Tag | Uhrzeit | Raum | Titel | Untertitel |
---|---|---|---|---|
Freitag | 12 | 1 | How To Leave The Planet | Welcome To The Camp. Join The Crew. Introduction To The Camp |
Freitag | 12 | 2 | ||
Freitag | 14 | 1 | Politics of Creating Crypto Software | How to create free strong crypto software without getting into trouble with the various regulatory agencies. |
Freitag | 14 | 2 | "How to ask for help on the net" -- finding information |
Finding Information on the net is sometimes not as easy as it looks. The talk gives also some sort of introduction to the whole field of Search Engines, how to ask questions, Communities, generating information and beeing patient. |
Freitag | 16 | 1 | Faktorisierung | Nach Zuruf einer - sagen wir mal zwölfstelligen - Zahl versucht der Vortragende diese zu faktorisieren, ohne dabei auf spezialisierte Software zurückzugreifen. A Paper and Pencil Attack. |
Freitag | 16 | 2 | Holographie Einführung | Claus gibt einen allgemeinen und einführenden Überblick über das weite Feld der Holographie. |
Freitag | 18 | 1 | ||
Freitag | 18 | 2 | Security & Authentication Mechanisms NT vs. Linux vs. Novell | We will discuss and evaluate the Security and Authentication mechanisms in these three popular Operating Systems. |
Freitag | 20 | 1 | "Secure and Fast Hard disk (and Pilot) Encryption with Smart Cards" | Smart cards are very user friendly and pretty tamper-proof - ok,ok not really if you hang on the CCC-Camp. But if you look at the performance, smart cards are like a compressed C64. So if you want to use a smart card supported files system, we have to use more sophisticated protocols. And we have developed some, free and even exportable to the US. http://www.informatik.uni-mannheim.de/~rweis/usenix99/ http://www.informatik.uni-mannheim.de/~rweis/morehash/enix99/) |
Freitag | 20 | 2 | Careerpunks | "A Career in Mischief: Cypherpunks in Corporate Security" "How to Succeed in Business -- for Cypherpunks" "It's Not Just a Job, It's a Hack" / "Cypherpunk Corporate Camoflage Camp" "Take This Job and Ping It" / "Hacking the Corporate Ladder for Fun & Profit" |
Freitag | 22 | 1 | Angel | A workshop about the development of the remailer-friendly cryptographic mail transfer agent "angel". |
Freitag | 22 | 2 | Hacker Variety Pack | The many ways one can be a hacker. Not all of which have anything to do with getting root on a machine. The panel will consist of Lucky Green, Ian Goldberg, John Gilmore, Hugh Daniel, and Sameer Parekh and some more people. The idea is to teach the kids that there are other ways to do cool stuff than to just hack boxes. We need managers, social engineers, scientists, and more. |
Freitag | 24 | 1 | Biometric Insecurity | Biometrical Authentication is one of the most interesting fields for future hacking. Bypassing finger print scanners, hand shape scanners, and other biometric devices will be discussed in more or less detail as well as the basic theories behind it. |
Freitag | 24 | 2 | Linux Security Summit | How to get strong encryption into main Linux distributions. |
Samstag | 12 | 1 | Secure Networks for the Future. DNSSEC, IPSEC, FreeSWAN | DNSSEC, IPSEC, FreeSWAN. |
Samstag | 12 | 2 | Telefonnetz-Hacking & servicewatch - Geschichten | Auch das Telefonnetz ist trotz oder gerade wegen des Internets interssant geblieben. Erörterungen zum Phreaking auch für Anfänger und servicewatch erzählt Geschichten. |
Samstag | 14 | 1 | Sicherheit kommerzieller NT-basierter Firewalls | Am praktischen Beispiel werden wir die Sicherheit von kommerziellen WindowsNT-basierten Firewalls erforschen und diskutieren. Ein Testsetup wird nach diesem Workshop im Camp-Netz stehen um weitere gezielte Forschungen durchzu führen. |
Samstag | 14 | 2 | Telephony voice encryption - project and therories | Projects on voice encryption show their state of development. |
Samstag | 16 | 1 | Generic Bidirectional Mapper | Vorgestellt wird ein Yacc-Nachfolger, der ausreichen komplex ist, um die praktischen externen Datenstrukturen in einem Ritt zu lesen und zu schreiben. |
Samstag | 16 | 2 | Intrusion Detection Systems - a Reality Check | This workshop will try to give an overview on the current state of Intrusion Detection Systems. Two or three commerial, semicommercial and free intrusion detection systems will be tested in a real hostile environment. |
Samstag | 18 | 1 | Multicast Protocolls (for Beginners) | Multicast is a more and more important field of the Internet development. This workshop will cover the basics as well as recent developments in this field. |
Samstag | 18 | 2 | Advanced Image Manipulation with the GIMP | A tour of Gimp's image manipulation power. What is Gimp and why should you use it? Selections, masks, layers, modes and channels, or how do you do really advanced image manipulation. Map and distort, examples of how to make your own custom box in Gimp. Color and Image corrections with Gimp's powerful color manipulation plug-ins. A Quick tour of the GIMP plug-in Land. |
Samstag | 20 | 1 | Down with the DEA -State of Process for the next DES | "Advanced Encryption Standard: State of Process" Down with the DEA! A new star will born soon. A first closer look on the candidates for the Advanced Encryption Standard. Some of them are very secure, very fast and designed by very nice guys. http://www.informatik.uni-mannheim.de/~rweis/research/ http://csrc.nist.gov/encryption/aes/aes_home.htm |
Samstag | 20 | 2 | Construction of WindowsNT shell code for Buffer Overflow exploits | We will discuss and demonstrate how to construct, write and test insertion codes to exploit WindowsNT buffer overflow exploits. |
Samstag | 22 | 1 | Verschwörungstheorien | Muster und Mechanismen von Verschörungstheorien. Wie verbreiten sie sich, welche Gemeinsamkeiten gibt es? Ein kulturwissenschaftlich-entspannter Betrachtungsversuch. |
Samstag | 22 | 2 | CIPHR'00 planning meeting. | This is the planing meeting for the Cypher Rights Conference in 2000 |
Samstag | 24 | 1 | Poetry Slam | Gedichte, Poetry, Lyrik, wasauchimmer |
Samstag | 24 | 2 | Nerdbank: Feasability of an open source banking | After a brief introduction why banking may be good target for the open source paradigm, and various protocols considered possible the speakers would like to start a discussion on the overall doability of the open-source ecommerce as well as on the choice of protocols. |
Sonntag | 12 | 1 | Eingeschränkt freie Berufswahl in der IT-Branche | Ein Erlebnisbericht zu den Risiken einer abweichenden Meinung für die Freiheit der Berufswahl. |
Sonntag | 12 | 2 | "Crypto-Hacking Export restrictions" | There are still many silly export restriction for cryptographic software. Therefore we have taken a closer look on nice mathematical tricks to improve key length, building encryption systems with signature cards and using "non decrypting" JAVA cards to do en- and decryption. For all these systems there exist nice mathematical security proofs, but perhaps we should do some funnier things too, like encrypting with Solitaire cards or PERL body painting. http://www.informatik.uni-mannheim.de/~rweis/research/ http://www.counterpane.com/solitaire.html http://www.dcs.exeter.ac.uk/~aba/rsa/tattoo.html |
Sonntag | 14 | 1 | Das Chaos-CD Projekt | Das Projekt zur Erstellung des Inhalts der nächsten Chaos-CD stellt sein Konzept vor und verteilt Arbeits-Päckchen an Mitarbeitswillige Mitmenschen |
Sonntag | 14 | 2 | Freedom - the pseudonymous IP Network - Introduction | In this workshop Ian Goldberg gives an overview of Freedom, a pseudonymous IP network that is soon to be released publicly. |
Sonntag | 16 | 1 | IP V6: Erfahrungen aus dem IP V6-Feldversuch auf dem Camp | Was ging, was ging nicht beim IP V6-Ackerversuch? Eine Bilanz. |
Sonntag | 16 | 2 | ||
Sonntag | 18 | 1 | Chaos Communication Camp Reverse Engineering Award Ceremony | A price for the best reverse engineering project at the Chaos Communication Camp will be handed out. IThe winner gets a very rare price: one of the only eight GSM diagnostic SIM's I know of with rewritable internal keys. A board of judges that consists of several well known and respected members of the hacker comunity will try to judge the winner independently. |
Sonntag | 18 | 2 | ||
Sonntag | 20 | 1 | ||
Sonntag | 20 | 2 | ||
Sonntag | 22 | 1 | ||
Sonntag | 22 | 2 | ||
Sonntag | 24 | 1 | ||
Sonntag | 24 | 2 |