Devi aver effettuato l'accesso per segnare gli episodi come guardati. Accedi oppure registrati.
Stagione 30
Data di messa in onda
Dic 27, 2013
Speaker: Tim Pritlove
Welcome to the 30th Chaos Communication Congress
Introductory event to say hello to everybody, give a brief overview of the event's features and look into history and future alike
Speaker: Tim Pritlove
Welcome to the 30th Chaos Communication Congress
Introductory event to say hello to everybody, give a brief overview of the event's features and look into history and future alike
Data di messa in onda
Dic 27, 2013
Speaker: lizvlx
Art Practice under the Regime of Anti-Terror Legislation
This lecture shall give a first person account of how circumstances have dramatically changed for actionist
.. show full overview
Speaker: lizvlx
Art Practice under the Regime of Anti-Terror Legislation
This lecture shall give a first person account of how circumstances have dramatically changed for actionist art practice over the last 15 years. I will use examples from my own art practice to show the impossibility to engange in digital and real-life actionism as they are considered criminal under anti-terrorist laws.
Data di messa in onda
Dic 27, 2013
Speaker: Stefan Widmann
Techniques - Tools - Tricks
This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from
.. show full overview
Speaker: Stefan Widmann
Techniques - Tools - Tricks
This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be really tricky. After that it introduces the necessary tools, gives tips on how to detect the processor architecture, and explains some more advanced analysis techniques, including how to figure out the offsets where the firmware is loaded to, and how to start the investigation.
Data di messa in onda
Dic 27, 2013
Speakers: *m, Jeff Mann, frank, Diani Barreto
The Making of…
Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch
.. show full overview
Speakers: *m, Jeff Mann, frank, Diani Barreto
The Making of…
Auf dem 30C3 wird es, neben der bisher gewohnten digitalen Infrastruktur mit Netz, Telefon etc. dieses Jahr auch erstmalig ein Rohrpost-System mit dem schönen Namen Seidenstraße geben. Als Inspiration dient die auf geschlossenen Drainagerohren und Staubsaugern basierende Installation OCTO der Künstlergruppe Telekommunisten, die einigen von der letzten transmediale bekannt sein dürfte.
Data di messa in onda
Dic 27, 2013
Speaker: Andreas Lehner
Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.
Speaker: Andreas Lehner
Dieser Vortrag beschreibt Konzept und Idee des tiefen Staates anhand der Geschichte der BRD.
Data di messa in onda
Dic 27, 2013
Speaker: josch
How to do things with words
Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung,
.. show full overview
Speaker: josch
How to do things with words
Der Vortrag stellt fortgeschrittene linguistische Methoden des politisch motivierten Internetmonitorings vor. Er gibt keine Anleitung, wie man sich der Überwachung wirkungsvoll entziehen kann, denn das ist ohnehin zwecklos.
30x7
Keine Anhaltspunkte für flächendeckende Überwachung (#5281)
Episode overview
Data di messa in onda
Dic 27, 2013
Speakers: Martin Haase/maha, khamacherDie Diskussion um NSA, PRISM, Tempora sprachlich und logisch aufgearbeitet
Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze
.. show full overview
Speakers: Martin Haase/maha, khamacherDie Diskussion um NSA, PRISM, Tempora sprachlich und logisch aufgearbeitet
Die Enthüllungen Edward Snowdens haben die deutsche Politik für kurze Zeit in Aufregung gebracht. Für eine Beruhigung reichte es bereits aus, die Enthüllungen in sprachlich-logisch cleverer Weise zu verarbeiten, sie teilweise in ein anderen Kontext zu stellen und so schließlich Entwarnung geben zu können: Die Bundesregierung hat „keine Anhaltspunkte für flächendeckende Überwachung“.
Bei diesem Vorgehen handelt sich um ein Paradebeispiel dafür, wie mit einfachen sprachlich-rhetorischen Tricks die politisch Verantwortlichen die Öffentlichkeit und sich selbst so weit täuschten, dass es ihnen nicht mehr nötig erschien, sich mit den eigentlichen Problemen auseinanderzusetzen, und so das leidige Thema aus dem Wahlkampf herausgehalten werden konnte. Neben den mittlerweile zum Standard gehörenden „Basta“-Floskeln spielte das Phänomen der Modalisierung eine besondere Rolle, wie die genauere Analyse zeigt. Auch logische Fehler wie Zirkelschlüssel und (zu) strikte Einschränkung des thematischen Bezugs erlaubten diese „Flucht-nach-vorne“-Strategie. Die Häufung sprachlicher Tricks und des logisch-inhaltlichen Ausweichens legen eine Inszenierung nahe.
Data di messa in onda
Dic 27, 2013
Speaker: Jan Schejbal
It hurts.
We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt
.. show full overview
Speaker: Jan Schejbal
It hurts.
We reverse-engineered one implementation of the non-public CHIASMUS cipher designed by the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, short BSI). This did not only give us some insight on the cipher, but also uncovered serious implementation issues in GSTOOL which allow attackers to crack files encrypted with the GSTOOL encryption function with very little effort.
Data di messa in onda
Dic 27, 2013
Speaker: nbd
How OpenWrt evolved from a WRT54G firmware to an universal Embedded Linux OS
A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.
Speaker: nbd
How OpenWrt evolved from a WRT54G firmware to an universal Embedded Linux OS
A review of the 10 year history of the OpenWrt project, current events, and upcoming developments.
30x10
Triggering Deep Vulnerabilities Using Symbolic Execution (#5224)
Episode overview
Data di messa in onda
Dic 27, 2013
Speaker: gannimo
Deep program analysis without the headache
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic
.. show full overview
Speaker: gannimo
Deep program analysis without the headache
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths at once. A drawback of many systems is that they need source code access and only scale to few lines of code. This talk explains how SE and binary analysis can be used to (i) reverse-engineer components of binary only applications and (ii) construct specific concrete input that triggers a given condition deep inside the application (think of defining an error condition and the SE engine constructs the input to the application that triggers the error).
30x11
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade (#5634)
Episode overview
Data di messa in onda
Dic 27, 2013
Speaker:Alexa O'Brien
Reporting on the secret trial of Chelsea Manning
At Fort George "Orwell" Meade, home of the NSA and the US Defense Information School, managing the message of
.. show full overview
Speaker:Alexa O'Brien
Reporting on the secret trial of Chelsea Manning
At Fort George "Orwell" Meade, home of the NSA and the US Defense Information School, managing the message of Chelsea Manning's trial was facilitated by a lack of public access to most of the court filings and rulings until 18 months into her legal proceeding.
Data di messa in onda
Dic 27, 2013
Speakers: tw, sb
Stealing Money from ATMs with Malware
This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted
.. show full overview
Speakers: tw, sb
Stealing Money from ATMs with Malware
This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.
Data di messa in onda
Dic 27, 2013
Speaker: mel/ Agnes Meyder
Introduction to Heterogeneous Parallel Programming
This talks introduces programming concepts and languages for parallel programming on accelerator cards.
Speaker: mel/ Agnes Meyder
Introduction to Heterogeneous Parallel Programming
This talks introduces programming concepts and languages for parallel programming on accelerator cards.
Data di messa in onda
Dic 27, 2013
Speaker: Stefan Wehrmeyer
Erkenntnisse aus Informationsfreiheitsanfragen - Hacks, Bugs, Workarounds
Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger
.. show full overview
Speaker: Stefan Wehrmeyer
Erkenntnisse aus Informationsfreiheitsanfragen - Hacks, Bugs, Workarounds
Mit Informationsfreiheitsgesetz (IFG) und FragDenStaat.de kann man als Bürger den Staat einfach zurücküberwachen. Was erfährt man, wenn man fragt? Wo sind die Probleme, was sind die Workarounds? Ein Blick zurück auf 2013, nach vorn auf 2014 und ein Aufruf das IFG zu nutzen.
Data di messa in onda
Dic 27, 2013
Speaker: anja
more than just pew pew!
This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.
Speaker: anja
more than just pew pew!
This talk will give an introduction on lasers and space and it will show the huge diversity of applications for lasers in space.
Data di messa in onda
Dic 27, 2013
Speakers: Karsten Nohl, Luca Melette
Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from
.. show full overview
Speakers: Karsten Nohl, Luca Melette
Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.
Many networks are still reluctant to implement appropriate protection measures in legacy systems. But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.
Data di messa in onda
Dic 27, 2013
Speaker: ruedi
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt
.. show full overview
Speaker: ruedi
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.
Data di messa in onda
Dic 27, 2013
Speaker: Clemens Hopfer
introduction to software radio principles
The aim of this talk is to give an understandable insight into wireless communication, using existing systems as
.. show full overview
Speaker: Clemens Hopfer
introduction to software radio principles
The aim of this talk is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.
Data di messa in onda
Dic 27, 2013
Speaker: MaTu
Velocipedes and Face Recognition
This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern
.. show full overview
Speaker: MaTu
Velocipedes and Face Recognition
This talk considers the use of new technology to police large crowds in the Romantic period. We examine ethical aspects of modern surveillance technologies by looking at debates around crowd control and face recognition in the age that first imagined, and reflected on, the surveillance state.
Data di messa in onda
Dic 27, 2013
Speaker: Andreas Bogk
Applying science to eliminate 100% of buffer overflows
Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk
.. show full overview
Speaker: Andreas Bogk
Applying science to eliminate 100% of buffer overflows
Violation of memory safety is still a major source of vulnerabilities in everyday systems. This talk presents the state of the art in compiler instrumentation to completely eliminate such vulnerabilities in C/C++ software.
Data di messa in onda
Dic 27, 2013
Speaker: Peter Stuge
Clean boot every boot - rejecting persistence of malicious software and tripping up the evil maid
A commodity laptop is analyzed to identify exposed attack
.. show full overview
Speaker: Peter Stuge
Clean boot every boot - rejecting persistence of malicious software and tripping up the evil maid
A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner.
Data di messa in onda
Dic 27, 2013
Speaker: C B
Concepts and components for intercontinal communication with single photons.
This talk should introduce the general 30c3 participant with several components of long distance quantum communication.
Speaker: C B
Concepts and components for intercontinal communication with single photons.
This talk should introduce the general 30c3 participant with several components of long distance quantum communication.
30x23
Monitoring the Spectrum: Building Your Own Distributed RF Scanner Array (#5142)
Episode overview
Data di messa in onda
Dic 27, 2013
Speaker: Andrew Reiter (arr,awr)
Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One
.. show full overview
Speaker: Andrew Reiter (arr,awr)
Software-Defined Radio (SDR) has increased in popularity in recent years due to the decrease in hardware costs and increase in processing power. One example of such a class of devices is the RTL-SDR USB dongles based on the Realtek RTL2832U demodulator. This talk will discuss my experience in building a distributed RF scanner array for monitoring and spectrum mapping using such cheap SDR devices. The goal is to help the audience understand the what, why, and how of building their own RF monitoring array so that they will be able to do it themselves. In this era of increasingly being ``watched'', we must be prepared to do our own ``watching''.
Data di messa in onda
Dic 27, 2013
Speakers: Glenn Greenwald, frank
Speakers: Glenn Greenwald, frank
Data di messa in onda
Dic 27, 2013
Speakers: Jacob, arma
We're living in interesting times
Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
Speakers: Jacob, arma
We're living in interesting times
Roger Dingledine and Jacob Appelbaum will discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
Data di messa in onda
Dic 27, 2013
Speaker: sven, marcan, Nicholas Allegra (comex)
WiiU
About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the
.. show full overview
Speaker: sven, marcan, Nicholas Allegra (comex)
WiiU
About a year ago Nintendo released their latest video gaming console, the Wii U. Since 2006, the Wii has led to one of the most active homebrew scenes after its security system was completely bypassed. This talk will discuss the improvements made in Wii U's architecture and explain how it was broken in less than 31 days. The talk is targeted at those who hack (or design) embedded system security, but gamers might also find it interesting.
Data di messa in onda
Dic 27, 2013
Speaker: Joe Davis
Vortrag: Forbidden Fruit
Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.
Speaker: Joe Davis
Vortrag: Forbidden Fruit
Various dietary restrictions are historically associated with human culture and civilization. In addition, millions suffer from eating disorders that have both pathological and cultural origins.
Data di messa in onda
Dic 27, 2013
Speaker: Kai
Activity Recognition for the Mind
The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading.
.. show full overview
Speaker: Kai
Activity Recognition for the Mind
The talk gives an overview about our work of quantifying knowledge acquisition tasks in real-life environments, focusing on reading. We combine several pervasive sensing approaches (computer vision, motion-based activity recognition etc.) to tackle the problem of recognizing and classifying knowledge acquisition tasks with a special focus on reading. We discuss which sensing modalities can be used for digital and offline reading recognition, as well as how to combine them dynamically.
Data di messa in onda
Dic 27, 2013
Speaker: RPW, esizkur
Hexagon challenges
Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share
.. show full overview
Speaker: RPW, esizkur
Hexagon challenges
Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 97% of the market share of shipped LTE chipsets in 1Q2013, you see their chipset in every single top-of-the-line smartphone, whether it is an Android, an iPhone, a Windows Phone or a Blackberry.
Data di messa in onda
Dic 27, 2013
Speaker: Markus Beckedahl, Thomas Lohninger
Wer kontrolliert das Netz?
Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit
.. show full overview
Speaker: Markus Beckedahl, Thomas Lohninger
Wer kontrolliert das Netz?
Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit der Ankündigung der Deutschen Telekom im Frühjahr, zukünftig auf Volumentarife umzusteigen und Partnerdienste priorisiert durchzulassen, wurde Netzneutralität eines der meistdiskutierten netzpolitischen Debatten des Jahres.
Auf nationaler Ebene startete das Bundeswirtschaftsminsiterium eine Diskussion über eine Verordnung und auf EU-Ebene legte die Kommission einen Verordnungsvorschlag vor.
Data di messa in onda
Dic 27, 2013
Speaker: Anja Drephal
Stalin's best men, armed with paper and pen
The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself.
.. show full overview
Speaker: Anja Drephal
Stalin's best men, armed with paper and pen
The use of encryption to secure sensitive data from unauthorized eyes is as old as human communication itself. Before the relatively new method of computerized encryption software converting data into a format unintelligible to anyone lacking the necessary key for its decryption, for a long time there was pen and paper and the human brain doing quite a bit of work. Up until the 20th century encryption had to be done literally by hand, to then be transmitted in paper form, via telegraphy or radio. In this context, encryption of data has always been of special importance during times of political conflict and war; subsequently, it saw its major developments during those times in history. This talk will examine and explain common hand encryption methods still employed today using the example of one very successful Soviet espionage group operating in Japan in the 1930s and 1940s: the spy ring centered around Richard Sorge, codenamed “Ramsay”.
Data di messa in onda
Dic 27, 2013
Speaker: grothoff
A Decentralized PKI For Social Movements
DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate
.. show full overview
Speaker: grothoff
A Decentralized PKI For Social Movements
DNS, DNSSEC and the X.509 CA system leak private information about users to server operators and fail to provide adequate security against modern adversaries. The fully decentralized GNU Name System provides a privacy-enhancing and censorship-resistant alternative.
Data di messa in onda
Dic 27, 2013
Speakers: Quinn Norton, Eleanor Saitta
The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations. If you
.. show full overview
Speakers: Quinn Norton, Eleanor Saitta
The news of the past few years is one small ripple in what is a great wave of culture and history, a generational clash of civilizations. If you want to understand why governments are acting and reacting the way they are, and as importantly, how to shift their course, you need to understand what they're reacting to, how they see and fail to see the world, and how power, money, and idea of rule of law actually interact.
Data di messa in onda
Dic 27, 2013
Speaker: Martin Herfurt
OMG - my Smart TV got pr0wn3d
10789556_m
HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV
.. show full overview
Speaker: Martin Herfurt
OMG - my Smart TV got pr0wn3d
10789556_m
HbbTV (Hybrid broadband broadcast TV) is an emerging standard that is implemented in a growing number of smart TV devices. The idea is to bundle broadcast media content with online content which can be retrieved by the TV set through an Internet connection.
Mechanisms that allow the online content to be accessed by the TV set can be attacked and might put the TV user’s privacy at stake. The presentation highlights possible attack vectors of HbbTV-capable TV sets and introduces possible mitigations.
Data di messa in onda
Dic 27, 2013
Speaker: Michael Büker
On the Awesomeness of Particle Accelerators and Colliders
A light-hearted presentation about many aspects of particle accelerators like the LHC and their
.. show full overview
Speaker: Michael Büker
On the Awesomeness of Particle Accelerators and Colliders
A light-hearted presentation about many aspects of particle accelerators like the LHC and their particle collision experiments. Aimed at technically interested non-scientists and physics buffs alike.
Data di messa in onda
Dic 27, 2013
Speaker: angcui
Embedded Security Using Binary Autotomy
We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware
.. show full overview
Speaker: angcui
Embedded Security Using Binary Autotomy
We present a collection of techniques which aim to automagically remove significant (and unnecessary) portions of firmware binaries from common embedded devices to drastically reduce the attack surface of these devices. We present a brief theoretical explanation of Firmware Fat Camp, a collection of "before" and "after" photos of graduates of FFC, along with a set of live demonstrations of FFC in action on common embedded devices.
Modern embedded systems such as VoIP phones, network printers and routers typically ship with all available features compiled into its firmware image. A small subset of these features is activated at any given time on individual devices based on its specific configuration. An even smaller subset of features is actually used, as some unused and insecure features cannot are typically enabled by default and cannot be disabled. However, all embedded devices still contain a large amount of code and data that should never be executed or read according to its current configuration. This unnecessary binary is not simply a waste of memory; it contains vulnerable code and data that can be used by an attacker to exploit the system. This “dead code” provides an ideal attack surface. Automated minimization of this attack surface will significantly improve the security of the device without any impact to the device’s functionality.
Data di messa in onda
Dic 28, 2013
Speakers: Sec, Ray
Number guessing for geeks
The Hacker Jeopardy is a quiz show.
Speakers: Sec, Ray
Number guessing for geeks
The Hacker Jeopardy is a quiz show.
Data di messa in onda
Dic 28, 2013
Speaker: Karl Heinz Jeron
A singing and dancing robot build to take part in casting shows
Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.
Speaker: Karl Heinz Jeron
A singing and dancing robot build to take part in casting shows
Sim Gishel is a multimedia robot. He sings and dances on request. He will try hard to take part in casting shows to become a popstar.
Data di messa in onda
Dic 28, 2013
Speaker: Jaap-Henk Hoepman
Attribute Based Credentials in Practice
Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race,
.. show full overview
Speaker: Jaap-Henk Hoepman
Attribute Based Credentials in Practice
Attribute Based Credentials (ABC) allow users to prove certain properties about themselves (e.g. age, race, license, etc.) without revealing their full identity. ABC are therefore important to protect the privacy of the user. The IRMA (I Reveal My Attributes) project of the Radboud University Nijmegen has created the first full and efficient implementation of this technology on smart cards. This allows ABC technology to be used in practice both on the Internet as well as in the physical world. We will discuss ABCs in general, the IRMA system, it's advantages and pitfalls, and future work.
Data di messa in onda
Dic 28, 2013
Speaker: Aram Bartholl
How to make art after Snowden?
USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive
.. show full overview
Speaker: Aram Bartholl
How to make art after Snowden?
USB DeadDrops, IRL map marker in public, FUCK 3D glasses or How to vacuum form a guy fawkes mask. I will present an extensive overview of my art projects from over the last 10 years including the Fake Google car by F.A.T. and moar!! It all started here at the CCC congress! :))
Data di messa in onda
Dic 28, 2013
Speaker: Nicolas Pouillard
Security notions, proofs and attacks using dependently typed functional programming
Software engineering is in a unsustainable state: software is mainly
.. show full overview
Speaker: Nicolas Pouillard
Security notions, proofs and attacks using dependently typed functional programming
Software engineering is in a unsustainable state: software is mainly developed in a trial and error fashion, which always leads to vulnerable systems. Several decades ago the correspondence between logics and programming (Curry-Howard) was found. This correspondence is now being used in modern programming languages using dependent types, such as Agda, Coq, and Idris.
In this talk I show our development of attacks and security notions within Agda, using the recent BREACH exploit as an example. Our development is a constructive step towards verified software and bridges a gap between theory and practice.
I will explain the details about the Curry-Howard correspondence.
The target audience are interested people with some programming experience.
Data di messa in onda
Dic 28, 2013
Speaker: Drahflow
A case for expansionistic space policy
An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already
.. show full overview
Speaker: Drahflow
A case for expansionistic space policy
An abundant number of existential risks threatens humanity. Many of those planetary by nature. Current science already enables us to colonize nearby space, yet nobody bothers to supply the modest financial resources. Hence this call to action.
Data di messa in onda
Dic 28, 2013
Speaker Stephen Balaban
Fun and frightening uses of always-on camera enabled wearable computers
A one hour technical lecture that covers everything from machine learning and AI to
.. show full overview
Speaker Stephen Balaban
Fun and frightening uses of always-on camera enabled wearable computers
A one hour technical lecture that covers everything from machine learning and AI to hardware design and manufacture. Includes demonstrations of applications enabled by an always-on image capturing wearable computer. You'll leave with a clear understanding of the field's status quo, how we got here, and insight into what's around the corner.
30x44
Fast Internet-wide Scanning and its Security Applications (#5533)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: J. Alex Halderman
Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden
.. show full overview
Speaker: J. Alex Halderman
Internet-wide network scanning has powerful security applications, including exposing new vulnerabilities, tracking their mitigation, and exposing hidden services. Unfortunately, probing the entire public address space with standard tools like Nmap requires either months of time or large clusters of machines. In this talk, I'll demonstrate ZMap, an open-source network scanner developed by my research group that is designed from the ground up to perform Internet-wide scans efficiently. We've used ZMap with a gigabit Ethernet uplink to survey the entire IPv4 address space in under 45 minutes from a single machine, more than 1300 times faster than Nmap. I'll explain how ZMap's architecture enables such high performance. We'll then work through a series of practical examples that explore the security applications of very fast Internet-scale scanning, both offensive and defensive. I'll talk about results and experiences from conducting more than 300 Internet-wide scans over the past 18 months, including new revelations about the state of the HTTPS CA ecosystem. I'll discuss the reactions our scans have generated--on one occasion we were mistaken for an Iranian attack against U.S. banks and we received a visit from the FBI--and I'll suggest guidelines and best practices for good Internet citizenship while scanning.
Data di messa in onda
Dic 28, 2013
Speaker: nickfarr
Speaker: nickfarr
30x46
Extracting keys from FPGAs, OTP Tokens and Door Locks (#5417)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: David
Side-Channel (and other) Attacks in Practice
Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to
.. show full overview
Speaker: David
Side-Channel (and other) Attacks in Practice
Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.
Data di messa in onda
Dic 28, 2013
Speaker: Travis Goodspeed
Repurposing an Inmarsat Dish
Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track
.. show full overview
Speaker: Travis Goodspeed
Repurposing an Inmarsat Dish
Satellites in Low Earth Orbit have tons of nifty signals, but they move quickly though the sky and are difficult to track with fine accuracy. This lecture describes a remotely operable satellite tracking system that the author built from a Navy-surplus Inmarsat dish in Southern Appalachia.
Data di messa in onda
Dic 28, 2013
Speaker: Jan Philipp Albrecht
Jan Phillip Albrecht is rapporteur of the European Parliament for the EU's General Data Protection Regulation as well as for the EU-US data protection framework agreement.
Speaker: Jan Philipp Albrecht
Jan Phillip Albrecht is rapporteur of the European Parliament for the EU's General Data Protection Regulation as well as for the EU-US data protection framework agreement.
Data di messa in onda
Dic 28, 2013
Speaker: Michael Zöller
Free Software on Your Camera
We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly
.. show full overview
Speaker: Michael Zöller
Free Software on Your Camera
We present Magic Lantern, a free open software add-on for Canon DSLR cameras, that offers increased functionality aimed mainly at DSLR pro and power users. It runs alongside Canon's own firmware and introduces to consumer-grade DSLRs features usually only found in professional high-end digital (cinema) cameras.
30x50
Die Bundesrepublik – das am meisten überwachte Land in Europa (#5612)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: Josef Foschepoth
Historische Grundlagen und notwendige Konsequenzen
Seit Monaten hält uns die NS-Affäre in Atem. Immer neue Abhörmaßnahmen und geheimdienstliche Praktiken
.. show full overview
Speaker: Josef Foschepoth
Historische Grundlagen und notwendige Konsequenzen
Seit Monaten hält uns die NS-Affäre in Atem. Immer neue Abhörmaßnahmen und geheimdienstliche Praktiken werden enthüllt. Ein gigantisches Ausmaß an Überwachung durch die Vereinigten Staaten von Amerika tut sich auf, weltweit. In Europa ist die Bundesrepublik Deutschland das am meisten überwachte Land.
Data di messa in onda
Dic 28, 2013
Speaker: Felix "tmbinc" Domke
Using existing hardware platforms to integrate python into your dashboard
Almost all higher-end cars come with very beefy in-car entertainment
.. show full overview
Speaker: Felix "tmbinc" Domke
Using existing hardware platforms to integrate python into your dashboard
Almost all higher-end cars come with very beefy in-car entertainment hardware. In this talk, I'll describe how to take advantage of an existing hands-free kit to connect your car to the internet and script your dashboard in python.
Data di messa in onda
Dic 28, 2013
Speaker: Oona Räisänen
How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.
Speaker: Oona Räisänen
How I discovered mysterious hidden signals on a public radio channel and eventually found out their meaning through hardware hacking, reverse engineering and little cryptanalysis.
Data di messa in onda
Dic 28, 2013
Speaker: Robert M Ochshorn
Twisting time and space to explore the unknown
Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a
.. show full overview
Speaker: Robert M Ochshorn
Twisting time and space to explore the unknown
Using case studies of documentary film, Freedom of Information Law document dumps, soundbanks, and a hacker conference, I will demonstrate experiments and results of several years developing open source tools to reorient the idea of documentary around its documents. This is in opposition to a tendancy towards textual and machine-readable metadata, which unduly constrain our wonder, perception, and ability to navigate ambiguous and unknown material.
Data di messa in onda
Dic 28, 2013
Speakers: Nicolas Maigret, Brendan Howell
Creating mash-up movies by hidden activity and geography of Peer-to-Peer file sharing
"The Pirate Cinema" reveals Peer-to-Peer information
.. show full overview
Speakers: Nicolas Maigret, Brendan Howell
Creating mash-up movies by hidden activity and geography of Peer-to-Peer file sharing
"The Pirate Cinema" reveals Peer-to-Peer information flows. It is a composition generated by the activity on file sharing networks. "The Pirate Cinema" immerses the viewer in network flows.
30x55
Hardware Attacks, Advanced ARM Exploitation, and Android Hacking (#5193)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: Stephen A. Ridley
In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical
.. show full overview
Speaker: Stephen A. Ridley
In this talk (which in part was delivered at Infiltrate 2013 and NoSuchCon 2013) we will discuss our recent research that is being rolled into our Practical ARM Exploitation course (sold out at Blackhat this year and last) on Linux and Android (for embedded applications and mobile devices). We will also demonstrate these techniques and discuss how we were able to discover them using several ARM hardware development platforms that we custom built. Where relevant we will also discuss ARM exploitation as it related to Android as we wrote about in the "Android Hackers Handbook" which we co-authored and will be released in October 2013.
Data di messa in onda
Dic 28, 2013
Speaker: Karsten Becker
Making awesome stuff with FPGAs
In this talk I want to show you around in the mysterious world of
Field Programmable Gate Arrays, or short FPGAs. The aim
.. show full overview
Speaker: Karsten Becker
Making awesome stuff with FPGAs
In this talk I want to show you around in the mysterious world of
Field Programmable Gate Arrays, or short FPGAs. The aim is to enable you to get a rough understanding on what FPGAs are good at and how they can be used in areas where conventional CPUs and Microcontrollers are failing upon us. FPGAs open up the world of high-speed serial interconnects, nano-second event reactions and hardware fuzzing.
Data di messa in onda
Dic 28, 2013
Speaker: olia lialina
What can be done to protect the term, the notion and the existence of the Users?
With the disappearance of the computer, something else is silently becoming
.. show full overview
Speaker: olia lialina
What can be done to protect the term, the notion and the existence of the Users?
With the disappearance of the computer, something else is silently becoming invisible as well — the User. Users are disappearing as both phenomena and term, and this development is either unnoticed or accepted as progress — an evolutionary step. Though the Invisible User is more of an issue than an Invisible Computer.
Data di messa in onda
Dic 28, 2013
Speaker: Frantisek Algoldor Apfelbeck
call for participation in project and product development
This is a call for participation in a project aimed to build up an open source based
.. show full overview
Speaker: Frantisek Algoldor Apfelbeck
call for participation in project and product development
This is a call for participation in a project aimed to build up an open source based experimental incubator which can be used for variety of food, beverage and bio hacking projects allowing for easy control and monitoring of internal condition like temperature and humidity. Working groups will be established to develop prototypes which can be easily and relatively cheaply assembled. Securing funding and establishing a portal to effectively share the news and knowledge within the groups and wider community will be major part of the first phase.
Data di messa in onda
Dic 28, 2013
Speaker: Nadia Heninger, djb, Tanja Lange
This was a busy year for crypto.
TLS was broken. And then broken again.
Discrete logs were computed. And then computed again.
Is the
.. show full overview
Speaker: Nadia Heninger, djb, Tanja Lange
This was a busy year for crypto.
TLS was broken. And then broken again.
Discrete logs were computed. And then computed again.
Is the cryptopocalypse nigh?
Has the NSA backdoored everything in sight?
Also, answers to last year's exercises will be given.
Data di messa in onda
Dic 28, 2013
Speakers: Talke Blase, Asta Nechajute, Felix Höfner ,Mona Mucke
Wer ist eigentlich dieser "Verfassungsschutz", was tut er und brauchen wir ihn überhaupt? Laut Angaben des
.. show full overview
Speakers: Talke Blase, Asta Nechajute, Felix Höfner ,Mona Mucke
Wer ist eigentlich dieser "Verfassungsschutz", was tut er und brauchen wir ihn überhaupt? Laut Angaben des Verfassungsschutzes beantworten drei Viertel der deutschen Bundesbürger diese Frage mit "Ja.". Das nö-theater Köln stellt diesem jedoch ein klares "NÖ!" entgegen. Auf Basis intensiver Interviews, Beobachtungen und Recherchen entwickelten sie das politische Satirestück "V wie Verfassungsschutz". Es werden die Verstrickungen des deutschen Inlandsgeheimdienstes mit der NSU beleuchtet, die "fünf peinlichsten Fälle für den Verfassungsschutz" neben den Pannen mit prostitutionsähnlichen V-Mann-Praktiken inszeniert. Dazwischen tanzt fröhlich Leo Lupix, das Maskottchen des Verfassungsschutzes. Die Kölner Theatertruppe hebt für uns den Zeigefinger und sagt: V wie... Vertuschung, V wie... Verzweiflung - V wie... Versagen.
Data di messa in onda
Dic 28, 2013
Speaker: byterazor
This lecture gives an introduction to processor design.
It is mostly interesting for people new to processor design and does not cover high performance pipelined
.. show full overview
Speaker: byterazor
This lecture gives an introduction to processor design.
It is mostly interesting for people new to processor design and does not cover high performance pipelined structures.
Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described here.
Demo:
Create a backdoor in the VHDL Code of a processor core.
Exploit this backdoor to get a root shell in the linux operating system.
Data di messa in onda
Dic 28, 2013
Speaker: !Mediengruppe Bitnik
!Mediengruppe Bitnik about their recent works
!Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work,
.. show full overview
Speaker: !Mediengruppe Bitnik
!Mediengruppe Bitnik about their recent works
!Mediengruppe Bitnik are contemporary artists. In their talk they will show two examples of their work, illustrating the translation of hacking from the computer field into an artistic practice. Bitnik will show how to hack the opera in ten easy steps and what happens when you send a parcel with a hidden live webcam to Julian Assange at the Ecuadorian Embassy in London.
Using the strategies of hacking, !Mediengrupppe Bitnik intervenes into settings with the aim of opening them up to re-evaluation and new perspectives.
Data di messa in onda
Dic 28, 2013
Speaker: Peter Laackmann, Marcus Janke
Von der Historie zur Zukunft
Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in
.. show full overview
Speaker: Peter Laackmann, Marcus Janke
Von der Historie zur Zukunft
Eine unterhaltsame, spannende und lehrreiche Reise durch 25 Jahre Chipkarten-Angriffe mit tiefen Einblicken in Amateur- und Profi-Hackerlabore, inklusive eines Ausblicks in neueste Methoden und zukünftige Ansätze.
Data di messa in onda
Dic 28, 2013
Speakers: sergeybratus, Julian Bangert, bx
Ken Thompson's classic "Reflections on Trusting Trust" examined the impacts of planted build chain bugs, from an example of a compiler
.. show full overview
Speakers: sergeybratus, Julian Bangert, bx
Ken Thompson's classic "Reflections on Trusting Trust" examined the impacts of planted build chain bugs, from an example of a compiler Trojan to a hypothetical "well-placed microcode bug". Once theoretical & remote, such scenarios have lately been revealed as a stark reality.
Data di messa in onda
Dic 28, 2013
Speaker: Linus Neumann
So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim BND!
Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail
.. show full overview
Speaker: Linus Neumann
So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim BND!
Die technischen Probleme der De-Mail ließen sich juristisch lösen, und auch bei der E-Mail setzen deutsche Provider bald Sicherheitsstandards der Neunziger Jahre um. Auch für "die Cloud" hat das BSI einen feinen Standard parat – natürlich ohne Verschlüsselung. Wofür bräuchten wir die auch im Schlandnet?
Data di messa in onda
Dic 28, 2013
Speaker: atdotde
A farewell to a bold proposal?
Supersymmetry has been particle theorists' favorite toy for several decades. It predicts a yet unobserved symmetry of nature and
.. show full overview
Speaker: atdotde
A farewell to a bold proposal?
Supersymmetry has been particle theorists' favorite toy for several decades. It predicts a yet unobserved symmetry of nature and implies that to each known type of elementary particle there exists a partner particle none of which has been detected up to today.
I will explain why it is an attractive idea nevertheless and what is the current situation after the large hadron collider (LHC) at CERN has looked at many places where supersymmetric partners were expected and did not find them. Is it time to give up hope that susy is a property of nature?
Data di messa in onda
Dic 28, 2013
Speaker: nedos
The future of IC analysis
In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ
.. show full overview
Speaker: nedos
The future of IC analysis
In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocols. The weakest link of such a scheme is the chip itself. By attacking the chip directly an attacker can gain access to the secret data in its unencrypted form. In this presentation we demonstrate the attack class of the future, backside attacks. This class of attacks mitigate all device countermeasures and can access all signals of the device. As opposed to the attacks of today, these attacks can also be applied to complex systems such as the ARM SoCs of modern smartphones.
30x68
Art of the Exploit: An Introduction to Critical Engineering (#5440)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: Julian Oliver
In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and
.. show full overview
Speaker: Julian Oliver
In this lecture Julian will introduce projects and interventions made by himself and others that foreground Engineering, rather than Art, in the creative and critical frame, offering highly public insights into the hidden mechanisms and power struggles within our technical environment. Projects such as the Transparency Grenade, Packetbruecke and Newstweek will be covered in detail.
Data di messa in onda
Dic 28, 2013
Speaker: Karsten Becker
Let's create the Arduino for FPGAs
Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but
.. show full overview
Speaker: Karsten Becker
Let's create the Arduino for FPGAs
Learning to program an FPGA is time consuming. Not just do you need to download and install 20 GB of vendor tools, but you also need to wrap your brain around the strange ideas of hardware description languages like VHDL. PSHDL aims to ease the learning curve significantly and provide more people with the ability to program FPGAs.
30x70
The good, the bad, and the ugly - Linux Kernel patches (#5446)
Episode overview
Data di messa in onda
Dic 28, 2013
Speaker: wsa
Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better,
.. show full overview
Speaker: wsa
Companies are often blamed for not working upstream. Surprisingly, the situation is not per se better with community projects. To change the latter for the better, Wolfram will show some examples regarding the Linux Kernel and present ideas to create win-win-win situations.
Data di messa in onda
Dic 28, 2013
Speaker: mrv, bbuegler
Food replicating Robots from Open Source Technologies
Did you ever feel the need to be in charge of your environment? We did . A detailed story of our
.. show full overview
Speaker: mrv, bbuegler
Food replicating Robots from Open Source Technologies
Did you ever feel the need to be in charge of your environment? We did . A detailed story of our experience playing with 220VAC and water to build an automated, digitally controlled ecosystem. A place, where you can be the climate-change. Double the temperature, triple the floods, let it storm or rain. A Tamagotchi that generates food from electricity. All done with Arduino, raspberry Pi and Node.js.
Data di messa in onda
Dic 28, 2013
Speaker: Trevor Paglen
Although people around the world are becoming increasingly aware of the United States' global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.
Speaker: Trevor Paglen
Although people around the world are becoming increasingly aware of the United States' global geography of surveillance, covert action, and other secret programs, much of this landscape is invisible in our everyday lives.
Data di messa in onda
Dic 28, 2013
Speakers: Gleb Gritsai, Sergey Gordeychik
We already know
SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current
.. show full overview
Speakers: Gleb Gritsai, Sergey Gordeychik
We already know
SCADA StrangeLove team will present their research on ICS systems for the second time on CCC. Last year we showed current situation with security of industrial world and disclosed a big number of vulnerabilities found in Siemens ICS solutions. Part of vulnerabilities, we can say most notable one, wasn’t disclosed due to Responsible Disclosure. This time we already know. We will speak about several industrial protocols and their weaknesses. During this year we played with new industrial hardware and software – this patitially brings new “We don’t know yet” vulnerability details. Moreover, we’ll mention creepiest bugs undisclosed from last year, tell you about new ones and build attack vectors from them. At last, we will share our experience in pentesting ICS enviroments.
Data di messa in onda
Dic 28, 2013
Speaker: Nate Cardozo
Pragmatic Advice for Security Researchers
This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives.
.. show full overview
Speaker: Nate Cardozo
Pragmatic Advice for Security Researchers
This talk will focus on responsible disclosure best and worst practices from both legal and practical perspectives. I'll also focus on usable advice, both positive and negative, and answer any questions the audience has on best practices.
Data di messa in onda
Dic 28, 2013
Speaker: rysiek
How technology is used to subvert and circumvent anti-monopoly laws
We all know monopolies are bad. We even have laws against them that sometimes get enforced.
.. show full overview
Speaker: rysiek
How technology is used to subvert and circumvent anti-monopoly laws
We all know monopolies are bad. We even have laws against them that sometimes get enforced. However, today we have new kinds of monopolies that affect us without us even noticing them for what they truly are. And technology plays a central role.
Data di messa in onda
Dic 28, 2013
Speaker: artelse
On Freedom of Facial Expression
The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system
.. show full overview
Speaker: artelse
On Freedom of Facial Expression
The facial hacking research presented in this lecture/ performance exploits a well known vulnerability of the human nervous system that it can be easily accessed and controlled by electrodes mounted on the bodies exterior. External digital facial control allows for an unprecedented exploration of human facial expressiveness and has unveiled an unknown expressive potential of the human facial hardware.
Data di messa in onda
Dic 28, 2013
Speaker: Ilja van Sprundel
It's worse than it looks
For the past year, I've been looking at the implementation of X.org code. both client and server. During this presentation, I'll give an overview of the good, the bad and the ugly.
Speaker: Ilja van Sprundel
It's worse than it looks
For the past year, I've been looking at the implementation of X.org code. both client and server. During this presentation, I'll give an overview of the good, the bad and the ugly.
Data di messa in onda
Dic 29, 2013
Speakers: Constanze Kurz, frank, Linus Neumann
Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.
Speakers: Constanze Kurz, frank, Linus Neumann
Auch das Jahr 2013 geht irgendwann vorbei. Deshalb werfen wir einen Blick zurück auf die für uns besonders relevanten Themen und versuchen abzuschätzen, was im Jahr 2014 auf uns zukommen könnte.
Data di messa in onda
Dic 29, 2013
Speaker: Jöran Muuß-Merholz, Gestatten, it4n6
2013er Edition
Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit dem Googlequiz lässt sich das ausbauen.
.. show full overview
Speaker: Jöran Muuß-Merholz, Gestatten, it4n6
2013er Edition
Der durchschnittliche User nutzt nur fünf Prozent seines Googlevermögens. Mit dem Googlequiz lässt sich das ausbauen. Eine gewisse Konkurrenzsituation und Kaltgetränke können hilfreich sein.
Data di messa in onda
Dic 29, 2013
Speaker: Nadya Peek
rapid prototyping of digital fabrication and instrumentation machines
Making a new control system for a machine is often a slow and tedious task. Maybe you
.. show full overview
Speaker: Nadya Peek
rapid prototyping of digital fabrication and instrumentation machines
Making a new control system for a machine is often a slow and tedious task. Maybe you already have a 3 axis stage, and you already know how to move it around. But what if you want to add a camera and use it for position feedback? You'd have to redesign the whole hardware layer. I'll talk about some ways I've built modularity into control systems for machines so that you can quickly iterate on different kinds of machine systems without getting stuck in hardware land forever. This includes connecting synchronized nodes across a network and importing legacy nodes for things like, say, an old pressure box you found in the trash and has rs232 in. Down with gcode! Long live machine control.
Data di messa in onda
Dic 29, 2013
Speaker: Christoph Engemann
Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.
Speaker: Christoph Engemann
Talk introducing NSTIC and COM 238, i.e. the current digital identity policy proposals in the USA and European discussing their similarities, differences and possible conflicts.
Data di messa in onda
Dic 29, 2013
Speaker: Maria Xynou
India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India's surveillance industry, its UID
.. show full overview
Speaker: Maria Xynou
India is currently implementing some of the scariest surveillance schemes in the world. This lecture will shed light on India's surveillance industry, its UID scheme which aims at the collection of all biometric data and on various controversial surveillance schemes, such as the Central Monitoring System (CMS).
Data di messa in onda
Dic 29, 2013
Speaker: taziden
Building and running an ISP is not that difficult. It's hard to say how many people are connected to the Internet by such weird structures, but we know that they are
.. show full overview
Speaker: taziden
Building and running an ISP is not that difficult. It's hard to say how many people are connected to the Internet by such weird structures, but we know that they are more and more each day.
What is at stake is taking back the control of the Internet infrastructure and showing that a neutral Internet access is natural.
Data di messa in onda
Dic 29, 2013
Speakers: bughardy, Eagle1753
NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad
.. show full overview
Speakers: bughardy, Eagle1753
NFC technology is becoming more and more relevant in our lives. One of its major uses is in ticketing solutions. However, most of companies use bad implementations of NFC technology. By this talk we will explain a complete solution, analyzing security challenges and outlining the best practices and implementation choices.
Data di messa in onda
Dic 29, 2013
Speaker: Piotr Esden-Tempski
Autonomous flying vehicles, where are we and where are we going?
During the last 10 years the technology that was formerly only available to the
.. show full overview
Speaker: Piotr Esden-Tempski
Autonomous flying vehicles, where are we and where are we going?
During the last 10 years the technology that was formerly only available to the military, reached the hands of thousands. Researchers, hackers, enthusiasts and hobbyists helped drive the technology further and higher than anyone had imagined just a few years ago. We will recap what the civilian airborne robot community has achieved in the last decade and what the next frontiers are that need to be addressed.
Data di messa in onda
Dic 29, 2013
Speaker: Kate Krauss
In China Your ID Card Knows Everything
Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are
.. show full overview
Speaker: Kate Krauss
In China Your ID Card Knows Everything
Imagine getting pulled over for running a stop sign and learning for the first time – from the cop – that you are HIV-positive. People in China are required to carry electronic, swipeable ID cards that hold their political views, their HIV status, their mental health situation, and much more.
Data di messa in onda
Dic 29, 2013
Speaker: nickfarr
Speaker: nickfarr
Data di messa in onda
Dic 29, 2013
Speakers: Bram de Vries, Morris Winkler
experiences from the “i3 Berlin” 3D printer project with Blender and Github
Every successful open hardware project needs a solid
.. show full overview
Speakers: Bram de Vries, Morris Winkler
experiences from the “i3 Berlin” 3D printer project with Blender and Github
Every successful open hardware project needs a solid organization structure at some point in time, especially when plan to produce and sell your project. In our “i3 Berlin” 3d printer project, we took some elements of the PLM (Product Lifecycle Management) concept and implemented it with open source tools like Github and Blender.
Data di messa in onda
Dic 29, 2013
Speaker: Kenneth Newwood
Passwortgenerierung mit Arduino [Generating passwords with Arduino]
Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem
.. show full overview
Speaker: Kenneth Newwood
Passwortgenerierung mit Arduino [Generating passwords with Arduino]
Bei calc.pw handelt es sich um DIY Hardware, mit deren Hilfe man Passwörter aus einem Masterpasswort und einfach merkbaren Informationen (z. B. "ebay", "amazon", etc.) generieren kann. Im Vortrag soll es um die Probleme vorhandener Passwortverfahren (Passwortschemen, Passwortdatenbanken) gehen. Es soll die Theorie hinter der Passwortberechnung erläutert und eine praktische Implementierung dieser Berechnung vorgestellt werden.
30x89
The Exploration and Exploitation of an SD Memory Card (#5294)
Episode overview
Data di messa in onda
Dic 29, 2013
Speakers: bunnie, Xobs
All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of
.. show full overview
Speakers: bunnie, Xobs
All “managed FLASH” devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous storage out of FLASH silicon that is fundamentally unreliable and unpredictably fragmented. This controller is an attack surface of interest. First, the ability to modify the block allocation and erasure algorithms introduces the opportunity to perform various MITM attacks in a virtually undetectable fashion. Second, the controller itself is typically powerful, with performance around 50MIPS, yet with a cost of mere pennies, making it an interesting and possibly useful development target for other non-storage related purposes. Finally, understanding the inner workings of the controller enables opportunities for data recovery in cards that are thought to have been erased, or have been partially damaged.
This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.
Data di messa in onda
Dic 29, 2013
Speaker: Adrian Dabrowski
Hacking City-Wide Access Control Systems
In this lecture, we present a black-box analysis of an electronic contact-less system that has been
.. show full overview
Speaker: Adrian Dabrowski
Hacking City-Wide Access Control Systems
In this lecture, we present a black-box analysis of an electronic contact-less system that has been steadily
replacing a conventional mechanical key on multi-party
houses in a big European city. So far, there are est. 10.000 installations of the electronic system. The mechanical key has been introduced about 40 years ago to allow mail delivery services to access multi-party houses but has since then aggregated many additional users, such as garbage collection, police, fire brigade and other emergency services. Over 92% of residential buildings in this city are equipped with such a solution.
Data di messa in onda
Dic 29, 2013
Speaker: gratefulfrog
An Arduino Powered Electric Guitar
The ArduGuitar is an electric guitar with no physical controls, i.e. no buttons or knobs to adjust volume, tone or to
.. show full overview
Speaker: gratefulfrog
An Arduino Powered Electric Guitar
The ArduGuitar is an electric guitar with no physical controls, i.e. no buttons or knobs to adjust volume, tone or to select the pickups. All of these functions are performed remotely via a bluetooth device such as an Android phone, or via a dedicated Arduino powered blutetooth footpedal. The musician still plucks the strings, of course! This talk will give an overview of the technology and particularly the voyage that took me from nearly no knowledge about anything electronic to enough know-how to make it all work.I will explain what I learned by collaborating on forums, with Hackerspaces and with component providers: "How to ask the right questions." The guitar with its Arduino powered circuit and an Android tablet will be available for demo; the code is all available on the github arduguitar repo with the associated Arduino footpedal libraries.
Data di messa in onda
Dic 29, 2013
Speaker: Collin Mulliner
Dynamic Dalvik Instrumentation of Android Applications and the Android Framework
As application security becomes more important on Android we need better
.. show full overview
Speaker: Collin Mulliner
Dynamic Dalvik Instrumentation of Android Applications and the Android Framework
As application security becomes more important on Android we need better tools to analyze and understand them. Android applications are written in Java and a run in the Dalvik VM. Until now most analysis is done via disassembling and monitored execution in an emulator. This talk presents a new technique to instrument Android applications executed in the DVM. The talk will introduce the new technique in great detail including many small examples and a whole attack based on it. We will go step by step to show you what can be achieved using this technique.
Data di messa in onda
Dic 29, 2013
Speaker: Joscha
Artificial Intelligence Reloaded
A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial
.. show full overview
Speaker: Joscha
Artificial Intelligence Reloaded
A foray into the present, future and ideas of Artificial Intelligence. Are we going to build (beyond) human-level artificial intelligence one day? Very likely. When? Nobody knows, because the specs are not fully done yet. But let me give you some of those we already know, just to get you started.
Data di messa in onda
Dic 29, 2013
Speaker: Elizabeth Stark
The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.
Speaker: Elizabeth Stark
The movement against SOPA in the US was the largest protest in online history, and as one of the core organizers, we learned a lot of lessons on how to build a grassroots movement for internet freedom.
Data di messa in onda
Dic 29, 2013
Speakers: Dominic, Anne
The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it's not too absurd to try to
.. show full overview
Speakers: Dominic, Anne
The brain can be understood as a highly specialized information processing device. Because computers basically do the same thing, it's not too absurd to try to link these two together. The result is a brain-computer-interface.
This talk explains the core functionality of our brain and how to access the stored data from the outside. Software and hardware have already reached a somewhat hacker-friendly state, and we want to show you how we got there. We're also here to answer all your questions about the brain.
Data di messa in onda
Dic 29, 2013
Speaker: Friedrich Lindenberg
Spending a year coding in a newsroom
Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for
.. show full overview
Speaker: Friedrich Lindenberg
Spending a year coding in a newsroom
Knight-Mozilla OpenNews sends coders into news organisations on a ten-month fellowship to make new tools for reporting and measuring the news. We believe that to remain relevant, journalism has to smarten up about tech and data. As a global community, we develop tools to datamine public data, news apps to make information accessible, and visualisations to break down complex stories. In my talk, I want to present the lessons about tech that I've learned in a newsroom and the things that still need to be built.
30x97
Even More Tamagotchis Were Harmed in the Making of this Presentation (#5279)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: Natalie Silvanovich
You might remember Tamagotchi virtual pets from the 1990's. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts
.. show full overview
Speaker: Natalie Silvanovich
You might remember Tamagotchi virtual pets from the 1990's. These toys are still around and just as demanding as ever! At 29C3, I talked about my attempts to reverse engineer the latest Tamagotchis, and this presentation covers my progress since then. It includes methods for executing code on and dumping code from a Tamagotchi, an analysis of the Tamagotchi code dump and a demonstration of Tamagotchi development tools that make use of these capabilities.
Data di messa in onda
Dic 29, 2013
Speaker: Dmitry Khovratovich
Survey
The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the
.. show full overview
Speaker: Dmitry Khovratovich
Survey
The goal of white-box cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the context of Pay-TV and tamper-resistant software. I present an overview of the white-box cryptography concept along with the most common applications and proposed designs. I discuss the subtle difference between white-box cryptography, public-key cryptography, and obfuscation.
Data di messa in onda
Dic 29, 2013
Speaker: Leonhard Dobusch
Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen
.. show full overview
Speaker: Leonhard Dobusch
Wir leben in einem Zeitalter des Remix. Kreativität und Kultur bauten schon immer auf bereits Bestehendem auf. Internet und digitale Technologien ermöglichen aber die kreative Nutzung existierender Werke in völlig neuen Dimensionen: Nie zuvor war es so vielen möglich, Werke auf so unterschiedliche Arten zu verändern und so einfach anderen zugänglich zu machen. In dem Maße, in dem die kreative Kopie Teil des kommunikativen Alltags breiter Bevölkerungsschichten wird, ist ein Recht auf Remix eine grundlegende Voraussetzung für die Kunst- und Meinungsfreiheit einer Gesellschaft. Die Gegenwart ist jedoch geprägt von restriktivem Rechtemanagement und entgrenzter Rechtsdurchsetzung. Die Initiative "Recht auf Remix" möchte das ändern.
Data di messa in onda
Dic 29, 2013
Speaker: Patrick
Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala
For
.. show full overview
Speaker: Patrick
Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala
For over thirty years, human rights groups in Guatemala have carefully documented the killing and disappearance of many people in the early 1980s. There are tens of thousands of records in many databases, and over 80 million paper pages of police records available in the Archives of the National Police. Most of the prosecutions of the former military and police officials who committed the atrocities depends on eyewitnesses, specific documents, and forensic anthropologists' examination of exhumed bones. However, data analysis helps to see the big patterns in the violence.
Data di messa in onda
Dic 29, 2013
Speakers: m.eik, bruder
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene
Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung
.. show full overview
Speakers: m.eik, bruder
30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene
Auf dem 29C3 stellten wir euch die Cultural Commons Collecting Society (C3S) als Initiative zur Gründung einer GEMA-Alternative vor. Seit dem ist sehr viel passiert: Unter anderem ist mittlerweile eine Europäische Genossenschaft gegründet, die mit sechsstelligem Kapital aus einer Crowdfunding-Kampagne in das Jahr 2014 geht. Auf Seiten der GEMA sind angesichts der entstehenden Konkurrentin bereits erste Anzeichen für eine Kursänderung wahrnehmbar.
30x103
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware (#5380)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: Patrick Stewin
In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is
.. show full overview
Speaker: Patrick Stewin
In this work we present a stealthy malware that exploits dedicated hardware on the target system and remains persistant across boot cycles. The malware is capable of gathering valuable information such as passwords. Because the infected hardware can perform arbitrary main memory accesses, the malware can modify kernel data structures and escalate privileges of processes executed on the system.
The malware itself is a DMA malware implementation referred to as DAGGER. DAGGER exploits Intel’s Manageability Engine (ME), that executes firmware code such as Intel’s Active Management Technology (iAMT), as well as its OOB network channel. We have recently improved DAGGER’s capabilites to include support for 64-bit operating systems and a stealthy update mechanism to download new attack code.
Data di messa in onda
Dic 29, 2013
Speaker: acracia
Building a space for grassroots sustainable technology development near Barcelona
Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around
.. show full overview
Speaker: acracia
Building a space for grassroots sustainable technology development near Barcelona
Calafou – the Ecoindustrial Postcapitalist Colony – is a settlement of around three dozen people in the Catalonian countryside. Concrete pylons standing 20 meters high hold a highway passing above the wild forest valley, where hall after dilapidated hall of industrial ruins stretch along the banks of a contaminated stream nurturing a twisted yet lively ecosystem. Echoes of unseen, passing cars blend into the organic static of wildlife, punctuated by beats booming from the hacklab speakers.
30x105
Anonymity and Privacy in Public Space and on the Internet (#5500)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: aluburka
How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real
.. show full overview
Speaker: aluburka
How is it possible to participate in a social event anonymously? How can we hide from surveillance in public space? How can we communicate anonymously in real life?
How can we be private in public?
This talk will give an overview about existing hacks and techniques that allow to be private in public, and compare privacy technologies from the web to anonymity techniques that can be used in real life.
Data di messa in onda
Dic 29, 2013
Speaker: Annie Machon
Terror, whistleblowers, drugs, internet
Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a
.. show full overview
Speaker: Annie Machon
Terror, whistleblowers, drugs, internet
Based on her own experiences as an Intelligence Officer for MI5 (the UK domestic security service) and a whistleblower, Annie Machon will talk about the relationships between the wars on 'terror', drugs, whistleblowers, and the internet, and suggest some ideas about what we can do.
30x107
The Internet (Doesn't) Need Another Security Guide (#5538)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: evacide
Creating Internet Privacy and Security Resources That Don't Suck
As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give
.. show full overview
Speaker: evacide
Creating Internet Privacy and Security Resources That Don't Suck
As Internet privacy/security professionals and amateur enthusiasts, we are often asked to give advice about best practices in this field. Sometimes this takes the form of one-on-one advice to our friends, sometimes it's training a room full of people, and sometimes you may be asked to write a blog post or a brief guide or an entire curriculum. This talk will survey the current Internet privacy guide landscape and discuss the perils and pitfalls of creating this type of resource, using the Electronic Frontier Foundation's Surveillance Self Defense project as a case study.
Data di messa in onda
Dic 29, 2013
Speaker: delroth, shuffle2
A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very
.. show full overview
Speaker: delroth, shuffle2
A year ago in November 2012, Nintendo released their latest home video game console: the Wii U. While most video game consoles use controllers that are very basic, the Wii U took the opposite route with a very featureful gamepad: wireless with a fairly high range, touch screen, speakers, accelerometer, video camera, and even NFC are supported by the Wii U gamepad. However, as of today, this interesting piece of hardware can only be used in conjunction with a Wii U: wireless communications are encrypted and obfuscated, and there is no documentation about the protocols used for data exchange between the console and its controller. Around december 2012, I started working with two other hackers in order to reverse engineer, document and implement the Wii U gamepad communication protocols on a PC. This talk will present our findings and show the current state of our reverse engineering efforts.
Data di messa in onda
Dic 29, 2013
Speaker: gannimo
what is the winning move?
Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past
.. show full overview
Speaker: gannimo
what is the winning move?
Memory corruption has been around forever but is still one of the most exploited problems on current systems. This talk looks at the past 30 years of memory corruption and systematizes the different existing exploit and defense techniques in a streamlined way. We evaluate (i) how the different attacks evolved, (ii) how researchers came up with defense mechanisms as an answer to new threats, and (iii) what we will have to expect in the future.
Data di messa in onda
Dic 29, 2013
Speakers: Claudio Guarnieri, Morgan Marquis-Boire
The militarization of the Internet
2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as
.. show full overview
Speakers: Claudio Guarnieri, Morgan Marquis-Boire
The militarization of the Internet
2013 will be remembered as the year that the Internet lost its innocence for nearly everyone as light was shed on the widespread use of dragnet surveillance by the NSA and intelligence agencies globally. With the uprisings of the Arab Spring where people raided the offices of their regimes to bring evidence to light, we've seen a tremendous phenomenon: a large numbers of whistleblowers have taken action to inform the public about important details. The WikiLeaks SpyFiles series also shows us important details to corroborate these claims. There is ample evidence about the use and abuses of a multi-billion dollar industry that have now come to light. This evidence includes increasing use of targeted attacks to establish even more invasive control over corporate, government or other so-called legitimate targets.
Data di messa in onda
Dic 29, 2013
Speaker: Julia Aksënova
Eine Einführung in die Wirkungsweise psychedelischer Substanzen
Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches
.. show full overview
Speaker: Julia Aksënova
Eine Einführung in die Wirkungsweise psychedelischer Substanzen
Substanzen wie MDMA, Psilocybin, LSD und Ketamin besitzen erhebliches therapeutisches Potential, und die Erforschung ihrer Wirkmechanismen erlaubt Einblicke in die Funktionsweise der menschlichen Psyche. Der trotz Illegalität relativ einfachen Verfügbarkeit steht ein Mangel an Aufklärung über Risiken, Effekte und Pharmakologie gegenüber, dem mit dieser Einführung begegnet werden soll.
30x112
Backdoors, Government Hacking and The Next Crypto Wars (#5478)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: Christopher Soghoian
Backdoors, Government Hacking and The Next Crypto Wars
Law enforcement agencies claim they are "going dark". Encryption technologies have finally been
.. show full overview
Speaker: Christopher Soghoian
Backdoors, Government Hacking and The Next Crypto Wars
Law enforcement agencies claim they are "going dark". Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities?
30x113
Virtually Impossible: The Reality Of Virtualization Security (#5445)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: Gal Diskin
Errata FTW
This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an
.. show full overview
Speaker: Gal Diskin
Errata FTW
This talk will demonstrate why it is virtually impossible to secure virtual machines implementations properly. In the talk I will try to give an overview of the basics of hardware virtualization technology, the existing attack techniques against virtualization and also explain why it is such a complex problem to create a secure hypervisor. The talk will focus on the low level interfaces and how it affects all aspects of computer platform security. I will also try to review a few interesting Erratas at the end of the talk.
Data di messa in onda
Dic 29, 2013
Speaker: Pavol "stick" Rusnak
TREZOR is a hardware wallet for Bitcoin. We identified security of the end users' computer as one of the main problems that block Bitcoin mass adoption.
Speaker: Pavol "stick" Rusnak
TREZOR is a hardware wallet for Bitcoin. We identified security of the end users' computer as one of the main problems that block Bitcoin mass adoption.
Data di messa in onda
Dic 29, 2013
Speakers: Julian Assange, Jacob
a call to resistance
Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that
.. show full overview
Speakers: Julian Assange, Jacob
a call to resistance
Finally, the world is aware of the threat of mass surveillance and control, but we still have a fight on our hands, and that fight is both technical and political. Global democracy is not going to protect itself. There has never been a higher demand for a politically-engaged hackerdom. Jacob Appelbaum and Julian Assange discuss what needs to be done if we are going to win.
30x116
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit (#5502)
Episode overview
Data di messa in onda
Dic 29, 2013
Speaker: qbi
Ein Streifzug durch die Fehler in der Kryptografie
»Lange Schlüssel sind sicherer als kurze.«
»RSA und/oder AES sind einfach zu implementieren.«
»Für Zufallszahlen
.. show full overview
Speaker: qbi
Ein Streifzug durch die Fehler in der Kryptografie
»Lange Schlüssel sind sicherer als kurze.«
»RSA und/oder AES sind einfach zu implementieren.«
»Für Zufallszahlen reicht es, java.util.Random zu nehmen.«
Solche oder ähnliche Aussagen hört man immer mal wieder. Doch was ist da dran? Welche Fehler werden bei der Benutzung und Implementierung von Kryptografie gern gemacht?
Data di messa in onda
Dic 29, 2013
Speaker: Norbert Schepers
Kriegsführung der Zukunft?
Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der
.. show full overview
Speaker: Norbert Schepers
Kriegsführung der Zukunft?
Die Drohnenkriege sind Ausdruck einer rasanten Entwicklung: vom „Krieg gegen den Terror“ nach 9/11 zur Kriegsführung der Zukunft. Einer Zukunft, die gelegentlich der Science Fiction der späten Achtziger zu entstammen scheint, in der Roboter die schmutzigen Kriege der Menschen kämpfen und sich schließlich gegen ihre Schöpfer erheben. Letzteres liegt noch längst nicht im Bereich des Möglichen, aber Wege zur Erschaffung autonomer Kampfroboter werden bereits beschritten. Der Vortrag will das Phänomen des Drohnenkrieges politisch einordnen und einen Ausblick versuchen.
Data di messa in onda
Dic 29, 2013
Speaker: RFguy
Spaß mit mechanischer Anzeige
Inbetriebnahme alter Flip-Dot-Anzeigemodule eines
Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse
Engineering des
.. show full overview
Speaker: RFguy
Spaß mit mechanischer Anzeige
Inbetriebnahme alter Flip-Dot-Anzeigemodule eines
Autobahn-Parkleitsystems zu einer interaktiven Anzeige. Reverse
Engineering des Protokolls und Entwicklung einer Steuerplatine auf
Basis des Raspberry Pi.
Data di messa in onda
Dic 29, 2013
Speaker: FX
Lawful Interception
Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs.
.. show full overview
Speaker: FX
Lawful Interception
Lawful Interception is a monitoring access for law enforcement agencies, but also one of the primary data sources of many surveillance programs. (Almost?) every Internet service provider needs to provide LI functionality in its routers. However, LI exposes a larger attack surface to the one being surveilled than any router should. Could this be a mistake?
Data di messa in onda
Dic 29, 2013
Speakers: frank, Fefe
Der schonungslose Realitätsabgleich mit Birzarrometer-Rekalibrierung
Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die
.. show full overview
Speakers: frank, Fefe
Der schonungslose Realitätsabgleich mit Birzarrometer-Rekalibrierung
Im Format einer lockeren Abendshow werden wir die Highlights des Jahres präsentieren, die Meldungen zwischen den Meldungen, die subtilen Sensationen hinter den Schlagzeilen. Kommen Sie, hören Sie, sehen Sie! Lassen Sie sich mitreißen!
Data di messa in onda
Dic 29, 2013
Speaker: Klaus Maeck
DECODER is a legendary German film from 1984, based on the themes of William S. Burroughs. Burroughs himself acts in a key scene in the film, along with F.M. Einheit, Christiane F., Genesis P. Orridge a.o.
Speaker: Klaus Maeck
DECODER is a legendary German film from 1984, based on the themes of William S. Burroughs. Burroughs himself acts in a key scene in the film, along with F.M. Einheit, Christiane F., Genesis P. Orridge a.o.
Data di messa in onda
Dic 30, 2013
Speaker: Ztohoven
A parliamentary drama of 223 actors
Moralni_reforma1-462x349
The Czech art collective Ztohoven' project “Moral Reform” was accomplished in collaboration with web
.. show full overview
Speaker: Ztohoven
A parliamentary drama of 223 actors
Moralni_reforma1-462x349
The Czech art collective Ztohoven' project “Moral Reform” was accomplished in collaboration with web security experts. Together they created the unique art concept of a mobile phone mass-hack.
Data di messa in onda
Dic 30, 2013
Speaker: Jacob
The militarization of the Internet
Speaker: Jacob
The militarization of the Internet
30x124
Beyond the Tech: Building Internet Freedom Tools for Real People (#5550)
Episode overview
Data di messa in onda
Dic 30, 2013
Speaker: Michael Brennan
Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and
.. show full overview
Speaker: Michael Brennan
Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and surveillance. But how do we do it? This talk will outline a framework for a user-focused approach to the Development and Impact of Internet Freedom Tools through using ethnography, human-centered design, and the practice of research-based product definition. This talk is intended for developers, researchers, and journalists who seek to understand how better tools can be developed to protect anonymity and provide unfettered access to the Internet.
Data di messa in onda
Dic 30, 2013
Speaker: Sophie Hiltner
How to decipher the messages of your body
The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware
.. show full overview
Speaker: Sophie Hiltner
How to decipher the messages of your body
The average movement habits of a clichè hacker are legendary. Cowering for days in front of unergonomic hardware setups, stoic ignorance of hardly decodeable signs of the body like hunger, eye- and backpains. Probably due to a general disinterest in non-digitally engineered systems.
Shouldn’t a true hacker know at least bits and pieces about the codes and signs of the body? We all know bits and pieces.. but are they the correct and helpful ones? We will discuss some technical and biological details of slipped discs, posture disservice and pain. I will show fundamental “red flags” which have to be serviced by a medical geek. But not all medical geeks have a good idea about the body's code, therefore I will also suggest some helpful therapies for the most common cases.
Bottom line: how to code your body to prevent pain without relying on smattering.
Data di messa in onda
Dic 30, 2013
Speakers: Eric Michaud, Ryan Lackey
Physically Unclonable Functions for Hardware Tamper Detection
Increasingly, users and their computing hardware are exposed a range of software
.. show full overview
Speakers: Eric Michaud, Ryan Lackey
Physically Unclonable Functions for Hardware Tamper Detection
Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ranging from disk imaging to hardware keylogger installation and beyond. Existing methods are inadequate to fully protect users, particularly from covert physical hardware modifications in the "evil maid" scenario, and yet are very inconvenient. Victims include governments and corporations traveling internationally (e.g. China), anti-government activists in places like Syria, and anyone who is a target of a motivated attacker who can gain physical access.
Physically Unclonable Functions, combined with a trusted mobile device and a network service, can be used to mitigate these risks. We present a novel open-source mobile client and network service which can protect arbitrary hardware from many forms of covert modification and attack, and which when integrated with software, firmware, and policy defenses, can provide greater protection to users and limit potential attack surface. We'll also be showing video of an unreleased tool to the public utilized by surveillance teams.
30x127
Warum die Digitale Revolution des Lernens gescheitert ist. (#5467)
Episode overview
Data di messa in onda
Dic 30, 2013
Speaker: Jöran Muuß-Merholz
Fünf Desillusionen
Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.
Speaker: Jöran Muuß-Merholz
Fünf Desillusionen
Der digitale Wandel hat uns grandiose Chancen für selbstbestimmtes, kreatives, kollaboratives, kritisches und demokratisches Lernen gebracht. Wir haben sie nicht genutzt.
Data di messa in onda
Dic 30, 2013
Speaker: nickfarr
Speaker: nickfarr
Data di messa in onda
Dic 30, 2013
Speaker: groente
Contemplations on the essence of hacking and its implications on hacker ethics
Modern society's use of technology as an instrument for domination is deeply
.. show full overview
Speaker: groente
Contemplations on the essence of hacking and its implications on hacker ethics
Modern society's use of technology as an instrument for domination is deeply problematic. Are instrumentality and domination inherent to the essence of technology? Can hacking provide an alternative approach to technology which can overcome this? How do art and beauty fit into this approach?
Data di messa in onda
Dic 30, 2013
Speaker: Seb
"A New Hope" or "The Empire Strikes Back"?
This talk aims to shed some light on recent human rights violations in the context of the use of digital information and
.. show full overview
Speaker: Seb
"A New Hope" or "The Empire Strikes Back"?
This talk aims to shed some light on recent human rights violations in the context of the use of digital information and communications technology, particularly considering the latest disclosures about the surveillance programmes of Western intelligence services. At the same time, it shall provide information about Amnesty International's positions and activities in this field and invite anybody interested in our work to get involved.
Data di messa in onda
Dic 30, 2013
Speaker: Kurt Opsahl
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and
.. show full overview
Speaker: Kurt Opsahl
Everything we know about NSA spying
From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets in a faraday cage. The Electronic Frontier Foundation's Kurt Opsahl explains the known facts about how the programs operate and the laws and regulations the U.S. government asserts allows the NSA to spy on you.
30x132
THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE (#5421)
Episode overview
Data di messa in onda
Dic 30, 2013
Speaker: Kaustubh Srikanth
23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the "The Information Technology (Amendment) Act"
.. show full overview
Speaker: Kaustubh Srikanth
23rd of December 2008 was a sad day in India for civil liberties. On this day, The Indian Parliament passed the "The Information Technology (Amendment) Act" with no debate in the House, which effectively means is that the government of India now has the power to monitor all digital communications in the country without a court order or a warrant. The "world's largest democracy" strongly leaning towards becoming a surveillance state raises many questions and poses severe challenges for free speech and economic justice in India and globally. This talk will map and review the current political, socio-cultural and legal landscape of mass-surveillance, data protection and censorship in India and analyse how it ties in to the global landscape of surveillance and censorship. It will also aim to create a discussion space to investigate the deeper effects of these so called "welfare" projects and how citizen-led movements can drive the state towards stronger data protection and privacy laws.
Data di messa in onda
Dic 30, 2013
Speakers: kay, Peter Stuge, florolf, Sebastian, *m, Andi
Presentation of MOC/NOC/VOC/SOC/*OC
Speakers: kay, Peter Stuge, florolf, Sebastian, *m, Andi
Presentation of MOC/NOC/VOC/SOC/*OC
30x134
Amtliche Datenschützer: Kontrolleure oder Papiertiger? (#5623)
Episode overview
Data di messa in onda
Dic 30, 2013
Speaker: Peter Schaar
In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr
.. show full overview
Speaker: Peter Schaar
In dem Vortrag beschäftigt sich der Ex-Bundesdatenschützer mit der Rolle der Datenschutzbeauftragten: Welche Durchsetzungsmöglichkeiten haben sie? Wie ist ihr Verhältnis zur Zivilgesellschaft? Welchen Einfluss können sie auf europäischer und internationaler Ebene ausüben?
Data di messa in onda
Dic 30, 2013
Speaker: andy
getting out of surveillance state mode
After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of
.. show full overview
Speaker: andy
getting out of surveillance state mode
After studying the various levels of activities that come together in BuggedPlanet and realizing the scope and level of implementation of NSA´s SIGINT theatre, it´s propably time to step back, summarize the big picture and ask how we handle it properly.
Data di messa in onda
Dic 30, 2013
Speaker: sathya, Malli
HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless
.. show full overview
Speaker: sathya, Malli
HomeMatic is a good working, inexpensive and quickly spreading home automation system supporting wired as well as (partly AES handshake protected) wireless communication. The first part of our talk deals with security issues of HomeMatic devices and their wireless communication protocol called BidCoS (Bidirectional Communication Standard). In the second part we introduce Homegear, our own interface software to control HomeMatic devices.
In the past few years wireless home automation systems have become increasingly available as a good alternative to wired systems. Since wireless devices are installable without ripping open walls, it is now possible to easily integrate them into an existing building infrastructure. We chose to work with HomeMatic, because we think that through its affordable prices, its good quality and its fast growing portfolio it will become the most widely spread wireless home automation system in Germany.
In this live hacking presentation we will introduce different mechanisms to attack a HomeMatic system. We will show how to sniff BidCoS packets, how to send arbitrary packets in order to emulate a device (e. g. a HomeMatic central) and to control devices.
Some devices use an AES handshake to verify the sender of a command. But not all devices support the handshake and for many devices it is disabled by default. We will demonstrate several attacks making use of this security issue.
After the live hacking part we will give a short introduction into Homegear. Homegear is an interface software, which directly communicates with BidCoS devices and is controllable through XML RPC (XML Remote Procedure Call). It is possible to fully control most HomeMatic devices. We developed it to add features which are not integrated into the official system like controlling valve drives directly to implement custom room temperature control algorithms.
Data di messa in onda
Dic 30, 2013
Speaker: Sebastian Jekutsch
Auf dem Weg zu fairer Elektronik am Beispiel der Elkos
Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem
.. show full overview
Speaker: Sebastian Jekutsch
Auf dem Weg zu fairer Elektronik am Beispiel der Elkos
Die alarmierenden Zustände beim Abbau der Rohstoffe, die in den Bauteilen (z. B. dem Tantal-Elektrolytkondensator) eines Computers stecken, rufen Menschenrechtler auf den Plan. In den U.S.A. ist es 2010 gelungen, ein umstrittenes Gesetz umzusetzen, das die Finanzierung von Kriegsparteien durch Erzhandel regulieren soll. In der EU soll nun ähnliches geschehen. Der Vortrag klärt über die Geschichte auf, nennt Konsequenzen und formuliert Forderungen.
Data di messa in onda
Dic 30, 2013
Speakers: frank, Ron
Damit Sie auch morgen schlecht von Ihrem Computer träumen.
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
Speakers: frank, Ron
Damit Sie auch morgen schlecht von Ihrem Computer träumen.
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
Data di messa in onda
Dic 30, 2013
Speaker: ths
Speaker: ths
Se ci sono degli episodi e dei banner mancanti (e esistono su TheTVDB) puoi richiedere un aggiornamento automatico dell'intera serie:
Richiedi aggiornamento della serie
Aggiornamento richiesto