Diego Salazar
Welcome and presentation of the CDC.
dllud, Pavel Polach, bobotronic
Electronic hacker badge for the Critical Decentralization Cluster, featuring the TROPIC01 secure element with an ESP32-S3 microcontroller. Meant to be used for workshops and prototyping. It can also be worn as a mobile badge. Features an e-paper display with frontlight, a JST connector for single-cell LiPo batteries and a 12-button keypad. Designed with KiCad and released as open-hardware. https://github.com/riatlabs/cdc-badge
darko
Learn modern OpenPGP with the new RFC 9580 and Sequoia’s sq CLI. In two hours you’ll generate a v6 certificate, create a revocation cert, and practice daily ops: encrypt/decrypt, sign/verify, and publish via WKD/keyservers. We’ll cover Web-of-Trust basics (link vs vouch, trusted introducers, approvals) and note a GnuPG/v4 compatibility path. Optional: quick smart-card demo. Bring: laptop with terminal, email address; Sequoia sq preferred.
Mario Behling
This session looks at where open hardware is heading, starting from recent ground up developments at FOSSASIA and extending to global trends across the open hardware community. With perspectives from FOSSASIA developers and open hardware experts, it explores decentralised collaboration, open silicon and firmware stacks, manufacturing realities, and how openness can be sustained at scale.
freerk
Build your own open-source Bitcoin signing device with a Raspberry Pi Zero, camera and display! We have kits for 45€
Zebra
Free/libre software promotes users' rights, safeguards privacy, individual control over technology and fosters autonomy and decentralisation within our communities. In contrast, proprietary software limits user freedoms leading to centralised monopolies that often misuse their power to oppress and exploit. This imbalance can result in malware, degradation of privacy and service enshitification. Unfortunately, many remain unaware of the unjustices created by proprietary software, but increased awareness and shift towards free software can fuel resistance. Replacing of proprietary software is a crucial first step to liberate users, yet many need support to make this transition successfully. Workshops for system installation, repair centres and tech-savvy friends can offer essential assistance. However, what is the most effective way to offer this support? Which software should be recommended and how to engage the novice users while minimising the challenges associated with the transition? In this workshop we aim to discuss possible strategies of providing information on the path to software freedom. We will examine the installation process and ongoing use of free software within our circles. Key topics will include sparking interest in free distributions, selecting ideal software configuration, and exploring various forms of assistance during installation. Additionally, we'll address onboarding into the new system and troubleshooting potential issues. Finally, we hope to gather and share ideas on streamlining the process for everyone involved.
Alexis Roussel
The right to respect for digital integrity is an emerging right to protect people's digital lives. This talk will introduce this new legal concept, its possible implications for data protection and how this concept is being introduced in the current legal framework. The talk will also be an update of the implementation work with the adoption of the right in the Constitution of Geneva voted with 94% approval rate on the 18th of June 2023 and with 91% in Neuchâtel in November 2024. Zurich will be voting in November 2025.
Diego Salazar
What went on and what is coming next.
Cade Diehm
Digital identity is sold as a path to trust, inclusion, and "digital empowerment." In practice, it is a brittle control surface: a set of design choices that decide who is seen, who is excluded, and who can be targeted at scale. Born from a landmark research project, _The Digital Identity Event Horizon_, this talk describes the 2025 "mask-off moment" for digital identity: the point where multiple comforting narratives collapse and the core use of identity systems as population-management infrastructure becomes hard to deny. Using short vignettes from New Design Congress case-study work (Estonia, the US, Australia, Gaza, and others), it shows how ambiguity, vendor incentives, and governance theatre turn identity into fraud-permissive, coercion-ready infrastructure In response to this decline, this talk concludes proposes a working model of the digital self as a socio-technical system with six properties: serialisation, custodianship, presentation, authentication, authorisation, and assetisation, and offers new framing and threat models to help understand how digital identity creates brittle societies.
PoltoS
This talk will cover Z-Wave (an a bit of Zigbee and Matter) security mechanisms as well as different attack vectors on a Z-Wave network and describe how the protocol evolved to mitigate those threats. Many smart homes are still vulnerable to the described attacks.
Jeremy Rand
Namecoin has been used in the wild for years as a TLS Public Key Infrastructure, and using Tor onion services with TLS has been nearing deployment as well. But what kinds of other PKI wizardry can we do with Namecoin and Tor?
Joshua Babb
A walk-through of how to contribute to open source projects, with Stack Wallet, Monero, and Tor (Arti!) as examples. A quick guide to setting up development environments for each on Linux, macOS, and/or Windows, an update on where each project stands, and a list of big and small tasks to do for each. A "quickstart" guide for newcomers and a survey of outstanding TODOs for more experienced hands.
Alexis Roussel, Casey Ford
This workshop will introduce mixnet technology as a tool to achieve network-level anonymity for internet traffic. We will see hands on how a mixnet works, where the idea came from, and discuss other strategies for protecting privacy online against state and corporate surveillance.