BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
CALSCALE:GREGORIAN
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin
BEGIN:STANDARD
DTSTART:20151025T030000
RDATE:20151025T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
DTSTAMP;VALUE=DATE-TIME:20160105T142042Z
UID:012b9dea-7d42-4428-acd4-4f84fa41e729@frab.cccv.de
DESCRIPTION:During this lecture presentation\, Boaz Levin and Vera Tollma
 nn\,\nco-founders of the Research Center for Proxy Politics\, will devel
 op the proxy as a figure of thought by spinning and testing it in differ
 ent\ncontexts.\n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7570.html
SUMMARY: Plunge into Proxy Politics - Vera Tollmann\, Boaz Levin
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T140000
DTSTAMP;VALUE=DATE-TIME:20160104T233339Z
UID:cc9ede64-bad5-4ed0-92a3-4fbaf54eadec@frab.cccv.de
DESCRIPTION:The Fluxus movement came about in the early 1960ies and the t
 alk will discuss its strenghts\, dead-ends and promises for the creation
  of works and community in our digital environment. International\, tran
 sdisciplinary\, non-institutional\, anti-art and playful. After several 
 years of research and new art productions\, Leo Findeisen and Markus Zim
 mermann will present their findings.  \n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7421.html
SUMMARY:"Fluxus cannot save the world." - leomagnet\, Markus Zimmermann
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T113000
DTSTAMP;VALUE=DATE-TIME:20160108T134615Z
UID:7504eeb1-1665-47fd-b21a-601d2641c41c@frab.cccv.de
DESCRIPTION:News reports and political speeches are currently replete wit
 h references to hacking and hacktivism\, i.e.\, politically motivated ha
 cking. They often portray hackers and hacktivists negatively and put the
 m onto the same level with\, for example\, terrorists. This talk is base
 d on a PhD research project examining the perception of self-identified 
 hackers and hacktivists on these (in)securitising developments. It inves
 tigates how hackers and hacktivists understand themselves and their acti
 vities\, explores how they articulate the effects of this (in)securitisa
 tion\, and outlines the ways they resist these processes. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7207.html
SUMMARY:“I feel like a criminal and I have to be god at the same time” - 
 Leonie Maria Tanczer
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
DTSTAMP;VALUE=DATE-TIME:20160104T194530Z
UID:72ad2630-b736-4d4c-8ea1-d982076426bc@frab.cccv.de
DESCRIPTION:In der politischen Rede sind immer wieder Floskeln zu beobach
 ten\, zum Teil gibt es Moden\, wie im Zusammenhang mit dem so genannten 
 No-Spy-Abkommen\, wo Handlungen wiederholt mit „bestem Wissen und Gewiss
 en“ gerechtfertigt wurden. Auch das „volle/vollste Vertrauen“ der Kanzle
 rin ist auffällig. Der Vortrag vertritt die Hypothese\, dass solche Phra
 sen nicht zufällig sind\, dass sie eine Funktion besitzen. Es wird erläu
 tert\, was mit ihnen erreicht werden soll. Es wird außerdem der Frage na
 chgegangen\, wie Floskeln sich durch häufigen Gebrauch in ihrer Bedeutun
 g verändern bzw. verselbständigen und gegen den Sprecher wenden können. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7150.html
SUMMARY:„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik - Mar
 tin Haase/maha\, Kai Biermann
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
DTSTAMP;VALUE=DATE-TIME:20151230T190329Z
UID:3f61827f-8b17-47b4-a43c-e0dce6532cbe@frab.cccv.de
DESCRIPTION:    Embedded systems are omnipresent in our everyday life and
  are becoming \n    increasingly present in many computing and networked
  environments. For example\,\n    they are at the core of various Common
 -Off-The-Shelf (COTS) devices such as\n    printers\, video surveillance
  systems\, home routers and virtually anything we \n    informally call 
 electronics. The emerging phenomenon of the Internet-of-Things\n    (IoT
 ) will make them even more widespread and interconnected. Cisco famously
 \n    predicted that there will be 50 billion connected embedded devices
  by 2020.\n    Given those estimations\, the heterogeneity of technology
  and application fields\,\n    and the current threat landscape\, the se
 curity of all those devices becomes of\n    paramount importance. In add
 ition to this\, manual security analysis does not\n    scale. Therefore\
 , novel\, scalable and automated approaches are needed.\n    In this tal
 k\, we present several methods that make *the large scale\n    security 
 analyses of embedded devices* a feasible task. We implemented \n    thos
 e techniques in a scalable framework that we tested on real world data. 
 \n    First\, we collected a large number of firmware images from Intern
 et \n    repositories and then performed simple static analysis. \n    S
 econd\, since embedded devices often expose web interfaces for \n    rem
 ote administration\, therefore we developed techniques for large scale \
 n    static and dynamic analysis of such interfaces. \n    Finally\, ide
 ntifying and classifying the firmware files\, as well as \n    fingerpri
 nting and identifying embedded devices is difficult\, especially \n    a
 t large scale. \n    Using these techniques\, we were able to discover a
  large number of new \n    vulnerabilities in dozens of firmware package
 s\, affecting a great variety of vendors and\n    device classes. We wer
 e also able to achieve high accuracy in fingerprinting and\n    classifi
 cation of both firmware images and live devices.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7252.html
SUMMARY:(In)Security of Embedded Devices' Firmware - Fast and Furious at 
 Large Scale - Andrei Costin
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
DTSTAMP;VALUE=DATE-TIME:20160110T194644Z
UID:74515f8e-a752-4cbb-b407-3a70fca5b0b3@frab.cccv.de
DESCRIPTION:Neue App-basierte TAN-Verfahren sollen die etablierten Verfah
 ren ablösen und Onlinebanking komfortabler machen. Die Notwendigkeit von
  dedizierter Hardware entfällt und Transaktionen können mit nur einem mo
 bilen Endgerät durchgeführt werden. Was von den Kreditinstituten als Fea
 ture beworben wird\, erweist sich in unserer Untersuchung als fatal. In 
 einem Proof-of-Concept-Angriff demonstrieren wir die Manipulation von Tr
 ansaktionsdaten und zeigen die konzeptionelle Schwäche von App-basierten
  TAN-Verfahren.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7360.html
SUMMARY:(Un)Sicherheit von App-basierten TAN-Verfahren im Onlinebanking -
  Vincent Haupert
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T233000
DTSTAMP;VALUE=DATE-TIME:20160104T121653Z
UID:f1c8f781-1ce7-451f-90e9-218ba94bc955@frab.cccv.de
DESCRIPTION:On 17th December 2014\, the Government of India's Ministry of
  Communications and Information Technology issued an order to all licens
 ed Internet Service Providers (ISPs) in the country to block access to 3
 2 websites\, effective immediately. The basis of this was a claim that t
 he targeted web services were being used for "Jihadi Propaganda" by "Ant
 i-National groups". As a response to this\, a few technologists in Berli
 n got together and thought it would be a good idea to do some research u
 sing free and accessible tools and to look at how censorship has been im
 plemented\, as well as the various techniques that could be used to circ
 umvent this censorship. This talk will discuss our findings and make rec
 ommendations about how ISPs can handle such censorship requests better\,
  while being fair and transparent to their customers.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7263.html
SUMMARY:#GOIBlocks - Technical observations about recent internet censors
 hip in India - Kaustubh Srikanth
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T203000
DTSTAMP;VALUE=DATE-TIME:20160109T012743Z
UID:3b16ddc9-499b-44b1-9084-b3e328daea30@frab.cccv.de
DESCRIPTION:20 OSCILLATORS IN 20 MINUTES is an experimental music perform
 ance/technical challenge/standup comedy act where I attempt to build twe
 nty sound generating square wave oscillators in twenty minutes. This inv
 olves fabricating small electronic circuits with wires\, chips\, small c
 omponents and nine-volt batteries under the pressure of limited time and
  expectation. This is a test of my technical abilities and an experiment
  in working with live troubleshooting as a method of musical improvisati
 on. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7549.html
SUMMARY:20 OSCILLATORS IN 20 MINUTES  - Darsha
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
DTSTAMP;VALUE=DATE-TIME:20160109T013641Z
UID:7bf4c7a5-779e-4591-8d9b-f5f38d3dc879@frab.cccv.de
DESCRIPTION:The traditional review event with presentations from various 
 teams at congress.  Learn how the 32C3 got Internet\, video streaming\, 
 power and maybe more!
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7555.html
SUMMARY:32C3 Infrastructure Review - Leon
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T183000
DTSTAMP;VALUE=DATE-TIME:20160109T023554Z
UID:47da549d-fd5b-4210-a8e5-bbb057844c0d@frab.cccv.de
DESCRIPTION:3D printers are almost everywhere\, but not on the moon yet. 
 We want to change that and this talk gives you a little insight into the
  how and whys of 3D printing on the moon.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7336.html
SUMMARY:3D printing on the moon - Karsten Becker
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
DTSTAMP;VALUE=DATE-TIME:20160109T033535Z
UID:1cac5105-cfdc-42e9-9a87-0ee71fc2443c@frab.cccv.de
DESCRIPTION:How we built an automatic exploitation system and qualified f
 or the DARPA Cyber Grand Challenge.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7218.html
SUMMARY:A Dozen Years of Shellphish - Antonio Bianchi\, Jacopo Corbetta\,
  Andrew Dutcher
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T160000
DTSTAMP;VALUE=DATE-TIME:20160107T202128Z
UID:fca4934b-5f01-4680-8cda-03fa206aac17@frab.cccv.de
DESCRIPTION:Yosys (Yosys Open Synthesis Suite) is an Open Source Verilog 
 synthesis and verification tool.\n\nProject IceStorm aims at reverse eng
 ineering and documenting  the bit-stream format of Lattice iCE40 FPGAs a
 nd providing simple tools for analyzing and creating bit-stream files\, 
 including a tool that converts iCE40 bit-stream files into behavioral Ve
 rilog. Currently the bitstream format for iCE40 HX1K and HX8K is fully d
 ocumented and supported by the tools.  \n\nArachne-PNR is an Open Source
  place&route tool for iCE40 FPGAs based on the databases provided by Pro
 ject IceStorm. It converts BLIF files into an ASCII file format that can
  be turned into a bit-stream by IceStorm tools.\n\nThis three projects t
 ogether implement a complete open source tool-chain for iCE40 FPGAs. It 
 is available now and it is feature complete (with the exception of timin
 g analysis\, which is work in progress).
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7139.html
SUMMARY:A Free and Open Source Verilog-to-Bitstream Flow for iCE40 FPGAs 
 - Clifford
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
DTSTAMP;VALUE=DATE-TIME:20160109T055400Z
UID:c50c5193-7389-4858-9352-14ea6d74b77a@frab.cccv.de
DESCRIPTION:The leading social networks are the powerful new gatekeepers 
 of the digital age. Proprietary de facto standards of the dominant compa
 nies have lead to the emergence of virtual “information silos” that can 
 barely communicate with one another. Has Diaspora really lost the war? O
 r is there still a chance to succeed?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7403.html
SUMMARY:A New Kid on the Block - Katharina Nocun
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T173000
DTSTAMP;VALUE=DATE-TIME:20160111T005407Z
UID:17259b49-65ef-4726-ae03-a0b90e45806a@frab.cccv.de
DESCRIPTION:"Signal level is high but throughput is low" is a common expe
 rience in WLAN networks without central management. That causes a lot of
  frustration\, mainly because there is no easy way for users to OBSERVE 
 the presence of interference at all. \n\nIn order to improve this situat
 ion we developed a patch for OpenWRT which makes interference from other
  sources visible and is able to display the current utilization-ratio (c
 hannel load). No additional hardware is required and no interruption of 
 normal operation is necessary - because recent chipsets maintain interna
 l counters for channel load tracking.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7314.html
SUMMARY:All Our Shared Spectrum Are Belong to Us - Paul Fuxjaeger
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
DTSTAMP;VALUE=DATE-TIME:20160106T092525Z
UID:b9b2c371-417c-45c4-a47f-faf7eeb11fbf@frab.cccv.de
DESCRIPTION:AXIOM is the first professional\, extendable\, affordable and
  modular cinema camera platform based on Free ("libre") Software\, Open 
 Design\, Open Hardware\, transparent development processes and extensive
  documentation. The community project establishes an ecosystem that offe
 rs a sustainable basis for a broad spectrum of imaging applications and 
 empowers enthusiasts\, videographers as well as developers in the techno
 logy and creative industry sectors.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7355.html
SUMMARY:apertus° AXIOM - Matthias Tarasiewicz (parasew)
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
DTSTAMP;VALUE=DATE-TIME:20160107T202423Z
UID:56e8d345-8c04-4281-9811-d4ed9da8603e@frab.cccv.de
DESCRIPTION:With the advancement of defensive security and the constant r
 elease of research papers into their toolsets\, advanced threat actors h
 ave had to adapt with new operational security practices\, as well as wi
 th new technology.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7260.html
SUMMARY:APT Reports and OPSEC Evolution\, or: These are not  the APT repo
 rts you are looking for - Inbar Raz\, Gadi Evron
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T124500
DTSTAMP;VALUE=DATE-TIME:20160106T170845Z
UID:a30bcf2c-1abf-4b7b-9554-a6dacbaeba52@frab.cccv.de
DESCRIPTION:In recent years\, NGOs have been struggling to defend civil r
 ights in Brussels. As human rights defenders\, it is part of our job to 
 detect failures in the EU’s digital policy-making. But we rarely have th
 e opportunity to explore the underlying reasons and to debug Europe’s ke
 rnel package.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7227.html
SUMMARY:Avoiding kernel panic: Europe’s biggest fails in digital policy-m
 aking - Kirst3nF\, Walter van Holst
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
DTSTAMP;VALUE=DATE-TIME:20160107T203047Z
UID:b5d1079a-7d72-45b1-8328-e5c3e60944c1@frab.cccv.de
DESCRIPTION:In 2011\, Joanna Rutkowska unveiled an easy-to-use tool for m
 itigating many attacks on system boot chains by using the TPM - the Anti
  Evil Maid. Unfortunately the implementation was difficult to incorporat
 e into normal system boot in a secure manner - anybody able to observe a
  user could recreate the secret. This presentation describes a method to
  allow systems to prove their identity to the user without making it tri
 vial for attackers to mimic a secure boot and extract secrets from the u
 ser\, and why the state of modern hardware means this may still not be e
 nough.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7343.html
SUMMARY:Beyond Anti Evil Maid - Matthew Garrett
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T183000
DTSTAMP;VALUE=DATE-TIME:20160108T170123Z
UID:9ab1407a-126f-48d9-898d-eae7974324e9@frab.cccv.de
DESCRIPTION:Did you ever want to have access to a few hundred thousand ne
 twork end points? Or a few hundred thousand phone numbers? A short look 
 behind the curtains of how not to do network security.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7133.html
SUMMARY:Beyond your cable modem - Alexander Graf
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
DTSTAMP;VALUE=DATE-TIME:20160107T203923Z
UID:c87fa147-d1f4-4353-82db-c3e5b646884b@frab.cccv.de
DESCRIPTION:We will detect\, bypass\, and abuse honeypot technologies and
  solutions\, turning them against the defender. We will also release a g
 lobal map of honeypot deployments\, honeypot detection vulnerabilities\,
  and supporting code.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7277.html
SUMMARY:Breaking Honeypots for Fun and Profit - DeanSysman\, Gadi Evron\,
  Itamar Sher
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T131500
DTSTAMP;VALUE=DATE-TIME:20160110T200004Z
UID:c3731bcd-04a8-49ba-a472-d1180944c106@frab.cccv.de
DESCRIPTION:Buffering sucks! Why we see regular buffering when watching o
 nline video. What internet service providers could do to reduce bufferin
 g and why big players refuse to act. An attempt of calculating the econo
 mic cost of buffering.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7530.html
SUMMARY:Buffering sucks! - Fredy Kuenzler
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T224500
DTSTAMP;VALUE=DATE-TIME:20160107T022858Z
UID:60ba43d2-a9c8-42ab-a434-8772cb182675@frab.cccv.de
DESCRIPTION:This talk gives an overview on state-of-the-art wireless secu
 rity concepts: How can we analyze wireless protocols? How can we build m
 echanisms that are secure even when the attacker has unlimited computati
 onal power? Can we exploit wireless transmission for more?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7119.html
SUMMARY:Building and Breaking Wireless Security - jiska
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
DTSTAMP;VALUE=DATE-TIME:20160106T224410Z
UID:b7327513-182a-455a-932e-aab4791f5331@frab.cccv.de
DESCRIPTION:After defensive programming techniques and before attack meth
 od mitigations\, the least privilege principle is our strongest weapon a
 gainst exploitation. Much of the focus has been on how the admin can san
 dbox processes away.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7284.html
SUMMARY:Check your privileges! - Fefe
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
DTSTAMP;VALUE=DATE-TIME:20160109T082021Z
UID:48219ef6-24b8-41ca-8cc0-ec309e4148e6@frab.cccv.de
DESCRIPTION:Since my move to China in 2012 I have actively engaged in the
  local art scenes of Beijing and Shanghai\, focusing on collaborating wi
 th artists interested in technology and the internet. My own personal in
 dependent research of the Chinese internet and the popular Chinese socia
 l app\, WeChat 微信\, has contributed to an ongoing massive archive I bega
 n in 2014 called The Chinternet Archive. To date\, I have over 15\,000 p
 ieces of content (and growing) documenting localized trends\, memes\, ve
 rnacular photography\, online personas\, .gif animations\, videos\, self
 ies\, propaganda\, retail\, family/work life\, and other such digital ar
 tifacts of online Chinese culture. This archive directly influenced my a
 rtistic and curatorial practice\, resulting in an online art collection 
 called Netize.net\, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet F
 riend Network”\, which collaborates with emerging Chinese and internatio
 nal artists who are exploring or deconstructing East/West dichotomies\, 
 engaging in Sino-centric Web aesthetics\, or investigating the East onli
 ne. The goal of this talk is to explore through my Chinternet Archive an
 d Netize.net collections\, forms of creativity found in China in relatio
 nship to it’s early internet history\, interactions with technology\, lo
 calized networks and restrictions.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7216.html
SUMMARY:CHINTERNET ART - Michelle Proksell 
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T200000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
DTSTAMP;VALUE=DATE-TIME:20160109T191441Z
UID:5c8d1a32-d9ce-49cb-b058-846fa58663d8@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7551.html
SUMMARY:Closing Event - Carina Haupt\, Linus Neumann
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T124500
DTSTAMP;VALUE=DATE-TIME:20160109T180343Z
UID:08843e46-b813-49a4-93ad-ab6e7b3e4a17@frab.cccv.de
DESCRIPTION:CloudABI is an alternative runtime environment for UNIX-like 
 operating systems that is purely based on the principle of capability-ba
 sed security. This makes it possible to create applications that are str
 ongly sandboxed\, easier to test and easier to maintain.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7231.html
SUMMARY:CloudABI - Ed Schouten
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
DTSTAMP;VALUE=DATE-TIME:20160111T105539Z
UID:9b641e3f-6d6e-4850-bddd-ced7d67af5c6@frab.cccv.de
DESCRIPTION:Governments post reports and data about their operations. Jou
 rnalists publish documents from whistleblowers. But there is a third typ
 e of open data that is often overlooked- the information people and comp
 anies post about themselves. People need jobs. Companies need to hire pe
 ople. Secret prisons do not build themselves.  \n\nBy making it feasible
  for anyone to collect public data online in bulk and exploring ways to 
 effectively use this data for concrete objectives\, we can build an inde
 pendent\, distributed system of accountability.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7340.html
SUMMARY:Collect It All: Open Source Intelligence (OSINT) for Everyone - M
 . C. McGrath
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T174500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T171500
DTSTAMP;VALUE=DATE-TIME:20160103T215158Z
UID:269e7320-2133-4981-9238-e5fc8305a3e4@frab.cccv.de
DESCRIPTION:Wie lassen sich Konstantenfaltung und ein Registerallokator f
 ür einen Forth-Compiler implementieren\, der in einem Mikrocontroller lä
 uft ?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7520.html
SUMMARY:Compileroptimierungen für Forth im Microcontroller - Matthias Koc
 h
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T124500
DTSTAMP;VALUE=DATE-TIME:20160107T210542Z
UID:fb537cde-7f1d-484b-971b-1d30a543ecfb@frab.cccv.de
DESCRIPTION:Computational theories of the mind seem to be ideally suited 
 to explain rationality. But how can computations be subverted by meaning
 \, emotion and love?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7483.html
SUMMARY:Computational Meta-Psychology - Joscha
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
DTSTAMP;VALUE=DATE-TIME:20160105T023100Z
UID:9f2e9ff0-1555-470b-8743-9f07f54e9097@frab.cccv.de
DESCRIPTION:In 2011 the Nintendo 3DS was released. Today it is the most p
 opular current-gen handheld console\, having sold more than 50 million u
 nits worldwide. The 3DS features a completely redesigned architecture fr
 om its predecessors the DS and the DSi. This talk will focus on the secu
 rity features of the 3DS\, and how we got around them.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7240.html
SUMMARY:Console Hacking - plutoo\, derrek\, smea
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
DTSTAMP;VALUE=DATE-TIME:20160102T023511Z
UID:5f5cdb89-f599-40a6-84eb-d588eeed0250@frab.cccv.de
DESCRIPTION:Hacking receives growing attention among social scientists du
 ring the last five years. Researchers particularly in the fields of Huma
 n-Computer Interaction (HCI) and Computer-Supported Collaborative Work (
 CSCW) but also in the social sciences generally have begun to study hack
 ing empirically—investigating hacking as a practice and as cultural phen
 omenon. The talk offers a glimpse of the spectrum of research about hack
 ing in HCI\, CSCW\, and adjacent fields. Researchers in these fields por
 tray hacking very differently. The spectrum ranges from “transgressive c
 raft” to “innovative leisure practice\,” from skilled craftsmanship to a
 d hoc kludging\, from an individualist pursuit to a community mission\, 
 from an expression of liberalism to an exclusive practice of cultural di
 stinction. Some researchers see hacking as an illustration of how to def
 y technological determinism\, i.e.\, the conviction that the technologic
 al determines the social\, a position that social scientists typically f
 ight ferociously. Other researchers see it as the future of “end-user in
 novation.” This talks discusses these notions and describes the value---
 economic\, pedagogical\, cultural\, conceptual---that different research
  perspectives perceive in hacking.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7114.html
SUMMARY:Craft\, leisure\, and end-user innovation - Susann Wagenknecht
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
DTSTAMP;VALUE=DATE-TIME:20160104T233437Z
UID:ba780105-8cc1-4e6e-8552-5e3bc150b9ff@frab.cccv.de
DESCRIPTION:Die Landesverrat-Affäre um netzpolitik.org hat gezeigt\, wie 
 wichtig es ist\, nicht nur aus staatlichen Dokumenten zu zitieren\, sond
 ern sie im Original zu veröffentlichen. Ideales Werkzeug dafür ist das I
 nformationsfreiheitsgesetz (IFG). Wir geben einen Überblick über die Ent
 wicklungen dieses Jahr rund um das IFG.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7102.html
SUMMARY:Crypto ist Abwehr\, IFG ist Angriff! - Arne Semsrott
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
DTSTAMP;VALUE=DATE-TIME:20160110T002705Z
UID:31331405-a243-48ba-9536-83285542400a@frab.cccv.de
DESCRIPTION:Governments around the world are seeking to put a stop to sec
 ure end-to-end encryption\, from the UK’s Data Retention and Investigato
 ry Powers Act\, to Australia’s Defence Trade Controls Act\, to India’s d
 raft proposal to require plain text copies of all secure messages\, to t
 he United States’ Federal Bureau of Investigation’s public pressure on g
 lobal companies like Apple and Google to weaken their security and provi
 de law enforcement access to plain text content.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7386.html
SUMMARY:Crypto Wars Part II - Kurt Opsahl
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T140000
DTSTAMP;VALUE=DATE-TIME:20160105T204958Z
UID:8b3cba12-3928-4fb9-b727-ee4bc9e56f51@frab.cccv.de
DESCRIPTION:Transposition of the Wassenaar Arrangement\, which now also c
 overs export controls on exploits and surveillance technology\, into Eur
 opean law is upon us. This panel discusses this\, both on process and su
 bstance.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7280.html
SUMMARY:Cyber all the Wassenaars - Walter van Holst\, Nate Cardozo\, mlp\
 , Richard Tynan
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T203000
DTSTAMP;VALUE=DATE-TIME:20160109T082206Z
UID:47c13b4a-a50b-4158-9a71-f4a2f24ace64@frab.cccv.de
DESCRIPTION:Kommentierendes im Internet ist neuerdings bedroht. Der unflä
 tige Kommentierer hat den Pedonazi als Schrecken des Netzes abgelöst\, a
 ls Strohmann für mehr Kontrolle über das Netz kann er auf breitere Gefol
 gschaft rechnen. Es “muss etwas geschehen” gegen den “Hass im Netz”\, “P
 utintrolle” und Wutnetzbürger. Twitter\, Mark Zuckerberg\, Politiker\, a
 lle sollen mehr tun - aber was denn eigentlich\, mehr Zensur und Moderat
 ion\, andere Ausgestaltungen von Kommentarsystemen? 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7249.html
SUMMARY:Das Zahnrad aus Fleisch - agonarch\, @fraufeli
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T203000
DTSTAMP;VALUE=DATE-TIME:20160109T082400Z
UID:28891a0d-98d9-484a-bd59-ccea80852b12@frab.cccv.de
DESCRIPTION:Datahavens have long been discussed as a solution to user sec
 urity and privacy needs.  Instinctively\, the idea of physical locations
  where servers for communications\, financial privacy\, and other servic
 es can work is easily understood and seems appealing.  As a founder of t
 he HavenCo datahaven on Sealand in 2000\, I saw firsthand the potential 
 and the pitfalls of this approach.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7432.html
SUMMARY:Datahavens from HavenCo to Today - Ryan Lackey
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T140000
DTSTAMP;VALUE=DATE-TIME:20160111T105713Z
UID:2e3d2878-e8b0-44cd-aea8-baf52be25ecf@frab.cccv.de
DESCRIPTION:For the past 3 years I have been delivering a custom-tailored
  DDoS attacks for organizations that wanted to test out their DDoS defen
 se systems.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7523.html
SUMMARY:DDoS mitigation EPIC FAIL collection - dalmoz
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
DTSTAMP;VALUE=DATE-TIME:20160111T104150Z
UID:371063d0-da9d-4d9f-bbe9-f5739eba2f30@frab.cccv.de
DESCRIPTION:Last year I presented research showing how to de-anonymize pr
 ogrammers based on their coding style. This is of immediate concern to o
 pen source software developers who would like to remain anonymous. On th
 e other hand\, being able to de-anonymize programmers can help in forens
 ic investigations\, or in resolving plagiarism claims or copyright dispu
 tes. \n\nI will report on our new research findings in the past year. We
  were able to increase the scale and accuracy of our methods dramaticall
 y and can now handle 1\,600 programmers\, reaching 94% de-anonymization 
 accuracy. In ongoing research\, we are tackling the much harder problem 
 of de-anonymizing programmers from binaries of compiled code. This can h
 elp identify the author of a suspicious executable file and can potentia
 lly aid malware forensics. We demonstrate the efficacy of our techniques
  using a dataset collected from GitHub.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7491.html
SUMMARY:De-anonymizing Programmers - Aylin
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T014500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T001500
DTSTAMP;VALUE=DATE-TIME:20160110T002249Z
UID:ffa37241-83fe-40ca-9a5a-7c886d5879c0@frab.cccv.de
DESCRIPTION:Die ASYL-DIALOGE erzählen von Begegnungen\, die Menschen verä
 ndern\, von gemeinsamen Kämpfen in unerwarteten Momenten – eine dieser G
 eschichten spielt in Osnabrück\, wo seit März 2014 ein breites Bündnis s
 olidarischer Menschen bereits 37 Abschiebungen verhindern konnte und som
 it für viele bundesweit zum Vorbild wurde...
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7566.html
SUMMARY:Die Asyl-Dialoge / The Asylum Dialogues - Bühne für Menschenrecht
 e
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T214500
DTSTAMP;VALUE=DATE-TIME:20160111T111040Z
UID:9f89d94f-07fd-47f4-9ad0-c8dda94de175@frab.cccv.de
DESCRIPTION:Newly adopted VoLTE requires changes in all associated partie
 s\, such as 3GPP standard\, device\, operating system\, and cellular cor
 e networks. Therefore\, it is not too surprising that it has security pr
 oblems. However\, it turns out that it has way too many problems. In thi
 s talk\, we introduce how you can freely send data in the cellular netwo
 rk\, and how an attacker can perform caller spoofing and denial of servi
 ce attacks on calls to disable the target’s calling. Furthermore\, we ex
 plain how small implementation glitch on VoLTE may lead to break the who
 le cellular network down.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7502.html
SUMMARY:Dissecting VoLTE - Dongkwan\, Hongil Kim
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T190000
DTSTAMP;VALUE=DATE-TIME:20160109T082724Z
UID:62290f8e-f515-416f-9c4a-b403474e94e6@frab.cccv.de
DESCRIPTION:The Ecuadorian government received international visibility w
 hen in 2012 it agreed to grant Wikileaks founder Julian Assange politica
 l asylum and host him in Ecuador's London embassy. Ecuador has since bee
 n widely praised for standing up to the United States to defend the free
 dom of the press and freedom of expression.\n\nHowever\, the reality is 
 not consistent with this image Ecuador seeks to project. Journalists ins
 ide the country face oppressive laws\, huge fines and lawsuits for repor
 ting on government corruption. Digital and physical surveillance of jour
 nalists and activists is in fact getting worse.\n\nWe will analyze some 
 of the existing leaks that prove such activities. We will also give a fi
 rst-hand account from someone who had to literally run away from Ecuador
  for publishing leaked materials proving illegal espionage against journ
 alists and citizens.\n\nIs Ecuador really interested in free speech? We 
 don't think so and we will tell you why.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7134.html
SUMMARY:Ecuador: how an authoritarian government is fooling the entire wo
 rld - Pedro Noel\, Bethany Horne
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
DTSTAMP;VALUE=DATE-TIME:20160110T022230Z
UID:527d5a8e-841d-48ad-89d9-b62fbee741b8@frab.cccv.de
DESCRIPTION:Im Sommer kam heraus\, dass der Generalbundesanwalt Ermittlun
 gen gegen zwei Journalisten von netzpolitik.org in Gang gesetzt hatte. D
 as geschah\, weil sich das Bundesamt für Verfassungsschutz dadurch auf d
 en Schlips getreten fühlte\, dass Auszüge aus ihren Haushaltsplänen der 
 allgemeinen Bevölkerung bei netzpolitik.org zugänglich gemacht wurden.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7135.html
SUMMARY:Ein Abgrund von Landesverrat - Markus Beckedahl
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
DTSTAMP;VALUE=DATE-TIME:20160106T092402Z
UID:52706f90-a2f9-48be-a4c3-786257fce233@frab.cccv.de
DESCRIPTION:This talk is a brief recap into EEG / BCI for hackers\, maker
 s\, researchers\, and artists. It will give an overview of current consu
 mer devices and their flaws\, and subquently present fully open-source\,
  high-quality hardware and software. Finally implications for the future
  of modern society are outlined\, especially how commercial EEG consumer
  devices or services may be exploited by corporations to cloudsource mar
 ket research\, or spy on health conditions\, brain states or even leak p
 rivate information. Strategies to circumvent these risks and secure brai
 n wave experience are being discussed.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7416.html
SUMMARY:Evolution of Brain-Computer Interfaces - fractalfox
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T011500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T001500
DTSTAMP;VALUE=DATE-TIME:20160106T215515Z
UID:0bdbef2d-1594-4582-b315-7ee5da5505bf@frab.cccv.de
DESCRIPTION:Wir helfen euch\, die Fnords zu sehen\, wenn nach einem klare
 n Fall von Selbstmord der Zensor pinkeln war und die Stahlbälle den maxi
 malen Realitätsabstand eingenommen haben.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7282.html
SUMMARY:Fnord-Jahresrückblick - Fefe\, frank
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T211500
DTSTAMP;VALUE=DATE-TIME:20160111T025133Z
UID:153f9b5f-16a6-4c0c-b8d5-ca62ae23dea0@frab.cccv.de
DESCRIPTION:Free software and hardware are essential to sovereignty among
  developing nations\, and can be used to secure infrastructure and infor
 mation against sophisticated adversaries. Underdeveloped nations are lev
 eraging Free software for these purposes\, including Gaza and the Palest
 inian territories. This lecture discusses the Palestinian use of Free so
 ftware and hardware to claim a kind of sovereignty\, focusing on the hea
 lth sector as one example where speaker Dr. Tarek Loubani has experience
 d and participated in efforts to incorporate Free culture.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7246.html
SUMMARY:Free Software and Hardware bring National Sovereignty - Tarek Lou
 bani
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
DTSTAMP;VALUE=DATE-TIME:20160105T003854Z
UID:e34fb384-4da9-44c4-9096-1660d5d57962@frab.cccv.de
DESCRIPTION:„Never ever say no\, act your first thought and learn to love
  mistakes“ – these are the basic rules of improv theatre. I will show ho
 w this can be adopted for everyday life.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7138.html
SUMMARY:G’scheitern - Gregor Ruttner
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
DTSTAMP;VALUE=DATE-TIME:20160109T083052Z
UID:018148c1-62c9-4796-8443-2a8c8b8e3a01@frab.cccv.de
DESCRIPTION:DGAs (Domain Generation Algorithms) have become a trusty fall
 back mechanism for malware that’s a headache to deal with\, but they hav
 e one big drawback – they draw a lot of attention to themselves with the
 ir many DNS request for gibberish domains.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7243.html
SUMMARY:Gibberish Detection 102 - Ben H.
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T230000
DTSTAMP;VALUE=DATE-TIME:20160105T080250Z
UID:144b2208-bf0b-494c-99e5-665ed18f1e8f@frab.cccv.de
DESCRIPTION:Legend has it\, the first iteration of the Secure Sockets Lay
 er (SSL) protocol was broken in ten minutes by Phillip Hallam-Baker and 
 Alan Schiffman during a presentation by Marc Andreesen at MIT in 1994. I
 n the following two decades the protocol has been improved and the imple
 mentations have been strengthened\, but not without a steady stream of i
 mplementation vulnerabilities and protocol design errors. From the ciphe
 rsuite rollback attack to LogJam\, SSL/TLS has seen a diverse set of pro
 blems. In this talk we’ll discuss the pitfalls in designing and implemen
 ting a cryptographic protocol and lessons learned from TLS up to version
  1.2.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7438.html
SUMMARY:goto fail\; - Nick Sullivan
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T124500
DTSTAMP;VALUE=DATE-TIME:20160103T002209Z
UID:4b81e057-d17d-4108-90c4-8b0b162cf6c0@frab.cccv.de
DESCRIPTION:The military use of Drones has profoundly changed warfare and
  is a central aspect of the globalized war on terror. The public debate 
 including the respective talks at prior CCCs is dominated by questions o
 f the ethical and juridical aspects of Drone use. \n\nThis talk tries to
  shift the focus towards the enabling dimensions of Drone warfare. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7259.html
SUMMARY:Graphs\, Drones & Phones - Christoph Engemann
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T011500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T001500
DTSTAMP;VALUE=DATE-TIME:20160110T123355Z
UID:47cbd880-f500-4c44-b717-c11ed1da087d@frab.cccv.de
DESCRIPTION:In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen 
 des NSA-BND-Untersuchungsausschusses\, die bei netzpolitik.org nachzules
 en sind\, verbergen sich interessante Antworten auf Fragen\, die niemand
  gestellt hat\, vorher unbekannte juristische „Theorien“ des BND und Per
 len verlogener Rabulistik.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7225.html
SUMMARY:Grundrechte gelten nicht im Weltall! - anna\, Constanze Kurz\, cb
 ass\, Felix Betzin
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T021500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T001500
DTSTAMP;VALUE=DATE-TIME:20160107T073223Z
UID:e1efc11e-170c-4234-9ac0-4451a6631b01@frab.cccv.de
DESCRIPTION:The Hacker Jeopardy is a quiz show.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7152.html
SUMMARY:Hacker Jeopardy - Sec\, ray
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T113000
DTSTAMP;VALUE=DATE-TIME:20160109T094901Z
UID:3101dcca-7460-45e2-bdb1-c9f597eb462e@frab.cccv.de
DESCRIPTION:FOSS and hacker culture meeting the EU buereaucracy.  What ca
 n possibly come out of that?  We'll discuss what is involved for FOSS pr
 ojects and other interested parties to get $$$ funding by the European U
 nion.  Hackers deal with rule systems and their execution.  And the Euro
 pean Union issues a lot of rules which are executed by the "commission" 
 and its employees.  Within the Horizon2020 framework programme 80.000.00
 0.000 Euros will be distributed towards research projects across Europe 
 between 2014-2020.  Shouldn't some of that money go to purposes deemed u
 seful by 32c3 attendants?\n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7300.html
SUMMARY:Hacking EU funding for a decentralizing FOSS project - holger kre
 kel
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T160000
DTSTAMP;VALUE=DATE-TIME:20160104T232445Z
UID:7430c969-7ccf-4d40-903a-d9b1ebb4fb15@frab.cccv.de
DESCRIPTION:Dr. Peter Laackmann und Marcus Janke zeigen mit einem tiefen 
 Einblick in die Welt der Hardware-Trojaner\, auf welchem Wege „Instituti
 onen“ versuchen können\, sich versteckten Zugang zu Sicherheits-Hardware
  zu verschaffen.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7146.html
SUMMARY:Hardware-Trojaner in Security-Chips - Peter Laackmann\, Marcus Ja
 nke
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T113000
DTSTAMP;VALUE=DATE-TIME:20160104T001802Z
UID:94fa109a-45d7-4fea-86e3-12d12510c374@frab.cccv.de
DESCRIPTION:In my talk I am 1) discussing philosophical concepts of priva
 cy\, especially Hannah Arendt's philosophy.  I am 2) explaining why in a
  liberal-democratic system we need to protect our privacy and 3) what we
  can morally do to prevent catastrophes such as a totalitarian system fr
 om happening again. With Hannah Arendt's arguments and her analysis of t
 otalitarian systems in mind\, I am referring to three examples from toda
 y's privacy discussions: cybermobbing\, Behavioral Advertising and secre
 t services.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7342.html
SUMMARY:Household\, Totalitarianism and Cyberspace - Julia Maria Mönig
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T214500
DTSTAMP;VALUE=DATE-TIME:20160105T205129Z
UID:df35c860-60fc-4df8-801c-b2f4f91b33b8@frab.cccv.de
DESCRIPTION:When an online game no longer captivates interest\, what do y
 ou do? Grind on the network protocol\, of course! How does it work\, is 
 it secure - and\, how can you still get away while doing this?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7493.html
SUMMARY:How hackers grind an MMORPG: by taking it apart! - Rink Springer
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
DTSTAMP;VALUE=DATE-TIME:20160110T002725Z
UID:62a79191-ca6a-48ea-b747-8cf13faa75cb@frab.cccv.de
DESCRIPTION:In the dark days of October 2014 an unprecedented Ebola epide
 mic wrecked havoc across Sierra Leone\, Liberia and Guinea. In Sierra Le
 one\, the health system was only weeks away from total collapse due to a
 n inability to manage or pay health workers across the country and the w
 orld braced for the unchecked spread of the disease throughout west Afri
 ca. In the face of apocalyptic scenario\, a company made up of local hac
 kers took on the unprecedented challenge of building\, implementing and 
 running a huge Management Information System and Mobile payments system 
 to keep the health system from collapsing. This talk will show how this 
 was achieved with Open Source Software\, second hand laptops\, hacked vo
 ter registration machines\, second hand smartphones and some very smart 
 and determined young people used to achieving great things with none of 
 the resources we take for granted. We salute them.\n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7561.html
SUMMARY:How Open Source Software\, second hand laptops and hackers helped
  stop Ebola (and stopped an apocalypse). - Salton Arthur Massally\, Haro
 ld Valentine Mac-Saidu\, Francis Banguara\, Emerson
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T171500
DTSTAMP;VALUE=DATE-TIME:20160109T083459Z
UID:56721a59-30c0-4201-8744-5d2a9846ed28@frab.cccv.de
DESCRIPTION:Several years ago\, the Great Firewall of China was silently 
 upgraded to find and block circumvention servers that employ encryption 
 to defeat deep packet inspection. The system is now used to block protoc
 ols such as Tor\, SoftEther\, and SSH. In this talk\, we will give an ov
 erview of how this system works\, and how it can be circumvented.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7196.html
SUMMARY:How the Great Firewall discovers hidden circumvention servers - P
 hilipp Winter
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T140000
DTSTAMP;VALUE=DATE-TIME:20160106T212840Z
UID:abc3b46d-6e36-40e5-a037-79724a720183@frab.cccv.de
DESCRIPTION:What to do if you are neither a hardware- nor a software expe
 rt and want to contribute in effords of openess neverseless? A short ove
 rview about what I have done so far\, shown on 3 exaples: The Mooltipass
 \, a offline password save. The Pandora/Pyra\, a mini handheld\, full Li
 nux PC and its successor. Senoko\, the Novena battery board. From "just"
  crowdfunding to producing\, why it's worth to go through all the ups an
 d downs and encourage others to do the same.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7369.html
SUMMARY:How to contribute to make open hardware happen - mclien
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T211500
DTSTAMP;VALUE=DATE-TIME:20160110T002527Z
UID:550b8e16-3394-40d2-b47c-7cfe0031945b@frab.cccv.de
DESCRIPTION:Giant billboard vans\, drone-operated leaflet drops over an N
 SA building and calls to secret service agents\, Intelexit explores all 
 routes to reach out to secret service agents and convince them to follow
  their conscience and quit their jobs. We will take a look at the highli
 ghts of the campaign from 2015 and what's around the corner for 2016. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7426.html
SUMMARY:Intelexit - Gloria Spindle – Peng! Collective
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
DTSTAMP;VALUE=DATE-TIME:20160107T022829Z
UID:8becd5e2-45df-4723-9d6a-2e9f334875d2@frab.cccv.de
DESCRIPTION:Two years after the invitation to build your own iSP at 30C3\
 , I'd like to invite everyone to take part in building a better Internet
  with the Internet Cube project.\n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7401.html
SUMMARY:Internet Cube - taziden\, kload
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T140000
DTSTAMP;VALUE=DATE-TIME:20160110T195823Z
UID:78ea005f-4ddb-44d1-82e5-a2825ddea4e1@frab.cccv.de
DESCRIPTION:In Internet Landscapes\, Evan Roth with discuss his work as i
 t relates to visualizing\, archiving and understanding the Internet and 
 its effects on culture with a focus on the misuse of communication techn
 ologies. Roth will trace his personal and creative history within an Int
 ernet landscape that has changed significantly in the last 16 years. The
  presentation will include a range of work culminating in his more recen
 t pilgrimages to the beaches of the UK\, New Zealand and Sweden\, where 
 submarine Internet fiber optic cables reach the land. Armed with an arra
 y of paranormal technologies\, Roth will recount his personal quest to v
 isualize and reconnect with a changing Internet landscape. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7538.html
SUMMARY:Internet Landscapes - Evan Roth
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T230000
DTSTAMP;VALUE=DATE-TIME:20160107T203017Z
UID:e6217eeb-68ef-44b4-8e6e-beebe6a5195c@frab.cccv.de
DESCRIPTION:Listening to satellites and decoding is fun. We show interest
 ing stuff we found\, and how you can get into it.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7154.html
SUMMARY:Iridium Update  - Sec\, schneider
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T133000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T113000
DTSTAMP;VALUE=DATE-TIME:20160109T235146Z
UID:f9d33869-f9a2-4570-9e9a-25c56e32082a@frab.cccv.de
DESCRIPTION:Wir werden einen Überblick über die Themen geben\, die den Ch
 aos Computer Club 2015 beschäftigt haben. Neben der Zusammenfassung und 
 der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünfti
 ge Projekte reden.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7306.html
SUMMARY:Jahresrückblick des CCC - frank\, Linus Neumann\, erdgeist\, Cons
 tanze Kurz\, Falk Garbsch
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T140000
DTSTAMP;VALUE=DATE-TIME:20160102T023408Z
UID:3aeabb04-6227-4122-8fbc-21e31c04daf0@frab.cccv.de
DESCRIPTION:Auch in 2015 entstanden wieder zahlreiche Projekte bei Jugend
  hackt\, die mit Code die Welt verbessern. Im Talk möchten die jugendlic
 hen HackerInnen Einblick in ihre Ideen und Projekte geben\, und ihre Per
 spektive auf die Welt vermitteln.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7562.html
SUMMARY:Jugend hackt 2015 - Jugend hackt
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T203000
DTSTAMP;VALUE=DATE-TIME:20160103T104210Z
UID:341d7c6a-a8c0-47ec-8c24-4f6fc8639f3f@frab.cccv.de
DESCRIPTION:It is clear that something is needed to help the security com
 munity to evaluate\, audit and control the security level of hardware pr
 oducts.\n\nHardsploit is a complete tool box (hardware & software)\, a f
 ramework which aims to:\n\n- Facilitate the audit of electronic systems 
 for industry 'security' workers (consultants\, auditors\, pentesters\, p
 roduct designers\, etc.)\n\n- Increase the level of security (and trust 
 !) of new products designed by the industry
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7496.html
SUMMARY:julien.moinard@opale-security.com - Yann.A\, Julien MOINARD\, Gwé
 nolé Audic
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T113000
DTSTAMP;VALUE=DATE-TIME:20160110T002623Z
UID:5f7d945f-872f-4951-a95d-8b78558159f8@frab.cccv.de
DESCRIPTION:Ob diktatorischer Despot\, der seiner Bevölkerung die Kommuni
 naktionsrechte einschränkt\, oder ein Erdbeben\, das die Kommunikationsi
 nfrastruktur zerstört: Auch 2015 sind die Lösungsansätze noch nicht wese
 ntlich über Zettel und Stift hinaus.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7567.html
SUMMARY:Katastrophe und Kommunikation - Sebastian Jünemann
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T171500
DTSTAMP;VALUE=DATE-TIME:20160106T224045Z
UID:dda07b64-844a-4a54-8135-8c03f7ee6718@frab.cccv.de
DESCRIPTION:Key-Loggers are cool\, really cool. It seems\, however\, that
  every conceivable aspect of key-logging has already been covered: from 
 physical devices to hooking techniques. What possible innovation could b
 e left in this field?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7189.html
SUMMARY:Key-logger\, Video\, Mouse - Yaniv Balmas
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T113000
DTSTAMP;VALUE=DATE-TIME:20160106T155602Z
UID:77a03013-82df-48f7-8c0f-65a9e9f23490@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7565.html
SUMMARY:Keynote - Fatuma Musa Afrah
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T171500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T164500
DTSTAMP;VALUE=DATE-TIME:20160102T200213Z
UID:28efa221-42ce-4e2c-aa2c-1b52c87ddeb1@frab.cccv.de
DESCRIPTION:Initiative Freifunk\, ein Projekt des Chaos Darmstadt e.V. - 
 Wie kamen wir mit den Verwaltungen\, den Verbänden und Parteien ins Gesp
 räch\, um freifunk für refugees umzusetzen?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7230.html
SUMMARY:Lessons learned: Freifunk für Geflüchtete - Peter Löwenstein
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T190000
DTSTAMP;VALUE=DATE-TIME:20160109T081152Z
UID:4f1a0717-6931-4580-9e49-5d523be045df@frab.cccv.de
DESCRIPTION:Let's Encrypt is a new free and automated certificate authori
 ty\,\nthat entered closed beta in October and has already issued a large
  number of\nvalid certificates.  This talk will provide a short overview
  of \nhow the Let's Encrypt client and server software work\, and explor
 e\nstatistics gathered during our closed beta and launch period. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7528.html
SUMMARY:Let's Encrypt -- What launching a free CA looks like - Roland Bra
 cewell Shoemaker
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T233000
DTSTAMP;VALUE=DATE-TIME:20160110T223843Z
UID:4d473646-e765-441b-98eb-653dfe6bdeb1@frab.cccv.de
DESCRIPTION:In 2010 I was asked by the second maintainer in a row to take
  over as new maintainer of the libusb project. The first time I had decl
 ined.\n\nThe second time I accepted\, and sadly failed.\n\nEventually a 
 hostile fork emerged\, with the explicit goal to take over the original 
 project.\n\nI will tell you my story\, which mistakes I made and what I 
 learned - about independent and corporate contributors in open source pr
 ojects\, about package maintainers in downstream OS distributions\, abou
 t trolls on the internet\, about GitHub Inc. and about myself.\n\nThe ho
 stile fork? It wasn't merged.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7547.html
SUMMARY:libusb: Maintainer fail - Peter Stuge
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T160000
DTSTAMP;VALUE=DATE-TIME:20160110T002038Z
UID:1d7d4787-c77a-4e6e-9398-f3b4dcaa3587@frab.cccv.de
DESCRIPTION:Angae means "Fog" in Korean. The term is widely used in parts
  of custom code used by the Red Star OS. We will lift the fog on the int
 ernals of North Korea's operating system. Our talk will provide informat
 ion about how privacy is invaded for all users of Red Star OS and how an
  operating system designed by a totalitarian dictatorship works.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7174.html
SUMMARY:Lifting the Fog on Red Star OS - Florian Grunow\, Niklaus Schiess
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T124500
DTSTAMP;VALUE=DATE-TIME:20160103T001817Z
UID:df2f6e8a-f1fb-4736-8b4e-7e197ead73c2@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick! 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7558.html
SUMMARY:Lightning Talks Day 2 - gedsic\, bigalex
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T124500
DTSTAMP;VALUE=DATE-TIME:20160102T141614Z
UID:3a1241e9-1e0b-4539-a44c-7d04257ae16d@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick! 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7559.html
SUMMARY:Lightning Talks Day 3 - gedsic\, bigalex
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
DTSTAMP;VALUE=DATE-TIME:20160105T133035Z
UID:83fa2955-80df-4f47-9421-9e81b9f6f2c0@frab.cccv.de
DESCRIPTION:Lightning Talks are short lectures (almost) any congress part
 icipant may give! Bring your infectious enthusiasm to an audience with a
  short attention span! Discuss a program\, system or technique! Pitch yo
 ur projects and ideas or try to rally a crew of people to your party or 
 assembly! Whatever you bring\, make it quick! 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7560.html
SUMMARY:Lightning Talks Day 4 - gedsic\, bigalex
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T190000
DTSTAMP;VALUE=DATE-TIME:20160102T023329Z
UID:4afc705e-a55c-45ae-b67e-a820e5398d23@frab.cccv.de
DESCRIPTION:In this presentation I will present the experimental language
  Ling. We shall get an intuitive understanding of the language through f
 amiliar concepts from imperative programming. We shall cover how Ling en
 ables a modular and precise control on memory allocation\, through  a ge
 neral optimization called fusion. This optimization\, fusion is a cost-f
 ree abstraction mechanism which brings high level programming to system 
 programming.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7367.html
SUMMARY:Ling - High level system programming - Nicolas Pouillard
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T214500
DTSTAMP;VALUE=DATE-TIME:20160107T133028Z
UID:2f4cd1ef-dd90-4145-a734-141e5c081940@frab.cccv.de
DESCRIPTION:Earlier this year\, we discovered that Diffie-Hellman key\nex
 change – cornerstone of modern cryptography – is less\nsecure in practic
 e than the security community believed. In this\ntalk\, we’ll explain ho
 w the NSA is likely exploiting this weakness to\nallow it to decrypt con
 nections to at least 20% of HTTPS websites\, 25% of SSH servers\, and 66
 % of IPsec VPNs.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7288.html
SUMMARY:Logjam: Diffie-Hellman\, discrete logs\, the NSA\, and you - J. A
 lex Halderman\, Nadia Heninger
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T113000
DTSTAMP;VALUE=DATE-TIME:20160109T211917Z
UID:6a02cc83-73d8-4544-8f17-9358dd2495c9@frab.cccv.de
DESCRIPTION:There are two lines of research in the world about decreasing
  poverty in low-income communities: (1) to create solutions and share th
 em with people living in low-income areas or (2) build the capacity of p
 eople from low-income areas to create their own solutions. Maker Spaces 
 to BoP have showed great results to the strategy two. The lecture has th
 e goal to expose all the experience we have learnt in the last three yea
 rs to project\, implement and manage a Maker Space in a favela in São Pa
 ulo - Brazil called Innovation Center Vila Nova Esperança (ICVNE).
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7540.html
SUMMARY:Maker Spaces in Favelas - Lecture - Miguel Chaves
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T233000
DTSTAMP;VALUE=DATE-TIME:20160107T023024Z
UID:6063a86c-6703-4402-a7a1-074f18377b1a@frab.cccv.de
DESCRIPTION:This talk will have a look at maritime related robots and pro
 jects. It is not all that difficult and expensive - and there are truly 
 still dragons to find!
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7265.html
SUMMARY:Maritime Robotics - lilafisch
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T203000
DTSTAMP;VALUE=DATE-TIME:20151230T130915Z
UID:f193e1eb-5f67-43bc-a42a-c2c9b0c8d57f@frab.cccv.de
DESCRIPTION:How have the media reported the Snowden revelations? Does the
  public care about surveillance\, and how do people react? Do we need a 
 ‚data justice‘ movement?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7388.html
SUMMARY:Media Coverage and the Public in the Surveillance Society - Arne 
 Hintz\, Lina Dencik
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T021500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T001500
DTSTAMP;VALUE=DATE-TIME:20160108T165637Z
UID:d516ffe3-d32d-4bed-8289-09d245ac2b2f@frab.cccv.de
DESCRIPTION:Nicolas Wöhrl und Reinhard Remfort sprechen über interessante
  aktuelle Forschung\, Experimente und ihren wissenschaftlichen Alltag an
  einer deutschen Hochschule. Fachübergreifend\, abwechslungsreich\, unst
 rukturiert\, hoffnungslos subjektiv und immer garantiert methodisch inko
 rrekt.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7221.html
SUMMARY:Methodisch inkorrekt! - Nicolas Wöhrl\, @ReinhardRemfort
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T021500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T001500
DTSTAMP;VALUE=DATE-TIME:20160106T155240Z
UID:be3ed16d-1ef3-4c38-b45c-8e4696d05f27@frab.cccv.de
DESCRIPTION:### LIVE-STREAM ###\nNicolas Wöhrl und Reinhard Remfort sprec
 hen über interessante aktuelle Forschung\, Experimente und ihren wissens
 chaftlichen Alltag an einer deutschen Hochschule. Fachübergreifend\, abw
 echslungsreich\, unstrukturiert\, hoffnungslos subjektiv und immer garan
 tiert methodisch inkorrekt.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7572.html
SUMMARY:Methodisch inkorrekt! (Live-Stream) - 
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T174500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T171500
DTSTAMP;VALUE=DATE-TIME:20160103T185026Z
UID:5fb6f7b5-c237-4b64-b786-85e4c95f13ad@frab.cccv.de
DESCRIPTION:Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit vo
 n Windows-Nutzern gewarnt wurde\, schalte Microsoft mit Windows 10 das B
 otnetz scharf.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7291.html
SUMMARY:Microsofts Windows 10 Botnet - ruedi
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
DTSTAMP;VALUE=DATE-TIME:20160103T002001Z
UID:658ebc92-ef93-421d-9547-f117f75eed92@frab.cccv.de
DESCRIPTION:As Internet users increasingly connect to the Internet throug
 h smartphones\, this has transformed Iran’s Internet ecology towards an 
 increasing reliance and production in apps. In Iran\, a country that pra
 ctises some of the most stringent censorship and surveillance techniques
  in the world has seen this transformation reshape the way the governmen
 t implements information controls online. While applications with popula
 r usage on browsers such as Facebook and Twitter remain blocked through 
 their mobile applications\, platforms that predominantly exist in app fo
 rm such as WhatsApp\, Viber\, and Instagram remain unblocked in the coun
 try. This talk will look at how the government is counteracting these po
 licies through various means\, including local imitation apps\, and new 
 programs such as ‘intelligent filtering’\, and the Revolutionary Guards'
  “Spider” program. Additionally\, a discussion of how Iranian Internet u
 sers use these platforms\, especially in reference to digital security a
 wareness and practices will be included. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7529.html
SUMMARY:Mobile Censorship in Iran - Mahsa Alimardani
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
DTSTAMP;VALUE=DATE-TIME:20160101T183048Z
UID:534b5a9d-f786-4fc9-96d1-a0827125ee6e@frab.cccv.de
DESCRIPTION:In this talk Matthew Borgatti\, Lead Scientist at Super-Relea
 ser\, will take you through the process of turning a puddle of goo into 
 a working soft robot. He will take you through the different mechanisms 
 that can be created\, simple processes for fabricating soft robots\, and
  methods for joining elements together into sophisticated assemblies.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7389.html
SUMMARY:My Robot Will Crush You With Its Soft Delicate Hands! - Gianteye
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T140000
DTSTAMP;VALUE=DATE-TIME:20160109T081234Z
UID:36ff9cc8-f717-42f3-b570-fca9810a02fa@frab.cccv.de
DESCRIPTION:Is your email being sent in the clear? While PGP and S/MIME p
 rovide end-to-end encrypted mail\, most users have yet to adopt these pr
 actices\, and for users who have\, these tools leave metadata\, such as 
 the subject\, sender\, and recipient\, visible everywhere along a messag
 e’s path. SMTP&mdash\;the ubiquitous mail transport protocol&mdash\;has 
 evolved over the years to add encryption and authentication\, both of wh
 ich take place behind the scenes and help guard against surveillance and
  spam. While these features are being increasingly deployed\, our resear
 ch shows that they are almost always configured in vulnerable ways&mdash
 \;the details of which are hidden from the users sending and receiving m
 ail. Even more disturbingly\, these vulnerabilities are being widely exp
 loited in the wild: in seven countries\, more than 20% of inbound Gmail 
 messages are downgraded to cleartext by network-based attacks. In the mo
 st severe case\, 96% of messages sent from Tunisia to Gmail are downgrad
 ed to cleartext. In this talk\, I’ll introduce the commonly used SMTP se
 curity extensions&mdash\;including STARTTLS\, SPF\, DKIM\, and DMARC&mda
 sh\;and describe the current state of mail security on the Internet. I'l
 l describe several commonly occurring attacks our recent research has fo
 und and discuss how mail operators can configure their servers to secure
  email transport. Finally\, I'll discuss several weaknesses in the proto
 cols we're using and recent proposals for helping secure email transport
 .
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7255.html
SUMMARY:Neither Snow Nor Rain Nor MITM… The State of Email Security in 20
 15 - Zakir Durumeric
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T131500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T124500
DTSTAMP;VALUE=DATE-TIME:20160107T202516Z
UID:3a221dbd-39c7-4b85-a1fc-73d7e87fd31a@frab.cccv.de
DESCRIPTION:After two years the fight for net neutrality in Europe about 
 the Telecom Single Market Regulation has come to a close. In this talk w
 e will analyse the new net neutrality law and it's consequences and we g
 ive you the lessons learned from two years of EU campaigning. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7387.html
SUMMARY:Net Neutrality in Europe - Thomas Lohninger
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T160000
DTSTAMP;VALUE=DATE-TIME:20160106T164107Z
UID:5db7d97f-59c9-42d8-abfc-6224bf075f08@frab.cccv.de
DESCRIPTION:2015 und 2016 sind wichtige Jahre für die Netzpolitik in der 
 Schweiz\, denn die Parlamente entscheiden sowohl die Revision des BÜPF (
 <b>B</b>undesgesetz betreffend die <b>Ü</b>berwachung des <b>P</b>ost- u
 nd <b>F</b>ernmeldeverkehrs) als auch das NDG (<b>N</b>achrichten<b>d</b
 >ienst<b>g</b>esetz).
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7205.html
SUMMARY:Netzpolitik in der Schweiz - vimja\, ari\, Patrick Stählin\, Haku
 na MaMate
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T214500
DTSTAMP;VALUE=DATE-TIME:20160105T035909Z
UID:777ec642-2866-4617-9789-91cba4a2b313@frab.cccv.de
DESCRIPTION:Memory corruption is an ongoing problem and in past years we 
 have both developed a set of defense mechanisms and novel attacks agains
 t those defense mechanisms. Novel defense mechanisms like Control-Flow I
 ntegrity (CFI) and Code-Pointer Integrity (CPI) promise to stop control-
 flow hijack attacks. We show that\, while they make attacks harder\, att
 acks often remain possible. Introducing novel attack mechanisms\, like C
 ontrol-Flow Bending (CFB)\, we discuss limitations of the current approa
 ches. CFB is a generalization of data-only attacks that allows an attack
 er to execute code even if a defense mechanism significantly constrains 
 execution.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7163.html
SUMMARY:New memory corruption attacks: why can't we have nice things? - g
 annimo\, npc@berkeley.edu
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T124500
DTSTAMP;VALUE=DATE-TIME:20160110T001954Z
UID:0417a69e-87af-43f9-abbb-0f0666bfda3e@frab.cccv.de
DESCRIPTION:Im März 2014 wurde der NSA-Untersuchungsausschuss im Bundesta
 g eingesetzt\, der die Verwicklungen um die deutschen Geheimdienste aufk
 lären soll. Ein Rück- und Ausblick: Was wissen wir heute\, was erwartet 
 uns noch?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7228.html
SUMMARY:NSA-Untersuchungsausschuss: Zwischen Aufklärungswillen und Mauern
  aus Schweigen - anna
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T224500
DTSTAMP;VALUE=DATE-TIME:20151231T174618Z
UID:25dc688f-fe4f-4648-8b82-82c05cc090b8@frab.cccv.de
DESCRIPTION:Journalists\, while structurally and economically under threa
 t\, are bringing computer science into their newsrooms. Their tools and 
 techniques benefit from computer science in areas such as databases\, gr
 aph analysis and machine learning and allow journalists to tackle new ki
 nds of stories.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7419.html
SUMMARY:On Computing Numbers\, with an Application to Problems of our Soc
 iety - Stefan Wehrmeyer
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T173000
DTSTAMP;VALUE=DATE-TIME:20160106T092652Z
UID:00abb473-d6cc-4200-9920-3794591fe4d4@frab.cccv.de
DESCRIPTION:Earlier this year\, following the tragic events of early Janu
 ary in Paris\, the French governement pushed a bill to put a legal frame
 work around Intelligence Services activities. Far from protecting civil 
 liberties\, this bill seem to be the translation of Snowden's revelation
 s into law.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7423.html
SUMMARY:One year of securitarian drift in France - taziden\, Adrienne Cha
 rmet
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T113000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T110000
DTSTAMP;VALUE=DATE-TIME:20160106T084824Z
UID:654331ae-1710-42e5-bdf4-65a03a80c614@frab.cccv.de
DESCRIPTION:
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7550.html
SUMMARY:Opening Event - Carina Haupt\, Linus Neumann
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T224500
DTSTAMP;VALUE=DATE-TIME:20160105T205923Z
UID:d961bd32-2c2a-45a5-bc58-64449bb4b16a@frab.cccv.de
DESCRIPTION:Im April 2015 hat die österreichische Bundesregierung einen E
 ntwurf für ein "Polizeiliches Staatsschutzgesetz" vorgelegt. Damit soll 
 ein neuer Inlandsgeheimdienst mit weitreichenden Überwachungsbefugnissen
  geschaffen werden. Unabhängige Kontrolle durch Gerichte und das Parlame
 nt ist nicht vorgesehen. Bereits in der Begutachtungsphase wurde das Ges
 etz massiv kritisiert. Der AKVorrat gab mit einer umfassenden Stellungna
 hme die wichtigsten Argumente vor. Der Widerstand gegen das Gesetz und d
 ie Kampagne des AKVorrat haben zwar zu mehrfacher Verschiebung der Besch
 lussfassung geführt\, aber die Geheimdienstpläne der Regierung sind trot
 z mehr als 22.000 Unterzeichnerinnen und Unterzeichnern der Petition auf
  www.staatsschutz.at nach wie vor nicht vom Tisch. Der Talk bietet Einbl
 icke\, wie Geheimdienste in der Post-Snowden-Ära öffentlich und nicht öf
 fentlich diskutiert werden.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7413.html
SUMMARY:Österreich: Der Kampf gegen unkontrollierte Massenüberwachung - T
 homas Lohninger\, Werner Reiter
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T140000
DTSTAMP;VALUE=DATE-TIME:20160103T170258Z
UID:6ef3da22-6e38-4997-b44d-e279907be98d@frab.cccv.de
DESCRIPTION:Unser Vortrag demonstriert einen PLC-only Wurm. Der PLC-Wurm 
 kann selbstständig ein Netzwerk nach Siemens Simatic S7-1200 Geräten in 
 den Versionen 1 bis 3  durchsuchen und diese befallen.  Hierzu ist keine
  Unterstützung durch PCs oder Server erforderlich. Der Wurm „lebt“ aussc
 hließlich in den PLCs.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7229.html
SUMMARY:PLC-Blaster - Maik Brüggemann\, Ralf Spenneberg
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T230000
DTSTAMP;VALUE=DATE-TIME:20160106T085606Z
UID:1b6ed158-e206-416a-8705-9b285a428dbf@frab.cccv.de
DESCRIPTION:<p>Last year your friend Karen joined the alternative music s
 cene and sent you a sound track. The government is recording everything\
 , and this year announced that alternative music is a gateway drug to te
 rrorism (see <a href="http://www.theguardian.com/australia-news/2015/sep
 /25/radicalisation-kit-links-activism-and-alternative-music-scene-to-ext
 remism">http://www.theguardian.com/australia-news/2015/sep/25/radicalisa
 tion-kit-links-activism-and-alternative-music-scene-to-extremism</a>). F
 ortunately\, Karen encrypted the email.</p>
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7210.html
SUMMARY:PQCHacks - djb\, Tanja Lange
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T174500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T171500
DTSTAMP;VALUE=DATE-TIME:20160109T145417Z
UID:56126bd1-f1b3-4bc7-81be-304b6b681cde@frab.cccv.de
DESCRIPTION:Yearly\, the world is inundated with news about government da
 ta collection programs. In addition to these programs\, governments coll
 ect data from third party sources to gather information about individual
 s.  This data in conjunction with machine learning aids governments in d
 etermining where crime will be committed and who has committed a crime. 
 Could this data serve as a method by which governments predict whether o
 r not the individual will commit a crime? This talk will examine the use
  of big data in the context of predictive policing. Specifically\, how d
 oes the data collected inform suspicion about a particular individual? I
 n the context of U.S. law\, can big data alone establish reasonable susp
 icion or should it just factor into the totality of the circumstances? H
 ow do we mitigate the biases that might exist in large data sets?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7457.html
SUMMARY:Predicting Crime in a Big Data World - Whitney Merrill
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T183000
DTSTAMP;VALUE=DATE-TIME:20160109T135354Z
UID:13789a83-1028-40a6-ac32-827b57ec3f8e@frab.cccv.de
DESCRIPTION:Mass quantities of data are being incorporated into predictiv
 e systems in an ever-broadening set of fields. In many cases\, these alg
 orithms operate in the dark and their use has implications both intentio
 nal and unintentional. This talk will cover some of the fairness and acc
 ountability issues involved in controlling algorithms for media\, policy
 \, and policing. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7449.html
SUMMARY:Prediction and Control - Jennifer Helsby
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
DTSTAMP;VALUE=DATE-TIME:20160101T163209Z
UID:6c57ad7c-325a-47b1-88b9-124c35298f81@frab.cccv.de
DESCRIPTION:This talk will focus on the potential ability of data disaggr
 egated by race and ethnicity to reduce discriminatory policing in German
 y.  In the UK\, data has been collected during police procedures\, allow
 ing for a monitoring and evaluation of discriminatory policing practices
 . Unfortunately\, such an empirically driven policy approach is not curr
 ently possible in Germany. This talk will argue that\, as a first step\,
  a policy based off the UK approach towards data collection be implement
 ed in Germany to incorporate\, rather than ignore\, Germany’s diverse id
 entities\, and to allow for empirically driven and more effective polici
 ng.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7264.html
SUMMARY:Profiling (In)justice - Jeff Deutch
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T171500
DTSTAMP;VALUE=DATE-TIME:20160110T002153Z
UID:b2a1a06b-bafc-4a59-ba6f-dddaee5adddb@frab.cccv.de
DESCRIPTION:Public Library is the synergy of two efforts. First\, it make
 s the case for the institution of public library and its principle of un
 iversal access to knowledge. Second\, it is an exploration and developme
 nt of distributed internet infrastructure for amateur librarians. If <a 
 href="https://www.memoryoftheworld.org/blog/2014/10/27/public-library-an
 -essay/">Public Library</a> is a proposal/RFC <a href=""https://library.
 memoryoftheworld.org/>Memory of the World</a> is its proof of concept an
 d <a href="https://github.com/marcellmars/letssharebooks">reference impl
 ementation</a>. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7279.html
SUMMARY:Public Library/Memory of the World - Marcell Mars
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T203000
DTSTAMP;VALUE=DATE-TIME:20160107T200322Z
UID:3026eefd-c196-421a-b9d3-d678753ad8f7@frab.cccv.de
DESCRIPTION:QR codes have rapidly overtaken rival 2D bar code symbologies
  and are becoming quite ubiquitous. Most uses are rather pedestrian thou
 gh\, and even the more non-standard modifications to pure QR codes lack 
 a certain technical finesse\, opting to just overpaint part of the code 
 and let error correction handle that instead. Let's see how we can do be
 tter.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7310.html
SUMMARY:QRtistry - Henryk Plötz
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T214500
DTSTAMP;VALUE=DATE-TIME:20160110T085755Z
UID:0549d204-604a-46c5-92a2-e64b85aa9892@frab.cccv.de
DESCRIPTION:Unsere Welt ist nach allem was wir heute wissen im kleinsten 
 Massstab völlig bizarr aufgebaut und im grössten also im kosmologischen 
 Massstab besteht sie ziemlich genau aus nichts. Wie hängt das zusammen u
 nd was hat das mit dunkler Materie und dunkler Energie zu tun und was zu
 m Geier ist eigentlich die "spukhafte Fernwirkung" von der Einstein dama
 ls sprach und warum hat bis heute keiner so recht verstanden wie das all
 es zusammenpasst?\nHast du schon mal davon gehört\, dass die Quantenphys
 ik irgendwie schräg ist\, hast dich da aber noch nicht ran getraut\, obw
 ohl du das gerne besser verstehen wollen würdest? Denkst du manchmal drü
 ber nach\, wie zum Geier das komplette Universum mit allen Sternen und P
 laneten ganz früher mal in einen Tischtennisball oder sogar noch was kle
 ineres gepasst haben soll? Hast du schon mal davon gehört\, dass ein Pro
 ton angeblich aus drei Quarks besteht und denkst\, "jaja\, ihr könnt mir
  viel erzählen". Und klinkt sich dein Vorstellungsvermögen aus\, wenn du
  versuchst dir so was wie ein "schwarzes Loch" vorzustellen\, das unendl
 ich klein sein soll und dabei unendlich schwer? Dann bist du hier genau 
 richtig. Ich will dir  ohne wesentliche Vorkenntnisse vorauszusetzen im 
 Grossen und Ganzen den  Zusammenhang näher bringen\, deine Faszination f
 ür das Thema wecken oder füttern und dir Mut machen\, dich weiter damit 
 zu beschäftigen. Du darfst hier Fragen stellen\, dich wundern\, zweifeln
  und irritiert sein. \nWenn du an Quantenheilung\, Vortex Atome und holi
 stische Quanten-Kinesiologie glaubst\, dann bist du herzlich willkommen 
 um zu lernen\, dass das mit Quantenphysik nichts\, aber auch wirklich ga
 r nichts zu tun hat\, aber sei bitte nicht enttäuscht\, wenn ich auf die
 se Themen nicht eingehe. Eine Stunde ist viel zu Kurz um zusätzlich eine
  Einführung in die Prinzipien der Wissenschaft zu halten. \nWenn du aber
  schon mal die Schrödingergleichung hergeleitet hast oder gerne über die
  Vorteile der M-Theorie gegenüber der Super-Stringtheorie schwadronieren
  möchtest oder wenn du diskutieren möchtest\, ob es vielleicht auch noch
  ein Typ 3 Weyl Fermion geben kann\, dann langweilst du dich hier vermut
 lich\, das können wir dann ja gerne ein anderes mal machen \;-)\n
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7525.html
SUMMARY:Quantenphysik und  Kosmologie - Steini
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T203000
DTSTAMP;VALUE=DATE-TIME:20160111T100807Z
UID:1dcedd27-94b5-433e-a650-dccc1ba3d720@frab.cccv.de
DESCRIPTION:I will entertain the audience with a science talk about quant
 um cryptography\, covering both some classics (Quantum Key Distribution)
  and the latest developments (position-based quantum cryptography) in th
 is fascinating research field. \n[No previous knowledge of quantum mecha
 nics is required to follow the talk.]
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7305.html
SUMMARY:Quantum Cryptography - Christian Schaffner
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T140000
DTSTAMP;VALUE=DATE-TIME:20160108T170224Z
UID:7d2e79be-5d42-425b-a335-c41fd18431fb@frab.cccv.de
DESCRIPTION:News about the rad1o half a year later – cool stuff that happ
 ened\, and why you need an SDR.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7153.html
SUMMARY:rad1o++ - Sec\, schneider
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T113000
DTSTAMP;VALUE=DATE-TIME:20160103T184602Z
UID:1c70e359-0e63-4dad-b7f3-8377e3822286@frab.cccv.de
DESCRIPTION:How can be 3d printing a dual use technology? Print more thin
 gs\, produce less waste\, save money!
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7321.html
SUMMARY:re_cycle - obelix
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T113000
DTSTAMP;VALUE=DATE-TIME:20160107T023241Z
UID:1c39bb2e-fba0-4cb3-9aac-9e6dd396c55e@frab.cccv.de
DESCRIPTION:Physical keys and locks are one of the oldest security mechan
 isms still employed\ntoday. In this talk\, we will discuss how 3D printi
 ng keys enable attacks against many modern lock systems. We will describ
 e projects researchers and hobbyists have done involving 3D printed keys
 \, and present our own research on automating several of these attacks i
 n order to demonstrate how easy they are to do. Ultimately\, we hope to 
 describe the current state of 3D printed keys\, and their impact on the 
 physical security systems we most often take for granted.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7435.html
SUMMARY:Replication Prohibited - Eric Wustrow
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T210000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T203000
DTSTAMP;VALUE=DATE-TIME:20160106T224532Z
UID:930673b3-4f75-40eb-8be5-574469c3920f@frab.cccv.de
DESCRIPTION:This talk will be an overview of how to reverse-engineer Unif
 ied Extensible Firmware Interface (UEFI) firmware\, the replacement for 
 BIOS. Various useful tools will be discussed\, including those written b
 y the presenter and those written by others. One of the highlights will 
 be a tool that enables running parts of the firmware in userspace on a s
 tandard Operating System.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7245.html
SUMMARY:Reversing UEFI by execution - Jethro Beekman
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T124500
DTSTAMP;VALUE=DATE-TIME:20160105T003159Z
UID:3c818a0e-4148-4ba4-a58f-d2559e9d6a82@frab.cccv.de
DESCRIPTION:The REXUS/BEXUS programme allows students from universities a
 nd higher education colleges across Europe to carry out scientific and t
 echnological experiments on research rockets and balloons. Each year\, t
 wo rockets and two balloons are launched\, carrying up to 20 experiments
  designed and built by student teams.\nBy reference of two experiments w
 e were involved in\, we will explain the way from the experiment idea to
  the launch and test of it.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7325.html
SUMMARY:REXUS/BEXUS - Rocket and Balloon Experiments for University Stude
 nts - panic\, sev
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
DTSTAMP;VALUE=DATE-TIME:20160107T102005Z
UID:01da121b-bd49-4805-aaaf-a6ec1f4f941f@frab.cccv.de
DESCRIPTION:"Insanity: doing the same thing over and over again and expec
 ting different results." \nAlbert Einstein - Who did not live long enoug
 h to see Rowhammer\n\nRecent studies have found that repeated accesses t
 o DRAM rows can cause random bit flips\, resulting in the so called Rowh
 ammer vulnerability. We present Rowhammer.js\, the first remote software
 -induced hardware-fault attack\, from JavaScript. We also extend our pre
 sentation with an overview of cache side-channel attacks\, that use the 
 same technique to evict data from the cache.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7197.html
SUMMARY:Rowhammer.js: Root privileges for web apps? - Clémentine Maurice\
 , Daniel Gruss
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T203000
DTSTAMP;VALUE=DATE-TIME:20160107T155355Z
UID:16613345-4f8c-44f1-a065-b3fa1d7b51cc@frab.cccv.de
DESCRIPTION:Seven years after presenting „running your own GSM network“\,
  we are back presenting about how to do the same for 3G (UMTS/HSPA) netw
 orks.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7412.html
SUMMARY:Running your own 3G/3.5G network - LaForge
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
DTSTAMP;VALUE=DATE-TIME:20160104T233354Z
UID:668ba44b-6800-4a8f-9544-b8e5cd7bd86c@frab.cccv.de
DESCRIPTION:Introduction and consequences of the CJEU's "Safe Harbor" rul
 ing\, to  invalidate the EU-US data sharing deal in the light of the rev
 elations over US surveillance by Edward Snowden.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7513.html
SUMMARY:Safe Harbor - Max Schrems
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T230000
DTSTAMP;VALUE=DATE-TIME:20151230T185800Z
UID:4d8d4f44-bade-460b-8274-0bb5b9df38b3@frab.cccv.de
DESCRIPTION:Sanitizing and anonymizing PCAP or PCAPng files is often nece
 ssary to be able to share information about attack vectors\, security pr
 oblems or incidents in general. While it may seem simple to replace IP a
 ddresses or ports there are still quite a number of network packet detai
 ls that are hard to replace. This technical talk will shed a light on wh
 ere those troublemakers are encountered and how to get around them.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7294.html
SUMMARY:Sanitizing PCAPs - Jasper Bongertz
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
DTSTAMP;VALUE=DATE-TIME:20160109T103535Z
UID:e9a8cc8d-a598-4bc3-83ac-82c1fe227b0a@frab.cccv.de
DESCRIPTION:Algorithms and „big data“ penetrate many aspects of our lives
  today. In the future\, data collection and analysis will be even more u
 biquitous and permeate our lives from morning to night.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7482.html
SUMMARY:Say hi to your new boss: How algorithms might soon control our li
 ves. - Andreas Dewes
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
DTSTAMP;VALUE=DATE-TIME:20160110T200010Z
UID:422ba0b9-debb-436e-9822-e9a201dec845@frab.cccv.de
DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? 
 Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un
 d Trends waren zu sehen?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7546.html
SUMMARY:Security Nightmares 0x10 - Ron\, frank
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T214500
DTSTAMP;VALUE=DATE-TIME:20160103T225308Z
UID:cc3ee8b6-9fe5-4290-82de-824e0223bef9@frab.cccv.de
DESCRIPTION:Light of astronomical objects gets distorted as it passes ear
 th’s atmosphere. Adaptive optics can correct this distortion and create 
 images that are as sharp as those taken in space. The correction needs a
  bright reference star. If there is no such star nearby\, an artificial 
 Laser Guide Star can be created in the upper atmosphere.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7162.html
SUMMARY:Shooting lasers into space – for science! - Peter Buschkamp
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T214500
DTSTAMP;VALUE=DATE-TIME:20160108T170517Z
UID:2ca47144-1fe0-4ffd-b0fb-e65b1e73f1ff@frab.cccv.de
DESCRIPTION:Payment systems are old and have – unlike card protocols – se
 en little scrutiny so far. This talk enumerates design and implementatio
 n flaws in payment processing systems\, which can defraud consumers and 
 merchants.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7368.html
SUMMARY:Shopshifting - Karsten Nohl\, Fabian Bräunlein\, dexter
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T163000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T160000
DTSTAMP;VALUE=DATE-TIME:20160111T100753Z
UID:b753dbd8-32bb-437c-9f15-db0d7ac1811a@frab.cccv.de
DESCRIPTION:Der Hitag S Transponder wird in verschiedensten Applikationen
  eingesetzt. Während Angriffe für den Hitag 2 bereits bekannt sind\, gil
 t der Hitag S in der Literatur noch nicht als gebrochen. Wir haben die b
 eschriebenen Angriffe auf den Hitag S übertragen. Wir sind in der Lage d
 en Schlüssel zu brechen und Informationen wie das Kennwort zu ermitteln\
 , obwohl diese zusätzlich vor Lesezugriff geschützt sind. In Abhängigkei
 t des gewählten Angriffs benötigen wir für das Brechen des Schlüssels zw
 ischen mehreren hundert Tagen und 5 Minuten. Wir haben einen Emulator ge
 baut\, der jeden Hitag S Transponder nachbilden kann. Wird der Transpond
 er in einem Schließsystem eingesetzt\, können wir so eine Schlüsselkopie
  erstellen. \nBasierend auf unseren Ergebnissen und den Erfahrungen mit 
 anderen Transpondern aus dem 125kHz Bereich können wir nur vor dem Einsa
 tz in sicherheitskritischen Bereichen warnen.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7166.html
SUMMARY:Sicherheit von 125kHz Transpondern  am Beispiel Hitag S - Ralf Sp
 enneberg\, Hendrik Schwartke\, Oguzhan Cicek
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T174500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T171500
DTSTAMP;VALUE=DATE-TIME:20160109T081424Z
UID:969bee9e-d0bf-4d24-a649-15f93747d608@frab.cccv.de
DESCRIPTION:Technology companies now hold an unprecedented ability to sha
 pe the world around us by limiting our ability to access certain content
  and by crafting proprietary algorithm that bring us our daily streams o
 f content.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7286.html
SUMMARY:Sin in the time of Technology - Matthew Stender\, Jillian C. York
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T203000
DTSTAMP;VALUE=DATE-TIME:20160103T170647Z
UID:0399a5b3-f539-41ed-b0bc-858d7c987688@frab.cccv.de
DESCRIPTION:CubeSat are small standardized satellites typically flown as 
 secondary and containerized payloads piggybacking on the launches of lar
 ger satellites. Their low entrance cost have been a revolution in openin
 g access to space for a broad range of institutions. In this talk the ba
 sics of CubeSat standards\, technology and development are going to be p
 resented. The goal is to proliferate the knowledge of what it takes to s
 uccessfully build\, launch and operate a CubeSat within and beyond the h
 acker community.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7341.html
SUMMARY:So you want to build a satellite? - INCO
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T140000
DTSTAMP;VALUE=DATE-TIME:20160106T091724Z
UID:b5456783-49dc-4420-bb0f-fee33a249b65@frab.cccv.de
DESCRIPTION:Ten years after the rejection of the European software patent
  directive by the European Parliament\, the software patent problem stil
 l is not over.\nPolitical action is required.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7283.html
SUMMARY:Software and business method patents: call for action - Iga Bałos
 \, Benjamin Henrion (zoobab)
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T140000
DTSTAMP;VALUE=DATE-TIME:20160109T081522Z
UID:088e3078-bab2-433d-8be2-f1a4b37b4d5c@frab.cccv.de
DESCRIPTION:Major changes are underway in the Tor Project\, the Tor Netwo
 rk\, and the Tor community. We want to tell you details and introduce th
 e growing Tor community to the larger world.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7307.html
SUMMARY:State of the Onion - Roger\, Jacob\, Mike Perry\, Shari Steele\, 
 Alison Macrina
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T231500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T224500
DTSTAMP;VALUE=DATE-TIME:20160109T110404Z
UID:f4da28f8-1e28-45d4-9fab-d1d36d20ca7b@frab.cccv.de
DESCRIPTION:Landauf landab entstehen zur Zeit tausende öffentlicher Strom
 tankstellen. Diese neue Infrastruktur bietet viel Potential für kreative
  Nutzungen und hat eine Reihe an Nutzungs-\, Sicherheits- und Datenschut
 zproblemen\, für die bislang Lösungen fehlen.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7202.html
SUMMARY:Stromtankstellen – eine neue öffentliche Infrastruktur - Gunnar T
 höle
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T233000
DTSTAMP;VALUE=DATE-TIME:20151230T213256Z
UID:eb36c9f7-076a-45cc-ad66-ac97768e0c75@frab.cccv.de
DESCRIPTION:This lecture will give an overview on how technology can help
  and is helping to prevent or mitigate mass atrocity crimes. It focuses 
 on the work and research of the Digital Mass Atrocity Prevention Lab (DM
 AP Lab) but will discuss other major projects as well. The goal is to in
 form the audience about ongoing efforts and spark their interest to help
  work at the intersection of technology and human rights.  
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7400.html
SUMMARY:Technology and Mass Atrocity Prevention - Nicolai Pogadl
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T183000
DTSTAMP;VALUE=DATE-TIME:20160106T220540Z
UID:0c8f0e98-92ee-42ba-aa75-04fc50344904@frab.cccv.de
DESCRIPTION:The talk „We Lost The War“ was presented at Congress ten year
 s ago\, causing quite a stir. It was a prediction of a dark future that 
 did not sit well with many people\, but unfortunately many predictions h
 ave come true meanwhile. This talk will try to address what comes next\,
  as well as what the hacker community can do to make things better.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7501.html
SUMMARY:Ten years after ‚We Lost The War‘ - rop\, frank
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T183000
DTSTAMP;VALUE=DATE-TIME:20160110T145755Z
UID:b4339927-6780-4881-a342-e7a262078dce@frab.cccv.de
DESCRIPTION:Street level surveillance technology\, such as surveillance c
 ameras and iris scanners\, is now a pervasive part of the daily lives of
  city dwellers\, with disastrous consequences for freedom of expression.
  This talk will cover what kind of street level technology we’re seeing\
 , how it’s spreading\, and who’s making money off of it. We’ll also talk
  about some of the security flaws hackers have exposed on these technolo
 gies\, and put out a call to action to CCC. 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7374.html
SUMMARY:The architecture of a street level panopticon - Dia Kayyali
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T140000
DTSTAMP;VALUE=DATE-TIME:20160109T081817Z
UID:3cb4101c-2042-4883-b6fb-6591994a70c0@frab.cccv.de
DESCRIPTION:Analysis of the emission scandal shaking the German automotiv
 e industry from a procedural\, organizational and technical level. Inclu
 des insight into cheating for advanced managers and code extraction from
  ECUs from Ebay. And from Volkswagen. Initially.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7331.html
SUMMARY:The exhaust emissions scandal („Dieselgate“) - Daniel Lange (DLan
 ge)\, Felix "tmbinc" Domke
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T183000
DTSTAMP;VALUE=DATE-TIME:20160106T085410Z
UID:27260dd7-65b6-40ec-8929-2b96b45aa368@frab.cccv.de
DESCRIPTION:For years SCADA StrangeLove team speaks about vulnerabilities
  in Industrial Control Systems. Now we want to show by example of railwa
 y the link between information security and industrial safety and demons
 trate how a root access gained in a few minutes can bring to naught all 
 the years of efforts that were devoted to the improvement of fail-safety
  and reliability of the ICS system.\n\nRailroads is a complex systems an
 d process automation is used in different areas: to control power\, swit
 ches\, signals and locomotives. At this talk we will analyze threats and
  vulnerabilities of fundamental rail-road automation systems such as com
 puter based interlocking\, automatic train control and automatic train p
 rotection. \n\nNo vendor names and vulnerabilities details will be relea
 sed\, for obvious reasons. By the way\, all research based on hands-on s
 ecurity exercises and most of issues are confirmed and processed by vend
 ors.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7490.html
SUMMARY:The Great Train Cyber Robbery - Sergey Gordeychik\, Aleksandr Tim
 orin\, repdet
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T113000
DTSTAMP;VALUE=DATE-TIME:20160104T233755Z
UID:7ca8581d-a3f7-4247-8101-786cf04d9bd1@frab.cccv.de
DESCRIPTION:In the last couple of years\, cloud and web services have bec
 ome more and more popular. Since Snowden we know for sure that intellige
 nce agencies have access to the data storage of an  service provider\, e
 ither by (forced) cooperation\, or espionage. Thus\, to protect our priv
 acy we have to encrypted our data before hand it over to our service pro
 vider (data holder). But this approach contradicts the very idea of a we
 b service where the data holder have to process our data in one way or a
 n other. Therefore\, we need new cryptographic techniques to enable the 
  data holder to perform operation on encrypted data. One of the most imp
 ortant operations for cloud storage or database based web/cloud  service
 s is the search operation.  In this talk we focus on the very familiar c
 loud storage scenario. Because in this scenario\, It is obvious\, that t
 he user (data owner) do not want to perform the search by himself. This 
 should be a service offered by the data holder. We will present differen
 t practical approaches to achieve searchable ciphertext\, namely one wit
 h an index and one with cleverly encrypted words.\n\nNote that no PhD is
  required to attend this talk \;-)
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7333.html
SUMMARY:The Magic World of Searchable Symmetric Encryption - Tobias Muell
 er\, Christian Forler
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T113000
DTSTAMP;VALUE=DATE-TIME:20151230T120803Z
UID:b08bddb1-9370-4392-a8ca-8e49ad4a3911@frab.cccv.de
DESCRIPTION:Eine zweite Büste der ägyptischen Königin sei gefunden worden
 \, meldete Ägyptens größte Zeitung. Der Fund war jedoch Teil einer Kunst
 aktion\, die Museen und Kunstmarkt für deren Umgang mit Antiken kritisie
 rt.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7543.html
SUMMARY:The mummy unwrapped - nelles-al-badri
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T203000
DTSTAMP;VALUE=DATE-TIME:20160108T170807Z
UID:b2a8a8fe-646f-4e32-a4d8-67a163573e36@frab.cccv.de
DESCRIPTION:tl\;dr EXPLOIT ALL THE PERL. AGAIN.\nAfter last year’s Perl c
 rackdown\, I decided I have to take the Perl abuse to the next level. Th
 is time I focused on Perl’s core\, or more specifically\, the referencin
 g mechanism\, and shattered the security of most Perl CGI projects in th
 e world.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7130.html
SUMMARY:The Perl Jam 2 - Netanel Rubin
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T211500
DTSTAMP;VALUE=DATE-TIME:20160106T223546Z
UID:8b01d636-d39b-44b8-8d6f-fc03e47eae1b@frab.cccv.de
DESCRIPTION:Entropy\, the randomness used in many critical cryptography p
 rocesses including key generation\, is as important as it is misundersto
 od. Many myths are fueled by misleading documentation. This presentation
  aims to provide simple and actionable information while explaining the 
 core technical details and real world implementations.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7441.html
SUMMARY:The plain simple reality of entropy - Filippo Valsorda
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T223000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T220000
DTSTAMP;VALUE=DATE-TIME:20160105T205912Z
UID:92891768-7427-4d48-8127-35d18318a63d@frab.cccv.de
DESCRIPTION:Using follower bombing as art performances\, the artists Cons
 tant Dullaart continues the research into attention and identity as a co
 mmodity on social networks\, and has recently created a large sum of cus
 tom created artificial Facebook identities.\nMany websites offer an opti
 on to login in with Facebook credentials due to the strict controle of t
 he service on the reliability and verification of the social medium. In 
 a time where the open borders in Europe are under pressure\, and Syrian 
 identities are sold to people that long for a better future\, virtual id
 entity systems\, and their reliability become a topical analogy.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7517.html
SUMMARY:the possibility of an army - constantdull
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T171500
DTSTAMP;VALUE=DATE-TIME:20160110T233034Z
UID:9d3ce896-1ee6-47c5-b616-1ebcf6860690@frab.cccv.de
DESCRIPTION:CAGE exists to highlight abuses of the War on Terror. It has 
 uncovered many secrets of governments that they would like to remain sec
 ret\, and is now one of the most targeted organisations in the UK. Hear 
 how the state attempts to suppress dissent\, and yet we manage to speak 
 out.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7443.html
SUMMARY:The Price Of Dissent - CAGE\, Cerie Bullivant
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T113000
DTSTAMP;VALUE=DATE-TIME:20160105T165839Z
UID:f6149460-a278-4600-bf9d-61ea737c46de@frab.cccv.de
DESCRIPTION:The techniques to control access to the Internet\, and the ab
 ility to bring transparency to those processes are both continuing to ev
 olve. We’ll give an update on the landscape of online information contro
 ls\, and our ability to measure them.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7143.html
SUMMARY:The state of Internet Censorship - Will Scott\, Vasilis Ververis
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T183000
DTSTAMP;VALUE=DATE-TIME:20160108T202922Z
UID:c6f44cff-122c-44f3-bcf9-683577a67e85@frab.cccv.de
DESCRIPTION:The Amiga was one of the most powerful and wide srpead comput
 ers in the late 80's. This talk explains its hardware design and program
 ming.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7468.html
SUMMARY:The Ultimate Amiga 500 Talk - rahra
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T213000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T203000
DTSTAMP;VALUE=DATE-TIME:20160106T085513Z
UID:aa5412e2-c20a-4c4a-b4d7-fd97184a87fe@frab.cccv.de
DESCRIPTION:Last year at 31c3 we disclosed <a href="https://trmm.net/Thun
 derstrike_31c3">Thunderstrike</a>\, the first firmware attacks against M
 acbooks.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7236.html
SUMMARY:Thunderstrike 2 - Trammell Hudson
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T124500
DTSTAMP;VALUE=DATE-TIME:20160107T023413Z
UID:ff303155-f2fa-4c54-b9aa-ef47cd6e7704@frab.cccv.de
DESCRIPTION:What do you want? Did you build your web/app for humans or NS
 A robots? Let's make it usable for human beings. I'd like to show you so
 me basic design mistakes and how to avoid them to improve usability of y
 our web or app. Why? Because it's worth it and I'm good in it.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7356.html
SUMMARY:Top X* usability obstacles - BoB Marvan
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T124500
DTSTAMP;VALUE=DATE-TIME:20160107T113730Z
UID:1edc7ea3-0f06-4453-911f-f11b2a49e649@frab.cccv.de
DESCRIPTION:We'll update you on what's going on with Tor onion services\,
  aka Tor hidden services.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7322.html
SUMMARY:Tor onion services: more useful than you think - Roger\, David Go
 ulet\, asn
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T134500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T124500
DTSTAMP;VALUE=DATE-TIME:20160110T131723Z
UID:fa0727ab-81a7-4197-bc7d-0ce5e9dc4526@frab.cccv.de
DESCRIPTION:Can we build trustworthy client systems on x86 hardware? What
  are the main challenges? What can we do about them\, realistically? Is 
 there anything we can?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7352.html
SUMMARY:Towards (reasonably) trustworthy x86 laptops - Joanna Rutkowska
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T214500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T211500
DTSTAMP;VALUE=DATE-TIME:20160105T205902Z
UID:bfadd7de-3680-4766-a474-faa53c5f141f@frab.cccv.de
DESCRIPTION:The lecture outlines strategies by the "Artist against 419" o
 nline community that uses open source intelligence to gather data and fi
 le reports about fraudulent websites. The lecture presents the artistic 
 installation "Megacorp." (created by KairUs) that tries to visualize the
  global phenomenon of fake business websites.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7219.html
SUMMARY:Trust us and our business will expand! - Andreas Zingerle\, Linda
  Kronman
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T000000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T230000
DTSTAMP;VALUE=DATE-TIME:20160107T101954Z
UID:ab751ee0-8623-4a20-bab3-f82f8cf3dd82@frab.cccv.de
DESCRIPTION:Gradually we are all becoming more and more dependent on mach
 ines\, we will be able to live longer with an increased quality of life 
 due to machines integrated into our body. However\, our dependence on te
 chnology grows faster than our ability to secure it\, and a security fai
 lure of a medical device can have fatal consequences. This talk is about
  Marie's personal experience with being the host of a vulnerable medical
  implant\, and how this has forced her to become a human part of the "In
 ternet-of-Things". 
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7273.html
SUMMARY:Unpatchable - Marie Moe\, Eireann Leverett
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
DTSTAMP;VALUE=DATE-TIME:20160102T203123Z
UID:6f79c506-a6cd-4430-bfbf-1841aca06e41@frab.cccv.de
DESCRIPTION:In this talk I'll show how to build an open source vector gam
 ing system with MAME\, a microcontroller and an XY monitor or oscillosco
 pe. Relive the joys of playing vector video games from 1979 and enjoy so
 me of the retro-styled vector games of 2015.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7238.html
SUMMARY:Vector retrogaming - Trammell Hudson\, Adelle Lin
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151229T160000
DTSTAMP;VALUE=DATE-TIME:20160108T211653Z
UID:276311bf-60b5-411a-ab68-6a8fbb0fd6a9@frab.cccv.de
DESCRIPTION:This talk is about Vehicle2Vehicle (V2V) communication in Eur
 ope and in the U.S. Next to the introduction of some requirements for V2
 V communication\, the basic approaches of V2V communication based on IEE
 E 802.11p are presented. This includes an introduction to communication 
 stack\, concepts of message dissemination\, message contents\, privacy &
  security issues and an outlook to further developments.\n(The email add
 ress has an error. It should en with "de" not with "com")
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7165.html
SUMMARY:Vehicle2Vehicle Communication based on IEEE 802.11p - Bernd Lehma
 nn
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T173000
DTSTAMP;VALUE=DATE-TIME:20160105T080659Z
UID:81cba379-0eb6-4dbb-a48c-80feaea60939@frab.cccv.de
DESCRIPTION:We develop a tool to verify Linux netfilter/iptables firewall
 s rulesets. Then\, we verify the verification tool itself.\n\nWarning: i
 nvolves math!\n\nThis talk is also an introduction to interactive theore
 m proving and programming in Isabelle/HOL. We strongly suggest that audi
 ence members have some familiarity with functional programming. A strong
  mathematical background is NOT required.\n\nTL\;DR: Math is cool again\
 , we now have the tools for "executable math". Also: iptables!
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7195.html
SUMMARY:Verified Firewall Ruleset Verification - Cornelius Diekmann
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T193000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T183000
DTSTAMP;VALUE=DATE-TIME:20160110T002215Z
UID:f79c744f-30d1-4175-a173-2e760049337d@frab.cccv.de
DESCRIPTION:In the past years there has been a lot of discussion on the t
 opic of state sponsored surveillance. But hardly any material can be acc
 essed to support the general debate due to vaguely declared security con
 cerns. So we are debating Big Brother with little knowledge about what h
 e actually sees\, while he is watching. Over the course of three years\,
  I was able to research the archives left by East Germany's Stasi to loo
 k for visual memories of this notorious surveillance system and more rec
 ently I was invited to spend some weeks looking at the archive by the Cz
 echoslovak StB. Illustrating with images I have found during my research
 \, I would like to address the question why this material is still relev
 ant – even 25 years after the fall of the Iron Curtain.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7209.html
SUMMARY:What does Big Brother see\, while he is watching? - Simon
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T123000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T113000
DTSTAMP;VALUE=DATE-TIME:20160107T113636Z
UID:d66db4df-49ed-4c9f-ada3-289d16786c8e@frab.cccv.de
DESCRIPTION:What does the fact that Tor users can’t edit wikipedia mean f
 or the quality of the ``encyclopedia that anyone can edit?’’ How do capt
 chas and blocking of anonymity services affect the experiences of Tor us
 ers when they are trying to contribute content? This talk will discuss t
 he increasing limitations of active participation in the anonymous Inter
 net and the findings of our interview study of Tor users and wikipedia e
 ditors concerning these issues.  We believe that by understanding the co
 ntributions Tor users make—and that people denied access to anonymity to
 ols don't make—we can help make the case for the value of anonymity onli
 ne.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7324.html
SUMMARY:What is the value of anonymous communication? - greenstadt
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T150000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T140000
DTSTAMP;VALUE=DATE-TIME:20160110T124035Z
UID:b89b8cff-c496-4885-8e72-1461e8b274f7@frab.cccv.de
DESCRIPTION:„Social Media Break Up Coordinator“ is a performance art piec
 e and lecture performed by Caroline Sinders. Inspired by Facebook’s memo
 ries algorithms faux pas\, such as parents being reminded of their child
 ’s death\, or of events with an ex.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7497.html
SUMMARY:When  algorithms fail in our personal lives - Caroline Sinders
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T224500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T214500
DTSTAMP;VALUE=DATE-TIME:20160109T081849Z
UID:489a414b-2d6b-4f20-8187-813169ca19c9@frab.cccv.de
DESCRIPTION:Software design and testing is hard\, but what happens when e
 ach bug fix can cost months of delay and millions of dollars? In this ta
 lk we’ll take a behind-the-scenes look at the challenges in the design o
 f a very complex\, yet critical piece of hardware: the modern x86 CPU.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7171.html
SUMMARY:When hardware must „just work“ - David Kaplan
LOCATION:Hall 1
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T180000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T173000
DTSTAMP;VALUE=DATE-TIME:20160111T001711Z
UID:5f57ffa9-631c-429d-a11b-5b51bebe0f0f@frab.cccv.de
DESCRIPTION:Das Nonplusultra für hauptamtliche Jugendschützer sind Filter
 programme\, auch „Jugendschutzprogramme“ genannt. Doch was machen die Pr
 ogramme\, welche Wirkungen und vor allem Nebenwirkungen haben sie? Und w
 as macht eigentlich der Zombie JMStV?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7415.html
SUMMARY:Wie Jugendschutzprogramme nicht nur die Jugend schädigen - Alvar 
 Freude
LOCATION:Hall 6
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T170000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T160000
DTSTAMP;VALUE=DATE-TIME:20160110T123555Z
UID:03c8501f-d327-4228-a9fe-2635370d25d2@frab.cccv.de
DESCRIPTION:Der steigende Anteil der Erneuerbaren Energien an der Stromer
 zeugung und der zunehmende Handel mit Strom erhöht die Belastung der Str
 omnetze. Welche Auswirkungen hat das auf die Netzstabilität? Wann kommen
  die Stromnetze an ihre Leistungsgrenze? Wie kann ein gezielter Angriff 
 auf das Europäische Verbundnetz aussehen? Was müsste man tun\, um einen 
 Blackout zu verursachen? Und: Wie können wir unsere Stromnetze umbauen\,
  damit das nicht passiert?
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7323.html
SUMMARY:Wie man einen Blackout verursacht  - Mathias Dalheimer
LOCATION:Hall G
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T181500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151227T171500
DTSTAMP;VALUE=DATE-TIME:20160102T201059Z
UID:4c070a2c-0558-48b8-b612-b8507a51154e@frab.cccv.de
DESCRIPTION:This presentation covers windows kernel driver security issue
 s. It'll discuss some background\, and then give an overview of the most
  common issues seen in drivers\, covering both finding and fixing issues
 .
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7510.html
SUMMARY:Windows drivers attack surface - Ilja van Sprundel
LOCATION:Hall 2
END:VEVENT
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T190000
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151230T180000
DTSTAMP;VALUE=DATE-TIME:20160103T140559Z
UID:45a2ba85-564b-4d94-9bef-db32b59d7602@frab.cccv.de
DESCRIPTION:A review/rant about the progress that free software wireless 
 drivers (especially on Linux) have made over the recent years\, as well 
 as the current challenges that driver developers (and users) are facing.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7375.html
SUMMARY:Wireless Drivers: Freedom considered harmful? - Felix Fietkau
LOCATION:Hall G
END:VEVENT
END:VCALENDAR
