SIGINT 2012: CfP endet bald!

DE

Vom 18. bis 20. Mai 2012 findet in Köln zum dritten Mal die SIGINT, die Konferenz für Hacker, Netzbewohner und Aktivisten, statt.

Verpeilerwarnung: Der Beitragsaufruf (“Call for Papers“) ist nur noch wenige Tage, bis Sonntag Nacht (25.03.2012), online. Wenn Du planst, auf der SIGINT einen Vortrag zu halten, solltest Du ihn bald einreichen!

Die SIGINT geht über drei Tage und wird über 60 Vorträge je 45 Minuten anbieten. Zusätzlich gibt es Workshops und natürlich auch ein großes Hackcenter. Projekten und Organisationen, die der Veranstaltung inhaltlich nahe stehen, wird kostenlos Standfläche …

Easterhegg 2012 – Call for Participation – Crossing the borders

DE

Das Easterhegg ist das Hackerfamilientreffen zu Ostern. Dieses Jahr findet es zum ersten mal in der Schweiz, genauer gesagt in Basel statt. Die Teilnehmer kommen aus dem Umfeld des Chaos Computer Clubs und anderen chaosnahen Gruppen.

Für das Easterhegg 2012 suchen wir Einreichungen zu allen chaosrelevanten Themen, wie z.B.:

  • Kreativer Umgang mit Technik
  • Biometrische und genetische Daten
  • System- und Netzwerksicherheit
  • Hackerspaces
  • Energie und das Smart-Grid
  • Hacktivismus, Politik und Lobbyarbeit
  • Kunst mit und um Technik
  • Staatliche Überwachung und die Vorratsdatenspeicherung
  • Bürgerrechte im …

SIGINT 2012: Call for Papers veröffentlicht

DE

Vom 18. bis 20. Mai 2012 findet in Köln die SIGINT, die Konferenz für Hacker, Netzbewohner und Aktivisten, statt.

Unser Beitragsaufruf (“Call for Papers”) ist jetzt online und kann unter http://sigint.ccc.de/Beitragsaufruf begutachtet werden.

Worum es geht? Um die Zukunft, wie schon 2009 und 2010 (2011 fiel die SIGINT aus, um dem Camp den nötigen Platz im Kalender zu geben).

In den letzten Jahren wird die Signaldichte höher, doch obwohl wir immer mehr Input aufnehmen, rücken holistische Entwürfe in immer weitere Ferne, bestimmen Reduktion und Effizienz die Identitäten der Menschen, statt …

GPN11 und GPN12

DE

Liebe Netzgemeinde <3,

Ein bisschen her ist sie, die Gulaschprogrammiernacht 11. Ungefähr 300 Gäste besuchten ca. 30 Vorträge und Workshops und genossen unser Gulasch. Und ein bisschen Dokumentation soll nicht fehlen. Hier also sind die Aufzeichnungen, die wir hier an dieser Stelle noch nicht verkündigt hatten:

Schaut Euch die Bildergalerie an, mit vielen vielen schönen Fotos aus dem Hackcenter:

Nicht zu vergessen die Ergebnisse des Gamejams (Programmiere ein Spiel in …

Public Statement

EN DE

This short message is to establish that we are unwilling to tolerate any sexism, harassment or racism in our community. If you witness the above-mentioned at any of the CCC gatherings, please speak out, back up anyone who has been the target of such behaviour, and encourage your peers to do the same. Please also know that the organizers of any CCC event will support you in doing so.

Sexism and racism contradict the preamble of the statutes of the CCC [1]1 and a public statement of the CCC issued 2005 [2]2. The Chaos Computer Club and the organizers of the Chaos Communication Congress take …

Recordings of 28C3 talks available

EN

The 28th Chaos Communication Congress ended yesterday and most of the talks are already available for download.

http://events.ccc.de/congress/2011/wiki/Documentation

Credit goes to the FEM, who did a really tremendous job streaming the talks during the conference and who still continue their hard work by publishing the Official Releases of the last talks.

Did you really love certain events? Weren’t so excited about others? Let us know! You can leave feedback via the Fahrplan. Find the events you’d like to leave your thoughts on and click on the green “Give Feedback” link in the lower right …

Crypto talk at 28C3: Sovereign Keys – A proposal for fixing attacks on CAs and DNSSEC, Day 3, 23:00, Saal 3

Crypto talk at 28C3: Sovereign Keys – A proposal for fixing attacks on CAs and DNSSEC, Day 3, 23:00, Saal 3

EN

After many attacks on X.509 and the internet PKI infrastructure, it became clear, that the current state does not meet the requirements for the upcoming challenges for secure internet communication in the future. CAs have been completely compromised, and weak cryptography used by PKIs has been broken in practice to issue rouge certificates. So there is a need for an alternative how to establish a binding between your public key and your identity. The EFF will present their proposal to improve the security of SSL/TLS connections this evening at the congress.

See the talk, Day 3, 23:00, Saal 3. …

“Neue Leichtigkeit”

EN

Tonight the young Swiss music group “Europa” is bringing “new airiness” to the 28C3 in the form of a Gala. The main goal is to put in question the practice of the entertainment industry and alienate its conventions by overdriving them. It’s going to be an experiment you can become part of as spectators. Please watch the following teaser. [The teaser has been removed since the server hosting it was a temporary one located at 28c3. Check the vimeo link below or download the recording of the actual talk]

Video: http://vimeo.com/34302758
Link 28C3 Fahrplan: …

Crypto talk at 28C3: TRESOR: Festplatten sicher verschlüsseln, Day 3, 14:30, Saal 2

EN

Some of you may remember the Cold Boot Attack. It’s a general method, how almost all disk encryption schemes on PCs and Laptop can be circumvented.

Usually, when a harddisk or just a partition is encrypted, the encryption software used, needs to store the keys in memory, as long as the filesystem is mounted. Three years ago, it was shown that this key can be extracted, just by removing the RAM module, and dumping it’s content on a second PC using a custom software. Alternatively, the system can be booted from a CD or USB-stick with a custom software, that dumps the content of the RAM. As long …

Crypto talk at 28C3: Implementation of MITM Attack on HDCP-Secured Links, Day 3, 18:30, Saal 1

EN

On Day 3 of 28C3, an absolute crypto highlight will be presented. A Person-In-The-Middle (previously known as Man-In-The-Middle)attack against HDCP-secured links. For those who don’t know, HDCP is a protocol for digital video links like DVI, Display Port and HDMI, that encrypts the content between your PC or Blue-Ray player and your digital TV or display. HDCP was invented so that the encrypted high quality video, as you can find it on a Blue-Ray disc or HD-DVD will never be unencrypted in it’s digital form on the way to the display. If those systems would be secure, this could prevent pirated …

Crypto talk at 28C3: Bitcoin

EN

Two Bitcoin related talks will be presented tomorrow. Bitcoin is a decentralized digital currency, and of course uses various cryptographic schemes as building blocks. Because Bitcoins can be exchanged with real money, Bitcoin is more than just an academic playground and real cash could be lost, if an attack on Bitcoin would be found.

The first talk Bitcoin – An Analysis will be presented by Kay Hamacher and Stefan Katzenbeisser. From the abstract:

In this presentation, we show results on network analysis of the money flow, the behavior of individuals, and the overall scalability of …