Posts Tagged ‘Events’

31C3 Lightning Talks

Wednesday, December 17th, 2014

Did you think that the thrill of sharing your ideas in front of a huge audience at a C3 was something you’d never do? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Well, you’re in luck because there will be Lightning Talks at 31C3.

Taking place at 12:45 on Days 2, 3 and 4, these fast paced sessions are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don’t have an awesome idea or project to share, a Lightning Talk is perfect for pitching your self organized session, assembly, or even a longer talk you’ll give at the speaker’s corner.

There will even be a special 180 second express round for those of you who don’t need fancy slides or a full five minutes to share your ideas.

Registration is now open for the Lightning Talk sessions at the 31C3. Act fast to reserve your slot. The last couple of times, lightning talk slots filled up on Day 1, so better hurry!

More Lightning talk information can be found at

https://events.ccc.de/congress/2014/wiki/Static:Lightning_Talks

The submission form is at:

https://events.ccc.de/congress/2014/wiki/Form:Lightning


 

“Vortrag auf dem Congress? Ich? Keine Chance.” Glaubst Du das? Arbeitest Du an einem coolen Projekt und willst es unter die Leute bringen? Wurde Dein Vortrag abgelehnt? Hast Du einen großartigen Hack, an dem Du uns teilhaben lassen willst? Glück gehabt, denn es gibt die Lightning Talks auf dem 31C3!

An den Tagen 2, 3 und 4 geht es um 12:45 Uhr los mit den Sessions, es dreht sich alles um neue Hardwareprojekte, Exploits, kreativen Unfug oder merkwürdige Ideen – vor einem weltweiten Publikum! Und auch wenn Du kein cooles Projekt vorstellen, sondern lieber eine interessante selbstorganisierte Session, ein Assembly oder einen längeren Vortrag in der Speaker’s Corner ankündigen willst, bist Du hier an der richtigen Adresse.

Es gibt sogar eine Extrarunde mit 180-Sekunden-Express-Vorträgen, wenn fünf Minuten Dir zu lang sind.

Die Anmeldung läuft, also registriere jetzt schnell Deinen Lightning Talk für den 31C3! Die letzten Male waren die Slots an Tag 1 schon voll, schnell sein lohnt sich also!

Das Programm und mehr Informationen zu den Lightning Talks gibt es unter:

https://events.ccc.de/congress/2014/wiki/Static:Lightning_Talks

Einen Talk einreichen kannst Du hier:

https://events.ccc.de/congress/2014/wiki/Form:Lightning

Von Patent-Trollen und indischem Reis

Monday, June 30th, 2014

patent wars

Mit Patenten verbindet man gemeinhin die Namen bedeutender Erfinder wie Thomas Alva Edison oder Alexander Bell. So ging es auch Filmemacherin Hannah Leonie Prinzler. In ihrem Dokumentarfilm The Patent Wars will sie das Patentwesen genauer erforschen und stößt auf eine bizarre Parallelwelt, in der vor allem die Gesetze des gefürchteten “Marktes” gelten.

Ausgangspunkt ist die Frage, warum Teile unserer Gene patentiert werden können. Mit ihrer Kamera macht sich Prinzler auf in die vermeintliche Papierwüste verschiedener nationaler Patentsysteme und begibt sich auf eine Reise um die halbe Welt, um mit den Menschen zu reden, die von den Patentkriegen profitieren, aber auch denen, die darunter zu leiden haben. Rund zwanzig Prozent der menschlichen Gene waren in den USA bereits patentiert und konnten somit nur noch von den Rechteinhabern wirtschaftlich genutzt werden, beispielsweise um Tests zur frühzeitigen Krebsdiagnose anzubieten. Erst im Juni 2013 – also während der Dreharbeiten zu “The Patent Wars” – setzte ein Beschluss des Supreme Court diesem Treiben ein Ende.

Bei den Dreharbeiten zu “The Patent Wars” stößt Prinzler auf vermeintlich innovative Patente, die jedoch jahrhundertealte Yoga-Posen oder Reissorten lizenzieren wollen, auf Creative-Commons-Autoschrauber, auf Mobiltelefone, die von tausenden Patentschriften umzingelt sind, auf Anleitungen für Patent-Trolle und strategisch plazierte “intelligente Bomben” in Form von perfide formulierten “patent claims”. All das formt sie zu einem spannenden und zugleich informativen Film, der nachdenklich macht, aber auch komische Momente hat.

“The Patent Wars” wagt den Einblick in ein Patentelabyrinth, das irgendwann aus dem Ruder gelaufen ist und schon längst alles andere als innovations- und gesellschaftsfördernd ist, sondern vielmehr Erfinder und Start-ups ausbremst und Länder der Dritten Welt dazu verdammt, teure, veraltete oder eben keine Medikamente zur Verfügung zu haben und mehr Lizenzgebühren an Firmen aus Erstweltstaaten zu zahlen, als Entwicklungshilfe ins Land fließt.

Den Film gibt es in Deutsch und Englisch. Und das Beste ist: Am Dienstagabend um 22.55 Uhr wird die Fernsehversion von “The Patent Wars” auf arte ausgestrahlt und ist danach auch (bis zur Depublizierung) in der arte-Mediathek zu finden. Es ist eine ästhetisch anspruchsvolle Doku, die übrigens auch durch die zauberhafte Stimme der Filmemacherin besticht.

Wer sich diesen Film nicht anschaut, ist selber schuld! :}

 

Illustration von Ephemeral Scraps

Fahrplan Sneak

Monday, December 2nd, 2013

The final 30c3 schedule is going to be late, we know… however, please stay tuned, as it’s still work in progress, and we can promise the Fahrplan will be awesome!

We’d like to tell you about some of the security highlights at 30c3. There are three major groups of interest this year:

  1. Cryptography
  2. Hardware & Embedded Device Security
  3. Software & Protocol Reverse Engineering

First, let’s start with a cryptography highlight: Nadia Heninger, Tanja Lange and Daniel J. Bernstein will be presenting “This Year in Crypto”. They will cover stuff that was broken before and continues to be broken again and again. The talk will also cover the coming Cryptopocalyps, backdoors in cryptographic implementations and the authors’ worries and concerns in regard to crypto in general. It’s worth mentioning that they initially recommended that their talk should be part of the Art & Beauty Track, since crypto is beautiful (and finessing crypto is an art).

Another cryptographic highlight this year is a lecture by Dmitry Khovratovich who’s going to talk about White-Box Cryptography. He’s going to explain the differences between White-Box & Public-Key Cryptography and obfuscation. This will include an overview of the white-box crypto concept along with the most common applications and proposed designs.

The Hardware & Embedded Security track will also feature several noteworthy lectures this year. Due to the outstanding quality of the submissions, it’s difficult to mention just a handful of talks. However, we’d like to highlight the following ones:

Console Hacking 2013 – It’s the year of the Wii U. This talk will cover improvements made in the architecture over previous console generations. Still, its security system was completely bypassed, and the authors will show how the Wii U was broken in less than 31 days. You’ll be able to reproduce all of the presented attacks at home – if you bring basic knowledge of embedded systems and CPU architectures.

Staying on the topic of Embedded Security and Embedded Privacy, Martin Herfurt will be presenting his research on Hybrid broadband broadcast TV (HbbTV). This is the new de-facto standard, which is currently being rolled out around the world. This new standard raises several security and privacy concerns. Martin will cover the emerging standard and how to deal with those security & privacy concerns.

Dr. Peter Laackmann will be covering the last 25 years of smartcard hacking (in German). This will be a rather entertaining talk with many crazy IC analysis techniques that you don’t want to miss – even if you’re not that much into technical details of chip-card hacking (or German).

As already mentioned, there is a substantial number of excellent hardware-security related talks this year. To keep the blog post short, here are just a few more that deserve to be mentioned:

  • Ralf P. Weinmann will talk about Hexagon Challenges: Baseband Exploitation in 2013,
  • Dmitry Nedospasov will be presenting his approaches on physical attacks of ICs’ backsides,
  • Adrian Dabrowski is going to introduce you to the RFID Treehouse of Horror, and how to hack city-wide access control systems.

Though it’s difficult to categorize the remaining submissions, they include Software and Protocol Reverse Engineering as well as any remaining software security related topics.

Jan Schejbal and his colleagues reverse engineered one of the implementations of the CHIASMUS cipher, designed by the BSI (Bundesamt für Sicherheit in der Informationstechnik). This work will not only reveal insights on the non-public CHIASMUS-cipher, but also uncover serious implementation issues in the “official” GSTOOL. The implementation issues allow an attacker to crack files that have been encrypted with GSTOOL with very little effort.

Also worth mentioning: Collin Mulliner’s “Dynamic Dalvik instrumentation of Android Applications and the Android framework” as well as Andreas “Bogk’s Bug Class Genocide”. Ilja van Sprundel will try to debunk the greatness of a well known open-source project: the X11 or X.org code.

See you at 30c3!

30c3 Security team

The 30c3 Security-Track

Saturday, November 16th, 2013

German version below.

This year, in order to better align the workload with the actual expertise of the reviewers, several topic-specific teams were formed. (More here.) Security related topics were staffed by a team of three to four core members. Additionally, six reviewers with differing security background were supporting the review.

Since in some cases the content of the actual presentations overlapped with the focus of more than one content team, submissions were shifted back and forth. Most of the overlap occured between Hardware, DiY & Making, and Science & Engineering. Overlaps with Society, Politics & Ethics as well as Art & Beauty were also present, but were far less common.

Altogether, approximately 130 hours were allocated for presentations among the entire content-team of the 30c3. 30 hours from this pool were specifically allocated for the security track and further split into 30 and 60 minute slots. In the end, the security content track received additional timeslots and accumulated 31 hours of content in total. We initially received a collection of around 100 submissions, which is roughly a third of all submissions.

While filtering content, we initially focused on reverse engineering of software and protocols, cryptography, and hardware & embedded security-related topics. Fortunately, a large portion of the submissions fell into these categories so that we were not forced to reconsider this focus. The majority of the submissions covered contemporary IT security related issues and current developments, which have yet to receive sufficient public attention.

In the end, we tried to find a balance between various current and imporant security issues. In cases where multiple submissions covering a particular topic were received, the team made a conscious decision in favor of one particular talk to avoid redundancy. This also involved some difficult decisions pertaining to presentations covering unique, novel, or noteworthy topics.

Ultimately, the available time slots are limited. This resulted in recommending that talks instead be resubmitted at a later date or encouraging that they be presented as a lightning talk. In several cases requiring interaction with the audience or a hands-on approach, a workshop format was proposed instead.

In the coming days, the security track team will continue to publish a number of blog posts to highlight a few outstanding submissions from each of the three topic areas of the upcoming security track. Spoiler alert!

30c3 logo

In diesem Jahr wurden themenspezifische Content-Teams gebildet, um die Arbeitslast besser auf die Expertise mehrerer Reviewer zu verteilen. (Mehr dazu hier.) Das Team, das sich um die Security-Themen kümmerte, bestand im Kern aus drei bis vier Leuten. Dazu gehörte ein sechsköpfiges Reviewer-Team aus unterschiedlichen Fachbereichen.

Da es oftmals Überschneidungen mit den inhaltlichen Schwerpunkten anderer Teams gab, mußten hin und wieder Einreichungen hin- und hergeschoben werden. Die meisten Überschneidungen gab es mit den Teams Hardware, DIY & Making sowie Science & Engineering. Manche unserer Einreichungen wurden am Ende dort plaziert bzw. von anderen Teams entschieden. Weniger Überschneidungen gab es mit den anderen zwei Teams, Society, Politics & Ethics sowie Art & Beauty.

Insgesamt standen dem gesamten Content-Team fast 130 Stunden für die Vergabe von Slots für Vorträge, Entertainment und CCC-Themen zur Verfügung. Der Security-Track erhielt ein Kontingent von dreißig Stunden, die in ein- und halbstündige Slots aufgeteilt wurden. Mit einem “Notsitz” kamen wir schlußendlich auf etwa 31 Stunden. Etwas mehr als einhundert Einreichungen wurden dem Security-Track anfangs zugeordnet. Das entspricht etwa einem Drittel aller Einreichungen.

Thematisch wurde zu Beginn grob vorsortiert und ein Fokus auf die Themen Hardware & Embedded Security, Reverse-Engineering von Software und Protokollen sowie Erhellendes aus der Kryptographie gelegt. Glücklicherweise entsprach das Gros der hundert Einreichungen den gewünschten Schwerpunkten, so daß wir nicht gezwungen waren, an unseren inhaltlichen Erwartungen zu drehen. Der Großteil der Einreichungen deckte sehr zeitgemäße und vor allen Dingen auch aktuelle Entwicklungen ab, die bislang noch nicht oder nicht allzuoft in der Öffentlichkeit thematisiert wurden.

Somit haben wir in einer ersten Vorauswahl nach Ende der Deadline bereits die Einreichungen auf die Seite gelegt, die nicht zu unserem Themenschwerpunkt paßten. Letztlich haben wir versucht, eine Balance zwischen den verschiedenen aktuellen Themen zu finden. Gab es mehrere Einreichungen zu einem ähnlichen Thema, hat das Team darüber debattiert, wer den Zuschlag bekommt und wer nicht. Schwieriger war es am Ende, die Entscheidung über all die Einreichungen zu treffen, die thematisch einmalig waren und wo also jedes Thema aktuell und erwähnenswert ist.

Da die Zeit jedoch begrenzt ist, mußten wir leider viel zu viele Einreicher auf das nächste Jahr vertrösten oder haben sie motiviert, einen Lightning-Talk zu halten. In Fällen, wo eine gewisse Interaktion mit dem Publikum ohnehin angemessen wäre, schlugen wir die Organisation von Workshops vor, die allerdings nicht der Auswahl und der Organisation durch das Content-Team unterliegen.

Das Security-Content-Team wird in den kommenden Tagen eine Reihe von Blogpostings veröffentlichen, in denen jeweils aus einem der drei Themen-Schwerpunkte ein paar Highlights der angenommenen Vorträge präsentiert werden. Spoiler Alert!

On the acceptance and rejections in the 30c3 Society, Politics & Ethics track

Friday, November 15th, 2013

Within the next hours, everyone who submitted a talk or lecture (not: lightning talk or workshop) should receive their notice of acceptance or non-acceptance. Some of you will be disappointed, because talks that you considered important did not make it into the program. We would like to share with you how decisions were made and by which priorities, so everyone can have a better understanding of how the final Society, Politics & Ethics program came into existence.

First, we would like to give you some background on the content team process. In previous years, there was one global content team for all tracks. This year, we had five “track teams”,  each responsible for one track. The track teams consisted of subject matter experts who reviewed the submissions thoroughly. We did this in order to (a) reduce the work load on each content team member and (b) to increase the time for reviewing each submission.

Before we started, the total number of available congress slots was split up between the tracks. The resulting distribution of slots aimed at creating a proper balance between tech/science subjects, IT security questions and politics/society topics, as well as art & beauty and making/crafting. The CCC congress has always lived from its very wide area of subjects and topics, so distributing the available talk slots among different tracks is a good way to get the right mix.

The Society, Politics & Ethics track was assigned 29 hours out of 120 hours total lecture time. This does not include lightning talks, workshops, CCC related talks or evening shows. We received a total of more than 300 submissions to the congress – more than 120 of which were aiming at a slot in the  Society, Politics & Ethics track. Many submissions asked for slots even longer than one hour.

With regards to contents, this track’s goal is to reflect on last year’s important discussions and events in order to bring forward the debate in our community and in society in general and to – and this is just as important – have a number of talks that just widen the horizon and introduce you to fields you haven’t heard or thought about much so far. The overarching goal was of course to help forming connections between different communities in the fight for digital freedoms and to learn from each other’s successes and mistakes.

So, we needed to make some hard decisions.

The track team, after reviewing all submissions, came up with some rules to ensure general fairness between submissions:

  1. Maximum slot length is one hour.
  2. A number of talks has to be condensed to thirty minutes, so we can cover more topics.
  3. No panels – unless we have contrarian, extra-ordinary, kick-ass panel members.
  4. No lectures whose sole purpose is the introduction of a specific project (we humbly ask you to do this in a workshop or lightning talk).
  5. Strong international/European focus, no predominantly US-centric talks.

As a first step, we identified this year’s general topics of interest and clustered submissions into 12 resulting sections. Within each section, submissions were then rank-ordered. Judgements were made strictly based on the talk submission’s contents. As we have emphasized on numerous occasions before the submission deadline: Submitting a weak, hastily written or convoluted description or one that does not convey what you really want to talk about, immensely reduces your chance of acceptance.

After the first round of thorough reviewing and within-section ranking, we ended up with about twice as many talks as we could fit into the available time. This means: For every submission we accepted, we had to drop at least one other submission that we had also agreed to accept. As you can tell, this was when the really tough decisions had to be made.

At this point, there were two types of conflicts:

(a) the intra-subject conflict: When there were two submissions dealing with the same (or very similiar) topics, we had to opt for only one of them, in order to not discriminate other, just as important subjects. This is when we introduced speaker performance as a criterion. We looked at videos of previous talks, read through the rankings collected at previous CCC-events and asked around to hear about audience experiences with the speaker in question at other conferences.

(b) the inter-subject conflict: Even after (roughly) enforcing the one-slot-per-topic directive we had laid upon us, there was still not enough time. The only solution was to shorten submissions down to thirty minutes of length, and – ultimately – dropping them. So we sat down and made these uncomfortable decisions based on which talk might interest the bigger audience, has the higher relevance in the current situation.

In the end, only 35 submissions made it into the final program.

If your submission was accepted, please keep in mind that two other submissions had to be rejected to make space for you, one of which was originally considered indespensable by the track team. We trust that you will not disappoint our faith in you.

If your talk – or one that you feel strongly about – has not made it into the final 30C3 Society, Politics & Ethics track, don’t despair. You all were up against some very serious competition. We could have filled about twice as much time as we had and would still not have weak talks in the program. The other track teams faced similiar problems, just that they had (except for the Security & Hacking track) a far less dramatic submissions to available slots ratio.

To those of you who did not make it into the final round, there is one consolation: Judged by the number of rejected obviously-unrejectable submissions, we’re sure to have compiled a kick-ass program. :)

More information at 30c3? Here: https://events.ccc.de/congress/2013/wiki/Main_Page.

SIGINT 2013: Call for Participation

Thursday, February 21st, 2013

July 5th-7th, KOMED im Mediapark, Cologne, Germany

SIGINT13

sigint.ccc.de/cfp

SIGINT is an annual hacker conference organized by the Chaos Computer Club. It features talks covering both technical and social aspects of our digital society.

VOLUNTEERS For SIGINT to be as great as always, we need your help. First and foremost, we need eager volunteers to help on-site with the intricate details of organizing a conference for hundreds of people. Please register as a volunteer as soon as we have the registration online.

ARTS AND PROJECTS Asides from helping us having everything run smoothly, we’d gladly accept any kind of project that can be built upon our conference infrastructure. Do you have a cool project you want to show off? Great! You’re just dying to have a venue to try out your fancy new art installation? Cool! Drop us a line at sigint-content(at)koeln.ccc.de and we’ll see if we can sort it out.

TALKS As a community-organized conference, we want to offer you the best lectures you can get. For this, we need your talk submissions—we’re offering one-hour slots (including Q&A), and your talk will be recorded and put online after the conference. Unless you opt out, of course.

If you think you have a great talk that other hackers should listen to, great! Just submit it at our talk submission site!

In case you’re undecided on whether your talk is appropriate, here’s a list of things we are interested in:
Anything that is related to these topics or close enough is welcome too!

  • Signals intelligence and surveillance techniques, e.g. digital wiretapping, deep packet inspection, etc.
  • Mobile device hacking and telecommunications security and exploiting weaknesses in mobile app ecosystems
  • Network neutrality, i.e. the ownership, censorship, circumvention and the politics of de facto standards
  • Programming languages, the state of the art and research as well as interesting new or old applications
  • Privacy in the age of big data, ensuring it via policy or technical means, ethical considerations, etc.
  • (Post-)Privacy, conflict between the desires of an individual and the public regarding social networks and public spaces
  • Alternative worlds, communities in the deep web, augmented reality, hackerspaces and other environments
  • Storming the clouds, hacking, breaking, exploiting and securing cloud-based computing and storage ideas
  • Transparency and participation in politics and governance, sousveillance, open data and its applications
  • Physical hacking, making and fabbing, lockpicking, electronics and hardwarde design, artistic expression
  • Painting it green, concepts for reducing the ecological footprint our urban lifestyle has on the planet
  • Automation, labor market, terms of employment and future chances

As mentioned before, the above list is meant as an inspiration, and not a restriction. It is neither exhaustive nor complete.
All talk submissions will be reviewed and a benevolent selection of talks will try to represent the broadest possible spectrum to the best of our abilities.

SUBMISSION GUIDELINES (more…)

Junghackertag

Friday, December 28th, 2012

Education – not our department? Auf dem Junghackertrack am Tag 3 wendet sich der CCC an das junge Publikum. Zwischen 12 und 20 Uhr gibt es jede Menge zu tun: Alarmanlagen basteln, elektronische Käfer (pentabugs) basteln oder lernen, wie Schlösser funktionieren – das “Chaos macht Schule”-Projekt, ein Zusammenschluss mehrerer CCC-Erfas stellt sich und seine Arbeit vor. Während gebastelt wird, gibt es Vorträge zum “Chaos macht Schule”-Projekt, der kreativen Nutzung von Medien und Datenschutz. Außerdem steht das “Chaos macht Schule”-Team in einer Podiumsdiskussion Rede und Antwort.

Der Eintritt für Junghacker (bis 14 Jahre) inkl. einem Elternteil in der Zeit von 11:30 Uhr bis 17 Uhr (Einlaß) ist kostenlos. Die Workshops sind ebenfalls kostenlos, Spenden werden aber gerne entgegengenommen.

Mehr Informationen zum Projekt hier im Wiki.

Alle Workshops starten um 12 Uhr und dauern den ganzen Tag. Pausen sind allerdings möglich. Folgende Workshops werden angeboten:

  • von Schräge Runde/Alwin Weber: Blödsinn mit Lötzinn
  • von der Chaospott-Assembly: Alarmanlagenbau
  • von der C3D2-Assembly: pentabugs
  • von der C3D2-Assembly: pentalight
  • von der Lockpicking Assembly: Lockpicking ab 15 Uhr
  • sowie Vorträge (alle Saal 12)

Vorträge:

  • 12:30 Uhr: Datenschutz
  • 14 Uhr: Lockpicking
  • 15:30 Uhr: Runtergeladen und trotzdem gezahlt
  • 17 Uhr: Vorstellung von Chaos macht Schule
  • danach Diskussionsrunde

Alle Vorträge und Workshops auch nochmal hier: https://events.ccc.de/congress/2012/wiki/Junghackertag.

29C3 – Tickets and Pricing

Tuesday, October 9th, 2012

29C3 will cost us much more than standard tickets priced at 80 EUR will pay. Thus we’ll sell supporter tickets for 100 and 120 EUR. Please consider buying one of these. Help us minimize our losses and support others who can’t afford paying much more! Thanks a lot! :)

(more…)

u23 2012 in Köln

Monday, September 10th, 2012

Pixelrakete

Der Chaos Computer Club Cologne e.V. veranstaltet dieses Jahr bereits zum neunten Mal ein spannendes Projekt aus der Reihe “u23″ für NachwuchshackerInnen unter 23 Jahren.

An sieben Terminen werden wir in die Welt der Mikrocontroller aufbrechen. Die Teilnehmer werden mit einem STM32-Development-Board eine kleine Spielekonsole entwickeln.
Jeder Teilnehmer erhält ein STM32-ARM-Mikroprozessor-Board, ein Expansion Board und einen SNES-Controller. Nach einer Einführung in C werden die Boards von den Teilnehmern in Kleingruppen selbst zusammengelötet (keine SMD-Teile, nur passive DIP-Teile). In den weiteren Terminen gibt es eine Einführung in die vom C4 entwickelte Library zur Spielentwicklung. Danach kann der Kreativität freien Lauf gelassen werden, wenn in Gruppen eigene Spiele für das Board entwickelt werden. Wie immer endet das u23 mit einer Vorstellung der Ergebnisse auf dem November-OpenChaos.

Entwicklungsaufbau

Der Chaos Computer Club Cologne veranstaltet das u23 im nahezu jährlichen Rhythmus seit 2002. In der Vergangenheit behandelten wir beispielsweise die Themen Hardwarebastelei, Softwareentwicklung oder Grundlagen der Netzwerktechnik.

Im Rahmen der sieben Termine vom 20. Oktober bis 29. November 2012 beschäftigen sich die Teilnehmer eingehend mit der Programmierung simpler grafischer Spiele in C für unsere Plattform. Unsere Tutoren helfen den Gruppen die erforderlichen Kenntnisse zu erlernen, vermitteln Wissen und geben Denkanstösse.
Die Arbeit in den Gruppen wird durch die Eigeninitiative der Teilnehmer angetrieben und bietet darüber hinaus die Möglichkeit, außerhalb der Vortragstermine am gemeinsamen Projekt in den Clubräumen des Chaos Computer Club Cologne weiter zu arbeiten.

Alle Informationen und die Möglichkeit zur Anmeldung gibt es unter https://koeln.ccc.de/u23/.

Hey! What about the tickets for 29C3?

Tuesday, August 28th, 2012

As we had a lot of people asking, here some answers:

Q: How much will the tickets cost?
A: Our priority is to keep the price for the tickets as low as in the years before. So we currently assume that it will be around 80 Euros — as it was last year.

Q: What if I can not afford that?
A: There will be a friend’s request address as we had it before. More details coming with the start of the presale.

Q: But what is this friend’s request?
A: At 28C3 we handled it like this. Have a look.

Q: Ah, there will be a presale for tickets?
A: Yes, there will be a presale to buy a ticket in advance.

Q: So I have to set up my presale scripts again?
A: No, the new venue in Hamburg should be really big enough to fit all of us. Your time will be better invested if you start thinking about what you and/or your project/hackerspace/group could do with all that space!

Q: Why do you always say “There will be…”?
A: Please have a look outside — it’s still summer, isn’t it? Nevertheless your congress team is already working hard to make the congress possible again. So please be patient. If you keep an eye on this blog you won’t miss any information on tickets and presale.