Lightning Talks are short lectures any congress participant may give!
Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!

The Lightning Talks were a huge hit at the 29c3! For the first time since we introduced the new Lightning Talk format, every slot was completely booked by Day 2. There were three packed sessions and over seven hours of Lightning Talks. There is a possibility that Lightning Talk slots will be gone by the time the Congress starts, so submit your idea as soon as possible!

How to Apply

Send an e-mail to with the following information:

  1. Presentation Title
  2. 30c3 Wiki Username
  3. Language of your Presentation
  4. Keywords
  5. Abstract
  6. Relevant Links (Project Page, 30c3 Wiki Page, etc.)
  7. Slides in PDF or ODP format OR link to a Video. Submissions without at least one slide, background graphic or video will not be accepted.
  8. Do we have your permission to upload your slides to the wiki? (Before my talk/After My Talk/Not at all)

Got questions? See the FAQ

How it Works

The 30c3 Lightning Talks are 5 minutes each, given on a first-come, first-served basis to presenters who provide complete submissions. There is no curation on content or message, however, no submission which violates the core principles of the CCC will be accepted.

  1. Speakers take the podium as the moderator brings up their slides on the beamer.
  2. Once slides are ready, the speaker is given a "Go" to proceed.
  3. Speakers introduce themselves
  4. To move to the next slides, the speaekr will say "slide"
  5. With one minute left to go, the moderator will give a "One Minute" warning over the microphone
  6. The moderator will give another warning with 30 seconds left
  7. At 10 seconds, the moderator will signal the audience to count down.
  8. When the speaker is finished, or five minutes are up, the audience applauds and the next speaker takes the stage.


Currently Approved Talks - Awaiting LT Room/Time in Fahrplan

Time Title Presenter Lang Keywords Abstract Links Slides
(5:00) PHDays Labyrinth: The Hacker Disneyland Yuri Goltsev English PHDays, Hacking, Dumpster Diving, Lockpicking, Vulns, CTF The Labyrinth at Positive Hack Days is a real life hacking attraction. During only one hour the participants of the competition are to get over the laser field and motion detectors, pick some locks, clear the room of bugs, defeat artificial intelligence, and disarm the bomb. To get through the Labyrinth, you will need some skills in dumpster diving, lock picking, application vulnerabilities detection, social engineering, and of course, there is no way without mother wit and physical fitness. PHDays III on YouTube Available afterwards
(15:00) Bitford, a streaming BitTorrent client for Chrome Astro English BitTorrent, Chrome This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading. GitHub Bitford on Chrome Web Store Available afterwards
(5:00) Wir werden alle überwacht. Und nun? Mspro Deutsch Überwachung, Privatsphäre, NSA, Vorratsdatenspeicherung Der Fall ist eingetreten, mit dem viele von uns gerechnet haben. Wir werden ständig und allumfassend überwacht und es sieht nicht so aus, als könnten uns Crypto oder Politiker davor bewahren.

Diese Tatsache hat auch schwerwiegende Auswirkungen auf den Aktivismus gegen Überwachung. Wie können wir gegen Überwachung kämpfen, wenn eh alle wissen, dass sie überwacht werden? Werden sich die Menschen zum Beispiel trotz NSA noch gegen die Vorratsdatenspeicherung mobilisieren lassen?

Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen. UNAVAILABLE
(15:00) Fenrir: Transport, Encryption & Authentication Luker English protocols, transport, encryption, authentication Fenrir is a UDP-based transport protocol which combines ideas from SCTP, QUIC and other protocols, adds encryption (not based on SSL), uses DNSSEC for trust and pubkey management, implements federated authentication and much more. Available afterwards
(5:00) Secure eMail Storage with qpsmtpd + GPG Byterazor English email storage, encryption, pgp, security Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon. QPSMTPD GPG Plugin Available afterwards
(5:00) Online Footprint - An experiment in privacy Hiromipaw English Privacy, Social Networks, Visualization While social media are increasingly opening up new possibilities for users to share and interact with people and content online, it has also become apparent that, as networking systems evolve and online interactions become more frequent and complex, it is always more difficult to retain control over our online footprint.

This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques.

Forthcoming Available afterwards
(5:00) Web 3.0 - reconquest of freedom on the Internet - a social movement? Klaus Wallenstein Deutsch Web 3.0, Internet freedom, surveillance, resistance, social movement The protest against the total surveillance on the Internet fizzles been ineffective. Still, data are skimmed off by intelligence agencies and Internet companies masse.

Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem?

[1] Available afterwards

Day 2 - Room and Time TBA

Time Title Presenter Lang Keywords Abstract Links Slides
TBA How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia To Be Uploaded

Day 3 - Room and Time TBA

Time Title Presenter Lang Keywords Abstract Links Slides
TBA How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia To Be Uploaded

Day 4 - Room and Time TBA

Time Title Presenter Lang Keywords Abstract Links Slides
TBA How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia To Be Uploaded


Q: I'm so nervous! I've never been on stage before. I couldn't possibly give a lightning talk!

A: Yes, you can! LTs are not about being polished or professional, they're for people with passion for their ideas. It's very natural to be nervous, but that fades quickly once you're on stage talking about your ideas. Many people who gave a good Lightning Talk went on to submit a successful lecture at a future congress.

Q: I have this TOTALY AWSUM LITENING TALK but I don't have slides yet. Can I haz slot?

A: No. The only way to get your Lightning Talk rejected is to provide an incomplete submission. A submission without some kind of a background graphic is incomplete, and therefore, will not be accepted. People walk in and out of the Lightning Talks all the time. They may not be in the room or paying attention when you introduce yourself. Again: if they really like what you're saying, you should give them some way of getting a hold of you--and the best way to do that is with a graphic behind you during or at the end of your talk.

Q: What if I don't want to use slides at all?

A: That's fine, but you must provide some kind of background graphic to say who you are and what you're talking about. This is for the audience's benefit. If they really like what you're saying, you should give them some way of getting a hold of you.

Q: I want to reserve a slot, but I won't have my slides prepared until the congress.

A: You need to provide at least a title slide to confirm your place on the schedule. The deadline for final slides is Day 1 of the 30c3.

Q: What should I include in my last (or only) slide?

A: The following things should be in your last slide (however, they are not mandatory):
Your Name (handle, etc.)
Contact (DECT, email, fon)
Links (project homepage)
Place of contact (assembly, room, party)

Q: Why are you being so harsh about this slide thing?

A: TL;DR: It shows that you can both read directions and take the de minimis effort to prepare your talk. Both things are very important steps to assuring that the talk goes well for you and that session is enjoyable for everyone. This step alone weeds out many people who simply want to get on stage and talk without thinking through their ideas or arranging them in a manner than takes them no more than 5 minutes to explain.

Q: Why do I have to submit slides in advance?

A: Because switching from laptop to laptop wastes a lot of time and breaks the flow of the session. At the 29c3, using this format, we were able to present nearly six hours of talks and achieve nearly standing-room only crowds. Most LT presenters find it far better to reach many more people with a solid, concise message than give a flashy presentation to a handful of people.

Q: But I have a really cool animation/presi/flashytime presentation that I must give on my own hardware!

A: No, you don't.

Q: What if I absolutely must give a demo on my own hardware?

A: There are only a very small number of slots where this will be possible, at the beginning and at the break for most sessions. You must test your hardware in advance and any delays in getting your laptop on the beamer will come out of your five minutes. Why not try a video instead?

Q: I can't possibly give my talk in 5 minutes! Will there be any 15 minute (i.e. FOSDEM style) slots?

A: There are a small number of slots for 15 minute talks. With your submission, write in greater detail why you really need 15 minutes to fully deliver your talk.

Q: Ich spreche nicht sehr gut Englisch. Kann präsentiere ich meine Vortrags auf Deutsch?

A: Ja, genau. Bitte habe Geduld mit dem Moderator, ist sein deutscher wirklich schrecklich.

Q: How do I get an answer to a question that is not answered here?

A: E-mail