Description
Lightning Talks are short lectures any congress participant may give!
Content
Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!

The Lightning Talks were a huge hit at the 29c3! For the first time since we introduced the new Lightning Talk format, every slot was completely booked by Day 2. There were three packed sessions and over seven hours of Lightning Talks. There is a possibility that Lightning Talk slots will be gone by the time the Congress starts, so submit your idea as soon as possible!

How to Apply

Send an e-mail to 30c3@nickfarr.org with the following information in this order:

  1. Presentation Title
  2. 30c3 Wiki Username
  3. Language of your Presentation
  4. Keywords
  5. Abstract
  6. Relevant Links (Project Page, 30c3 Wiki Page, etc.)
  7. Slides in PDF or ODP format OR link to a Video. Submissions without at least one slide, background graphic or video will not be accepted.
  8. Do we have your permission to upload your slides to the wiki? (Before my talk/After My Talk/Not at all)

Got questions? See the FAQ

How it Works

The 30c3 Lightning Talks are 5 minutes each, given on a first-come, first-served basis to presenters who provide complete submissions. There is no curation on content or message, however, no submission which violates the core principles of the CCC will be accepted.

  1. Speakers take the podium as the moderator brings up their slides on the beamer.
  2. Once slides are ready, the speaker is given a "Go" to proceed.
  3. Speakers introduce themselves
  4. To move to the next slides, the speaekr will say "slide"
  5. With one minute left to go, the moderator will give a "One Minute" warning over the microphone
  6. The moderator will give another warning with 30 seconds left
  7. At 10 seconds, the moderator will signal the audience to count down.
  8. When the speaker is finished, or five minutes are up, the audience applauds and the next speaker takes the stage.

Schedule

Day 2 - 12:45 in Saal G

Time Title Presenter Lang Keywords Abstract Links Slides
12:45 How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia Available afterwards
12:50
12:55 Wir werden alle überwacht. Und nun? Mspro Deutsch Überwachung, Privatsphäre, NSA, Vorratsdatenspeicherung Der Fall ist eingetreten, mit dem viele von uns gerechnet haben. Wir werden ständig und allumfassend überwacht und es sieht nicht so aus, als könnten uns Crypto oder Politiker davor bewahren.

Diese Tatsache hat auch schwerwiegende Auswirkungen auf den Aktivismus gegen Überwachung. Wie können wir gegen Überwachung kämpfen, wenn eh alle wissen, dass sie überwacht werden? Werden sich die Menschen zum Beispiel trotz NSA noch gegen die Vorratsdatenspeicherung mobilisieren lassen?

Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen.

mspr0.de UNAVAILABLE
13:00 Secure eMail Storage with qpsmtpd + GPG Byterazor English email storage, encryption, pgp, security Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon. QPSMTPD GPG Plugin
13:05 Snake: a privacy-aware online social network providing anonymity of data at rest Aleclm English HTML5 single page application, usability, dumb storage server, social graph anonymity, scalable secure group management, OSN, end-to-end encryption, Web of Trust, privacy, key graphs, in-band public key authentication The enormous amount of sensitive information available to Online Social Networks is highly attractive for criminals, therefore adequate security measures are needed. So far, in most cases, OSN providers have had complete control over user data: the only restrictions came from the OSN’s Terms of Service and the regulations of the various countries where the service was available. The aim of this work is to allow OSNs’ end users to have as much control as possible over the data they post and to design a service provider storing as little information as strictly necessary to offer the intended service. Forthcoming Available afterwards
13:10 Online Footprint - An experiment in privacy Hiromipaw English Privacy, Social Networks, Visualization While social media are increasingly opening up new possibilities for users to share and interact with people and content online, it has also become apparent that, as networking systems evolve and online interactions become more frequent and complex, it is always more difficult to retain control over our online footprint.

This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques.

Forthcoming Available afterwards
13:15 Web 3.0 - reconquest of freedom on the Internet - a social movement? Klaus Wallenstein Deutsch Web 3.0, Internet freedom, surveillance, resistance, social movement The protest against the total surveillance on the Internet fizzles been ineffective. Still, data are skimmed off by intelligence agencies and Internet companies masse.

Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem?

Wagnis Demokratie Available afterwards
13:20 Getting more out of Java Stacktraces Snakebyte English Java Stacktrace Fingerprinting This talk presents a database which allows to use Java stacktraces for web application and framework version fingerprinting TBA Available Aftewards
13:25 Presentation Title: Investor-to-state dispute settlement: a threat to democracy Ante English ISDS, investor-to-state dispute settlement, democracy, copyright, patent law Investor-to-state dispute settlement (ISDS) gives multinationals the right to sue states before special tribunals if changes in law may lead to lower profits than expected. Multinationals can challenge environmental policies, health policies and reform of copyright and patent law. A growing number of civil society groups see ISDS as a threat to democracy. ISDS Project Page
13:30 hPDB - the fastest Protein Databank parser is written in Haskell Miga English PDB, bioinformatics, Haskell hPDB is a parallel Protein Databank parser written in a lazy functional language Haskell. According to current benchmarks it is among the top three parser when used on a single core, and outclasses other parsers when used on quad-core. Is it sign of a new future for both Haskell, and parsing? GitHub, biohaskell.org, BioHacking Assembly
13:35 DIY Bookscanner everywhere Benjamin English DIY Bookscanner, book scanning, public domain, building, archive, wikisource, gutenberg I will present the DIY Bookscanner of Dan Reetz, along with the book scanning communities of the world.

We will show how the machine works, why you should build your own, how you can spread knowledge and culture all over the world Come to La Quadrature du Net's tea house for a demonstration, and to scan your own books !

30c3 BookScanner Project, diybookscanner.org (en), bookscanner.fr (fr) Slides
13:40 How to organize a (traveling) conference Yana, Krokodilerian English conference, low budget, traveling, education, inspiration How to organize a traveling conference in a small country (Bulgaria) on IT/hacking topics, with a very low budget, with the idea to educate the people, to show new things, to give them something to research and advance their own projects. Everything was recorded and streamed in real time. [1], [2], [3], [4], [5] Slides
13:45 Holy $417! Watch these ordinary people encrypt their emails. Kinko English email, mailserver, encryption, security, privacy, smtp, pgp Kinko provides email encryption
...that is easy to use.
...that works with all your devices.
...in your home. Or your office.

Kinko believes: What is in your email concerns only you and the persons you write to. Period. Even in times of NSA and Tempora surveillance programs strong crypto still works - whenever we use it. Let's build the tools to make it a breeze to use -- for everyone!

kinko.me, Kinko Project Page Available afterwards
13:50 Take action on digital human rights! Amnesty English digital rights, human rights, Amnesty International, privacy, data protection, freedom of expression, freedom of information, anonymity, cooperation, NGO, global human rights movement, civil society This is (as far as we know) the first time Amnesty International is present at the Chaos Communication Congress. In the past, Amnesty has been a bit hesitant to approach the issue of human rights in the digital world in a consistent manner. We at Digital@Amnesty, an evolving new task force, would like to finally change that and use the opportunity of being here to briefly introduce the concept of our work. At the same time, we want to get in touch with all those of you who feel a need to take action, and call upon other NGO's active in this field to join forces with us. Day 3 Talk, Amnesty Assembly Available afterwards
13:55 LightScythe: Light Painting with LED Stripes Bigalex English light painting, lightscythe, fancy hardware stuff Light painting with LED stripes is fun! This talk presents a light painting tool based on the LightScythe by The Mechatronics Guy. Some improvements were added to provide easier setup and handling in the field, e.g. a web interface to control settings with mobile devices and on-device image preprocessing. The intention of this talk is to lure some photographers into a light painting session outside the CCH. GitHub Page To Be Uploaded
14:00 BREAK
14:10 Bitford, a streaming BitTorrent client for Chrome Astro English BitTorrent, Chrome This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading. GitHub, Bitford on Chrome Web Store Available afterwards
14:15
14:20
14:25 ScreenInvader. Social TV. Kallaballa English Linux, Media Streaming Ever wished you could play media content from your laptop or smart phone on a TV set, screen or projector in just an instant? This is what ScreenInvader helps you do: browse the web, watch videos or flip through images together with your friends on a big screen with just a few simple clicks. Github, screeninvader.com Available afterwards
14:30 Social Encryption Coxi English encryption, privacy We need more ideas for better privacy - here is one! Available afterwards
14:35 A/I kaos translation! it.de Hlg English Translation, Tech collective history, Italy The italian tech collective and media activism group A/I has written down its history in a book. We are about to translate the book straight into german language. The talk presents the translation project and woos further contributors. kaostranslation.de Available afterwards
14:40 Why is anything the way it is? Srinivas English social movement, sociodynamics, information, politics Before we change how our societies work, shouldn't we first understand how they actually work? Those who benefit from the structure of the present system seek to limit public comprehension of the social system. Let's use the tools we used to understand physical systems to understand, and then to change how our social systems work. srinivas.gs Available afterwards
14:45 GNU Naming System Key Exchange Party @ 30C3 Docmalloc English GNS, Naming System, Crypto, Key Party GNS, the GNU Naming System, is a decentralized, censorship resistant and secure naming system. Every user manages his own namespace and can access other users name using a delegation system. In the context of the "Youbroketheinternet" workshop and the panel discussion about secure naming systems we provide the possibility to directly get to know GNS. We organize a GNS key exchange party at 30C3 where users can get business cards containing their GNS information and exchange with other GNS users. GNS project page, youbroketheinternet.org

Day 3 - 12:45 in Saal G

Time Title Presenter Lang Keywords Abstract Links Slides
12:45 How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia To Be Uploaded
12:50
12:55
13:00
13:05
13:10
13:15
13:20
13:25
13:30
13:35
13:40
13:45
13:50
13:55
14:00 BREAK
14:10 Fenrir: Transport, Encryption & Authentication Luker English protocols, transport, encryption, authentication Fenrir is a UDP-based transport protocol which combines ideas from SCTP, QUIC and other protocols, adds encryption (not based on SSL), uses DNSSEC for trust and pubkey management, implements federated authentication and much more. fenrirproject.org Available afterwards
14:15
14:20
14:25
14:30
14:35
14:40
14:45 PHDays Labyrinth: The Hacker Disneyland Yuri Goltsev English PHDays, Hacking, Dumpster Diving, Lockpicking, Vulns, CTF The Labyrinth at Positive Hack Days is a real life hacking attraction. During only one hour the participants of the competition are to get over the laser field and motion detectors, pick some locks, clear the room of bugs, defeat artificial intelligence, and disarm the bomb. To get through the Labyrinth, you will need some skills in dumpster diving, lock picking, application vulnerabilities detection, social engineering, and of course, there is no way without mother wit and physical fitness. PHDays III on YouTube Available afterwards

Day 4 - 12:45 in Saal G

Time Title Presenter Lang Keywords Abstract Links Slides
12:45 How to give a good Lightning Talk Nick Farr English Lightning Talks, Orientation, Introduction This is a brief Lightning Talk explaining the basics of how the Lightning Talks work. Lightning Talks on Wikipedia To Be Uploaded
12:50 So I discovered that my HP laptop…broadcasts Shinji English Tempest, HP, Elitebook, Reddit, Groupthinking We took a look at some HP Elitebooks To Be Uploaded
12:55
13:00
13:05
13:10
13:15
13:20
13:25
13:30
13:35
13:40
13:45
13:50
13:55
14:00 BREAK
14:10 How the American legislative process has failed everyone but the rich Valkyrie English politics, legislation, change After a dramatic event that shook the hacker community in January, I began a quest to change draconian computer laws. In our effort to bring the bring the hacker community together, I encountered surprising obstacles. In this talk, I will cover the obstacles that we encountered and will briefly cover ideas that we've put together to address some of these obstacles. forkthelaw.org Available aftewards
14:15
14:20
14:25 NymRights and NymWrongs Aestetix English names, trust, online identity This talk will be a brief introduction to the world of names and nyms-- pseudonyms, polynyms, anonyms, and more! We'll cover some fundamentals of how names work and why, and then explore the challenges we're encountering as we try to bring name-related systems into technology. We'll also take a look at the National Strategy for Trusted Identities in Cyberspace, a US-government group tasked with solving many of today's challenges, and see how they are doing. nymrights.org Available Afterwards
14:30
14:35
14:40
14:45

FAQ

Q: I'm so nervous! I've never been on stage before. I couldn't possibly give a lightning talk!

A: Yes, you can! LTs are not about being polished or professional, they're for people with passion for their ideas. It's very natural to be nervous, but that fades quickly once you're on stage talking about your ideas. Many people who gave a good Lightning Talk went on to submit a successful lecture at a future congress.

Q: I have this TOTALY AWSUM LITENING TALK but I don't have slides yet. Can I haz slot?

A: No. The only way to get your Lightning Talk rejected is to provide an incomplete submission. A submission without some kind of a background graphic is incomplete, and therefore, will not be accepted. People walk in and out of the Lightning Talks all the time. They may not be in the room or paying attention when you introduce yourself. Again: if they really like what you're saying, you should give them some way of getting a hold of you--and the best way to do that is with a graphic behind you during or at the end of your talk.

Q: What if I don't want to use slides at all?

A: That's fine, but you must provide some kind of background graphic to say who you are and what you're talking about. This is for the audience's benefit. If they really like what you're saying, you should give them some way of getting a hold of you.

Q: I want to reserve a slot, but I won't have my slides prepared until the congress.

A: You need to provide at least a title slide to confirm your place on the schedule. The deadline for final slides is Day 1 of the 30c3.

Q: What should I include in my last (or only) slide?

A: The following things should be in your last slide (however, they are not mandatory):
Your Name (handle, etc.)
Contact (DECT, email, fon)
Links (project homepage)
Place of contact (assembly, room, party)

Q: Why are you being so harsh about this slide thing?

A: TL;DR: It shows that you can both read directions and take the de minimis effort to prepare your talk. Both things are very important steps to assuring that the talk goes well for you and that session is enjoyable for everyone. This step alone weeds out many people who simply want to get on stage and talk without thinking through their ideas or arranging them in a manner than takes them no more than 5 minutes to explain.

Q: Why do I have to submit slides in advance?

A: Because switching from laptop to laptop wastes a lot of time and breaks the flow of the session. At the 29c3, using this format, we were able to present nearly six hours of talks and achieve nearly standing-room only crowds. Most LT presenters find it far better to reach many more people with a solid, concise message than give a flashy presentation to a handful of people.

Q: But I have a really cool animation/presi/flashytime presentation that I must give on my own hardware!

A: No, you don't.

Q: What if I absolutely must give a demo on my own hardware?

A: There are only a very small number of slots where this will be possible, at the beginning and at the break for most sessions. You must test your hardware in advance and any delays in getting your laptop on the beamer will come out of your five minutes. Why not try a video instead?

Q: I can't possibly give my talk in 5 minutes! Will there be any 15 minute (i.e. FOSDEM style) slots?

A: There are a small number of slots for 15 minute talks. With your submission, write in greater detail why you really need 15 minutes to fully deliver your talk.

Q: Ich spreche nicht sehr gut Englisch. Kann präsentiere ich meine Vortrags auf Deutsch?

A: Ja, genau. Bitte habe Geduld mit dem Moderator, ist sein deutscher wirklich schrecklich.

Q: Can I pitch my crowd funding project in a Lightning Talk?

A: Yes you can! We strongly recommend using the last minute of your talk to mention your fundraising website, as well as adding a very visible link to your crowdfunding page from your main project site. Of course, this is most helpful if you've added a link to your main project site in your application.

Q: How do I get an answer to a question that is not answered here?

A: E-mail 30c3@nickfarr.org