<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Talks on CCC Event Blog</title>
    <link>https://events.ccc.de/en/tag/talks/</link>
    <description>Recent content in Talks on CCC Event Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Wed, 22 May 2019 14:19:24 +0000</lastBuildDate><atom:link href="https://events.ccc.de/en/tag/talks/feed" rel="self" type="application/rss" />
    <item>
      <title>Call for Participation: Chaos Communication Camp 2019</title>
      <link>https://events.ccc.de/en/2019/05/22/call-for-participation-chaos-communication-camp-2019/</link>
      <pubDate>Wed, 22 May 2019 14:19:24 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2019/05/22/call-for-participation-chaos-communication-camp-2019/</guid>
      <description>&lt;p&gt;The Chaos Communication Camp in &lt;a href=&#34;http://www.openstreetmap.org/node/267114042&#34;&gt;Mildenberg&lt;/a&gt; is an open-air hacker camp and party that takes place every four years, organized by the Chaos Computer Club (CCC). Thousands of hackers, technology freaks, artists and utopians get together for five days in the Brandenburg summer – to communicate, learn, hack and party together.&lt;/p&gt;
&lt;p&gt;We focus on topics such as information technology, digital security, hacking, crafting, making and breaking, and we engage in creative, sceptical discourse on the interaction between technology and society.&lt;/p&gt;
&lt;p&gt;We’d love to see your submission for these tracks:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Arts &amp;amp; Culture,&lt;/li&gt;
&lt;li&gt;Ethics, Society &amp;amp; Politics,&lt;/li&gt;
&lt;li&gt;Hardware &amp;amp; Making,&lt;/li&gt;
&lt;li&gt;Security &amp;amp; Hacking,&lt;/li&gt;
&lt;li&gt;Science.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Apart from the official conference program on the main stages, the Chaos Communication Camp also offers space for community villages, developer and project meetings, art installations, lightning talks and numerous workshops (called “self-organized sessions”).&lt;/p&gt;
&lt;h3 id=&#34;lightning-talks&#34;&gt;Lightning talks&lt;/h3&gt;
&lt;p&gt;Got something interesting to say but don’t want to submit a full talk? Consider doing a lightning talk instead! You will have five minutes to present your ideas or projects – or just to rant, if you need to vent. A formal submission through our submission system (called „frab“) is not required; as usual, the lightning talks are organized via our public wiki. Lightning talks can be held in German or English and will be streamed, recorded and published (see below).&lt;/p&gt;
&lt;p&gt;For projects, installations, workshops, sessions hosted in assemblies and other fun stuff is no formal submission through frab required. There will be a wiki page to keep track of requirements for space and other resources. Simply start already considering now what you would like to make, bring, or show, and write it down once the wiki goes online.&lt;/p&gt;
&lt;h3 id=&#34;dates--deadlines&#34;&gt;Dates &amp;amp; deadlines&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;May 22th, 2019: Call for Participation&lt;/li&gt;
&lt;li&gt;June 11th, 2019 (23:59 CEST): Deadline for submissions&lt;/li&gt;
&lt;li&gt;July 10th: Notification of acceptance&lt;/li&gt;
&lt;li&gt;August 21st – 25th, 2019: Chaos Communication Camp at &lt;a href=&#34;http://www.ziegeleipark.de/index.html&#34;&gt;Ziegeleipark Mildenberg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;submission-guidelines-for-talks&#34;&gt;Submission guidelines for talks&lt;/h3&gt;
&lt;p&gt;All lectures need to be submitted to our conference planning system under the following URL: &lt;a href=&#34;https://frab.cccv.de/cfp/camp2019&#34;&gt;https://frab.cccv.de/cfp/camp2019&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Please follow the instructions there. If you have any questions regarding the submission, you are welcome to contact us via mail at &lt;a href=&#34;mailto:camp2019-content@cccv.de&#34;&gt;camp2019-content@cccv.de&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Please send us a description of your suggested talk that is as complete as possible. The description is the central criteria for acceptance or rejection, so please ensure that it is as clear and complete as possible. Quality comes before quantity. Due to the non-commercial nature of the event, presentations which aim to market or promote commercial products or entities will be rejected without consideration.&lt;/p&gt;
&lt;p&gt;Since most participants find – or don’t find a lecture by its title, it’s important to keep your talk description precise, accessible and comprehensible. Our teams will keep a keen eye on title and subtitle and make suggestions to change them if necessary, so please avoid insider jokes and stereotypes.&lt;/p&gt;
&lt;p&gt;As it is likely that there will be multiple submissions on the same topic, please show us exactly why your talk should be part of the conference. Remember that the teams are diversely staffed, and not every reviewer knows every submitter and their backgrounds. Please write something about yourself, your research, and your motivation. It does not matter if the talk has been held at another conference somewhere on this planet, as long as it is up to date and relevant.&lt;/p&gt;
&lt;p&gt;Talks should be 45 minutes long and can include up to 15 minutes for questions and answers. Longer slots are possible if absolutely necessary, but should be an exception. Please take our limited amount of presentation time into consideration, check how much time you really need to bring home your points and then tell us the proposed length of your talk.&lt;/p&gt;
&lt;h3 id=&#34;language&#34;&gt;Language&lt;/h3&gt;
&lt;p&gt;Although the Chaos Communication Camp is an international event and a lot of content is presented in English, there will again be a translation team that will simultaneously translate most German talks into English. So if you are not comfortable with presenting in English, don’t hesitate to present your lecture in German. If your talk will be held in English, your submission should also be in English.&lt;/p&gt;
&lt;h3 id=&#34;publication&#34;&gt;Publication&lt;/h3&gt;
&lt;p&gt;Audio and video recordings of the lectures will be published in various formats at &lt;a href=&#34;https://media.ccc.de/&#34;&gt;media.ccc.de&lt;/a&gt; under the license Creative Commons Attribution 4.0 International (CC BY 4.0). This license allows commercial use of excerpts by media institutions as part of their reporting. If you do not wish for material from your lecture to be published or streamed, please let us know in your submission.&lt;/p&gt;
&lt;p&gt;Note: As German law (and therefore the license) might differ from the law of your country, please let us know if you have any issues or questions regarding the exact implications. Unfortunately, we can’t guarantee a perfect translation.&lt;/p&gt;
&lt;h3 id=&#34;travel-costs--visa&#34;&gt;Travel, costs &amp;amp; visa&lt;/h3&gt;
&lt;p&gt;The Chaos Communication Camp is a great adventure for us, also financially. As we’re all there to have a nice time together, and split the costs, we cannot offer a different entrance fee for speakers, workshop organizers or angels. The camp is a non-commercial event where neither the organisers nor the speakers are being paid – thus, we cannot provide a free entrance ticket, even for speakers. If necessary, we are however able to provide limited support for travel costs.&lt;/p&gt;
&lt;p&gt;If you need help applying for a visa, such as an official invitation to present to the German embassy, please let the content team know well in advance. Please be aware that the visa application procedure may take up to six weeks or longer!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Photo: Fabrizio, &lt;a href=&#34;https://creativecommons.org/licenses/by-sa/2.0/&#34;&gt;CC BY-SA 2.0&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Fahrplan Sneak</title>
      <link>https://events.ccc.de/en/2013/12/02/fahrplan-sneak/</link>
      <pubDate>Mon, 02 Dec 2013 01:08:20 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2013/12/02/fahrplan-sneak/</guid>
      <description>&lt;p&gt;The final &lt;a href=&#34;https://events.ccc.de/congress/2013/wiki/Main_Page&#34;&gt;30c3&lt;/a&gt; schedule is going to be late, we know… however, please stay tuned, as it’s still work in progress, and we can promise the Fahrplan will be awesome!&lt;/p&gt;
&lt;p&gt;We’d like to tell you about some of the security highlights at 30c3. There are three major groups of interest this year:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Cryptography&lt;/li&gt;
&lt;li&gt;Hardware &amp;amp; Embedded Device Security&lt;/li&gt;
&lt;li&gt;Software &amp;amp; Protocol Reverse Engineering&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;First, let’s start with a cryptography highlight: Nadia Heninger, Tanja Lange and Daniel J. Bernstein will be presenting “This Year in Crypto”. They will cover stuff that was broken before and continues to be broken again and again. The talk will also cover the coming Cryptopocalypse, backdoors in cryptographic implementations and the authors’ worries and concerns in regard to crypto in general. It’s worth mentioning that they initially recommended that their talk should be part of the Art &amp;amp; Beauty Track, since crypto is beautiful (and finessing crypto is an art).&lt;/p&gt;
&lt;p&gt;Another cryptographic highlight this year is a lecture by Dmitry Khovratovich who’s going to talk about White-Box Cryptography. He’s going to explain the differences between White-Box &amp;amp; Public-Key Cryptography and obfuscation. This will include an overview of the white-box crypto concept along with the most common applications and proposed designs.&lt;/p&gt;
&lt;p&gt;The Hardware &amp;amp; Embedded Security track will also feature several noteworthy lectures this year. Due to the outstanding quality of the submissions, it’s difficult to mention just a handful of talks. However, we’d like to highlight the following ones:&lt;/p&gt;
&lt;p&gt;Console Hacking 2013 – It’s the year of the Wii U. This talk will cover improvements made in the architecture over previous console generations. Still, its security system was completely bypassed, and the authors will show how the Wii U was broken in less than 31 days. You’ll be able to reproduce all of the presented attacks at home – if you bring basic knowledge of embedded systems and CPU architectures.&lt;/p&gt;
&lt;p&gt;Staying on the topic of Embedded Security and Embedded Privacy, Martin Herfurt will be presenting his research on Hybrid broadband broadcast TV (HbbTV). This is the new de-facto standard, which is currently being rolled out around the world. This new standard raises several security and privacy concerns. Martin will cover the emerging standard and how to deal with those security &amp;amp; privacy concerns.&lt;/p&gt;
&lt;p&gt;Dr. Peter Laackmann will be covering the last 25 years of smartcard hacking (in German). This will be a rather entertaining talk with many crazy IC analysis techniques that you don’t want to miss – even if you’re not that much into technical details of chip-card hacking (or German).&lt;/p&gt;
&lt;p&gt;As already mentioned, there is a substantial number of excellent hardware-security related talks this year. To keep the blog post short, here are just a few more that deserve to be mentioned:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ralf P. Weinmann will talk about Hexagon Challenges: Baseband Exploitation in 2013,&lt;/li&gt;
&lt;li&gt;Dmitry Nedospasov will be presenting his approaches on physical attacks of ICs’ backsides,&lt;/li&gt;
&lt;li&gt;Adrian Dabrowski is going to introduce you to the RFID Treehouse of Horror, and how to hack city-wide access control systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Though it’s difficult to categorize the remaining submissions, they include Software and Protocol Reverse Engineering as well as any remaining software security related topics.&lt;/p&gt;
&lt;p&gt;Jan Schejbal and his colleagues reverse engineered one of the implementations of the CHIASMUS cipher, designed by the BSI (Bundesamt für Sicherheit in der Informationstechnik). This work will not only reveal insights on the non-public CHIASMUS-cipher, but also uncover serious implementation issues in the “official” GSTOOL. The implementation issues allow an attacker to crack files that have been encrypted with GSTOOL with very little effort.&lt;/p&gt;
&lt;p&gt;Also worth mentioning: Collin Mulliner’s “Dynamic Dalvik instrumentation of Android Applications and the Android framework” as well as Andreas “Bogk’s Bug Class Genocide”. Ilja van Sprundel will try to debunk the greatness of a well known open-source project: the X11 or X.org code.&lt;/p&gt;
&lt;p&gt;See you at 30c3!&lt;/p&gt;
&lt;p&gt;30c3 Security team&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Workshops – and all other events besides the main talks</title>
      <link>https://events.ccc.de/en/2012/11/17/workshops-and-all-other-events-besides-the-main-talks/</link>
      <pubDate>Sat, 17 Nov 2012 18:05:02 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2012/11/17/workshops-and-all-other-events-besides-the-main-talks/</guid>
      <description>&lt;p&gt;tldr:&lt;br&gt;
&lt;em&gt;Congress is made by you! &lt;a href=&#34;https://events.ccc.de/congress/2012/wiki/Workshops&#34;&gt;Please add your workshop&lt;/a&gt;. A “workshop” is just something, that happens at a special time and place, but not in one of the big halls.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;As you may have read in the &lt;a href=&#34;../../../../en/2012/10/22/assemblies/&#34;&gt;blogpost on assemblies&lt;/a&gt; this congress will be even more community driven than it used to be. One step towards this is allowing you to hold your own sessions on whatever topic you think is important. We kindly ask you to prepare “workshops”.&lt;/p&gt;
&lt;p&gt;That does not mean, that it &lt;em&gt;has to be&lt;/em&gt; something with hands-on and making – sure it &lt;em&gt;could be&lt;/em&gt;! But workshops can also be a gathering of a project group or discussing a special topic. They can be contests or games, activities outside of the building or even small talks, a follow-up-discussion on one of the “big talks” or any other topic that happened recently – or something completely different that you think deserves a place at the congress!&lt;/p&gt;
&lt;p&gt;This year we will generate &lt;a href=&#34;https://events.ccc.de/congress/2012/wiki/Calendar&#34;&gt;one big schedule of all those events&lt;/a&gt;, so that you can see everything that happens on one page. This is done using the semantic features of the wiki – so it is very important that you use the forms properly when you &lt;a href=&#34;https://events.ccc.de/congress/2012/wiki/Special:FormEdit/Workshop&#34;&gt;add your workshop&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For workshops we will have four fixed places, and maybe some more dynamic space at your assembly. The rooms are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;workshop 12&lt;/em&gt;, with 60 square meters&lt;/li&gt;
&lt;li&gt;&lt;em&gt;workshop 13&lt;/em&gt;, with 78 square meters&lt;/li&gt;
&lt;li&gt;&lt;em&gt;workshop 14&lt;/em&gt;, with 60 square meters&lt;/li&gt;
&lt;li&gt;and the &lt;em&gt;speaker’s corner&lt;/em&gt;, that is an open space close to hall 1 and the main foyer.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please refer also to the wikipage to find more details on &lt;a href=&#34;https://events.ccc.de/congress/2012/wiki/Workshops&#34;&gt;how to add your workshop&lt;/a&gt;.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Invite all the Speakers!</title>
      <link>https://events.ccc.de/en/2012/09/19/invite-all-the-speakers/</link>
      <pubDate>Tue, 18 Sep 2012 22:15:18 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2012/09/19/invite-all-the-speakers/</guid>
      <description>&lt;p&gt;You know someone who could tell us interesting things at the congress? You recently read an article and thought “It would be great to hear that person speak at the congress”? But you are not sure if he/she/it knows about it? Then just tell them!&lt;/p&gt;
&lt;p&gt;There are many ways to do that, the easiest one would be sending an email like this:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;“Hey [name], I like your [article /talk/project/something] and I would love to see you at the 29th Chaos Communication Congress. You can find the Call for Participation here: &lt;a href=&#34;../../../../en/2012/08/03/call-for-participation-for-29th-chaos-communication-congress/&#34;&gt;[link]&lt;/a&gt;. If you need any help with the submission form I would be happy to assist you. Be aware that the submission deadline is September 30th!”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Of course it would be much nicer if you wrote some more:&lt;br&gt;
You could write some words about the congress: you can use the &lt;a href=&#34;http://en.wikipedia.org/wiki/Chaos_Communication_Congress&#34;&gt;Wikipedia entry&lt;/a&gt; or the &lt;a href=&#34;http://events.ccc.de/congress/?language=en&#34;&gt;older congress pages&lt;/a&gt; for copypasta. It will be even nicer if you find your own words. You can also point out that a lot of great people have spoken at the last editions of Chaos Communication Congress, and this would be a good opportunity to be listed on the same page with those people ;)&lt;/p&gt;
&lt;p&gt;Please make sure that the speaker does not get the impression that you are from the content team or that you are issuing an official invitation.&lt;/p&gt;
&lt;p&gt;You could also write to &lt;a href=&#34;mailto:29-content@cccv.de&#34;&gt;29-content@cccv.de&lt;/a&gt; and suggest a speaker. Tell us something about him/her and how great it would be to have them! Give us links to talks he/she held and just everything we should know to invite him/her.&lt;/p&gt;
&lt;p&gt;Let’s build a great congress together!&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Camp Schedule Published</title>
      <link>https://events.ccc.de/en/2011/07/18/camp-schedule-published/</link>
      <pubDate>Mon, 18 Jul 2011 11:30:39 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2011/07/18/camp-schedule-published/</guid>
      <description>&lt;p&gt;Almost a week ago we published the Camp Fahrplan (schedule). Follow this &lt;a href=&#34;http://events.ccc.de/camp/2011/Fahrplan/&#34;&gt;link&lt;/a&gt; for more information.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: FrozenCache – Mitigating cold-boot attacks for Full-Disk-Encryption software, Day 3, 23:00, Saal 2</title>
      <link>https://events.ccc.de/en/2010/12/28/frozen-cache/</link>
      <pubDate>Tue, 28 Dec 2010 18:38:05 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/28/frozen-cache/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5293511931/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5248/5293511853_e9abb5f22e.jpg&#34; alt=&#34;Cold Boots&#34; width=&#34;300&#34; height=&#34;278&#34; /&gt;&lt;/a&gt;As a general attack against encryption software on a computer, the cold boot attack was presented at 25C3. To encrypt data on a PC, many programs store the encryption key in RAM. The key is usually derived from a password or loaded from the hard disk where it is protected by a password too. The key resists as least as long as the encryption operation take in RAM. For many applications like Full-Disk-Encryption or Email Signatures, it is convenient to keep the key permanently in RAM, once it has been loaded, so that the user doesn’t need to enter his password again and again.&lt;/p&gt;
&lt;p&gt;To protect the key from unauthorized access, computers are locked when the legitimate user is away or the computer has been switched to power-saving-mode. To gain access again, the user needs to type a password or needs to identify himself using a fingerprint reader or any other kind of biometric authorization device. Of course, the key is still in RAM for the whole time.&lt;/p&gt;
&lt;p&gt;Here, the cold boot attack kicks in. At 25C3, it has been shown that RAM chips (DRAMs) can be easily removed from a running PC, Server or Laptop Computer, and their content can be extracted afterward. Even if the device has just been turned off, the content of the RAM fades only slowly away, depending on the exact type of RAM and its temperature. Even if some bits are recovered incorrectly, the correct encryption key can still be found an corrected, because many cryptographic algorithms use a lot of redundancy in they keys (round-keys for AES for example).&lt;/p&gt;
&lt;p&gt;One way to counter the attack could be to store the keys only in the computer cache, instead of RAM. In contrast to the RAM which is a separate device connected to the computers motherboard, the Cache resides on the CPU die, and cannot easily be extracted or read-out. However, caches are hard to control and one needs to make sure that keys are really frozen in the cache and are never written to the RAM:&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5293511931/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5043/5293511931_a5a2644d79.jpg&#34; alt=&#34;Frozen Cache&#34; width=&#34;300&#34; height=&#34;219&#34; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;div&gt;
  &lt;p&gt;
    Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache is a general-purpose solution to this attack for x86 based systems that employs a special CPU cache mode known as &amp;#8220;Cache-as-RAM&amp;#8221;. Switching the CPU cache into a special mode forces data to held exclusively in the CPU cache and not to be written to the backing RAM locations, thus safeguarding data from being obtained from RAM by means of cold boot attacks.
  &lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk, because it might be a good solution to use secure full-disk encryption software, without always having to shutdown your computer when you leave it unattended.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4018.en.html&#34;&gt;See the talk, Day 3, 23:00, Saal 2!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3:  Is the SSLiverse a safe place? Day 2, 16:00, Saal 2</title>
      <link>https://events.ccc.de/en/2010/12/28/is-the-ssliverse-a-safe-place/</link>
      <pubDate>Tue, 28 Dec 2010 01:18:50 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/28/is-the-ssliverse-a-safe-place/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;SSL/TLS&lt;/a&gt; is the standard when it comes to securing HTTP traffic on the internet. The authenticity of a web server is usually secured using a &lt;a href=&#34;http://en.wikipedia.org/wiki/X.509&#34;&gt;X.509 certificate&lt;/a&gt; digitally signed by a trusted &lt;a href=&#34;http://en.wikipedia.org/wiki/Certificate_authority&#34;&gt;certification authority (CA)&lt;/a&gt;. All major web browsers come with a list of CAs preinstalled they assume as trustworthy. Every website can be signed by any of these CAs, so no web browser would show a warning, if &lt;strong&gt;&lt;a href=&#34;https://www.dod.gov&#34;&gt;www.dod.gov&lt;/a&gt;&lt;/strong&gt; would be signed by a &lt;strong&gt;Chinese certification authority&lt;/strong&gt; or the &lt;strong&gt;Deutsche Telekom&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/arcticpuppy/4366428283/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm5.static.flickr.com/4056/4366428283_4af058ce10_m.jpg&#34; alt=&#34;Observatory&#34; width=&#34;240&#34; height=&#34;160&#34; /&gt;&lt;/a&gt;To examine the usage of X.509 certificates for SSL/TLS, the &lt;a href=&#34;http://www.eff.org/&#34;&gt;EFF&lt;/a&gt; installed a &lt;a href=&#34;http://www.eff.org/observatory&#34;&gt;SSL Observatory&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The SSL observatory is a project to bring more transparency to SSL Certificate Authorities, and help understand who really controls the web’s cryptographic authentication infrastructure. The Observatory is an Electronic Frontier Foundation (EFF) project that began by surveying port 443 of all public IPv4 space. At Defcon 2010, we reported the initial findings of the SSL Observatory. That included thousands of valid ‘localhost’ certificates, certificates with weak keys, CA certs sharing keys and with suspicious expiration dates, and the fact that there are approximately 650 organizations that can sign a certificate for any domain that will be trusted by modern desktop browsers, including some that you might regard as untrustworthy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I am looking forward to see some obscure SSL/TLS setups here. For example, SSL/TLS doens’t require the server to present a certificate, connections where no certificate at all are also supported, which only provide security against an passive eavesdropper. Also, the usage of encryption is an optional feature in SSL/TLS, so that both parties may send their traffic in clear, and use SSL/TLS only to prevent unauthorized modification of the data or to prove authenticity of the server. Also, the key in a certificate doesn’t need to be an RSA key, instead some public Diffie-Hellmann parameters or a DSA key might be embedded there too.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/voxpelli/2954947277/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm4.static.flickr.com/3242/2954947277_e24a070960_m.jpg&#34; alt=&#34;Netscape Navigator&#34; width=&#34;240&#34; height=&#34;180&#34; /&gt;&lt;/a&gt;For those of you who would like to know why it is called SSL/TLS: SSL 1.0 was created by Netscape to secure HTTP traffic, but the standard was never released to the public. &lt;a href=&#34;http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html&#34;&gt;SSL 2.0&lt;/a&gt; was the first version of SSL released to the public and implemented in the Netscape Browser. &lt;a href=&#34;http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt&#34;&gt;SSL 3.0&lt;/a&gt; was the last version of SSL created by Netscape, before the IETF took over development. &lt;a href=&#34;http://www.ietf.org/rfc/rfc2246.txt&#34;&gt;TLS 1.0&lt;/a&gt; was the first version of SSL released by the IETF, which technically still carriers a version number 3.1 in the protocol header. While there are big differences between SSL 2.0 and SSL 3.0, the differences between SSL 3.0 and TLS 1.0 are only minor. The current version of TLS is &lt;a href=&#34;http://www.ietf.org/rfc/rfc5246.txt&#34;&gt;version 1.2&lt;/a&gt; (which still carries a version number 3.3 in the protocol header), which contains some security fixes and improvements over TLS 1.0. So we usually say SSL/TLS, when we refer to the SSL or TLS protocol, but not to a particular version of the protocol.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk because I conducted a small SSL X.509 survey by myself back in 2007, when I implemented a TLS 1.0 stack in Java for the J2ME platform. Nowadays, this stack is included in the bouncycastle project, a Java cryptography provider, and can be run on J2ME as well as on J2SE or J2EE.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4121.en.html&#34;&gt;See the talk at Day2, 16:00 Saal 2!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: Die gesamte Technik ist sicher, Day 1, 21:45, Saal 1</title>
      <link>https://events.ccc.de/en/2010/12/27/die-gesamte-technik-ist-sicher/</link>
      <pubDate>Mon, 27 Dec 2010 12:09:09 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/27/die-gesamte-technik-ist-sicher/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/44410286@N02/5295962507/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm6.static.flickr.com/5045/5295962507_55c7360f1f_m.jpg&#34; alt=&#34;NPA&#34; width=&#34;240&#34; height=&#34;152&#34; /&gt;&lt;/a&gt;The new national id card &lt;a href=&#34;http://de.wikipedia.org/wiki/Personalausweis_%28Deutschland%29&#34;&gt;Neuer Personalausweis (NPA)&lt;/a&gt; was one of the biggest IT projects in the German government in the last years. Compared to the old id card, the new id card is a RFID smart card, which can also be used on the internet to prove your identify to a remote party (Ebay, Paypal, or Amazon for example) and to sign binding contracts. For example, you can use the card to buy a new house or car, or open up a bank account or apply for a credit.&lt;/p&gt;
&lt;p&gt;When using the card over the internet, the card is connected to a reader, which is connected to a (potentially insecure) PC, which is connected to the internet. To use the card, the user needs to enter his PIN code to prove possession of the card and knowledge of the PIN. If the PIN is entered on an insecure device as the PC, it might be recorded by an attacker and used by him later.&lt;/p&gt;
&lt;p&gt;Frank Morgner and Dominik Oepe examined the various attack scenarios on the NPA, which could be possible, depending on the used reader for the NPA:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Wir untersuchen die Machbarkeit und Auswirkung von Relay-Angriffen in Hinblick auf die verschiedenen Lesegeräteklassen und Anwendungsszenarien des neuen Personalausweises. Nach dem derzeitigen Stand der Spezifikationen lassen sich solche Angriffe kaum verhindern. Einige der Probleme erweisen sich als unlösbar, für andere existieren Lösungsansätze, welche von simpel, aber unzureichend bis komplex, aber kaum umsetzbar reichen.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk, because it might show us some nice attack scenarios on the NPA, which are hard to counter, without buying very expensive readers. A lot of low-cost readers have just been distributed by a well known computer magazine in Germany, so that we can assume that a lot of people will be using their NPA with a highly insecure reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4297.en.html&#34;&gt;See the talk at Day 1, 21:45, Saal 1!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Autor: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Crypto Talk at 27C3: Automatic Identification of Cryptographic Primitives in Software, Day1, 16:00, Saal 3</title>
      <link>https://events.ccc.de/en/2010/12/27/automatic-identification-of-cryptographic-primitives-in-software/</link>
      <pubDate>Mon, 27 Dec 2010 01:31:51 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/27/automatic-identification-of-cryptographic-primitives-in-software/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;http://www.flickr.com/photos/pagedooley/2422430207/&#34;&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://farm3.static.flickr.com/2371/2422430207_01b2dcba11_m.jpg&#34; alt=&#34;Fingerprint&#34; width=&#34;240&#34; height=&#34;180&#34; /&gt;&lt;/a&gt;Many applications, including closed source applications like malware or DRM-enabled multimedia players (you might consider them as malware too) use cryptography. When analyzing these applications, a first step is the identification and localization of the cryptographic building blocks (cryptographic primitives, for example &lt;a href=&#34;http://en.wikipedia.org/wiki/Advanced_Encryption_Standard&#34;&gt;AES&lt;/a&gt;, &lt;a href=&#34;http://en.wikipedia.org/wiki/Data_Encryption_Standard&#34;&gt;DES&lt;/a&gt;, &lt;a href=&#34;http://en.wikipedia.org/wiki/RSA&#34;&gt;RSA&lt;/a&gt;…) in the applications. When these blocks have been localized, the input and output of the cryptographic primitives and the key management can be observed and the application can be analyzed further. Fortunately, many cryptographic algorithms use special constants or have a typical fingerprint  and there are only a few different public implementations of the algorithm. This allows us to automate this first, &lt;a href=&#34;http://groebert.org/felix/&#34;&gt;Felix Gröbert&lt;/a&gt; will show us how:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Using dynamic binary instrumentation, we record instructions of a program during runtime and create a fine-grained trace. We implement a trace analysis tool, which also provides methods to reconstruct high-level information from a trace, for example control flow graphs or loops, to detect cryptographic algorithms and their parameters.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;http://en.wikipedia.org/wiki/Dynamic_program_analysis&#34;&gt;Trace driven/dynamic analysis&lt;/a&gt; has some advantages of &lt;a href=&#34;http://en.wikipedia.org/wiki/Static_code_analysis&#34;&gt;static analysis&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Because the program is analyzed at runtime, it is immediately known which parts of the code are used at which time, so that they might be correlated with runtime decryption of the code or with network communication.&lt;/li&gt;
&lt;li&gt;Inputs and outputs of the primitives as well as the keys are recorded, even if the originate from a remote server or botnet. This allows us to immediately distinguish between long term keys and session keys, if multiple executions of the same program can be recorded.&lt;/li&gt;
&lt;li&gt;This is also highly interesting if private keys are included in an obfuscated binary, for example private RSA keys.&lt;/li&gt;
&lt;li&gt;Dead or unused code is automatically excluded, so that one can proceed with the main parts of the code first.&lt;/li&gt;
&lt;li&gt;If additional code is loaded from a server, it is included in the analysis. This would be hard to impossible using static analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; class=&#34;alignright&#34; src=&#34;http://events.ccc.de/congress/2010/Fahrplan/images/event-4160-128x128.png&#34; alt=&#34;Analysis&#34; width=&#34;128&#34; height=&#34;128&#34; /&gt; Of course, trace driven analysis has it disadvantages, for example if a malware needs to communicate with a command-and-control server, which has already been taken down or behaves differently on different systems or at different times.__&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Personally, I am interested in this talk because it might make ease up the analysis of closed source applications using cryptography. Even if the application, the DRM scheme, or the cryptographic primitive has no special weaknesses or bugs, just he recording of every input and output of all cryptographic building blocks in the application might be sufficient to extract a DRM free version of DRM protected digital content. Please also note that even if an application uses only well analyzed cryptographic primitives as AES and RSA, it might still be insecure, if these primitives are used in the wrong way.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/events/4160.en.html&#34;&gt;See the talk at Day 1, 16:00, Saal 3!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Author: Erik Tews&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>24 Hour Hardware Hacking Returns to 27c3</title>
      <link>https://events.ccc.de/en/2010/12/16/24-hour-hardware-hacking-returns-to-27c3/</link>
      <pubDate>Thu, 16 Dec 2010 19:54:29 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/16/24-hour-hardware-hacking-returns-to-27c3/</guid>
      <description>&lt;p&gt;Hackers of all ages can (learn how to) make things at the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Hardware_Hacking_Area&#34;&gt;Hardware Hacking Area&lt;/a&gt; of the 27c3!&lt;/p&gt;
&lt;p&gt;The HHA is open to everyone and open the entire congress! Hackers of all ages and skill levels are welcome! Round-the-clock hands on workshops will be led by lots of experienced teachers like &lt;a href=&#34;http://twitter.com/maltman23&#34;&gt;Mitch Altman&lt;/a&gt;, &lt;a href=&#34;http://jimmieprodgers.com/&#34;&gt;Jimmie P. Rodgers&lt;/a&gt;, &lt;a href=&#34;http://fabienne.us/&#34;&gt;fbz&lt;/a&gt;, &lt;a href=&#34;http://hackable-devices.org/&#34;&gt;Wim Vandeputte&lt;/a&gt; and…you!&lt;/p&gt;
&lt;p&gt;Learn to solder, then help teach others! Make cool things with electronics, design and print 3D models on the Makerbot, break RFID, or give your own workshop on the projects you’ve been hacking on this year. Last year there was a Cantenna workshop, a Mikrocopter workshop, and a GSM workshop among many others.&lt;/p&gt;
&lt;p&gt;Lots of kits for you to make will be available including Brain Machines, TV-B-Gones, Trippy RGB Waves, Mignonette Games, LEDcubes, LOL shields, Atari Punk Consoles…and there’s always room for yours!&lt;/p&gt;
&lt;p&gt;To accommodate all this hardware hacking goodness, the HHA will be twice the size it was during the 26c3, but still conveniently located near the Hackcenter.&lt;/p&gt;
&lt;p&gt;Even if you don’t have a ticket to Congress, you can stop by the HHA with a &lt;strong&gt;&lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Tickets#Night_Passes&#34;&gt;Night Pass&lt;/a&gt; good from Midnight to 6 AM.&lt;/strong&gt; Night passes are only €5 and will be sold shortly before midnight each day of the 27c3.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Lightning Talks at the 27c3</title>
      <link>https://events.ccc.de/en/2010/12/13/27c3-lt/</link>
      <pubDate>Mon, 13 Dec 2010 19:04:15 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/12/13/27c3-lt/</guid>
      <description>&lt;p&gt;Want four minutes on stage at the 27c3? You can have it! Registration is now open for the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Lightning_Talks&#34;&gt;Lightning Talk&lt;/a&gt; sessions at the 27c3.&lt;/p&gt;
&lt;p&gt;Taking place at 12:45 in Saal 3 on Days 2, 3 and 4, these fast paced sessions are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to share with the world.&lt;/p&gt;
&lt;p&gt;Lightning talks are also good for getting publicity for your workshop at the 27c3, or for recruiting people to join in on things like a &lt;a href=&#34;http://www.youtube.com/watch?v=SQlBgOg0-W0&#34;&gt;high calorie flash mob&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In order to maximize the available time, registrations will be granted to presenters who submit their graphics (i.e. slides, background picture, contact info, etc.) in advance. Exceptions will be made very selectively on a case-by-case basis. Register soon, as we anticipate the available slots will go quickly. (Proposals started coming in a few minutes after we put up a draft of the wiki page!)&lt;/p&gt;
&lt;p&gt;Read the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki/Lightning_Talks&#34;&gt;Lightning Talks&lt;/a&gt; article on the &lt;a href=&#34;http://events.ccc.de/congress/2010/wiki&#34;&gt;27c3 wiki&lt;/a&gt; for more information!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Photo Courtesy &lt;a href=&#34;http://www.flickr.com/photos/mbiddulph/&#34;&gt;Matt Biddulph&lt;/a&gt; via flickr.&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Content Meetings are over: Fahrplan released</title>
      <link>https://events.ccc.de/en/2010/11/10/content-meetings-are-over-fahrplan-released-2/</link>
      <pubDate>Wed, 10 Nov 2010 22:46:04 +0000</pubDate>
      
      <guid isPermaLink="false">/en/2010/11/10/content-meetings-are-over-fahrplan-released-2/</guid>
      <description>&lt;p&gt;This past Sunday, we concluded the second and final Content Meeting for 27C3. We’ve looked at all 223 submissions for talks and presentations and selected what we feel are the best 98 of them. We’d like to thank all submitters for the many interesting proposals that lightened up our work.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5074.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5074.jpg&#34;
         alt=&#34;A lot of Pentacards&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;One card for each talk that was accepted for 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But now, the schedule for the 27th Chaos Communication Congress is mostly done. So today we present the first release of the 27C3 presentation schedule (or “Fahrplan” in German):  &lt;a href=&#34;http://events.ccc.de/congress/2010/Fahrplan/&#34;&gt;&lt;strong&gt;Fahrplan Version 0.1&lt;/strong&gt;&lt;/a&gt;. Note this is Version 0.1. Blanks will be filled with more really cool stuff. Much more to come.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5079.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5079.jpg&#34;
         alt=&#34;Shuffling cards&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;The Content Team is shuffling cards on the floor to plan 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This year we’ll also have talks that last 30 minutes. The intent is to create a space for issues that are too complex for a Lightning Talk but still would not fill an entire hour. The resulting increase in the number of presentations serves to diversify the programme as well as allow people to tune into the event with morning sessions that don’t require quite the same attention span we might be able to more easily muster in afternoons and evenings.
&lt;a href=&#34;../../../../wp-content/uploads/2010/11/IMG_5085.jpg
&#34;&gt;&lt;figure&gt;&lt;img src=&#34;../../../../wp-content/uploads/2010/11/IMG_5085.jpg&#34;
         alt=&#34;Finished schedule for 27C3&#34;/&gt;&lt;figcaption&gt;
            &lt;p&gt;Finished schedule for 27C3&lt;/p&gt;
        &lt;/figcaption&gt;
&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We will be highlighting some of the accepted talks with short introductions here soon. So stay tuned. :-)&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
