Usually we called this section "workshops". Then we told you on this page, that a workshop doesn't need to be an event with hands-on and making – but sure it could! We said that a "workshop" is just something, that happens at a special time and place, but doesn't take place in one of the big halls. Therefore we changed the name to "Self-organized Sessions" that includes everything - everything that is organized by you!
Such an event can be...
- ... a gathering of a project group or on a special topic,
- ... a contest or a game
- ... something happening outside of the building
- ... a small talk or lecture
- ... a screening of a movie
- ... something with music, literature and art
- ... a follow-up-discussion on one ob the "big talks" or another topic that happened rencently
- ... everything else you think that needs to take place at the congress!
Registered Self-organized Sessions
The calendar is updated using the semantics feature of the self-organized sessions form and template. This may take some time, so be patient...
The following calendar shows all registered activities like workshops, talks at assemblies or in the workshop rooms, hand-ons, and stuff like mentioned above.
This is the calendar for Static:Self-organized Sessions. You find the complete calendar on Calendar.
You may select one of the following filters:
List of Self-organized Sessions
List of Self-organized Sessions
|13 Principles Worldwide Campaign|
|A-Coin||We'll outline a proposal for a peer-to-peer electronic currency which has learned some lessons from bitcoin. Faster and less resource hungry. Most importantly: asset-backed money more adept to faster circulation. I hope to get some discussion going about the pros and cons of different concepts for electronic currencies. Maybe start a project to carry it into effect.|
|Alltagstaugliche Steganografie - geht das?||Lässt sich Steganografie alltagstauglich umsetzen, wie sinnvoll wäre das? Lasst uns Lösungsansätze begutachten und den Bedarf diskutieren.|
|Amateurfunklizenz erwerben||Kurzvortrag zum Erwerb einer Amateurfunklizenz|
|Amending the European Parliament draft report on mass surveillance||The European Parliament has been conducting a special inquiry on the Snowden revelations. The draft report from this inquirywill be published on 3rd January. Until mid-January, there will be time to table amendments. This workshop is meant to discuss possible amendments which would improve the final report, assess their political viability, and in general discuss the way forward in EU politics around this.|
|Amnesty International - Take Action on Digital Human rights||How can you contribute to the protection of human rights in a digital world? This session is a follow-up to the lecture "Human Rights and Technology - 'A New Hope' or 'The Empire Strikes Back'?" at 1:45pm in Hall 6 (see URL below). We would like to engage with you in a dialogue about how you can take action within Amnesty International, and what Amnesty and you(r NGO) can do to join forces so as to render the fight for the protection of digital rights more effective.|
|ArduGuitar Demo||After the presentation of the ArduGuitar at 14:30 in Saal 6 on 29 Dec, I will have a guitar, amp and tablet to demo for anyone interested.|
|ArduinoForTotalNewbies||Learn Arduino using TV-B-Gone as an example project
Day 3: 29-Dec, 12pm - 3:30pm
|Associated Whistle-Blowing Press RELEASE||AWP´s kickstart release.|
|Beer||Home brewing has become quite popular. We meet and sample each other's beer.|
|Binary Analysis||Do you stare at bytes? Reconstruct control flow? Recover datastructures? Let us have a chat about tools and methods!|
|BiscuIT||Entwicklung eines Freien Schul-Informations-Systems|
|Board/Card games||This is a session for all people interested in Board and Cardgames. Bring your games!|
|Building Klackerlaken for kids||Kids can build clanking bugs in this workshop.|
|Building Multicopters||We will build a 'Multicopter' aka Quadrocopter from scratch. That includes frame, mechanics, electronics and programming.|
|C3S – Strategies for the Future of European Media Culture||Students of the „Institute for Journalism and Communication Sciences“ will present the results of this semester's seminar on the management of media convergence. Subject of the workshop will be a presentation and an open discussion of the developed strategies and projects to help developing the C3S - the first open, fair and democratic collecting society - as an agency for free culture in Europe.|
|CCC Regiotreffen||Regional meeting of the Chaos Computer Club. Not intended for the general public but not top secret either. If you don't know what this is, you should probably not go there...|
|Campaign Strategies||bringing Alinsky's "Rules for Radicals" into the 21st century|
|ChaosVPN||ChaosVPN is a meshed VPN to connect hackerspaces.|
|Circuit stickers||Come play with circuit stickers! This session is part of fightling's Kidspace assembly.|
|CivicSummit||An edemocracy experiment|
|Clojure||Clojure (and LISP) related stuff (discussion, workshop, meeting, etc.)
any level of expertise (no prior exposure to Clojure needed)If you are interested in learning Clojure, exchange your Clojure knowledge, find other Clojure programmers, or have some general interest in programming and want to expand your horizon please join us!
|Coding your Body||Some exercises and basic massage techniques to start coding your body!|
|Copyright Consultation: A Chance to influence EU policy||The Copyright reform we've all been waiting for is here. The European Commission has a made a proposal for copyright reform which is now open for public consutation. That means, you can influence the process of the European Union. We are going to host around 2hour workshop where Amelia Andersdotter, member of the European Parliament for the Swedish Pirate Party and Ásta Helgadóttir, alternate member of the Icelandi Parliament for the Icelandic Pirate Party are going to go through the important bits and help you out to influence EU policy!|
|Copyright Debate: The Conference Game||Language frames the discussion. Thus it is necessary to understand the words we use, their context, and the way they are used by others. So let's talk & let's play "Copyright Debate: The Conference Game"|
|Create a plush embroidery applique||We have some plush in different colors to create furry embroidery appliques, e.g. cats, dogs and ponies ;)|
|Create your own Stickers||We'll help you creating great stickers for your laptop, mobile phone and car.|
|Create your own T-Shirts and Hoodies||We'll help you vectorizing your graphics and get them on textiles.|
|DE FPGA Workshop PSHDL||Lerne FPGAs zu programmieren in nur 3 Stunden!|
|DFRI Meeting||DFRI is a nonprofit organisation working for digital rights. This is an organization meeting, open to both members and the public.|
|DIY ISP Gathering||A gathering for the talk "Y U NO ISP, taking back the Net". We want to meet people from different countries and settle on a platform and address to use for future communication.|
|DIY Mate||We will try different types of Mate and prepare them in different ways, from the traditional way of drinking a Mate to DIY Mate Limos with all the ingredients you want. We will have plenty of Mate, cuias and bombas and if you have some special ingredients to add to your DIY Mate Limo, bring them with. We will have carbonated water and stevia to sweeten the Mates, bring your own bottle if you want to take your Limo with!|
|Data Mining for Good||Using random sampling, entity resolution, communications metadata, and statistical modeling to assist prosecutions for disappearance and genocide in Guatemala
For over thirty years, human rights groups in Guatemala have carefully documented the killing and disappearance of many people in the early 1980s. There are tens of thousands of records in many databases, and over 80 million paper pages of police records available in the Archives of the National Police. Most of the prosecutions of the former military and police officials who committed the atrocities depends on eyewitnesses, specific documents, and forensic anthropologists' examination of exhumed bones. However, data analysis helps to see the big patterns in the violence.This talk will explain how data analysis illuminated the selective patterns among mass killings in the prosecution for genocide of former de facto President General José Efraín Ríos Montt. The talk will also explain how looking at the communications metadata from over 20,000 randomly sampled paper memos helped illuminate command patterns in a disappearance case
|Data retention in the eu - how to get the paste back into the tube?||Let's put our heads together: The data retention directive on EU level and at its member states. How to get the paste back into the tube?|
|DataSeal Firefox // Datendichtung Firefox||In this workshop practical measures are presented to minimize the datatrace of Firefox during surfing, e. g. cookie-blocking, deactivation of cache, some useful plugins ... In dieser Sitzung werden praktische Maßnahmen gezeigt, um die Datenspur des Firefox beim Surfen zu minimieren, z. B. Cookie-Blockade, Abschalten des Cache, nützliche Plugins ...|
|Ddj||Meetup with all the data journalist, visualisation gurus, hackers etc.|
|Debugging your Depression||This aims at providing a small spot to talk about depression and how to manage to live with it. The focus of this session should be at sharing experiences and developing patterns and habits to deal with Depression and emotional downs.|
|Demonstration - Freedom not Fear||This is a demonstration against surveillance. We will meet at the Fairy Dust (the rocket in front of the CCH) and then we will walk to Jungfernstieg.|
|Der Kongress tanzt||Ballroom and latin dance addicts meet here.|
|Design t-shirt logos using Inkscape||Is there a logo you always wanted to design but you never knew how to do it? No t-shirt shop is selling your logo? Or do you just want to know how it works? We'll show you what to do and how to get your logo on a t-shirt.|
|Detector.io||DetecTor is an open source project to implement client side SSL/TLS MITM detection, compromised CA detection and server impersonation detection, by making use of the Tor network.|
|Digital Community Television||Digital Terrestrial Television (DTT) is mainly operated by state-owned organizations, large media enterprises or partnerships between such. DTT signal distribution is monopolized although most countries' regulations allow for individual signal distribution. This session demonstrates a new way how to operate your own digital TV station and fit into the existing DTT landscape.|
|Digital Cooking Sessions||We'll cook all kinds of food with our EveryCook devices. Either those recipes that are already in our database or new ones you created.|
|EGK German Health Insurance Card||Report on current state and discussion of perspectives of "world's largest IT project". German Health Insurance Card and Infrastructure Project, "Elektronische Gesundheitskarte" (EGK).|
|EU elections 2014||Hacking the EU election!|
|EVE Online Roam||I would really like to get together with other EVE players there for fun, drinks and discussions! I am also reserving a workshop room for a late night session of EVE at 30c3, if we can still fly in a straight line.|
|Early Bird: A Beginner’s Guide to Encrypted Communication with CAcert||CAcert.org is a community-driven certificate authority that issues free public key certificates to the public. CAcert has over 200,000 verified users and has issued nearly 800,000 certificates as of January 2012. These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the Internet. (Wikipedia)|
|Early Bird: Audiobearbeitung mit Open Source & Open Content||Audioeditoren sind Anwendungsprogramme, mit denen man Audiosignale über Soundkarten bzw. angeschlossene analoge und digitale Schnittstellen digital aufnehmen, bearbeiten und wiedergeben kann. Sie können Audiodateien von Speichermedien in den vom Audioeditor unterstützten Audioformaten gelesen, wiedergegeben, bearbeitet, analysiert und konvertiert werden. (Wikipedia)|
|Early Bird: Computerspiele mit Scratch entwickeln||Scratch ist eine interpretierte, dynamische und visuelle Programmiersprache, die auf Squeak basiert. Ihr Ziel ist es, Neueinsteiger − besonders Kinder und Jugendliche − mit den Grundkonzepten der Computerprogrammierung vertraut zu machen und ihnen unter dem Motto „imagine, program, share“, die kreative Erstellung eigener Spiele und Multimediaanwendungen zu ermöglichen. Auch das Teilen dieser Resultate im Internet ist möglich. (Wikipedia)|
|Early Bird: Dreams of the Future – Learning in Science Fiction Movies||Science fiction is a genre of fiction dealing with imaginative content such as futuristic settings, futuristic science and technology, space travel, time travel, parallel universes, and extraterrestrial life. Exploring the consequences of scientific innovations is one purpose of science fiction, making it a "literature of ideas". Science fiction has been used by authors as a device to discuss philosophical ideas such as identity, desire, morality, and social structure. (Wikipedia)|
|Edgenet||Growing a fully decentralized information distribution network, the edgenet.|
|Embroidery Basics||Learn how embroidery machines work and how to create your own embroidery designs.|
|Example Session||This is an example session. This should show you, yes YOU, how a session page looks alike.|
|Exploit and Crypto Regulations||The discussions on export controls for "Digital Arms/Digital Weapons" is misleading to a wrong direction. We have seen for example that PI in UK got Gamma controlled by their use of crypto. This is a big danger for the security of civil infrastructure in the longrun. The talk focusses on the issues and tries to discuss better solutions.|
|Export Controls on Surveillance Technology||Session about Export Controls, recently introduced into the The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies|
|FNF BXL 2014 - Get started!||A meeting for everyone who is interested in organizing the Freedom not Fear 2014 in Brussels, taking place from 26-29 September.|
|FPGA Workshop PSHDL||Learn how to program an FPGA in just 3 hours! This crash course will make LED blink in all kind of interesting ways.|
|Fabschool Kids (for youngsters from 8-12)||Fabschool Kids at #30C3: enjoying the snow between hackers and nerds. Today we are with a bunch of laptops making a lot of fun at Fabschool kids. We are programming with Scratch and are playing with MaKey MaKeys, lego wedo censors, and conductive materials like bananas, apples, cucumbers and buckets of snow.|
|Fhb cheese randevou||Lets enjoy cheeses and related condiments together!|
|Fixing the Legislative Process||Follow-up to the lightning talk about how the legislative project is broken and how it is becoming worse.|
|Flying Multicopters||Outdoor fly session with Multicopters and First-Person-View-flying.|
|Food Hacking Base build up||A discussion about build up of food&beverage focused community and portal within the hacker community.|
|Free Software Song||You can't sing? Me neither. So let's sing togehter! The *Free Software Song* is an important part of our hacker culture. Lets celebrate singing it.|
|Freifunk Community-Treffen||Kurze Vorstellung und Vernetzung lokaler Communities|
|Friendica & red - Decentralized social networks for the masses||Learn why facebook sucks and that with friendica (and red in the future) alternatives exist. Learn how to set up and use a friendica node.|
|Geeks & BDSM||A short introduction into "BDSM" and Q&A.|
|Gentoo eV Meeting||Gentoo e.V. Meeting (Mitgliederversammlung in German)|
|Geocaching||Treasure hunting via GPS - We will search Geocaches in Hamburg!|
|GlobaLeaks Anonymous Whistleblowing Software||GlobaLeaks Project since 2011 has been helping initiatives that want to Solicit Whistleblowers for public interests purposes. GlobaLeaks 2.0 has been released on May 2013 with more than different 7 initiatives using it.
It focus on simplifying the deployment, being fully configurable via web.During this talks we want to give an overview of current functionalities, showcase of different uses of globaleaks, how you can start using and you can start hacking to implement new cool features :-)
|Guerillaknitting 101 - lets yarnbomb 30C3!||This talk/workshop will give a colorful and practical introduction into the art of guerillaknitting. A 101 of urban knitting will be presented as well as many inspiring examples of global knithacking - by individuals, local and global communities with trees, bridges, tanks, cars, planes, stones or power cords covered in knitting. Attendants will learn the basics of how to yarnbomb a place such as the 30C3. Bring knitting needles and wool but if you didn't - there will be some available. Lets join forces to beautify the congress centre!|
|Hackerschnitzeljagd||Hackerschnitzeljackt is a 6 hour game during second day of congress.|
|Hackerschnitzeljagd HQ||Headquarter for the puppetmaster of the Hackerschnitzeljagd.|
|Hackerspaces & Society, in the Middle East: Tag Team or Versus Match?||Hacker/ maker/ & community spaces are popping up in the most unlikely places around the Middle East and they are slowly influencing (as well as being slowly influenced by) their local communities and cities.
Lamba Labs, Beirut's first hackerspace, is one such space, that, through and since its foundation, has faced many external/internal cultural/social challenges that were initially perceived as purely local.As it turns out, those challenges are just extreme or localized variants of those we all face in the hacker community and this interactive talk/discussion will revolve around some of those challenges and what we have done or can do about them.
|Hacking & Debugging Firefox OS||A hand-on session to jump-start developers to work with Firefox OS devices. The session will cover remote debugging & Gaia hacking - one is the main pillar of serious app-development, and the other is about changing the look & feel of the OS itself. Will cover flashing custom Gaia into the developer phones as well, if the time/scope permits.|
|Hacking SCADA: ICS Penetration testing workshop||During our workshop, we will share SCADAStrangeLove team experience in penetration testing in ICS environment. From network level to application and from 0-day hunting to project management. Toolkit/tip and tricks/real world examples. What you should do and what you do not ever have to do. Please bring your notebook with VMware Player.|
|Hacking Tamagotchis for Fun and .... Well, That's Pretty Much It||Have you always wanted to hack a Tamagotchi? Here is your chance! This workshop will teach you how to write custom games, items and code for the virtual pets. It will show you the tools you need for both script and assembly-based “Tama development”, and during the workshop you will work towards putting a photo on the screen of a Tamagotchi|
|Hacking a knitting machine using Arduino (AYAB)||LOCATION CHANGED to muCCC Assembly (Hall 3)! In this talk, we explain how a knitting machine basically works (on the example of a Brother KH-910) - and how it is possible to achieve a computer controlled knitting using Arduino and Python.|
|Haecksen Breakfast||Haecksen Breakfast|
|Ham Radio Antenna Assembling||Assembling of Ham Radio Antennas|
|Ham Radio Antenna Disassembling||Disassembling of Ham Radio Antennas|
|Hello World in Ruby on Rails||We will programm a simple hello world example using the popular Ruby on Rails webframework.|
|Hotel Door Unlocker||Workshop and talk on a circuit that unlocks Electronic Hotel Door Locks|
|How to get the Hacker Ethic out there?||In this session we want to make steps towards designing a course for interested adult non-geek computer users in which the hacker ethic is fully integrated in appealing, playful ways.|
|How to help Tor?||A discussion about the various part of the Tor project, where and how to help.|
|HowTo Host a Cryptoparty||Since summer 2013, we face a lot of CryptoParty visitors never seen before in a hackerspace. We invite all people having organized such a talk or hands-on workshop to come in, share insights and fails. Let´s find best practises.|
|IRMA demo and discussion||Demo of IRMA (I Reveal My Attributes), a smart card implementation of Attribute Based Credentials. Discussing pros and cons, and possible options and extensions.|
|Intersectional Feminist Queer Geek Roundtable and Discussion||In this discussion, we will try to adress the complex issues of the relation between tech, gender, and power, from a historical point of view, and from the position of people who are trying to find concrete ways to improve current problems. In this talk and roundtable, we will have a look at different theories constructed through time and then try to understand what political and practical initiatives come from history and what are emerging now to move things in directions that would open up new possibilities. We will follow this (short) theoretical discussion by a (we hope) broad discussion about what's happening now : What are the initiatives that are emerging ? Come and share your story and your inspiring initiatives! From the first Feminist Server Summit, to Intersectional Feminist, Queer and Trans Hackerspaces, to the upcoming Eclectic Tech Carnival (ETC 2014), we want to hear from you!|
|Intro to Biotinkering||This session will provide an introduction to the Do It Yourself (DIY)-Bio movement. We will explore the basics of Biotechnology, Genetic Engineering and what we can do with this in our DIY lab. We will learn the principles of bacterial transformation and some basic hardware hacks. You will get a first hands on experience on how to work in a wetlab.
Further to that - get ready to reprogram cells, assemble synthetic DNA, sketch metabolic pathways and simulate cellular behavior on your computer. With TinkerCell programming cells has become as easy as designing circuit boards. In this workshop you will learn how to design your own.If you have spare webcameras or anything you can imagine to be suitable to be used in a lab, bring it over and let's see what we can build of it!!
|Introduction To Electronic Fashion||A hands-on workshop introducing the equipment, techniques and materials for use with electronic fashion, e-textile and wearable projects.|
|Introduction to CAD for 3D Printers||This workshop will cover CAD programs available for 3D printer users, followed by an introduction to OpenSCAD, a scripted design program. For the second half, you will want to bring a laptop with OpenSCAD installed to complete the examples|
|Introduction to soy bean fermentations||You will learn how to treat properly the soy bean and ferment it with microbial culture producing tempeh and maybe another ferment.|
|Junghackertag||YoungHackersDay at 30c3
Hands-on Electronics for starters U23
Have fun and build exciting projects with us. Drinks and snacks will be served during the workshop. Every workshop you attend, you'll earn a stamp in your personal hackers passport.
Information for parents and teachers
We introduce you to the "Chaos-goes-School"-project, inform about chances and risks of social media and give hints for responsible internet usage.During the event you can ask us any question about data security or other related issues.
|Kefir making||Kefir making is wonderful ancient endeavor providing you with extremely diverse and healthy microbial product - kefir!|
|Keysigning Party||The aim of this Workshop is to strengthen the Web of Trust by signing OpenPGP keys of other people and receiving signatures from others.|
|Kimchi Frenzy||We will be showing you how to make Korean kimchi, and we'll be tasting various types from cabbage, radish, cucumber. We'll also try some recipes based on kimchi, for instance kimchi pancakes. There might also be some Korean side dishes or snacks around, like fermented octopus...|
|Knitting the Swing||This is a technique for advanced knitters, a tasting course for those who want to learn an intriguing knitting-technique.
First step is to knit an "inclined plane" which forms the base of the swinging stanzas. There are some simple rules to learn and follow, and like magic- in the end all your short rows are completed and the knitting is straight again.Once learned the principle vou can combine colors and stanzas to a unique project.
|Kombucha is easy||Come and learn how to make tasty and healthy kombucha, so you can continue to brew your own at home or at your local hackerspace!|
|LEAP Workshop||Basic introduction to the LEAP Encryption Access Project. Client and Platform side.|
|Language & Power||How is 30C3 dealing with this question?|
|LearnToSolder||Learn to Solder! A large variety of way cool kits are available, all designed for total beginners to complete successfully -- and intriguing enough for the total hardware geek.
This ongoing workshop will be happening concurrently with lots of other way cool workshops at the Hardware Hacking Area!
|Light Painting with LED Stripes||Let's do some lightpainting outside the CCH on Day 2. I will bring a LED stripe light painting tool. BYO tripods and cameras and send me some images to draw with the LED stripe in advance.|
|Little Onions||Are you running Tor on a Raspberry Pi (or similar)? Let's have a chat about lessons learned, tips and tricks.|
|Lockpicking Basics||Lockpicking Basics|
|M3TA TA3M||An meetup for people organizing TA3M of wanting to organise TA3Ms.|
|MagicLantern||Hands-on with Magic Lantern. Bring your Canon DSLR's and together we can install the latest nightlies, try out functionality and discuss the project.|
|Mailpile workshop||In this session, we'll be introducing participants to the plugin architecture of Mailpile, and helping people get into the gritty details of working with Mailpile's internals. At least a rudimentary understanding of Python is needed.|
|Medienpädagogik am Beispiel Pixln||Ästhetisch praktische Medienpädagogik am Beispiel Pixln|
|Mind+ workshop for Arduino beginners||Introduction of basic hardware hacking including electronics on arduino and programming on Mind+. You can have hand-on hacking experience of creating a heartbeat LED animation, tuning machine, morning alarm(light-inductive) and avatar plant (touch-inductive). Most importantly, with Mind+, a flow-based visual programming software for Arduino, you can have a taste of Arduino programming by drag and drop just like LEGO and start to create your own project.|
|MiniKIF||KIFfel treffen sich auf dem Congress|
|Minimalist hosting configs exchange||Did you make your own Freedombox? Do you maintain a home server? Do you host services on a Raspberry Pi? Pimp up your stack!|
|Nachhaltige IT||Nachhaltige IT? Die Suche nach nachhaltigen Lösungsansätzen trotz übersättigtem Markt, geplanter Obsolesz & greenwashing.|
|NerfgunBattle||Tired of egoshooters? Feeling the need for better graphics, realistic physics and surround sound?
Start banging away people in the real world! Join the big Nerf-Gun Battle at 30c3!come around - bring your own device - get shot
|Net Neutrality||Net neutrality - why it is important, why it is under threat, why the EU is now deciding on the future of the internet as we know it - and what we can do about it.|
|Net Neutrality laws around the world||The internet is asking for a law to be saved, how could it be and what went wrong? This Workshop is in addition to the general Net Neutrality session. Here we take a critical look at laws and regulations that try to tackle the problem of net neutrality around the world. We look at different approaches regulating the internet, loopholes in the various texts and consequences around the world.|
|Net Research Net||Net for activist+academics researching Net as a social fenomen|
|Network map workshop||Discussion on LibreMap: a scalable, global and decentralized router database and map visualization for community networks|
|New gsmmap.org tool workshop||This is a supplementary workshop to Karsten Nohl’s talk „Mobile network attack evolution.“|
|Noisy Square General Assembly||Daily General Assembly for the Noisy Square organizers, volunteers and anyone else who is interested to join.
Everyday we'll evaluate and discuss
|Noisy Square Paaaarty!!!||Great Big party at the End of the Park - Free Entry!|
|Nsupdate.info introduction||nsupdate.info is a dynamic dns service implemented in Python/Django|
|NymRights||A discussion on online anonymity and pseudonymity. Among other things, we'll be exploring when nyms do NOT work.|
|OBAI Brause||Making your own sherbet is really easy and not that expensive. OBAI Brause is aiming to give you that crucial caffeine dose you're craving for to get you through the event. As part of the workshop you'll be able to mix your very own sherbet with ingredients available at the shackspace assembly.|
|Open source laptop discussion||We want your feedback on how best to get our open source laptop hardware into your hands.|
|OpenKnowledgeMeetup||We believe knowledge can empower everyone, enabling people to work together
to tackle local and global challenges, understand our world, expose inefficiency and challenge inequality and hold governments to account. We believe in diversity: epistemic, geographic, socio-demographic, of language and gender.Let's meet and discuss
|PSHDL Hands-on Introduction||A short interactive demo of the PSHDL framework and its website|
|Phil. of hacking discussion||Philosophical discussion on hacking, approaches to technology and its instrumentality. Continuation of the program talk https://events.ccc.de/congress/2013/Fahrplan/events/5278.html|
|Podcamp podcast session||Wer immer schon einmal wissen wollte wie man einen podcast aufnimmt, bearbeitet, verbessert und veröffentlicht, wird hier fündig.|
|Podlove Workshop||Überblick über die Entwicklung und Anwendung des Podlove Podcast Publisher.|
|PolSoc featured sessions I||A series of political workshops (max. 1h each)
As most speakers come from abroad, the PolSoc-team will take care of scheduling in bilateral contact with the speakers / organizations)This blocker will then be replaced by the sessions
|Pony watching session||watch today's My Little Pony episode and maybe more.|
|Postmodernism, social systems and whistle-blowing||Philosophical forking trying to explain whistle-blowing under the light of social cybernetics and theories of post-modernism.|
|Press Conference Jacob Applebaum||Press Conference by Jacob Appelbaum|
|Pribook.com - the most easiest way for encrypted communication||Most of the people fail to establish a secure communication. Therefore pribook.com is an approach to gain asymmetric encryption from user to user, without the need for installing a program or store keys. It is a social network service with build-in RSA encryption which is executed in the web browser. During this session we would like to explain and discuss the idea and introduce you to the prototype implementation. We are looking forward to find some people who want to join us, to start this idea as a non-profit open-source project. More information (in German) can be fount at pribook.com.|
|Print your own T-Shirt||Given a logo as a vector graphic, we'll help you getting your own t-shirt printed - on an actual t-shirt you can wear!|
|Privacy@bigdata||Big Data is entering our life, and more and more people feel the emerging need for more privacy. Not only because NSA collects data about most of us, many companies do that, too. But what is privacy? There will be a brief introduction into "talking about privacy".|
|Proper release practices||Best practices for responsible release process of circumvention tech tools|
|Publeaks.nl||Mieke van Heeswijk will explain how Publeaks got started, what it is about and what the plans are for the future.
The Publeaks Foundation and a large number of Dutch media outlets are today launching Publeaks.nl , a website for people to leak documents to the media securely and anonymously. The initiative is designed to protect whistleblowers, shed light on wrongdoings and encourage and support investigative journalism.
Publeaks is a secure channel. It facilitates safe leaking to the press: the sender remains completely anonymous and he or she can choose which of the participating media outlets receive documents, sound fragments or photographic material. Recipient media outlets can process these files in a protected environment.
Publeaks is based on the GlobaLeaks software package developed by the Hermes Center for Transparency and Digital Human Rights. The Publeaks organization has no access to the leaked files, does not publish anything itself and has no means of identifying the informant. Participating media outlets have committed themselves to verifying the leaked materials, finding sources to support the content and hearing all sides before publishing anything. Journalists can put questions to the anonymous informant on a secure part of the site.. The informant decides whether or not to answer them. Journalists who receive material through Publeaks will know which other media outlets have received the same material and can decide whether or not to undertake a collaborative investigation.Publeaks is an initiative of the Publeaks Foundation. The foundation takes measures to support press scrutiny and is financed by the participating news media: AD, ANP, De Correspondent, De Groene Amsterdammer, De Volkskrant, Het Financieele Dagblad, het Parool, NOS, NRC Handelsblad, Nieuwsuur, Nu.nl, Pownews, RTL-Nieuws, Trouw and Vrij Nederland. This collaboration of almost all leading Dutch news organisations is a unique initiative without global precedent, in a time that safety, privacy and protection of whistleblowers is more relevant than ever.
|PyGame - Spieleprogrammierung für Kinder und Jugendliche||Entwicklung eigener kleiner Spiele für alle interessierten Kinder und Jugendliche|
|Python3 Porting||Porting to Python 3 It's not voodoo, it (sometimes) i not even a lot of work, do it! :)|
|Queer-Geeks-Gathering||A space and time for queer geeks and nerds to come together for meeting, chatting, connecting. Looking forward to you!|
|Researching Net||Short presentation of the results of a conference about the Polish Stop Acta Protest and discussion about social researching of the Net|
|Router-Flashworkshop||You want to be part of the Freifunk mesh network in your city? Come by and we help you to flash your router and answer questions!|
|Running a Hackerspace||A time to share the joy (and perhaps the pain) of running a hackerspace, how do you collect dues? How did you convince someone to insure you?|
|SMD Soldering Workshop||SMD (surface mount) soldering is not as hard as it seems.
During this workshop you will assemble your very own ATmega32u4 devboard (aka Arduino Leonardo).Only minimal soldering knowledge is required.
|Satoshi Square||After a short introduction to Bitcoin and a quick how to we will organize a Satoshi Square on the 30C3. A Satoshi Square is a self organized market place were people can trade bitcoin against fiat or whatever face to face. If you have bitcoin and wanna sell, bring them along. If you want bitcoin, bring a fitting device (Smartphone, Notebook) and some spare fiat money (e.g. Euros).|
|SawuGo workshop, the One Ring||goldsmithing and forging of a silver or golden ring from a piece of metal, with a nice hammered and faceted look, during all days of the event|
|Should Julian Assange be welcome?||Julian Assange was accused with several rape crimes. Anyhow the committee decided to let him speak at the 30c3 with the slogan "Sysadmins of the world, unite!" Is it okay, to let a person speak at Haal 1 on such an important topic who might have comitted a serious crime?|
|Situational Awareness Technology & Domestic Spy Centers||We'll have a discussion about the state of situational awareness technology - which has been developed by military contractors and is now being sold to law enforcement agencies for use in city-wide spy centers.|
|Smart Meter in Germany||As an introduction to this topic a brief status overview on German Smart Meter approach is given focusing on data safety, data security, end-to-end encryption and IT infrastructure. The subsequent discussion should be focused on the impact of a full rollout of the Smart Meter System in Germany.|
|Software with C/C++, ideas, how to's, stumbling blocks, results||A lot of code around is making creation of working software not that easy. A lecture or course about SW may trick even more. So, what is nonetheless working, what is supporting the creation? Is prototyping producing matter? Is prototyping expensive? Those questions will be topic and real examples will be shown.|
|Soldering For Kids!||Kids of all ages can Learn to Solder! Everyone will be making their own Trippy RGB Waves kit -- interactive colored blinky light art -- designed for total beginners of all ages to complete successfully -- ages 3.5 on up.
This is one of many way cool workshops at the Hardware Hacking Area!
|Soldering Workshop||Learn to solder, or further your soldering skills. All day, every day, whenever someone from BlinkenArea is available.|
|Soldering for yongsters||Komm doch rum, wenn du zwischen 15 und 19 Jahre alt bist und Lust hast löten zu lernen, ich bin selber 16 und würde mich mega freuen wenn du vorbei schaust Auf dem Kongress kann man sich verschiedenste Lötkits kaufen (10-20€), also such dir eines aus und ich erkläre dir wie man lötet|
|Spirit- and Cocktail-Meetup||We're going to visit Le Lion - Probably the best cocktail bar in Germany and a true heaven for Cocktail- and Spirits-Geeks!|
|Start to knit!||We’re going to go through the process of knitting the knit stitch and the purl stitch step by step, and we’ll also cover things you need to know before you start knitting, and several important techniques (such as how to start your knitting and how to end it!).|
|Stealth-sms||The Dutch police uses, like e.g. the German police, a silent or stealth sms to observe the locations of subjects. We will focuss on both the legal and the technical aspects of the stealth sms.|
|Tails needs your help!||Come and help us.|
|Tea time||We'd like to drink some proper tea with you.|
|Telekommunisten - workshop on techniques for social outcomes||Members of Telekommunisten will be workshopping current projects|
|The Go programming language||Want to write code that runs fast(er than ruby, python, php) and can be written fast(er than java, C++)? Go might be worth a try, especially for web and network projects. This workshop aims to be a platform to meet and exchange thoughts with other go programmers or simply to become one in the first place. No prior knowlegde required. Bringing a computer is highly recommended.|
|The good, the bad and the data||Do you remember the days before DevOps? The days when developers and system admins alike just
concentrated on the application and servers and the data was mere byproduct of the application? Data has become someone's content, someone's privacy and a gold mine of interesting trends. Data is no longer the byproduct of an application. This change has effect on the lives of the developers and as well as the lives of those who operate the systems. Have you seen this shift?How do you handle it when it hits you? Data protection and privacy are hot topics even outside the debate around national 3 letter acronyms.
|Tor Relay Operators Meetup||Torservers.net invites Tor exit relay operators and organizations to a meetup. If possible, prepare some slides on your activities, we will do quick presentations on recent and future activities around Torservers.net.|
|Traditional kimchi making||This workshop will teach you bases of traditional kimchi preparation and it's history, taught by native Korean.|
|Traditional makgeolli brewing||Learn more about traditional Korean alcoholic rice beverage "makgeolli", bit about it's history, current use and importantly how to make it by yourself!|
|Unbox party||mad tea party|
|Unethical Hacking Assembly||Every new redefinition of hacker ethics divides individuals in two groups, good and bad.
The hacker communities finally got rid of the old mass-media image of the "bad hacker". Who is the new "bad hacker" then? What practices and approaches are excluded by the new ethical paradigm?We propose a "mutual aid" (AA-style) group to share thoughts and experiences of being bad hackers today.
|Villa Straylight||The villa straylight program.|
|Villa Straylight DJs||the ambient and dub music lineup (strictly no dance music on this floor)|
|WE - Whistleblowing Everywhere||Whistle-blowing Everywhere! is a coalition made up by different organizations seeking to provide pragmatic, objective and specialized support to whistle-blowing initiatives world-wide in their many levels, promoting coordination between them and seeking solutions to the many tasks and challenges of contemporary digital whistle-blowing.|
|WLPress - volunteer-organized news||WikiLeaks-Press is a volunteer-organized and news aggregation website endorsed by WikiLeaks. Since 2011 we have researched the material that has been published by WikiLeaks. This includes Cablegate, the Iraq and Afghan War logs, the GIfiles and the Spy Files. There is a small core team of volunteers doing research and a larger group of volunteers who occasionally help out.
In this session we will explain the motivation behind the website, what we have published in the past and how you can find out how much fun researching the WikiLeaks material is!We are not official representatives of WikiLeaks – official WikiLeaks statements and information will only ever be given out over the WikiLeaks website and the @wikileaks twitter account.
|Warum brauchen Jugendliche eine Open Source-Community?||Kinder und Jugendliche sollen in die Open Source-Gemeinde integriert werden - warum?|
|What is next for the EU Data Protection reform?||Discussion about the future of the EU data protection reform. This is a follow-up workshop of the keynote by MEP Jan Philipp Albrecht.|
|Whisky||Third time is the charm. This is the third incarnation of the popular whisky evening. It's fairly simple: If you enjoy good whisky, or are planing to do so, join us. We'll have the virtual chimney fire going and will get you ready for the fnord-Jahresrückblick. Last minute updates via ADN broadcast: https://app.net/c/2r77|
|Who is geek girl? Loaded words & politics|
|Wordlounge Performances||We will have Poetry, Sci Fi Reading and RadioRollplays here on this stage.|
|YBTI Crypto Names||The great shoot out panel of the name resolution titans. Does it make sense to patch the Domain Name System? Which strategy should we pick for a safer new Internet stack? Should we require cryptographic privacy of name resolution?
|YBTI Cryptographic Routing||Cryptographic routing is the foundation of our GNU Internet beyond X.509, DNS, SMTP and XMPP. Even the IETF is now considering that Onion Routing should be a fundamental capability of the Internet. How would that look like in practice?
|YBTI Hardware||If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us.
|YBTI In Depth||A chance to go in-depth and cover some missing aspects.
|YBTI Introduction||Somebody broke the Internet. We will meet in a series of workshops to discuss the layers of a new stack and motivate projects to work together on the common goal of fixing the net and implement the constitutional right of Secrecy of Correspondence. This is a short kick-off introduction to the event series just before the Crypto Names session.|
|YBTI Meshnet Works||Cut out the service provider middle man. Projects like ServalMesh, Zyre, Briar, GNUnet and of course freifunk are already doing this. Let's make it a part of normality. Let's exchange public keys this way etc.
|YBTI Operating System||From safer use of cryptography over kernel magic to reproducible compilation up to a vision of a full security redesign of the OS.
|YBTI Political Attack Vectors||How much damage can be limited by appropriate legislation? Is it okay for example to propose a law that makes unencrypted private conversation technology illegal after 2014?
|YBTI Results||Presenting the results of the #youbroketheinternet sessions: - Which projects will participate in building the stack of a GNU Internet. - What architectural and security choices have we made. - Which jobs to be done have been identified, how you can help.|
|YBTI Scalability||How can we build systems that are capable of scaling to hundreds of millions of users? Why is it so hard to do a distributed Twitter so that it actually works?
|YBTI Strategic Choices||Based on the sessions in the past days it is time to take some decisions on the future of #youbroketheinternet:
|YBTI TNG Apps||The next generation on privacy and crypto apps all satellite around cryptographic routing. We'll discuss E-Mail replacements, secure telephony and DHT-based storage systems.
|YBTI Usability||How can we make our technologies grandparent compatible and the exchange of cryptographic keys and shared secrets a natural everyday transaction? Does every piece of software have to be socially aware to be usable?
|Zwiebelfreunde e.V. Mitgliedervollversammlung||Offizielle Mitgliederversammlung Zwiebelfreunde e.V. / Official Members Meeting Zwiebelfreunde e.V.|
There are 155 registered self-organized sessions.
Your Self-organized Session goes 30C3
On this page you can find a list of planned self-organized sessions by participants of the 30C3 and you'll find the necessary information to create your own one.
The idea is, that we will be able to provide a global workshop and talk calendar: Everyone being at the 30C3 is able to look at this calendar and will find out what self-organized sessions are currently running besides the "big" talks in the halls.
Registering own workshops or talks
To register your self-organized sessions just use the self-organized session form.
For now, the crucial information are
- Name of the self-organized session (which will be used as the site name)
- A short description
- A valid email address that might be used by the orga team to contact you
It might even be great, if you give some information about the person and assembly performing the self-organized session and a rough start- and end-time for the schedule, as well as a location. You can always update this information later.
For a detailed description, you can use the Free text field. This field allows the usual mediawiki syntax, and it will be the body of your page at the end.
You can also select a location for your self-organized. There will be again special rooms and places for this, they will be added here soon.
Planning self-organized sessions within the workshop rooms works on a "fair use policy":
- You can plan any timeslot that is still free (FCFS). Take a look into our Calendar or the timelines on the workshop location pages.
- You may register self-organized sessions in one of the workshop rooms with a maximum duration of 3 hours. If you need more time, you might kindly want to ask one of the Assemblies that provide space for workshops, if you can perform your workshop there.
- Give a valid contact on your self-organized session page. If no name given, we are not able to contact you in case of questions.