BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
CALSCALE:GREGORIAN
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin
BEGIN:STANDARD
DTSTART:20141026T030000
RDATE:20141026T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T233000
DTSTAMP;VALUE=DATE-TIME:20150107T131845Z
UID:4aOXU9cdQYbirV0Q-k5usw@frab.cccv.de
DESCRIPTION:Two weeks after the Heartbleed bug was announced\, CloudFlare
  patched the Heartbleed bug\, created a challenge to prove the bug could
  be used to find private keys (uncovering a second bug in OpenSSL) and t
 urned its entire network into a giant honeypot. This session will discus
 s the specific steps taken to prevent early disclosure\, creating and sc
 aling the first public vulnerability test\, how the CloudFlare Heartblee
 d challenge showed that you can reveal private SSL keys (how a second bu
 g in OpenSSL made this possible) the incredible impact of revoking over 
 100\,000 certificates in a single day\, and the results of our honeypot 
 revealing the proportion of attack traffic versus research traffic. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6212.html
SUMMARY: Heartache and Heartbleed: The insider’s perspective on the after
 math of Heartbleed
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000
DTSTAMP;VALUE=DATE-TIME:20141231T012818Z
UID:0hwHwiTLCTkE94bpOBOcVg@frab.cccv.de
DESCRIPTION:3 theater projects that illustrate the false "California Ideo
 logy" and ask us to look at our slip into neoliberalism through the back
 door of technology and to consider the ethics in the protocol. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6547.html
SUMMARY:"Exploit" in theater
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500
DTSTAMP;VALUE=DATE-TIME:20150118T104621Z
UID:HOqeNIb6G7M4hYFKFRkCmQ@frab.cccv.de
DESCRIPTION:Im Sommer 2014 wurde die sogenannte Digitale „Agenda“ vorgest
 ellt\, die als „netzpolitisches Regierungsprogramm“ bezeichnet wurde. Au
 s texttypologischer Sicht handelt es sich aber eher um einen PR-Text\, d
 er so aussieht\, als sei er ein Auszug aus einer Wahlkampfbroschüre. Der
  Vortrag analysiert den Text zunächst inhaltlich\, um zu zeigen\, worum 
 es im Einzelnen geht und wo Widersprüche auftauchen\, dann aus textkriti
 scher und aus linguistischer Perspektive. Insbesondere werden bestimmte 
 Interessen der Bundesregierung und anderer Akteure deutlich\, die wenige
 r offen thematisiert werden\, aber doch sprachlich zu Tage treten.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6264.html
SUMMARY:„Wir beteiligen uns aktiv an den Diskussionen“
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T190000
DTSTAMP;VALUE=DATE-TIME:20150108T132748Z
UID:defd3b01-c39d-433f-b3c4-dbea1ea2fe00@frab.cccv.de
DESCRIPTION:In general data is stored on technically sensitive systems an
 d can easily be lost. At the same time files today appear often as indes
 tructible once uploaded to the Internet.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6595.html
SUMMARY:»Hard Drive Punch«
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500
DTSTAMP;VALUE=DATE-TIME:20150101T181335Z
UID:P27IBlfmjGfZIib1deB_xg@frab.cccv.de
DESCRIPTION:This talk presents a deep analysis of banking mobile apps ava
 ilable in the world. Based on static and dynamic analysis as well as on 
 the analysis of the final source code we show that a vast majority of th
 em are not respecting users' privacy and users' data protection. Worse a
  few of them contains critical bugs
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6530.html
SUMMARY:(In)Security of Mobile Banking
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000
DTSTAMP;VALUE=DATE-TIME:20150116T075714Z
UID:1hSKsR-r9B0BnpLfUvpDAg@frab.cccv.de
DESCRIPTION:Seit nun über 10 Jahren gibt es OpenStreetMap. Besonders in d
 en letzten drei Jahren war die Entwicklung überwältigend\, sowohl was di
 e Datenlage als auch das gesamte Ökosystem anbelangt. Wir wollen zeigen\
 , was möglich ist und was in der Zukunft (hoffentlich) passieren wird.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6255.html
SUMMARY:10 Jahre OpenStreetMap
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T183000
DTSTAMP;VALUE=DATE-TIME:20150107T114336Z
UID:eddb2328-37c3-4e86-86cc-c8541d14b4d7@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6562.html
SUMMARY:31C3 Closing Event
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000
DTSTAMP;VALUE=DATE-TIME:20150105T144000Z
UID:e192e98a-90ca-44c8-9cfd-86b94a79f4d1@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6557.html
SUMMARY:31C3 Infrastructure Review
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T113000
DTSTAMP;VALUE=DATE-TIME:20150118T104044Z
UID:8c4e647f-813e-41ef-b05b-65469dd841c3@frab.cccv.de
DESCRIPTION:The 31C3 Keynote
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6571.html
SUMMARY:31C3 Keynote
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T113000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T110000
DTSTAMP;VALUE=DATE-TIME:20150122T130014Z
UID:29aecfd7-2e44-4f49-ab86-29b5e0877325@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6561.html
SUMMARY:31C3 Opening Event
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500
DTSTAMP;VALUE=DATE-TIME:20150106T194847Z
UID:SXxWu-U4pNjjFZLl9XXDDA@frab.cccv.de
DESCRIPTION:We use microwaves to cast aluminum from 3D printed objects. T
 his gives us the ability to cast high quality 6040 aluminum pieces using
  a 3D printer and commercially available consumer microwaves. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6417.html
SUMMARY:3D Casting Aluminum
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000
DTSTAMP;VALUE=DATE-TIME:20150104T154202Z
UID:lE9xGxC7-9DQGljZOWg_Sw@frab.cccv.de
DESCRIPTION:What do the arts and literature have to contribute to urgent 
 debates about the technization of food production? What can a play from 
 1605 tell us about fairer distribution of natural resources today? Equal
 ly\, how might a cyber thriller from 2011 help us debate contentious iss
 ues such as gene-based technologies and utopian visions of knowledge-led
  society? This talk considers agri-tech and food security across a wide 
 sweep of social and political terrain\, from the Arab Spring to the Euro
 pean horsemeat scandal\, from Shakespeare to Daniel Suarez. It argues th
 at the arts and sciences need to cooperate to deepen understanding about
 \, and define actions on\, the big challenges facing a needy world. Fina
 lly\, it suggests ways in which the arts and technology can assist us in
  arriving at a model of society in which resources are distributed not o
 nly more efficiently\, but also more equitably.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6135.html
SUMMARY:Agri-tech and the Arts: From Barns to D-Space
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500
DTSTAMP;VALUE=DATE-TIME:20150105T095012Z
UID:_lVlmBO98KMg4M-n-_A3FA@frab.cccv.de
DESCRIPTION:You definitely should care. The aim of this talk is to provid
 e insight to the  security\, architecture and yes you guessed it\, vulne
 rability of the AMD System Management Unit (SMU) firmware found in moder
 n AMD x86 processors.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6103.html
SUMMARY:AMD x86 SMU firmware analysis
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203000
DTSTAMP;VALUE=DATE-TIME:20150104T183449Z
UID:T7aunKcOFBLl5b8IGVqJWQ@frab.cccv.de
DESCRIPTION:On modern Intel based computers there exists two powerful and
  protected code regions: the UEFI firmware and System Management Mode (S
 MM). UEFI is the replacement for conventional BIOS and has the responsib
 ility of initializing the platform. SMM is a powerful mode of execution 
 on Intel CPUs that is even more privileged than a hypervisor. Because of
  their powerful positions\, SMM and UEFI are protected by a variety of h
 ardware mechanisms. In this talk\, Rafal Wojtczuk and Corey Kallenberg t
 eam up to disclose several prevalent vulnerabilities that result in SMM 
 runtime breakin as well as arbitrary reflash of the UEFI firmware.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6129.html
SUMMARY:Attacks on UEFI security\, inspired by Darth Venamis's misery and
  Speed Racer
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500
DTSTAMP;VALUE=DATE-TIME:20150104T004113Z
UID:aUcSuwZ2iMoJQMEL40opIw@frab.cccv.de
DESCRIPTION:Re-using works licensed under Creative Commons seems pretty s
 imple\, but it can often be quite time consuming. One image might be oka
 y\, but keeping track of the license and attribution of a thousand image
 s in your mashup\, or when quoting from massively crowdsourced data sets
  such as Wikipedia? Whoah! Don’t we have computers to do that for us!? W
 e do –  but there’s no widespread support for including licensing or aut
 hor information when sharing or reusing digital works. This session will
  discuss how this should work in the open knowledge environment.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6214.html
SUMMARY:Attribution revolution
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T220000
DTSTAMP;VALUE=DATE-TIME:20150106T203948Z
UID:7dt2PzyGxZI8i0QQysCZ6Q@frab.cccv.de
DESCRIPTION:Transcribing a talk comes relatively easy to fast typists\, w
 hereas turning a transcript into time-aligned subtitles for a video requ
 ires a much larger human effort. In contrast\, speech recognition perfor
 mance (especially for open-source-based solutions)\, is still poor on op
 en-domain topics\, but speech technology is able to align a given text t
 o the corresponding speech with high accuracy. Let's join forces to gene
 rate superior subtitling with little effort\, and to improve future open
 -source-based speech recognizers\, at the same time!\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6554.html
SUMMARY:Automatically Subtitling the C3
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000
DTSTAMP;VALUE=DATE-TIME:20150101T212246Z
UID:wyL8OVhv0Y6VczeYR3K_jQ@frab.cccv.de
DESCRIPTION:Axoloti is an integrated platform for digital audio: its grap
 hical editor is an easy-to-use toolbox for creating sound synthesis or p
 rocessing algorithms. The audio processing runs on a microcontroller boa
 rd\, and runs standalone after editing. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6402.html
SUMMARY:Axoloti
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500
DTSTAMP;VALUE=DATE-TIME:20150113T223549Z
UID:DvpNPWPGVgSqGcOI1WK45g@frab.cccv.de
DESCRIPTION:Ever wondered what the cryptic <code>QNY27R</code> on your ai
 rline reservaton means? This talk explores typical computing environment
  as seen in the air transport industry. Discover ancient software\, old 
 communication protocols and cryptic systems. What data are stored and ho
 w they are exchanged to keep the air transport industry running. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6308.html
SUMMARY:Beyond PNR: Exploring airline systems
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000
DTSTAMP;VALUE=DATE-TIME:20150106T093643Z
UID:5gpaE5FLmfxMjTlbSDJkWw@frab.cccv.de
DESCRIPTION:"Nearly all of the symmetric encryption modes you learned  ab
 out in school\, textbooks\, and Wikipedia are (potentially) insecure." -
 - Matthew Green\n\nIn recent history\, we saw time and again (to some ex
 tent catastrophic) failures of cryptographic constructions for authentic
 ated encryption (AE) due to bad design choices\, implementation errors a
 nd a lack of reliable standards. After an introduction providing some ba
 ckground information on these topics\, we present CAESAR\, a new cryptog
 raphic competition which aims to find solutions to the problems mentione
 d above. In the second part of the talk\, we introduce NORX\, a new and 
 next-generation AE scheme and our candidate for CAESAR.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6137.html
SUMMARY:CAESAR and NORX
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T021500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000
DTSTAMP;VALUE=DATE-TIME:20150109T224230Z
UID:77aea78c-f2d2-461a-92b3-82929a79d598@frab.cccv.de
DESCRIPTION:"Citizenfour" is Laura Poitras' documentary and a closeup vie
 w about blowing the whistle on the spooks at the NSA.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6581.html
SUMMARY:Citizenfour
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000
DTSTAMP;VALUE=DATE-TIME:20150114T205709Z
UID:n2DFvyl_lWjW-gm317vT3A@frab.cccv.de
DESCRIPTION:Programs are full of bugs\, leading to vulnerabilities. We'll
  discuss power and limitations of code-pointer integrity (CPI)\, a stron
 g but practical security policy that enforces memory safety for all code
  pointers\, protecting against any form of control-flow hijack attack (e
 . g.\, ROP or JOP).\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6050.html
SUMMARY:Code Pointer Integrity
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500
DTSTAMP;VALUE=DATE-TIME:20150104T184108Z
UID:iU5CnqxotZz_KK2P-uVMsQ@frab.cccv.de
DESCRIPTION:This talk will reflect on teaching Computer Science in Pyongy
 ang over the last two years\, and look at how technology has been integr
 ated into civilian life in the DPRK. Remaining an extremely isolated cou
 ntry\, many people would be surprised to hear that cellphones have becom
 e commonplace within the capitol\, let alone that the country invests in
  custom hardware and software. I'll talk through the current state of de
 sktop and mobile technology in pyongyang\, and what's changing.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6253.html
SUMMARY:Computer Science in the DPRK
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T140000
DTSTAMP;VALUE=DATE-TIME:20150105T182319Z
UID:P8L4krxqjXP7zHMZToU6CQ@frab.cccv.de
DESCRIPTION:After years of debate\, EU copyright law is finally being rev
 isited. The Commission will present a proposal for reform within 4 month
 s of 31c3. And it's high time: There has never been a bigger discrepancy
  between the technical feasibility to share information and knowledge ac
 ross all physical borders and the legal restrictions to actually do so. 
 This talk outlines the unique opportunity and the challenge to bring cop
 yright into the 21st century that lies in front of us. Hackers ensured t
 hat people were heard during last winter's public consultation. Can they
  now also ensure a progressive outcome of the reform process?
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6350.html
SUMMARY:Correcting copywrongs
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000
DTSTAMP;VALUE=DATE-TIME:20150109T224246Z
UID:MghFmvDBS-J7T2ZOkNXUKA@frab.cccv.de
DESCRIPTION:Julia Angwin\, Jack Gillum\, and Laura Poitras will tell us s
 tories about how they use crypto and privacy-enhancing technologies as h
 igh-profile journalists\, and rant in an entertaining way about how thes
 e tools have failed or are horribly inadequate for their needs. They wil
 l also talk about their rare crypto successes.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6154.html
SUMMARY:Crypto Tales from the Trenches
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T140000
DTSTAMP;VALUE=DATE-TIME:20150107T131822Z
UID:ELK9-ZQeFcqKxBYW8eay8g@frab.cccv.de
DESCRIPTION:Reverse engineering is not all binaries and byte-code. The bl
 ack art also extends to networks and unobtainable game servers. In this 
 talk we go into the gruesome details of how we dug through the graveyard
 s of console binaries and mausoleums of forgotten network protocols in o
 rder to stitch together the pieces necessary to bring our favorite game 
 Metal Gear Online back to life.\n\nWe will be examining the process of r
 everse engineering the games custom network protocols in all angles from
  packet logs to low level disassembly of client code.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5956.html
SUMMARY:Cyber Necromancy
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500
DTSTAMP;VALUE=DATE-TIME:20150106T214759Z
UID:SkWIxKKgQFunVQAJT_oagA@frab.cccv.de
DESCRIPTION:So you want to author a next Stuxnet (or even cooler than tha
 t). Here is the success recipe: forget what you have known about cyber s
 ecurity. When an attack transitions from control of a digital system to 
 control of a physical process\, physics and time become controlling fact
 ors instead of the digital rules encoded into your microcontroller.\n\nT
 he holly CIA trinity is meaningless in the physical world. The uncontrol
 lable but still running process is not really available\; process dynami
 cs does not stop simply because the controlling equipment is DoSed\; ele
 ctronically segregated components can still communicate over physical me
 dia (the process) and a physical phenomenon can be measured terribly wro
 ngly (so that the wrong measurement will be  proudly delivered to the di
 gital application in a totally secure way). Where physics plays a govern
 ing role\, IT security concepts are rendered useless. \n\nPlease welcome
  a new arrival in the "damn"-frameworks series - Damn Vulnerable Chemica
 l Process. Come to the lecture and learn what it takes to exploit a phys
 ical process: how to find vulnerabilities and how to exploit them with m
 inimal cost and maximum impact. Get astonished about the gazillion of un
 certainties you will have to face on your way to disruptive goal and rea
 lize that the TIME is ONLY what matters while designing your attack .\n\
 nMake sure to visit local library and refresh your knowledge on physics\
 , chemistry\, mechanics\, control theory\, signal processing and algorit
 hms. The lecture will teach you how to apply this knowledge in the excit
 ing world of cyber-physical exploitation.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6463.html
SUMMARY:Damn Vulnerable Chemical Process
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000
DTSTAMP;VALUE=DATE-TIME:20150106T201855Z
UID:66379bd1-4e68-4bcf-9d1e-0f4c38fbe78e@frab.cccv.de
DESCRIPTION:Im Vortrag wird die technische Umsetzung des Transparenzporta
 ls Hamburg vorgestellt.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6582.html
SUMMARY:Das Transparenzportal Hamburg
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000
DTSTAMP;VALUE=DATE-TIME:20150107T132226Z
UID:Rm1YndV-p_f5_NFEyPZMNA@frab.cccv.de
DESCRIPTION:Die Kritik am Freihandelsabkommen TTIP und CETA auf die Chlor
 hühnchen zu beschränken\, greift viel zu kurz. Denn bei den beiden Abkom
 men zwischen der EU und den USA und der EU und Kanada steht noch viel me
 hr auf dem Spiel. Egal ob Datenschutz\, Demokratie oder Urheberrecht – A
 bkommen\, an denen Konzerne unter Ausschluss der Öffentlichkeit mitschre
 iben können\, sind selten eine gute Idee. Sitzungsdokumente mit “unverbi
 ndlichen” Lobby-Vorschlägen und Leaks der Vertragstexte lassen wenig Gut
 es erwarten. Datenschutzstandards laufen Gefahr zu Handelshemmnissen erk
 lärt zu werden. Konzerne pochen darauf\, Staaten vor außerstaatlichen Sc
 hiedsgerichten auf Schadensersatz verklagen zu können. Was die Bürger wo
 llen\, wurde im ganzen Verhandlungsprozess der beiden Freihandelsabkomme
 n nicht einmal gefragt. Doch “Klicktivismus” war gestern – neue Strategi
 en und Tools halfen dabei\, eine Welle des dezentralen Protests loszutre
 ten. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6342.html
SUMMARY:Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500
DTSTAMP;VALUE=DATE-TIME:20150114T120158Z
UID:yN_BHtGEljjFHh2dl-Irug@frab.cccv.de
DESCRIPTION:The next revolution in data processing is Quantum computing.\
 nThis talk is an entertaining “tour de force” starting with a brief intr
 oduction to the fascinating yet strange theories of quantum physics\, th
 e concepts of using these in quantum computing and the latest results on
  qubits in devices made out of real diamonds.\nIf you want to learn abou
 t the machines that decrypt your passwords in the coming years and how y
 ou can actually grow diamonds in your microwave oven (and who wouldn’t?)
  this talk is for you!\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6157.html
SUMMARY:Diamonds are a quantum computer’s best friend
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500
DTSTAMP;VALUE=DATE-TIME:20150111T210314Z
UID:L9rFWciMu_GVpHLIhPT9Qg@frab.cccv.de
DESCRIPTION:Im Rahmen meiner Forschungsarbeit "Das Bild im digitalen Wand
 el" beschätige ich mich mit der Veränderung der Bilder im Rahmen der Ver
 änderung der medialen Anwendung und Vermittlung von Bildern.\nDarüber wü
 rde ich gerne sprechen.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6381.html
SUMMARY:Die Krise der Bilder ist die Krise der Politik
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T230000
DTSTAMP;VALUE=DATE-TIME:20141231T145803Z
UID:xyADKdXtvEgJWo6eaTmUBQ@frab.cccv.de
DESCRIPTION:Whistleblowing is becoming a progressively popular topic and 
 ways to technically support anonymous submissions by journalistic source
 s are being increasingly discussed and developed. However\, there is muc
 h more to protecting sources than the technical side. There is currently
  little discussion about the surrounding ethics\, operational security a
 nd public protections of sources. Two women that have expertise in all a
 reas of source protection\; from submission\, to publication\, to after-
 care explain and discuss what source protection really means\, issues th
 at have arisen in recent years\, often causing disastrous consequences\,
  as well as the important lessons to learn from these and successful cas
 es.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6291.html
SUMMARY:Doing right by sources\, done right
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500
DTSTAMP;VALUE=DATE-TIME:20150114T211618Z
UID:dN7QONPJousa5xBD6XQxgg@frab.cccv.de
DESCRIPTION:In the wake of the Snowden revelations and the explicit targe
 tting of address book and buddy list information\, social service provid
 ers may wish to actively avoid learning which of its users are friends. 
  In this talk\, we will introduce the workings of a surprising technolog
 y called private information retrieval\, or PIR. Then\, we will describe
  its use in DP5\, a new suite of privacy-preserving presence protocols t
 hat allow people to determine when their friends are online (and to esta
 blish secure communications with them)\, without a centralized provider 
 ever learning who is friends with whom.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6140.html
SUMMARY:DP5: PIR for Privacy-preserving Presence
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500
DTSTAMP;VALUE=DATE-TIME:20150113T073825Z
UID:7G4FQIXg2eb7D6F_jNwuxA@frab.cccv.de
DESCRIPTION:This talk will explain how to work with elliptic curves const
 ructively to obtain secure and efficient implementations\, and will high
 light pitfalls that must be avoided when implementing elliptic-curve cry
 pto (ECC). The talk will also explain what all the buzz in curve choices
  for TLS is about. This talk does not require any prior exposure to ECC.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6369.html
SUMMARY:ECCHacks
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000
DTSTAMP;VALUE=DATE-TIME:20150104T183944Z
UID:_kPJG76FUvxbX7Z6h20Gcw@frab.cccv.de
DESCRIPTION:EMET (Enhanced Mitigation Experience Toolkit) is an applicati
 on which can be used to further harden a Windows system by adding additi
 onal security protections to running processes. These protections includ
 e several ROP (Return-Oriented-Programming) checks\, shellcode detection
  mechansims\, heap-spray mitigations and many more.\nThe talk covers tec
 hniques to bypass EMET 5.1 (the current version) and shows the audience 
 how hard/easy it is for an attacker to accomplish this.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6161.html
SUMMARY:EMET 5.1 - Armor or Curtain?
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000
DTSTAMP;VALUE=DATE-TIME:20150115T125208Z
UID:-fw4u4HgOtFUvdKnF7Xrbw@frab.cccv.de
DESCRIPTION:Eine Mietwohnung ist seit circa 20 Jahren verlassen\, ihr Bew
 ohner nicht auffindbar. Unveränderte Möblierung\, Ausstattung und persön
 liche Hinterlassenschaften sind jedoch noch vorhanden und unberührt.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6124.html
SUMMARY:ES GIBT VIEL ZU TUN - HAU'N WIR AB.
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500
DTSTAMP;VALUE=DATE-TIME:20150117T014418Z
UID:aowmh_BVhxN_YNmkQomweQ@frab.cccv.de
DESCRIPTION:The talk gives an overview about the emerging field of smart 
 glasses and how they can be used to augment our mind (e.g. how to improv
 e our brain with technology). The talk will focus mostly on how to quant
 ify cognitive tasks in real world environments. I also present a first a
 pplication scenarios on how to use smart eyewear (e.g. google glass or J
 INS MEME) for short term memory augmentation and cognitive activity reco
 gnition.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6460.html
SUMMARY:Eye Wear Computing
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500
DTSTAMP;VALUE=DATE-TIME:20150105T100833Z
UID:gRbk7OprwZBqF3cv0NddMQ@frab.cccv.de
DESCRIPTION:We introduce Fernvale\, a reverse-engineered\, open hardware 
 and software platform based upon Mediatek's MT6260 value phone SoC. The 
 MT6260 is the chip that powers many of the $10 GSM feature phones produc
 ed by the Shanzhai. \n\nFernvale is made available as open-licensed sche
 matics\, board layouts\, and an RTOS based upon the BSD-licensed NuttX\,
  as well as a suite of open tools for code development and firmware uplo
 ad. We discuss our technical reverse engineering efforts\, as well as ou
 r methodology to lawfully import IP from the Shanzhai ecosystem into the
  Maker ecosystem. We hope to establish a repeatable\, if not labor-inten
 sive\, model for opening up previously closed IP of interest\, thereby o
 utlining a path to leveling the playing field for lawful Makers.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6156.html
SUMMARY:Fernvale: An Open Hardware and Software Platform\, Based on the (
 nominally) Closed-Source MT6260 SoC
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500
DTSTAMP;VALUE=DATE-TIME:20150103T132617Z
UID:0T8GTXjwMVJLM_n5VEuE0A@frab.cccv.de
DESCRIPTION:Using the same stream cipher key twice is known to be a Very 
 Bad Idea\, but keystream-resuse vulnerabilities are still very much a th
 ing of the present - both in legitimate software and in the malware land
 scape. We describe a heuristic algorithm which can detect vulnerabilitie
 s of this kind. We explain the inner workings of the algorithm and demon
 strate a proof-of-concept attack on sevreral examples of vulnerable data
 \, including files encrypted by the DirCrypt malware and encrypted traff
 ic generated by malware such as variants of Zeus and Ramnit.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6144.html
SUMMARY:Finding the Weak Crypto Needle in a Byte Haystack
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T014500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T001500
DTSTAMP;VALUE=DATE-TIME:20150113T131300Z
UID:Mw1wjnNzwxzSkM3Ip5Lg0g@frab.cccv.de
DESCRIPTION:Im Format einer lockeren Abendshow werden wir die Nachrichten
 -Highlights des Jahres präsentieren\, die Meldungen zwischen den Meldung
 en\, die subtilen Sensationen hinter den Schlagzeilen.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6109.html
SUMMARY:Fnord News Show
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T014500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T001500
DTSTAMP;VALUE=DATE-TIME:20150106T215736Z
UID:74711c06-8813-4158-b102-36dbbe374d13@frab.cccv.de
DESCRIPTION:Im Format einer lockeren Abendshow werden wir die Nachrichten
 -Highlights des Jahres präsentieren\, die Meldungen zwischen den Meldung
 en\, die subtilen Sensationen hinter den Schlagzeilen.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6606.html
SUMMARY:Fnord News Show (Stream)
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000
DTSTAMP;VALUE=DATE-TIME:20150110T133525Z
UID:UqfjLnUNKqc6-WzUjP6YQg@frab.cccv.de
DESCRIPTION:The presentation will cover the journey that we have taken to
  develop the USB armory board from scratch\, explaining the lessons lear
 ned and its prospected applications.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6541.html
SUMMARY:Forging the USB armory
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000
DTSTAMP;VALUE=DATE-TIME:20150119T235034Z
UID:iWU6RrYVPk7Q-fLuBE-LoQ@frab.cccv.de
DESCRIPTION:For freedom in your own computer\, the software must be free.
 \nFor freedom on the internet\, we must organize against\nsurveillance\,
  censorship\, SaaSS and the war against sharing.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6123.html
SUMMARY:Freedom in your computer and in the net
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T113000
DTSTAMP;VALUE=DATE-TIME:20150119T024906Z
UID:1116a02b-0312-4949-9921-d605148bfccb@frab.cccv.de
DESCRIPTION:How can the physical universe give rise to a mind? I suggest 
 to replace this confusing question by another one: what kind of informat
 ion processing system is the mind\, and how is the mind computed? As we 
 will see\, even our ideas of the physical universe turn out to be comput
 ational. Let us explore some fascinating scenery of the philosophy under
 lying Artificial Intelligence.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6573.html
SUMMARY:From Computation to Consciousness
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000
DTSTAMP;VALUE=DATE-TIME:20150103T141601Z
UID:AvAdq20cdc8iWoNubd6ABw@frab.cccv.de
DESCRIPTION:Maxwell's  equations are four differential equations which fo
 rm the foundation of classical electrodynamics\, classical optics\, and 
 electric circuits. This talk will take a look at the connection between 
 these equations\, wave propagation and antenna arrays.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6361.html
SUMMARY:From Maxwell to antenna arrays
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T140000
DTSTAMP;VALUE=DATE-TIME:20150122T184439Z
UID:H1GEe9l64eUbo1oZXtLkEg@frab.cccv.de
DESCRIPTION:Binary tricks to evade identification\, detection\, to exploi
 t encryption and hash collisions.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5930.html
SUMMARY:Funky File Formats
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000
DTSTAMP;VALUE=DATE-TIME:20150114T210553Z
UID:1Xe2U3LqTfMTXAvI6hrgxg@frab.cccv.de
DESCRIPTION:Im Grunde sind GIFs Schnee von gestern. Es gibt zahlreiche Al
 ternativen\, die das\, was ein GIF kann\, besser können. Und trotzdem ha
 ben sich GIFs als Kulturtechnik durchgesetzt. Oder war es nur ein letzte
 r Hype vor dem Tod? Wie kommt es\, dass ein Medium\, das schon in den 90
 ern veraltet war\, sich noch zwei Jahrzehnte später bester Beliebtheit e
 rfreut? Und was können wir daraus über die Diskrepanz zwischen aktueller
  technischer Entwicklung einerseits und der tatsächlichen Nutzung von Te
 chnologie andererseits lernen?
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6325.html
SUMMARY:GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500
DTSTAMP;VALUE=DATE-TIME:20150111T160518Z
UID:Bnz1quB2NHq9BEXoyNm5xQ@frab.cccv.de
DESCRIPTION:Despite claims of its obsolescence\, electrical glitching can
  be a viable attack vector against some ICs. This presentation chronicle
 s a quest to learn what types of electrical transients can be introduced
  into an integrated circuit to cause a variety of circuit faults advanta
 geous to an reverser. Several hardware platforms were constructed during
  the quest to aid in research\, including old-skool & solderless breadbo
 ards\, photo-etched & professional PCBs\, FPGAs\, and cheap & dirty home
 made logic analyzers. The strengths and weaknesses of the various approa
 ches will be discussed.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6499.html
SUMMARY:Glitching For n00bs
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500
DTSTAMP;VALUE=DATE-TIME:20141130T192225Z
UID:KNu4tX4NRJCFiFCsIh-FxA@frab.cccv.de
DESCRIPTION:An update to our Reports from the Frontlines talk at OHM 2013
 \, we will provide the latest stories and figures from Access' digital s
 ecurity helpline that provides security incident response and technical 
 support to civil society groups and human rights defenders around the wo
 rld.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6399.html
SUMMARY:Global Civil Society Under Attack
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T021500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T001500
DTSTAMP;VALUE=DATE-TIME:20150115T114811Z
UID:Ls3UZdXbRpTYhYncqSJN_w@frab.cccv.de
DESCRIPTION:Beim Googlequiz spielen max. 7 Teams mit je max. 7 Spielern g
 egeneinander. Sie dürfen dabei nicht Google benutzen. Es ist eine recht 
 spaßorientierte Angelegenheit\, so dass auch Zuschauer willkommen sind.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6226.html
SUMMARY:Googlequiz – 2015er Edition
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000
DTSTAMP;VALUE=DATE-TIME:20150102T210529Z
UID:n8k2uElFR872zYbrs7kycQ@frab.cccv.de
DESCRIPTION:Ethics in Computer Science is now finally gaining some well d
 eserved attention.  At the University of Amsterdam\, we have started an 
 ethical committee for the System and Network Engineering Master. In this
  talk we describe how and why we started this committee\, and also look 
 back at our first results.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6071.html
SUMMARY:Hacking Ethics in Education
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000
DTSTAMP;VALUE=DATE-TIME:20150105T002505Z
UID:V_yKfMGBUgnu6g90YF-iBA@frab.cccv.de
DESCRIPTION:Extending the common 3-space-to-2-space projections to 4D and
  higher and how certain types of fractals can be presented using these e
 xpansions. After that we'll have a closer look at Fractal Flames as used
  in Electric Sheep.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6072.html
SUMMARY:Higher-Dimensional Geometry and Fractals
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000
DTSTAMP;VALUE=DATE-TIME:20150106T195616Z
UID:0CpZm9-0S1ja92XDOICX0Q@frab.cccv.de
DESCRIPTION:An introduction to the Robot Operating System (ROS) for the h
 ome/hackerspace roboticist (if it physically interacts with the world th
 rough code\, call it robot).
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6077.html
SUMMARY:How I Learned to Stop Reinventing and Love the Wheels
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000
DTSTAMP;VALUE=DATE-TIME:20150122T130128Z
UID:A8xVpIjX1oKQOQcWMt_49Q@frab.cccv.de
DESCRIPTION:Bei der Passworteingabe über die Schultern schauen? Die Matef
 lasche klauen\, um an Fingerabdrücke zu kommen? Alles Technik von gester
 n. Der Vortrag zeigt\, wie man heutzutage an Daten kommt\, um Authentifi
 zierungsmethoden zu überwinden.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6450.html
SUMMARY:Ich sehe\, also bin ich ... Du
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000
DTSTAMP;VALUE=DATE-TIME:20150106T203559Z
UID:Lt7ABZNFLzAgdiGcpHPHUQ@frab.cccv.de
DESCRIPTION:Die interessantesten IFG-Geschichten des Jahres mit Anfragen 
 und Ablehnungen\, Klagen und Kampagnen. Außerdem: wie wir mit Hilfe des 
 Journalismus der Informationsfreiheit neuen Antrieb geben werden!
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6366.html
SUMMARY:IFG – Mit freundlichen Grüßen
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000
DTSTAMP;VALUE=DATE-TIME:20150107T132045Z
UID:rSiFVNguzdBmx13Lb-gobg@frab.cccv.de
DESCRIPTION:This speech about how the hacker scene is failing its own ide
 als and what questions must be addressed to make a real difference.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6205.html
SUMMARY:Infocalypse now: P0wning stuff is not enough
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000
DTSTAMP;VALUE=DATE-TIME:20150102T214512Z
UID:lWgvj2btOjK-_XxUtIs-qw@frab.cccv.de
DESCRIPTION:Simple access to social media and cell phone has widely been 
 accepted as a positive tool for citizens to voice dissatisfaction with t
 heir government and coordinate protest. But why would rulers permit thes
 e tools if they merely pose a threat to their own survival? This talk wi
 ll investigate how a government’s ability to censor and limit the flow o
 f information feeds into its choice of violent responses to protest. I w
 ill talk about the conditions under which a government is likely to bene
 fit more from surveilling the free flow of information\, and under which
  conditions it is more likely to benefit from censorship. \n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6358.html
SUMMARY:Information Control and Strategic Violence
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500
DTSTAMP;VALUE=DATE-TIME:20150122T130643Z
UID:78e2d419-0adc-43ff-989e-95a78ac9ddd4@frab.cccv.de
DESCRIPTION:Of all the NSA's Cold War listening posts\, their intelligenc
 e facility on top of Berlin's Teufelsberg was their most secretive.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6585.html
SUMMARY:Inside Field Station Berlin Teufelsberg
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T190000
DTSTAMP;VALUE=DATE-TIME:20150112T224316Z
UID:qRQclNxyOV7ZYPwbrXrw1Q@frab.cccv.de
DESCRIPTION:A toilet is a toilet is a toilet ... was a toilet. Nowadays h
 ackers discover a larger interest in doing more with toilets then just w
 hat they were designed for in the first place. Within the "Internet of t
 hings" scene the sanitarian sphere claims a place of its own. This talk 
 will present current projects\, technologies used and research published
 .
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6370.html
SUMMARY:Internet of toilets
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500
DTSTAMP;VALUE=DATE-TIME:20150107T131618Z
UID:rHjqtfbslD_ucUr8kW5wcQ@frab.cccv.de
DESCRIPTION:The chronicles of reversing the Iridium pager system.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6236.html
SUMMARY:Iridium Pager Hacking
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500
DTSTAMP;VALUE=DATE-TIME:20150112T160813Z
UID:7bdbb7a1-63f2-400f-97a1-d7abfc455f73@frab.cccv.de
DESCRIPTION:Auch das Jahr 2014 geht irgendwann vorbei. Deshalb werfen wir
  einen Blick zurück auf die für uns besonders relevanten Themen und vers
 uchen abzuschätzen\, was im Jahr 2015 auf uns zukommen könnte.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6583.html
SUMMARY:Jahresrückblick des CCC
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000
DTSTAMP;VALUE=DATE-TIME:20150110T000627Z
UID:0a06acd5-709e-4bba-9444-e71f78cd2094@frab.cccv.de
DESCRIPTION:Im September 2014 fand die Veranstaltung Jugend hackt statt: 
 Ein Wochenende Hacken\, Basteln und Programmieren mit 120 computerbegeis
 terten Jugendlichen. Wir als Organisatorinnen und Teilnehmer wollen von 
 dem Event erzählen und unsere Erfahrungen teilen. Der Talk richtet sich 
 gleichermaßen an Jugendliche\, die sich für's Hacken begeistern\, als au
 ch an alle\, die sich für Code Literacy\, Medienpädagogik oder den IT-Na
 chwuchs interessieren.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6559.html
SUMMARY:Jugend hackt
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500
DTSTAMP;VALUE=DATE-TIME:20150110T215253Z
UID:oBQMMNfX5t-5TBIk3z6pOg@frab.cccv.de
DESCRIPTION:(K)ein kleiner Rant über Elliptische Kurven\, Quantencomputer
 \, Bitcoins und die NSA et al.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6295.html
SUMMARY:Krypto für die Zukunft
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500
DTSTAMP;VALUE=DATE-TIME:20150105T101046Z
UID:_jFN0YWHACogrN4ddVWK0Q@frab.cccv.de
DESCRIPTION:I will explain why quantum computing is interesting\, how it 
 works and what you actually need to build a working quantum computer. I 
 will use the superconducting two-qubit quantum processor I built during 
 my PhD as an example to explain its basic building blocks. I will show h
 ow we used this processor to achieve so-called quantum speed-up for a se
 arch algorithm that we ran on it. Finally\, I will give a short overview
  of the current state of superconducting quantum computing and Google's 
 recently announced effort to build a working quantum computer in coopera
 tion with one of the leading research groups in this field.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6261.html
SUMMARY:Let's build a quantum computer!
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T140000
DTSTAMP;VALUE=DATE-TIME:20150114T205836Z
UID:4_Q4s48yg8FV08kvf9lbpQ@frab.cccv.de
DESCRIPTION:As we've called for widespread use of HTTPS\, the cost and co
 mplexity of the certificate system has been an obstacle.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6397.html
SUMMARY:Let's Encrypt
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000
DTSTAMP;VALUE=DATE-TIME:20150104T182812Z
UID:BhRiQWa_rOqEw5k-l4GRXg@frab.cccv.de
DESCRIPTION:The talk is about our project to develop software and hardwar
 e tools for a fair and environment friendly garment and textile producti
 on and how we break down the locks that exists on every level in the ind
 ustry from design\, to software\, machines and distribution. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6447.html
SUMMARY:Let’s build our own personalized open textile production line 
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500
DTSTAMP;VALUE=DATE-TIME:20150102T121746Z
UID:c3efec0b-cfb1-4e59-88fd-f519dd31d9a6@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick! 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6563.html
SUMMARY:Lightning Talks Day 2
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T124500
DTSTAMP;VALUE=DATE-TIME:20141231T084320Z
UID:e46101e6-3114-4d5a-a09a-c70d4bfb4fec@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick!
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6579.html
SUMMARY:Lightning Talks Day 3
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500
DTSTAMP;VALUE=DATE-TIME:20141231T084141Z
UID:f69efb76-d030-4371-83e1-d7b2b8d408b9@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick!
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6580.html
SUMMARY:Lightning Talks Day 4
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T203000
DTSTAMP;VALUE=DATE-TIME:20150106T200642Z
UID:4f9TGtkPJafH9LU7RqsZnw@frab.cccv.de
DESCRIPTION:During World War I\, homing pigeons were used to carry messag
 es and take photographs over enemy territory. Today\, experiments are be
 ing conducted to remote-control insects for similar purposes.\nThis talk
  intends to give an overview of 100 years of living drones\, speculate o
 n future developments in the field\, and question the ethical implicatio
 ns of the practice.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6275.html
SUMMARY:Living Drones
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T164500
DTSTAMP;VALUE=DATE-TIME:20150102T203131Z
UID:oN5AzdecYPpDFbE3nkJZFg@frab.cccv.de
DESCRIPTION:Referring to the seminal talk Dymaxion gave at the closing of
  the NoisySquare at OHM in 2013. This talk will explore what has happene
 d and what has not in the mean time on the "battle ground". An overview 
 will be presented on the technical\, legal\, political and social battle
 s going on and will provide pointers to further tactics. Finally we will
  look at how to make sure we keep ourselves safe and sane.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6406.html
SUMMARY:Long war tactics
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T113000
DTSTAMP;VALUE=DATE-TIME:20150107T132349Z
UID:uJGVeWdNzwr_8AvAXa2DKA@frab.cccv.de
DESCRIPTION:Capturing the splash of a water balloon\, the snap of a mouse
  trap or the impact of a bullet results in exciting pictures. Best of al
 l\, it doesn't require expensive equipment. This talk covers the theory 
 of high speed photography\, the required hardware\, microcontroller hack
 ing and setting up an improvised studio in the shower.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5943.html
SUMMARY:Low Cost High Speed Photography
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T224500
DTSTAMP;VALUE=DATE-TIME:20150104T220122Z
UID:ejFaY7sUr4WTs1tajM9JOQ@frab.cccv.de
DESCRIPTION:How do garage gate remotes work?\nIt turns out the ones from 
 MegaCode simply send a individual fixed code.\nAnd with little efforts i
 f was possibly to clone them\, send arbitrary codes\, and record them al
 l.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6462.html
SUMMARY:MegaCode to facility gates
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500
DTSTAMP;VALUE=DATE-TIME:20150108T034730Z
UID:sAZoeOc6Qu4bMPxrU8yEpw@frab.cccv.de
DESCRIPTION:Der Vortrag bietet eine sprachwissenschaftlich informierte Pe
 rspektive auf den Informationskrieg mit Fokus auf operative Kommunikatio
 n in sozialen Medien. Am Beispiel eines selbst entwickelten Bots werden 
 wir linguistische Prozeduren zur Manipulation von Kommunikation mit dem 
 Ziel der Beeinflussung von Wissen\, Werten\, Gefühlen und Handlungsdispo
 sitionen vorstellen. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6184.html
SUMMARY:Mein Bot\, der Kombattant
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203500
DTSTAMP;VALUE=DATE-TIME:20150119T195528Z
UID:xvPazrSLJdMwzpnphpOEIQ@frab.cccv.de
DESCRIPTION:While graph databases are primarily known as the backbone of 
 the modern dating world\, this nerd has found a much more interesting ap
 plication for them: program analysis. This talk aims to demonstrate that
  graph databases and the typical program representations developed in co
 mpiler construction are a match made in heaven\, allowing large code bas
 es to be mined for vulnerabilities using complex bug descriptions encode
 d in simple\, and not so simple graph database\nqueries.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6534.html
SUMMARY:Mining for Bugs with Graph Database Queries
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000
DTSTAMP;VALUE=DATE-TIME:20150122T130043Z
UID:419d4f7e-7506-4d46-8700-e47e164a8e32@frab.cccv.de
DESCRIPTION:Ein Mahnmal gegen die Vereinten Nationen\, 25.000 Euro Kopfge
 ld auf eine\ndeutsche Waffenhändlerfamilie\, eine falsche Kampagne für d
 as\nFamilienministerium oder die Flucht der "Mauerkreuze" vom Reichstags
 ufer\nan die EU-Außengrenzen: wenn das Zentrum für Politische Schönheit 
 (ZPS)\ndas Kriegsbeil ausgräbt\, ist eine kontroverse Debatte garantiert
 .
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6584.html
SUMMARY:Mit Kunst die Gesellschaft hacken
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000
DTSTAMP;VALUE=DATE-TIME:20150118T105006Z
UID:szHEwO2pazLIG7w8wQTa1w@frab.cccv.de
DESCRIPTION:We know that mobile networks can — and do — attack us on many
  fronts. As this talk will show\, even 3G is attackable. It’s high time 
 that we upgrade from complaining to self-defense.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6122.html
SUMMARY:Mobile self-defense
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T173000
DTSTAMP;VALUE=DATE-TIME:20150106T200843Z
UID:8283fa4f-a6eb-4296-a6a8-20c3f9d80a4c@frab.cccv.de
DESCRIPTION:Mr Beam was started as a hobby project aiming to get more exp
 erience in 3D printing. For fun we put it on Kickstarter and ended up in
  kind of a roller coaster. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6589.html
SUMMARY:Mr Beam goes Kickstarter
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500
DTSTAMP;VALUE=DATE-TIME:20150103T223719Z
UID:1lKbMS92kS0J0pQAAO6XZA@frab.cccv.de
DESCRIPTION:Our talk will highlight the current debates surrounding net n
 eutrality in Europe\, the United States and other parts of the world. We
  will look at the results of the <a href="https://savetheinternet.eu">Sa
 veTheInternet.eu</a> campaign which was lunched a year ago on 30c3. We w
 ill discuss various legal protections for net neutrality\, look closer a
 t the experience of the Netherlands and we will give an overview of all 
 important open ends of the debate.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6170.html
SUMMARY:net neutrality: days of future past? 
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000
DTSTAMP;VALUE=DATE-TIME:20150103T143335Z
UID:87b8f1ba-1f05-46c2-93ac-b575bbc9fb4f@frab.cccv.de
DESCRIPTION:When the Internet was designed\, it was thought to be meadows
  full of daisies. As we now know\, it's a dark place\, where communicati
 on is monitored and subverted. This session presents both developments i
 n known solutions\, as well as novel suggestions\, to liberally apply cr
 ypto to improve the foundations of Internet communications.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6597.html
SUMMARY:Now I sprinkle thee with crypto dust
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000
DTSTAMP;VALUE=DATE-TIME:20150111T231804Z
UID:Z4htibNZxLewwCmPKSdeqA@frab.cccv.de
DESCRIPTION: - Station VIENNA in der US-Botschaft 1090 Wien\n-  VIENNA  A
 NNEX  beim UNO-Sitz in Wien 1220\n- Legacy Standort „NSA-Villa“ Wien 118
 0 \n- Relaystation Exelberg\,Breitbandnetz von NSA/SCS  über Wien  \n- E
 quipment und Funktion der FORNSAT-Station Königswarte.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6430.html
SUMMARY:NSA Points of Presence in AT
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T185500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500
DTSTAMP;VALUE=DATE-TIME:20150104T183410Z
UID:1J0sEDUwTplMXgNU2Q7hrw@frab.cccv.de
DESCRIPTION:leading hackers and researchers\nfrom the worldwide hackerspa
 ce\, \nuniversitiy\, and DIY artist community\, \nexplain current techno
 logical \npossibilites in BCI\, \n\nand show ways\nto use open source \n
 hardware and software \nfor hackers\, makers\, artists\, \npersonal deve
 lopment\, citizen science\, \n\nproviding a framework\nfor alternative c
 ulture and free expression \nbalancing the soon coming commercial expans
 ion \nin "Neurogaming"\, "Neuromarketing" and "eHealth" \n\ntalk will il
 lustrate \nthe mutually beneficial relationship \nbetween "hacking" and 
 science\, \nwith the example of hacking BCIs\, \n\nas well as an overvie
 w into the new field\nof "BCI Mind-Hacking"\, such as exploiting \nremot
 e consumer Neuroheadsets\, \nand Data-Mining the human-brain \nfor sensi
 tive data during casual use.\n\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6148.html
SUMMARY:Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000
DTSTAMP;VALUE=DATE-TIME:20150102T193056Z
UID:E95sP8WH8tLiiJj2SBAA1A@frab.cccv.de
DESCRIPTION:At 28C3 we introduced the very first steps of the osmo-gmr pr
 ojects. During this talk\, we will present the various advances that hav
 e been made in this project on various aspects (voice codec\, crypto alg
 orithm\, ...)
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6267.html
SUMMARY:osmo-gmr: What's up with sat-phones ?
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000
DTSTAMP;VALUE=DATE-TIME:20150116T195509Z
UID:TvC3Zh1wVU8NotOjslV57Q@frab.cccv.de
DESCRIPTION:We are the PayPal 14. For the last several years we've been r
 estricted in what we could or couldn't say about our court case. Our sen
 tencing is on December 4th\, ending the legal restrictions on what we ca
 n share about our story.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6377.html
SUMMARY:Paypals War on Terror
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500
DTSTAMP;VALUE=DATE-TIME:20150111T231708Z
UID:NjtxGgpt76NkFb1Q4LLjvg@frab.cccv.de
DESCRIPTION:In the post-NSA world it is important to understand the magni
 tude of our online activities in order to take informative decisions on 
 our ubiquitous shared lives.\n\nPersonal Tracking Devices is the result 
 of a two years long study on tracking technologies and the inherent natu
 re of the web and telecommunication networks in general.\n\nThe study\, 
 conducted as part of Ph.D. research in privacy and security at UPC Barce
 lona Tech\, collected a large amount of metadata to raise awareness on t
 he footprints left by users on the web and through mobile apps.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6100.html
SUMMARY:Personal Tracking Devices and Online Identity
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000
DTSTAMP;VALUE=DATE-TIME:20150107T131615Z
UID:J9UXjl3ggsIGnkIJSxSxmw@frab.cccv.de
DESCRIPTION:This talks follows our previous EMV research uncovering new f
 indings as well as a detailed analysis of Chip & PIN fraud markers in or
 der to benefit cardholders\, as well as issuing banks\, in preventing wr
 ongful liability for fraudulent charges.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6120.html
SUMMARY:Practical EMV PIN interception and fraud detection
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T155500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T154500
DTSTAMP;VALUE=DATE-TIME:20150107T132413Z
UID:e604e540-90d0-4910-920a-1c23ea83e341@frab.cccv.de
DESCRIPTION:Premiere of the English version of the shortfilm "We love sur
 veillance".
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6608.html
SUMMARY:Premiere: We love surveillance
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203000
DTSTAMP;VALUE=DATE-TIME:20150112T175742Z
UID:MBpSOQzfPD4ky0hqL6B-hg@frab.cccv.de
DESCRIPTION:Old-school arcade games were so protected that hacking is the
  only way to preserve them before all boards are dead\, and the games ar
 e lost.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5997.html
SUMMARY:Preserving arcade games
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500
DTSTAMP;VALUE=DATE-TIME:20150101T220949Z
UID:lcqCv-SWZ2OTU7b2xqw9tg@frab.cccv.de
DESCRIPTION:The internet may be the nervous system of the 21st century\, 
 but its main business purpose is helping marketers work out how to make 
 people buy stuff. This talk maps out a possible alternative\, where cons
 umers co-ordinate online\, pooling their data and resources to match dem
 and with supply.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6202.html
SUMMARY:Privacy and Consumer Markets
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T140000
DTSTAMP;VALUE=DATE-TIME:20150103T143235Z
UID:JhCUm-jQqCMx_jDfrzH24Q@frab.cccv.de
DESCRIPTION:Idris is a relatively young research programming languages th
 at attempts to bring dependent types to general purpose programming. In 
 this talk I will introduce the concept of dependent types and the Curry-
 Howard isomorphism and how these can be applied to prove properties abou
 t software and eradicate whole classes of bugs and security issues.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6162.html
SUMMARY:Programming with dependent types in Idris
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T203000
DTSTAMP;VALUE=DATE-TIME:20150107T163818Z
UID:1NE5joYD0o-gaf5SqL-1Nw@frab.cccv.de
DESCRIPTION:Surveillance\, cryptography\, terrorism\, malware\, economic 
 espionage\, assassination\, interventions\, intelligence services\, poli
 tical prisoners\, policing\, transparency\, justice and you.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6258.html
SUMMARY:Reconstructing narratives
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000
DTSTAMP;VALUE=DATE-TIME:20150112T124923Z
UID:KJiq3wTS9cMLTTrgJ8PqHA@frab.cccv.de
DESCRIPTION:Software build reproducibility is the ability to use independ
 ent build machines to compile bit-identical binaries from program source
  code. In this talk\, we will discuss the motivation for and the technic
 al details behind software build reproducibility. We will describe the t
 echnical mechanisms used by the Tor Project to produce\nreproducible bui
 lds of the Tor Browser\, and also introduce the early efforts of both F-
 Droid and Debian to achieve these same build integrity properties on a m
 ore wide-scale basis.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6240.html
SUMMARY:Reproducible Builds
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T160000
DTSTAMP;VALUE=DATE-TIME:20150122T212746Z
UID:HLDDEFxCxCrQryx8fEacZw@frab.cccv.de
DESCRIPTION:We present four new Bleichenbacher side channels\, and three 
 successful Bleichenbacher attacks against the Java Secure Socket Extensi
 on (JSSE) SSL/TLS implementation and against hardware security appliance
 s using the Cavium NITROX SSL accelerator chip.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5960.html
SUMMARY:Revisiting SSL/TLS Implementations
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000
DTSTAMP;VALUE=DATE-TIME:20150104T183252Z
UID:67baa392-2af9-4213-a9ce-bf63331d43a4@frab.cccv.de
DESCRIPTION:Rocket Kitten is an advanced APT set of campaigns\, with a tw
 ist - off-the-shelf malware that won’t shame a nation state. The talk wi
 ll combine an assessment of the threat group’s modus operandi with a tec
 hnical deep dive. Prepare for some hex dumps.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6575.html
SUMMARY:Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Na
 tion States
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T183000
DTSTAMP;VALUE=DATE-TIME:20150111T044532Z
UID:oI8n77eKy3Uz2Fklmk4hVQ@frab.cccv.de
DESCRIPTION:Three years have elapsed since the call for a "Hacker Space P
 rogram" during the Chaos Communication Camp 2011. In this lecture we wil
 l review the basics of space flight\, discuss common problems and pitfal
 ls encountered by a practitioner on the way to orbit\, and report on the
  state of our sounding rocket program.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6180.html
SUMMARY:Rocket science – how hard can it be?
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000
DTSTAMP;VALUE=DATE-TIME:20150102T214602Z
UID:psS7-V3-VqYDuiKCr5PmWg@frab.cccv.de
DESCRIPTION:How to play with lasers without injuring Yourself and others 
 and how to design the safety circuits of a laser system.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6131.html
SUMMARY:Safer playing with lasers
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T140000
DTSTAMP;VALUE=DATE-TIME:20150122T130211Z
UID:OQzXwQcnHSLD9Qd7Iu7Rqw@frab.cccv.de
DESCRIPTION:For two years SCADA StrangeLove speaks about Industrial Contr
 ol Systems and nuclear plants. This year we want to discuss Green Energy
 . Our hackers' vision of Green Energy\, SmartGrids and Cloud IoT technol
 ogy.\nWe will also speak about the security problems of traditional "hea
 vy" industrial solutions\, about the things that Zurich Airport and Larg
 e Hadron Collider have in common \n\nOn top of it you will learn about o
 ur new releases\, some funny and not so funny stories about discovery an
 d fixing of vulnerabilities and the latest news from the front strugglin
 g for the Purity of Essence.​
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6010.html
SUMMARY:SCADA StrangeLove: Too Smart Grid in da Cloud
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000
DTSTAMP;VALUE=DATE-TIME:20150105T101033Z
UID:hl9yD87mkTYvOY5J2BIQwQ@frab.cccv.de
DESCRIPTION:Full-body scanners\, also known as "naked scanners"\, are use
 d in airports and other government facilities to detect metallic and non
 metallic objects hidden beneath people's clothes. In many countries\, th
 ey play a critical part in airline security\, but they have also been cr
 iticized for being unsafe\, ineffective\, and an invasion of privacy. To
  shed scientific lights on these questions\, we conducted the first rigo
 rous\, independent security evaluation of such a system. We bought a gov
 ernment-surplus Rapiscan Secure 1000 full-body scanner on eBay and exten
 sively tested it in our lab. We found that it's possible to conceal kniv
 es\, guns\, and explosives from detection by exploiting properties of th
 e device's backscatter X-ray technology. We also investigated computer s
 ecurity threats: malicious software and hardware that can compromise the
  effectiveness\, safety\, and privacy of the machine. In this talk\, we'
 ll explain how full-body scanners work\, describe the results of our exp
 eriments\, and draw lessons to inform transportation security\, embedded
  systems security\, and the public debate over secretive and privacy inv
 asive government technologies.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6332.html
SUMMARY:Security Analysis of a Full-Body X-Ray Scanner
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T140000
DTSTAMP;VALUE=DATE-TIME:20150107T164250Z
UID:yMuYr5eW4o9FpJMw-NwXrg@frab.cccv.de
DESCRIPTION:Estonia is the only country in the world that relies on Inter
 net voting in a significant way for legally-binding national elections —
  up to 30% of all voters cast their ballots online. This makes the secur
 ity of Estonia's Internet voting system of interest to technologists and
  citizens the world over. Over the past year\, I helped lead the first r
 igorous\, independent security evaluation of the system\, based on elect
 ion observation\, code review\, and laboratory testing. The findings are
  alarming: there are staggering gaps in Estonia's procedural and operati
 onal security\, and the architecture of the system leaves it open to cyb
 erattacks from foreign powers. Our investigation confirmed the viability
  of these attacks in the lab\, but the Estonian government has chosen to
  downplay them. We urgently recommend that Estonia discontinue use of th
 e system before the country suffers a major attack.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6344.html
SUMMARY:Security Analysis of Estonia's Internet Voting System
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T171500
DTSTAMP;VALUE=DATE-TIME:20150107T132424Z
UID:38ea922b-5b2d-4290-8c79-da0c891edd7a@frab.cccv.de
DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? 
 Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un
 d Trends waren zu sehen?\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6572.html
SUMMARY:Security Nightmares
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T171500
DTSTAMP;VALUE=DATE-TIME:20141228T174916Z
UID:78d34ebe-e910-4d26-98e3-71c0f07cedb6@frab.cccv.de
DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? 
 Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un
 d Trends waren zu sehen?
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6607.html
SUMMARY:Security Nightmares (Stream)
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500
DTSTAMP;VALUE=DATE-TIME:20150109T120242Z
UID:Fj7J1P7FKCiWEl7lIaDaXg@frab.cccv.de
DESCRIPTION:Die radikalen philosophischen Texte von Elektra W. haben das 
 Ziel - seien wir offen und direkt - einen Headcrash des Ich-Erlebens her
 beizuführen\, das sich im Laufe unserer Enkulturation und Erziehung im V
 orderlappen des Großhirns breit gemacht hat. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6244.html
SUMMARY:Serenität – Anleitung zum Glücklichsein
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000
DTSTAMP;VALUE=DATE-TIME:20150106T214700Z
UID:z84bCyzZ-xiYlyM83L5dig@frab.cccv.de
DESCRIPTION:"Vertrauen ist gut - Kontrolle ist besser." Dieses Idiom gilt
  mehr denn je\, sofern man die Aktivitäten von Geheimdiensten bewerten m
 ag. Wie seit einiger Zeit bekannt ist\, ist die Mär der massenhaften Übe
 rwachung des Einzelnen Realität. Ob und inwieweit dies Auswirkungen auf 
 die Realität des Einzelnen hat\, steht im Fokus der vorliegenden Studie.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6455.html
SUMMARY:Snowden Effect vs. Privacy Paradox
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500
DTSTAMP;VALUE=DATE-TIME:20150107T132020Z
UID:xnYRHWIRybr3subP-h_1Wg@frab.cccv.de
DESCRIPTION:Stylometry is the study of linguistic style found in text. St
 ylometry existed long before computers but now the field is dominated by
  artificial intelligence techniques.\n\nWriting style is a marker of ide
 ntity that can be found in a document through linguistic information to 
 perform authorship recognition. Authorship recognition is a threat to an
 onymity but knowing ways to identify authors provides methods for anonym
 izing authors as well. Even basic stylometry systems reach high accuracy
  in classifying authors correctly.  Stylometry can also be used in sourc
 e code to identify the author of a program. In this talk\, we investigat
 e methods to de-anonymize source code authors of C++ and authors across 
 different domains. Source code authorship attribution could provide proo
 f of authorship in court\, automate the process of finding a cyber crimi
 nal from the source code left in an infected system\, or aid in resolvin
 g copyright\, copyleft and plagiarism issues in the programming fields. 
 Programmers can obfuscate their variable or function names\, but not the
  structures they subconsciously prefer to use or their favorite incremen
 t operators. Following this intuition\, we create a new feature set that
  reflects coding style from properties derived from abstract syntax tree
 s. We reach 99% accuracy in attributing 36 authors each with ten files. 
 We experiment with many different sized datasets leading to high true po
 sitive rates.  Such a unique representation of coding style has not been
  used as a machine learning feature to attribute authors and therefore t
 his is a valuable contribution to the field. \n\nWe also examine the nee
 d for cross-domain stylometry\, where the documents of known authorship 
 and the documents in question are written in different contexts. Specifi
 cally\, we look at blogs\, Twitter feeds\, and Reddit comments. While tr
 aditional methods in stylometry that work well within one domain fail to
  identify authors across domains\, we are able to improve the accuracy o
 f cross-domain stylometry to as high as 80%. Being able to identify auth
 ors across domains facilitates linking identities across the Internet ma
 king this a key privacy concern\; users can take other measures to ensur
 e their anonymity\, but due to their unique writing style\, they may not
  be as anonymous as they believe. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6173.html
SUMMARY:Source Code and Cross-Domain Authorship Attribution
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000
DTSTAMP;VALUE=DATE-TIME:20150104T183217Z
UID:i_Dt13BFiawklEaokv3pKg@frab.cccv.de
DESCRIPTION:At the 26C3 we first presented our vision of sending a rover 
 to the moon. We're still in the pursuit of doing this and are closer tha
 n ever. Many things have happened in the past 5 years and we want to sha
 re our story with you.\nBut this talk is not just about us\, it is also 
 about you! You will have the possibility to contribute to our mission\, 
 just tune in to get all the details :)
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6142.html
SUMMARY:Space Hacker
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500
DTSTAMP;VALUE=DATE-TIME:20150118T104822Z
UID:-n9QScyDLXMEwkqrCHASYw@frab.cccv.de
DESCRIPTION:Companies are now selling the ability to track your phone num
 ber whereever you go. With a precision of up to 50 meters\, detailed mov
 ement profiles can be compiled by somebody from the other side of the wo
 rld without you ever knowing about it. But that is just the tip of the i
 ceberg.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6249.html
SUMMARY:SS7: Locate. Track. Manipulate.
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T230000
DTSTAMP;VALUE=DATE-TIME:20150106T215813Z
UID:13hAy7IIWod2RIuLMvnELw@frab.cccv.de
DESCRIPTION:SS7 has been shown repeatedly as an insecure protocol: spoofi
 ng\, faking\, crash through fuzzing\, fraud. The main question of our st
 udy is to determine how this insecurity is mitigated by network operator
 ’s action to prevent compromise on both network exposure of infrastructu
 re and privacy compromise of subscribers. It's why we wanted to come out
  with SS7map.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6531.html
SUMMARY:SS7map : mapping vulnerability of the international mobile roamin
 g infrastructure
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T140000
DTSTAMP;VALUE=DATE-TIME:20150106T192135Z
UID:XGhOde-ujLyDS1gsvpebMg@frab.cccv.de
DESCRIPTION:The current state of the Tor network and community\, covering
  important updates\, discussions of the ecosystem of software\, and incl
 ude a longer Q&A than previous CCC talks!
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6251.html
SUMMARY:State of the Onion
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T230000
DTSTAMP;VALUE=DATE-TIME:20150103T212214Z
UID:bX1J_FaFjsFbyn15h7OGdg@frab.cccv.de
DESCRIPTION:This talk asks how we might plan for the continuation of a pr
 ivacy sustaining internet in light of growing trends in enforced identit
 y checking and demonisation of everyday anonymity. It presents a 'free p
 honebox' project\, which was tested at the FutureEverything art and tech
 nology festival in 2014\, as an example of a social-technical system tha
 t promotes identity ambiguity in communication through the sharing of 'f
 ree' mobile phone minutes between strangers.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6175.html
SUMMARY:Superheroes Still Need Phoneboxes
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T113000
DTSTAMP;VALUE=DATE-TIME:20150106T214634Z
UID:Km3oA97mSXAMOZGte_v8Fg@frab.cccv.de
DESCRIPTION:This talk will introduce you to Industrial Ethernet Switches 
 and their vulnerabilities. These are switches used in industrial environ
 ments\, like substations\, factories\, refineries\, ports\, or other oth
 er homes of industrial automation. In other words: DCS\, PCS\, ICS & SCA
 DA switches. It is a very good companion talk to Damn Vulnerable Chemica
 l Process? Own your own critical infrastructures today!
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6196.html
SUMMARY:Switches Get Stitches
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T171500
DTSTAMP;VALUE=DATE-TIME:20150105T143316Z
UID:hYXcWw5YzxirnRJZDuYiSQ@frab.cccv.de
DESCRIPTION:In this talk an introduction to amateur telescope making (ATM
 ) will be provided. Starting from grinding the mirror\, testing it and b
 uilding the telescope around it.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5931.html
SUMMARY:Telescope Making
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T124500
DTSTAMP;VALUE=DATE-TIME:20150122T130303Z
UID:e8e29f6a-11df-491a-acae-1253879ae8f9@frab.cccv.de
DESCRIPTION:For nearly one hundred years\, the NSA and its predecessors h
 ave been engaging in secret\, illegal deals with the American telecom in
 dustry\, with both virtually immune from prosecution.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6600.html
SUMMARY:Tell no-one
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T160000
DTSTAMP;VALUE=DATE-TIME:20150112T133932Z
UID:2yBK0TAIqddmCWa1MJUNQQ@frab.cccv.de
DESCRIPTION:We report about a LOAD e. V. study regarding data collection 
 of cars\, future developments of this technology field\, how this data i
 s accessed and secured and what the stakeholders (car manufacturers\, ca
 r owners and users)  positions are on this data gathering. In a summary 
 we outline necessary consequences.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6265.html
SUMMARY:The automobile as massive data gathering source and the consequen
 ces for individual privacy
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T113000
DTSTAMP;VALUE=DATE-TIME:20150106T192358Z
UID:6b94aab7-5909-4662-99f8-1a990c247bb1@frab.cccv.de
DESCRIPTION:A discussion with U.S. Army private Chelsea Manning's attorne
 ys Nanny Hollander\, Ahmed Ghappour\, and Chase Strangio.\nModerated by 
 journalist Alexa O'Brien.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6602.html
SUMMARY:The case of Chelsea Manning
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T214500
DTSTAMP;VALUE=DATE-TIME:20150106T105953Z
UID:H_jf4nwFLZMEY7zwBlrehA@frab.cccv.de
DESCRIPTION:In 2011 I started trying to warn EU institutions about what w
 e now call PRISM\, after working it out from open sources. Civil society
 \, privacy regulators\, and the Commission all did nothing. This is the 
 story of exactly how they did nothing\, and why\, and what is happening 
 now
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6195.html
SUMMARY:The Cloud Conspiracy 2008-2014
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T171500
DTSTAMP;VALUE=DATE-TIME:20150110T011244Z
UID:hixbG3OS0o1-lkJG36qcug@frab.cccv.de
DESCRIPTION:The talk is on the eXperimental Robot Project (XRP)\, a proje
 ct to develop an open-hardware humanoid robot. More precisely\, we are f
 ocusing on the distinguishing feature of a <i>humanoid</i> robot - the a
 bility to walk on two legs.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6234.html
SUMMARY:The eXperimental Robot Project
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T200000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T190000
DTSTAMP;VALUE=DATE-TIME:20150114T205410Z
UID:T7Ta13fUuQaAbv1JlO4-Qg@frab.cccv.de
DESCRIPTION: “There will be people who resist adopting and using technolo
 gy\, people who want nothing to do with virtual profiles\, online data s
 ystems or smart phones. Yet a government might suspect that people who o
 pt out completely have something to hide and thus are more likely to bre
 ak laws\, and as a counterterrorism measure\, that government will build
  the kind of ‘hidden people’ registry we described earlier. If you don’t
  have any registered social-networking profiles or mobile subscriptions\
 , and on-line references to you are unusually hard to find\, you might b
 e considered a candidate for such a registry. You might also be subjecte
 d to a strict set of new regulations that includes rigorous airport scre
 ening or even travel restrictions.”
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6459.html
SUMMARY:The Invisible Committee Returns with "Fuck Off Google"
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T224500
DTSTAMP;VALUE=DATE-TIME:20141231T013048Z
UID:n2e6vsWynbgJeu2GC6FpnA@frab.cccv.de
DESCRIPTION:The Machine To Be Another is an open-source interactive syste
 m designed to explore the relationship between identity and empathy thro
 ugh interdisciplinary performance-experiments drawing from neuroscience\
 , VR\, storytelling and art. Through research collaborations we have bee
 n developing applications in contexts of conflict resolution\, the arts 
 and healthcare.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6385.html
SUMMARY:The Machine To Be Another
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500
DTSTAMP;VALUE=DATE-TIME:20150106T203843Z
UID:a7cde3ca-46a8-4f0b-be61-f60e77f3418e@frab.cccv.de
DESCRIPTION:June 5\, 2014 marked one year since leaks by NSA whistleblowe
 r Edward Snowden began to be introduced to a worldwide public. On this d
 ate\, transmediale teamed up with N.K. Projekt and Leslie Dunton-Downer\
 , 2014 fellow at The American Academy in Berlin\, for the Magical Secrec
 y Tour\, a bus journey exploring Berlin as the global capital of informe
 d response to mass surveillance. This inside look at the project feature
 s first-ever screening of footage shot by filmmaker Simon Klose (TPB AFK
 ) for his documentary about the tour.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6596.html
SUMMARY:The Magical Secrecy Tour 
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000
DTSTAMP;VALUE=DATE-TIME:20150103T133345Z
UID:p6g2YacbVEfuPkJ01kvHAw@frab.cccv.de
DESCRIPTION:The Maker movement and patent law are like two planets moving
  on the orbit of innovations. Occasionally\, they collide … because the 
 Maker planet moves too fast.\nBut\, back on the Earth. Encounters with p
 atent law can be of many reasons\, e.g. filing a patent application or b
 eing blocked in making by a patent (or much worse\, being accused of a p
 atent infringement). The latter motivated the question of the permissibl
 e uses of patented inventions. The talk explains which activities on pat
 ents are lawful and keep Makers safe in their making.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6043.html
SUMMARY:The Maker movement meets patent law
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T233000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T230000
DTSTAMP;VALUE=DATE-TIME:20150107T131916Z
UID:6bXRd7c5UJbIlb4QiTd1ng@frab.cccv.de
DESCRIPTION:The Heartbleed vulnerability took the Internet by surprise in
  April of this year. The vulnerability was one of the most consequential
  in the history of the Internet\, since it allowed attackers to potentia
 lly steal login credentials\, cryptographic keys\, and other private dat
 a from up to half of all popular HTTPS sites.  In this talk\, we take a 
 detailed look at Heartbleed and its aftermath\, based on comprehensive m
 easurements and analysis that our research team performed over the past 
 six months.  We began tracking Heartbleed's impact within hours of its d
 isclosure using massive ZMap scans and large network telescopes.  This a
 llowed us to track which sites remained vulnerable\, observe certificate
  revocations\, and monitor for large scale attacks in close to real time
 . Based on this data\, we also conducted one of the largest ever mass vu
 lnerability notifications\, informing the network administrators for all
  devices still susceptible to Heartbleed across the entire IPv4 address 
 space.  Finally\, we investigated the question of whether attackers knew
  about and exploited Heartbleed prior to its public disclosure---and we 
 will present new details about this question in the talk.  We hope that 
 by learning from the Heartbleed security disaster\, our community can pr
 epare to respond more effectively to such events in the future. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6321.html
SUMMARY:The Matter of Heartbleed
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T160000
DTSTAMP;VALUE=DATE-TIME:20150105T104101Z
UID:vw7sldBf_2ldlwNWTOF93A@frab.cccv.de
DESCRIPTION:Since 10 years I write about Vernacular Web and Digital Folkl
 ore\, about early days of the web and web design before it became a prof
 ession. It is not that easy to find pages that were made in 93-97 and ar
 e still online or look the same. Things changed in 2009\, when Yahoo ann
 ounced that they are closing Geocities\, number one free hosting service
  of the last century\, "myspace of the 90es"\, first home for many web u
 sers and a jest for "professional web"\n\nIn half a year yahoo gave its 
 users to copy their data\, Archive Team managed to partly rescue the pag
 es and release one terabyte torrent of it. In 2010 my partner Dragan Esp
 enschied and I started to download the files. In the middle of 2011 Drag
 an restored the archive and we started to go through the profiles: colle
 cting\, tagging\, comparing\, analyzing. One Terabyte of Kilobyte Age pr
 oject started.\n\nWe don't only collect and restore but bring this cultu
 re of the 90es back to the web\, using contemporary infrastructure. It i
 s http://oneterabyteofkilobyteage.tumblr.com/ that posts a screenshot of
  a page every 20 minutes since February 2013. Or my channel on Vine\, th
 at allows to see those pages animated and with sound. And of course the 
 blog http://contemporary-home-computing.org/1tb/ where we describe the f
 indings.\n\nIn my HIGHLY ILLUSTRATED talk I'd like to introduce to the a
 udience pearls of the early web culture\, going much deeper than usual U
 nder Construction signs and animated GIFs nostalgia. Will show what did 
 it mean to make a web page technically\, philosophically and ideological
 ly. Will also talk about our unique technical setting for emulating the 
 pages and what digital preservation really means.  And last but not leas
 t will talk about newer cases of deleted social networks and social serv
 ices.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6373.html
SUMMARY:The Only Thing We Know About Cyberspace Is That Its 640x480
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T220000
DTSTAMP;VALUE=DATE-TIME:20150119T070654Z
UID:5hkhmuwi5J8ZHMfd5k7veg@frab.cccv.de
DESCRIPTION:tl\;dr EXPLOIT ALL THE PERL.\nWe chained several of Perl’s ri
 diculous syntax quirks in order to create a surprisingly powerful attack
 \, bringing down some of the most popular Perl-based projects in the wor
 ld to their knees. Brace yourselves\, RCE exploits are coming.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6243.html
SUMMARY:The Perl Jam: Exploiting a 20 Year-old Vulnerability
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T113000
DTSTAMP;VALUE=DATE-TIME:20150105T003710Z
UID:EN5SvbzMs0D7iCFyfK1Ubw@frab.cccv.de
DESCRIPTION:In the parliamentary elections of September 2013\, more than 
 250 000 Norwegians in selected municipalities were able to vote from hom
 e. They were taking part in a national trial of Internet voting\, buildi
 ng on an advanced cryptographic protocol.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6213.html
SUMMARY:The rise and fall of Internet voting in Norway
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T233000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T211500
DTSTAMP;VALUE=DATE-TIME:20150102T025733Z
UID:35vPpFdywfzrf36_zbn6zA@frab.cccv.de
DESCRIPTION:Das c-atre collectivdrama präsentiert THE TIME IS RIGHT\, ein
  Science-Fiction-Theaterstück nach einer Idee von yetzt.\n\n„Es geht um 
 das große Ganze! Die Bewahrung von freiem Wissen\, freier Kultur – ohne 
 Copyright-Mafiosi\, die jeden Pups\, der dir entfleucht\, lizenzieren wo
 llen!“ (Jo)\n\nAls die Aktivisten Mo und Jo bei einer ihrer geheim-gefäh
 rlichen Widerstandsaktionen gegen die drohende Allmacht der Verwertungsg
 esellschaften von dieser sonderbaren jungen Frau\, die wie aus dem Nicht
 s erscheint\, überrascht werden\, ahnt noch niemand\, welche weitreichen
 den Folgen diese Begegnung im Kampf für die Kunst der Zukunft gehabt hab
 en wird.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6543.html
SUMMARY:The Time is Right
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T183000
DTSTAMP;VALUE=DATE-TIME:20150115T085233Z
UID:k78-hNDINhkZS3TvxuLSrQ@frab.cccv.de
DESCRIPTION:In this presentation we demonstrate Thunderstrike\, a vulnera
 bility that allows the installation of persistent firmware modifications
  into the EFI boot ROM of Apple's popular MacBooks.  The bootkit can be 
 easily installed by an evil-maid via the externally accessible Thunderbo
 lt ports and can survive reinstallation of OSX as well as hard drive rep
 lacements.  Once installed\, it can prevent software attempts to remove 
 it and could spread virally across air-gaps by infecting additional Thun
 derbolt devices.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6128.html
SUMMARY:Thunderstrike: EFI bootkits for Apple MacBooks
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T214500
DTSTAMP;VALUE=DATE-TIME:20150113T103421Z
UID:lEFQRUU823FUOPqKG85vWg@frab.cccv.de
DESCRIPTION:TL\;DR We unravel the story of a bug that would become one of
  the most important vulnerabilities released this year. Also\, we have f
 ree cookies.\nThe findings we published earlier this year demystified th
 e voodoo that is TR-069\, demonstrated how mass pwnage can be achieved v
 ia server-side attacks\, and proved the landscape is ripe for harvesting
 . We will continue where we left off to explore TR-069 client-side vulne
 rabilities\; we analyze client implementations\, pour some insight into 
 mysterious results from our internet-wide scans\, and follow to mass pwn
 age through remote code execution on millions of online devices. again.\
 n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6166.html
SUMMARY:Too Many Cooks - Exploiting the Internet-of-TR-069-Things
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T171500
DTSTAMP;VALUE=DATE-TIME:20150105T162318Z
UID:C4w30id6HpMnzKM2xcrT4g@frab.cccv.de
DESCRIPTION:This talk presents the results from what we believe to be one
  of the largest studies into Tor Hidden Services (The Darknet) to date. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6112.html
SUMMARY:Tor: Hidden Services and Deanonymisation
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T203000
DTSTAMP;VALUE=DATE-TIME:20150109T203552Z
UID:qdo1rVjUVrQBHvjWYYx8sQ@frab.cccv.de
DESCRIPTION:The Novena open source laptop contains a FPGA\, but free soft
 ware support for FPGAs is lacking and requires root access to the hardwa
 re.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6412.html
SUMMARY:Towards General Purpose Reconfigurable Computing on Novena
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T220000
DTSTAMP;VALUE=DATE-TIME:20150112T121210Z
UID:SNW-UDgMBlqvbRHVTwhxpg@frab.cccv.de
DESCRIPTION:Have you ever wondered who is watching while you are reading 
 your favourite media online?\n\nWhether we are reading the Guardian\, th
 e New York Times\, the Hindu or any other news website\, third party tra
 ckers are collecting data about our online behaviour. \n\nThis lecture w
 ill present Tactical Tech's new project\, Trackography\, which shows tha
 t we are all part of a global tracking business. 
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6299.html
SUMMARY:Trackography
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T230000
DTSTAMP;VALUE=DATE-TIME:20150122T155632Z
UID:2f68e356-6c3f-4034-9640-c06d717ed96b@frab.cccv.de
DESCRIPTION:Kopierer\, die spontan Zahlen im Dokument verändern: Im Augus
 t 2013 kam heraus\, dass so gut wie alle Xerox-Scankopierer beim Scannen
  Zahlen und Buchstaben einfach so durch andere ersetzen. Da man solche F
 ehler als Benutzer so gut wie nicht sehen kann\, ist der Bug extrem gefä
 hrlich und blieb lange unentdeckt: Er existiert über acht Jahre in freie
 r Wildbahn.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6558.html
SUMMARY:Traue keinem Scan\, den du nicht selbst gefälscht hast
LOCATION:Saal G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141227T124500
DTSTAMP;VALUE=DATE-TIME:20150107T131606Z
UID:mzNAGavKy2KOcwOjGqC8pw@frab.cccv.de
DESCRIPTION:We present Mirage OS\, a modular library operating system dev
 eloped from scratch in the functional programming language OCaml. Each s
 ervice\, called unikernel\,  is an OCaml application using libraries suc
 h as a TCP/IP stack\, DNS. It is either compiled to a Xen virtual machin
 e image or to a Unix binary (for development). State in 2014 is that it 
 runs on x86 and arm\, we implemented a clean-slate TLS (1.0\, 1.1\, 1.2)
 \, X.509\, ASN.1 stack\, crypto primitives\, Off-the-record. We also hav
 e TCP/IP\, HTTP\, a persistent branchable store (similar to git) - all i
 mplemented in OCaml. A virtual machine serving data via https is roughly
  2MB in size - no libc inside :)
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6443.html
SUMMARY:Trustworthy secure modular operating system engineering
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T113000
DTSTAMP;VALUE=DATE-TIME:20150106T214707Z
UID:hnRe8t6JYI_8PYnFh-dsug@frab.cccv.de
DESCRIPTION:An entertaining\, thrilling and educational journey through t
 he world of chip preparation. Deep insight into amateur- as well as prof
 essional methods and equipment is given\, for the first\, most important
  steps for analysis and attacks on dedicated hardware.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6084.html
SUMMARY:Uncaging Microchips
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T224500
DTSTAMP;VALUE=DATE-TIME:20150108T093350Z
UID:Q41efHdmmnBkM5G8p6Wf_w@frab.cccv.de
DESCRIPTION:This talk will show a new method for password cracking called
  UNHash. UNHash as a tool uses rulefiles that are something in between o
 f a DSL (Domain specific language) and a python script to describe the p
 assword cracking process. This talk will show how to mix web service abu
 se\, knowledge of human nature and data mining to enable far better atta
 cks against passwords. We will be focusing on a few features: cracking d
 efault passwords on network systems with minimal effort\, testing for em
 bedded backdoors and offline attacks by data mining and modeling about 3
 3 million user account to gain insight in how users choose their passwor
 ds and how can we use that knowledge to speed up password cracking for 2
 0% more gain for non pseudorandom passwords.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/5966.html
SUMMARY:UNHash - Methods for better password cracking
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T160000
DTSTAMP;VALUE=DATE-TIME:20141230T220011Z
UID:9RncwfCW37x4dhs15BQqBQ@frab.cccv.de
DESCRIPTION:New methods and approaches for securing cloud environments ar
 e becoming increasingly more critical as traditional host security strat
 egies are not well integrated into virtual environments. For example\, a
 ntivirus scans are a critical component of layered defense-in-depth\, bu
 t in the cloud they rapidly exhaust available CPU and memory. The cloud 
 environment nevertheless offers a unique opportunity: the ability to pee
 r into a running operating system from an outside perspective\, known as
  virtual machine introspection (VMI). More interestingly\, it is also po
 ssible to alter the behavior of the virtualized components to help prote
 ct virtual systems in real-time. In this talk we will explore the open-s
 ource LibVMI library which over the last year\, as part of the DARPA Cyb
 er Fast Track program\, has been significantly extended to ease the proc
 ess of developing cloud security solutions.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6297.html
SUMMARY:Virtual Machine Introspection
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T181500
DTSTAMP;VALUE=DATE-TIME:20150107T131634Z
UID:xmlu4jFXkob2t8CUHi0Rng@frab.cccv.de
DESCRIPTION:Im Vortrag sollen technische und gesellschaftliche Konsequenz
 en der von Microsoft kontrollierten Windows-8-Secure-Boot-Architektur un
 d mögliche Gegenmaßnahmen diskutiert werden.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6294.html
SUMMARY:Vor Windows 8 wird gewarnt
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T171500
DTSTAMP;VALUE=DATE-TIME:20150111T231818Z
UID:uMGv2XJJqkQodKm0_Mtr_A@frab.cccv.de
DESCRIPTION:An overview of 70 years of nuclear weapons\, focusing on some
  of the underlying physics\, the international politics that surround th
 e topic\, modern technology for nuclear weapons detection and monitoring
 \, and what everyone can do to help nuclear disarmament.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6121.html
SUMMARY:What Ever Happened to Nuclear Weapons?
LOCATION:Saal 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141230T124500
DTSTAMP;VALUE=DATE-TIME:20150120T201653Z
UID:ad722522-5817-4317-8f3d-bb443b4e6c77@frab.cccv.de
DESCRIPTION:Computers have become ubiquitous and essential\, but they rem
 ain massively error-prone and insecure - as if we were back in the early
  days of the industrial revolution\, with steam engines exploding left\,
  right\, and centre.  Why is this\, and can we do better?  Is it science
 \, engineering\, craft\, or bodgery?\n\nI'll talk about attempts to mix 
 better engineering methods from a cocktail of empiricism and logic\, wit
 h examples from network protocols\, programming languages\, and (especia
 lly) the concurrency behaviour of programming languages and multiprocess
 ors (from the ARMs in your phone to x86 and IBM Power servers)\, togethe
 r with dealings with architects and language standards groups.\n
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6574.html
SUMMARY:Why are computers so @#!*\, and what can we do about it?
LOCATION:Saal 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141229T113000
DTSTAMP;VALUE=DATE-TIME:20150101T163957Z
UID:nH8WWBIPmElTIWVCbrjcrg@frab.cccv.de
DESCRIPTION:We from EveryCook are building an open source computerized co
 oking device. At 29c3 I presented the idea of digital cooking and people
  gave me an awesome feedback. Now\, 2 years later the industry giants ha
 ve realised that connecting computers and kitchen devices can do awesome
  things. But do they create open standards? Of course not! They create l
 ittle black boxes speaking strange languages that you can't integrate in
  an ecosystem that wasn't designed by the manufacturers themselves. We s
 till want an open ecosystem for free exchange of information about food 
 and recipes. We came closer to our goal. Let me tell you...
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6158.html
SUMMARY:Why do we need an open food information platform
LOCATION:Saal 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20141228T113000
DTSTAMP;VALUE=DATE-TIME:20150109T215245Z
UID:XGqu620EKR92-WUWMXNRvA@frab.cccv.de
DESCRIPTION:GPG has been correctly described as "damn near unusable". Why
  is this so? What does research into usable security tell us? This talk 
 covers the history\, methods\, and findings of the research field\, as w
 ell as proposed solutions and open questions.
URL:http://events.ccc.de/congress/2014/Fahrplan/events/6021.html
SUMMARY:Why is GPG "damn near unusable"?
LOCATION:Saal G
END:VEVENT
END:VCALENDAR
