You must be logged in to use the filter favorited.
You must be logged in to use the filter favorited.

Schedule

Der Hub wird spätestens Ende Januar archiviert, alle nutzerbezogenen Inhalte, Boards und auch einige Wiki-Seiten werden dabei entfernt. Alle öffentlichen Assemblies, Projekte und Veranstaltungen bleiben. // The hub will be archived by end of January. All user-provided content, boards and several wiki pages will be deleted. All public assemblies, projects and events will remain.
Schedule


































 

Day 2
10:00

10:30

11:00

11:30

12:00

12:30

13:00

13:30

14:00

14:30

15:00

15:30

16:00

16:30

17:00

17:30

18:00

18:30

19:00

19:30

20:00

20:30

21:00

21:30

22:00

22:30

23:00

23:30

00:00

00:30

01:00

01:30

02:00

02:30
Intro to the Critical Decentralization Cluster (en)

Diego Salazar

Welcome and presentation of the CDC.

Intro to Tropicsquare TROPIC01 Workshops at CDC (en)

Introduction to the TROPIC01 Open Source Secure Element and the CDC Badge. Kick-Off of the Workshop series at the Critical Decentralisation Cluster.

Open Legal Q&A with Judith de Boer: "Can I Get Arrested for Writing Code?" (en)

Kirill

Judith de Boer is leading the Alex Pertsev's legal defence team — fighting his "Alex could've thought that his code will be used by criminals, but still wrote it — so he's guilty of criminal conspiracy" verdict from a Dutch court.

iroh p2p chat over gossip (en)

Floris Bruynooghe

In this workshop we'll look at how iroh establishes p2p QUIC connections. Using holepunching to create direct connections where possible. Then we'll build on top of this by using the gossip protocol to build a group chat.

Embedding Anonymity Directly in your Application (en)

idk

A deep dive into using Embedded I2P to seamlessly anonymize your applications

Zero-Knowledge Proofs Workshop (en)

Freeman Slaughter

Zero-knowledge proofs (ZKPs) are reshaping the landscape of privacy, scalability, and trust in decentralized systems. In this workshop, we’ll explore how ZKPs let one party convince another that a statement is true, without revealing anything else about it. We aim to demystify the core ideas behind interactive protocols, walk through modern ZKP constructions, and examine how they’re deployed in cryptocurrencies and modern privacy-preserving designs. Participants will leave with a clear understanding of how the "prove without revealing" paradigm is shaping blockchain technology, verifiable computation, and the next generation of cryptographic standards.

Radicle: P2P, Censorship-Resistant Code Collaboration Based on Git (en)

Lorenz Leutgeb

[Radicle](https://radicle.xyz/) is an open source, peer-to-peer code collaboration stack built on Git. Unlike centralized code hosting platforms, such as GitHub or GitLab, there is no single entity controlling the network. Repositories are replicated across peers in a decentralized manner, and users retain sovereignty over their data and workflow. *Free your code!*

The Bitcoin Security Budget and Its Implications A Look at the Security, Scaling and Spam Resistance of Proof of Work Cryptocurrencies (en)

Francisco "ArticMine" Cabañas

The Bitcoin security budget has profound implications for the long term security of Bitcoin and similar proof of work cryptocurrencies. In this talk we discuss the various types of transaction fee markets for different cryptocurrencies and the possibility of transaction fees replacing falling block rewards to provide security in the future. The results from our analysis of the Monero fee market in particular do pose some very serious questions regarding the long term security and viability of cryptocurrencies that do not have a minimum fixed block reward or tail emission. We will discuss these questions and their implications for the possibility of a worldwide peer-to-peer electronic cash system.

Real World Timestamping With OpenTimestamps (en)

Peter Todd

How is OpenTimestamps used in the real world? We'll explain how it achieves cryptographic timestamping, and show some read world examples of it in use such as the Guatemalan Presidential Election.

Recap and precap of Critical Decentralization Cluster sessions (en)

Diego Salazar

What went on and what is coming next.

Passkeys : the good, the bad, the ugly (en)

btchip

Passkeys are the new hype for easy onboarding, but it's a quite old protocol that has been hijacked for crypto purposes. We'll dig through the standard history, the potentially misleading security expectations, and see how to reverse engineer an implementation to validate its soundness This is a rebroadcast of my devcon 7 presentation (https://archive.devcon.org/devcon-7/passkeys-the-good-the-bad-the-ugly/?tab=YouTube) with some additional details on modern ETH wallets implementations

DIY Bioreactors for mycology and biohacking (en)

Augustin Bielefeld

Augustin Bielefeld, principal engineer at Eilbek Research, has been growing mycelium and other micro-organisms since 2023, and will present his journey building a reproducible and affordable bioreactor, which is destined to be open-sourced. This talk is aimed at people with an interest in mycology/microbiology but the principles demonstrated are accessible to everyone.

"Referendum Citoyen" the revolutionnary app (en)

Alexis Roussel

this talk will present the story behind the "referendum citoyen" app, the ZK tech built by Rarimo team, but also how social movements are embracing cypherpunk tools to engage into challenging the structure of power in a country such France.

XMPP and metadata (en)

mathieui

In this talk, I will cover how XMPP manages metadata, what is technically required for which reason, what could be avoided and with which drawbacks, and do some comparisons with centralized (e.g. signal), other decentralized (e.g. matrix) and other systems trying to solve the same issue.

GNU Boot install party (en)

neox, GNUtoo

Boot software like BIOS or UEFI are usually nonfree. They still run after the operating system is booted and often contain restrictions (like refusing to boot when the WiFi card is replaced) and are usually related to technologies of control like the Management engine or similar. On computers with a Management engine, replacing the nonfree BIOS with GNU Boot also removes the Management Engine operating system. The install party will take place in a room at the GNU Boot assembly location and the maintainers will be available to help you install GNU Boot on a supported computer (see https://www.gnu.org/software/gnuboot/status.html for a list).