(Day 3 - 12:45 in Saal G)
(Day 4)
 
(70 intermediate revisions by 8 users not shown)
Line 1: Line 1:
; Description: [http://en.wikipedia.org/wiki/Lightning_Talk Lightning Talks] are short lectures any congress participant may give!
+
; Description: [http://en.wikipedia.org/wiki/Lightning_Talk Lightning Talks] are short lectures (almost) any congress participant may give!
  
 
; Content: Bring your infectious enthusiasm to an audience with a short attention span!  Discuss a program, system or technique!  Pitch your projects and ideas or try to rally a crew of people to your party or assembly!  Whatever you bring, make it quick!
 
; Content: Bring your infectious enthusiasm to an audience with a short attention span!  Discuss a program, system or technique!  Pitch your projects and ideas or try to rally a crew of people to your party or assembly!  Whatever you bring, make it quick!
  
The Lightning Talks were a huge hit at the 29c3For the first time since we introduced the new Lightning Talk format, every slot was completely booked by Day 2.  There were three packed sessions and over seven hours of Lightning Talks.  There is a possibility that Lightning Talk slots will be gone by the time the Congress starts, so submit your idea as soon as possible!
+
The Lightning Talks at the 30c3 were the best yetWe need your help to make them even better next yearPlease e-mail 30c3@nickfarr.org to get in touch with the coordinators who put together next year's session.
 
+
= How to Apply =
+
 
+
'''NOTE:  Only 180 second talk slots are currently available.'''  
+
 
+
Full five minute talks may be elect to be on a waitlist for each day.
+
 
+
Send an e-mail to 30c3@nickfarr.org with the following information in this order:
+
 
+
# Presentation Title
+
# 30c3 Wiki Username
+
# Language of your Presentation
+
# Keywords
+
# Abstract
+
# Relevant Links (Project Page, 30c3 Wiki Page, etc.)
+
# '''Slides in PDF, ODP or PNG format OR link to a Video.'''
+
# Do we have your permission to upload your slides to the wiki? (Before my talk/After My Talk/Not at all)
+
 
+
Got questions?  See the [[Static:Lightning_Talks#FAQ|FAQ]]
+
 
+
= How it Works =
+
 
+
The 30c3 Lightning Talks are 5 minutes each, given on a first-come, first-served basis to presenters who provide complete submissions on non-controversial topics.
+
 
+
# Speakers take the podium as the moderator brings up their slides on the beamer.
+
# Once slides are ready, the speaker is given a "Go" to proceed.
+
# Speakers introduce themselves
+
# Speakers advance their own slides using the remote on the podium
+
# With one minute left to go, the moderator will give a "One Minute" warning over the microphone
+
# The moderator will give another warning with 30 seconds left
+
# At 10 seconds, the moderator will signal the audience to count down.
+
# When the speaker is finished, or five minutes are up, the audience applauds and the next speaker takes the stage.
+
 
+
== 180 Second Express Round ==
+
 
+
Is 5 minutes too much?  What can you do in 180 seconds or less? 
+
 
+
In order to make room for more participants, ease the submission requirements, and create a dumping ground for people who cannot follow directions, we're trying this special 3 minute round on Day 4. The application process is the same!
+
  
 
= Schedule =
 
= Schedule =
  
== [https://events.ccc.de/congress/2013/Fahrplan/events/5562.html Day 2 - 12:45 in Saal G] ==
+
== Day 2 ==
 +
* [http://live.berlin.voc.media.ccc.de/tests/podlove/lt2.html Click here to jump to the LT you want! (powered by Shownot.es + VOC)]
 +
* [https://c3notes.grus.uberspace.de/doc/lt-day2 Pad with timestamps]
 +
* [http://media.ccc.de/browse/congress/2013/30C3_-_5562_-_en_-_saal_g_-_201312281245_-_lightning_talks_day_2_-_nickfarr.html Official Video Download Source (media.ccc.de)]
  
 
{| class="table"
 
{| class="table"
 
|-
 
|-
! Time
+
! HH:MM
 
! Title
 
! Title
 
! Presenter
 
! Presenter
Line 57: Line 22:
 
! Slides
 
! Slides
 
|-  
 
|-  
| 12:45
+
| [http://live.berlin.voc.media.ccc.de/tests/podlove/lt2.html#t=1:58 01:58]
! How to give a good Lightning Talk
+
! Be a Chaos Mentor
 
| [[User:Nickfarr | Nick Farr]]
 
| [[User:Nickfarr | Nick Farr]]
 
| EN
 
| EN
| This is a brief Lightning Talk explaining the basics of how the Lightning Talks work.
+
| A quick discussion about the awesome Chaos Mentor program!
| [http://en.wikipedia.org/wiki/Lightning_talk Lightning Talks on Wikipedia]
+
| [[Projects:Chaospatinnen|Chaospatinnen on the Wiki]]
| Available soon
+
| [[Media:LT-Day 2-12.45-Chaospatinnen Pitch.pdf|Slides]]
 
|-
 
|-
| 12:50
+
|  
 
! Hacking With Care
 
! Hacking With Care
 
| [[User:Emily]]
 
| [[User:Emily]]
Line 76: Line 41:
 
| [http://hackingwithcare.in/wordpress/wp-content/uploads/2013/12/marvel_fitnessspiderman2.jpg Slide]
 
| [http://hackingwithcare.in/wordpress/wp-content/uploads/2013/12/marvel_fitnessspiderman2.jpg Slide]
 
|-
 
|-
| 12:55
+
|  
 
! Wir werden alle überwacht. Und nun?
 
! Wir werden alle überwacht. Und nun?
 
| [[User:Mspro]]
 
| [[User:Mspro]]
Line 86: Line 51:
 
Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen.
 
Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen.
 
| [http://mspr0.de/ mspr0.de]
 
| [http://mspr0.de/ mspr0.de]
| Will not be uploaded
+
| [[Media:LT-Day 2-12.55-FINAL-Wir werden alle überwacht. Und nun.pdf|Slides]]
 
|-
 
|-
| 13:00
+
|  
 +
! Snake: a privacy-aware online social network providing anonymity of data at rest
 +
| [[User:aleclm]]
 +
| EN
 +
| An end-to-end encrypted social network that is easy to use and protects your privacy from evil hackers, storage providers and overly curious government agencies.
 +
| [http://snake.li Website] [http://igg.me/at/snake Fundraising campaign] [http://snake.li/snake-design.pdf Full design document]
 +
| [[Media:LT-Day 2-13.05-FINAL-Snake- a privacy-aware online social network.pdf|Slides]]
 +
|-
 +
|
 
! Secure eMail Storage with qpsmtpd + GPG
 
! Secure eMail Storage with qpsmtpd + GPG
 
| [[User:byterazor]]
 
| [[User:byterazor]]
Line 94: Line 67:
 
| Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon.
 
| Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon.
 
| [http://byterazor.federationhq.de/blog/qpsmtpd-gpg.shtml QPSMTPD GPG Plugin]
 
| [http://byterazor.federationhq.de/blog/qpsmtpd-gpg.shtml QPSMTPD GPG Plugin]
| Available afterwards
+
| [[Media:LT-Day 2-13.00-Secure eMail Storage with qpsmtpd + GPG.pdf|Slides]]
 
|-
 
|-
| 13:05
+
|  
! Snake: a privacy-aware online social network providing anonymity of data at rest
+
| [[User:aleclm]]
+
| EN
+
| The enormous amount of sensitive information available to Online Social Networks is highly attractive for criminals, therefore adequate security measures are needed. So far, in most cases, OSN providers have had complete control over user data: the only restrictions came from the OSN’s Terms of Service and the regulations of the various countries where the service was available. The aim of this work is to allow OSNs’ end users to have as much control as possible over the data they post and to design a service provider storing as little information as strictly necessary to offer the intended service.
+
| Forthcoming
+
| Available afterwards
+
|-
+
| 13:10
+
 
! Online Footprint - An experiment in privacy
 
! Online Footprint - An experiment in privacy
 
| [[User:Hiromipaw]]
 
| [[User:Hiromipaw]]
Line 112: Line 77:
 
This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques.
 
This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques.
 
|
 
|
| [https://docs.google.com/presentation/d/1gmBd11DBEYW-Hka6c74C4uKTvyyo5sF7DmtPdvoYnzY/edit?usp=sharing Slides (via Google Drive)]
+
| [[Media:LT-Day 2-13.10-Online Footprint - An experiment in privacy.pdf|Slides]]
 
|-
 
|-
| 13:15
+
|  
 
! Web 3.0 - reconquest of freedom on the Internet - a social movement?
 
! Web 3.0 - reconquest of freedom on the Internet - a social movement?
 
| [[User:Klaus_Wallenstein]]
 
| [[User:Klaus_Wallenstein]]
Line 122: Line 87:
 
Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem?
 
Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem?
 
| [http://wagnisdemokratie.wordpress.com/ Wagnis Demokratie]
 
| [http://wagnisdemokratie.wordpress.com/ Wagnis Demokratie]
| Available afterwards
+
| [[Media:LT-Day 2-13.15-Web 3.0 - reconquest of freedom on the Internet - a social movement?.pdf|Slides]]
 
|-
 
|-
| 13:20
+
|  
 
! Getting more out of Java Stacktraces
 
! Getting more out of Java Stacktraces
 
| [[User:snakebyte]]
 
| [[User:snakebyte]]
Line 130: Line 95:
 
| This talk presents a database which allows to use Java stacktraces for web application and framework version fingerprinting
 
| This talk presents a database which allows to use Java stacktraces for web application and framework version fingerprinting
 
| TBA
 
| TBA
| Available afterwards
+
| [[Media:LT-Day_2-13.20-Getting_more_out_of_Java_Stacktraces.pdf|Slides]]
 
|-
 
|-
| 13:25
+
|  
 
! Investor-to-state Dispute Settlement: A Threat To Democracy
 
! Investor-to-state Dispute Settlement: A Threat To Democracy
 
| [[User: ante]]
 
| [[User: ante]]
Line 140: Line 105:
 
| [[media:LT-Investor-to-state dispute settlement- a threat to democracy.pdf|Slides]]
 
| [[media:LT-Investor-to-state dispute settlement- a threat to democracy.pdf|Slides]]
 
|-
 
|-
| 13:30
+
|  
 
! hPDB - the fastest Protein Databank parser is written in Haskell
 
! hPDB - the fastest Protein Databank parser is written in Haskell
 
| [[User:miga]]
 
| [[User:miga]]
Line 146: Line 111:
 
| hPDB is a parallel Protein Databank parser written in a lazy functional language Haskell. According to current benchmarks it is among the top three parser when used on a single core, and outclasses other parsers when used on quad-core. Is it sign of a new future for both Haskell, and parsing?
 
| hPDB is a parallel Protein Databank parser written in a lazy functional language Haskell. According to current benchmarks it is among the top three parser when used on a single core, and outclasses other parsers when used on quad-core. Is it sign of a new future for both Haskell, and parsing?
 
| [https://github.com/BioHaskell/hPDB GitHub], [http://www.biohaskell.org biohaskell.org], [https://events.ccc.de/congress/2013/wiki/Assembly:BioHacking BioHacking Assembly]
 
| [https://github.com/BioHaskell/hPDB GitHub], [http://www.biohaskell.org biohaskell.org], [https://events.ccc.de/congress/2013/wiki/Assembly:BioHacking BioHacking Assembly]
| Unknown
+
| [[Media:LT-Day_2-13.30-hPDB_-_Fastest_parallel_parser_of_Protein_Databank_data_is_written_in_Haskell.pdf|Slides]]
 
|-
 
|-
| 13:35
+
|  
 
! DIY Bookscanner everywhere
 
! DIY Bookscanner everywhere
 
| [[User:Benjamin]]
 
| [[User:Benjamin]]
Line 158: Line 123:
 
| [[media:LT-Bookscanner.pdf | Slides]]
 
| [[media:LT-Bookscanner.pdf | Slides]]
 
|-
 
|-
| 13:40
+
|  
 
! How to organize a (traveling) conference
 
! How to organize a (traveling) conference
 
| [[User:yana]], [[User:krokodilerian]]
 
| [[User:yana]], [[User:krokodilerian]]
Line 166: Line 131:
 
| [[media:LT-How2OrganizeATravelingConference.pdf|Slides]]
 
| [[media:LT-How2OrganizeATravelingConference.pdf|Slides]]
 
|-
 
|-
| 13:45
+
|  
 
! Holy $417! Watch these ordinary people encrypt their emails.
 
! Holy $417! Watch these ordinary people encrypt their emails.
 
| [[User:kinko]]
 
| [[User:kinko]]
Line 176: Line 141:
 
Kinko believes: What is in your email concerns only you and the persons you write to. Period. Even in times of NSA and Tempora surveillance programs strong crypto still works - whenever we use it. Let's build the tools to make it a breeze to use -- for everyone!
 
Kinko believes: What is in your email concerns only you and the persons you write to. Period. Even in times of NSA and Tempora surveillance programs strong crypto still works - whenever we use it. Let's build the tools to make it a breeze to use -- for everyone!
 
| [http://www.kinko.me kinko.me], [https://events.ccc.de/congress/2013/wiki/Kinko Kinko Project Page]
 
| [http://www.kinko.me kinko.me], [https://events.ccc.de/congress/2013/wiki/Kinko Kinko Project Page]
| Available afterwards
+
| [[Media:Day_2-13.45-FINAL-Holy_$417!_Watch_these_ordinary_people_encrypt_their_emails..pdf|Slides]]
 
|-
 
|-
| 13:50
+
|  
 
! Take action on digital human rights!
 
! Take action on digital human rights!
 
| [[User:Amnesty]]
 
| [[User:Amnesty]]
Line 184: Line 149:
 
| This is (as far as we know) the first time Amnesty International is present at the Chaos Communication Congress. In the past, Amnesty has been a bit hesitant to approach the issue of human rights in the digital world in a consistent manner. We at Digital@Amnesty, an evolving new task force, would like to finally change that and use the opportunity of being here to briefly introduce the concept of our work. At the same time, we want to get in touch with all those of you who feel a need to take action, and call upon other NGO's active in this field to join forces with us.  
 
| This is (as far as we know) the first time Amnesty International is present at the Chaos Communication Congress. In the past, Amnesty has been a bit hesitant to approach the issue of human rights in the digital world in a consistent manner. We at Digital@Amnesty, an evolving new task force, would like to finally change that and use the opportunity of being here to briefly introduce the concept of our work. At the same time, we want to get in touch with all those of you who feel a need to take action, and call upon other NGO's active in this field to join forces with us.  
 
| [https://events.ccc.de/congress/2013/Fahrplan/events/5539.html Day 3 Talk], [[Assembly:Amnesty_International]], [[Session:Amnesty_International_-_Take_Action_on_Digital_Human_rights]]
 
| [https://events.ccc.de/congress/2013/Fahrplan/events/5539.html Day 3 Talk], [[Assembly:Amnesty_International]], [[Session:Amnesty_International_-_Take_Action_on_Digital_Human_rights]]
| Available afterwards
+
| [[Media:Day_2-13.50-FINAL-Take_action_on_digital_human_rights!.pdf|Slides]]
 
|-
 
|-
| 13:55
+
|  
 
! Light Painting with LED Stripes
 
! Light Painting with LED Stripes
 
| [[User:bigalex]]
 
| [[User:bigalex]]
Line 192: Line 157:
 
| Light painting with LED stripes is fun! This talk presents a light painting tool based on the LightScythe by The Mechatronics Guy. Some improvements were added to provide easier setup and handling in the field, e.g. a web interface to control settings with mobile devices and on-device image preprocessing. The intention of this talk is to lure some photographers into a light painting session outside the CCH.
 
| Light painting with LED stripes is fun! This talk presents a light painting tool based on the LightScythe by The Mechatronics Guy. Some improvements were added to provide easier setup and handling in the field, e.g. a web interface to control settings with mobile devices and on-device image preprocessing. The intention of this talk is to lure some photographers into a light painting session outside the CCH.
 
| [[Session:Light_Painting_with_LED_Stripes|Self Organized Session]], [https://github.com/alxlo/LightScytheJS GitHub Page]
 
| [[Session:Light_Painting_with_LED_Stripes|Self Organized Session]], [https://github.com/alxlo/LightScytheJS GitHub Page]
| Available afterwards
+
| [[Media:LT-Day_2-13.55-Light_Painting_with_LED_Stripes_(DEMO).pdf|Slides]]
 
|-
 
|-
| 14:00
+
|  
! colspan=7 rowspan=2 | 10 MINUTE BREAK
+
! Bitford, a streaming BitTorrent client for Chrome
 +
| Astro
 +
| EN
 +
| This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading.
 +
| [https://github.com/astro/bitford GitHub], [https://chrome.google.com/webstore/detail/bitford/agjcpjkkccmhfopfciohkkfolnjbbdoh Bitford on Chrome Web Store]
 +
| N/A
 
|-
 
|-
| 14:05
+
|  
|-
+
! palava: Encrypted P2P conferences on the web
| 14:10
+
| [[User:farao]]
! rowspan="3"| Bitford, a streaming BitTorrent client for Chrome
+
| EN
| rowspan="3"|Astro
+
| palava is a complete free & open source software stack for video and audio conferences with an instance running on
| rowspan="3"|EN
+
[https://palava.tv palava.tv] - for everybody to use and hack on!
| rowspan="3"|This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading.
+
| [https://palava.tv palava.tv], [https://blog.palava.tv Blog] [https://github.com/palavatv github]
| rowspan="3"|[https://github.com/astro/bitford GitHub], [https://chrome.google.com/webstore/detail/bitford/agjcpjkkccmhfopfciohkkfolnjbbdoh Bitford on Chrome Web Store]
+
| [http://palavatv.github.io/talk-30c3-lightning/ Slides]
| rowspan="3"|Available afterwards
+
 
|-
 
|-
| 14:15
+
|  
|-
+
| 14:20
+
|-
+
| 14:25
+
 
! ScreenInvader. Social TV.
 
! ScreenInvader. Social TV.
 
| [[User: Kallaballa]]
 
| [[User: Kallaballa]]
Line 217: Line 182:
 
| Ever wished you could play media content from your laptop or smart phone on a TV set, screen or projector in just an instant? This is what ScreenInvader helps you do: browse the web, watch videos or flip through images together with your friends on a big screen with just a few simple clicks.
 
| Ever wished you could play media content from your laptop or smart phone on a TV set, screen or projector in just an instant? This is what ScreenInvader helps you do: browse the web, watch videos or flip through images together with your friends on a big screen with just a few simple clicks.
 
| [https://github.com/Metalab/Screeninvader Github], [https://screeninvader.com Main Site]
 
| [https://github.com/Metalab/Screeninvader Github], [https://screeninvader.com Main Site]
| Available afterwards
+
| [[Media:Day_2-14.25-FINAL-UPLOAD-ScreenInvader._Social_TV.pdf|Slides]]
 
|-
 
|-
| 14:30
+
|  
 
! KittenGroomer: The agnostic USB sanitizer
 
! KittenGroomer: The agnostic USB sanitizer
 
| [[User:Rafiot]]
 
| [[User:Rafiot]]
Line 227: Line 192:
 
| [[media:LT-KittenGroomer_-_The_agnostic_USB_sanitizer.pdf|Slides]]
 
| [[media:LT-KittenGroomer_-_The_agnostic_USB_sanitizer.pdf|Slides]]
 
|-
 
|-
| 14:35
+
|  
 
! A/I kaos translation! it.de
 
! A/I kaos translation! it.de
 
| [[User:hlg]]
 
| [[User:hlg]]
Line 233: Line 198:
 
| The italian tech collective and media activism group A/I has written down its history in a book. We are about to translate the book straight into german language. The talk presents the translation project and woos further contributors.
 
| The italian tech collective and media activism group A/I has written down its history in a book. We are about to translate the book straight into german language. The talk presents the translation project and woos further contributors.
 
| [http://kaostranslation.de Main Site]
 
| [http://kaostranslation.de Main Site]
| Available afterwards
+
| [[Media:LT-Day_2-14.35-kaostranslation_30c3.pdf|Slides]]
 
|-
 
|-
| 14:40
+
|  
 
! Why is anything the way it is?
 
! Why is anything the way it is?
 
| [[User:Srinivas]]
 
| [[User:Srinivas]]
Line 241: Line 206:
 
| Before we change how our societies work, shouldn't we first understand how they actually work? Those who benefit from the structure of the present system seek to limit public comprehension of the social system. Let's use the tools we used to understand physical systems to understand, and then to change how our social systems work.
 
| Before we change how our societies work, shouldn't we first understand how they actually work? Those who benefit from the structure of the present system seek to limit public comprehension of the social system. Let's use the tools we used to understand physical systems to understand, and then to change how our social systems work.
 
| [http://srinivas.gs srinivas.gs]
 
| [http://srinivas.gs srinivas.gs]
| Available afterwards
+
| [[Media:LT-Day_2-14.40-FINAL-Why_is_anything_the_way_it_is.pdf|Slides]]
 
|-
 
|-
| 14:45
+
|  
 
! GNU Naming System Key Exchange Party @ 30C3
 
! GNU Naming System Key Exchange Party @ 30C3
 
| [[User:docmalloc]]
 
| [[User:docmalloc]]
Line 250: Line 215:
 
| [https://gnunet.org/gns GNS project page], [http://youbroketheinternet.org/ You broke the internet!]
 
| [https://gnunet.org/gns GNS project page], [http://youbroketheinternet.org/ You broke the internet!]
 
| [[media:GNU_Naming_System_Key_Exchange_Party_at_30C3.pdf | Slides]]
 
| [[media:GNU_Naming_System_Key_Exchange_Party_at_30C3.pdf | Slides]]
 +
|-
 
|}
 
|}
  
== [https://events.ccc.de/congress/2013/Fahrplan/events/5563.html Day 3 - 12:45 in Saal G] ==
+
== Day 3 ==
 +
* [http://live.berlin.voc.media.ccc.de/tests/podlove/lt3.html Click here to jump to the LT you want! (powered by Shownot.es + VOC)]
 +
* Pad with timestamps: https://c3notes.grus.uberspace.de/doc/lt-day3
 +
* http://cdn.media.ccc.de/congress/2013/mp4/30c3-5563-en-de-Lightning_Talks_Day_3_h264-hq.mp4
 +
* https://www.youtube.com/watch?v=97bwN2U9SIQ
  
 
{| class="table"
 
{| class="table"
 
|-
 
|-
! Time
+
! HH:MM
 
! Title
 
! Title
 
! Presenter
 
! Presenter
Line 264: Line 234:
 
! Slides
 
! Slides
 
|-
 
|-
| 12:45
+
|  
! How to give a good Lightning Talk
+
! HOPE X in NYC
| [[User:Nickfarr | Nick Farr]]
+
| [[User:mlc | mlc]]
 
| EN
 
| EN
| This is a brief Lightning Talk explaining the basics of how the Lightning Talks work.
+
| Why you should come to HOPE X in New York City July 18-20
| [http://en.wikipedia.org/wiki/Lightning_talk Lightning Talks on Wikipedia]
+
| [http://x.hope.net/ Website]
| Available soon
+
| [https://www.dropbox.com/s/iau24vy88kas562/Day%203-12.45-Come%20to%20the%20HOPE%20conference.pdf Slides]
 
|-
 
|-
| 12:50
+
|
 
! uProxy
 
! uProxy
 
| [[User:keroserene]]
 
| [[User:keroserene]]
Line 281: Line 251:
 
Let's chat about the most relevant aspects of what uProxy does and does not do, and more.
 
Let's chat about the most relevant aspects of what uProxy does and does not do, and more.
 
| [http://uproxy.org uproxy.org]
 
| [http://uproxy.org uproxy.org]
| Available afterwards
+
| [[Media:LT-Day 3-12.50-uProxy.pdf|Slides]]
 
|-
 
|-
| 12:55
+
|  
 
! cctvmap - mapping the surveillance
 
! cctvmap - mapping the surveillance
 
| [[User:dp]]
 
| [[User:dp]]
Line 289: Line 259:
 
| Let's build a wiki map for people to collect with an android app the surveillance in your neighborhood
 
| Let's build a wiki map for people to collect with an android app the surveillance in your neighborhood
 
| [http://stadtpolitik.org/cctvmap/ Alpha map version], [http://cctvmap.org cctvmap.org, coming soon], [[Projects:Cctvmap]]
 
| [http://stadtpolitik.org/cctvmap/ Alpha map version], [http://cctvmap.org cctvmap.org, coming soon], [[Projects:Cctvmap]]
| Available afterwards
+
| [[Media:LT-Day 3-12.55-cctvmap - mapping the surveillance.pdf|Slides]]
 
|-
 
|-
| 13:00
+
|  
 
! rpi smartMetering -  how raspberry pis and nerds will save the world
 
! rpi smartMetering -  how raspberry pis and nerds will save the world
 
| [[User:docjoe]]
 
| [[User:docjoe]]
Line 299: Line 269:
 
| [[media:Rpi smartMetering -  how raspberry pis and nerds will save the world.pdf|Slides]]
 
| [[media:Rpi smartMetering -  how raspberry pis and nerds will save the world.pdf|Slides]]
 
|-
 
|-
| 13:05
+
|  
 
! r0ket-based wireless keyboard sniffing
 
! r0ket-based wireless keyboard sniffing
 
| [[User:Sec]]
 
| [[User:Sec]]
Line 305: Line 275:
 
| Playing around with the nrf24l01p, the rf chip of the r0ket which is also used by the MS wireless keyboard.
 
| Playing around with the nrf24l01p, the rf chip of the r0ket which is also used by the MS wireless keyboard.
 
| [http://r0ket.de/ r0ket.de], [https://github.com/r0ket/r0ket r0ket GitHub]
 
| [http://r0ket.de/ r0ket.de], [https://github.com/r0ket/r0ket r0ket GitHub]
| Available afterwards
+
| [https://www.dropbox.com/s/0nsoqnojxy0qh2t/Day%203-13.05-r0ket-based%20wireless%20keyboard%20sniffing.pdf Slides]
 
|-
 
|-
| 13:10
+
|  
 
! How can regulators and hackers cooperate to strengthen Internet privacy?
 
! How can regulators and hackers cooperate to strengthen Internet privacy?
 
| [[User:Achim]]
 
| [[User:Achim]]
Line 315: Line 285:
 
| [[media:LT-How_can_regulators_and_hackers_cooperate_to_strengthen_Internet_privacy.pdf | Slides]]
 
| [[media:LT-How_can_regulators_and_hackers_cooperate_to_strengthen_Internet_privacy.pdf | Slides]]
 
|-
 
|-
| 13:15
+
|  
! NymRights and NymWrongs
+
! Hacker Culture Noise Cancellation
| [[User:aestetix]]
+
| [[User:Stitch]]
 
| EN
 
| EN
| This talk will be a brief introduction to the world of names and nyms-- pseudonyms, polynyms, anonyms, and more! We'll cover some fundamentals of how names work and why, and then explore the challenges we're encountering as we try to bring name-related systems into technology. We'll also take a look at the National Strategy for Trusted Identities in Cyberspace, a US-government group tasked with solving many of today's challenges, and see how they are doing.
+
| Dare to look at yourself differently, this can be fun, confronting and educational.
| [http://www.nymrights.org nymrights.org]
+
|
| Available afterwards
+
| [[Media:LT-Day 3-13.15-30c3 noise cancellation.pdf|Slides]]
 
|-
 
|-
| 13:20
+
|  
 
! Firebird/interbase database engine hacks or RTFM
 
! Firebird/interbase database engine hacks or RTFM
 
| [[User:Gifts]]
 
| [[User:Gifts]]
Line 329: Line 299:
 
| Couple techniques to exploit remote command execution in Firebird with exposed port
 
| Couple techniques to exploit remote command execution in Firebird with exposed port
 
|  
 
|  
| Available afterwards
+
| [https://www.dropbox.com/s/hkc2z7da29ovzzg/Day%203-13.20-Firebird-interbase%20database%20engine%20hacks%20or%20RTFM.pdf Slides]
 
|-
 
|-
| 13:25
+
|  
 
! So I discovered that my HP laptop…broadcasts
 
! So I discovered that my HP laptop…broadcasts
 
| [[User:Shinji]]
 
| [[User:Shinji]]
Line 337: Line 307:
 
| We took a look at some HP Elitebooks
 
| We took a look at some HP Elitebooks
 
|
 
|
| Available afterwards
+
| [https://www.dropbox.com/s/xj8yzhpjgqlbr38/Day%203-13.25-FINAL-So%20I%20discovered%20that%20my%20HP%20laptop%E2%80%A6broadcasts.pdf Slides]
 
|-
 
|-
| 13:30
+
|  
 
! Einigkeit für Recht und Freiheit - Für eine gemeinsame Bewegung gegen Überwachung
 
! Einigkeit für Recht und Freiheit - Für eine gemeinsame Bewegung gegen Überwachung
 
| [[User:Ramses]]
 
| [[User:Ramses]]
Line 347: Line 317:
 
| [[media:LT-Einigkeit_für_Recht_und_Freiheit_-_Für_eine_gemeinsame_Bewegung_gegen_Überwachung.pdf|Slides]]
 
| [[media:LT-Einigkeit_für_Recht_und_Freiheit_-_Für_eine_gemeinsame_Bewegung_gegen_Überwachung.pdf|Slides]]
 
|-
 
|-
| 13:35
+
|  
 
! Open Source Redaktion
 
! Open Source Redaktion
 
| [[User:Pingunine]]
 
| [[User:Pingunine]]
Line 355: Line 325:
 
| [[media:LT-Open_Source_Redaktion.pdf | Slides]]
 
| [[media:LT-Open_Source_Redaktion.pdf | Slides]]
 
|-
 
|-
| 13:40
+
|  
 
! 3D printer & Art: More Than Just a Tool
 
! 3D printer & Art: More Than Just a Tool
 
| [[User:Obelix]]
 
| [[User:Obelix]]
Line 361: Line 331:
 
| Some ideas and examples on how to make art with a 3D printer/scanner where the printer/scanner is more than a simple tool for creating objects. Because of the unique possibilities and characteristics the 3d printer becomes itself part of the artwork it is creating.
 
| Some ideas and examples on how to make art with a 3D printer/scanner where the printer/scanner is more than a simple tool for creating objects. Because of the unique possibilities and characteristics the 3d printer becomes itself part of the artwork it is creating.
 
| [http://5th.moscowbiennale.ru/en/program/special_projects/bits_to_pieces.html Example project: Exhibition in Moscow]
 
| [http://5th.moscowbiennale.ru/en/program/special_projects/bits_to_pieces.html Example project: Exhibition in Moscow]
| Available afterwards
+
| [https://www.dropbox.com/s/vf06wbltczet9a7/Day%203-13.40-FINAL-3D%20printer%20%26%20Art%3A%20More%20Than%20Just%20a%20Tool.pdf Slides]
 
|-
 
|-
| 13:45
+
|  
! rowspan="3"| How the American legislative process has failed everyone but the rich
+
! Fenrir: Transport, Encryption & Authentication
| rowspan="3"|[[User:Valkyrie]]
+
| [[User:Luker]]
| rowspan="3"|EN
+
| EN
| rowspan="3"|After a dramatic event that shook the hacker community in January, I began a quest to change draconian computer laws. In our effort to bring the bring the hacker community together, I encountered surprising obstacles. In this talk, I will cover the obstacles that we encountered and will briefly cover ideas that we've put together to address some of these obstacles.
+
| Fenrir is a UDP-based transport protocol which combines ideas from SCTP, QUIC and other protocols, adds encryption (not based on SSL), uses DNSSEC for trust and pubkey management, implements federated authentication and much more.
| rowspan="3"|[http://forkthelaw.org forkthelaw.org]
+
| [https://fenrirproject.org fenrirproject.org]
| rowspan="3"|Available afterwards
+
| [[Media:LT-Day 3-14.10-FINAL-Fenrir-Transport, Encryption + Authentication.pdf|Slides]]
 
|-
 
|-
| 13:50
+
|  
 +
! Unboxing the Fairphone
 +
| [[User:henk]]
 +
| EN
 +
| We will unbox one of the first fairphones, a seriously cool smartphone that puts social values first, based on open design principles/fairtech.
 +
| [http://www.fairphone.com fairphone.com]
 +
| [[media:LT-Fairphone_presentation_30c3.pdf|Slides]]
 
|-
 
|-
| 13:55
 
|-
 
| 14:00
 
! colspan=6 rowspan=2 | 10 MINUTE BREAK
 
|-
 
| 14:05
 
|-
 
| 14:10
 
! rowspan="3"|Fenrir: Transport, Encryption & Authentication
 
| rowspan="3"|[[User:Luker]]
 
| rowspan="3"|EN
 
| rowspan="3"|Fenrir is a UDP-based transport protocol which combines ideas from SCTP, QUIC and other protocols, adds encryption (not based on SSL), uses DNSSEC for trust and pubkey management, implements federated authentication and much more.
 
| rowspan="3"|[https://fenrirproject.org fenrirproject.org]
 
| rowspan="3"|Available afterwards
 
|-
 
| 14:15
 
|-
 
| 14:20
 
|-
 
| 14:25
 
! rowspan="3"| "What the fox say?"
 
| rowspan="3"| gmc
 
| rowspan="3"| EN
 
| rowspan="3"| After a number of death threats, a direct and public call to commit suicide and lots of abuse I have reached a point where I will no longer stand for bullies who believe I am evil because of my employment with Fox-IT. In this short presentation I will give insight into what my work actually is, what other work we do and why this is not evil or against my hacker ideals.
 
| rowspan="3"|
 
| rowspan="3"| Available afterwards
 
|-
 
| 14:30
 
|-
 
| 14:35
 
|-
 
| 14:40
 
! Necessary Introduction to SQL injection attacks
 
| [[User:arnim]]
 
| EN
 
| Necessary background on SQL injection attacks to make following presentation more relevant for not-so-techie types.
 
 
|
 
|
| Available afterwards
 
|-
 
| 14:45
 
 
! Maximizing the speed of time based SQL injection data retrival
 
! Maximizing the speed of time based SQL injection data retrival
 
| [[User:arnim]]
 
| [[User:arnim]]
Line 418: Line 355:
 
| This talk features several new ideas on how to speed up data retrieval using time based blind SQL injection (SQLi). It's important to realize the difference between boolean based SQLi and time base SQLi. and why the later has more in common with “What's My Line?” aka “Heiteres Beruferaten” than binary search. Just applying this knowledge to sqlmap resulted in a speed increase of 20% with a patch of 10 lines of code. Password hashes can be retrieved even faster by narrowing down to hex-digits.
 
| This talk features several new ideas on how to speed up data retrieval using time based blind SQL injection (SQLi). It's important to realize the difference between boolean based SQLi and time base SQLi. and why the later has more in common with “What's My Line?” aka “Heiteres Beruferaten” than binary search. Just applying this knowledge to sqlmap resulted in a speed increase of 20% with a patch of 10 lines of code. Password hashes can be retrieved even faster by narrowing down to hex-digits.
 
| (Some presented ideas will go into [http://sqlmap.org sqlmap.org])
 
| (Some presented ideas will go into [http://sqlmap.org sqlmap.org])
| Available afterwards
+
| [[Media:LT-Speeding_up_time_based_blind_sqli_30c3.pdf|Slides]]
 
|-
 
|-
| 14:50
+
|  
 +
! pribook.com: The most easiest way to encrypted communication
 +
| [[User:Finn]]
 +
| EN
 +
| Most people fail to establish secure communications. Therefore pribook.com is an approach to gain asymmetric encryption from user to user, without the need for installing a program or store keys. It is a social network service with build-in RSA encryption which is executed in the web browser. In this lightning talk I will give a brief summit to gain attraction for our self-organized-session. We are looking forward to find some people who want to join us, to start this idea as a non-profit open-source project.
 +
| [http://pribook.com pribook.com], [[Session:Pribook.com_-_the_most_easiest_way_for_encrypted_communication|Self Organized Assembly]]
 +
| [[Media:LT-Day_3-14.40-pribook.com-_The_most_easiest_way_to_encrypted_communication.pdf|Slides]]
 +
|-
 +
|
 +
! DetecTor.IO
 +
| [[User:Kaie]]
 +
| EN
 +
| DetecTor is an open source project to implement client side SSL/TLS MITM detection, compromised CA detection and server impersonation detection, by making use of the Tor network.
 +
| [http://detector.io/ detector.io]
 +
| [[Media:LT-Day 3-14.45-DetecTor.IO.pdf|Slides]]
 +
|-
 +
|
 +
! "Yeah, it looks nice... but why are you doing this?" or "Why Demo Coding?"
 +
| [[User:SvOlli]]
 +
| EN
 +
| Showing a friend of mine a demo I was working on, I got the question: "Yeah, it looks nice... but why are you doing this?". I'll try to find at least three different answers in five minutes.
 +
| [[Projects:Atari_2600_VCS_hacking|Atari 2600 VCS Hacking]]
 +
| [[Media:LT-Day 3-14.50-FINAL-"Yeah, it looks nice... but why are you doing this?" or "Why Demo Coding?".pdf|Slides]]
 +
|-
 +
|
 
! PHDays Labyrinth: The Hacker Disneyland
 
! PHDays Labyrinth: The Hacker Disneyland
 
| Yuri Goltsev
 
| Yuri Goltsev
Line 428: Line 389:
 
| Available afterwards
 
| Available afterwards
 
|-
 
|-
| 15:00
+
|  
! Associated Whistle-Blowing Press: First release of files
+
! Associated Whistle-Blowing Press: First release of files
 
| [[User:hieroph4nt]]
 
| [[User:hieroph4nt]]
 
| EN
 
| EN
Line 437: Line 398:
 
|}
 
|}
  
== [https://events.ccc.de/congress/2013/Fahrplan/events/5564.html Day 4 - 12:45 in Saal G] ==
+
== Day 4 ==
 
+
* [http://live.berlin.voc.media.ccc.de/tests/podlove/lt4.html Click here to jump to the LT you want! (powered by Shownot.es + VOC)]
 +
* Pad with timestamps: https://c3notes.grus.uberspace.de/doc/lt-day4
 +
* http://cdn.media.ccc.de/congress/2013/mp4/30c3-5564-en-de-Lightning_Talks_Day_4_h264-hq.mp4
 +
* https://www.youtube.com/watch?v=wlanbPyceeU
 
{| class="table"
 
{| class="table"
 
|-
 
|-
! Time
+
! HH:MM
 
! Title
 
! Title
 
! Presenter
 
! Presenter
Line 449: Line 413:
 
! Slides
 
! Slides
 
|-
 
|-
| 12:45
+
|  
! Come to HOPE X
+
! DHCXSSP
| [[User:Nickfarr | Maltman23]]
+
| [[User:momorientes]]
 +
| EN
 +
| I'll show you how to break webinterfaces of multiple (enterprise) access points using dhcp as my only tool.
 +
| [http://dl.ubnt.com/unifi/static/cve-2013-3572.html Pwnage]
 +
| [[Media:LT-DHCXSSP.pdf|Slides]]
 +
|-
 +
|
 +
! Email encryption for the masses
 +
| [[User:ciphersheep]]
 
| EN
 
| EN
| A preview of HOPE X, taking place in New York City from July 18-20
+
| Encrypted email has been around for ages, but most people still don't use it. One problem is that Google, Microsoft, Yahoo, and others want to keep mining your inbox for juicy data, and are thus not interested in pushing proper email encryption. Another important problem is that current solutions are difficult to use. We will look at how get email encryption ready for the masses.
| [http://x.hope.net x.hope.net]
+
| [http://www.secuso.informatik.tu-darmstadt.de/en/staff/arne-renkema-padmos TU Darmstadt Staff Page]
| Available soon
+
| [[Media:LT-Email encryption for the masses.pdf|Slides (final)]]
 
|-
 
|-
 
! colspan=7 | 180 SECOND EXPRESS ROUND BEGIN!
 
! colspan=7 | 180 SECOND EXPRESS ROUND BEGIN!
 
|-
 
|-
| 12:48
+
|  
 +
! The Free Software Song
 +
| [[User:mquintus]]
 +
| EN
 +
| Abstract: Join us now and share the software; You’ll be free, hackers, you’ll be free. Join us now and share the software; You’ll be free, hackers, you’ll be free.
 +
| [[Session:Free_Software_Song|Free Software Song Session]], [https://www.youtube.com/watch?v=9sJUDx7iEJw YouTube Link], [https://www.gnu.org/music/free-software-song.html gnu.org]
 +
| [[Media:LT-Free_Software_Song.pdf|Slides]]
 +
|-
 +
|
 
! BalCCon 2k14
 
! BalCCon 2k14
 
| [[User:jelena]]
 
| [[User:jelena]]
Line 467: Line 447:
 
| [[media:LT-BalCCon_2k14.pdf|Slides]]
 
| [[media:LT-BalCCon_2k14.pdf|Slides]]
 
|-
 
|-
| 12:51
+
|  
 
! The freedom of total control?
 
! The freedom of total control?
 
| [[User:Nakaha]]
 
| [[User:Nakaha]]
Line 473: Line 453:
 
| Never before in history surveillance of public and private space and thoughts was so comprehensive like nowadays but oddly enough never before people cared less about being surveilled. I want to introduce a provocative idea that might explain this observation: total control leads to total freedom. I hope that further discussion may result in a better understanding of public ignorance and in better ways to mobilize people against their surveillance.
 
| Never before in history surveillance of public and private space and thoughts was so comprehensive like nowadays but oddly enough never before people cared less about being surveilled. I want to introduce a provocative idea that might explain this observation: total control leads to total freedom. I hope that further discussion may result in a better understanding of public ignorance and in better ways to mobilize people against their surveillance.
 
|
 
|
| Available afterwards
+
| [[Media:LT-The freedom of total control.pdf|Slides]]
 
|-
 
|-
| 12:54
+
|  
! Octoprint: a RPi printserver
+
! Octoprint: An RPi printserver for 3D printers
 
| [[User:obelix]]
 
| [[User:obelix]]
 
| EN
 
| EN
| Octoprint gives you a web-based control and monitor interface for your 3d printer. You're sitting on the couch too lazy to get up? Use Ocotprint with a mobile device over WiFi...
+
| Octoprint gives you a web-based control and monitor interface for your 3d printer. You're sitting on the couch too lazy to get up? Use Octoprint with a mobile device over WiFi...
 
| [http://octoprint.org/ octoprint.org]
 
| [http://octoprint.org/ octoprint.org]
| Available afterwards (not submitted yet)
+
| [[Media:LT-Octoprint-_a_RPi_printserver_for_3d_printers.pdf|Slides]]
 
|-
 
|-
| 12:57
+
|  
!  
+
! How to Write an Open Textbook over a Weekend
|
+
| [[User:JoonasD6]]
|
+
| EN
|
+
| A group of Finnish mathematics enthuasiasts hooked together a year ago write a Creative Commons high school textbook over a weekend. The concept was a success and has since extended into a charming project where we've begun to set our sights into writing all the necessary school books - freely available for everyone to use, modify and distribute. Wanna know how it worked? Wanna duplicate our textbook hackathon in your country? Here's how.
|
+
| [https://creativecommons.org/weblog/entry/34643 Creative Commons Blog], [https://www.facebook.com/oppikirjamaraton oppikirjamaraton on Facebook], [http://avoimetoppimateriaalit.fi/ Finnish Link]
|
+
| [[media:LT-How_to_Write_an_Open_Textbook_over_a_Weekend.pdf | Slides]]
 
|-
 
|-
| 13:00
+
|  
!  
+
! MSH (MPI-Shell)
|
+
| [[User:SreeTotakura]]
|
+
| EN
|
+
| MSH is a project for providing remote access between nodes of high performance computing systems where SSH is often unavailable or restricted by the administrators.
|
+
| [https://gnunet.org/svn/msh/doc/msh.pdf MSH Documentation],
|
+
| [[Media:LT-MSH_(MPI-Shell).pdf|Slides]]
 
|-
 
|-
| 13:03
+
|  
!  
+
! Foundation of the European Pirate Party (PPEU)
|
+
| [[User:Zombb]]
|
+
| EN
|
+
| Purpose, agenda and foundation process of the PPEU
|
+
| [http://ppeu.net/ ppeu.net]
|
+
| [[media:LT-Day_4-13.18-FINAL-Foundation_of_the_European_Pirate_Party_(PPEU).pdf | Slides]]
 
|-
 
|-
| 13:06
+
|  
!  
+
! cape: Component Architecture for Python Environments
|
+
| [[User:riot]]
|
+
| EN
|
+
| A flashtalk about Hackerfleet's cape project, which is an opensource, component-based and flow oriented architecture for Python programmers.
|
+
| [irc://freenode.org/#hackerfleet IRC], [https://hackerfleet.org/dev Trac]
|
+
| [[Media:LT-Cape-Component_Architecture_for_Python_Environments.pdf|Slides]]
 
|-
 
|-
| 13:09
+
|  
 
+
! $417 Appens
!  
+
| [[User:Johnjohndoe]]
|
+
| EN
|
+
| The $417 Appens project aims to track the state of restrooms. Our goal is to instantly see which toilet is used, and which is free. Is the toilet paper nearly gone? Send a push message to the responsible person. Three toilets - which toilet is the most visited toilet? What is the average toilet time? How much cost a toilet visit? Any many more statistics.
|
+
| [http://github.com/johnjohndoe/ShitAppensAndroid github]
|
+
| [https://www.dropbox.com/s/5qy8s7gu2e69md5/Day%204-13.24-ShitAppens-30c3-v2.pdf Slides]
|
+
 
|-
 
|-
| 13:12
+
|  
!  
+
! Hacking your car dashboard LCD
|
+
| [[User:derpston]]
|
+
| EN
|
+
| Taking control of the general purpose LCD on your car dashboard - reverse engineering, decoding existing data, generating new data, tidying it up into a reusable package for others.
|
+
| [https://github.com/derpston/Audi-radio-DIS-reader Audi radio DIS reader github], [https://github.com/derpston/linux-rpi-audi-dis Linux RPI Audi DIS github]
|
+
| [https://www.dropbox.com/s/r5lnl85jor36j74/Day%204-13.27-Hacking%20your%20car%20dashboard%20LCD.pdf Slides]
 
|-
 
|-
| 13:15
+
|  
!  
+
! Fairnopoly: The online marketplace for all.
|
+
| [[User:Tschakki]]
|
+
| DE
|
+
| As a social enterprise Fairnopoly want a fair alternative to the  existing major online marketplaces offer. Our Marketplace virtually any kind of articles and services offered be. Fairnopoly is organized as a cooperative and is characterized thanks to three core elements:
|
+
# A Fair business model
|
+
# The promotion of responsible consumption
 +
# A contribution to the fight against corruption
 +
| [https://www.fairnopoly.de Marketplace], [http://info.fairnopoly.de Blog], [https://github.com/fairnopoly github], [http://www.startnext.de/fairnopoly2 Current crowdfunding campaign]
 +
| [https://www.dropbox.com/s/8jsdlgp627fhhj9/Day%204-13.30-Fairnopoly%20-%20The%20online%20marketplace%20for%20all.pdf Slides]
 
|-
 
|-
| 13:18
+
|  
!
+
! Hvernig gengur Islandi Tvo (What's the status Iceland 2)
|
+
| [[user:w03]]
|
+
| EN
|
+
| It's been one year since we last looked at the situation in Iceland, some things have changed some things have gotten better, some worse, come hear the truth or a close approximation to it.
|
+
 
|
 
|
 +
| [[media:LT-Day_4-13.25-Hvernig_Gengur_a_Islandi_Tvo.pdf|Slides]]
 
|-
 
|-
| 13:21
+
|  
!  
+
! Source: Internet? There must be a better way
|
+
| Leena Simon
|
+
| EN
|
+
| Imagine you could take an image licensed under an open license such as Creative Commons, insert it into your work, and have attribution and license information be automatically included in your work. This would save you from having to keep track of this information yourself, to make using openly licensed works as easy as publishing them.
|
+
| [http://www.commonsmachinery.se Commons Machinery]
|
+
| [https://www.dropbox.com/s/49drxtnu3a2o12i/Day%204-13.36-Source%20Internet%20Commmons%20Machinery.odp Slides]
 
|-
 
|-
| 13:24
+
|  
!  
+
! Easy PGP Key Sharing
|
+
| [[user:bnvk]]
|
+
| EN
|
+
| The sharing of public keys is hard, verifying them is even harder- especially for average people. The goal is to make the process as easy exchanging business cards or sending a friend requests on Facebook. Utilizing PGP fingerprints and QR codes we may propose a simple and elegant solution!
|
+
| [https://mailpile.is mailpile.is]
|
+
| [https://brennannovak.com/uploads/files/easy-key-sharing.pdf Slides]
 
|-
 
|-
| 13:27
+
|  
!
+
! So you want to write a Tor pluggable transport
|
+
| N/A
|
+
| EN
|
+
| How to get started writing censorship-resistant transports for Tor.
|
+
| [https://www.torproject.org/docs/pluggable-transports Pluggable transports home page], [https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports Tor wiki page]
|
+
| [[Media:LT-Tor Pluggable.pdf|Slides]]
 +
|-
 +
|
 +
! Umweltzone / Low emission zone
 +
| [[User:Johnjohndoe]]
 +
| EN
 +
| The Umweltzone app for Android allows to look up the actual position and path of the low emission zone for individual cities. The open source project uses data published by the government as well as crowdsourced OpenStreetMap data. The app is published in German in the current version 1.1.0 but will be localized soon.
 +
| [http://bitbucket.org/tbsprs/umweltzone Umweltzone]
 +
| [https://www.dropbox.com/s/yh06oqb4orl45cv/Day%204-13.45-Umweltzone.pdf Slides]
 +
|-
 +
|
 +
! CONFidence Introduction
 +
| [[User:Jabss]]
 +
| EN
 +
| An introduction and invitation to a CONFidence Conference held annually in Krakow.
 +
| [http://www.confidence.org.pl CONFidence]
 +
| [https://www.dropbox.com/s/28w7e7jawn6reuf/Day%204-13%3A51-CONFidence%20Introduction.pdf Slides]
 
|-
 
|-
 
! colspan=7 | 180 SECOND EXPRESS ROUND END!
 
! colspan=7 | 180 SECOND EXPRESS ROUND END!
 
|-
 
|-
| 13:30
+
|  
! colspan=7 rowspan=2 | 10 MINUTE BREAK
+
! Awesome Retro: Retrogaming Community and your Donations
 +
| [[User:Stitch]]
 +
| EN
 +
| Looking what the Awesome Retro community does and how you can help.
 +
| [http://www.awesomeretro.com Awesome Retro Dot Com]
 +
| [https://www.dropbox.com/s/3bylmss9byeh2os/Day%204-14.00-Awesome%20Retro%20-%20Retrogaming%20Community%20and%20your%20Donations.pdf Slides]
 
|-
 
|-
| 14:05
+
|  
 +
! P.O.S.T.: Physical Objects Sneaker Transport
 +
| [[user:inj4n]]
 +
| EN
 +
| I will present an ongoing project to establish digital support for crowd-based transportation of physical objects on co-presence networks. The project applies communication network protocols to the world of physical objects, essentially creating anonymous, hard to censor transportation.
 +
| [http://www.wiwi.uni-siegen.de/itsec/lehre/ws-1314/ws13-post-project/index.html?lang=de P.O.S.T. Project]
 +
| [[Media:2013-30c3-LT-Physical-Objects-Sneaker-Transport.pdf|Slides]]
 +
|-
 +
|
 +
! Iteratees in C
 +
| [[User:Pesco]]
 +
| EN
 +
| "Iteratee I/O" is a concept for structuring the processing of data streams in a fashion that makes it modular, cleanly composable, and amenable to reasoning while not significantly impacting. As such it helps program robustness and security.
 +
 
 +
 
 +
I present an early proof-of-concept for implementing iteratee I/O in C. This is somewhat complicated by limited support for working with functions as first-class objects.
 +
 
 +
A successful full-scale implementation would open the technique to a wide range of security-critical code.
 +
| [http://code.khjk.org/citer/ POC repo]
 +
| [[Media:LT-Iteratees in C.pdf|Slides]]
 
|-
 
|-
| 14:10
+
|  
 
! tor2tcp
 
! tor2tcp
 
| [[User:mzeltner]]
 
| [[User:mzeltner]]
Line 585: Line 607:
 
|  or … <erno> hm. I've lost a machine.. literally _lost_. it responds to ping, it works completely, I just can't figure out where in my apartment it is.
 
|  or … <erno> hm. I've lost a machine.. literally _lost_. it responds to ping, it works completely, I just can't figure out where in my apartment it is.
 
| [https://poum.niij.org/ poum.niij.org]
 
| [https://poum.niij.org/ poum.niij.org]
| Available afterwards
+
| [[Media:LT-tor2tcp.pdf|Slides]]
 
|-
 
|-
| 14:15
+
|  
 
! Bitcoinproof: Digital notary, secured by the bitcoin network
 
! Bitcoinproof: Digital notary, secured by the bitcoin network
 
| [[User:vog]]
 
| [[User:vog]]
Line 593: Line 615:
 
| Bitcoinproof creates a forgery-proof timestamp for your data, secured by the bitcoin network. This enables you to prove that a certain event happened before a certain point in time, without trusting any central authority. So you can use the bitcoin network as a digital notary service!
 
| Bitcoinproof creates a forgery-proof timestamp for your data, secured by the bitcoin network. This enables you to prove that a certain event happened before a certain point in time, without trusting any central authority. So you can use the bitcoin network as a digital notary service!
 
| [http://vog.github.io/bitcoinproof/ Bitcoinproof demo page]
 
| [http://vog.github.io/bitcoinproof/ Bitcoinproof demo page]
| Available afterwards
+
| [[Media:LT-Bitcoinproof-Digital_notary,_secured_by_the_bitcoin_network.pdf|Slides]]
 
|-
 
|-
| 14:20
+
|  
 
! Teckids: Why children need an open source community
 
! Teckids: Why children need an open source community
 
| [[User:Natureshadow]]
 
| [[User:Natureshadow]]
Line 601: Line 623:
 
| Community projects settled around free standards, privacy and security have been taking rapid movement throughout the last years. But why is it also important to bring this movement to kids and teenagers?
 
| Community projects settled around free standards, privacy and security have been taking rapid movement throughout the last years. But why is it also important to bring this movement to kids and teenagers?
 
| [https://www.teckids.org teckids.org], [[Assembly:Teckids]]
 
| [https://www.teckids.org teckids.org], [[Assembly:Teckids]]
| Available afterwards
+
| [https://www.dropbox.com/s/q94sy829pxi8onz/Day%204-14.25-Teckids-Why%20children%20need%20an%20open%20source%20community.pdf Slides]
 
|-
 
|-
| 14:25
+
|  
 
! bettercrypto.org: The definitive guide to applied crypto hardening
 
! bettercrypto.org: The definitive guide to applied crypto hardening
 
| [[User:MacLemon]]
 
| [[User:MacLemon]]
Line 609: Line 631:
 
| Deploying good crypto correctly is complex. This guide gives you all the details you want and the config to copy/paste. It's creation process is completely transparent and the the contents are heavily peer reviewed by experts in the field.
 
| Deploying good crypto correctly is complex. This guide gives you all the details you want and the config to copy/paste. It's creation process is completely transparent and the the contents are heavily peer reviewed by experts in the field.
 
| [https://bettercrypto.org/ bettercrypto.org], [[Projects:Applied_Crypto_Hardening|30c3 Project Page]]
 
| [https://bettercrypto.org/ bettercrypto.org], [[Projects:Applied_Crypto_Hardening|30c3 Project Page]]
| [https://bettercrypto.org/static/bettercrypto.org_30C3_Lightningtalk.pdf Slides]
+
| [[Media:LT-bettercrypto.org_The_definitive_guide_to_applied_crypto_hardening.pdf|Slides]]
 
|-
 
|-
| 14:30
+
|  
 
! NSA-like Surveillance by a Third World Country
 
! NSA-like Surveillance by a Third World Country
 
| [[User:musalbas]]
 
| [[User:musalbas]]
Line 619: Line 641:
 
| [[media:LT-NSA-like_Surveillance_by_a_Third_World_Country.pdf|Slides]]
 
| [[media:LT-NSA-like_Surveillance_by_a_Third_World_Country.pdf|Slides]]
 
|-
 
|-
| 14:35
+
|  
! "Yeah, it looks nice... but why are you doing this?" or "Why Demo Coding?"
+
! sharingsecrets: a tool for sharing and distributing passwords
| [[User:SvOlli]]
+
| someName
 
| EN
 
| EN
| Showing a friend of mine a demo I was working on, I got the question: "Yeah, it looks nice... but why are you doing this?". I'll try to find at least three different answers in five minutes.
+
| A call for paticipation for further development of a passwordmanager, which allows to share and distribute passwords
| [[Projects:Atari_2600_VCS_hacking|Atari 2600 VCS Hacking]]
+
| [http://sharing-secrets.de/ Website]
| [[media:LT-"Yeah,_it_looks_nice..._but_why_are_you_doing_this?"_or_"Why_Demo_Coding?".pdf|Slides]]
+
| [[media:LT-Day_4-13.25-sharingsecrets_a_tool_for_sharing_and_distributing_passwords.pdf|Slides]]
 
|-
 
|-
| 14:40
+
|  
 
! ddserver: A server-side dynamic DNS service
 
! ddserver: A server-side dynamic DNS service
 
| [[User:Major]]
 
| [[User:Major]]
Line 633: Line 655:
 
| ddserver is a server-side application for dynamic DNS management. It allows you to specify hostnames (subdomains) inside a dynamic DNS zone, and to update the IP address of those hostnames using a dynamic update protocol (no-ip protocol). This enables you to access hosts with dynamic IP addresses by a static domain name, even if the IP address changes.
 
| ddserver is a server-side application for dynamic DNS management. It allows you to specify hostnames (subdomains) inside a dynamic DNS zone, and to update the IP address of those hostnames using a dynamic update protocol (no-ip protocol). This enables you to access hosts with dynamic IP addresses by a static domain name, even if the IP address changes.
 
| [http://ddserver.0x80.io ddserver]
 
| [http://ddserver.0x80.io ddserver]
| Available afterwards
+
| [[Media:LT-ddserver-A_server-side_dynamic_DNS_service.pdf|Slides]]
 +
|-
 +
|
 +
| The Legislative Process: How It Is Failing Everyone But the Rich
 +
|[[User:Valkyrie]]
 +
|EN
 +
|After a dramatic event that shook the hacker community in January, I began a quest to change draconian computer laws. In our effort to bring the bring the hacker community together, I encountered surprising obstacles. In this talk, I will cover the obstacles that we encountered and will briefly cover ideas that we've put together to address some of these obstacles.
 +
|[http://forkthelaw.org forkthelaw.org]
 +
| [[Media:LT-Why_the_legislative_process_has_failed.pdf|Slides]]
 +
|-
 
|}
 
|}
 
= FAQ =
 
 
== Curation of Content ==
 
 
'''Q:''' How do you choose which Lightning Talks to put in?  What topics do you not accept?
 
 
:'''A:''' Lightning Talks are generally first-come, first-served.  Controversial topics may not be accepted.  Any talks rejected for content will be informed of the reason for their denial.
 
 
'''Q:''' I'm so nervous!  I've never been on stage before.  I couldn't possibly give a lightning talk!
 
 
:'''A:''' Yes, you can!  LTs are not about being polished or professional, they're for people with passion for their ideas.  It's very natural to be nervous, but that fades quickly once you're on stage talking about your ideas.  Many people who gave a good Lightning Talk went on to submit a successful lecture at a future congress.
 
 
'''Q:''' Can I give a talk anonymously or pseudoanonymously?
 
 
:'''A:''' No, and please don't ask. Submissions requesting anonymity will be discarded without review or reply.
 
 
== Slides: Why it's a requirement ==
 
 
'''Q:''' Why are slides required?
 
 
:'''A:''' TL;DR: It shows that you can both '''read directions''' and take the '''[http://en.wikipedia.org/wiki/De_minimis de minimis] effort to prepare''' your talk. 
 
 
Reading directions and minimally preparing are both critical steps to assuring that the talk goes well for you and that session is enjoyable for everyone.  This step alone weeds out many people who simply want to get on stage and talk without thinking through their ideas or arranging them in a manner than takes them no more than 5 minutes to explain.  People who can't prepare will be mercilessly placed into the 180 second round.
 
 
'''Q:''' I want to reserve a slot, but I won't have my slides prepared until the congress.
 
 
:'''A:''' You need to provide at least a title slide or background graphic to confirm your place on the schedule.  The deadline for final slides is Day 1 of the 30c3 at 23:00 CET.  No slides?  You're in the 180 second round.
 
 
'''Q:''' Why do I have to submit slides in advance?
 
 
:'''A:''' Because switching from laptop to laptop wastes a lot of time and breaks the flow of the session.  Constantly switching laptops previously plagued the flow of the lightning talks. At the 29c3, using this format, we were able to present nearly six hours of talks and achieve nearly standing-room only crowds with only 2-3 display failures. Most LT presenters find it far better to reach many more people with a solid, concise message than give a flashy presentation to a handful of people.
 
 
'''Q:''' What if I don't want to use slides at all?
 
 
:'''A:''' That's fine, but if you want a full 5 minute talk '''you must provide some kind of background graphic to say who you are and what you're talking about.'''  This is for the audience's benefit.  If they really like what you're saying, you should give them some way of getting a hold of you.  Otherwise, the 180 second round is an option for you.
 
 
'''Q:''' What should I include in my last (or only) slide?
 
 
:'''A:''' The following things should be in your last slide (however, they are not mandatory):
 
:: Your Name (handle, etc.)
 
:: Contact (DECT, email, fon)
 
:: Links (project homepage)
 
:: Place of contact (assembly, room, party)
 
 
'''Q:''' But I have a really cool animation/presi/flashytime presentation that I must give on my own hardware!
 
 
:'''A:''' [http://www.slideshare.net/asevenstern/prezi-sucks No, you don't.]
 
 
'''Q:''' What if I absolutely must give a demo on my own hardware?
 
 
:'''A:''' There are only a very small number of slots where this will be possible, at the beginning and at the break for most sessions.  You must test your hardware in advance and any delays in getting your laptop on the beamer will come out of your five minutes.  Why not try a video instead?
 
 
== Other FAQs ==
 
 
'''Q:''' I can't possibly give my talk in 5 minutes!  Will there be any 15 minute (i.e. [https://archive.fosdem.org/2013/call_for_lightningtalks/ FOSDEM style]) slots?
 
 
:'''A:''' There are a small number of slots for 15 minute talks.  With your submission, write in greater detail why you really need 15 minutes to fully deliver your talk.
 
 
'''Q:''' Ich spreche nicht sehr gut Englisch. Kann präsentiere ich meine Vortrags auf Deutsch?
 
 
:'''A:''' Ja, genau. Bitte habe Geduld mit dem Moderator, ist sein deutscher wirklich schrecklich.
 
 
'''Q:''' Can I pitch my crowd funding project in a Lightning Talk?
 
 
:'''A:''' Yes you can! We strongly recommend using the last minute of your talk to mention your fundraising website, as well as adding a very visible link to your crowdfunding page from your main project site.  Of course, this is most helpful if you've added a link to your main project site in your application.
 
 
'''Q:''' Will there be milk and cookies?
 
 
:'''A:''' Yes.
 
 
'''Q:''' How do I get an answer to a question that is not answered here?
 
 
:'''A:''' E-mail 30c3@nickfarr.org
 

Latest revision as of 18:16, 15 January 2014

Description
Lightning Talks are short lectures (almost) any congress participant may give!
Content
Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!

The Lightning Talks at the 30c3 were the best yet! We need your help to make them even better next year. Please e-mail 30c3@nickfarr.org to get in touch with the coordinators who put together next year's session.

Schedule

Day 2

HH:MM Title Presenter Lang Abstract Links Slides
01:58 Be a Chaos Mentor Nick Farr EN A quick discussion about the awesome Chaos Mentor program! Chaospatinnen on the Wiki Slides
Hacking With Care Emily EN Hacking (with) care is a versatile, collaborative initiative which purpose is to bring balance, embodiment, body & soul awareness and care to the hackers' communities, living by the shared ethics of goodness for all, joyful creativity, freedom and sharing of knowledge.


Hacking (with) care explores questions relative to hackers' psychological and physical well-being and health, and looks at how a sense of freedom in the technological realms can relate to a sense of freedom in one's life. We seek to encourage vitality and (data)love potentialities to blossom both on and away from keyboards. We also feel we want to return the favor to those who, often behind their computers, care for all of us by engaging everyday in straining battles for freedom.

Hacking with Care, Hacking (with) care, 30c3 LQSN Assembly Slide
Wir werden alle überwacht. Und nun? Mspro DE Der Fall ist eingetreten, mit dem viele von uns gerechnet haben. Wir werden ständig und allumfassend überwacht und es sieht nicht so aus, als könnten uns Crypto oder Politiker davor bewahren.

Diese Tatsache hat auch schwerwiegende Auswirkungen auf den Aktivismus gegen Überwachung. Wie können wir gegen Überwachung kämpfen, wenn eh alle wissen, dass sie überwacht werden? Werden sich die Menschen zum Beispiel trotz NSA noch gegen die Vorratsdatenspeicherung mobilisieren lassen?

Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen.

mspr0.de Slides
Snake: a privacy-aware online social network providing anonymity of data at rest Aleclm EN An end-to-end encrypted social network that is easy to use and protects your privacy from evil hackers, storage providers and overly curious government agencies. Website Fundraising campaign Full design document Slides
Secure eMail Storage with qpsmtpd + GPG Byterazor EN Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon. QPSMTPD GPG Plugin Slides
Online Footprint - An experiment in privacy Hiromipaw EN While social media are increasingly opening up new possibilities for users to share and interact with people and content online, it has also become apparent that, as networking systems evolve and online interactions become more frequent and complex, it is always more difficult to retain control over our online footprint.

This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques.

Slides
Web 3.0 - reconquest of freedom on the Internet - a social movement? Klaus Wallenstein DE The protest against the total surveillance on the Internet fizzles been ineffective. Still, data are skimmed off by intelligence agencies and Internet companies masse.

Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem?

Wagnis Demokratie Slides
Getting more out of Java Stacktraces Snakebyte EN This talk presents a database which allows to use Java stacktraces for web application and framework version fingerprinting TBA Slides
Investor-to-state Dispute Settlement: A Threat To Democracy Ante EN Investor-to-state dispute settlement (ISDS) gives multinationals the right to sue states before special tribunals if changes in law may lead to lower profits than expected. Multinationals can challenge environmental policies, health policies and reform of copyright and patent law. A growing number of civil society groups see ISDS as a threat to democracy. ISDS Project Page Slides
hPDB - the fastest Protein Databank parser is written in Haskell Miga EN hPDB is a parallel Protein Databank parser written in a lazy functional language Haskell. According to current benchmarks it is among the top three parser when used on a single core, and outclasses other parsers when used on quad-core. Is it sign of a new future for both Haskell, and parsing? GitHub, biohaskell.org, BioHacking Assembly Slides
DIY Bookscanner everywhere Benjamin EN I will present the DIY Bookscanner of Dan Reetz, along with the book scanning communities of the world.

We will show how the machine works, why you should build your own, how you can spread knowledge and culture all over the world Come to La Quadrature du Net's tea house for a demonstration, and to scan your own books !

30c3 BookScanner Project, diybookscanner.org (en), bookscanner.fr (fr) Slides
How to organize a (traveling) conference Yana, Krokodilerian EN How to organize a traveling conference in a small country (Bulgaria) on IT/hacking topics, with a very low budget, with the idea to educate the people, to show new things, to give them something to research and advance their own projects. Everything was recorded and streamed in real time. [1], [2], [3], [4], [5] Slides
Holy $417! Watch these ordinary people encrypt their emails. Kinko EN Kinko provides email encryption
...that is easy to use.
...that works with all your devices.
...in your home. Or your office.

Kinko believes: What is in your email concerns only you and the persons you write to. Period. Even in times of NSA and Tempora surveillance programs strong crypto still works - whenever we use it. Let's build the tools to make it a breeze to use -- for everyone!

kinko.me, Kinko Project Page Slides
Take action on digital human rights! Amnesty EN This is (as far as we know) the first time Amnesty International is present at the Chaos Communication Congress. In the past, Amnesty has been a bit hesitant to approach the issue of human rights in the digital world in a consistent manner. We at Digital@Amnesty, an evolving new task force, would like to finally change that and use the opportunity of being here to briefly introduce the concept of our work. At the same time, we want to get in touch with all those of you who feel a need to take action, and call upon other NGO's active in this field to join forces with us. Day 3 Talk, Amnesty International, Amnesty International - Take Action on Digital Human rights Slides
Light Painting with LED Stripes Bigalex EN Light painting with LED stripes is fun! This talk presents a light painting tool based on the LightScythe by The Mechatronics Guy. Some improvements were added to provide easier setup and handling in the field, e.g. a web interface to control settings with mobile devices and on-device image preprocessing. The intention of this talk is to lure some photographers into a light painting session outside the CCH. Self Organized Session, GitHub Page Slides
Bitford, a streaming BitTorrent client for Chrome Astro EN This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading. GitHub, Bitford on Chrome Web Store N/A
palava: Encrypted P2P conferences on the web Farao EN palava is a complete free & open source software stack for video and audio conferences with an instance running on

palava.tv - for everybody to use and hack on!

palava.tv, Blog github Slides
ScreenInvader. Social TV. Kallaballa EN Ever wished you could play media content from your laptop or smart phone on a TV set, screen or projector in just an instant? This is what ScreenInvader helps you do: browse the web, watch videos or flip through images together with your friends on a big screen with just a few simple clicks. Github, Main Site Slides
KittenGroomer: The agnostic USB sanitizer Rafiot EN This project aims to be used by someone receiving a USB key from an untrusted source and who want to see the content you do not know what is on it without opening the original and potentially malicious files. KittenGroomer, GitHub, Project Page Slides
A/I kaos translation! it.de Hlg EN The italian tech collective and media activism group A/I has written down its history in a book. We are about to translate the book straight into german language. The talk presents the translation project and woos further contributors. Main Site Slides
Why is anything the way it is? Srinivas EN Before we change how our societies work, shouldn't we first understand how they actually work? Those who benefit from the structure of the present system seek to limit public comprehension of the social system. Let's use the tools we used to understand physical systems to understand, and then to change how our social systems work. srinivas.gs Slides
GNU Naming System Key Exchange Party @ 30C3 Docmalloc EN GNS, the GNU Naming System, is a decentralized, censorship resistant and secure naming system. Every user manages his own namespace and can access other users name using a delegation system. In the context of the "Youbroketheinternet" workshop and the panel discussion about secure naming systems we provide the possibility to directly get to know GNS. We organize a GNS key exchange party at 30C3 where users can get business cards containing their GNS information and exchange with other GNS users. GNS project page, You broke the internet! Slides

Day 3

HH:MM Title Presenter Lang Abstract Links Slides
HOPE X in NYC mlc EN Why you should come to HOPE X in New York City July 18-20 Website Slides
uProxy Keroserene EN uProxy is an experiment allowing users to easily and securely proxy through or for their friends. Available as a browser extension and eventually on mobile devices, uProxy seeks to improve the current state of proxies via trust, scalability, and most importantly, usability. The project was seeded by Google Ideas and currently in development. It will be open source.


Let's chat about the most relevant aspects of what uProxy does and does not do, and more.

uproxy.org Slides
cctvmap - mapping the surveillance Dp EN Let's build a wiki map for people to collect with an android app the surveillance in your neighborhood Alpha map version, cctvmap.org, coming soon, Cctvmap Slides
rpi smartMetering - how raspberry pis and nerds will save the world Docjoe EN I bought an raspberry pi at 29c3 and built my own smart meter. I learned that my house consumes too much energy when doing nothing. And I learned, that now everybody can check how many slices I toast in the morning (reality). All of this inspired me to cook up my own homegrown micro-powerplant (just an idea yet). Then I started thinking about a simple need driven decentralized electric prower grid. Then I thought about a new world currency coupled to energy rather than gold and now I'd like to talk about it before someone silences me... Ahoj Senn Slides
r0ket-based wireless keyboard sniffing Sec EN Playing around with the nrf24l01p, the rf chip of the r0ket which is also used by the MS wireless keyboard. r0ket.de, r0ket GitHub Slides
How can regulators and hackers cooperate to strengthen Internet privacy? Achim EN Data protection authorities, other regulators and legislators invest considerably in defining and interpreting legal rules for the protection of individuals’ fundamental rights of personal data protection and privacy. At the same time, developers of internet tools and applications unaware of the risks to privacy and data. If these two trends continue to diverge, there is an increased risk that the actual privacy of individuals will become substantially less protected. This talk is meant as an invitation to developers to discuss how this separation can be overcome. European Data Protection Supervisor Homepage Slides
Hacker Culture Noise Cancellation Stitch EN Dare to look at yourself differently, this can be fun, confronting and educational. Slides
Firebird/interbase database engine hacks or RTFM Gifts EN Couple techniques to exploit remote command execution in Firebird with exposed port Slides
So I discovered that my HP laptop…broadcasts Shinji EN We took a look at some HP Elitebooks Slides
Einigkeit für Recht und Freiheit - Für eine gemeinsame Bewegung gegen Überwachung Ramses DE Seit Edward Snowden seine Enthüllungen begonnen hat, gibt es auch in Deutschland eine breite Front von Organisationen, Initiativen und Einzelpersonen, die sich gegen die zunehmende Überwachung wenden. Dieser breite Protest ist jedoch sehr zersplittert. Es gibt viele Einzelinitiativen, die zu großen Teilen nicht zusammenarbeiten. Vielmehr gibt es sogar erhebliche Differenzen zwischen den Gruppierungen, obwohl die Ziele oft nahezu deckungsgleich sind. Aktionen der anderen werden kritisiert, man streitet über unwesentliche Details. In diesem Lightning Talk Rant möchte ich aufzeigen, dass das anders werden muss und die verschiedenen Initiativen und Organisationen vereint auftreten müssen, wenn wir das erreichen wollen, worum es uns letztlich allen geht: Recht und Freiheit. Einigkeit fuer Recht und Freiheit!, StopWatchingUs Heidelberg Slides
Open Source Redaktion Pingunine DE Anforderungen an ein modernes Open Source Redaktionssystem Slides
3D printer & Art: More Than Just a Tool Obelix EN Some ideas and examples on how to make art with a 3D printer/scanner where the printer/scanner is more than a simple tool for creating objects. Because of the unique possibilities and characteristics the 3d printer becomes itself part of the artwork it is creating. Example project: Exhibition in Moscow Slides
Fenrir: Transport, Encryption & Authentication Luker EN Fenrir is a UDP-based transport protocol which combines ideas from SCTP, QUIC and other protocols, adds encryption (not based on SSL), uses DNSSEC for trust and pubkey management, implements federated authentication and much more. fenrirproject.org Slides
Unboxing the Fairphone Henk EN We will unbox one of the first fairphones, a seriously cool smartphone that puts social values first, based on open design principles/fairtech. fairphone.com Slides
Maximizing the speed of time based SQL injection data retrival Arnim EN This talk features several new ideas on how to speed up data retrieval using time based blind SQL injection (SQLi). It's important to realize the difference between boolean based SQLi and time base SQLi. and why the later has more in common with “What's My Line?” aka “Heiteres Beruferaten” than binary search. Just applying this knowledge to sqlmap resulted in a speed increase of 20% with a patch of 10 lines of code. Password hashes can be retrieved even faster by narrowing down to hex-digits. (Some presented ideas will go into sqlmap.org) Slides
pribook.com: The most easiest way to encrypted communication Finn EN Most people fail to establish secure communications. Therefore pribook.com is an approach to gain asymmetric encryption from user to user, without the need for installing a program or store keys. It is a social network service with build-in RSA encryption which is executed in the web browser. In this lightning talk I will give a brief summit to gain attraction for our self-organized-session. We are looking forward to find some people who want to join us, to start this idea as a non-profit open-source project. pribook.com, Self Organized Assembly Slides
DetecTor.IO Kaie EN DetecTor is an open source project to implement client side SSL/TLS MITM detection, compromised CA detection and server impersonation detection, by making use of the Tor network. detector.io Slides
"Yeah, it looks nice... but why are you doing this?" or "Why Demo Coding?" SvOlli EN Showing a friend of mine a demo I was working on, I got the question: "Yeah, it looks nice... but why are you doing this?". I'll try to find at least three different answers in five minutes. Atari 2600 VCS Hacking Slides
PHDays Labyrinth: The Hacker Disneyland Yuri Goltsev EN The Labyrinth at Positive Hack Days is a real life hacking attraction. During only one hour the participants of the competition are to get over the laser field and motion detectors, pick some locks, clear the room of bugs, defeat artificial intelligence, and disarm the bomb. To get through the Labyrinth, you will need some skills in dumpster diving, lock picking, application vulnerabilities detection, social engineering, and of course, there is no way without mother wit and physical fitness. PHDays III on YouTube Available afterwards
Associated Whistle-Blowing Press: First release of files Hieroph4nt EN AWP's first release of sensitive materials providing evidence of corruption and malpractice. Associated Whistle-Blowing Press Available afterwards

Day 4

HH:MM Title Presenter Lang Abstract Links Slides
DHCXSSP Momorientes EN I'll show you how to break webinterfaces of multiple (enterprise) access points using dhcp as my only tool. Pwnage Slides
Email encryption for the masses Ciphersheep EN Encrypted email has been around for ages, but most people still don't use it. One problem is that Google, Microsoft, Yahoo, and others want to keep mining your inbox for juicy data, and are thus not interested in pushing proper email encryption. Another important problem is that current solutions are difficult to use. We will look at how get email encryption ready for the masses. TU Darmstadt Staff Page Slides (final)
180 SECOND EXPRESS ROUND BEGIN!
The Free Software Song Mquintus EN Abstract: Join us now and share the software; You’ll be free, hackers, you’ll be free. Join us now and share the software; You’ll be free, hackers, you’ll be free. Free Software Song Session, YouTube Link, gnu.org Slides
BalCCon 2k14 Jelena EN BalCCon 2k14 - : Balkan Computer Congress has been conceptualized as a two day gathering of the international hacker community in the organization of LUGoNS – Linux users of Novi Sad. The first part of the program has been envisaged to be a set of presentations, workshops and lectures on the current topics regarding privacy, technology, software development, free software & socio-political issues. Our goal is to gather all the communities from the region, continent and the World in an effort to hack, play, learn, pass knowledge and exchange experience. balccon.org Slides
The freedom of total control? Nakaha EN Never before in history surveillance of public and private space and thoughts was so comprehensive like nowadays but oddly enough never before people cared less about being surveilled. I want to introduce a provocative idea that might explain this observation: total control leads to total freedom. I hope that further discussion may result in a better understanding of public ignorance and in better ways to mobilize people against their surveillance. Slides
Octoprint: An RPi printserver for 3D printers Obelix EN Octoprint gives you a web-based control and monitor interface for your 3d printer. You're sitting on the couch too lazy to get up? Use Octoprint with a mobile device over WiFi... octoprint.org Slides
How to Write an Open Textbook over a Weekend JoonasD6 EN A group of Finnish mathematics enthuasiasts hooked together a year ago write a Creative Commons high school textbook over a weekend. The concept was a success and has since extended into a charming project where we've begun to set our sights into writing all the necessary school books - freely available for everyone to use, modify and distribute. Wanna know how it worked? Wanna duplicate our textbook hackathon in your country? Here's how. Creative Commons Blog, oppikirjamaraton on Facebook, Finnish Link Slides
MSH (MPI-Shell) SreeTotakura EN MSH is a project for providing remote access between nodes of high performance computing systems where SSH is often unavailable or restricted by the administrators. MSH Documentation, Slides
Foundation of the European Pirate Party (PPEU) Zombb EN Purpose, agenda and foundation process of the PPEU ppeu.net Slides
cape: Component Architecture for Python Environments Riot EN A flashtalk about Hackerfleet's cape project, which is an opensource, component-based and flow oriented architecture for Python programmers. IRC, Trac Slides
$417 Appens Johnjohndoe EN The $417 Appens project aims to track the state of restrooms. Our goal is to instantly see which toilet is used, and which is free. Is the toilet paper nearly gone? Send a push message to the responsible person. Three toilets - which toilet is the most visited toilet? What is the average toilet time? How much cost a toilet visit? Any many more statistics. github Slides
Hacking your car dashboard LCD Derpston EN Taking control of the general purpose LCD on your car dashboard - reverse engineering, decoding existing data, generating new data, tidying it up into a reusable package for others. Audi radio DIS reader github, Linux RPI Audi DIS github Slides
Fairnopoly: The online marketplace for all. Tschakki DE As a social enterprise Fairnopoly want a fair alternative to the existing major online marketplaces offer. Our Marketplace virtually any kind of articles and services offered be. Fairnopoly is organized as a cooperative and is characterized thanks to three core elements:
  1. A Fair business model
  2. The promotion of responsible consumption
  3. A contribution to the fight against corruption
Marketplace, Blog, github, Current crowdfunding campaign Slides
Hvernig gengur Islandi Tvo (What's the status Iceland 2) W03 EN It's been one year since we last looked at the situation in Iceland, some things have changed some things have gotten better, some worse, come hear the truth or a close approximation to it. Slides
Source: Internet? There must be a better way Leena Simon EN Imagine you could take an image licensed under an open license such as Creative Commons, insert it into your work, and have attribution and license information be automatically included in your work. This would save you from having to keep track of this information yourself, to make using openly licensed works as easy as publishing them. Commons Machinery Slides
Easy PGP Key Sharing Bnvk EN The sharing of public keys is hard, verifying them is even harder- especially for average people. The goal is to make the process as easy exchanging business cards or sending a friend requests on Facebook. Utilizing PGP fingerprints and QR codes we may propose a simple and elegant solution! mailpile.is Slides
So you want to write a Tor pluggable transport N/A EN How to get started writing censorship-resistant transports for Tor. Pluggable transports home page, Tor wiki page Slides
Umweltzone / Low emission zone Johnjohndoe EN The Umweltzone app for Android allows to look up the actual position and path of the low emission zone for individual cities. The open source project uses data published by the government as well as crowdsourced OpenStreetMap data. The app is published in German in the current version 1.1.0 but will be localized soon. Umweltzone Slides
CONFidence Introduction Jabss EN An introduction and invitation to a CONFidence Conference held annually in Krakow. CONFidence Slides
180 SECOND EXPRESS ROUND END!
Awesome Retro: Retrogaming Community and your Donations Stitch EN Looking what the Awesome Retro community does and how you can help. Awesome Retro Dot Com Slides
P.O.S.T.: Physical Objects Sneaker Transport Inj4n EN I will present an ongoing project to establish digital support for crowd-based transportation of physical objects on co-presence networks. The project applies communication network protocols to the world of physical objects, essentially creating anonymous, hard to censor transportation. P.O.S.T. Project Slides
Iteratees in C Pesco EN "Iteratee I/O" is a concept for structuring the processing of data streams in a fashion that makes it modular, cleanly composable, and amenable to reasoning while not significantly impacting. As such it helps program robustness and security.


I present an early proof-of-concept for implementing iteratee I/O in C. This is somewhat complicated by limited support for working with functions as first-class objects.

A successful full-scale implementation would open the technique to a wide range of security-critical code.

POC repo Slides
tor2tcp Mzeltner EN or … <erno> hm. I've lost a machine.. literally _lost_. it responds to ping, it works completely, I just can't figure out where in my apartment it is. poum.niij.org Slides
Bitcoinproof: Digital notary, secured by the bitcoin network Vog EN Bitcoinproof creates a forgery-proof timestamp for your data, secured by the bitcoin network. This enables you to prove that a certain event happened before a certain point in time, without trusting any central authority. So you can use the bitcoin network as a digital notary service! Bitcoinproof demo page Slides
Teckids: Why children need an open source community Natureshadow EN Community projects settled around free standards, privacy and security have been taking rapid movement throughout the last years. But why is it also important to bring this movement to kids and teenagers? teckids.org, Teckids Slides
bettercrypto.org: The definitive guide to applied crypto hardening MacLemon EN Deploying good crypto correctly is complex. This guide gives you all the details you want and the config to copy/paste. It's creation process is completely transparent and the the contents are heavily peer reviewed by experts in the field. bettercrypto.org, 30c3 Project Page Slides
NSA-like Surveillance by a Third World Country Musalbas EN A look into how the Tunisian government surveilled the social media and email accounts of its citizens during the Tunisian revolution of 2011. Pastebin Remove Tunisian government phishing scripts Slides
sharingsecrets: a tool for sharing and distributing passwords someName EN A call for paticipation for further development of a passwordmanager, which allows to share and distribute passwords Website Slides
ddserver: A server-side dynamic DNS service Major EN ddserver is a server-side application for dynamic DNS management. It allows you to specify hostnames (subdomains) inside a dynamic DNS zone, and to update the IP address of those hostnames using a dynamic update protocol (no-ip protocol). This enables you to access hosts with dynamic IP addresses by a static domain name, even if the IP address changes. ddserver Slides
The Legislative Process: How It Is Failing Everyone But the Rich Valkyrie EN After a dramatic event that shook the hacker community in January, I began a quest to change draconian computer laws. In our effort to bring the bring the hacker community together, I encountered surprising obstacles. In this talk, I will cover the obstacles that we encountered and will briefly cover ideas that we've put together to address some of these obstacles. forkthelaw.org Slides