Congress Podcasting

EN

There are two new channels you can get audible information about 22C3 from. However, both are them are in German only (if somebody wants to do English podcasting let us know).

First, there is CongressRadio which is planning continuous coverage before and during the event. They have already posted their third episode. There is now a phone-based audio feedback system as well. Check it out.

In addition, Chaosradio has started to do a weekly podcast in addition to the monthly talk radio show called Chaosradio Express. You currently get it all together in a single podcast feed.

Photos

EN

If you want to get a visual impression of the Congress atmosphere, take a look at last year’s photo documentation. There will be a Photo Documentation this year as well. Moreover, there is a Flickr interest group named 22c3 where participants can put their pictures. Tag them with something like 22c3 chaoscommunicationcongress ccc and use a copyleft license (e.g. Creative Commons 2.0 by).
Hackers are very sensitive about a possible appearance in photos, especially if these photos are widely spread on the internet (which is generally the case nowadays). So please make sure to ask people before …

Oh, the anticipation!

EN

Great news everyone! We will publish the schedule for this year’s congress within the next minutes… er… hours… er… today. Stay tuned. It’s worth it!

The Smoking Situation

EN
Non Smoking Ashtray Quite an issue last year. Smoking situation was so bad that even heavy smokers complained about the bad air. Of course, smoking is forbidden in the art&beauty-area, the lecture halls and in the Hackcenter, as it was last year.

But for the rings we want to improve the situation and discussed many suggestions in the last months.
As the technical solution for this problem is way to expensive for us – as nerds, we would prefer that of course – we had to find a social one. So here it is: We kindly ask everyone not to smoke in the …

Haecksen

EN
Haecksen Logo This year the Haecksen found a new home base at the congress. Their gathering place is in the Haecksen Area at the back of A08. As usual there will be a sofa, some tee and nice lights making the Haecksen Area one of the cosier places at the congress.

So if you are interested in meeting other women who are in this in computer stuff like you are there is the place to be. And don’t be shy if you are owner of a y-chromosome, you are welcome too, of course.

But the Haecksen Area is more than a nice hangout for the female …

Learning cryptography through handcyphers

EN

For many people cryptography is something that they consider too complicated. While most current implementations demand a strong knowledge of the mathematical background, the basic principles are quite easy to catch. In order to understand these principles Brenno de Winter will go back in time in his lecture Learning cryptography through handcyphers – Shaping a digital future with ancient wisdom to take a look at the evolution of modern cryptography.

He will focus on handcyphers that can be used without a computer and have grown in complexity throughout time even tough some early mechanisms …

Lightning Talks

EN

Good ideas deserve to be stolen. Lightning talks are such a fantastic idea that we just had to nick it. We were inspired to have our own lightning talks at 21C3 (last year) by the Perl community who may not have invented the concept but definitely introduced it to a larger audience at their YAPC (Yet Another Perl Conference).

But what is a lightning talk? It’s a 5-minute talk you (for reasons of your own) don’t feel like doing as a full 1-hour presentation. Maybe the topic is too obscure. Maybe the research you want to present is still too much in progress. Maybe you just want to talk about a …

Honeymonkeys

EN

Honeypots are a well known and deployed technique to gather information about new and unknown attack vectors. While there are many different types of honeypots used on server side to detect threats or spamming activities for example, there isn’t very much out there to deal with client harassment. Microsoft has recently started a new research initiative to actively detect those client-side threats on a larger scale by having a computer or a virtual PC that actively mimics the actions of a user surfing the web.

In their lecture Honeymonkeys – Chasing hackers with a bunch of monkeys Krisztian …

Workshop Area

EN

Last year the workshop room was just a smaller lecture hall where not workshops but lectures took place. This year we would like to see real hands-on-workshops hold by you instead. There will be a table under the windows in the roof of room A08 at the end of the Hackcenter. At this table fit about 23 people and there will be no digital projector or other kind of presentation device. So, can you think of its use? Right! It’s the workshop area!
As the congress is a quite dynamic environment we just set up a page in the congress-wiki where you can reserve some time at this table to do any …

22C3 Public Wiki

EN

We have opened the 22C3 Public Wiki. It’s late, but it’s here. We are still filling it. Please use it and contribute. If you miss something or have any other general question that you think should be covered by the wiki, place your question in the FAQ.

Note that you can access the Wiki via http and https. We recommend using https for security reasons. You might want to install our CCCV-CA certificate to get around the browser warnings regarding unknown certificates. Mac OS X users can install this systemwide, other platforms might use the certificate in the browser.