Sat - Day 1 - December 27
Opening Ceremony
pajowu, Stella
All Sorted by Machines of Loving Grace? "AI", Cybernetics, and Fascism and how to Intervene
Katika Kühnreich
The art of text (rendering)
Nicolas Rougier
OpenAutoLab: photographic film processing machine. Fully automatic and DIY-friendly.
Kauz
ZPS: Ein Jahr Adenauer SRP+ und mehr
Stefan Pelzer, Philipp Ruch
Demystifying Fuzzer Behaviour
Addison
ISDN + POTS Telephony at Congress and Camp
Harald Welte
Brennende Wälder und Kommentarspalten - Klimaupdate mit Bits & Bäume und dem FragDenStaat Climate Helpdesk
Joschi Wolf
Building hardware - easier than ever - harder than it should be
kliment
Neuroexploitation by Design: Wie Algorithmen in Glücksspielprodukten sich Wirkweisen des Reinforcement Learning und dopaminergen Belohnungssystems zunutze machen
Elke Smith
FeTAp 611 unplugged: Taking a rotary dial phone to the mobile age
Michael Weiner
Who cares about the Baltic Jammer? – Terrestrial Navigation in the Baltic Sea Region
Lars, Niklas Hehenkamp, Markus
Liberating Bluetooth on the ESP32
Antonio Vázquez Blanco (Antón)
Chaos macht Küche
Ingwer Andersen
Developing New Medicines in the Age of AI and Personalized Medicine
Aphorism
Endlich maschinenlesbare Urteile! Open access für Juristen
Beata Hubrig, Nuri Khadem-Al-Charieh
Opening pAMDora's box and unleashing a thousand paths on the journey to play Beatsaber custom songs
tihmstar
Not an Impasse: Child Safety, Privacy, and Healing Together
Kate Sim
KIM 1.5: Noch mehr Kaos in der Medizinischen Telematikinfrastruktur (TI)
chrissat
All my Deutschlandtickets gone: Fraud at an industrial scale
Q Misell, maya / 551724
Of Boot Vectors and Double Glitches: Bypassing RP2350's Secure Boot
stacksmashing, nsr
„KI“, Digitalisierung und Longevity als Fix für ein kaputtes Gesundheitssystem?
Manuel Hofmann
Handy weg bis zur Ausreise – Wie Cellebrite ins Ausländeramt kam
Chris Köver
Pwn2Roll: Who Needs a 599€ Remote When You Have wheelchair.py?
corellia
Escaping Containment: A Security Analysis of FreeBSD Jails
ilja, Michael Smith
Die Känguru-Rebellion: Digital Independence Day
Marc-Uwe Kling, Rosa Luxus
And so it begins - Wie unser Rechtsstaat auf den Highway Richtung Trumpismus rast – und warum afghanische Kläger*innen für uns die Notbremse ziehen
Eva, Elaha
1965 + 60 Years of Algorithmic Art with Computers
Enna Gerhard, Frieder Nake
Life on Hold: What Does True Solidarity Look Like Beyond Duldung, Camps, Deportation, and Payment Cards?
Hafid Shaaib, Eric Noel Mbiakeu
Episode II - Der Rat schlägt zurück
khaleesi, Markus Reuter
Excuse me, what precise time is It?
Oliver Ettlin
BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets
Alon Leviev
Not To Be Trusted - A Fiasco in Android TEEs
0ddc0de, gannimo, Philipp
Hacking washing machines
Severin von Wnuck-Lipinski, Hajo Noerenberg
Aber hier Leben? Nein danke! …oder doch? Wie wir der autoritären Zuspitzung begegnen können.
Jaša, Lisa Hoodie
Throwing your rights under the Omnibus - how the EU's reform agenda threatens to erase a decade of digital rights
Thomas Lohninger, Ralf Bendrath
DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices
Zhongrui Li, Yizhe Zhuang, Kira Chen
Bluetooth Headphone Jacking: A Key to Your Phone
Dennis Heinze, Frieder Steinmetz
Breaking architecture barriers: Running x86 games and apps on ARM
neobrain
The Eyes of Photon Science: Imaging, Simulation and the Quest to Make the Invisible Visible
MarKuster
Coding Dissent: Art, Technology, and Tactical Media
helenanik0n0le
AI-generated content in Wikipedia - a tale of caution
Mathias Schindler
Building a NOC from scratch
lilly, Scientress
From Silicon to Darude Sand-storm: breaking famous synthesizer DSPs
giulioz
Unnecessarily Complicated Kitchen – Die Wissenschaft des guten Geschmacks
LukasQ
Sun - Day 2 - December 28
Protecting the network data of one billion people: Breaking network crypto in popular Chinese mobile apps
Mona
Hatupangwingwi: The story how Kenyans fought back against intrusive digital identity systems
Mustafa Mahmoud Yousif
Lightning Talks - Tag 2
chestnut, keldo, Andi Bräu
Digitale Inklusion: Wie wir digitale Barrierefreiheit für alle erreichen können
Jakob Sponholz, Kathrin Klapper, Lena Christina Müller
Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots
Shipei Qu, Zikai Xu, Xuangan Xiao
Suing spyware in Europe: news from the front!
Lori Roussey, Celia/Irídia
Neue Chaos Events - InselChaos und Håck ma’s Castle plaudern aus dem Nähkästchen
Erwin Ernst "eest9" Steinhammer, lasii, Nami
A post-American, enshittification-resistant internet
Cory Doctorow
A space odyssey #2: How to study moon rocks from the Soviet sample return mission Luna 24
Paul Koetter, Christopher Hamann
Agentic ProbLLMs: Exploiting AI Computer-Use and Coding Agents
Johann Rehberger
selbstverständlich antifaschistisch! Aktuelle Informationen zu den Verfahren im Budapest-Komplex - von family & friends Hamburg
family & friends Hamburg
Chaospager - How to construct an Open Pager System for c3
Max, Julian
Chaos Communication Chemistry: DNA security systems based on molecular randomness
Anne Lüscher
Live, Die, Repeat: The fight against data retention and boundless access to data
Klaus Landefeld
Power Cycle B7 oder Warum kauft man eine Zeche?
Kohlenpod, kater, Stephan
Cracking open what makes Apple's Low-Latency WiFi so fast
Henri Jäger
Awful interception: misadventures of the russian surveillance machinery
Xeniax
Amateurfunk im All – Kontakt mit Fram2
akira25, flx, Gato
Über europäische Grenzen hinweg auf klinischen Daten rechnen - aber sicher!
Hendrik Ballhausen
CCC-Jahresrückblick
Persist, resist, stitch
Philo
Lessons from Building an Open-Architecture Secure Element
Jan Pleskac
Auf die Dauer hilft nur Power: Herausforderungen für dezentrale Netzwerke aus Sicht der Soziologie
Marco Wähner
Current Drone Wars
Leonard
Variable Fonts — It Was Never About File Size
Bernd
A Quick Stop at the HostileShop
Mike Perry
In-house electronics manufacturing from scratch: How hard can it be?
Augustin Bielefeld, Alexander Willer
CPU Entwicklung in Factorio: Vom D-Flip-Flop bis zum eigenen Betriebssystem
PhD (Philipp)
Amtsgeheimnis raus, Datenhalde rein: was die Informationsfreiheit in Österreich bringt
Markus (fin) Hametner, Erwin Ernst "eest9" Steinhammer
How to render cloud FPGAs useless
Dirk
freiheit.exe - Utopien als Malware
Christiane Mudra
Recharge your batteries with us - an empowering journey through the energy transition
Salacidre, JulianeB
Prometheus: Reverse-Engineering Overwatch
breakingbread
Trump government demands access to European police databases and biometrics
Matthias Monroy
Verlorene Domains, offene Türen - Was alte Behördendomains verraten
Tim Philipp Schäfers (TPS)
CSS Clicker Training: Making games in a "styling" language
Lyra Rebane
Wie wir alte Flipperautomaten am Leben erhalten
Axel Böttcher
Power Cycles statt Burnout – Wie Einflussnahme nicht verpufft
Rahel Becker, Anna Kassautzki
Don’t look up: There are sensitive internal links in the clear on GEO satellites
Nadia Heninger, Annie Dai
Textiles 101: Fast Fiber Transform
octoprog
How To Minimize Bugs in Cryptography Code
Jade
The Museum of Care: Open-Source Survival Kit Collection
nika_dubrovsky
Xous: A Pure-Rust Rethink of the Embedded Operating System
b@bunnie.org, Sean "xobs" Cross
51 Ways to Spell the Image Giraffe: The Hidden Politics of Token Languages in Generative AI
Ting-Chun Liu, Leon-Etienne Kühr
When Vibe Scammers Met Vibe Hackers: Pwning PhaaS with Their Own Weapons
Chiao-Lin Yu (Steven Meow)
The Maybe Talent Show
Norman Müller-Schmitz, lukas-schmukas, James Bonne d'age
Code to Craft: Procedural Generation for the Physical World
bleeptrack
Reverse engineering the Pixel TitanM2 firmware
willem
The Small Packet of Bits That Can Save (or Destabilize) a City
manuelrabade
GPTDash – Der Reverse-Turing-Test
Benny, KI-lian, Ben
Mon - Day 3 - December 29
Greenhouse Gas Emission Data: Public, difficult to access, and not always correct
Hanno Böck
Design for 3D-Printing
rahix
Lightning Talks - Tag 3
chestnut, keldo, Andi Bräu
Machine Vision – Vom Algorithmus zum Baumpilz im digitalen Metabolismus
Thomas Knüsel
Celestial navigation with very little math
Trammell Hudson
a media-almost-archaeology on data that is too dirty for "AI"
jiawen uffline
Hacking Karlsruhe - 10 years later
Jürgen Bering
What Makes Bike-Sharing Work? Insights from 43 Million Kilometers of European Cycling Data
Martin Lellep, Georg Balke, FelixW
Teckids – eine verstehbare (digitale) Welt
Keno, Darius Auding
BE Modded: Exploring and hacking the Vital Bracelet ecosystem
cyanic
Wer hat Angst vor dem Neutralitätsgebot?
Hannah Vos, Vivian Kube
Shit for Future: turning human shit into a climate solution
Elena
Watch Your Kids: Inside a Children's Smartwatch
Nils Rollshausen
When 8 Bits is Overkill: Making Blinkenlights with a 1-bit CPU
girst (Tobi)
Supplements und Social Media – wenn der Online-Hype zur realen Gesundheitsgefahr wird
Christoph Wiedmer
Programmierte Kriegsverbrechen? Über KI-Systeme im Kriegseinsatz in Gaza und warum IT-Fachleute sich dazu äußern müssen
Rainer Rehak
Making the Magic Leap past NVIDIA's secure bootchain and breaking some Tesla Autopilots along the way
EliseZeroTwo
Learning from South Korean Telco Breaches
peremen, Yonghyu "perillamint" Ban
Gegenmacht - Best of Informationsfreiheit
Arne Semsrott
There is NO WAY we ended up getting arrested for this (Malta edition)
mixy1, Luke Bjorn Scerri, girogio
APT Down and the mystery of the burning data centers
Christopher Kunz, Sylvester
Von wegen Eisblumen! Wie man mit Code, Satelliten und Schiffsexpeditionen die bunte Welt des arktischen Phytoplanktons sichtbar macht
Moritz Zeising
Schlechte Karten - IT-Sicherheit im Jahr null der ePA für alle
Bianca Kastl
Set-top box Hacking: freeing the 'Freebox'
Frédéric Hoguin
Wer liegt hier wem auf der Tasche? Genug mit dem Bürgergeld-Fetisch. Stürmt die Paläste!
Helena Steinhaus
The Last of Us - Fighting the EU Surveillance Law Apocalypse
Svea, Chloé Berthélémy
AI Agent, AI Spy
Udbhav Tiwari, Meredith Whittaker
Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
Romain Malmain, Scott Bauer
Transkultureller Hack auf die klassische Musikszene – Vortrag und Konzert
Johanna-Leonore Dahlhoff
Netzpolitik in der Schweiz: Zwischen Bodensee und Matterhorn
Kire, Rahel
The Angry Path to Zen: AMD Zen Microcode Tools and Insights
Benjamin Kollenda
Blackbox Palantir
Constanze Kurz, Franziska Görlitz
Undersea Cables in Africa: New Frontiers of Digital Colonialism
Esther Mwema
Race conditions, transactions and free parking
Benjamin W. Broersma
Hegemony Eroding: Excavating Diversity in Latent Space
Karim Hamdi
10 years of Dieselgate
tmbinc
The Heartbreak Machine: Nazis in the Echo Chamber
Martha Root, Eva Hoffmann, Christian Fuchs
Light in the Dark(net)
Tobias Höller
Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM
Martin Heckel, Florian Adamsky, Daniel Gruss
Peep-Show für die Polizei. Staatliche Überwachung von Queers in Hamburger Toiletten bis 1980
Simon Schultz
Human microservices at the Dutch Railways: modern architecture, ancient hardware?
Maarten W
From Fuzzers to Thinkers: Designing a Cyber Reasoning System for AIxCC
mmisc, Annika Kuntze
PRÜF
Nico Semsrott
Verschlüsselung brechen durch physischen Zugriff - Smartphone Beschlagnahme durch Polizei
Janik Besendorf, Davy
Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities
Thijs
Die große Datenschutz-, Datenpannen- und DS-GVO-Show
Alvar C.H. Freude
Tue - Day 4 - December 30
Asahi Linux - Porting Linux to Apple Silicon
sven
Atoms in Space
manuel
I Hated All The Cross-Stitch Software So I Made My Own: My Deranged Outsider Software Suite For Making Deranged Outsider Art
yomimono
How to keep Open Source open without leaving our communities open to threats
Quintessence
CCC&T - Cosmic ray, the Climate Catastrophe and Trains.
FantasticMisterFux
CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren
Lina Lastname, Elias Zeidler (Northernside)
“End Of 10”: How the FOSS Community is Combatting Software-Drive Resource and Energy Consumption
joseph, Carolina Silva Rode, Bettina Louis
What You Hack Is What You Mean: 35 Years of Wiring Sense into Text
Torsten Roeder
Security of Cardiac Implantable Electronic Devices
dilucide
The rising misuse of AI in {medical} research
Ole Goltermann
Fossile Industrie liebt KI!
Friederike Karla Hildebrandt, Moritz
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling
Patch, Sam. Beaumont (PANTH13R)
Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs
Leo Meyerovich, Sindre Breda
Von Groschen und SpurLos - GNU Taler auch auf eurem Event!
Mikolai Gütschow, signum
We, the EU, and 1064 Danes decided to look into YouTube: A story about how the EU gave us a law, 1064 Danes gave us their YouTube histories, and reality gave us a headache
David, LK Seiling
RedScout42 – Zur digitalen Wohnungsfrage
Sandra, Leonard
Security Nightmares
Constanze Kurz, Ron
Infrastructure Review
nicoduck
Closing Ceremony
Stella, pajowu