlight some of his latest projects that use DIY machines to involve communities in creating art together. From a graffiti robot to a giant mosaic that was designed by an entire neighborhood with the help of a mobile arcade machine, he&#8217;ll share the stories behind his inventions. He will discuss his sources of inspiration, the creative process and thoughts about inclusiveness guiding the development of the machines, and the joy of watching diverse people interact with and contribute to these unconventional art pieces. 

Join Niklas for an insightful journey into how inventiveness can transform urban environments, while also bringing people together through creativity and play.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Q98U7B/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/Q98U7B/feedback/</feedback_url>
            </event>
            <event guid='1d9f5e5a-06c3-5b5f-a195-406f940b3ac3' id='31'>
                <room>Saal GLITCH</room>
                <title>RadioMining - Playlist-Scraping und Analyse</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T21:45:00+01:00</date>
                <start>21:45</start>
                <duration>01:00</duration>
                <abstract>Seit einigen Jahren hat Stefan von etwa vierzig regul&#228;ren deutschen (Pop-)Radiosendern die Playlisten gespeichert. Welche Meta-Informationen sich daraus ergeben und welche Abh&#228;ngigkeiten von Jahreszeiten, Charts und Ereignissen sich abzeichnen, wird in einem unterhaltsamen Vortrag zum Besten gegeben.</abstract>
                <slug>38c3-31-radiomining-playlist-scraping-und-analyse</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/8U8ARN/IMG_20241010_193236_266_54yDJNA.svg</logo>
                <persons>
                    <person id='9'>Stefan Magerstedt</person>
                </persons>
                <language>de</language>
                <description>Gro&#223;e Radiosender stellen die von Ihnen gespielten Lieder zum Nachlesen auf ihrer Homepage bereit. Der Hintergrund daf&#252;r ist, dass man leicht sein neues Lieblingsst&#252;ck, welches man auf dem Weg zur Arbeit geh&#246;rt hat, wiederfinden kann.

Bei n&#228;herer Betrachtung werfen diese Playlisten etliche Fragestellungen auf. Werden zum Beispiel den ganzen Tag immer wieder dieselben Lieder gespielt? Spielen alle Radiosender die gleichen St&#252;cke? Was ist der zeitliche Mindestabstand eines Musikst&#252;cks, bevor es erneut gespielt wird? Und m&#252;ssen wir Last Christmas auch in Zukunft ertragen?

In dem Vortrag wird auch die Beziehung zwischen den &quot;Charts&quot; und den Playlisten der Radiosender gepr&#252;ft. Dabei hat sich auch gezeigt, dass die Charts selbst ein spannendes Analysefeld sind. In die Chartberechnungen wurden MP3-Downloads und sp&#228;ter Streams aufgenommen und haben dadurch altbew&#228;hrte Konzepte ver&#228;ndert.

Neben diesen Fragestellungen werden von Stefan auch technische Dinge beleuchtet. Die Herausforderungen des Scrapings, das Einf&#252;gen in eine geeignete Datenbank, die Auswertung selbst (und mit welchen Tools) sowie die Visualisierung von Ergebnissen werden anschaulich pr&#228;sentiert.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8U8ARN/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8U8ARN/feedback/</feedback_url>
            </event>
            <event guid='d73d780d-d98e-5e2b-b253-efa523fb82ab' id='327'>
                <room>Saal GLITCH</room>
                <title>Automation and Empathy: Can We Finally Replace All Artistic Performers with Machines?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>00:40</duration>
                <abstract>In this talk, artist and robotic musician Moritz Simon Geist explores whether robots and avatars can establish an emotional connection with a human audience, and examines the implications this has for arts and culture.</abstract>
                <slug>38c3-327-automation-and-empathy-can-we-finally-replace-all-artistic-performers-with-machines-</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/JQS3KA/I_need_to_find_a_fot1_ca0oy1B.jpg</logo>
                <persons>
                    <person id='351'>moritz simon geist</person>
                </persons>
                <language>en</language>
                <description>Algorithms and machines are transforming how artworks are produced - but can they replicate the complex psychosocial capacity of empathy in performative arts like music and theater? 
Moritz offers an example-based overview of the history of non-human performers in the arts and shares current state-of-the-art projects in this field. He discusses his personal journey of combining engineering with art, highlighting projects like the &quot;MR-808 Drum Robot&quot; and automated installations like &quot;Don&apos;t Look at Me.&quot; Through these works, he examines how robotic performers impact audience perception and emotional engagement.
The talk asks critical questions: How do machines alter the psychosocial dynamics of performance? What are the minimal structures needed to evoke an empathetic response from the audience? How does the concept of the Uncanny Valley, as proposed by Masahiro Mori, influence our reactions to non-human performers?
So - can we automate empathy? Let&apos;s find out!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JQS3KA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JQS3KA/feedback/</feedback_url>
            </event>
            <event guid='46d28f57-bc1a-539f-b040-37dc51b176d9' id='252'>
                <room>Saal GLITCH</room>
                <title>Die Faszination des echten Kugelspiels</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-28T23:55:00+01:00</date>
                <start>23:55</start>
                <duration>00:40</duration>
                <abstract>Der Vortrag ist ein pers&#246;nlicher Blick auf die Geschichte, Vielfalt und Entwicklung im Bereich der Flipperautomaten und ist motiviert durch die eigene Begeisterung f&#252;r diese Form von Unterhaltungstechnik. Geschichte und Geschichten der Ger&#228;te wird anhand eigener Erfahrungen, Sammlung und Recherche sowie Geschehnissen und eigene Anwendungen der Ger&#228;te (Kauf, Reparatur, Restauration, Modifikation, ...) pr&#228;sentiert und soll die Faszination und das Interesse daf&#252;r wecken oder Interessierte zusammenbringen. Es ist geplant, auch Ger&#228;te zum Kongress mitzubringen, die bespielt und/oder im Detail erkl&#228;rt werden k&#246;nnen und vielleicht sogar ein Ger&#228;t zum Basteln bereit zu stellen.</abstract>
                <slug>38c3-252-die-faszination-des-echten-kugelspiels</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='262'>Gunther</person>
                </persons>
                <language>de</language>
                <description>Flipperautomaten waren f&#252;r lange Zeit ein fester Bestandteil der Unterhaltungs- und Jugendkultur. Sie vereinen ein reales Spielgeschehen mit echten Kugeln und Hindernissen mit (Elektro-)mechanischer und elektronischer Steuerung und Effekten und sind dabei dem direkten Einfluss der Spieler ausgesetzt. Seit einiger Zeit ist diese Unterhaltung, die zudem meist an Orten au&#223;erhalb des eigenen Zuhauses stattfand, nun von rein oder vorwiegend virtuellen Spielangeboten ersetzt worden, die in unserem Kulturkreis vor allem in den eigenen vier W&#228;nden stattfindet. Der Vortrag wirft einen pers&#246;nlichen Blick zur&#252;ck auf die Entwicklung und Eigenarten dieser Unterhaltungstechnik und beschreibt eigene Erfahrungen aus einigen Jahren, in denen der Vortragende in diesem Umfeld t&#228;tig war. Er gibt auch Einblicke in die verwendete Technik und zieht Parallelen zu aktuellen Eins&#228;tzen &#228;hnlicher Unterhaltungsanwendungen wie z.&#160;B. Escape-Rooms.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ALAJNW/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ALAJNW/feedback/</feedback_url>
            </event>
            <event guid='a5f09a3a-1734-5ce2-8870-77e118f25dae' id='501'>
                <room>Saal GLITCH</room>
                <title>Net Neutrality: Why It Still Matters (More Than Ever!)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T00:55:00+01:00</date>
                <start>00:55</start>
                <duration>00:40</duration>
                <abstract>Net Neutrality is a core pillar of the open internet. But we witness a coordinated, world-wide attack from the telecom industry on the very foundation that ties the internet together. The interconnection of autonomous parts of the internet used to be a non-political and non-commercial field that not many paid attention to. But through heavy lobbying activity we are on the brink of regulating interconnection in the EU, Brazil and India to establish a new payment obligation that would force everyone who wants to send a significant amount of data to customers. Telecom companies would end up being paid twice for the same traffic, from their customers and the content and cloud providers that want to reach them.</abstract>
                <slug>38c3-501-net-neutrality-why-it-still-matters-more-than-ever-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='145'>Thomas Lohninger</person><person id='533'>Raquel Renno Nunes</person><person id='366'>J&#252;rgen Bering</person>
                </persons>
                <language>en</language>
                <description>This talk by Raquel Renno Nunes from Article 19 and Thomas Lohninger from epicenter.works gives insights into the global civil society fight against the telecom industry. We will lift the veil about the lobbying of companies like Deutsche Telekom, Orange and A1 and showcase strategies how NGOs fought back in Latin America and Europe. This war for the open internet is only heating up. European Commissioner Henna Virkkunen for Digital will have in her hands to uphold net neutrality in Europe.

We want to extend our perspective by also looking at the successful fight in Latin America. Brazil in particular made their own experience with Zero-Rating tariffs that connected millions of Brazilians only to a selected few Apps instead of the whole internet. We will showcase how WhatsApp became a catalyst for the spread of fake news around the election of Jair Bolsonaro.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UZXTXJ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UZXTXJ/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='3' date='2024-12-29' start='2024-12-29T04:00:00+01:00' end='2024-12-30T03:59:00+01:00'>
        <room name='Saal 1' guid='ba692ba3-421b-5371-8309-60acc34a3c05'>
            <event guid='3d69a23a-9488-5544-a4e8-24e9f24561ea' id='668'>
                <room>Saal 1</room>
                <title>Gef&#228;hrliche Meinung &#8211; Wenn W&#228;lder brennen und Klimaaktivist*innen im Knast sitzen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Eine Geschichte &#252;ber den Kampf f&#252;r Walderhalt in der Klimakrise, die unn&#246;tige Erweiterung eines klimasch&#228;dlichen Stahlwerks und einer vermutlich illegalen Genehmigung f&#252;r eine vorgezogene Rodung. Wie wir daf&#252;r ins Gef&#228;ngnis kamen. Und wie das Bundesverfassungsgericht die Gef&#228;ngnisleitung zwang, mich vorzeitig wieder zu entlassen.

Aktivistische Kritik buchst&#228;blich an der zust&#228;ndigen Bezirksregierung endete in einem Gerichtskrimi durch die AugsburgerJustiz, die sich nach wie vor entschlossen zeigt, die laut Bundesverfassungsgericht besonders gesch&#252;tzte Machtkritik der Aktivist*innen m&#246;glichst hart zu bestrafen. 
Ein Vortrag &#252;ber den kreativen Umgang mit Repressionen mit Einblicken hinter die Gef&#228;ngnismauern. 
Vom Kampf der Augsburger Justiz gegen kreativen Protest f&#252;r den Erhalt der Lebensgrundlagen.
Memes inklusive. &#129518;</abstract>
                <slug>38c3-668-gefhrliche-meinung-wenn-wlder-brennen-und-klimaaktivist-innen-im-knast-sitzen</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='643'>Samuel Bosch</person><person id='680'>Kiki K&#246;ffle</person>
                </persons>
                <language>de</language>
                <description>Die Regierung von Schwaben genehmigte im Herbst 2022 die Rodung eines besonders gesch&#252;tzten Bannwalds -- trotz laufender Rechtswidrigkeitspr&#252;fung des gesamten Vorhabens durch Bayerns h&#246;chstes Verwaltungsgericht. Denn der Besitzer des angrenzenden Stahlwerks, der zuf&#228;llig mit seinem Lobbyverband auch gr&#246;&#223;ter Spender der CSU ist, Max Aicher, wollte sein klimasch&#228;dliches Stahlwerk in den Bannwald hinein erweitern. Daraufhin demonstrierten wir an der Regierung von Schwaben und &quot;besetzen&quot; deren Beh&#246;rdenflur symbolisch mit einer satirischen Botschaft. Einen Bannwald roden? &#8211; Frech!

Wir werden davon erz&#228;hlen, wie wir f&#252;r unsere Kritik zu Haft verurteilt wurden, die Haft aber zun&#228;chst nicht antraten, sondern eine Woche durch die &#214;ffentlichkeit geisterten, erst eine Woche sp&#228;ter eine L&#252;cke im Terminplan entdeckten und dann doch in der Arrestanstalt auftauchten. 
Samuel gibt Einblicke hinter die Mauern der Jugendarrestanstalt und berichtet, wie es den Menschen dort drinnen geht, die dort durch psychischen Schmerz &quot;resozialisert&quot; und &quot;erzogen&quot; werden sollen.
&#220;ber Brief und Zettel aus dem Fensterschlitz konnten Unterst&#252;tzer*innen von au&#223;en den Kontakt halten. Eine Gruppe Nerds baute einen FM-Transmitter und versuchte, ein eigenes Knastradio f&#252;r Samuel einzurichten.

Nach zwei Wochen wurde Samuel pl&#246;tzlich nachts mit all seinen B&#252;chern vor die T&#252;r gesetzt, denn das Bundesverfassungsgericht entschied: Meinungsfreiheit gilt auch in Augsburg. Die Urteile aus Augsburg waren rechtswidrig, nicht mit dem Grundgesetz vereinbar.
Ein eindrucksvolles Beispiel, wie in Deutschland Protest mitunter als &#8222;Bedrohung der &#246;ffentlichen Ordnung und Sicherheit&#8220; konstruiert und eingeschr&#228;nkt wird.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WGGVDK/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WGGVDK/feedback/</feedback_url>
            </event>
            <event guid='2845809a-1611-5287-b95c-a617c8eee2be' id='406'>
                <room>Saal 1</room>
                <title>Robot Uprising: a story-driven AI robotics experience</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>It&apos;s the 2040&#8217;s. The dusty skyline of Helsinki is covered with vertical buildings reaching for the clouds. Autonomous drones deliver messages and items from layer to layer while robots maintain the aerial pathways across buildings. A sense of tension hangs in the air.

Somewhere beneath the surface, hackers and corporates wage war over AI. Will they be able to master it, or will the City succumb to a dark technology? 

**Perhaps you can change the fate of things?**</abstract>
                <slug>38c3-406-robot-uprising-a-story-driven-ai-robotics-experience</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/9RPH7S/RU18_black_D85oh4r.png</logo>
                <persons>
                    <person id='328'>Karim Hamdi</person><person id='568'>Katarina Partti</person><person id='697'>Juho Kostet</person>
                </persons>
                <language>en</language>
                <description>Do you like deep-diving into AI &amp; robotics, but wish you could escape the inevitable existential dread of techno-capitalist dystopia? If acting it out through a story-driven hackathon sounds interesting, we might just have the right thing for you.

[Robot Uprising](https://robotuprising.fi/) is a community-organised, story-driven AI &amp; robotics event series. Part LARP, part hackfest, part robotics competition, it all neatly fits together under the umbrella of an overarching cyberpunk story. The story provides inspiration for the events, the events provide the &quot;historical facts&quot; that shape how the narrative develops.

In this talk, we&apos;ll take you through the history of Robot Uprising, delve into the technologies (robotics or otherwise) explored through our events, and contemplate how story and hacking intertwine.

Our hope is to convince you of the awesomeness of story-driven hacking and inspire you to create many more events like this all around the world.

You can join us at [House of Tea after the talk](https://events.ccc.de/congress/2024/hub/en/event/robot-uprising-come-chat-after-our-talk_b0lw/) for a cup of tea and we can continue talking in a more intimate setting.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9RPH7S/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9RPH7S/feedback/</feedback_url>
            </event>
            <event guid='f6814c4a-7455-5591-90da-3e4bfd2f6630' id='262'>
                <room>Saal 1</room>
                <title>Databroker Files: Wie uns Apps und Datenh&#228;ndler der Massen&#252;berwachung ausliefern</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Databroker verschleudern unsere Daten. &#220;ber einen Datenmarktplatz konnten wir 3,6 Milliarden Handy-Standortdaten aus Deutschland ergattern. Darin fanden wir detaillierte Bewegungsprofile, unter anderem von Geheimagent:innen, Soldat:innen und hochrangigen Regierungsbeamt:innen. Hier h&#246;rt ihr die absurde Geschichte, wie einfach solche Daten zu haben sind, was den z&#252;gellosen Datenhandel so gef&#228;hrlich macht &#8211; und wie wir gemeinsam f&#252;r eine L&#246;sung k&#228;mpfen k&#246;nnen.</abstract>
                <slug>38c3-262-databroker-files-wie-uns-apps-und-datenhndler-der-massenberwachung-ausliefern</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/XBE87S/databroker-files_ueberblick_HRHJT9f.jpg</logo>
                <persons>
                    <person id='141'>Sebastian Meineck</person><person id='292'>Ingo Dachwitz</person><person id='1081'>Rebecca Ciesielski</person>
                </persons>
                <language>de</language>
                <description>Aus 3,6 Milliarden Handy-Standortdaten konnten wir uns ein m&#228;chtiges Massen&#252;berwachungs-Tool basteln, das in den falschen H&#228;nden viel Schaden anrichten k&#246;nnte. Wir konnten sehen, auf welchem Weg mutma&#223;liche Angestellte der NSA zur Arbeit fahren, wo Angeh&#246;rige der Armee ins Bordell gehen und wo Staatsbeamt:innen wohnen. All das war m&#246;glich durch die Gratis-Kostprobe eines Datenh&#228;ndlers &#8211; wer ein paar Tausend Euro im Monat ausgibt, k&#246;nnte sich noch viel mehr Daten besorgen.

Auf unsere Recherchen gab es schockierte Reaktionen aus Bundestag und Bundesregierung, EU-Parlament und Pentagon. Aber Lippenbekenntnisse sind nicht genug, um die kommerzielle Massen&#252;berwachung durch Handy-Apps zu stoppen. Wir zeigen, wie jede:r Einzelne aktiv werden kann und was sich rechtlich &#228;ndern muss. Und: Unsere Recherchen zu den Databroker Files gehen weiter. 

Team netzpolitik.org: Sebastian Meineck; Ingo Dachwitz. Team BR: Katharina Brunner, Rebecca Ciesielski, Maximilian Zierer, Robert Sch&#246;ffel, Eva Achinger. Hier ist die &#220;bersicht der dazugeh&#246;rigen Ver&#246;ffentlichungen: https://netzpolitik.org/2024/databroker-files-die-grosse-datenhaendler-recherche-im-ueberblick/</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XBE87S/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XBE87S/feedback/</feedback_url>
            </event>
            <event guid='45386b99-a14c-59a2-9238-fda47005ea93' id='472'>
                <room>Saal 1</room>
                <title>Ein unmoralisches Angebot: Wie wir unsere Communities vor ideologischen Zugriffen sch&#252;tzen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>In beschleunigten Krisenzeiten w&#228;chst mit der &#220;berforderung auch die Sehnsucht nach einer klaren Ordnung: Weltbilder, die das Chaos auf ein moralisch aufgeladenes &quot;Entweder-Oder&quot; reduzieren. 

Mit dieser bin&#228;ren Logik werden alle L&#246;sungen, die das &quot;Sowohl-als-auch&quot; denken, abgem&#228;ht. Die verheerende Folge: zwischen aufgeheiztem Lagerdenken, Positionierungsdruck und Rhetorik von individueller Schuld und Scham ist kein kollektives Handeln mehr m&#246;glich.

Der Talk macht das unmoralische Angebot eines universalistischen und anwender*innenfreundlichen &#8222;Security-Updates&quot;. Eine Empfehlung, auf was wir dringend achten sollten, um unser Netzwerk handlungsf&#228;hig zu halten.</abstract>
                <slug>38c3-472-ein-unmoralisches-angebot-wie-wir-unsere-communities-vor-ideologischen-zugriffen-schtzen</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='281'>elenos</person>
                </persons>
                <language>de</language>
                <description>Der Talk gliedert sich in drei Teile:

3. GROUND CONTROL: NORMATIVE INFRASTRUKTUR: Wir alle sind nicht ganz schwindelfrei und suchen nach Anbindungen oder Gravitationsfeldern, die uns in der unendlichen Kontingenz des Daseins Orientierung geben. Diese zutiefst menschliche Sehnsucht nach Sinnanziehungskraft kann man erstmal  als solche anerkennen und ohne Scham annehmen. Das ist das klassische Business von Religionen (religare &#8594; la &#8222;anbinden, zur&#252;ckbinden, festhalten, an etwas festmachen&#8220;). Nun hinterlassen in einer gr&#246;&#223;tenteils s&#228;kularen Gesellschaft die zum Gl&#252;ck arbeitslos gewordenen Religionen viele ungebundene Individuen. Leider selten freie Radikale, vielmehr eine durch neoliberale Politik und kapitalistische Erz&#228;hlungen individualisierte, unorganisierte Schar von Wesen, die ziemlich &#8218;lost&#8217; sind &#8211; und dadurch empf&#228;nglich f&#252;r moralisch durchtr&#228;nkte Diskurse &#8211; gegenw&#228;rtig vor allem solche, die das Individuum in den Mittelpunkt stellen. Das Problem daran: Kollektives Handeln wird immer schwieriger zu organisieren.

2. ILLEGAL CONSTRUCTIONS oder DIE ZERST&#214;RUNG DER EINS: Alain Badiou ist ein Philosoph, der weltweit und nicht nur in akademischen Kreisen gelesen wird, in Deutschland aber kaum bekannt ist. Dabei hat er gerade zu dieser Fragestellung einiges zu sagen. Sein Pl&#228;doyer gilt der Verkn&#252;pfung von Subjektivit&#228;t und Universalismus statt dem Versuch, Partikularit&#228;ten zu kontrollieren &#8211; wie es seiner Meinung nach identit&#228;tspolitische Ans&#228;tze versuchen. Stattdessen schl&#228;gt er vor, Subjektivit&#228;t als kollektive &#8218;illegal instruction&#8216; zu denken. Was erstmal abstrakt klingt, bringt sehr konkrete Konsequenzen mit sich, wenn man sie in den (netz-)aktivistischen Alltag &#252;bersetzt &#8211; was im dritten Teil getan wird:

3. ILLEGAL INSTRUCTIONS: Unverbindliches Angebot eines &#8222;Security Updates&#8220; mit praktischen Hinweisen, Anregung zur Selbstreflexion und vielen offenen Fragen, die mit in die eigenen Strukturen genommen werden k&#246;nnen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PN3TE3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PN3TE3/feedback/</feedback_url>
            </event>
            <event guid='a89328ff-564b-5e25-bebe-66b067309e09' id='374'>
                <room>Saal 1</room>
                <title>Eat the Rich!  Die Menschen wollen soziale Sicherheit, aber kriegen &#8222;Deutschland den Deutschen&#8220;.  Holt das Geld bei den Reichen!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Bezahlkarte bald auch f&#252;r B&#252;rgergeld-Empf&#228;nger*innen, versch&#228;rfte Sanktionen, Pauschale f&#252;r die Kosten der Unterkunft, weniger Regelsatz, Umzugszwang, versch&#228;rfte Zumutbarkeitsregelungen f&#252;r Arbeitsangebote und Komplett-&#220;berwachung: Die Debatte &#252;ber das B&#252;rgergeld ist v&#246;llig durchgedreht. Was kommt noch auf uns zu? Und wie kommen wir aus der Hetz-Spirale wieder heraus?</abstract>
                <slug>38c3-374-eat-the-rich-die-menschen-wollen-soziale-sicherheit-aber-kriegen-deutschland-den-deutschen-holt-das-geld-bei-den-reichen-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='400'>Helena Steinhaus</person>
                </persons>
                <language>de</language>
                <description>Die Union hat das B&#252;rgergeld zum wichtigsten Wahlkampfthema 2025 auserkoren und will es am liebsten sofort abschaffen. An Menschen, die Sozialleistungen beziehen, werden soziale und technische Methoden der Entmenschlichung erprobt. Im Talk geht es um die Frage, wie es sich im B&#252;rgergeld lebt, was die Unterschiede zu Hartz IV sind, welche Auswirkungen die &#220;berwachungsmethoden der Jobcenter haben und welche gesellschaftliche Funktion das B&#252;rgergeld erf&#252;llt. Ist das alles wirklich legal? Ist das vielleicht sogar egal? Und vor allem: Was k&#246;nnen wir dagegen tun?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PSHBNA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PSHBNA/feedback/</feedback_url>
            </event>
            <event guid='6f95336c-76e0-5c3e-91c6-7da80c4c1b89' id='402'>
                <room>Saal 1</room>
                <title>Can We Find Beauty in Tax Fraud?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>00:40</duration>
                <abstract>What do Olaf Scholz, blue ikea bags, Moldova, Deutsche Bank, fine art, and Butyrka Prison have in common?

Join us for a brief stroll through the hidden, shady world of large-scale tax fraud, cross-border financial crime, money laundering, and corruption. We&#8217;ll examine both common and lesser-known financial exploits, drawing on revelations from journalists, activists, and investigators over the last few decades.</abstract>
                <slug>38c3-402-can-we-find-beauty-in-tax-fraud-</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='437'>martin</person>
                </persons>
                <language>en</language>
                <description>Can there be beauty in abstraction? And are dividend stripping or VAT fraud diagrams really as dull as they seem? But most importantly: Is defrauding the public of 64 billion euros considered science, engineering, or art? And what does this have to do with you&#8212;and why should you care?

Using real-world case studies, we&#8217;ll explore how corporations and individuals defraud populations and how these schemes&#8212;though sometimes confusing or complex on the surface&#8212;rely on surprisingly simple, chained tactics, much like exploits in information systems. We&#8217;ll break down the roles of various actors, service providers, fraudsters, and corrupt officials, as well as their playbooks, exploring how these crimes work or how they break and fail.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YTE8AH/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YTE8AH/feedback/</feedback_url>
            </event>
            <event guid='03d0f884-57d9-55ce-8d0d-52945e1e805b' id='682'>
                <room>Saal 1</room>
                <title>Der Milliarden-Steuerraub Cum/Ex &#8211; wie sch&#228;dlich ist Wirtschaftskriminalit&#228;t f&#252;r unsere Gesellschaft?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T16:40:00+01:00</date>
                <start>16:40</start>
                <duration>00:40</duration>
                <abstract>Nachdem kurz erkl&#228;rt wird, was Cum/Ex eigentlich ist, widmet sich der Vortrag zun&#228;chst der Frage, wie die Aufkl&#228;rung in diesem international organisierten Fall schwerer Steuerhinterziehung &#252;berhaupt gelingen konnte und was noch zu tun ist. Wer sind die Akteure auf Seiten der Finanzbranche und wie ticken die T&#228;ter?  Anschlie&#223;end wird der generelle Umgang des Staates mit Wirtschaftskriminalit&#228;t dargestellt und L&#246;sungsans&#228;tze entwickelt. Dabei geht es auch um die Frage, was jeder Einzelne tun kann und warum die NGO Finanzwende ein wichtiger Ort sein kann, um politische Ver&#228;nderungen bei finanzpolitischen Themen zu bewirken.</abstract>
                <slug>38c3-682-der-milliarden-steuerraub-cum-ex-wie-schdlich-ist-wirtschaftskriminalitt-fr-unsere-gesellschaft-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='779'>Anne Brorhilker</person>
                </persons>
                <language>de</language>
                <description>Nachdem kurz erkl&#228;rt wird, was Cum/Ex eigentlich ist, widmet sich der Vortrag zun&#228;chst der Frage, wie die Aufkl&#228;rung in diesem international organisierten Fall schwerer Steuerhinterziehung &#252;berhaupt gelingen konnte und was noch zu tun ist. Wer sind die Akteure auf Seiten der Finanzbranche und wie ticken die T&#228;ter?  Anschlie&#223;end wird der generelle Umgang des Staates mit Wirtschaftskriminalit&#228;t dargestellt und L&#246;sungsans&#228;tze entwickelt. Dabei geht es auch um die Frage, was jeder Einzelne tun kann und warum die NGO Finanzwende ein wichtiger Ort sein kann, um politische Ver&#228;nderungen bei finanzpolitischen Themen zu bewirken.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/87CFYP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/87CFYP/feedback/</feedback_url>
            </event>
            <event guid='3266d556-4be7-546a-a54c-238206ac9cc2' id='161'>
                <room>Saal 1</room>
                <title>KI nach dem Kapitalismus: Hat ChatGPT in der besseren neuen Welt einen Platz?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T17:35:00+01:00</date>
                <start>17:35</start>
                <duration>00:40</duration>
                <abstract>Unsere Welt funktioniert nur, wenn sich immer neue Bereiche finden, in denen Profite erbeutet werden k&#246;nnen. Nach Blockchain, Metaverse und Web3 ist &quot;K&#252;nstliche Intelligenz&quot; die neueste Wette der Tech-Investoren auf kr&#228;ftige Gewinne. Ob &quot;KI&quot; tats&#228;chlich irgendeinen gesellschaftlichen Wert hat, ist dabei v&#246;llig nebens&#228;chlich. Was tun wir also mit &quot;KI&quot; nach dem Kapitalismus? Brauchen wir Large Language Models &#252;berhaupt in einer Welt, die radikal auf Kooperation statt Konkurrenz, auf Bed&#252;rfniserf&#252;llung statt Profit und auf Solidarit&#228;t statt Privateigentum basiert?</abstract>
                <slug>38c3-161-ki-nach-dem-kapitalismus-hat-chatgpt-in-der-besseren-neuen-welt-einen-platz-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='163'>Malte Engeler</person><person id='239'>Sandra Sieron</person>
                </persons>
                <language>de</language>
                <description>In diesem Talk besprechen wir, was gegenw&#228;rtige &quot;KI&quot; ist, wie sich &#246;konomische Macht in &quot;KI&quot; zeigt und wie sich &quot;KI&quot; in die breitere Debatte um Technologiekritik einordnet. Wir fragen uns, was man mit Mustererkennung, Deep Learning und Sprachmodellen &#252;berhaupt anfangen will in der besseren Welt nach der Revolution und ob uns eine Technologie wie &quot;KI&quot; auf dem Weg dahin helfen kann oder eher behindert.

Der Talk wird zu gleichen Teilen von Malte Engeler und Sandra Sieron gehalten.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8UUJVJ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8UUJVJ/feedback/</feedback_url>
            </event>
            <event guid='8095bb81-072e-509b-a1ca-f7e0263994a7' id='193'>
                <room>Saal 1</room>
                <title>Kn&#228;ste hacken</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>In Deutschland sitzen &#252;ber 40.000 Menschen im Knast. Weitgehend ohne Zugang zu digitaler Infrastruktur - au&#223;er einem Telefon. Wir schauen uns die Systeme an, die sie nutzen d&#252;rfen und in denen sie verwaltet werden.</abstract>
                <slug>38c3-193-knste-hacken</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='193'>Lilith Wittmann</person>
                </persons>
                <language>de</language>
                <description>Von HamSy oder SoPart haben die meisten Menschen noch nie etwas geh&#246;rt. Au&#223;er sie hatten bereits Kontakt mit deutschen Kn&#228;sten. Das f&#252;hrt dazu, das es kaum Dokumentation dar&#252;ber gibt, wie Digitalisierung f&#252;r Menschen dort funktioniert und welche Folgen sie in Zukunft haben kann.

Im letzten Jahr besch&#228;ftigte ich mich mit verschiedenen Systemen in deutschen Kn&#228;sten und m&#246;chte &#252;ber Datenabfl&#252;sse und strukturelle Probleme, die verhindern, dass wir Menschen dort Zugang zu digitaler Teilhabe gew&#228;hren, sprechen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/99SLE3/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/99SLE3/feedback/</feedback_url>
            </event>
            <event guid='b06036e0-00fc-56ca-aa15-590170d0227f' id='30'>
                <room>Saal 1</room>
                <title>Das IFG ist tot &#8211; Best of Informationsfreiheit, Gefangenenbefreiung &amp; Macht&#252;bernahmen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>Die Versprechungen waren gro&#223;: Bl&#252;hende Transparenz-Landschaften, Mitbestimmung, Korruptionspr&#228;vention, De-mo-kra-tie!
Das Informationsfreiheitsgesetz sollte den deutschen Staat besser machen. Nach Jahren schlechter Verwaltungspraxis, schlechter Gerichtsurteile und schlechter Politik ist es in wichtigen Teilen aber nutzlos geworden. Das zeigt sich vor allem, wenn man sich Szenarien einer antidemokratischen Regierungs&#252;bernahme vorstellt - die Transparenz w&#228;re als erstes hin&#252;ber, der Boden daf&#252;r ist schon bereit.
Was tun?</abstract>
                <slug>38c3-30-das-ifg-ist-tot-best-of-informationsfreiheit-gefangenenbefreiung-machtbernahmen</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='7'>Arne Semsrott</person>
                </persons>
                <language>de</language>
                <description>Wenn das IFG tot ist, sollten wir daf&#252;r k&#228;mpfen, es wiederzubeleben &#8211; vielleicht als Untote? Zahlreiche Skandale, die FragDenStaat in diesem Jahr aufgedeckt hat, zeigen, wohin der Weg gehen sollte:
- Wir brauchen mehr Leaks &amp; illegal instructions f&#252;r Beamte
- Es ist Zeit, Verwaltungen zu infiltrieren

Mit dem Best of Informationsfreiheit, FragDenStaat, Gefangenenbefreiung und Macht&#252;bernahmen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/F7SPPL/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/F7SPPL/feedback/</feedback_url>
            </event>
            <event guid='17918b07-99c8-5154-8abe-e5f45865a1e9' id='421'>
                <room>Saal 1</room>
                <title>Postpartum Punk: make space for unfiltered creativity</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>After years as a journalist and filmmaker covering topics like crypto, holocaust  and showbiz, everything changed for me 3 years ago after the birth of my daughter. 

While I haven&apos;t planned to be a mother, I decided to keep this pregnancy at 41, however this grass turn out to be too high for lawn mower &#8211; I was ready to go for a rave, not to be locked in a baby dark room for 3 years. 

I felt like my brain had been reprogrammed overnight. The analytical mindset I once relied on&#8212;quick to analyse, explore, and understand complex topics&#8212;seemed to vanish, replaced by a simpler, instinct-driven state that prioritized pure survival and nurturing yet mixed with unhinged chaos, aux naturelle psychedelic downloads plus no sense of inhibition or fear of being seen.  

Hand cuffed to a rainbow I was gazing at the black clouds. 

Despite the shock at this involuntarily IQ transplant, I quickly realised this new mind-tool-set was all in all fulfilling and liberating.

I became my own fire brigade with an alternative emergency strap-on.

Without the pressure to think analytically, I began channelling this raw energy into my joke band PUShY PUShY PUShY, creating what I now call postpartum punk movement. 

The idea caught on &#8211; this summer we have been featured in the Guardian and The New Yorker. 

This fuels my missionarism towards another level: how can we embrace this wild, intuitive mindset, not only as parents but as people? And could new technologies help us experience or even learn from this state?</abstract>
                <slug>38c3-421-postpartum-punk-make-space-for-unfiltered-creativity</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='454'>Ania Poullain-Majchrzak</person>
                </persons>
                <language>en</language>
                <description>In this talk, I&#8217;ll share my story and propose some solutions to help people connect  and utilise with this raw, abstract, flippant side of the mind, whether or not they&#8217;ve experienced parenthood: haptic births, transcranial nursering, chaos VR sessions, neurofeedback baths, quantum aerobics, algorithm jams,  and &apos;Near-Birth-Experiences&apos;</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/N3FZQD/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/N3FZQD/feedback/</feedback_url>
            </event>
            <event guid='b385ce88-c1b8-5cdb-9665-ab4a9464e527' id='627'>
                <room>Saal 1</room>
                <title>Pyrotechnik &#8211; ist doch kein Verbrechen!?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>Feuerwerk erregt die Gem&#252;ter - und das seit mehreren hundert Jahren. Gemeinsam beleuchten wir  technische, kulturelle und gesellschaftspolitische Aspekte eines der faszinierenderen und gleicherma&#223;en umstritteneren Ph&#228;nomene unserer Zeit.</abstract>
                <slug>38c3-627-pyrotechnik-ist-doch-kein-verbrechen-</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/NA9SF8/smiley_Y2GrndX.jpg</logo>
                <persons>
                    <person id='632'>felix</person><person id='766'>bijan</person>
                </persons>
                <language>de</language>
                <description>W&#228;hrend des 38C3 entfaltet sich in Politik und Medien ein j&#228;hrlich wiederkehrendes Ritual: Die Debatte um Sinn und Unsinn von Feuerwerk. &#8222;Der Fortschritt ruft! Der Kohlenstoff hat abgedankt, die Zeit ist f&#252;rs Silizium reif!&#8220;, so schallt es aus den Reihen der vermeintlich aufgekl&#228;rteren und und fortschrittlicheren Teile der Gesellschaft.

Doch was ist Feuerwerk &#252;berhaupt? Wie funktioniert es? Und ist nicht im Recht, wer das Verschwinden des stinkenden Geknalles fordert? Wir behaupten: das Feuerwerk mitsamt seiner Geschichte und Gegenwart h&#228;lt noch ein paar spannende Einsichten f&#252;r uns und unsere Zeit parat.

Mit dem Talk werfen wir einen Blick hinter die Kulissen und tauchen tief in Technik und Diskurs der explosiven Materie ein. In einem unterhaltsamen Kurztrip beleuchten wir verschiedene Dimensionen eines vielschichtiges Ph&#228;nomens - praktisch, technisch, historisch und politisch.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NA9SF8/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NA9SF8/feedback/</feedback_url>
            </event>
            <event guid='94af8bc5-790a-5260-9e51-923589eb1f56' id='159'>
                <room>Saal 1</room>
                <title>Hacker Jeopardy</title>
                <subtitle></subtitle>
                <type>Game show</type>
                <date>2024-12-30T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>02:00</duration>
                <abstract>The Hacker Jeopardy is a quiz show.</abstract>
                <slug>38c3-159-hacker-jeopardy</slug>
                <track>Entertainment</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/8C7KKR/beopardy_OmOGMB2.png</logo>
                <persons>
                    <person id='162'>Sec</person><person id='719'>Ray</person>
                </persons>
                <language>en</language>
                <description>The well known reversed quiz format, but of course hacker style. It once was entitled &#8222;number guessing for geeks&#8220; by a German publisher, which of course is an unfair simplification. It&#8217;s also guessing of letters and special characters. ;)

Three initial rounds will be played, the winners will compete with each other in the final.

The event will be in German, we hope to have live translation again.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8C7KKR/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8C7KKR/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal ZIGZAG' guid='62251a07-13e4-5a72-bb3c-8528416ee0f2'>
            <event guid='4c63b6f7-0d8a-5c92-9223-ca3c2cf46b82' id='548'>
                <room>Saal ZIGZAG</room>
                <title>Chatbots im Schulunterricht!?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Was k&#246;nnen die Tools wirklich, was machen sie mit der &#8220;Bildung&#8221;, und sollten wir daf&#252;r Steuergelder ausgeben?

Sp&#228;testens seit dem Hype um ChatGPT werden KI-Tools als magische Technofixes f&#252;r Lehrkr&#228;ftemangel und soziale Segregation im Bildungswesen angepriesen. Mehrere Bundesl&#228;nder haben zum Beispiel Fl&#228;chenlizenzen f&#252;r alle Lehrkr&#228;fte bei dem Hamburger Unternehmen &quot;Fobizz&quot; erworben. Das Unternehmen bietet auf Basis gro&#223;er Sprachmodelle (meist GPT-3/4) und verschiedener bildgenerierender KIs eine ganze Reihe von Bots sowohl f&#252;r Sch&#252;lerInnen als auch f&#252;r LehrerInnen an: Tools zur automatisierten Korrektur und Bewertung von Hausaufgaben, Chatbot-basierte individuelle Lern-Coaches, Avatare zur Gespr&#228;chssimulation (&quot;mit Angela Merkel chatten&quot;), oder Bots zur Erstellung von individualisiertem Unterrichtsmaterial.
Wir haben das Fobizz-Tool zur automatisierten Korrektur von Hausaufgaben und Pr&#252;fungsleistungen detailliert unter die Lupe genommen. Funktioniert das wirklich? Wie wirkt sich das auf die Qualit&#228;t des Unterrichts aus? Kann man LehrerInnen und Sch&#252;lerInnen guten Gewissens darauf loslassen? &#8211; Unsere Antwort ist schockierend eindeutig: nein! Und es ist ein Skandal, dass Steuergelder daf&#252;r ausgegeben werden. Im Vortrag berichten wir von frustrierenden Irrfahrten wenn Sch&#252;lerInnen den Korrekturen des KI-Tools folgen; von quasi ausgew&#252;rfelten Bewertungen (nach dem Motto: wenn dir die Note f&#252;r diese Person nicht passt, dr&#252;ck einfach auf &quot;re-generate&quot;), und von der impliziten Botschaft an die Sch&#252;lerInnen: Ihr m&#252;sst ChatGPT verwenden, sonst k&#246;nnt ihr nicht gut abschneiden.</abstract>
                <slug>38c3-548-chatbots-im-schulunterricht-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='317'>Rainer M&#252;hlhoff</person><person id='583'>Marte Henningsen</person>
                </persons>
                <language>de</language>
                <description>Im zweiten Teil unserer Studie haben wir systematisch mit LehrerInnen gesprochen und ihre Perspektive auf KI im Schulunterricht untersucht. Wir besprechen, wie dystopisch und fehlgeleitet es ist, die sozialpolitischen Probleme im Bildungswesen mit Techno-Tools zu l&#246;sen. W&#228;hrend in Gro&#223;britannien bereits &#8220;teacher-free&#8221; KI-Klassen als Pilotprojekt ins neue Schuljahr gestartet sind, scheint man in Deutschland zwar immer noch auf Lehrkr&#228;fte im Klassenzimmer zu setzen &#8211; doch die Signale der Kultusministerien sind eindeutig: Lieber den Lehrkr&#228;ftemangel mit den Services privater KI-Unternehmen fixen als echte politische Ma&#223;nahmen durchzusetzen, die den Beruf ertr&#228;glicher und attraktiver machen. Dass das Schulsystem &#252;ber KI-Tools noch weiter an private Unternehmensinteressen gebunden wird, hat unweigerlich steigende Ungleichheit und Intransparenz zur Folge. 
Da aktuell weitere Bundesl&#228;nder an der Schwelle stehen, Lizenzvertr&#228;ge mit KI-Unternehmen f&#252;r Lerntools abzuschlie&#223;en, steht mit diesem Thema einiges auf dem Spiel.

Unsere Studie zur &quot;KI-Korrekturhilfe&quot; von Fobizz kann hier runtergeladen werden: &lt;a href=&quot;https://doi.org/10.48550/arXiv.2412.06651&quot;&gt;https://doi.org/10.48550/arXiv.2412.06651&lt;/a&gt;</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/73Q3KX/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/73Q3KX/feedback/</feedback_url>
            </event>
            <event guid='d3fd8a6a-97e9-587e-8e30-9042cac58e3d' id='347'>
                <room>Saal ZIGZAG</room>
                <title>AI Meets Git: Unmasking Security Flaws in Qodo Merge</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>The whole world is talking about AI, and developers are no exception. When a developer hears about a tool that can help them handle git pull requests using AI, it is likely that they will start using it for their open source project.

This is precisely what&apos;s happening with Qodo Merge (formerly PR-Agent), an open source tool that can help review and handle git pull requests by using AI to provide feedback and suggestions to developers. It is getting adopted by more and more open source projects, including popular ones.

It is so easy to add new features by relying on external tools, yet the consequences on security can be catastrophic.

Indeed, if the tool contains security vulnerabilities, the project using it may become vulnerable too and may grant anyone permissions to perform unexpected actions without realizing it. But everyone wants to use AI so security may be overlooked.

We found multiple vulnerabilities in Qodo Merge that may lead to privilege escalation on Gitlab, getting write access to Github repositories and leaking Github repository secrets. Additionally we found multiple high profile Github repositories using Qodo Merge with a configuration that makes them vulnerable, such as highly popular projects, government official repositories, self-driving automotive industry projects, blockchains and more.

In this talk we go through what Qodo Merge is, how it can be used, how it works, how it can be exploited, what projects are affected and what are the impacts. We also mention remediation steps to fix these issues.</abstract>
                <slug>38c3-347-ai-meets-git-unmasking-security-flaws-in-qodo-merge</slug>
                <track>Security</track>
                
                <persons>
                    <person id='371'>Nils Amiet</person>
                </persons>
                <language>en</language>
                <description>Qodo (formerly CodiumAI) develops an open source tool called Qodo Merge (formerly PR-Agent). This tool can be setup to automatically analyze pull requests on a Gitlab, Github or Bitbucket project.

Qodo Merge uses AI to perform various tasks that may help a developer handle a pull request, such as:
* Summarizing a pull request
* Suggesting code changes to improve a pull request
* Generating a CHANGELOG file entry for a pull request
* Answering questions about a pull request
* and more

In this talk, we describe vulnerabilities we found in Qodo Merge that may lead to privilege escalation on Gitlab, write access to Github repositories and leaking secrets of Github repositories.

We mention popular open source projects that are vulnerable because they started using Qodo Merge, and discuss how to protect your project from these attacks.

We also talk about the multiple ways we tried to report those vulnerabilities to the developers of Qodo Merge and the lack of a way for security people to contact them. Finally, we describe the current security posture of the project regarding the vulnerabilities we found.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XXXSWE/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XXXSWE/feedback/</feedback_url>
            </event>
            <event guid='6061195f-b992-56e9-ad5a-0bbf50c8f2e0' id='655'>
                <room>Saal ZIGZAG</room>
                <title>Vom Betrieb bis ins Netz: Gewerkschaften als Vorbild f&#252;r modernen Widerstand?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Von kreativen Strategien und Herausforderungen aus der Gewerkschaftsarbeit im Kampf f&#252;r Arbeiter*innenrechte</abstract>
                <slug>38c3-655-vom-betrieb-bis-ins-netz-gewerkschaften-als-vorbild-fr-modernen-widerstand-</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='660'>Joana Starck</person><person id='784'>Laurent Kuffert</person>
                </persons>
                <language>de</language>
                <description>Arbeitnehmer*innen der IT-Branche sehen sich zunehmend mit Repressionen konfrontiert, die kreative und gemeinsame Formen des Widerstands erfordern. Von Union Busting &#252;ber unmoralische Praktiken am Arbeitsplatz bis hin zu gesetzlichen H&#252;rden &#8211; die Angriffe auf kollektive Arbeitsrechte werden intensiver und vielseitiger. Die Herausforderung, neue Aktionen zu entwickeln, Widerst&#228;nde zu &#252;berwinden, Ideen zu verwerfen und immer wieder neu anzusetzen, ist l&#228;ngst allt&#228;glich geworden. Umso wichtiger ist es, dass wir uns gegenseitig inspirieren und unterst&#252;tzen. Aktivismusfelder wie Netzpolitik, Klimaschutz und Arbeitsrechte stehen vor &#228;hnlichen Hindernissen &#8211; und wir alle profitieren, wenn wir uns austauschen und voneinander lernen.

Unser Vortrag zielt daher nicht darauf ab, allumfassende L&#246;sungen zu bieten. Stattdessen m&#246;chten wir aktuelle Missst&#228;nde aufzeigen und Erfahrungen sowie L&#246;sungsans&#228;tze teilen. Gemeinsam wollen wir untersuchen, wie unkonventionelle Ans&#228;tze, geteilte Erfahrungen und Zusammenarbeit zu einer st&#228;rkeren, solidarischen Zukunft f&#252;hren k&#246;nnen. Mit unserer Erfahrung aus der Gewerkschaftsjugend und aus Tarifk&#228;mpfen sprechen wir &#252;ber Aktionen, Erfolge und R&#252;ckschl&#228;ge &#8211; und dar&#252;ber, wie wir uns in Zukunft besser aufstellen k&#246;nnen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CHDQRA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CHDQRA/feedback/</feedback_url>
            </event>
            <event guid='db040c6e-f729-5d54-b59b-a7eac586ce99' id='33'>
                <room>Saal ZIGZAG</room>
                <title>Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>Auracast, the new Bluetooth LE Broadcast Audio feature has gained some publicity in the last few months. The Bluetooth SIG has been working on the specification of this feature set in the past few years and vendors are only now starting to implement it. Auracast enables broadcasting audio to multiple devices. These broadcasts can also be encrypted. Unfortunately, the security properties of the protocol are vague and insufficient. It has already been shown that these broadcasts can be hijacked by anyone when unencrypted.

We explain the state of (in)security of the protocol and add to it by showing that even when encrypted, broadcasts can often be cracked easily. We also show that once equipped with the passcode, attackers can eavesdrop and hijack even encrypted broadcasts. Alongside the talk, we will release our toolkit to brute-force authentication codes, decrypt dumped Auracast streams, and hijack encrypted broadcasts.</abstract>
                <slug>38c3-33-auracast-breaking-broadcast-le-audio-before-it-hits-the-shelves</slug>
                <track>Security</track>
                
                <persons>
                    <person id='12'>Frieder Steinmetz</person><person id='392'>Dennis Heinze</person>
                </persons>
                <language>en</language>
                <description>Bluetooth Auracast is a marketing term for a subset of the new &quot;LE Audio&quot; features introduced in the Bluetooth 5.2 specification. 
LE Audio is designed to provide better sound quality, longer battery life and new capabilities for audio devices like headphones, earbuds and especially hearing aids. Essentially, Auracast is an audio broadcast feature set for Bluetooth Low Energy. Our talk will focus on the new features introduced in the core spec, namely Broadcast Isochronous streams (BIS).

The protocol specification for Auracast was released several years ago, and vendors are only now beginning to implement application-level support for it. Previous research from 2023 (the &quot;BISON&quot; paper) has already shown that unencrypted Auracast broadcasts can be hijacked.

The Bluetooth specification is very vague in what security goals it tries to achieve for (encrypted) broadcasts. The core building block for LE Audio broadcasts are Broadcast Isochronous Streams (BIS). Security for BIS is only ever mentioned in terms of confidentiality, which is supposedly achievable by encrypting a BIS. In this talk we&apos;ll shed some light on the security properties of Auracast and show that authenticity and confidentiality can be violated, even when broadcasts are encrypted.

To examine whether the vague specification and the bad examples lead to real-world issues, we have surveyed several implementations of Auracast. We found that on popular devices the default configuration is weak and allows breaking the authenticity and confidentiality of the Auracast broadcast.

Alongside the talk, we will release a toolkit that allows to dump, decrypt and hijack encrypted Auracast broadcasts.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7C8KRZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7C8KRZ/feedback/</feedback_url>
            </event>
            <event guid='7ec6ad03-b55e-5fe1-b3be-5da66d456058' id='648'>
                <room>Saal ZIGZAG</room>
                <title>Dialing into the Past: RCE via the Fax Machine &#8211; Because Why Not?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Remember the days when faxes were the pinnacle of office tech, and the sound of a paper getting pulled in was as satisfying as a fresh cup of coffee? Well,  it&apos;s time to dust off those memories and reintroduce ourselves to the quirky world of printers and their forgotten fax interfaces &#8211; yes, those relics that make us all feel like we&apos;re in an &apos;80ies sci-fi movie &#8211; and specifically, how they can unlock a new frontier in printer security exploits!</abstract>
                <slug>38c3-648-dialing-into-the-past-rce-via-the-fax-machine-because-why-not-</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/KBSSG9/faxmachine_C4VaNOz.png</logo>
                <persons>
                    <person id='654'>Rick de Jager</person><person id='790'>Carlo Meijer</person>
                </persons>
                <language>en</language>
                <description>In this talk, we&apos;ll show you how we leveraged a printer bug that we found at Pwn2Own Ireland this year to gain remote code execution. Over its fax interface. You might think, &quot;Who cares about faxes?&quot; &#8211; but what if I told you that lurking within this vintage feature is a potential pathway for remote code execution? That&apos;s right, while everyone else is busy patching the latest vulnerabilities in trendy software and half the world is obsessed with cloud security, we&apos;ll be having a blast with tech that should&apos;ve been retired to the attic long ago, exploiting a feature that&apos;s older than some of the attendees!

We&apos;ll explore how this vintage tech can be the gateway to some serious mischief. Think of the possibilities: municipalities, banks, courts, you pick your favorite bureaucracy. Unfortunately, we can&apos;t do any of those things -- that&apos;d be naughty -- so we&apos;re restricted to doing the stupidest things we can think of in our live demos. In case you&apos;re wondering: of course we&apos;ll be running doom on this thing, proving that even the most outdated tech can still pack a punch, as we take control over this device in style. Expect a mix of technical insights and many moments of &quot;why would you do that?&quot;.

So join us in this wild ride through simpler times -- who knew the key to world domination lays in a dusty fax machine?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KBSSG9/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/KBSSG9/feedback/</feedback_url>
            </event>
            <event guid='a33c84f6-5fc2-50db-9798-38e35be8a7ac' id='531'>
                <room>Saal ZIGZAG</room>
                <title>Let&apos;s build dodos! How generative AI is upturning the world of synthetic biology and hopelessly overwhelming traditional governance instruments.</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>00:40</duration>
                <abstract>Have you always wanted to build an egg-laying woolly milk sow or bring the legendary dodo 
back to life? The dream of some biologists to not only understand organisms, but also to redesign, build or bring living beings back to life is accelerating towards reality with the convergence of synthetic biology and generative AI in &#8216;generative biology&#8217;. For example, large language models are now being used to write genes and proteins, while complex laboratory tests are being replaced by machine vision and automation. 
The pace of these developments is so fast that they are barely noticed by the public, politicians or related experts such as environmental scientists. Questions about the reliability and safety of these new biodigital methods and applications are not yet being asked and research into risk assessment methods is not keeping pace. At the same time, this shift of generative AI systems from generating text and images to generating protein, bacteria, viruses and organisms could transform many areas of life, from medicine and the environment to bioweapons. So let&apos;s talk about it and discuss it.</abstract>
                <slug>38c3-531-let-s-build-dodos-how-generative-ai-is-upturning-the-world-of-synthetic-biology-and-hopelessly-overwhelming-traditional-governance-instruments-</slug>
                <track>Science</track>
                
                <persons>
                    <person id='560'>Margret Engelhard</person>
                </persons>
                <language>en</language>
                <description>This is what the talk will be about:
- What is the science behind synthetic biology? What is genome editing, CRISPR/cas, RNAi or off-target effects etc.? 
- And how does generative AI and generative biology come into play? What is actually happening in laboratories and corporate R&amp;D around the world, including in the USA and China? I will report on AI platforms that generate designs for novel viruses and proteins to experiments ranging from medical drug development and attempts to bring extinct species back to life. I will also present current scenarios in the field of bioweapons. 
- How big tech is moving to get into bioeconomy &#8211; Titans such as Google, Microsoft, Nvidia, Alibaba, Meta, Amazon and Salesforce, with no specific experience in life sciences, are now the leaders in a new &#8216;generative biology&#8217; run.
- I will then continue with our own research on risk and technology assessment of genetically modified organisms and synthetic biology. This includes experiments and method development on biosafety, but also poses more fundamental questions such as investigating if the AI/biodigital design of nature is in line with nature conservation concepts or asking if democratization of biotech research (garage biology) relates to &#8220;dual use&#8221; risks. We also work on instruments to better understand impacts on society and improved social participation. 
- Finally, I would like to report on the very controversy negotiations on this topic at the UN Convention on Biological Diversity in Colombia in November &#8211; among parties, with perspectives from developing countries, indigenous peoples and local communities, scientist and others and discuss ways forward for fair, multidisciplinary assessment and oversight that is urgently needed.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GNZG8R/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GNZG8R/feedback/</feedback_url>
            </event>
            <event guid='a8c2dca8-a040-5a76-b3ed-7d88f882b481' id='413'>
                <room>Saal ZIGZAG</room>
                <title>Brauchbare Illegalit&#228;t &#8211; Organisationen f&#252;r menschenfeindliche Diskurse wappnen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T16:40:00+01:00</date>
                <start>16:40</start>
                <duration>00:40</duration>
                <abstract>Organisationen und die in ihnen stattfindenden Gespr&#228;che und Debatten haben einen gro&#223;en Einfluss auf ihre Mitglieder und ihr Umfeld. Es ist daher bedeutsam und beunruhigend, wenn in diesen Diskursen Grunds&#228;tze unseres gesellschaftlichen Zusammenlebens in Frage gestellt werden. Was tun? 

Luhmanns Begriff der &quot; Brauchbaren Illegalit&#228;t &quot; beschreibt elegant und kraftvoll funktionale Regelabweichungen in Organisationen. In diesem Talk werden ausgehend von diesem Begriff Gestaltungsm&#246;glichkeiten f&#252;r Strukturen, Praktiken und Hacks vorgestellt. Diese Anregungen zeigen, wie die ausgesprochenen und unausgesprochenen Regeln einer Organisation so ver&#228;ndert werden k&#246;nnen, dass sie eine demokratische und fortschrittliche Gesellschaft st&#228;rken.</abstract>
                <slug>38c3-413-brauchbare-illegalitt-organisationen-fr-menschenfeindliche-diskurse-wappnen</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='227'>Johannes Fertmann</person>
                </persons>
                <language>de</language>
                <description>Einen gro&#223;en Teil unseres Lebens verbringen wir in oder mit Organisationen. Vom Sportverein, der Schule, &#252;ber diverse Arbeitgeber bis hin zur Waldfriedhof GmbH, die sich auch nach unserem Leben um uns k&#252;mmert. Organisationen sind m&#228;chtige soziale Systeme. Sie sind komplex und widerspr&#252;chlich, teilweise qu&#228;lend langsam oder erschreckend effizient. Aber ohne gro&#223;e und kleine funktionierende Organisationen w&#228;re unsere moderne Gesellschaft nicht denkbar. Das wissen auch die Gegner einer pluralistischen Demokratie. Ihnen ist es bereits gelungen, in den letzten Jahren mit ihren Themen den &#246;ffentlichen Diskurs zu pr&#228;gen, nun r&#252;cken Organisationen und damit ihre Mitglieder in den Fokus. In Organisationen gelten jedoch andere Einflussfaktoren als im &#246;ffentlichen Diskurs. Der Diskurs von Organisationen wird durch die Strukturen der Organisation und deren Bedeutung f&#252;r das Verhalten ihrer Mitglieder gepr&#228;gt, der Diskurs entsteht in der Kaffeek&#252;che und am Flie&#223;band, bei Pr&#228;sentationen und bei Standup-Meetings und ist sogar eingewebt, in die Art und Weise, wie Alltagspraktiken bei der Arbeit ablaufen. 

In diesem Talk werden M&#246;glichkeiten beschrieben, wie mit organisationswissenschaftlichen und  kommunikationspsychologischen Erkenntnissen aus Forschung und Praxis Organisationen robuster f&#252;r die Zukunft gemacht werden k&#246;nnen. Es geht um die Frage, wie konkrete Praktiken einer Organisation gestaltet werden k&#246;nnen, dass ein fortschrittliches Miteinander in und um eine Organisation gest&#228;rkt wird.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8CZXCG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/8CZXCG/feedback/</feedback_url>
            </event>
            <event guid='abaae1da-cf60-583d-974d-a6af8df1531a' id='463'>
                <room>Saal ZIGZAG</room>
                <title>TETRA Algorithm set B - Can glue mend the burst?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T17:35:00+01:00</date>
                <start>17:35</start>
                <duration>00:40</duration>
                <abstract>In August 2023, we published the TETRA:BURST vulnerabilities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure. Authentication and encryption within TETRA were handled by proprietary cryptographic cipher-suites, which had remained secret for over two decades through restrictive NDAs until our reverse-engineering and publication.


This talk is not TETRA:BURST, but dives into the latest TETRA revision introduced in 2022. Most notably, it contains a new suite of cryptographic ciphers. Of course the cipher available for critical infrastructure and civilian use (TEA7) is intentionally crippled, and of course these ciphers were to be kept secret, but this decision was overruled due to public backlash following our publication last year. In this talk we will present a practical attack on the TEA7 cipher, which while taking a 192-bit key, only offers 56 bits of security. Furthermore, we point out improvements and shortcomings of the new standard, and present an update on TEA3 cryptanalysis, where we previously found a suspicious feature, and draw a parallel with its successor TEA6.

All in all, in this short and relatively crypto-forward talk, we assess with all-new material whether the new TETRA standard is fit for its intended purpose. This crucial technology seeks to once again take a very central role in our society for decades to come, and its cryptographic resilience is of fundamental importance - for emergency networks, but possibly even more for our critical infrastructure and associated processes.</abstract>
                <slug>38c3-463-tetra-algorithm-set-b-can-glue-mend-the-burst-</slug>
                <track>Security</track>
                
                <persons>
                    <person id='498'>Wouter Bokslag</person><person id='788'>Jos Wetzels</person>
                </persons>
                <language>en</language>
                <description>The new authentication suite (TAA2, as opposed to the old TAA1) features longer keys and completely new cryptographic primitives. The new Air Interface Encryption algorithms (TEA set B) consist of three new ciphers, for differing target audiences. TEA5 is intended for European emergency networks, and is the successor of TEA2. TEA6 is intended for friendly extra-european emergency and military networks, and replaces TEA3. Lastly, TEA7 is the only one available for use by critical infrastructure and other civil applications, and replaces TEA1.

Initially, ETSI envisaged to keep the new algorithms secret again, once more eliminating the possibility of public scrutiny. However, following our publication, a promise was made to release the algorithms to the public for inspection.
Additionally, a statement was made that TEA7 has a reduced effective strength of 56 bits. As mentioned, this algorithm is the successor to TEA1, which has an effective strength of only 32 bits, in a time where 40 bits was the maximum for freely exportable crypto.

In TETRA:BURST, we presented several vulnerabilities found in the old standard. Obviously, the backdoored TEA1 algorithm is now replaced by a new cipher, and we will dive into how this works, how it can be attacked, and what the practical implications will be. Second, we previously presented a method of decrypting and injecting traffic on all network types, even those using the stronger TEA2 and TEA3 algorithms. This relies on the lack of cryptographic integrity guarantees on message - something that is still unaddressed. We discuss how this leads to issues. Lastly, TETRA:BURST described a way of decrypting the pseudonymized identities of TETRA users (first demonstrated at the 37C3), allowing for a powerful intelligence capability. We will discuss how the new standard seeks to resolve this issue.

Lastly, we previously recommended caution regarding TEA3, due to a suspicious feature in its design. While no full attack will be presented, progress in its cryptanalysis was made, which we will discuss during the talk. And, there is an interesting parallel to be drawn between the suspicious quirk in TEA3 and the design of its successor, TEA6.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9G97SZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9G97SZ/feedback/</feedback_url>
            </event>
            <event guid='460805ee-d525-548a-b088-c00021a884b9' id='94'>
                <room>Saal ZIGZAG</room>
                <title>May the forest be with you &#8211; B&#228;ume pflanzen gegen die Klimakrise?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>Der Harz wurde von Borkenk&#228;fern gefressen, nur jeder vierte Baum in Deutschland gilt als gesund und in Russland sowie Nordamerika brennen die W&#228;lder in einem enormen Ausma&#223;. Gleichzeitig gelten W&#228;lder als eine der L&#246;sungen in der Klimakrise, als CO2-Speicher und Produzent von nachhaltigen, nachwachsenden Rohstoffen. Sind W&#228;lder in Gefahr auf Grund von D&#252;rre, Borkenk&#228;fer und Feuer? Und k&#246;nnen wir mit Wiederaufforstungen der Klimakrise was entgegensetzten? Kirsten Kr&#252;ger forscht an der Technischen Universit&#228;t M&#252;nchen zu St&#246;rungsdynamiken in W&#228;ldern und erkl&#228;rt in ihrem Vortrag, was W&#228;lder eigentlich alles f&#252;r uns leisten, warum St&#246;rungen ein nat&#252;rlicher Bestandteil von W&#228;ldern sind und B&#228;ume pflanzen allein keine akkurate Antwort auf die Klimakrise ist.</abstract>
                <slug>38c3-94-may-the-forest-be-with-you-bume-pflanzen-gegen-die-klimakrise-</slug>
                <track>Science</track>
                
                <persons>
                    <person id='87'>Kirsten Kr&#252;ger</person>
                </persons>
                <language>de</language>
                <description>St&#246;rungen im Wald durch D&#252;rre, Borkenk&#228;fer und Feuer pr&#228;gen zunehmen das Landschaftsbild und erhalten mehr Aufmerksamkeit von Medien und Politik. Die Sorge reicht von dem Szenario, dass wir alle W&#228;lder verlieren werden hin zu dem Verlust von einem wertvollen CO2-Speicher und Produzenten von Holz. Global neue B&#228;ume zu pflanzen scheint eine intuitive Antwort drauf zu sein, l&#246;st aber nicht die Herausforderung der Klimakrise vor der wir gerade stehen. In meinem Vortrag m&#246;chte ich aufkl&#228;ren, warum St&#246;rungen im Wald per se kein Problem, sondern ein Teil der Waldentwicklung sind und wie sich diese auf die CO2-Speicherf&#228;higkeit und andere F&#228;higkeiten von W&#228;ldern auswirken. W&#228;lder sind keine statischen Konstrukte in der Landschaft, sondern ein dynamisches System, welches uns viele Dienstleistungen bereitstellt. Es gibt genug Gr&#252;nde B&#228;ume zu pflanzen, aber warum, wo und wie sind entscheidende Fragen, die ich beleuchten m&#246;chte. Au&#223;erdem berichte ich aus der aktuellen Forschung um den Zustand der W&#228;lder, wie vor allem wir Menschen den Wald beeinflussen und m&#246;glichen Ans&#228;tzen, wie wir W&#228;lder widerstandsf&#228;higer machen k&#246;nnen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CEJZ9E/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/CEJZ9E/feedback/</feedback_url>
            </event>
            <event guid='da7e05ad-c5ef-57e1-99cf-f52f1403b1dd' id='448'>
                <room>Saal ZIGZAG</room>
                <title>Hacking Life: How to decode and manipulate biological cells with AI</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>AI methods are advancing biological research in diverse directions. In this talk, you will learn how we decode the fundamental building blocks of life with AI, and how it will help us to hack cells to cure diseases and beyond.</abstract>
                <slug>38c3-448-hacking-life-how-to-decode-and-manipulate-biological-cells-with-ai</slug>
                <track>Science</track>
                
                <persons>
                    <person id='485'>Moritz Schaefer</person>
                </persons>
                <language>en</language>
                <description>The cell is the fundamental building block of biological organisms, such as us humans. As such, technologies to understand and hack cells enable the cure of diseases and potentially even to expand our life span. In my talk, I provide an overview on how biologists and bioinformaticians use AI to understand and hack cells.

Understanding  the role of individual cells is a core aspect of biological research, given the extreme diversity of cellular states and functions. A common measurement method to characterize a given cell quantifies which of its genes are activated and how strongly. While this provides a rich high-dimensional readout, it is complex to interpret, given the challenge of deriving an intuition about the meaning of all the individual gene activation levels, as well as their combinatorial effects. 

In my research, I combine recent AI methods, most prominently multimodal large language models, to enable the analysis and interpretation of these measurements with the English language. I will present this work alongside a more general overview into the research landscape of &#8220;AI cell models&#8221;. Furthermore, I will provide preliminary insights into how these interpretations form the basis to &#8220;hack&#8221; cells, which is accomplished through the introduction of complex &#8220;illegal instructions&#8221; in the form of molecular agents, which alter the behavior of the cell&apos;s internal programs. 

With this talk, I aim to provide the Chaos community with a focused insight into the biological cell and the ways in which recent developments in AI help us understand and manipulate them.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UBWU9D/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UBWU9D/feedback/</feedback_url>
            </event>
            <event guid='ba34abf3-ad01-5ea9-ad5f-fff96ecae64f' id='105'>
                <room>Saal ZIGZAG</room>
                <title>Die Elektronische Patientenakte (ePA)&#8211; a legal instruction trap?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>Kaum ein IT-Gesundheitsprojekt bleibt so hinter den Erwartungen und Versprechen zur&#252;ck wie die Elektronische Patientenakte (ePA). Sie wird in 2025 zur Pflicht. 
Jede gesetzlich versicherte Person die nicht widerspricht, bekommt eine mit Abrechnungsdaten bef&#252;llte ePA kostenlos. Da nichts kostenlos ist, bist Du auch in diesem Fall nicht Kunde sondern Ware und bezahlst bestenfalls nur mit Deinen Daten &#8230;</abstract>
                <slug>38c3-105-die-elektronische-patientenakte-epa-a-legal-instruction-trap-</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/TKWN7X/38c3_cfp_20241014-1_9ZCTDex.png</logo>
                <persons>
                    <person id='101'>cbro</person>
                </persons>
                <language>de</language>
                <description>Ihr seid in die Kryptoparty-Reihe Digitalisierung und IT-Sicherheit im Gesundheitswesen (aka TI-rant) geraten. 
Medizin- und Nerd-Bubble konfluieren f&#252;r eine kurze Zeit, Wissenstransfer passiert. 
Mindestens 3,14 Herzen schlagen in unserer Brust, wenn wir auf die Digitalisierung des Gesundheitswesens blicken: Nerd, Patient, Anwender, Investor usw. Wir werden versuchen, die verschiedenen Perspektiven etwas auszuleuchten, vielleicht sogar ein wenig mehr in Einklang zu bringen. 
Wir setzen uns interaktiv mit aktuellen digitalen Ph&#228;nomenen im Gesundheitswesen auseinander &#8211; hier mit Fokus auf die elektronische Patientenakte (ePA).</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TKWN7X/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/TKWN7X/feedback/</feedback_url>
            </event>
            <event guid='fe30704a-9169-55c9-863a-ab9768168321' id='442'>
                <room>Saal ZIGZAG</room>
                <title>Hacker&apos;s Guide to Meshtastic: Off-Grid, Encrypted LoRa Meshnets for Cheap!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T22:05:00+01:00</date>
                <start>22:05</start>
                <duration>00:40</duration>
                <abstract>Beginners can now create off-grid, encrypted mesh networks for cheap, with applications in emergency communication, sensor monitoring, and more! These mesh networks have been popping up in cities all over the world, and this talk will go over everything a beginner needs to run or build their own nodes.</abstract>
                <slug>38c3-442-hacker-s-guide-to-meshtastic-off-grid-encrypted-lora-meshnets-for-cheap-</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='476'>Kody Kinzie</person>
                </persons>
                <language>en</language>
                <description>If you&apos;ve ever wanted to legally create off-grid, encrypted mesh networks that can span over a hundred miles, you can get started with Meshtastic for around $10.

This talk will serve as a beginner user&apos;s guide to Meshtastic, covering everything from hardware basics to advanced software configuration. We will explore making custom Meshtastic hardware, real-world results from deploying Meshtastic in Los Angeles, and attacks against mesh networks. 

Attendees will learn about LoRa, Meshtastic node and antenna options, software setup and configuration to extend its functionality, and real-world deployments of remote nodes.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ZJFPSS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/ZJFPSS/feedback/</feedback_url>
            </event>
            <event guid='989a4c82-1dc6-564b-ac4a-5a7062c74187' id='180'>
                <room>Saal ZIGZAG</room>
                <title>Attack Mining: How to use distributed sensors to identify and take down adversaries</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>Ever wondered why your web server seems to be under constant attack from what feels like everyone on the internet?
Me too!
Join me in this session where we&apos;ll explore the data of millions of attacks from hundreds of sensors around the world, to identify who is attacking us from where and why. Additionally, we will have a look into how we can use that data to get abusive systems taken down, and how successful this approach actually is.

Buckle up for a deep dive into the constant battle to protect systems on the internet against adversaries gaining access, and how you can help make the internet a safer place!</abstract>
                <slug>38c3-180-attack-mining-how-to-use-distributed-sensors-to-identify-and-take-down-adversaries</slug>
                <track>Security</track>
                
                <persons>
                    <person id='176'>Lars K&#246;nig</person>
                </persons>
                <language>en</language>
                <description>Looking at the 2024 M-Trends report, brute force is still one of the main reasons for adversaries to gain access and compromise companies. In fact, 6% of all initial access is done via brute force. Knowing this, as well as that attackers are constantly trying all sorts of attacks against any internet-connected device, there seems to be a gap between what is currently mostly done (block the attack) versus what should be done (report and take down the attacker)!

This talk will start with a short introduction on how to set up a system that is able to collect attacks from distributed sensors, enrich them at a central location, as well as use the data to reach out to ISPs and other governing bodies to report the abuse. The sensors are Docker containers with modified OpenSSH servers that will block any login attempt, no matter which username and password combination is used, as well as log the timestamp, source IP, username, and password to a central location. Using this, the so-called &quot;attack pot&quot; is indistinguishable from other Linux systems, ensuring that no suspicion on the attacker&apos;s side is raised.
For the enrichment part, the ISP&apos;s contact data is identified, and abuse notifications are sent via multiple channels to initiate a take down. Furthermore, automated bots monitor if the take down was successful and how long it took, allowing us to share some information on how successful this approach is, which ISPs are more cooperative, and where it is nearly impossible to get any system taken down. Generally, lessons learned with what could be potentially done better will be discussed!

The second part of the talk will focus on the analysis of the collected attacks. Across all of the attacks, multiple clusters, which likely are adversarial groups moving from one target to another, could be identified. Furthermore, by analyzing the used credentials, there seems to be some correlation between internet-identifiable information like DNS, region, or OS and the credentials used in an attack. This will allow defenders to get a better understanding of how to defend and even put out decoy information to quickly identify attacks.

The closure of the presentation will be an outlook on what could be done better from an ISP or governing body side to speed up take downs of adversarial infrastructure, as well as what everyone can do to make the internet a safer place!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9SSMGL/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9SSMGL/feedback/</feedback_url>
            </event>
            <event guid='16c09f00-0a16-5a11-92b7-7c065b7f1046' id='559'>
                <room>Saal ZIGZAG</room>
                <title>Hacking Victorian Bodies: From Grid to Vector Space</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>00:40</duration>
                <abstract>This performative lecture by SOLID FLESH Collective explores how generative AI can reshape historical body representations into tools for imagining new bodily futures. Drawing from Muybridge&#8217;s chronophotography, which fixed bodies into a rigid scientific grid, we investigate AI&#8217;s capacity for fluid, multidimensional embodiment. Using open-source AI models to &#8216;resurrect&#8217; Muybridge&#8217;s subjects and defy commercial censorship, we reveal speculative possibilities for bodily motion and identity. Our work positions the &#8216;vector body&#8217;&#8212;a digitally-mediated form of self-imagination&#8212;within a broader conversation on identity fluidity, algorithmic embodiment, and liberating futures beyond conventional body ideals.</abstract>
                <slug>38c3-559-hacking-victorian-bodies-from-grid-to-vector-space</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='588'>Marcin Ratajczyk</person>
                </persons>
                <language>en</language>
                <description>In this performative lecture, the SOLID FLESH Collective reimagines how artistic practice can transform historical methods of body representation into tools for imagining radical new forms of embodiment. SOLID FLESH Collective, a hybrid space bridging the realms of gym, gallery, and think tank, examines how Muybridge&#8217;s chronophotography once &#8216;solidified&#8217; bodies within a rigid grid, contrasting it with generative AI&#8217;s potential for unprecedented fluidity in self-reimagining.

We present a series of experiments in &#8216;resurrecting&#8217; Muybridge&#8217;s subjects, using open-source AI tools to transform scientific documentation into speculative fictions. When commercial AI flagged these Victorian images as &#8216;pornographic,&#8217; this rejection spurred us to explore alternate approaches, resulting in the creation of wonderfully surreal, inhuman movements with animDiff&#8212;as if the AI, uninformed by human motion, were an animator imagining it for the first time.

The lecture positions the AI-mediated body within a multidimensional vector space of possibilities, spanning dimensions of gender, age, class, and experience. Through our custom ComfyUI workflow and selected clips from our ongoing film project (solidflesh.com), we show how this &#8216;vector body&#8217; allows for forms of self-imagination that break free from the solidifying gaze of the camera. Our technical explorations engage larger questions around identity fluidity, algorithmic embodiment, and the possibility of a new, digitally mediated somatic imagination.

As mainstream AI development often reinforces conventional body ideals, we speculate on alternative futures, asking how these technologies might instead enable liberating bodily self-conceptions. Moving beyond Muybridge&#8217;s grid and current AI&#8217;s polished limitations, we explore what approaches to algorithmic embodiment might emerge when we embrace the glitches and &#8216;failures&#8217; of these systems.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/M733LV/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/M733LV/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal GLITCH' guid='7202df07-050c-552f-8318-992f94e40ef0'>
            <event guid='e1d6ab25-c347-52ca-9e65-7dc4c3b136c2' id='1095'>
                <room>Saal GLITCH</room>
                <title>Azubi-Tag Einf&#252;hrung</title>
                <subtitle></subtitle>
                <type>Ceremony</type>
                <date>2024-12-29T09:30:00+01:00</date>
                <start>09:30</start>
                <duration>01:15</duration>
                <abstract>Siehe &lt;https://events.ccc.de/congress/2024/infos/azubi-tag.html&gt;</abstract>
                <slug>38c3-1095-azubi-tag-einfhrung</slug>
                <track>CCC</track>
                
                <persons>
                    
                </persons>
                <language>de</language>
                <description>Jedes Jahr zwischen Weihnachten und Neujahr treffen sich tausende Hacker*innen zum Chaos Communication Congress in Hamburg. Der Azubi-Tag ist eine g&#252;nstige Gelegenheit f&#252;r Auszubildende, den Congress zu besuchen, den CCC kennenzulernen und viel &#252;ber IT-Security, Technik und Gesellschaft zu lernen. Wir freuen uns, diesen Tag nun zum zweitem Mal anbieten zu k&#246;nnen.

Weitere Informationen siehe &lt;https://events.ccc.de/congress/2024/infos/azubi-tag.html&gt;.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PSX7FY/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PSX7FY/feedback/</feedback_url>
            </event>
            <event guid='b019b506-b89a-5b2a-8150-956b7e9134df' id='411'>
                <room>Saal GLITCH</room>
                <title>Sacrificing Chickens Properly: Why Magical Thinking is Both the Problem and the Solution.</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>As an Anthropologist, magical thinking is a normal fact of life. Rather than dismissing it outright, our job is to look at its function and yes, rationality, for groups at hand.

Starting out with a story about actual chickens being sacrificed to ensure the harvest, this talk explores the prevalence of useful magical thinking in our own community. Using metaphors, or even personifications, doesn&#8216;t make a person irrational. It&#8216;s applying a principle implicitly onto a subject matter which works completely differently, that would be the problem. After all, unless you are a strict vegetarian, it&#8216;s not the killing of a chicken as such you&#8216;d object to, it&#8216;s the idea that this act makes rain. 

With LLMs, our public sphere has run into a problem where experts are at loss explaining a very complicated thing to a general public, which often lacks the basic terms with which to understand how this mechanism works. The instant personification of LLMs can lead to vast mismatches between their actual capabilities and what those stories imply. Rather than dismissing them outright, the question posed would be, what&#8216;s the alternative?

The talk is intended to be a light-hearted overview of some examples of both useful and dangerous constructions used to simplify complexity. It aims to touch upon some of the mechanisms that should be heeded in order to be able to tell a better story.</abstract>
                <slug>38c3-411-sacrificing-chickens-properly-why-magical-thinking-is-both-the-problem-and-the-solution-</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/PR8EGC/2EC2866A-9D0E-4A5B-AE13-08855609739A_mbSbHGc.jpeg</logo>
                <persons>
                    <person id='441'>Senana</person>
                </persons>
                <language>en</language>
                <description>Causality is hard. Hence the hackers jargon file contains certain references about voodoo, deep magic and yes, even the sacrifice of chickens for the greater good. In that case, that good would be &#8222;the stakeholder&#8216;s peace of mind&#8220;. 

Rather than looking at the content of the subject matter, this talk is strictly about language. It highlights the issues arising when experts aim to talk about non-experts about subject matters which are not easily put into words. More precisely, not easily understood by human-sized categories of the mind. 

The core point is highlighting what could be called the default library present in humans: Stories, with actors and actions leading to results. Anything that&#8216;s not easily fit into that category struggles to be understood. Underneath this, there&#8216;s a set of basic assumptions, comparable to the terms and capabilities of a programming language or it&#8216;s paradigm, which sets the stage for the human-sized stories to happen in. Those are very hard to even see, let alone change, for any individual. 

Rather than fighting assumptions, replacing a story with another story can be done far more easily. The challenge addressed in this talk is the tendency of public discourse to revolve around human-sized categories even when faced with system-sized problems. The talk invites to use the ethnographer&#8216;s eye in order to combat dread and anger in the current public discourse. Rather than asking &#8222;how can you be so stupid?&#8220;, asking &#8222;how can you be thinking in the terms you are&#8220; and look for logic. This skill can give you one pointed edge: Discerning active lies and acts of propaganda from honest mistakes brought about by mismatched metaphors. Which, in the end, makes the world look like a much more friendly place.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PR8EGC/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PR8EGC/feedback/</feedback_url>
            </event>
            <event guid='27b95819-6bba-5d9e-a9e6-41e811c1cf4e' id='246'>
                <room>Saal GLITCH</room>
                <title>Von Augustus bis Trump &#8211; Warum Desinformation ein Problem bleibt und was wir trotzdem dagegen tun k&#246;nnen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>Trotz intensiver Forschung hinken wir aktuellen Entwicklungen im Bereich Desinformation oft hinterher. In diesem Vortrag erkl&#228;ren wir, warum der Umgang mit Desinformation so herausfordernd ist und welche konkreten L&#246;sungsans&#228;tze es gibt.</abstract>
                <slug>38c3-246-von-augustus-bis-trump-warum-desinformation-ein-problem-bleibt-und-was-wir-trotzdem-dagegen-tun-knnen</slug>
                <track>Science</track>
                
                <persons>
                    <person id='128'>Hendrik Heuer</person><person id='691'>Josephine Schmitt</person>
                </persons>
                <language>de</language>
                <description>Obwohl wir inzwischen aus Perspektive der Forschung gesicherte Erkenntnisse &#252;ber Verbreitung und Wirkung von Desinformationen haben und wirksame Pr&#228;ventions- wie auch Interventionsma&#223;nahmen auf vielen Ebenen diskutiert werden, laufen wir den tats&#228;chlichen Entwicklungen und gesellschaftlichen Konsequenzen von Desinformation nur hinterher. Ein effektiver Umgang mit den unterschiedlichen Spielarten von Desinformation gelingt oft nicht.

Mit Blick auf die aktuelle Forschung bieten wir einen &#220;berblick &#252;ber L&#246;sungen gegen Desinformation. Dieser Talk soll die Begrifflichkeit f&#252;r die &#246;ffentliche Debatte sch&#228;rfen und die Frage adressieren: Was kann und soll als Desinformation verstanden werden? Dar&#252;ber hinaus wollen wir diskutieren, warum der Umgang mit Desinformation so schwierig ist und welche individuellen, gesellschaftlichen und politischen Herausforderungen ihn so schwierig machen. Abschlie&#223;end beantworten wir die Fragen: Was ist zu tun?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GAWZXM/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GAWZXM/feedback/</feedback_url>
            </event>
            <event guid='091786b6-a7ab-5f39-af44-4cb6751e4df2' id='381'>
                <room>Saal GLITCH</room>
                <title>Der traurigste Vortrag &#252;ber digitale Barrierefreiheit des Jahrhunderts</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Ein riesiger Teil der digitalen Leistungen der Bundesrepublik sind nicht inklusiv und f&#252;r alle zug&#228;nglich. Eklatante Rechtsbr&#252;che werden ignoriert und es gibt absolut nichts, was wir tun k&#246;nnen, au&#223;er dar&#252;ber zu reden.</abstract>
                <slug>38c3-381-der-traurigste-vortrag-ber-digitale-barrierefreiheit-des-jahrhunderts</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='405'>Casey Kreer</person>
                </persons>
                <language>de</language>
                <description>Die digitale Barrierefreiheit ist kaputt. In den letzten Monaten habe ich viele digitale Angebote des Staates auf deren Barrierefreiheit &#252;berpr&#252;ft und die kritischsten Barrieren an die verantwortlichen Stellen gemeldet. 

Beispielsweise war es in der Hochwasser-Krise nach Weihnachten 2023 f&#252;r blinde Personen in mindestens drei relevanten Bundesl&#228;ndern nicht m&#246;glich, den aktuellen Pegelstand an ihrem Wohnort abzurufen. Im Katastrophenschutz sieht es nicht besser aus: Alle vier &#246;ffentlich finanzierten Warn-Apps sind f&#252;r viele Menschen mit Behinderung nicht nutzbar. Und auch das neue, f&#252;r alle verpflichtende E-Rezept wurde voller Barrieren ausgerollt. 

Diese eklatanten M&#228;ngel sind leider Dauerzustand. Selbst wenn Barrieren schon intern bekannt sind, dauert es oft Jahre, bis diese behoben werden. An allen Ecken fehlt wichtige Expertise und der weltweite Beratungsmarkt wird beherrscht von Schlangen&#246;l. 

Bei einer Meldung einer neuen Barriere werfen die Beh&#246;rden gerne mit Phrasen um sich und beteuern ihren Einsatz f&#252;r Inklusion. Tats&#228;chlich zeigen meine Erfahrungen ein erschreckendes Muster , das auf systematische Diskriminierung hindeutet. Aber wie k&#246;nnen wir dann wirklich und nachhaltig Dinge verbessern? K&#246;nnen wir das &#252;berhaupt?

Wir schauen uns den traurigen Zustand der digitalen Barrierefreiheit in Deutschland an, benennen Verantwortliche f&#252;r die Misere und lernen, was wir eigentlich wirklich br&#228;uchten. Von echten Menschen mit Behinderung, mit echter Expertise.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VY3FKQ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VY3FKQ/feedback/</feedback_url>
            </event>
            <event guid='63ade5c5-70ba-5473-8f36-4e1812caf469' id='624'>
                <room>Saal GLITCH</room>
                <title>Euclid, das Weltraumteleskop - 180 Millionen Galaxien sind ein guter Anfang</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>&#8222;Euclid&quot; ist seit 2023 das neue Weltraumteleskop der Europ&#228;ischen Weltraumbeh&#246;rde mit Beteiligungen eines Wissenschaftskonsortiums aus vierzehn europ&#228;ischen L&#228;ndern, den USA, Kanada und Japan. Gestartet vor knapp eineinhalb Jahren, l&#228;uft jetzt seit gut 9 Monaten die wissenschaftliche Himmeldurchmusterung. Auf dem 37C3 konnte ich die ersten f&#252;nf &quot;Early Release Observation&quot; Bilder vorstellen, seitdem ist viel passiert. Vor allem l&#228;uft nach ein paar Anlaufschwierigkeiten die Mission richtig gut und viele hundert Quadratgrad des Himmels sind bereits fertig kartiert - die Datenbearbeitung und Auswertung l&#228;uft. Ich werde weitere Bilder und einen kleinen Blick hinter die Kulissen zeigen.</abstract>
                <slug>38c3-624-euclid-das-weltraumteleskop-180-millionen-galaxien-sind-ein-guter-anfang</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/GYAZK8/ero2_collage_NbtYf4B.jpg</logo>
                <persons>
                    <person id='631'>Knud Jahnke</person>
                </persons>
                <language>de</language>
                <description>Euclid ist ein astronomisches Weltraumobservatorium, aber zugleich als Gesamtkonzept ein wissenschaftliches Experiment zur besseren Erforschung von &quot;Dunkler Energie&quot; und &quot;Dunkler Materie&quot;. Beim 37C3 hatte ich die Hintergr&#252;nde dazu erkl&#228;rt und wie Euclid mit der Vermessung der Formen und Entfernungen von 1-2 Milliarden Galaxien die Entwicklungsgeschichte des Universums nachvollziehen wird.

Nach eineinhalb Jahren Erfahrungen mit dem Teleskop und neun Monaten Himmeldurchmusterung haben wir einiges an Erfahrung mit dem Teleskop gesammelt, den ersten Data-Release vorbereitet und jede Menge sch&#246;ner Bilder gesehen und bestaunt. Wir haben uns aber auch durch Herausforderungen mit dem Teleskop gearbeitet, zum Beispiel durch Eisbel&#228;ge auf den Spiegeln oder eine aktuell sehr aktive Sonne. Aber das ist unter Kontrolle.

Ich werde einige neue und eindrucksvolle Bilder von Euclid zeigen und den Stand der Dinge skizzieren. Ich werde auch ein bisschen einen Blick hinter die Kulissen geben, wie mit solchen Herausforderungen umgegangen wird und wie die Datenverarbeitung voranschreitet.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GYAZK8/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/GYAZK8/feedback/</feedback_url>
            </event>
            <event guid='7bd7dba1-b9a8-5fe8-94f7-9fc9d1704877' id='586'>
                <room>Saal GLITCH</room>
                <title>The Design Decisions behind the first Open-Everything FABulous FPGA</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>With the availability of robust silicon-proven open-source tools, IPs, and process design kits (PDKs), it is now possible to build complex chips without industry tools. This is exactly what we did to design our first open-everything FABulous FPGA, which is an example of open silicon that is designed and programmed entirely with open tools.

Produced in the Skywater 130nm process node, our chip features 672 LUTs (each with 4 inputs and a flop), 6 DSP blocks (8x8 bit multipliers with 20-bit accumulators), 8 BRAMs (with 1KB each), and 12 register file primitives (each having 32 4-bit words with 1 write and 2 read ports). The resources are sufficient to run, for instance, a small RISC-V system on the fabric. The FPGA comes with a small board that is designed to fit into an audio cassette case and that can be programmed directly via an USB interface. Moreover, the FPGA supports partial reconfiguration, which allows us to swap the logic of parts of the FPGA while continuing operation in the rest of the chip.

The chip was designed with the help of the versatile FABulous framework, which integrates several further open-source projects, including Yosys, nextpnr, the Verilator, OpenRAM, and the OpenLane tool suite. FABulous was used for various embedded FPGAs, including multiple designs manufactured in the TSMC 28nm process node.

The talk will discuss and analyze differences and similarities with industry FPGAs and dive into design decision taken and optimizations applied to deliver good quality of results (with respect to area cost and performance). The talk will highlight state-of-the-art in open-source FPGA chip design and provide a deeper than usual discussion on the design principles of these devices.</abstract>
                <slug>38c3-586-the-design-decisions-behind-the-first-open-everything-fabulous-fpga</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/UDBPYF/FABulous_OpenBoard_OTQMZzI.jpg</logo>
                <persons>
                    <person id='609'>Dirk</person>
                </persons>
                <language>en</language>
                <description>The talk will target both FPGA novices and experts and discuss the technology from two angles: 1) the capabilities of open tools to build an entire FPGA ecosystem and 2) FPGA technology insights.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UDBPYF/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UDBPYF/feedback/</feedback_url>
            </event>
            <event guid='f1e929eb-5b85-563a-9c40-a489dd7913aa' id='658'>
                <room>Saal GLITCH</room>
                <title>Beyond BLE: Cracking Open the Black-Box of RF Microcontrollers</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>00:40</duration>
                <abstract>Despite the recent popularity and breadth of offerings of low-cost RF microcontrollers, there is a shared absence of documentation for the internal workings of their RF hardware. Vendors might provide an API for their supported protocols, such as BLE, but their documentation will only provide as much detail as necessary to use these libraries. For practically every BLE MCU available to hobbyists, interfacing with the on-chip radio is limited to secret ROMs or binary blobs. In this talk, we will finally peel back the curtain on one of these RF MCUs, giving the ability to understand and unlock the full potential of the hardware to operate in new modes.</abstract>
                <slug>38c3-658-beyond-ble-cracking-open-the-black-box-of-rf-microcontrollers</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='622'>Adam Batori</person><person id='669'>Robert Pafford</person>
                </persons>
                <language>en</language>
                <description>The TI SimpleLink family of BLE and Sub-GHz RF MCUs present a general-purpose Cortex-M4F platform with extensive documentation for developing custom embedded/IoT devices. With a reference manual filled with countless diagrams and register maps for all its peripherals, the Radio section is surprisingly sparse, only mentioning a high-level API for exchanging commands between an RF coprocessor core. This secondary undocumented CPU is what handles the actual RF communication, running from an inaccessible ROM. There&#8217;s no mention of what peripherals lay beyond the coprocessor aside from generic &#8220;DSP Modem&#8221; and &#8220;RF Engine&#8221; modules.

This talk serves to be the unofficial &#8220;Radio Reference Manual&#8221; of the SimpleLink MCUs, opening the black box of the RF subsystem and painting the full picture on how the radio operates - from the stack to the antenna. As part of this effort to fully understand these chips, we reverse engineered TI&#8217;s proprietary RF patch format, which enables SDK updates to introduce support for newer protocols on existing chips. We show how these patches allow you to modify the behavior of almost every part of the RF subsystem, control the RF subsystem in ways not intended, or even replace the ROM firmware entirely. Additionally, we investigate the hidden DSP Modem cores, and decode their proprietary ISA to disassemble and craft new firmware patches for them as well, potentially opening up the door for a cheap single-chip SDR.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YC8L8L/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YC8L8L/feedback/</feedback_url>
            </event>
            <event guid='47c0094c-fd30-52b5-8eb9-398d0418c7cc' id='642'>
                <room>Saal GLITCH</room>
                <title>Biological evolution: writing, rewriting and breaking the program of life</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T16:40:00+01:00</date>
                <start>16:40</start>
                <duration>00:40</duration>
                <abstract>Biological evolution is a great inventor. Over 4 billion years, it has generated an astonishing diversity of lifeforms, from the tiniest bacteria to the tallest trees.
Each new organism inherits a genetic program from its parents - a set of instructions to &#8220;build&#8221; the organism itself. Random mutations in this program can alter the organism&#8217;s traits, affecting its ability to survive in its environment. 
But how do these small changes combine over thousands of generations to yield the vast complexity we see in present-day lifeforms?

In this talk, we discuss examples from our research, using computer simulations to model the early evolution of animals, from single-celled microbes to complex multicellular organisms. 
We show that evolution behaves a bit like a hacker, repurposing the programs it previously built in unexpected ways to create new functions and structures. 

Understanding how evolution continually innovates is one of biology&#8217;s grand challenges. We also hope that uncovering these processes in biological systems will provide new perspectives on current debates about the generative and creative capabilities of AI.</abstract>
                <slug>38c3-642-biological-evolution-writing-rewriting-and-breaking-the-program-of-life</slug>
                <track>Science</track>
                
                <persons>
                    <person id='649'>Enrico Sandro Colizzi</person><person id='650'>Renske Vroomans</person>
                </persons>
                <language>en</language>
                <description>The history of life abounds with examples of how biological evolution repurposes old tools for new functions.
Feathers, indispensable for bird flight, first appeared in dinosaurs, where they served an entirely different purpose: to stay warm in the Jurassic winter. 
Analogously, the proteins that focus light in the lens of our eyes originally functioned as metabolic enzymes. 
One of evolution&#8217;s most transformative repurposing events is the emergence of multicellularity &#8212; a transition that laid the groundwork for complex life as we know it.

Before multicellularity evolved, single cells lived autonomously, each with their own genetic program to find food and survive harsh environments. Evolution repurposed these cellular programs, to organise self-sufficient cells into cooperative multicellular groups, with surprising new capabilities and collective survival strategies. For example, cells in the group can divide tasks among each other and share resources, paving the way for the extreme specialisation we find in the organs of modern animals. 

Our computational models simulate this evolutionary transition to explore how the rewriting of cellular programs sets the stage for further biological innovations. 
One striking insight from our computational approach is that it requires little input data to generate novel solutions to evolutionary problems, revealing an inherent efficiency in biological systems that stands in contrast to modern generative AI.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7YDWFB/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/7YDWFB/feedback/</feedback_url>
            </event>
            <event guid='5abd5a97-4255-5cf7-9635-4bcd5b13ff74' id='641'>
                <room>Saal GLITCH</room>
                <title>High energy physics aside the Large Hadron Collider</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T17:35:00+01:00</date>
                <start>17:35</start>
                <duration>00:40</duration>
                <abstract>What are we, and where do we come from? - Searching for flavour in beauty

Nowadays the Large Hadron Collider (LHC) at CERN is the best known high energy physics research facility. However, there are other facilities around the world performing cutting edge high energy physics research. Some of these are the so called flavour factories which have a long tradition in high energy physics. Two of these are currently in operation: BES III in China and Belle II in Japan. Collecting huge amounts of data, the goal of these experiments is to measure free parameters of the standard model of particle physics with very high precision to find deviations from predictions by theory. Such deviations can hint to new physics, and physicists are still searching for the reasons of our very existence as by our best knowledge nothing but light should have remained after the big bang. But testing the standard model is challenging. Huge data sets in the order of tera bytes need to be analysed requiring advanced analysis software and techniques. By now these analyses usually employ machine learning and artificial intelligence in various kinds, while using custom hardware and software, and a world spanning computing infrastructure. All of this is only possible with more than 1000 people working together in a collaboration. Part of the work in high energy physics nowadays would not be possible anymore without the groundbreaking research by this year&apos;s Nobel laureates for physics.
In this talk I will present what flavour physics is, the reasons why flavour physics is interesting and why it matters, and which challenges we are facing, using the Belle II experiment as an example. Most of the challenges are not unique to Belle II but to high energy physics in general, so I will also set this into the bigger context and take a look to what is ahead of us in the field of high energy physics.</abstract>
                <slug>38c3-641-high-energy-physics-aside-the-large-hadron-collider</slug>
                <track>Science</track>
                
                <persons>
                    <person id='648'>Christian Wessel</person>
                </persons>
                <language>en</language>
                <description>Developed in the 1950s to 1960s, the standard model of particle physics has been a huge success. However, there are parts it cannot describe:
* During the big bang the same amount of matter and anti-matter should have been produced, and they should have annihilated only leaving light. But here we are, so there must have been some sort of imbalance or asymmetry. With our current understanding of particle physics and the big bang we cannot explain the amount of asymmetry necessary to explain our existence. So why are we here?
* We found that neutrinos do have mass, while the SM predicts them to be massless. So why do neutrinos have mass and where does it come from?
* The orbital velocities of stars in distant galaxies show deviations from expectations if only visible matter is taken into account. These deviations in the galaxy rotational curves hints to additional matter which nowadays we call &quot;dark matter&quot;. But what is its origin
* The universe seems to expand with an increasing rate, but what is the driver behind this rate? We now describe this as &quot;dark energy&quot; but do not really know what it is made of.
* ...

Cosmology, astrophysics, and high energy physics are working on solving these mysteries. While the first two require observations of space and simulations on earth, the last one can be fully conducted on earth. In high energy physics we currently are following to paths of finding physics beyond our current understanding called the &quot;standard model&quot; of particle physics: direct and indirect discoveries. This can be achieved by testing ever higher energies, or by probing known processes with improved precision. The discovery of the Higgs Boson in 2012 was of the first category, a direct discovery at high energies.

Flavour factories work differently. They operate at much lower energies (about 1000 times lower than the Large Hadron collider), but are collecting huge amounts of data to precisely test the standard model to find hints for unknown physics effects. One of the current flavour physics experiments is Belle II in Japan. There physicists try to find hints explaining the asymmetry between matter and anti-matter seen at the big bang, and are searching for dark matter candidates, as well as other indications of deviations from the standard model. By precisely measuring the standard model processes it is possible check for particles 10,000 times heavier than the energies used in Belle II, and 10 times heavier of what the LHC can achieve in direct searches.

This talk focuses on the challenges that modern high energy physics experiments, as well as other experiments are facing, and how to tackle them, as well as the public relevance of the research fields.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/H8QNQX/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/H8QNQX/feedback/</feedback_url>
            </event>
            <event guid='f71f01a7-aef9-5793-95f8-4c40a5687855' id='525'>
                <room>Saal GLITCH</room>
                <title>Drawing with circuits &#8211; creating functional and artistic PCBs together</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T19:15:00+01:00</date>
                <start>19:15</start>
                <duration>00:40</duration>
                <abstract>We are a professional electronics designer and a professional artist.  We&apos;d like to share our experience of integrating an artist into the design workflow for EMF&apos;s 2022 and 2024 event badges, how we ensured that form and function grew together, and how you might make a board so fancy it crashes your PCB vendor&#8217;s CAM software.</abstract>
                <slug>38c3-525-drawing-with-circuits-creating-functional-and-artistic-pcbs-together</slug>
                <track>Art &amp; Beauty</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/XUE8CS/tildagonfull_PLCE3rL.png</logo>
                <persons>
                    <person id='554'>Kliment</person><person id='750'>Morag Hickman</person>
                </persons>
                <language>en</language>
                <description>Circuit boards are increasingly being made to be seen.  Whether they&apos;re personal or commercial, many projects show off their PCBs in an array of shapes, colours and sizes instead of hiding them in enclosures.
While making an electronic design work correctly and making it look amazing are not conflicting goals, they do require very different skillsets.

If you are not one of the rare people whose expertise spans both graphic and electronic design, it may feel very daunting to collaborate with someone who has a very different skillset.  You must figure out what you don&apos;t know about each other&apos;s fields, what the other needs to know, and find the right language to bridge that divide.  

We will share our experience of working together as circuit designer and artist, and will talk about:
- the possibilities and constraints of modern PCB technology as a medium for visual art
- turning a functional electronic design into an artistic playground
- our experience of communicating across fields of expertise, developing a common language and conveying essential ideas without getting in each other&apos;s way
- some fantastic free software for art and electronic design
- sample workflows for embellishing circuits
- what PCB design software and manufacturers expect and how to get away with doing &quot;weird&quot; things
- many examples of beautiful things we and others have made

We hope this will inspire and encourage you to make your own beautiful collaborative designs a reality.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XUE8CS/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XUE8CS/feedback/</feedback_url>
            </event>
            <event guid='1273e121-e12d-5995-b526-ce93547c5b11' id='311'>
                <room>Saal GLITCH</room>
                <title>Ultrawide archaeology on Android native libraries</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T20:15:00+01:00</date>
                <start>20:15</start>
                <duration>00:40</duration>
                <abstract>A bug in a scraper script led to us downloading every single native library in every single Android app ever published in any market (~8 million apps). 
Instead of deleting this massive dataset and starting again, we foolishly decided to run some binary similarity algos to check if libraries and outdated and still vulnerable to old CVEs. No one told us we were opening Pandora&apos;s box.
A tragic story of scraping, IP-banning circumvention, love/hate relationships with machine learning, binary similarity party tricks, and an infinite sea of vulnerabilities.</abstract>
                <slug>38c3-311-ultrawide-archaeology-on-android-native-libraries</slug>
                <track>Security</track>
                
                <persons>
                    <person id='321'>Luca Di Bartolomeo (cyanpencil)</person><person id='675'>Rokhaya Fall</person>
                </persons>
                <language>en</language>
                <description>A rumor has been going around: Android developers are slow to update native dependencies, leaving vulnerabilities unpatched.
In this talk we will show how *wrong* this rumor is: Android developers are not slow to patch - they never heard of the word patching.
We conduct a massive study over the every single app ever published on Android (more than 8 million!).
We explore trendy topics like Play Store scraping, Androzoo scraping, Maven repository scraping, the state of the Android ecosystem, binary similarity state-of-the-art methods vs binary similarity pre-historic methods, and the consequences of thinking you know how databases work when you actually don&apos;t.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/STEVPR/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/STEVPR/feedback/</feedback_url>
            </event>
            <event guid='43b507c0-3612-51ae-be02-f0634da93166' id='523'>
                <room>Saal GLITCH</room>
                <title>Klimasch&#228;dlich by Design&#160;&#8211; die &#246;kologischen Kosten des KI-Hypes</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T21:10:00+01:00</date>
                <start>21:10</start>
                <duration>00:40</duration>
                <abstract>Sogenannte Generative KI hat einen hohen Rechenbedarf und braucht damit automatisch viel Energie. Wir wollen zeigen, was die AI-Bubble uns alle bisher an Ressourcen gekostet hat. Wer verdient sich daran dumm und dusslig?&#160;Und wer tr&#228;gt die &#246;kologischen und sozialen Kosten?</abstract>
                <slug>38c3-523-klimaschdlich-by-design-die-kologischen-kosten-des-ki-hypes</slug>
                <track>Ethics, Society &amp; Politics</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/LVVRLL/bunterPapgei_7zNGwMm.png</logo>
                <persons>
                    <person id='387'>Friederike Karla Hildebrandt</person><person id='456'>Constanze Kurz</person>
                </persons>
                <language>de</language>
                <description>Sogenannte &#8222;Generative KI&#8220; ist nicht nur ein Hype-Thema in Politik und Gesellschaft, mit ihr schie&#223;en auch die ben&#246;tigten Rechenkapazit&#228;ten in die H&#246;he. Der Energiebedarf ist so hoch, dass Google, Microsoft und Meta 2024 nacheinander ihre Klima-Ziele zur&#252;cknahmen und nun auf dubiose Kernkraft-L&#246;sungen umsteigen wollen.

Das hat System, denn Big Tech entwickelt und finanziert nicht nur die gehypten KI-Anwendungen, die gleichen Konzerne bieten auch die ben&#246;tigten Cloud-Kapazit&#228;ten an. Von Chile, Spanien bis nach Taiwan &#8211; weltweit regen sich Proteste gegen die Infrastruktur hinter dem KI-Boom, von neuen Bergbauprojekten, Chipfabriken bis zu Hyperscale-Rechenzentren. Der steigende Energie-, Wasser- und Ressourcenverbrauch feuert die Klimakrise an, bedroht &#214;kosysteme und verletzt indigene Landrechte &#8211; f&#252;r erhoffte Milliardengewinne auf der Seite von Big Tech.

In diesem Vortrag schauen wir auf die &#246;kologischen und menschenrechtlichen Kosten des KI-Booms. Wir&#160;tragen die Fakten zusammen und liefern kritische Analysen und Argumentationshilfen zum KI-Hype.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LVVRLL/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/LVVRLL/feedback/</feedback_url>
            </event>
            <event guid='b85ccc8d-52ce-5532-ac8e-c970d458ecd0' id='456'>
                <room>Saal GLITCH</room>
                <title>Mushroom-DJs, Strong AI &amp; Climate Change: Connecting the Dots with Artistic Research</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T22:05:00+01:00</date>
                <start>22:05</start>
                <duration>00:40</duration>
                <abstract>The exploratory nature of artistic research can aide in the production of knowledge. Sometimes, this takes a detour through music-making mushrooms and making moonshine, sometimes it deals with societal reverberations of AI usage or how lithium extraction affects the planet. This talk gives an insight on how we do technology-assisted artistic research at ZKM | Hertzlab, the artistic research &amp; development department of the Center for Art and Media, Karlsruhe.</abstract>
                <slug>38c3-456-mushroom-djs-strong-ai-climate-change-connecting-the-dots-with-artistic-research</slug>
                <track>Art &amp; Beauty</track>
                
                <persons>
                    <person id='492'>twena</person>
                </persons>
                <language>en</language>
                <description>Artistic research takes the exploratory impulse of art and combines it with the wish for knowing the world that characterizes scientific research. It is neither science communication, nor purely artistic practice - it is located somewhere in between. As a field of its own, artistic research is still relatively young; at ZKM | Center for Art and Media, Karlsruhe, we explore what this means in the context of one of Europe&apos;s oldest media art institutions. Our six themes - lifecycles, connect, a common(s) world, ai-lab, post-human world, fellow futures - guide us in what we hope is a contribution to larger discourses from the point of view of art.

With examples and projects, this talk will illuminate artistic research practices, its benefits and challenges and how having a hacker mindset is the first step into becoming an artistic researcher.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JLJGB8/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/JLJGB8/feedback/</feedback_url>
            </event>
            <event guid='7a704cd7-ae73-5427-968b-88201d57f993' id='514'>
                <room>Saal GLITCH</room>
                <title>How election software can fail</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-29T23:00:00+01:00</date>
                <start>23:00</start>
                <duration>01:00</duration>
                <abstract>Experiences from a hacker working at the Election Council of The Netherlands.</abstract>
                <slug>38c3-514-how-election-software-can-fail</slug>
                <track>Security</track>
                
                <persons>
                    <person id='549'>Benjamin W. Broersma</person>
                </persons>
                <language>en</language>
                <description>After critically following the elections for 8 years from the outside, a hacker was employed as one of the functional administrators of the software supporting the elections. Sharing experiences of the use of election software during 7 elections (2020-2023), from local, national to European in The Netherlands.

A governmental software project with strict deadlines, and high security expectations. The software project for elections in The Netherlands is build an IT organization [owned by German local governments](https://www.regioit.de/unternehmen/zahlen-daten-fakten). More than 10.000 Java files, what can possible go wrong?

During this time multiple emergency patches were needed and incidents occur. Although at first explicitly *not* hired as a coder, within 3 months a Java code contribution was made that was unexpectedly more crucial than anticipated.

This talk will show some incidents with the election software in The Netherlands: how the software failed, and when/how it was discovered. Go over how seeing the elections from the outside, and give some history of voting computers and software. Ending with some reflecting on the future.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UR9CYP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/UR9CYP/feedback/</feedback_url>
            </event>
            <event guid='f47ee6a9-1045-52b3-b287-4eab1b2f4160' id='274'>
                <room>Saal GLITCH</room>
                <title>Mal was mit Holz</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T00:15:00+01:00</date>
                <start>00:15</start>
                <duration>00:40</duration>
                <abstract>Bildervortrag zum Thema &quot;Nachhaltige Inneneinrichtung&quot; mit Mitbringseln zum Anfassen sowie Tipps &amp; Tricks zu Konstruktion, Gestaltung und Durchf&#252;hrung</abstract>
                <slug>38c3-274-mal-was-mit-holz</slug>
                <track>Hardware &amp; Making</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/WDCRSE/Esszimmer_dTRMahJ.jpg</logo>
                <persons>
                    <person id='286'>Metal_Warrior</person>
                </persons>
                <language>de</language>
                <description>Holz ist als nachwachsender Rohstoff ein umweltfreundliches Baumaterial, hat als Naturprodukt jedoch seine Eigenheiten. Der Vortrag geht auf die Basics der Holzbearbeitung ein, worauf geachtet werden muss und wie stabile Verbindungen oft v&#246;llig ohne Leim oder Schrauben hergestellt werden k&#246;nnen. Die Bilder dazu verfolgen zwei Projekte von der Konstruktionszeichnung &#252;ber die rohen Bohlen bis zum fertigen Produkt und geben Einblicke in das Handwerk, das oft auch ohne Maschinen auskommen kann.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WDCRSE/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WDCRSE/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='4' date='2024-12-30' start='2024-12-30T04:00:00+01:00' end='2024-12-31T03:59:00+01:00'>
        <room name='Saal 1' guid='ba692ba3-421b-5371-8309-60acc34a3c05'>
            <event guid='5a7f47a6-3f4f-5496-8d05-f9b229aad0fc' id='281'>
                <room>Saal 1</room>
                <title>From Simulation to Tenant Takeover</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>All I wanted was for Microsoft to deliver my phishing simulation. This journey took me from discovering trivial vulnerabilities in Microsoft&apos;s Attack Simulation platform, to a Chinese company to which Microsoft outsourced its support department that wanted all my access tokens. I finally ended up hijacking remote PowerShell sessions and obtaining all data from random Microsoft 365 tenants, all the while reeling in bug bounties along the way.</abstract>
                <slug>38c3-281-from-simulation-to-tenant-takeover</slug>
                <track>Security</track>
                
                <persons>
                    <person id='303'>Vaisha Bernard</person>
                </persons>
                <language>en</language>
                <description>This talk is the result of what happens when you ask a hacker to simply automate sending out a phishing simulation.

My first attempt with Microsoft&apos;s new Attack Simulation platform resulted in three bug bounties for the most trivial vulnerabilities and no more faith in the product. 

Then I tried building a phishing simulation program myself and the last thing I needed was to allowlist my IP address in Exchange Online. 

I ended up in a rabbit hole where I discovered that Microsoft outsourced their support department to a Chinese company that wanted all my access tokens. 

I then tried intercepting client-side requests made by the Security &amp; Compliance center with the goal of replaying these to a backend API, only to discover that by fiddling with some parameters I could now hijack remote PowerShell sessions and access Microsoft 365 tenants that were not mine. Tenants where I could now export everything, e-mail, files, etc.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MCGKUA/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MCGKUA/feedback/</feedback_url>
            </event>
            <event guid='db6b17d6-88e3-5665-b1d8-1c8348c1431b' id='255'>
                <room>Saal 1</room>
                <title>Ten Years of Rowhammer: A Retrospect (and Path to the Future)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>The density of memory cells in modern DRAM is so high that disturbance errors, like the Rowhammer effect, have become quite frequent. An attacker can exploit Rowhammer to flip bits in inaccessible memory locations by reading the contents of nearby accessible memory rows. Since its discovery in 2014, we have seen a cat-and-mouse security game with a continuous stream of new attacks and new defenses. Now, in 2024, exactly 10 years after Rowhammer was discovered, it is time to look back and reflect on the progress we have made and give an outlook on the future. Additionally, we will present an open-source framework to check if your system is vulnerable to Rowhammer.</abstract>
                <slug>38c3-255-ten-years-of-rowhammer-a-retrospect-and-path-to-the-future-</slug>
                <track>Security</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/33YLTY/image_1_F3rwPBD.png</logo>
                <persons>
                    <person id='265'>Daniel Gruss</person><person id='268'>Martin Heckel</person><person id='776'>Florian Adamsky</person>
                </persons>
                <language>en</language>
                <description>In 2014, Kim et al. reported a new disturbance effect in modern DRAM that they called Rowhammer.
The Rowhammer effect flips bits in inaccessible memory locations just by reading the content of nearby memory locations that are attacker-accessible. 
They trigger the Rowhammer effect by accessing memory locations at a high frequency, using memory accesses and flushes.
The root problem behind Rowhammer is the continuous increase in cell density in modern DRAM.
In early 2015, Seaborn and Dullien were the first to demonstrate the security impact of this new disturbance effect.
In two different exploit variants, they demonstrated privilege escalation from the Google Chrome NaCl sandbox to native code execution and from unprivileged native code execution to kernel privileges.
Later, in 2015, Gruss et al. demonstrated that this effect can even be triggered from JavaScript, which they presented in their talk &quot;Rowhammer.js: Root privileges for web apps?&quot; at 32C3.

Now, in 2024, it is precisely 10 years after Rowhammer was discovered.
Thus, we believe it is time to look back and reflect on the progress we have made.
We have seen a seemingly endless cat-and-mouse security game with a constant stream of new attacks and new defenses.
We will discuss the milestone works throughout the last 10 years, including various mitigations (making certain instructions illegal, ECC, doubled-refresh rate, pTRR, TRR) and how they have been bypassed.
We show that new Rowhammer attacks pushed the boundaries further with each defense and challenge. While initial attacks required native code on Intel x86 with DDR3 memory, subsequent attacks have also been demonstrated on DDR4 and, more recently, DDR5. Attacks have also been demonstrated on mobile Arm processors and AMD x86 desktop processors. Furthermore, instead of native code, attacks from sandboxed JavaScript or even remote attacks via network have been demonstrated as well.
Furthermore, we will discuss how the Rowhammer effect can be used to leak memory directly, as well as related effects such as Rowpress. We will discuss these research results and show how they are connected.
We will then talk about the lessons learned and derive areas around the Rowhammer effect that have not received sufficient attention yet.
We will outline what the future of DRAM disturbance effects may look like, covering more recent effects and trends in computer systems and DRAM technology.

Finally, an important aspect of our talk is that we invite everyone to contribute to solving one of the biggest unanswered questions about Rowhammer:
What is the real-world prevalence of the Rowhammer effect? How many systems, in their current configurations, are vulnerable to Rowhammer?
As large-scale studies with hundreds to thousands of systems are not easy to perform, such a study has not yet been performed. Therefore, we developed a new framework to check if your system is vulnerable to Rowhammer, incorporating the state-of-the-art Rowhammer techniques and tools.
Thus, we invite everyone to participate in this unique opportunity at 38C3 to join forces and close this research gap together.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/33YLTY/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/33YLTY/feedback/</feedback_url>
            </event>
            <event guid='0c346b37-5f1e-5765-b4cd-0075cadc127e' id='436'>
                <room>Saal 1</room>
                <title>All Brains are Beautiful! &#8211; The Biology of Neurodiversity</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>How do you think?
People can experience thoughts, feelings, and sensory inputs very differently. While context and substances are known to promote changes in perception and thinking, the biological basis is very diverse, contrary to what is often assumed. Brain cells come in extraordinary varieties in size, shape, and complexity. Their synaptic connectivity provides the foundation of all our sensory input, motor output, cognitive functions, and thoughts. In short: They shape us. This talk gives an introduction about the extent of variability in neuronal patterns that underlies neurodiversity and critically discusses the idea of neurodivergence, diagnosis criteria in Autism and ADHD from a biological and first person-perspective. We find that biological variability of brains is an evolutionary feature that helps us to adapt to our environment but comes with certain risks and downsides in our modern society. While many things are still unknown, scientists have identified genes and environmental impacts that shape our network architecture during brain development and which help to explain why we think and experience the world so differently.</abstract>
                <slug>38c3-436-all-brains-are-beautiful-the-biology-of-neurodiversity</slug>
                <track>Science</track>
                
                <persons>
                    <person id='469'>Marcello</person>
                </persons>
                <language>en</language>
                <description>This talk gives an introduction about the extent of variability in neuronal patterns that underlies neurodiversity and critically discusses the idea of neurodivergence, diagnosis criteria in Autism and ADHD from a biological and affected person-perspective. It aims to clear up stereotypes, dogmas that still stick in our society and provides latest insights from science and community about what makes our brains work so differently.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NJXH8N/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/NJXH8N/feedback/</feedback_url>
            </event>
            <event guid='c44ea615-7ef3-500b-acec-4c02826ca4a2' id='383'>
                <room>Saal 1</room>
                <title>identity theft, credit card fraud and cloaking services &#8211; how state-sponsored propaganda makes use of the cyber criminal toolbox</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>The Russian disinformation campaign Doppelg&#228;nger is considered to be technically highly sophisticated. Research by CORRECTIV and Qurium has revealed that the Russian state relies on the toolbox of internet fraudsters for the dissemination of propaganda and fakes. A talk on the state&apos;s possible alliance with the criminal world - and on possibilities and limitations of countering it.</abstract>
                <slug>38c3-383-identity-theft-credit-card-fraud-and-cloaking-services-how-state-sponsored-propaganda-makes-use-of-the-cyber-criminal-toolbox</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='411'>Alexej Hock</person><person id='1021'>Max Bernhard</person>
                </persons>
                <language>en</language>
                <description>Its goal is to undermine the support for Ukraine and polarize Western states: For more than two years, the Russian disinformation campaign Doppelg&#228;nger has been running on social networks and its own portals. Despite sanctions, the affected countries have not been able to stop the campaign. This is also because the architects of the campaign employ methods tried and tested by cyber criminals: Identity theft, use of stolen credit cards, bulletproof hosting, cloaking services and multi-level forwarding mechanisms. Research by CORRECTIV and Qurium based on data provided by Antibot4Navalny has uncovered the technical infrastructure of the campaign. The talk guides the audience through details of the new potential alliance between the Russian state and the criminal world. It raises questions about the accountability of authorities and platforms and opens the discussion to the possibilities and limits of resistance against malign foreign influences in the digital sphere.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3QG7TT/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/3QG7TT/feedback/</feedback_url>
            </event>
            <event guid='e79b8620-b69e-5d6d-a6d2-d4cfe94a5ffc' id='542'>
                <room>Saal 1</room>
                <title>Find My * 101</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>I&apos;ll introduce the technology underlying bluetooth trackers from Apple and Google, and will describe and show what can actually be seen on the air (using a hackrf/rad1o for example).

This is part demonstration of what is possible right now, part explanation of the underlying principles, and part invitation to would-be hackers to make creative use of this technology.</abstract>
                <slug>38c3-542-find-my-101</slug>
                <track>Security</track>
                
                <persons>
                    <person id='2'>Henryk Pl&#246;tz</person>
                </persons>
                <language>en</language>
                <description>Apple&apos;s &quot;Find My&quot; network has been online for more than 5 years. Google has launched its own variant &quot;Find My Device&quot; this year. The Apple protocol has been previously reverse-engineered, while Google&apos;s specs are publicly available. Both take part in Detecting Unwanted Location Trackers (DULT), an IETF draft.

Underlying this is standard Bluetooth Low Energy (BLE) which can be analyzed, and toyed with, with all the standard BLE research tools. I&apos;ll show how to sniff and interact with these trackers using tools that many hackers might already have available.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/EAT3WZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/EAT3WZ/feedback/</feedback_url>
            </event>
            <event guid='24230857-2a52-57b9-b5c4-ce2bf646e28f' id='100'>
                <room>Saal 1</room>
                <title>Implantable Cardiac Devices - Security and Data Accessibility</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>00:40</duration>
                <abstract>Cardiac Implantable Electronic Devices (CIED), such as cardiac pacemakers and defibrillators, are a fairly niche target for security researchers, in part due to a lack of manufacturer cooperation and device accessibility. This talk aims to provide insights into the challenges in device development and methods with which to research device security. Data accessibility to patients will be touched upon.</abstract>
                <slug>38c3-100-implantable-cardiac-devices-security-and-data-accessibility</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='93'>dilucide</person>
                </persons>
                <language>en</language>
                <description>CIEDs may adversely affect patients implanted with such devices should their security be compromised. Although some efforts to secure these devices can be noted, it has quite often been lacking and may thus enable patient harm or data confidentiality compromise by malicious actors. Given the vast consequences of security vulnerabilities within this industry, the author aims to provide insight into the challenges associated with designing security architectures for such platforms, as well as possible methodology of researching these devices safely even when lacking manufacturer cooperation and access to device programmers. 
Data collected by CIEDs and transmitted through remote monitoring is an additional concern for patients. Whilst research has shown that most manufacturers do respond in a timely and comprehensive fashion to GDPR requests, immediate data access is not yet possible and requires the patient to reach out to their doctors to obtain the requisite (event) data. A proposed solution is presented on how a patient communicator may be designed to allow patients interested in their autonomy to perform limited device interrogation in a safe and secure manner.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MHXP8Q/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/MHXP8Q/feedback/</feedback_url>
            </event>
            <event guid='6cce986f-4677-5d59-8f52-f49d357566b6' id='533'>
                <room>Saal 1</room>
                <title>Security Nightmares</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T16:40:00+01:00</date>
                <start>16:40</start>
                <duration>01:00</duration>
                <abstract>Der IT-Sicherheitsalptraum-R&#252;ck&#173;blick: Manchmal belustigend, zuweilen beunruhigend, aber mit Ausblick.</abstract>
                <slug>38c3-533-security-nightmares</slug>
                <track>CCC</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/SDFDUW/hackerStock-blurred_tnUsjJq.png</logo>
                <persons>
                    <person id='562'>Ron</person><person id='456'>Constanze Kurz</person>
                </persons>
                <language>de</language>
                <description>Es ist wieder ein Jahr vergangen und niemand ist von einem Smartmeter erw&#252;rgt worden: Ist &#252;berhaupt etwas Berichtenswertes passiert? Und wenn nein, wird es denn n&#228;chstes Jahr wenigstens schlimmer?

Wir betrachten das vergangene Jahr, versuchen Muster zu erkennen und zu ahnen, wie es weitergehen muss, denn vorgewarnt zu sein, hei&#223;t gewappnet zu sein. Und sei es nur mit Popcorn und &#8222;In &#220;bereinstimmung mit der Prophezeihung!&#8220;-Schildern.

Publikumseinw&#252;rfe willkommen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SDFDUW/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/SDFDUW/feedback/</feedback_url>
            </event>
            <event guid='b34a47c0-4f31-5c3e-9384-afab6f7e365f' id='37'>
                <room>Saal 1</room>
                <title>38C3: Return to legal constructions</title>
                <subtitle></subtitle>
                <type>Ceremony</type>
                <date>2024-12-30T18:00:00+01:00</date>
                <start>18:00</start>
                <duration>00:40</duration>
                <abstract>Let&apos;s join in a quiet moment to bid farewell to the chaotic wonderland that has been 38C3 and prepare ourselves for the harsh reality outside.</abstract>
                <slug>38c3-37-38c3-return-to-legal-constructions</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='461'>Gabriela Bogk</person><person id='277'>Aline Blankertz</person>
                </persons>
                <language>en</language>
                <description>Gather round and take a deep breath and enjoy the unique atmosphere before you will feel the spirit again at the next hacker event close to you.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VZCYSX/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/VZCYSX/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal ZIGZAG' guid='62251a07-13e4-5a72-bb3c-8528416ee0f2'>
            <event guid='29d46adc-8f2d-55af-9bc3-1d939ecb8446' id='237'>
                <room>Saal ZIGZAG</room>
                <title>Longtermismus &#8211; der &#8222;Geist&#8220; des  digitalen Kapitalismus</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>Der Vortrag wirft einen sozialwissenschaftlichen Blick auf die Ideologie des Longtermismus. Seine Funktion im digitalen Kapitalismus wird analysiert. Mithilfe von Klassikern der Soziologie wird dargestellt, warum sich diese Ideologie in eine faschistische Richtung entwickelt.</abstract>
                <slug>38c3-237-longtermismus-der-geist-des-digitalen-kapitalismus</slug>
                <track>Ethics, Society &amp; Politics</track>
                
                <persons>
                    <person id='249'>Max Franz Johann Schnetker</person>
                </persons>
                <language>de</language>
                <description>Longtermismus ist die neue Hype-Ideologie des Silicon Valley. Elon Musk und Sam Altman haben sich als Anh&#228;nger geoutet, er ist die offizielle Firmenpolitik von OpenAI.
Longtermismus postuliert, dass wir uns nicht mit der Gegenwart oder der nahen Zukunft besch&#228;ftigen sollten, sondern unser politisches Hauptaugenmerk auf die Entwicklung eines Computerhimmels in ferner Zukunft richten sollten. Zentral sind dabei Annahmen &#252;ber die Entwicklungsm&#246;glichkeiten von k&#252;nstlicher Intelligenz, die deutlich religi&#246;se Z&#252;ge tragen.

Der Vortrag stellt die Ergebnisse soziologischer Forschung zu dieser neuen Ideologie vor.

Denn so neu ist das ganze gar nicht. Die &#8222;Moral&#8220; des Longtermismus passt erstaunlich gut zu den Gesch&#228;ftszielen der Digitalkonzerne und macht aus diesen eine Metaphysik. Diese soziale Funktion des Longtermismus &#228;hnelt damit der Funktion, die Max Weber f&#252;r den Protestantismus als &#8222;Geist&#8220; des Kapitalismus im Fr&#252;hkapitalismus ausgemacht hat. Wie der Protestantismus fr&#252;her dient der Longtermismus heute einerseits als metaphysische Rechtfertigung der Gesch&#228;ftsmodelle von Unternehmen und andererseits als individuelle Moral, die ihre Anh&#228;nger*innen zu mehr Leistung animieren soll.
 
Gegenw&#228;rtig erleben wir einen Rechtsruck im Longtermismus, dessen prominente Vertreter*innen wie Elon Musk oder Peter Thiel sich offen f&#252;r Donald Trump positionieren. Auch hier &#228;hnelt die Entwicklung des Longtermimsus vergleichbaren fr&#252;heren Ideologien. Klassische Analysen zeigen, warum individualistische Leistungsideologien das Potenzial haben, in eine faschistische Richtung zu kippen. Der Rechtsruck der Silicon-Valley-Eliten wird so verst&#228;ndlich.

Abschlie&#223;end wird auf den Einfluss von Musk und Thiel auf die US-Wahlen eingegangen und versucht, die weitere Entwicklung abzusch&#228;tzen.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/RWD9LP/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/RWD9LP/feedback/</feedback_url>
            </event>
            <event guid='62cc7bf4-22c6-5ec0-8c94-f9b7cf76f3cd' id='227'>
                <room>Saal ZIGZAG</room>
                <title>Moving with feelings: Behind the scenes of a one man show mobile &amp; fiber operator in Spain</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>How to run an MVNO with values: What are the requirements? Do you need a government license, maybe a lot of investment? There are different types of MVNOs. We will talk about how to do business as an MVNO while respecting users&apos; privacy, supporting free software, believing in the right to repair and making your customers technologically sovereign.</abstract>
                <slug>38c3-227-moving-with-feelings-behind-the-scenes-of-a-one-man-show-mobile-fiber-operator-in-spain</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='715'>Edgar Saumell Oechsle</person>
                </persons>
                <language>en</language>
                <description>The issues with data privacy are being discussed more than ever. However, from the end user perspective, it is difficult to understand the full extent of the impact on their privacy when using well known &quot;free&quot; services or maybe acquired hardware like a vacuum cleaner or a cooking robot. On the other side, there are projects that demonstrate that they can do business respecting their users. 

One way to start to take care of your privacy is by using free software, but this software needs to be high quality, easy to use for the end user, has to be documented in a clear way and has to resolve issues and bugs as fast as possible. This is very hard work for the developers, so their work has to be compensated.

Last but not least, the right to repair plays a big role for being technologically sovereign. It&apos;s as important to be aware of your privacy when using online services as it is to know how repairable and privacy-respecting hardware is before you buy it.

Can you fight for and support what you believe in while doing business?
I think so! Let&apos;s talk about it.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HFPUYT/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HFPUYT/feedback/</feedback_url>
            </event>
            <event guid='0daa8ef9-3eb3-5e50-b879-c48fe5dc69ad' id='470'>
                <room>Saal ZIGZAG</room>
                <title>GLAM zwischen LOD und &#175;\_(&#12484;)_/&#175;. Museumskritik f&#252;r Hacker*innen</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Habt ihr euch immer schon gefragt wie Museumssammlungen ins Netz kommen, warum online Sammlungen meist immer noch aussehen wie Kataloge seit dem 19. Jahrhundert, was f&#252;r Strategien und F&#246;rderprogramme dahinter stecken, welche Firmen hier quasi-Monopole haben, und warum Museen so viele Hoffnungen (Zugang! Partizipation! Demokratie!) mit der Digitalisierung verbinden? Der Talk ist eine Einladung an Hacker*innen sich an der kritischen Weiterentwicklung, &#214;ffnung und Reflexion von Museen zu beteiligen.</abstract>
                <slug>38c3-470-glam-zwischen-lod-und----museumskritik-fr-hacker-innen</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/WU87FV/elefant_L367klt.PNG</logo>
                <persons>
                    <person id='503'>Lukas Fuchsgruber</person>
                </persons>
                <language>de</language>
                <description>GLAM = Abk&#252;rzung f&#252;r Sammlungsinstitutionen: Galleries, Libraries, Archives, Museums
LOD = Buzzword in Museen: Linked Open Data
&#175;\_(&#12484;)_/&#175; = Platzhalter f&#252;r: Lass irgendwas mit KI, Google Arts &amp; Culture, Facebook Metaverse machen!

Als vor vier Jahren mein Forschungsprojekt zur Digitalisierung in Museen losging habe ich meine ersten Ideen auf der rC3 pr&#228;sentiert (&quot;Wie k&#246;nnen wir das digitale Museum aufhalten&quot;). Und jetzt m&#246;chte ich die Ergebnisse aus vier Jahren Forschung zur Digitalisierung von Museen teilen. Meine Quellen sind vor allem die Jahresberichte der Staatlichen Museen zu Berlin seit 1990, und die Digitalstrategien der Deutschen Bundesregierung, mit ihrem Fokus auf K&#252;nstliche Intelligenz, Virtual Reality und Vernetzte Daten, die zum Beispiel die Millionenprojekte &quot;museum4punkt0&quot; und &quot;Datenraum Kultur&quot; beinhalten.

Ich zeige gr&#246;&#223;ere Entwicklungen und Konflikte und viele Beispiele, alles anhand der Frage: Welche Br&#252;cken k&#246;nnen wir bauen zwischen Museumskritik und Datenpolitik?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WU87FV/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WU87FV/feedback/</feedback_url>
            </event>
            <event guid='900481bb-9723-562b-9f39-361f495524b8' id='192'>
                <room>Saal ZIGZAG</room>
                <title>From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>In the October 2023 update, Windows 11 introduced support for 11 additional compression formats, including RAR and 7z, allowing users to manage these types of files natively within File Explorer. The enhancement significantly improves convenience; however, it also introduces potential security risks. To support these various compression formats, Windows 11 utilizes the libarchive library, a well-established open-source library used across multiple operating systems like Linux, BSD, and macOS, and in major projects such as ClickHouse, Homebrew, and Osquery.

The libarchive has been continuously fuzzed by Google&#8217;s OSS-Fuzz project, making it a time-tested library. However, its coverage in OSS-Fuzz has been less than ideal. In addition to the two remote code execution (RCE) vulnerabilities disclosed by Microsoft Offensive Research &amp; Security Engineering (MORSE) in January, we have identified several vulnerabilities in libarchive through code review and fuzzing. These include a heap buffer overflow vulnerability in the RAR decompression and arbitrary file write and delete vulnerabilities due to insufficient checks of libarchive&#8217;s output on Windows. Additionally, in our presentation, we will reveal several interesting features that emerged from the integration of libarchive with Windows.

And whenever vulnerabilities are discovered in widely-used libraries like libarchive, their risks often permeate every corner, making it difficult to estimate the potential hazards. Moreover, when Microsoft patches Windows, the corresponding fixes are not immediately merged into libarchive. This delay gives attackers the opportunity to exploit other projects using libarchive. For example, the vulnerabilities patched by Microsoft in January were not merged into libarchive until May, leaving countless applications exposed to risk for four months. The worst part is that the developers might not know the vulnerability details or even be aware of its existence. To illustrate this situation, we will use the vulnerabilities we reported to ClickHouse as an example to demonstrate how attackers can exploit the vulnerabilities while libarchive remains unpatched.</abstract>
                <slug>38c3-192-from-convenience-to-contagion-the-libarchive-vulnerabilities-lurking-in-windows-11</slug>
                <track>Security</track>
                
                <persons>
                    <person id='192'>NiNi Chen</person>
                </persons>
                <language>en</language>
                <description>We will introduce the new Compressed Archived folder feature in Windows 11 and review the vulnerabilities of the previous Compressed (zipped) folder. Next, we will explain how we analyzed the libarchive that Windows 11 introduced to support various compression formats. Despite extensive fuzz testing by OSS-Fuzz, we discovered several vulnerabilities in libarchive through code review and fuzzing, including an RCE (Remote Code Execution) vulnerability. Finally, we will use the ClickHouse case to explain how we triggered an RCE vulnerability in ClickHouse while the patch had not been merged upstream.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YLNEYH/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/YLNEYH/feedback/</feedback_url>
            </event>
            <event guid='4f4ba783-2390-5252-b183-3c7be50b9a4b' id='45'>
                <room>Saal ZIGZAG</room>
                <title>corebooting Intel-based systems</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Gaining a reasonable level of trust on the firmware that runs your everyday activities</abstract>
                <slug>38c3-45-corebooting-intel-based-systems</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='29'>aprl</person><person id='95'>elly</person>
                </persons>
                <language>en</language>
                <description>Corebootable or not corebootable, that is the question.

The nerdiest nerds already corebooted their old X230 ThinkPads... but what about your new ThinkPad, or even your gaming rig? Well, Intel has a trick called the &quot;BootGuard&quot; inside the Management Engine.
It is supposed to protect the firmware and only allow updates from signed sources... somewhat like the Secure Boot. This means we can&apos;t coreboot our newer machines, right?

..right? Well, for that to work... it needs team-play between OEMs and Intel, which doesn&apos;t always work out. 

In this talk you will learn how to port coreboot to modern Intel systems - how we did it and even got to game on them.

We&apos;ll go over coreboot development, tell you how to find ~~potential subjects~~ compatible mainboards and what it would take to boot on them!). We&apos;ll explain what are &quot;payloads&quot;, which one is right for you, and what it takes to make such system run mainline Linux.

We&apos;ll also take a look at current state of AMD systems and how they&apos;re doing with OpenSIL (which will replace AGESA in the coming years).</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WHDXXH/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WHDXXH/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Saal GLITCH' guid='7202df07-050c-552f-8318-992f94e40ef0'>
            <event guid='76ee194a-c269-50e0-b616-04f38fa329cb' id='527'>
                <room>Saal GLITCH</room>
                <title>Dude, Where&apos;s My Crypto? - Real World Impact of Weak Cryptocurrency Keys</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:40</duration>
                <abstract>We present Milksad, our research on a class of vulnerabilities that exposed over a billion dollars worth of cryptocurrency to anyone willing to &apos;crunch the numbers&apos;.
The fatal flaw? Not enough chaos.
Learn how we found and disclosed issues in affected open source wallet software, brute-forced thousands of individual affected wallets on a budget, and traced over a billion US dollars worth of prior transactions through them.</abstract>
                <slug>38c3-527-dude-where-s-my-crypto-real-world-impact-of-weak-cryptocurrency-keys</slug>
                <track>Security</track>
                
                <persons>
                    <person id='361'>John Naulty</person>
                </persons>
                <language>en</language>
                <description>In July 2023, people in our circle of friends noticed a series of seemingly impossible cryptocurrency thefts, which added up to over one million US dollars. 
A common denominator was discovered across the set of victims we knew: the wallet software `libbitcoin-explorer`. Vulnerable versions used a weak pseudorandom number generator when creating cryptocurrency wallets. Within a short period of time, we disclosed the vulnerability, [CVE-2023-39910](https://milksad.info/disclosure.html). 
Using this weakness, attackers were able to compute private keys of victims, which is supposed to be impossible under normal circumstances.

In this talk we 
* &#128220; - tell the story of uncovering a digital currency heist
* &#127760; - dive into similar vulnerabilities
* &#128269; - trace the movement of coins
* &#9878; - outline ethical challenges of cryptocurrency security research
* &#128737; - explore methods to defend and protect against this bug class

Our intention is to share the story of how little details can have big consequences and the importance of quality chaos.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PEN9QU/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PEN9QU/feedback/</feedback_url>
            </event>
            <event guid='13802a20-4b8f-5848-9611-1f0b260605c9' id='358'>
                <room>Saal GLITCH</room>
                <title>Is Green Methanol the missing piece for the Energy Transition?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:40</duration>
                <abstract>In an accelerating climate crisis, renewable energy and electrification are the most important tools to reduce greenhouse gas emissions. However, in sectors where electrification is infeasible or impossible, other solutions will be needed. While hydrogen gets a lot of attention, it suffers from challenges like being difficult to transport and store. While it does not receive nearly as much attention as hydrogen, another molecule, methanol, could play a crucial role in bringing down emissions in challenging sectors like shipping, aviation, or the chemical industry.</abstract>
                <slug>38c3-358-is-green-methanol-the-missing-piece-for-the-energy-transition-</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/BQFULL/carbonrecyclinginternational-1280_Zq87xgS.jpg</logo>
                <persons>
                    <person id='383'>Hanno B&#246;ck</person>
                </persons>
                <language>en</language>
                <description>Methanol is the simplest carbon-containing liquid and is currently almost exclusively made from fossil fuels. However, it could be made by utilizing renewable energy, green hydrogen, and carbon dioxide, and such green methanol could play an important role in a climate-neutral future - both as a fuel and as a chemical feedstock[1].

Methanol is relatively easy to store and transport. It could provide energy during times with little sun and wind and possibly even balance multi-year fluctuations [2][3]. It could also serve as a shipping fuel and, indirectly, help make aviation fuels. Furthermore, it could form the basis of a fossil-free production of chemical products like plastics [4][5]. That raises important questions about stranded assets in today&apos;s chemical industry, as the existing plastic production with steam crackers could become obsolete.

Despite its prospects, methanol is no magic silver bullet. Making it from CO2 requires enormous amounts of energy. It should be used carefully and only where efficient direct electrification is infeasible (no methanol car, sorry). Alternative production pathways using climate-friendly biomass and waste have turned out to be challenging in the past, but they could lower some of the enormous energy needs.

[1] https://industrydecarbonization.com/news/from-coal-enabler-to-the-minimal-green-methanol-economy.html
[2] https://www.cell.com/joule/abstract/S2542-4351(23)00407-5
[3] https://industrydecarbonization.com/news/should-we-burn-methanol-when-the-wind-does-not-blow.html
[4] https://www.pnas.org/doi/full/10.1073/pnas.1821029116
[5] https://industrydecarbonization.com/news/how-to-make-plastics-without-fossil-fuels.html</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/BQFULL/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/BQFULL/feedback/</feedback_url>
            </event>
            <event guid='ab0f568d-dd61-59e6-b264-8f44a4b32ff3' id='276'>
                <room>Saal GLITCH</room>
                <title>Going Long! Sending weird signals over long haul optical networks</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T12:55:00+01:00</date>
                <start>12:55</start>
                <duration>00:40</duration>
                <abstract>Computer network operators depend on optical transmission everywhere as it is what glues together our interconnected world. But most of the industry is running the same kinds of signals down the optical transceivers.

As part of my need to &quot;Trust, but verify&quot; I wanted to check my assumptions on how the business end of modern optical modules worked, so join me in a adventure of sending weird signals many kilometres, and maybe set some records for the most wasteful bandwidth utilisation of optical spectrum in 2024!</abstract>
                <slug>38c3-276-going-long-sending-weird-signals-over-long-haul-optical-networks</slug>
                <track>Hardware &amp; Making</track>
                
                <persons>
                    <person id='289'>Ben Cartwright-Cox</person>
                </persons>
                <language>en</language>
                <description>Computer network operators depend on optical stuff everywhere as it is what glues together our interconnected world. But most of the industry is running the same kinds of signals down the optical transceivers.

As part of my need to &quot;Trust, but verify&quot; I wanted to check my assumptions on how the business end of modern optical modules worked, so join me in a adventure of sending weird signals many kilometres, and maybe set some records for the most wasteful bandwidth utilisation of optical spectrum in 2024!

In this talk we will cover the basis of optical networks, how it fits in with networking, some of the weird things pluggable optics do, the perhaps odd industry defacto standards, and bending the intended use cases of existing tech to make signals that would would deeply probably confuse a modest signals intelligence agency</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WCUKHB/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/WCUKHB/feedback/</feedback_url>
            </event>
            <event guid='66187911-4b3e-5b23-8cd3-2f7cd0fdec83' id='557'>
                <room>Saal GLITCH</room>
                <title>Microbes vs. Mars: A Hacker&apos;s Guide to Finding Alien Life</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T13:50:00+01:00</date>
                <start>13:50</start>
                <duration>00:40</duration>
                <abstract>Mars is famously the only planet (we know of) that is entirely inhabited by robots. And these robots are working hard on looking for something that would be one of the most significant discoveries in the history of science: Alien life.
But how do you look for something that no one has ever seen? And would we recognize it if we find it?
Join me on a journey through Mars&#8217; ancient past and Earth&#8217;s most extreme environments, where scientists hunt for strange microbes that defy all our expectations: Organisms thriving in salt lakes, breathing metal, and building bizarre microbial &#8216;cities&#8217; out of rock. Are they the blueprint of what alien life might look like? I will introduce you to the cutting-edge technology we use to analyse and understand them, and how we detect their &#8220;biological fingerprints&#8221; that might one day help us to find Martian life.
This talk will not only give you a deep look behind the scenes of the search for life on Mars, but also a new appreciation for the strange and wonderful life on our own planet.</abstract>
                <slug>38c3-557-microbes-vs-mars-a-hacker-s-guide-to-finding-alien-life</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/F7MSNF/curiosity_kDEmbPX.jpg</logo>
                <persons>
                    <person id='587'>Anouk Ehreiser</person>
                </persons>
                <language>en</language>
                <description>I am a PhD student in astrobiology and planetary science at the University of Hong Kong and want to introduce you to the exciting research that is happening in the search for life on Mars. We will talk about what Earth and Mars looked like 3 billion years ago, you will get to know some truly weird microbes, learn about the instruments on Mars rovers and the exciting upcoming Mars sample return missions. I will also share highlights from my own research and fieldwork in Mars-like environments: From growing extremophiles in the lab to testing planetary rovers on Mount Etna, and research adventures in the remote deserts of the Atacama and western China.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/F7MSNF/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/F7MSNF/feedback/</feedback_url>
            </event>
            <event guid='c2ba4839-32ad-5e6e-a998-cd2d07ac7448' id='130'>
                <room>Saal GLITCH</room>
                <title>Von Ionen zu Daten: Die Funktionsweise und Relevanz von (Quadrupol-)Massenspektrometern</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Massenspektrometer sind unverzichtbare Analysewerkzeuge in der Chemie und zudem hochinteressante und verbl&#252;ffende Instrumente. In diesem Talk wird die Massenspektrometrie mit Schwerpunkt auf Quadrupolmassenspektrometer anschaulich vorgestellt.</abstract>
                <slug>38c3-130-von-ionen-zu-daten-die-funktionsweise-und-relevanz-von-quadrupol-massenspektrometern</slug>
                <track>Science</track>
                <logo>/congress/2024/fahrplan/media/38c3/submissions/PRLP7M/IMG_9534_Nir7lTR.jpg</logo>
                <persons>
                    <person id='100'>Sally</person>
                </persons>
                <language>de</language>
                <description>Massenspektrometer aus der Hacker-Perspektive:
Die Massenspektrometrie mag auf den ersten Blick kompliziert wirken, doch mit einem grundlegenden Verst&#228;ndnis der Physik und etwas logischem Denken kann man sich &#252;berraschend gut in diese Welt einarbeiten. Ich besch&#228;ftige mich seit vier Jahren intensiv mit Massenspektrometern &#8211; eine Technik, die mich immer mehr fasziniert und in die ich tief eintauche. Dieser Vortrag richtet sich an alle, die bisher wenig bis gar nichts &#252;ber Massenspektrometrie wissen und erkl&#228;rt auf zug&#228;ngliche Weise, wie (Quadrupol-)Massenspektrometer funktionieren und warum sie so entscheidend f&#252;r die chemische Analyse sind. Wir schauen uns an, wie diese Ger&#228;te auf molekularer Ebene arbeiten und welche spannenden Anwendungen es gibt, die unseren Alltag beeinflussen. Dabei werden die physikalischen Grundlagen verst&#228;ndlich erkl&#228;rt, sodass jeder &#8211; auch ohne Vorkenntnisse &#8211; nachvollziehen kann, wie und warum diese Technologie so wichtig ist.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PRLP7M/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/PRLP7M/feedback/</feedback_url>
            </event>
            <event guid='7c34225e-8eca-56b9-ab3a-1e5a5093e671' id='308'>
                <room>Saal GLITCH</room>
                <title>Philosophical, Ethical and Legal Aspects of Brain-Computer Interfaces</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>00:40</duration>
                <abstract>This talk examines philosophical, legal, and ethical questions of the merging of human minds with intelligent machines through Brain-Computer-Interfaces, provides an overview of current debates and international regulatory development - and what might be at stake when technologies increasingly access the human brain.</abstract>
                <slug>38c3-308-philosophical-ethical-and-legal-aspects-of-brain-computer-interfaces</slug>
                <track>Science</track>
                
                <persons>
                    <person id='332'>Christoph Bublitz</person>
                </persons>
                <language>en</language>
                <description>Human minds and machines, or organic and artificial intelligence (AI), are increasingly merging through neurotechnologies such as Brain-Computer-Interfaces (BCIs) that may record or alter brain activity. While most current devices are developed and used for rehabilitative purposes, more and more consumer devices are about to come on the market, and some stakeholders such as Elon Musk and his company Neuralink pursue more transhumanist objectives. This merging of minds and machines raises multiple intriguing philosophical, ethical, and legal questions: Do these devices become part of the person, even more, might the AI operating these devices become part of her? (I argue that it does under certain conditions, creating the most intimate conceivable connection between AI and persons). Are there ethical boundaries, and what is the legal situation, especially with respect to human rights? (I call for a renaissance of the right to freedom of thought to provide at least some principled protection for privacy of thought). 
 
Moreover, the topic has received the attention of international organizations, which will negotiate the first international treaty on the ethics of neurotechnology under the auspices of UNESCO in the beginning of 2025 (expected to be concluded in late 2025). This will set the standards for the future trajectory of the technology, but whether agreement can be found is to be seen. The EU, US, and China have different regulatory approaches with different visions for the future.   

This talk addresses these political, philosophical, legal and ethical questions and presents results of an international research cooperation on the topic, HYBRID MIND, that is funded in Germany by the Federal Ministry of Education and Research and comes to its official conclusion during the days of the 38C3.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DFATXZ/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/DFATXZ/feedback/</feedback_url>
            </event>
            <event guid='577adb5e-088c-5e0b-8828-0f9d7ff8011f' id='315'>
                <room>Saal GLITCH</room>
                <title>38C3: Infrastructure Review</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2024-12-30T16:40:00+01:00</date>
                <start>16:40</start>
                <duration>01:15</duration>
                <abstract>This talks gives a behind the scenes on how the infrastructure side of the event is done.</abstract>
                <slug>38c3-315-38c3-infrastructure-review</slug>
                <track>CCC</track>
                
                <persons>
                    <person id='336'>nicoduck</person>
                </persons>
                <language>en</language>
                <description>A lot of teams help to make this event happen. This talk gives them the opportunity to show you what they do and how they do it.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XKW9LG/</url>
                <feedback_url>https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/XKW9LG/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
