Schedule

Schedule










































 

Day 3
09:00

09:30

10:00

10:30

11:00

11:30

12:00

12:30

13:00

13:30

14:00

14:30

15:00

15:30

16:00

16:30

17:00

17:30

18:00

18:30

19:00

19:30

20:00

20:30

21:00

21:30

22:00

22:30

23:00

23:30

00:00

00:30

01:00

01:30

02:00

02:30

03:00

03:30

04:00

04:30

05:00

05:30

Saal 1

NEW IMPORTANT INSTRUCTIONS (en)

Real-world exploits and mitigations in Large Language Model applications

Johann Rehberger

With the rapid growth of AI and Large Language Models users are facing an increased risk of scams, data exfiltration, loss of PII, and even remote code execution. This talk will demonstrate many real-world exploits the presenter discovered, including discussion of mitigations and fixes vendors put in place for the most prominent LLM applications, including ChatGPT, Bing Chat and Google Bard.

Fuzzing the TCP/IP stack (en)

beyond the trivial

Ilja van Sprundel

In this talk, we delve into the captivating realm of TCP/IP stack fuzzing. As the backbone of internet communication, the TCP/IP stack is a prime target for cyber threats. This presentation will unravel the intricacies of fuzzing techniques applied to several TCP/IP stacks, shedding light on how these methodologies can uncover bugs, crashes and vulnerabilities. From the fundamentals of packet fuzzing to advanced mutation strategies, attendees will gain valuable insights into the proactive ways to fuzz a TCP/IP stack. Whether you're a seasoned cybersecurity professional or a curious enthusiast, this talk promises to be an enlightening journey into the heart of TCP/IP stack security and the crucial role of fuzzing in safeguarding our interconnected world.

Darf's noch etwas visionärer sein? (de)

Digital-ökologische Zukunftsvorstellungen in der deutschsprachigen Diskurslandschaft

AnjaH, Mascha Schädlich

Supereffiziente digitale Technik als Lösung aller Probleme oder doch lieber die selbstgebaute ressourcensparsame Low-Tech-Variante? Die Zukunftsvorstellungen, die den Einsatz digitaler Technik und ökologische Fragen zusammendenken, sind in der deutschen Diskurslandschaft nicht gerade üppig gesät. Im Vortrag werden die Ergebnisse einer Kurzstudie präsentiert, bei der wir die Zukunftsvorstellungen digital-ökologischer Transformation bei gesellschaftspolitischen Akteuren gesucht, analysiert und zu Visionskategorien zusammengefasst haben.

What is this? A machine learning model for ants? (en)

How to shrink deep learning models, and why you would want to.

etrommer

This talk will give a brief introduction of deep learning models and the energy they consume for training and inference. We then discuss what methods currently exist for handling their complexity, and how neural network parameter counts could grow by orders of magnitude, despite the end of Moore's law.

Social Engineering: Geschichte, Wirkung & Maßnahmen. (de)

Alles, was ihr immer über Social Engineering wissen wolltet, aber nie die Zeit hattet, zu erfragen.

K4tana

In diesem Vortrag beschreibe ich die Geschichte und den Gegenstand des Social Engineerings über den Tech-Kontext hinaus und erkläre anhand relevanter Forschung, wie, warum und bei wem es wirkt. Die modernen technischen Herausforderungen werden ebenso erläutert wie Maßnahmen, die jetzt oder in der Zukunft gegen Social Engineering getroffen werden können – individuell oder in Gruppen bzw. Organisationen.

ANIMAL()CITY (en)

Unleashed!

edavidova@gmail.com, Sakrowski, Sembo

Presentation/introduction to the ongoing 37C3 art exhibition groupshow with Joachim Blank, Eva Davidova, Meredith Drum, exonemo, Jonas Lund, Sahej Rahal, Ingeborg Wie by panke.gallery (Sakrowski).

Vierjahresrückblick des CCC (de)

Nix los und viel zu tun

Anna Biselli, Henning

Über die letzten vier Jahre sind in der Nautosphäre um den Chaos Computer Club, Deutschland, Europa und der Welt aufregende, irritierende, bemerkenswerte und empörenswerte Dinge passiert, bei deren Einordnung wir gerne helfend zur Seite stehen wollen. Von Berichten aus den Erfahrungsaustauschkreisen über die digitalen Hausbesuche bei den Luca-Apps dieser Welt, von kleinen und riesengroßen Hacker-Veranstaltungen zu den inzwischen schöne Tradition gewordenen Gutachten für unser Verfassungsgericht wollen wir in vielen kleinen Wortmeldung ein rundes Bild zu den Entwicklungen der letzten vier Jahre und einen Ausblick auf das Jahr 2024 geben.

Chatkontrolle - Es ist noch nicht vorbei! (de)

Eine Tragödie in X Akten

Dr. Patrick Breyer, khaleesi, Prof. Ulrich Kelber

In diesem Vortrag wollen wir auf die letzten knapp drei Jahre Kampf gegen die Chatkontrolle zurückblicken. Ein Kampf, der genauso droht zu einem Wiedergänger zu werden wie die Vorratsdatenspeicherung. Wir waren auf eine harte Auseinandersetzung um Überwachung und sichere Kommunikation vorbereitet. Als Patrick 2020 angefangen, hat uns vor dem, was da kommt, zu warnen, haben wir nicht erwartet, dass es sich zu einer Tragödie entwickeln würde, in der es nicht um Kinderschutz oder Überwachung geht. Sondern um eine Kommission, der jedes Mittel recht ist. Und Korruption und Lobbyskandal.

On Digitalisation, Sustainability & Climate Justice (en)

A critical talk about sustainability, technology, society, growth and ways ahead

Maja Göpel

The aim of this talk is to critically analyse the use of digital technology in the current context of global ecological injustice and the collapse of ecosystems. But how can we strive for and promote a sustainable, just and democratic digital future? The challenges are huge and include the digital world's hunger for energy as well as the exploitative global practices of tech companies or the discussion of the current AI sustainability hype. But which digital tools make sense, which do not and how can we achieve global social emancipation from self-destructive structures and towards ecological sustainability and a and a just world?

Heimlich-Manöver (de)

Best of Informationsfreiheit & Gefangenenbefreiung

arnese

Wie umgehen mit der politischen Verzweiflung? Was tun, wenn der Staat keine der Krisen wirklich noch bekämpfen kann, sondern nur neue erzeugt? Reicht es noch, für Transparenz zu kämpfen? Das Beste aus dem letzten Jahr – nein, aus den letzten vier Jahren! – FragDenStaat und Informationsfreiheit. Wir plaudern aus dem Nähkästchen von verlorenen Klagen gegen Frontex über Nazis im EU-Parlament bis zu den Pimmelgate-Akten und darüber, wie aus einer kleinen Recherche die größte Gefangenenbefreiung der deutschen Geschichte wurde.

What your phone won’t tell you (en)

Uncovering fake base stations on iOS devices

lukasarnld

Your phone’s internal communication contains precious data. It can be analyzed to detect fake base stations used in cellular attacks. For that, we reverse-engineered a proprietary communication channel between the phone’s OS and modem.

Prompt Battle (de)

Ella Zickerick, Lina Schwarzenberg, Sebastian Schmieg

Do you have what it takes to become a Prompt Designer? Based on the Rap Battle format, Prompt Battle is a game show in which people compete against each other with the performative use of language. AI-supported text-to-image software enables the candidates to generate complex photos, images, and illustrations, seemingly out of thin air, by typing in image descriptions, so-called prompts. The audience will decide who will elicit the most surprising, disturbing or beautiful images from the latent space, and who will walk away carrying the prestigious title Prompt Battle Winner.

Saal Granville

Von der ePA zum EHDS: 7 Thesen zur aktuellen digitalen Gesundheitspolitik (de)

bkastl, Daniel Leisegang

Karl Lauterbach und die EU-Kommission haben eines gemeinsam. Beide wollen in Windeseile die Digitalisierung des Gesundheitssektors voranbringen. Die elektronische Patientenakte soll im Januar 2025 für alle Bundesbürger:innen kommen. Im gleichen Jahr ist der Start des sogenannten Europäischen Gesundheitsdatenraums geplant.

Einführung in Smartphone Malware Forensik (de)

Wie man Stalkerware und Staatstrojaner auf Smartphones finden kann

vik3000

Smartphones sind in den letzten zehn Jahren zu einem allseits beliebten Angriffsziel geworden, sei es für Stalkerware, Staatstrojaner oder Banking-Malware. In diesem Vortrag wollen wir einen Überblick geben, mit welchen Techniken und Open-Source-Tools man auf Smartphones (unter iOS und Android) auf die Jagd nach Malware gehen kann. Im Anschluss findet ein Workshop mit einem praktischen Teil zum Ausprobieren einiger dieser Techniken statt.

Gläserne Geflüchtete (de)

Mit Computern das Leben zum Schlechteren verändern

Anna Biselli

Digitale Bezahlkarten, Migrationsvorhersage mit sogenannter KI, digitalisierte Grenzen zur Festung Europa und immer mehr davon. Ein Überblick, wie Digitalisierung jenseits des öffentlichen Aufschreis genutzt wird, um den Pull-Faktor Menschlichkeit zu drücken.

Finding Vulnerabilities in Internet-Connected Devices (en)

A Beginner’s Guide

Christoph Wolff, Pascal Zenker

This introductory session will outline the process of hacking internet-connected devices, with the help of a real world example: Poly telephones and conference speaker systems. We will explain vulnerabilities we identified in them and how they can be leveraged to transform the devices into wiretaps.

About Gamma-Ray Bursts And Boats (en)

What We (Don't) Know About the Most Energetic Events in the Universe

Annika Rudolph, Sylvia Zhu

In October 2022 a gamma-ray burst dubbed the 'Brightest Of All Times' smashed records. But what is that actually, a gamma-ray burst? How do we detect it? And why was the BOAT so special?

How Many Planets in Our Solar System? Glad You Asked! (en)

How Astronomy Knew 6 Planets, Then Found 20 More, Then Went Back To 8 (For Now)

Michael Büker

The Solar System has had 8 planets ever since Pluto was excluded in 2006. This has made a lot of people very angry and been widely regarded as a bad move. But did you know Neptune was discovered as the 12th planet? Or that, 80 years before Star Trek, astronomers seriously suspected a planet called Vulcan near the Sun? This talk will take you through centuries of struggling with the question: Do you even planet?!

Writing secure software (en)

using my blog as example

Fefe

I have previously given talks about security principles and approaches like Least Privilege, TCB Minimization, and Self Sandboxing. The most frequent feedback has been "I don't know how to apply this in practice". So, in this talk, I will show how I applied those principles in a real-world software project: a CRUD web app. My blog. I introduced dangerous attack surface on purpose so I could some day give a talk about how to apply these techniques to reduce risk. This is that talk. I will also introduce the concept of append-only data storage.

Reconstructing game footage from a Game Boy's memory bus (en)

The GB Interceptor

DiCon

How do you capture a video from an 1989's Game Boy without modding the original hardware? With an adapter cartridge that spies on the memory bus! Let's talk about how to reconstruct the Game Boy's memory state, emulate its graphics unit and then encode the image into an MJPEG stream for anyone to use as a USB video class device. In realtime. On an rp2040 microcontroller.

How to build a submarine and survive (de)

Wie wir mit begrenzten Mitteln ein U-Boot gebaut haben und was ihr draus lernen könnt.

Elias, quirsh

3,4 Tonnen schwer, 4,3 Meter lang, Material: Stahl, Farbe: Orange und der Fahrzeugtyp ist „Sporttauchboot”. Vom Fund eines Drucktanks bis zum ersten Tauchgang auf den Grund eines Tagebausees – wir erzählen von unseren größten Herausforderungen sowie Fehlschlägen. Wir laden euch ein zu einem technischen Beratungsgespräch für alle, die schonmal mit dem Gedanken gespielt haben, ein U-Boot zu bauen.

Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices (en)

A Dive into Reverse Engineering and Understanding the iPod Touch

Martijn de Vos

This talk presents QEMU-iOS, an open-source emulator of legacy Apple devices. I outline the process of emulating an iPod Touch 2G, discussing the technical challenges and reverse engineering methodologies applied. The talk starts with an overview of the project's goals and then outlines the reverse engineering process, utilizing tools like Ghidra for disassembling the Apple bootloader, XNU kernel, and other binaries. Then, I describe QEMU, a popular framework for emulation, and show how essential iPod Touch peripherals such as the touchscreen, storage, and display have been implemented. Finally, this talk touches upon the implications of open-sourcing this project, its contribution to the emulation and reverse engineering landscape, and its potential for future efforts to emulate newer Apple devices.

Saal Zuse

Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales (en)

cerebro, e7p, Steffen Becker

Ensuring the integrity of Integrated Circuits (ICs) against malicious hardware Trojans is paramount for secure electronic devices. One approach involves imaging the manufactured chips to compare them with their original design files. While such techniques for detecting Trojans are relatively well-known in the industry, there is a notable absence of comprehensive, publicly available case studies. To bridge this gap, we unveil a Red Team vs. Blue Team case study on hardware Trojan detection across four digital ICs in various modern feature sizes. We share our findings, algorithms, and image datasets, shedding light on the efficiency of these techniques, and offer insights into the impact of technology scaling on detection performance.

Numerical Air Quality Modeling Systems (en)

a journey from emissions to exposure

Johannes Bieser, Martin Otto Paul Ramacher

High performance computing (HPC) in environmental science is usually associated with research on climate change, investigating the impact of atmospheric greenhouse gases (GHG) over the next century. Besides these GHGs, there are many other gases and aerosolos in the atmosphere, which have a much more direct and immediate impact on human health: air pollutants.

Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure (en)

Adam Batori

Following the failure and easy exploitation of the AACSv1 DRM on HD-DVD and Blu-ray, AACS-LA went back to the drawing board and announced the next generation AACSv2 DRM scheme, launching alongside 4K UHD Blu-ray in 2015. Since then, nearly no information has come out publicly about any vulnerabilities or even the algorithms themselves, owing in large part to software players requiring the use of Intel SGX secure enclave technology, which promises integrity and confidentiality of AACSv2 code and data through local and remote attestation mechanisms. Join us as we explore the broken history of AACS, describe practical side-channel attacks against SGX, and present the first look into the inner workings of AACSv2 DRM, culminating in a demonstration of the first full compromise of AACSv2 and unofficial playback of a UHD-BD disc.

Seeds of Change (en)

Unlearning & Radical Collective Change in Online Communities

Dorian Cavé

Let's explore how online communities of activists can help to bring about forms of radical collective change, through decolonial practices of social (un)learning. What enabling conditions need to be put in place? And what counts as "radical change" in the first place?!

RFC 9420 or how to scale end-to-end encryption with Messaging Layer Security (en)

Konrad Kohbrok, Raphael Robert

They call it RFC 9420, we say MLS: A new IETF standard for end-to-end encryption was published in July and brings large improvements in performance and security compared to existing protocols. We are here to present Messaging Layer Security, its ecosystem and its roadmap. The MLS protocol is already being used in production to end-to-end encrypt Webex conference calls and will soon provide encryption for Android messages and RCS 2.0 for billions of users. Other messaging tools (such as Discord, Matrix, Wire, etc.) are currently trialing MLS and are expected to follow. Why was the protocol developed in the first place? How does it work? What are the next steps for MLS?

Gut feelings: Can we optimize lifestyle, diet and medication according to our respective microbiota? (en)

Sofia Kirke Forslund-Startceva

Why do some people stay fit and healthy easier than others, even when following the same health advice? Why does the same medication work well in one person, but not in another? Some of our individuality in these regards may trace to which bacteria we carry in the soil of our intestinal gardens. In this talk, drawing on work by my own research lab at the Charité and on that by our collaborators and rivals elsewhere in the world, I outline what we know, what we speculate, and what obstacles remain in the way of widespread adoption of personalized health prevention through microbiome sequencing.

Ecocide and (green) colonialism in Sápmi (de)

Data centers on indigenous land in Northern Europe

Kim, Maris

What is Sápmi? And who are the Sami people? Why is their land threatened by the so-called Green Transition? Why is Europe's largest data centre being built on their land? We would like to try to answer these questions and explain in detail why "our green transition" is a threat to the land and rights of the Sami people. We will also discuss the so-called green server infrastructure in Sápmi for example the largest data centre in Europe (by Facebook). We are from the Decolonise Sápmi info tour through Germany and not Sámi ourselves. Our talk is based on presentations given by Sámi people during our tour.

DevOps but for artworks in museums (en)

A look into pipelines ending in museums and not in the cloud

obelix

In the original Hacker Ethics, Steven Levy stated that "you can create art and beauty on a computer". That was 40 years ago, creating art and beauty is one thing, but how do you maintain or develop it as a gallery, archive or museum? You know all about CI/CD and deploying to "the cloud"? Well, let me show you how to deploy to a museum or art space. Important note: this talk is not about NFTs.

Gemeinsam gegen rechten Terror! Aber wie? (de)

Vortrag und Lesung

Caro Keller (NSU-Watch)

Die zwölf Jahre seit der Selbstenttarnung des NSU haben gezeigt, dass auf den Staat bei der Aufklärung und Aufarbeitung von rechtem Terror kein Verlass ist. Deshalb haben Betroffene von rechter Gewalt, Antifaschist\*innen und Zivilgesellschaft diese Aufgabe wieder und wieder selbst in die Hand genommen. Die daraus gewonnenen Analysen, die Aufklärung und die entstandenen solidarischen Netzwerke sind vielfältiger, als sich viele am Anfang vorgestellt haben. Doch wir wollen fragen: Was können nächste Schritte sein? Wie können wir rechten Terror verhindern?

Unlocked: PICing a wireless door access system (en)

sre

Mainframe, Oldenburg's Hackerspace, needed a wireless door lock solution. We do not trust vendors advertising promises about the device security and had a closer look.

Buffered Daemons (en)

Sound art performance exploring the concept of translation and containers by in both digital and analog realms

Pedro A. Ramírez

The work titled Buffered Daemons is a sound performance that attempts to explore the concepts of translation and non-local interaction in the sound realm. It does so by playing with the idiosyncrasies of audio representation/playback and mobilises them through the creation of an expanded musical situation.

Stream: Prompt Battle (de)

(Live-Stream of Saal 1) Do you have what it takes to become a Prompt Designer? Based on the Rap Battle format, Prompt Battle is a game show in which people compete against each other with the performative use of language. AI-supported text-to-image software enables the candidates to generate complex photos, images, and illustrations, seemingly out of thin air, by typing in image descriptions, so-called prompts. The audience will decide who will elicit the most surprising, disturbing or beautiful images from the latent space, and who will walk away carrying the prestigious title Prompt Battle Winner.

Bits & Bäume Workshop Space

Selforganized Sessioins with the tool Openki.net (de, en)

Lessons4Action: Zwischen Zynismus, Apokalypse und Lastenfahrrad (de)

Für die Akzeptanz von Maßnahmen gegen den Klimawandel, die Motivation zu politischer Partizipation bzw. zur Änderung eigenen Verhaltens ist das Wissen über die Grundlagen des Klimawandels zwar notwendig, aber nicht hinreichend. Ich möchte Bildungsmaterial und -erfahrungen aus einem Schülerlabor teilen, in dem ich versuche die Lücke zwischen Wissen zum Klimawandel und tatsächlichen Handeln etwas zu verkleinern. Konkret bringe ich die Treibhaustaler mit, ein Veranschaulichung aller emissionsrelevanten Handlungen eines typischen Tages: Individuelles Handeln ist relevant, strukturelle Verändeungen sind notwendig.

Gesellschaft für Freiheitsrechte: Friends & Donor Meet up (en)

As a donor-funded organization we particularly appreciate people who support us with regular or one-time donations and in doing so sustain our work.

Recent Attacks against Net Neutrality: Why Telcos never learn (en)

socialhack

Garden Hacks (Open Source Gärtner:innen-Treffen) (en)

Dies ist unser offenes Open Source Gärtner:innen Treffen. Nach einem kurzen Input gibt es Raum für Feedback, was gefällt euch an den Open Source Gardens, was könnte besser sein, wo wollen wir hin, was können wir gemeinsam erreichen etc?

Running a NGO on FreeSoftware (en)

Can organisations with limited resources be digitally sovereign and still provide modern services? It is not trivial, but the FSFE proves it's possible. In this workshop we want to share our story and hear from you how you are running your NGO on FreeSoftware.

Ecocide and (green) colonialism in Sápmi Q&A Video-Live-Session (en)

Dies ist die Live-Video Q&A-Session zum Talk "Ecocide and (green) colonialism in Sápmi"

Gluon Meetup (de)

Auch dieses Jahr wollen sich die auf dem Congress anwesenden Entwicklerinnen und Anwenderinnen zu aktuellen Gluon Themen austauschen.

Der (humanitäre) Preis ist heiß (de)

Wer kennt sie nicht noch, die nervtötende Ode an den Kapitalismus „Der Preis ist heiß“.

How to get out of any git situation with these 3 commands (en)

Stonewall IO

Offene Workshop-Sessions Tag 3 | Open workshop sessions day 3 (de)

DE: Während dieser Session ist der Workshopraum für alle offen, die sich hier treffen möchten. Er soll ein Raum für produktiven Austausch sein. EN: During this session, the workshop room is open to anyone who would like to meet here. Our room is meant to be a space for productive exchange.

Haecksenfrühstück (de)

Gemeinsames Frühstück für FINTA, die Haecksen werden möchten

Philhaecksen Memorials (de)

naerrin, Smettbo

Vielleicht kennst du schon die Haecksen-Memorials: https://www.haecksen.org/memorials/ Das sind anfassbare, toll aufbereitete Kunstwerke in Form von Tafeln und Elektrobasteleien, die die Arbeiten von wichtigen FINTA Personen aus der Technikgeschichte darstellen und näher bringen. Hieran wollen wir anknüpfen und Memorials von FINTA Personen beisteuern, die tolles in der Philosophiegeschichte geleistet haben. Denn genauso wie in der Technikgeschichte werden in der Philosophiegeschichte nicht cis männliche Menschen gerne rausgeschrieben, d.h. es wird nicht erwähnt, dass es sie gibt oder ihre Werke werden Männern zugewiesen. Mit unserem Memorials Projekt wollen wir genau darauf aufmerksam machen.

CCCrip Auskotzrunde (de)

Helga Velroyen, Katta, lavalaempchen, Oliver Suchanek, pascoda (she/her)

Zielgruppe für diesen Workshop sind be_hinderte Congress-Besucher:innen (CCCrips). Eine Hackspace- oder C3-Mitgliedschaft ist komplett optional. Wir wollen uns untereinander kennenlernen, Erfahrungen austauschen, und Pläne schmieden! Weltherrschaft, anyone?

Introductory Workshop to Containers! (en)

Drakulix

Containers appear to be ubiquitous to almost all software development these days. But what are they? After a short introduction on the technology we will get hands on with Docker to run existing container images, building our own, connect them to eachother and gently tap into all the powerful features they provide.

Experimentelles Spiel zur IT-Netzwerk Kommunikation (de)

Bücherratten

Ich möchte gemeinsam mit euch ein experimentelles Netzwerkspiel spielen. Dabei geht es darum die Kommunikation zwischen Computern spielerisch nachzuahmen um so zu verstehen wie Pakete zwischen Computern und Netzwerken transportiert werden. Wir werden TCP, UDP simulieren und erfahren was passiert, wenn der Router mal nicht aufpasst. Ich möchte einen alternativen unvollständigen Weg zum begreifen von Netzwerk Kommunikation anbieten. IPoAC inklusive.

Zeit für Papier, Bretter und Spiele | Time for Games (de)

naerrin

**DE** Offener Abend, wo wir Platz bieten, damit Leute sich für gesellige Spiele treffen können, ob Pen and Paper, Brett- oder Kartenspiele... kommt an die Tische, lasst euch in den Sitzecken nieder und tut gemeinsam lustige Dinge. Natürlich so lang die Nacht euch begeistert. ------ **EN** Open evening where we offer space for people to meet for social games, whether pen and paper, board or card games.... come to the tables, settle down in the sitting areas and do fun things together. As long as the night excites you, of course.

FOSS-HW Workshop Area [CDC Saal 3]

Intro to Open Event Management and Tech Exchange (Marco A. Gutierrez, Mario Behling) (en)

The new version of the open source event system eventyay is currently being developed and we will release the first version in February. In this discussion, the maintainers will share about the development plan for the next 12 months , focusing on enhancement features and AI capabilities.

Hacking the Orb (en)

Uniquely identifying real users is a problem as old as the Internet. With the recent surge in AI language and vision models, CATCHAs might be close to losing the bot-mitigating fight. But how can you know your users are human without fully surveilling them? Perhaps we could use… Iris scanners and zero knowledge proofs? Which is precisely the approach that Worldcoin takes. However, building such a system is fraught with security and privacy challenges. In this talk, I’ll focus on the Orb’s operating system security properties and privacy defenses.

TraceTogether or TrackTogether? (Joyce Ng) (en)

We do an analysis of TraceTogether, Singapore's COVID-19 contact tracing system, its protocol and technical implementation, as well as a look at alternative protocols and implementations for contact tracing systems. We also discuss privacy concerns relating to the collection of contact tracing data and centralized nature of the TraceTogether system.

Miniscript Workshop - Explore the Next Level of Bitcoin Wallet Security (en)

Discover how a miniscript can revolutionize your Bitcoin self-custody experience. The workshop can be followed as a presentation, but you are welcome to take your computer and to setup the wallets and test everything by yourself. Requirements are listed below.

Leveraging ptrace for Proactive Proxy Leak Prevention (Workshop) (en)

Explore our project's use of ptrace in Golang for proactive proxy leak prevention. We intercept and analyze system calls universally across Linux applications, ensuring comprehensive coverage and enhancing user privacy and security by preventing network socket system call leaks.

Pocket Science Lab Introductory Workshop (Alex Bessman, Marco A. Gutierrez) (en)

The goal of this workshop is to introduce participants to the PSLab and to enable them to conduct experiments using sensors as well as to control small servos of mini robots. PSLab website: https://pslab.io

Breaking into Wireless Smart Homes, Z-Wave example (en)

This talk will cover different attack vectors on a Z-Wave network and describe how the protocol evolved to mitigate those threats. Many smart homes are still vulnerable to the described attacks.

Open Security Token Nitrokey and the Trussed Cryptographic Firmware (de, en)

Trussed is Modern Cryptographic Firmware from Solokeys and Nitrokeys based on Rust. This is an introduction and overview of the status of Trussed.

Round Table [CDC Saal 3]

testing CLI sending data over the NYM mixnet decentralised infrastructure (en)

Be a alpha tester for the NYM VPN You can follow the instructions here: https://nymtech.net/developers/events/37c3/welcome.html

Using enclaves for trustable off-chain compute (en)

A group discussion considering if we can use trusted enclaves like Intel SGX for ensuring the integrity of off-chain computations. This would be particularly useful for non-deterministic processes like machine learning models, and for hyperstructure-funded server deployments that require a public trust chain to ensure integrity.

Mobile phone privacy with silent.link S1E03 (Workshop)

ZeroKYC Anonymous eSIM service: security and privacy implications for mobile users. Use cases. Advantages and limitations. Questions and answers. Hands-on experience.

Escaping the Multicall of Madness (how to read data from EVM blockchains in style) (de, en)

Reading data from the blockchain can be a PITA when you have to juggle with RPC calls, dependent requests and computation. I'll present the common patterns to get on-chain data to the client and even do some read computation in EVM!

Reinventing Modbus Protocol (en)

Despite being a relic from the 70s, Modbus is still widely used in home and building automation applications due to its simplicity and interoperability. It is also extremely cheap to implement in hardware, making it a common choice for most related DIY projects. Unfortunately, due to its client-server architecture, the central controller of an installation must resort to polling to retrieve data and events from end devices. For some devices, like motion detectors or simple wall switches, this results in a significant delay between user input and the corresponding action. In short, Modbus installations can be terribly slow.

Making Smart Home devices great again (en)

During this workshop we will build simple smart home devices using the Z-Wave protocol. We will also discuss smart home controllers and protocols diversity: Z-Wave, Zigbee, Thread, Matter.

Nym Nodes workshop (en)

Do you run or want to run a Nym Node? Do you have any experiences with running a Tor exit relay? Join Nym operators workshop and discussion at 19:00 at CDC (Hall 3)

Tea Session: Enjoy a cup of tea and chat with the FOSSASIA community (en)

Fireshonks

Bird Clock Opera/ w text from Days Of The Week (en)

Prism Obsidian

The texts for this piece were originally written as part of a revision of the Homeric Hymn to Demeter; a revision which broadens the picture of Black women who are descendant of colonial enslavement. A dialogue based on the contrast of Artemis’ power and agency over her body compared to women who have been unsafe for generations. Women who carry these wounds as warnings and a call out for accountability. The underlying track called ‚Xercathalon’s Debut: A Bird Clock Opera, is a piece based on the sounds of childhood as remembered and incorporated into this collaborative soundscape. The question works such as these answer is a soft approach towards understanding the people that 37C3 wants to become more diverse towards. Diversity, equity and inclusion are more than catchy phrases. They don't happen overnight, but through art and literature there are greater options for briding understanding.

Klänge coden: Eine Einführung in Supercollider (de)

modern_dragon

Mit der Programmiersprache SuperCollider komponiere ich seit einigen Jahren elektronische Musik, Klangkunst und Sound Design. Dieser Talk ist eine kurze, praxisbezogene Einführung ins Klangbasteln mit Code.

Try Mental Health Care - zuhause (de)

Wawuschel

Wir sollten uns alle mehr Zeit für Mental Health Care nehmen, also mehr für unsere psychische Gesundheit tun. Ich zeige Euch, mit welchen einfachen Schritten das auch zuhause geht... Und wie und wo Ihr professionelle Hilfe dabei findet, wenn Ihr sie braucht - und warum die klassischen Therapiemethoden bei neurodiversen Menschen oft nicht so gut funktionieren.

Die Wissenschaft vom Whisky (de)

Lars Fischer

Mit einem Glas in der Hand durch die Chemie und Physik eines überraschend komplizierten Getränks

Encapsulated Electromyography with Myo and Raspi (en)

Alex Leitch, Celia Chen

Let's talk ten year old tech! The myo armband was once a really strange way to control a computer, and then became a way to do fine-grained myomuscular electrical detection research. This is a talk about how to hook a myo to a Raspberry Pi 3B+ in 2023, and from there how to have the armband communicate over serial to other devices. We choose to use it to control a Programmable Air system for pneumatic control of muscular robots.

Bringing the Hack Back into the Chaos (en)

Daniel Maslowski

While more and more hackerspaces have been founded in the recent years, there are many different topics that are being discussed at the same time: AI, 3D printing, Arduino, social and political questions, and lots more. Where are the hacks though? Things are happening, and with this talk, we want to talk about them and call for exchange.

Sendezentrum Podcast Table (X12)

Comeflywithus Podcast - live @congress (de)

Olli und Steffen

Eine neue Episode des Fliegerpodcasts "Comeflywithus": Olli und Steffen sprechen auf dem 37c3 über das Thema "GPS Spoofing - Wenn das Flugzeug-Navi eine plötzliche Abzweigung nimmt".

Das Congress-Mindset (de)

mehrlachen

In diesem Podcast soll das Besondere am Congress-Mindset beschrieben werden und quasi als Berichterstattung für die Hörerschaft des Podcast Caller Lounge dienen. Die Caller Lounge ist der erste und bislang einzige deutschsprachige Square Dance Podcast. Was macht die Community auf dem Congress, im Sendegate und den Chaos-nahen Projekten aus? Was sind die Eigenschaften? Was und wer sind die Katalysatoren? Welches Mindset benötigt es? Gibt es Erfahrungswerte beim Anleiten anderer Gruppen oder organisieren anderer Veranstaltungen das erlebte Mindset auf andere Communities zu übertragen. Kann man ein Mindset schaffen?

Rosenpass Update (en)

ajuvo

News from Project Rosenpass, with ajuvo and dakoraa, and a special guest, congress edition

Offene Werkstätten und Freiräume - best practice und lessons learned (de)

Knurps

Offene Bereiche zu gestalten, mit Leben und Sinn zu füllen stellt die Akteure regelmäßig vor die unterschiedlichsten Herausforderungen. Im Podcast werden Erfahrungen aus 8 Jahre Aufbau-Phase zusammengefasst.

Radio Capitol - Der Rewatch Podcast (de)

MacSnider

Wir schauen und kommentieren die Serie Stromberg, Folge für Folge. Ein Rewatch Podcast von Fans für Fans!

Archived page - Impressum/Datenschutz