You must be logged in to use the filter favorited.
You must be logged in to use the filter favorited.

Schedule

Der Hub wird spätestens Ende Januar archiviert, alle nutzerbezogenen Inhalte, Boards und auch einige Wiki-Seiten werden dabei entfernt. Alle öffentlichen Assemblies, Projekte und Veranstaltungen bleiben. // The hub will be archived by end of January. All user-provided content, boards and several wiki pages will be deleted. All public assemblies, projects and events will remain.
Schedule




















 

Day 3
13:00

13:30

14:00

14:30

15:00

15:30

16:00

16:30

17:00

17:30

18:00

18:30

19:00

19:30

20:00

20:30

21:00

21:30

22:00

22:30
(Outdoor) Ballooning with antennas (en)

chris

We meet indoors at CDC Circle and go outside to launch some comms infrastructure on a tethered balloon. As every Star Trek fan knows, humans are "ugly bags of mostly water" [S1E18] so RF communication in areas densely packed with humans - or their infrastructure made of metal and stone - is problematic. We'll explore ideas to overcome or mitigate this problem, ideas that are possible due to miniaturisation of RF devices and their constraints.

State of the Decentralization in Industry (en)

Diego Salazar

Come hear about how decentralization is used and viewed in commercial projects, and how you can make a difference in real-world adoption.

The CDC Badge: conference badge & devboard with TROPIC01 and ESP32-S3 (en)

dllud, bobotronic

Electronic conference badge & devboard by the Critical Decentralization Cluster with: • TROPIC01 secure element • ESP32-S3 microcontroller • e-paper display with frontlight • battery charging IC and LiPo battery • 12-button keypad • Lots of IO: RasPi header, Grove, SAO https://github.com/riatlabs/cdc-badge

Talk with Industry Cryptographers and Developers (en)

Diego Salazar

Real-world industry cryptographers and developers working on open-source projects, codebases, and research sit down to listen and answer your questions about how they got started, what they're doing, and how they make a difference.

Leveraging LLMs for Preventing De-anonymization: Occlumask (en)

Alice Margatroid

Personal data leaks can happen to the best of us. A unique development in machine learning gives us the opportunity to catch lapses before they're passed on for the world to see. This talk covers how Occlumask works and its developments so far.

Occlumask Demo & Brainstorming Session (en)

Jeremy Rand, Alice Margatroid

Come and experience Occlumask in action! We want to make sure Occlumask can stand up to whatever situations you might find yourself in. Enter your own text and see if Occlumask can tell whether you're doxing yourself, and suggest what kinds of information Occlumask should be able to detect and notify you of.

SocksTrace: Preventing Proxy Leaks in Your Applications (en)

Robert Mindo

When building privacy-sensitive applications, we often rely on proxies like Tor to ensure that no direct connections escape the intended anonymity network. However, verifying that every part of an application reliably goes through the proxy is surprisingly difficult. Even a single syscall escaping the proxy path can quietly deanonymize a user. SocksTrace is a lightweight proxy-leak detection tool that traces network-related syscalls and validates whether they correctly route through the configured proxy. In this talk, I’ll show how SocksTrace works under the hood, what kinds of leaks it can catch, and why syscall-level inspection is essential for high-assurance privacy tools. I’ll also walk through real-world findings: during our testing, we identified previously unknown proxy leaks in major browsers including Firefox and Brave, one of which resulted in a confirmed bug bounty. These results highlight how subtle proxy routing mistakes can occur even in widely-used, privacy-oriented software.

qaul - Decentralized Off-the-Grid Mesh Communication App (en)

Mathias

qaul is a P2P mesh communication app, with a strong focus on privacy and usability. Every user is identified via their self-sovereign cryptographic identity. It not only communicates P2P, but builds a mesh network, interconnecting multiple communication such as BLE (Bluetooth Low Energy), Local Area Networks, and Internet overlay links. The messaging app has an automated user discovery, end-to-end encrypted direct messaging and group chats for text, voice-messages and files, as well as public communication channels. https://qaul.net

Decentralized Syndication — The Missing Internet Protocol (en)

Tautvilas Mečinskas

The Internet is decentralized by design. It came into being not at once, but in parts.  New protocols were added on top of previous ones, with each new protocol extending and improving functionality of the global network. However one essential protocol is still missing  —  an open way to discover and publish content on the global web.

A Brief History of Keeping Secrets (en)

Brandon Goodell

We walk from ancient Roman times to modern day, discussing the general advancement of applied cryptography across history. We begin with the Caesar cipher, fast forward to the World Wars of the early 20th century, before moving onto the rise and fall of elliptic curve cryptography, including Monero's past, present, and future protocol design philosophy. This talk is informal, intended as a primer for the historically-minded.

Pre-Quantum to Post-Quantum Cryptography (en)

Freeman Slaughter

Quantum computers represent a looming threat to much of the critical foundations of modern cryptography. Post-quantum cryptography (PQC) utilizes hard mathematical problems that we believe resist the so-called "quantum advantage," to preserve security and privacy. In this workshop we will unpack the principles behind the leading PQC families such as lattice and code based constructions, then showcase their implications for cryptocurrencies, digital signatures, and zero-knowledge protocols.

be-BOP: Ethical Commerce, Without the Middlemen (en)

Roos

[be-BOP](https://be-bop.io/) is free and open-source software for **autonomous commerce**. It’s an all-in-one, batteries-included solution built for merchants, not engineers. It lets communities run markets without accounts, tracking, or gatekeepers. From shops to restaurants, ticketing to peer-funding — all self-hosted. Adoption grows among merchants and creators seeking real independence. Next steps: **multitenant** for specialization, **cross be-BOP** for **federation**. We’re building the foundations of a free, federated economy.

Applying cryptoanarchy in individual and communal sovereignty (en)

Mario

Proprietary tech from corporations and surveillance from governments never been more pervasive and it's becoming impossible to deflect it's patterns of control. Refuse the captured system and opt out into the parallel one, embracing FOSS, decentralization and freedom. Let's explore technologies we can use as an actual tools without serving third parties, building independent community coordination and distributed systems that cannot be controlled. Join us to share your stack and tips on surviving without proprietary technologies, banks and big brothers as an individual and a hackerspace.

On the Limits of Decentralization (en)

Ome

A collaborative dialogue to examine and unsettle the philosophical foundations of decentralization. What do we actually mean when we speak of decentralization, and what forms of order, asymmetry or coordination quietly sustain it? Where does decentralization end and centralization begin, and is this opposition as clear as it appears? Beyond familiar binaries such as order and chaos, what assumptions are embedded in the formal systems, protocols and narratives we rely on? What do participants experience when engaging with institutions, infrastructures or rulesets, and what recedes into the background as those systems operate? Through a self-reflective and performative inquiry, this dialogue explores decentralization not as a moral absolute but as a situated and contested design space shaped as much by what it excludes as by what it enables.