<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>crypto on CCC Event Blog</title>
    <link>https://events.ccc.de/en/tag/crypto/</link>
    <description>Recent content in crypto on CCC Event Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Wed, 09 Mar 2016 20:52:05 +0000</lastBuildDate><atom:link href="https://events.ccc.de/en/tag/crypto/feed" rel="self" type="application/rss" />
    <item>
      <title>Call for Papers: CryptoCon16 – Patch Me If You Can</title>
      <link>https://events.ccc.de/en/2016/03/09/cryptocon15-sublab/</link>
      <pubDate>Wed, 09 Mar 2016 20:52:05 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2016/03/09/cryptocon15-sublab/</guid>
      <description>&lt;p&gt;For the the fourth time Leipzig Hackerspace sublab e.V. and Bündnis Privacy Leipzig e.V. invite everybody to our security conference CryptoCon16 themed “Patch me if you can”. Ehe event will take place from May 19 until May 22, 2016, at our location in Leipzig-Plagwitz (Westwerk).&lt;br&gt;
For four days, we will focus on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;cryptography&lt;/li&gt;
&lt;li&gt;practical approaches to encryption&lt;/li&gt;
&lt;li&gt;decentralized communication infrastructure&lt;/li&gt;
&lt;li&gt;law and administrative questions&lt;/li&gt;
&lt;li&gt;privacy&lt;/li&gt;
&lt;li&gt;open hardware&lt;/li&gt;
&lt;li&gt;hacktivism&lt;/li&gt;
&lt;li&gt;attacks on IT and communication systems&lt;/li&gt;
&lt;li&gt;security solutions and protocols&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In 2013 Edward Snowdens uncoverings made our worst nightmares come true. Federal and Intelligence surveillance these days even outperforms our most pessimistic predictions.&lt;br&gt;
Private companies housing tremendous amounts of data, of collected with users conscent. Legal limbo often makes them becoming sheriffs deputy, when request by government agency come in.&lt;br&gt;
We were promised, that all this was about to change, one will get to the bottom of it. But as of now: Nothing happened. Nothing changed.&lt;br&gt;
Even worse, instead of making the intelligence agencies subject to massive reforms, build up an effective federal control, restrict cooperations with agencies from overseas, restrict private data aggregation, federal surveillance will even be expanded.&lt;br&gt;
Mindestspeicherfrist (data retention, from 2017) in Germany, permanent state of emergency in France, will be only the first steps towards an all European Police State.&lt;/p&gt;
&lt;p&gt;We invite all people to become a part of CryptoCon16. Get involved, may it be by submitting a creative or critical project, clarifying or explaining a specific issue, report about something, or basically almost everything you can imagine. We would like to motivate you, to submit installations, lectures, workshops, presentations or ideas for panels and discussions as well as art installations and performances. Please submit your project until March 31, 2016 23:59 CET. A short description of your project along with the approximate time duration to cryptocon at sublab dot org or submit it directly to our conference tool&lt;a href=&#34;https://events.sublab.io/en/CC16/cfp&#34;&gt;1&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To get an impression of CryptoCon we recommend the recordings of our previous events[2][3]&lt;a href=&#34;http://sublab.org/cryptocon13&#34;&gt;4&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://events.sublab.io/en/CC16/cfp&#34;&gt;1&lt;/a&gt; &lt;a href=&#34;https://events.sublab.io/en/CC16/cfp&#34;&gt;Submit your project&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://media.ccc.de/c/cc15&#34;&gt;2&lt;/a&gt; &lt;a href=&#34;https://media.ccc.de/c/cc15&#34;&gt;CryptoCon15&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://cryptocon.org/14/&#34;&gt;3&lt;/a&gt; &lt;a href=&#34;https://cryptocon.org/14/&#34;&gt;CryptoCon 14&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;http://sublab.org/cryptocon13&#34;&gt;4&lt;/a&gt; &lt;a href=&#34;http://sublab.org/cryptocon13&#34;&gt;CryptoCon 13&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 28C3: Datamining for Hackers – Encrypted Traffic Mining, Day 1, 14:00, Saal 1</title>
      <link>https://events.ccc.de/en/2011/12/27/crypto-talk-data-mining/</link>
      <pubDate>Tue, 27 Dec 2011 00:23:34 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2011/12/27/crypto-talk-data-mining/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/6578122845/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm8.staticflickr.com/7009/6578122845_48953d7458.jpg&#34; alt=&#34;&#34; width=&#34;400&#34; height=&#34;316&#34; /&gt;&lt;/a&gt;The first cryptography related talk at 28C3 is about data mining in encrypted data. One may assume, that encrypting your data with a good encryption scheme prevents other people from learning about it. However, this is not true, specially for network protocols, that often leak information, like who is communicating with who, and when how much data is transferred. An attacker can use these information to make assumptions about the content of the transmission.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;From the abstract: &lt;em&gt;Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. Stefan will present research into leakage of information from Skype, a widely used and protected VoIP application. Experiments have shown that isolated phonemes can be classified and given sentences identified. By using the dynamic time warping (DTW) algorithm, frequently used in speech processing, an accuracy of 60% can be reached. The results can be further improved by choosing specific training data and reach an accuracy of 83% under specific conditions.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I think this talk is interesting, because it can show you how much information can even be gathered from an encrypted data stream, just using some side information from the communication.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2011/Fahrplan/events/4732.en.html&#34; title=&#34;Datamining for Hackers&#34;&gt;See the talk: Day 1, 14:00, Saal 1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Author: Erik Tews&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
