From 27C3 public wiki
News and Updates
TALKS FROM PEACE MISSIONS PLEASE SUBMIT:
- Slides you plan to present OR a video of your talk
- Be prepared for a late night testing session to take place on Day 2 or 3.
- Use the term "Behind Enemy Lines" in the subject of your submission e-mail.
There are no tickets available for lightning talk presenters. Day tickets will be available each day lightning talks are happening.
Please do not submit your presentation without slides or a background graphic. All presentations will be hosted from one laptop so time is not lost dealing with inevitable projector and display issues. In order to be fair to all presenters and cut down on the number of unprepared speakers, a lightning talk will not be scheduled unless the submission includes attached slides, a background graphic or a plan for a substitute graphical element (like the use of lasers).
Discussion: Lightning Talks Discussion
Description: Lightning Talks are 4-minute talks by *you*.
Other: Everyone can register for this until the list is full.
Content: Your talk can be about a program, a system, a technique, some hardware - or about a cool project, or some strange idea. You may also give us an idea about your real talk, announce your workshop or tell us about your booth. Or you could simply ask people to join you for some DOS attack of the next food store, announcing a key signing party, or maybe a *real* party. Whatever it is... be brief. Four minutes is all you get!
DO NOT ADD YOURSELF TO THE SCHEDULE.
All changes to the schedule not made by a coordinator will be reversed.
Note: We will accept registrations until each session is full. If the sessions fill up, we'll start scheduling backup speakers.
Please submit your proposal and slides/background graphic in an e-mail to: firstname.lastname@example.org
Please do *not* register by adding any entries to the pentabarf system or by changing the wiki page. Thanks!
We need the following information from you:
- Language: DE (Deutsch,German)/EN (English)/Other
- Title: What is your presentation called? (12 Words or Less)
- Slides: Please submit slides or a background graphic with your contact information in PDF or PNG format
- Keywords: (Optional, but helpful.)
- Abstract: What are you talking about or presenting? (300 Words or Less)
- Links/Other: Anything else you would like people to see
# Language: English # Title: How to Present a Lightning Talk # Keywords: Lightning Talks, Presentation, Speaking, 27c3 # Slides: How To Give a Lightning Talk # Abstract: This talk will cover the very basics of giving a lightning talk # Links/Other: http://events.ccc.de/congress/2010/Fahrplan/events/4296.en.html
Questions?: Send an email to email@example.com or find Nick Farr at the congress.
Day 2: Saal 3
|Day 2 in Saal 3|
|12:45||Your Lightning Talk!||A quick introduction to Lightning Talks||Lightning Talks, 27c3||It could be you!|
|12:50||Project DaPriM (Data Privacy Management) der FH Münster. (In German)||DaPriM Abstract||Datenschutz, Irreversibler Datenverschluss, TPM, FH-Münster||Ulrich Greveler, Benjamin Justus, Dennis Löhr|
|13:00||Project Starfish||The goal of Project Starfish is to enable the creation of a world-wide user-controlled network based on a distributed architecture. This is to be achieved through developing the necessary software and hardware which allows users to form such networks in an ad-hoc fashion independent of any centralised control. Its conceived advantages will be the strengthening of net neutrality while diminishing the digital divide, improving local communications and resilience, increased network capacity and renewed personal responsibility.||distributed networks, starfish, net neutrality||Raffael Kéménczy|
|13:05||Telecomix DNS||Telecomix DNS is a decentralized DNS server network, to complement the single DNS root (ICANN). This presentation will cover the basic layout of the network, as well as what it's good for. Is it live already?||DNS, telecomix, decentralization||jwalck|
|13:10||Leaving the Closed Cloud: Debian's FreedomBox||FreedomBox: A cheap and simple computer that serves freedom in the home. We are building a Debian based platform for distributed applications. The FreedomBox is about: privacy, control, ease of use, dehierarchicalization, decentralisation.||Freedom, Privacy, Embedded, OpenSource, Decentralized, P2P, User-Control||Arthur Lutz|
|13:15||Arduinos For Total Newbies Workshop||Arduinos are easy enough for non-geek artists, yet powerful enough for uber-geeks. Learn all you need to get going with an Arduino. (This LT is promoting a workshop being given 14:00h to 17:00h on Day 2 and 3)||education, arduino, tv-b-gone, electronics, hardware, hacking, making||Mitch Altman|
|13:20||SAP vs. Sanity||Anecdotal evidence why SAP consultants and clients seriously need help||SAP, usability, security||matthias (at gmail.com: zrjbzz)|
|13:25||SMS Port Scanner||Overview of SMS (short Messaging Service) interface to a port scanner than I plan to provide to users of the Congress GSM network.||sms, gsm||greenhac|
|13:30||TSA Screenings & Your Rights||Recent privacy & medical issues w/ TSA screenings, security theater psychology, & what everyone can do about 'em||TSA, Unreasonable Search, Security Theater||Sai|
|13:35||An Introduction to The Hacking Game NetS-X||NetS-X is a project centered around E-Learning on Network Security. NetS-X needs a community, participants who are willing to learn and help. YouTube Trailer||community, hacking, education, network security||Alexander Ott|
|13:40||The Revolution Will Be Live||Demo of wikileaks cablegate blog sync code and yet another end to censorship.||wikileaks, cablegate, python||Jesse B Semple|
Day 3: Saal 3
|Day 3 in Saal 3|
|11:30||Freerainbowtables||State of the project, how to participate, live from shackspace||Rainowtables, BOINC, Developers||Stefan|
|11:35||How to Present||44 sides on giving really effective presentations||Public Speaking, Lightning Talks||Steve Clement|
|11:40||Flockscrape||Open Data the hard way: a distributed method for retrieving sites that don't want to be scraped.||scraping, open data, datentagebau||Friedrich Lindenberg|
|11:45||The Space Federation||Three tools for Space Facilitators and Creators||Hackerspaces, Co-Working Space, Makerspace||Willow Bloo|
|11:50||Domain Cached Credentials||This lightning talk is about the MSCASH2 patch for recovering DCC hashes of modern Windows operating systems.||Domain Cached Credentials, password recovery, John the Ripper, MSCASH2 patch||Matthias|
|11:55||Kombucha Workshop||What is and how do you participate in the Food Hacking movement?||Food Hacking, Workshop, Slow Food, Fermentations||Frantisek|
|12:00||Automated testing of Operating Systems ||This talk is about how to test whole operating systems in a cool way.||QA, automation, KVM||Bernhard M. Wiedemann|
|12:05||What I learned from 091Labs the new hackerspace in Galway||I will talk about the experience of starting a hackspace from scratch and some of the great things that I learned.||Hackesrpaces, community||Adrian Mont|
|12:10||Libre Projects - for users and developers||A directory of non-discriminating community projects that are free, gratis, platform-independent and usable (ideally also anonymous and secure).||free software, free culture, meta||Jan-Christoph Borchardt|
|12:15||Chaos Codegolf Challenge||Squeeze your logic into the smallest pieces possible!||code, golf, short, ruby, python, perl, fun, fun, fun||Jan Lelis|
|12:20||Skype's Bag of Legal Tricks||Have you ever wondered where all the Skype "cracking" projects go? Is it really impossible to understand how Skype and its protocol works? Obfuscation is only a part of their protection. Without their legal team all the workings of Skype would already be public long ago. This presentation is about how to publish your results and what to expect when you do. It is not about reverse-engineering.||skype, legal, freedom, rights, reverse-engineering||Kirils Solovjovs|
|12:25||Wikileaks, Human Rights and the Uncovering of Government Data||As the worldwide debate continues about the release of U.S government information by Wikileaks, history has shown that the uncovering of government data can be an important factor in human rights investigations. In 2010, the Human Rights Data Analysis Group (HRDAG) examined once hidden government documents from Guatemala and Chad that provided key evidence needed to hold former national leaders and security forces accountable for human rights violations.||Lightning Talks, Presentation, Speaking, 27c3, Wikileaks, Human Rights||Annie Harrison|
|12:30||CryptoMiniSat||The talk will present the award-winning SAT solver CryptoMiniSat and its advantages over other SAT solvers||SAT Solving, Cryptography,||Mate Soos|
|12:35||Creeper - simple surveillance of big brother||Creeper is a Swedish service that tracks government use of the web. This talk will give you an overview of how it works, and what you can do.||Creeper, HTTP, surveillance, web||Patrik Wallstrom|
|12:45||OpenGov on the city level - A call for action||Some slides that will tell you why and how you should claim OpenGov/OpenData in your city.||OpenGov, OpenData, Transparency, Participation||Konrad Förstner|
|12:50||CUV Library - Combining Fast Number Crunching and Fast Prototyping||CUV is a C++ library that provides Python wrappers for CUDA. It can be used to process huge amounts of data very easily and fast.||GPU, CUDA, Python, Number Crunching, Machine Learning||Andreas Müller|
|13:00||eLib Science & Fiction Wettbewerb||Call 4 papers für die eLib Science & Fiction Textdays. Unter den Teilnehmern wird Gaming-Hardware verlost.||Science Fiction, Technology, Call for Papers, Competition||gego|
|13:05||Snow Wild||Snow_0_Wild is a literary project dedicated to imagine a future of love encounters through non verbal channels such as traceroutes, brute force and any hacking tool as far as it’s consensual. It aims to question reverse engineering, social engineering and how we can fight for better privacy through education and knowledge.||Arts, Traceroutes, Hacking Dreams, Privacy Control, Virtual Sex||Shadow|
|13:10||shackspace - The Stuttgart Hackerspace||I'll quickly present the rapidly growing Stuttgart hackerspace 'shackspace' and talk about the uncertain future awaiting us.||shackspace, hackerspace, stuttgart, help||Hadez|
|13:15||Seeks : a distributed collaborative search software||Seeks is a free and open P2P design and application for enabling social websearch. Its specific purpose is to regroup users whose queries are similar so they can share both the query results and their experience on these results. On this basis, Seeks allows for true real-time, decentralized, websearch to emerge.||search, dht, collaborative, free software, p2p||Loic Dachary|
|13:25||Coupwn, p2p sharing of services||You can purchase daily train tickets via sms. What happens if an electronic p2p co'op shares them?||mobile, p2p, train tickets||Benjamin Weber & Nathan Fain|
|13:30||Lifesaving Crypto with Pehpho - Watch the watchmen without being watched by the watchmen||We present a first implementation of a cryptographically secured photo application for Symbian and Linux based mobile phones. Shot pictures are immediately encrypted on the device. Besides of a public key based scheme which avoids decryption of stolen or confiscated devices, our GPL application is also supplying some basis support for upload of pictures and a secret key splitting features.||photography, cryptography, avoiding repression||Ruediger Weis, Robert Wuttke |
|13:35||DanKam: Augmented Reality for Color Blindness||Is it possible to use a smartphone to correct for colorblindness? Yes! In this quick talk, I'll discuss an interesting diversion into vision science.||Color Blind, Augmented Reality, Not Security, Not DNS||Dan Kaminsky|
|13:40||A GPU Exploit||Instead of using a GPU for computation, why not use it to attack the host operating system?||CUDA, GPU, Local Privilege Escalation, 0day||Travis Goodspeed|
Day 4: Saal 3
|Day 4 in Saal 3|
|1||Freerainbowtables||State of the project, how to participate, live from shackspace||Rainowtables, BOINC, Developers||Stefan|
|2||f2fify - keep the music free||building a decentralized on-demand music service||music, python, json, free software||adisbladis|
|3||Problems of the Criminalisation of Aviation Accidents||Criminal proceedings in the wake of accidents may hinder the main goal of the accident investigation in this way: To find out the causes for the accident, testimonies of involved persons are very important. The goal of these investigations is to prevent reoccurrences. If involved people have to fear a criminal investigation for negligence, they may choose to remain silent.||(None Supplied)||Bernd Sieker|
|4||DNSSEC myths - a response to Daniel Bernstein||Daniel Bernstein had a talk about high-speed high-security cryptography. But it was more a talk against DNSSEC rather then focusing on his own solution. This talk will respond to the arguments that Daniel had against DNSSEC.||DNSSEC, myths||Rickard Bellgrim|
|5||MoinMoin Wiki 2.0 - redesigning moin as it should be||moin2 - what's new/different, what we use, coders wanted.||MoinMoin, Wiki, Python, Web, WSGI, python libraries||Thomas Waldmann|
|6||FAT lighting talk FUCK GOOGLE||Brief presentation of fat lab, a crew of hackers, street artist, lawyers, makers and activists interested in the intersection of open source and pop culture. in feb 2010 we construct a fake google car, tweet that we put a gps on it.. and troll it over Berlin. This is what happened.||(None Supplied)||Geraldine|
|7||Announcing CIPHER 7 - a Call for Participation||We are announcing CIPHER 7, a classical capture-the-flag contest, which is supposed to take place in Juli 2011. CIPHER 6 had to be called off due to missing contributions :-( The Lightning Talk is our Call for Participation: We are looking for people who commit to write vulnerable services (in a language of their choice), review and rate advisories for their services and help with setup and operations during the contest.||Cipher 7, Capture-the-Flag Contest, Vulnerable Services||lexi|
|8||Privacy/Transparency and the Social Web||Wikileaks tought us that the government is intent on defining its right to confidentiality, but this does not seem to be a right that they deem worth protecting for their citizens. What goes?||social web, wikileaks, privacy, transparency||Henry Story|
|9||OpenSCAD Demo||Solid 3D CAD modeling for programmers. Intro to OpenSCAD by live coding||metalab, openscad, 3d printing, reprap, makerbot, lazzzor, lasercutting||Marius Kintel|
|10||Open Source laser cutter driver VIDEO||Love laser cutters? Hate having to deal with Windows and CorelDraw? Let us fix you up.||metalab, lazzzor, lasercutting||Amir Hassan|
|11||Flying Salamis? VIDEO||Salami Rocket is about building a hybrid fuel rocket with a gaseous oxydizer (N20) and salami as propellants.||Salami Rocket, Hybrid Rocket, metalab||Prof. KallaBalla|
|12:30||OpenLase: Open Realtime Laser Graphics||OpenLase is an open framework for realtime laser visualization and 2D/3D rendering. You can build your own DIY projector to use with it. Example projects: realtime MIDI or music visualization, laser vector videogames, laser video, etc.||laser, openlase, realtime, electronics, art||Hector Martin "marcan"|
|12:45||Console Hacking 2010: PS3 Demo||Demo of the attack presented on Day 3||Console Hacking, PS3, Linux, Demo||Hector Martin|
|16||BOFH meets SystemTap||SystemTap as a rootkit framework for the lazy. This is about subverting an enterprise tracing debugging tool to annoy and spy on users with very little effort.||linux, rootkit, kernel, privacy||Adrien "Krunch" Kunysz|
|17||ATTENTION: Apache ALOIS knows what you did last summer!||Apache ALOIS is a log collection and correlation software with reporting and alarming functionalities. ALOIS stands for "Advanced Log Data Insight System" and is meant to be a fully implemented open source SIEM security information and event management system. Since October 2010, ALOIS is an incubation project of the Apache Foundation. Unless other tools in this domain, Apache ALOIS should become a true community project, with no dependency to a company.||Apache ALOIS, SIEM, logging, data retention||Marcus Holthaus|
|18||TV-B-Gone for the N900||TV-B-Gone is a neat remote control to cover a wide range of tv switch off codes. This talk will present an implementation of this idea for the N900 (which incorporates a IR transmitter) and will show some of the difficulties encountered.||TV-B-Gone, N900, IR||Simon Budig|
|20||Malware monitoring / visiting ZeuS almighty||Few words about our work at CERT Polska on malware analysis||zeus,spyware, monitoring, malware||Tomasz Bukowski|
|21||eLib Science & Fiction Wettbewerb||Call 4 papers für die eLib Science & Fiction Textdays. Unter den Teilnehmern wird Gaming-Hardware verlost.||Science Fiction, Technology, Call for Papers, Competition||gego|
|22||Hacking Governments. HOWTO Win The #Infowar||A practical approach from the Political Science to the concept of Hacking Governments: what an # infowar is, lessons learnt from the past and guidelines for the future, i.e.: HOWTO Win an #infowar. This is a proof of concept to propose a talk about this on 28c3: your feedback is welcome!||political science, hacking, government, 27c3, 28c3||Suso Baleato|
|13:40||dragonCopter - FOSS Quadrocopter Design||Fresh hardware and software design for quadrotors||quadrocopter, flying objects, uav||Helge|
How it Works
- Submit your talk in advance. You must submit your slides or background graphic in advance to guarantee a spot on the schedule.
- Exceptions will be made only for top secret demos and specialized hardware which MUST have a VGA out ready to go. You must bring your own VGA adapter. There will be a hard cut after 4 minutes.
- Practice your talk with friends.
- Be present in the room 5 minutes before the session starts
- Introduce yourself to the moderator and sit in the front row
- When called, get on stage
- Adjust the microphone.
- Introduce yourself
- Check your slides or background graphic
- Say who you are
- Mention the title again.
- If you are using slides, say "next slide" when you want to advance your slide
- Speak clearly and loud.
- Only say the most interesting stuff.
- Say everything else on your webpage.
- When you hear the gong, say goodbye and leave the stage quickly.
- Be prepared to meet interested people after the session.
- Have a flyer, handout and/or business card ready.
- Get back to them during the congress.
If you are bringing your own display hardware
- There will be only VGA inputs available
- If you need to feed in some other type of signal (e.g. from a camera-to show small things (CVBS,S-video), an ultra new laptop which has only HDMI, some weird gaming console that you will crack (YUV), or whatever) bring a device which can really *convert* these signals.
- Simple passive adapters mostly do not work (e.g. there are adapters from HDMI to DVI and from DVI to VGA, but with the you will *never* be able to convert a HDMI signal into VGA, without a real converter).
- We will NOT have adapters available
- You will have 30 seconds to get your display hardware working. If it does not, then we will proceed to the next talk.
- There is no need to fill the available time.
- There is no need for any catchy slides, a background graphic is fine.
- Just be informative, be quick, be smart.
- Tell people how to get involved and how they can contact you.
- Add links to the description here in the wiki.
- Add links to your contact info (ie a dect/phone number, and an email address).
Include the following things in your last slide:
- Contact (DECT, email, fon)
- Links (project homepage)
- Place of contact (booth, room, party)