Lightning Talks
Day 2 - 12:45 in Saal G
Time | Title | Presenter | Lang | Abstract | Links | Slides |
---|---|---|---|---|---|---|
12:45 | Be a Chaos Mentor | Nick Farr | EN | A quick discussion about the awesome Chaos Mentor program! | Chaospatinnen on the Wiki | Slide |
12:50 | Hacking With Care | Emily | EN | Hacking (with) care is a versatile, collaborative initiative which purpose is to bring balance, embodiment, body & soul awareness and care to the hackers' communities, living by the shared ethics of goodness for all, joyful creativity, freedom and sharing of knowledge.
|
Hacking with Care, Hacking (with) care, 30c3 LQSN Assembly | Slide |
12:55 | Wir werden alle überwacht. Und nun? | Mspro | DE | Der Fall ist eingetreten, mit dem viele von uns gerechnet haben. Wir werden ständig und allumfassend überwacht und es sieht nicht so aus, als könnten uns Crypto oder Politiker davor bewahren.
Diese Tatsache hat auch schwerwiegende Auswirkungen auf den Aktivismus gegen Überwachung. Wie können wir gegen Überwachung kämpfen, wenn eh alle wissen, dass sie überwacht werden? Werden sich die Menschen zum Beispiel trotz NSA noch gegen die Vorratsdatenspeicherung mobilisieren lassen? Die Überwachungsdebatte tritt in eine neue Phase ein, in der es nicht mehr um das Bit "überwacht/nicht überwacht" gehen kann, sondern wo Überwachung differenziert betrachtet und qualitativ eingeordnet werden muss. Dazu will ich ein paar Vorschläge machen. |
mspr0.de | Slide |
13:00 | Snake: a privacy-aware online social network providing anonymity of data at rest | Aleclm | EN | An end-to-end encrypted social network that is easy to use and protects your privacy from evil hackers, storage providers and overly curious government agencies. | Website Fundraising campaign Full design document | Slides |
13:05 | Secure eMail Storage with qpsmtpd + GPG | Byterazor | EN | Because of the current actions against secure eMail providers in the USA (for example Lavabit) eMail security gets more and more important in the world. The current implementations of MTAs, POP3 and IMAP Servers do not provide a secure eMail storage. Adding such a secure storage is not trivial, because the encryption keys have to be stored at the eMail provider, enabling organizations to get hold of this key and decrypt the eMail. To prevent this, an asymmetric encryption standard has to be used. The eMail provider encrypts incoming eMail with the recipients public key and the recipient, after downloading the eMail, decrypts it with his private key. This talk presents a plugin for the QPSMTPD SMTP server, which does exactly this. Every incoming email is encrypted with the recipients PGP public key in the PGP-Mime standard, if this key is locally available and trusted. After encryption the eMail is forwarded by SMTP to the backend Mailserver. This method can easily be adapted to any other queuing plugin for the QPSMTPD daemon. | QPSMTPD GPG Plugin | Slides |
13:10 | Online Footprint - An experiment in privacy | Hiromipaw | EN | While social media are increasingly opening up new possibilities for users to share and interact with people and content online, it has also become apparent that, as networking systems evolve and online interactions become more frequent and complex, it is always more difficult to retain control over our online footprint.
This work is hence concerned with the modelling the user online footprint as a result of the aggregate activity collected across different services online, calculating the risk that a user can be subjected to a particular attack, hence profiling known attacks, and finally helping the user to maintain a desired online footprint by adopting certain privacy enhancing techniques. |
Slides | |
13:15 | Web 3.0 - reconquest of freedom on the Internet - a social movement? | Klaus Wallenstein | DE | The protest against the total surveillance on the Internet fizzles been ineffective. Still, data are skimmed off by intelligence agencies and Internet companies masse.
Why it has not yet come to political progress? What should change in the future so that society and politics finally respond appropriately to the problem? |
Wagnis Demokratie | Slides |
13:20 | Getting more out of Java Stacktraces | Snakebyte | EN | This talk presents a database which allows to use Java stacktraces for web application and framework version fingerprinting | TBA | Slides |
13:25 | Investor-to-state Dispute Settlement: A Threat To Democracy | Ante | EN | Investor-to-state dispute settlement (ISDS) gives multinationals the right to sue states before special tribunals if changes in law may lead to lower profits than expected. Multinationals can challenge environmental policies, health policies and reform of copyright and patent law. A growing number of civil society groups see ISDS as a threat to democracy. | ISDS Project Page | Slides |
13:30 | hPDB - the fastest Protein Databank parser is written in Haskell | Miga | EN | hPDB is a parallel Protein Databank parser written in a lazy functional language Haskell. According to current benchmarks it is among the top three parser when used on a single core, and outclasses other parsers when used on quad-core. Is it sign of a new future for both Haskell, and parsing? | GitHub, biohaskell.org, BioHacking Assembly | Slides |
13:35 | DIY Bookscanner everywhere | Benjamin | EN | I will present the DIY Bookscanner of Dan Reetz, along with the book scanning communities of the world.
We will show how the machine works, why you should build your own, how you can spread knowledge and culture all over the world Come to La Quadrature du Net's tea house for a demonstration, and to scan your own books ! |
30c3 BookScanner Project, diybookscanner.org (en), bookscanner.fr (fr) | Slides |
13:40 | How to organize a (traveling) conference | Yana, Krokodilerian | EN | How to organize a traveling conference in a small country (Bulgaria) on IT/hacking topics, with a very low budget, with the idea to educate the people, to show new things, to give them something to research and advance their own projects. Everything was recorded and streamed in real time. | [1], [2], [3], [4], [5] | Slides |
13:45 | Holy $417! Watch these ordinary people encrypt their emails. | Kinko | EN | Kinko provides email encryption
Kinko believes: What is in your email concerns only you and the persons you write to. Period. Even in times of NSA and Tempora surveillance programs strong crypto still works - whenever we use it. Let's build the tools to make it a breeze to use -- for everyone! |
kinko.me, Kinko Project Page | Slides |
13:50 | Take action on digital human rights! | Amnesty | EN | This is (as far as we know) the first time Amnesty International is present at the Chaos Communication Congress. In the past, Amnesty has been a bit hesitant to approach the issue of human rights in the digital world in a consistent manner. We at Digital@Amnesty, an evolving new task force, would like to finally change that and use the opportunity of being here to briefly introduce the concept of our work. At the same time, we want to get in touch with all those of you who feel a need to take action, and call upon other NGO's active in this field to join forces with us. | Day 3 Talk, Amnesty International, Amnesty International - Take Action on Digital Human rights | Slides |
13:55 | Light Painting with LED Stripes | Bigalex | EN | Light painting with LED stripes is fun! This talk presents a light painting tool based on the LightScythe by The Mechatronics Guy. Some improvements were added to provide easier setup and handling in the field, e.g. a web interface to control settings with mobile devices and on-device image preprocessing. The intention of this talk is to lure some photographers into a light painting session outside the CCH. | Self Organized Session, GitHub Page | Slides |
14:10 | Bitford, a streaming BitTorrent client for Chrome | Astro | EN | This talk will present Bitford, a BitTorrent client with novel features. Piggybacked on Chrome, it runs on many OS platforms. Because browsers feature A/V playback capabilities, it turns BitTorrent into a true YouTube killer by allowing playback while still downloading. | GitHub, Bitford on Chrome Web Store | N/A |
14:17 | palava: Encrypted P2P conferences on the web | Farao | EN | palava is a complete free & open source software stack for video and audio conferences with an instance running on
palava.tv - for everybody to use and hack on! |
palava.tv, Blog github | Slides |
14:25 | ScreenInvader. Social TV. | Kallaballa | EN | Ever wished you could play media content from your laptop or smart phone on a TV set, screen or projector in just an instant? This is what ScreenInvader helps you do: browse the web, watch videos or flip through images together with your friends on a big screen with just a few simple clicks. | Github, Main Site | Slides |
14:30 | KittenGroomer: The agnostic USB sanitizer | Rafiot | EN | This project aims to be used by someone receiving a USB key from an untrusted source and who want to see the content you do not know what is on it without opening the original and potentially malicious files. | KittenGroomer, GitHub, Project Page | Slides |
14:35 | A/I kaos translation! it.de | Hlg | EN | The italian tech collective and media activism group A/I has written down its history in a book. We are about to translate the book straight into german language. The talk presents the translation project and woos further contributors. | Main Site | Slides |
14:40 | Why is anything the way it is? | Srinivas | EN | Before we change how our societies work, shouldn't we first understand how they actually work? Those who benefit from the structure of the present system seek to limit public comprehension of the social system. Let's use the tools we used to understand physical systems to understand, and then to change how our social systems work. | srinivas.gs | Slides |
14:45 | GNU Naming System Key Exchange Party @ 30C3 | Docmalloc | EN | GNS, the GNU Naming System, is a decentralized, censorship resistant and secure naming system. Every user manages his own namespace and can access other users name using a delegation system. In the context of the "Youbroketheinternet" workshop and the panel discussion about secure naming systems we provide the possibility to directly get to know GNS. We organize a GNS key exchange party at 30C3 where users can get business cards containing their GNS information and exchange with other GNS users. | GNS project page, You broke the internet! | Slides |