chris
We meet indoors at CDC Circle and go outside to launch some comms infrastructure on a tethered balloon. As every Star Trek fan knows, humans are "ugly bags of mostly water" [S1E18] so RF communication in areas densely packed with humans - or their infrastructure made of metal and stone - is problematic. We'll explore ideas to overcome or mitigate this problem, ideas that are possible due to miniaturisation of RF devices and their constraints.
Diego Salazar
Come hear about how decentralization is used and viewed in commercial projects, and how you can make a difference in real-world adoption.
dllud, bobotronic
Electronic conference badge & devboard by the Critical Decentralization Cluster with: • TROPIC01 secure element • ESP32-S3 microcontroller • e-paper display with frontlight • battery charging IC and LiPo battery • 12-button keypad • Lots of IO: RasPi header, Grove, SAO https://github.com/riatlabs/cdc-badge
Diego Salazar
Real-world industry cryptographers and developers working on open-source projects, codebases, and research sit down to listen and answer your questions about how they got started, what they're doing, and how they make a difference.
Alice Margatroid
Personal data leaks can happen to the best of us. A unique development in machine learning gives us the opportunity to catch lapses before they're passed on for the world to see. This talk covers how Occlumask works and its developments so far.
Jeremy Rand, Alice Margatroid
Come and experience Occlumask in action! We want to make sure Occlumask can stand up to whatever situations you might find yourself in. Enter your own text and see if Occlumask can tell whether you're doxing yourself, and suggest what kinds of information Occlumask should be able to detect and notify you of.
Robert Mindo
When building privacy-sensitive applications, we often rely on proxies like Tor to ensure that no direct connections escape the intended anonymity network. However, verifying that every part of an application reliably goes through the proxy is surprisingly difficult. Even a single syscall escaping the proxy path can quietly deanonymize a user. SocksTrace is a lightweight proxy-leak detection tool that traces network-related syscalls and validates whether they correctly route through the configured proxy. In this talk, I’ll show how SocksTrace works under the hood, what kinds of leaks it can catch, and why syscall-level inspection is essential for high-assurance privacy tools. I’ll also walk through real-world findings: during our testing, we identified previously unknown proxy leaks in major browsers including Firefox and Brave, one of which resulted in a confirmed bug bounty. These results highlight how subtle proxy routing mistakes can occur even in widely-used, privacy-oriented software.
Mathias
qaul is a P2P mesh communication app, with a strong focus on privacy and usability. Every user is identified via their self-sovereign cryptographic identity. It not only communicates P2P, but builds a mesh network, interconnecting multiple communication such as BLE (Bluetooth Low Energy), Local Area Networks, and Internet overlay links. The messaging app has an automated user discovery, end-to-end encrypted direct messaging and group chats for text, voice-messages and files, as well as public communication channels. https://qaul.net
Tautvilas Mečinskas
The Internet is decentralized by design. It came into being not at once, but in parts. New protocols were added on top of previous ones, with each new protocol extending and improving functionality of the global network. However one essential protocol is still missing — an open way to discover and publish content on the global web.
Brandon Goodell
We walk from ancient Roman times to modern day, discussing the general advancement of applied cryptography across history. We begin with the Caesar cipher, fast forward to the World Wars of the early 20th century, before moving onto the rise and fall of elliptic curve cryptography, including Monero's past, present, and future protocol design philosophy. This talk is informal, intended as a primer for the historically-minded.
Freeman Slaughter
Quantum computers represent a looming threat to much of the critical foundations of modern cryptography. Post-quantum cryptography (PQC) utilizes hard mathematical problems that we believe resist the so-called "quantum advantage," to preserve security and privacy. In this workshop we will unpack the principles behind the leading PQC families such as lattice and code based constructions, then showcase their implications for cryptocurrencies, digital signatures, and zero-knowledge protocols.
Roos
[be-BOP](https://be-bop.io/) is free and open-source software for **autonomous commerce**. It’s an all-in-one, batteries-included solution built for merchants, not engineers. It lets communities run markets without accounts, tracking, or gatekeepers. From shops to restaurants, ticketing to peer-funding — all self-hosted. Adoption grows among merchants and creators seeking real independence. Next steps: **multitenant** for specialization, **cross be-BOP** for **federation**. We’re building the foundations of a free, federated economy.
Mario
Proprietary tech from corporations and surveillance from governments never been more pervasive and it's becoming impossible to deflect it's patterns of control. Refuse the captured system and opt out into the parallel one, embracing FOSS, decentralization and freedom. Let's explore technologies we can use as an actual tools without serving third parties, building independent community coordination and distributed systems that cannot be controlled. Join us to share your stack and tips on surviving without proprietary technologies, banks and big brothers as an individual and a hackerspace.
Ome
A collaborative dialogue to examine and unsettle the philosophical foundations of decentralization. What do we actually mean when we speak of decentralization, and what forms of order, asymmetry or coordination quietly sustain it? Where does decentralization end and centralization begin, and is this opposition as clear as it appears? Beyond familiar binaries such as order and chaos, what assumptions are embedded in the formal systems, protocols and narratives we rely on? What do participants experience when engaging with institutions, infrastructures or rulesets, and what recedes into the background as those systems operate? Through a self-reflective and performative inquiry, this dialogue explores decentralization not as a moral absolute but as a situated and contested design space shaped as much by what it excludes as by what it enables.
Pavel Polach
Let's program it on the badge.
Jitter
Let's build mesh radios from scratch. We will bring 20 PCB kits, containing all parts. Soldering is difficult but doable in the Congress. You have to be very proficient with soldering to get this done during Congress, but the Eternal Soldering Workshop is open and nearby. We also have solder paste and stencils for the real pros! If you don't want to get into soldering now, you can take one of the kits home. During the workshop you will get to know everything necessary to get the job done.
Robert Mindo
Join us for a practical session on auditing network traffic. In this workshop, you will learn how to use SocksTrace to intercept, analyze, and socksify applications.
Zerocat
Introduction into chip flasher device history and operation - get trained!