Version Mildenberg

Events

Science

  Title Track Speakers
Tractor starlit sky
0en & 1en auf dem Acker
Die Dynamik der globalen Agrarmärkte hat sich in den letzten Jahren verstärkt...
Science
Event small
A hacker's guide to Climate Change - What do we know and how do we know it?
Climate change has long ceased to be news to many people, but it is...
Science
Event small
Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels'
Quantitative science evaluation, such as university rankings, rely on...
Science
Event small
Beeinflussung durch Künstliche Intelligenz
Eine wissenschaftliche Perspektive auf die achtlose Anwendung der Algorithmen...
Science
Event small
Closing the loop: Reconnecting social-technologial dynamics to Earth System science
International commitment to the appropriately ambitious Paris climate...
Science
Event small
Don't stop 'til you feel it
This talk will report on my current research in bringing to bear multiple...
Science
Event small
Drones of Power: Airborne Wind Energy
Airborne wind energy is the attempt to bring the digital revolution to the...
Science
Event small
Ensuring Climate Data Remains Public
How do we keep important environmental and climate data accessible amidst...
Science
Event small
Es sind die kleinen Dinge im Leben II
Jeder weiß ungefähr was man mit einem Mikroskop tun kann: Kleine Dinge...
Science
Event small
Extended DNA Analysis
In 2017, the federal states of Baden-Wurttemberg and Bavaria suggested the...
Science
Tesla cavity
Free Electron Lasers
Wouldn’t it be awesome to have a microscope which allows scientists to map...
Science
Wi fi holography   augmented reality
Holography of Wi-Fi radiation
Holography of Wi-Fi radiation Philipp Holl [1,2] and Friedemann Reinhard...
Science
5812589 %282%29
International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interoperable Schnittstellen für digitalisiertes Kulturgut
Neue Standards wie IIIF (http://iiif.io) ermöglichen es, digitalisiertes...
Science
Event small
On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Resolution
The representation of thunderstorms (deep convection) and rain showers in...
Science
Event small
Relativitätstheorie für blutige Anfänger
Jeder kennt sie, kaum jemand versteht sie wirklich, die vielleicht...
Science
Satnogs
SatNOGS: Crowd-sourced satellite operations
An overview of the SatNOGS project, a network of satellite ground station...
Science
Mankins2
Saving the World with Space Solar Power
Space Solar Power station, such as SPS Alpha, could overcome some issues that...
Science
Event small
Science is broken
We're supposed to trust evidence-based information in all areas of life....
Science
Magpie2
Simulating the future of the global agro-food system
How can we feed a growing world population within a resilient Earth System?...
Science
Menge
Treibhausgasemissionen einschätzen
Alles was wir jeden Tag tun erzeugt Treibhausgase. Für eine...
Science
Upsat
UPSat - the first open source satellite
During 2016 Libre Space Foundation a non-profit organization developing open...
Science
Event small
Watching the changing Earth
For a few decades by now, satellites offer us the tools to observe the whole...
Science
Darwin tree 1837
WHWP
Vorstellung der Dissertation "WHWP - Walter Höllerer bei WikiPedia". Es wurde...
Science

Security

  Title Track Speakers
Event small
1-day exploit development for Cisco IOS
Year 2017 was rich in vulnerabilities discovered for Cisco networking...
Security
Event small
Are all BSDs created equally?
In this presentation I start off asking the question „How come there are only...
Security
Event small
ASLR on the line
Address Space Layout Randomization (ASLR) is fundamentally broken on modern...
Security
Event small
avatar²
Avatar² is an open source framework for dynamic instrumentation and analysis...
Security
Event small
BootStomp: On the Security of Bootloaders in Mobile Devices
In our paper we present a novel tool called BootStomp able to identify...
Security
Event small
Console Security - Switch
Nintendo has a new console, and it's more secure than ever.
Security
Event small
Decoding Contactless (Card) Payments
This talk will dive into the techniques and protocols that drive contactless...
Security
Event small
Defeating (Not)Petya's Cryptography
In this presentation we will outline our findings about (Not)Petya's crypto...
Security
Nomorp logo square
Die fabelhafte Welt des Mobilebankings
Bisher wurden Angriffe gegen App-basierte TAN-Verfahren und Mobilebanking von...
Security
Event small
Doping your Fitbit
Security architectures for wearables are challenging. We take a deeper look...
Security
Event small
DPRK Consumer Technology
The DPRK has largely succeeded at hiding its consumer technology. While...
Security
Event small
Electromagnetic Threats for Information Security
For non specialists, Electromagnetic Pulse weapons (EMP) are fantasy weapons...
Security
Event small
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
How I hacked Sasmung eMMC chips: from an indication that they have a firmware...
Security
Event small
Everything you want to know about x86 microcode, but might have been afraid to ask
Microcode is an abstraction layer on top of the physical components of a CPU...
Security
Img 0505
How to drift with any car
Lots of research are arising from the fairly unexplored world of automative...
Security
Event small
Implementing an LLVM based Dynamic Binary Instrumentation framework
This talk will go over our efforts to implement a new open source DBI...
Security
Collin
Inside Android’s SafetyNet Attestation: Attack and Defense
SafetyNet Attestation is the primary platform security service on Android....
Security
Event small
Inside Intel Management Engine
Positive Technologies researchers Maxim Goryachy and Mark Ermolov have...
Security
Event small
Intel ME: Myths and reality
Many claims were made recently about purpose and capabilities of the Intel ME...
Security
John dee
iOS kernel exploitation archaeology
This talk presents the technical details and the process of reverse...
Security
Logo small
KRACKing WPA2 by Forcing Nonce Reuse
We introduce key reinstallation attacks (KRACKs). These attacks abuse...
Security
Event small
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Wir retten das Klima mit Elektroautos — und bauen die Ladeinfrastruktur...
Security
Event small
LatticeHacks
Lattices are an extremely useful mathematical tool for cryptography. This...
Security
Event small
Lets break modern binary code obfuscation
Do you want to learn how modern binary code obfuscation and deobfuscation...
Security
Event small
Microarchitectural Attacks on Trusted Execution Environments
Trusted Execution Environments (TEEs), like those based on ARM TrustZone or...
Security
Event small
Mobile Data Interception from the Interconnection Link
Many mobile network operators rush to upgrade their networks to 4G/LTE from...
Security
Event small
MQA - A clever stealth DRM-Trojan
Master Quality Authenticated (MQA) is a new audio format promising studio...
Security
Event small
Resilienced Kryptographie
Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der...
Security
Event small
SCADA - Gateway to (s)hell
Small gateways connect all kinds of fieldbusses to IP systems. This talk will...
Security
Download
Squeezing a key through a carry bit
The Go implementation of the P-256 elliptic curve had a small bug due to a...
Security
Dissection
Taking a scalpel to QNX
In this talk we will present a deep-dive analysis of the anatomy of QNX: a...
Security
Event small
The Noise Protocol Framework
The <a href="https://noiseprotocol.org">Noise Protocol Framework</a> is a...
Security
Blare big
TrustZone is not enough
This talk deals with embedded systems security and ARM processors...
Security
Event small
Type confusion: discovery, abuse, and protection
Type confusion, often combined with use-after-free, is the main attack vector...
Security
Event small
Uncovering vulnerabilities in Hoermann BiSecur
Hoermann BiSecur is a bi-directional wireless access control system “for the...
Security
Event small
We should share our secrets
Backing up private keys in a secure manner is not straightforward. Once a...
Security

CCC

  Title Track Speakers
Event small
34C3 Infrastructure Review
In this traditional lecture, various teams provide an inside look at how this...
CCC
171122 34c3 logotype plus
Abschluss
DE: Damit wir als Komputerfrieks nicht länger unkoordiniert vor uns...
CCC
Img 3723
All Creatures Welcome
ALL CREATURES WELCOME is a documentary film about the communities of the...
CCC
Event small
Bildung auf dem Weg ins Neuland
An unseren Schulen besteht ein großes Defizit hinsichtlich der Vermittlung...
CCC
Event small
Der PC-Wahl-Hack
Hacker des Chaos Computer Clubs (CCC) haben eine in mehreren Bundesländern...
CCC
Event small
Eröffnung: tuwat
Daß sich mit Kleinkomputern trotzalledem sinnvolle Sachen machen lassen, die...
CCC
Chaosknoten
Jahresrückblick des CCC 2017
Staatstrojaner, Vorratsdaten, automatisierte Biometriesammlungen, PC-Wahl –...
CCC
Tuwat lt
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Tuwat lt
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Tuwat lt
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may...
CCC
Event small
Security Nightmares 0x12
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen...
CCC

Art & Culture

  Title Track Speakers
Post snowden nails aram bartholl 13 small
Access To Bodies
Cyborgs und Body Enhancement sind typisch männlich dominierte Thematiken...
Art & Culture
9365 1 2017 afro fest
Afro TECH
Inke Arns will present speculative projections of the future and current...
Art & Culture
Event small
BBSs and early Internet access in the 1990ies
This talk explains how individuals were able to communicate globally in the...
Art & Culture
Screen shot 2017 11 27 at 21.00.25
Deconstructing a Socialist Lawnmower
Darsha Hewitt is a Canadian artist working in new media and sound. She is...
Art & Culture
Event small
Dude, you broke the Future!
We're living in yesterday's future, and it's nothing like the speculations of...
Art & Culture
Event small
Ecstasy 10x yellow Twitter 120mg Mdma
Artists !Mediengruppe Bitnik talk about recent works around bots and the...
Art & Culture
Forensic arch
Forensic Architecture
In recent years, the group Forensic Architecture began using novel research...
Art & Culture
Event small
Humans as software extensions
While technology is often described as an extension of our bodies, this talk...
Art & Culture
Ird
institutions for Resolution Disputes
The institutions of Resolution Disputes [iRD] call attention to media...
Art & Culture
Estrofem03 %281%29
Open Source Estrogen
Collaborative and interdisciplinary research, Open Source Estrogen combines...
Art & Culture
Robotmusic2
Robot Music
Once full automation hits, we will have a lot of free time on our hands. This...
Art & Culture
Title screen dig assassination.001
The Work of Art in the Age of Digital Assassination
My talk explores the interconnected nature of war and culture. It does so...
Art & Culture
Elahi tt screenshot sf
Tracking Transience
Hasan Elahi is an interdisciplinary artist working with issues in...
Art & Culture
1011783 10154799296605083 8572860066039740959 n
Visceral Systems
This talk considers the visceral relationship one can have towards intangible...
Art & Culture
01 a contemporary delphic oracle
Why Do We Anthropomorphize Computers?...
A talk on waiting for the technological rapture in the church of big data....
Art & Culture

Ethics, Society & Politics

  Title Track Speakers
Indy avatar
All Computers Are Beschlagnahmt
Im August 2017 wurde Indymedia linksunten vom Bundesinnenminister verboten....
Ethics, Society & Politics
Event small
Antipatterns und Missverständnisse in der Softwareentwicklung
Anhand von Anekdoten aus 20 Jahren Softwareentwicklung versucht der Vortrag...
Ethics, Society & Politics
Internet map justice
BGP and the Rule of Custom
When bad actors can simply move servers from country to country, why does the...
Ethics, Society & Politics
Twitter arabic
Catch me if you can: Internet Activism in Saudi Arabia
Activists in Saudi Arabia have been able to celebrate important victories...
Ethics, Society & Politics
Event small
cryptocurrencies, smart contracts, etc.: revolutionary tech?
Bitcoin arrived eight years ago, and has now spawned a dazzling array of...
Ethics, Society & Politics
Event small
Der netzpolitische Wetterbericht
Deutschland hat gewählt, man weiß nur noch nicht, wer regieren wird. Bis...
Ethics, Society & Politics
Clarion alley by oren rozen
Die göttliche Informatik / The divine Computer Science
Die Informatik ist scheinbar das neue Göttliche, das den Klimawandel, die...
Ethics, Society & Politics
Fingerprint
Die Lauschprogramme der Geheimdienste
Der NSA-BND-Untersuchungsausschuss des Deutschen Bundestags ist zu Ende. Da...
Ethics, Society & Politics
Event small
Die Sprache der Überwacher
So intensiv wie 2017 wurde der Themenkomplex rund um Sicherheit und...
Ethics, Society & Politics
Worldcheck 4 1498254190
Financial surveillance
Faced with new responsibilities to prevent terrorism and money laundering,...
Ethics, Society & Politics
Logo
Fuck Dutch mass-surveillance: let's have a referendum!
Dutch intelligence agencies will soon be allowed to analyse bulk data of...
Ethics, Society & Politics
Event small
Gamified Control?
In 2014 China’s government announced the implementation of big data based...
Ethics, Society & Politics
Event small
History and implications of DRM
Digital Restrictions Management (DRM) is found everywhere from music to cars...
Ethics, Society & Politics
Citl
How risky is the software you use?
Software vendors like to claim that their software is secure, but the effort...
Ethics, Society & Politics
Democracia
Internet censorship in the Catalan referendum
On October 1st the Catalan society held a referendum to decide if they wanted...
Ethics, Society & Politics
A2081262357 10
Internet of Fails
Expect current examples of IoT fails that I collected during my work as a...
Ethics, Society & Politics
Event small
Italy's surveillance toolbox
This project aims to take advantage of the availability of public procurement...
Ethics, Society & Politics
Event small
Lobby-Schlacht um die ePrivacy-Verordnung
In der EU wird gerade über eine Verordnung verhandelt, die für die...
Ethics, Society & Politics
Event small
Net Neutraliy Enforcement in the EU
After four years of advocacy and lobbying to enshrine net neutrality...
Ethics, Society & Politics
Event small
Netzpolitik in der Schweiz
Gleich in drei Gesetzen drohen Netzsperren. Staatstrojaner und...
Ethics, Society & Politics
Event small
Pointing Fingers at 'The Media'
The German election in September 2017 brought a tectonic shift to the layout...
Ethics, Society & Politics
Pi logo
Policing in the age of data exploitation
What does policing look like in the age of data exploitation? This is the...
Ethics, Society & Politics
Event small
Privacy Shield - Lipstick on a Pig?
In 2015 the Court of Justice of the European Union (CJEU) has overturned the...
Ethics, Society & Politics
Bordercrossingprivacylogo
Protecting Your Privacy at the Border
Our lives are on our laptops – family photos, medical documents, banking...
Ethics, Society & Politics
Event small
QualityLand
Willkommen in QualityLand, in einer nicht allzu fernen Zukunft: Alles läuft...
Ethics, Society & Politics
Event small
Regulating Autonomous Weapons
Depending on the definition, autonomous weapon systems do not and might never...
Ethics, Society & Politics
Fragdenstaat square
Schreibtisch-Hooligans
Wie umgehen mit politischer Ohnmacht? Das Informationsfreiheitsgesetz bietet...
Ethics, Society & Politics
Graph middle
Social Bots, Fake News und Filterblasen
„Angriff der Meinungsroboter“ und „Gefangen in der Filterblase“ titelten die...
Ethics, Society & Politics
Socialcooling ccc
Social Cooling - big data’s unintended side effect
What does it mean to be free in a world where surveillance is the dominant...
Ethics, Society & Politics
Event small
Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
In 2015, artist Ai Weiwei was bugged in his home, presumably by government...
Ethics, Society & Politics
Event small
Taxation
Taxation, the most "boring" #34c3 talk, but hey it's the economy stupid, and...
Ethics, Society & Politics
Event small
The seizure of the Iuventa
The ship „Iuventa“ of the organization „Jugend Rettet“ was seized on August...
Ethics, Society & Politics
Event small
The Snowden Refugees under Surveillance in Hong Kong
The Snowden Refugees’ actions to protect the world’s most significant whistle...
Ethics, Society & Politics
Event small
Think big or care for yourself
In German nursing science the dominant position on emergent technologies...
Ethics, Society & Politics
Event small
This is NOT a proposal about mass surveillance!
In November 2016 the UK has passed the Investigatory Powers Act (aka...
Ethics, Society & Politics
Event small
Tiger, Drucker und ein Mahnmal
Flüchtlingsfressende Tiger in Berlin, zum Diktatorensturz aufrufende...
Ethics, Society & Politics
Screen shot 2017 10 12 at 10.06.22 pm
Tightening the Net in Iran
How do Iranians experience the Internet? Various hurdles and risks exist for...
Ethics, Society & Politics
Matrix
Trügerische Sicherheit
Wie steht es um die Sicherheitsversprechen, die mit dem Einsatz von neuen...
Ethics, Society & Politics
Event small
Uncertain Concern
Over 11 million undocumented immigrants live in the United States today....
Ethics, Society & Politics
Event small
Uncovering British spies’ web of sockpuppet social media personas
The Joint Threat Research Intelligence Group (JTRIG), a unit in one of...
Ethics, Society & Politics
Event small
WTFrance
France is part of the top countries trying to destroy encryption, especially...
Ethics, Society & Politics
Event small
Zamir Transnational Network und Zagreb Dairy
Die Geschichte des ZAMIR Transnational Network und meines...
Ethics, Society & Politics

Hardware & Making

  Title Track Speakers
Rocket
Blinkenrocket!
The Blinkenrocket is a DIY SMD Soldering Kit that was designed to teach...
Hardware & Making
Event small
Demystifying Network Cards
Network cards are often seen as black boxes: you put data in a socket on one...
Hardware & Making
Mod
Designing PCBs with code
An overview and history of various tools and languages that allow you to use...
Hardware & Making
Event small
Digitale Bildung in der Schule
„5.-Klässlerinnen, die über die Millisekunden für einen delay()-Aufruf...
Hardware & Making
Img 20171005 wa0001
Electroedibles
Electroedibles is an experiment with “edible” hardware that explores the...
Hardware & Making
Logo still
Home Distilling
This talk covers the theory, legality and economics of home distilling. We...
Hardware & Making
Eye2
Low Cost Non-Invasive Biomedical Imaging
An open source biomedical imaging project using electrical impedance...
Hardware & Making
Mfmw
Making Experts Makers and Makers Experts
Over the past year, we have been developing open source wheelchair add-ons...
Hardware & Making
Img 20171014 174810 2
“Nabovarme” opensource heating infrastructure in Christiania
Project “Nabovarme” (meaning “neighbour heating”) has transformed private...
Hardware & Making
Event small
Opening Closed Systems with GlitchKit
Systems that hide their firmware-- often deep in readout-protected flash or...
Hardware & Making
Matteo michel4 small
openPower - the current state of commercial openness in CPU development
How does developing future processors with yesterdays capabilities work out...
Hardware & Making
Event small
Public FPGA based DMA Attacking
Most thought Direct Memory Access (DMA) attacks were a thing of the past...
Hardware & Making
Event small
Reverse engineering FPGAs
In this talk I describe the basic makeup of FPGAs and how I reverse...
Hardware & Making
Event small
Running GSM mobile phone on SDR
Since SDR (Software Defined Radio) becomes more popular and more available...
Hardware & Making
Logo2
Schnaps Hacking
This talk covers the theory, the required tools and how to make them, and the...
Hardware & Making
Event small
The making of a chip
You are surrounded by ICs. Yet you probably don't know much about how such a...
Hardware & Making
Event small
The Ultimate Apollo Guidance Computer Talk
The Apollo Guidance Computer ("AGC") was used onboard the Apollo spacecraft...
Hardware & Making
Unbenannt
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Did you ever want to run your own IoT cloud on your IoT devices? Or did you...
Hardware & Making
Event small
Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons
Eliminating nuclear weapons will require trusted measurement systems to...
Hardware & Making

Resilience

  Title Track Speakers
Briar logo circle
Briar
Briar is a peer-to-peer messaging app that is resistant to censorship and...
Resilience
Chip
Bringing Linux back to server boot ROMs with NERF and Heads
The NERF and Heads projects bring Linux back to the cloud servers' boot ROMs...
Resilience
Event small
Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Development
Most working engineers view machine-checked mathematical proofs as an...
Resilience
Event small
Deep Learning Blindspots
In the past decade, machine learning researchers and theorists have created...
Resilience
Event small
Ein Festival der Demokratie
Erfahrungen und Details zu den zwei kritischen Medienprojekten FC/MC...
Resilience
Event small
End-to-end formal ISA verification of RISC-V processors with riscv-formal
Formal hardware verification (hardware model checking) can prove that a...
Resilience
Event small
Growing Up Software Development
Hacker culture overcomes limitations in computer systems through creativity...
Resilience
Cadus logo app web vorlage
hacking disaster
Gesundheit als entscheidender Teil von Glück und Zufriedenheit ist bis in...
Resilience
Event small
Hardening Open Source Development
<p>As authors it is our responsibility to build secure software and give each...
Resilience
Decryption mix net
How Alice and Bob meet if they don't like onions
There exists no such thing as a perfect anonymity network with low latency,...
Resilience
Event small
How can you trust formally verified software?
Formal verification of software has finally started to become viable: we have...
Resilience
Event small
library operating systems
Traditional models of application development involve talking to an...
Resilience
Dtrace pony
May contain DTraces of FreeBSD
Systems are getting increasingly complex and it's getting harder to...
Resilience
Event small
Mietshäusersyndikat: den Immobilienmarkt hacken
Das Mietshäusersyndikat ist eine nicht-kommerzielle Kooperative mit...
Resilience
Event small
Modern key distribution with ClaimChain
ClaimChain is a Public Key Infrastructure unique in that it can operate in...
Resilience
Long wordmark
OONI: Let's Fight Internet Censorship, Together!
How can we take a stand against the increasing shadow of Internet censorship?...
Resilience
Event small
Organisational Structures for Sustainable Free Software Development
What kind of organisational structures exist for free software projects? What...
Resilience
Event small
Practical Mix Network Design
We shall explain the renewed interest in mix networks. Like Tor, mix networks...
Resilience
Snet
The Internet in Cuba: A Story of Community Resilience
Internet access in Cuba is notoriously restrictive. ETECSA, the...
Resilience

Entertainment

  Title Track Speakers
1567
Hacker Jeopardy
The Hacker Jeopardy is a quiz show.
Entertainment
Event small
Hacker Jeopardy Stream
The Hacker Jeopardy is a quiz show. -- Stream
Entertainment
Fullsizeoutput aad 300x133
Inside AfD
Herbst 2017. Irgendwo in Deutschland. Die führenden Köpfe der AfD träumen von...
Entertainment
Minkorrekt
Methodisch inkorrekt!
Der IgNobelpreis ist eine Auszeichnung, um wissenschaftliche Leistungen zu...
Entertainment
Nougatbytes logo text quadrat
Nougatbytes 11₂
Zwei Teams mit rauchenden Köpfen und ein johlendes Publikum raten sich durch...
Entertainment

Archived page - Impressum/Datenschutz