Schedule

Der Hub wird spätestens Ende Januar archiviert, alle nutzerbezogenen Inhalte, Boards und auch einige Wiki-Seiten werden dabei entfernt. Alle öffentlichen Assemblies, Projekte und Veranstaltungen bleiben. // The hub will be archived by end of January. All user-provided content, boards and several wiki pages will be deleted. All public assemblies, projects and events will remain.
Schedule
















 

Day 2
10:00

10:30

11:00

11:30

12:00

12:30

13:00

13:30

14:00

14:30

15:00

15:30

16:00

16:30

17:00

17:30
Intro to the Critical Decentralization Cluster (en)

Diego Salazar

Welcome and presentation of the CDC.

Intro to Tropicsquare TROPIC01 Workshops at CDC (en)

Introduction to the TROPIC01 Open Source Secure Element and the CDC Badge. Kick-Off of the Workshop series at the Critical Decentralisation Cluster.

Open Legal Q&A with Judith de Boer: "Can I Get Arrested for Writing Code?" (en)

Kirill

Judith de Boer is leading the Alex Pertsev's legal defence team — fighting his "Alex could've thought that his code will be used by criminals, but still wrote it — so he's guilty of criminal conspiracy" verdict from a Dutch court.

iroh p2p chat over gossip (en)

Floris Bruynooghe

In this workshop we'll look at how iroh establishes p2p QUIC connections. Using holepunching to create direct connections where possible. Then we'll build on top of this by using the gossip protocol to build a group chat.

Embedding Anonymity Directly in your Application (en)

idk

A deep dive into using Embedded I2P to seamlessly anonymize your applications

Zero-Knowledge Proofs Workshop (en)

Freeman Slaughter

Zero-knowledge proofs (ZKPs) are reshaping the landscape of privacy, scalability, and trust in decentralized systems. In this workshop, we’ll explore how ZKPs let one party convince another that a statement is true, without revealing anything else about it. We aim to demystify the core ideas behind interactive protocols, walk through modern ZKP constructions, and examine how they’re deployed in cryptocurrencies and modern privacy-preserving designs. Participants will leave with a clear understanding of how the "prove without revealing" paradigm is shaping blockchain technology, verifiable computation, and the next generation of cryptographic standards.