Time (2008-12-29) & Number of Streamers
More than 3500 hackers enjoyed this year’s hacker jeopardy through our network of streaming servers. During the course of 25C3 our friends at FeM
ran an array of 6 wmv streaming servers supplemented by 3 ogg theora relays provided by the Chaos family in Ulm and elsewhere. Over 1500 people watched the theora streems, which is almost as many as the wmv streams.
Additionally, we had a number of experimental streams in various other formats.
Streaming and recording the whole conference was only possible thanks to our helpers and angels who ran the live streams and edited the recordings in almost no time. So, if you missed the live events, check out the recordings.
As usual, we ask you to give your opinion on the lectures held at 25C3. Just go to the “Fahrplan”, click on the lectures you attended (or watched on video), click the feedback button, and tell us your impression. It is interesting and possibly helpful for the speakers to know your (anonymous) thoughts about their talks, and it is very important for the organizers to know what you liked and what you didn’t, when planning the next event. So, please, take your time to evaluate this year’s program.
Moreover, general feedback on all aspects of the event is welcome. Feel free to contribute to the feedback page in the wiki or to the Photo Documentation, and if there is something you want to tell everybody, blog about it and publish a link in the wiki, or just write it here.
Sadly, we’re on the last day of the 25C3. The good news is that your printed schedule is accurate with one very notable exception. All we have for you today is the addition of two really great talks in Saal 2:
- 14:00: Vertex Hacking: Reverse Engineering von 3D-Dateiformaten: “Es geht um die Methoden beim Umgang mit unbekannten Dateiformaten, speziell im Bereich der 3D-Modelle. Vorgestellt werden sollen die Werkzeuge, die Vorgehensweise, ein paar mögliche Fallstricke, interessante Implementierungsdetails und schlussendlich auch das Ergebnis in Form der Bibliothek libg3d.”
- 15:15: Mining social contacts with active RFID: “We describe the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. We report on experiments performed during conference gatherings, where the new feature of proximity detection was used to mine and expose patterns of social contact. We discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.”
In addition, Security Nightmares 2009 will be translated into English and simulcast in Saal 3.
The title of the talk “Making the theoretical possible” has been changed to “MD5 considered harmful today: Creating a rogue CA certificate”. The speakers will be Alexander Sotirov, Marc Stevens and Jacob Appelbaum.
Dag Arne Osvik, David Molnar, Arjen Lenstra and Benne de Weger will also be in the audience.
From left to right: Benne de Weger, Arjen Lenstra, Marc Stevens, Jacob Appelbaum, David Molnar, Alexander Sotirov. Photo: Alexander Klink (CC-BY)
Fornicating Formica robots
I gave the talk on the Formica project; thanks to all who watched. We had not realised the demand for kits. We started a mailing list at the end, but too late! So if you’re interested, please email me. If demand is sufficiently high we’ll sort something out. More information is available at:
The Raumstation needs your help! Tonight, hackerspaces.org is bringing together hackerspaces, lockpickers, makers, crafters and other hacker groups from around the world to help the c-base. Please join us for an evening of foodhacking, fundraising and friendship to help secure the continued exploration of the space station under Berlin! Relax with food, chill music and have a quiet night before Silvester!
Here is the lineup of events going on tonight at the c-base:
- 18:00: Aktivismus im digitalen Zeitalter: Markus Beckedahl (de): Markus zeigt auf, wie Politik und politische Kamapagnen im Internetzeitalter jenseits zentraler Steuerung als Mitmachprojekte im Open-Source-Stil bereits funktionieren und in Zukumft funktionieren können. (Note: This event is in German)
- 19:00: Semantic Food Engine: Join the hacker chefs from foodhacking.com as they go through the night’s gastronomy food technology, and enjoy a fresh dinner prepared by fellow congress attendees.
- 20:30: Das Snafu-Prinzip: Daniel Kulla (de): Eine Einführung in das Sanfu-Prinzip und wie es sich auswirkt und was dagegen hilft, gerade für sehr flache und informelle Informationshierachien wie den CCC. (Note: This event is in German)
- 22:00: The Power to the People Auction: This is your chance to directly support the c-base and walk away with really cool stuff! Come find out what SSD eV, NYCResistor, HacDC, Noisebridge, OpenAMD, Metalab, RepRap and many others have donated really cool things to help raise money for the c-base. Nick Farr and Astera from hackerspaces.org will be continuing a grand North American hacker conference tradition of fundraising and storytelling through hacker memorabilia. You might even walk away with a certain hacker’s suit, leaving him with nothing but jeans and a t-shirt to wear. ;)
Thanks to tef, netwalkerz_net, kap4001, hypatia.ca and Security4all. Don’t forget to tag your photos “25C3” and if possible, license your photos with a Creative Commons license. If there’s a particular picture you would like to see, leave a comment in this post!
Here are some quick updates to the schedule that do not appear in the printed program:
- Analyzing RFID Security with Henryk Plötz and Karsten Nohl will be appearing in Saal 1 at 16:00: “Many RFID tags have weaknesses, but the security level of different tags varies widely…we illustrate the complexity of RFID systems and discuss different attack vectors…we release an open-source, software-controlled, and extensible RFID reader with support for most common standards.”
- DECT: The Digital Enhanced Cordless Telecommunications standard will also be appearing in Saal 1 at 17:15: “Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public. Nevertheless we decided to investigate the security of DECT closer …”
- A new round of lightning talks has been added! They will be in Saal 3 at 20:30. Check the Lightning Talks Wiki Page for more information.
- The “Xbox360 – Rebooter” talk scheduled for Saal 3 at 20:30 has been cancelled.
- Weizenbaum: Rebel at work is appearing in Saal 3 at 21:45: “Bekannt wurde er in den 70er Jahren als scharfzüngiger Wissenschafts- und Gesellschaftskritiker. Sein Buch “Die Macht der Computer und die Ohnmacht der Vernunft” ist zum Klassiker geworden, sowohl unter Philosophen als auch unter Informatiker.”
- The “We got owned by the (rhymes-with-unease)…” talk scheduled for Saal 2 at 23:00 has been cancelled.
- As announced yesterday, Hacker Jeopardy will be live translated into English in Saal 3 beginning at 23:00.
Thanks to MrTopf for the great photo from this morning’s Privacy Workshop Project talk.