forked from pbock/c3t-pad
-
Notifications
You must be signed in to change notification settings - Fork 0
/
events.json
1 lines (1 loc) · 356 KB
/
events.json
1
[{"guid":"654331ae-1710-42e5-bdf4-65a03a80c614","id":"7550","date":"2015-12-27T10:00:00.000Z","day":"1","recording":{"license":null,"optout":false},"persons":[{"id":"3752","name":"Carina Haupt"},{"id":"3995","name":"Linus Neumann"}],"links":[],"attachments":[],"start":"11:00","duration":"00:30","room":"Hall 1","slug":"32c3-7550-opening_event","title":"Opening Event","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":null,"description":null,"logo":null},{"guid":"77a03013-82df-48f7-8c0f-65a9e9f23490","id":"7565","date":"2015-12-27T10:30:00.000Z","day":"1","recording":{"license":null,"optout":false},"persons":[{"id":"6411","name":"Fatuma Musa Afrah"}],"links":[],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 1","slug":"32c3-7565-keynote","title":"Keynote","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":null,"description":null,"logo":null},{"guid":"0417a69e-87af-43f9-abbb-0f0666bfda3e","id":"7228","date":"2015-12-27T11:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5735","name":"anna"}],"links":[{"href":"https://netzpolitik.org/tag/live-blog/","title":null},{"href":"https://media.ccc.de/v/32c3-7228-nsa-untersuchungsausschuss_zwischen_aufklarungswillen_und_mauern_aus_schweigen","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 1","slug":"32c3-7228-nsa-untersuchungsausschuss_zwischen_aufklarungswillen_und_mauern_aus_schweigen","title":"NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern aus Schweigen","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Im März 2014 wurde der NSA-Untersuchungsausschuss im Bundestag eingesetzt, der die Verwicklungen um die deutschen Geheimdienste aufklären soll. Ein Rück- und Ausblick: Was wissen wir heute, was erwartet uns noch?","description":"Immer wieder stößt der Ausschuss, der die (Zusammen-)Arbeit der deutschen Geheimdienste und der Five Eyes untersuchen soll, auf Schwierigkeiten. Die Abgeordneten und ihre Mitarbeiter müssen unter widrigen Bedingungen mit Unmengen an eingestuften Papierakten arbeiten und bekommen wichtige Informationen vorenthalten. Die Gedächtnislücken vieler Zeugen sind bemerkenswert, ebenso wie die eigenartigen Rechtsauffassungen der Spione, die zu Tage treten. Die Theorie, dass Grundrechte nicht im Weltraum gelten, ist nur ein Beispiel von vielen.\r\n\r\nDie Szenerie gleicht nicht selten absurdem Theater und doch wissen wir mittlerweile mehr als am Anfang. Der Vortrag wird einen Überblick über das geben, was wir seit Beginn des Ausschusses erfahren haben und einen Ausblick auf das bieten, was uns noch erwartet. Nicht zuletzt soll überlegt werden, welche Schlussfolgerungen wir aus den Erkenntnissen ziehen und was sie uns über die Unmöglichkeit der Geheimdienstkontrolle offenbart haben.","logo":"/system/events/logos/000/007/228/medium/nsaua_europasaal_20151105.JPG?1448019395"},{"guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","id":"7331","date":"2015-12-27T13:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4673","name":"Daniel Lange (DLange)"},{"id":"1380","name":"Felix \"tmbinc\" Domke"}],"links":[{"href":"https://media.ccc.de/v/32c3-7331-the_exhaust_emissions_scandal_dieselgate","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/812/original/32C3_-_Dieselgate_FINAL_slides.pdf?1451238103","title":"Presentation slides"}],"start":"14:00","duration":"01:00","room":"Hall 1","slug":"32c3-7331-the_exhaust_emissions_scandal_dieselgate","title":"The exhaust emissions scandal („Dieselgate“)","subtitle":"Take a deep breath into pollution trickery","track":null,"type":"lecture","language":"en","abstract":"Analysis of the emission scandal shaking the German automotive industry from a procedural, organizational and technical level. Includes insight into cheating for advanced managers and code extraction from ECUs from Ebay. And from Volkswagen. Initially.","description":"The exhaust emission scandal has visibly shaken the confidence auto buyers put into the German automotive industry.\r\nThe details are – half a year after Volkswagen managers confessed to fraud – scarce, very scare.\r\nBoth around the procedural and the technical details of the betrayal. Daniel will show how engineering a Electronic Control Unit (ECU) works, and how many people are involved.\r\nAnd he will take a look at the revealing communication from the affected parties. That try to share nothing with many words but still reveal a few interesting details.\r\nFelix takes the other approach and looks at body of evidence that 8+ million people have access to but too few took a closer look.\r\nHe will share the tricks to extract the firmware from the affected engine control units and share the findings he made along the way and when he looked at the plain and honest truth in code.","logo":null},{"guid":"fca4934b-5f01-4680-8cda-03fa206aac17","id":"7139","date":"2015-12-27T15:00:00.000Z","day":"1","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"5860","name":"Clifford"}],"links":[{"href":"http://www.clifford.at/yosys/","title":null},{"href":"http://www.clifford.at/icestorm/","title":null},{"href":"https://github.com/cseed/arachne-pnr","title":null},{"href":"https://media.ccc.de/v/32c3-7139-a_free_and_open_source_verilog-to-bitstream_flow_for_ice40_fpgas","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 1","slug":"32c3-7139-a_free_and_open_source_verilog-to-bitstream_flow_for_ice40_fpgas","title":"A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog synthesis and verification tool.\r\n\r\nProject IceStorm aims at reverse engineering and documenting the bit-stream format of Lattice iCE40 FPGAs and providing simple tools for analyzing and creating bit-stream files, including a tool that converts iCE40 bit-stream files into behavioral Verilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully documented and supported by the tools. \r\n\r\nArachne-PNR is an Open Source place&route tool for iCE40 FPGAs based on the databases provided by Project IceStorm. It converts BLIF files into an ASCII file format that can be turned into a bit-stream by IceStorm tools.\r\n\r\nThis three projects together implement a complete open source tool-chain for iCE40 FPGAs. It is available now and it is feature complete (with the exception of timing analysis, which is work in progress).","description":null,"logo":null},{"guid":"56721a59-30c0-4201-8744-5d2a9846ed28","id":"7196","date":"2015-12-27T16:15:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6007","name":"Philipp Winter"}],"links":[{"href":"https://nymity.ch/active-probing/","title":null},{"href":"https://media.ccc.de/v/32c3-7196-how_the_great_firewall_discovers_hidden_circumvention_servers","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/709/original/ensafi2015b.pdf?1443404961","title":"Research paper"},{"href":"/system/event_attachments/attachments/000/002/825/original/32c3-slides.pdf?1451312530","title":"Talk slides"}],"start":"17:15","duration":"01:00","room":"Hall 1","slug":"32c3-7196-how_the_great_firewall_discovers_hidden_circumvention_servers","title":"How the Great Firewall discovers hidden circumvention servers","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Several years ago, the Great Firewall of China was silently upgraded to find and block circumvention servers that employ encryption to defeat deep packet inspection. The system is now used to block protocols such as Tor, SoftEther, and SSH. In this talk, we will give an overview of how this system works, and how it can be circumvented.","description":"The GFW's reactive probing system scans egress network traffic for circumvention protocol signatures, and then launches short-lived probes to verify if the suspected server is, in fact, speaking the circumvention protocol. If that is the case, the GFW adds the IP address and port of the server to a country-wide blacklist, preventing people in China from connecting to it. We recently finished a multi-month research project in which we looked at the system from different angles to answer several open questions. In particular, we will talk about:\r\n<ul>\r\n<li>How the reactive probing system makes use of thousands of unique IP addresses to launch its probes.</li>\r\n<li>We discuss our hypotheses on the physical design of the reactive probing system. Our evidence shows that all these IP addresses are either hijacked, or that the GFW operates a large, geographically distributed network of proxies.</li>\r\n<li>We show patterns in the IP, TCP, and TLS headers that suggest that the thousands of reactive probing IP addresses we harvested are controlled by few centralized systems.</li>\r\n<li>How the system seems to flush its blacklist regularly, providing a short window for circumvention.</li>\r\n<li>The effectiveness of the system, i.e., how good is it at blocking servers and how well does it scale?</li>\r\n<li>How the GFW seems to treat science and education networks different from consumer networks.</li>\r\n<li>Ways to troll the Great Firewall of China.</li>\r\n</ul>","logo":null},{"guid":"27260dd7-65b6-40ec-8929-2b96b45aa368","id":"7490","date":"2015-12-27T17:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3530","name":"Sergey Gordeychik"},{"id":"5274","name":"Aleksandr Timorin"},{"id":"3686","name":"repdet"}],"links":[{"href":"https://media.ccc.de/v/32c3-7490-the_great_train_cyber_robbery","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall 1","slug":"32c3-7490-the_great_train_cyber_robbery","title":"The Great Train Cyber Robbery","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"For years SCADA StrangeLove team speaks about vulnerabilities in Industrial Control Systems. Now we want to show by example of railway the link between information security and industrial safety and demonstrate how a root access gained in a few minutes can bring to naught all the years of efforts that were devoted to the improvement of fail-safety and reliability of the ICS system.\r\n\r\nRailroads is a complex systems and process automation is used in different areas: to control power, switches, signals and locomotives. At this talk we will analyze threats and vulnerabilities of fundamental rail-road automation systems such as computer based interlocking, automatic train control and automatic train protection. \r\n\r\nNo vendor names and vulnerabilities details will be released, for obvious reasons. By the way, all research based on hands-on security exercises and most of issues are confirmed and processed by vendors.","description":null,"logo":"/system/events/logos/000/007/490/medium/ezgif-557547965.gif?1449953485"},{"guid":"aa5412e2-c20a-4c4a-b4d7-fd97184a87fe","id":"7236","date":"2015-12-27T19:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4825","name":"Trammell Hudson"}],"links":[{"href":"https://media.ccc.de/v/32c3-7236-thunderstrike_2","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall 1","slug":"32c3-7236-thunderstrike_2","title":"Thunderstrike 2","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Last year at 31c3 we disclosed <a href=\"https://trmm.net/Thunderstrike_31c3\">Thunderstrike</a>, the first firmware attacks against Macbooks.","description":"This year we’ve ported old UEFI vulnerabilities to the Mac and will demo <a href=\"<a href=\"https://trmm.net/Thunderstrike2_details\">Thunderstrike 2</a>, an extension to the attack that no longer requires physical access and can replicate via shared Thunderbolt devices. ","logo":null},{"guid":"489a414b-2d6b-4f20-8187-813169ca19c9","id":"7171","date":"2015-12-27T20:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5921","name":"David Kaplan"}],"links":[{"href":"https://media.ccc.de/v/32c3-7171-when_hardware_must_just_work","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/801/original/When_HW_must_just_work_--_FINAL.pdf?1451143699","title":"Slides"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"21:45","duration":"01:00","room":"Hall 1","slug":"32c3-7171-when_hardware_must_just_work","title":"When hardware must „just work“","subtitle":"An inside look at x86 CPU design","track":null,"type":"lecture","language":"en","abstract":"Software design and testing is hard, but what happens when each bug fix can cost months of delay and millions of dollars? In this talk we’ll take a behind-the-scenes look at the challenges in the design of a very complex, yet critical piece of hardware: the modern x86 CPU.","description":"All hardware design and testing is complex, but x86 CPUs are designs that must work correctly basically 100% of the time. They are critical not only for running your applications, but for enforcing the security of the entire system. In this talk, we’ll explore what modern x86 CPU hardware looks like, describe some of the methodology around CPU testing, and discuss real-world hardware design. \r\n\r\nSo does that all make flawless hardware? Of course not! CPU bugs do happen, and when dealing with hardware bugs, it’s rarely as simple as “download this patch”. This talk will additionally look at some of the various capabilities used with modern chips to address late-breaking issues, from special configuration bits to microcode to even focused ion beams.\r\n\r\nThe goal of this talk is to not only provide the listener with a glimpse into the world of complex hardware design, but to hopefully inspire software engineers with new ideas on how to test equally critical software that must “just work”.","logo":"/system/events/logos/000/007/171/medium/central-processing-unit-md.png?1447700667"},{"guid":"1b6ed158-e206-416a-8705-9b285a428dbf","id":"7210","date":"2015-12-27T22:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"3538","name":"djb"},{"id":"3714","name":"Tanja Lange"}],"links":[{"href":"https://media.ccc.de/v/32c3-7210-pqchacks","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/816/original/slides.pdf?1451252317","title":"slides.pdf"}],"start":"23:00","duration":"01:00","room":"Hall 1","slug":"32c3-7210-pqchacks","title":"PQCHacks","subtitle":"A gentle introduction to post-quantum cryptography","track":null,"type":"lecture","language":"en","abstract":"<p>Last year your friend Karen joined the alternative music scene and sent you a sound track. The government is recording everything, and this year announced that alternative music is a gateway drug to terrorism (see <a href=\"http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism\">http://www.theguardian.com/australia-news/2015/sep/25/radicalisation-kit-links-activism-and-alternative-music-scene-to-extremism</a>). Fortunately, Karen encrypted the email.</p>","description":"<p>Fast forward to 2035. Stasi 2.0 has risen to power and has decided that, to protect society, anyone who has ever been exposed to alternative music will be sent to a „better place“. They still have a copy of Karen’s ciphertext. And here’s the really bad news: They’ve just finished building a billion-qubit quantum computer.</p>\r\n\r\n<p>Back in 2015, large general-purpose quantum computers haven’t been built yet, but the consensus is that they will be built, and that they will allow well-funded attackers to retroactively break practically all of today's deployed public-key cryptography.\r\nRSA will be dead.\r\nECC will be dead.\r\nDSA will be dead.\r\n„Perfect forward secrecy“, despite its name, won’t help.\r\n</p>\r\n\r\n<p>Fortunately, there are replacement public-key cryptosystems\r\nthat have held up very well against analysis of possible attacks,\r\nincluding future quantum attacks.\r\nThis talk will take a hands-on look at the two examples\r\nwith the longest track records: namely, hash-based signatures (Merkle trees) and code-based encryption (McEliece).\r\n</p>\r\n\r\n<p>The talk will be given as a joint presentation by Daniel J. Bernstein and Tanja Lange.</p>","logo":null},{"guid":"ffa37241-83fe-40ca-9a5a-7c886d5879c0","id":"7566","date":"2015-12-27T23:15:00.000Z","day":"1","recording":{"license":null,"optout":true},"persons":[{"id":"6400","name":"Bühne für Menschenrechte"}],"links":[],"attachments":[],"start":"00:15","duration":"01:30","room":"Hall 1","slug":"32c3-7566-die_asyl-dialoge_the_asylum_dialogues","title":"Die Asyl-Dialoge / The Asylum Dialogues","subtitle":"Dokumentarisches Theater / Documentary Theatre","track":null,"type":"performance","language":"de","abstract":"Die ASYL-DIALOGE erzählen von Begegnungen, die Menschen verändern, von gemeinsamen Kämpfen in unerwarteten Momenten – eine dieser Geschichten spielt in Osnabrück, wo seit März 2014 ein breites Bündnis solidarischer Menschen bereits 37 Abschiebungen verhindern konnte und somit für viele bundesweit zum Vorbild wurde...","description":"The Asylum Dialogues\r\nDocumentary Theatre - Actors for Human Rights Germany\r\nin German, with English, French and Arabic subtitles\r\n\r\nThe ASYLUM DIALOGUES speak about encounters which change people, about joint fights in unexpected moments - one of the stories takes place in Osnabrück, where - since March2014 - a coaltion of solidary people could prevent until today 37 deportations and became a role model nationwide.\r\n","logo":"/system/events/logos/000/007/566/medium/Asyl_Dialoge_Premiere_Foto_15.jpg?1450370014"},{"guid":"d66db4df-49ed-4c9f-ada3-289d16786c8e","id":"7324","date":"2015-12-27T10:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3660","name":"greenstadt"}],"links":[{"href":"https://blog.torproject.org/blog/call-arms-helping-internet-services-accept-anonymous-users","title":null},{"href":"https://blog.torproject.org/blog/study-what-value-anonymous-communication","title":null},{"href":"https://media.ccc.de/v/32c3-7324-what_is_the_value_of_anonymous_communication","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/813/original/32c3-Anon.pdf?1451238511","title":"Slides"}],"start":"11:30","duration":"01:00","room":"Hall 2","slug":"32c3-7324-what_is_the_value_of_anonymous_communication","title":"What is the value of anonymous communication?","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"What does the fact that Tor users can’t edit wikipedia mean for the quality of the ``encyclopedia that anyone can edit?’’ How do captchas and blocking of anonymity services affect the experiences of Tor users when they are trying to contribute content? This talk will discuss the increasing limitations of active participation in the anonymous Internet and the findings of our interview study of Tor users and wikipedia editors concerning these issues. We believe that by understanding the contributions Tor users make—and that people denied access to anonymity tools don't make—we can help make the case for the value of anonymity online.","description":"The belief that a free and open Internet enables people to accomplish great things together is at the core of projects like Wikipedia, open source software, and online political activism. The term “peer production” has been used for years to describe a new kind of collaborative project-—one that is facilitated by the Internet and in which people self-organize to create things they value, whether that’s software, encyclopedias, news, maps, or just about anything else. But research about these projects and how they work generally doesn't take into account the value of anonymous participation.\r\n\r\n Moderating user-generated or peer-produced content has challenges and many services (Yelp, Google, Wikipedia, Cloudflare, etc) have turned to third party blacklists, real-name policies, and banning users of anonymity networks like Tor to handle real and perceived abuse issues.\r\nThe result of such decisions in aggregate means that the Internet offers uneven opportunities for participation and engagement. It’s easy to imagine anonymous participants as only jerks and trolls, but much harder to quantify the contributions that don’t happen when anonymity is banned or made more difficult.\r\n\r\nWe interviewed Tor users about their participation in peer production projects and Wikipedia editors about their privacy concerns. In this talk, we will share stories about the contributions of anonymous participants and the chilling effects of limiting anonymity ---topics not edited and people silenced.","logo":null},{"guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","id":"7352","date":"2015-12-27T11:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6124","name":"Joanna Rutkowska"}],"links":[{"href":"https://media.ccc.de/v/32c3-7352-towards_reasonably_trustworthy_x86_laptops","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 2","slug":"32c3-7352-towards_reasonably_trustworthy_x86_laptops","title":"Towards (reasonably) trustworthy x86 laptops","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Can we build trustworthy client systems on x86 hardware? What are the main challenges? What can we do about them, realistically? Is there anything we can?","description":"In the first part we will take a look at the security problems we encounter on modern Intel-based x86 systems, specifically on laptops. In the second part we will discuss how most (all?) of these problems could be addressed, with just minimal hardware modifications realizable by laptop OEMs.","logo":null},{"guid":"7d2e79be-5d42-425b-a335-c41fd18431fb","id":"7153","date":"2015-12-27T13:00:00.000Z","day":"1","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"2506","name":"Sec"},{"id":"5339","name":"schneider"}],"links":[{"href":"https://media.ccc.de/v/32c3-7153-rad1o","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/814/original/rad1o-32c3.pdf?1451240728","title":"Slides"}],"start":"14:00","duration":"01:00","room":"Hall 2","slug":"32c3-7153-rad1o","title":"rad1o++","subtitle":"half a year later","track":null,"type":"lecture","language":"en","abstract":"News about the rad1o half a year later – cool stuff that happened, and why you need an SDR.","description":"The rad1o was the badge for the Camp 2015. This talk will be a bit about what went into a project of this size, what went well and what not so much. The main part is about what we (and lots of other volunteers) have done with it – both standalone and with a computer, and why y’all need to play more with SDR. ","logo":null},{"guid":"7430c969-7ccf-4d40-903a-d9b1ebb4fb15","id":"7146","date":"2015-12-27T15:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4262","name":"Peter Laackmann"},{"id":"4408","name":"Marcus Janke"}],"links":[{"href":"https://media.ccc.de/v/32c3-7146-hardware-trojaner_in_security-chips","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/805/original/Hardware_Trojaner_in_Security_Chips-P_Laackmann_M_Janke.pdf?1451215469","title":"Hardware_Trojaner_in_Security_Chips-P_Laackmann_M_Janke.pdf"}],"start":"16:00","duration":"01:00","room":"Hall 2","slug":"32c3-7146-hardware-trojaner_in_security-chips","title":"Hardware-Trojaner in Security-Chips","subtitle":"Eine Reise auf die dunkle Seite","track":null,"type":"lecture","language":"de","abstract":"Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen Einblick in die Welt der Hardware-Trojaner, auf welchem Wege „Institutionen“ versuchen können, sich versteckten Zugang zu Sicherheits-Hardware zu verschaffen.","description":"Wer bzw. was kann Hersteller dazu bringen, den Einsatz von „Backdoors“ zu akzeptieren, zu billigen, zu unterstützen oder sogar selbst zu initiieren? Wann ist es Mutwilligkeit, wann Ignoranz, wann Dummheit?\r\n\r\nVersteckte Zugänge zu Sicherheitschips, auch als „Backdoors“ bekannt, stellen eine erhebliche Bedrohung für die Sicherheit persönlicher Daten in vielen heutigen Anwendungen dar. Die Referenten zeigen detailliert, auf welchem Wege „Institutionen“ versuchen können, sich versteckten Zugang zu Sicherheits-Hardware zu verschaffen. Die Beispiele reichen von der einfachen Firmware-Änderung über Schaltungsmodifikationen in Herstellungsmasken, bis hin zu Sondertechnologien, deren Nutzung als „Backdoors“ auch in der Zertifizierung nahezu undetektierbar ist. \r\n\r\nGleichzeitig wird gezeigt, auf welchen Wegen jeder Beteiligte in Entwicklung, Produktion und Anwendung helfen kann, „Backdoors“ schon im Ansatz zu verhindern. Besonderes Augenmerk liegt auf der Erkennung bestimmter als vermeintliche „Sicherheitsfeatures“ angepriesener Technologien, die jedoch ihren Einsatz als Hardware-Trojaner stark begünstigen und somit geradezu herausfordern. \r\n\r\nAuch der moralisch-ethische Aspekt soll beleuchtet werden: Wer bzw. was kann Hersteller dazu bringen, den Einsatz von „Backdoors“ zu akzeptieren, zu billigen, zu unterstützen oder sogar selbst zu initiieren? Wann ist es Mutwilligkeit, wann Ignoranz, wann Dummheit? \r\n\r\nDer Vortrag zeigt, was man gegen diese Bedrohung schon präventiv auf jeder Ebene unternehmen kann und wie sich die Abwesenheit von „Backdoors“ wirksam kontrollieren läßt. \r\n\r\nDie Autoren blicken auf über 25 Jahre private und fast 20 Jahre berufliche Erfahrung im Bereich Chipkarten-Angriffsmethoden zurück. Nach ihren allerersten Chipkarten-Vorträgen und -Workshops 1991-93 auf den CCC-Kongressen im Eidelstädter Bürgerhaus knüpfen die Referenten nun an ihren Überblick „25 Jahre Chipkartenangriffe“ auf dem 30C3 an.","logo":"/system/events/logos/000/007/146/medium/PLMJ_Logo_Vortrag_quadr_500px.jpg?1442927272"},{"guid":"4c070a2c-0558-48b8-b612-b8507a51154e","id":"7510","date":"2015-12-27T16:15:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"821","name":"Ilja van Sprundel"}],"links":[{"href":"https://media.ccc.de/v/32c3-7510-windows_drivers_attack_surface","title":null}],"attachments":[],"start":"17:15","duration":"01:00","room":"Hall 2","slug":"32c3-7510-windows_drivers_attack_surface","title":"Windows drivers attack surface","subtitle":"some 'new' insights","track":null,"type":"lecture","language":"en","abstract":"This presentation covers windows kernel driver security issues. It'll discuss some background, and then give an overview of the most common issues seen in drivers, covering both finding and fixing issues.","description":"In this presentation I intent to cover a rapid fire set of issues that commonly occur in windows drivers. From the trivial (ioctl, probing) to the obscure and subtle. The presentation will discuss these issues, illustrate them with examples, and offer developer guidance on how to avoid and mitigate these issues.\r\n\r\nWhether you're a security researcher, a developer looking for some security guidance when writing these drivers, or just generally curious about driver internals, there's something here for all.","logo":null},{"guid":"9ab1407a-126f-48d9-898d-eae7974324e9","id":"7133","date":"2015-12-27T17:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5926","name":"Alexander Graf"}],"links":[{"href":"https://media.ccc.de/v/32c3-7133-beyond_your_cable_modem","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/866/original/Beyond_Your_Cable_Modem.pdf?1452306351","title":"Slides for Beyond Your Cable Modem"}],"start":"18:30","duration":"01:00","room":"Hall 2","slug":"32c3-7133-beyond_your_cable_modem","title":"Beyond your cable modem","subtitle":"How not to do DOCSIS networks","track":null,"type":"lecture","language":"en","abstract":"Did you ever want to have access to a few hundred thousand network end points? Or a few hundred thousand phone numbers? A short look behind the curtains of how not to do network security.","description":"Have you ever wondered why cable modem providers don’t allow you to swap out your modems with your own? \r\n\r\nOnce you look at the network your modem (and thus you once you gain access to it) has access to, a whole new world of security mess-up lies ahead.\r\n\r\nJoin me in exploring how DOCSIS (the standard behind cable modems) works, how it’s used today in a real life example setup, how you could potentially make it secure and what implications this has to you as an end user. I will also show you what happens if you don't look out for security on the DOCSIS network and how that can lead to compromising other people's modems, private networks and telephone access.\r\n","logo":null},{"guid":"16613345-4f8c-44f1-a065-b3fa1d7b51cc","id":"7412","date":"2015-12-27T19:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"1757","name":"LaForge"}],"links":[{"href":"http://openbsc.osmocom.org/","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall 2","slug":"32c3-7412-running_your_own_3g_3_5g_network","title":"Running your own 3G/3.5G network","subtitle":"OpenBSC reloaded","track":null,"type":"lecture","language":"en","abstract":"Seven years after presenting „running your own GSM network“, we are back presenting about how to do the same for 3G (UMTS/HSPA) networks.","description":"Seven years ago, the now famous „running your own GSM network“ talk was held at 25C3, paving the way for a first step into the then-new field of applied research (aka hacking) into mobile communications research.\r\n\r\nThe result of that talk is what is known as OpenBSC. Together with its sister-projects OsmoBTS, OsmoPCU, OsmoNITB, OsmoSGSN and OpenGGSN are commonly used to run GSM/GPRS networks as a means to perform security research, offensive as well as defensive.\r\n\r\nNow, the team behind those projects has finally started work on supporting 3G base station hardware, extending the scope from 2G/2.5G/2.75G technologies towards UMTS, HSDPA and HSUPA.\r\n\r\nThe talk will cover \r\n* what was/is required to implement in terms of the protocol stacks,\r\n* the current status of this work,\r\n* how it integrates into the Osmo* world,\r\n* how it is envisioned to be usd in mobile security research. \r\n\r\nLike at 25C3, there will also be a demo, of course..\r\n","logo":null},{"guid":"2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff","id":"7368","date":"2015-12-27T20:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"1741","name":"Karsten Nohl"},{"id":"6014","name":"Fabian Bräunlein"},{"id":"3456","name":"dexter"}],"links":[{"href":"https://media.ccc.de/v/32c3-7368-shopshifting","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/817/original/151227.32C3-SRLabs-Shopshifting.v1.pdf?1451266222","title":"Slides"}],"start":"21:45","duration":"01:00","room":"Hall 2","slug":"32c3-7368-shopshifting","title":"Shopshifting","subtitle":"The potential for payment system abuse","track":null,"type":"lecture","language":"en","abstract":"Payment systems are old and have – unlike card protocols – seen little scrutiny so far. This talk enumerates design and implementation flaws in payment processing systems, which can defraud consumers and merchants.","description":"Like most embedded devices, payment system elements are potentially vulnerable to a range of attacks. This has not changed in years. What did change, though, is the exposure of these vulnerabilities: Serial interfaces are now exposed via ethernet; proprietary backend protocols are reachable over the Internet TCP, and flaws in real time operating systems are widely known.\r\n\r\nThis talk provides an overview of design issues and implementation vulnerabilities in current payment processing systems, including un-authenticated protocols and insecure hardware implementations, which enable fraud vectors against merchants who operate payment terminals and consumers who use them. Some of them remote and pre-auth ...","logo":null},{"guid":"56e8d345-8c04-4281-9811-d4ed9da8603e","id":"7260","date":"2015-12-27T22:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5165","name":"Inbar Raz"},{"id":"1342","name":"Gadi Evron"}],"links":[{"href":"https://media.ccc.de/v/32c3-7260-apt_reports_and_opsec_evolution_or_these_are_not_the_apt_reports_you_are_looking_for","title":null}],"attachments":[],"start":"23:00","duration":"01:00","room":"Hall 2","slug":"32c3-7260-apt_reports_and_opsec_evolution_or_these_are_not_the_apt_reports_you_are_looking_for","title":"APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for","subtitle":"How advanced threat actors learn and change with innovation in security defense and constant APT reports, and how we can get better","track":null,"type":"lecture","language":"en","abstract":"With the advancement of defensive security and the constant release of research papers into their toolsets, advanced threat actors have had to adapt with new operational security practices, as well as with new technology.","description":"With the advancement of defensive security and the constant release of research papers into their toolsets, advanced threat actors have has to adapt with new operational security practices, as well as with new technology.\r\n\r\nExamples of this are how long it takes for a threat actor to take its operation offline once a public report of it's tools is getting released, or the technology it may be using to cope when its expensive code base that has taken years of development suddenly becomes public property.\r\n\r\nTwo quick examples are the geographical distribution of attacks, which are often (mis)used in attribution, and the use of cryptography for reuse of now public code bases.","logo":null},{"guid":"b08bddb1-9370-4392-a8ca-8e49ad4a3911","id":"7543","date":"2015-12-27T10:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6319","name":"nelles-al-badri"}],"links":[{"href":" http://www.faz.net/aktuell/feuilleton/kunst/noftretete-von-nora-al-badri-u-jan-nikolai-nelles-13937678.html","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/796/original/TheOtherNefertiti_InstallationView101.jpg?1450223542","title":"Installation View, Radio Cinema, Cairo, Egypt"}],"start":"11:30","duration":"01:00","room":"Hall G","slug":"32c3-7543-the_mummy_unwrapped","title":"The mummy unwrapped","subtitle":"Cultural Commons durch Kunstraub","track":null,"type":"lecture","language":"de","abstract":"Eine zweite Büste der ägyptischen Königin sei gefunden worden, meldete Ägyptens größte Zeitung. Der Fund war jedoch Teil einer Kunstaktion, die Museen und Kunstmarkt für deren Umgang mit Antiken kritisiert.","description":"Nelles und Al-Badri haben mit einem portablen Scanner die Daten der Nofretete aus dem Neuen Museum in Berlin geraubt und den daraufhin angefertigten 3D Druck in Kairo ausgestellt. Mit ihrer multimedialen Intervention „The Other Nefertiti“ stellen sie Fragen nach Original und Kopie, nach dem Monopol auf Digitalisate\r\nund fordern die neokolonialen Strukturen von Museen heraus.\r\n\r\nAuf dem Kongress werden sie über notwendige Lügen sprechen und Kunst als oppositionelle Strategie, alternative Erzählungen und wie Deutsche den Terror von Daesh finanzieren.","logo":"/system/events/logos/000/007/543/medium/TheOtherNefertiti_InstallationView102.jpg?1450223541"},{"guid":"a30bcf2c-1abf-4b7b-9554-a6dacbaeba52","id":"7227","date":"2015-12-27T11:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"3618","name":"Kirst3nF"},{"id":"5016","name":"Walter van Holst"}],"links":[],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall G","slug":"32c3-7227-avoiding_kernel_panic_europe_s_biggest_fails_in_digital_policy-making","title":"Avoiding kernel panic: Europe’s biggest fails in digital policy-making","subtitle":"How the institutions fuck up, and how we fuck it up as well","track":null,"type":"lecture","language":"en","abstract":"In recent years, NGOs have been struggling to defend civil rights in Brussels. As human rights defenders, it is part of our job to detect failures in the EU’s digital policy-making. But we rarely have the opportunity to explore the underlying reasons and to debug Europe’s kernel package.","description":"In this talk, we want to analyse the EU’s biggest fails and explore the following questions: Where and why is the European Union failing? Can the EU learn from its failures? Where and what is the European digital rights movement? How do we make our advocacy more successful?\r\n\r\nIn recent months, these fails have received a great deal of attention in the press – Oettinger’s Taliban attacks, Schroedinger’s net neutrality, the cybercybercyber war and the repeated repackaging of ACTA. \r\n\r\nIt is reasonable to say that in a complex system like the European Union, system failure is a perpetual risk. However, for the defence of human rights and, indeed, many other policy issues, limiting those risks is absolutely essential. This is why we want to explore how we can gain insights and use valuable information from recent fails to fix the EU’s vulnerabilities. Most importantly, if we wish to prevent the more serious failures in the future, we need to examine how and where our advocacy fails.\r\n\r\nAccess and European Digital Rights fight for digital rights at the EU level. Although we’re detecting and fighting a large number of failures that the European Union produces with regard to digital policy-making, we’re still very far from preventing the big fails. \r\n\r\nFor instance, instead of proposing real solutions to the migration crisis, the EU’s shortsighted vision focuses on border surveillance. Instead of an urgently needed reform of Europe’s privacy rules, its governments water down the protections for their citizens. Instead of safeguarding the open and neutral internet, the EU paves the way for discrimination by the big telcos. Instead of proposing evidence-based policies, the EU is trying to justify its proposals with evidence-making surveys. \r\n\r\nCertainly, Brussels is obscure, opaque, complicated and far away – but the decisions made there affect us all. Unfortunately, among the many reasons for a failing defense of human rights at EU-level is the political indifference and resignation in our community™, a lack of understanding of the Brussels maze, a lack of awareness of the extent to which our national governments are directly involved in the policy-making process and a lack of communication about what happens in Brussels. During our talk, we therefore want to explore the following questions: Where and why is the European Union failing? Can the EU learn from its failures? Where and what is the European digital rights movement? How do we make our advocacy more successful?","logo":"/system/events/logos/000/007/227/medium/32c3-talk.png?1443539931"},{"guid":"78ea005f-4ddb-44d1-82e5-a2825ddea4e1","id":"7538","date":"2015-12-27T13:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6238","name":"Evan Roth"}],"links":[{"href":"http://evan-roth.com","title":null},{"href":"http://www.evan-roth.com/presentations/32c3/","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall G","slug":"32c3-7538-internet_landscapes","title":"Internet Landscapes","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"In Internet Landscapes, Evan Roth with discuss his work as it relates to visualizing, archiving and understanding the Internet and its effects on culture with a focus on the misuse of communication technologies. Roth will trace his personal and creative history within an Internet landscape that has changed significantly in the last 16 years. The presentation will include a range of work culminating in his more recent pilgrimages to the beaches of the UK, New Zealand and Sweden, where submarine Internet fiber optic cables reach the land. Armed with an array of paranormal technologies, Roth will recount his personal quest to visualize and reconnect with a changing Internet landscape. ","description":null,"logo":"/system/events/logos/000/007/538/medium/P1230031.jpg?1446641151"},{"guid":"5db7d97f-59c9-42d8-abfc-6224bf075f08","id":"7205","date":"2015-12-27T15:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6019","name":"vimja"},{"id":"2603","name":"ari"},{"id":"6351","name":"Patrick Stählin"},{"id":"6379","name":"Hakuna MaMate"}],"links":[{"href":"https://www.ccc-ch.ch/referendum-gen-das-massenuberwachungsgesetz-ndg-in-der-mache.html","title":null},{"href":"https://www.ccc-ch.ch/","title":null},{"href":"https://www.nachrichtendienstgesetz.ch","title":null},{"href":"http://stopbuepf.ch/","title":null},{"href":"https://www.digitale-gesellschaft.ch","title":null},{"href":"https://www.digitale-gesellschaft.ch/sliv","title":null},{"href":"https://piratenpartei.ch","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/811/original/presentation.pdf?1451232216","title":"Folien (Slides)"}],"start":"16:00","duration":"01:00","room":"Hall G","slug":"32c3-7205-netzpolitik_in_der_schweiz","title":"Netzpolitik in der Schweiz","subtitle":"NDG, BÜPF und wie wir uns dagegen wehren","track":null,"type":"lecture","language":"de","abstract":"2015 und 2016 sind wichtige Jahre für die Netzpolitik in der Schweiz, denn die Parlamente entscheiden sowohl die Revision des BÜPF (<b>B</b>undesgesetz betreffend die <b>Ü</b>berwachung des <b>P</b>ost- und <b>F</b>ernmeldeverkehrs) als auch das NDG (<b>N</b>achrichten<b>d</b>ienst<b>g</b>esetz).","description":"Die beiden Gesetze würden den entsprechenden Bundesbehörden deutlich mehr Handlungsfreiheiten einräumen, wenn es um das Sammeln von Daten auf Vorrat und das Überwachen der Telekommunikation geht. Im Vortrag geben wir eine Übersicht über die beiden Gesetze und sprechen darüber, welche Auswirkungen sie unserer Meinung nach haben werden und was wir dagegen unternehmen und bereits unternommen haben.\r\n\r\nEinige der am stärksten kritisierten Punkte der Gesetze sind:\r\n<ul>\r\n<li>Dem Nachrichtendienst wird der Einsatz von Staatstrojanern gestattet,</li>\r\n<li>Dem Nachrichtendienst wird exzessiver Zugriff auf den Internetverkehr in der Schweiz gestattet (Kabelaufklärung),</li>\r\n<li>Die Vorratsdatenspeicherung in der Schweiz wird weiter ausgebaut.</li>\r\n</ul>\r\n\r\nWir gehören zum CCC-CH und zur Digitalen Gesellschaft (Schweiz). In der Schweiz haben die Stimmberechtigten die Möglichkeit, das Referendum zu ergreifen. Gelingt es, innerhalb von einhundert Tagen nach in Kraft treten der Referendumsfrist 50'000 Unterschriften zu sammeln, so kommt der Gesetzesentwurf vor das Stimmvolk, welches das letzte Wort hat. Doch 50'000 Unterschriften wollen erst mal gesammelt werden… Leider werden die Gesetze zeitlich versetzt verabschiedet, so dass die Referendumsfristen nicht, wie ursprünglich erhofft, zusammenfallen. Es ist durchaus denkbar, dass es sich dabei um ein politisches Manöver handelt, da das BÜPF doch deutlich mehr Gegner hat als das NDG.\r\n\r\nIm Falle des NDG hat die Digitale Gesellschaft, zusammen mit der Piratenpartei Schweiz, grundrechte.ch und dem CCC-CH, unter <a href=\"https://www.nachrichtendienstgesetz.ch/\">nachrichtendienstgesetz.ch</a> eine Plattform erstellt, um die Unterschriftensammlung zu koordinieren. Zum Zeitpunkt des 32C3 wird die Referendumsfrist wohl schon beinahe vorbei sein. Wir berichten, wie das Unterschriftensammeln verlaufen ist, was das jetzt zur Folge hat und was wir daraus lernen können – auch in Hinsicht auf das BÜPF, dessen Referendumsfrist wohl kurz nach dem 32c3 beginnen wird. Glücklicherweise hat das BÜPF deutlich mehr Gegner als das NDG, weshalb sich die Initianten von <a href=\"http://stopbuepf.ch/\">stopbuepf.ch</a> gute Chancen erhoffen.\r\n\r\nIm Anschluss an den Talk gibt es eine ausgedehnte Diskussions- und Fragesession zu den behandelten Themen im Raum A.2: <a href=\"https://events.ccc.de/congress/2015/wiki/Session:Diskussion_zur_Netzpolitik_Schweiz\">Siehe hier</a>","logo":"/system/events/logos/000/007/205/medium/ccc-ch.png?1443461603"},{"guid":"dda07b64-844a-4a54-8135-8c03f7ee6718","id":"7189","date":"2015-12-27T16:15:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6000","name":"Yaniv Balmas"}],"links":[],"attachments":[{"href":"/system/event_attachments/attachments/000/002/819/original/key-logger-video-mouse.pdf?1451298638","title":"Presentation Slides"}],"start":"17:15","duration":"01:00","room":"Hall G","slug":"32c3-7189-key-logger_video_mouse","title":"Key-logger, Video, Mouse","subtitle":"How to turn your KVM into a raging key-logging monster","track":null,"type":"lecture","language":"en","abstract":"Key-Loggers are cool, really cool. It seems, however, that every conceivable aspect of key-logging has already been covered: from physical devices to hooking techniques. What possible innovation could be left in this field?","description":"Well, that’s what we used to think too. That is until we noticed that little grey box sitting there underneath a monitor, next to yesterday’s dirty coffee cup. The little grey box that is most commonly known as ‚KVM‘.\r\nThe talk will tell the tale of our long journey to transform an innocent KVM into a raging key-logging monster. \r\nWe will safely guide you through the embedded wastelands, past unknown IC’s, to explore uncharted serial protocols and unravel monstrous obfuscation techniques.\r\nWalking along the misty firmware woods of 8051 assembly we will challenge ambiguous functions, and confront undebuggable environments.\r\n\r\nFinally, we will present a live demo of our POC code and show you that air-gapped networks might not be as segregated as you imagined.\r\nYou will witness that malware code could actually reside outside your computer, persisting through reboots, wipes, formats, and even hardware replacements. \r\nYou might laugh, you might cry, but one thing is certain – you will never look at your KVM the same as before\r\n\r\nOur presentation will guide the audience trough an entire research project process: from the choice of a research subject, the learning stage, trough the many failures along the way, and until a complete success is finally achieved.\r\nOur research process provides useful insights for both entry-level and experienced researchers in the hardware hacking area.\r\n\r\nThis research sheds light on a brand new field that has yet to be uncovered by the security community. We believe that CCC, as one of the world’s largest security convention, will provide the most suitable stage to share our research story and its implications.\r\nAnd finally, this talk is the product of a long research project which was both fulfilling and exciting, we are confident the audience will relive our experiences throughout the presentation.","logo":"/system/events/logos/000/007/189/medium/kvm.png?1447708751"},{"guid":"f79c744f-30d1-4175-a173-2e760049337d","id":"7209","date":"2015-12-27T17:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6024","name":"Simon"}],"links":[{"href":"http://simonmenner.com/pages/Stasi-Index.htm","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall G","slug":"32c3-7209-what_does_big_brother_see_while_he_is_watching","title":"What does Big Brother see, while he is watching?","subtitle":"Uncovering images from the secret Stasi archives.","track":null,"type":"lecture","language":"en","abstract":"In the past years there has been a lot of discussion on the topic of state sponsored surveillance. But hardly any material can be accessed to support the general debate due to vaguely declared security concerns. So we are debating Big Brother with little knowledge about what he actually sees, while he is watching. Over the course of three years, I was able to research the archives left by East Germany's Stasi to look for visual memories of this notorious surveillance system and more recently I was invited to spend some weeks looking at the archive by the Czechoslovak StB. Illustrating with images I have found during my research, I would like to address the question why this material is still relevant – even 25 years after the fall of the Iron Curtain.","description":null,"logo":"/system/events/logos/000/007/209/medium/Simon_Menner_Logo.jpg?1443475530"},{"guid":"28891a0d-98d9-484a-bd59-ccea80852b12","id":"7432","date":"2015-12-27T19:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4190","name":"Ryan Lackey"}],"links":[{"href":"https://media.ccc.de/v/32c3-7432-datahavens_from_havenco_to_today","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall G","slug":"32c3-7432-datahavens_from_havenco_to_today","title":"Datahavens from HavenCo to Today","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Datahavens have long been discussed as a solution to user security and privacy needs. Instinctively, the idea of physical locations where servers for communications, financial privacy, and other services can work is easily understood and seems appealing. As a founder of the HavenCo datahaven on Sealand in 2000, I saw firsthand the potential and the pitfalls of this approach.","description":"Datahavens have long been discussed as a solution to user security and privacy needs. Instinctively, the idea of physical locations where servers for communications, financial privacy, and other services can work is easily understood and seems appealing. As a founder of the HavenCo datahaven on Sealand in 2000, I saw firsthand the potential and the pitfalls of this approach.\r\n\r\nWe will discuss the concept behind datahavens, some specific examples, the legal and technical challenges they face, and how specifically HavenCo failed. While projects to date have largely failed, there is hope for the future, both in the physical datahaven approach and in technical measures, so there is good reason to be optimistic.","logo":null},{"guid":"777ec642-2866-4617-9789-91cba4a2b313","id":"7163","date":"2015-12-27T20:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"2410","name":"gannimo"},{"id":"6403","name":"[email protected]"}],"links":[{"href":"https://media.ccc.de/v/32c3-7163-new_memory_corruption_attacks_why_can_t_we_have_nice_things","title":null}],"attachments":[],"start":"21:45","duration":"01:00","room":"Hall G","slug":"32c3-7163-new_memory_corruption_attacks_why_can_t_we_have_nice_things","title":"New memory corruption attacks: why can't we have nice things?","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel attacks against those defense mechanisms. Novel defense mechanisms like Control-Flow Integrity (CFI) and Code-Pointer Integrity (CPI) promise to stop control-flow hijack attacks. We show that, while they make attacks harder, attacks often remain possible. Introducing novel attack mechanisms, like Control-Flow Bending (CFB), we discuss limitations of the current approaches. CFB is a generalization of data-only attacks that allows an attacker to execute code even if a defense mechanism significantly constrains execution.","description":"Memory corruption plagues systems not just since Aleph1's article on stack smashing but since the dawn of computing. With the rise of defense techniques like stack cookies, ASLR, and DEP, attacks have grown more sophisticated but control-flow hijack attacks are still prevalent. Attackers can still launch code reuse attacks, often using some form of information disclosure. Stronger defense mechanisms have been proposed but none have seen wide deployment so far due to the time it takes to deploy a security mechanism, incompatibility with specific features, and most severely due to performance overhead.\r\n\r\nControl-Flow Integrity (CFI) and Code-Pointer Integrity (CPI) are two of the hottest upcoming defense mechanisms. After quickly introducing them, we will discuss differences and advantages/disadvantages of both approaches, especially the security benefits they give under novel memory corruption attacks. CFI guarantees that the dynamic control flow follows the statically determined control-flow of the compiled program but an attacker may reuse any of the statically valid transitions at any control flow transfer. CPI on the other hand is a dynamic property that enforces memory safety guarantees like bounds checks for code pointers by separating code pointers from regular data. Data-only attacks are possible both for CFI and CPI.\r\n\r\nCounterfeit Object-Oriented Programming (COOP) and Control-Flow Bending (CFB) are two novel attack mechanisms. COOP reuses complete functions as gadgets, mitigating several defense mechanisms and CFB bends the control flow along valid but unintended paths in the control flow graph of a program. We will discuss COOP and CFB attacks, focusing on mitigating strong novel defense mechanisms.","logo":null},{"guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","id":"7240","date":"2015-12-27T22:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6053","name":"plutoo"},{"id":"6340","name":"derrek"},{"id":"6341","name":"smea"}],"links":[{"href":"http://3dbrew.org/wiki/Main_Page","title":null},{"href":"https://media.ccc.de/v/32c3-7240-console_hacking","title":null}],"attachments":[],"start":"23:00","duration":"01:00","room":"Hall G","slug":"32c3-7240-console_hacking","title":"Console Hacking","subtitle":"Breaking the 3DS","track":null,"type":"lecture","language":"en","abstract":"In 2011 the Nintendo 3DS was released. Today it is the most popular current-gen handheld console, having sold more than 50 million units worldwide. The 3DS features a completely redesigned architecture from its predecessors the DS and the DSi. This talk will focus on the security features of the 3DS, and how we got around them.","description":"We start by presenting a summary of the security system of the 3DS from the ground up. After the introduction, we proceed to elaborately exploit each layer of the 3DS operating system, starting with userspace, kernelspace, and finally gain code-execution in the security processor.\r\n\r\nWe also present how we figured out a hardware secret built into the console, and an early break in the chain of trust.\r\n\r\nBasic knowledge of embedded systems and CPU architectures is recommended, although we aim to also make it enjoyable for non-technical audiences.","logo":"/system/events/logos/000/007/240/medium/3dbrew2.png?1450815330"},{"guid":"3101dcca-7460-45e2-bdb1-c9f597eb462e","id":"7300","date":"2015-12-27T10:30:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5522","name":"holger krekel"}],"links":[{"href":"https://media.ccc.de/v/32c3-7300-hacking_eu_funding_for_a_decentralizing_foss_project","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 6","slug":"32c3-7300-hacking_eu_funding_for_a_decentralizing_foss_project","title":"Hacking EU funding for a decentralizing FOSS project","subtitle":"Understanding and adapting EU legal guidelines from a FOSS perspective","track":null,"type":"lecture","language":"en","abstract":"FOSS and hacker culture meeting the EU buereaucracy. What can possibly come out of that? We'll discuss what is involved for FOSS projects and other interested parties to get $$$ funding by the European Union. Hackers deal with rule systems and their execution. And the European Union issues a lot of rules which are executed by the \"commission\" and its employees. Within the Horizon2020 framework programme 80.000.000.000 Euros will be distributed towards research projects across Europe between 2014-2020. Shouldn't some of that money go to purposes deemed useful by 32c3 attendants?\r\n","description":"No surprise, the formal rules a project has to live by just for an application proposal is somewhat amazing. FOSS hackers, on the other hand, are used to communicate and adapt to a multitude of programs and systems. Looking from the right angle, it can be interesting to understand how an EU funded project is supposed to work.\r\n\r\nEven if you don't usually find arbitrary rule systems and their execution interesting you may learn some interesting bits and pieces about how (not) to interact with the EU - should you decide that your project is ready or desperate enough to go that way. Some of these \"bits and pieces\" can take weeks to research and be summarized in 3 minutes.\r\n\r\nWe'll specifically look and discuss how it played out for the NEXTLEAP\r\nproject which aims to research decentralized crypto protocols and\r\ncommunities. Discussed in the hallways of 31c3 well after midnight it managed to receive 2 Million Euro in funding.\r\n","logo":null},{"guid":"3c818a0e-4148-4ba4-a58f-d2559e9d6a82","id":"7325","date":"2015-12-27T11:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5934","name":"panic"},{"id":"6347","name":"sev"}],"links":[{"href":"http://rexusbexus.net","title":null},{"href":"http://fovs.de/","title":null},{"href":"http://bexus-arca.de/","title":null},{"href":"https://media.ccc.de/v/32c3-7325-rexus_bexus_-_rocket_and_balloon_experiments_for_university_students","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 6","slug":"32c3-7325-rexus_bexus_-_rocket_and_balloon_experiments_for_university_students","title":"REXUS/BEXUS - Rocket and Balloon Experiments for University Students","subtitle":"How to bring student experiments into space.","track":null,"type":"lecture","language":"en","abstract":"The REXUS/BEXUS programme allows students from universities and higher education colleges across Europe to carry out scientific and technological experiments on research rockets and balloons. Each year, two rockets and two balloons are launched, carrying up to 20 experiments designed and built by student teams.\r\nBy reference of two experiments we were involved in, we will explain the way from the experiment idea to the launch and test of it.","description":"Bringing an experiment into space aboard a sounding rocket or into the higher atmosphere aboard a balloon is not as hard as one might think. Students from Europe can simply write a proposal and apply for the REXUS/BEXUS programme, which is realised by an agreement between the German and Swedish space agencies, DLR (German: Deutsches Zentrum für Luft- und Raumfahrt) and SNSB (Swedish National Space Board, Swedish: Rymdstyrelsen). The Swedish share is furthermore accessible to teams from other European countries through ESA.\r\n\r\nFor REXUS, two sounding rockets are launched from northern Sweden every year, each one capable of carrying up to 5 experiments (max. experiment payload mass approx. 40kg) to an altitude of 80-90km. The experiments have to be engineered to withstand at least 20g of acceleration during ascent and descent, and experience milli-gravity when close to the apogee. In addition, the space specific thermal and vacuum environment need to be considered. Since the altitude is too low for reaching an orbit, the rocket motor and payload falls back to ground and is recovered by helicopters. The experiments are then returned to the student teams and the data from the 10min flight can be analysed, for instance, atmospheric measurements or technology demonstrators.\r\n\r\nSimilarly for BEXUS, two balloons per year are launched from the same location in Sweden and allow for carrying up to 12 experiments (max. 100kg). The balloon lifts the gondola with inside experiments to an altitude between 25-30km. After some hours of floating, the balloon is separated and the gondola descents on a parachute. The payload is then recovered by a helicopter and returned to the launch site by truck.\r\n\r\nDuring the talk we will present two experiments which we were involved in:\r\n- Fiber Optical Vibration Sensing Experiment launched on RX15 in May 2014, and\r\n- Advanced Receiver Concepts for ADS-B Experiment launched on BX18 in October 2014\r\nBeside this, we will explain, how other interested students can participate in the next REXUS/BEXUS cycle.\r\n","logo":"/system/events/logos/000/007/325/medium/rb-logov2.png?1443632311"},{"guid":"6ef3da22-6e38-4997-b44d-e279907be98d","id":"7229","date":"2015-12-27T13:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5998","name":"Maik Brüggemann"},{"id":"924","name":"Ralf Spenneberg"}],"links":[{"href":"https://media.ccc.de/v/32c3-7229-plc-blaster","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/833/original/32c3.pdf?1451386379","title":"Slides"}],"start":"14:00","duration":"01:00","room":"Hall 6","slug":"32c3-7229-plc-blaster","title":"PLC-Blaster","subtitle":"Ein Computerwurm für PLCs","track":null,"type":"lecture","language":"de","abstract":"Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm kann selbstständig ein Netzwerk nach Siemens Simatic S7-1200 Geräten in den Versionen 1 bis 3 durchsuchen und diese befallen. Hierzu ist keine Unterstützung durch PCs oder Server erforderlich. Der Wurm „lebt“ ausschließlich in den PLCs.","description":"PLCs der Baureihe Siemens Simatic werden über einen proprietäres Protokoll verwaltet. Mit diesem Protokoll kann ein PLC gestartet und gestoppt werden. Es können Diagnoseinformationen gelesen und der Upload/Download von Benutzerprogrammen durchgeführt werden. Für die S7-300/400 existieren bereits OpenSource-Lösungen die das Siemens Protokoll unterstützen. Mit der Einführung der neuen Produktreihe S7-1200 wurde das alte Protokoll von Siemens abgelöst und durch ein neues Protokoll ersetzt. Zu diesem neuen Protokoll steht weder eine offizielle Dokumentation zur Verfügung noch existieren veröffentlichte Untersuchungen. Wir haben dieses Protokoll basierend auf der S7-1200v3 analysiert und können beliebig Benutzerprogramme mit diesem Protokoll auf einer PLC installieren bzw. auslesen.\r\n\r\nHierauf aufbauend haben wir einen PLC-Wurm entwickelt, der selbstständig ein beliebiges Netzwerk nach S7-1200v3 Geräten durchsucht und diese befällt wenn die Schutzmechanismen ausgeschaltet sind. Der Wurm ist ausschließlich in der Programmiersprache SCL programmiert und benötigt keine weitere externe Unterstützung. Für die Fernsteuerung der infizierten PLCs haben wir einen Command&Control Server implementiert. Infizierte Geräte können sich automatisch mit diesem Server verbinden. Über diese Schnittstelle können wir aus der Ferne beliebige Steuerausgänge verändern. Eine Proxy-Funktionalität erlaubt es uns über einen Tunnel auf weitere Systeme in dem Netzwerk zuzugreifen. Schließlich kann über den Steuerungsserver auch der Defect-Modus ausgelöst werden. Hierdurch stellt die PLC ihre Arbeit ein. In diesem Modus ist ein Kaltstart der PLC erforderlich. Dies werden wir im Rahmen des Vortrags vorführen.\r\n\r\nDiese Arbeit zeigt, wie wichtig es ist, dass Inbetriebnehmer die vorhandenen PLC Sicherungsmechanismen verwenden. Außerdem sollten die neusten PLC Softwareversionen und Funktionalitäten genutzt werden.","logo":"/system/events/logos/000/007/229/medium/blaster_logo.png?1451386492"},{"guid":"1d7d4787-c77a-4e6e-9398-f3b4dcaa3587","id":"7174","date":"2015-12-27T15:00:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3993","name":"Florian Grunow"},{"id":"6354","name":"Niklaus Schiess"}],"links":[{"href":"https://www.insinuator.net/2015/07/redstar-os-watermarking/","title":null},{"href":"https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 6","slug":"32c3-7174-lifting_the_fog_on_red_star_os","title":"Lifting the Fog on Red Star OS","subtitle":"A deep dive into the surveillance features of North Korea's operating system","track":null,"type":"lecture","language":"en","abstract":"Angae means \"Fog\" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.","description":"In 2014 the version 3 of North Korea's Red Star operating system was leaked. It is based on Linux and has the look and feel of a Mac. There is also a server version available. We will start the presentation by giving a general overview and presenting findings that already hit the net during the last year, like research on Red Star’s custom browser and its configuration.\r\n\r\nThe focus of the presentation is to explain in depth how the architecture of the components is made up and to give a detailed overview of the privacy invading custom code implemented into the OS.\r\n\r\nThe system is designed to defend and protect itself from changes made from user space. We will analyze the interaction of the components and the protection mechanisms and provide information on how to deactivate some of the malicious functionality of Red Star OS. \r\nNorth Korea abuses the principals of free software to provide an operating system that suppresses free speech. Therefore we think it is necessary to disclose this information to the public and present the audience on how to get around the limitations introduced by North Korea.\r\n\r\nInvestigating functionality that can be used to invade the privacy of users was our primary goal. We found that the features implemented in Red Star OS are the wet dream of a surveillance state dictator. It provides a set of surveillance features like the capabilities to watermark different types of files that can be used to track the distribution of documents and multi-media files. We will have an in depth look on how some of these features built the foundation for a suppressive state in a modern world.","logo":null},{"guid":"b2a1a06b-bafc-4a59-ba6f-dddaee5adddb","id":"7279","date":"2015-12-27T16:15:00.000Z","day":"1","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6078","name":"Marcell Mars"}],"links":[{"href":"https://www.memoryoftheworld.org/","title":null},{"href":"https://media.ccc.de/v/32c3-7279-public_library_memory_of_the_world","title":null}],"attachments":[],"start":"17:15","duration":"01:00","room":"Hall 6","slug":"32c3-7279-public_library_memory_of_the_world","title":"Public Library/Memory of the World","subtitle":"Access to knowledge for every member of society","track":null,"type":"lecture","language":"en","abstract":"Public Library is the synergy of two efforts. First, it makes the case for the institution of public library and its principle of universal access to knowledge. Second, it is an exploration and development of distributed internet infrastructure for amateur librarians. If <a href=\"https://www.memoryoftheworld.org/blog/2014/10/27/public-library-an-essay/\">Public Library</a> is a proposal/RFC <a href=\"\"https://library.memoryoftheworld.org/>Memory of the World</a> is its proof of concept and <a href=\"https://github.com/marcellmars/letssharebooks\">reference implementation</a>. ","description":"In the catalog of History the institution of public library is listed in the category of phenomena of which we humans are most proud. Along with free public education, public healthcare, the scientific method, Universal Declaration of Human Rights, Wikipedia, free software… It’s one of those almost invisible infrastructures that we start to notice only once they go extinct. A place where all people can get access to all knowledge that can be collected seemed for a long time a dream beyond reach – until the egalitarian impetus of social revolutions, the Enlightment idea of universality of knowledge, and the expcetional suspension of the comercial barriers of copyright made it possible.\r\n\r\nThe Internet has, as in many other situations, completely changed our expectations and imagination about what is possible. The dream of a catalogue of the world – a universal access to all available knowledge for every member of society – became realizable. A question merely of the meeting of curves on a graph: the point at which the line of global distribution of personal computers meets that of the critical mass of people with access to the Internet. Today nobody lacks the imagination necessary to see public libraries as part of a global infrastructure of universal access to knowledge for literally every member of society. However, the emergence and development of the Internet is taking place precisely at the point at which an institutional crisis — one with traumatic and inconceivable consequences — has also begun.\r\n\r\nThe reactionary forces of the »old regime« are staging a »Thermidor« to suppress the public libraries from pursuing their mission. Today public libraries cannot acquire, cannot even buy digital books from the world’s largest publishers. The small amount of e-books that they were able to acquire they must destroy after only twenty-six lendings. Libraries and the principle of universal access to all existing knowledge that they embody are losing, in every possible way, the battle with a market dominated by new players such as Amazon.com, Google, and Apple.\r\n\r\nIn 2012, Canada’s Conservative Party–led government cut financial support for Libraries and Archives Canada (LAC) by Can$9.6 million, which resulted in the loss of 400 archivist and librarian jobs, the shutting down of some of LAC’s Internet pages, and the cancellation of the further purchase of new books. In only three years, from 2010 to 2012, some 10 percent of public libraries were closed in Great Britain. The phenomena of which we people are most proud are being undercut and can easily go extinct.","logo":"/system/events/logos/000/007/279/medium/lsb.png?1443617193"},{"guid":"c6f44cff-122c-44f3-bcf9-683577a67e85","id":"7468","date":"2015-12-27T17:30:00.000Z","day":"1","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"1810","name":"rahra"}],"links":[{"href":"https://media.ccc.de/v/32c3-7468-the_ultimate_amiga_500_talk","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall 6","slug":"32c3-7468-the_ultimate_amiga_500_talk","title":"The Ultimate Amiga 500 Talk","subtitle":"Amiga Hardware Design And Programming","track":null,"type":"lecture","language":"en","abstract":"The Amiga was one of the most powerful and wide srpead computers in the late 80's. This talk explains its hardware design and programming.","description":"The Amiga 1000 appeared in 1985 and was followed by the Amiga 500 a few years later, which had the same design concept but was a little bit more powerful. The hardware design was highly sophisticated and powerful and was years ahead to other computers at the time then.\r\nEquipped with the Motorola 68000 Microprocessor as the CPU which was internally a full 32 bit processor and several additional co-processors for various complex DMA tasks it was perfect for graphics-intensive software.\r\n\r\nThis talk explains the hardware in detail, how all those processors interacted and how it was programmed.","logo":"/system/events/logos/000/007/468/medium/amigaworkbench.png?1443676547"},{"guid":"0399a5b3-f539-41ed-b0bc-858d7c987688","id":"7341","date":"2015-12-27T19:30:00.000Z","day":"1","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6049","name":"INCO"}],"links":[{"href":"https://media.ccc.de/v/32c3-7341-so_you_want_to_build_a_satellite","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall 6","slug":"32c3-7341-so_you_want_to_build_a_satellite","title":"So you want to build a satellite?","subtitle":"How hard can it be? An introduction into CubeSat development","track":null,"type":"lecture","language":"en","abstract":"CubeSat are small standardized satellites typically flown as secondary and containerized payloads piggybacking on the launches of larger satellites. Their low entrance cost have been a revolution in opening access to space for a broad range of institutions. In this talk the basics of CubeSat standards, technology and development are going to be presented. The goal is to proliferate the knowledge of what it takes to successfully build, launch and operate a CubeSat within and beyond the hacker community.","description":"It has been 12 years since the first CubeSat was launched. Invented as a standard for university student satellite projects, the advantages of the CubeSat standard made it outgrow the educational field. The (relatively) low entrance hurdle in terms of cost and regulations has inspired many to pursue their own satellite project. But why do about 50% of all first-time CubeSats fail early? This talk is aiming at spreading the knowledge of how to tackle the task of conducting a CubeSat mission. What are the special requirements for CubeSats? How is the space environment different from what we came to expect for earth-based projects? What kind of components are available? What (FOSS) tools are available for the design and verification process? ","logo":null},{"guid":"cc3ee8b6-9fe5-4290-82de-824e0223bef9","id":"7162","date":"2015-12-27T20:45:00.000Z","day":"1","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5936","name":"Peter Buschkamp"}],"links":[{"href":"http://www.mpe.mpg.de/ir/argos","title":null},{"href":"https://media.ccc.de/v/32c3-7162-shooting_lasers_into_space_for_science","title":null}],"attachments":[],"start":"21:45","duration":"01:00","room":"Hall 6","slug":"32c3-7162-shooting_lasers_into_space_for_science","title":"Shooting lasers into space – for science!","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Light of astronomical objects gets distorted as it passes earth’s atmosphere. Adaptive optics can correct this distortion and create images that are as sharp as those taken in space. The correction needs a bright reference star. If there is no such star nearby, an artificial Laser Guide Star can be created in the upper atmosphere.","description":"A lot of clever real time software, hardware and feedback loops steer a deformable mirror to straighten the distorted wavefront. The talk looks at the technologies of this fascinating technique and will also cover the question how to become a laser-rocket-scientist. Also, there will be star-wars like laser pew pew pictures & videos.\r\n\r\nIn the first part I will talk about the background of adaptive optics and how it enables ground-based observations which people though to be impossible only two decades ago. We will look at the building blocks of such a system and how they are combined to work together nicely.\r\n\r\nThe second part will look at a real Laser-AO system, the project I have worked with, ARGOS at the LARGE Binocular Telescope in Arizona. I will present the system in detail and talk about the little things in all the black boxes. Mechanics, electronics, Optics and Software. We will have images and videos of the system at work and look at first test results showing the potential of this system. \r\nARGOS feeds one of three near-infrared multi-object spectrometers that exists on this planet (Instruments name: LUCI). LUCI is used to record light from the universe 11 billion years ago to to answer the question where galaxies came from and how they developed. \r\n\r\nIn the last (somewhat shorter) part I want to briefly talk about what it takes to get into this kind of work, how to become a „laser rocket scientist“. I get this question a lot in Q&A sessions and therefore want to address it right away. There are misconceptions about his type of work and quite a number of people leave the field again – mainly because school and especially university puts up a distorted picture and sometimes questionable promises about careers in science.","logo":null},{"guid":"534b5a9d-f786-4fc9-96d1-a0827125ee6e","id":"7389","date":"2015-12-27T22:00:00.000Z","day":"1","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"3128","name":"Gianteye"}],"links":[{"href":"http://har.ms","title":null},{"href":"http://superreleaser.com","title":null},{"href":"https://media.ccc.de/v/32c3-7389-my_robot_will_crush_you_with_its_soft_delicate_hands","title":null}],"attachments":[],"start":"23:00","duration":"01:00","room":"Hall 6","slug":"32c3-7389-my_robot_will_crush_you_with_its_soft_delicate_hands","title":"My Robot Will Crush You With Its Soft Delicate Hands!","subtitle":"How to design and fabricate soft robots using everyday materials","track":null,"type":"lecture","language":"en","abstract":"In this talk Matthew Borgatti, Lead Scientist at Super-Releaser, will take you through the process of turning a puddle of goo into a working soft robot. He will take you through the different mechanisms that can be created, simple processes for fabricating soft robots, and methods for joining elements together into sophisticated assemblies.","description":"Soft robots are slowly trickling out of universities and labs into everyday life. Amazon is experimenting with installing soft grippers on robotic arms to pick any product off a warehouse shelf. DARPA just funded an extensive program to build soft exoskeletons for soldiers to enhance how much they can lift and how long they can march. My lab, Super-Releaser, is developing robotic spacesuit components for NASA as a subcontractor on a SBIR grant. On paper they might seem too complex to whip up at home, but if you’re the kind of person who loved Creepy Crawlers and have access to a 3d printer you can make your very own soft robots.\r\n\r\nLet’s take a step back to explain what a soft robot is and what they're good for. Most robots out there are made from hard parts like steel gears and plastic housings with the occasional rubber wheel or timing belt thrown in. When they respond to their environment it’s usually by reading sensors and using a processor to change their behavior accordingly. This responsiveness is called compliance. There’s another way to get compliance out of an engineered object, though: make the object soft. Everything from goat hooves to octopus tentacles, starfish suckers to human muscles, use softness and springiness to their advantage. When your robot responds to the environment by bending, say around the thing you’re trying to grip, getting a specific output, like putting that thing in a box to get packed up and shipped off, becomes a lot simpler on the computation side of things. Adding compliant mechanisms to your engineering toolbox can add huge problem solving power to any robotics problem you're trying to tackle.\r\n\r\nIn this talk I’m going to describe how I go about fabricating soft robots. There are lots of methods out there – from heat sealing, to stitching, to direct printing – but the method I prefer is casting. I like casting my robots from 3d printed molds because I can test multiple designs in parallel (just print out the different molds with, say, different wall thicknesses or numbers of ribs inside the actuators, all at the same time). It also allows me to experiment with designs in a context that matches the material I’d be using if production were scaled up for mass manufacture. Finally, if I decide I really like the robot I’ve created, making a dozen of them is just a matter of casting that same mold a dozen times.\r\n\r\nI’m going to go over the materials I use and where to find them online, how to go about designing your own soft robot, and some interesting problems in soft robotics that are just waiting for solutions. I’m going to be taking the audience from building the simplest actuators, to methods for fastening parts, to getting airtight seals even at high pressures, to putting everything together into a single-piece walking quadruped.","logo":"/system/events/logos/000/007/389/medium/SR_illo_01.png?1443647065"},{"guid":"f9d33869-f9a2-4570-9e9a-25c56e32082a","id":"7306","date":"2015-12-28T10:30:00.000Z","day":"2","recording":{"license":null,"optout":false},"persons":[{"id":"1633","name":"frank"},{"id":"3995","name":"Linus Neumann"},{"id":"1544","name":"erdgeist"},{"id":"1630","name":"Constanze Kurz"},{"id":"4395","name":"Falk Garbsch"}],"links":[{"href":"https://media.ccc.de/v/32c3-7306-jahresruckblick_des_ccc","title":null}],"attachments":[],"start":"11:30","duration":"02:00","room":"Hall 1","slug":"32c3-7306-jahresruckblick_des_ccc","title":"Jahresrückblick des CCC","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Wir werden einen Überblick über die Themen geben, die den Chaos Computer Club 2015 beschäftigt haben. Neben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünftige Projekte reden.","description":null,"logo":"/system/events/logos/000/007/306/medium/pesthoernchen_weihnacht_250x250.png?1448117187"},{"guid":"8b3cba12-3928-4fb9-b727-ee4bc9e56f51","id":"7280","date":"2015-12-28T13:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5016","name":"Walter van Holst"},{"id":"4149","name":"Nate Cardozo"},{"id":"3224","name":"mlp"},{"id":"5750","name":"Richard Tynan"}],"links":[{"href":"https://media.ccc.de/v/32c3-7280-cyber_all_the_wassenaars","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 1","slug":"32c3-7280-cyber_all_the_wassenaars","title":"Cyber all the Wassenaars","subtitle":"Export controls and exploit regulations: braindead and (in)evitable?","track":null,"type":"podium","language":"en","abstract":"Transposition of the Wassenaar Arrangement, which now also covers export controls on exploits and surveillance technology, into European law is upon us. This panel discusses this, both on process and substance.","description":"The big issue is that this may stifle security research while at the same time we want to stop the Hacking Teams of this world.\r\n\r\nThis is a panel discussing the various good or least bad ways to deal with this. Participants come from civil society and security research.","logo":"/system/events/logos/000/007/280/medium/sand.jpg?1448587724"},{"guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","id":"7135","date":"2015-12-28T15:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"1595","name":"Markus Beckedahl"}],"links":[{"href":"https://media.ccc.de/v/32c3-7135-ein_abgrund_von_landesverrat","title":null}],"attachments":[],"start":"16:00","duration":"00:30","room":"Hall 1","slug":"32c3-7135-ein_abgrund_von_landesverrat","title":"Ein Abgrund von Landesverrat","subtitle":"Wie es dazu kam und was daraus zu lernen ist","track":null,"type":"lecture","language":"de","abstract":"Im Sommer kam heraus, dass der Generalbundesanwalt Ermittlungen gegen zwei Journalisten von netzpolitik.org in Gang gesetzt hatte. Das geschah, weil sich das Bundesamt für Verfassungsschutz dadurch auf den Schlips getreten fühlte, dass Auszüge aus ihren Haushaltsplänen der allgemeinen Bevölkerung bei netzpolitik.org zugänglich gemacht wurden.","description":"Zehn Tage lang gab es in der Sommerpause einen medialen Aufschrei, die Ermittlungen wurden gestoppt. Aber noch immer sind viele Fragen ungeklärt. Warum kam es überhaupt dazu, wer hat politischen Druck ausgelöst und sind die Regeln für die Pressefreiheit im Zeitalter des Internets noch zeitgemäß oder sollten sie dringend an digitale Realitäten angepasst werden?\r\n\r\nDer Vortrag will einerseits zurückblicken, aber auch die Learnings vorstellen, inklusive einer dringend notwendigen Debatte, wie wir ein Update der Pressefreiheit in Deutschland hinbekommen könnten.","logo":"/system/events/logos/000/007/135/medium/maulkorb_whistleblower-300x300.jpg?1448125002"},{"guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","id":"7360","date":"2015-12-28T15:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5995","name":"Vincent Haupert"}],"links":[{"href":"https://www1.cs.fau.de/content/unsicherheit-von-app-basierten-tan-verfahren-im-onlinebanking","title":null},{"href":"https://media.ccc.de/v/32c3-7360-un_sicherheit_von_app-basierten_tan-verfahren_im_onlinebanking","title":null}],"attachments":[],"start":"16:45","duration":"00:30","room":"Hall 1","slug":"32c3-7360-un_sicherheit_von_app-basierten_tan-verfahren_im_onlinebanking","title":"(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Neue App-basierte TAN-Verfahren sollen die etablierten Verfahren ablösen und Onlinebanking komfortabler machen. Die Notwendigkeit von dedizierter Hardware entfällt und Transaktionen können mit nur einem mobilen Endgerät durchgeführt werden. Was von den Kreditinstituten als Feature beworben wird, erweist sich in unserer Untersuchung als fatal. In einem Proof-of-Concept-Angriff demonstrieren wir die Manipulation von Transaktionsdaten und zeigen die konzeptionelle Schwäche von App-basierten TAN-Verfahren.","description":"Die deutschen Kreditinstitute wenden sich zunehmend von den alten TAN-Verfahren ab. Als Motiv zur Erschließung neuer Techniken abseits der indizierten TAN-Liste, mTAN und chipTAN wird neben der Sicherheit auch der fehlende Komfort durch die Notwendigkeit dedizierter Hardware angeführt. Neue App-basierte TAN-Verfahren erlauben es dem Nutzer, eine Transaktion mit seinem mobilen Endgerät (Android oder iOS) auszulösen und auf dem selben Gerät zu bestätigen -- und das bei vermeintlich höherer Sicherheit als bei den etablierten Verfahren. Wir haben die Sicherheit solcher App-basierten TAN-Verfahren am Beispiel des pushTAN-Verfahrens der Sparkassen ausgewertet und attestieren dem Verfahren gravierende konzeptionelle Schwächen. Der bewusste Verzicht auf eigenständige Hardware zur Transaktionsauslösung und -bestätigung macht das Verfahren für Schadsoftware zu einer leichten Beute. Zur Demonstration dieser Schwächen haben wir einen Angriff entwickelt, der vom Nutzer Transaktionen abfängt und vor ihrer Bestätigung nach Belieben manipulieren kann.","logo":"/system/events/logos/000/007/360/medium/logo.png?1448367224"},{"guid":"00abb473-d6cc-4200-9920-3794591fe4d4","id":"7423","date":"2015-12-28T16:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4175","name":"taziden"},{"id":"6395","name":"Adrienne Charmet"}],"links":[{"href":"https://www.laquadrature.net/en/French-Intelligence%3A-the-mad-race-to-international-mass-surveillance","title":null},{"href":"https://www.laquadrature.net/en/Civil-rights-groups-condemn-draft-mass-surveillance-bill-to-be-adopted-in-France","title":null},{"href":"https://www.laquadrature.net/en/surveillance-of-all-citizens-french-government-has-now-carte-blanche","title":null},{"href":"https://www.eff.org/deeplinks/2015/09/frances-government-aims-give-itself-and-nsa-carte-blanche-spy-world","title":null},{"href":"https://media.ccc.de/v/32c3-7423-one_year_of_securitarian_drift_in_france","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/822/original/32C3.pdf?1451303163","title":"Slides"}],"start":"17:30","duration":"00:30","room":"Hall 1","slug":"32c3-7423-one_year_of_securitarian_drift_in_france","title":"One year of securitarian drift in France","subtitle":"From the Bill on Intelligence to the State of Emergency","track":null,"type":"lecture","language":"en","abstract":"Earlier this year, following the tragic events of early January in Paris, the French governement pushed a bill to put a legal framework around Intelligence Services activities. Far from protecting civil liberties, this bill seem to be the translation of Snowden's revelations into law.","description":"Despite the fact this law was in the making for many years, its content seem to be inspired by Snowden's revelations.\r\nFrench intelligent services, willing to become more independent from US ones were certainly waiting for this bill for a long time, giving them uncompared power on every one (IMSI Catchers, algorithmic black boxes in ISP networks, etc etc)\r\nA patch to the law has been voted, legalizing international cable wiretapping for the DGSE (French NSA), providing them legal protection for what existed since at least 2008 as a NouvelObs journalist revealed some weeks ago.\r\n\r\nIn this talk, we'll also give an overview over the legal actions taken by several NGO's to defeat this laws.\r\n\r\nFollowing the November 2015 Paris attacks and the declaration of a state of emergency, we'll extend the initial scope of the talk to give an overview of the latest securitarian/autharitarian developments in France.","logo":null},{"guid":"01da121b-bd49-4805-aaaf-a6ec1f4f941f","id":"7197","date":"2015-12-28T17:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5943","name":"Clémentine Maurice"},{"id":"6293","name":"Daniel Gruss"}],"links":[{"href":"http://arxiv.org/abs/1507.06955","title":null},{"href":"http://www.slate.com/articles/technology/bitwise/2015/07/rowhammer_security_exploit_why_a_new_security_attack_is_truly_terrifying.html","title":null},{"href":"https://media.ccc.de/v/32c3-7197-rowhammer_js_root_privileges_for_web_apps","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/815/original/slides.pdf?1451249325","title":"Slides"}],"start":"18:15","duration":"00:30","room":"Hall 1","slug":"32c3-7197-rowhammer_js_root_privileges_for_web_apps","title":"Rowhammer.js: Root privileges for web apps?","subtitle":"A tale of fault attacks on DRAM and attacks on CPU caches","track":null,"type":"lecture","language":"en","abstract":"\"Insanity: doing the same thing over and over again and expecting different results.\" \r\nAlbert Einstein - Who did not live long enough to see Rowhammer\r\n\r\nRecent studies have found that repeated accesses to DRAM rows can cause random bit flips, resulting in the so called Rowhammer vulnerability. We present Rowhammer.js, the first remote software-induced hardware-fault attack, from JavaScript. We also extend our presentation with an overview of cache side-channel attacks, that use the same technique to evict data from the cache.","description":"Last year, studies demonstrated Rowhammer, a fault attack that can cause random bit flips by repeatedly accessing DRAM rows. This vulnerability has already been exploited to gain root privileges and to evade a sandbox, showing the severity of faulting single bits for security. However, these exploits are written in native code and use special instructions that flush data from the cache.\r\n\r\nIn this talk we present Rowhammer.js [1], a JavaScript-based implementation of the Rowhammer attack. After presenting the native attack, we underline the challenges we faced to trigger the vulnerability from JavaScript, without any special instruction. Beyond DRAM, this attack also requires a very fine understanding of CPU cache internals, that are largely undocumented. We detail our findings on these undocumented parts, and the different steps that led to the attack from JavaScript. We also give an outlook on possible exploits, including gaining root privileges from JavaScript and performing fault attacks on cryptography.\r\n\r\nIn the last part, we extend our presentation with an overview of cache attacks, bridging the gap between hardware-fault attacks and side channels. In side-channel attacks, the attacker doesn't rely on a direct software compromise, but rather on passive observation of hardware characteristics when a victim process runs. In common with Rowhammer.js, these attacks use techniques to evict data from the last-level cache.\r\n\r\n[1] Daniel Gruss, Clémentine Maurice, Stefan Mangard. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. http://arxiv.org/abs/1507.06955","logo":"/system/events/logos/000/007/197/medium/rowhammerjs-logo.jpg?1451249290"},{"guid":"4f1a0717-6931-4580-9e49-5d523be045df","id":"7528","date":"2015-12-28T18:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6259","name":"Roland Bracewell Shoemaker"}],"links":[{"href":"https://media.ccc.de/v/32c3-7528-let_s_encrypt_--_what_launching_a_free_ca_looks_like","title":null}],"attachments":[],"start":"19:00","duration":"00:30","room":"Hall 1","slug":"32c3-7528-let_s_encrypt_--_what_launching_a_free_ca_looks_like","title":"Let's Encrypt -- What launching a free CA looks like","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Let's Encrypt is a new free and automated certificate authority,\r\nthat entered closed beta in October and has already issued a large number of\r\nvalid certificates. This talk will provide a short overview of \r\nhow the Let's Encrypt client and server software work, and explore\r\nstatistics gathered during our closed beta and launch period. ","description":"Let's Encrypt is a new certificate authority that is being launched by a\r\ncollaboration between EFF, Mozilla, Cisco, Akamai, IdenTrust, and a team\r\nat the University of Michigan. It will issue certificates for free,\r\nusing a new automated protocol called ACME for verification of domain\r\ncontrol and issuance.\r\n\r\nThis talk will describe the features of the CA and available clients at\r\nlaunch; discuss ongoing feature development in both the official server and client;\r\nand share statistics on the closed beta and launch periods, as well as looking\r\nat our place within the CA ecosystem post launch.","logo":"/system/events/logos/000/007/528/medium/le-banner1.png?1446157395"},{"guid":"b2a8a8fe-646f-4e32-a4d8-67a163573e36","id":"7130","date":"2015-12-28T19:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5034","name":"Netanel Rubin"}],"links":[{"href":"https://media.ccc.de/v/32c3-7130-the_perl_jam_2","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall 1","slug":"32c3-7130-the_perl_jam_2","title":"The Perl Jam 2","subtitle":"The Camel Strikes Back","track":null,"type":"lecture","language":"en","abstract":"tl;dr EXPLOIT ALL THE PERL. AGAIN.\r\nAfter last year’s Perl crackdown, I decided I have to take the Perl abuse to the next level. This time I focused on Perl’s core, or more specifically, the referencing mechanism, and shattered the security of most Perl CGI projects in the world.","description":"With more WATs, more broken concepts, and more wildly popular 0-days, we will finally prove the Perl language is a broken concept, one that stood tall for way too many years.\r\n\r\nPresenting „The Perl Jam: Exploiting a 20 Year-old Vulnerability“ at 31c3 opened a Pandora’s Box full of Perl debates and controversies. Many of these debates originated from the Perl community itself, with unforgiving arguments such as „vulnerabilities are the developer’s fault“, „RTFM“ and „I really hate the Camel abuse in the presentation“ that were mostly directed at me.\r\n\r\nThis is why I’m proud to say that this year I finally got the message: Finding vulnerabilities in core modules is not enough. I need to prove there are problems in the most fundamental aspects of the Perl language, or the Perl community will keep ignoring the language many issues.\r\nSo I did, and we are going to analyze it in a presentation filled with lolz, WATs, and 0-days, so maybe this time something will change.\r\n\r\nJoin me for a journey in which we will delve into more 0-days in Bugzilla, an RCE on everyone who follows CGI.pm documentation, and precious WTF moments with basically any other CGI module in the world, including (but not limited to) Mojolicious, Catalyst and PSGI, affecting almost every Perl based CGI application in existence.\r\n\r\nI hope this talk will finally prove that developers are NOT the fault here, it’s the LANGUAGE, and its anti-intuitive, fail-prone ‚TMTOWTDI‘ syntax.\r\nbtw, maybe it’s time to check your $$references ;)","logo":"/system/events/logos/000/007/130/medium/perljam.jpg?1449631163"},{"guid":"2f4cd1ef-dd90-4145-a734-141e5c081940","id":"7288","date":"2015-12-28T20:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4228","name":"J. Alex Halderman"},{"id":"3547","name":"Nadia Heninger"}],"links":[{"href":"https://weakdh.org","title":null},{"href":"https://weakdh.org/imperfect-forward-secrecy.pdf","title":null},{"href":"https://media.ccc.de/v/32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you","title":null}],"attachments":[],"start":"21:45","duration":"01:00","room":"Hall 1","slug":"32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you","title":"Logjam: Diffie-Hellman, discrete logs, the NSA, and you","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Earlier this year, we discovered that Diffie-Hellman key\r\nexchange – cornerstone of modern cryptography – is less\r\nsecure in practice than the security community believed. In this\r\ntalk, we’ll explain how the NSA is likely exploiting this weakness to\r\nallow it to decrypt connections to at least 20% of HTTPS websites, 25% of SSH servers, and 66% of IPsec VPNs.","description":"Unlike the NSA, most of us don’t have a billion-dollar budget, but thanks to 1990s-era U.S. crypto backdoors, even attackers with much more modest resources can break the crypto for a sizable fraction of web sites. We’ll explain these flaws and how to defend yourself, and we’ll demonstrate how you too can experiment with Diffie-Hellman cryptanalysis from the comfort of your local hacker space.\r\n\r\nDiffie-Hellman key exchange lets two parties negotiate a shared secret key in the presence of an eavesdropper who can see every message they exchange. This bit of cryptographic magic underlies the security of the Internet, from TLS to SSH, IPsec, Tor, OTR, and beyond.\r\nDiffie-Hellman is widely believed to offer „perfect forward secrecy“ – after you’re done communicating, you can „forget\" your\r\nsecret key and not even the NSA can later reconstruct it. In recent\r\nyears, this property led to the security community (us included!)\r\npromoting Diffie-Hellman over other crypto techniques as a defense\r\nagainst mass surveillance.\r\n\r\nWe were wrong. We’re really sorry.\r\n\r\nIn this talk, we’ll explain how a confluence of number theory, lazy\r\nimplementations, and aging protocols has created a world where anyone willing to spend a few hundred million dollars is likely able to\r\npassively decrypt a huge fraction of Internet traffic. We’ll then go\r\nback for a close reading of the Snowden documents that were published at 31C3 and show how such a cryptanalytic exploit lines up exactly with several of the NSA’s most powerful known decryption capabilities.\r\n\r\nFor those who prefer a more hands-on approach, we’ll tell you how you too can experiment with breaking Diffie-Hellman for the „export-grade“ 512-bit key sizes that were mandated in the 1990s by U.S. crypto regulations. About 8% of popular HTTPS sites still support these weakened keys for use with legacy browsers, but we discovered a TLS protocol flaw, which we named the Logjam attack, that allowed a man-in-the-middle to trick all modern browsers into accepting them.\r\nWe’re pretty sure your browser has shipped a security update to fix\r\nthis by now...\r\n\r\nWe’ll conclude the talk by discussing what went wrong with\r\ncommunication between mathematical cryptographers and security\r\npractitioners, how we can prevent this from happening again, and what flavors of cryptography you should really be using to defend yourself.\r\n(Hint: It starts with „elliptic“ and ends with „curve“.)\r\n","logo":null},{"guid":"e6217eeb-68ef-44b4-8e6e-beebe6a5195c","id":"7154","date":"2015-12-28T22:00:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"2506","name":"Sec"},{"id":"5339","name":"schneider"}],"links":[{"href":"https://media.ccc.de/v/32c3-7154-iridium_update","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/834/original/Iridium-Talk-32c3-final.pdf?1451388665","title":"Slides"}],"start":"23:00","duration":"01:00","room":"Hall 1","slug":"32c3-7154-iridium_update","title":"Iridium Update ","subtitle":"more than just pagers","track":null,"type":"lecture","language":"en","abstract":"Listening to satellites and decoding is fun. We show interesting stuff we found, and how you can get into it.","description":"The Iridium satellite system provides voice and data coverage to satellite phones, pagers and integrated transceivers over Earth's entire surface. It was built by Motorola over 15 years ago, and parts of it remain unchanged to this day.\r\n\r\nLast year we showed how to decode the unidirectional pager messages. Since then we can share our better understanding of some of the protocol but also show listening to the SMS-like bidirectional SBD communication channel. ","logo":null},{"guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","id":"7282","date":"2015-12-28T23:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"1621","name":"Fefe"},{"id":"1633","name":"frank"}],"links":[{"href":"https://media.ccc.de/v/32c3-7282-fnord-jahresruckblick","title":null}],"attachments":[],"start":"00:15","duration":"01:00","room":"Hall 1","slug":"32c3-7282-fnord-jahresruckblick","title":"Fnord-Jahresrückblick","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Wir helfen euch, die Fnords zu sehen, wenn nach einem klaren Fall von Selbstmord der Zensor pinkeln war und die Stahlbälle den maximalen Realitätsabstand eingenommen haben.","description":"Ein munterer Rückblick auf das Jahr mit Würdigung der groteskesten Geschehnisse zwecks Neukalibrierung des Bizarrometers.","logo":"/system/events/logos/000/007/282/medium/bobdobbs2jpg.gif?1444668690"},{"guid":"f6149460-a278-4600-bf9d-61ea737c46de","id":"7143","date":"2015-12-28T10:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4821","name":"Will Scott"},{"id":"6361","name":"Vasilis Ververis"}],"links":[{"href":"https://wills.co.tt/32c3-censorship","title":null},{"href":"https://media.ccc.de/v/32c3-7143-the_state_of_internet_censorship","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 2","slug":"32c3-7143-the_state_of_internet_censorship","title":"The state of Internet Censorship","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"The techniques to control access to the Internet, and the ability to bring transparency to those processes are both continuing to evolve. We’ll give an update on the landscape of online information controls, and our ability to measure them.","description":"The talk will give an update on current country-level practices, the techniques in use to measure them, and an overview of major tools in use.\r\n\r\nOver the past couple years, restrictions on Internet access have grown even more ubiquitous. Many take the form of URL or Domain blacklists implemented by western countries, along with increased levels of self censorship on social platforms with user generated content.\r\n\r\nThe measurement community continues to play a catch-up game. Through a mixture of watching legislature, an increased understanding of what we need to build to keep track of internet controls, and discoveries of side channels that let us externally measure connectivity, we’re making progress!","logo":null},{"guid":"3a221dbd-39c7-4b85-a1fc-73d7e87fd31a","id":"7387","date":"2015-12-28T11:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4366","name":"Thomas Lohninger"}],"links":[{"href":"https://savetheinternet.eu","title":null},{"href":"https://media.ccc.de/v/32c3-7387-net_neutrality_in_europe","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/847/original/32c3-nn.pdf?1451433011","title":"Slides"}],"start":"12:45","duration":"00:30","room":"Hall 2","slug":"32c3-7387-net_neutrality_in_europe","title":"Net Neutrality in Europe","subtitle":"alea iacta est ","track":null,"type":"lecture","language":"en","abstract":"After two years the fight for net neutrality in Europe about the Telecom Single Market Regulation has come to a close. In this talk we will analyse the new net neutrality law and it's consequences and we give you the lessons learned from two years of EU campaigning. ","description":"On 30c3 we launched the <a href=\"https://SaveTheInternet.eu\">SaveTheInternet.eu</a> campaign. Since then activists from all around Europe fought for net neutrality and the freedom of the open internet. At 32c3 the the legislative process in Europe will have come to a close and the campaign will be mostly over. \r\n\r\nIn this talk we will look back and try to learn from past mistakes and successes. What has worked and what didn't? What will the new net neutrality law in Europe actually mean in practice? We assess the repercussions for the European internet and also for the global fight for net neutrality, particularly in the global south. ","logo":"/system/events/logos/000/007/387/medium/savetheinternet-banner-wide.jpg?1443646798"},{"guid":"c3731bcd-04a8-49ba-a472-d1180944c106","id":"7530","date":"2015-12-28T12:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6288","name":"Fredy Kuenzler"}],"links":[{"href":"https://media.ccc.de/v/32c3-7530-buffering_sucks","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/820/original/_32C3_buffering_sucks_fredy_kuenzler.pdf?1451299317","title":"32C3_buffering_sucks_fredy_kuenzler"}],"start":"13:15","duration":"00:30","room":"Hall 2","slug":"32c3-7530-buffering_sucks","title":"Buffering sucks!","subtitle":"An attempt of calculating the economic cost of buffering.","track":null,"type":"lecture","language":"en","abstract":"Buffering sucks! Why we see regular buffering when watching online video. What internet service providers could do to reduce buffering and why big players refuse to act. An attempt of calculating the economic cost of buffering.","description":"It’s all about Net Neutrality. Buffering is the visible effect which makes millions of broadband customers suffer.","logo":null},{"guid":"3aeabb04-6227-4122-8fbc-21e31c04daf0","id":"7562","date":"2015-12-28T13:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6373","name":"Jugend hackt"}],"links":[{"href":"http://jugendhackt.de/projekte","title":null},{"href":"https://media.ccc.de/v/32c3-7562-jugend_hackt_2015","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 2","slug":"32c3-7562-jugend_hackt_2015","title":"Jugend hackt 2015","subtitle":"Projektvorstellungen der JunghackerInnen","track":null,"type":"lecture","language":"de","abstract":"Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend hackt, die mit Code die Welt verbessern. Im Talk möchten die jugendlichen HackerInnen Einblick in ihre Ideen und Projekte geben, und ihre Perspektive auf die Welt vermitteln.","description":null,"logo":"/system/events/logos/000/007/562/medium/logo_claim.png?1449072832"},{"guid":"b753dbd8-32bb-437c-9f15-db0d7ac1811a","id":"7166","date":"2015-12-28T15:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"924","name":"Ralf Spenneberg"},{"id":"5246","name":"Hendrik Schwartke"},{"id":"6362","name":"Oguzhan Cicek"}],"links":[{"href":"https://media.ccc.de/v/32c3-7166-sicherheit_von_125khz_transpondern_am_beispiel_hitag_s","title":null}],"attachments":[],"start":"16:00","duration":"00:30","room":"Hall 2","slug":"32c3-7166-sicherheit_von_125khz_transpondern_am_beispiel_hitag_s","title":"Sicherheit von 125kHz Transpondern am Beispiel Hitag S","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Der Hitag S Transponder wird in verschiedensten Applikationen eingesetzt. Während Angriffe für den Hitag 2 bereits bekannt sind, gilt der Hitag S in der Literatur noch nicht als gebrochen. Wir haben die beschriebenen Angriffe auf den Hitag S übertragen. Wir sind in der Lage den Schlüssel zu brechen und Informationen wie das Kennwort zu ermitteln, obwohl diese zusätzlich vor Lesezugriff geschützt sind. In Abhängigkeit des gewählten Angriffs benötigen wir für das Brechen des Schlüssels zwischen mehreren hundert Tagen und 5 Minuten. Wir haben einen Emulator gebaut, der jeden Hitag S Transponder nachbilden kann. Wird der Transponder in einem Schließsystem eingesetzt, können wir so eine Schlüsselkopie erstellen. \r\nBasierend auf unseren Ergebnissen und den Erfahrungen mit anderen Transpondern aus dem 125kHz Bereich können wir nur vor dem Einsatz in sicherheitskritischen Bereichen warnen.","description":"Die Hitag Transponderfamilie besteht aus mehreren unterschiedlichen Transpondern, zu denen auch der Hitag S gehört. Der Hitag S Transponder wird von dem Hersteller NXP in erster Linie für die folgenden Zwecke empfohlen: Wäscherei-Automation, Logistik, Lagerverwaltung und die Überwachung und Verwaltung von Tierherden. In der Realität werden Sie aber auch in Zutrittskontrollsystemen wie dem blueSmart-System der Firma Winkhaus eingesetzt.\r\n\r\nDer Hitag S Transponder bietet zwei Modi: Plain und Authentication. Im Authentication Mode ist der Zugriff auf den Speicher des Transponders erst nach einer erfolgreichen Authentifizierung möglich. Grundlage der Authentifizierung ist ein 48Bit Pre-Shared-Key. Für dieses Verfahren ist laut Hersteller leserseitig ein Krypto-Coprozessor erforderlich.\r\n\r\nIn diesem Vortrag erläutern wir die unterschiedlichen, bei dem Hitag S, erfolgreich durchgeführten Angriffe zur Überwindung der Authentifizierung bzw. dem Brechen des verwendeten Schlüssels. Hierbei berücksichtigen wir sowohl deren chronologische Entwicklung als auch ihre steigende Komplexität. Neben einem einfachen Replay-Angriff, der uns bereits Zugang zu den auf dem Transponder gespeicherten Daten gibt, kann auch der verwendete Schlüssel gebrochen werden. Während entsprechende Angriffe für den Hitag 2 bereits bekannt sind, gilt der Hitag S in der Literatur noch nicht als gebrochen. Wir haben die beschriebenen Angriffe auf den Hitag S übertragen. Wir sind in der Lage den Schlüssel zu brechen und Informationen wie das Kennwort zu ermitteln, obwohl diese zusätzlich vor Lesezugriff geschützt sind. In Abhängigkeit des gewählten Angriffs benötigen wir für das Brechen des Schlüssels zwischen mehreren hundert Tagen und 5 Minuten. Die hierfür benötigten Daten können mit geeigneter Hardware innerhalb von wenigen Minuten durch Abhören der Funkkommunikation des Transponders mit einem Leser erhalten werden. \r\n\r\nWir haben einen Emulator gebaut, der jeden Hitag S Transponder nachbilden kann. Wird der Transponder in einem Schließsystem eingesetzt, können wir so eine Schlüsselkopie erstellen. \r\nBasierend auf unseren Ergebnissen und den Erfahrungen mit anderen Transpondern aus dem 125kHz Bereich können wir nur vor dem Einsatz in sicherheitskritischen Bereichen warnen. Hierbei ist es unerheblich, ob es sich um ein Online- oder Offline-System handelt. Keiner der uns bekannten 125 kHz Transponder verfügt über ausreichende Kryptographieverfahren, um derartige Angriffe abzuwehren. Daher ist, selbst bei starker Verschlüsselung der Daten auf dem Transponder, es immer möglich mit einem Emulator einen exakten Klon zu erzeugen. Die Lesegeräte, online wie offline, können diesen Klon nicht erkennen. Wenn die RFID-Anwendung die auf dem Transponder gespeicherten Daten nicht ausreichend schützt, können diese auch verändert werden. Bei einer Schließanlage sind dann zum Beispiel beliebige Änderungen der Schließberechtigungen denkbar.\r\n","logo":null},{"guid":"28efa221-42ce-4e2c-aa2c-1b52c87ddeb1","id":"7230","date":"2015-12-28T15:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5845","name":"Peter Löwenstein"}],"links":[{"href":"http://darmstadt.freifunk.net","title":null},{"href":"https://media.ccc.de/v/32c3-7230-lessons_learned_freifunk_fur_gefluchtete","title":null}],"attachments":[],"start":"16:45","duration":"00:30","room":"Hall 2","slug":"32c3-7230-lessons_learned_freifunk_fur_gefluchtete","title":"Lessons learned: Freifunk für Geflüchtete","subtitle":"1 Jahr Freifunk in Südhessen ","track":null,"type":"lecture","language":"de","abstract":"Initiative Freifunk, ein Projekt des Chaos Darmstadt e.V. - Wie kamen wir mit den Verwaltungen, den Verbänden und Parteien ins Gespräch, um freifunk für refugees umzusetzen?","description":"Zeitstrahl Entwicklung von Freifunk Initiative Darmstadt 03/15 bis 12/15\r\nWas hat sich in den 10 Monaten geändert – und warum?\r\n\r\nWelche Parteien haben das Thema Freifunk in kommunale Parlamente Südhessens getragen – und mit welcher Begründung?\r\n\r\nWie reagierten Regierungspräsidium, Bürgermeister und Kreistage als Betreiber der Unterkünfte auf die Freifunk Initiative?\r\n\r\nWelche Apps passen zu Freifunk für Flüchtlinge – und warum?\r\nWas habe ich gelernt?\r\n\r\nWarum Bündnisse eingehen besser ist als auf nur eine Partei zu vertrauen\r\n\r\nErkenne die Chancen auf Veränderungen, wenn die ganze Verwaltung chaotisch geworden zu sein scheint – nur woran?\r\n\r\nTelekom, Vodafone oder unitymedia sind keine Gegner: Vier Argumente für Freifunk, mit der sich trotz den ganz Großen die Rathaustüren für freifunk weit öffnen\r\n\r\nWie Flüchtlinge das Internet nutzen – und wofür nicht. Chancen und Risiken\r\n\r\nFreifunk 2016: Was ich erkennen kann – Ernüchterung, Burnout und Professionalisierung\r\n","logo":"/system/events/logos/000/007/230/medium/footer_skyline.png?1449762496"},{"guid":"17259b49-65ef-4726-ae03-a0b90e45806a","id":"7314","date":"2015-12-28T16:30:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6074","name":"Paul Fuxjaeger"}],"links":[{"href":"https://media.ccc.de/v/32c3-7314-all_our_shared_spectrum_are_belong_to_us","title":null}],"attachments":[],"start":"17:30","duration":"00:30","room":"Hall 2","slug":"32c3-7314-all_our_shared_spectrum_are_belong_to_us","title":"All Our Shared Spectrum Are Belong to Us","subtitle":"Visualizing WLAN Channel Usage on OpenWRT","track":null,"type":"lecture","language":"en","abstract":"\"Signal level is high but throughput is low\" is a common experience in WLAN networks without central management. That causes a lot of frustration, mainly because there is no easy way for users to OBSERVE the presence of interference at all. \r\n\r\nIn order to improve this situation we developed a patch for OpenWRT which makes interference from other sources visible and is able to display the current utilization-ratio (channel load). No additional hardware is required and no interruption of normal operation is necessary - because recent chipsets maintain internal counters for channel load tracking.","description":"We all love WLAN/IEEE802.11 networks. It's wonderful what we do with a few slices of free spectrum without the need for any central coordination.\r\n\r\nThe Problem is: demand for these few radio resources is increasing faster than additional free spectrum gets allocated. A potential tragedy of the commons situation is approaching.\r\n\r\nAdditionally, there is a heavy new user on the block: mobile operators want to start utilizing those free 5GHz bands. Protocols labelled License-Assisted-Access (LAA) or LTE-Unlicensed (LTE-U) have been put into silicon and large scale rollout can be expected to start during 2016.\r\n\r\nThis talk presents a modification to OpenWRT that will help coping with increased interference load over the next years. We think this feature is necessary to avoid a tragedy-of-the-commons situation in license-exempt bands (2.4/5GHz) due to ever increasing demands and node densities. The same way as we would be frustrated when we are unable to measure the general noise level in a room prior to deciding to use it to have a verbal conversation in it.\r\n\r\nWe started testing this feature (modifications to the mac80211 sublayer and to luci) at this years BattleMeshV8 in Maribor, Slovenia. Public release is planned for November 2015.\r\n","logo":null},{"guid":"e34fb384-4da9-44c4-9096-1660d5d57962","id":"7138","date":"2015-12-28T17:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5946","name":"Gregor Ruttner"}],"links":[{"href":"https://media.ccc.de/v/32c3-7138-g_scheitern","title":null}],"attachments":[],"start":"18:15","duration":"00:30","room":"Hall 2","slug":"32c3-7138-g_scheitern","title":"G’scheitern","subtitle":"The art of failure taught by improv theatre ","track":null,"type":"lecture","language":"en","abstract":"„Never ever say no, act your first thought and learn to love mistakes“ – these are the basic rules of improv theatre. I will show how this can be adopted for everyday life.","description":"Improvisational theatre (short „improv theatre“) has a long history but still follows the same basic framework: be open minded and not afraid of yourself and others.\r\nKeith Johnstone, the godfather of this genre, once said: „Good improvisers seem telepathic; everything looks pre-arranged. This is because they accept all offers made – which is something no ‘normal’ person would do.“ They can do so by learning that any mistake can be the origin of something great.\r\nThis can also be seen as a hack of the traditional arts form theatre: Create something awesome out of something awful.\r\nThe mantra behind is „if you fail, fail smartly“ or as we say in Austria <i>G’scheitern</i>.\r\n\r\nThere will also be a workshop for those who want to try out some improv theatre methods.","logo":"/system/events/logos/000/007/138/medium/Gscheitern.png?1451154867"},{"guid":"62290f8e-f515-416f-9c4a-b403474e94e6","id":"7134","date":"2015-12-28T18:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5940","name":"Pedro Noel"},{"id":"5942","name":"Bethany Horne"}],"links":[{"href":"https://data.awp.is/ecuadortransparente/2015/08/04/29.html","title":null},{"href":"https://data.awp.is/ecuadortransparente/2014/11/04/15.html","title":null},{"href":"https://data.awp.is/ecuadortransparente/2014/10/08/10.html","title":null},{"href":"https://netzpolitik.org/2015/leak-wie-der-ecuadorianische-geheimdienst-senain-politiker-und-aktivisten-systematisch-ueberwachte/","title":null},{"href":"https://netzpolitik.org/2015/internationaler-aufruf-gegen-ueberwachung-in-ecuador/","title":null},{"href":"https://awp.is/announcements/2015/09/11/10.html","title":null},{"href":"http://us6.campaign-archive1.com/?u=af0b024f4f6c25b6530ff4c66&id=bc745688b3&e=52036a53c1","title":null},{"href":"https://www.accessnow.org/blog/2015/09/22/announcing-the-2015-heroes-villains-of-human-rights-and-communications-surv","title":null},{"href":"https://media.ccc.de/v/32c3-7134-ecuador_how_an_authoritarian_government_is_fooling_the_entire_world","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/828/original/32c3_Ecuador.odp?1451319211","title":"Slides"}],"start":"19:00","duration":"00:30","room":"Hall 2","slug":"32c3-7134-ecuador_how_an_authoritarian_government_is_fooling_the_entire_world","title":"Ecuador: how an authoritarian government is fooling the entire world","subtitle":"Guess what? The Government of Rafael Correa actually is totally against free-speech and we got proofs on that","track":null,"type":"lecture","language":"en","abstract":"The Ecuadorian government received international visibility when in 2012 it agreed to grant Wikileaks founder Julian Assange political asylum and host him in Ecuador's London embassy. Ecuador has since been widely praised for standing up to the United States to defend the freedom of the press and freedom of expression.\r\n\r\nHowever, the reality is not consistent with this image Ecuador seeks to project. Journalists inside the country face oppressive laws, huge fines and lawsuits for reporting on government corruption. Digital and physical surveillance of journalists and activists is in fact getting worse.\r\n\r\nWe will analyze some of the existing leaks that prove such activities. We will also give a first-hand account from someone who had to literally run away from Ecuador for publishing leaked materials proving illegal espionage against journalists and citizens.\r\n\r\nIs Ecuador really interested in free speech? We don't think so and we will tell you why.","description":"The talk will be divided as the following:\r\n\r\n1. The lie: Wikileaks and free speech advocacy\r\n\r\nAnalysis of current situation and recent past in an international scope.\r\n\r\n2. The truth: Surveillance, oppressive laws and huge fees\r\n\r\nAnalysis of recent cases of freedom of speech suppression in the country (lawsuits, fines, political pressure, surveillance).\r\n\r\nAnalysis of already published leaks proving attacks on freedom of speech, expression and personal privacy.\r\n\r\nAnalysis of government public discourse to legitimate such actions.\r\n\r\n3. A new leak\r\n\r\nA new leak will be published during the talk: a secret document providing strong evidence that the government of Ecuador is not interested in free speech at all - or even freedom itself.\r\n\r\nSpeakers:\r\n\r\nBethany Horne grew up in Ecuador. She worked there for the state newspaper, El Telégrafo, and later for the Free/Libre Open Knowledge Society, a research group operating out of a state university to develop policy for the Ecuadorian government. In 2013, she published a feature article in Newsweek magazine about Ecuador's oil drilling in the Amazon and human rights violations against local indigenous groups. As a result of this publication, she became a target of state surveillance. She now lives in Berlin.\r\n\r\nPedro Noel is co-editor at Associated Whistleblowing Press (AWP). Working on leaks since 2010, took part in more than 30 disclosures of leaked materials and performed analysis on leaked material denouncing wrongdoing and information of public interest in more than 15 countries. He is currently staff of Ecuador Transparente, a digital whistleblowing platform that in August 2015 published 31 pieces of secret information belonging to the Ecuadorian intelligence body.","logo":null},{"guid":"1dcedd27-94b5-433e-a650-dccc1ba3d720","id":"7305","date":"2015-12-28T19:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6096","name":"Christian Schaffner"}],"links":[{"href":"http://homepages.cwi.nl/~schaffne/positionbasedqcrypto.php","title":null},{"href":"https://media.ccc.de/v/32c3-7305-quantum_cryptography","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/823/original/32C3_QCrypto.pptx?1451306481","title":"Talk slides"}],"start":"20:30","duration":"01:00","room":"Hall 2","slug":"32c3-7305-quantum_cryptography","title":"Quantum Cryptography","subtitle":"from key distribution to position-based cryptography","track":null,"type":"lecture","language":"en","abstract":"I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key Distribution) and the latest developments (position-based quantum cryptography) in this fascinating research field. \r\n[No previous knowledge of quantum mechanics is required to follow the talk.]","description":"The most well-known application of <a href=\"https://en.wikipedia.org/wiki/Quantum_cryptography\">quantum cryptography</a> is <a href=\"https://en.wikipedia.org/wiki/Quantum_key_distribution\">Quantum Key Distribution (QKD)</a> which was invented in 1984 by <a href=\"https://en.wikipedia.org/wiki/Charles_H._Bennett_%28computer_scientist%29\">Bennett</a> and <a href=\"https://en.wikipedia.org/wiki/Gilles_Brassard\">Brassard</a>. QKD allows two players Alice and Bob to securely communicate over an insecure line which is overheard by an eavesdropper Eve. Security can be proven in an information-theoretic sense against an unrestricted Eve. Such a high level of security is impossible to achieve with classical communication. In the first part of the talk, I will introduce some basic concepts of quantum information theory in order to understand and appreciate the security of QKD.\r\n\r\nHowever, quantum cryptography offers a wide range of <a href=\"http://arxiv.org/abs/1510.06120\">other applications</a> that go beyond the task of key distribution. For instance, the goal of <a href=\"https://en.wikipedia.org/wiki/Quantum_cryptography#Position-based_quantum_cryptography\">“position-based cryptography”</a> is to use a player’s physical position as cryptographic credential. The combination of relativistic constraints (assuring that information cannot travel faster than the speed of light) and quantum mechanical effects (such as the impossibility to perfectly copy a quantum state) enables entirely new cryptographic applications like sending a message in such a way that it can only be read at a particular geographic position. In the second part, I will introduce you to this intriguing new branch of quantum cryptography.","logo":null},{"guid":"9f89d94f-07fd-47f4-9ad0-c8dda94de175","id":"7502","date":"2015-12-28T20:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6204","name":"Dongkwan"},{"id":"6385","name":"Hongil Kim"}],"links":[{"href":"https://media.ccc.de/v/32c3-7502-dissecting_volte","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/829/original/2015.12.28_CCC_Dissecting_VoLTE.pdf?1451328287","title":"Dissecting VoLTE"}],"start":"21:45","duration":"01:00","room":"Hall 2","slug":"32c3-7502-dissecting_volte","title":"Dissecting VoLTE","subtitle":"Exploiting Free Data Channels and Security Problems","track":null,"type":"lecture","language":"en","abstract":"Newly adopted VoLTE requires changes in all associated parties, such as 3GPP standard, device, operating system, and cellular core networks. Therefore, it is not too surprising that it has security problems. However, it turns out that it has way too many problems. In this talk, we introduce how you can freely send data in the cellular network, and how an attacker can perform caller spoofing and denial of service attacks on calls to disable the target’s calling. Furthermore, we explain how small implementation glitch on VoLTE may lead to break the whole cellular network down.","description":"Voice-over-LTE (VoLTE) is a newly adopted voice technology in the LTE network, whose functionality is similar to VoIP. Even though VoLTE works similar to VoIP, implementing it on the cellular network is not an easy problem because it needs many changes at each component of LTE. If these changes are not securely considered, this may lead to several security problems.\r\n \r\nIn the legacy 3G network, as data and voice are separate, the accounting policies are also different: data is charged based on byte usage, and voice, on time usage. However, in VoLTE, even though voice is delivered as a packet, it is still charged by time usage. Therefore, this strange accounting policy might open free data channels.\r\n \r\nAnother point is that voice signaling for VoLTE is not handled as in the legacy 3G network. Basically, a phone has two processors: an application processor (AP) which runs mobile OSes such as Android and a communication processor (CP) which manages digital signal processing and radio access. In 3G, voice signaling is handled in CP which makes an attacker hard to manipulate it. However, in VoLTE, because voice signaling is handled in AP, an attacker can easily analyze or modify the call flow. Furthermore, this new change can cause problems to the mobile OS.\r\n\r\nTo scrutinize these two points, we analyzed 5 operators, two in the U.S and three in South Korea. As a result, we found four free data channels. For free data channels, an attacker can inject data in the call signaling procedure or voice data transmission. Additionally, the attacker can freely send data to the Internet or to another phone in the cellular network through the VoLTE interface. Furthermore, we discovered five security problems which include no encryption of voice packets, no authentication of call signaling, no call session management, IMS bypassing, and permission model mismatch in Android. We responsibly disclosed all the vulnerabilities to US/KR CERTs and Google in May. We suggest mitigations for each vulnerability, and further propose possible attack vectors that researchers can study on.","logo":"/system/events/logos/000/007/502/medium/11896496_10204301040837794_7127389902016444054_o.jpg?1444639404"},{"guid":"144b2208-bf0b-494c-99e5-665ed18f1e8f","id":"7438","date":"2015-12-28T22:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5003","name":"Nick Sullivan"}],"links":[{"href":"https://media.ccc.de/v/32c3-7438-goto_fail","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/863/original/32c3-sullivan.pdf?1452059372","title":"Nick Sullivan - goto fail;"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"23:00","duration":"01:00","room":"Hall 2","slug":"32c3-7438-goto_fail","title":"goto fail;","subtitle":"exploring two decades of transport layer insecurity","track":null,"type":"lecture","language":"en","abstract":"Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol was broken in ten minutes by Phillip Hallam-Baker and Alan Schiffman during a presentation by Marc Andreesen at MIT in 1994. In the following two decades the protocol has been improved and the implementations have been strengthened, but not without a steady stream of implementation vulnerabilities and protocol design errors. From the ciphersuite rollback attack to LogJam, SSL/TLS has seen a diverse set of problems. In this talk we’ll discuss the pitfalls in designing and implementing a cryptographic protocol and lessons learned from TLS up to version 1.2.","description":"Legend has it, the first iteration of the Secure Sockets Layer (SSL) protocol was broken in ten minutes by Phillip Hallam-Baker and Alan Schiffman during a presentation by Marc Andreesen at MIT in 1994. In the following two decades the protocol has been improved and the implementations have been strengthened, but not without a steady stream of implementation vulnerabilities and protocol design errors. From the ciphersuite rollback attack to LogJam, SSL/TLS has seen a diverse set of problems.\r\n\r\nFrom the HMAC-then-Encrypt vs Encrypt-then-HMAC debate to the preference for Cipher Block Chaining (CBC) modes, the 90s was an innocent time in secure protocol design. Daniel Bleichenbacher had not yet started his assault on RSA and the types of side-channel attacks that enabled BEAST and POODLE had not yet been discovered. Over the next two decades, not only were weaknesses revealed in the protocol, but implementation flaws were found in even the most widely deployed SSL/TLS libraries. By following the security-relevant changes in SSL/TLS over the years we can paint a picture of the hard lessons learned by the cryptographic community over the history of this protocol all and how we can prevent ourselves from repeating the mistakes of the past.","logo":null},{"guid":"be3ed16d-1ef3-4c38-b45c-8e4696d05f27","id":"7572","date":"2015-12-28T23:15:00.000Z","day":"2","recording":{"license":null,"optout":false},"persons":[],"links":[],"attachments":[],"start":"00:15","duration":"02:00","room":"Hall 2","slug":"32c3-7572-methodisch_inkorrekt_live-stream","title":"Methodisch inkorrekt! (Live-Stream)","subtitle":"Die Wissenschaftsgala vom 32C3","track":null,"type":"performance","language":"de","abstract":"### LIVE-STREAM ###\r\nNicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle Forschung, Experimente und ihren wissenschaftlichen Alltag an einer deutschen Hochschule. Fachübergreifend, abwechslungsreich, unstrukturiert, hoffnungslos subjektiv und immer garantiert methodisch inkorrekt.","description":"Eigentlich ein Podcast der alle 14 Tage erscheint. Nach dem großen Erfolg auf dem Kongress im letzten Jahr wird diesmal eine noch größere Show abgezogen: Experimente die mal interessant, mal fragwürdig sind. Wissenschaftler die mal belehrend und mal unzurechnungsfähig sind. Wissenschaftliche Studien die mal nobelpreisverdächtig und mal zweifelhaft sind. Wissenschaft auf der Showbühne. It works, bitches!","logo":"/system/events/logos/000/007/572/medium/methodisch-inkorrekt_original.jpg?1451327421"},{"guid":"94fa109a-45d7-4fea-86e3-12d12510c374","id":"7342","date":"2015-12-28T10:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6069","name":"Julia Maria Mönig"}],"links":[],"attachments":[{"href":"/system/event_attachments/attachments/000/002/830/original/JuliaMMoenig_Praesentation32C3.pdf?1451339881","title":"Household.pdf"}],"start":"11:30","duration":"01:00","room":"Hall G","slug":"32c3-7342-household_totalitarianism_and_cyberspace","title":"Household, Totalitarianism and Cyberspace","subtitle":"Philosophical Perspectives on Privacy Drawing on the Example of Hannah Arendt","track":null,"type":"lecture","language":"en","abstract":"In my talk I am 1) discussing philosophical concepts of privacy, especially Hannah Arendt's philosophy. I am 2) explaining why in a liberal-democratic system we need to protect our privacy and 3) what we can morally do to prevent catastrophes such as a totalitarian system from happening again. With Hannah Arendt's arguments and her analysis of totalitarian systems in mind, I am referring to three examples from today's privacy discussions: cybermobbing, Behavioral Advertising and secret services.","description":"That our privacy is at stake is not just a problem since the 2013 revelations of Edward Snowden. The 20th century philosopher Hannah Arendt is an important source to understand what `privacy' means and why we need to protect it. In my talk I am going to explain what Arendt understood as `private' throughout her work, and how her reasons to claim the protection of the private realm were connected with her analysis of the totalitarian systems in the 20th Century. \r\nIn my contribution I am first discussing philosophical concepts of privacy, with a focus on Hannah Arendt's philosophy. Second, I am arguing why in a liberal-democratic system we need to protect our privacy. The third step will be to reason what we can morally do to prevent catastrophes such as a totalitarian system from happening again.\r\nBeing a philosopher, I am going to make the philosophical — and in part legal — claims and preconditions understandable for a larger public. To prevent \"what never ought have happened\" from happening again we should, following Arendt, never refuse to judge about what is happening around us. I apply Arendt's framework of moral judging by examples to three cases from today's privacy discussions, Cybermobbing, Behavioral Advertising and secret services.","logo":null},{"guid":"df2f6e8a-f1fb-4736-8b4e-7e197ead73c2","id":"7558","date":"2015-12-28T11:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5263","name":"gedsic"},{"id":"4601","name":"bigalex"}],"links":[{"href":"https://media.ccc.de/v/32c3-7558-lightning_talks_day_2","title":null}],"attachments":[],"start":"12:45","duration":"02:15","room":"Hall G","slug":"32c3-7558-lightning_talks_day_2","title":"Lightning Talks Day 2","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! ","description":"To get involved and learn more about what is happening please visit <a href=\"https://events.ccc.de/congress/2015/wiki/Static:Lightning_Talks\">the Lightning Talks Wikipage</a>.","logo":"/system/events/logos/000/007/558/medium/fd_30c0.JPG?1448895819"},{"guid":"52706f90-a2f9-48be-a4c3-786257fce233","id":"7416","date":"2015-12-28T15:00:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6030","name":"fractalfox"}],"links":[{"href":"www.brain-duino.com","title":null},{"href":"www.open-bci.org","title":null},{"href":"https://media.ccc.de/v/32c3-7416-evolution_of_brain-computer_interfaces","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/824/original/32c3_evolution_of_bci.pdf?1451312208","title":"slides"}],"start":"16:00","duration":"00:30","room":"Hall G","slug":"32c3-7416-evolution_of_brain-computer_interfaces","title":"Evolution of Brain-Computer Interfaces","subtitle":"The future of Neuro-Headsets and concepts towards open-source, high-quality devices as an alternative to commercial products","track":null,"type":"lecture","language":"en","abstract":"This talk is a brief recap into EEG / BCI for hackers, makers, researchers, and artists. It will give an overview of current consumer devices and their flaws, and subquently present fully open-source, high-quality hardware and software. Finally implications for the future of modern society are outlined, especially how commercial EEG consumer devices or services may be exploited by corporations to cloudsource market research, or spy on health conditions, brain states or even leak private information. Strategies to circumvent these risks and secure brain wave experience are being discussed.","description":"In the recent years, affordable Brain-Computer Interfaces are becoming more accessible for consumers. Applications range from controlling computers / machines, biofeedback and Quantified Self. At first sight, the current generation of commercial devices seem to be decent in their functionality, and various use cases are suggested. However, neurophysiological signal quality, as well as limitations of software and hardware hackability are among the greatest issues and hurdles towards advancement in user experience.\r\n\r\nThis talk is a brief recap into EEG / BCI for hackers, makers, researchers, and artists. It will give an overview of current consumer devices and their flaws, and subquently present fully open-source, high-quality hardware and software. Finally implications for the future of modern society are outlined, especially how commercial EEG consumer devices or services may be exploited by corporations to cloudsource market research, or spy on health conditions, brain states or even leak private information. Strategies to circumvent these risks and secure brain wave experience are being discussed.\r\n\r\nThis talk can be seen as a sequel to last year's talk by MeTaMiNd EvoLuTioN and will also deal with further proceedings in open-source neurotech.","logo":"/system/events/logos/000/007/416/medium/32bcievo.png?1451242189"},{"guid":"b9b2c371-417c-45c4-a47f-faf7eeb11fbf","id":"7355","date":"2015-12-28T15:45:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6090","name":"Matthias Tarasiewicz (parasew)"}],"links":[{"href":"https://www.apertus.org/","title":null},{"href":"http://prix2012.aec.at/prixwinner/4928/","title":null},{"href":"https://media.ccc.de/v/32c3-7355-apertus_axiom","title":null}],"attachments":[],"start":"16:45","duration":"00:30","room":"Hall G","slug":"32c3-7355-apertus_axiom","title":"apertus° AXIOM","subtitle":"The first Open Source Cinema Camera","track":null,"type":"lecture","language":"en","abstract":"AXIOM is the first professional, extendable, affordable and modular cinema camera platform based on Free (\"libre\") Software, Open Design, Open Hardware, transparent development processes and extensive documentation. The community project establishes an ecosystem that offers a sustainable basis for a broad spectrum of imaging applications and empowers enthusiasts, videographers as well as developers in the technology and creative industry sectors.","description":"Since 2006 the apertus° community has been developing open tools to tackle demands of professionals working in contemporary video and film production. The community extends from renowned Directors of Photography in prominent Hollywood studios to emerging independent filmmakers, developers, artists and researchers all working from different locations around the world. AXIOM is a very ambitious project, using principles of FLOSS, extended on the whole design, production and software of a professional, modular cinema camera. With AXIOM, our ambition is to free film makers of the artificial limitations introduced through the “closed” products being available. ","logo":null},{"guid":"81cba379-0eb6-4dbb-a48c-80feaea60939","id":"7195","date":"2015-12-28T16:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4862","name":"Cornelius Diekmann"}],"links":[{"href":"https://github.com/diekmann/Iptables_Semantics","title":null},{"href":"https://media.ccc.de/v/32c3-7195-verified_firewall_ruleset_verification","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/810/original/slides_169.pdf?1451228795","title":"Slides"}],"start":"17:30","duration":"00:30","room":"Hall G","slug":"32c3-7195-verified_firewall_ruleset_verification","title":"Verified Firewall Ruleset Verification","subtitle":"Math, Functional Programming, Theorem Proving, and an Introduction to Isabelle/HOL","track":null,"type":"lecture","language":"en","abstract":"We develop a tool to verify Linux netfilter/iptables firewalls rulesets. Then, we verify the verification tool itself.\r\n\r\nWarning: involves math!\r\n\r\nThis talk is also an introduction to interactive theorem proving and programming in Isabelle/HOL. We strongly suggest that audience members have some familiarity with functional programming. A strong mathematical background is NOT required.\r\n\r\nTL;DR: Math is cool again, we now have the tools for \"executable math\". Also: iptables!","description":"We all know that writing large firewall rulesets can be hard. One huge problem. Let's write a tool to statically verify some properties of our rulesets! Now we have three huge problems:\r\n(1) writing flawless firewall rulesets.\r\n(2) making sure that our verification tool does the right thing.\r\n(3) making sure that the internal firewall model of our tool corresponds to the real world.\r\n\r\nIn this talk, we will solve these problems from front to back. We focus on problems (2) and (3). Warning: this talk involves math!\r\n\r\nFirst, we need to specify the behavior of the Linux netfilter/iptables firewall. In order to be convincing, this model must be small and simple. It should fit on one slide. However, firewalls can be quite complex and the model must cope with this. For example, looking at `man iptables-extensions`, we see numerous match conditions. But nobody required that our model must be executable code; we will specify the model mathematically. For example, this allows to define <i>arbitrary</i> match conditions. Technically speaking, we define the filtering behavior of iptables in terms of bigstep semantics. Mathematical specifications can be very powerful, in particular when we get to the point where the specification is not directly \"executable\".\r\n\r\nEnough math, let's write some executable code to do something with our ruleset. For example, unfolding the jumps to user-defined chains, checking that some packets will be certainly blocked, or checking that we got the spoofing protection right.\r\n\r\nSecond, based on our firewall model, we can now prove that our algorithms do the right thing. In contrast to testing, a mathematical proof allows assertions for all possible values. For example: For all possible packets, rulesets, and firewall-matching-features, our unfolding algorithm does not change the filtering behavior of the firewall. Yes, we can even show that our tool will still be correct, even if the netfilter team pushes a new matching feature.\r\n\r\nFinally, we now have a verified verification tool. We can use it to verify our firewall ruleset and finally sleep well at night again.\r\n\r\nWe developed an iptables verification library over the last few years in Isabelle/HOL. Isabelle can export executable definitions (i.e. our algorithms) to functional languages such as Haskell, Scala, SML, or OCcaml. Writing the input/output functions manually in Haskell, we have a fast and stand-alone tool.\r\n\r\nThis talk is also an introduction to interactive theorem proving and programming in Isabelle/HOL. We strongly suggest that audience members have some familiarity with functional programming. A strong mathematical background is not required.","logo":"/system/events/logos/000/007/195/medium/isabelle.png?1443400470"},{"guid":"6f79c506-a6cd-4430-bfbf-1841aca06e41","id":"7238","date":"2015-12-28T17:15:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"4825","name":"Trammell Hudson"},{"id":"6372","name":"Adelle Lin"}],"links":[{"href":"https://trmm.net/MAME","title":null},{"href":"https://media.ccc.de/v/32c3-7238-vector_retrogaming","title":null}],"attachments":[],"start":"18:15","duration":"00:30","room":"Hall G","slug":"32c3-7238-vector_retrogaming","title":"Vector retrogaming","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"In this talk I'll show how to build an open source vector gaming system with MAME, a microcontroller and an XY monitor or oscilloscope. Relive the joys of playing vector video games from 1979 and enjoy some of the retro-styled vector games of 2015.","description":null,"logo":"/system/events/logos/000/007/238/medium/21785257252_63deb9a155_o.jpg?1443548840"},{"guid":"47c13b4a-a50b-4158-9a71-f4a2f24ace64","id":"7249","date":"2015-12-28T19:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5112","name":"agonarch"},{"id":"6353","name":"@fraufeli"}],"links":[{"href":"https://media.ccc.de/v/32c3-7249-das_zahnrad_aus_fleisch","title":null}],"attachments":[],"start":"20:30","duration":"01:00","room":"Hall G","slug":"32c3-7249-das_zahnrad_aus_fleisch","title":"Das Zahnrad aus Fleisch","subtitle":"Expeditionen ins Kommentierreich","track":null,"type":"lecture","language":"de","abstract":"Kommentierendes im Internet ist neuerdings bedroht. Der unflätige Kommentierer hat den Pedonazi als Schrecken des Netzes abgelöst, als Strohmann für mehr Kontrolle über das Netz kann er auf breitere Gefolgschaft rechnen. Es “muss etwas geschehen” gegen den “Hass im Netz”, “Putintrolle” und Wutnetzbürger. Twitter, Mark Zuckerberg, Politiker, alle sollen mehr tun - aber was denn eigentlich, mehr Zensur und Moderation, andere Ausgestaltungen von Kommentarsystemen? ","description":"“The commenters don’t read the article, the writers don’t read the comments, and no one clicks on the ads.”, @ftrain 20 April 2012\r\n\r\nViele klassische Zeitungen geben auf, schränken ihre Kommentarbereiche online wieder ein oder schließen sie ganz. Die Süddeutsche beschränkt Kommentare auf drei Themen/Tag, Spiegel Online und FAZ fahren Kommentarmöglichkeiten zurück. Woher kommt die Schlacke im einst so ersehnten \"Rückkanal\"? Fördern die Artikel selbst eine Tendenz zu Ressentiments? Selbst bei Watchbloggern klassischer Medien wie Niggemeier ist der Ton im Kommentarbereich sauer geworden. Spreeblick färbt neuerdings Unerwünschtes weiß. Kommentarverdrossene Medienschaffende, Blogger und Fernsehjournalisten richten offene Briefe und Videobotschaften an ihr Publikum. Politische Verantwortungsträger fordern unisono Schritte gegen “die Hetze” und “den Hass” im Neuland des Internets und bei Facebook, gemeint sind fast immer Online-Kommentare im eristischen Geiste. Was hat sich in den letzten Jahren verändert? Werden wir wirklich soeben vom Hass überrollt? Welche Rolle spielt die technische Realisierung von Kommentarsystemen? Warum klaffen Moderationspraxis und “Community Guidelines” auseinander?\r\n\r\n@fraufeli hat jahrelange Erfahrungen als Social Media Gärtnerin in den Kommentarspalten von Nachrichtenportalen und kennt sich mit Krauts und Unkrauts aus. Sie versteigt sich zu der These, dass es eigentlich keine Kommunikation mehr im Internet gibt, wenn sich alle nur noch niederbrüllen. “Besorgte Bürger” nennen sie (und ihre Kollegen) auch mal ein “Zahnrad aus Fleisch”, wenn sie Beiträge partout nicht durchlassen möchte. Freilich liebenswerter als die anderen Schimpfattacken, die bei Moderatorinnen wie ihr täglich aufschlagen.\r\n\r\n@agonarch wünscht weiterhin, dass im Netz sich Vielfalt und sanktionsfreies Gespräch entfalten kann. Seine Sympathien für die Nachzensurpraxis kann er jüngst kaum mehr verhehlen, und hat sich mit @fraufeli auf die Suche nach Balance gemacht. Gegen den Vorwurf des “Solutionismus” verwehrt er sich entschieden, wenn er auf technische Lösungen gegen die Misere schaut, und die schnell gestrickten Policy-Antworten aus Brüssel und den anderen Hauptstädten Europas kritisch begleitet. ","logo":null},{"guid":"df35c860-60fc-4df8-801c-b2f4f91b33b8","id":"7493","date":"2015-12-28T20:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6183","name":"Rink Springer"}],"links":[{"href":"https://github.com/zhmu/openrom","title":null},{"href":"https://media.ccc.de/v/32c3-7493-how_hackers_grind_an_mmorpg_by_taking_it_apart","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/797/original/32c3-how_hackers_grind_an_mmorpg.pdf?1450617648","title":"Slides"}],"start":"21:45","duration":"01:00","room":"Hall G","slug":"32c3-7493-how_hackers_grind_an_mmorpg_by_taking_it_apart","title":"How hackers grind an MMORPG: by taking it apart!","subtitle":"An introduction to reverse engineering network protocols","track":null,"type":"lecture","language":"en","abstract":"When an online game no longer captivates interest, what do you do? Grind on the network protocol, of course! How does it work, is it secure - and, how can you still get away while doing this?","description":"Online games are hardly new, but their inner workings are rarely (if ever) documented. This needs to change: if it runs on my computer and uses my network I want to know what's going on!\r\n\r\nThis talk starts by analysing the network protocol of the Runes of Magic game, and continues by introducing specific tools to aid this process and the steps taken to come up with such tools. Continuing with a demonstration to whet your appetite: we will show how much <i>fun</i> it is to do this kind of work, and finally some advice on the legal side of things.\r\n\r\nAll custom tools and methods described are not specific to a game per se, however using custom tools will greatly improve your reversing experience. They aren't even specific to games, the same techniques can be used to analyse about any network protocol.","logo":null},{"guid":"ab751ee0-8623-4a20-bab3-f82f8cf3dd82","id":"7273","date":"2015-12-28T22:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6075","name":"Marie Moe"},{"id":"4081","name":"Eireann Leverett"}],"links":[{"href":"https://www.iamthecavalry.org","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/832/original/2015-12-28-CCC.pdf?1451384623","title":"Unpatchable presentation slides"}],"start":"23:00","duration":"01:00","room":"Hall G","slug":"32c3-7273-unpatchable","title":"Unpatchable","subtitle":"Living with a vulnerable implanted device","track":null,"type":"lecture","language":"en","abstract":"Gradually we are all becoming more and more dependent on machines, we will be able to live longer with an increased quality of life due to machines integrated into our body. However, our dependence on technology grows faster than our ability to secure it, and a security failure of a medical device can have fatal consequences. This talk is about Marie's personal experience with being the host of a vulnerable medical implant, and how this has forced her to become a human part of the \"Internet-of-Things\". ","description":"Marie's life depends on the functioning of a medical device, a pacemaker that generates each and every beat of her heart. This computer inside of her may fail due to hardware and software issues, due to misconfigurations or network-connectivity. \r\n\r\nYes, you read that correctly. The pacemaker has a wireless interface for remote monitoring forcing the patient to become a human part of the Internet-of-Things. As a security-professional Marie is worried about her heart's attack surface. How can she trust the machine inside her body, when it is running on proprietary code and there is no transparency? This is why she went shopping on eBay to acquire medical devices that can communicate with her pacemaker, and started a hacking project together with her friend Éireann.\r\n\r\nThis talk will be focused on the problem that we have these life critical devices with vulnerabilities that can't easily be patched without performing surgery on patients, Marie's personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.","logo":"/system/events/logos/000/007/273/medium/heart-circuitboard.jpg?1447849147"},{"guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","id":"7221","date":"2015-12-28T23:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4984","name":"Nicolas Wöhrl"},{"id":"6387","name":"@ReinhardRemfort"}],"links":[{"href":"http://minkorrekt.de","title":null},{"href":"https://www.youtube.com/watch?v=YgPIElakaDw","title":null}],"attachments":[],"start":"00:15","duration":"02:00","room":"Hall G","slug":"32c3-7221-methodisch_inkorrekt","title":"Methodisch inkorrekt!","subtitle":"Die Wissenschaftsgala vom 32C3","track":null,"type":"performance","language":"de","abstract":"Nicolas Wöhrl und Reinhard Remfort sprechen über interessante aktuelle Forschung, Experimente und ihren wissenschaftlichen Alltag an einer deutschen Hochschule. Fachübergreifend, abwechslungsreich, unstrukturiert, hoffnungslos subjektiv und immer garantiert methodisch inkorrekt.","description":"Eigentlich ein Podcast der alle 14 Tage erscheint. Nach dem großen Erfolg auf dem Kongress im letzten Jahr wird diesmal eine noch größere Show abgezogen: Experimente die mal interessant, mal fragwürdig sind. Wissenschaftler die mal belehrend und mal unzurechnungsfähig sind. Wissenschaftliche Studien die mal nobelpreisverdächtig und mal zweifelhaft sind. Wissenschaft auf der Showbühne. It works, bitches!\r\n","logo":null},{"guid":"6a02cc83-73d8-4544-8f17-9358dd2495c9","id":"7540","date":"2015-12-28T10:30:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6084","name":"Miguel Chaves"}],"links":[{"href":"bit.do/civneacontece","title":null},{"href":"http://bit.do/civnehistoria","title":null},{"href":"https://media.ccc.de/v/32c3-7540-maker_spaces_in_favelas_-_lecture","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 6","slug":"32c3-7540-maker_spaces_in_favelas_-_lecture","title":"Maker Spaces in Favelas - Lecture","subtitle":"Engaging social innovation and social innovators","track":null,"type":"lecture","language":"en","abstract":"There are two lines of research in the world about decreasing poverty in low-income communities: (1) to create solutions and share them with people living in low-income areas or (2) build the capacity of people from low-income areas to create their own solutions. Maker Spaces to BoP have showed great results to the strategy two. The lecture has the goal to expose all the experience we have learnt in the last three years to project, implement and manage a Maker Space in a favela in São Paulo - Brazil called Innovation Center Vila Nova Esperança (ICVNE).","description":"The terms “social innovation” and “social innovators” have become commonplace expressions in technology and development fields. More people have created new kinds of businesses and solutions to create positive impact in the society instead of just bringing interests to the partners of the company. However, in the last two decades, most resources available to build solutions for international development challenges were provided to institutions in richer countries. Most of the solutions, therefore, were coming from outside the local context or community. There are very few examples that show low-income people as responsible designers for good solutions. Several reasons try to explain why this has happened, but one essential reasoning is the belief that well educated people have more capacity to reach a good solution for any context, even if these people do not belong to the local culture or context. However, the main results of this methodology are anything but understanding and positive. The four main results are: dependence, lack of user needs understanding, (and, as such) little or no sense of ownership, and lack of maintenance.\r\nIn order to address these four problems, different approaches to social innovation have started to be tested. One model that tries to explain these different approaches are called Design For, Design With, Design By. If this model is studied deeper, it is possible to recognize that it translates the passage from the donator solutions mindset to the capacity-building solutions mindset. The two main parameters to define to understand the difference between those approaches is “designer” and “user.” Design For expresses the fact the designer has very limited interaction with the user (typically only in the information gathering stage at the beginning and user testing at the end). This is typically what appropriate technology development looks like. Design With, also called co-creation and participatory development, brings together the user and the designer to understand the problem together, create solutions together and make decisions together in order to keep the project going forward. Design By defines the approach where the designer is also the user (and vice versa) or belongs to the same environment as the user. To test the Design By model, our Donor IDIN (www.idin.org) opted to support a local Innovation Center in a favela in Latin America, more specifically in São Paulo that the local organization Caos Focado has been responsible.","logo":"/system/events/logos/000/007/540/medium/Caos_Focado_Logo.png?1447038881"},{"guid":"08843e46-b813-49a4-93ad-ab6e7b3e4a17","id":"7231","date":"2015-12-28T11:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6044","name":"Ed Schouten"}],"links":[{"href":"https://github.com/NuxiNL/cloudlibc","title":null},{"href":"https://github.com/NuxiNL/cloudabi-ports","title":null},{"href":"https://media.ccc.de/v/32c3-7231-cloudabi","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/821/original/slides.pdf?1451299731","title":"Slides"}],"start":"12:45","duration":"01:00","room":"Hall 6","slug":"32c3-7231-cloudabi","title":"CloudABI","subtitle":"Pure capability-based security for UNIX","track":null,"type":"lecture","language":"en","abstract":"CloudABI is an alternative runtime environment for UNIX-like operating systems that is purely based on the principle of capability-based security. This makes it possible to create applications that are strongly sandboxed, easier to test and easier to maintain.","description":"UNIX-like operating systems don't seem to make it easy to sandbox programs to harden them against exploits. They also don't allow you to run untrusted executables directly without compromising security, which is the reason why we require technology like virtual machines and containers to secure our systems.\r\n\r\nI am going to talk about a system I am developing called CloudABI. CloudABI is a simplified POSIX-like runtime environment that is inspired by FreeBSD's Capsicum. It allows you to create exectables that can solely interact with the environment through file descriptors (capabilities). This not only makes CloudABI more secure than the traditional POSIX runtime, it also makes it easier to test programs through dependency injection. This makes CloudABI a perfect environment for developing microservices.\r\n\r\nIn my presentation I am going to focus on how CloudABI works, how you can develop software for it and how it works in practice.","logo":null},{"guid":"b5456783-49dc-4420-bb0f-fee33a249b65","id":"7283","date":"2015-12-28T13:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5979","name":"Iga Bałos"},{"id":"1506","name":"Benjamin Henrion (zoobab)"}],"links":[{"href":"https://media.ccc.de/v/32c3-7283-software_and_business_method_patents_call_for_action","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/809/original/Balos_Henrion_Software_and_business_methods_patents_Call_for_action.odp?1451225822","title":"Balos_Henrion_Presentation"}],"start":"14:00","duration":"01:00","room":"Hall 6","slug":"32c3-7283-software_and_business_method_patents_call_for_action","title":"Software and business method patents: call for action","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Ten years after the rejection of the European software patent directive by the European Parliament, the software patent problem still is not over.\r\nPolitical action is required.","description":"For further information, please refer to the attached document. It contains a one page summary of highlights, and five pages of a more detailed narrative. Finally, it includes the bio's of the three speakers. ","logo":null},{"guid":"6c57ad7c-325a-47b1-88b9-124c35298f81","id":"7264","date":"2015-12-28T15:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6068","name":"Jeff Deutch"}],"links":[{"href":"https://media.ccc.de/v/32c3-7264-profiling_in_justice","title":null}],"attachments":[],"start":"16:00","duration":"00:30","room":"Hall 6","slug":"32c3-7264-profiling_in_justice","title":"Profiling (In)justice","subtitle":"Disaggregating Data by Race and Ethnicity to Curb Discriminatory Policing","track":null,"type":"lecture","language":"en","abstract":"This talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany. In the UK, data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing.","description":"\r\nAs social exclusion and racial discrimination are highly tied to policing practices, it is essential that a reduction of discriminatory policing be part of the larger discussion on addressing social inequalities in developed nations. In Germany, the lack of data disaggregated by race and ethnicity means that there are no figures on the extent of racially or ethnically based discrimination. Germany presents a unique case for examining the collection of disaggregated data due largely to the term race, or Rasse, having negative connotations due to the misuse of such data during the Nazi era.\r\n\r\nThis talk will focus on the potential ability of data disaggregated by race and ethnicity to reduce discriminatory policing in Germany, with a particular focus on ‘stop and search.’ Stop and search is a crime-prevention practice existing in both Germany and the UK which allows police officers to stop individuals they suspect of committing a crime, carrying a weapon, possessing stolen property, or carrying drugs. In Germany, federal police have the added power to stop a person suspected of committing an immigration violation.\r\n\r\nIn the UK – due to pressure from civil society organisations, academics, and government officials – data has been collected during police procedures, allowing for a monitoring and evaluation of discriminatory policing practices. Unfortunately, such an empirically driven policy approach is not currently possible in Germany. This talk will argue that, as a first step, a policy based off the UK approach towards data collection be implemented in Germany to incorporate, rather than ignore, Germany’s diverse identities, and to allow for empirically driven and more effective policing.","logo":null},{"guid":"012b9dea-7d42-4428-acd4-4f84fa41e729","id":"7570","date":"2015-12-28T15:45:00.000Z","day":"2","recording":{"license":null,"optout":false},"persons":[{"id":"6407","name":"Vera Tollmann"},{"id":"6408","name":"Boaz Levin"}],"links":[{"href":"https://vimeo.com/143251322","title":null},{"href":"https://media.ccc.de/v/32c3-7570-plunge_into_proxy_politics","title":null}],"attachments":[],"start":"16:45","duration":"00:30","room":"Hall 6","slug":"32c3-7570-plunge_into_proxy_politics","title":" Plunge into Proxy Politics","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"During this lecture presentation, Boaz Levin and Vera Tollmann,\r\nco-founders of the Research Center for Proxy Politics, will develop the proxy as a figure of thought by spinning and testing it in different\r\ncontexts.\r\n","description":"The Research Center for Proxy Politics aims to explore and reflect upon the nature of networks and their actors, that is, machines and things as well as humans. The proxy, a decoy or surrogate, is today often used to designate a computer server acting as an intermediary for requests from clients. Originating in the Latin procurator, an agent representing others in a court of law, proxies are now emblematic of a post-representational political age, one increasingly populated by bot militias, puppet states, ghostwriters, and communication relays.\r\n\r\nDuring the period of the project (September 2014 to August 2017) the\r\ncenter hosts a series of workshops at the Universität der Künste,\r\nBerlin, revolving around a wide range of relevant topics including the\r\npolitics of digital networks, the political economy of\r\ncrypto-currencies, the genealogy of networked thought, the mediality of physical landscapes and strategies of opacity. The center also conducts material, experimental, investigations into the conception and construction of alternative networks, or alternets.\r\n","logo":"/system/events/logos/000/007/570/medium/RCPP_gif.gif?1451309329"},{"guid":"5f57ffa9-631c-429d-a11b-5b51bebe0f0f","id":"7415","date":"2015-12-28T16:30:00.000Z","day":"2","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4555","name":"Alvar Freude"}],"links":[{"href":"https://ak-zensur.de/","title":null},{"href":"https://media.ccc.de/v/32c3-7415-wie_jugendschutzprogramme_nicht_nur_die_jugend_schadigen","title":null}],"attachments":[],"start":"17:30","duration":"00:30","room":"Hall 6","slug":"32c3-7415-wie_jugendschutzprogramme_nicht_nur_die_jugend_schadigen","title":"Wie Jugendschutzprogramme nicht nur die Jugend schädigen","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Das Nonplusultra für hauptamtliche Jugendschützer sind Filterprogramme, auch „Jugendschutzprogramme“ genannt. Doch was machen die Programme, welche Wirkungen und vor allem Nebenwirkungen haben sie? Und was macht eigentlich der Zombie JMStV?","description":"<p>Die Bundesländer wollen in einem neuen Anlauf den Jugendmedienschutzvertrag (JMStV) verschärfen. Ein Kernpunkt ist: Möglichst viele (oder alle) Webseiten sollen maschinenlesbare Alterskennzeichen tragen. Filterprogramme sollen diese auslesen und (vermeintlich oder tatsächlich) jugendgefährdende Webseiten blockieren. Der Traum so mancher Jugendschützer sind dabei Filter direkt beim Provider, am besten standardmäßig aktiviert und nur auf Wunsch auf die Stufe „ab 18“ änderbar.</p>\r\n\r\n<p>Die „Kommission für Jugendmedienschutz“ (KJM) hat bereits mehrere Filterprogramme offiziell anerkannt, also quasi zugelassen.</p>\r\n\r\n<p>Doch welche Nebenwirkungen haben diese Filter? Wie funktionieren die Programme, und was machen sie?</p>\r\n\r\n<p>Der Vortrag zeigt anhand einer genauen Analyse, dass die Qualität der offiziellen „Jugendschutzprogramme“ unter aller Sau ist und sie noch einige weitere, bisher nicht bekannte Nebenwirkungen haben.</p>\r\n\r\n<p>Daneben zeigt der Vortrag noch den aktuellen Stand der Diskussion über den Jugendmedienschutzstaatsvertrag und was uns in dem Bereich noch alles blüht.</p>","logo":null},{"guid":"658ebc92-ef93-421d-9547-f117f75eed92","id":"7529","date":"2015-12-28T17:15:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6268","name":"Mahsa Alimardani"}],"links":[{"href":"https://media.ccc.de/v/32c3-7529-mobile_censorship_in_iran","title":null}],"attachments":[],"start":"18:15","duration":"00:30","room":"Hall 6","slug":"32c3-7529-mobile_censorship_in_iran","title":"Mobile Censorship in Iran","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"As Internet users increasingly connect to the Internet through smartphones, this has transformed Iran’s Internet ecology towards an increasing reliance and production in apps. In Iran, a country that practises some of the most stringent censorship and surveillance techniques in the world has seen this transformation reshape the way the government implements information controls online. While applications with popular usage on browsers such as Facebook and Twitter remain blocked through their mobile applications, platforms that predominantly exist in app form such as WhatsApp, Viber, and Instagram remain unblocked in the country. This talk will look at how the government is counteracting these policies through various means, including local imitation apps, and new programs such as ‘intelligent filtering’, and the Revolutionary Guards' “Spider” program. Additionally, a discussion of how Iranian Internet users use these platforms, especially in reference to digital security awareness and practices will be included. ","description":null,"logo":null},{"guid":"4afc705e-a55c-45ae-b67e-a820e5398d23","id":"7367","date":"2015-12-28T18:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4179","name":"Nicolas Pouillard"}],"links":[{"href":"https://github.com/np/ling","title":null},{"href":"https://nicolaspouillard.fr","title":null},{"href":"https://nicolaspouillard.fr/talks/ling-32c3/","title":null},{"href":"https://media.ccc.de/v/32c3-7367-ling_-_high_level_system_programming","title":null}],"attachments":[],"start":"19:00","duration":"00:30","room":"Hall 6","slug":"32c3-7367-ling_-_high_level_system_programming","title":"Ling - High level system programming","subtitle":"modular and precise resource management","track":null,"type":"lecture","language":"en","abstract":"In this presentation I will present the experimental language Ling. We shall get an intuitive understanding of the language through familiar concepts from imperative programming. We shall cover how Ling enables a modular and precise control on memory allocation, through a general optimization called fusion. This optimization, fusion is a cost-free abstraction mechanism which brings high level programming to system programming.","description":"The design of <a href=\"https://github.com/np/ling\">Ling</a> is the result of my researches in collaboration with Daniel Gustafsson and Nicolas Guenot at the IT-University of Copenhagen and also from the language <a href=\"https://lopezjuan.com/limestone/\">Limestone</a> by Jean-Philippe Bernardy and Víctor López Juan at the University of Chalmers. These two lines of research stand upon the longstanding research topics of process calculi (such as the π-calculus), term calculi (such as λ-calculus), Linear Logic, and dependent Type Theory (such as used in Coq and Agda to write proofs and programs).\r\n\r\nThe research on the λ-calculus and Type Theory gave rise to a powerful family of languages including but not limited to: Haskell, OCaml, Coq, Idris, and Agda. The research on the π-calculus gave rise to a vast family of calculi for concurrency. However type systems for these languages took much longer to emerge and progress. For instance the main concurrent programming language in use today is still dynamically typed. This is changing as we understand better how to the use the formulae of Linear Logic as behavior types (or session types) for concurrent processes.\r\n\r\nStill the aim of this experimental language is to program systems precisely and modularly. The need for precision comes from the resource constraints such as memory, file handles and the need for modularity comes the desire to reduce programming mistakes by solving problems at the right abstraction level. Functional programming offers a pretty good framework for modularity. This modularity comes at a cost which is rather difficult to predict. One the one hand optimizing compilers can fuse function composition to eliminate the need for intermediate data-structures. One the other hand when such an optimization fails to trigger the resulting program might poorly perform. The system of Ling controls when fusion can happen. Therefore one knows statically when fusion occurs and when intermediate buffers are needed.\r\n\r\nToday concurrent systems are built out of shared memory. However, the shared memory model is a nightmare for programmers. Here the approach is reversed we start from a concurrent programming language and apply it also for shared memory. At first the goal is not necessarily to target a parallel architecture but to program at level of abstraction where the programmer knows precisely the resources needed and the compiler still has plenty of opportunity to re-order and parallelize safely some instructions.\r\n\r\nThis talk is intended at an audience familiar with imperative programming. Using the language should not require to understand anything about Linear Logic even though it is used fundamentally. Finally this presentation is an open call for comments and contributions to the open development of the language and infrastructure.\r\n","logo":null},{"guid":"341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f","id":"7496","date":"2015-12-28T19:30:00.000Z","day":"2","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"5910","name":"Yann.A"},{"id":"6376","name":"Julien MOINARD"},{"id":"6377","name":"Gwénolé Audic"}],"links":[{"href":"http://hardsploit.io","title":null},{"href":"https://media.ccc.de/v/32c3-7496-hardsploit_a_metasploit-like_tool_for_hardware_hacking","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/780/original/32C32015_CFP_Submission_-_OPALE_SECURITY-_Yann_ALLAIN_-__HardSploit_-_Like_metasploit_but_for_Hardware_Hacking.pdf?1444139528","title":"CFP Slides submission"},{"href":"/system/event_attachments/attachments/000/002/859/original/32C3-HARDSPLOIT.pdf?1451817940","title":"Slides Hardsploit Tool by Julien MOINARD & Gwénolé AUDIC"}],"start":"20:30","duration":"01:00","room":"Hall 6","slug":"32c3-7496-julien_moinard_opale-security_com","title":"[email protected]","subtitle":"A complete toolbox for IoT security ","track":null,"type":"lecture","language":"en","abstract":"It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware products.\r\n\r\nHardsploit is a complete tool box (hardware & software), a framework which aims to:\r\n\r\n- Facilitate the audit of electronic systems for industry 'security' workers (consultants, auditors, pentesters, product designers, etc.)\r\n\r\n- Increase the level of security (and trust !) of new products designed by the industry","description":"Hardsploit is an all-in-one hardware pentesting tool with software and electronic aspects. It's a technical and modular platform (using FPGA) to perform security tests by using electronic communication bus.\r\n\r\nThe main hardware security audit functions are:\r\n- Sniffer\r\n- Interact\r\n- Dump\r\n\r\nHardsploit's modules will let users intercept, replay and / or send data via each type of electronic bus used by the target. The level of interaction that pentesters will have depends on the targeted bus features.\r\n\r\nHardsploit's modules also enable you to analyze electronic bus (serial and parallel types) like JTAG, SPI, I2C's, parallel addresses and more will come !\r\n\r\nWe also provide a graphical interface to manage your components and their commands. A wiring helper module is available too. It will help you connect easily your target to Hardsploit.\r\n\r\nOur ambition is to provide a tool equivalent to those offered by the company Qualys or the Metasploit Framework but in the domain of embedded systems/electronics.","logo":"/system/events/logos/000/007/496/medium/op.png?1448634578"},{"guid":"0549d204-604a-46c5-92a2-e64b85aa9892","id":"7525","date":"2015-12-28T20:45:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6266","name":"Steini"}],"links":[{"href":"https://media.ccc.de/v/32c3-7525-quantenphysik_und_kosmologie","title":null}],"attachments":[],"start":"21:45","duration":"01:00","room":"Hall 6","slug":"32c3-7525-quantenphysik_und_kosmologie","title":"Quantenphysik und Kosmologie","subtitle":"Eine Einführung für blutige Anfänger","track":null,"type":"lecture","language":"de","abstract":"Unsere Welt ist nach allem was wir heute wissen im kleinsten Massstab völlig bizarr aufgebaut und im grössten also im kosmologischen Massstab besteht sie ziemlich genau aus nichts. Wie hängt das zusammen und was hat das mit dunkler Materie und dunkler Energie zu tun und was zum Geier ist eigentlich die \"spukhafte Fernwirkung\" von der Einstein damals sprach und warum hat bis heute keiner so recht verstanden wie das alles zusammenpasst?\r\nHast du schon mal davon gehört, dass die Quantenphysik irgendwie schräg ist, hast dich da aber noch nicht ran getraut, obwohl du das gerne besser verstehen wollen würdest? Denkst du manchmal drüber nach, wie zum Geier das komplette Universum mit allen Sternen und Planeten ganz früher mal in einen Tischtennisball oder sogar noch was kleineres gepasst haben soll? Hast du schon mal davon gehört, dass ein Proton angeblich aus drei Quarks besteht und denkst, \"jaja, ihr könnt mir viel erzählen\". Und klinkt sich dein Vorstellungsvermögen aus, wenn du versuchst dir so was wie ein \"schwarzes Loch\" vorzustellen, das unendlich klein sein soll und dabei unendlich schwer? Dann bist du hier genau richtig. Ich will dir ohne wesentliche Vorkenntnisse vorauszusetzen im Grossen und Ganzen den Zusammenhang näher bringen, deine Faszination für das Thema wecken oder füttern und dir Mut machen, dich weiter damit zu beschäftigen. Du darfst hier Fragen stellen, dich wundern, zweifeln und irritiert sein. \r\nWenn du an Quantenheilung, Vortex Atome und holistische Quanten-Kinesiologie glaubst, dann bist du herzlich willkommen um zu lernen, dass das mit Quantenphysik nichts, aber auch wirklich gar nichts zu tun hat, aber sei bitte nicht enttäuscht, wenn ich auf diese Themen nicht eingehe. Eine Stunde ist viel zu Kurz um zusätzlich eine Einführung in die Prinzipien der Wissenschaft zu halten. \r\nWenn du aber schon mal die Schrödingergleichung hergeleitet hast oder gerne über die Vorteile der M-Theorie gegenüber der Super-Stringtheorie schwadronieren möchtest oder wenn du diskutieren möchtest, ob es vielleicht auch noch ein Typ 3 Weyl Fermion geben kann, dann langweilst du dich hier vermutlich, das können wir dann ja gerne ein anderes mal machen ;-)\r\n","description":"Die Quantenphysik und Einsteins Relativitätstheorie haben eine über hundert Jahre alte Geschichte und sie passen bis heute nicht vernünftig zusammen. Und einige Aspekte der Debatte fanden schon bei den alten Philosophen ihren Anfang. Wo das Problem liegt, was an der Quantenphysik zu verrückt ist und warum das was mit der Entstehung unseres Universum zu tun hat und was so alles daraus folgt will ich versuchen möglichst für Laien verständlich zu erzählen.","logo":null},{"guid":"4d8d4f44-bade-460b-8274-0bb5b9df38b3","id":"7294","date":"2015-12-28T22:00:00.000Z","day":"2","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4679","name":"Jasper Bongertz"}],"links":[{"href":"https://blog.packet-foo.com","title":null},{"href":"https://media.ccc.de/v/32c3-7294-sanitizing_pcaps","title":null}],"attachments":[{"href":"/attachments/original/missing.png","title":"file"},{"href":"/system/event_attachments/attachments/000/002/850/original/Sanitizing_PCAPs.pptx?1451436142","title":"Slide Deck"}],"start":"23:00","duration":"01:00","room":"Hall 6","slug":"32c3-7294-sanitizing_pcaps","title":"Sanitizing PCAPs","subtitle":"Fun and games until someone uses IPv6 or TCP","track":null,"type":"lecture","language":"en","abstract":"Sanitizing and anonymizing PCAP or PCAPng files is often necessary to be able to share information about attack vectors, security problems or incidents in general. While it may seem simple to replace IP addresses or ports there are still quite a number of network packet details that are hard to replace. This technical talk will shed a light on where those troublemakers are encountered and how to get around them.","description":"When sanitizing/anonymizing PCAPs (or the newer, better, but also much more complex PCAPng network capture file format) there are a ton of problems to run into: Replacement need to be consistent, Checksums need to be recalculated sometimes but now always, and IPv6 has dependencies to MAC addresses that need to be considered as well. Additionally, protocols may be stacked on top of each other, tunneling IPv4 over IPv4 or IPv6 over IPv4, adding complexity to the replacement process. And finally, sanitizing TCP payloads is a certifiable nightmare because you never quite know what you're looking at, and the data segments may require reassembly/unpacking before you can do anything. It's easy to break sequence numbers, unless every replacement is exactly the same size as the original value. This talk will take a closer look at some of the typical problems that come up when sanitizing/anonymizing network packet captures, and at tools that can help with getting reasonable results.","logo":null},{"guid":"72ad2630-b736-4d4c-8ea1-d982076426bc","id":"7150","date":"2015-12-29T10:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4085","name":"Martin Haase/maha"},{"id":"6349","name":"Kai Biermann"}],"links":[{"href":"https://media.ccc.de/v/32c3-7150-nach_bestem_wissen_und_gewissen_floskeln_in_der_politik","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/831/original/Floskeln-und-Phrasen-32C3.pdf?1451340119","title":"Floskeln-Phrasen-schwarz-auf-weiss.pdf"},{"href":"/system/event_attachments/attachments/000/002/841/original/Floskeln-und-Phrasen-32C3-black.pdf?1451403928","title":"Floskeln-Phrasen-Folien.pdf"}],"start":"11:30","duration":"01:00","room":"Hall 1","slug":"32c3-7150-nach_bestem_wissen_und_gewissen_floskeln_in_der_politik","title":"„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik","subtitle":"Politische Phrasologie – warum man aus dem ganzen Zeug, das Politiker so reden, schlau werden kann","track":null,"type":"lecture","language":"de","abstract":"In der politischen Rede sind immer wieder Floskeln zu beobachten, zum Teil gibt es Moden, wie im Zusammenhang mit dem so genannten No-Spy-Abkommen, wo Handlungen wiederholt mit „bestem Wissen und Gewissen“ gerechtfertigt wurden. Auch das „volle/vollste Vertrauen“ der Kanzlerin ist auffällig. Der Vortrag vertritt die Hypothese, dass solche Phrasen nicht zufällig sind, dass sie eine Funktion besitzen. Es wird erläutert, was mit ihnen erreicht werden soll. Es wird außerdem der Frage nachgegangen, wie Floskeln sich durch häufigen Gebrauch in ihrer Bedeutung verändern bzw. verselbständigen und gegen den Sprecher wenden können. ","description":"In diesem Vortrag werden eine Reihe von Floskeln untersucht, die in politischer Rede vorkommen und sich in jüngerer Zeit besonderer Beliebtheit erfreuen. Es wird erörtert, was die Floskeln eigentlich bedeuten, wie und zu welchem Zweck sie verwendet werden und welche besondere Dynamik bei häufigem Gebrauch entstehen kann, insbesondere wenn sich die Floskeln verselbständigen.\r\n\r\nEs werden eine Reihe von Politikerzitaten zu aktuellen Themen analysiert: selbstverständlich geht es um die Vorratsdatenspeicherung und ihre auch sprachlich zweifelhaften Begründungen, um den \"Kampf gegen den Terror\" und um die Landesverratsaffäre.","logo":"/system/events/logos/000/007/150/medium/event-5181-128x128.png?1450048227"},{"guid":"1edc7ea3-0f06-4453-911f-f11b2a49e649","id":"7322","date":"2015-12-29T11:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"1785","name":"Roger"},{"id":"6390","name":"David Goulet"},{"id":"6392","name":"asn"}],"links":[{"href":"https://media.ccc.de/v/32c3-7322-tor_onion_services_more_useful_than_you_think","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 1","slug":"32c3-7322-tor_onion_services_more_useful_than_you_think","title":"Tor onion services: more useful than you think","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"We'll update you on what's going on with Tor onion services, aka Tor hidden services.","description":"In the past, onion services were mostly run by people who wanted to set up a website that somebody else wanted to shut down. Increasingly, people are recognizing that onion services are much more broadly useful: they are about providing more security to users, not hiding websites. \r\n\r\nOver the last year or so, Facebook set up an onion service to let their users reach Facebook more securely, the IETF officially designated '.onion' as a reserved domain, we've been talking to the \"Let's Encrypt\" folks about giving an onion address to every website, some neat new apps are coming out that use onion services (like decentralized chat), and more.\r\n\r\nWe also have some actual stats on hidden services:\r\nhttps://blog.torproject.org/blog/some-statistics-about-onions\r\n\r\nAt the same time, we've been working on next-generation onion services. We'll explain why they greatly improve both security and scalability.","logo":null},{"guid":"088e3078-bab2-433d-8be2-f1a4b37b4d5c","id":"7307","date":"2015-12-29T13:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"1785","name":"Roger"},{"id":"1083","name":"Jacob"},{"id":"5030","name":"Mike Perry"},{"id":"6398","name":"Shari Steele"},{"id":"5106","name":"Alison Macrina"}],"links":[{"href":"https://media.ccc.de/v/32c3-7307-state_of_the_onion","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 1","slug":"32c3-7307-state_of_the_onion","title":"State of the Onion","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Major changes are underway in the Tor Project, the Tor Network, and the Tor community. We want to tell you details and introduce the growing Tor community to the larger world.","description":"The State of the Onion covers technical, social, economic, political, and cultural issues pertaining to anonymity, the Tor Project, and the ecosystem surrounding our communities.\r\n\r\nImportant topics include the following issues:\r\n\r\n- Our new mission statement and code of conduct\r\n- An introduction to our „Vegas Plan“\r\n- Introducing a huge set of developers and users working on enabling your anonymity\r\n- An overview of the kinds of projects and groups involved with Tor\r\n- A summary and fact checking of important media coverage\r\n- A history lesson about the Tor network\r\n","logo":"/system/events/logos/000/007/307/medium/tor-logo.png?1448473762"},{"guid":"e9a8cc8d-a598-4bc3-83ac-82c1fe227b0a","id":"7482","date":"2015-12-29T15:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5040","name":"Andreas Dewes"}],"links":[{"href":"https://events.ccc.de/congress/2014/Fahrplan/events/6261.html","title":null},{"href":"https://media.ccc.de/v/32c3-7482-say_hi_to_your_new_boss_how_algorithms_might_soon_control_our_lives","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 1","slug":"32c3-7482-say_hi_to_your_new_boss_how_algorithms_might_soon_control_our_lives","title":"Say hi to your new boss: How algorithms might soon control our lives.","subtitle":"Discrimination and ethics in the data-driven society","track":null,"type":"lecture","language":"en","abstract":"Algorithms and „big data“ penetrate many aspects of our lives today. In the future, data collection and analysis will be even more ubiquitous and permeate our lives from morning to night.","description":"Many people (well, mostly business people) welcome this new era of data analysis and the associated vision of an „intelligent planet“. Not so many people seem to be concerned about the other side of the coin though, which is an ever-growing influence of algorithms on our personal life and the accompanying shift of decision power from humans to machines. In as little as 10 years, algorithms might decide if you get a new job – or if you get fired from your current one –, how much you will pay for your health insurance, whether you will be allowed to travel to a given country and who you will marry. So it’s time to say hi to your new boss: the algorithm.\r\n\r\nOften people talk either about the consequences of a data-driven society, or about the technological aspects of it, but rarely about the two together. With my talk I want to change that by discussing concrete technologies and algorithms that are used in data analysis today, together with their societal and political implications. I will show how algorithms can be trained to be racist, misogynic and plenty of other things, and that this actually happens in practice if no care is taken to avoid it. Finally, I will discuss various approaches to solve this dilemma, both technological and political.\r\n\r\nOutline:\r\n\r\n* Introduction to „big data“ and data analysis,\r\n* Parts of our lives that are already under algorithmic control,\r\n* Parts of our lives that soon will be under algorithmic control,\r\n* Example use case of algorithms in data science,\r\n* How machine learning can discriminate against certain groups of people,\r\n* Example algorithm: Classifying people in good and bad customers,\r\n* How the bias comes about: Algorithm-based discrimination,\r\n* How we can fix these problems.\r\n* Outlook.","logo":null},{"guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","id":"7513","date":"2015-12-29T16:15:00.000Z","day":"3","recording":{"license":null,"optout":false},"persons":[{"id":"6348","name":"Max Schrems"}],"links":[{"href":"https://media.ccc.de/v/32c3-7513-safe_harbor","title":null}],"attachments":[],"start":"17:15","duration":"01:00","room":"Hall 1","slug":"32c3-7513-safe_harbor","title":"Safe Harbor","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Introduction and consequences of the CJEU's \"Safe Harbor\" ruling, to invalidate the EU-US data sharing deal in the light of the revelations over US surveillance by Edward Snowden.","description":"In a landmark ruling the Court of Justice of the European Union (CJEU) has declared the \"Safe Harbor\" data sharing system between the EU and the US invalid over NSA surveillance, disclosed by Edward Snowden. The CJEU has for the first time ruled that \"mass surveillance\" as in the US violated the \"essence\" of Art 7 and 47 of the EU Charter of Fundamental Rights. \r\n\r\nThe ruling has major implications for global data flows as more than 4.000 US companies used \"Safe Harbor\" as their legal basis for EU-US data transfers - including large providers like Google, Apple, Microsoft, Facebook or Yahoo. In addition the ruling could also be relevant case law for similar forms of \"mass surveillance\" by EU member states.\r\n\r\nIn addition to explaining the legal situation [and a couple of insiders], the following questions should be answered:\r\n- What are possible legal solutions for global services?\r\n- What are possible technical solutions for global services?\r\n- What are ways forward to enforce fundamental rights in the digital sphere?","logo":"/system/events/logos/000/007/513/medium/8wxbfz6h.jpg?1449238770"},{"guid":"0c8f0e98-92ee-42ba-aa75-04fc50344904","id":"7501","date":"2015-12-29T17:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"1572","name":"rop"},{"id":"1633","name":"frank"}],"links":[{"href":"http://frank.geekheim.de/?page_id=128","title":null},{"href":"https://media.ccc.de/v/32c3-7501-ten_years_after_we_lost_the_war","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall 1","slug":"32c3-7501-ten_years_after_we_lost_the_war","title":"Ten years after ‚We Lost The War‘","subtitle":"The future does not look much brighter than ten years ago. What comes next, and what can the hacker community do to make things better?","track":null,"type":"lecture","language":"en","abstract":"The talk „We Lost The War“ was presented at Congress ten years ago, causing quite a stir. It was a prediction of a dark future that did not sit well with many people, but unfortunately many predictions have come true meanwhile. This talk will try to address what comes next, as well as what the hacker community can do to make things better.","description":"It’s a broad-spectrum talk that covers analysis of past and current events and possible futures in specific fields such as surveillance and digital rights, as well as a broader analysis of where the speakers think the world might be in 5-10 more years.","logo":null},{"guid":"3026eefd-c196-421a-b9d3-d678753ad8f7","id":"7310","date":"2015-12-29T19:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4439","name":"Henryk Plötz"}],"links":[{"href":"https://media.ccc.de/v/32c3-7310-qrtistry","title":null}],"attachments":[],"start":"20:30","duration":"00:30","room":"Hall 1","slug":"32c3-7310-qrtistry","title":"QRtistry","subtitle":"One can create art and beauty with … pixels","track":null,"type":"lecture","language":"en","abstract":"QR codes have rapidly overtaken rival 2D bar code symbologies and are becoming quite ubiquitous. Most uses are rather pedestrian though, and even the more non-standard modifications to pure QR codes lack a certain technical finesse, opting to just overpaint part of the code and let error correction handle that instead. Let's see how we can do better.","description":"The simple visual appearance of a QR code belies a very complex multi-step encoding process: Text is encoded using one or multiple character sets and encoding modes (allowing, for example, for a more efficient representation of strings of numbers), the resultant data is grouped into code words in segments with delimiters, error correction information is added, the augmented data is placed on the 2D matrix, structure obfuscation with a masking pattern is applied and version and format meta-data is added. each of these steps grants some degree of freedom to the encoder that will result in visually distinct but semantically identical codes.\r\n\r\nPrevious approaches to play with QR code appearance have usually stuck to modifying either end of this pipeline: Overwriting some parts of the finished code, or adding additional encoded data so that the finished code will have certain features embedded in it. The downside of these approaches is that you either rely on error correction to remove all the disturbances you've added, limiting the amount of modification possible, or become very limited in which pixels you can control.\r\n\r\nBy constructing an encoder and decoder that allows access to each step of the encoding/decoding process, I will allow you to go further and take control of the QR code as a whole. Changing all parameters of the encoding process will make the resulting code appear almost like you want it without relying on the error correcting capabilities, which then allows you to add further manipulations by abusing the error correction capabilities.\r\n\r\nAll code will be released under a free software license at the same time as the talk.","logo":null},{"guid":"550b8e16-3394-40d2-b47c-7cfe0031945b","id":"7426","date":"2015-12-29T20:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6136","name":"Gloria Spindle – Peng! Collective"}],"links":[{"href":"https://www.intelexit.org/","title":null},{"href":"http://www.wired.com/2015/09/campaign-help-surveillance-agents-quit-nsa-gchq/","title":null},{"href":"https://theintercept.com/2015/10/05/drone-flies-over-nsa-complex-in-germany-dropping-pamphlets/","title":null},{"href":"https://www.youtube.com/watch?v=5v2z7KwThIg","title":null},{"href":"https://www.youtube.com/watch?v=panT9P_VdyE","title":null},{"href":"https://media.ccc.de/v/32c3-7426-intelexit","title":null}],"attachments":[],"start":"21:15","duration":"00:30","room":"Hall 1","slug":"32c3-7426-intelexit","title":"Intelexit","subtitle":"Calling secret service agents to quit their jobs ","track":null,"type":"lecture","language":"en","abstract":"Giant billboard vans, drone-operated leaflet drops over an NSA building and calls to secret service agents, Intelexit explores all routes to reach out to secret service agents and convince them to follow their conscience and quit their jobs. We will take a look at the highlights of the campaign from 2015 and what's around the corner for 2016. ","description":"When we talk about government surveillance, we most often talk about it as a dark and menacing threat. But there are humans working day in and day out at secret service offices around the world, following orders, keeping secrets. How many of them feel ethically conflicted about their role in upholding these structures? How many of them might consider leaving and pursuing another career, if nudged in the right direction? Intelexit, an initiative produced by the Peng! Collective, reaches out to these people and offers them a friendly nudge and connects them with the right kinds of support if they wish to leave. Treading the line between art and activism, between spectacle and reality, Peng set up Intelexit to draw attention to the women and men working in the shadows, and to reach out to them. Intelexit was an experiment at first but it turned out to be very popular and needed, so it will continue into 2016 and it needs your help! ","logo":"/system/events/logos/000/007/426/medium/IntelExit-Twitter-profilepic.jpg?1446157318"},{"guid":"ba780105-8cc1-4e6e-8552-5e3bc150b9ff","id":"7102","date":"2015-12-29T21:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5605","name":"Arne Semsrott"}],"links":[{"href":"FragDenStaat.de","title":null},{"href":"https://media.ccc.de/v/32c3-7102-crypto_ist_abwehr_ifg_ist_angriff","title":null}],"attachments":[],"start":"22:00","duration":"00:30","room":"Hall 1","slug":"32c3-7102-crypto_ist_abwehr_ifg_ist_angriff","title":"Crypto ist Abwehr, IFG ist Angriff!","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Die Landesverrat-Affäre um netzpolitik.org hat gezeigt, wie wichtig es ist, nicht nur aus staatlichen Dokumenten zu zitieren, sondern sie im Original zu veröffentlichen. Ideales Werkzeug dafür ist das Informationsfreiheitsgesetz (IFG). Wir geben einen Überblick über die Entwicklungen dieses Jahr rund um das IFG.","description":"Die Landesverrat-Affäre um netzpolitik.org hat gezeigt, wie wichtig es ist, nicht nur aus staatlichen Dokumenten zu zitieren, sondern sie im Original zu veröffentlichen. \r\nIdeales Werkzeug dafür ist das Informationsfreiheitsgesetz (IFG), das aber weiterhin noch viel zu selten genutzt wird - weder von Aktivistinnen noch von Journalistinnen. \r\nWir zeigen, welche politischen Entwicklungen, Gerichtsurteile und Veröffentlichungen 2015 wichtig waren für die Informationsfreiheit in Deutschland - und auch in anderen Ländern wie England, wo der Freedom of Information Act von der Cameron-Regierung vermutlich bald eingestampft wird.\r\nFragDenStaat haben wir unterdessen weiterentwickelt zu einer Plattform, auf der Behörden auch dann angefragt werden können, wenn für sie das IFG nicht gilt. Und haben dabei erlebt, dass der bisher größte internationale Medienhype um die Plattform nicht auf seriöse Arbeit zurückzuführen ist, sondern auf einen 17-Jährigen, der über FragDenStaat seine Abiturklausuren vor dem Klausurtermin einsehen wollte.","logo":"/system/events/logos/000/007/102/medium/fds_5.jpg?1448229128"},{"guid":"60ba43d2-a9c8-42ab-a434-8772cb182675","id":"7119","date":"2015-12-29T21:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4927","name":"jiska"}],"links":[{"href":"https://media.ccc.de/v/32c3-7119-building_and_breaking_wireless_security","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/865/original/32c3_wireless_security.pdf?1452247299","title":"Presentation Slides"}],"start":"22:45","duration":"00:30","room":"Hall 1","slug":"32c3-7119-building_and_breaking_wireless_security","title":"Building and Breaking Wireless Security","subtitle":"Wireless Physical Layer Security & More...","track":null,"type":"lecture","language":"en","abstract":"This talk gives an overview on state-of-the-art wireless security concepts: How can we analyze wireless protocols? How can we build mechanisms that are secure even when the attacker has unlimited computational power? Can we exploit wireless transmission for more?","description":"Typically, wireless security is realized by implementing encryption on upper layers and replacing the wire with some wireless modulation schemes. Yet, there is more! For example, it is possible to build \"NSA proof\" systems or to use legacy WiFi frames as radar.\r\n\r\nFirst, there will be a brief introduction on how to hack things with your rad1o badge and other cheap software defined radios. This is your chance to understand how radio waves look like and how to capture and process them :)\r\n\r\nSecond, the concept of wireless physical layer security is introduced. Based on this, information-theoretic secure systems for confidential communication and key exchange can be built.\r\n\r\nThird, wireless transmissions contain a lot of additional information, since they get disturbed depending on the environment. Hence, we can extract positions of humans and even loudspeaker movements through walls.","logo":null},{"guid":"6063a86c-6703-4402-a7a1-074f18377b1a","id":"7265","date":"2015-12-29T22:30:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6066","name":"lilafisch"}],"links":[{"href":"https://media.ccc.de/v/32c3-7265-maritime_robotics","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/851/original/maritime-robotics-lilafisch.pdf?1451444750","title":"maritime-robotics-32c3-lilafisch"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"23:30","duration":"00:30","room":"Hall 1","slug":"32c3-7265-maritime_robotics","title":"Maritime Robotics","subtitle":"Hackers, I call thee to our Oceans!","track":null,"type":"lecture","language":"en","abstract":"This talk will have a look at maritime related robots and projects. It is not all that difficult and expensive - and there are truly still dragons to find!","description":"With this talk I want to expand the attention from air and land vehicles to maritime robotics and other maritime projects. Surface and underwater vehicles are challenging: Waterproofing is vital, communication is restricted and doesn't work the way we are used to, and weight is a factor that needs more consideration than usually (either to avoid sinking or to achieve it...). Still discovering this area myself, I'm planning to cover interesting challenges, surprising solutions, the differences in sensing and actuation, exciting projects, and the responsibility that comes with building robots for the sea.","logo":null},{"guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","id":"7152","date":"2015-12-29T23:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"2506","name":"Sec"},{"id":"6352","name":"ray"}],"links":[{"href":"https://media.ccc.de/v/32c3-7152-hacker_jeopardy","title":null}],"attachments":[],"start":"00:15","duration":"02:00","room":"Hall 1","slug":"32c3-7152-hacker_jeopardy","title":"Hacker Jeopardy","subtitle":"Zahlenraten für Geeks","track":null,"type":"other","language":"de","abstract":"The Hacker Jeopardy is a quiz show.","description":"The well known reversed quiz format, but of course hacker style. It once was entitled „number guessing for geeks“ by a German publisher, which of course is an unfair simplification. It’s also guessing of letters and special characters. ;)\r\n\r\nThree initial rounds will be played, the winners will compete with each other in the final.\r\n\r\nThe event will be in German, we hope to have live translation again.","logo":"/system/events/logos/000/007/152/medium/1567.png?1448117875"},{"guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","id":"7343","date":"2015-12-29T10:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6117","name":"Matthew Garrett"}],"links":[{"href":"https://mjg59.dreamwidth.org/35742.html","title":null},{"href":"https://media.ccc.de/v/32c3-7343-beyond_anti_evil_maid","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 2","slug":"32c3-7343-beyond_anti_evil_maid","title":"Beyond Anti Evil Maid","subtitle":"Making it easier to avoid low-level compromise, and why you'll still lose","track":null,"type":"lecture","language":"en","abstract":"In 2011, Joanna Rutkowska unveiled an easy-to-use tool for mitigating many attacks on system boot chains by using the TPM - the Anti Evil Maid. Unfortunately the implementation was difficult to incorporate into normal system boot in a secure manner - anybody able to observe a user could recreate the secret. This presentation describes a method to allow systems to prove their identity to the user without making it trivial for attackers to mimic a secure boot and extract secrets from the user, and why the state of modern hardware means this may still not be enough.","description":"A correctly implemented Trusted Boot solution makes it possible for systems to prove to other systems that they have booted with the expected boot chain. The Anti Evil Maid technique took advantage of this to encrypt a secret with the TPM in such a way that a system whose firmware or bootloader had been compromised would no longer be able to decrypt that secret. Unfortunately, the use of a static secret makes it easier for an attacker to mimic a good boot - as a result, a sufficiently motivated attacker could circumvent Anti Evil Maid and convince the user that a compromised system was in a good state.\r\n\r\nThis presentation describes the use of shared trust between the system and another device, making it significantly more difficult for an attacker to mimic a trusted boot. It includes a description of the implementation of Trusted Boot support in Free operating systems on modern UEFI systems, how this can be tied into sharing trust between multiple devices and the limitations that may still permit state-level actors to compromise these techniques.","logo":null},{"guid":"fb537cde-7f1d-484b-971b-1d30a543ecfb","id":"7483","date":"2015-12-29T11:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4034","name":"Joscha"}],"links":[{"href":"https://media.ccc.de/v/32c3-7483-computational_meta-psychology","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 2","slug":"32c3-7483-computational_meta-psychology","title":"Computational Meta-Psychology","subtitle":"An Artificial Intelligence exploration into the creation of meaning","track":null,"type":"lecture","language":"en","abstract":"Computational theories of the mind seem to be ideally suited to explain rationality. But how can computations be subverted by meaning, emotion and love?","description":"Minds are computational systems that are realized by causal functionality provided by their computational substrate (such as nervous systems). Their primary purpose is the discovery and exploitation of structure in an entropic environment, but they are capable to something much more sinister, too: they give rise to meaning.\r\nMinds are the solution to a control problem: in our case, this problem amounts to navigating a social primate through a complex open environment in an attempt to stave off entropy long enough to serve evolutionary imperatives. Minds are capable of second-order control: they create representational structures that serve as a model of their environment. And minds are capable or rationality: they can learn how to build models that are entirely independent of their subjective benefit for the individual. \r\nBecause we are the product of an evolutionary process, our minds are constrained by powerful safeguards against becoming fully rational in the way we construct these models: our motivational system can not only support our thinking and decision making to optimize individual rewards, but censor and distort our understanding to make us conform to social and evolutionary rewards. This opens a security hole for mind-viruses: statebuilding systems of beliefs that manage to copy themselves across populations and create causal preconditions to serve neither individuals nor societies, but primarily themselves.\r\nI will introduce a computational model of belief attractors that can help us to explain how our minds can become colonized and governed by irrational beliefs that co-evolve with social institutions.\r\nThis talk is part of a series of insights on how to use the epistemology of Artificial Intelligence to understand the nature of our minds.","logo":"/system/events/logos/000/007/483/medium/cosmic_clockwork_core_mechanics_by_mandelwerk-d50bpj2.jpg?1443731169"},{"guid":"36ff9cc8-f717-42f3-b570-fca9810a02fa","id":"7255","date":"2015-12-29T13:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5006","name":"Zakir Durumeric"}],"links":[{"href":"https://media.ccc.de/v/32c3-7255-neither_snow_nor_rain_nor_mitm_the_state_of_email_security_in_2015","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/722/original/paper.pdf?1443592008","title":"Neither Snow Nor Rain Nor MITM . . . An Empirical Analysis of Email Delivery Security"}],"start":"14:00","duration":"01:00","room":"Hall 2","slug":"32c3-7255-neither_snow_nor_rain_nor_mitm_the_state_of_email_security_in_2015","title":"Neither Snow Nor Rain Nor MITM… The State of Email Security in 2015","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Is your email being sent in the clear? While PGP and S/MIME provide end-to-end encrypted mail, most users have yet to adopt these practices, and for users who have, these tools leave metadata, such as the subject, sender, and recipient, visible everywhere along a message’s path. SMTP—the ubiquitous mail transport protocol—has evolved over the years to add encryption and authentication, both of which take place behind the scenes and help guard against surveillance and spam. While these features are being increasingly deployed, our research shows that they are almost always configured in vulnerable ways—the details of which are hidden from the users sending and receiving mail. Even more disturbingly, these vulnerabilities are being widely exploited in the wild: in seven countries, more than 20% of inbound Gmail messages are downgraded to cleartext by network-based attacks. In the most severe case, 96% of messages sent from Tunisia to Gmail are downgraded to cleartext. In this talk, I’ll introduce the commonly used SMTP security extensions—including STARTTLS, SPF, DKIM, and DMARC—and describe the current state of mail security on the Internet. I'll describe several commonly occurring attacks our recent research has found and discuss how mail operators can configure their servers to secure email transport. Finally, I'll discuss several weaknesses in the protocols we're using and recent proposals for helping secure email transport.","description":"<p>Email carries some of our most sensitive communication, including private correspondence, financial details, and password recovery confirmations. We expect that messages are private and, in many cases, unforgeable. However, SMTP—the protocol responsible for relaying messages between mail servers—did not originally authenticate senders or encrypt mail in transit. Instead, servers support these features through SMTP extensions. Adopting these features is entirely voluntary and they have only been gradually adopted. As a consequence, mail servers still tolerate unprotected communication and will send messages in clear text if any problems occur when negotiating a secure connection.</p>\r\n\r\n<p>Earlier this year, I worked with colleagues at the University of Michigan and Google to measure the global adoption of email security features and try to better understand how well email is secured in practice. Our study draws from two unique data sources: connection logs for Gmail spanning 16 months, plus a snapshot of SMTP server configurations from April 2015 for the Alexa Top Million domains. From Gmail’s perspective, incoming messages protected by TLS have increased 82% over the last year, peaking at 60% of all inbound mail. However, this improvement was largely because a small number of popular web mail providers deployed TLS—many organizations still haven't deployed these features correctly. I will discuss these results and many more that reveal several major weaknesses in the global deployment of mail transport security.</p>\r\n\r\n<p>This security patchwork enables network attackers to intercept and surveil email. In one kind of attack, actors corrupt the TLS handshakes at the the start of an SMTP connection to downgrade the connection to cleartext—exposing messages to potential eavesdropping. Using Internet-wide scanning, we identified more than 41,000 SMTP servers in 193 countries that are routinely forced to deliver email as cleartext. We analyzed the mail sent to Gmail from these hosts and find that in seven countries, more than 20% of all messages are prevented from being encrypted by active network attacks. In the most severe case, 96% of messages sent from Tunisia to Gmail are downgraded to cleartext, but even in Denmark, nearly 4% of messages are affected.</p>\r\n\r\n<p>In a second class of attack, DNS servers provide fraudulent MX records for popular email providers. We searched for servers that provide fraudulent addresses for Gmail’s SMTP servers, and we find 14.6K publicly accessible DNS servers in 69 countries provide falsified responses. We investigate the messages that Gmail received from these hosts and find that in 193 countries more than 0.01% of messages from each country are transited through these impostor hosts. Six of the eight most-affected countries are in Europe.</p>\r\n \r\n<p>In this talk, I will first introduce the security extensions for SMTP and the current state of mail security. Then, drawing on our measurements, I will discuss the weaknesses in these protocols and the attacks we see occurring in the wild. I'll discuss what mail server operators, developers, and even end users, can do to protect against these problems. Finally, I will present current proposals for securing mail transport and several weaknesses that we still need to address.</p>","logo":null},{"guid":"b7327513-182a-455a-932e-aab4791f5331","id":"7284","date":"2015-12-29T15:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"1621","name":"Fefe"}],"links":[{"href":"https://media.ccc.de/v/32c3-7284-check_your_privileges","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 2","slug":"32c3-7284-check_your_privileges","title":"Check your privileges!","subtitle":"How to drop more of your privileges to reduce attack surface.","track":null,"type":"lecture","language":"en","abstract":"After defensive programming techniques and before attack method mitigations, the least privilege principle is our strongest weapon against exploitation. Much of the focus has been on how the admin can sandbox processes away.","description":"A recent development is the idea that the process itself can „sandbox itself away“. This talk explores how that works in practice and is aimed at interested programmers.\r\n\r\nThis talk will mostly focus on seccomp-filter and namespaces on Linux, but it will also talk about capsicum (FreeBSD) and tame (OpenBSD), and old-school methods like ptrace and chroot, and cover capabilities. Also maybe a bit about systrace/selinux style approaches where the admin sets the profile from the outside, and why I chose to focus on letting the app sandbox itself instead.","logo":null},{"guid":"9d3ce896-1ee6-47c5-b616-1ebcf6860690","id":"7443","date":"2015-12-29T16:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5595","name":"CAGE"},{"id":"6418","name":"Cerie Bullivant"}],"links":[{"href":"http://cageuk.org/","title":null},{"href":"http://cageuk.org/article/protecting-thought-preventing-prevent","title":null},{"href":"https://www.youtube.com/watch?v=emfncWOhXw8","title":null},{"href":"https://media.ccc.de/v/32c3-7443-the_price_of_dissent","title":null}],"attachments":[],"start":"17:15","duration":"01:00","room":"Hall 2","slug":"32c3-7443-the_price_of_dissent","title":"The Price Of Dissent","subtitle":"The surveillance state & modern day COINTELPRO tactics","track":null,"type":"podium","language":"en","abstract":"CAGE exists to highlight abuses of the War on Terror. It has uncovered many secrets of governments that they would like to remain secret, and is now one of the most targeted organisations in the UK. Hear how the state attempts to suppress dissent, and yet we manage to speak out.","description":"The War on Terror is the primary justification used to invest ever-increasing powers to the security state. It is the reason why states have been able to amass the powers to conduct mass surveillance of millions of law-abiding citizens. The surveillance state continues to expand. \r\n\r\nCAGE was formed to highlight the abuses of the War on Terror after the creation of Guantanamo Bay prison. It has uncovered the existence of secret detention sites across the globe, revealed the involvement of Western intelligence agencies in rendition and torture and has campaigned courageously on behalf of prisoners that have been tortured and held without detention and trial for years. Our work has been underpinned by an unshakable commitment to the principles of due process and the rule of law. Today, CAGE is leading the charge against one of the most draconian and intrusive Government policies that has ever been devised – PREVENT. \r\n\r\nWe are representatives of the ‘suspect community’ of our times. As a result of our challenging yet rational, evidence-based and measured contributions, our organisation has become one of the most targeted in the UK. Our bank accounts have been frozen, one of our directors has been arrested, our funders have been pressured, our homes & vehicles have been bugged... We’re constantly attempting to secure our communications and environments just to continue our work. From new encryption methods to Faraday bags.\r\n\r\nThe Security State is trying to marginalise each of us. But we are taking on the security state together and citizens are being empowered. There are many that agree with us and recognise what is to come... ","logo":"/system/events/logos/000/007/443/medium/cage_logo_l_tw.png?1443653801"},{"guid":"13789a83-1028-40a6-ac32-827b57ec3f8e","id":"7449","date":"2015-12-29T17:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6054","name":"Jennifer Helsby"}],"links":[{"href":"https://media.ccc.de/v/32c3-7449-prediction_and_control","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall 2","slug":"32c3-7449-prediction_and_control","title":"Prediction and Control","subtitle":"Watching Algorithms","track":null,"type":"lecture","language":"en","abstract":"Mass quantities of data are being incorporated into predictive systems in an ever-broadening set of fields. In many cases, these algorithms operate in the dark and their use has implications both intentional and unintentional. This talk will cover some of the fairness and accountability issues involved in controlling algorithms for media, policy, and policing. ","description":"Decision making is increasingly being performed by intelligent algorithms in areas from search engine rankings to public policy. Algorithmic decision making includes applications as important as who is flagged as a potential terrorist as in the United States’ no-fly list to deciding how police officers will be allocated as in predictive policing.\r\n\r\nThese systems are getting smarter as we develop better algorithms, as well as more expansive as they integrate more data. Government agencies and corporations are determining how to best convert the mass quantities of data that have been collected on their citizens and customers into meaningful inferences and decisions through data mining and predictive systems.\r\n\r\nHowever, many of these systems consist of algorithms whose operation is closed to the public - constituting a new form of secrecy maintained by powerful entities. The intentional or unintentional impact of some of these systems can have profound consequences.\r\n\r\nThis talk will cover some of the emerging issues with the widespread use of these systems in terms of transparency and fairness. We need to have some mechanism for verifying how these systems operate. Are these algorithms discriminatory? Are they fair with respect to protected groups? What role can auditing and reverse engineering play? I'll discuss these questions, the current status of this field, and some paths forward. ","logo":"/system/events/logos/000/007/449/medium/algowatch.png?1448147708"},{"guid":"930673b3-4f75-40eb-8be5-574469c3920f","id":"7245","date":"2015-12-29T19:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6059","name":"Jethro Beekman"}],"links":[{"href":"https://jbeekman.nl/blog/2015/03/reverse-engineering-uefi-firmware/","title":null},{"href":"https://media.ccc.de/v/32c3-7245-reversing_uefi_by_execution","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/846/original/presentation.pdf?1451423818","title":"presentation"}],"start":"20:30","duration":"00:30","room":"Hall 2","slug":"32c3-7245-reversing_uefi_by_execution","title":"Reversing UEFI by execution","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"This talk will be an overview of how to reverse-engineer Unified Extensible Firmware Interface (UEFI) firmware, the replacement for BIOS. Various useful tools will be discussed, including those written by the presenter and those written by others. One of the highlights will be a tool that enables running parts of the firmware in userspace on a standard Operating System.","description":"The Unified Extensible Firmware Interface (UEFI) is a programming environment quite different from regular Operating Systems models, and as such reverse engineering UEFI software is quite different from reversing standard software.\r\n\r\nThis talk will consits of three parts. First, an overview of UEFI and what makes it different will be presented. Then, existing and new tools that aid in reversing UEFI are discussed, including a demonstration of the <i>efiperun</i> tool that enables running UEFI modules in userspace. The talk will conclude with the recounting of a succesful reverse engineering project to uncover the Lenovo hard drive password hashing algorithm.\r\n\r\nJethro Beekman is a security researcher and Ph.D. student at the University of California, Berkeley. He has a broad range of interests in technology, ranging from electronics to cryptography. Recent work has focused on various topics such as side-channels, remote attestation, Heartbleed and the Rust programming language.","logo":null},{"guid":"8b01d636-d39b-44b8-8d6f-fc03e47eae1b","id":"7441","date":"2015-12-29T20:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6145","name":"Filippo Valsorda"}],"links":[{"href":"https://media.ccc.de/v/32c3-7441-the_plain_simple_reality_of_entropy","title":null}],"attachments":[],"start":"21:15","duration":"00:30","room":"Hall 2","slug":"32c3-7441-the_plain_simple_reality_of_entropy","title":"The plain simple reality of entropy","subtitle":"Or how I learned to stop worrying and love urandom","track":null,"type":"lecture","language":"en","abstract":"Entropy, the randomness used in many critical cryptography processes including key generation, is as important as it is misunderstood. Many myths are fueled by misleading documentation. This presentation aims to provide simple and actionable information while explaining the core technical details and real world implementations.","description":"Randomness is as simple as critical. An application wants some bytes which an attacker can't predict. The clearest example is generating a cryptographic key, but a wide array of functions depend on randomness.\r\n\r\nAny time a key is generated, any time a DSA signature is made, any time the memory layout is randomized, applications rely on being able to create strings of bytes impossible to predict. If that comes short everything fails: cryptographic keys are compromised, exploits protections are ineffective.\r\n\r\nEntropy, the unpredictable raw material, is usually collected by the Operating System and exposed to the applications that need it. Once enough bits of entropy have been collected, it becomes impossible to predict the output of the CSPRNG (cryptographically secure pseudo-random number generator), a stirrer of sorts that expands a seed into unlimited whitened random bytes, often based on stream ciphers or hashes.\r\n\r\nReal risks include trying to use a CSPRNG early on in the boot process, when not enough random events have been collected, or using a userspace CSPRNG instead of the kernel one and forgetting to seed it. Or using a non-CS PRNG.\r\n\r\nThat's just about it. However, there is a lot of misunderstanding on \"decreasing entropy\". It's a widespread myth that using random bytes decreases the \"amount\" of entropy. Reality is, to an attacker who's basically trying to predict the CSPRNG output there's no decrease in difficulty no matter how much output is drawn, so developers can avoid introducing additional complexity because of this.\r\n\r\nThis is all backed up by showing a simple toy CSPRNG design, and reasoning about its properties.\r\n\r\nMore practically, the points above translate into \"in Linux, just use /dev/urandom or the get_random syscall\". That's the kernel interface for the system CSPRNG. Its inner working are presented and they will hopefully make it clear why there is no meaningful difference from the \"counting\" /dev/random.","logo":null},{"guid":"8becd5e2-45df-4723-9d6a-2e9f334875d2","id":"7401","date":"2015-12-29T21:00:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"4175","name":"taziden"},{"id":"6419","name":"kload"}],"links":[{"href":"http://internetcu.be/","title":null},{"href":"http://www.ffdn.org/en","title":null},{"href":"https://yunohost.org/#/index_en","title":null},{"href":"https://github.com/labriqueinternet/","title":null},{"href":"https://media.ccc.de/v/32c3-7401-internet_cube","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/764/original/CEfYMBiWoAEr66x.jpg_large.jpeg?1443649095","title":"Internet Cube, AFK"}],"start":"22:00","duration":"00:30","room":"Hall 2","slug":"32c3-7401-internet_cube","title":"Internet Cube","subtitle":"Let's Build together a Free, Neutral and Decentralized Internet","track":null,"type":"lecture","language":"en","abstract":"Two years after the invitation to build your own iSP at 30C3, I'd like to invite everyone to take part in building a better Internet with the Internet Cube project.\r\n","description":"At the crossroads of DIY Internet Access, Open Source Hardware and Self-Hosting Free Software, \"Internet Cube\" is the living proof everyone can regain control on their data.\r\nUsing a public and static VPN endpoint provided by a neutral and privacy-friendly ISP, the Cube enables the user to have her services accessible from everywhere simply by plugging it to the Internet.\r\nAssorted with a wireless antenna, the Cube operates as an ambulant cleaning gateway to the Internet, getting rid of whatever stupid thing a commercial ISP would be doing on the network like port blocking or service prioritization.\r\n\r\nThere are many other use cases enabled by already existing Y U NO HOST applications like turning the Cube into a PirateBox or a Tor gateway.\r\n\r\nWhen the first prototype came to life, someone said \"Well, congratulations guys, you've just built an actual working FreedomBox\" and I believe that what we built is more than that.","logo":"/system/events/logos/000/007/401/medium/internetcube-poster-a3.png?1443648890"},{"guid":"d961bd32-2c2a-45a5-bc58-64449bb4b16a","id":"7413","date":"2015-12-29T21:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4366","name":"Thomas Lohninger"},{"id":"6402","name":"Werner Reiter"}],"links":[{"href":"https://staatsschutz.at","title":null},{"href":"https://akvorrat.at","title":null},{"href":"http://technische-aufklaerung.de/ta014-thomas-lohninger-ueberwachung-in-oesterreich/","title":null},{"href":"http://www.parlament.gv.at/PAKT/VHG/XXV/ME/ME_00110/","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/848/original/32c3-akvorrat-v4.pdf?1451433065","title":"Slides"}],"start":"22:45","duration":"00:30","room":"Hall 2","slug":"32c3-7413-osterreich_der_kampf_gegen_unkontrollierte_massenuberwachung","title":"Österreich: Der Kampf gegen unkontrollierte Massenüberwachung","subtitle":"Geheimdienste kontrolliert man am besten, indem man ihre Gründung verhindert","track":null,"type":"lecture","language":"de","abstract":"Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein \"Polizeiliches Staatsschutzgesetz\" vorgelegt. Damit soll ein neuer Inlandsgeheimdienst mit weitreichenden Überwachungsbefugnissen geschaffen werden. Unabhängige Kontrolle durch Gerichte und das Parlament ist nicht vorgesehen. Bereits in der Begutachtungsphase wurde das Gesetz massiv kritisiert. Der AKVorrat gab mit einer umfassenden Stellungnahme die wichtigsten Argumente vor. Der Widerstand gegen das Gesetz und die Kampagne des AKVorrat haben zwar zu mehrfacher Verschiebung der Beschlussfassung geführt, aber die Geheimdienstpläne der Regierung sind trotz mehr als 22.000 Unterzeichnerinnen und Unterzeichnern der Petition auf www.staatsschutz.at nach wie vor nicht vom Tisch. Der Talk bietet Einblicke, wie Geheimdienste in der Post-Snowden-Ära öffentlich und nicht öffentlich diskutiert werden.","description":"Wir zeigen die Geschichte von Österreich als Drehscheibe von internationalen Geheimdienstaktivitäten. Die aktuellen Pläne der Regierung zur Schaffung eines Inlandsgeheimdienstes sind in diesem Kontext zu sehen. Der aktuelle Gesetzesvorschlag stattet Polizeibehörden mit Geheimdienstbefugnissen aus, die einer unabhängigen Kontrolle weitestgehend entzogen sind. In unserer Analyse stellen wir unsere Kritikpunkte in einen größeren Kontext, der der Idee einer Überwachungsgesamtrechnung folgt.\r\n\r\nWir stellen unsere Kampagne vor, die auf zwei Säulen steht: Aktivismus und politisches Lobbying. Der Spagat zwischen beiden Polen ist nicht immer einfach, aber unbedingt nötig, um die Breite des Widerstandes gegen das Gesetz darzustellen. Der reicht von der Bischofskonferenz, über Amnesty International bis zu Arbeitnehmervertretungen. Die juristische Expertise des AKVorrat macht uns auch zu ernstzunehmenden Gesprächspartnern von Politikerinnen und Politikern.\r\n\r\nThomas Lohninger und Werner Reiter vom AKVorrat Österreich zeichnen das Bild eines ereignisreichen Widerstands gegen die Einrichtung eines Inlandsgeheimdienstes inkl. Gehimdienstdosenschießen und dem Defacement der Kampagnenwebsite. Sie diskutieren Kampagneninstrumente und ihre Wirksamkeit; und vor allem, unter welchen Rahmenbedingungen polizeiliche Ermittlungen menschenrechtskonform gestaltet werden können.","logo":"/system/events/logos/000/007/413/medium/Screen_Shot_2015-09-30_at_23.39.45.png?1443649924"},{"guid":"4d473646-e765-441b-98eb-653dfe6bdeb1","id":"7547","date":"2015-12-29T22:30:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"2142","name":"Peter Stuge"}],"links":[{"href":"https://media.ccc.de/v/32c3-7547-libusb_maintainer_fail","title":null}],"attachments":[],"start":"23:30","duration":"00:30","room":"Hall 2","slug":"32c3-7547-libusb_maintainer_fail","title":"libusb: Maintainer fail","subtitle":"How I failed to run an open source project","track":null,"type":"lecture","language":"en","abstract":"In 2010 I was asked by the second maintainer in a row to take over as new maintainer of the libusb project. The first time I had declined.\r\n\r\nThe second time I accepted, and sadly failed.\r\n\r\nEventually a hostile fork emerged, with the explicit goal to take over the original project.\r\n\r\nI will tell you my story, which mistakes I made and what I learned - about independent and corporate contributors in open source projects, about package maintainers in downstream OS distributions, about trolls on the internet, about GitHub Inc. and about myself.\r\n\r\nThe hostile fork? It wasn't merged.","description":null,"logo":null},{"guid":"47cbd880-f500-4c44-b717-c11ed1da087d","id":"7225","date":"2015-12-29T23:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5735","name":"anna"},{"id":"1630","name":"Constanze Kurz"},{"id":"3594","name":"cbass"},{"id":"6401","name":"Felix Betzin"}],"links":[{"href":"https://media.ccc.de/v/32c3-7225-grundrechte_gelten_nicht_im_weltall","title":null}],"attachments":[],"start":"00:15","duration":"01:00","room":"Hall 2","slug":"32c3-7225-grundrechte_gelten_nicht_im_weltall","title":"Grundrechte gelten nicht im Weltall!","subtitle":"Die absurdesten Szenen aus dem NSA-BND-Untersuchungsausschuss","track":null,"type":"lecture","language":"de","abstract":"In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des NSA-BND-Untersuchungsausschusses, die bei netzpolitik.org nachzulesen sind, verbergen sich interessante Antworten auf Fragen, die niemand gestellt hat, vorher unbekannte juristische „Theorien“ des BND und Perlen verlogener Rabulistik.","description":"Das schreit förmlich danach, Teile der Live-Protokolle aufzuarbeiten und vorzulesen. Genau das werden wir tun.","logo":"/system/events/logos/000/007/225/medium/alles.jpg?1448372424"},{"guid":"3f61827f-8b17-47b4-a43c-e0dce6532cbe","id":"7252","date":"2015-12-29T10:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6056","name":"Andrei Costin"}],"links":[{"href":"http://www.s3.eurecom.fr/docs/usenixsec14_costin.pdf","title":null},{"href":"http://s3.eurecom.fr/docs/dynamicanalysis_costin.pdf","title":null},{"href":"https://media.ccc.de/v/32c3-7252-in_security_of_embedded_devices_firmware_-_fast_and_furious_at_large_scale","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall G","slug":"32c3-7252-in_security_of_embedded_devices_firmware_-_fast_and_furious_at_large_scale","title":"(In)Security of Embedded Devices' Firmware - Fast and Furious at Large Scale","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":" Embedded systems are omnipresent in our everyday life and are becoming \r\n increasingly present in many computing and networked environments. For example,\r\n they are at the core of various Common-Off-The-Shelf (COTS) devices such as\r\n printers, video surveillance systems, home routers and virtually anything we \r\n informally call electronics. The emerging phenomenon of the Internet-of-Things\r\n (IoT) will make them even more widespread and interconnected. Cisco famously\r\n predicted that there will be 50 billion connected embedded devices by 2020.\r\n Given those estimations, the heterogeneity of technology and application fields,\r\n and the current threat landscape, the security of all those devices becomes of\r\n paramount importance. In addition to this, manual security analysis does not\r\n scale. Therefore, novel, scalable and automated approaches are needed.\r\n In this talk, we present several methods that make *the large scale\r\n security analyses of embedded devices* a feasible task. We implemented \r\n those techniques in a scalable framework that we tested on real world data. \r\n First, we collected a large number of firmware images from Internet \r\n repositories and then performed simple static analysis. \r\n Second, since embedded devices often expose web interfaces for \r\n remote administration, therefore we developed techniques for large scale \r\n static and dynamic analysis of such interfaces. \r\n Finally, identifying and classifying the firmware files, as well as \r\n fingerprinting and identifying embedded devices is difficult, especially \r\n at large scale. \r\n Using these techniques, we were able to discover a large number of new \r\n vulnerabilities in dozens of firmware packages, affecting a great variety of vendors and\r\n device classes. We were also able to achieve high accuracy in fingerprinting and\r\n classification of both firmware images and live devices.","description":"This material is both important and innovative because it addresses the \r\nmore and more pressing matter of securing/hacking the IoT, hence the \r\nembedded devices themselves. Moreover, it's envisioned that the topic will \r\ngo in the next few years from important to critically important. \r\n\r\nThis material is definitely innovative because it will provide technical \r\naspects of security research by combining several interesting \r\nresearch directions:\r\n- non-x86 emulation (and the caveats)\r\n- some aspects of static and dynamic analysis\r\n- machine learning\r\n- device fingerprinting\r\n\r\nThis material is significant because it will present the results, knowledge \r\nand insights that resulted from three years of experimentation and work \r\nusing systematic, methodological and academic approaches. \r\n\r\nAudience will be presented with technical knowledge, demos, insights, lessons \r\nlearned and open challenges. \r\n","logo":null},{"guid":"3a1241e9-1e0b-4539-a44c-7d04257ae16d","id":"7559","date":"2015-12-29T11:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5263","name":"gedsic"},{"id":"4601","name":"bigalex"}],"links":[{"href":"https://media.ccc.de/v/32c3-7559-lightning_talks_day_3","title":null}],"attachments":[],"start":"12:45","duration":"02:15","room":"Hall G","slug":"32c3-7559-lightning_talks_day_3","title":"Lightning Talks Day 3","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! ","description":"To get involved and learn more about what is happening please visit <a href=\"https://events.ccc.de/congress/2015/wiki/Static:Lightning_Talks\">the Lightning Talks Wikipage</a>.","logo":"/system/events/logos/000/007/559/medium/fd_30c0.JPG?1448895859"},{"guid":"276311bf-60b5-411a-ab68-6a8fbb0fd6a9","id":"7165","date":"2015-12-29T15:00:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"5882","name":"Bernd Lehmann"}],"links":[{"href":"https://media.ccc.de/v/32c3-7165-vehicle2vehicle_communication_based_on_ieee_802_11p","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/860/original/Vehicle2Vehicle.pdf?1451900636","title":"Slides"}],"start":"16:00","duration":"01:00","room":"Hall G","slug":"32c3-7165-vehicle2vehicle_communication_based_on_ieee_802_11p","title":"Vehicle2Vehicle Communication based on IEEE 802.11p","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"This talk is about Vehicle2Vehicle (V2V) communication in Europe and in the U.S. Next to the introduction of some requirements for V2V communication, the basic approaches of V2V communication based on IEEE 802.11p are presented. This includes an introduction to communication stack, concepts of message dissemination, message contents, privacy & security issues and an outlook to further developments.\r\n(The email address has an error. It should en with \"de\" not with \"com\")","description":"Modern vehicles have several advanced driver assistant systems (ADASs). This is the beginning of the full automation of the driving task. Vehicle manufacturers already showed first fully automated prototypes but a lot of challenges have to be addressed until such systems will be commercially available. One challenge is to provide the necessary information for the self-driving vehicle to make the right driving decisions. V2V communication is one possible technology to provide this information. The proposed talk is an introduction to the state of the art of V2V communication based on IEEE 802.11p.\r\n\r\nThis talk is a technical introduction to Vehicle2Vehicle communication. It will introduce the basic concepts of V2V technology and provides references to documents of the standardization. The talk will consist of the following parts:\r\n\r\nMotivation:\r\nThe talk starts by describing the scope and possible applications of V2V communication focusing on the use-case of the “Electronic Emergency Break Light”. What is more, V2V communication will be compared to traditional on-board sensors like Lidar or Radar.\r\n\r\nBasic concepts:\r\nThe state of the art concepts of V2V communication based on IEEE 802.11p and its differences compared to consumer WiFi will be discussed in this section. Furthermore, the existing concepts and standards developed in both Europe and the U.S. will be compared, with a special focus on the differences between the two approaches. In summary, the following questions will be addressed:\r\n•\tWhat are the approaches for V2V communication in Europe and the U.S.? \r\n•\tHow is communication realized for V2V?\r\n•\tWhich standardization approaches exist and where can they be found?\r\n•\tWhat are the most important disseminated information and messages?\r\n•\tHow are these messages formatted? (header structure)\r\n•\tWhat are the differences between the V2V communication concepts in the U.S and Europe ?\r\n•\tWhich technical challenges have to be solved?\r\n\r\nPrivacy and Security:\r\nAs V2V communication will be used to broadcast the vehicle’s position and dynamic state, the privacy of the driver has to be protected. The talk will introduce the pursued concepts for privacy protection, whilst ensuring that only authorized entities are able participate in the communication. Due to the complexity of the topic, this section will focus on the concepts and the standards found in Europe.\r\n\r\nPerspective:\r\nEventually, the talk will address future work within the field of V2V communication, such as novel ADASs and privacy concepts.\r\n\r\nRemarks: The talk is only about the state of the art of V2V technology, its standardization and its further development.\r\n","logo":null},{"guid":"371063d0-da9d-4d9f-bbe9-f5739eba2f30","id":"7491","date":"2015-12-29T16:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3596","name":"Aylin"}],"links":[{"href":"https://www.youtube.com/watch?v=SK73oyI4Ygw&feature=youtu.be","title":null},{"href":"https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/caliskan-islam","title":null},{"href":"https://freedom-to-tinker.com/blog/aylin/when-coding-style-survives-compilation-de-anonymizing-programmers-from-executable-binaries/","title":null},{"href":"https://media.ccc.de/v/32c3-7491-de-anonymizing_programmers","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/843/original/caliskan-islam_when.pdf?1451410769","title":"When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries"},{"href":"/system/event_attachments/attachments/000/002/845/original/Aylin_32C3.pdf?1451412347","title":"CODE STYLOMETRY & PROGRAMMER DE-ANONYMIZATION"}],"start":"17:15","duration":"01:00","room":"Hall G","slug":"32c3-7491-de-anonymizing_programmers","title":"De-anonymizing Programmers","subtitle":"Large Scale Authorship Attribution from Executable Binaries of Compiled Code and Source Code","track":null,"type":"lecture","language":"en","abstract":"Last year I presented research showing how to de-anonymize programmers based on their coding style. This is of immediate concern to open source software developers who would like to remain anonymous. On the other hand, being able to de-anonymize programmers can help in forensic investigations, or in resolving plagiarism claims or copyright disputes. \r\n\r\nI will report on our new research findings in the past year. We were able to increase the scale and accuracy of our methods dramatically and can now handle 1,600 programmers, reaching 94% de-anonymization accuracy. In ongoing research, we are tackling the much harder problem of de-anonymizing programmers from binaries of compiled code. This can help identify the author of a suspicious executable file and can potentially aid malware forensics. We demonstrate the efficacy of our techniques using a dataset collected from GitHub.","description":"It is possible to identify individuals by de-anonymizing different types of large datasets. Once individuals are de-anonymized, different types of personal details can be detected from data that belong to them. Furthermore, their identities across different platforms can be linked. This is possible through utilizing machine learning methods that represent human data with a numeric vector that consists of features. Then a classifier is used to learn the patterns of each individual, to classify a previously unseen feature vector.\r\n \r\nTor users, social networks, underground cyber forums, the Netflix dataset have been de-anonymized in the past five years. Advances in machine learning and the improvements in computational power, such as cloud computing services, make these large scale de-anonymization tasks possible in a feasible amount of time. As data aggregators are collecting vast amounts of data from all possible digital media channels and as computing power is becoming cheaper, de-anonymization threatens privacy on a daily basis.\r\n \r\nLast year, we showed how we can de-anonymize programmers from their source code. This is an immediate concern for programmers who would like to remain anonymous. (Remember Saeed Malekpour, who was sentenced to death after the Iranian government identified him as the web programmer of a porn site.) We scaled our method to 1,600 programmers after last year’s talk on identifying source code authors via stylometry. We reach 94% accuracy in correctly identifying the 1,600 authors of 14,400 source code samples. These results are a breakthrough in accuracy and magnitude when compared to related work.\r\n \r\nThis year we have been focusing on de-anonymizing programmers from their binaries of compiled code. Identifying stylistic fingerprints in binaries is much more difficult in comparison to source code. Source code goes through compilation to generate binaries and some stylistic fingerprints get lost in translation while some others survive. We reach 65% accuracy, again a breakthrough, in de-anonymizing binaries of 100 authors.\r\n \r\nDe-anonymization is a threat to privacy but it has many security enhancing applications. Identifying authors of source code helps aid in resolving plagiarism issues, forensic investigations, and copyright-copyleft disputes. Identifying authors of binaries can help identify the author of a suspicious executable file or even be extended to malware classification. We show how source code and binary authorship attribution works on a real world datasets collected from GitHub.\r\n\r\nI hope this talk raises awareness on the dangers of de-anonymization while showing how it can be helpful in resolving conflicts in some other areas. Binary de-anonymization could potentially enhance security by identifying malicious actors such as malware writers or software thieves.\r\n \r\nI would like to conclude by mentioning two future directions. Can binary de-anonymization be used for malware family classification and be incorporated to virus detectors? Obfuscators are not the counter measure to de-anonymizing programmers. We can identify the authors of obfuscated code with high accuracy. There is an immediate need for a code anonymization framework, especially for all the open source software developers who would like to remain anonymous.","logo":null},{"guid":"b4339927-6780-4881-a342-e7a262078dce","id":"7374","date":"2015-12-29T17:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6051","name":"Dia Kayyali"}],"links":[{"href":"https://www.eff.org/sls","title":null},{"href":"https://media.ccc.de/v/32c3-7374-the_architecture_of_a_street_level_panopticon","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall G","slug":"32c3-7374-the_architecture_of_a_street_level_panopticon","title":"The architecture of a street level panopticon","subtitle":"How drones, IMSI Catchers, and cameras are shaping our cities","track":null,"type":"lecture","language":"en","abstract":"Street level surveillance technology, such as surveillance cameras and iris scanners, is now a pervasive part of the daily lives of city dwellers, with disastrous consequences for freedom of expression. This talk will cover what kind of street level technology we’re seeing, how it’s spreading, and who’s making money off of it. We’ll also talk about some of the security flaws hackers have exposed on these technologies, and put out a call to action to CCC. ","description":"Surveillance was on the street before it was online, and that hasn’t changed. What has changed is that cities around the world are now bristling with street level surveillance technology, like GPS tracking devices, IMSI catchers, biometrics, drones, and cameras of all kinds. Much like the business of selling malware to repressive regimes, big multi-national corporations like General Electric and Morpho have made huge profits off the spread of this technology, and have helped it spread like wildfire. \r\n\r\nEven in places like the United States, where, in the last 20 years, crime rates have steadily and significantly declined, the use of this incredibly invasive technology is excused by “public safety\" or \"crime prevention needs.” Justifications range from warnings about terrorism (often thinly-veiled jabs at activists like the Black Lives Matter movement or anti-austerity activists in Greece) to conflating “national security” with disaster preparedness. Similarly, In Latin American, government authorities have used surveillance measures to discredit and stigmatize social movements involved in protests. \r\n\r\nStreet level surveillance is also often part of preparation for major events. The technology left behind becomes integrated in to everyday policing. The 2012 Olympics in London was accompanied by a host of new technology, including iris scanners, biometric ID cards, automated license plate readers, and facial-recognition CCTV systems. In preparation for the 2014 World Cup Games, Brazil spent millions on CCTV, drones, facial recognition goggles, surveillance helicopters, and a mobile high-frequency radio wave scanner, as well as 14 digital command centers across the country (featuring huge ceiling-to-wall monitors to facilitate real-time monitoring of surveillance cameras.) The country also integrated their national and international databases with cooperating parties, like Interpol, and subjected Brazilians to this invasive data collection technique. Intelligence agents mapped protest routes and monitored demonstrators by tracking their social media accounts. The 2016 Brazil Olympics are sure to make use of this technology—and provide an excuse for more. \r\n\r\nThis talk will cover what kind of street level technology we’re seeing, how it’s spreading, and who’s making money off of it. We’ll also talk about some of the security flaws hackers have exposed on these technologies, and put out a call to action to CCC. \r\n\r\nSpeakers are:\r\nNadia Kayyali, Activist at Electronic Frontier Foundation. They focus on street level surveillance technology such as IMSI catchers and drones, US national security policy, privacy, anonymity, and freedom of expression. Nadia has worked on EFF’s Street Level Surveillance and Surveillance Self-Defense projects, advocated for anonymity and privacy with governmental bodies and companies like Facebook, and has coordinated a variety of US campaigns to limit surveillance at the national and local level. As a Syrian-American, Nadia got especially interested in surveillance because of the experiences of Arab and Muslim Americans after 9/11. \r\n\r\nJoana Varon, Founder and Director of Coding rights and consultant and independent researcher on Internet Governance and Digital Rights. Previously, Joana was a researcher and project coordinator at the Centre for Technology and Society from Fundação Getulio Vargas in Rio de Janeiro. While there, she worked on applied research on information and communication technology for development. Joana is a lawyer and holds a bachelor’s degree in international relations and a master’s degree in law and development. She is concerned about how the lack of true Internet freedom impacts human rights, innovation and, ultimately, development","logo":null},{"guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","id":"7549","date":"2015-12-29T19:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6357","name":"Darsha"}],"links":[{"href":"Description","title":null},{"href":"https://media.ccc.de/v/32c3-7549-20_oscillators_in_20_minutes","title":null}],"attachments":[],"start":"20:30","duration":"00:30","room":"Hall G","slug":"32c3-7549-20_oscillators_in_20_minutes","title":"20 OSCILLATORS IN 20 MINUTES ","subtitle":null,"track":null,"type":"performance","language":"en","abstract":"20 OSCILLATORS IN 20 MINUTES is an experimental music performance/technical challenge/standup comedy act where I attempt to build twenty sound generating square wave oscillators in twenty minutes. This involves fabricating small electronic circuits with wires, chips, small components and nine-volt batteries under the pressure of limited time and expectation. This is a test of my technical abilities and an experiment in working with live troubleshooting as a method of musical improvisation. ","description":null,"logo":"/system/events/logos/000/007/549/medium/20_osc_20_min.jpg?1449142562"},{"guid":"153f9b5f-16a6-4c0c-b8d5-ca62ae23dea0","id":"7246","date":"2015-12-29T20:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5506","name":"Tarek Loubani"}],"links":[{"href":"https://media.ccc.de/v/32c3-7246-free_software_and_hardware_bring_national_sovereignty","title":null}],"attachments":[],"start":"21:15","duration":"00:30","room":"Hall G","slug":"32c3-7246-free_software_and_hardware_bring_national_sovereignty","title":"Free Software and Hardware bring National Sovereignty","subtitle":"Gaza as a case study","track":null,"type":"lecture","language":"en","abstract":"Free software and hardware are essential to sovereignty among developing nations, and can be used to secure infrastructure and information against sophisticated adversaries. Underdeveloped nations are leveraging Free software for these purposes, including Gaza and the Palestinian territories. This lecture discusses the Palestinian use of Free software and hardware to claim a kind of sovereignty, focusing on the health sector as one example where speaker Dr. Tarek Loubani has experienced and participated in efforts to incorporate Free culture.","description":"Free software and hardware are essential to ensure cultural, economic and military sovereignty among developing nations. Software such as GNU/Linux and GPG are potent weapons used by state and quasi-state actors to secure infrastructure or information against sophisticated adversaries.\r\n\r\nSeveral Latin American countries have effectively utilized Free software tools over the past two decades to advance their sovereignty. Today, another wave of underdeveloped nations is similarly leveraging Free software, including the Gaza Strip and Palestinian Authority.\r\n\r\nThe Palestinian Territories - and particularly the Gaza Strip - exist in a state of nearly-complete technological, economic, political and military domination. This lecture discusses the Palestinian use of Free software and hardware to claim a kind of sovereignty, focusing on the health sector as one example where speaker Dr. Tarek Loubani has experienced and participated in efforts to incorporate Free culture.","logo":null},{"guid":"5f5cdb89-f599-40a6-84eb-d588eeed0250","id":"7114","date":"2015-12-29T21:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5923","name":"Susann Wagenknecht"}],"links":[{"href":"https://media.ccc.de/v/32c3-7114-craft_leisure_and_end-user_innovation","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/837/original/Susann-32c3-hacking_in_research.pdf?1451399802","title":"Slide deck with references"}],"start":"22:00","duration":"00:30","room":"Hall G","slug":"32c3-7114-craft_leisure_and_end-user_innovation","title":"Craft, leisure, and end-user innovation","subtitle":"How hacking is conceived in social science research","track":null,"type":"lecture","language":"en","abstract":"Hacking receives growing attention among social scientists during the last five years. Researchers particularly in the fields of Human-Computer Interaction (HCI) and Computer-Supported Collaborative Work (CSCW) but also in the social sciences generally have begun to study hacking empirically—investigating hacking as a practice and as cultural phenomenon. The talk offers a glimpse of the spectrum of research about hacking in HCI, CSCW, and adjacent fields. Researchers in these fields portray hacking very differently. The spectrum ranges from “transgressive craft” to “innovative leisure practice,” from skilled craftsmanship to ad hoc kludging, from an individualist pursuit to a community mission, from an expression of liberalism to an exclusive practice of cultural distinction. Some researchers see hacking as an illustration of how to defy technological determinism, i.e., the conviction that the technological determines the social, a position that social scientists typically fight ferociously. Other researchers see it as the future of “end-user innovation.” This talks discusses these notions and describes the value---economic, pedagogical, cultural, conceptual---that different research perspectives perceive in hacking.","description":"Hacking receives growing attention among social scientists during the last five years. Researchers particularly in the fields of Human-Computer Interaction (HCI) and Computer-Supported Collaborative Work (CSCW) but also in the social sciences generally have begun to study hacking empirically—investigating hacking as a practice and as cultural phenomenon.\r\n\r\nHowever, Fefe, an influential blogger of the German hacking community, warned against collaborating with researchers: \r\n\r\n „In letzter Zeit gibt es eine auffällige Häufung von Befragungen und wissenschaftlichen Studien zu Hackern und Piraten, wie die Szene funktioniert und so weiter, auch bei Hackerspaces und insbesondere auch bei Gruppen wie Occupy und co. Wenn so jemand bei euch anklopft, sagt ihm bitte nichts. Nur weil die freundlich und nett wirken, muss man noch nicht kooperieren.\r\nNanu, hat der Fefe was gegen Wissenschaft? Nein. Aber was die meisten nicht auf dem Radar haben: Solche \"Studien\" werden von den Bösen gemacht. Dahinter stecken Public Relations Consulting-Firmen, Risk-Management-Firmen, Politikberatung, Thinktanks. Die haben Angst vor uns und wollen uns ausforschen. Und wie macht man das? Man schickt unverdächtige V-Leute. In diesem Fall nerdige Wissenschaftler, die freundlich anfragen.” (7.2.2013, blog.fefe.de/?ts=afed4222)\r\n\r\nIn this talk, I will not be able to speak about undercover spying for corporate or government interest (because I don’t know any more about it than Fefe). Instead, this talk will be about the research that some of those ‘nerdy scientists’ that Fefe mentions do—researchers like my collaborator and me who thought: Hacking! Yes! That’s an interesting phenomenon, and it is important! For many social scientists, hacking is interesting because it challenges their academic thinking and their academic vision. It challenges the categories in which some research fields usually think (e.g., ‘the user’ as opposed to ‘the designer’). And it also can challenge how disciplines such as HCI (who perceive themselves as advocates for prospective users) envision themselves. \r\n \r\nThe talk offers a glimpse of the spectrum of research about hacking in HCI, CSCW, and adjacent fields. Researchers in these fields portray hacking very differently. The spectrum ranges from “transgressive craft” to “innovative leisure practice,” from skilled craftsmanship to ad hoc kludging, from an individualist pursuit to a community mission, from an expression of liberalism to an exclusive practice of cultural distinction. Some researchers see hacking as an illustration of how to defy technological determinism, i.e., the conviction that the technological determines the social, a position that social scientists typically fight ferociously. Other researchers see it as the future of “end-user innovation.”\r\n\r\nClearly, there is often vested academic interests in the ways in which social scientists portray hacking. In some cases, there is an interest in emphasizing the economic value of hacking, highlighting its creative and innovative potential. In other cases, there is an interest in emphasizing the pedagogical value of hacking, highlighting its potential as a means of teaching and learning. In still other cases, there is a conceptual interest in hacking or an interest in its cultural value. And yes, in some cases there is clearly an interest in simply preventing hacking. \r\n\r\nMy personal motivation to study hacking has a lot to do with my conceptual interest in notions such as ‘use’ and ‘design.’ Is hacking using, is it designing, is it both? And I find it interesting to note that hacking practices often react to a condition where the possibilities of ‘use’ are perceived as very limited. But my personal motivation to study and write about hacking in the HCI/CSCW community also stems from discontentment with the way in which HCI/CSCW research often sidelines the political visions of hacking—most notably, the vision of ‘open,’ community-driven technology that is an ‘expression of liberalism’ (Gabriela Coleman).\r\n\r\nMy motivation to give this talk is to communicate research back to those who are the subjects of research. The research discourse is, besides the mass media discourse, an important place for creating a public image of ‘the hacker.’ Moreover, I would like to discuss Fefe’s warning—“do not talk with researchers,” is that what 32C3 thinks? And what, after all, is hacking?\r\n","logo":null},{"guid":"f4da28f8-1e28-45d4-9fab-d1d36d20ca7b","id":"7202","date":"2015-12-29T21:45:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6017","name":"Gunnar Thöle"}],"links":[{"href":"https://media.ccc.de/v/32c3-7202-stromtankstellen_eine_neue_offentliche_infrastruktur","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/842/original/Stromtankstellen_ccc.pdf?1451409617","title":"Folien"},{"href":"/system/event_attachments/attachments/000/002/862/original/Stromtankstellen_ccc.pdf?1452022372","title":"Mit Beiträgen aus der Fragerunde ergänzte Folien"}],"start":"22:45","duration":"00:30","room":"Hall G","slug":"32c3-7202-stromtankstellen_eine_neue_offentliche_infrastruktur","title":"Stromtankstellen – eine neue öffentliche Infrastruktur","subtitle":"Was kann das? Wie kann ich das nutzen? Wo besteht Erforschungsbedarf?","track":null,"type":"lecture","language":"de","abstract":"Landauf landab entstehen zur Zeit tausende öffentlicher Stromtankstellen. Diese neue Infrastruktur bietet viel Potential für kreative Nutzungen und hat eine Reihe an Nutzungs-, Sicherheits- und Datenschutzproblemen, für die bislang Lösungen fehlen.","description":"Dies ist eine erste minimale Einführung in die Technik und ein Hilferuf und soll die Türen zu neuem Spaß am Gerät öffnen.\r\n\r\nDer Vortrag wird in zwei Teilen folgende Informationen geben:\r\n<b>Teil 1 – Selber nutzen</b>\r\n<ul><li>Einführung: Wofür braucht man Stromtankstellen? Darstellung der üblichen elektrischen Parameter von Fahrzeugen und Batteriesystemen,</li>\r\n<li>die drei etablierten Systeme für Gleich- und Wechselstrom zur Fahrzeugladung werden vorgestellt,</li>\r\n<li>Telefonakku leer in der Stadt? Es wird gezeigt, wie man für beliebige Nutzungen Wechselstrom beziehen kann,</li>\r\n<li>zwei Open-Source-Projekte für Ladestationen im Eigenbau werden kurz angerissen.</li>\r\n\r\n<b>Teil 2 – Wo besteht Bedarf an Sicherheits- und Hardware-Erforschungen?</b>\r\nEs geht um folgende Themenbereiche:\r\n<li>Steckerkonstruktion: Die Stecker sind viel zu teuer, wenn überhaupt erhältlich.</li>\r\n<li>Datenkommunikation der Gleichstromladesysteme CHAdeMO und CCS: Insbesondere bei CCS ist das Kommunikationsprotokoll nicht gut zugänglich, so dass Adapterlösungen oder die Nutzung zur Aufladung von Eigenbaufahrzeugen nicht möglich ist. Außerdem ist Gleichstrom-Ladehardware völlig überteuert und ohne Protokollkenntnis nicht zu verbessern.</li>\r\n<li>Proprietäre Mitspieler: Tesla hat einen genormten Steckertyp proprietär ergänzt, und niemand weiß, was an Tesla-Superchargern genau passiert.</li>\r\n<li>Authentifizierung und Abrechnung: Ein Wildwuchs an Abrechnungssystemen auf Basis von Apps und RFID-Karten wartet darauf, auf Sicherheitslücken überprüft zu werden. Wo bleibt die Stromtankstelle, die Bitcoins akzeptiert?</li>\r\n<li>Datenschutz: Die anonyme Nutzung von Benzintankstellen ist üblich, von Stromtankstellen aber oft unmöglich. Hier fehlen Lösungen.</li>\r\n<li>Strombezug aus der Batterie: Fahrzeuge mit Gleichstromladeanschluß bieten prinzipiell einen direkten Zugang zur Batterie, der viele interessante Nutzungen ermöglichen würde – nur niemand kennt das Datenprotokoll.</li>\r\n\r\nFür Tests gibt es eine öffentliche Stromtankstelle in der Moorweidenstraße, 300 Meter vom CCH.","logo":"/system/events/logos/000/007/202/medium/2015-11-19_22.57.13.jpg?1447970345"},{"guid":"eb36c9f7-076a-45cc-ad66-ac97768e0c75","id":"7400","date":"2015-12-29T22:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5863","name":"Nicolai Pogadl"}],"links":[{"href":"http://www.concordia.ca/research/migs.html","title":null},{"href":"http://www.concordia.ca/research/migs/projects/dmap.html","title":null},{"href":"https://civic.mit.edu/blog/ethanz/understanding-media-coverage-media-cloud-experiments","title":null},{"href":"https://www.reddit.com/r/ethereum/comments/36mth0/ethereum_for_humanitarian_work/","title":null},{"href":"http://hackingconflict.org/teams/","title":null},{"href":"http://www.creativeassociatesinternational.com/news/peacehackdc-generates-new-tech-tools-to-counter-violent-extremism/","title":null},{"href":"http://analysis.gdeltproject.org/","title":null},{"href":"https://play.google.com/store/apps/details?id=com.camera.easy","title":null},{"href":"http://www.earlywarningproject.com/","title":null},{"href":"http://www.performancepeacekeeping.org/","title":null},{"href":"http://verificationhandbook.com/book2/","title":null},{"href":"https://equalit.ie/#","title":null},{"href":"https://media.ccc.de/v/32c3-7400-technology_and_mass_atrocity_prevention","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/835/original/Talk.odp?1451390074","title":"Lecture Slides"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"23:30","duration":"00:30","room":"Hall G","slug":"32c3-7400-technology_and_mass_atrocity_prevention","title":"Technology and Mass Atrocity Prevention","subtitle":"Overview on Current Efforts - We Need Moar H4x0rs?! ","track":null,"type":"lecture","language":"en","abstract":"This lecture will give an overview on how technology can help and is helping to prevent or mitigate mass atrocity crimes. It focuses on the work and research of the Digital Mass Atrocity Prevention Lab (DMAP Lab) but will discuss other major projects as well. The goal is to inform the audience about ongoing efforts and spark their interest to help work at the intersection of technology and human rights. ","description":"The lecture will span a wide arc over current efforts made in how to use technology in peacekeeping, mass atrocity prevention and mass atrocity documentation. It also will give a brief introduction on why this work is important using current (e.g. South Sudan, Syria) and past (e.g. Rwanda) cases. The projects described in the talk can be found in the link section but will have to be fleshed out in more detail until the CCC event. In short: it will be a \"tour de force\" through various human rights/technology projects to give the audience a wide perspective with which they can (hopefully!) find ways for future collaboration. The talk will also touch briefly on challenges and risks using technology in mass atrocity prevention - because we all know: technology has no morality and can be used for both good and evil.","logo":null},{"guid":"1c70e359-0e63-4dad-b7f3-8377e3822286","id":"7321","date":"2015-12-29T10:30:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"4508","name":"obelix"}],"links":[{"href":"https://media.ccc.de/v/32c3-7321-re_cycle","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/777/original/20150930_185631_HDR_copy.jpg?1443668328","title":"Plastic trash waiting to be recycled"}],"start":"11:30","duration":"01:00","room":"Hall 6","slug":"32c3-7321-re_cycle","title":"re_cycle","subtitle":"Trash the prints, print the trash","track":null,"type":"lecture","language":"en","abstract":"How can be 3d printing a dual use technology? Print more things, produce less waste, save money!","description":"Each day 3D printers become cheaper and the internet gets filled with 3d files to print. With every 3d printer running the need for plastics and therefore the amount of waste produced (either through failed prints or normal end of life of the print) will grow. Even if there are things you won't need to buy anymore and the additional waste is compensated here, the reality shows that failed prints can't be ignored, 3d printers are used to print a lot of nonsense things (e.g. internet memes) and the lifetime of these prints is often below commercial grade products.\r\n\r\nIn this talk i'll present the difficulties in recycling plastic as well as the progresses or fails i've made. \r\n\r\nHow easy is it to recycle 3d prints or other wast in order print it again? \r\nHow often can this process be repeated? Does it save money? \r\nDo the new prints look good? \r\n\r\nAs a special feature i'll try to collect some waste from the audience at the beginning of the talk and recycle it live on stage!\r\n\r\nAbout me: i'm 25 years old and use 3d printers since several years and run 9 3d printers at this time. With so many printers, the amount of waste gets at a point where it feels like i would waste a lot of money and increase the negative environmental impact if i don't recycle the fails and unused prints. I brought several printers to events like 30-31C3, GPN13-14-15 or the CCCamp15 (you may remeber me as obelix, the guy with the tent full of 3d printers).","logo":"/system/events/logos/000/007/321/medium/20150930_190142_HDR_copy.jpg?1443668375"},{"guid":"4b81e057-d17d-4108-90c4-8b0b162cf6c0","id":"7259","date":"2015-12-29T11:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3160","name":"Christoph Engemann"}],"links":[{"href":"https://media.ccc.de/v/32c3-7259-graphs_drones_phones","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 6","slug":"32c3-7259-graphs_drones_phones","title":"Graphs, Drones & Phones","subtitle":"The role of social-graphs for Drones in the War on Terror. ","track":null,"type":"lecture","language":"en","abstract":"The military use of Drones has profoundly changed warfare and is a central aspect of the globalized war on terror. The public debate including the respective talks at prior CCCs is dominated by questions of the ethical and juridical aspects of Drone use. \r\n\r\nThis talk tries to shift the focus towards the enabling dimensions of Drone warfare. ","description":"Using source material from public documents of academia, the US-military as well as from the Snowden publications I will show that Social Graphs and graph-analysis are central for the War on Terror. \r\n\r\nIn this context Drones have at least two functions: 1. they act as data-gatheres, collecting visual and SIGINT (phone) data necessary for graph-generation and -updates. 2. they are deployed to shape Social Graphs: that is destroy particular nodes with kinetic means where the kill decision are made on the basis of graph analysis. \r\n\r\nI will show that there is a rich academic literature on graph analysis of terror networks revealing an ongoing debate about algorithms able to inform such decisions.\r\n\r\nOn this basis I will argue that in the War on Terror Drones and Social-Graphs need to be understood as interdependent systems and that the debate needs to be informed by a deeper understanding of the history and current state of graph-analysis.\r\n\r\nThe talk will conclude with questions regarding the strategic and geopolitical role of Social Graphs.\r\n\r\n","logo":null},{"guid":"cc9ede64-bad5-4ed0-92a3-4fbaf54eadec","id":"7421","date":"2015-12-29T13:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6061","name":"leomagnet"},{"id":"6133","name":"Markus Zimmermann"}],"links":[{"href":"http://futurefluxus.org","title":null},{"href":"https://media.ccc.de/v/32c3-7421-fluxus_cannot_save_the_world","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 6","slug":"32c3-7421-fluxus_cannot_save_the_world","title":"\"Fluxus cannot save the world.\"","subtitle":"What hacking has to do with avantgarde art of the 1960ies (subtitle to be changed)","track":null,"type":"lecture","language":"en","abstract":"The Fluxus movement came about in the early 1960ies and the talk will discuss its strenghts, dead-ends and promises for the creation of works and community in our digital environment. International, transdisciplinary, non-institutional, anti-art and playful. After several years of research and new art productions, Leo Findeisen and Markus Zimmermann will present their findings. \r\n","description":"Historical points of interest will deal with Erik Satie, Marcel Duchamp and John Cage and their pioneering works of easy listening, the new instrumentalisation of taste and boredom as well as the enhancement of the notion of art via the application of musical scores to daily actions. These lines are followed up in classical Fluxus works and the audience will get to see pieces by Nam Jun Paik, Alison Knowles, Robert Filliou, Ay O, Something Else Press a.o. Later influences in Germany are presented in anecdotes of Wau Holland & Joseph Beuys, foebud or thing.net. The vital Fluxus scenes of the 1970ies behind the Iron Curtain are hardly known and will also be presented using recent books. Contemporary candidates include Mediengruppe Bitnik!, speed-shows of Aram Bartholl, the Balcony manifesto by Constant Dullaart a.o., the \"Internet Black-Out\" by LaQuadrature.net; some \"Scores\" (Handlungsanleitungen) will be tried out live and their function \"The 12 Ideas of Fluxus\" (2002) will be discussed. In applying methods of cultural anthropology and Actor-Network-Theory, we will also compare Fluxus ideas and Fluxus ideals with the tools, methods and goals of online-Communities and the OpenSource-approach in general. \r\n\r\nThe poster attached (2011) has been our research manifesto, it features visuals of and explanations about the Icelandic Modern Media Initiative, XKCD, Yoko Ono, Joseph Beuys, the Google Custom Placemark, Nam Jun Paiks \"TV-Chello\" and who is playing it as well as George Maciunas, the \"impressario\" of Fluxus. \r\n\"Fluxus cannot save the world.\"\r\n","logo":"/system/events/logos/000/007/421/medium/FutureFluxus_Poster_explained_CCulturesVienna.jpg?1443650272"},{"guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","id":"7243","date":"2015-12-29T15:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4950","name":"Ben H."}],"links":[{"href":"https://media.ccc.de/v/32c3-7243-gibberish_detection_102","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 6","slug":"32c3-7243-gibberish_detection_102","title":"Gibberish Detection 102","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"DGAs (Domain Generation Algorithms) have become a trusty fallback mechanism for malware that’s a headache to deal with, but they have one big drawback – they draw a lot of attention to themselves with their many DNS request for gibberish domains.","description":"When basic entropy-based Machine Learning methods rose to the challenge of automatically detecting DGAs, DGAs responded by subtly changing their output to be /just/ plausible enough to fool those methods. In this talk we’ll harness the might of the English dictionary, cut corners to achieve sane running times for insane computations, and use fancy Machine Learning® methods – all in order to build a classifier with a higher standard for gibberish plausibility.\r\n\r\nIn recent years, there has been a rising trend in malware’s use of Domain Generation Algorithms (DGAs) as a fallback mechanism in case the campaign is shut down at the DNS level. DGAs are a headache to deal with, but they have one big drawback – they make a lot of noise. To be more precise, they generate a very large amount of DNS requests for domains, and the domains are often complete gibberish.\r\n\r\nThis situation looks ripe to be exploited with your favorite Cyber™ Machine Learning® Big Data© solution; and indeed, advances were made by basic language processing methods that could detect and stop the outright complete gibberish. These worked well, until DGAs mutated, and started producing more reasonable gibberish. A milestone in this regard was the introduction of KWYJIBO, a DGA that generates gibberish where every other letter is a vowel (e. g. „garolimoja“), which stumps the old methods completely.\r\n\r\nHow do you thwart KWYJIBO and other DGAs of its sophistication? How do you look for meaninglessness in string-space? In this talk we’ll harness the might of the English dictionary; cheat mathematics to cut running times from impossible to reasonable; and demonstrate a fancy Cyber™ Machine Learning® Big Data© tool based on all the above to tell apart meaningful domain names from nonsense. Where is this arms race going, anyway? Is there such a thing as undetectable gibberish?","logo":null},{"guid":"1cac5105-cfdc-42e9-9a87-0ee71fc2443c","id":"7218","date":"2015-12-29T16:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5922","name":"Antonio Bianchi"},{"id":"6380","name":"Jacopo Corbetta"},{"id":"6382","name":"Andrew Dutcher"}],"links":[{"href":"http://angr.io/","title":null},{"href":"https://seclab.cs.ucsb.edu","title":null},{"href":"https://media.ccc.de/v/32c3-7218-a_dozen_years_of_shellphish","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/856/original/32c3_ShellphishCGC.pdf?1451617451","title":"Slides"}],"start":"17:15","duration":"01:00","room":"Hall 6","slug":"32c3-7218-a_dozen_years_of_shellphish","title":"A Dozen Years of Shellphish","subtitle":"From DEFCON to the DARPA Cyber Grand Challenge","track":null,"type":"lecture","language":"en","abstract":"How we built an automatic exploitation system and qualified for the DARPA Cyber Grand Challenge.","description":"From a rag-tag hackademic group to getting money from DARPA for auto-exploiting and auto-patching. A tale of surfing, CTF-playing, and releasing an <a href=\"http://angr.io\">angry binary-analysis framework</a> as <a href=\"https://github.com/angr/angr\">open source</a> :)\r\n\r\n<p>Beside introducing <a href=\"http://shellphish.net\">Shellphish</a>, we will explain how we qualified to the final round of the DARPA Cyber Grand Challenge. The CGC is a security competition played by programs. Yep, you read it right, your code must <strong>automatically exploit and patch binaries</strong>, without any human intervention!\r\n\r\n<p>In particular, we will show how our open source binary analysis framework (<a href=\"http://angr.io\">angr</a>) can help you find vulnerabilities in binaries.\r\n\r\n<p>Shellphish is a group of security enthusiasts born in the University of California, Santa Barbara (UCSB) in 2004.\r\nSince then Shellphish played countless Capture the Flag (CTF) security competitions, <a href=\"https://www.defcon.org/html/links/dc-ctf-history.html\">winning the DEFCON CTF finals in 2005</a>.\r\n\r\n<p>In 2015, Shellphish enrolled in the DARPA Cyber Grand Challenge (CGC).\r\nDifferently from others security competitions, in which humans have to solve security challenges (such as exploiting binaries or web services), during the CGC participants have to <b>build an automatic system that plays for them</b>!\r\nIn particular, teams have to build a system that is able to <em>automatically</em> find vulnerabilities in binaries, exploit them, and patch them, without any human intervention.\r\n\r\n<p>In this talk we will present the system we developed to participate in the CGC, our almost-million dollar baby :)\r\nOur system was able to score among the top 7 teams during the qualification event of the CGC, qualifying us for the final event (in August 2016 at Las Vegas), in which participants will compete against each other to win a first-place prize of 2 million dollars (and eternal bragging rights).\r\n\r\n<p>Part of the system we developed is based on <a href=\"http://angr.io\">angr</a>, the open source binary analysis framework developed at UCSB.<br>\r\nDuring the talk we will demo angr, showing how it can be used to automatically find vulnerabilities in binaries.<br>\r\nIn particular, we will first show how angr helped us during CGC and then how, more generally, it can be used to automatically solve binaries challenges proposed in recent CTF security competitions.","logo":"/system/events/logos/000/007/218/medium/shellphish_head.png?1449465502"},{"guid":"47da549d-fd5b-4210-a8e5-bbb057844c0d","id":"7336","date":"2015-12-29T17:30:00.000Z","day":"3","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"3798","name":"Karsten Becker"}],"links":[{"href":"https://media.ccc.de/v/32c3-7336-3d_printing_on_the_moon","title":null}],"attachments":[],"start":"18:30","duration":"01:00","room":"Hall 6","slug":"32c3-7336-3d_printing_on_the_moon","title":"3D printing on the moon","subtitle":"The future of space exploration","track":null,"type":"lecture","language":"en","abstract":"3D printers are almost everywhere, but not on the moon yet. We want to change that and this talk gives you a little insight into the how and whys of 3D printing on the moon.","description":"Having a printer in space is a great idea, it allows you to produce things in space, without having to actually launch it with a rocket. Some want to mine asteroids for that, we want to use lunar regolith. This would make it possible to build structures on the moon that are essential for build a permanent outpost there.\r\nEven further down the line one might build the first interplanetary refuelling outpost in space for rockets and go even deeper into space.\r\n\r\nWe want to show you how this dream could become reality, what techniques are of interest, and how it could be implemented.","logo":null},{"guid":"f193e1eb-5f67-43bc-a42a-c2c9b0c8d57f","id":"7388","date":"2015-12-29T19:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6122","name":"Arne Hintz"},{"id":"6363","name":"Lina Dencik"}],"links":[{"href":"http://www.dcssproject.net/","title":null},{"href":"https://media.ccc.de/v/32c3-7388-media_coverage_and_the_public_in_the_surveillance_society","title":null}],"attachments":[],"start":"20:30","duration":"00:30","room":"Hall 6","slug":"32c3-7388-media_coverage_and_the_public_in_the_surveillance_society","title":"Media Coverage and the Public in the Surveillance Society","subtitle":"Findings from a Research Project on Digital Surveillance Post-Snowden","track":null,"type":"lecture","language":"en","abstract":"How have the media reported the Snowden revelations? Does the public care about surveillance, and how do people react? Do we need a ‚data justice‘ movement?","description":"This talk will present results from the research project „Digital Citizenship and Surveillance Society: State-Media-Citizen Relations After the Snowden Leaks“. We will discuss why media coverage has been biased and investigate public knowledge of, as well as public reactions to, surveillance. We will show that people are concerned about surveillance but feel disempowered to resist it, and explore why many social/political/environmental activists have been reluctant to change their communication practices after Snowden. And we will suggest a ‚data justice‘ framework to form part of broader social and economic justice agenda in order to resonate with a broader public.\r\n\r\nThe project „Digital Citizenship and Surveillance Society“ is hosted at Cardiff University and includes researchers from Cardiff, the Oxford Internet Institute and the Technical University of Delft. It investigates the responses to the Snowden revelations for policy, technology, civil society and the news media. In this talk, two of the investigators will present findings from research that included content analysis of the British press and broadcast news, interviews with journalists and activists, and focus groups with a wide range of the British public. They will uncover widespread worries about surveillance amongst both activists and wider population but, at the same time, a lack of knowledge and confidence to address it socially, politically and technologically. \r\n\r\nThe research provides insights for digital rights campaigners, crypto developers, and everyone interested in the Snowden leaks. ","logo":null},{"guid":"bfadd7de-3680-4766-a474-faa53c5f141f","id":"7219","date":"2015-12-29T20:15:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5820","name":"Andreas Zingerle"},{"id":"6386","name":"Linda Kronman"}],"links":[{"href":"http://megacorp.kairus.org","title":null},{"href":"www.andreaszingerle.com","title":null},{"href":"http://www.kairus.org","title":null},{"href":"http://www.kairus.org","title":null},{"href":"https://media.ccc.de/v/32c3-7219-trust_us_and_our_business_will_expand","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/713/original/Kairus_Megacorp01.JPG?1443523547","title":"Megacorp. installation setup"},{"href":"/system/event_attachments/attachments/000/002/714/original/Kairus_Megacorp04_72dpi.JPG?1443523547","title":"Megacorp. interim report"}],"start":"21:15","duration":"00:30","room":"Hall 6","slug":"32c3-7219-trust_us_and_our_business_will_expand","title":"Trust us and our business will expand!","subtitle":"Net-activism strategies against fake web companies","track":null,"type":"lecture","language":"en","abstract":"The lecture outlines strategies by the \"Artist against 419\" online community that uses open source intelligence to gather data and file reports about fraudulent websites. The lecture presents the artistic installation \"Megacorp.\" (created by KairUs) that tries to visualize the global phenomenon of fake business websites.","description":"“Megacorp.” is a corporate conglomerate inspired by its equally powerful counterparts in science fiction. The artwork is based on a collection of fake websites scraped from internet by the artist duo KairUs. These companies exist only virtually and are used by cyber criminals for phishing attacks or to support scam stories. The “Megacorp.” exists therefore as an umbrella company for subsidiary companies that are 100% dummy cooperations. “Megacorp.” operates on a global scale and is constantly growing with firms represented in almost every branch of industry. The strategic objectives according to the “Megacorp.” Mission statement is to: “offer complete services from one source which can serve the entire market”. Accordingly the subsidiary companies cover domestic and international export, real estate agents, insurance companies, law firms, security companies, banks, educational institutions, hospitals, online commerce, economic communities and ministries.The functions of “Megacorp.” are presented in the form of an interim report and company visuals. The archieved websites are locally available in the gallery allowing visitors to explore the current fake website repository. By examining the fake websites the artwork reflects both the imaginary and the real world ‘megacorps’, questioning centralization of power.","logo":null},{"guid":"92891768-7427-4d48-8127-35d18318a63d","id":"7517","date":"2015-12-29T21:00:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5962","name":"constantdull"}],"links":[{"href":"dismagazine.com/dystopia/67039/constant-dullaart-100000-followers-for-everyone/","title":null},{"href":"https://media.ccc.de/v/32c3-7517-the_possibility_of_an_army","title":null}],"attachments":[],"start":"22:00","duration":"00:30","room":"Hall 6","slug":"32c3-7517-the_possibility_of_an_army","title":"the possibility of an army","subtitle":"phone verified accounts bringing the Hessian army back to life","track":null,"type":"lecture","language":"en","abstract":"Using follower bombing as art performances, the artists Constant Dullaart continues the research into attention and identity as a commodity on social networks, and has recently created a large sum of custom created artificial Facebook identities.\r\nMany websites offer an option to login in with Facebook credentials due to the strict controle of the service on the reliability and verification of the social medium. In a time where the open borders in Europe are under pressure, and Syrian identities are sold to people that long for a better future, virtual identity systems, and their reliability become a topical analogy.","description":"Due to the large financial incentive through advertisement revenue, there is a large industry creating Facebook accounts that can be used for commercial purposes only, and controlled en masse by dedicated software.\r\nWith a press of a button hundreds of artificial accounts can like a certain Facebook post, group, political party, celebrity, brand or artist. Influencing advertisement revenue and cost, elections, or feigning consumer interest.\r\nThese profiles are not representative of actual human entities, and are only created to pass for people through Facebook’s detection algorithms. Somewhat similar to how a social registration number creates a physical legal identity.\r\nWith generated names and interests, with downloaded images, these accounts have verified email addresses, and the most valuable profiles are Phone Verified Accounts, so called PVAs.\r\nPVAs generated with United States based phone numbers are most valuable since they are checked less by Facebook, than profiles verified with Pakistani, Bangladeshi or Filipino for example.\r\nThe last countries playing a big part in the artificial virtual identity industry. \r\nAlthough this industry has been active for many years, commodifying our idea’s of what shapes an online identity, many journalists, political parties, institutions, and consumers still believe that the quantified attention of a number of likes or friends on Facebook suggests a validation of quality.\r\nBy collecting a large collection of custom made PVA’s into an army, Dullaart is commenting on the use of these false validation systems.\r\nWhere PVA’s are normally used for commercial gain, Dullaart will use them for performative and artistic gestures only. \r\nAn argument in a political conversation is suddenly liked by thousands of people, and an aspiring artist suddenly has a lot of people speaking of her work.\r\n\r\nThe newly created profiles that shape the army will be based on the identities of the 18-th century Hessian auxiliaries contracted for military service to the British during the American revolutionary war. Using all the actual names of the mercenaries, and acting in the spirit of the army as studied by Professor Doctor Holger Gräf, of the Hessian Historical Landes Ambt.\r\nThe yearly income generated by renting out the Hessian Mercenaries equaled 7 times the tax revenue of the state Hessen-Kassel, and gave Frederick II the opportunity to build many public works, amongst which the Fredericianum in Kassel, and many public roads.\r\nAfter the presentation of the army on the 10th of November in Kunsthalle Schirn in Frankfurt, the army will be for rent to pay for the maintenance (the profiles need rented internet proxies to keep from being killed off by Facebook) , and act under the command of Constant Dullaart and an editorial board discussing which valuable contributions the army can deliver in the political, cultural, or poetic realm on Facebook. \r\n\r\nDullaart wil show the experiences in creating and controlling the army for artistic purposes, as well as previous research into new types of digital materials for artists to use.","logo":"/system/events/logos/000/007/517/medium/miter.jpg?1445371731"},{"guid":"25dc688f-fe4f-4648-8b82-82c05cc090b8","id":"7419","date":"2015-12-29T21:45:00.000Z","day":"3","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"2262","name":"Stefan Wehrmeyer"}],"links":[{"href":"https://media.ccc.de/v/32c3-7419-on_computing_numbers_with_an_application_to_problems_of_our_society","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/861/original/32c3-cs-journalism.pdf?1451927468","title":"Slides"}],"start":"22:45","duration":"00:30","room":"Hall 6","slug":"32c3-7419-on_computing_numbers_with_an_application_to_problems_of_our_society","title":"On Computing Numbers, with an Application to Problems of our Society","subtitle":"Journalism ♥ Computer Science","track":null,"type":"lecture","language":"en","abstract":"Journalists, while structurally and economically under threat, are bringing computer science into their newsrooms. Their tools and techniques benefit from computer science in areas such as databases, graph analysis and machine learning and allow journalists to tackle new kinds of stories.","description":"This lecture will be about how journalists use computer science to find the story needles in their data haystacks. CS knowledge comes in handy when scraping government websites, searching giant troves of documents and analysing social graphs. Recently popularised techniques like machine learning and other techniques can be used to explore and uncover hidden truths in datasets. New research areas such as algorithmic accountability (e. g. how can you find the cheating algorithm in the VW cars) become more important and lead to stories that require a journalistic mind to discover them but need reverse engineering skills to fully understand.\r\n\r\nI will give a roundup of how stories are told with the help of computers in newsrooms around the world. As a software engineer by trade working in an investigative newsroom I’m also applying the stuff I learn to help my reporter colleagues find and tell new kinds of stories.","logo":null},{"guid":"f1c8f781-1ce7-451f-90e9-218ba94bc955","id":"7263","date":"2015-12-29T22:30:00.000Z","day":"3","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3961","name":"Kaustubh Srikanth"}],"links":[{"href":"https://media.ccc.de/v/32c3-7263-goiblocks_-_technical_observations_about_recent_internet_censorship_in_india","title":null}],"attachments":[],"start":"23:30","duration":"00:30","room":"Hall 6","slug":"32c3-7263-goiblocks_-_technical_observations_about_recent_internet_censorship_in_india","title":"#GOIBlocks - Technical observations about recent internet censorship in India","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"On 17th December 2014, the Government of India's Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to block access to 32 websites, effective immediately. The basis of this was a claim that the targeted web services were being used for \"Jihadi Propaganda\" by \"Anti-National groups\". As a response to this, a few technologists in Berlin got together and thought it would be a good idea to do some research using free and accessible tools and to look at how censorship has been implemented, as well as the various techniques that could be used to circumvent this censorship. This talk will discuss our findings and make recommendations about how ISPs can handle such censorship requests better, while being fair and transparent to their customers.","description":"On 17th December 2014, the Government of India's Ministry of Communications and Information Technology issued an order to all licensed Internet Service Providers (ISPs) in the country to block access to 32 websites, effective immediately. Not only did the ban affect access to popular cultural sites such as archive.org, vimeo.com, dailymotion.com, but the order also blocked access to sites like github.com, pastebin.com, which are useful for all sorts of people but are especially popular with software developers.\r\n\r\nThe Ministry's order was issued following a request from the Mumbai police's Anti-Terrorism Squad on 15th November 2014. The police request argued that the targeted web services were being used for \"Jihadi Propaganda\" by \"Anti-National groups\", and were encouraging youth in the country to join organisations like the Islamic State (ISIS/ISIL).\r\n\r\nAs a response to this, a few technologists in Berlin got together and thought it would be a good idea to do some research using free and accessible tools to look at how censorship has been implemented, as well as the various techniques that could be used to circumvent this censorship. The research was conducted through January, 2015 and draws on the browsing experience of several customers of different ISPs around India as well as information gained through the use of the open source censorship measurement toolkit provided by Open Observatory of Network Interference (OONI) [1] and other manual tests we conducted. Since then, we have been able to turn this into a continued effort to monitor ISPs in India and invited others to contribute to this effort to map and understand various technical implementations of censorship orders.\r\n\r\nThis talk will summarise our key findings, including the different methods of blocking implemented by multiple ISPs.\r\n\r\nWe will also discuss and make recommendations about the different ways ISPs can better handle such censorship orders, while continuing to respect the their customers' right to access to information, and how they can be more transparent while exercising censorship orders and requests from authorities.\r\n\r\n[1] http://ooni.torproject.org/","logo":null},{"guid":"7504eeb1-1665-47fd-b21a-601d2641c41c","id":"7207","date":"2015-12-30T10:30:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5903","name":"Leonie Maria Tanczer"}],"links":[{"href":"https://media.ccc.de/v/32c3-7207-i_feel_like_a_criminal_and_i_have_to_be_god_at_the_same_time","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/838/original/CCC_32c3_Presentation_Tanczer_-_8_-_29.12.2015.pdf?1451402471","title":"PowerPointSlides - Preliminary (29.12.2015)"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"11:30","duration":"01:00","room":"Hall 1","slug":"32c3-7207-i_feel_like_a_criminal_and_i_have_to_be_god_at_the_same_time","title":"“I feel like a criminal and I have to be god at the same time”","subtitle":"Perceptions of hackers and hacktivists on their (in)securitisation","track":null,"type":"lecture","language":"en","abstract":"News reports and political speeches are currently replete with references to hacking and hacktivism, i.e., politically motivated hacking. They often portray hackers and hacktivists negatively and put them onto the same level with, for example, terrorists. This talk is based on a PhD research project examining the perception of self-identified hackers and hacktivists on these (in)securitising developments. It investigates how hackers and hacktivists understand themselves and their activities, explores how they articulate the effects of this (in)securitisation, and outlines the ways they resist these processes. ","description":"Within the public discourse, terms such as hacking and hacktivism are controversial. They are frequently equated with malicious activities and associated with the likes of cybercrime or cyberwarfare. Besides, both the activities and the actors standing behind these concepts are increasingly becoming subject to a threat construction. This process is understood as “(in)securitisation” which builds upon the idea that security issues do not necessarily reflect the objective, material circumstances of the world. Instead, what is considered as a “security threat” depends on the design of such a menace by a multitude of actors, e.g., politics, industry, or the media. \r\n\r\nThe talk uses this understanding to examine the perspective of hackers and hacktivists who have been subjected to this (in)securitisation. It is based on a sub-study which is part of a broader PhD project within the social sciences. It exhibits qualitative findings that are derived from interview data collected over the course of a Research Fellowship at the Alexander von Humboldt Institute for Internet and Society, Berlin. A sample of N = 35 (female: n = 6; male: n = 29) self-identified hackers and hacktivists were therefore interviewed in German or English. The data was analysed using the method of thematic analysis. \r\n\r\nThis talk explains the theoretical background of the research project, the method used to analyse the data, and presents as well as discusses some of the research’s findings. It concentrates on the following issues: (a) how participants understand themselves and their activities, (b) how they articulate the effects of the (in)securitisation process, and (c) how they resist the (in)securitisation. Ultimately, the presentation gives an overview of what the (in)securitisation “does” to the hacker and hacktivist community, who - for the purpose of this research - have been studied conjunctively. It highlights how hackers’ and hacktivists’ self-understanding and perception stand in contrast to their current public representation, providing a relevant insight for the current debates about the possibility of re-articulating political rights online.","logo":null},{"guid":"31331405-a243-48ba-9536-83285542400a","id":"7386","date":"2015-12-30T11:45:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"4020","name":"Kurt Opsahl"}],"links":[{"href":"https://media.ccc.de/v/32c3-7386-crypto_wars_part_ii","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 1","slug":"32c3-7386-crypto_wars_part_ii","title":"Crypto Wars Part II","subtitle":"The Empires Strike Back","track":null,"type":"lecture","language":"en","abstract":"Governments around the world are seeking to put a stop to secure end-to-end encryption, from the UK’s Data Retention and Investigatory Powers Act, to Australia’s Defence Trade Controls Act, to India’s draft proposal to require plain text copies of all secure messages, to the United States’ Federal Bureau of Investigation’s public pressure on global companies like Apple and Google to weaken their security and provide law enforcement access to plain text content.","description":"Yet it is impossible to give these governments what they want without creating vulnerabilities that could be exploited by bad actors. Moreover any attempt to prevent people from writing and publishing strong encryption without backdoors conflicts with the right to freedom of expression enshrined in Article 19 of the Universal Declaration of Human Rights.\r\n\r\nThis presentation will address the history of crypto wars, update the audience with the latest information on government proposals from around the world, and discuss how we can fight for a future that will allow for secure communications for everyone. The discussion will also include information about EFF’s effort to protect and promote strong encryption, including the Secure Messaging Scorecard, Encrypt the Web report and the Who Has Your Back reports.\r\n\r\nThe presentation will explain how the unintended consequence of these efforts to provide law enforcement unfettered access to communications for users’ privacy and the security of the Internet far exceeds the benefits that would be gained. The proposals are often made in the name of protecting national security, but are likely to have severe economic, political and social consequences for these nations and their citizens, while doing little to protect their security. Contrary to these government proposals, encryption has a critical role to play in national security by protecting citizens against malicious threats. The harm to the public that can be presented by lax digital security has been illustrated too many times: weak or flawed cryptography led to vulnerabilities such as Logjam and FREAK that compromised the transport layer security protocols used to secure network connections worldwide. Encryption is not only essential to protecting free expression in the digital age – it’s also a critical part of national security.\r\n\r\nThis presentation will address the history of crypto wars, update the audience with the latest information on government proposals from around the world, and discuss how we can fight for a future that will allow for secure communications for everyone. The discussion will also include information about EFF’s effort to protect and promote strong encryption, including the Secure Messaging Scorecard, Encrypt the Web report and the Who Has Your Back reports.","logo":"/system/events/logos/000/007/386/medium/coder-cat-cat.png?1443646739"},{"guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","id":"7523","date":"2015-12-30T13:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6257","name":"dalmoz"}],"links":[{"href":"https://media.ccc.de/v/32c3-7523-ddos_mitigation_epic_fail_collection","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 1","slug":"32c3-7523-ddos_mitigation_epic_fail_collection","title":"DDoS mitigation EPIC FAIL collection","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"For the past 3 years I have been delivering a custom-tailored DDoS attacks for organizations that wanted to test out their DDoS defense systems.","description":"The client did give their logs after the attack so we can analyze together the impact and rewind the attack in slow-motion for us to consider a proper recommendation and not just something the vendor is expecting us to believe.\r\nMany rhetorical advice from vendors regarding defense know-how was found wrong or insufficient and many times even contributed to the EPIC FAIL of the entire defense system.\r\nDuring the presentation I will be bring to light 10 such cases of FAILs in hopes that future defenses will be battered and, of course, for some lolz.\r\nI have been researching DDoS attacks and mitigation techniques for the past three years and worked with industry leaders on testing their systems, providing them with cutting edge, and even never-seen-before attacks.\r\nI was amazed (actually still am) to find out that those big corporations, investing much work into their architecture of defense came to FAIL and sometimes the sole reason for a successful attack was a mitigation configuration or architecture FAIL.\r\nMy research is done by utilizing smart grids of computers, mimicking vast botnets from all over the world, writing and perfecting scripted attacks and even involve social engineering attempts within those attacks (for mitigation that involve manual intervention)\r\nIn the presentation there will be a showcase of 10 such FAILs, detailed technically as for a step-by-step close follow on the attack strategy and its mitigation failing, and of course – how delving into a recommended setup for a proper mitigation technique that will not inflict such a direct damage as presented.","logo":null},{"guid":"c87fa147-d1f4-4353-82db-c3e5b646884b","id":"7277","date":"2015-12-30T15:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6077","name":"DeanSysman"},{"id":"1342","name":"Gadi Evron"},{"id":"6384","name":"Itamar Sher"}],"links":[{"href":"https://media.ccc.de/v/32c3-7277-breaking_honeypots_for_fun_and_profit","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 1","slug":"32c3-7277-breaking_honeypots_for_fun_and_profit","title":"Breaking Honeypots for Fun and Profit","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.","description":"The concept of a honeypot is strong, but the way honeypots are implemented is inherently weak, enabling an attacker to easily detect and bypass them, as well as make use of them for his own purposes. Our methods are analyzing the network protocol completeness and operating system software implementation completeness, and vulnerable code.\r\n\r\nAs a case study, we will concentrate on platforms deployed in real organizational networks, mapping them globally, and demonstrating how it is possible to both bypass and use these honeypots to the attacker's advantage.","logo":"/system/events/logos/000/007/277/medium/KCQsriFM.png?1443616758"},{"guid":"56126bd1-f1b3-4bc7-81be-304b6b681cde","id":"7457","date":"2015-12-30T16:15:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5161","name":"Whitney Merrill"}],"links":[{"href":"https://media.ccc.de/v/32c3-7457-predicting_crime_in_a_big_data_world","title":null}],"attachments":[],"start":"17:15","duration":"00:30","room":"Hall 1","slug":"32c3-7457-predicting_crime_in_a_big_data_world","title":"Predicting Crime in a Big Data World","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect data from third party sources to gather information about individuals. This data in conjunction with machine learning aids governments in determining where crime will be committed and who has committed a crime. Could this data serve as a method by which governments predict whether or not the individual will commit a crime? This talk will examine the use of big data in the context of predictive policing. Specifically, how does the data collected inform suspicion about a particular individual? In the context of U.S. law, can big data alone establish reasonable suspicion or should it just factor into the totality of the circumstances? How do we mitigate the biases that might exist in large data sets?","description":"This talk will examine the current big data programs utilized by governments and police departments around the world and discuss how they factor into individualized suspicion of persons. Can big data sets with the proper algorithm effectively predict who will commit a crime? What are the appropriate margins of error (if any at all)? I will discuss the use of algorithms on big data sets to predict both where crime will occur and who might commit it.\r\n\r\nAdditionally, I will discuss the types of data that exists in these databases and compare several different ways in which computer algorithms are used on big data sets to predict something about a particular individual. Should predictive policing algorithms more closely resemble those used to predict disease from DNA samples or those used in the clearance process? Should they be used at all? ","logo":null},{"guid":"422ba0b9-debb-436e-9822-e9a201dec845","id":"7546","date":"2015-12-30T17:00:00.000Z","day":"4","recording":{"license":null,"optout":false},"persons":[{"id":"384","name":"Ron"},{"id":"1633","name":"frank"}],"links":[{"href":"https://media.ccc.de/v/32c3-7546-security_nightmares_0x10","title":null}],"attachments":[],"start":"18:00","duration":"01:00","room":"Hall 1","slug":"32c3-7546-security_nightmares_0x10","title":"Security Nightmares 0x10","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?","description":"Wie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2016 und darüber hinaus. Denn was wir wirklich wissen wollen, ist ja schließlich: Was kriecht, krabbelt und fliegt in Zukunft auf uns zu und in unseren digitalen Implants herum?\r\n\r\nIm Zuge von noch mehr Transparenz, Kritik & Selbstkritik und kontinuierlicher nachhaltiger Optimierung aller Prozesse werden wir außerdem frühere Voraussagen hinsichtlich des Eintreffens unserer Weissagungen prüfen.","logo":"/system/events/logos/000/007/546/medium/dhit10.jpg?1448487255"},{"guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","id":"7551","date":"2015-12-30T18:00:00.000Z","day":"4","recording":{"license":null,"optout":false},"persons":[{"id":"3752","name":"Carina Haupt"},{"id":"3995","name":"Linus Neumann"}],"links":[{"href":"https://media.ccc.de/v/32c3-7551-closing_event","title":null}],"attachments":[],"start":"19:00","duration":"01:00","room":"Hall 1","slug":"32c3-7551-closing_event","title":"Closing Event","subtitle":null,"track":null,"type":"lecture","language":null,"abstract":null,"description":null,"logo":null},{"guid":"1c39bb2e-fba0-4cb3-9aac-9e6dd396c55e","id":"7435","date":"2015-12-30T10:30:00.000Z","day":"4","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"5283","name":"Eric Wustrow"}],"links":[{"href":"https://keysforge.com/","title":null},{"href":"https://keysforge.com/paper.html","title":null},{"href":"https://media.ccc.de/v/32c3-7435-replication_prohibited","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 2","slug":"32c3-7435-replication_prohibited","title":"Replication Prohibited","subtitle":"3D printed key attacks","track":null,"type":"lecture","language":null,"abstract":"Physical keys and locks are one of the oldest security mechanisms still employed\r\ntoday. In this talk, we will discuss how 3D printing keys enable attacks against many modern lock systems. We will describe projects researchers and hobbyists have done involving 3D printed keys, and present our own research on automating several of these attacks in order to demonstrate how easy they are to do. Ultimately, we hope to describe the current state of 3D printed keys, and their impact on the physical security systems we most often take for granted.","description":"Physical keys and locks are one of the oldest security mechanisms still employed\r\ntoday. Despite their long-standing history, many still suffer from known\r\nattacks including bumping, impressioning, teleduplication, and rights \r\namplification. To mitigate these attacks, many lock systems rely on restricted\r\nkeyways and use blanks that are not sold to the general public, making it harder\r\nfor attackers to obtain them. Often the key blank designs themselves are\r\npatented, further discouraging distribution or manufacture by even skilled\r\nmachinists.\r\n\r\nIn this talk, we will investigate how rapid prototyping and 3D printing tools\r\ncan be used to attack modern lock systems. Even when manufactured on commodity\r\nmachines, 3D printed keys are now good enough to be used in a variety of\r\nattacks. We demonstrate this by showing several example attacks against popular locks, from 3D printing the TSA master key, to our own attacks against restricted key systems. To test the strength of modern 3D printed keys, we present results from our paper of a controlled analysis on a range of printed\r\nmaterials from plastic to metal, and show that it is possible to cheaply make or purchase 3D printed keys that are practically as strong as real keys. We also present a tool that can automatically\r\ncreate a CAD model of a key blank, given only a single picture of the front of \r\nthe corresponding lock. This tool makes the attacks that 3D printing enables\r\nagainst locks even easier and cheaper by no longer requiring skilled 3D design knowledge, and provides a warning to start looking\r\nfor alternatives to secure physical goods. Lastly, we describe defenses\r\nthat modern lock manufacturers can do to ensure their locks are not easily\r\nbypassed by 3D printing technology, including new lock designs, as well as putting more emphasis on existing designs that may resist 3D printing-enabled attacks for years to come.\r\n\r\nWebsite: https://keysforge.com/\r\nPaper: https://keysforge.com/paper.html","logo":null},{"guid":"ff303155-f2fa-4c54-b9aa-ef47cd6e7704","id":"7356","date":"2015-12-30T11:45:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6123","name":"BoB Marvan"}],"links":[{"href":"https://cz.linkedin.com/in/lukasmarvan","title":null},{"href":"https://media.ccc.de/v/32c3-7356-top_x_usability_obstacles","title":null}],"attachments":[],"start":"12:45","duration":"01:00","room":"Hall 2","slug":"32c3-7356-top_x_usability_obstacles","title":"Top X* usability obstacles","subtitle":"*(will be specified later based on usability test with Ivana Jilekova)","track":null,"type":"lecture","language":"en","abstract":"What do you want? Did you build your web/app for humans or NSA robots? Let's make it usable for human beings. I'd like to show you some basic design mistakes and how to avoid them to improve usability of your web or app. Why? Because it's worth it and I'm good in it.","description":"\"Under the candlestick is dark.\" Back to the roots. Everybody is talking about User Experience (UX), Human Centered Design (HCD) end-to-end flows, holistic approach but the devil is hidden in the details. I'd like to show you some of the most frequent mistakes in user interfaces and how to avoid them. From misplaced lines to microcopy worth millions. From broken flows to broken hierarchy.\r\n\r\nIf you fix your UI troubles you can gain much bigger reach than ever before. The main question remains up to you: Dou you like to improve usability of your service or stay in the darkness of misunderstanding. \r\n\r\nWith my tips will be your app/web for people as clear and bright as Czech crystal: No more confusions or misunderstanding. BTW: I'm the UX designer from AVG.com (the online security company) from the Czech republic.","logo":null},{"guid":"b89b8cff-c496-4885-8e72-1461e8b274f7","id":"7497","date":"2015-12-30T13:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6191","name":"Caroline Sinders"}],"links":[{"href":"http://www.facets-con.com/#home","title":null},{"href":"http://www.washingtonpost.com/news/the-intersect/wp/2015/05/14/the-conclusive-expert-guide-to-saving-twitter-from-its-trolls/","title":null},{"href":"http://www.theverge.com/2015/5/14/8602205/how-periscope-should-change-its-design-to-mitigate-abuse","title":null},{"href":"http://narrative.ly/stories/that-time-the-internet-sent-a-swat-team-to-my-moms-house/","title":null},{"href":"http://thecreatorsproject.vice.com/blog/10-artists-to-know-from-americas-first-ever-internet-flea-market","title":null},{"href":"https://media.ccc.de/v/32c3-7497-when_algorithms_fail_in_our_personal_lives","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 2","slug":"32c3-7497-when_algorithms_fail_in_our_personal_lives","title":"When algorithms fail in our personal lives","subtitle":"Social media break up coordinator","track":null,"type":"lecture","language":"en","abstract":"„Social Media Break Up Coordinator“ is a performance art piece and lecture performed by Caroline Sinders. Inspired by Facebook’s memories algorithms faux pas, such as parents being reminded of their child’s death, or of events with an ex.","description":"There’s a lot of emotion involved with social media with posts, images, and songs; all of those events have a context and that’s a context algorithms can’t understand. However, humans can. A Social Media Break Up Coordinator goes through a clients social media accounts with the client, and helps block, unfriend, untag, and help ‚mute‘ old relationships and bad memories. \r\n\r\n„Social Media Break Up Coordinator“ will be presented as lecture over my performance which is debuting at Babycastles on Nov 21st, and 22nd. I am a user researcher and UX designer at IBM Watson. I work in conversational analytics and I help design systems and software layout for chat bots. I spend a lot of time thinking about the way systems and AIs ‚think‘ about and relate to words, context of conversations, and emotions. The way our social media systems are structured, there’s a fair amount of outlining and ‚work‘ users have to do when it comes to reporting online harassment, changing privacy settings, etc. But in that same vein, there's a lot the systems do for us- from suggesting users, suggesting content, to display of content, messaging, images, and events. All of those ‚things‘ are coming from content created by users, and are treated as data. But what is the context of it all? Facebook can see if a user removes a relationship status, but there isn’t a button or an algorithm for break ups. How do you a tell a system your child died or your heart was broken?\r\nThat’s where the Social Media Break Up Coordinator comes in. I will perform a series of paid events for my customers, who will also sign a legally binding. These services range from untagging the user and the ex or chosen person in specific images, moving friends of the ex/person and the ex/person onto a special list (to either mute, see less content, etc), crafting a series of emotional neutral messages to alert the other person that they are being unfriended/unfollowed/blocked for specific reasons, taking the number of the ex, deleting it from the client’s cellphone, and holding onto it for a specified amount of time decided upon between the client and myself. \r\nEffectively, the way to emotional navigate really ‚sticky‘ situations in social media is to have human intervention. Human emotions and relationships are complex and complicated, and require context, very deep context to understand. This is just something an algorithm cannot do. I’m interested in exploring emotional labor and the creation of new digital services and job to aid in this area of human relationships that have gone awry or death, as more and more users lives are lived and shared online, especially when algorithms began to fail with this kind of content.\r\n\r\nThe talk/lecture at CCC would feature documentation of my performance, research that I’ve done around blocking, muting, and a wide variety of social interactions (from abusive arguments with Gamergaters to navigating spaces with exes- ex boyfriends, girlfriends, best friends, and co-workers). I will also lecture on the structure of Facebook, Twitter, and Instagram- and how the UI first fails with users when it comes to ‚de-couple‘ or ‚un-friend‘. I’ll then lecture how the algorithms fail, because all of the interactions of these are designed towards users interacting, not users completely separating from other users who may be very connected by friends and professional networks. What is the solution for this? My hypothesis is a series of newly created human roles, almost like a freelance life couch, to help the user get their digital lives in ‚order‘. ","logo":null},{"guid":"62a79191-ca6a-48ea-b747-8cf13faa75cb","id":"7561","date":"2015-12-30T15:00:00.000Z","day":"4","recording":{"license":null,"optout":false},"persons":[{"id":"6369","name":"Salton Arthur Massally"},{"id":"6371","name":"Harold Valentine Mac-Saidu"},{"id":"6370","name":"Francis Banguara"},{"id":"1327","name":"Emerson"}],"links":[{"href":"https://media.ccc.de/v/32c3-7561-how_open_source_software_second_hand_laptops_and_hackers_helped_stop_ebola_and_stopped_an_apocalypse","title":null}],"attachments":[],"start":"16:00","duration":"01:00","room":"Hall 2","slug":"32c3-7561-how_open_source_software_second_hand_laptops_and_hackers_helped_stop_ebola_and_stopped_an_apocalypse","title":"How Open Source Software, second hand laptops and hackers helped stop Ebola (and stopped an apocalypse).","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"In the dark days of October 2014 an unprecedented Ebola epidemic wrecked havoc across Sierra Leone, Liberia and Guinea. In Sierra Leone, the health system was only weeks away from total collapse due to an inability to manage or pay health workers across the country and the world braced for the unchecked spread of the disease throughout west Africa. In the face of apocalyptic scenario, a company made up of local hackers took on the unprecedented challenge of building, implementing and running a huge Management Information System and Mobile payments system to keep the health system from collapsing. This talk will show how this was achieved with Open Source Software, second hand laptops, hacked voter registration machines, second hand smartphones and some very smart and determined young people used to achieving great things with none of the resources we take for granted. We salute them.\r\n","description":null,"logo":null},{"guid":"969bee9e-d0bf-4d24-a649-15f93747d608","id":"7286","date":"2015-12-30T16:15:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5956","name":"Matthew Stender"},{"id":"5001","name":"Jillian C. York"}],"links":[{"href":"https://onlinecensorship.org/","title":null},{"href":"https://media.ccc.de/v/32c3-7286-sin_in_the_time_of_technology","title":null}],"attachments":[],"start":"17:15","duration":"00:30","room":"Hall 2","slug":"32c3-7286-sin_in_the_time_of_technology","title":"Sin in the time of Technology","subtitle":"How social media companies are creating a global morality standard through content regulations","track":null,"type":"lecture","language":"en","abstract":"Technology companies now hold an unprecedented ability to shape the world around us by limiting our ability to access certain content and by crafting proprietary algorithm that bring us our daily streams of content.","description":"The great waves of change across the epochs have traditionally required a recalibration of society's moral compass. We see the theological and ideological underpinnings of the post-Enlightenment paradigm set out by the Protestant Reformation and the US Civil Rights Movement, we have come to see self determination as a bedrock of civilization. \r\n\r\nThe reach of social media companies has created a class of corporations that are able to influence – if not curate – the world outlook of over a billion people on certain days. This unprecedented capacity gives Facebook power to shape discourse approaching the degree of religious institutions and the state – two of the traditional institutions that we have long relied on for shaping our society-wide morality and values. \r\n\r\nBy compelling users to comply with the arbitrary content standards laid out in their ToS, Facebook is essentially laying out a new global standard for what people can and can not see. This standard, however, is not derived from the same moralistic traditions of previous moral paradigms, but is a calculated business decision crafted in the boardrooms of Silicon Valley. Risk averse, Facebook has created a global content standard that is in place not to contextualize the world for their users, but to meet perceived expectations of acceptable speech in a diverse range of nations.\r\n\r\nOur project, OnlineCensorship.org, seeks to capture instances of censorship across social media platforms. We will present OnlineCensorship.org and demonstrate how you can help us push companies toward a more open practice.","logo":null},{"guid":"9b641e3f-6d6e-4850-bddd-ced7d67af5c6","id":"7340","date":"2015-12-30T17:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"4076","name":"M. C. McGrath"}],"links":[{"href":"https://media.ccc.de/v/32c3-7340-collect_it_all_open_source_intelligence_osint_for_everyone","title":null}],"attachments":[],"start":"18:00","duration":"01:00","room":"Hall 2","slug":"32c3-7340-collect_it_all_open_source_intelligence_osint_for_everyone","title":"Collect It All: Open Source Intelligence (OSINT) for Everyone","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked- the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves. \r\n\r\nBy making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.","description":"Intelligence analysts regularly use Open Source Intelligence (OSINT) in their work. With ICWatch, we showed that it's possible to use open data online to watch the intelligence community too. Now, Transparency Toolkit has built free software anyone can use to collect OSINT without coding. This talk discusses techniques for collecting OSINT on surveillance and human rights issues. It also explores pathways for using this data in journalism, litigation, and policy change.","logo":null},{"guid":"7ca8581d-a3f7-4247-8101-786cf04d9bd1","id":"7333","date":"2015-12-30T10:30:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"3980","name":"Tobias Mueller"},{"id":"5816","name":"Christian Forler"}],"links":[{"href":"https://media.ccc.de/v/32c3-7333-the_magic_world_of_searchable_symmetric_encryption","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/855/original/sse.pdf?1451567539","title":"Slides"}],"start":"11:30","duration":"01:00","room":"Hall G","slug":"32c3-7333-the_magic_world_of_searchable_symmetric_encryption","title":"The Magic World of Searchable Symmetric Encryption","subtitle":"A brief introduction to search over encrypted data","track":null,"type":"lecture","language":"en","abstract":"In the last couple of years, cloud and web services have become more and more popular. Since Snowden we know for sure that intelligence agencies have access to the data storage of an service provider, either by (forced) cooperation, or espionage. Thus, to protect our privacy we have to encrypted our data before hand it over to our service provider (data holder). But this approach contradicts the very idea of a web service where the data holder have to process our data in one way or an other. Therefore, we need new cryptographic techniques to enable the data holder to perform operation on encrypted data. One of the most important operations for cloud storage or database based web/cloud services is the search operation. In this talk we focus on the very familiar cloud storage scenario. Because in this scenario, It is obvious, that the user (data owner) do not want to perform the search by himself. This should be a service offered by the data holder. We will present different practical approaches to achieve searchable ciphertext, namely one with an index and one with cleverly encrypted words.\r\n\r\nNote that no PhD is required to attend this talk ;-)","description":"We found that many people cannot believe that it is possible to execute operations on ciphertext. We want to rectify this by educating hackers of the magic of searchable encryption schemes.\r\n\r\n\r\n\r\n\r\n<h4>Intro</h4>\r\n\r\n\"The Cloud\" has undoubtedly become very popular over the last decade. Many people like the convenience of virtually unlimited storage and computing power at their fingertips. However, people tend to dislike to disclose their data to third parties. A simple solution would be encrypt the data before uploading it to a third party, but you may very well want to perform certain operations on the encrypted data such as a search.\r\n\r\n\r\n<h4>Entering Searchable Encryption</h4>\r\n\r\nThis conflict of encryption and the ability to execute computations on data seems to be inherent. However, clever encryption schemes which allow certain search operations on ciphertext exist! We will present some searchable symmetric encryption schemes which enable others to search for keywords or substrings without learning they key nor the plaintext. You may very well ask what the security implications in those cases are, so we will present the associated security notions. Another concern is performance reg. speed or memory consumption. We present our measurements of prototypical implementations and infer that searchable symmetric encryption schemes can indeed be practical.\r\n\r\nOur vision is to store data remotely in an encrypted fashion without losing convenience of using third party applications.\r\nWe want to enable developers to secure their databases and we want to make users aware of advances in cryptography so that they demand more secure services. Given the properties, other use cases of secure keyword search include email or document storage. In fact, it is possible to not only secure relational databases, but to create secure big data scenarios where massive amounts of data are being handled.","logo":"/system/events/logos/000/007/333/medium/magic-mask.jpg?1451219607"},{"guid":"83fa2955-80df-4f47-9421-9e81b9f6f2c0","id":"7560","date":"2015-12-30T11:45:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"5263","name":"gedsic"},{"id":"4601","name":"bigalex"}],"links":[{"href":"https://media.ccc.de/v/32c3-7560-lightning_talks_day_4","title":null}],"attachments":[],"start":"12:45","duration":"02:15","room":"Hall G","slug":"32c3-7560-lightning_talks_day_4","title":"Lightning Talks Day 4","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick! ","description":"To get involved and learn more about what is happening please visit <a href=\"https://events.ccc.de/congress/2015/wiki/Static:Lightning_Talks\">the Lightning Talks Wikipage</a>.","logo":"/system/events/logos/000/007/560/medium/fd_30c0.JPG?1448895896"},{"guid":"03c8501f-d327-4228-a9fe-2635370d25d2","id":"7323","date":"2015-12-30T15:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"2461","name":"Mathias Dalheimer"}],"links":[{"href":"https://media.ccc.de/v/32c3-7323-wie_man_einen_blackout_verursacht","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/807/original/32C3-Blackout-16-9.pdf?1451225645","title":"Vortragsfolien"},{"href":"/attachments/original/missing.png","title":"file"}],"start":"16:00","duration":"01:00","room":"Hall G","slug":"32c3-7323-wie_man_einen_blackout_verursacht","title":"Wie man einen Blackout verursacht ","subtitle":"und warum das gar nicht so einfach ist.","track":null,"type":"lecture","language":"de","abstract":"Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der zunehmende Handel mit Strom erhöht die Belastung der Stromnetze. Welche Auswirkungen hat das auf die Netzstabilität? Wann kommen die Stromnetze an ihre Leistungsgrenze? Wie kann ein gezielter Angriff auf das Europäische Verbundnetz aussehen? Was müsste man tun, um einen Blackout zu verursachen? Und: Wie können wir unsere Stromnetze umbauen, damit das nicht passiert?","description":"Gegenwärtig wird die (N-1)-Sicherheit als Kriterium für die Netzstabilitätsplanung herangezogen: Fällt ein beliebiges Betriebsmittel aus, so muss das Stromnetz weiterhin funktionsfähig bleiben. Dieses Kriterium setzt jedoch voraus, dass Betriebsmittel immer unabhängig voneinander ausfallen. Durch den Stromhandel, aber auch durch die vermehrte Einbindung regelbarer Lasten gibt es in Zukunft externe Ereignisse, welche die Ausfallwahrscheinlichkeiten mehrerer Betriebsmittel gleichzeitig beeinflussen. Dies kann vermehrt sowohl zu großflächigen (d. h. Bundesland aufwärts) als auch zu kleineren Ausfällen führen.\r\n\r\nDie Netzfrequenzmessdaten der Schnellabschaltung des Kernkraftwerks Gundremmingen liefert die Grundlage für ein Modell, mit dem das notwendige Lastungleichgewicht zur Destabilisierung des Verbundstromnetzes abgeschätzt werden kann. Der Vortrag diskutiert verschiedene Szenarien, wie eine solche Lastschwankung verursacht werden könnten: durch gezielte Smart-Meter-Manipulation? Durch Fehler in Stromleitungen oder Umspannwerken? Durch den Angriff von Großkraftwerken? Oder durch Marktmanipulationen an der Strombörse?\r\n\r\nAuch im kleinen Maßstab kann natürlich die Stromversorgung ausfallen: zum Beispiel bei einem kleinen Stadtnetzbetreiber. Eine Statistik der Bundesnetzagentur über Netzausfälle in Deutschland wird ausgewertet, um z. B. den Einfluß der Energiewende auf die Zuverlässigkeit der Stromversorgung zu bewerten. Der Realitätsgehalt der offiziellen Daten muss jedoch angezweifelt werden.\r\n\r\nSchließlich versucht der Vortrag, Wege aufzuzeigen, um die Resilienz des Stromnetzes zu erhöhen. Weniger technische Hindernisse als vielmehr das Festhalten der Energiewirtschaft an ihren Geschäftsmodellen verhindert eine Umstrukturierung der Stromversorgung, die – neben der einfacheren Integration der erneuerbaren Energien – auch die Stabilität des Gesamtsystems erhöhen würde.","logo":null},{"guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","id":"7291","date":"2015-12-30T16:15:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"1545","name":"ruedi"}],"links":[{"href":"https://media.ccc.de/v/32c3-7291-microsofts_windows_10_botnet","title":null}],"attachments":[],"start":"17:15","duration":"00:30","room":"Hall G","slug":"32c3-7291-microsofts_windows_10_botnet","title":"Microsofts Windows 10 Botnet","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von Windows-Nutzern gewarnt wurde, schalte Microsoft mit Windows 10 das Botnetz scharf.","description":"Botnetze sind gemäß einer gängigen Definition Computernetze, bei\r\ndenen ein Angreifer von außen beliebigen Code ausführen kann. Und genau dies kann man aus den aktuellen Microsoft-Lizenzen unschwer herauslesen.\r\nNoch gruseliger gestaltet sich die digitale Selbstaufgabe bei der Lektüre der Beta-Test-Bedingungen. Aber vielleicht ist die ganze Sache auch gar nicht so schlimm, sondern viel schlimmer. Auch Intel hat sich weiter unten mit ME einen verschlüsselten Zugang gesichert, für das Betriebssystem und dort laufenden Virenscanner unsichtbar. Aber das gilt ja beunruhigenderweise auch für die bereits gesichteten\r\nAngriffsprogramme im UEFI-Bereich. In einem derartigen Sicherheitsumfeld unter dem Stichwort „Industrie 4.0“ Dienste, die für das friedliche gesellschaftliche Zusammenleben relevant sind, Angriffen aus dem Netz auszusetzen, kann nicht als akzeptable Herangehensweise charakterisiert werden.","logo":null},{"guid":"45a2ba85-564b-4d94-9bef-db32b59d7602","id":"7375","date":"2015-12-30T17:00:00.000Z","day":"4","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"825","name":"Felix Fietkau"}],"links":[{"href":"https://media.ccc.de/v/32c3-7375-wireless_drivers_freedom_considered_harmful","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/854/original/slides.pdf?1451555921","title":"Slides"}],"start":"18:00","duration":"01:00","room":"Hall G","slug":"32c3-7375-wireless_drivers_freedom_considered_harmful","title":"Wireless Drivers: Freedom considered harmful?","subtitle":"An OpenWrt perspective on the development of Linux 802.11 support","track":null,"type":"lecture","language":"en","abstract":"A review/rant about the progress that free software wireless drivers (especially on Linux) have made over the recent years, as well as the current challenges that driver developers (and users) are facing.","description":"Many users of free software have realized that 802.11 wireless chipsets can be used in more ways than simply making their laptop connect to their home AP or hotspot.\r\n\r\nMany people are replacing their router firmware with OpenWrt to have a better AP with free software drivers. Mesh network communities like Freifunk are building decentralized network infrastructure, which is also used to provide internet access to refugees in Germany. There are countless other examples of useful and innovative projects that are enabled by having free software wireless drivers.\r\n\r\nHowever, the sad reality is that the hardware choices for these kinds of innovative projects are very limited, not because of limitations in the actual hardware, but because of the lack of datasheets, information, reference source code, developer time, etc.\r\n\r\nIn this talk, I will show how we got the state of Linux wireless support to the point where it is now, and I will rant viciously about what's holding us back. \r\n\r\nI have been working on wireless drivers for a few years now, and as a contractor for chipset manufacturers, I was given a glimpse into the maze of insanities that is holding back progress significantly.\r\n\r\nBut no matter how much bureaucracy, lame excuses, NDA crap and other weird things vendors (and now also the FCC) throw at us, there is still hope for a better future...","logo":null},{"guid":"5f7d945f-872f-4951-a95d-8b78558159f8","id":"7567","date":"2015-12-30T10:30:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"6404","name":"Sebastian Jünemann"}],"links":[{"href":"http://www.cadus.org","title":null},{"href":"https://media.ccc.de/v/32c3-7567-katastrophe_und_kommunikation","title":null}],"attachments":[],"start":"11:30","duration":"01:00","room":"Hall 6","slug":"32c3-7567-katastrophe_und_kommunikation","title":"Katastrophe und Kommunikation","subtitle":null,"track":null,"type":"lecture","language":"de","abstract":"Ob diktatorischer Despot, der seiner Bevölkerung die Kommuninaktionsrechte einschränkt, oder ein Erdbeben, das die Kommunikationsinfrastruktur zerstört: Auch 2015 sind die Lösungsansätze noch nicht wesentlich über Zettel und Stift hinaus.","description":"„CADUS – redefine global solidarity“ über den Ist-Zustand in Katastrophengebieten und Lösungsideen.\r\n\r\nKommunikation und Organisation sind unverzichtbar für große Menschengruppen, egal ob Oppositionsbewegung in Diktaturen oder für Volunteers nach großen Naturkatastrophen. \r\nIm Süden der Türkei, in Nordkurdistan, sieht man grade einmal wieder, dass die erste Maßnahme von repressiven Regierungen die Beschneidung des Rechts auf Kommunikation ist. Wenige hundert Kilometer weiter, im Nordirak, erlebt man auch 2015 noch, wie das UN-OCHA (Office for the Coordination of Humanitarian Affairs) Hilfsorganisationen offline über Meetings und \"„Zettel und Stift“-Kultur zu organisieren versucht. \r\n„CADUS – redefine global solidarity“ ist u. a. in der Region aktiv. In dem Vortrag wird eine kritische Beleuchtung des Ist-Zustandes von Recht (und Möglichkeit) auf Kommunikation im Nahen und Mittleren Osten gegeben. Weiterhin werden Lösungsansätze und Ideen vorgestellt, was ITK-Lösungen für sowohl Bevölkerung als auch Organisationen bieten könnte.","logo":"/system/events/logos/000/007/567/medium/cadus-logo_RGB_web.jpg?1450875571"},{"guid":"c50c5193-7389-4858-9352-14ea6d74b77a","id":"7403","date":"2015-12-30T11:45:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"6118","name":"Katharina Nocun"}],"links":[{"href":"https://media.ccc.de/v/32c3-7403-a_new_kid_on_the_block","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/762/original/geraspora-data-analysis13.png?1443648938","title":"geraspora-data-analysis13.png"}],"start":"12:45","duration":"01:00","room":"Hall 6","slug":"32c3-7403-a_new_kid_on_the_block","title":"A New Kid on the Block","subtitle":"Conditions for a Successful Market Entry of Decentralized Social Networks","track":null,"type":"lecture","language":"en","abstract":"The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?","description":"The Internet today is a giant web, a hilarious copy machine, interlaced into more and more aspects of our lives. What started as a network of equal nodes, has since transformed the layer above the open, decentralized hypertext protocol, and begun to move it towards greater centralization and power in the hands of few large platforms. Social networks are an important benchmark for this trend. \r\n\r\nSocial networks are an important tool for private, commercial and political use. Technological sovereignty can be decisive for political struggles, regardless of whether we talk about elections or revolutions. Privacy gains importance when the Internet becomes interconnected with more and more parts of our lives. The launch of Diaspora in 2010, a crowdfunded free-to-use social network based on free software, was clearly born from these debates. While the appeal of a federated system of social contacts is same in centralized and decentralized networks, they are worlds apart regarding their technical infrastructure, their power structures and their options for business models. \r\n\r\nMuch scientific work has been carried out on the technical challenges that decentralized social networks face. But the underlying economic mechanisms that drive the market towards concentration, promote the dominance of few actors and build high barriers for market entry, have so far been rarely addressed in the context of social networks. The dominance of one network is deeply rooted in the code of the market structure troubled with network effects, lock-in and proprietary de facto standards. Furthermore, privacy restraints through the operator derive from the very core of the business model of multi-sided markets as a bottleneck between users and advertisers. Lock-in and switching costs, make it difficult for users to leave their social network, thereby weakening competition. Such a structure enforces asymmetric power relations between users and providers systematically. \r\n\r\nHere’s the thesis: Whoever wants to challenge the incumbent’s position needs to address these findings since this structure poses high barriers for market entry. Centralization of infrastructure on the market for social networks can not be reversed with technology alone. Decentralized social networks need foremost to consider how to breathe life into their provided infrastructure, since it is the user content and the interconnection between users that adds value and meaning to a social network. Projects that want to reintroduce technological sovereignty need good technology combined with a straightforward strategy for market entry. Some of these strategies differ substantially from standard strategies, since non-commercialized decentralized community driven projects based on the idea of free/ libre open source software differ in many aspects from companies. The fact that Diaspora built an alliance with other decentralized social networks of the Federation based on shared open standards is an important development and can be regarded as a good move towards joining forces against a paramount incumbent. It will be shown that although decentralized social networks face tough conditions entering the market for social networks, there are promising strategies that have not yet been exhausted. \r\n\r\nThe controversies which arose around the centralization in the market for social networks are now more pressing than ever. This talk shall present an overview of the impact of social networks and the driving economic forces of this market. The status quo of the Diaspora network and the Federation as the most prominent representative of free and open source non-commercial decentralized alternatives will be analyzed. Next, the economic analysis of the relevant market structures will be used to derive fresh perspectives on how this “new kid on the block” could develop a strategy for a successful market entry. The findings are supported by expert interviews with authorities in relevant fields and data from Diaspora and connected networks.","logo":"/system/events/logos/000/007/403/medium/kattascha_nerd.jpg?1448554908"},{"guid":"abc3b46d-6e36-40e5-a037-79724a720183","id":"7369","date":"2015-12-30T13:00:00.000Z","day":"4","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"5168","name":"mclien"}],"links":[{"href":"https://boards.openpandora.org/pyramain/main/","title":null},{"href":"http://www.themooltipass.com/","title":null},{"href":"http://kosagi.com/w/index.php?title=Novena_Main_Page","title":null},{"href":"https://media.ccc.de/v/32c3-7369-how_to_contribute_to_make_open_hardware_happen","title":null}],"attachments":[],"start":"14:00","duration":"01:00","room":"Hall 6","slug":"32c3-7369-how_to_contribute_to_make_open_hardware_happen","title":"How to contribute to make open hardware happen","subtitle":"Mooltipass, Openpandora/Pyra and Novena/Senoko: how I contributed and what was to be learnt on the path","track":null,"type":"lecture","language":"en","abstract":"What to do if you are neither a hardware- nor a software expert and want to contribute in effords of openess neverseless? A short overview about what I have done so far, shown on 3 exaples: The Mooltipass, a offline password save. The Pandora/Pyra, a mini handheld, full Linux PC and its successor. Senoko, the Novena battery board. From \"just\" crowdfunding to producing, why it's worth to go through all the ups and downs and encourage others to do the same.","description":"My very subjective views to the following projects I got myself more or less involved\r\nThe Mooltipass is a offline passwordstorage with 2 factor authentification, which is a open hardware development initiat around the hackaday community. Here I did simply crwodfunding, which is surely the easiest way to support open hardware. Untill it looks like the campagin is missing the goal and what you can do about it and what are good ways to set up perks.\r\nThe Openpandor and its successor the Pyra are chamshell designe mini handhelds mainly aimed for (retro)gaming, but also have the power to run as full Linux desktop PC. Here I give a view from what the whole community and the maker learned, including surviving the near death of the whole project and how you should/should not tread the community. Endurance will earn awsomeness.\r\nThe Senoko is the Novena Battery Board, which is easily producable, because it's open hardware, right? Why it is and is not somehow at the same time, why I started it alltogether and how to make it happen inspite of strange standardisation, customs and confusing notifications on your account statement.\r\nAnd my peronal dos and don'ts that derivate from this expierence.","logo":null},{"guid":"48219ef6-24b8-41ca-8cc0-ec309e4148e6","id":"7216","date":"2015-12-30T15:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0-DE","optout":false},"persons":[{"id":"5997","name":"Michelle Proksell "}],"links":[{"href":"www.netize.net","title":null},{"href":"https://www.wired.de/collection/latest/so-sieht-der-digitale-alltag-china-aus","title":null},{"href":"http://www.vice.com/read/chinas-first-net-art-exhibition-113","title":null},{"href":"http://www.thespace.org/news/view/ben-valentine-aspartime-net-art","title":null},{"href":"https://media.ccc.de/v/32c3-7216-chinternet_art","title":null}],"attachments":[{"href":"/attachments/original/missing.png","title":"file"}],"start":"16:00","duration":"01:00","room":"Hall 6","slug":"32c3-7216-chinternet_art","title":"CHINTERNET ART","subtitle":"Creativity, Archives & Digital Media from the Chinese Internet","track":null,"type":"lecture","language":"en","abstract":"Since my move to China in 2012 I have actively engaged in the local art scenes of Beijing and Shanghai, focusing on collaborating with artists interested in technology and the internet. My own personal independent research of the Chinese internet and the popular Chinese social app, WeChat 微信, has contributed to an ongoing massive archive I began in 2014 called The Chinternet Archive. To date, I have over 15,000 pieces of content (and growing) documenting localized trends, memes, vernacular photography, online personas, .gif animations, videos, selfies, propaganda, retail, family/work life, and other such digital artifacts of online Chinese culture. This archive directly influenced my artistic and curatorial practice, resulting in an online art collection called Netize.net, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet Friend Network”, which collaborates with emerging Chinese and international artists who are exploring or deconstructing East/West dichotomies, engaging in Sino-centric Web aesthetics, or investigating the East online. The goal of this talk is to explore through my Chinternet Archive and Netize.net collections, forms of creativity found in China in relationship to it’s early internet history, interactions with technology, localized networks and restrictions.","description":"Michelle Lee Proksell 媚潇 (b. 1985, Dhahran, Saudi Arabia) was born a Third Culture Kid (TCK) to ex-patriate American parents and experienced extreme forms of censorship and governmental monitoring in Saudi Arabia during her formative years. This influenced and shaped her interest and direction in exploring transcultural experiences online in relationship to localized access and dissemination of information, via forms of censorship or self-censorship. Her childhood exploring Asia and years working in new media and internet-related galleries and projects led to her eventual fascination with the unique history of the Chinese Internet. Since 2012 she has been working with creatives in China who engage in technology and the internet, resulting in two major projects documenting online digital artifacts and the emergence of Net Art in China: The Chinternet Archive and Netize.net 网友网 “The Internet Friend Network”.\r\n\r\nIn this lecture, Michelle will briefly introduce Chinese digital media and online culture through her first hand experience and research. She will touch upon the topics of what it’s really like to deal with the Great Fire Wall on a daily basis, the influence of WeChat on contemporary Chinese digital culture, creative trends from her Chinternet Archive, and memes pertaining to recent viral media events. She will also introduce artists and their artworks from her Netize.net 网友网 project. She will reflect on how people are engaging creatively with the changes of the Chinese internet, how this influences artists and what we can learn from localized networks and the increasingly blurred lines between real life and virtual life.\r\n","logo":"/system/events/logos/000/007/216/medium/WeChat_Logo_01.jpg?1451400567"},{"guid":"269e7320-2133-4981-9238-e5fc8305a3e4","id":"7520","date":"2015-12-30T16:15:00.000Z","day":"4","recording":{"license":"CC-BY 4.0","optout":false},"persons":[{"id":"6237","name":"Matthias Koch"}],"links":[{"href":"mecrisp.sourceforge.net","title":null},{"href":"https://media.ccc.de/v/32c3-7520-compileroptimierungen_fur_forth_im_microcontroller","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/858/original/Forth-Vortrag_32C3.pdf?1451769518","title":"Vortragsfolien"}],"start":"17:15","duration":"00:30","room":"Hall 6","slug":"32c3-7520-compileroptimierungen_fur_forth_im_microcontroller","title":"Compileroptimierungen für Forth im Microcontroller","subtitle":"Mecrisp intern","track":null,"type":"lecture","language":"de","abstract":"Wie lassen sich Konstantenfaltung und ein Registerallokator für einen Forth-Compiler implementieren, der in einem Mikrocontroller läuft ?","description":"Wer gern mit Elektronik und Mikrocontrollern bastelt, kennt sicherlich die aufwändige Fehlersuche mit vielen kleinen Testprogrammen. Doch es ist auch möglich, einen Forth-Compiler direkt im Microcontroller zu installieren, mit dem über ein Terminal kommuniziert werden kann und welcher es erlaubt, \"von innen heraus\" auf die Hardware zuzugreifen sowie jede neu geschriebene Routine sofort von Hand auszuprobieren. Forth ist ein alter Hut - wer jetzt jedoch an langsam denkt, mag überrascht sein: Ein optimierender Forth-Compiler mit Konstantenfaltung und Registerallokator passt mit 20 kb Größe sogar in den LPC1114FN28 ! Wie die Optimierungen \"an Bord\" funktionieren, soll in diesem Vortrag erläutert werden. Assemblerkenntnisse für MSP430 und ARM Cortex M sind von Vorteil. Wer Forth genauer kennenlernen möchte, kann gern auch zur Assembly der Forth-Gesellschaft kommen.","logo":null},{"guid":"7bf4c7a5-779e-4591-8d9b-f5f38d3dc879","id":"7555","date":"2015-12-30T17:00:00.000Z","day":"4","recording":{"license":"CC-BY-4.0","optout":false},"persons":[{"id":"2042","name":"Leon"}],"links":[{"href":"https://media.ccc.de/v/32c3-7555-32c3_infrastructure_review","title":null}],"attachments":[{"href":"/system/event_attachments/attachments/000/002/857/original/32c3-noc.pdf?1451748411","title":"NOC review slides"}],"start":"18:00","duration":"01:00","room":"Hall 6","slug":"32c3-7555-32c3_infrastructure_review","title":"32C3 Infrastructure Review","subtitle":null,"track":null,"type":"lecture","language":"en","abstract":"The traditional review event with presentations from various teams at congress. Learn how the 32C3 got Internet, video streaming, power and maybe more!","description":null,"logo":null}]