{"acronym":"34c3","aspect_ratio":"16:9","updated_at":"2026-04-04T22:30:09.675+02:00","title":"34C3: TUWAT","schedule_url":"","slug":"congress/2017","event_last_released_at":"2018-01-10T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"congress/2017","logo_url":"https://static.media.ccc.de/media/congress/2017/media-logo.png","images_url":"https://static.media.ccc.de/media/congress/2017","recordings_url":"https://cdn.media.ccc.de/congress/2017","url":"https://api.media.ccc.de/public/conferences/34c3","events":[{"guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","title":"Financial surveillance","subtitle":"Exposing the global banking watchlist","slug":"34c3-9070-financial_surveillance","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9070.html","description":"Faced with new responsibilities to prevent terrorism and money laundering, banks have built a huge surveillance infrastructure sweeping up millions of innocent people. Investigative journalists Jasmin Klofta and Tom Wills explain how, as part of an international collaboration, they exposed World-Check, the privately-run watchlist at the heart of the system.\n\nAn accidental leak granted a rare opportunity for journalists to examine a database used to make decisions affecting people and organisations all over the world. They include a mosque that had its bank account shut without explanation, activists blacklisted for a peaceful protest, and ordinary citizens whose political activities were secretly catalogued.\n\nWe will show how we used data mining, OSINT and traditional investigative techniques to analyse the World-Check database and discover the human impact of this Kafkaesque system, which is used by almost every major bank and many other institutions including law enforcement agencies. The resulting story made front page news in the UK, Germany, Belgium, Italy, the Netherlands and the USA.\n\nWe will also ask whether we really want banks to be held responsible for the crimes of their customers? Are Financial Intelligence Units a sensible precaution, or are they pre-crime agencies?","original_language":"eng","persons":["Jasmin Klofta","Tom Wills"],"tags":["34c3","9070","Ethics, Society \u0026 Politics"],"view_count":2701,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-13T22:00:10.507+01:00","length":3545,"duration":3545,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9070-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9070-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/664f6c37-2fab-4191-a5d6-042aba7518c3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/664f6c37-2fab-4191-a5d6-042aba7518c3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9070-financial_surveillance","url":"https://api.media.ccc.de/public/events/664f6c37-2fab-4191-a5d6-042aba7518c3","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":91},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":67},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":66},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":79},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":77},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":76},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":99},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":70},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":66},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":66},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":85},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":69},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":104},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":179},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":91},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":83},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":75},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":100},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":80},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":78},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":87},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":70},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":86},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":67},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":90},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":66}]},{"guid":"12f2dd5b-5e3d-4098-9f10-6c277672b2e0","title":"Lobby-Schlacht um die ePrivacy-Verordnung","subtitle":"Die EU hat die Wahl: Schutz von Menschen oder von Geschäftsmodellen?","slug":"34c3-9271-lobby-schlacht_um_die_eprivacy-verordnung","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9271.html","description":"In der EU wird gerade über eine Verordnung verhandelt, die für die Vertraulichkeit der elektronischen Kommunikation verbindliche und zeitgemäße Regeln schaffen soll. Diese „ePrivacy-Verordnung“ könnte in absehbarer Zeit die letzte Möglichkeit sein, dem informationellen Kontrollverlust EU-weit politisch etwas entgegenzusetzen.\n\nGoogle analysiert die Mails seiner Kunden, Facebook wertet WhatsApp-Kontakte aus, Tracker verfolgen Bewegungen durch das Netz und auch durchs Einkaufszentrum. Die Verwertung persönlichen Informationen, die bei der digitalen Kommunikation jeden Tag gesammelt werden, ist das dominante Geschäftsmodell der digitalen Welt. Eine Wahl haben Nutzerinnen oft nicht, wenn sie auf die großen Dienste angewiesen sind: „Take it or leave it; data or die“ lautet das Grundprinzip der kommerziellen Überwachung. \n\nWährend digitale Bürgerrechtsorganisationen auf eine starke Regulierung hoffen, warnt die Werbe- und Trackingindustrie davor, dass „das Internet, wie wir es kennen“, in Gefahr ist: Müssen Tracker künftig „Do not track“ respektieren? Dürfen bald auch Mobilfunkanbieter unser Kommunikationsverhalten unbegrenzt auswerten? Kommt ein echtes Recht auf Verschlüsselung? Wird die Vorratsdatenspeicherung auf Messenger ausgeweitet? Wer sich in Brüssel am Ende durchsetzt, wird auch in der Öffentlichkeit entschieden.","original_language":"deu","persons":["Ingo Dachwitz"],"tags":["34c3","9271","Ethics, Society \u0026 Politics"],"view_count":1557,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-11-23T22:30:06.331+01:00","length":3358,"duration":3358,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9271-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9271-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/12f2dd5b-5e3d-4098-9f10-6c277672b2e0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/12f2dd5b-5e3d-4098-9f10-6c277672b2e0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9271-lobby-schlacht_um_die_eprivacy-verordnung","url":"https://api.media.ccc.de/public/events/12f2dd5b-5e3d-4098-9f10-6c277672b2e0","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":41},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":47},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":45},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":56},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":73},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":42},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":70},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":54},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":44},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":58},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":70},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":67},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":75},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":77},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":58},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":88},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":55},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":55},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":48},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":58}]},{"guid":"0b0a3457-91be-43ea-af21-8e251d8d9322","title":"“Nabovarme” opensource heating infrastructure in Christiania","subtitle":"Freetown Christiania´s digitally controlled/surveyed heating system. 350 users","slug":"34c3-8989-nabovarme_opensource_heating_infrastructure_in_christiania","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8989.html","description":"Project “Nabovarme” (meaning “neighbour heating”) has transformed private heating necessity into a social experiment build on OpenSource software/hardware and social empowerment by transforming heat consumers into Nabovarme Users and letting them take ownership to infrastructure and consumption.\n\nChristiania - a child of hippie thinking and direct democracy, est. 1971\n900 inhabitants, 210 houses, 24 hectares land, 1 km from the danish parliament and the royal palace\nLocal common ownership to ALL infrastructure:\nhouses, roads, electricity, water, sewers, fiber LAN, park and lakes\nNabovarme (started 2001) has connected more than half of Christiania\nPreviously heating was based on private wood burning stoves, coal burning stoves and oilheaters, Nabovarme has created a  transition towards common heating systems based on burning wood pellets.\nNabovarme has transformed the heating infrastructure into a social experiment built on OpenSource software/hardware and social empowerment and is transforming passive heat consumers into active Nabovarme Users -making everyone take ownership of the infrastructure and a goal of optimizing usage for economic and climate reasons.\nCurrent technologies for heating systems are proprietary and full of protocols hidden behind NDA's. \nOur project has unlocked a broad range of devices so data and control now is in the hands of the users - and not sent out of the community.\nThe project is a cross competence endeavor where equal amounts of plumbing, infrastructure building and digging, electronics and software has been needed to fulfill the task.\nThe project tells the story about:\nA society embracing OpenSource before the term was declared \nCommunities going together and creating a common heating solution to lower the environmental impact and risk of fire and increase the level of autonomy. \nThe creation of a custom fitted, self administered payment model.\n\nWe have liberated devices controlling the production of heat (NBE Pellet system, Kamstrup meter systems) and made devices (MeterLogger) used for metering heat and electricity consumption using open source. We are in the process of bringing easy readable consumption data to the focus of christiania citizens - for all of us to take climate action.","original_language":"eng","persons":["Johannes Valbjorn","Emmerik"],"tags":["34c3","8989","Hardware \u0026 Making"],"view_count":540,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-20T20:45:14.709+01:00","length":1815,"duration":1815,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8989-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8989-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/0b0a3457-91be-43ea-af21-8e251d8d9322-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/0b0a3457-91be-43ea-af21-8e251d8d9322-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8989-nabovarme_opensource_heating_infrastructure_in_christiania","url":"https://api.media.ccc.de/public/events/0b0a3457-91be-43ea-af21-8e251d8d9322","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":21},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":19},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":25},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":18},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":12},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":18},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":10},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":21},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":21},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":21},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":35},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":22},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":8},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":20},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":19},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":8},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":23},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":16},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":21}]},{"guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","title":"ASLR on the line","subtitle":"Practical cache attacks on the MMU","slug":"34c3-9135-aslr_on_the_line","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9135.html","description":"Address Space Layout Randomization (ASLR) is fundamentally broken on modern hardware due to a side-channel attack on the Memory management unit, allowing memory addresses to be leaked from JavaScript.  This talk will show how.\n\nAddress space layout randomization (ASLR) has often been sold as an\nimportant first line of defense against memory corruption attacks\nand a building block for many modern countermeasures. Existing\nattacks against ASLR rely on software vulnerabilities and/or on\nrepeated (and detectable) memory probing.\n\nIn this talk, we show that neither is a hard requirement\nand that ASLR is fundamentally insecure on modern cache-\nbased architectures, making ASLR and caching conflicting\nrequirements (ASLR xor Cache, or simply AnC). To support\nthis claim, we describe a new EVICT+TIME cache attack\non the virtual address translation performed by the memory\nmanagement unit (MMU) of modern processors. Our AnC attack\nrelies on the property that the MMU's page-table walks result\nin caching page-table pages in the shared last-level cache (LLC).\n\nAs a result, an attacker can derandomize virtual addresses of a\nvictim's code and data by locating the cache lines that store the\npage-table entries used for address translation.\nRelying only on basic memory accesses allows AnC to be\nimplemented in JavaScript without any specific instructions or\nsoftware features. We show our JavaScript implementation can\nbreak code and heap ASLR in two major browsers running on\nthe latest Linux operating system with 28 bits of entropy in 150\nseconds. We further verify that the AnC attack is applicable to\nevery modern architecture that we tried, including Intel, ARM\nand AMD. Mitigating this attack without naively disabling caches\nis hard, since it targets the low-level operations of the MMU.\nWe conclude that ASLR is fundamentally flawed in sandboxed\nenvironments such as JavaScript and future defenses should not\nrely on randomized virtual addresses as a building block.\n","original_language":"eng","persons":["brainsmoke"],"tags":["34c3","9135","Security"],"view_count":2289,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-20T11:30:05.214+01:00","length":2653,"duration":2653,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9135-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9135-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/86c60da2-fefc-4750-ad22-fa821ce619b1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/86c60da2-fefc-4750-ad22-fa821ce619b1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9135-aslr_on_the_line","url":"https://api.media.ccc.de/public/events/86c60da2-fefc-4750-ad22-fa821ce619b1","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":52},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":41},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":47},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":33},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":44},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":38},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":63},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":54},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":44},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":85},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":82},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":48},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":36},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":21},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":10},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":42},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":38},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":65},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":40},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":44}]},{"guid":"58ffa60d-607b-405f-9363-213097ef3920","title":"The Internet in Cuba: A Story of Community Resilience","subtitle":"Get a unique tour of some of the world’s most unusual networks, led by a Cuban hacker","slug":"34c3-8740-the_internet_in_cuba_a_story_of_community_resilience","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8740.html","description":"Internet access in Cuba is notoriously restrictive. ETECSA, the government-run teleco, offers 60 wireless hotspots in parks and hotels, allowing foreigners and citizens alike to \"visit\" the Internet for only $1/hour… That’s what most tourists know about the Internet in Cuba, but of course, that can't be the whole story!\n\nIn this talk, we'll take a deeper look at what life is like for Cuban hackers, and we’ll get to tour a vibrant set of community-driven networks that typical tourists never see. The story that emerges is an inspiring view of what communities can (and can’t) accomplish in the face of adversity.\n\n\nInternet access in Cuba is a study in resilience. By the official numbers, the island seems hopelessly disconnected: Cuba ranked last in the Americas in the ITU’s 2016 ICT development index, having only 5.6% household Internet penetration, and international bandwidth per user measures a mere 572 bits/s. Yet Cubans have developed a number of bottom-up, community-oriented responses to these limitations.\n\nThis talk will focus on three indigenous networks that aren't seen by the typical tourist. These include “El Paquete”, a sneaker-net distribution of media files that’s passed around the country on USB sticks and hard drives, and which may be Cuba’s largest source of private employment. There is also the Cuban educational network, which connects more than 20 higher education institutions around the country. Perhaps most unusual is Havana’s “Street Network”, or SNET, a vast unsanctioned IP network, constructed by volunteers using salvaged equipment. Though entirely isolated from the Internet, the SNET connects over 50,000 residential users across the capital city, and it’s home to a vibrant community and hundreds of websites.\n\nIn describing these three systems, we'll draw lessons about what is necessary for network communities to survive and thrive in the island’s challenging environment, including places where flexibility and compromise have been essential. Cuba presents a highly unusual regulatory and technological environment, and the approaches that have succeeded there are both inspiring and demonstrative of what communities can (and can't) accomplish through organic, distributed networks.","original_language":"eng","persons":["Will Scott","kopek"],"tags":["34c3","8740","Resilience"],"view_count":2856,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-15T15:30:06.107+01:00","length":3509,"duration":3509,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8740-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8740-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/58ffa60d-607b-405f-9363-213097ef3920-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/58ffa60d-607b-405f-9363-213097ef3920-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8740-the_internet_in_cuba_a_story_of_community_resilience","url":"https://api.media.ccc.de/public/events/58ffa60d-607b-405f-9363-213097ef3920","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":27},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":50},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":31},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":28},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":29},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":46},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":27},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":48},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":29},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":44},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":28},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":28},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":9},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":52},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":14},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":21},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":29},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":32},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":20},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":33},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":30},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":9},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":69},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":28}]},{"guid":"684193b5-696e-495f-88eb-04f8d3114e01","title":"Low Cost Non-Invasive Biomedical Imaging","subtitle":"An Open Electrical Impedance Tomography Project","slug":"34c3-8948-low_cost_non-invasive_biomedical_imaging","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8948.html","description":"An open source biomedical imaging project using electrical impedance tomography. Imagine a world where medical imaging is cheap and accessible for everyone! We'll discuss this current project, how it works, and future directions in medical physics. ","original_language":"eng","persons":["Jean Rintoul"],"tags":["34c3","8948","Hardware \u0026 Making"],"view_count":1845,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-02T23:30:06.291+02:00","length":2103,"duration":2103,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8948-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8948-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/684193b5-696e-495f-88eb-04f8d3114e01-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/684193b5-696e-495f-88eb-04f8d3114e01-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8948-low_cost_non-invasive_biomedical_imaging","url":"https://api.media.ccc.de/public/events/684193b5-696e-495f-88eb-04f8d3114e01","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":37},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":52},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":36},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":35},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":40},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":31},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":60},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":80},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":44},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":58},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":69},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":51},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":36},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":56},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":52},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":43}]},{"guid":"8d29d28d-a222-4731-bdfc-fde590385cae","title":"Relativitätstheorie für blutige Anfänger","subtitle":"Raum, Zeit, Licht und Gravitation, wie hängt das zusammen?","slug":"34c3-8710-relativitatstheorie_fur_blutige_anfanger","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8710.html","description":"Jeder kennt sie, kaum jemand versteht sie wirklich, die vielleicht berühmteste Gleichung der Welt: E=mc^2 \nWas hat es damit auf sich, was ist die spezielle- und was die allgemeine Relativitätstheorie? Wie kann man sicher sein, dass das wirklich stimmt? Bleibt die Zeit stehen, wenn man sich mit Lichtgeschwindigkeit bewegt? Was ist das Zwillings-Paradoxon und dehnt sich das Universum aus, oder werden wir einfach nur immer kleiner?","original_language":"deu","persons":["Steini"],"tags":["34c3","8710","Science"],"view_count":17186,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T22:00:05.515+02:00","length":1966,"duration":1966,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8710-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8710-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8d29d28d-a222-4731-bdfc-fde590385cae-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8d29d28d-a222-4731-bdfc-fde590385cae-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8710-relativitatstheorie_fur_blutige_anfanger","url":"https://api.media.ccc.de/public/events/8d29d28d-a222-4731-bdfc-fde590385cae","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":507},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":927},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":953},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":792},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":576},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":583},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1079},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":111},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":635},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":86},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":222},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":204},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":232},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":239},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":339},{"event_id":4789,"event_guid":"684193b5-696e-495f-88eb-04f8d3114e01","weight":80},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":408},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":105},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1486},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":600},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":90},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":892},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":138},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":161},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":298},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":583},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":140},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":161},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":137},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":128},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1265},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":655},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":255},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":347},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":311},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":222},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":342},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":95},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":450},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":77},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":194},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1332},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":382},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":840},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":82},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":93},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":87},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":77},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":77},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":87},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":260},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":213},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":82},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":665},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":132},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":161},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":83},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":144},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":80}]},{"guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","title":"The Ultimate Apollo Guidance Computer Talk","subtitle":"","slug":"34c3-9064-the_ultimate_apollo_guidance_computer_talk","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9064.html","description":"The Apollo Guidance Computer (\"AGC\") was used onboard the Apollo spacecraft to support the Apollo moon landings between 1969 and 1972. This talk explains \"everything about the AGC\", including its quirky but clever hardware design, its revolutionary OS, and how its software allowed humans to reach and explore the moon. \r\n","original_language":"eng","persons":["Michael Steil","Christian Hessmann"],"tags":["34c3","9064","Hardware \u0026 Making"],"view_count":23839,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T12:00:09.026+02:00","length":3701,"duration":3701,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9064-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9064-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/722ce759-9cde-4e3b-8db5-5a97aa9673d9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/722ce759-9cde-4e3b-8db5-5a97aa9673d9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9064-the_ultimate_apollo_guidance_computer_talk","url":"https://api.media.ccc.de/public/events/722ce759-9cde-4e3b-8db5-5a97aa9673d9","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":1318,"event_guid":"import-b5cb111843cef80e01","weight":107},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":224},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":462},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":826},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":531},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":208},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":566},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":448},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":86},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":359},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":87},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":207},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":121},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":318},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":70},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":289},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":600},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":219},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":639},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":104},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":453},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":105},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":110},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":171},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":156},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":108},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":91},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":182},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":981},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":239},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":310},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":389},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":462},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":79},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":112},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":91},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":160},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":70},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":74},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":70},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":257},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":746},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":313},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":476},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":71},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":88},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":100},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":303},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":92},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":495},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":90},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":70}]},{"guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","title":"Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons","subtitle":null,"slug":"34c3-8994-vintage_computing_for_trusted_radiation_measurements_and_a_world_free_of_nuclear_weapons","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8994.html","description":"Eliminating nuclear weapons will require trusted measurement systems to confirm authenticity of nuclear warheads prior to their dismantlement. A new idea for such an inspection system is to use vintage hardware (Apple IIe/6502) instead of modern microprocessors, reducing the attack surface through simplicity. In the talk, we present and demo a custom open hardware measurement system based on gamma spectroscopy.\n\nTwenty-five years after the end of the Cold War, there are still about 15,000 nuclear weapons in the arsenals of the nine nuclear weapon states. After an era of transparency, cooperation, and confidence-building in the 1990s, progress in nuclear arms control has slowed down in the 2000s and is currently in a crisis. The newly negotiated Treaty on the Prohibition of Nuclear Weapons (“Ban Treaty”) and the 2017 Nobel Peace Prize have given new attention to the enduring threat posed by these weapons and the urgency of further reductions. Any further progress toward nuclear disarmament will have to rely on robust verification mechanisms, especially while there is limited trust among relevant states. This requires trusted measurement systems to confirm the authenticity of nuclear warheads based on their radiation signatures. These signatures are considered sensitive information, the systems have to be designed to protect them. To accomplish this task, so-called “information barriers” have been proposed. These devices process the sensitive information acquired during an inspection, but only display results in a pass/fail manner. Traditional inspection systems rely on complex electronics both for data acquisition and processing. Several research efforts have produced prototype systems following fundamentally different design philosophies, but it has proven difficult to demonstrate that hidden switches and side channels do not exist. After almost 30 years of research and development, no viable and widely accepted system has emerged.\n\nWe pursue a fundamentally different approach: Our prototype of an inspection system uses vintage hardware built around a 6502 processor. The processor uses 8-micron technology (about 600 times larger than current 14-nanometer technology) and has only about 3500 transistors. Vintage hardware may have a number of important advantages for applications where two parties need to simultaneously establish trust in the hardware used. CPUs designed in the distant past, at a time when their use for sensitive measurements was never envisioned, drastically reduce concerns that the other party implemented backdoors or hidden switches on the hardware level. Today, the design of the 6502 is de-facto open source, and several projects have explored the hardware in great detail (visual6502.org, monster6502.com). The technology is so basic that it would be difficult or impossible to surreptitiously implement extra functionalities that could be used to leak secret information. For the same reason, however, using vintage hardware also comes at a price, as the performance of the inspection system is limited, and data acquisition and processing has to be designed and highly optimized accordingly. \n\nIn this talk, we demonstrate the performance of the inspection system in an actual inspection setting. For this purpose, we built a prototype system using an Apple IIe and a custom-made open-source data-processing board connected to a sodium-iodide radiation detector for low-resolution gamma spectroscopy. Data processing and analysis is exclusively done on the Apple IIe hardware. In inspection mode, the Apple IIe is used as an information barrier, and the result of the analysis is simply displayed by a green/red (pass/fail) LED on the data-processing board. To wrap up, we discuss the broader context required for verifying deeper cuts in the nuclear arsenals and demonstrate the system as part of a notional inspection scenario, including its capability to detect basic cheating scenarios, in which a dishonest party presents an invalid item that has a different radiation signature.\n","original_language":"eng","persons":["Moritz","ALX"],"tags":["34c3","8994","Hardware \u0026 Making"],"view_count":1501,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-12-29T01:00:13.605+01:00","length":3313,"duration":3313,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8994-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8994-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/68a0f7fd-fb06-4447-b6eb-da17b998d240-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/68a0f7fd-fb06-4447-b6eb-da17b998d240-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8994-vintage_computing_for_trusted_radiation_measurements_and_a_world_free_of_nuclear_weapons","url":"https://api.media.ccc.de/public/events/68a0f7fd-fb06-4447-b6eb-da17b998d240","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":39},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":6},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":41},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":59},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":14},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":30},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":30},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":40},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":42},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":50},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":36},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":30},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":56},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":34},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":40},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":46},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":33},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":36}]},{"guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","title":"Electromagnetic Threats for Information Security","subtitle":"Ways to Chaos in Digital and Analogue Electronics","slug":"34c3-8920-electromagnetic_threats_for_information_security","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8920.html","description":"For non specialists, Electromagnetic Pulse weapons (EMP) are fantasy weapons in science fiction movies. Interestingly, the susceptibility of electronic devices to electromagnetic interference has been advertised since the 90’s. Regarding the high integration of sensors and digital systems to control power-grids, telecom networks and automation infrastructures (e.g. Smart-grids, Industrial Control Systems), the intrinsic vulnerability of electronic devices to electromagnetic interference is of fundamental interest. In the context of IT Security, few studies have been carried out to understand how the effects may be a significant issue especially in the far-field region (distance between the transmitter’s antenna and the target with regard to the wavelength/central frequency). Most studies in Emanation Security (EMSEC) are related to near-field probing for side-channel and fault injection attacks assuming a close physical access to the targeted devices. In this paper, we propose a methodology to detect, classify and correlate the effect induced during the intentional exposure of analogue and digital systems to electromagnetic interference. Applying this methodology, the implication of the effects for the IT security world will be discussed with regards to the attacker profile needed to set-up a given scenario. ","original_language":"eng","persons":["@EMHacktivity ","José Lopes Esteves"],"tags":["34c3","8920","Security"],"view_count":1247,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-18T21:30:05.410+01:00","length":2950,"duration":2950,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8920-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8920-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a39634b4-d220-4c84-bf5a-e52c375827c5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a39634b4-d220-4c84-bf5a-e52c375827c5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8920-electromagnetic_threats_for_information_security","url":"https://api.media.ccc.de/public/events/a39634b4-d220-4c84-bf5a-e52c375827c5","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":21},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":61},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":39},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":39},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":50},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":48},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":41},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":42},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":42},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":85},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":90},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":46},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":36},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":56},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":36},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":37},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":35}]},{"guid":"8453f8f1-d934-4d10-bcfa-a857fa65b8df","title":"Internet censorship in the Catalan referendum","subtitle":"Overview of how the state censored and how it got circumvented","slug":"34c3-9028-internet_censorship_in_the_catalan_referendum","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9028.html","description":"On October 1st the Catalan society held a referendum to decide if they wanted to stay part of the Spanish state or create an independent state. This talk will explain the internet censorship which took place in the weeks before the referendum, on the very same day as well as in the timer after the referendum.\n\nThe talk will focus on the methods used by the state to carry out the censorship. These included websites informing about the referendum and information about the polling station each citizen had to use. I will describe how the censorship got circumvented and give an insight in the systems developed to facilitate an easy cloning of the information.\n\nOn the day of the referendum it was expected that the Spanish police will close down polling stations. Therefor a global census accessible via internet was introduced which allowed the vote at any polling station. I will describe how this global census was organised to block people from voting twice. I will explain in which different ways the census got attacked by the Spanish state. And of course what we can learn from the state censorship to create more resilient infrastructures.","original_language":"eng","persons":["Matthias"],"tags":["34c3","9028","Ethics, Society \u0026 Politics"],"view_count":2541,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-02T02:15:06.312+01:00","length":3024,"duration":3024,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9028-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9028-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8453f8f1-d934-4d10-bcfa-a857fa65b8df-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8453f8f1-d934-4d10-bcfa-a857fa65b8df-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9028-internet_censorship_in_the_catalan_referendum","url":"https://api.media.ccc.de/public/events/8453f8f1-d934-4d10-bcfa-a857fa65b8df","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":26},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":35},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":30},{"event_id":4792,"event_guid":"6abb1f81-c163-4382-8838-8b684147d10c","weight":25},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":24},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":26},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":49},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":26},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":21},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":29},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":24},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":39},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":20},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":29},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":25},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":51},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":25},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":26}]},{"guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","title":"WTFrance","subtitle":"Decrypting French encryption law","slug":"34c3-8919-wtfrance","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8919.html","description":"France is part of the top countries trying to destroy encryption, especially through backdoor obligations, global interceptions, and effort to get access to master keys. French law already criminalises the use of encryption, imposing heavier penalties on people using it or regarding them as general suspects.\nHow can we oppose this trend? What political role for developers?","original_language":"eng","persons":["Agnes","Okhin"],"tags":["34c3","8919","Ethics, Society \u0026 Politics"],"view_count":2476,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-11T05:00:06.728+01:00","length":1890,"duration":1890,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8919-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8919-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/0ff9c9c4-a561-4ec0-afa2-93647a740f26-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/0ff9c9c4-a561-4ec0-afa2-93647a740f26-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8919-wtfrance","url":"https://api.media.ccc.de/public/events/0ff9c9c4-a561-4ec0-afa2-93647a740f26","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":178},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":277},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":152},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":161},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":238},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":188},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":138},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":104},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":262},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":90},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":136},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":194},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":80},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":129},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":104},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":86},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":102},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":172},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":80}]},{"guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","title":"Watching the changing Earth","subtitle":"warning: gravity ahead","slug":"34c3-8964-watching_the_changing_earth","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8964.html","description":"For a few decades by now, satellites offer us the tools to observe the whole Earth with a wide variety of sensors. The vast amount of data these Earth observations systems collect enters the public discourse reduced to a few numbers, numbers like 3 or even 300. So, how do we know the amount of ice melting in the arctic or how much rain is falling in the Amazon? Are groundwater aquifers stable or are they are being depleted? Are these regular seasonal changes or is there a trend? How can we even measure these phenomena on a global scale?\n\nThis talk will provide one possible answer: gravity.","original_language":"eng","persons":["manuel"],"tags":["34c3","8964","Science"],"view_count":3027,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T05:45:03.176+02:00","length":2001,"duration":2001,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8964-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8964-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a66fa9d5-b12c-4d6b-84f9-f279faf38f86-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a66fa9d5-b12c-4d6b-84f9-f279faf38f86-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8964-watching_the_changing_earth","url":"https://api.media.ccc.de/public/events/a66fa9d5-b12c-4d6b-84f9-f279faf38f86","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":234},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":331},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":212},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":260},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":199},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":266},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":168},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":252},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":136},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":166},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":122},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":164},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":102},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":164},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":222},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":148},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":165},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":102},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":109},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":207},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":102}]},{"guid":"991aceeb-d25f-4f59-9317-bf438775a215","title":"Die göttliche Informatik","subtitle":"Die Informatik löst formale (mathematisch modellierte) Probleme ganz vorzüglich – doch nun soll sie alle anderen Probleme auch noch lösen.","slug":"34c3-8998-die_gottliche_informatik_the_divine_computer_science","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8998.html","description":"DE: Die Informatik ist scheinbar das neue Göttliche, das den Klimawandel, die Kriminalität, unser fehlendes Wissen über das Gehirn, den globalen Terror, dichter werdenden Stadtverkehr, die Energieprobleme und die Armut der Welt lösen kann; und zwar mit der Blockchain, mit künstlicher Intelligenz, mit der Cloud und mit Big-Data. Doch inwiefern ist die Informatik überhaupt in der Lage, derartige Probleme hoher gesellschaftlicher Relevanz anzugehen? In diesem Vortrag soll versucht werden, Teile der riesigen Wunschliste an die Informatik mit ihren tatsächlichen aktuellen Möglichkeiten in Einklang zu bringen sowie die ökonomischen Motivationen und Rahmenbedingungen einzubeziehen.\r\n\r\nEN: Computer science seems to be the new divine element that can solve climate change, crime, our lack of knowledge about the brain, global terror, urban traffic, our energy issues and world poverty; with blockchain, with artificial intelligence, with the cloud and big data. But to what extent is computer science even able to address such problems of high societal relevance? In this lecture an attempt will be made to reconcile parts of the huge wish list to computer science with its actual current possibilities and to include the economic motivations and conditions.","original_language":"deu","persons":["Rainer Rehak"],"tags":["34c3","8998","Ethics, Society \u0026 Politics"],"view_count":2821,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-07T11:30:05.648+01:00","length":3678,"duration":3678,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8998-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8998-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/991aceeb-d25f-4f59-9317-bf438775a215-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/991aceeb-d25f-4f59-9317-bf438775a215-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8998-die_gottliche_informatik_the_divine_computer_science","url":"https://api.media.ccc.de/public/events/991aceeb-d25f-4f59-9317-bf438775a215","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":90},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":108},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":75},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":118},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":101},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":71},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":75},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":161},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":154},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":115},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":111},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":124},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":106},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":251},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":155},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":152},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":74},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":143},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":93},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":85},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":168},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":83},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":71},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":85},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":75}]},{"guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","title":"Methodisch inkorrekt!","subtitle":"Die Wissenschaftsgala vom 34C3","slug":"34c3-8922-methodisch_inkorrekt","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8922.html","description":"Der IgNobelpreis ist eine Auszeichnung, um wissenschaftliche Leistungen zu ehren, die „Menschen zuerst zum Lachen, dann zum Nachdenken bringen“ („to honor achievements that first make people laugh, and then make them think“). Wir erklären die Preisträger 2017 in gewohnter Minkorrekt-Manier.\n\nEs geht um Kaffeetrinken, flüssige Katzen und ganz viele primäre Geschlechtsteile.\n\nEigentlich ein Podcast, der alle 14 Tage erscheint. Gelegentlich aber auch auf Bühnen. Aber immer im Dienste der Wissenschaft. Echt jetzt. It works, bitches!","original_language":"deu","persons":["Nicolas Wöhrl","Reinhard Remfort"],"tags":["34c3","8922","Entertainment"],"view_count":29017,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-03T03:30:05.041+02:00","length":6944,"duration":6944,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8922-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8922-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/dec6a7e0-2651-4bb5-8300-977795e901ed-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/dec6a7e0-2651-4bb5-8300-977795e901ed-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8922-methodisch_inkorrekt","url":"https://api.media.ccc.de/public/events/dec6a7e0-2651-4bb5-8300-977795e901ed","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":156},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":210},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":939},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1011},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":875},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":288},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":283},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":922},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":326},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":94},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":147},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":151},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":134},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":241},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":840},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":831},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":476},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":854},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":115},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":109},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":192},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":367},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":109},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":108},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1238},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":700},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":155},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":294},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":194},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":184},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":282},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":121},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":89},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":544},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":88},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":245},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1892},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":939},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":106},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":108},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":103},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":88},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":120},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":98},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":171},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":370},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":245},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":96},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":89},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1096},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":268},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":195},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":104},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":207},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":271},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":97}]},{"guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","title":"KRACKing WPA2 by Forcing Nonce Reuse","subtitle":null,"slug":"34c3-9273-kracking_wpa2_by_forcing_nonce_reuse","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9273.html","description":"We introduce key reinstallation attacks (KRACKs). These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.","original_language":"eng","persons":["Mathy Vanhoef"],"tags":["34c3","9273","Security"],"view_count":3376,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-17T00:45:03.099+01:00","length":3701,"duration":3701,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9273-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9273-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ff24373e-ebe2-4077-9db0-eae5ab003538-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ff24373e-ebe2-4077-9db0-eae5ab003538-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9273-kracking_wpa2_by_forcing_nonce_reuse","url":"https://api.media.ccc.de/public/events/ff24373e-ebe2-4077-9db0-eae5ab003538","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":95},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":132},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":86},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":80},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":160},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":117},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":162},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":140},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":166},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":90},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":76},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":177},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":104},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":68},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":95},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":90},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":203},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":68},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":137},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":111},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":98},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":101},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":101},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":81},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":87}]},{"guid":"bdccda64-ee80-43fb-8e56-931199444188","title":"Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Development","subtitle":null,"slug":"34c3-9105-coming_soon_machine-checked_mathematical_proofs_in_everyday_software_and_hardware_development","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9105.html","description":"Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all.  In contrast, activities like testing, debugging, and code review are accepted as essential.  They are woven into the lives of nearly all developers.  In this talk, I will explain how I see machine-checked proofs enabling new everyday activities for developers of computer software and hardware.  These activities have the potential to lower development effort dramatically, at the same time as they increase our assurance that systems behave correctly and securely.  I will give a cosmological overview of this field, answering the FAQs that seem to stand in the way of practicality; and I will illustrate the principles with examples from projects that you can clone from GitHub today, covering the computing stack from digital hardware design to cryptographic software and applications.\n\n\u003cp\u003eToday's developers of computer software and hardware are tremendously effective, compared to their predecessors.  We have found very effective ways of \u003cb\u003emodularizing\u003c/b\u003e and \u003cb\u003evalidating\u003c/b\u003e our work.  The talk is about ammunition for these activities from a perhaps-unexpected source.\u003c/p\u003e\n\n\u003cp\u003e\u003cb\u003eModularity\u003c/b\u003e involves breaking a complex system into a hierarchy of simpler pieces, which may be written and understood separately.  Structured programming (e.g., using loops and conditionals instead of \u003ctt\u003egoto\u003c/tt\u003es) helps us read and understand parts of a single function in isolation, and data abstraction lets us encapsulate important functionality in objects, with guarantees that other code can only access the private data by calling public methods.  That way, we can convince ourselves that the encapsulated code upholds certain essential properties, \u003ci\u003eregardless of which other code it is linked with\u003c/i\u003e.  Systematic unit testing also helps enforce contracts for units of modularity.  Each of these techniques can be rerun automatically, to catch regressions in evolving systems, and catch those regressions in a way that accurately points the finger of responsibility to particular modules.\u003c/p\u003e\n\n\u003cp\u003e\u003cb\u003eValidation\u003c/b\u003e is an important part of development that encompasses testing, debugging, code review, and anything else that we do to raise our confidence that the system behaves as intended.  Experienced engineers know that validation tends to take up the majority of engineering effort.  Often that effort involves mentally taxing activities that would not otherwise come up in coding.  One example is thinking about test-case coverage, and another is including instrumentation that produces traces to consult during debugging.\u003c/p\u003e\n\n\u003cp\u003eIt is not hard for working developers to imagine great productivity gains from better ways to break systems into pieces or raise our confidence in those pieces.  The claim I will make in this talk is that a key source of such insights has been neglected: \u003cb\u003emachine-checked mathematical proofs\u003c/b\u003e.  Here the basic functionality is an ASCII language for defining mathematical objects, stating theorems about them, and giving proofs of theorems.  Crucially, an algorithm checks that purported proofs really do establish the theorems.  By going about these activities in the style of programming, we inherit usual supporting tools like IDEs, version control, continuous integration, and automated build processes.  But how could so esoteric a task as math proofs call for that kind of tooling, and what does it have to do with building real computer systems?\u003c/p\u003e\n\n\u003cp\u003eI will explain a shared vision to that end, developed along with many other members of my research community.  Let me try to convince you that all of the following goals are attainable in the next 10 years.\u003c/p\u003e\n\n\u003cul\u003e\n  \u003cli\u003eWe will have complete computer systems implementing moderately complex network servers for popular protocols, \u003ci\u003eproved to implement those protocols correctly, from the level of digital circuits on up\u003c/i\u003e.  We will remove all deployed code (hardware or software) from the trusted computing base, shifting our trust to much smaller specifications and proof checkers.\u003c/li\u003e\n  \u003cli\u003eHobbyists will be able to design new embedded computing platforms by mixing and matching open-source hardware and software components, also mixing and matching \u003ci\u003ethe proofs\u003c/i\u003e of these components, \u003ci\u003eguaranteeing no bugs at the digital-abstraction level or higher\u003c/i\u003e, with \u003ci\u003eno need for debugging\u003c/i\u003e.\u003c/li\u003e\n  \u003cli\u003eNew styles of library design will be enabled by the chance to attach a \u003ci\u003eformal behavioral specification\u003c/i\u003e to each library.  For instance, rank-and-file programmers will able to assemble their own code for cryptographic protocols, with code that looks like reference implementations in Python, but \u003ci\u003egetting performance comparable to what experts handcraft in assembly today\u003c/i\u003e.  Yet that benefit would come with \u003ci\u003eno need to trust that library authors have avoided bugs or intentional backdoors\u003c/i\u003e, perhaps even including \u003ci\u003eautomatic proofs of cryptographic security properties\u003c/i\u003e.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eMain technical topics to cover to explain my optimism:\u003c/p\u003e\n\n\u003cul\u003e\n  \u003cli\u003eThe basic functionality of \u003ci\u003eproof assistants\u003c/i\u003e and why we should trust their conclusions\u003c/li\u003e\n  \u003cli\u003eHow to think about system decomposition with specifications and proofs, including why, for most components, we do not need to worry about specification mistakes\u003c/li\u003e\n  \u003cli\u003eThe different modes of applying proof technology to check or generate components\u003c/li\u003e\n  \u003cli\u003eThe engineering techniques behind cost-effective proof authoring for realistic systems\u003c/li\u003e\n  \u003cli\u003eA hardware case study: \u003ca href=\"https://github.com/mit-plv/kami\"\u003eKami\u003c/a\u003e, supporting component-based digital hardware authoring with proofs\u003c/li\u003e\n  \u003cli\u003eA software case study: \u003ca href=\"https://github.com/mit-plv/fiat-crypto\"\u003eFiat Cryptography\u003c/a\u003e, supporting correct-by-construction auto-generation of fast code for elliptic-curve cryptography\u003c/li\u003e\n  \u003cli\u003ePointers to where to look next, if you would like to learn more about this technology\u003c/li\u003e\n\u003c/ul\u003e","original_language":"eng","persons":["Adam Chlipala"],"tags":["34c3","9105","Resilience"],"view_count":3993,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-02T15:45:07.597+02:00","length":3699,"duration":3699,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9105-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9105-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/bdccda64-ee80-43fb-8e56-931199444188-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/bdccda64-ee80-43fb-8e56-931199444188-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9105-coming_soon_machine-checked_mathematical_proofs_in_everyday_software_and_hardware_development","url":"https://api.media.ccc.de/public/events/bdccda64-ee80-43fb-8e56-931199444188","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":75},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":62},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":73},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":68},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":53},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":24},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":69},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":73},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":54},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":59},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":53},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":7},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":7},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":29},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":7},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":108},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":61},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":61},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":68},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":55},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":54}]},{"guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","title":"Home Distilling","subtitle":"Theory and practice of moonshining and legal distilling","slug":"34c3-8938-home_distilling","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8938.html","description":"This talk covers the theory, legality and economics of home distilling. We present the theoretical background of mashing, fermenting and distilling alcohol as well as the legal framework for home distilling in Germany from 2018 on.\n\nOur theory part covers both the biochemical and physical principles of fermenting fruit mash to alcohol, of distilling this alcohol to a fine spirit and best practices of how to gain maximum output at the best taste. The legal and regulations part shows how to do this process legally under the new German alcohol law of 2018, and how to avoid serious health risks, a.k.a. explosions and burn prevention. The theoretical part will close with a short introduction on the economics of craft distilling, in terms of time consumption and financial investments necessary to get up and running.","original_language":"eng","persons":["freibrenner"],"tags":["34c3","8938","Hardware \u0026 Making"],"view_count":2153,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-24T23:30:09.489+01:00","length":1732,"duration":1732,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8938-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8938-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/9ba995df-b1ca-402d-b1c8-c21e5faacd3b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/9ba995df-b1ca-402d-b1c8-c21e5faacd3b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8938-home_distilling","url":"https://api.media.ccc.de/public/events/9ba995df-b1ca-402d-b1c8-c21e5faacd3b","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":71},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":67},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":99},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":66},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":72},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":74},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":151},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":59},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":124},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":65},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":64},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":67},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":597},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":90},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":78},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":119},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":89},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":69}]},{"guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","title":"Der PC-Wahl-Hack","subtitle":"Analyse einer Wahlsoftware","slug":"34c3-9247-der_pc-wahl-hack","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9247.html","description":"Hacker des Chaos Computer Clubs (CCC) haben eine in mehreren Bundesländern zur Erfassung und Auswertung der kommenden Bundestagswahl verwendete Software auf Angriffsmöglichkeiten untersucht. Die Analyse ergab eine Vielzahl von Schwachstellen und mehrere praktikable Angriffsszenarien. Diese erlauben die Manipulation von Wahlergebnissen auch über die Grenzen von Wahlkreisen und Bundesländern hinweg. Die untersuchte Software „PC-Wahl“ wird seit mehreren Jahrzehnten für die Erfassung, Auswertung und Präsentation von Wahlen auf Bundes-, Landes- und Kommunalebene eingesetzt.\n\nhttps://ccc.de/de/updates/2017/pc-wahl\nhttps://ccc.de/de/updates/2017/pc-wahl-again\nhttps://ccc.de/system/uploads/230/original/PC-Wahl_Bericht_CCC.pdf\n","original_language":"deu","persons":["Linus Neumann","Martin Tschirsich","Thorsten Schröder"],"tags":["34c3","9247","CCC"],"view_count":7268,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2018-01-03T01:00:00.000+01:00","updated_at":"2026-03-24T07:15:04.447+01:00","length":3308,"duration":3308,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9247-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9247-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4d3d9d56-7617-44da-b620-21ce5389a0b2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4d3d9d56-7617-44da-b620-21ce5389a0b2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9247-der_pc-wahl-hack","url":"https://api.media.ccc.de/public/events/4d3d9d56-7617-44da-b620-21ce5389a0b2","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":38},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":99},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":89},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":141},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":63},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":52},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":146},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":58},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":67},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":38},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":37},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":54},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":83},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":144},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":57},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":109},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":50},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":72},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":186},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":112},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":67},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":81},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":76},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":118},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":71},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":241},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":126},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":104},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":40},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":43},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":37},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":88},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":55},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":38},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":49},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":189},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":83},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":128},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":136},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":43},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":40}]},{"guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","title":"Microarchitectural Attacks on Trusted Execution Environments","subtitle":null,"slug":"34c3-8950-microarchitectural_attacks_on_trusted_execution_environments","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8950.html","description":"Trusted Execution Environments (TEEs), like those based on ARM TrustZone or Intel SGX, intend to provide a secure way to run code beyond the typical reach of a computer’s operating system.\nHowever, when trusted and untrusted code runs on shared hardware, it opens the door to the same microarchitectural attacks that have been exploited for years. This talk provides an overview of these attacks as they have been applied to TEEs, and it additionally demonstrates how to mount these attacks on common TrustZone implementations. Finally, we identify new techniques which allow us to peer within TrustZone TEEs with greater resolution than ever before.","original_language":"eng","persons":["Keegan Ryan"],"tags":["34c3","8950","Security"],"view_count":1131,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-09T13:00:06.312+01:00","length":3301,"duration":3301,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8950-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8950-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/16c756dd-cb07-4c0e-9885-98243026f7cf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/16c756dd-cb07-4c0e-9885-98243026f7cf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8950-microarchitectural_attacks_on_trusted_execution_environments","url":"https://api.media.ccc.de/public/events/16c756dd-cb07-4c0e-9885-98243026f7cf","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":5},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":5},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":15},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":41},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":29},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":5},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":29},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":28},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":45},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":15},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":29},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":15},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":24},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":5},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":32},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":17},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":33},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":25},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":26},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":28},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":15}]},{"guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","title":"Dude, you broke the Future!","subtitle":null,"slug":"34c3-9270-dude_you_broke_the_future","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9270.html","description":"We're living in yesterday's future, and it's nothing like the speculations of our authors and film/TV producers. As a working science fiction novelist, I take a professional interest in how we get predictions about the future wrong, and why, so that I can avoid repeating the same mistakes. Science fiction is written by people embedded within a society with expectations and political assumptions that bias us towards looking at the shiny surface of new technologies rather than asking how human beings will use them, and to taking narratives of progress at face value rather than asking what hidden agenda they serve.\n\nIn this talk, author Charles Stross will give a rambling, discursive, and angry tour of what went wrong with the 21st century, why we didn't see it coming, where we can expect it to go next, and a few suggestions for what to do about it if we don't like it. \n","original_language":"eng","persons":["Charles Stross"],"tags":["34c3","9270","Art \u0026 Culture"],"view_count":37675,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-04-01T11:15:05.689+02:00","length":3477,"duration":3477,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9270-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9270-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2ef3b60f-6e5c-4c23-a145-d263685ec13e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2ef3b60f-6e5c-4c23-a145-d263685ec13e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9270-dude_you_broke_the_future","url":"https://api.media.ccc.de/public/events/2ef3b60f-6e5c-4c23-a145-d263685ec13e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":84},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":2621},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1633},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1084},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1132},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2176},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":366},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":276},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1070},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":277},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":132},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":103},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":331},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":135},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":575},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":161},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":281},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":353},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":84},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":527},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":953},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":172},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1214},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":826},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":132},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1264},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":120},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":182},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":191},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":429},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":244},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":108},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":107},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":190},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":181},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1785},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":522},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":247},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":444},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":404},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":91},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":207},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":222},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":111},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":89},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":390},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":152},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":354},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":93},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":84},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":2398},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":403},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1011},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":158},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":140},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":153},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":90},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":85},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":95},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":262},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":417},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":109},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1004},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":223},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":196},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":89},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":160},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":138}]},{"guid":"439d7085-4f24-45ac-843f-987f89c4446d","title":"Lightning Talks Day 3","subtitle":null,"slug":"34c3-9257-lightning_talks_day_3","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9257.html","description":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!\n\nTo get involved and learn more about what is happening please visit the Lightning Talks Wikipage at \u003ca href=\"https://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\"\u003ehttps://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\u003c/a\u003e","original_language":"eng","persons":["gedsic","bigalex"],"tags":["34c3","9257","CCC"],"view_count":2515,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2018-01-09T01:00:00.000+01:00","updated_at":"2026-03-28T18:45:06.158+01:00","length":6064,"duration":6064,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9257-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9257-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/439d7085-4f24-45ac-843f-987f89c4446d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/439d7085-4f24-45ac-843f-987f89c4446d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9257-lightning_talks_day_3","url":"https://api.media.ccc.de/public/events/439d7085-4f24-45ac-843f-987f89c4446d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3675,"event_guid":"090675f6-f86e-4082-886b-e13c9c837ecb","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":7},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":13},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":7},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":7},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":7},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":18},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":6},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":6},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":10},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":9},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":60},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":19},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":6},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":6},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":6},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":6},{"event_id":4927,"event_guid":"edfd7686-0117-43c4-8e42-030408de5e91","weight":62},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":6},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":12},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":6},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":6},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":10},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":7},{"event_id":4940,"event_guid":"ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4","weight":14},{"event_id":5658,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb890","weight":42},{"event_id":6006,"event_guid":"efce5d58-73c6-4431-bfc7-d503b4b51433","weight":8}]},{"guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","title":"cryptocurrencies, smart contracts, etc.: revolutionary tech?","subtitle":"short answer: Yes!","slug":"34c3-9240-cryptocurrencies_smart_contracts_etc_revolutionary_tech","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9240.html","description":"Bitcoin arrived eight years ago, and has now spawned a dazzling array of follow-on technologies, including smart contracts, censorship-resistant computation, trustless databases (“blockchains”) and more. This talk attempts to highlight a few of the most significant developments in both technology and in society's response to it, including some nation-state governments banning cryptocurrencies and/or launching their own cryptocurrencies.\n\nThis talk will briefly summarize in broad strokes what previously-impossible technologies have now been proven and deployed (starting with Bitcoin), as well as the general outlines of nascent technologies are currently under development. It will also briefly outline the evolution of the market and the social response to these technologies, such as the ICO boom and the varying reactions of different populations and governments. It will also draw out a few examples that illustrate the situation in more detail, such as the recent crackdown by the Chinese government, the deployment and evolution of Ethereum, and the massive investment into new technologies which is being fueled by the ICO boom.","original_language":"eng","persons":["Zooko"],"tags":["34c3","9240","Ethics, Society \u0026 Politics"],"view_count":4682,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-21T14:15:09.296+01:00","length":4159,"duration":4159,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9240-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9240-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/73bcc647-faa3-4c6c-8a48-8d540de454ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/73bcc647-faa3-4c6c-8a48-8d540de454ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9240-cryptocurrencies_smart_contracts_etc_revolutionary_tech","url":"https://api.media.ccc.de/public/events/73bcc647-faa3-4c6c-8a48-8d540de454ee","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":96},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":158},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":100},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":110},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":154},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":119},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":114},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":117},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":141},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":111},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":213},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":97},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":101},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":95},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":13},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":139},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":121},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":242},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":58},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":106},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":106},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":164},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":130}]},{"guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","title":"Italy's surveillance toolbox","subtitle":"Research on Monitoring Italian Government Surveillance Capabilities by means of Transparency tools","slug":"34c3-9148-italy_s_surveillance_toolbox","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9148.html","description":"This project aims to take advantage of the availability of public procurement data sets, required by anticorruption transparency laws, to discover government surveillance capabilities in Italy.\n\n\nIn this talk I'll present a mixed-strategy approach, based on transparency and privacy activism, to uncover government capabilities analyzing procurement data of Ministry of Interior, Justice and Defense that are allowed by law to buy and use surveillance products and services.\n\nThis project will present manifold outcomes, such as the mapping of surveillance capabilities, monitoring governmental expenditures, discovering governmental project codenames, providers and peculiar participants of surveillance related tenders.\n\nThe project will take advantage of the new italian FOIA laws by asking for:\n- all invoices of each company that we found out selling surveillance technologies to the government\n- all technical and economic offers of all the contractors related to surveillance technologies\n\nPreliminary findings of the prototyping phase have been presented at the Freedom Not Fear 201, where we described the strategy we are using and talked about some early results showing documents we received with a FOIA requests: the Ministry of Interior provided us with 85 invoices issued by Area SpA, an italian surveillance company known for selling surveillance technology to Egypt.\n\nThus, with this project, we’ll try to shed light on the use of surveillance technologies providing a public database of knowledgeable information that can help to hold governments accountable for violations of human rights.\n\nIn this talk I'll show early results in:\n- Mapping surveillance capabilities of the Government \n- Updating a database of companies selling surveillance tech \n- Discovering official resellers of other foreign surveillance companies\n- Detailing governmental expenditures for surveillance technologies\n","original_language":"eng","persons":["boter"],"tags":["34c3","9148","Ethics, Society \u0026 Politics"],"view_count":826,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-02-10T21:15:07.478+01:00","length":1668,"duration":1668,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9148-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9148-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/1a4ac7bc-1ca5-4674-a736-38d796b0c36a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/1a4ac7bc-1ca5-4674-a736-38d796b0c36a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9148-italy_s_surveillance_toolbox","url":"https://api.media.ccc.de/public/events/1a4ac7bc-1ca5-4674-a736-38d796b0c36a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":23},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":23},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":29},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":26},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":23},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":31},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":38},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":13},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":24},{"event_id":4868,"event_guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","weight":26},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":15},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":43},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":25},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":27},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":27},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":36},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":13},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":37},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":23},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":36},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":24},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":34}]},{"guid":"3ab79865-b681-4d61-8ac5-6d8aa4678d08","title":"The seizure of the Iuventa","subtitle":"How search and rescue in the mediterranean was criminalized","slug":"34c3-8806-the_seizure_of_the_iuventa","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8806.html","description":"The ship „Iuventa“ of the organization „Jugend Rettet“ was seized on August 2nd 2017 by the Italian authorities. The accusations: facilitating illegal immigration, organized crime and possession of weapons. What followed was a smear campaign that had seldomly been seen before. Against „Jugend Rettet“ and all the other NGOs that do search and rescue (SAR) in the mediterranean sea.","original_language":"eng","persons":["Hendrik","Kathrin"],"tags":["34c3","8806","Ethics, Society \u0026 Politics"],"view_count":703,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-12-16T23:30:04.323+01:00","length":1933,"duration":1933,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8806-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8806-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/3ab79865-b681-4d61-8ac5-6d8aa4678d08-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/3ab79865-b681-4d61-8ac5-6d8aa4678d08-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8806-the_seizure_of_the_iuventa","url":"https://api.media.ccc.de/public/events/3ab79865-b681-4d61-8ac5-6d8aa4678d08","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":18},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":22},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":16},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":18},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":12},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":21},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":12},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":18},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":21},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":18},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":24},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":17},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":18},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":18},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":21},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":19}]},{"guid":"264c9958-ba75-487e-b23f-703e837336de","title":"openPower - the current state of commercial openness in CPU development","subtitle":"is there no such thing as open hardware?","slug":"34c3-9202-openpower_-_the_current_state_of_commercial_openness_in_cpu_development","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9202.html","description":"How does developing future processors with yesterdays capabilities work out today? CPU development is something out of focus these days. In this lecture I would like to show the state-of-the-art processor development flow of POWER processors from the first initial ideas to post-silicon testing. Apart from x86 Intel products there have been initiatives across the hardware industry to form some alternative business model. I would like to show if and how this compares to real open principals.\n\nThis talk should first give a brief overview of how processor development is done these days and which steps are required to get to working products at the end of the day, what is needed from a technical perspective, how many people are involved during the process and which process steps are required. Second it should show which requirements are out there for server/cloud products and their customers. Third it should address why there is this openPOWER initiative and what it all means in regards to hardware development. It should show more detailed information the ideas behind this group of different hardware suppliers and universities. It will definitely not end up in an promotional talk but more look behind the curtains how open this format really is and if it can be used by real people at the end or if it only applies to commercial entities.","original_language":"eng","persons":["Matteo Michel"],"tags":["34c3","9202","Hardware \u0026 Making"],"view_count":796,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-09-25T04:00:02.267+02:00","length":1899,"duration":1899,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9202-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9202-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/264c9958-ba75-487e-b23f-703e837336de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/264c9958-ba75-487e-b23f-703e837336de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9202-openpower_-_the_current_state_of_commercial_openness_in_cpu_development","url":"https://api.media.ccc.de/public/events/264c9958-ba75-487e-b23f-703e837336de","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":18},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":25},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":27},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":30},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":29},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":32},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":25},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":27},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":16},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":39},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":38},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":35},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":31},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":59},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":22},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":24},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":43},{"event_id":4932,"event_guid":"d30b21b9-726d-4ceb-bc68-6858cd158e36","weight":24}]},{"guid":"5c5e888e-4556-405b-a205-e59b97db99e1","title":"LatticeHacks","subtitle":"Fun with lattices in cryptography and cryptanalysis","slug":"34c3-9075-latticehacks","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9075.html","description":"Lattices are an extremely useful mathematical tool for cryptography.\nThis talk will explain the basics of lattices in cryptography and cryptanalysis.\n\nIt’s an exciting time for public-key cryptography. With the threat of practical quantum computers looming in the next few decades, it’s high time to replace the systems that can be broken by a quantum computer with ones that remain secure even if the attacker has a quantum computer. However, this is easier said than done – there is no consensus what replacements should be chosen and how secure the systems are. NIST has just started a 5-7 year competition with the target to recommend a portfolio of post-quantum encryption and signature schemes. Considerations will be speed, bandwidth, and of course security.\n\nSeveral of the submissions are based on lattices. At our current level of understanding, lattice-based cryptography offers relatively small public keys for both encryption and signatures, while having good performance and reasonably sized ciphertexts and signatures. While these features are nice and make us want to know more about lattices, that world can be a scary place full of discussions of Minkowski bounds, Gaussian distributions, and orthogonalized bases. We will show how these schemes work in accessible terms.\n\nLattices have been used in cryptography for more than thirty years, but for most of that only as a tool to attack systems, starting with knapsack systems in the early 80’s. Lattices can also be used to break conventional public-key cryptosystems such as RSA or Diffie-Hellman when they are incorrectly implemented. This talk will explain these fun attacks in concrete terms, with code you can run at home.\n\nAlgorithms will be presented as Python/Sage code snippets and will already be online before the talk at https://latticehacks.cr.yp.to.\n\nThis is a joint presentation by Daniel J. Bernstein, Nadia Heninger, and Tanja Lange, surveying work by many people.","original_language":"eng","persons":["djb","Tanja Lange","Nadia Heninger"],"tags":["34c3","9075","Security"],"view_count":3686,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-19T13:00:07.447+01:00","length":3955,"duration":3955,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9075-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9075-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/5c5e888e-4556-405b-a205-e59b97db99e1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/5c5e888e-4556-405b-a205-e59b97db99e1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9075-latticehacks","url":"https://api.media.ccc.de/public/events/5c5e888e-4556-405b-a205-e59b97db99e1","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":89},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":71},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":58},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":58},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":56},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":67},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":56},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":60},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":59},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":55},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":56},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":64},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":126},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":69},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":85},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":104},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":104},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":74},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":85},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":55}]},{"guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","title":"Hacker Jeopardy","subtitle":"Zahlenraten für Geeks","slug":"34c3-9007-hacker_jeopardy","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9007.html","description":"The Hacker Jeopardy is a quiz show.\n\nThe well known reversed quiz format, but of course hacker style. It once was entitled „number guessing for geeks“ by a German publisher, which of course is an unfair simplification. It’s also guessing of letters and special characters. ;)\n\nThree initial rounds will be played, the winners will compete with each other in the final.\n\nThe event will be in German, we hope to have live translation again.","original_language":"deu","persons":["Sec","Ray"],"tags":["34c3","9007","Entertainment"],"view_count":13442,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-21T12:45:05.306+01:00","length":7212,"duration":7212,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9007-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9007-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2cb8f405-10be-40f5-ae95-579f024a0c84-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2cb8f405-10be-40f5-ae95-579f024a0c84-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9007-hacker_jeopardy","url":"https://api.media.ccc.de/public/events/2cb8f405-10be-40f5-ae95-579f024a0c84","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":159},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":435},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":403},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":289},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":242},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":218},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":289},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":202},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":94},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":86},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":107},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":147},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":243},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":382},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":363},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":313},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":252},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":139},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":264},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":134},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":89},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":619},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":351},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":139},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":325},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":200},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":120},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":213},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":425},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":239},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":888},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":939},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":85},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":90},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":95},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":250},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":216},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":215},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":638},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":144},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":108},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":126},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":100},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":175}]},{"guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","title":"TrustZone is not enough","subtitle":"Hijacking debug components for embedded security","slug":"34c3-8831-trustzone_is_not_enough","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8831.html","description":"This talk deals with embedded systems security and ARM processors architecture. Most of us know that we can perform security with the ARM TrustZone framework. I will show that most ARM processors include debug components (aka CoreSight components) that can be used to create efficient security mechanisms.\n\nEmbedded security is still a hot topic. For several years, ARM have proposed its TrustZone framework. With some colleagues, we have studied how we could use debug components available in most ARM processors to create security mechanisms targeting a wide range of attacks (buffer overflows, ROPs…) with minimal performance overheads.\nWe use CoreSight debug components in with a technique called dynamic information flow tracking (aka DIFT) which allow us to monitor the execution of an application at runtime. Compared to existing works, we show that there’s no need to modify the main processor (existing binaries will be compatible!). Furthermore, we used a coprocessor implemented in reconfigurable logic (FPGA chip) to speedup the DIFT process.\nThis ARM/FPGA combo is up to 90% faster than related techniques in terms of instrumentation time. Furthermore, as the ARM CPU has not been modified (while existing works do modify it…), the final user doesn’t have to recompile all his/her programs to be compatible with our approach.\nWe will also show a few clues to indicate how we could target multi-threaded/multi-processor architectures as it is the case of most embedded systems by now.\n","original_language":"eng","persons":["Pascal Cotret"],"tags":["34c3","8831","Security"],"view_count":671,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2018-01-09T01:00:00.000+01:00","updated_at":"2026-02-22T01:15:04.457+01:00","length":1883,"duration":1883,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8831-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8831-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/fd734b31-4f79-4d1f-879f-3f7248c60dad-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/fd734b31-4f79-4d1f-879f-3f7248c60dad-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8831-trustzone_is_not_enough","url":"https://api.media.ccc.de/public/events/fd734b31-4f79-4d1f-879f-3f7248c60dad","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":15},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":5},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":9},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":9},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":2},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":9},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":4},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":11},{"event_id":4811,"event_guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","weight":19},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":2},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":11},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":9},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":18},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":11},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":10},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":12},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":4},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":15},{"event_id":4853,"event_guid":"7f293cf6-6d19-43ed-8aa7-7371e008bd45","weight":9},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":9},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":14},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":2},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":9},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":2},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":9},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":12},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":11},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":3},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":11},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":11},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":13},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":3},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":18},{"event_id":4932,"event_guid":"d30b21b9-726d-4ceb-bc68-6858cd158e36","weight":16},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":8},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":9},{"event_id":4940,"event_guid":"ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4","weight":16},{"event_id":4941,"event_guid":"02146e03-1a07-44f2-83b3-e1fd261a4214","weight":14}]},{"guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","title":"History and implications of DRM","subtitle":"From tractors to Web standards","slug":"34c3-9110-history_and_implications_of_drm","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9110.html","description":"Digital Restrictions Management (DRM) is found everywhere from music to cars and, most recently, World Wide Web Consortium recommendations. How did we get here and where are we going with DRM? Who really owns not just your tools, but your experiences when someone (or something) else is controlling access to the data and access around them?  We'll attempt to answer these questions, and more, in a historical overview, contemporary analysis, and look towards the future.\n\nThis talk will cover a range of technologies and use (and failure) cases in how digital experiences are being restricted and controlled by \"rights holders.\" It will also touch on what it means to be a rights holder, and how that's affecting digital media and technology. This talk is aimed at a general audience, and will be tackling these topics at a basic level, with the aim to create shared language and understanding.","original_language":"eng","persons":["Molly de Blanc"],"tags":["34c3","9110","Ethics, Society \u0026 Politics"],"view_count":783,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-03T18:30:07.226+01:00","length":1970,"duration":1970,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9110-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9110-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6dcdb702-ce9b-4351-aab9-2a2ac3780a17-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6dcdb702-ce9b-4351-aab9-2a2ac3780a17-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9110-history_and_implications_of_drm","url":"https://api.media.ccc.de/public/events/6dcdb702-ce9b-4351-aab9-2a2ac3780a17","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":27},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":7},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":45},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":15},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":29},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":30},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":30},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":30},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":32},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":23},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":39},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":58},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":36},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":15},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":29},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":27},{"event_id":4880,"event_guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","weight":17},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":33}]},{"guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","title":"Internet of Fails","subtitle":"Where IoT has gone wrong","slug":"34c3-9193-internet_of_fails","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9193.html","description":"Expect current examples of IoT fails that I collected during my work as a journalist in regards of privacy and security. What do such fails mean for society? What are possible solutions and what can customers do?","original_language":"eng","persons":["Barbara Wimmer"],"tags":["34c3","9193","Ethics, Society \u0026 Politics"],"view_count":19930,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T11:00:07.206+02:00","length":3560,"duration":3560,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9193-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9193-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/16645200-2036-4a3c-a44d-a5ff44ac2991-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/16645200-2036-4a3c-a44d-a5ff44ac2991-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9193-internet_of_fails","url":"https://api.media.ccc.de/public/events/16645200-2036-4a3c-a44d-a5ff44ac2991","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1033},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1785},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1066},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":707},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":904},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1273},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":197},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":1008},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":172},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":207},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":473},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":220},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":319},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":544},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":124},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":751},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1265},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":274},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1817},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":981},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":203},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":93},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1353},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":119},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":107},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":197},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":375},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":765},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":357},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":109},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":152},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":176},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":310},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":383},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":1013},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":95},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":429},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":935},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":672},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":179},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":340},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":493},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":207},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":126},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":102},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":103},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":147},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":151},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":743},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":96},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":170},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":688},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":123},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":91},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1949},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":619},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1238},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":213},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":196},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":101},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":170},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":112},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":103},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":128},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":439},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":633},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":113},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":206},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1808},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":172},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":255},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":186},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":154},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":157}]},{"guid":"581ccbad-4bbf-47a2-8845-f52278d61061","title":"Intel ME: Myths and reality","subtitle":null,"slug":"34c3-8782-intel_me_myths_and_reality","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8782.html","description":"Many claims were made recently about purpose and capabilities of the Intel ME but with all the buzz it is not always clear what are facts and what is just speculation. We'll try to clear the fog of misunderstanding with research based on investigations of ME firmware and practical experiments on ME-equipped hardware.\n\nWe would like to cover the most common claims about the ME, based in part on the new research done in the few last years such as complete recovery of the proprietary Huffman compression which previously hindered research into some parts of the ME firmware, as well as describe what steps can ordinary users take to reduce the attack surface exposed by the ME.\n\nSome of the claims we plan to  cover:\n\n• It's a  backdoor made for NSA and serves no useful purpose\n• It is always on even if the PC is turned off\n• It can read all data on PC/spy on the user\n• It can't be disabled\n• It can lock the PC with a command sent over the air\n• It a black box which can't be audited because it's closed source\n• End users can't do anything about it. \n\nTogether with the talk we're planning to make available detailed notes on reverse engineering of the ME firmware with some pointers to the identified functionality for other interested researchers.\n","original_language":"eng","persons":["Igor Skochinsky","Nicola Corna"],"tags":["34c3","8782","Security"],"view_count":9617,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-04T11:30:04.629+02:00","length":3753,"duration":3753,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8782-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8782-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/581ccbad-4bbf-47a2-8845-f52278d61061-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/581ccbad-4bbf-47a2-8845-f52278d61061-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8782-intel_me_myths_and_reality","url":"https://api.media.ccc.de/public/events/581ccbad-4bbf-47a2-8845-f52278d61061","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":111},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":138},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":82},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":493},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":111},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":91},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":98},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":50},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":87},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":87},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":75},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":100},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":207},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":133},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":222},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":80},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":82},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":104},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":78},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":83},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":74},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":75},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":99},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":85},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":130},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":84},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":127}]},{"guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","title":"Why Do We Anthropomorphize Computers?...","subtitle":"...and dehumanize ourselves in the process?","slug":"34c3-9296-why_do_we_anthropomorphize_computers","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9296.html","description":"A talk on waiting for the technological rapture in the church of big data. The paralysing effect of hiding the human hand in software through anthropomorphising computers and dehumanising ourselves.\n","original_language":"eng","persons":[" Marloes de Valk"],"tags":["34c3","9296","Art \u0026 Culture"],"view_count":1068,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-22T16:15:07.687+01:00","length":1924,"duration":1924,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9296-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9296-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/3a957087-9ee2-47e8-b74a-d0a1a18d3673-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/3a957087-9ee2-47e8-b74a-d0a1a18d3673-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9296-why_do_we_anthropomorphize_computers","url":"https://api.media.ccc.de/public/events/3a957087-9ee2-47e8-b74a-d0a1a18d3673","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":54},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":33},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":43},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":46},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":55},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":44},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":34},{"event_id":4806,"event_guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","weight":31},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":63},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":47},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":72},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":46},{"event_id":4848,"event_guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","weight":34},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":37}]},{"guid":"02146e03-1a07-44f2-83b3-e1fd261a4214","title":"eMMC hacking, or: how I fixed long-dead Galaxy S3 phones","subtitle":"A journey on how to fix broken proprietary hardware by gaining code execution on it","slug":"34c3-8784-emmc_hacking_or_how_i_fixed_long-dead_galaxy_s3_phones","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8784.html","description":"How I hacked Sasmung eMMC chips: from an indication that they have a firmware - up until code execution ability on the chip itself, relevant to a countless number of devices. It all started when Samsung Galaxy S3 devices started dying due to a bug in their eMMC firmware. I will cover how I figured out there's a firmware inside the chip, how I obtained it, and my journey to gaining code execution on the chip itself \u0026mdash; up until the point in which I could grab a bricked Galaxy S3, and fix it by software-only means.\n\n\u003cp\u003eFew years ago Samsung Galaxy S3 devices started dying all around the world (a phenomenon known as \"Galaxy S3 Sudden Death\"). The faulty hardware was pinpointed to its eMMC chip (made by Samsung). eMMC are basically SD cards in BGA form soldered to the PCB, but as it apperas - they hide a CPU and a firmware inside.\u003c/p\u003e\n\u003cp\u003eSamsung eMMC chips support some vendor-specific, undocumented eMMC commands. By doing some guesswork and finding the right sequence of commands I was able to dump the entire RAM (and firmware) of the eMMC chip, which appears to sport an \u003ci\u003eARM Cortex-M3\u003c/i\u003e chip inside. But how can we know what causes the device to fail?\u003c/p\u003e\n\u003cp\u003eSamsung has written a Linux patch which patches the eMMC's RAM in order to fix the problem. However, investigating the patch itself reveals that it does nothing more than jumping to an infinite loop when something goes wrong. We needed a more inherent fix. By utilizing Samsung's own vendor-specific commands, we can write the eMMC's RAM in order to achieve code execution, or even write to the eMMC's NAND flash memory directly. We can update its firmware and fix the problem altogether.\u003c/p\u003e\n\u003cp\u003eHowever, when a device is bricked, how do we even get to send commands to its soldered eMMC chip by software-only means? I will show a working exploit against Samsung's boot-loader to be able to send commands to the eMMC chip.\u003c/p\u003e\n\u003cp\u003eNevertheless, this is not enough. A bricked device usually means that the eMMC is now in an infinite loop and won't accept and eMMC commands. Although it appears to be a dead-end, there's a way: by triggering a power reset on the eMMC chip, there's a time window in which the chip boots itself. There's a way to stop the eMMC chip from loading its own firmware, instead putting itself in some \"recovery mode\". I was finally able to execute my own code on the faulty chip.\u003c/p\u003e\n\u003cp\u003eThe research not only applies to Galaxy S3 devices (which are obviously old), as it appears to be relevant for new Samsung eMMC chips, even though they have a slightly different firmware, which will be briefly overviewed.\u003c/p\u003e","original_language":"eng","persons":["oranav"],"tags":["34c3","8784","Security"],"view_count":3754,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2018-01-10T01:00:00.000+01:00","updated_at":"2026-04-01T01:30:04.849+02:00","length":3367,"duration":3367,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8784-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8784-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/02146e03-1a07-44f2-83b3-e1fd261a4214-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/02146e03-1a07-44f2-83b3-e1fd261a4214-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8784-emmc_hacking_or_how_i_fixed_long-dead_galaxy_s3_phones","url":"https://api.media.ccc.de/public/events/02146e03-1a07-44f2-83b3-e1fd261a4214","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":2},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":2},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":6},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":31},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":24},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":24},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":16},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":22},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":15},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":15},{"event_id":4792,"event_guid":"6abb1f81-c163-4382-8838-8b684147d10c","weight":2},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":2},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":15},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":14},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":2},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":22},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":40},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":27},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":22},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":14},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":14},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":31},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":23},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":4},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":2},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":39},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":2},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":26},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":14},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":14},{"event_id":4940,"event_guid":"ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4","weight":23}]},{"guid":"f068c5df-f969-4206-befb-540326e3d053","title":"Free Electron Lasers","subtitle":"...or why we need 17 billion Volts to make a picture.","slug":"34c3-8832-free_electron_lasers","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8832.html","description":"Wouldn’t it be awesome to have a microscope which allows scientists to map atomic details of viruses, film chemical reactions, or study the processes in the interior of planets? Well, we’ve just built one in Hamburg. It’s not table-top, though: 1 billion Euro and a 3km long tunnel is needed for such a ‘free electron laser’, also called 4th generation synchrotron light source. I will talk about the basic physics and astonishing facts and figures of the operation and application of these types of particle accelerators.\n\nMost people have heard about particle accelerators, most prominently LHC, at which high energy particles are brought to collision in order to study fundamental physics. However, in fact most major particle accelerators in the world are big x-ray microscopes.\n\nThe latest and biggest of these synchrotron radiation sources which was built is the European XFEL. A one billion Euro ‘free electron laser’, based on a superconducting accelerator technology and spread out 3km beneath the city of Hamburg. The produced x-ray pulses allow pictures, for example from proteins, with sub-atomic resolution and an exposure time short enough to enable in-situ studies of chemical reactions.\n\nThis talk aims to explain how particle accelerators and in particular light sources work, for what reason we need these big facilities to enable new types of science and why most of modern technology would be inconceivable without them. ","original_language":"eng","persons":["Thorsten"],"tags":["34c3","8832","Science"],"view_count":9183,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-02T22:45:05.386+02:00","length":3554,"duration":3554,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8832-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8832-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f068c5df-f969-4206-befb-540326e3d053-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f068c5df-f969-4206-befb-540326e3d053-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8832-free_electron_lasers","url":"https://api.media.ccc.de/public/events/f068c5df-f969-4206-befb-540326e3d053","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":127},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":247},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":216},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":242},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":120},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":153},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":168},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":174},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":211},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":255},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":170},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":310},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":130},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":188},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":128},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":429},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":119},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":315},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":327},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":155},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":166},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":216},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":139},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":155},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":122},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":163}]},{"guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","title":"How can you trust formally verified software?","subtitle":null,"slug":"34c3-8915-how_can_you_trust_formally_verified_software","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8915.html","description":"Formal verification of software has finally started to become viable: we have examples of formally verified microkernels, realistic compilers, hypervisors etc. These are huge achievements and we can expect to see even more impressive results in the future but the correctness proofs depend on a number of assumptions about the Trusted Computing Base that the software depends on. Two key questions to ask are: Are the specifications of the Trusted Computing Base correct? And do the implementations match the specifications? I will explore the philosophical challenges and practical steps you can take in answering that question for one of the major dependencies: the hardware your software runs on. I will describe the combination of formal verification and testing that ARM uses to verify the processor specification and I will talk about our current challenge: getting the specification down to zero bugs while the architecture continues to evolve.","original_language":"eng","persons":["Alastair Reid"],"tags":["34c3","8915","Resilience"],"view_count":1777,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T03:30:03.576+02:00","length":1719,"duration":1719,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8915-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8915-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/44e7cb13-011e-4242-b26a-1edf4ac15b83-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/44e7cb13-011e-4242-b26a-1edf4ac15b83-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8915-how_can_you_trust_formally_verified_software","url":"https://api.media.ccc.de/public/events/44e7cb13-011e-4242-b26a-1edf4ac15b83","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":32},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":65},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":78},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":82},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":51},{"event_id":4776,"event_guid":"825add58-9218-4afe-a489-4dd8c4408e45","weight":61},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":86},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":57},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":48},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":52},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":50},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":71},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":79},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":67},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":53},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":60},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":59},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":73},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":63}]},{"guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","title":"34C3 Abschluss","subtitle":"#tuwat","slug":"34c3-9293-abschluss","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9293.html","description":"\u003cp\u003eDE: Damit wir als Komputerfrieks nicht l\u0026auml;nger unkoordiniert vor uns hinwuseln, tun wir wat und treffen uns! EN: To keep us computer freaks from puttering about aimlessly any longer, we\u0026rsquo;re doin\u0026rsquo; somethin\u0026rsquo; and will meet!\u003c/p\u003e","original_language":"deu","persons":["sva"],"tags":["34c3","9293","CCC"],"view_count":4574,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-11T17:00:09.202+01:00","length":2809,"duration":2809,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9293-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9293-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/9a0efbf6-94d6-4c86-864c-caa1f3e929c7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/9a0efbf6-94d6-4c86-864c-caa1f3e929c7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9293-abschluss","url":"https://api.media.ccc.de/public/events/9a0efbf6-94d6-4c86-864c-caa1f3e929c7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":1945,"event_guid":"ZC7MIPs8uNBd42GK42CQ_Q","weight":66},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":372},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":223},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":103},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":75},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":141},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":66},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":61},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":80},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":132},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":130},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":90},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":112},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":79},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":94},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":172},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":198},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":73},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":89},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":92},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":134},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":104},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":310},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":144},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":268},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":65},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":118},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":202},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":68},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":94},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":82},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":511},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":157},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":112}]},{"guid":"541e74c5-6336-4892-90aa-ce84936b03ca","title":"UPSat - the first open source satellite","subtitle":"Going to space the libre way","slug":"34c3-9182-upsat_-_the_first_open_source_satellite","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9182.html","description":"During 2016 Libre Space Foundation a non-profit organization developing open source technologies for space, designed, built and delivered UPSat, the first open source software and hardware satellite.\n\nUPSat is the first open source software and hardware satellite. The presentation will be covering the short history of Libre Space Foundation, our previous experience on upstream and midstream space projects, how we got involved in UPSat, the status of the project when we got involved, the design, construction, verification, testing and delivery processes. We will also be covering current status and operations, contribution opportunities and thoughts about next open source projects in space. During the presentation we will be focusing also on the challenges and struggles associated with open source and space industry.","original_language":"eng","persons":["Pierros Papadeas"],"tags":["34c3","9182","Science"],"view_count":1291,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-12-25T00:15:05.511+01:00","length":2024,"duration":2024,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9182-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9182-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/541e74c5-6336-4892-90aa-ce84936b03ca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/541e74c5-6336-4892-90aa-ce84936b03ca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9182-upsat_-_the_first_open_source_satellite","url":"https://api.media.ccc.de/public/events/541e74c5-6336-4892-90aa-ce84936b03ca","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":15},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":36},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":51},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":56},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":39},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":21},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":46},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":42},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":49},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":51},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":50},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":7},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":15},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":53},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":46},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":42},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":133},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":8},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":53},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":65},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":42}]},{"guid":"02489143-0b78-4302-9603-605d1c674fbb","title":"Uncertain Concern","subtitle":"How Undocumented Immigrants in the US Navigate Technology","slug":"34c3-9085-uncertain_concern","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9085.html","description":"Over 11 million undocumented immigrants live in the United States today. Immediately after taking office, the Trump administration issued two executive orders pumping resources into border and immigration enforcement agencies, heightening fears of deportation, harassment, and family separation among immigrant communities. In the following months reports emerged of increased immigration enforcement activity and hints about the deployment of new high-tech methods by the immigration enforcement agency. I will discuss the current state of immigration enforcement in the US and associated surveillance capabilities, the results of a study with undocumented immigrants about their technology practices, and the takeaways for the technology and privacy community in supporting communities of heightened risk.\n\nIn this talk, I will first discuss the current state of immigration enforcement in the United States, including recent immigration policy changes, known surveillance capabilities of enforcement agencies, and recent efforts by these agencies that hint at an expansion of technical sophistication. I will then discuss lessons and insights from a series of interviews we conducted with undocumented immigrants and immigrant rights organizations about this community’s technology practices, risk awareness, and security and privacy behavior online. We find that in the face of acute risk of detention, harassment, and deportation, this community is well-versed in managing risks offline. Their most common strategies for managing risk online—self-censorship and controlling access to spaces—are largely the same techniques used in the physical world. However, the immigrants we interviewed are extremely uncertain about the effectiveness of their defenses against adversaries online, which are typically conceptualized as nebulous and all-knowing.\n\nWe find that managing privacy and immigration status disclosure, a responsibility that rests not only with individuals but in communities, is more complex online. This is in part due to a diminishing sense of control online over where and how information is exposed. Furthermore, this community places a surprising amount of trust in the platforms that host their community spaces, which exposes a potentially dangerous gap in understanding about information collection and use by companies. Based on our findings, I will discuss what technologists, security tool developers, and activists should be aware of in order to more effectively support communities of heightened risk in protecting themselves online. ","original_language":"eng","persons":["Allison McDonald"],"tags":["34c3","9085","Ethics, Society \u0026 Politics"],"view_count":375,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-10-23T09:45:04.783+02:00","length":3494,"duration":3494,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9085-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9085-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/02489143-0b78-4302-9603-605d1c674fbb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/02489143-0b78-4302-9603-605d1c674fbb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9085-uncertain_concern","url":"https://api.media.ccc.de/public/events/02489143-0b78-4302-9603-605d1c674fbb","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":6},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":12},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":14},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":14},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":7},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":13},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":15},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":19},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":12},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":16},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":26},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":22},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":11},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":15},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":21},{"event_id":4925,"event_guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","weight":16},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":27},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":23},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":13}]},{"guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","title":"Mobile Data Interception from the Interconnection Link","subtitle":null,"slug":"34c3-8879-mobile_data_interception_from_the_interconnection_link","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8879.html","description":"Many mobile network operators rush to upgrade their networks to 4G/LTE from 2G and 3G, not only to improve the service, but also the security. The Diameter protocol - the successor of SS7 in Long Term Evolution (LTE) networks is believed to offer more protection to the network itself and to the end-users. However, also Diameter offers a rich functionality set, which can be also exploited and misused, if the network is not properly protected. We will show in this lecture, how data interception (MiM) can be done via the diameter based interconnection link.","original_language":"eng","persons":["Dr. Silke Holtmanns"],"tags":["34c3","8879","Security"],"view_count":2043,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-30T10:00:06.252+02:00","length":2898,"duration":2898,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8879-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8879-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/95f7fa6a-c6a4-42eb-8c04-e5c82d696539-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/95f7fa6a-c6a4-42eb-8c04-e5c82d696539-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8879-mobile_data_interception_from_the_interconnection_link","url":"https://api.media.ccc.de/public/events/95f7fa6a-c6a4-42eb-8c04-e5c82d696539","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":53},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":42},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":58},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":41},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":45},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":70},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":45},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":47},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":55},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":65},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":48},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":93},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":55},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":38},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":54},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":48},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":39},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":38}]},{"guid":"7f293cf6-6d19-43ed-8aa7-7371e008bd45","title":"Uncovering vulnerabilities in Hoermann BiSecur","subtitle":"An AES encrypted radio system","slug":"34c3-9029-uncovering_vulnerabilities_in_hoermann_bisecur","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9029.html","description":"Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often trivial to break wireless access control systems, the system should thus make it practically infeasible to clone a genuine transmitter so that attackers can get unauthorized access. We used the low-cost CCC rad1o software defined radio (SDR) platform to intercept and analyze the wireless radio signal. We took apart several Hoermann BiSecur hand transmitters and subsequently utilized a vulnerability in the microcontroller to successfully extract the firmware. In order to conduct a security audit, the extracted firmware was disassembled and analyzed so that the encryption mechanism, the key material, the cryptographic operations as well as the RF interface could be reverse engineered. Our security analysis shows that the overall security design is sound, but the manufacturer failed to properly initialize the random seed of the transmitters. As a result, an attacker can intercept an arbitrary radio frame and trivially compute the utilized encryption key within less than a second. Once the key is known to the attacker, a genuine transmitter can be cloned with an SDR platform such as the CCC rad1o. In addition to unauthorized operation of gates and doors, there is a likely (although currently untested) impact on Smart Home appliances that use the BiSecur system. We tested a total of 7 hand transmitters from 3 different model series and with manufacturing dates between 2015 and 2017. All analyzed hand transmitters shared the same static random seed and were found to be vulnerable to our attack. The vulnerability can easily be fixed so that future hand transmitters and radio transmission are protected from our attack.\n\nIn our CCC talk we plan to give a step-by-step presentation on how we analyzed and subsequently broke the Hoermann BiSecur system. This includes the following topics:\n- Overall system overview\n- Radio signal analysis with the CCC rad1o SDR platform\n- Reverse engineering of the radio signal\n- Hardware analysis of BiSecur transmitters\n- Firmware extraction from the microcontroller by exploiting a security flaw in the PIC18F controller\n- Firmware disassembly and reverse engineering with IDA Pro\n- Analysis results providing a technical overview of how the BiSecur system operates including the encryption scheme (with AES-128 at its core) and RF operations\n- Presentation of our attacks (signal cloning of genuine transmitters)\n- Live-Hacking Demo with the CCC rad1o SDR platform\n- Suggested security fix","original_language":"eng","persons":["Markus Muellner","Markus Kammerstetter"],"tags":["34c3","9029","Security"],"view_count":1703,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-02T16:15:06.260+02:00","length":3095,"duration":3095,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9029-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9029-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/7f293cf6-6d19-43ed-8aa7-7371e008bd45-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/7f293cf6-6d19-43ed-8aa7-7371e008bd45-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9029-uncovering_vulnerabilities_in_hoermann_bisecur","url":"https://api.media.ccc.de/public/events/7f293cf6-6d19-43ed-8aa7-7371e008bd45","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":12},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":24},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":27},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":21},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":18},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":28},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":23},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":28},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":39},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":18},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":34},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":11},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":18},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":18},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":22},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":19},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":21},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":26}]},{"guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","title":"Trügerische Sicherheit","subtitle":"Wie die Überwachung unsere Sicherheit gefährdet","slug":"34c3-9287-trugerische_sicherheit","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9287.html","description":"Wie steht es um die Sicherheitsversprechen, die mit dem Einsatz von neuen Überwachungsinstrumenten abgegeben werden?\nWelche Unterminierung der Sicherheit kann durch Überwachung eigentlich entstehen?","original_language":"deu","persons":["Peter Schaar"],"tags":["34c3","9287","Ethics, Society \u0026 Politics"],"view_count":6527,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-10T23:15:08.284+01:00","length":3671,"duration":3671,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9287-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9287-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/21127aeb-fe1f-4506-a3f0-d747e20419a5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/21127aeb-fe1f-4506-a3f0-d747e20419a5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9287-trugerische_sicherheit","url":"https://api.media.ccc.de/public/events/21127aeb-fe1f-4506-a3f0-d747e20419a5","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":198},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":222},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":224},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":377},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":142},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":458},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":193},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":126},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":206},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":211},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":183},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":274},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":342},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":416},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":112},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":384},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":94},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":213},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":470},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":122},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":93},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":1},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":127},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":178},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":493},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":343},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":260},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":108},{"event_id":4836,"event_guid":"7308816a-1e3d-4dc6-99e8-b512da95bcf1","weight":1},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":100},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":329},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":504},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":93},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":237},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":403},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":213},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":282},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":95},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":113},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":97},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":92},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":257},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":302},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":198},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":93}]},{"guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","title":"The Noise Protocol Framework","subtitle":null,"slug":"34c3-9222-the_noise_protocol_framework","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9222.html","description":"The \u003ca href=\"https://noiseprotocol.org\"\u003eNoise Protocol Framework\u003c/a\u003e is a toolkit for 2-party secure-channel protocols.  Noise is used by WhatsApp for client-server communication, by the WireGuard VPN protocol, and by the Lightning Network.  In this talk I'll describe the rationale behind such a framework, and how you can use it to build simple, efficient, and customized secure-channel protocols.\n\nNoise provides a simple pattern language and naming scheme for 2-party DH-based cryptographic handshakes, covering the different possibilities for client and/or server authentication, post/pre-specified peers, identity-hiding, and 0-RTT encryption.  These patterns are easily compiled into linear sequences of cryptographic operations using your favorite ECDH, hash, and cipher functions.  Extensions are in the works for additional cryptographic choices, e.g. post-quantum options for \"hybrid forward-secrecy\", as well as negotiation frameworks.","original_language":"eng","persons":["Trevor Perrin"],"tags":["34c3","9222","Security"],"view_count":1844,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-19T17:15:06.411+01:00","length":1922,"duration":1922,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9222-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9222-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/81530917-cfdd-4a08-bf29-9b71fafb1bc1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/81530917-cfdd-4a08-bf29-9b71fafb1bc1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9222-the_noise_protocol_framework","url":"https://api.media.ccc.de/public/events/81530917-cfdd-4a08-bf29-9b71fafb1bc1","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":41},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":43},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":23},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":27},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":21},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":27},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":32},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":29},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":28},{"event_id":4806,"event_guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","weight":36},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":29},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":31},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":33},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":51},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":20},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":31},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":27},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":38},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":37},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":28},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":32},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":13},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":29},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":27},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":28},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":41}]},{"guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","title":"SCADA - Gateway to (s)hell ","subtitle":"Hacking industrial control gateways","slug":"34c3-8956-scada_-_gateway_to_s_hell","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8956.html","description":"Small gateways connect all kinds of fieldbusses to IP systems. This talk will look at the (in)security of those gateways, starting with simple vulnerabilities, and then deep diving into reverse-engineering the firmware and breaking the encryption of firmware upgrades. The found vulnerabilities will then be demonstrated live on a portable SCADA system.\n\nCompanies often utilize small gateway devices to connect the different field-busses used in industrial control systems (such as Modbus, RS232 etc) to TCP/IP networks. Under the hood, these devices are mostly comprised of ARM-based mini computers, running  either custom, tiny operating systems or uClinux/Linux. The talk will look at the security aspects of these gateways by examining known and unfixed vulnerabilities like unchangeable default credentials, protocols that do not support authentication, and reverse engineering and breaking the encryption of firmware upgrades of certain gateways.\n\nThe talk will consist of a theoretical part, an introduction on how to reverse-engineer and find vulnerabilities in a firmware-blob of unknown format, and a practical part, showcasing a live ICS environment that utilizes gateways, from both the IP and  the field-bus side, to pivot through an industrial control system environment: Demonstrating how to potentially pivot from a station in the field up to the SCADA headquarters, permanently modifying the firmware of the gateways on the way.","original_language":"eng","persons":["Thomas Roth"],"tags":["34c3","8956","Security"],"view_count":6521,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-04-04T11:45:03.920+02:00","length":2707,"duration":2707,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8956-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8956-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8956-scada_-_gateway_to_s_hell","url":"https://api.media.ccc.de/public/events/1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":109},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":113},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":91},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":142},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":84},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":65},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":96},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":83},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":77},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":82},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":96},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":131},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":92},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":62},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":67},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":64},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":77},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":134},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":206},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":122},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":93},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":83},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":63},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":71},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":179},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":169},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":69},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":89},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":82},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":104},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":67},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":107},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":72},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":171},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":112},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":94},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":250},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":82},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":112}]},{"guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","title":"Afro TECH","subtitle":"Afrofuturism, Telling tales of speculative futures","slug":"34c3-9275-afro_tech","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9275.html","description":"Inke Arns will present speculative projections of the future and current developments in the field of digital technologies by artists and inventors from different countries in Africa, the African diaspora and many other actors in the USA and Europe. \n\nThe project examines science-fiction narratives and concepts of technology that function according to their own rules rather than conforming with dominant western narratives. A key source of inspiration for the artworks on display is Afrofuturism, a movement that emerged in the mid-twentieth century against the backdrop of the African-American community's historical experience of racism and discrimination. Telling tales of speculative futures, it opened up a space for a distinct history, and hence emancipation, self-empowerment and individual freedom. The concepts, ideas and aesthetics of Afrofuturism soon spread from the USA to the rest of the world, influencing countless artists – also in German-speaking countries – with whose experiences they strongly resonated.","original_language":"eng","persons":["Inke Arns"],"tags":["34c3","9275","Art \u0026 Culture"],"view_count":778,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-22T16:45:10.350+01:00","length":1834,"duration":1834,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9275-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9275-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/5cbe3344-f83a-492d-afc2-f1697959ff5e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/5cbe3344-f83a-492d-afc2-f1697959ff5e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9275-afro_tech","url":"https://api.media.ccc.de/public/events/5cbe3344-f83a-492d-afc2-f1697959ff5e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":19},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":31},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":21},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":19},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":30},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":17},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":11},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":26},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":16},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":23},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":34},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":27},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":40},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":16},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":20},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":57},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":17},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":7},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":27},{"event_id":4863,"event_guid":"801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","weight":26},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":62},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":27},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":32},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":31},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":29},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":24}]},{"guid":"6abb1f81-c163-4382-8838-8b684147d10c","title":"Catch me if you can: Internet Activism in Saudi Arabia","subtitle":null,"slug":"34c3-9190-catch_me_if_you_can_internet_activism_in_saudi_arabia","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9190.html","description":"Activists in Saudi Arabia have been able to celebrate important victories like the recent lifting of the ban on women driving in September 2017 but have to fight on a lot of other front lines at the same time. Websites are blocked on a large scale and many activists are sent to jail on the grounds of a loosely used cybercrime law. This talk will give some insight into the current social and political strife happening on the Saudi Internet from a first-hand-perspective using some of the data collected in a collaboration with the OONI project.","original_language":"eng","persons":["Noujoum"],"tags":["34c3","9190","Ethics, Society \u0026 Politics"],"view_count":1003,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-08-15T12:15:04.214+02:00","length":1833,"duration":1833,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9190-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9190-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6abb1f81-c163-4382-8838-8b684147d10c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6abb1f81-c163-4382-8838-8b684147d10c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9190-catch_me_if_you_can_internet_activism_in_saudi_arabia","url":"https://api.media.ccc.de/public/events/6abb1f81-c163-4382-8838-8b684147d10c","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":42},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":47},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":35},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":51},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":34},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":45},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":53},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":44},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":60},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":38},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":35},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":11},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":36},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":34},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":40},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":38},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":61},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":35},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":42}]},{"guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","title":"Security Nightmares 0x12","subtitle":null,"slug":"34c3-8888-security_nightmares_0x12","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8888.html","description":"Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?\n\nWie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2018 und darüber hinaus. Denn was wir wirklich wissen wollen, ist ja schließlich: Was kriecht, krabbelt und fliegt in Zukunft auf uns zu und in unseren digitalen Implants herum?\n\nIm Zuge von noch mehr Transparenz, Kritik \u0026 Selbstkritik und kontinuierlicher nachhaltiger Optimierung aller Prozesse werden wir außerdem frühere Voraussagen hinsichtlich des Eintreffens unserer Weissagungen prüfen.","original_language":"deu","persons":["frank","Ron"],"tags":["34c3","8888","CCC"],"view_count":19050,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-28T16:00:06.517+01:00","length":4284,"duration":4284,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8888-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8888-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8e222759-cd6b-403b-8fe1-3517bf7d2802-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8e222759-cd6b-403b-8fe1-3517bf7d2802-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8888-security_nightmares_0x12","url":"https://api.media.ccc.de/public/events/8e222759-cd6b-403b-8fe1-3517bf7d2802","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":95},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":90},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":764},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1004},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":637},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":368},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":508},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":796},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":446},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":77},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":198},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":102},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":141},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":302},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":317},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":665},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":123},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":929},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":495},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":87},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":654},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":99},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":142},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":381},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":171},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":75},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":83},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":124},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":162},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1808},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":807},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":163},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":377},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":357},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":138},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":302},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":127},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":99},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":546},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":687},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1688},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":638},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1096},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":130},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":153},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":105},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":159},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":103},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":107},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":112},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":223},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":435},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":104},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":555},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":75},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":87},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":145},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":250},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":511},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":329},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":189},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":159},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":123},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":93}]},{"guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","title":"Regulating Autonomous Weapons","subtitle":"The time travelling android isn’t even our biggest problem","slug":"34c3-9291-regulating_autonomous_weapons","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9291.html","description":"Depending on the definition, autonomous weapon systems do not and might never exist, so why should we care about killer robots? It is the decline of human control as an ongoing trend in military systems and the incapacity of computing systems to „understand“ human beings and the nature of war that is worrisome.\n\nTherefore, the envisaged military advantages come at a price as the technology raises legal, ethical, and security concerns.\n\nThe good news: Scientists and NGOs have taken up these concerns and States address the issue within the UN Convention on Certain Conventional Weapons (CCW), where a ban of the development and use of autonomous weapons is possible. The bad news: States Parties might not find a consensus for a necessary regulation.\n\nThe talk will discuss these pressing issues to support civil society in addressing the regulation of lethal autonomous weapons (LAWS).","original_language":"eng","persons":["Anja Dahlmann"],"tags":["34c3","9291","Ethics, Society \u0026 Politics"],"view_count":750,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-05T22:45:19.098+01:00","length":1555,"duration":1555,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9291-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9291-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/82d8204a-7147-452d-b5a3-91969e3a3ac6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/82d8204a-7147-452d-b5a3-91969e3a3ac6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9291-regulating_autonomous_weapons","url":"https://api.media.ccc.de/public/events/82d8204a-7147-452d-b5a3-91969e3a3ac6","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":8},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":30},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":17},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":35},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":41},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":22},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":39},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":72},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":31},{"event_id":4869,"event_guid":"d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","weight":33},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":22},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":33},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":30},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":44},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":29},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":37},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":35},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":28},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":26}]},{"guid":"ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4","title":"library operating systems","subtitle":"reject the default reality^W abstractions and substitute your own","slug":"34c3-8949-library_operating_systems","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8949.html","description":"Traditional models of application development involve talking to an underlying operating system through abstractions of its choosing.  These abstractions may or may not be a good fit for your language or application, but you have no choice but to use them - you can only layer more abstractions on top of them, to try to lessen the pain of a bad match.  Library operating systems let you write applications that use better abstractions in your own language - either someone else's abstractions, or your own.\n\nThis talk is an overview of library operating systems that focuses on the benefits to application developers.  Interfacing with lower-level systems using familiar abstractions, rather than alien ones, is a thing of joy -- in testing, reasoning, modification, and participation.  Operating systems programming doesn't have to be an arcane black art requiring a totally different set of skills from your day-to-day application development.  It can be comprehensible, documentable, testable, and hackable with your everyday tools.  Operating systems hacking is in reach!\n\nExamples (when appropriate) will be given using the MirageOS library operating system, which is written in OCaml, but principles discussed are applicable to other library operating systems projects including IncludeOS in C++, HaLVM in Haskell, and many others.","original_language":"eng","persons":["Mindy Preston"],"tags":["34c3","8949","Resilience"],"view_count":809,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2018-01-09T01:00:00.000+01:00","updated_at":"2026-03-28T04:00:02.692+01:00","length":1946,"duration":1946,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8949-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8949-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8949-library_operating_systems","url":"https://api.media.ccc.de/public/events/ff9f5cb5-8bff-44b4-9aa2-71855fed7cf4","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":18},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":17},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":13},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":13},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":28},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":22},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":15},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":14},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":17},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":20},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":15},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":8},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":18},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":20},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":22},{"event_id":4938,"event_guid":"fd734b31-4f79-4d1f-879f-3f7248c60dad","weight":16},{"event_id":4939,"event_guid":"439d7085-4f24-45ac-843f-987f89c4446d","weight":14},{"event_id":4941,"event_guid":"02146e03-1a07-44f2-83b3-e1fd261a4214","weight":23}]},{"guid":"c7b3314c-165c-446d-963c-609922ea990f","title":"Defeating (Not)Petya's Cryptography","subtitle":null,"slug":"34c3-8724-defeating_not_petya_s_cryptography","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8724.html","description":"In this presentation we will outline our findings about (Not)Petya's crypto flaws and how we were able to exploit them to decrypt infected computers.\n","original_language":"eng","persons":["Sebastian Eschweiler"],"tags":["34c3","8724","Security"],"view_count":1172,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-26T03:15:04.471+01:00","length":3283,"duration":3283,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8724-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8724-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c7b3314c-165c-446d-963c-609922ea990f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c7b3314c-165c-446d-963c-609922ea990f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8724-defeating_not_petya_s_cryptography","url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":48},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":54},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":49},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":50},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":28},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":57},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":47},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":49},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":90},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":49},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":54},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":27},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":46},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":48},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":44},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":78},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":45},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":36},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":48}]},{"guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","title":"Protecting Your Privacy at the Border","subtitle":"Traveling with Digital Devices in the Golden Age of Surveillance","slug":"34c3-9086-protecting_your_privacy_at_the_border","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9086.html","description":"Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Digital searches at national borders can reach our personal correspondence, health information, and financial records, allowing an affront to privacy and dignity which is inconsistent with the values of a free society. While privacy and security is important for any traveler, this has become a critical issue for international conferences and their attendees, who shouldn’t need to trade off an invasive search for participating in important conversations. This talk will discuss the both the legal and policy issues with border searches, as well as technological measures people can use in an effort to protect their data.\n\nThis talk will begin with an overview of the legal and policy issues surrounding border crossings, where many countries will conduct more invasive searches than their constitutions would otherwise allow. The discussion will include examples of countries that can require you to enter passwords to decrypt data on your laptop and will examine your social media and cloud data, and provide advice on which countries may require more extensive precautions. This includes the challenges of entering the United States in the time of Trump, discussing the recent changes to policy for visitors entering the country, what your rights are as a visa holder, and details about EFF’s lawsuit to challenge the policy.\n\nTurning to the practical, the talk will discuss techniques to help protect your data, from basic precautions like backups and externally stored data, to more advanced advice about encryption and password strategies, secure boot processes, as well as data hygiene - how to travel clean, and still have access to important information on the other side. This will cover what border agents are theoretically capable of doing to compromise devices, and what precautions you can take to secure your data before this interaction occurs. The discussion will include advice about laptops, mobile phones, flash drives, digital cameras, and other common digital data devices.  While critical, technological protections are not enough, so we will also discuss the practicalities of interacting with border agents.\n\nFinally, we will discuss what people can do to keep themselves informed, and stay active in the fight for a better future.","original_language":"eng","persons":["Kurt Opsahl","William Budington"],"tags":["34c3","9086","Ethics, Society \u0026 Politics"],"view_count":7040,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-30T19:15:07.393+02:00","length":3480,"duration":3480,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9086-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9086-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/00e9a3f8-16b5-45db-a4e3-312fda04c7df-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/00e9a3f8-16b5-45db-a4e3-312fda04c7df-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9086-protecting_your_privacy_at_the_border","url":"https://api.media.ccc.de/public/events/00e9a3f8-16b5-45db-a4e3-312fda04c7df","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":140},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":115},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":76},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":77},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":75},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":100},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":76},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":116},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":75},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":84},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":144},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":196},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":112},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":90},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":76},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":113},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":127},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":89},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":106},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":186},{"event_id":4868,"event_guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","weight":10},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":90},{"event_id":4873,"event_guid":"8453f8f1-d934-4d10-bcfa-a857fa65b8df","weight":5},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":5},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":6},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":108},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":106},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":81},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":88},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":86},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":155},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":74},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":104},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":153},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":84}]},{"guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","title":"Jahresrückblick des CCC 2017","subtitle":"tuwat","slug":"34c3-9262-jahresruckblick_des_ccc_2017","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9262.html","description":"Staatstrojaner, Vorratsdaten, automatisierte Biometriesammlungen, PC-Wahl – wir geben einen Überblick über die Themen, die den Chaos Computer Club 2017 beschäftigt haben.\n\nNeben der Zusammenfassung und der Rückschau auf das vergangene Jahr wollen wir aber auch über zukünftige Projekte und anstehende Diskussionen reden.","original_language":"deu","persons":["frank","Constanze Kurz","nexus","Linus Neumann"],"tags":["34c3","9262","CCC"],"view_count":12665,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-26T12:30:09.115+01:00","length":7991,"duration":7991,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9262-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9262-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9262-jahresruckblick_des_ccc_2017","url":"https://api.media.ccc.de/public/events/4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":92},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":786},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":522},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":415},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":282},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":250},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":705},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":363},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":87},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":128},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":233},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":134},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":178},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":249},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":655},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":690},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":239},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":632},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":121},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":212},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":421},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":102},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":85},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":111},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1013},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":119},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":237},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":167},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":198},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":343},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":465},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":172},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":900},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":351},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":700},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":97},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":182},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":150},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":807},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":198},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":107},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":112},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":82}]},{"guid":"1d7b2355-60b1-453c-bf0e-64228466d2cc","title":"Think big or care for yourself","subtitle":"On the obstacles to think of emergent technologies in the field of nursing science","slug":"34c3-8953-think_big_or_care_for_yourself","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8953.html","description":"In German nursing science the dominant position on emergent technologies demands the removal of machines from caring environments („Entmaschinisierung“). In contrast to this, European research policy heavily focus on developing new health and social technologies to solve societal issues like a skill shortage in nursing. Thinking about technology in nursing science cannot but be conflicted. In this talk we first expose requirements for particularly conceptualizing the application of technological systems in care work settings. Further we will give an overview on main arguments against digital technologies in care with an example of a current research project in the field of Augmented Reality in care work. ","original_language":"eng","persons":["AKO","Hanna Wüller"],"tags":["34c3","8953","Ethics, Society \u0026 Politics"],"view_count":518,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-15T10:30:05.497+01:00","length":1952,"duration":1952,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8953-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8953-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/1d7b2355-60b1-453c-bf0e-64228466d2cc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/1d7b2355-60b1-453c-bf0e-64228466d2cc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8953-think_big_or_care_for_yourself","url":"https://api.media.ccc.de/public/events/1d7b2355-60b1-453c-bf0e-64228466d2cc","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":18},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":11},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":22},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":21},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":24},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":22},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":16},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":21},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":25},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":30},{"event_id":4809,"event_guid":"2024d7d1-4510-4371-a923-3dabdb408475","weight":22},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":14},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":30},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":26},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":23},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":43},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":21},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":22},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":20},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":24}]},{"guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","title":"Beeinflussung durch Künstliche Intelligenz","subtitle":"Über die Banalität der Beeinflussung und das Leben mit Algorithmen","slug":"34c3-8811-beeinflussung_durch_kunstliche_intelligenz","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8811.html","description":"Eine wissenschaftliche Perspektive auf die achtlose Anwendung der Algorithmen des maschinellen Lernens und der künstlichen Intelligenz, z.B. in personalisierten Nachrichtenempfehlungssystemen oder Risikosoftware im US-Justizsystem.","original_language":"deu","persons":["Hendrik Heuer","KRN"],"tags":["34c3","8811","Science"],"view_count":10427,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-01T19:00:05.209+02:00","length":3703,"duration":3703,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8811-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8811-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/acab4111-aba7-44f7-b56e-ef805dcacd00-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/acab4111-aba7-44f7-b56e-ef805dcacd00-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8811-beeinflussung_durch_kunstliche_intelligenz","url":"https://api.media.ccc.de/public/events/acab4111-aba7-44f7-b56e-ef805dcacd00","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":346},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":429},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":324},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":439},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":237},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":596},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":460},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":109},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":251},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":214},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":257},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":174},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":286},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":583},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":634},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":171},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":745},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":164},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":143},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":259},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":124},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":251},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":499},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":127},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":765},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":421},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":188},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":292},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":208},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":204},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":470},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":537},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":183},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":586},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":264},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":367},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":117},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":190},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":161},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":381},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":94},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":110}]},{"guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","title":"Taxation","subtitle":null,"slug":"34c3-9047-taxation","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9047.html","description":"Taxation, the most \"boring\" #34c3 talk, but hey it's the economy stupid, and you pay for it! We will a provide a quick overview of the international taxation system. Explaining what a Double Irish Sandwich is. Why international corporations like Google only pays 2.4% taxes. And how your favourite tech companies (Google, Amazon, Apple, Microsoft, ... ) evaded billions in taxes. This tax-dodging costs the European Union more than $50 billion. Annually. We bring this numbers into perspective. And why you pay more.\nAnd how you should discuss that topic, since it defines how our society will be.\n\nYou might heard about #LuxLeaks, #PanamaPapers, or other frivilous  tax activites. This talk gives a overview about one the most urgend policy issues legal tax holes for big corporation, how big their score is, in relation to your own tax rate (across Europe) and why it should concern you.  Duh you pay for it. And why you should get active.  We will present the launch of a European-wide anti-tax evasion campaign beginning of May 2017.\n\nIreland's decision to phase out the Double Irish tax loophole doesn't mean the country is giving up on tax competition, or that U.S. multinationals will now bring more of their foreign earnings home. The reason affected tech companies are so calm about it is that they know Ireland will do whatever it takes to keep them. And it's not just Ireland ... \n\n\"Revelations of the extent of tax avoidance by multinationals based on exploitation of the arm’s length system prompted a rear-guard action by the OECD described as the base erosion and profit shifting (BEPS) programme but the programme deliberately avoids any principled re-examination of norms underlying the international tax regime or any consideration of a shift from residence to source-based taxation.\"\n\nAnd the icing on the cake:  We will present you the Stachanow of Capitalism: The only employee (on a mere 55.000 Euro annual salary) of ExxonMobil  Spain: 9.9 billion Euro in net profits in 2 years.","original_language":"eng","persons":["vavoida"],"tags":["34c3","9047","Ethics, Society \u0026 Politics"],"view_count":3837,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-10T19:00:08.988+01:00","length":2007,"duration":2007,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9047-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9047-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/81125495-9d1d-481a-8c63-0d3ef9ff0617-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/81125495-9d1d-481a-8c63-0d3ef9ff0617-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9047-taxation","url":"https://api.media.ccc.de/public/events/81125495-9d1d-481a-8c63-0d3ef9ff0617","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":64},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":152},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":100},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":115},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":97},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":81},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":94},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":104},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":170},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":51},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":66},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":112},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":87},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":87},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":93},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":91},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":86},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":157},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":88},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":139},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":89},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":114}]},{"guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","title":"Are all BSDs created equally? ","subtitle":"A survey of BSD kernel vulnerabilities.","slug":"34c3-8968-are_all_bsds_created_equally","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8968.html","description":"In this presentation I start off asking the question „How come there are only a handful of BSD security kernel bugs advisories released every year?“ and then proceed to try and look at some data from several sources.\n\nIt should come as no surprise that those sources are fairly limited and somewhat outdated. \n\nThe presentation then moves on to try and collect some data ourselves. This is done by actively investigating and auditing. Code review, fuzzing, runtime testing on all 3 major BSD distributions [NetBSD/OpenBSD/FreeBSD]. This is done by first investigating what would be good places where the bugs might be. Once determined, a detailed review is performed of these places. Samples and demos will be shown. \n\nI end the presentation with some results and conclusions. I will list what the outcome was in terms of bugs found, and who – based on the data I now have – among the three main BSD distributions can be seen as the clear winner and loser. I will go into detail about the code quality observed and give some pointers on how to improve some code. Lastly I will try and answer the question I set out to answer („How come there are only a handful of BSD security kernel bugs advisories released every year?“).","original_language":"eng","persons":["Ilja van Sprundel"],"tags":["34c3","8968","Security"],"view_count":7815,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-01T02:30:03.623+02:00","length":3537,"duration":3537,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8968-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8968-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/956cf3ed-c342-4c1d-b636-29ec3d4578d2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/956cf3ed-c342-4c1d-b636-29ec3d4578d2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8968-are_all_bsds_created_equally","url":"https://api.media.ccc.de/public/events/956cf3ed-c342-4c1d-b636-29ec3d4578d2","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":153},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":175},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":77},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":75},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":161},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":122},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":87},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":83},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":88},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":149},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":88},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":86},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":170},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":136},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":137},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":97},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":73},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":100},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":123},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":85},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":49},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":295},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":95},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":88},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":81},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":98},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":91},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":159},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":159}]},{"guid":"55f921ed-ab90-4553-9903-8658557ac447","title":"iOS kernel exploitation archaeology","subtitle":null,"slug":"34c3-8720-ios_kernel_exploitation_archaeology","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8720.html","description":"This talk presents the technical details and the process of reverse engineering and re-implementation of the evasi0n7 jailbreak's main kernel exploit. This work was done in late 2013, early 2014 (hence the \"archaeology\" in the title), however, it will provide insight into the kernel debugging setup for iOS devices (iDevices), the encountered difficulties and how they were overcome, all of which can be useful for current iOS kernel vulnerability research.","original_language":"eng","persons":["argp"],"tags":["34c3","8720","Security"],"view_count":2666,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T00:30:06.219+02:00","length":3296,"duration":3296,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8720-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8720-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/55f921ed-ab90-4553-9903-8658557ac447-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/55f921ed-ab90-4553-9903-8658557ac447-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8720-ios_kernel_exploitation_archaeology","url":"https://api.media.ccc.de/public/events/55f921ed-ab90-4553-9903-8658557ac447","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":9},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":61},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":71},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":80},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":58},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":62},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":52},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":57},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":19},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":73},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":88},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":79},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":61},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":86},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":58},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":62},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":50}]},{"guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","title":"Es sind die kleinen Dinge im Leben II","subtitle":"was alles geht und wie man anfängt, mit Mikroskopen","slug":"34c3-9134-es_sind_die_kleinen_dinge_im_leben_ii","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9134.html","description":"Jeder weiß ungefähr was man mit einem Mikroskop tun kann: Kleine Dinge ansehen. Aber wie geht das genau, was braucht man dafür und gibt es da nicht eine Möglichkeit, dass da digitale Bilder rauspurzeln? Das hier soll eine Einführung sein, und zwar in die Grundlagen von Mikroskopen, wo der Unterschied zu anderen Optiken (Fotografie, Teleskope) ist und wie man zu Hause mit einfachen Mitteln schöne Bilder machen kann. Was kann man sinnvolles an den Nachwuchs verschenken, was taugen Anstreck-Dinger für das Smartphone oder USB-Mikroskope, wie fange ich zu Hause mit Mikroskopie an und was kann man überhaupt so alles betrachten? Quasi Micsorcopy 101.\n\nManch einer hat Erinnerungen an Mikroskope aus der Schule, vielleicht hat auch einer noch irgendwo ein Mikroskop aus einem Experimentierkasten zu hause, manche kennen eigentlich nur Bilder aus den Medien – aber eine Vorstellung davon was ein Mikroskop ist hat irgendwie jeder: Es vergrößert Dinge.\n\nEin Gerät, das nur für den Zweck gebaut wurde die kleinen Dinge zu vergrößern, bringt ein paar Besonderheiten mit sich im Bezug auf Optik und Abbildung. Ich möchte erklären was das Besondere an einem Mikroskop-Objektiv ist, was die Begriffe Field of View, nummerische Apertur,  Bildfeldwölbung, Auflösung und Vergrößerung bedeuten und, vor allem, was dass für eine Anwendung zu Hause heißt.\n\nEs gibt einiges an Geräten zu kaufen. Ich möchte aufzeigen was günstige USB-Mikroskope leisten können, was die Ansteck-Mikroskope für Smartphones taugen, worauf bei „Kindermikroskopen“ zu achten ist und was man davon auch selber bauen könnte. Und es soll erklärt werden wie man digitale Bilder erhält, mit günstiger (oder selbstgemachter) Hardware und offener Software.\n\nAußerdem sollen ein paar Anwedungszwecke vorgestellt werden. Nicht nur die Biologie liefert einen Grund zum Mikroskop zu greifen, auch Elektronik, die Innereien von Computerchips, chemische Prozesse und Dinge aus der Materialwissenschaft lohnen sich unter dem Mikroskop zu betrachten. \n\nIch werde mehrere Mikroskope mitbringen, um einiges vom oben genannten direkt auf der Bühne zu zeigen und das ein oder andere Selbsgebastelte vorstellen. Außerdem bringe ich Proben mit – ich will nicht nur Bilder zeigen, sondern auch wie sie gemacht werden.","original_language":"deu","persons":["André Lampe"],"tags":["34c3","9134","Science"],"view_count":2041,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-01-13T12:30:11.082+01:00","length":1778,"duration":1778,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9134-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9134-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/e4eaa421-652a-4309-9e04-fe46aa3da50d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/e4eaa421-652a-4309-9e04-fe46aa3da50d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9134-es_sind_die_kleinen_dinge_im_leben_ii","url":"https://api.media.ccc.de/public/events/e4eaa421-652a-4309-9e04-fe46aa3da50d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":59},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":64},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":60},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":66},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":77},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":91},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":14},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":57},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":61},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":82},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":59},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":67},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":60},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":140},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":65},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":98},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":59},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":109},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":102},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":87},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":157},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":102},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":112},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":31},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":68}]},{"guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","title":"Closing the loop: Reconnecting social-technologial dynamics to Earth System science","subtitle":null,"slug":"34c3-9138-closing_the_loop_reconnecting_social-technologial_dynamics_to_earth_system_science","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9138.html","description":"International commitment to the appropriately ambitious Paris climate agreement and the United Nations Sustainable Development Goals in 2015 has pulled into the limelight the urgent need for major scientific progress in understanding and modelling the Anthropocene, the tightly intertwined social-techno-ecological planetary system that humanity now inhabits. The Anthropocene qualitatively differs from previous eras in Earth’s history in three key characteristics: (1) There is planetary-scale human agency. (2) There are social and economic networks of teleconnections spanning the globe. (3) It is dominated by planetary-scale social-ecological feedbacks. Bolting together old concepts and methodologies cannot be an adequate approach to describing this new geological era. Instead, we need a new paradigm in Earth System science that is founded equally on a deep understanding of the physical and biological Earth System – and of the economic, technological, social and cultural forces that are now an intrinsic part of it. It is time to close the loop and bring socially mediated dynamics and the technosphere explicitly into theory, analysis and computer models that let us study the whole Earth System.","original_language":"eng","persons":["Jonathan Donges"],"tags":["34c3","9138","Science"],"view_count":320,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-08-14T15:45:04.853+02:00","length":2045,"duration":2045,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9138-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9138-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f64a902e-db0e-4a8e-b5b7-b6e3136a4dea-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f64a902e-db0e-4a8e-b5b7-b6e3136a4dea-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9138-closing_the_loop_reconnecting_social-technologial_dynamics_to_earth_system_science","url":"https://api.media.ccc.de/public/events/f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":13},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":8},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":6},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":9},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":13},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":5},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":14},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":10},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":15},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":15},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":18},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":9},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":11},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":31},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":16},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":15},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":23},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":4},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":8},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":27},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":5},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":17},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":16},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":15},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":16},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":14}]},{"guid":"c38ddf1b-10d7-462c-a934-e69e9259ab19","title":"Implementing an LLVM based Dynamic Binary Instrumentation framework","subtitle":null,"slug":"34c3-9006-implementing_an_llvm_based_dynamic_binary_instrumentation_framework","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9006.html","description":"This talk will go over our efforts to implement a new open source DBI framework based on LLVM. We'll explain what DBI is used for, how it works, the implementation challenges we faced and compare a few of the existing frameworks with our own implementation.\n\nWe have been using DBI frameworks in our work for a few years now: to gather coverage information for fuzzing, to break whitebox cryptography implementations used in DRM or to simply assist reverse engineering.\n\nHowever we were dissatisfied with the state of existing DBI frameworks: they were either not supporting mobile architectures, too focused on a very specific use cases or very hard to use. This prompted the idea of developing QBDI which has been in development for two years and a half.\n\nWith QBDI we wanted to try a modern take on DBI framework design and build a tool crafted to support mobile architectures from the start, adopting a modular design enabling its integration with other tools and that was easy to use by abstracting all the low-level details from the users.\n\nIn this talk we will review the motivation behind the usage of a DBI. We will explain its core principle and the main implementation challenges we faced. We will go through a few of the existing frameworks (Intel Pin, Valgrind, DynamoRIO) and compare our implementation choices with theirs. Finally, we will demo our framework and showcase its integration inside Frida.\n\nWe also plan to open source our framework under a permissive free software license (Apache 2) during the conference.","original_language":"eng","persons":["Charles Hubain","Cédric Tessier"],"tags":["34c3","9006","Security"],"view_count":1533,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-27T22:45:08.319+01:00","length":3601,"duration":3601,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9006-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9006-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c38ddf1b-10d7-462c-a934-e69e9259ab19-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c38ddf1b-10d7-462c-a934-e69e9259ab19-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9006-implementing_an_llvm_based_dynamic_binary_instrumentation_framework","url":"https://api.media.ccc.de/public/events/c38ddf1b-10d7-462c-a934-e69e9259ab19","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":29},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":27},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":26},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":33},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":62},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":37},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":58},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":34},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":31},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":24},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":31},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":24},{"event_id":4880,"event_guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","weight":30}]},{"guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","title":"Robot Music","subtitle":"The Robots Play Our Music and What Do We Do?","slug":"34c3-9150-robot_music","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9150.html","description":"Once full automation hits, we will have a lot of free time on our hands. This project demonstrates early explorations in computer generated music via robot hands, old computers and generative algorithms. While the robot performs, we sit next to it and invite people for a conversation about robots being “creative” and “stealing our jobs”.\n\n“Robot Music” is an ongoing robotic research project between artists Goto80 and Jacob Remin centered around automation, creation and loss of control.\n \nThe project was initiated in 2017 and has been shown in other forms at Illutron (Copenhagen), Algomech Festival (Sheffield) and Internetdagarna (Stockholm).\n\nIn this installment at CCC robotic arms play music on a Commodore 64 and other sound machines. The robot loads songs that we have made and re-works them live by changing the notes, instruments, arrangements, effects and by applying a general “robot cool” to the mix.\n\nWhile the robot performs, we sit next to it to talk to people about robots being “creative” and “stealing our jobs”. \n\nFor CCC we will bring two robots. One for performing and one for hacking. We are inviting all hackers to join our conversation, and we are excited to meet people with skills within robotics, programming, neural networks for music composition and live coding.","original_language":"eng","persons":["jacob remin","goto80"],"tags":["34c3","9150","Art \u0026 Culture"],"view_count":1056,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-02T09:30:09.325+01:00","length":2031,"duration":2031,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9150-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9150-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/68d83e4e-52d8-42be-b01c-c6f425d95c8e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/68d83e4e-52d8-42be-b01c-c6f425d95c8e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9150-robot_music","url":"https://api.media.ccc.de/public/events/68d83e4e-52d8-42be-b01c-c6f425d95c8e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":42},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":35},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":32},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":35},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":40},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":26},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":33},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":34},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":58},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":35},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":38},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":30},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":55},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":41},{"event_id":4863,"event_guid":"801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","weight":32},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":65},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":45},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":31}]},{"guid":"79c1ee55-8004-4dcd-9282-9f7acae9c94a","title":"Practical Mix Network Design","subtitle":"Strong metadata protection for asynchronous messaging","slug":"34c3-8974-practical_mix_network_design","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8974.html","description":"We shall explain the renewed interest in mix networks. Like Tor, mix networks protect metadata by using layered encryption and routing packets between a series of independent nodes. Mix networks resist vastly more powerful adversary models than Tor though, including global passive adversaries. In so doing, mix networks add both latency and cover traffic. We shall outline the basic components of a mix network, touch on their roles in resisting active and passive attacks, and discuss how the latency impacts reliability, application design, and user experience.","original_language":"eng","persons":["David Stainton","jeffburdges"],"tags":["34c3","8974","Resilience"],"view_count":769,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T01:45:03.759+02:00","length":2811,"duration":2811,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8974-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8974-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/79c1ee55-8004-4dcd-9282-9f7acae9c94a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/79c1ee55-8004-4dcd-9282-9f7acae9c94a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8974-practical_mix_network_design","url":"https://api.media.ccc.de/public/events/79c1ee55-8004-4dcd-9282-9f7acae9c94a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":29},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":23},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":27},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":22},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":26},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":37},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":23},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":27},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":33},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":28},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":31},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":24},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":23},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":20},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":28},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":27}]},{"guid":"de1b5916-8052-4a25-bded-25d96a43aff7","title":"Pointing Fingers at 'The Media'","subtitle":"The Bundestagswahl 2017 and Rise of the AfD","slug":"34c3-9106-pointing_fingers_at_the_media","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9106.html","description":"The German election in September 2017 brought a tectonic shift to the layout of German politics. With the AfD in parliament far-right illiberalism has reached the mainstream. We investigate the communicative developments underlying this rise. Using web-scraping and automated content analysis, we collected over 10.000 articles from mainstream-news and far-right blogs, along with over 90GBs of Tweets and thousands of Facebook-Posts. This allows us a deep insight into how public discourse works in 2017 Germany.","original_language":"eng","persons":["alebey"],"tags":["34c3","9106","Ethics, Society \u0026 Politics"],"view_count":4388,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T02:30:03.063+02:00","length":3542,"duration":3542,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9106-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9106-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/de1b5916-8052-4a25-bded-25d96a43aff7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/de1b5916-8052-4a25-bded-25d96a43aff7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9106-pointing_fingers_at_the_media","url":"https://api.media.ccc.de/public/events/de1b5916-8052-4a25-bded-25d96a43aff7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":170},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":281},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":146},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":222},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":231},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":210},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":164},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":204},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":229},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":166},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":284},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":239},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":241},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":390},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":257},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":319},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":176},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":211},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":177},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":232},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":151},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":150},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":141}]},{"guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","title":"Humans as software extensions","subtitle":"Will You Be My Plugin?","slug":"34c3-9077-humans_as_software_extensions","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9077.html","description":"While technology is often described as an extension of our bodies, this talk will explore a reversed relationship: Bodies and minds of digital laborers (you and me and basically everybody else) as software extensions that can be easily plugged in, rewired, and discarded. I will approach this topic from an artist's point of view.\n\nFrom CAPTCHAS as micro jobs for training AI to people having to pretend to be bots, from gig work to APIs for programming people – we are extending computational systems by offering our bodies, our senses, and our cognition.\n\nTo some degree, this has been true for most kind of work for a long time. However, with software creeping into every aspect of our lives, and with algorithmic systems modulating and optimizing flows constantly, being plugged in and then generating data, or being modulated by data analysis, has become ubiquitous (workers never leaving the factory?).\n\nIn this talk, I will address the condition of being a software extension within the framework of my artistic practice and research by introducing artworks and discussing e.g. the survival creativity of gig workers on hyper-competitive online platforms; the surveilled workplace; AI as a global assembly line.\n\nAgainst this backdrop, I will also speculate about possible interventions inside these environments.","original_language":"eng","persons":["Sebastian Schmieg"],"tags":["34c3","9077","Art \u0026 Culture"],"view_count":1907,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-03T19:30:11.785+01:00","length":1589,"duration":1589,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9077-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9077-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6cccf75c-93a1-48df-b9fc-843da8359bd3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6cccf75c-93a1-48df-b9fc-843da8359bd3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9077-humans_as_software_extensions","url":"https://api.media.ccc.de/public/events/6cccf75c-93a1-48df-b9fc-843da8359bd3","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":31},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":64},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":32},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":47},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":4},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":40},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":46},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":43},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":30},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":40},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":75},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":16},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":42},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":31},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":40},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":33},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":39},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":33}]},{"guid":"e145a0be-1450-4e31-a493-4db81c970f08","title":"WHWP","subtitle":"Walter Höllerer bei WikiPedia","slug":"34c3-9014-whwp","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9014.html","description":"Vorstellung der Dissertation \"WHWP - Walter Höllerer bei WikiPedia\". Es wurde ein \neinzelner Artikel in der deutschen WikiPedia untersucht. Es wird dargestellt, welchen \nEinfluss die beteiligten Autoren auf die Qualität des WikiPedia-Artikels über Walter \nHöllerer hatten und weiterhin haben. Dafür wurden 113 Veränderungen durch 89 Autoren \neinzeln untersucht und bezüglich ihrer Relevanz bewertet. Es wurden auch \ndie Entwicklungen berücksichtigt, die seit der französischen Encyclopédie zur \nOnline-Enzyklopädie WikiPedia geführt haben. Daraus ist eine bisher einzigartige \nArbeit über die Produktion von Wissen und Wissenssammlungen entstanden. \n\nDie Dissertation \"WHWP - Walter Höllerer bei WikiPedia\" ist eine medienwissenschaftliche \nUntersuchung. Es wurden sprachwissenschaftliche Methoden zur Untersuchung eines \nenzyklopädischen Artikels in der deutschsprachigen Online-Enzyklopädie WikiPedia \nangewandt. Besonders interessant ist diese Arbeit, weil ein ausführlicher und für \nden WikiPedia-Artikel über Walter Höllerer umfassender Blick hinter die Kulissen der\nWikiPedia-Inszenierung gezeigt wird. Jede einzelne Veränderung des Artikels wurde \ndokumentiert und bewertet. Die beteiligten Autoren wurden an ihren \nAktivitäten erkannt und durch weitere, online verfügbare Informationen individuell charakterisiert. \n\nWalter Höllerer war ein deutscher Literaturwissenschaftler, Professor an der TU-Berlin, \nMitglied der Gruppe 47, Gründer des Literarischen Colloquium Berlin und der Sprach- / Literaturzeitschriften \"Sprache im technischen Zeitalter\" und \"Akzente\". \n\nDie Arbeit zeigt deutlich, wie einfach es ist, durch öffentlich verfügbare Daten \nAktivitätsmuster zu erkennen und damit Aussagen über die Relevanz der Aktivitäten \nverschiedener WikiPedia-Autoren machen zu können. Die Arbeit ist in einem \nallgemeinverständlichen Stil angefertigt. Es gibt viele Tabellen und Grafiken, damit \nLeser-Innen die Vorgehensweise nachvollziehen und sämtliche Fundstücke selbst \nrecherchieren können. Im Laufe der acht Jahre dauernden Recherchen für diese Arbeit \nwurden im Backstagebereich der WikiPedia einige Überraschungen gefunden und ein paar Mythen entzaubert.","original_language":"deu","persons":["friederb"],"tags":["34c3","9014","Science"],"view_count":1030,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-25T17:30:09.242+01:00","length":1885,"duration":1885,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9014-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9014-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/e145a0be-1450-4e31-a493-4db81c970f08-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/e145a0be-1450-4e31-a493-4db81c970f08-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9014-whwp","url":"https://api.media.ccc.de/public/events/e145a0be-1450-4e31-a493-4db81c970f08","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":38},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":31},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":30},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":39},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":74},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":50},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":46},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":49},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":51},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":56},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":88},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":39},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":56},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":104},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":49},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":68}]},{"guid":"4042ac64-4a70-482f-a527-c5509f7694b9","title":"Tracking Transience","subtitle":null,"slug":"34c3-9281-tracking_transience","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9281.html","description":"Hasan Elahi is an interdisciplinary artist working with issues in surveillance, privacy, migration, citizenship, technology, and the challenges of borders. An erroneous tip called into law enforcement authorities in 2002 subjected Elahi to an intensive investigation by the FBI and after undergoing months of interrogations, he was finally cleared of suspicions. After this harrowing experience, Elahi conceived “Tracking Transience” and opened just about every aspect of his life to the public. Predating the NSA’s PRISM surveillance program by half a decade, the project questions the consequences of living under constant surveillance and continuously generates databases of imag- ery that tracks the artist and his points of transit in real-time. Although initially created for his FBI agent, the public can also monitor the artist’s communication records, banking transactions, and transportation logs along with various intelligence and government agencies who have been confirmed visiting his website. ","original_language":"eng","persons":["Hasan Elahi"],"tags":["34c3","9281","Art \u0026 Culture"],"view_count":610,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-11-10T19:15:12.100+01:00","length":3458,"duration":3458,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9281-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9281-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4042ac64-4a70-482f-a527-c5509f7694b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4042ac64-4a70-482f-a527-c5509f7694b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9281-tracking_transience","url":"https://api.media.ccc.de/public/events/4042ac64-4a70-482f-a527-c5509f7694b9","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":28},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":23},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":14},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":11},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":22},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":13},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":26},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":13},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":22},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":24},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":24},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":7},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":23},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":19},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":19},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":27},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":20},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":22},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":49},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":22},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":22}]},{"guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","title":"May contain DTraces of FreeBSD","subtitle":null,"slug":"34c3-9196-may_contain_dtraces_of_freebsd","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9196.html","description":"Systems are getting increasingly complex and it's getting harder to understand what they are actually doing. Even though they are built by human individuals they often surprise us with seemingly bizarre behavior. DTrace lights a candle in the darkness that is a running production system giving us unprecedented insight into the system helping us to understand what is actually going on. \n\nWe are going implement `strace`-like functionality, trace every function call in the kernel, watch the scheduler to its thing, observer how FreeBSD manages resources and even peek into runtime systems of high level programming languages. If you ever wondered what software is doing when you are not looking, this talk is for you.","original_language":"eng","persons":["raichoo"],"tags":["34c3","9196","Resilience"],"view_count":1545,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-01-30T16:00:13.646+01:00","length":1807,"duration":1807,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9196-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9196-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c02f6777-5e55-46ca-8d60-1810a8d5f3c7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c02f6777-5e55-46ca-8d60-1810a8d5f3c7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9196-may_contain_dtraces_of_freebsd","url":"https://api.media.ccc.de/public/events/c02f6777-5e55-46ca-8d60-1810a8d5f3c7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":53},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":72},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":47},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":38},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":46},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":38},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":51},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":12},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":55},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":70},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":34},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":43},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":76},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":35},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":42},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":59},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":88}]},{"guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","title":"Hardening Open Source Development","subtitle":null,"slug":"34c3-9249-hardening_open_source_development","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9249.html","description":"\u003cp\u003eAs authors it is our responsibility to build secure software and give each other the chance to verify and monitor our work.\nVarious flaws in development toolchains that allow code execution just by viewing or working in malicious repositories question the integrity of development environments and as such our projects as a whole.\u003c/p\u003e\n\u003cp\u003eThis talk will discuss practical solutions for both technical and social challenges of collaboration.\u003c/p\u003e\n\n\u003cp\u003eNot only the software we build can be flawed, but also its dependencies, our tools or just the process of building it.\u003cbr/\u003e\nVulnerabilities in shell-integrations, code linters, package managers or compilers can become dangerous vectors of malware infection for developers. Beyond that risk we see software shipped straight from the developers editor to a repository, through the build chain, across the CDN, referenced from the package registry, almost directly to the user. Since even our favorite package managers have demonstrated large scale malware delivery, there is reason to seriously question our ability to guarantee our own products safefy at all.\u003c/p\u003e\n\u003cp\u003eDeciding to distrust our own equipment and abilities leads us to find solutions that work based on collaboration to gain safety against failure or fraud. Cleanly defined merge and release processes with automated quality enforcement and distributed quorum based verification are essential mitigations that allow others to verify our work.\nBy sharing lessons learned from 15 years of building software in open-source and enterprise environments I want to raise awareness for security in the development process and present practical solutions.\u003c/p\u003e","original_language":"eng","persons":["gronke"],"tags":["34c3","9249","Resilience"],"view_count":941,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-09T16:30:29.359+01:00","length":1827,"duration":1827,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9249-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9249-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/9e774be1-eb68-4ccc-94bd-a65f9abd752d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/9e774be1-eb68-4ccc-94bd-a65f9abd752d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9249-hardening_open_source_development","url":"https://api.media.ccc.de/public/events/9e774be1-eb68-4ccc-94bd-a65f9abd752d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":48},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":36},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":44},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":30},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":33},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":47},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":10},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":28},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":40},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":33},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":59},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":31},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":50},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":35},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":27},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":29},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":68},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":19}]},{"guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","title":"Lets break modern binary code obfuscation","subtitle":"A semantics based approach","slug":"34c3-8789-lets_break_modern_binary_code_obfuscation","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8789.html","description":"Do you want to learn how modern binary code obfuscation and deobfuscation works? Did you ever encounter road-blocks where well-known deobfuscation techniques do not work? Do you want to see a novel deobfuscation method that learns the code's behavior without analyzing the code itself? Then come to our talk and we give you a step-by-step guide.\n\nThis talk might be interesting for you if you love reverse engineering or binary security analysis. We present you modern code obfuscation techniques, such as opaque predicates, arithmetic encoding and virtualization-based obfuscation. Further, we explain state-of-the-art methods in (automated) deobfuscation [1] as well as how to break these [2]. Finally, we introduce a novel  approach [3] that learns the code's semantics and demonstrate how this can be used to deobfuscate real-world obfuscated code.\n\n[1] https://www.ieee-security.org/TC/SP2015/papers-archived/6949a674.pdf\n[2] https://mediatum.ub.tum.de/doc/1343173/1343173.pdf\n[3] https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-blazytko.pdf","original_language":"eng","persons":["Tim Blazytko","Moritz Contag"],"tags":["34c3","8789","Security"],"view_count":2774,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T14:45:07.666+02:00","length":3602,"duration":3602,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8789-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8789-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/5cf8c222-47d3-4741-9324-be182b4d0fb8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/5cf8c222-47d3-4741-9324-be182b4d0fb8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8789-lets_break_modern_binary_code_obfuscation","url":"https://api.media.ccc.de/public/events/5cf8c222-47d3-4741-9324-be182b4d0fb8","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":72},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":77},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":67},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":94},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":67},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":63},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":65},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":33},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":57},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":68},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":92},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":79},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":95},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":20},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":78},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":149},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":60},{"event_id":4841,"event_guid":"c38ddf1b-10d7-462c-a934-e69e9259ab19","weight":62},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":70},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":80},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":57},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":56},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":82},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":77},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":59}]},{"guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","title":"Opening Closed Systems with GlitchKit","subtitle":" 'Liberating' Firmware from Closed Devices with Open Source Hardware","slug":"34c3-9207-opening_closed_systems_with_glitchkit","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9207.html","description":"Systems that hide their firmware-- often deep in readout-protected flash or hidden in encrypted ROM chips-- have long stymied reverse engineers, who often have to resort to inventive methods to understand closed systems. To help reduce the effort needed to get a foothold into a new system, we present GlitchKit-- an open source hardware and firmware solution that significantly simplifies the process of fault-injecting your way into a new system -- and of fault-injecting firmware secrets out! This talk presents the development completed thus far, demonstrates the use of GlitchKit in simple attacks, and invites participation in the development of our open-source tools.\n\nWork by a variety of authors has demonstrated the vulnerability of hardware peripherals to fault-injection-driven firmware-disclosure attacks [1]-- or in other words: glitching attacks that cause devices to 'accidentally' disclose their own firmware. A common form of this attack exploits the behavior of hardware peripherals as they send out bits of read-only memory-- by inducing a glitch at the end of a communication, transmitters can often be inticed to transmit memory beyond the end of the scheduled communcation, often leaking firmware and other device secrets.\n\nFor glitching attacks to function properly, glitches must be precisely timed relative to communication events-- a requirement that often requires reverse engineers to develop purpose-built glitch-triggering hardware. GitchKit helps to relieve this burden-- providing an easy, context-aware glitching toolkit that can synchronize glitch events to a variety of communications events, including events generated by common protocols such as USB. GlitchKit builds atop existing open-source software and hardware-- including the GreatFET communications multitool, the FaceDancer USB-hacking toolkit, and the ChipWhisperer fault-injection toolkit-- and provides an entirely-open-source stack for easy glitching-- hopefully making it easier for you to get your hands on that elusive piece of firmware!\n\nThis talk presents the theory behind firmware-disclosure glitching, and aims to help every hacker start using open-source tools to start opening up closed systems. Accordingly, we discuss the current state of the GlitchKit project, describe in detail how it can be used to 'break open' existing closed systems, and provide live demonstration of GlitchKit features.\n\n[1] e.g, http://scanlime.org/2016/10/scanlime015-glitchy-descriptor-firmware-grab/","original_language":"eng","persons":["ktemkin","dominicgs"],"tags":["34c3","9207","Hardware \u0026 Making"],"view_count":2275,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-23T21:00:06.341+01:00","length":3631,"duration":3631,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9207-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9207-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c21cb389-aba3-4eaa-ba1f-76f966b1686e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c21cb389-aba3-4eaa-ba1f-76f966b1686e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9207-opening_closed_systems_with_glitchkit","url":"https://api.media.ccc.de/public/events/c21cb389-aba3-4eaa-ba1f-76f966b1686e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":66},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":74},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":49},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":58},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":49},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":56},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":127},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":102},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":80},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":88},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":82},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":78},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":74},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":58},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":27},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":48},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":48},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":87},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":93},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":60},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":69},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":88},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":57}]},{"guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","title":"Der netzpolitische Wetterbericht","subtitle":"Wird es Regen geben? Ein Ausblick auf die neue Legislaturperiode","slug":"34c3-8916-der_netzpolitische_wetterbericht","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8916.html","description":"Deutschland hat gewählt, man weiß nur noch nicht, wer regieren wird. Bis Weihnachten könnte ein Koalitionsvertrag verhandelt worden sein, vielleicht auch später. Was sind die zu erwartenden großen Debatten der neuen Legislaturperiode?","original_language":"deu","persons":["Markus Beckedahl"],"tags":["34c3","8916","Ethics, Society \u0026 Politics"],"view_count":3163,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T04:00:02.837+02:00","length":1756,"duration":1756,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8916-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8916-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/af65b0d3-5e43-49e3-9ec0-c225f6c57d46-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/af65b0d3-5e43-49e3-9ec0-c225f6c57d46-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8916-der_netzpolitische_wetterbericht","url":"https://api.media.ccc.de/public/events/af65b0d3-5e43-49e3-9ec0-c225f6c57d46","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":217},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":161},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":164},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":201},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":259},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":159},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":229},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":232},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":290},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":206},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":191},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":214},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":220},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":233},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":216},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":206},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":158},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":164},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":159}]},{"guid":"c26fa336-680b-49e5-80e6-24432305e94d","title":"Open Source Estrogen","subtitle":"From molecular colonization to molecular collaboration","slug":"34c3-9036-open_source_estrogen","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9036.html","description":"Collaborative and interdisciplinary research, Open Source Estrogen combines biohacking and artistic intervention to demonstrate the entrenched ways in which estrogen is a biomolecule with institutional biopower. It is a form of biotechnical civil disobedience, seeking to subvert dominant biopolitical agents of hormonal management, knowledge production, and anthropogenic toxicity. Thus, the project initiates a cultural dialogue through the generation of DIY/DIWO (do-it-yourself/do-it-with-others) for the detection and extraction of estrogen, and contextualized as kitchen performance and queer body worship. \n\nA collaborative, interdisciplinary research project, Open Source Estrogen combines biohacking and speculative design to demonstrate the entrenched ways in which estrogen is a biomolecule with institutional biopower. It is a form of biotechnical civil disobedience, seeking to subvert dominant biopolitical agents of hormonal management, knowledge production, and anthropogenic toxicity. The project begins with a speculative question: what if it was possible to make estrogen in the kitchen? From this seed arises more fundamental questions about who is producing hormones, whose bodies are affected, and how environmental hormones exist already as a state of toxicity. While issues of body and gender sovereignty are deeply at stake, endocrine disruptors termed ‘xenoestrogens’ pervade our environments due to petrochemical agro-industrial and pharmaceutical forces. These xeno-molecules change the morphology of our bodies and bodies of non-human species, evidencing a malleability inherent to nature but alien to our prescribed notions of (eco)heteronormalcy. In response to the “molecular queering” performed by estrogen, facilitated by dominant hegemonic forces, the project initiates a public dialogue through DIY/DIWO (do-it-yourself/do-it-with-others) biohacking and artistic intervention. Using speculative design, iterative workshopping, and kitchen performance, Open Source Estrogen employs these tactics to create new subjectivities for living in an increasingly queer world. From capitalist xeno-forces arise xeno-solidarities, capable of collectively hacking the systems of hormonal colonization.","original_language":"eng","persons":["maggic"],"tags":["34c3","9036","Art \u0026 Culture"],"view_count":1326,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-03T05:45:03.501+02:00","length":3488,"duration":3488,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9036-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9036-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c26fa336-680b-49e5-80e6-24432305e94d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c26fa336-680b-49e5-80e6-24432305e94d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9036-open_source_estrogen","url":"https://api.media.ccc.de/public/events/c26fa336-680b-49e5-80e6-24432305e94d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":30},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":17},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":22},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":27},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":13},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":13},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":16},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":16},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":15},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":3},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":18},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4869,"event_guid":"d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","weight":13},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":15},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":4},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":17},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":20},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":18},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":14},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":11},{"event_id":4880,"event_guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","weight":8},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":12},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":17},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":19},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":19},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":16},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":17}]},{"guid":"f68f2747-1c57-4531-a574-3ebe77d80135","title":"Mietshäusersyndikat: den Immobilienmarkt hacken","subtitle":"Wie man ein Haus kaufen kann ohne es zu besitzen","slug":"34c3-9031-mietshausersyndikat_den_immobilienmarkt_hacken","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9031.html","description":"Das Mietshäusersyndikat ist eine nicht-kommerzielle Kooperative mit dem\nZiel, Bereiche von selbstorganisiertem Wohnen zu schaffen, ohne selbst\nVermieter zu werden.\n\nWohnverhältnisse sind meist von Privatbesitz geprägt: die Eigentuemer wollen ihre Immobilien gewinnbringend vermieten.\n\nDiejenigen, die mieten, sind stark abhängig: die Mieten können in die Höhe getrieben werden und wer nicht zahlen kann, fliegt raus.\n \nUm diese Struktur zu konterkarieren, hat sich das Mietshäusersyndikat entwickelt. Hier sind Hausprojekte lose organisiert, deren Häuser nicht in\nPrivathand sind und damit die erwähnten Abhängigkeiten wegfallen.\n\nAber wie ist das bei dem heutigen Immobilienmarkt möglich? Häuser nicht im Privateigentum und nicht mit dem Ziel, Gewinn zu erwirtschaften?\n\nDas Statut von 1992 vom Mietshäusersyndikat benennt das Ziel„die Entstehung neuer selbstorganisierter Hausprojekte  zu unterstützen und politisch durchzusetzen: Menschenwürdiger Wohnraum, das Dach überm\nKopf, für alle.“\n\nHäuser, die von Projektgruppen aus dem Mietshäusersyndikat heraus gekauft werden, sollen für Menschen da sein, nicht für den Profit, und sollen auch nie wieder in den Immobilienmarkt zurück gehen.\n\nInzwischen umfasst das Mietshäusersyndikats-Netzwerk mehr als 125 Häuser, die bei niemandem im Privatbesitz sind und die von den Bewohnenden selbst verwaltet werden.\n\nSobald eine Gruppe von Menschen, die zusammen wohnen wollen, eine Immobilie  gefunden haben, können sie sich Beratung beim Mietshäusersyndikat holen und gemeinsam wird geschaut, wie das Haus vom Immobilienmarkt genommen und wie umgesetzt wird, dass Keiner/m das Haus gehört und auch nicht wieder Privateigentum werden wird.\n\nWie genau das ganze funktionieren kann, wird im Vortrag mit anschließender Diskussion erläutert.","original_language":"deu","persons":["Anita Hopes"],"tags":["34c3","9031","Resilience"],"view_count":6584,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-28T16:00:06.789+01:00","length":1854,"duration":1854,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9031-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9031-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f68f2747-1c57-4531-a574-3ebe77d80135-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f68f2747-1c57-4531-a574-3ebe77d80135-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9031-mietshausersyndikat_den_immobilienmarkt_hacken","url":"https://api.media.ccc.de/public/events/f68f2747-1c57-4531-a574-3ebe77d80135","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":226},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":262},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":216},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":277},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":147},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":304},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":153},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":150},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":275},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":260},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":336},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":224},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":171},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":190},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":142},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":144},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":140},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":439},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":182},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":218},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":160},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":257},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":327},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":287},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":492},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":216},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":370},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":164},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":155},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":187},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":157},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":178},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":176},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":171},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":435},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":202},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":304},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":141}]},{"guid":"59c664ea-425d-44e0-957c-09317cbfd382","title":"Die Sprache der Überwacher","subtitle":"Wie in Österreich über Sicherheit und Überwachung gesprochen wird","slug":"34c3-8969-die_sprache_der_uberwacher","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8969.html","description":"So intensiv wie 2017 wurde der Themenkomplex rund um Sicherheit und Überwachung in Österreich noch nie diskutiert. Das Thema ist in Hauptabendnachrichten und Leitartikeln angekommen. Die Diskussion rund um die geplante Einführung eines Sicherheitspakets, das sich bei näherer Betrachtung als ein reines Überwachungspaket entpuppt, bietet jede Menge Analysematerial: Öffentlich ausgetauschte (Schein-)Argumente, falsche Analogien und unpassende Sprachbilder haben die Debatte geprägt. In diesem Talk werden die Sprache der so genannten Sicherheitspolitiker (es sind in der Tat nur Männer) analysiert und ihre Argumente auf den Prüfstand gestellt. \n\nDrei Sätze des österreichischen Innenministers Wolfgang Sobotka stehen exemplarisch für die Qualität der Sicherheitsdiskussion in Österreich. Zu Beginn des Jahres 2017 rechtfertigte er seine Pläne für die Ausweitung der Videoüberwachung mit folgendem Argument: \"Ein Beispiel: Vor meiner Haustüre lag – vor vielen Jahren – immer wieder menschlicher Kot. Als ich eine Kamera aufgestellt habe, war das sofort vorbei.\" Mitte des Jahres sagte er in einem Interview: \"Die Sicherheit steht über der Politik\". Und als sein Überwachungspaket zu scheitern drohte, griff er in die unterste Schublade und holte diesen Satz hervor: „Alle innerhalb und außerhalb des Parlaments, die gegen diese gesetzlichen Anpassungen sind, planen einen Anschlag auf die Sicherheit der Österreicher.“ Zwischen diesen argumentativen Großtaten gab es noch jede Menge anderer Misstöne, die entkräftet, entschärft und gerade gerückt werden müssen, um die Diskussion auf eine tragfähige Basis zu stellen.","original_language":"deu","persons":["Thomas Lohninger","Werner Reiter","Angelika Adensamer"],"tags":["34c3","8969","Ethics, Society \u0026 Politics"],"view_count":4353,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-12-27T09:15:06.317+01:00","length":1941,"duration":1941,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8969-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8969-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/59c664ea-425d-44e0-957c-09317cbfd382-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/59c664ea-425d-44e0-957c-09317cbfd382-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8969-die_sprache_der_uberwacher","url":"https://api.media.ccc.de/public/events/59c664ea-425d-44e0-957c-09317cbfd382","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":191},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":207},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":139},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":166},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":338},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":169},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":216},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":129},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":99},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":148},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":222},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":305},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":239},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":118},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":104},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":180},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":204},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":143},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":340},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":198},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":119},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":329},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":257},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":113},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":286},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":120},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":184},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":96},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":160},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":138},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":206},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":94}]},{"guid":"2024d7d1-4510-4371-a923-3dabdb408475","title":"Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels'","subtitle":null,"slug":"34c3-9030-algorithmic_science_evaluation_and_power_structure_the_discourse_on_strategic_citation_and_citation_cartels","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9030.html","description":"Quantitative science evaluation, such as university rankings, rely on man-made algorithms and man-made databases. The modelling decisions underlying this data-driven algorithmic science evaluation are, among other things, the outcome of a specific power structure in the science system. Power relations are especially visible, when negotiated during processes of boundary work. Therefore, we use the discourse on 'citation cartels', to shed light on a specific perception of fairness in the scientific system, as well as on the actors who are in charge. While doing so, we draw analogies to the discourse on search engine optimization.","original_language":"eng","persons":["J. Hartstein","Teresa Isigkeit","Franziska Sörgel"],"tags":["34c3","9030","Science"],"view_count":592,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-01-09T19:45:21.109+01:00","length":1886,"duration":1886,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9030-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9030-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2024d7d1-4510-4371-a923-3dabdb408475-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2024d7d1-4510-4371-a923-3dabdb408475-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9030-algorithmic_science_evaluation_and_power_structure_the_discourse_on_strategic_citation_and_citation_cartels","url":"https://api.media.ccc.de/public/events/2024d7d1-4510-4371-a923-3dabdb408475","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":27},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":31},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":16},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":21},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":30},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":5},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":26},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":26},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":17},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":27},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":26},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":76},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":11},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":32},{"event_id":4816,"event_guid":"1d7b2355-60b1-453c-bf0e-64228466d2cc","weight":19},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":20},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":39},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":12},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":37},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":27},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":42}]},{"guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","title":"avatar²","subtitle":"Towards an open source binary firmware analysis framework","slug":"34c3-9195-avatar","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9195.html","description":"Avatar² is an open source framework for dynamic instrumentation and analysis of binary firmware, which was released in June 2017.\nThis talk does not only introduce avatar², but also focuses on the motivation and challenges for such a tool.\n\nDynamic binary instrumentation and analysis are valuable assets for security analysis and testing, and while a variety of tools exist for desktop software, the tooling landscape for analysing low-level binary firmware directly interacting with hardware is relatively empty.\n\nThis talk will first outline the key problems for developing dynamic firmware analysis tools and pinpoint different approaches to overcome those problems.\nThe core of this talk, however, focuses on avatar², an open source framework built to ease firmware reversing and security analysis.\n\nIn more detail, avatar² utilizes partial emulation to enable transparent analysis of firmware, and while the main firmware is executed inside the emulator, I/O operations to and from the hardware are commonly relayed to the actual hardware or the emulator. To realize this complex orchestration, avatar² enables communication and state synchronization between a variety of popular tools, such as Qemu, OpenOCD, GDB, PANDA and angr.\n\nWhile the declared scope of avatar² the is analysis of embedded firmware, this talk will also show that the framework can also be useful in other contexts, such as scripting gdb in python from outside gdb, or loading the state of a concretely executed binary into angr.","original_language":"eng","persons":["nsr"],"tags":["34c3","9195","Security"],"view_count":2243,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-01T21:45:05.242+02:00","length":3326,"duration":3326,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9195-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9195-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/0dbbb546-38e6-499f-bb93-a5539d114d1d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/0dbbb546-38e6-499f-bb93-a5539d114d1d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9195-avatar","url":"https://api.media.ccc.de/public/events/0dbbb546-38e6-499f-bb93-a5539d114d1d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":24},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":41},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":25},{"event_id":4834,"event_guid":"c35e099a-f620-41ea-8e99-16cade147196","weight":21},{"event_id":4841,"event_guid":"c38ddf1b-10d7-462c-a934-e69e9259ab19","weight":30},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":25},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":21},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":18},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":21},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":24},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":37},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":21},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":22},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":23},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":22},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":31},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":27},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":23}]},{"guid":"2541602b-f58c-4dec-9722-db72b1dea19e","title":"On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Resolution","subtitle":null,"slug":"34c3-9178-on_the_prospects_and_challenges_of_weather_and_climate_modeling_at_convection-resolving_resolution","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9178.html","description":"The representation of thunderstorms (deep convection) and rain showers in climate models represents a major challenge, as this process is usually approximated with semi-empirical parameterizations due to the lack of appropriate computational resolution. Climate simulations using kilometer-scale horizontal resolution allow explicitly resolving deep convection and thus allow for an improved representation of the water cycle. We present a set of such simulations covering Europe and global computational domains. Finally, we discuss challenges and prospects climate modelers face on heterogeneous supercomputers architectures.\n\nToday the evidence for global climate change is unequivocal, and the human influence is clear. Therefore the focus of young researchers has shifted from assessing whether the Planet is warming towards envisioning how a warmer world might look like. For instance, basic physical principles suggest that the hydrological cycle of Planet Earth will likely undergo dramatic changes. However, understanding and describing the involved processes, estimating future changes, and assessing the underlying uncertainties has proven to be difficult and complex. In this effort, numerical simulations of the weather and climate system are a useful research tool.\nWeather and climate modeling involves solving the governing equations of atmospheric motion on a numerical mesh and employing semi-empirical parameterizations that treat the processes not represented explicitly. For example, the parameterizations typically include treatments for thunderstorms and rain showers (deep convection). These processes are fundamental to the climate system since they vertically redistribute moisture, heat, and momentum, but so far they could not be resolved explicitly, due to the coarse gird spacing of the mesh (resolution) employed in the current generation of climate models. \nIn the recent year's power constrains in the domain of supercomputing have lead to heterogeneous node designs mixing conventional multi-core processors and accelerators such as graphics processing units (GPU’s). These machines posses properties beneficial for weather and climate codes and hence allow refining the resolution of the involved computational mesh to the kilometer scale. Convective clouds can then be represented explicitly (convection-resolving) and the models can be formulated much closer to physical first principles. However, to exploit the capabilities of these supercomputers, model codes have to be ported, a challenging task the weather and climate modeling community is struggling with.\n\nWe discuss prospects and challenges climate modelers face on these new supercomputers and highlight the potential for addressing key open science questions. The presentation is illustrated with simulations recently accomplished using a new version of the Consortium for Small-Scale Modeling weather and climate model (COSMO), capable of exploiting these heterogeneous supercomputer architectures. Using results form a then-year-long climate simulation on a computational domain covering Europe (1536x1536x60 grid points) we highlight some of the added value of the approach regarding the representation of precipitation processes. Furthermore, we explore the gap between the currently established regional simulations and global simulations by scaling the GPU accelerated version of the COSMO model to a near-global computational domain.\nReferences:\nFuhrer, O., Chadha, T., Hoefler, T., Kwasniewski, G., Lapillonne, X., Leutwyler, D., Lüthi, D., Osuna, C., Schär, C., Schulthess, T. C., and Vogt, H.: Near-global climate simulation at 1 km resolution: establishing a performance baseline on 4888 GPUs with COSMO 5.0, Geosci. Model Dev. Discuss., https://doi.org/10.5194/gmd-2017-230, in review, 2017. \nLeutwyler, D., Lüthi, D., Ban, N., Fuhrer, O., and Schär, C.: Evaluation of the Convection-Resolving Climate Modeling Approach on Continental Scales, J. Geophys. Res. Atmos., 122, doi:10.1002/2016JD026013\nLeutwyler, D., Fuhrer, O., Lapillonne, X., Lüthi, D., and Schär, C., 2016: Towards European-scale convection-resolving climate simulations with GPUs: a study with COSMO 4.19, Geosci. Model Dev., 9, 3393-3412, doi:10.5194/gmd-9-3393-2016.","original_language":"eng","persons":["David Leutwyler"],"tags":["34c3","9178","Science"],"view_count":457,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-04T16:15:08.895+01:00","length":3733,"duration":3733,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9178-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9178-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2541602b-f58c-4dec-9722-db72b1dea19e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2541602b-f58c-4dec-9722-db72b1dea19e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9178-on_the_prospects_and_challenges_of_weather_and_climate_modeling_at_convection-resolving_resolution","url":"https://api.media.ccc.de/public/events/2541602b-f58c-4dec-9722-db72b1dea19e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":5},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":7},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":4},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":9},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":1},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":3},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":12},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":12},{"event_id":4868,"event_guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","weight":9},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":5},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":10},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":12},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":23},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":45},{"event_id":4890,"event_guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","weight":16},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":24},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":9},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":9},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":9},{"event_id":4925,"event_guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","weight":11},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":9}]},{"guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","title":"Ecstasy 10x yellow Twitter 120mg Mdma","subtitle":"Shipped from Germany for 0.1412554 Bitcoins","slug":"34c3-9278-ecstasy_10x_yellow_twitter_120mg_mdma","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9278.html","description":"Artists !Mediengruppe Bitnik talk about recent works around bots and the online ecosystems that has been forming around them. Through the lens of their recent works around algorithms and bots, !Mediengruppe Bitnik offer a look into some of the technologies shaping our day-to-day.  ","original_language":"eng","persons":["!Mediengruppe Bitnik","!Mediengruppe Bitnik"],"tags":["34c3","9278","Art \u0026 Culture"],"view_count":6872,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-02T23:00:04.458+02:00","length":1773,"duration":1773,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9278-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9278-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/edd02e52-28f8-4f3e-8b17-75cffecb6d7f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/edd02e52-28f8-4f3e-8b17-75cffecb6d7f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9278-ecstasy_10x_yellow_twitter_120mg_mdma","url":"https://api.media.ccc.de/public/events/edd02e52-28f8-4f3e-8b17-75cffecb6d7f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":402},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":527},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":246},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":393},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":316},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":413},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":339},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":164},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":296},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":137},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":284},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":312},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":408},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":223},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":503},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":289},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":166},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":352},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":175},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":286},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":270},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":150},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":202},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":751},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":249},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":211},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":488},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":226},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":148},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":274},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":333},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":342},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":419},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":243},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":241},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":154},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":122},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":275},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":177},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":317}]},{"guid":"7308816a-1e3d-4dc6-99e8-b512da95bcf1","title":"Taking a scalpel to QNX","subtitle":"Analyzing \u0026 Breaking Exploit Mitigations and Secure Random Number Generators on QNX 6.6 and 7.0","slug":"34c3-8730-taking_a_scalpel_to_qnx","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8730.html","description":"In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.\n\nWe will present the first reverse-engineering and analysis of the exploit mitigations, secure random number generators and memory management internals of QNX versions up to and including 6.6 and the brand new 64-bit QNX 7.0 (released in March 2017) and uncover a variety of design issues and vulnerabilities.\n\nQNX is a proprietary, closed-source, Unix-like real-time operating system aimed at the embedded market. It is found in everything from BlackBerry products, carrier-grade routers and medical devices to military radios, UAVs and nuclear powerplants. On top of that, it dominates the automotive market and is found in millions of cars.\n\nWhile some prior security research has discussed QNX, mainly as a byproduct of BlackBerry mobile research, there is no prior work on QNX exploit mitigations or its secure random number generators.\n\nThis talk seeks to close that gap by presenting the first reverse-engineering and analysis of the exploit mitigations, secure random number generators and memory management internals of QNX. We dissect the NX / DEP, ASLR, Stack Cookies and RELRO mitigations as well as the /dev/random and kernel PRNGs.\n\nWe subsequently uncover a variety of design issues and vulnerabilities in these mitigations and PRNGs, which have significant implications for the exploitability of memory corruption vulnerabilities on QNX as well as the strength of its cryptographic ecosystem. Finally, we provide information on available patches and hardening measures available to defenders seeking to harden their QNX-based systems against the discussed issues.","original_language":"eng","persons":["Jos Wetzels","Ali Abbasi"],"tags":["34c3","8730","Security"],"view_count":951,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T18:30:06.052+02:00","length":2777,"duration":2777,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8730-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8730-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/7308816a-1e3d-4dc6-99e8-b512da95bcf1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/7308816a-1e3d-4dc6-99e8-b512da95bcf1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8730-taking_a_scalpel_to_qnx","url":"https://api.media.ccc.de/public/events/7308816a-1e3d-4dc6-99e8-b512da95bcf1","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":21},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":23},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":2},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":23},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":2},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":2},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":23},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":15},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":32},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":2},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":24},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":34},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":39},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":22},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":23},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":17},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":27},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":21},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":22},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":25},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":29},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":21},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":22},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":29}]},{"guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","title":"Reverse engineering FPGAs","subtitle":"Dissecting FPGAs from bottom up, extracting schematics and documenting bitstream formats","slug":"34c3-9237-reverse_engineering_fpgas","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9237.html","description":"In this talk I describe the basic makeup of FPGAs and how I reverse engineered the Xilinx 7 Series and Lattice iCE40 Series together with the implications.","original_language":"eng","persons":["MathiasL"],"tags":["34c3","9237","Hardware \u0026 Making"],"view_count":7660,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T18:30:06.355+02:00","length":2528,"duration":2528,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9237-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9237-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/be19fbe3-e825-4e67-93f9-a6aeda2e31af-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/be19fbe3-e825-4e67-93f9-a6aeda2e31af-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9237-reverse_engineering_fpgas","url":"https://api.media.ccc.de/public/events/be19fbe3-e825-4e67-93f9-a6aeda2e31af","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":58},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":107},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":57},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":175},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":65},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":113},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":77},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":67},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":69},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":108},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":14},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":69},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":14},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":73},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":87},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":68},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":176},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":92},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":66},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":153},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":162},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":87},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":127},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":97},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":125},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":61},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":118},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":102},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":75},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":59},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":83}]},{"guid":"275f85de-d612-4440-8755-85dee5912f12","title":"How to drift with any car","subtitle":"(without your mom yelling at you)","slug":"34c3-8758-how_to_drift_with_any_car","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8758.html","description":"Lots of research are arising from the fairly unexplored world of automative communications. Cars are no longer becoming computers, they are fully connected networks where every ECU exchanges and operates the vehicles at some point.\nHere is an introduction of my immersion and discussions with my car, and how I finally managed to drift (a bit) with my mom's FWD Fiat 500c.\n\nThis talk is not only about security, but about hacking and video games. Many video games are about driving cars, whether it is for racing, or heisting and escaping the police. In this talk, we will explain how the user experience could actually be improved by connecting a car to a video game and turning it into a game controller.\n\nWe will discuss about these connected systems, how car components interact with one another, the different protocols, or anything that came to us during this journey.\n\nHowever there was one important constraint during all that experience: no car could be dismantled nor modified. The main goal of this analysis was to try doing something out of the data which could be freely recovered while plugging itself to the OBD-II port of a car. As mentioned, this resulted in the possibility of controlling a video game car through the real car, like a simulator, without the need of modifying anything in the car itself.\n\nUnfortunately, this requires a lot of gasoline to have the engine powered on and run. Moreover, gasoline is really expensive in France. So we looked for a way to reduce that cost. We actually found a nice device on the Internet to optimize the amount of gasoline used by the engine. Apparently, it works by connecting to the OBD-II port and reconfigures the engine’s ECU. We looked into that to understand what was actually going on… and try to reduce the cost of the drifting.\n\nThe following points will be mentioned during the presentation:\nECUs\nCAN bus\nOBD-II (DTCs/PIDs)\nOn-top-of-CAN protocols\nUDS (Diagnostic/Security session)\nReverse engineering: the meanings of CAN messages\nUsing a real car as a simulator, for poories\nMinor details about how to create a custom game controller\nOBD dongle reverse engineering","original_language":"eng","persons":["Guillaume Heilles","P1kachu"],"tags":["34c3","8758","Security"],"view_count":9278,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T19:00:06.060+02:00","length":3077,"duration":3077,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8758-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8758-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/275f85de-d612-4440-8755-85dee5912f12-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/275f85de-d612-4440-8755-85dee5912f12-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8758-how_to_drift_with_any_car","url":"https://api.media.ccc.de/public/events/275f85de-d612-4440-8755-85dee5912f12","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":273},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":444},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":365},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":314},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":450},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":280},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":267},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":215},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":176},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":340},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":488},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":347},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":176},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":425},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":389},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":230},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":292},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":337},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":153},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":169},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":278},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":935},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":237},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":315},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":409},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":260},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":370},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":457},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":539},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":325},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":294},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":218},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":328},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":377}]},{"guid":"dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7","title":"Zamir Transnational Network und Zagreb Dairy","subtitle":"Das erste computer netzwerk in Krieg (Jugoslavia 1992-1997)","slug":"34c3-8842-zamir_transnational_network_und_zagreb_dairy","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8842.html","description":"Die Geschichte des ZAMIR Transnational Network und meines Zagreb-Diary\n(http://www.wamkat.de/diaries1/zagreb-diary) zwischen 1991 und 1995 im\nfrüheren Jugoslawien. Es war das erste Computernetzwerk in einer\nKriegsregion, das alle Friedens-, Frauen-, Menschenrechts- und\nhumanitäre Aktivisten und alle anderen Menschen in dem Kriegsgebiet\nmiteinander und der Außenwelt verbunden hat.\n\nZwischen 1991 und 1995 habe ich aktiv mitgeholfen, die Idee eines\nComputer-Netzwerks in einem Kriegsgebiet zu verwirklichen. Mit\nUnterstützung von Bionic, CCC und anderen Gruppen wurden im Gebiet des\nfrüheren Jugoslawien etwa ein Dutzend Hubs aufgebaut, die damals fast\n20.000 Benutzer im Kriegsgebiet mit der Außenwelt und - quer über die\nwechselnden Fronten - auch miteinander verbunden haben: Das ZAMIR\nTransnational Network.\nIch habe in der Zeit jeden Tag mein elektronisches Tagebuch publiziert\n(http://www.wamkat.de/diaries1/zagreb-diary), was manchmal von einigen\nhunderttausend Menschen gelesen wurde und viel dazu beigetragen hat, ein\naktives, humanitäres grassroots-Netzwerk aufzubauen.\n\nVon den damaligen Schwierigkeiten möchte ich gern berichten, die sich\nheute kaum noch jemand vorstellen kann, obwohl es eigentlich noch gar\nnicht so lange her ist. Davon, wie wir die Probleme gelöst haben (oder\nnicht) und was sich daraus ergeben hat. Über die Dinge, die wir damit\nerreicht haben.\nUnd darüber, was für mich und andere schließlich daraus geworden i","original_language":"deu","persons":["Wam (P.J.H.F.) Kat"],"tags":["34c3","8842","Ethics, Society \u0026 Politics"],"view_count":571,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-02-16T23:00:09.846+01:00","length":3666,"duration":3666,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8842-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8842-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8842-zamir_transnational_network_und_zagreb_dairy","url":"https://api.media.ccc.de/public/events/dcf47c43-b7e7-4a44-8dcd-f6d62c7cbdd7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":22},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":16},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":18},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":14},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":20},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":18},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":19},{"event_id":4858,"event_guid":"12f2dd5b-5e3d-4098-9f10-6c277672b2e0","weight":14},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":25},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":11},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":6},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":17},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":35},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":20},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":23},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":16},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":25},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":25},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":17},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":19}]},{"guid":"bf924a39-2860-4e27-8741-b8fa0c010363","title":"Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection","subtitle":null,"slug":"34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8735.html","description":"In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spying microphones. Our biggest concern was that most of the knowledge came from fictional movies. Therefore, we performed a deep study on the state-of-the-art of microphone bugs, their characteristics, features and pitfalls. It included real life experiments trying to bug ourselves and trying to detect the hidden mics. Given the lack of open detection tools, we developed a free software SDR-based program, called Salamandra, to detect and locate hidden microphones in a room. After more than 120 experiments we concluded that placing mics correctly and listening is not an easy task, but it has a huge payoff when it works. Also, most mics can be detected easily with the correct tools (with some exceptions on GSM mics). In our experiments the average time to locate the mics in a room was 15 minutes. Locating mics is the novel feature of Salamandra, which is released to the public with this work. We hope that our study raises awareness on the possibility of being bugged by a powerful actor and the countermeasure tools available for our protection.","original_language":"eng","persons":["Veronica Valeros","Sebastian Garcia"],"tags":["34c3","8735","Ethics, Society \u0026 Politics"],"view_count":6113,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-11T03:00:03.887+01:00","length":3750,"duration":3750,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8735-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8735-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/bf924a39-2860-4e27-8741-b8fa0c010363-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/bf924a39-2860-4e27-8741-b8fa0c010363-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection","url":"https://api.media.ccc.de/public/events/bf924a39-2860-4e27-8741-b8fa0c010363","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":181},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":119},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":197},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":154},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":135},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":226},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":134},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":171},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":202},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":128},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":222},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":148},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":182},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":150},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":127},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":145},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":163},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":19},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":383},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":75},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":128},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":278},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":161},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":178},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":125},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":221},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":141},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":144},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":140},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":134},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":162}]},{"guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","title":"Bringing Linux back to server boot ROMs with NERF and Heads","subtitle":null,"slug":"34c3-9056-bringing_linux_back_to_server_boot_roms_with_nerf_and_heads","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9056.html","description":"The NERF and Heads projects bring Linux back to the cloud servers' boot ROMs by replacing nearly all of the vendor firmware with a reproducible built Linux runtime that acts as a fast, flexible, and measured boot loader.  It has been years since any modern servers have supported Free Firmware options like LinuxBIOS or coreboot, and as a result server and cloud security has been dependent on unreviewable, closed source, proprietary vendor firmware of questionable quality.  With Heads on NERF, we are making it possible to take back control of our systems with Open Source Software from very early in the boot process, helping build a more trustworthy and secure cloud.\n\nThe NERF project was started by Ron Minnich (author of LinuxBIOS and lead of coreboot at Google) in January 2017 with the goal to bring Linux back to the BIOS by retaining a minimal set of PEI modules for memory controller initialization and replacing the entirety of the server vendor's UEFI DXE firmware with a reproducibly built Linux runtime.  It has been ported to a few different manufacturer's servers, demonstrating the general portability of the concept.\n\nNERF is fast - less than twenty second boot times, versus multiple minutes.  It's flexible - it can make use of any devices, filesystems and protocols that Linux supports. And it's open - users can easily customize the boot scripts, fix issues, build their own runtimes and reflash their firmware with their own keys.\n\nThe Heads runtime was started by Trammell Hudson (author of Thunderstrike and Magic Lantern) and was presented last year at 33c3.  It is a slightly more secure bootloader that uses Linux, the TPM, GPG and kexec to be able to load, measure, verify and execute the real kernel.  As part of porting Heads to work with NERF on server platforms, it now includes tools like Keylime to allow severs to remotely attest to user controlled systems that the NERF/Heads firmware matches what they expect, as well as network and iSCSI drivers for diskless compute node servers.\n\nIn this talk we'll provide an overview of the NERF project, the currently supported server mainboards, and the continued development on the Heads runtime that allows more trust in the servers that make up the cloud.","original_language":"eng","persons":["Trammell Hudson"],"tags":["34c3","9056","Resilience"],"view_count":2853,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-01T05:15:04.071+02:00","length":1791,"duration":1791,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9056-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9056-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c5bfac96-8290-438a-a47a-ebdbf0ab5365-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c5bfac96-8290-438a-a47a-ebdbf0ab5365-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9056-bringing_linux_back_to_server_boot_roms_with_nerf_and_heads","url":"https://api.media.ccc.de/public/events/c5bfac96-8290-438a-a47a-ebdbf0ab5365","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":68},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":69},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":56},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":12},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":48},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":65},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":73},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":82},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":52},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":57},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":85},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":60},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":49},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":58},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":49},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":68},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":83},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":122},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":63},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":19},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":55},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":85},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":54},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":56},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":50},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":59}]},{"guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","title":"0en \u0026 1en auf dem Acker","subtitle":"Was die Sensor \u0026 Automatisierungstechnik in der Landwirtschaft heute schon leisten kann – Ein Einblick","slug":"34c3-8961-0en_1en_auf_dem_acker","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8961.html","description":"Die Dynamik der globalen Agrarmärkte hat sich in den letzten Jahren verstärkt und birgt neue Herausforderungen für die Landwirte. Hoffnungsträger sind ähnlich wie in anderen Branchen auch Sensor- \u0026 Datenverarbeitungstechnik sowie das Internet: Produktionsprozesse steuern sich selbst, Anhänger werden halbautomatisch mittels Bilderkennung beladen, Maschinen kommunizieren mittels Maschinen und Fahrzeuge steuern sich weitestgehend schon jetzt autonom.\n\nDie Dynamik der globalen Agrarmärkte hat sich in den letzten Jahren verstärkt und birgt neue Herausforderungen für die Landwirte. Ebenso ändert sich das vielfach verbreitete Berufsbild des Landwirts oder des Bauers zunehmend hin zu einem landwirtschaftlichen Unternehmer, der das komplette Spektrum des aktuellen Standes des Technik einzusetzen vermag. Themen wie Ressourcenknappheit, Veränderungen im Klima sowie die weltweit steigende Nachfrage nach Nahrungsmitteln und nachwachsenden Rohstoffen zwingen dabei auch in Deutschland die Bauern bzw. landwirtschaftlichen Unternehmer über neue Strategien und Arbeitstechniken nachzudenken um Produktivität und Effizienz zu steigern. \nDie rasante Entwicklung in der Sensor- \u0026 Datenverarbeitungstechnik in Verbindung mit dem Internet ist dabei einer der Schlüssel der helfen kann den aktuellen Herausforderungen der Landwirtschaft zu begegnen. Dabei sind – ohne dass ein Großteil der Bevölkerung dies vermuten würde – gerade in der Landwirtschaft und dem landwirtschaftlichen kommunalen Dienstleistungssektor große Fortschritte in Arbeitsabläufen und Arbeitserledigungen vollzogen worden. Es darf dabei – gänzlich modern \u0026 smart von Landwirtschaft 4.0 gesprochen werden: Produktionsprozesse steuern sich selbst, Anhänger werden halbautomatisch mittels Bilderkennung beladen, Maschinen kommunizieren mittels Maschinen und Fahrzeuge steuern sich weitestgehend schon jetzt autonom.","original_language":"deu","persons":["Fritz - Dietrich Burghardt"],"tags":["34c3","8961","Science"],"view_count":2469,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-02-06T17:45:07.965+01:00","length":1848,"duration":1848,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8961-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8961-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/bf23997f-20bb-40a5-96f9-5f43f453e9dd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/bf23997f-20bb-40a5-96f9-5f43f453e9dd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8961-0en_1en_auf_dem_acker","url":"https://api.media.ccc.de/public/events/bf23997f-20bb-40a5-96f9-5f43f453e9dd","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":75},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":62},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":55},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":55},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":68},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":56},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":55},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":72},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":113},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":62},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":59},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":100},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":61},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":159},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":96},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":97},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":64},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":102},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":80},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":176},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":56},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":94},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":145},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":94},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":97}]},{"guid":"c297bff4-55ca-473c-afef-0064970a47b2","title":"Treibhausgasemissionen einschätzen","subtitle":"Wieviel CO2 macht \u003c...\u003e? Ungefähr?","slug":"34c3-8741-treibhausgasemissionen_einschatzen","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8741.html","description":"Alles was wir jeden Tag tun erzeugt Treibhausgase. Für eine vernünftige/moralische/ökologische Entscheidung, um mit anderen Handlungsoptionen brauchbar vergleichen zu können, muss man wissen - wieviel? Ungefähr zumindest? Für Einsteiger. Keine Formeln, wenig Mathematik/Physik.\n\nKurzvorstellung einiger für nicht-Fachleute verständlicher Werkzeuge, um Treibhausgasemissionen einschätzen zu können:\u003cul\u003e\n\u003cli\u003eGlobales Emissionsmodell integrierter Systeme (GEMIS) und Probas\u003c/li\u003e\n\u003cli\u003eEnvironmental Product Declaration\u003c/li\u003e\n\u003cli\u003eEin Guter Tag hat 100 Punkte\u003c/li\u003e\n\u003c/ul\u003e\nAnhand der Werkzeuge gucken wir uns mal ein paar typische und ein paar überraschende Alltagsbeispiele an:\u003cul\u003e\n\u003cli\u003eBus oder Bahn oder Auto oder Flugzeug?\u003c/li\u003e\n\u003cli\u003eAufzug oder Treppe - was ist klimafreundlicher?\u003c/li\u003e\n\u003cli\u003eLeitungswasser oder Flaschenwasser?\u003c/li\u003e\n\u003cli\u003eElektroautos und die Studie aus Schweden?\u003c/li\u003e\n\u003cli\u003eAmazon oder Kaufhaus?\u003c/li\u003e\n\u003cli\u003eFleisch, Rotwein, Käse?\u003c/li\u003e\n\u003c/ul\u003e\nHier werden keine kompletten, korrekten Ökobilanzen errechnet, sondern es geht darum, alltagstaugliche Entscheidungshilfen vorzustellen. Die Berücksichtigung kompletter Prozessketten vom Bohrloch bis zur Entsorgung machen wir aber trotzdem.","original_language":"deu","persons":["Gunnar Thöle"],"tags":["34c3","8741","Science"],"view_count":1770,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-02-16T13:15:09.900+01:00","length":2889,"duration":2889,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8741-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8741-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c297bff4-55ca-473c-afef-0064970a47b2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c297bff4-55ca-473c-afef-0064970a47b2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8741-treibhausgasemissionen_einschatzen","url":"https://api.media.ccc.de/public/events/c297bff4-55ca-473c-afef-0064970a47b2","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":59},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":63},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":53},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":52},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":48},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":48},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":13},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":64},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":56},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":99},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":79},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":84},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":72},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":102},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":33},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":98},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":49},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":64},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":54},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":49}]},{"guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","title":"Visceral Systems","subtitle":"Approaches to working with sound and network data transmissions as a sculptural medium.","slug":"34c3-9290-visceral_systems","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9290.html","description":"This talk considers the visceral relationship one can have towards intangible media, notably sound and network data transmissions. Sarah presents a selection of her work demonstrating these synesthetic relationships, ranging from experiments in bio and fiber arts to interface design and educational tools for demystifying computer networking technology.","original_language":"eng","persons":["Sarah Grant"],"tags":["34c3","9290","Art \u0026 Culture"],"view_count":495,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-30T23:45:06.899+02:00","length":1948,"duration":1948,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9290-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9290-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f6265504-14b2-41e6-a134-6fec8c00cee4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f6265504-14b2-41e6-a134-6fec8c00cee4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9290-visceral_systems","url":"https://api.media.ccc.de/public/events/f6265504-14b2-41e6-a134-6fec8c00cee4","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":35},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":10},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":20},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":23},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":17},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":23},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":20},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":6},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":25},{"event_id":4798,"event_guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","weight":23},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":20},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":14},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":6},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":21},{"event_id":4816,"event_guid":"1d7b2355-60b1-453c-bf0e-64228466d2cc","weight":30},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":15},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":37},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":12},{"event_id":4829,"event_guid":"6cccf75c-93a1-48df-b9fc-843da8359bd3","weight":30},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":20},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":19},{"event_id":4848,"event_guid":"68d83e4e-52d8-42be-b01c-c6f425d95c8e","weight":25},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":28},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":14},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":21},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":20},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":19}]},{"guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","title":"Deep Learning Blindspots","subtitle":"Tools for Fooling the \"Black Box\"","slug":"34c3-8860-deep_learning_blindspots","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8860.html","description":"In the past decade, machine learning researchers and theorists have created deep learning architectures which seem to learn complex topics with little intervention. Newer research in adversarial learning questions just how much “learning\" these networks are doing. Several theories have arisen regarding neural network “blind spots” which can be exploited to fool the network. For example, by changing a series of pixels which are imperceptible to the human eye, you can render an image recognition model useless. This talk will review the current state of adversarial learning research and showcase some open-source tools to trick the \"black box.\"","original_language":"eng","persons":["Katharine Jarmul"],"tags":["34c3","8860","Resilience"],"view_count":5893,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-09T23:45:09.128+01:00","length":3227,"duration":3227,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8860-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8860-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/aed02b65-9a16-4a42-ac28-2883da680d0a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/aed02b65-9a16-4a42-ac28-2883da680d0a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8860-deep_learning_blindspots","url":"https://api.media.ccc.de/public/events/aed02b65-9a16-4a42-ac28-2883da680d0a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":124},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":190},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":125},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":124},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":119},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":134},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":117},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":120},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":150},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":137},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":156},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":151},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":137},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":499},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":108},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":155},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":163},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":310},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":169},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":109},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":127},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":106},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":135},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":210},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":108},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":141},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":144},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":124}]},{"guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","title":"Privacy Shield -  Lipstick on a Pig?","subtitle":null,"slug":"34c3-9295-privacy_shield_-_lipstick_on_a_pig","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9295.html","description":"In 2015 the Court of Justice of the European  Union (CJEU) has overturned the EU-US data sharing system called „Safe Harbor“ over US mass surveillance, as disclosed by Edward Snowden. Only months later the European Commission agreed with the US government to replace it with the so-called “Privacy Shield”, despite the existence of PRISM and Upstream surveillance. Why the new deal is nothing but the old “Safe Harbor”, what we can learn for the documents exchanged between the EU and the US and why it will very likely be overturned as soon as it reached the CJEU again.","original_language":"eng","persons":["Max Schrems"],"tags":["34c3","9295","Ethics, Society \u0026 Politics"],"view_count":2112,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-12T19:00:05.434+01:00","length":2158,"duration":2158,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9295-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9295-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/57f82be5-77f2-46aa-ba55-94e922e6cb77-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/57f82be5-77f2-46aa-ba55-94e922e6cb77-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9295-privacy_shield_-_lipstick_on_a_pig","url":"https://api.media.ccc.de/public/events/57f82be5-77f2-46aa-ba55-94e922e6cb77","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":49},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":32},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":34},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":34},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":60},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":37},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":47},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":36},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":8},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":57},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":37},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":56},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":35},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":53},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":32},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":31},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":87},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":19},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":59}]},{"guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","title":"Nougatbytes 11₂","subtitle":"Die geekige Wort- \u0026 Bilderrätselspielshau ist zuЯück","slug":"34c3-8993-nougatbytes_11","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8993.html","description":"Zwei Teams mit rauchenden Köpfen und ein johlendes Publikum raten sich durch unsere dritte Wortspielhölle der IT, Informatik und digitalen Gesellschaft. Wer bei vielschichtigen (Anm. d. R.: „haarsträubenden“!) Assoziazionsbilderrätseln freudiges Synapsenfunkeln und feuchte Augen bekommt oder aber bei Gehirnschmerz und Um-die-Ecke-Denk-Beulen trotzdem feiert, ist bei uns zu Hause.\n\nAllgemeiner Aufruf:\nFür die erste Runde Nougatbytes wollen wir die Teams im Voraus anheuern. Wenn Ihr Mitmachlust verspürt und Euch auf unsere Couch traut, so bildet Banden zu dritt bis fünft gebt euch nen Namen und lasst uns wissen, warum ihr Lust auf Kopfsalat habt: couchplatz@nougatbytes.de\n\nLinks / Videos: Nougatbytes 1 und 10\nhttps://media.ccc.de/v/26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo\nhttps://media.ccc.de/v/29c3-5037-de-en-nougatbytes10_h264\nhttp://nougatbytes.de","original_language":"deu","persons":["Rainer Rehak","Benks"],"tags":["34c3","8993","Entertainment"],"view_count":3415,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-02-21T21:45:07.185+01:00","length":6439,"duration":6439,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8993-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8993-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c02bcac2-4df7-4264-83e3-c7277913cbd8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c02bcac2-4df7-4264-83e3-c7277913cbd8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8993-nougatbytes_11","url":"https://api.media.ccc.de/public/events/c02bcac2-4df7-4264-83e3-c7277913cbd8","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":84},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":95},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":65},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":70},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":87},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":63},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":73},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":69},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":128},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":74},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":64},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":72},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":75},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":140},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":250},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":171},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":70},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":87},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":178},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":31},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":80},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":72},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":223},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":118},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":99}]},{"guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","title":"Eröffnung: tuwat","subtitle":null,"slug":"34c3-9292-eroffnung_tuwat","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9292.html","description":"Daß sich mit Kleinkomputern trotzalledem sinnvolle Sachen machen lassen, die keine zentralisierten Großorganisationen erfordern, glauben wir.","original_language":"deu","persons":["Tim Pritlove"],"tags":["34c3","9292","CCC"],"view_count":21290,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-04-01T15:00:08.570+02:00","length":1283,"duration":1283,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9292-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9292-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/b036385c-ec1a-44e5-ae48-af703ce9b5d3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/b036385c-ec1a-44e5-ae48-af703ce9b5d3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9292-eroffnung_tuwat","url":"https://api.media.ccc.de/public/events/b036385c-ec1a-44e5-ae48-af703ce9b5d3","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2621},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1843},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":913},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":852},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":2607},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":284},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":228},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":683},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":178},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":105},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":84},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":234},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":93},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":293},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":217},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":170},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":251},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":402},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":927},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":103},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1099},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":462},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":95},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":844},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":82},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":125},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":236},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":346},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":154},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":90},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":124},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":87},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1033},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":786},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":127},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":273},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":192},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":191},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":198},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":369},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":190},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1798},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":435},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":939},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":96},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":84},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":226},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":188},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":764},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":372},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":140},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":99},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":162},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":152}]},{"guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","title":"Running GSM mobile phone on SDR","subtitle":"SDR PHY for OsmocomBB","slug":"34c3-8952-running_gsm_mobile_phone_on_sdr","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8952.html","description":"Since SDR (Software Defined Radio) becomes more popular and more available for everyone, there is a lot of projects based on this technology. Looking from the mobile telecommunications side, at the moment it's possible to run your own GSM or UMTS network using a transmit capable SDR device and free software like OsmoBTS or OpenBTS. There is also the srsLTE project, which provides open source implementation of LTE base station (eNodeB) and moreover the client side stack (srsUE) for SDR. Our talk is about the R\u0026D process of porting the existing GSM mobile side stack (OsmocomBB) to the SDR based hardware, and about the results we have achieved.\n\nThere is a great open source mobile side GSM protocol stack implementation - OsmocomBB project. One could be used for different purposes, including education and research. The problem is that the SDR platforms were out of the hardware the project could work on. The primary supported hardware for now are old Calypso based phones (mostly Motorola C1XX).\n\nDespite they are designed to act as mobile phone, there are still some limitations, such as the usage of proprietary firmware for DSP (Digital Signal Processor), which is being managed by the OsmocomBB software, and lack of GPRS support. Moreover, these phones are not manufactured anymore, so it's not so easy to find them nowadays.\n\nTaking the known problems and limitations into account, and having a strong desire to give everyone the new possibilities for research and education in the telecommunications scope, we decided to write a 'bridge' between OsmocomBB and SDR. Using GNU Radio, a well known environment for signal processing, we have managed to get some interesting results, which we would like to share with community on the upcoming CCC.","original_language":"eng","persons":["Vadim Yanitskiy","ptrkrysik"],"tags":["34c3","8952","Hardware \u0026 Making"],"view_count":2125,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-31T15:30:07.150+02:00","length":1879,"duration":1879,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8952-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8952-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/416409b8-e09e-4717-bb2d-bba218d6f2f1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/416409b8-e09e-4717-bb2d-bba218d6f2f1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8952-running_gsm_mobile_phone_on_sdr","url":"https://api.media.ccc.de/public/events/416409b8-e09e-4717-bb2d-bba218d6f2f1","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":22},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":42},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":33},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":36},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":32},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":43},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":36},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":56},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":46},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":39},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":39},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":34},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":46},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":46},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":55},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":46},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":42},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":64},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":4},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":41},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":36},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":65},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":39},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":18},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":37},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":51},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":32},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":51},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":44}]},{"guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","title":"A hacker's guide to Climate Change - What do we know and how do we know it?","subtitle":"An introduction to the basics of climate research and what we can do about climate change","slug":"34c3-9184-a_hacker_s_guide_to_climate_change_-_what_do_we_know_and_how_do_we_know_it","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9184.html","description":"Climate change has long ceased to be news to many people, but it is increasingly shaping humanity's reality.\n\nThis talk sheds light on the changes in the climate system and their consequences.\n\nWe introduce the basics and discuss possible actions in response.\n\nI. Understanding the Climate System\n\nWe begin with the physical basics, guided by visualizations rather than focussing on the math.\n\nWhat do we know about the workings of climate? How do we know?\nWe also consider the reliability of our knowledge in detail, as well as open questions yet to answer.\n\nWhat are the bio-physical consequences? What are the socio-economic ones?\n\nII. Hacking the Climate\n\nNext, we discuss leverage points to hack the climate system itself - climate engineering.\n\nMany ideas have been proposed, such as removing greenhouse gases or changing the radiative budget with other means.\nMost of these attempts are not more than a workaround.\n\nNevertheless, some of these are discussed much more seriously among climate scientist than the public realizes.\n\nIII. Hacking the System\n\nWe conclude with examples of what could be effective solutions to the climate problem and what we can do – hacking our political and economic system rather than the earth system. How can individuals contribute? What societal changes do we need?","original_language":"eng","persons":["Katja Bigge (seyru)","Sven Willner","Robert Gieseke"],"tags":["34c3","9184","Science"],"view_count":1872,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-06T14:00:09.009+01:00","length":3765,"duration":3765,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9184-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9184-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8b136e88-ea36-4398-bac2-13cf2a509d5e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8b136e88-ea36-4398-bac2-13cf2a509d5e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9184-a_hacker_s_guide_to_climate_change_-_what_do_we_know_and_how_do_we_know_it","url":"https://api.media.ccc.de/public/events/8b136e88-ea36-4398-bac2-13cf2a509d5e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":40},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":79},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":38},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":29},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":40},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":52},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":59},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":14},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":95},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":47},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":10},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":41},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":46},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":10},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":23},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":41},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":45},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":39},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":10},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":84},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":38},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":47},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":47},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":40}]},{"guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","title":"BootStomp: On the Security of Bootloaders in Mobile Devices","subtitle":null,"slug":"34c3-9205-bootstomp_on_the_security_of_bootloaders_in_mobile_devices","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9205.html","description":"In our paper we present a novel tool called BootStomp able to identify security vulnerabilities in Android bootloaders (such as memory corruptions) as well as unlocking vulnerabilities. During its evaluation, BootStomp discovered 6 previously unknown vulnerabilities across 4 different bootloaders. Finally BootStomp has been open-sourced to help the security community.","original_language":"eng","persons":["Audrey Dutcher"],"tags":["34c3","9205","Security"],"view_count":1222,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-12-05T19:30:04.319+01:00","length":1702,"duration":1702,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9205-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9205-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c1acc5c2-58b2-4ed5-a504-351b8b93c171-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c1acc5c2-58b2-4ed5-a504-351b8b93c171-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9205-bootstomp_on_the_security_of_bootloaders_in_mobile_devices","url":"https://api.media.ccc.de/public/events/c1acc5c2-58b2-4ed5-a504-351b8b93c171","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":48},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":51},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":52},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":49},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":98},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":35},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":48},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":48},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":46},{"event_id":4811,"event_guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","weight":45},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":50},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":76},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":12},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":48},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":79},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":42},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":65},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":50}]},{"guid":"6c4b2648-3840-476c-b966-c008010bca66","title":"How Alice and Bob meet if they don't like onions","subtitle":"Survey of Network Anonymisation Techniques","slug":"34c3-9104-how_alice_and_bob_meet_if_they_don_t_like_onions","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9104.html","description":"There exists no such thing as a perfect anonymity network with low latency, low bandwith consumption which provides strong anonymity. \nPopular anonymisation networks rightfully focus on  Web browsing, because that is the most popular application on todays Internet.  The most popular anonymisation network is, rightfully so, Tor. You might, however, not have the requirements that mandate the use of the Tor network and thus are looking for alternatives.\nIn this talk, we present alternatives to the popular Tor anonymisation network and examine what they achieve and how they differ.\n\nWith the popularity of the Web came the popularity of anonymisation communication networks (ACNs) catering for the Web context. That means in particular low latency. Generally, though, anonymisation networks can be classified by different properties such as anonymity goals, strength of adversary or application area.\n \nIn this talk we present alternative ACNs to the popular Tor network and their goals.  We explain their architectures, properties, and how they achieve anonymity. In particular, we will look at JonDonym, I2P, Freenet, and GNUnet as well as ongoing research projects such as Loopix, Vuvuzela, and Riffle.\n \nWe will see that once you understand your requirements, you can optimise your choice of anonymisation networks according to your needs.\n\n\n","original_language":"eng","persons":["Tobias Mueller","Erik","Matthias"],"tags":["34c3","9104","Resilience"],"view_count":1930,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-09T19:30:08.638+01:00","length":3712,"duration":3712,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9104-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9104-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6c4b2648-3840-476c-b966-c008010bca66-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6c4b2648-3840-476c-b966-c008010bca66-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9104-how_alice_and_bob_meet_if_they_don_t_like_onions","url":"https://api.media.ccc.de/public/events/6c4b2648-3840-476c-b966-c008010bca66","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":15},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":78},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":54},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":43},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":46},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":49},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":57},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":80},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":40},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":43},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":40},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":48},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":42},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":17},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":62},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":80},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":69},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":50},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":88},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":51},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":56},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":66},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":52},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":72},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":67}]},{"guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","title":"Die Lauschprogramme der Geheimdienste","subtitle":null,"slug":"34c3-9289-die_lauschprogramme_der_geheimdienste","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9289.html","description":"Der NSA-BND-Untersuchungsausschuss des Deutschen Bundestags ist zu Ende. Da bietet es sich an, nun auf die gesammelten Geheimdienstskandale und die Reaktionen auf die Enthüllungen zurückzublicken.","original_language":"deu","persons":["Hans-Christian Ströbele","Constanze Kurz"],"tags":["34c3","9289","Ethics, Society \u0026 Politics"],"view_count":21678,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-03-30T19:15:05.577+02:00","length":3413,"duration":3413,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9289-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9289-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f2ca3661-30c8-476e-9d6b-920bb20b21eb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f2ca3661-30c8-476e-9d6b-920bb20b21eb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9289-die_lauschprogramme_der_geheimdienste","url":"https://api.media.ccc.de/public/events/f2ca3661-30c8-476e-9d6b-920bb20b21eb","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":68},{"event_id":4606,"event_guid":"5400c892-12e3-4199-b976-a68b0b54c159","weight":58},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":2607},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2176},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1942},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1118},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":862},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":371},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":174},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":727},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":188},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":135},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":94},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":266},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":107},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":425},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":259},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":231},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":339},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":88},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":413},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1079},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":94},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1680},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":448},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":117},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1386},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":130},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":101},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":230},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":596},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":136},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":118},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":65},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":119},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":154},{"event_id":4824,"event_guid":"5d255692-ae5e-4f96-b10e-55929d570813","weight":65},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1273},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":705},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":120},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":280},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":221},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":66},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":338},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":458},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":82},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":60},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":601},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":254},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":58},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1623},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":289},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":922},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":100},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":115},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":118},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":104},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":63},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":66},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":304},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":250},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":84},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":796},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":141},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":187},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":146},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":116},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":116},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":57}]},{"guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","title":"Decoding Contactless (Card) Payments ","subtitle":"An Exploration of NFC Transactions and Explanation How Apple Pay and Android Pay work","slug":"34c3-8965-decoding_contactless_card_payments","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8965.html","description":"This talk will dive into the techniques and protocols that drive contactless card payments at the Point of Sale. We will explore how Apple Pay works on a technical level and why you are able to 'clone' your credit card onto your phone. Building upon previous C3 talks on the topics of EMV and ICC payments, we will learn about different NFC payment options, why legacy will never die and how the individual card brands have specified their payment workflows.\n\nContactless payments are gaining more momentum every day and even though Apple Pay is not yet available in Germany, you are able to use your new contactless credit card at an increasing number of locations. This trend is not likely to stop anytime soon and it is time to understand what is going on the lower layers.\n\nTo jumpstart the discussion, we will first have a look at all the parties involved in a card transaction and where they are placed in the communication and decision chain. From there we are comparing the differences between a chip (ICC) and a contactless (NFC) transaction.\n\nAfterwards we are ready to look at Apple Pay, Android Pay and other card emulations. Even though they provide the same features on first look, they work fundamentally different on the technical level. We will learn about storing sensitive transaction information offline on the device in a Secure Element (SE) or online with your service provider utilizing Hosted Card Emulation (HCE).\n\nIn the end, we will take a short look at how contactless payments might influence our future, why legacy is still king and if tokenization might just save your day one time.","original_language":"eng","persons":["Simon Eumes"],"tags":["34c3","8965","Security"],"view_count":3772,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-04-02T02:00:03.231+02:00","length":3498,"duration":3498,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8965-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8965-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8c303809-3c7c-4532-ab1e-c9a4e7c38245-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8c303809-3c7c-4532-ab1e-c9a4e7c38245-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8965-decoding_contactless_card_payments","url":"https://api.media.ccc.de/public/events/8c303809-3c7c-4532-ab1e-c9a4e7c38245","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":77},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":96},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":56},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":60},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":92},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":81},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":70},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":103},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":59},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":61},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":70},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":66},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":89},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":66},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":112},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":63},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":64},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":86},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":66},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":77},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":106},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":107},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":107}]},{"guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","title":"QualityLand","subtitle":"Lesung","slug":"34c3-9285-qualityland","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9285.html","description":"Willkommen in QualityLand, in einer nicht allzu fernen Zukunft: Alles läuft rund - Arbeit, Freizeit und Beziehungen sind von Algorithmen optimiert.\n\n Trotzdem beschleicht den Maschinenverschrotter Peter Arbeitsloser immer mehr das Gefühl, dass mit seinem Leben etwas nicht stimmt. Wenn das System wirklich so perfekt ist, warum gibt es dann Drohnen, die an Flugangst leiden, oder Kampfroboter mit posttraumatischer Belastungsstörung? Warum werden die Maschinen immer menschlicher, aber die Menschen immer maschineller? Marc-Uwe Kling hat die Verheißungen und das Unbehagen der digitalen Gegenwart zu einer verblüffenden Zukunftssatire verdichtet, die lange nachwirkt. Visionär, hintergründig – und so komisch wie die Känguru-Trilogie.","original_language":"deu","persons":["Marc-Uwe Kling"],"tags":["34c3","9285","Ethics, Society \u0026 Politics"],"view_count":12201,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2018-01-03T01:00:00.000+01:00","updated_at":"2026-04-04T12:45:03.478+02:00","length":3702,"duration":3702,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9285-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9285-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/947f946e-3dd9-4911-b4de-f9bbd87058ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/947f946e-3dd9-4911-b4de-f9bbd87058ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9285-qualityland","url":"https://api.media.ccc.de/public/events/947f946e-3dd9-4911-b4de-f9bbd87058ee","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":162},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":160},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":115},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":48},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":116},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":78},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":35},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":31},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":43},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":144},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":103},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":70},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":128},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":30},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":32},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":71},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":154},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":64},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":30},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":62},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":61},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":72},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":50},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":197},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":100},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":207},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":34},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":48},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":79},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":35},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":159},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":48},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":56},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":128},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":194},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":36}]},{"guid":"5d255692-ae5e-4f96-b10e-55929d570813","title":"Netzpolitik in der Schweiz","subtitle":"Die aktuellen Auseinandersetzungen über digitale Freiheitsrechte","slug":"34c3-8980-netzpolitik_in_der_schweiz","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8980.html","description":"Gleich in drei Gesetzen drohen Netzsperren. Staatstrojaner und Massenüberwachung bis ins WLAN sind mit der Einführung der Überwachungsgesetze BÜPF und NDG vorgesehen. E-Voting soll auf Biegen und Brechen durchgesetzt werden. Nur garantierte Netzneutralität lässt weiter auf sich warten. Im Vortrag versuchen wir, Einsichten in die aktuellen netzpolitischen Auseinandersetzungen in der Schweiz zu geben und Handlungsmöglichkeiten aufzuzeigen.","original_language":"deu","persons":["Kire","Patrick Stählin","Martin Steiger"],"tags":["34c3","8980","Ethics, Society \u0026 Politics"],"view_count":1031,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-02-07T16:00:07.794+01:00","length":2844,"duration":2844,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8980-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8980-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/5d255692-ae5e-4f96-b10e-55929d570813-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/5d255692-ae5e-4f96-b10e-55929d570813-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8980-netzpolitik_in_der_schweiz","url":"https://api.media.ccc.de/public/events/5d255692-ae5e-4f96-b10e-55929d570813","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":46},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":40},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":65},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":42},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":57},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":60},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":57},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":38},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":57},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":77},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":49},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":62},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":59},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":40},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":53}]},{"guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","title":"Digitale Bildung in der Schule","subtitle":"5.-Klässlerinnen, die über die Millisekunden für einen delay()-Aufruf diskutieren! Gibt es nicht? Doch, gibt es!","slug":"34c3-8865-digitale_bildung_in_der_schule","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8865.html","description":"„5.-Klässlerinnen, die über die Millisekunden für einen delay()-Aufruf diskutieren!\nGibt es nicht? Doch, gibt es!“ Ein Modellprojekt mit sieben Schulen in Aachen hat diese Frage untersucht – wir haben die Schülerinnen und Schüler begleitet und würden gerne darüber berichten, denn wir wissen jetzt: Programmieren macht ihnen Spaß!","original_language":"deu","persons":["Katja Bach"],"tags":["34c3","8865","Hardware \u0026 Making"],"view_count":5701,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-31T17:15:06.216+02:00","length":2025,"duration":2025,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8865-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8865-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ed1d9ef6-23e1-4213-be8d-b97625ff20da-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ed1d9ef6-23e1-4213-be8d-b97625ff20da-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8865-digitale_bildung_in_der_schule","url":"https://api.media.ccc.de/public/events/ed1d9ef6-23e1-4213-be8d-b97625ff20da","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":236},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":191},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":173},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":132},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":230},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":118},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":191},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":124},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":175},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":298},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":321},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":110},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":244},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":343},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":259},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":111},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":375},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":212},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":147},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":180},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":213},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":175},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":286},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":139},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":192},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":171},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":142},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":135}]},{"guid":"4b1c06a3-d870-4740-9f77-832768d41fae","title":"Drones of Power: Airborne Wind Energy","subtitle":null,"slug":"34c3-8877-drones_of_power_airborne_wind_energy","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8877.html","description":"Airborne wind energy is the attempt to bring the digital revolution to the production of energy. It means that we convert the power of high-altitude winds into electricity by autonomously controlled aircraft which are connected to the ground via a tether.\nThis technology can be a key element to finally power the world by clean energy only. In this talk we will explain the physical foundations, give an overview of the current status and show you how to build an experimental system by yourself: it involves hacking an off-the-shelf model aircraft and its autopilot based on the open and free Ardupilot framework.\n\nIt is hard to argue that energy is not the very heart of humankind’s major challenge. Up to now it is largely unscratched by a digital revolution -- the main power sources of the world are remarkably dumb.\n\nWe are about to change this. In this talk, we will present what we think will disrupt energy production. We're not talking about retrofitting the power grid with yet some more insecure 'smart' component. This is about predictably available renewable energy called Airborne Wind Energy (AWE): autonomous flying drones at high altitudes can harvest the wind’s energy cheaper than any wind turbine, and most importantly: it can be done almost everywhere and almost all the time, solving the two major technological and geopolitical challenges of sustainable energy production, which has rattled the world for decades. We are convinced that humans should power the world by clean energy only, and we think AWE can be a key element to do just that. In this talk, we will cover the physical foundations, introduce a few of the control algorithms and the challenges associated with very strong forces acting on very light objects. We will also shed a light on the progress of leaders in the field such as Ampyx Power and Google Makani.\n \nBut there is more to it: Using the `AWEsome' project, we will show you how to build an open source wind drone for yourself by hacking a model plane and its autopilot based on the open and free Ardupilot framework. While its energy production will be rather limited, it serves a lot of useful purposes: For example, it paves the way to test crazy new ideas of start, landing and flight modes on a cheap disposable platform and is a training playground for flight operations.\n\nMaybe by the time of the next Chaos Communication Camp, you will have joined us and we can fly our wind energy harvesting robots together -- and save the world, all at the same time.","original_language":"eng","persons":["Christoph"],"tags":["34c3","8877","Science"],"view_count":1207,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-28T01:45:02.940+01:00","length":2233,"duration":2233,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8877-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8877-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4b1c06a3-d870-4740-9f77-832768d41fae-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4b1c06a3-d870-4740-9f77-832768d41fae-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8877-drones_of_power_airborne_wind_energy","url":"https://api.media.ccc.de/public/events/4b1c06a3-d870-4740-9f77-832768d41fae","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":43},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":37},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":46},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":36},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":33},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":8},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":49},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":35},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":33},{"event_id":4863,"event_guid":"801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","weight":35},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":75},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":8},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":34},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":36},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":49},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":53},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":34},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":166},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":37},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":33},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":32}]},{"guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","title":"Saving the World with Space Solar Power","subtitle":"or is it just PEWPEW?!","slug":"34c3-8869-saving_the_world_with_space_solar_power","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8869.html","description":"Space Solar Power station, such as SPS Alpha, could overcome some issues that renewable energy plants on Earth suffer of structural basis when challenges such as energy transfer from orbit to Earth are solved. But will this solve the Earth's problems in a peaceful way?\n\nThe increasing demand on energy seems to be one of the greatest challenges for modern society. [1,2] Power generation approaches of the 20th century, such as coal, oil, or nuclear plants come with certain issues limiting the scalability and/or questioning even the approach itself since they may harm nature and environment on a longterm time scale. \nRenewable energy generated e.g. with solar cells, wind mills, or tidal stations are on the rise but they usually depend to certain locations, weather, storage capabilities, and in some cases even on political climates. [3]\nSpace based Solar Power generation [4,5] overcomes some of these issues: solar cells in orbit are independent of atmospheric influences and weather (e.g. clouds), solar harvesting satellites can be placed in orbit so they always face sun and generate power continuously, and there is enough space to scale the plants in order to serve the power demands. Solar power is an infinite power source (at least in the time scale for humanity) \nThe bottle neck with this approach, however, is the transfer of the power from orbit to Earth. But if solved, this technology can supply power to locations on Earth, that are remotely located, that lack other power generation capabilities (e.g. due to a natural catastrophe), or that come with varying demands on power consumption. \nSome questions still remain: Is it possible to transfer power wireless over such a long distance with a sufficient efficiency? [6-8] How would that influence life on Earth? And who is in charge of the orbital death laser?!?\n\n[1] https://data.worldbank.org/indicator/EG.USE.ELEC.KH.PC\n[2]https://www.theguardian.com/environment/2017/aug/28/electricity-demand-in-southern-europe-to-soar-with-air-con-say-climate-scientists  (http://www.pnas.org/content/114/38/E7910)\n[3] https://unearthed.greenpeace.org/2015/12/23/three-problems-transitioning-renewables-how-to-fix/     \n[4] https://en.wikipedia.org/wiki/Space-based_solar_power \n[5] https://www.nasa.gov/directorates/spacetech/niac/mankins_sps_alpha.html\n[6] https://en.wikipedia.org/wiki/Wireless_power_transfer\n[7] https://www.cio.com/article/3129027/space/wireless-power-systems-could-one-day-beam-electricity-from-space.html\n[8] https://www.rfglobalnet.com/doc/japanese-scientists-develop-long-distance-wireless-power-transmission-0001\n\n\n","original_language":"eng","persons":["anja","sjunk"],"tags":["34c3","8869","Science"],"view_count":1010,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-08-16T11:00:04.530+02:00","length":1542,"duration":1542,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8869-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8869-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/b4ec41ce-8c36-47a3-87a3-984c111cb2a6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/b4ec41ce-8c36-47a3-87a3-984c111cb2a6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8869-saving_the_world_with_space_solar_power","url":"https://api.media.ccc.de/public/events/b4ec41ce-8c36-47a3-87a3-984c111cb2a6","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":32},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":18},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":29},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":31},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":38},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":29},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":18},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":32},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":37},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":29},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":37},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":65},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":24},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":166},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":33},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":45},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":53},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":20},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":12},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":31},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":41},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":32},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":33}]},{"guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","title":"The Snowden Refugees under Surveillance in Hong Kong","subtitle":"A Rapidly Emerging Police State and Imminent Deportation to Sri Lanka and Philippines","slug":"34c3-9297-the_snowden_refugees_under_surveillance_in_hong_kong","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9297.html","description":"The Snowden Refugees’ actions to protect the world’s most significant whistle blower of the 21st Century, amounts to an expression of Political Opinion. Since September 2016, the Snowden Refugees have been systematically targeted and persecuted by the Hong Kong government based on that political opinion.\n\nAfter the Oliver Stone film “Snowden” was released in September 2016, the world learned about Edward Snowden having been provided a safe haven and refuge in Hong Kong by the destitute “Snowden Refugees”.\nInstead of being recognized as brave individuals who selflessly protected Mr Snowden, the Hong Kong government launched a systematic campaign to harass, oppress and punish the Snowden Refugees, with a view to deport them from Hong Kong as quickly as possible.\nBy October 2017, the Hong Kong government had utilized the Social Welfare Department, its Swiss based Contractor International Social Services, and the Immigration Department to target and punish the Snowden Refugees. These well-planned systemic efforts escalated with the Hong Kong police targeting the Snowden Refugees, instead of providing protection to them.\nThe Hong Kong government has been aggressively seeking to rapidly remove Vanessa and her stateless daughter to the Philippines under conditions of a nation-wide state of emergency, martial law in Mindanao and a recently catalyzed nation-wide civil war with the National People’s Army. In the name of a war on drugs, President Duterte directed the well-planned and systematic use of torture, arbitrary arrest and detention, enforced disappearances and extra-judicial killings of tens of thousands of innocent civilians including politicians, with no end in sight. His actions amount to crimes against humanity.\nThe Hong Kong government also seeks to deport the Sri Lankan Snowden Refugees to a country accused of having committed war crimes, crimes against humanity and genocide, with its current Prime Minister Ranil Wickremesinghe accused of being complicit in war crimes and crimes against humanity. Today Sri Lanka is plagued by systemic use of torture, arbitrary arrest and detention, enforced disappearances and extrajudicial killings with no end in sight. \nIn the above context, the Hong Kong government has failed to protect the Snowden Refugees and in fact have taken steps to put them in harms’ way both in Hong Kong and their countries of origin.","original_language":"eng","persons":["Robert Tibbo","Edward Snowden"],"tags":["34c3","9297","Ethics, Society \u0026 Politics"],"view_count":2311,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-13T01:30:16.953+01:00","length":3998,"duration":3998,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9297-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9297-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2dd1ed02-2a4f-4c15-93e5-6d171fea74df-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2dd1ed02-2a4f-4c15-93e5-6d171fea74df-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9297-the_snowden_refugees_under_surveillance_in_hong_kong","url":"https://api.media.ccc.de/public/events/2dd1ed02-2a4f-4c15-93e5-6d171fea74df","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":73},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":90},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":35},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":118},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":46},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":42},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":41},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":41},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":46},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":44},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":74},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":50},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":54},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":47},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":35},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":65},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":38},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":93},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":47},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":63},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":43},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":36},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":58},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":37},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":66},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":45}]},{"guid":"51b586be-500c-436e-b70c-fc433e65c4be","title":"Unleash your smart-home devices: Vacuum Cleaning Robot Hacking","subtitle":"Why is my vacuum as powerful as my smartphone?","slug":"34c3-9147-unleash_your_smart-home_devices_vacuum_cleaning_robot_hacking","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9147.html","description":"Did you ever want to run your own IoT cloud on your IoT devices? Or did you ever wonder what data your vacuum cleaning robot is transmitting to the vendor? Why a vacuum cleaning robot needs tcpdump?\nNowadays IoT devices are getting more and more powerful and contain a lot of sensors. As most devices are connected directly to the vendor and transmit all data encrypted to the cloud, this may result in privacy issues. An IoT device with no internet connection lacks numerous features or is even unusable. We want to change that.\n\nWe show you how to root a Xiaomi vacuum cleaning robot in order to get access to the underlying Linux operating system(Ubuntu 14.04 LTS), \u003cb\u003e**without opening the device or tampering the warranty seals**\u003c/b\u003e. Furthermore, we will have a look into the vendors cloud interface and its commands, and will show you how to de-attach the device from the cloud and connect it to your local Smart Home system. Finally, we will demonstrate how to run Smart Home software directly on the vacuum cleaning robot itself.\n\nWe will give you a detailed tour through the hardware and software components of the Xiaomi vacuum robot (generation 1). We will also publish a non-invasive method to get root access to your vacuum robot. \n\nAfter talking about the rooting procedure, we will discuss the internals of the robot. For example, the robot uses a so called SLAM (Simultaneous Localization and Mapping) system with LIDAR (Light Detection And Ranging) and various other sensors to create maps of your apartment. These maps are used, among other things, to calculate the best cleaning path. We will show you what these maps look like and how they are stored in the robot. At the end, we will discuss which data are created and uploaded to the vendor, and why this may be a big privacy issue. We will also prove why it is a bad idea to leave IoT devices in an unconfigured state.\n","original_language":"eng","persons":["Dennis Giese","DanielAW"],"tags":["34c3","9147","Hardware \u0026 Making"],"view_count":23059,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-04T17:15:05.582+02:00","length":1875,"duration":1875,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9147-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9147-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/51b586be-500c-436e-b70c-fc433e65c4be-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/51b586be-500c-436e-b70c-fc433e65c4be-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9147-unleash_your_smart-home_devices_vacuum_cleaning_robot_hacking","url":"https://api.media.ccc.de/public/events/51b586be-500c-436e-b70c-fc433e65c4be","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":190},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":354},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":273},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":254},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":344},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":254},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":214},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":87},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":165},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":126},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":239},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":84},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":342},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":194},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":150},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":373},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":257},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":101},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":196},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":102},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":183},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":319},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":125},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":135},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":221},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":688},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":172},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":166},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":457},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":210},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":113},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":237},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":99},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":93},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":94},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":238},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":86},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":86},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":424},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":239},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":245},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":121},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":106},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":123},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":89},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":287},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":277},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":179},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":687},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":104},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":108}]},{"guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","title":"Inside Intel Management Engine ","subtitle":null,"slug":"34c3-8762-inside_intel_management_engine","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8762.html","description":"Positive Technologies researchers Maxim Goryachy and Mark Ermolov have discovered a vulnerability that allows running unsigned code. The vulnerability can be used to activate JTAG debugging for the Intel Management Engine processor core. When combined with DCI, this allows debugging ME via USB.","original_language":"eng","persons":["Maxim Goryachy","Mark Ermolov"],"tags":["34c3","8762","Security"],"view_count":7137,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T11:45:04.998+02:00","length":3106,"duration":3106,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8762-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8762-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/65a25dfd-56dd-4e87-a910-334e2dc25a9c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/65a25dfd-56dd-4e87-a910-334e2dc25a9c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8762-inside_intel_management_engine","url":"https://api.media.ccc.de/public/events/65a25dfd-56dd-4e87-a910-334e2dc25a9c","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":251},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":353},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":247},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":306},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":588},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":339},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":271},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":231},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":166},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":312},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":339},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":164},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":476},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":318},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":202},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":174},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":168},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":171},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":544},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":178},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":174},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":340},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":451},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":183},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":493},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":183},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":239},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":291},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":169},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":302}]},{"guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","title":"Everything you want to know about x86 microcode, but might have been afraid to ask","subtitle":"An introduction into reverse-engineering x86 microcode and writing it yourself","slug":"34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9058.html","description":"Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and the update mechanism itself are proprietary and have not been throughly analyzed yet. We close this gap by both analyzing microcode and writing our own programs for it. This talk will give an insight into our results and how we achieved them, including live demos of what we can do and technical details.\n\nGiven the complexity of modern instruction sets hardware vendors moved to hardware designs incorporating complex decode units. A single instruction of the complex outwardfacing instruction set is translated to multiple instructions of the simpler internal architecture. While it is possible to do this translation in hardware alone, some instructions would require huge amounts of space on the silicon and increase costs. These complex instructions are instead decoded using a software-like approach called microcode. While processing such an instruction, the CPU internally evaluates a sequence of operations, micro-ops, which decode the complex instruction into the corresponding simpler operations that are performed by the hardware.\n\nIn the light of the existence of hardware bugs such as the infamous Pentium fdiv bug, hardware vendors developed a process to fix those errors without requiring a CPU replacement. However the microcode is stored in a ROM on the CPU die and can not be changed after production. Also relatively simple or often used instructions are still decoded in hardware. The update is instead achieved using microcode updates, which intercept certain instructions and replace their faulty implementation with a new, fixed version. These updates are applied either by the BIOS/UEFI or the operating system during early bootup. While the update process is well documented, the Linux kernel offers a module for it, and the updates are provided by the CPU vendors, the actual semantics of microcode are proprietary.\n\nMost update mechanisms are protected by signatures or other cryptographic primitives. However there were some indications that older CPU models (until around 2013) do not have a strong cryptographic protection and thus would accept custom updates. Given this chance we started to analyze the behavior of the CPU given our own updates and used these observations to infer the semantics of microcode. After some time we reverse-engineered enough of the semantics to write our own microcode programs. These programs range from very simple proof of concepts to stealthy backdoors and defensive primitives.\n\nAs an additional approach we also performed hardware analysis. By delayering the CPU and imaging it with both an optical and an electron microscope we could locate and read out the ROM containing the microcode. After processing and reordering the physical connections we retrieved the hardwired microcode of the CPU. This gave us more information on what can be done with microcode and allowed more insights into the intended behavior than our reverse-engineering approach.\n\nIn this talk we will first start with a (short) crash course in CPU architecture and where microcode is used in practice. We will then cover our reverse engineering methods and how we were able to discover the semantics of x86 microcode. We then demonstrate, also with live demos, this knowledge with multiple microcode programs that implement both defensive measures as well as provide an attacker with hard to detect backdoors. Lastly we will discuss security problems and possible solutions to protect against them. We also provide example microcode programs for your own CPUs (use at your own risk) and a kernel patch to apply them on a Linux system. Also we will have some systems with us so you can try your hand at writing some microcode yourself.\n","original_language":"eng","persons":["Benjamin Kollenda","Philipp Koppe"],"tags":["34c3","9058","Security"],"view_count":13175,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-30T19:45:05.266+02:00","length":3444,"duration":3444,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9058-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9058-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/e1a60f7b-6a56-4dce-ab3a-c686fa940aa8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/e1a60f7b-6a56-4dce-ab3a-c686fa940aa8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask","url":"https://api.media.ccc.de/public/events/e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":192},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":404},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":146},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":188},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":722},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":221},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":255},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":255},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":451},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":94},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":226},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":311},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":127},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":323},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":462},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":111},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":164},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":208},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":159},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":162},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":5},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":109},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":161},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":672},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":167},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":149},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":327},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":409},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":108},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":222},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":104},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":191},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":104},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":210},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":482},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":200},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":194},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":137},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":328},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":93},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":357}]},{"guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","title":"Social Cooling - big data’s unintended side effect","subtitle":"How the reputation economy is creating data-driven conformity","slug":"34c3-8797-social_cooling_-_big_data_s_unintended_side_effect","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8797.html","description":"What does it mean to be free in a world where surveillance is the dominant business model? Behind the scenes databrokers are turning our data into thousands of scores. This digital reputation is increasingly influencing our chances to find a job, a loan or even a date. Researchers are pointing out that, as people become aware of this reputation economy, it is generating a culture where self-censorship and risk aversion are the new normal.","original_language":"eng","persons":["Tijmen Schep"],"tags":["34c3","8797","Ethics, Society \u0026 Politics"],"view_count":3116,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-01-29T22:30:13.305+01:00","length":2066,"duration":2066,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8797-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8797-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4f8ec815-f761-4fb5-a786-a9d29cc34d17-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4f8ec815-f761-4fb5-a786-a9d29cc34d17-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8797-social_cooling_-_big_data_s_unintended_side_effect","url":"https://api.media.ccc.de/public/events/4f8ec815-f761-4fb5-a786-a9d29cc34d17","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":120},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":156},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":81},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":75},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":65},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":83},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":122},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":77},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":90},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":68},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":61},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":107},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":66},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":57},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":50},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":70}]},{"guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","title":"34C3 Infrastructure Review","subtitle":"How does the CCC run a conference?","slug":"34c3-8911-34c3_infrastructure_review","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8911.html","description":"In this traditional lecture, various teams provide an inside look at how this Congress‘ infrastructure was planned and built. You’ll learn what worked and what went wrong, and some of the talks may even contain facts! Also, the NOC promises to try and not have the network fail in the middle of the NOC presentation this time.","original_language":"eng","persons":["John","Leon","Marcus","tsaitgaist","danimo","smtw"],"tags":["34c3","8911","CCC"],"view_count":3112,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2018-01-05T01:00:00.000+01:00","updated_at":"2026-02-08T00:15:08.739+01:00","length":3438,"duration":3438,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8911-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8911-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2e0125ef-679c-4eb3-9de6-f5e56e27fbca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2e0125ef-679c-4eb3-9de6-f5e56e27fbca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8911-34c3_infrastructure_review","url":"https://api.media.ccc.de/public/events/2e0125ef-679c-4eb3-9de6-f5e56e27fbca","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":33},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":69},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":58},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":61},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":26},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":47},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":57},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":30},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":48},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":47},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":49},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":86},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":50},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":32},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":30},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":45},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":30},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":96},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":64},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":97},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":30},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":28},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":33},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":52},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":43},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":50},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":38},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":93},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":112},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":42},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":43},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":36},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":40}]},{"guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","title":"Net Neutraliy Enforcement in the EU","subtitle":null,"slug":"34c3-9125-net_neutraliy_enforcement_in_the_eu","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9125.html","description":"After four years of advocacy and lobbying to enshrine net neutrality principles in law in Europe, we can now examine the first full year of enforcement of the new rules. We will compare the enforcment of net neutrality in the individual EU member states, showcase a few of the more creative net neutrality violations and demonstrate what civil society can do to keep the Internet neutral. Enforcing net neutrality also requires network measurement tools that can detect discrimination; we will discuss what progress Europe has made in this regard. \n\nNet neutrality is the principle that all data transfers on the internet should be treated equally. It gives users the right to choose the content and services they wish to see and use online and prevents ISPs from acting as gatekeepers. Net neutrality also guarantees equal access to the global Internet to all ideas, innovations and opinions without centralised control.\n\nSince August 2016, the EU has had a regulatory regime protecting net neutrality that now has to be enforced by the national telecoms' regulatory authorities. Unfortunately, we observe very different results in different EU member states with Germany presenting a particularly negative example. In this context, our NGO epicenter.works has focused its enforcement work on a product of Deutsche Telekom called \"StreamOn\". We will showcase our work on that product analysing the offer, raising awareness, submitting complaints with the regulator, and speaking at the annual general meeting of Deutsche Telekom AG.\n\nThis presentation is intended for everyone interested in net neutrality and particularly for those that want to become active in safeguarding it.","original_language":"eng","persons":["Thomas Lohninger"],"tags":["34c3","9125","Ethics, Society \u0026 Politics"],"view_count":1039,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-06T02:00:04.725+01:00","length":1967,"duration":1967,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9125-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9125-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8d87b905-24e0-461e-bff8-d122207ea2e4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8d87b905-24e0-461e-bff8-d122207ea2e4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9125-net_neutraliy_enforcement_in_the_eu","url":"https://api.media.ccc.de/public/events/8d87b905-24e0-461e-bff8-d122207ea2e4","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":28},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":24},{"event_id":4824,"event_guid":"5d255692-ae5e-4f96-b10e-55929d570813","weight":26},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":41},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":25},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":36},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":29},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":25},{"event_id":4858,"event_guid":"12f2dd5b-5e3d-4098-9f10-6c277672b2e0","weight":15},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":31},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":36},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":43},{"event_id":4868,"event_guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","weight":31},{"event_id":4869,"event_guid":"d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","weight":32},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7},{"event_id":4873,"event_guid":"8453f8f1-d934-4d10-bcfa-a857fa65b8df","weight":20},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":34},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":7},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":32},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":32},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":27}]},{"guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","title":"Fuck Dutch mass-surveillance: let's have a referendum!","subtitle":"Forcing the Netherlands to publicly debate privacy and the intelligence agencies","slug":"34c3-9172-fuck_dutch_mass-surveillance_let_s_have_a_referendum","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9172.html","description":"Dutch intelligence agencies will soon be allowed to analyse bulk data of civilians on a massive scale, by intercepting internet traffic and through real-time access to all kinds of databases. They will also start hacking third-parties. My friends and I want to stop this. We started an action to enforce a referendum on the law. Surprisingly, it worked! How do we get most out of this opportunity?\n\nIn this talk I will discuss what the new spying law means for the Netherlands, how we campaigned to get 400k+ signatures, and the future course of the debate and campaign for the referendum (which is due in March). Finally, I would like to do a call to action, nationally and internationally.\nThe main concerns about the law are: the allowance of untargeted interception on a potentially massive scale. (Which the AIVD is framing as not being mass-surveillance, you judge for yourself.) This sparked an outcry from human rights activists, journalists, doctors, and others. Also, the hacking of third-parties is very uncool and has not yet been the subject of a strong public debate.\nBoth edges of the political spectrum are supporting the initiative, which shows how the erosion of privacy affects us all. Thus, our campaign tries to reach out to everyone. Now that the privacy debate is mainstream and #woke again, Team-Intelligence-Agencies is showing their teeth. But we’re biting back, even though we realize that we are five kids (and back-up) fighting something way bigger than ourselves. This means that we really need your support! You can help on so many levels that I won’t write them down, so I guess you should come see this talk.","original_language":"eng","persons":["niinja"],"tags":["34c3","9172","Ethics, Society \u0026 Politics"],"view_count":1196,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-12-21T13:00:06.260+01:00","length":1934,"duration":1934,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9172-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9172-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9172-fuck_dutch_mass-surveillance_let_s_have_a_referendum","url":"https://api.media.ccc.de/public/events/ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":28},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":29},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":17},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":17},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":39},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":26},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":24},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":25},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":26},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":35},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":6},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":36},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":31},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":29},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":53},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":18},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":20},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":24},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":40},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":25},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":24}]},{"guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","title":"Schreibtisch-Hooligans","subtitle":"Informationsfreiheit trotz CSU","slug":"34c3-8714-schreibtisch-hooligans","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8714.html","description":"\u003cp\u003eWie umgehen mit politischer Ohnmacht? Das Informationsfreiheitsgesetz bietet einige Ans\u0026auml;tze: Es macht es auch f\u0026uuml;r juristische Laien m\u0026ouml;glich, gegen Beh\u0026ouml;rden vorzugehen, die das Recht brechen. Wir k\u0026auml;mpfen gegen die Ohnmacht: Dieses Jahr haben wir alle Gesetzentw\u0026uuml;rfe aller Bundesministerien und Lobby-Stellungnahmen dazu befreit. Wir haben uns mit der Berliner Partypolizei angelegt - prost! - und 13 Beh\u0026ouml;rden verklagt, darunter die Polizei K\u0026ouml;ln, das Innenministerium und das Verteidigungsministerium. Und wir haben einen Weg gefunden, zwei Beh\u0026ouml;rden zu verklagen, die eigentlich sonst keine Auskunft geben ...\u003c/p\u003e","original_language":"deu","persons":["Arne Semsrott"],"tags":["34c3","8714","Ethics, Society \u0026 Politics","Frag den Staat"],"view_count":5441,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-31T01:00:00.000+01:00","updated_at":"2026-02-22T19:15:08.290+01:00","length":1847,"duration":1847,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8714-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8714-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/8720ee73-f47b-4594-bfab-26206c0d6cfc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/8720ee73-f47b-4594-bfab-26206c0d6cfc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8714-schreibtisch-hooligans","url":"https://api.media.ccc.de/public/events/8720ee73-f47b-4594-bfab-26206c0d6cfc","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":73},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":140},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":196},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":130},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":132},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":187},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":81},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":159},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":115},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":96},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":161},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":174},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":228},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":70},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":135},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":110},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":255},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":107},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":206},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":198},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":262},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":75},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":108},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":284},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":108},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":195},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":84},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":161},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":68},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":99},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":304},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":68},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":97},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":112},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":329},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":157},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":83},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":169}]},{"guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","title":"Schnaps Hacking","subtitle":"from apple to schnaps -- a complete diy-toolchain","slug":"34c3-8946-schnaps_hacking","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8946.html","description":"This talk covers the theory, the required tools and how to make them, and the process of turning apples into juice, ferment them, and enrich the alcohol content of the product. \n\nWe will present our high-pressure, drm-free juice press which we used to turn our hand picked apples into juice.\n\nThen we present a simple setup to ferment the juice (or other stuff, maybe even mate ;) ) to turn it into an alcoholic beverage.\n\nYou will learn about the precise steps you need to avoid, in order to not build a still. We will also talk about all the details of a totally hypothetical distilling process, and the results that could have been achieved.\n\nFinally we will show you a method to increase the alcohol content of a beverage without distilling it (\"ice-rifing\"), and talk about our results.\n\nWe will cover the relevant measuring equipment as well as the theory behind each of these steps, as we go through them.\n ","original_language":"eng","persons":["Nero Lapislucis","sir wombat"],"tags":["34c3","8946","Hardware \u0026 Making"],"view_count":2357,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-20T00:45:05.315+01:00","length":2290,"duration":2290,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8946-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8946-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6d9ee2da-4907-415f-84b4-61ecfa783895-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6d9ee2da-4907-415f-84b4-61ecfa783895-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8946-schnaps_hacking","url":"https://api.media.ccc.de/public/events/6d9ee2da-4907-415f-84b4-61ecfa783895","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":76},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":79},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":102},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":95},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":86},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":74},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":147},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":76},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":119},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":79},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":73},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":597},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":111},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":94},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":144},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":67},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":121},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":100},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":99}]},{"guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","title":"The Work of Art in the Age of Digital Assassination","subtitle":null,"slug":"34c3-9027-the_work_of_art_in_the_age_of_digital_assassination","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9027.html","description":"My talk explores the interconnected nature of war and culture. It does so through the context of technology and political discourse in contemporary art. With a view from the battle fields of the Middle East, both real and imagined, I attempt to dissect how the political discourse of academia and the art world trickles down to everyday discussions. A simple word such as \"assassination\" becomes rife with racism when its etymology can be linked to anti-Muslim propaganda that originated during the Crusades. And today assassination is the primary political tool of the West to negotiate with Muslim radicals, even violating their own rules of citizenship, constitutional, and human rights protections in the process. With this backdrop, we see how the artistic works of such diverse artists such as Chris Marker, Chris Burden, Haroun Farouki, Anish Kapoor, and Banksy have evolved to reflect the political discourse of the moment. The digital advancements of the war zone, I argue, are reflected in the diametrically opposed peaceful spaces of the gallery, museum, or art house cinema. As the digital defeats analogue, the act of killing becomes disconnected from the killer, with democracies spreading thei blame over systemic failures rather than facing the reality of death.     ","original_language":"eng","persons":["Saud Al-Zaid"],"tags":["34c3","9027","Art \u0026 Culture"],"view_count":1633,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-02-13T14:15:07.112+01:00","length":976,"duration":976,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9027-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9027-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c9ae7564-9156-4d31-9f8a-168793a1bb18-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c9ae7564-9156-4d31-9f8a-168793a1bb18-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9027-the_work_of_art_in_the_age_of_digital_assassination","url":"https://api.media.ccc.de/public/events/c9ae7564-9156-4d31-9f8a-168793a1bb18","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":228},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":276},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":120},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":178},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":129},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":174},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":129},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":175},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":104},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":73},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":60},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":80},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":78},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":116},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":66},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":83},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":69},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":84}]},{"guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","title":"The making of a chip","subtitle":null,"slug":"34c3-9250-the_making_of_a_chip","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9250.html","description":"You are surrounded by ICs. Yet you probably don't know much about how such a chip is made. This talk is an introduction to the world of chip fabrication from photolithography over ion implantation to vapor deposition of the connections\n\nThis talk is a tour through the fabrication of an integrated circuit, an electronic chip. You will see the basics of the different techniques used in the process:\n- photolithography (\"photolitho\")\n- etching\n- ion implantation\n- vapor deposition\nand how they are combined:\n- photolitho and etching to selectively remove material\n- photolitho and implantation to form doped semiconductors that form transistors\n- photolitho and vapor deposition to form the connections that turn the transistors into gates\n\nI will touch the underlying semiconductor physics only very briefly to give an idea why this layout makes sense. \n\nThis talk is meant to give you a glimpse into the world of IC fabrication. I will not talk about things that are particularly new, this knowledge has been around since at least 1990. But it is still interesting since the processes are still used for every IC in production today yet not widely known outside the semiconductor industry. \n\nI won't touch IC development (none of the points mentioned \u003ca href=https://en.wikipedia.org/wiki/Integrated_circuit_development\u003ehere\u003c/a\u003e). If you're interested in that \u003ca href=https://media.ccc.de/v/c4.openchaos.2017.06.cpu-design-fuer-einsteiger-und-risc-v\u003eon development\u003c/a\u003e and a \u003ca href=https://media.ccc.de/v/RNJNXM\u003elow-level view on an FPGA\u003c/a\u003e may be your thing.","original_language":"eng","persons":["Ari"],"tags":["34c3","9250","Hardware \u0026 Making"],"view_count":1762,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-13T03:15:03.975+01:00","length":3133,"duration":3133,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9250-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9250-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/77aaf0be-d2a8-4531-be02-c91c19b1ca77-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/77aaf0be-d2a8-4531-be02-c91c19b1ca77-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9250-the_making_of_a_chip","url":"https://api.media.ccc.de/public/events/77aaf0be-d2a8-4531-be02-c91c19b1ca77","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":50},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":64},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":59},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":74},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":97},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":96},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":73},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":104},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":75},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":13},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":87},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":48},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":80},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":58},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":72},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":88},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":85},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":64},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":46},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":46},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":53}]},{"guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","title":"Resilienced Kryptographie","subtitle":null,"slug":"34c3-9142-resilienced_kryptographie","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9142.html","description":"Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der Minix 3 basierten Intel ME Implementierung zeigen, dass das Vertrauen in hardwaregestützte Coputersicherheit grundlegend hinterfragt werden muss. Die Robustness in feindlicher Umgebung kann mit anspruchsvolleren kryptographische Verfahren mathematisch abgesichert erhöht werden.\n\n\nKryptographie hilft gegen sehr mächtige Angreifer.  Wenn jedoch Fehler bei der Schlüsselgenerierung gemacht werden oder Hardwarebackdoors schwer aufdeckbaren Angriffe ermöglichen, bricht das gesamte Sicherheitsfundament. Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der Minix 3 basierten Intel ME Implementierung zeigen, dass das Vertrauen in hardwaregestützte Coputersicherheit grundlegend hinterfragt werden muss. \n\nEs gibt eine Reihe von einfachen mathematischen Hacks, um auch zukünftige Angriffsmethoden nachhaltig zu erschweren. Auch die Robustness in feindlicher Umgebung kann mit anspruchsvolleren kryptographische Verfahren mathematisch abgesichert erhöht werden. ","original_language":"deu","persons":["ruedi","cforler"],"tags":["34c3","9142","Security"],"view_count":2749,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-03T23:30:10.102+01:00","length":3567,"duration":3567,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9142-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9142-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ea27b2dc-d558-4fab-8406-a9db30930f8f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ea27b2dc-d558-4fab-8406-a9db30930f8f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9142-resilienced_kryptographie","url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":51},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":47},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":48},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":44},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":49},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":93},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":67},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":68},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":49},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":101},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":56},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":45},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":55},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":53},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":53},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":46},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":322},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":62},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":4},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":103},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":63},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":64},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":98},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":51},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":70},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":44},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":54},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":48},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":105}]},{"guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","title":"1-day exploit development for Cisco IOS","subtitle":null,"slug":"34c3-8936-1-day_exploit_development_for_cisco_ios","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8936.html","description":"Year 2017 was rich in vulnerabilities discovered for Cisco networking devices. At least 3 vulnerabilities leading to a remote code execution were disclosed. This talk will give an insight on exploit development process for Cisco IOS for two of the mentioned critical vulnerabilities. Both lead to a full takeover of the target device. Both PowerPC and MIPS architectures will be covered. The presentation will feature an SNMP server exploitation demo.","original_language":"eng","persons":["Artem Kondratenko"],"tags":["34c3","8936","Security"],"view_count":4282,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T13:30:06.737+02:00","length":2736,"duration":2736,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8936-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8936-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/4c4af291-e9ed-4dc9-8b2e-9062db9924fa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/4c4af291-e9ed-4dc9-8b2e-9062db9924fa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8936-1-day_exploit_development_for_cisco_ios","url":"https://api.media.ccc.de/public/events/4c4af291-e9ed-4dc9-8b2e-9062db9924fa","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":72},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":84},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":66},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":143},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":88},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":66},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":136},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":84},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":68},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":69},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":113},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":70},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":140},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":89},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":80},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":124},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":67},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":68},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":94},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":69},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":84},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":71},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":68},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":83},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":68}]},{"guid":"02dbb8e3-54ed-42ac-b26d-dfcb5fe5a70c","title":"International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interoperable Schnittstellen für digitalisiertes Kulturgut","subtitle":null,"slug":"34c3-8853-international_image_interoperability_framework_iiif_kulturinstitutionen_schaffen_interoperable_schnittstellen_fur_digitalisiertes_kulturgut","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8853.html","description":"Neue Standards wie IIIF (http://iiif.io) ermöglichen es, digitalisiertes Kulturgut (Gemälde, Bücher, Handschriften, Fotografien, Karten u.s.w.) interoperabel und maschinenlesbar verfügbar zu machen. Darauf aufsetzend können nicht nur ansehnliche Präsentationen erstellt werden, insbesondere ermöglicht IIIF es, institutionsübergreifend Daten verknüpfbar zu machen und virtuelle Arbeitsoberflächen einrichtungsunabhängig zu realisieren. Dem Linked Data Prinzip folgend, sind alle Daten standardisiert identifizierbar und nutzbar. Es existieren bereits viele leistungsfähige Open Source Anwendungen für IIIF. Der Talk führt in IIIF ein und zeigt viele anschauliche Beispiele, die bedeutende Werke aus namhaften Einrichtungen weltweit enthalten.\n\nDie freie Verfügbarkeit bildbasierter Dokumente ist von grundlegender Bedeutung für die Verbreitung kulturellen Wissens sowie für Forschung und Lehre. Digitalisate historischer Gemälde, Zeichnungen, Bücher, Zeitschriften, Handschriften, Karten, Schriftrollen, Fotografien und Archivmaterialien online bereitzustellen, macht es möglich, deren Inhalte ortsunabhängig und bei optimalem Schutz der physisch empfindlichen Originale großen Nutzerkreisen zur Verfügung zu stellen. Dies wird durch neue Standards wie IIIF nun auch maschinenlesbar möglich.\n\nWar bis vor wenigen Jahren die Betrachtung dieser Werke nur auf isolierten, institutionellen Websites möglich, so beschäftigt sich seit 2011 eine wachsende internationale Gemeinschaft von Forschungsbibliotheken, Museen und Archiven mit der Konzeption und Standardisierung einer interoperablen Technologie zur institutionsübergreifenden Bereitstellung von Digitalisaten im Internet unter der Bezeichnung International Image Interoperability Framework (IIIF, http://iiif.io).\n\nAufgrund seiner starken Orientierung an Linked Open Data und der interoperablen Bereitstellung aller Ressourcen über HTTP ist es mit IIIF möglich, Daten zu verknüpfen und virtuelle Arbeitsumgebungen zu realisieren, die Digitalisate von Servern unterschiedlicher Einrichtungen unter einer Oberfläche vereinen. So ist es beispielsweise möglich, Werke, die sich an völlig unterschiedlichen Orten weltweit befinden, in einer IIIF-basierten Oberfläche virtuell nebeneinander zu legen, sie zu betrachten und mit ihnen zu arbeiten. Dabei ermöglicht IIIF auch das Anlegen und Weitergeben von Annotationen, die ebenfalls nach dem Prinzip von Linked Data modelliert sind. IIIF kann die Grundlage für institutionsübergreifende wissenschaftliche Arbeitsumgebungen sein.\n\nDer Talk soll in IIIF allgemein einführen, sowie konkrete Datenquellen und Anwendungen vorstellen. Der Talk wird viele anschauliche Beispiele enthalten, die Werke von internationaler Bedeutung einbeziehen. Zugleich will der Talk auch einladen, an der Weiterentwicklung dieser neuen Standards und Technologien mitzuwirken, sowie IIIF-kompatible Open Source Anwendungen zu entwerfen oder weiterzuentwickeln.\n\nLeander Seige ist Bereichsleiter für Digitale Dienste der Universitätsbibliothek Leipzig, hat dort, neben vielen anderen Open Source-basierten IT-Infrastrukturprojekten, auch IIIF als neue Standardtechnologie zur Bereitstellung von Digitalisaten eingeführt. Die Universitätsbibliothek Leipzig bewahrt eine der größten Altbestandssammlungen in Deutschland mit einem breiten Spektrum historischer Materialien, die nach und nach per IIIF bereitgestellt werden, bevorzugt unter CC0. Leander Seige engagiert sich darin, IIIF auch in Kooperationsprojekten mit anderen Einrichtungen zu etablieren. Privat betreibt Leander Seige einen Server, der frei verfügbare Digitalisate von Gemälden, Zeichnungen und anderen Kunstwerken dem IIIF-Standard entsprechend aufbereitet und anbietet.","original_language":"deu","persons":["Leander Seige"],"tags":["34c3","8853","Science"],"view_count":398,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-11-07T17:00:04.184+01:00","length":1643,"duration":1643,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8853-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8853-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/02dbb8e3-54ed-42ac-b26d-dfcb5fe5a70c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/02dbb8e3-54ed-42ac-b26d-dfcb5fe5a70c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8853-international_image_interoperability_framework_iiif_kulturinstitutionen_schaffen_interoperable_schnittstellen_fur_digitalisiertes_kulturgut","url":"https://api.media.ccc.de/public/events/02dbb8e3-54ed-42ac-b26d-dfcb5fe5a70c","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":9},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":6},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":6},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":5},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":10},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":4},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":9},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":21},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":11},{"event_id":4890,"event_guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","weight":10},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":9},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":6},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":5},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":16},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":18},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":10},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":13},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":15},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":10},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":8},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":11},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":9},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":10},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":8},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":10}]},{"guid":"d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","title":"Policing in the age of data exploitation","subtitle":null,"slug":"34c3-8940-policing_in_the_age_of_data_exploitation","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8940.html","description":"What does policing look like in the age of data exploitation? This is the question we at Privacy International have been exploring for the past two years. Our research has focused on the UK where the population has been used as guinea pigs for ever more invasive modern approaches to policing. In this talk we will discuss our findings with you and avenues for change.\n\nSociety is changing – the cities we live in, the way we communicate, the objects we carry, what we reveal about ourselves has evolved – and law enforcement across the world is desperately trying to catch up.\nFrom mobile phone extraction to social media intelligence, police forces have been trying to take advantage of an environment that is largely unregulated.\n\nWith 51,000 cameras run by the police London is arguably the most surveilled city in the world. We have focused our research in a country that has effectively become a playing ground for law enforcement and corporations wishing to sell technologies offering the police unprecedented access to people’s life. The deals are safely signed behind closed doors and the general population has been left out of this debate.\n\nPrivacy International has been trying to shed light on these new trends. By conducting research, FOI requests and legal actions we are attempting to document this new environment. Trials of facial recognition have taken place at football matches and Notting Hill Carnival. They will continue to test this technology on the public and the next year will see a rapid uptake of a variety of predictive policing tools throughout UK police forces. The rush to extract data from mobile phones continues without oversight resulting in serious crime investigations being undermined by poor practices. Next on the horizon is IoT and how the police can get their hands on data in your homes.\n\nWe hope to create the opportunity for you to join our research project and start documenting what data and policing looks like in your country.","original_language":"eng","persons":["Eva Blum--Dumontet","Millie Wood"],"tags":["34c3","8940","Ethics, Society \u0026 Politics"],"view_count":886,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-22T02:30:04.877+01:00","length":3606,"duration":3606,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8940-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8940-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/d86672a7-22fc-44a1-b6d3-20fd9bb51cfa-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/d86672a7-22fc-44a1-b6d3-20fd9bb51cfa-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8940-policing_in_the_age_of_data_exploitation","url":"https://api.media.ccc.de/public/events/d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":21},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":30},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":31},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":22},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":22},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":28},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":23},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":22},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":27},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":47},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":21},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":20},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":5},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":23},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":25},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":33},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":23},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":46},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":32},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":16},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":5},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":21},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":22},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":35},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":24}]},{"guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","title":"Extended DNA Analysis ","subtitle":"Political pressure for DNA-based facial composites","slug":"34c3-9045-extended_dna_analysis","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9045.html","description":"In 2017, the federal states of Baden-Wurttemberg and Bavaria suggested the extension of the law on the analysis of forensic DNA. Up to now, DNA fingerprinting  in forensic settings may, in addition to non-coding features of DNA, only analyze the chromosomal sex of the person, but not any other openly visible feature. Bavaria and Baden-Wurttemberg, under the leadership of CSU and the Green party, are pushing forward to analyze DNA found at crime scenes regarding hair color, eye color, skin color and in the case of Bavaria even geographical ethnicity. Extended DNA analysis, or “DNA facial composite”  is seen as an impartial witness to the crime and, in the eyes of the states’ government, would help solve crimes. But would it?\n\nEver since TV shows such as CSI or NCIS have become popular, DNA evidence has gained a reputation for an infallible method of crime solving. However, similar to fingerprints, DNA evidence up to now only serves as a method of matching the DNA at a crime scene to a suspect. So what if there are no suspects? In theory, DNA possesses all the information on what a human being would look like. Does that mean we could construct a facial composite from blood spots, semen or saliva? While the term “DNA facial composite” may imply so, the science of it is still in its infancy. We can determine a likely eye, hair and skin color and a geographic ethnicity from the DNA. In some cases even more features. This could, depending on the case, lead investigations to the right suspect - but down a very dangerous path. \nGenetic information is subject to the laws of privacy. For one, instead of having a crime and finding as suspect, extended DNA analysis leads to an investigation into a crime, where there is no suspect, but a range of “non-suspect persons of interest” that are connected to the case only by their appearance. The presumption of innocence is vital to a democracy. Putting people of similar appearance – or even ethnical groups – into the focus of investigation, is likely to spark even more xenophobic movements in Germany.  Information on skin color correlates with medical information such as skin cancer risk, but also risk for heart disease. This medical information is especially protected by law. What is worse, the technology could lead investigations to the wrong “non-suspect person of interest”. Just as hair color may change with age, so may for instance the appearance of a person’s gender. Not all genetic information is directly seen in the phenotype. Adding up to this, the data correlating genes to geographic ethnicity is only as good as the data of people who have contributed to the database in the first place.\nIf DNA analysis is to be implemented in Germany – and it very well might be – we need to push for hard data protection laws and strict rules when and where it may be applied. \n","original_language":"eng","persons":["_Adora_Belle_"],"tags":["34c3","9045","Science"],"view_count":759,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-10-09T19:00:06.153+02:00","length":1882,"duration":1882,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9045-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9045-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/44949d62-284f-46b6-ad7b-2359aa1f7a0b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/44949d62-284f-46b6-ad7b-2359aa1f7a0b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9045-extended_dna_analysis","url":"https://api.media.ccc.de/public/events/44949d62-284f-46b6-ad7b-2359aa1f7a0b","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":22},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":30},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":21},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":13},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":16},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":34},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":17},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":22},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":7},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":7},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":21},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":22},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":42},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":26},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":7},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":21},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":17},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":16},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":21},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":25},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":13},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":7},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":59},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":32},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":28},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":29},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":28},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":13}]},{"guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","title":"SatNOGS: Crowd-sourced satellite operations","subtitle":"Satellite Open Ground Station Network","slug":"34c3-9189-satnogs_crowd-sourced_satellite_operations","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9189.html","description":"An overview of the SatNOGS project, a network of satellite ground station around the world, optimized for modularity, built from readily available and affordable tools and resources.\n\nWe love satellites! And there are thousands of them up there. SatNOGS provides a scalable and modular platform to communicate with them. Low Earth Orbit (LEO) satellites are our priority, and for a good reason. Hundreds of interesting projects worth of tracking and listening are happening in LEO and SatNOGS provides a robust platform for doing so. We support VHF and UHF bands for reception with our default configuration, which is easily extendable for transmission and other bands too.\n\nWe designed and created a global management interface to facilitate multiple ground station operations remotely. An observer is able to take advantage of the full network of SatNOGS ground stations around the world.","original_language":"eng","persons":["Nikos Roussos"],"tags":["34c3","9189","Science"],"view_count":682,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-07T21:00:09.266+01:00","length":1713,"duration":1713,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9189-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9189-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9189-satnogs_crowd-sourced_satellite_operations","url":"https://api.media.ccc.de/public/events/fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":21},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":13},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":28},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":13},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":19},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":18},{"event_id":4865,"event_guid":"0b0a3457-91be-43ea-af21-8e251d8d9322","weight":19},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":28},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":9},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":22},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":22},{"event_id":4872,"event_guid":"c26fa336-680b-49e5-80e6-24432305e94d","weight":18},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":23},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":133},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":11},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":26},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":36},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":18},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":18},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":25},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":20},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":23},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":14}]},{"guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","title":"Antipatterns und Missverständnisse in der Softwareentwicklung","subtitle":"Eine Geschichte voller Missverständnisse","slug":"34c3-9095-antipatterns_und_missverstandnisse_in_der_softwareentwicklung","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9095.html","description":"Anhand von Anekdoten aus 20 Jahren Softwareentwicklung versucht der Vortrag herauszuarbeiten, was in der Praxis zu scheiternden Projekten führt.\n\n\nEs geht nicht um Programmierfehler sondern um Fehler in der Herangehensweise, den Prozessen, falsche Anreize, etc.\n\nBei den Antipatterns geht es um Dinge, die aus den falschen Gründen gemacht werden -- etwa einen Monolithen in eine Microservice-Architektur überführen, aber dann bei einem verteilen Monolithen rauskommen. Ein gemeinsames Muster ist, dass man mit chirurgischer Präzision die Vorteile eines Ansatzes gezielt umgeht, aber großzügig jeden einzelnen Nachteil mitnimmt.","original_language":"deu","persons":["Fefe"],"tags":["34c3","9095","Ethics, Society \u0026 Politics"],"view_count":44624,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-04-03T23:45:07.909+02:00","length":2039,"duration":2039,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9095-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9095-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/117a52b4-f675-49dd-aafe-659c07b6bc9c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/117a52b4-f675-49dd-aafe-659c07b6bc9c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9095-antipatterns_und_missverstandnisse_in_der_softwareentwicklung","url":"https://api.media.ccc.de/public/events/117a52b4-f675-49dd-aafe-659c07b6bc9c","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":77},{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":79},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":96},{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":177},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":265},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1798},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2398},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1335},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":482},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":579},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1623},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":116},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":594},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":102},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":195},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":164},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":232},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":291},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":419},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1332},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":127},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1664},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":746},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":101},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1594},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":124},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":153},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":286},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":586},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":238},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":76},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":168},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":102},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":210},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":141},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1949},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":900},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":77},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":216},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":539},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":482},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":86},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":286},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":403},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":130},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":85},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":177},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":144},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":119},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":877},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":108},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":85},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":157},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":424},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":122},{"event_id":4858,"event_guid":"12f2dd5b-5e3d-4098-9f10-6c277672b2e0","weight":88},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":112},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":127},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":108},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":888},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1892},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":242},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":186},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":322},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":295},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":95},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":93},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":80},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":179},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":112},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":99},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":140},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":140},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":492},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":437},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":159},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":169},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1688},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":310},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":284},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":241},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":197},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":175},{"event_id":4937,"event_guid":"2e0125ef-679c-4eb3-9de6-f5e56e27fbca","weight":96}]},{"guid":"801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","title":"Blinkenrocket!","subtitle":"How to make a community project fly","slug":"34c3-8721-blinkenrocket","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8721.html","description":"The Blinkenrocket is a DIY SMD Soldering Kit that was designed to teach different manufacturing and soldering skills.\n\nA lot of work on both Hardware and Software was done in CCC erfas namely shackspace, chaosdorf and metalab.\n\nThe kit is used in workshops since 1.5 years at the chaos macht schule events and is very successful in its purpose. Creating this project was plenty of work and there is so much to show and tell around it, it will blow your mind.\n\nIn 2016 we made BLINKENROCKET fly.\n\nIn this talk you'll learn about our journey, the lessons we learned and get insights that you can leverage to skyrocket your own soldering kit.\n\nBlinkenrocket is a badge-type electronic in the shape of the famous fairy dust rocket aimed at teaching different skills of soldering to kids as well as young adults. \nOnce the kit it soldered, custom animations and scrolltext can be created at \u003ca href=\"http://blinkenrocket.de\"\u003eblinkenrocket.de\u003c/a\u003e and uploaded using your audio port. \n\nBlinkenrocket is designed to:\n - teach different skills of soldering (SMD, trough hole,  stencils, reflow)\n - be CHEAP so it can be used at school events\n - be 100% open source, EVERYTHING is available online under open source licensed terms \n - provide extensive information targeted to kids as well as young adults\n - be extendable \n - it will sell in a BUY ONE / GIVE ONE program to support future growth and donations to workshops.\nthis way people who can not afford it are not excluded from learning how to solder.\n","original_language":"eng","persons":["overflo","muzy"],"tags":["34c3","8721","Hardware \u0026 Making"],"view_count":1600,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-22T18:00:09.994+01:00","length":1754,"duration":1754,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8721-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8721-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/801e92bc-c2a2-4f89-bf60-c76a44b0b8b5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/801e92bc-c2a2-4f89-bf60-c76a44b0b8b5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8721-blinkenrocket","url":"https://api.media.ccc.de/public/events/801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":26},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":45},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":35},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":30},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":48},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":35},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":35},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":41},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":70},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":27},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":26},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":39},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":7},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":7},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":33},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":51},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":44},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":15},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":24},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":55},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":62},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":43},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":35},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":52},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":19},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":38},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":43},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":36}]},{"guid":"c35e099a-f620-41ea-8e99-16cade147196","title":"Inside Android’s SafetyNet Attestation: Attack and Defense","subtitle":null,"slug":"34c3-8725-inside_android_s_safetynet_attestation_attack_and_defense","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8725.html","description":"SafetyNet Attestation is the primary platform security service on Android. Until recently you had to use third party tools or implemented your own app integrity checks and device rooting checks. Today you can use Android's SafetyNet Attestation infrastructure to ensure the integrity of your application and the user's device. Unfortunately, SafetyNet Attestation is not well documented by Google. This talk is split into three parts. Part one provides a deep dive into SafetyNet Attestation how it works. Part two is a guide on how to implement and use it for real world applications. This is based on the lessons learned from implementing SafetyNet Attestation for an app with a large install base. The talk will provide you with everything you need to know about Android’s SafetyNet Attestation and will help you to implement and use it in your app. Part three presents attacks and bypasses against SafetyNet Attestation. The attack method targets not only SafetyNet but other similar approaches. New tools and techniques will be released at this talk.","original_language":"eng","persons":["Collin Mulliner"],"tags":["34c3","8725","Security"],"view_count":1297,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-12-15T02:30:02.666+01:00","length":3550,"duration":3550,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8725-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8725-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c35e099a-f620-41ea-8e99-16cade147196-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c35e099a-f620-41ea-8e99-16cade147196-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8725-inside_android_s_safetynet_attestation_attack_and_defense","url":"https://api.media.ccc.de/public/events/c35e099a-f620-41ea-8e99-16cade147196","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":32},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":3},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":3},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":42},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":3},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":36},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":25},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":38},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":23},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":50},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":25},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":41},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":44},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":25},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":25},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":42},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":25},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":29},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":27}]},{"guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","title":"Tightening the Net in Iran","subtitle":"The Situation of Censorship and Surveillance in Iran, and What Should Be Done","slug":"34c3-8900-tightening_the_net_in_iran","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8900.html","description":"How do Iranians experience the Internet? Various hurdles and risks exist for Iranians and including outside actors like American technology companies. This talk will assess the state of the Internet in Iran, discuss things like the threats of hacking from the Iranian cyber army; how the government are arresting Iranians for their online activities; the most recent policies and laws for censorship, surveillance and encryption; and the policies and relationships of foreign technology companies like Apple, Twitter and Telegram with Iran, and the ways they are affecting the everyday lives of Iranians.  This talk will effectively map out how the Internet continues to be a tight and controlled space in Iran, and what efforts are being done and can be done to make the Iranian Internet a more accessible and secure space.","original_language":"eng","persons":["Mahsa Alimardani"],"tags":["34c3","8900","Ethics, Society \u0026 Politics"],"view_count":1904,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T06:45:03.315+02:00","length":2867,"duration":2867,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8900-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8900-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/51f1fe0d-19df-406d-a313-befeab6ac1bb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/51f1fe0d-19df-406d-a313-befeab6ac1bb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8900-tightening_the_net_in_iran","url":"https://api.media.ccc.de/public/events/51f1fe0d-19df-406d-a313-befeab6ac1bb","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":84},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":103},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":55},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":64},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":74},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":94},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":60},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":92},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":90},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":46},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":47},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":87},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":47},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":46},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":57}]},{"guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","title":"Access To Bodies","subtitle":"Ein Leitfaden für post-humane Computer- und Körperanwendungen","slug":"34c3-9040-access_to_bodies","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9040.html","description":"Cyborgs und Body Enhancement sind typisch männlich dominierte Thematiken (Terminator etc). Im Gegensatz dazu ist zB die weiblich konotierte Beautybranche auch hochtechnisiert. Körper und Technologie sind auf verschiedenen Ebenen hier schon eng verzahnt. Diese beiden Bereiche zusammenzubringen ist FUN. Stehen Computer eigentlich auf rosa?","original_language":"deu","persons":["Nadja Buttendorf"],"tags":["34c3","9040","Art \u0026 Culture"],"view_count":1315,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T07:30:04.199+02:00","length":1887,"duration":1887,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9040-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9040-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6588e4a4-d0ac-4082-ad9e-7a13329217ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6588e4a4-d0ac-4082-ad9e-7a13329217ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9040-access_to_bodies","url":"https://api.media.ccc.de/public/events/6588e4a4-d0ac-4082-ad9e-7a13329217ee","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":105},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":132},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":99},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":130},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":92},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":135},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":55},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":73},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":103},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":60},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":90},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":62},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":50},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":58},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":56},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":59},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":69},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":72},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":61}]},{"guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","title":"Briar","subtitle":"Resilient P2P Messaging for Everyone","slug":"34c3-8937-briar","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8937.html","description":"Briar is a peer-to-peer messaging app that is resistant to censorship and works even without internet access. The app encrypts all data end-to-end and also hides metadata by utilizing Tor onion services.\n\nAround the world communication is increasingly monitored and restricted. If communication can not be eavesdropped on, it is often blocked entirely. Less advanced states even block the entire internet nation-wide.\n\nWe need to develop tools that are more resilient to these threats. Communication and expression needs to be free. Censorship should not be possible. Even if the internet was taken down, people should still be able to communicate.\n\nThis presentation will introduce Briar a resilient messaging app. Its goal is to enable people in any country to create safe spaces where they can debate any topic, plan events, and organize social movements.\n\nBriar does not rely on servers. It connects people directly peer-to-peer and does not care how data is exchanged. Currently, it has plugins for Bluetooth, WiFi and Tor. The latter is used for long-distance communication over the internet and is supposed to not leak metadata.\n\nBriar aims to be secure and easy to use at the same time. An Android app is currently in beta. Support for other platforms is planned.\n\nSince Briar works peer-to-peer, there is no single universal truth in it. Each group of people might have a different view on the available data depending on their connectivity. This opens up some interesting technical and usability problems that you do not encounter in centralized systems where the server is the authority.","original_language":"eng","persons":["Torsten Grote"],"tags":["34c3","8937","Resilience"],"view_count":3182,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-04-01T18:15:06.943+02:00","length":1871,"duration":1871,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8937-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8937-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/aa99c1b2-80cf-4a67-8106-55e7a097294e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/aa99c1b2-80cf-4a67-8106-55e7a097294e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8937-briar","url":"https://api.media.ccc.de/public/events/aa99c1b2-80cf-4a67-8106-55e7a097294e","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":31},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":51},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":30},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":30},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":50},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":36},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":50},{"event_id":4863,"event_guid":"801e92bc-c2a2-4f89-bf60-c76a44b0b8b5","weight":43},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":61},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":32},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":30},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":30},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":13},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":72},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":37},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":50},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":39},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":48},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":7},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":46},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":35},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":56},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":31},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":33},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":35},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":75},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":41},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":37}]},{"guid":"9326038b-f781-4707-b35a-9ef52f98d35a","title":"hacking disaster","subtitle":"mit Krisenintervention den Kapitalismus hacken","slug":"34c3-9188-hacking_disaster","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9188.html","description":"Gesundheit als entscheidender Teil von Glück und Zufriedenheit ist bis in ihre kleinsten Teilbereiche „durchkapitalisiert“. Und dieser Prozess macht auch vor humanitärer Hilfe und Krisenintervention nicht halt. In diesem Talk gehen wir auf verschiedene Beispiele ein und erklären, wie CADUS mit seinem Makerspace versucht, dieses Problem auf vielen Ebenen zu hacken.","original_language":"deu","persons":["Sebastian Jünemann"],"tags":["34c3","9188","Resilience"],"view_count":7412,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-03-19T21:30:09.309+01:00","length":2114,"duration":2114,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9188-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9188-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/9326038b-f781-4707-b35a-9ef52f98d35a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/9326038b-f781-4707-b35a-9ef52f98d35a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9188-hacking_disaster","url":"https://api.media.ccc.de/public/events/9326038b-f781-4707-b35a-9ef52f98d35a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":913},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1084},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":729},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":776},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1118},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":332},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":178},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":584},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":161},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":130},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":260},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":124},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":443},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":201},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":222},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":306},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":393},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":576},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":651},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":208},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":424},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":132},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":439},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":119},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":125},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":119},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":707},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":282},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":216},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":314},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":188},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":166},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":377},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":416},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":254},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":482},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":242},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":288},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":277},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":162},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":368},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":132}]},{"guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","title":"Doping your Fitbit","subtitle":"On Fitbit Firmware Modifications and Data Extraction","slug":"34c3-8908-doping_your_fitbit","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8908.html","description":"Security architectures for wearables are challenging. We take a deeper look into the widely-used Fitbit fitness trackers. The Fitbit ecosystem is interesting to analyze, because Fitbit employs security measures such as end-to-end encryption and authentication to protect user data (and the Fitbit business model). Even though this goes beyond security mechanisms offered by other fitness tracker vendors, reverse-engineering the trackers enables us to launch practical attacks against Fitbit. In our talk, we demonstrate new attacks including wireless malware flashing on trackers as well as “unlocking” the trackers to work independent from the Fitbit cloud.","original_language":"eng","persons":["jiska","DanielAW"],"tags":["34c3","8908","Security"],"view_count":9410,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T20:00:08.141+02:00","length":1368,"duration":1368,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8908-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8908-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/7edaed35-e938-4a13-b21c-aac4bb0ebf94-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/7edaed35-e938-4a13-b21c-aac4bb0ebf94-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8908-doping_your_fitbit","url":"https://api.media.ccc.de/public/events/7edaed35-e938-4a13-b21c-aac4bb0ebf94","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":154},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":244},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":126},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":119},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":218},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":136},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":119},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":168},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":270},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":140},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":147},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":267},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":156},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":111},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":124},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":108},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":145},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":357},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":337},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":159},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":122},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":319},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":238},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":134},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":109},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":149},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":142},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":195},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":171}]},{"guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","title":"Social Bots, Fake News und Filterblasen","subtitle":"Therapiestunde mit einem Datenjournalisten und vielen bunten Visualisierungen","slug":"34c3-9268-social_bots_fake_news_und_filterblasen","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9268.html","description":"„Angriff der Meinungsroboter“ und „Gefangen in der Filterblase“ titelten die deutschen Medien. Doch was ist wirklich daran?","original_language":"deu","persons":["Michael Kreil"],"tags":["34c3","9268","Ethics, Society \u0026 Politics"],"view_count":24688,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-28T14:45:06.004+01:00","length":4002,"duration":4002,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9268-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9268-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a9ebf7e3-abc5-49d9-8efe-316b3bc52902-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a9ebf7e3-abc5-49d9-8efe-316b3bc52902-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9268-social_bots_fake_news_und_filterblasen","url":"https://api.media.ccc.de/public/events/a9ebf7e3-abc5-49d9-8efe-316b3bc52902","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":844},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1264},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":923},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":424},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":275},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1386},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":581},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":165},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":270},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":206},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":390},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":202},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":352},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":892},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1315},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":453},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":130},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":122},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":148},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":244},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":745},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":115},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":151},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":150},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1353},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":632},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":130},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":230},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":164},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":239},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":384},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":544},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":196},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1594},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":252},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":854},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":114},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":224},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":172},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":654},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":112},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":228},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":109},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":128},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":191}]},{"guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","title":"We should share our secrets","subtitle":"Shamir secret sharing: How it works and how to implement it","slug":"34c3-8885-we_should_share_our_secrets","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8885.html","description":"Backing up private keys in a secure manner is not straightforward. Once a backup has been compromised you need to refresh all your key material. For example, the disclosure of a private key of a Bitcoin wallet gives access to the coins inside. This makes it unattractive to store a complete backup of your private key(s) with your bank or your spouse. The better option would be to split the key into multiple parts. The recommended way to do this securely is to use the Shamir secret sharing scheme. This talk provides a detailed breakdown of how the scheme works and explains how it is implemented in C in a new library called SSS.","original_language":"eng","persons":["Amber Sprenkels"],"tags":["34c3","8885","Security"],"view_count":1231,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-18T17:00:06.300+01:00","length":3579,"duration":3579,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8885-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8885-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/af131b56-3423-4f8a-87ff-79b9f21e0656-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/af131b56-3423-4f8a-87ff-79b9f21e0656-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8885-we_should_share_our_secrets","url":"https://api.media.ccc.de/public/events/af131b56-3423-4f8a-87ff-79b9f21e0656","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":17},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":43},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":35},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":29},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":27},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":28},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":36},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":9},{"event_id":4807,"event_guid":"3a957087-9ee2-47e8-b74a-d0a1a18d3673","weight":31},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":28},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":26},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":17},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":34},{"event_id":4825,"event_guid":"a39634b4-d220-4c84-bf5a-e52c375827c5","weight":27},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":56},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":30},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":28},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":28},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":31},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":32},{"event_id":4839,"event_guid":"81530917-cfdd-4a08-bf29-9b71fafb1bc1","weight":36}]},{"guid":"6be7c907-103c-4c96-969a-32890c98a8cd","title":"Lightning Talks Day 2","subtitle":null,"slug":"34c3-9256-lightning_talks_day_2","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9256.html","description":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!\n\nTo get involved and learn more about what is happening please visit the Lightning Talks Wikipage at \u003ca href=\"https://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\"\u003ehttps://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\u003c/a\u003e","original_language":"eng","persons":["gedsic","bigalex"],"tags":["34c3","9256","CCC"],"view_count":1682,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-28T14:15:04.525+01:00","length":6236,"duration":6236,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9256-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9256-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/6be7c907-103c-4c96-969a-32890c98a8cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/6be7c907-103c-4c96-969a-32890c98a8cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9256-lightning_talks_day_2","url":"https://api.media.ccc.de/public/events/6be7c907-103c-4c96-969a-32890c98a8cd","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":28},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":39},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":36},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":21},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":27},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":28},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":71},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":36},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":43},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":33},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":27},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":13},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":69},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":45},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":36},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":64},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":39},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":28},{"event_id":4927,"event_guid":"edfd7686-0117-43c4-8e42-030408de5e91","weight":114},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":36},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":28},{"event_id":4939,"event_guid":"439d7085-4f24-45ac-843f-987f89c4446d","weight":60}]},{"guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","title":"All Computers Are Beschlagnahmt","subtitle":"Zum Verbot von Indymedia linksunten","slug":"34c3-8955-all_computers_are_beschlagnahmt","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8955.html","description":"Im August 2017 wurde Indymedia linksunten vom Bundesinnenminister verboten. Rechtsanwältin Kristin Pietrzyk berichtet von den Razzien, von der Zusammenarbeit zwischen Polizei und Geheimdiensten und gibt Einblick in das juristische Vorgehen gegen Verbot und Zensur.\n\nDie wichtigste linksradikale Nachrichtenplattform linksunten.indymedia.org wurde im August 2017 von Bundesinnenminister Thomas de Maizière verboten. Um das Presserecht auszuhebeln, nutzte das Innenministerium das Vereinsrecht. Kurzerhand erklärten sie einige ihnen bekannte Freiburger Autonome zu Mitgliedern eines Vereins „Indymedia linksunten” und das Autonome Zentrum KTS Freiburg zum „Vereinsheim“. \n\nUm überhaupt erst gerichtsfeste Belege für das Vereinsverbot und die Zuordnung der Betroffenen zu diesem Verein zu beschaffen, wurden vier Wohnungen und das „Vereinsheim” durchsucht. Das aufgefundene Geld wurde kurzerhand als „Vereinsvermgögen“ deklariert und beschlagnahmt. Die beschlagnahmten Computer sollen von einer „Task Force“ des LKA Baden-Württemberg, der Bundespolizei und dem Bundesamt für Verfassungsschutz „dekryptiert“ und im Erfolgsfall vom Inlandsgeheimdienst ausgewertet werden.\n\nEigentlich müsste anhand des Beispiels Indymedia linksunten politisch über Presse- und Meinungsfreiheit diskutiert werden. Über gezielte Verfassungsschutzhetze im Vorfeld des Verbots und über den Fallout des G20-Gipfels in Hamburg. Über den Aufstieg der rechtsradikalen AfD und einen deutschen Wahlkampf im Herbst 2017. Stattdessen wird der Fall als Folge eines Verwaltungsakts des Bundesinnenministeriums vor dem Bundesverwaltungsgericht in Leipzig verhandelt. Kristin Pietrzyk ist Rechtsanwältin aus Jena und vertritt dabei einen der Betroffenen.\n\nNeben den juristischen wird sie auch auf folgende Fragen eingehen: Was hat eine verdeckte Kameraüberwachung mit einer linksradikalen Nachrichtenseite zu tun? Was können Fußnoten in Ermittlungsakten über Informanten des Bundesamtes für Verfassungsschutz erzählen? Wieso liegt die Stickersammlungen jetzt beim Geheimdienst? Und warum wurde eigentlich nicht der alte BKA-Trick angewandt, durch den Zielpersonen mitten in der Nacht ihre Rechner freiwillig entschlüsseln? ","original_language":"deu","persons":["Kristin Pietrzyk"],"tags":["34c3","8955","Ethics, Society \u0026 Politics"],"view_count":10396,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-17T21:45:07.966+01:00","length":3564,"duration":3564,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8955-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8955-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/949bee69-3be0-4cc8-915b-5f1167141dcc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/949bee69-3be0-4cc8-915b-5f1167141dcc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8955-all_computers_are_beschlagnahmt","url":"https://api.media.ccc.de/public/events/949bee69-3be0-4cc8-915b-5f1167141dcc","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":369},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":390},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":296},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":416},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":245},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":601},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":296},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":209},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":158},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":177},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":183},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":333},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":450},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":86},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":538},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":160},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":544},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":78},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":175},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":537},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":98},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":85},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":106},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":125},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":743},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":465},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":155},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":370},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":191},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":257},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":504},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":111},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":90},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":91},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":238},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":877},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":425},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":544},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":84},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":127},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":100},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":161},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":327},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":199},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":100},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":546},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":134},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":262},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":118},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":191},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":91}]},{"guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","title":"BBSs and early Internet access in the 1990ies","subtitle":"Modems, FIDO, Z-Netz, Usenet, UUCP, SLIP and ISDN","slug":"34c3-9034-bbss_and_early_internet_access_in_the_1990ies","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9034.html","description":"This talk explains how individuals were able to communicate globally in the 1990ies using self-organized networks of BBSsin networks like FIDO and Z-Netz, before individual access to the Internet was possible.  It also covers the efforts of non-profit organizations to provide individual access to Internet Mail+News via UUCP and later via IP during that period.\n\nThis talk covers how individuals could participate in local, regional and global message-based data communications in the 1990ies.  It covers the technologies used to access such networks, both on the infrastructure (BBS) side, as well as on the user/client side. \n\nAt the same time, the talk is a bit of a personal journey from \n\u003cul\u003e\n\u003cli\u003eaccessing dial-up BBSs using accoustinc coupler and modem\u003c/li\u003e\n\u003cli\u003ebecoming CoSysop of a BBS and learning about how to operatie BBSs\u003c/li\u003e\n\u003cli\u003ebeing a Node/Point in message based communications networks like Z-Netz and FIDO\u003c/li\u003e\n\u003cli\u003eusing UUCP to participate in Internet mail/news (Usenet)\u003c/li\u003e\n\u003cli\u003eworking in the technical team of Kommunikationsnetz Franken e.V. to set up a community-based ISP with modem and ISDN dial-up banks, satellite based Usenet feeds, analog leased lines ISDN-SPV.\u003c/li\u003e\n\u003cli\u003ehelping getting Germany's alleged first Internet Cafe (we then called it an Online Bistro) connected\u003c/li\u003e\n\u003c/ul\u003e","original_language":"eng","persons":["LaForge"],"tags":["34c3","9034","Art \u0026 Culture"],"view_count":2578,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-31T23:30:07.573+02:00","length":3701,"duration":3701,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9034-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9034-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f5245c8c-5020-4bfc-914b-b0c161ff794b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f5245c8c-5020-4bfc-914b-b0c161ff794b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9034-bbss_and_early_internet_access_in_the_1990ies","url":"https://api.media.ccc.de/public/events/f5245c8c-5020-4bfc-914b-b0c161ff794b","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":11},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":60},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":78},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":43},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":43},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":51},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":44},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":43},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":70},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":80},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":45},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":78},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":26},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":49},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":47},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":48},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":74},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":45},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":67},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":46},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":108},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":44},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":30},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":65},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":54}]},{"guid":"544e7736-6b59-4c05-87a7-c013ef993688","title":"Uncovering British spies’ web of sockpuppet social media personas","subtitle":null,"slug":"34c3-9233-uncovering_british_spies_web_of_sockpuppet_social_media_personas","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9233.html","description":"The Joint Threat Research Intelligence Group (JTRIG), a unit in one of Britain’s intelligence agencies, is tasked with creating sockpuppet accounts and fake content on social media, in order to use \"dirty tricks\" to \"destroy, deny, degrade [and] disrupt\" enemies by \"discrediting\" them. In this talk, we reveal some of that content, in relation to infiltrating activists groups around the world, including during the Arab spring and Iranian revolution.","original_language":"eng","persons":["Mustafa Al-Bassam"],"tags":["34c3","9233","Ethics, Society \u0026 Politics"],"view_count":8902,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T04:30:03.098+02:00","length":1891,"duration":1891,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9233-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9233-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/544e7736-6b59-4c05-87a7-c013ef993688-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/544e7736-6b59-4c05-87a7-c013ef993688-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9233-uncovering_british_spies_web_of_sockpuppet_social_media_personas","url":"https://api.media.ccc.de/public/events/544e7736-6b59-4c05-87a7-c013ef993688","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":293},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":575},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":290},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":443},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":546},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":425},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":511},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":194},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":166},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":204},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":231},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":296},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":204},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":354},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":207},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":270},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":251},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":226},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":473},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":168},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":215},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":255},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":209},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":165},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":195},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":171},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":198}]},{"guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","title":"Forensic Architecture","subtitle":"Forensic Architecture is an independent research agency that undertakes historical and theoretical examinations of the history and present in articulating notions of public truth.","slug":"34c3-9276-forensic_architecture","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9276.html","description":"In recent years, the group Forensic Architecture began using novel research methods to undertake a series of investigations into human rights abuses. The group uses architecture as an optical device to investigate armed conflicts and environmental destruction, as well as to cross-reference a variety of evidence sources, such as new media, remote sensing, material analysis, witness testimony, and crowd-sourcing.\n \nIn this talk, Eyal Weizman provides, for the first time, an in-depth introduction to the history, practice, assumptions, potentials, and double binds of this practice. ","original_language":"eng","persons":["Eyal Weizman"],"tags":["34c3","9276","Art \u0026 Culture"],"view_count":1513,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T05:00:05.588+02:00","length":2614,"duration":2614,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9276-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9276-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/34fb21bd-34f5-40cc-b081-7fc427c452b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/34fb21bd-34f5-40cc-b081-7fc427c452b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9276-forensic_architecture","url":"https://api.media.ccc.de/public/events/34fb21bd-34f5-40cc-b081-7fc427c452b6","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":93},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":135},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":66},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":124},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":93},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":107},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":64},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":78},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":103},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":66},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":62},{"event_id":4775,"event_guid":"51f1fe0d-19df-406d-a313-befeab6ac1bb","weight":47},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":71},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":94},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":44},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":42},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":41},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":36},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":39},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":55},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":38}]},{"guid":"825add58-9218-4afe-a489-4dd8c4408e45","title":"End-to-end formal ISA verification of RISC-V processors with riscv-formal","subtitle":null,"slug":"34c3-8768-end-to-end_formal_isa_verification_of_risc-v_processors_with_riscv-formal","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8768.html","description":"Formal hardware verification (hardware model checking) can prove that a design has a specified property. Historically only very simple properties in simple designs have been provable this way, but improvements in model checkers over the last decade enable us to prove very complex design properties nowadays. riscv-formal is a framework for formally verifying RISC-V processors directly against a formal ISA specification. In this presentation I will discuss how the complex task of verifying a processor against the ISA specification is broken down into smaller verification problems, and other techniques that I employed to successfully implement riscv-formal.","original_language":"eng","persons":["Clifford Wolf"],"tags":["34c3","8768","Resilience"],"view_count":1624,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-03T06:15:03.735+02:00","length":1745,"duration":1745,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8768-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8768-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/825add58-9218-4afe-a489-4dd8c4408e45-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/825add58-9218-4afe-a489-4dd8c4408e45-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8768-end-to-end_formal_isa_verification_of_risc-v_processors_with_riscv-formal","url":"https://api.media.ccc.de/public/events/825add58-9218-4afe-a489-4dd8c4408e45","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":41},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":73},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":41},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":37},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":113},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":42},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":35},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":36},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":33},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":33},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":37},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":61},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":41},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":43},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":41}]},{"guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","title":"Die fabelhafte Welt des Mobilebankings","subtitle":null,"slug":"34c3-8805-die_fabelhafte_welt_des_mobilebankings","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8805.html","description":"Bisher wurden Angriffe gegen App-basierte TAN-Verfahren und Mobilebanking von betroffenen Banken eher als akademische Kapriole abgetan. Sie seien, wenn überhaupt, nur unter Laborbedingungen und dazu unter wiederkehrend hohem manuellen Aufwand zu realisieren. Um diese Sichtweise zu korrigieren, haben wir das Programm Nomorp entwickelt, das in der Lage ist, zentrale Sicherungs- und Härtungsmaßnahmen in weltweit 31 Apps vollautomatisch zu deaktivieren und somit Schadsoftware Tür und Tor öffnet. Unter den Betroffenen stellen deutsche Unternehmen mit 20 Finanz-Apps die größte Fraktion.","original_language":"deu","persons":["Vincent Haupert"],"tags":["34c3","8805","Security"],"view_count":22023,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-04T15:15:04.700+02:00","length":1990,"duration":1990,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8805-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8805-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a2887b4a-0c9d-4220-a52f-c65c20ae25d7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a2887b4a-0c9d-4220-a52f-c65c20ae25d7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8805-die_fabelhafte_welt_des_mobilebankings","url":"https://api.media.ccc.de/public/events/a2887b4a-0c9d-4220-a52f-c65c20ae25d7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":131},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":213},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1099},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1214},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1548},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":651},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":702},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1680},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":173},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":694},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":102},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":148},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":354},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":290},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":241},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":476},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":113},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":503},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1486},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":177},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":639},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":177},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":1315},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":143},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":107},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":321},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":634},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":267},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":154},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":156},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":148},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1817},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":690},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":170},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":425},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":323},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":305},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":416},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":111},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":538},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":373},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1664},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":363},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":831},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":119},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":116},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":336},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":317},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":131},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":929},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":130},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":174},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":144},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":103}]},{"guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","title":"Modern key distribution with ClaimChain","subtitle":"A decentralized Public Key Infrastructure that supports privacy-friendly social verification","slug":"34c3-9094-modern_key_distribution_with_claimchain","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9094.html","description":"ClaimChain is a Public Key Infrastructure unique in that it can operate in fully decentralized settings with no trusted parties. A vouching mechanism among users, similar to the Web of Trust, assists with social authentication but without revealing the users' social graph. High-integrity data structures prevent equivocation and help detect compromises; the protocol can support generic claims (conventional PGP, modern OTR/Signal etc.); and a prototype evaluation indicates that ClaimChain can scale.\n\nBlockchain holds a big promise for Public Key Infrastructure (PKI) designs. Prominent systems, such as Keybase and CONIKS, tend to be centralized, something that eases the update of keys and provides good availability. Centralized designs, however, require users to trust that the source of authority acts honestly at all times, and does not perform surveillance.\u003cbr\u003e\n\nClaimChain is a decentralized PKI design, where users maintain repositories of claims implemented as hash chains: data structures that allow for efficient verification of the integrity and authenticity of their content. Claims relate to the key material of the owners, or their beliefs about public keys of others. In the latter case, cross-referencing serves as a way of efficient and verifiable vouching about states of other users. In practice, such information would reveal the social graph of the chain owners and even their communication patterns. To solve this privacy issue, we use cryptographic verifiable random functions to derive private identifiers that are re-randomized on each chain update, encrypted to a given set of authorized readers. In that way, chain owners can not present different views to authorized readers of the same contact. ClaimChain allows to detect chain compromises, manifested as forks of hash chains, and to implement various social policies for deriving decisions about the latest state of users in the system.\u003cbr\u003e\n\nEvaluation of a prototype implementation indicates that ClaimChain can scale to accommodate the needs of large groups at an acceptable computational and bandwidth overhead cost. Interoperability with PGP makes it possible for users to gradually deploy ClaimChain locally. Email providers that wish to adopt ClaimChain will participate as an additional factor in the social authentication process. Arguably, ClaimChain constitutes an example that decentralization in combination with modern cryptography allow for increased robustness to adversarial central authorities, and offer comparable availability, as well as more options for supporting privacy.","original_language":"eng","persons":["prometheas"],"tags":["34c3","9094","Resilience"],"view_count":834,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-17T03:30:03.939+01:00","length":1971,"duration":1971,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9094-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9094-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/85d76a77-0d89-4820-8d99-8c5a8509eb24-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/85d76a77-0d89-4820-8d99-8c5a8509eb24-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9094-modern_key_distribution_with_claimchain","url":"https://api.media.ccc.de/public/events/85d76a77-0d89-4820-8d99-8c5a8509eb24","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":23},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":14},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":32},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":9},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":23},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":26},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":9},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":42},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":27},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":22},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":38},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":48},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":25},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":23},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":25},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":40},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":5},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":12}]},{"guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","title":"Console Security - Switch","subtitle":"Homebrew on the Horizon","slug":"34c3-8941-console_security_-_switch","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8941.html","description":"Nintendo has a new console, and it's more secure than ever.\n\nThe Switch was released less than a year ago, and we've been all over it.\n\nNintendo has designed a custom OS that is one of the most secure we've ever seen, making the game harder than it has ever been before.\n\nIn this talk we will give an introduction to the unique software stack that powers the Switch, and share our progress in the challenge of breaking it. We will talk about the engineering that went into the console,  and dive deep into the security concepts of the device.\n\nThe talk will be technical, but we aim to make it enjoyable also for non-technical audiences.","original_language":"eng","persons":["plutoo","derrek","naehrwert"],"tags":["34c3","8941","Security"],"view_count":22622,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-04-02T18:00:04.702+02:00","length":3409,"duration":3409,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8941-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8941-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/03ba9edb-1d3a-4774-9384-7548c0696df7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/03ba9edb-1d3a-4774-9384-7548c0696df7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8941-console_security_-_switch","url":"https://api.media.ccc.de/public/events/03ba9edb-1d3a-4774-9384-7548c0696df7","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":91},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":188},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":417},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":210},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":162},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":424},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":250},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":255},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":171},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":169},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":64},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":177},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":213},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":121},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":317},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":303},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":172},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":161},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":195},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":75},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":81},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":97},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":633},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":150},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":122},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":328},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":328},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":89},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":84},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":199},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":277},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":437},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":215},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":245},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":67},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":74},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":159},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":106},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":107},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":112},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":555},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":68},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":74}]},{"guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","title":"Holography of Wi-Fi radiation","subtitle":"Can we see the stray radiation of wireless devices? And what would the world look like if we could?","slug":"34c3-9024-holography_of_wi-fi_radiation","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9024.html","description":"Holography of Wi-Fi radiation\nPhilipp Holl [1,2] and Friedemann Reinhard [2]\n\n[1] Max Planck Institute for Physics\n[2] Walter Schottky Institut and Physik-Department, Technical University of Munich\n\nWhen we think of wireless signals such as Wi-Fi or Bluetooth, we usually think of bits and bytes, packets of data and runtimes.  \n\nInterestingly, there is a second way to look at them. From a physicist's perspective, wireless radiation is just light, more precisely: coherent electromagnetic radiation. It is virtually the same as the beam of a laser, except that its wavelength is much longer (cm vs µm). \n\nWe have developed a way to visualize this radiation, providing a view of the world as it would look like if our eyes could see wireless radiation. \n\nOur scheme is based on holography, a technique to record three-dimensional pictures by a phase-coherent recording of radiation in a two-dimensional plane. This technique is traditionally implemented using laser light. We have adapted it to work with wireless radiation, and recorded holograms of building interiors illuminated by the omnipresent stray field of wireless devices. In the resulting three-dimensional images we can see both emitters (appearing as bright spots) and absorbing objects (appearing as shadows in the beam). Our scheme does not require any knowledge of the data transmitted and works with arbitrary signals, including encrypted communication. \n\nThis result has several implications: it could provide a way to track wireless emitters in buildings, it could provide a new way for through-wall imaging of building infrastructure like water and power lines. As these applications are available even with encrypted communication, it opens up new questions about privacy.\n\n\n","original_language":"eng","persons":["Friedemann Reinhard"],"tags":["34c3","9024","Science"],"view_count":2110,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-27T02:45:03.406+01:00","length":3689,"duration":3689,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9024-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9024-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/95f6e79b-e6a5-4d93-b4ba-cb70470ed819-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/95f6e79b-e6a5-4d93-b4ba-cb70470ed819-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9024-holography_of_wi-fi_radiation","url":"https://api.media.ccc.de/public/events/95f6e79b-e6a5-4d93-b4ba-cb70470ed819","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":93},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":62},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":58},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":29},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":13},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":61},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":58},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":123},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":82},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":85},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":70},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":69},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":64},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":49},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":72},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":27},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":86},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":68},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":97},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":112},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":59},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":24},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":84},{"event_id":4878,"event_guid":"541e74c5-6336-4892-90aa-ce84936b03ca","weight":27},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":50},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":62},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":66},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":58}]},{"guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","title":"Don't stop 'til you feel it","subtitle":"Artistic interventions in climate change","slug":"34c3-8851-don_t_stop_til_you_feel_it","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8851.html","description":"This talk will report on my current research in bringing to bear multiple knowledges on problem spaces around the environment and digital culture, and in so doing questioning both the prevailing knowledge hierarchy and the institutionalisation of knowledge production. To connect with the environment, for instance, do we need to connect with how it feels? This talk draws on works exploring both the marine environment and food, using knowledge from science, art, culture, instinct and history to create happenings and instances that break out the border of \"me\" and \"my environment\" to create an empathic response linking what we traditionally consider to be inside and outside. This will be demonstrated in the context of two artistic works - The Coral Empathy Device and Vital | Flows.\n\nWe exist within a set of rules about the value of knowledge - a hierarchy of knowledge that places quantified data at the top and the “lower” senses at the bottom. The neglect of other forms of knowledge – aesthetic, embodied, cultural and more – has created a void in our socio-political and environmental relations that has been filled by emotive, populist rhetoric that undermines the validity of the knowledge we have. Post-truth practices are answering a gap that arises from our reliance on cognitive knowledge as the main valid form of knowledge – including datafication of everything – particularly in politics. \n\nAs an alternative I propose we augment this cognitive and data derived knowledge with more emotionally connecting knowledges, to achieve a more integrated understanding of the world, and to once again embark on a quest for a type of truth. \n\n\nWhen we live close to the land we experience empathy with the land. It has recently been said that indeed our present mode of life has led to the “death of empathy”. The Coral Empathy Device uses principles of embodied learning to explore whether physical sensation curated by an artist can evoke interspecies empathy in a human for a coral – a creature at once so similar and so alien to us. The artwork creates a discomforting experience that challenges the visitor’s embodied experience to leverage the fact that “the body schema is the converting system of perception and action”. By bridging the gap between the way we perceive and the way coral perceives, can we connect with the marine environment in a new way? Can we foster action by creating knowledge of another species within the body as a whole? \n\nVital | Flows is an ongoing work drawing knowledge about food from multiple sources - DIY science, phenomenology, instinct, culture - to explore the ephemeral nature of boundaries between self and other. This paper will report the results of open sourcing these methods, working with London communities who will use them to explore food and its meaning. This open source artistic research methodology for exploring environmental topics creates a platform for rhyzomic growth of selfactualised research that brings together and brings the best out of online and offline knowledge sharing. This is an exploration in breaking down the boundaries between inside and outside \"myself\", redefining the concept of the individual to incorporate the reality of our permeability. By achieving this through melding knowledge from quantification, embodiment, aesthetics and more, can we reach a new understanding of the place of self and other?","original_language":"eng","persons":["iamkat"],"tags":["34c3","8851","Science"],"view_count":393,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-01-05T10:30:16.673+01:00","length":3802,"duration":3802,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8851-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8851-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/d9421381-5934-46ba-9fe8-3f4cc0a3f187-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/d9421381-5934-46ba-9fe8-3f4cc0a3f187-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8851-don_t_stop_til_you_feel_it","url":"https://api.media.ccc.de/public/events/d9421381-5934-46ba-9fe8-3f4cc0a3f187","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":15},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":21},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":16},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":2},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":23},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":16},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":22},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":15},{"event_id":4888,"event_guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","weight":14},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":19},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":19},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":15},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":4},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":15},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":10},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":4},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":17},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":16},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":6},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":15},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":20},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":15}]},{"guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","title":"BGP and the Rule of Custom","subtitle":"How the internet self-governs without international law","slug":"34c3-9072-bgp_and_the_rule_of_custom","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9072.html","description":"When bad actors can simply move servers from country to country, why does the internet remain reasonably civil ?\nHow does one get on, or get kicked off, of the internet ?\nWhy do fraud and child abuse websites regularly get shut down but thepiratebay remains living ?\nI will explain BGP, the protocol that knits the internet together, also covering the world of last resort hosting, bulletproof hosting and high profile cases of servers that were taken offline and servers which could not be taken offline despite significant effort.","original_language":"eng","persons":["Caleb James DeLisle"],"tags":["34c3","9072","Ethics, Society \u0026 Politics"],"view_count":1832,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-18T22:00:06.100+01:00","length":1871,"duration":1871,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9072-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9072-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/d5d27820-0e97-4c19-bf57-b470cbbd97ef-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/d5d27820-0e97-4c19-bf57-b470cbbd97ef-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9072-bgp_and_the_rule_of_custom","url":"https://api.media.ccc.de/public/events/d5d27820-0e97-4c19-bf57-b470cbbd97ef","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":56},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":103},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":50},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":57},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":89},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":68},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":65},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":75},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":60},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":62},{"event_id":4799,"event_guid":"95f7fa6a-c6a4-42eb-8c04-e5c82d696539","weight":55},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":52},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":76},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":57},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":109},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":52},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":65},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":60},{"event_id":4851,"event_guid":"f5245c8c-5020-4bfc-914b-b0c161ff794b","weight":80},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":50},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":73},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":76}]},{"guid":"2d374ca6-9f86-49d1-bfc6-8084f61c4db3","title":"Electroedibles","subtitle":"Open Source Hardware for Smart Candies","slug":"34c3-9025-electroedibles","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9025.html","description":"Electroedibles is an experiment with “edible” hardware that explores the limits of interaction between our tongue and circuits to mock the present fantasies of Internet of (Every)thing.  This project initiated by the hardware lab at Shenkar College of Arts and Tel Aviv Makerspace consists from series of workshops, in which participants combine simple circuits (lickometer with LED, vibration motor or piezo) with recipes for candy making (hard candy based on syrups or gummy or corn starch molds). The circuits are casted in candy “molds” to serve different ideas defined by the participants: extreme hardware fetishist lollipops, philosophical props into sensory perception, post-colonial critique of the sugar cane addiction and slavery, scientific interest in triggering taste buds etc. This probe into the edible hardware is also a celebration of the DIY culture of sharing behind cooking, but also Open Source Hardware that bridges the divisions between the kitchen, the hardware studio and the science lab. Instead of applying science and technology to cooking and tasting (typical for molecular gastronomy \u0026 haute cuisine), the electroedibles use the experiences of candy cooking and to engage with different science and technology issues in enjoyable and funny ways.","original_language":"eng","persons":["Denisa Kera","yair reshef","Zohar Messeca-Fara"],"tags":["34c3","9025","Hardware \u0026 Making"],"view_count":575,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-07T11:30:06.332+01:00","length":1818,"duration":1818,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9025-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9025-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/2d374ca6-9f86-49d1-bfc6-8084f61c4db3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/2d374ca6-9f86-49d1-bfc6-8084f61c4db3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9025-electroedibles","url":"https://api.media.ccc.de/public/events/2d374ca6-9f86-49d1-bfc6-8084f61c4db3","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":25},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":1},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":1},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":1},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":1},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":22},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":9},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":1},{"event_id":4811,"event_guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","weight":1},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":21},{"event_id":4819,"event_guid":"55f921ed-ab90-4553-9903-8658557ac447","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":27},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":9},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":1},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":1},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":1},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":1},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":15},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":10},{"event_id":4865,"event_guid":"0b0a3457-91be-43ea-af21-8e251d8d9322","weight":23},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":35},{"event_id":4868,"event_guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","weight":1},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":16},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":24},{"event_id":4872,"event_guid":"c26fa336-680b-49e5-80e6-24432305e94d","weight":19},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":6},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":6},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":18},{"event_id":4880,"event_guid":"0dbbb546-38e6-499f-bb93-a5539d114d1d","weight":10},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":20},{"event_id":4884,"event_guid":"416409b8-e09e-4717-bb2d-bba218d6f2f1","weight":9},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":18},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":21},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":18},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":20},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":20},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":10},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":19}]},{"guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","title":"Squeezing a key through a carry bit","subtitle":null,"slug":"34c3-9021-squeezing_a_key_through_a_carry_bit","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9021.html","description":"The Go implementation of the P-256 elliptic curve had a small bug due to a misplaced carry bit affecting less than 0.00000003% of field subtraction operations. We show how to build a full practical key recovery attack on top of it, capable of targeting JSON Web Encryption.","original_language":"eng","persons":["Filippo Valsorda"],"tags":["34c3","9021","Security"],"view_count":2104,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-01-29T17:30:09.193+01:00","length":3001,"duration":3001,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9021-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9021-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/23d59026-ab98-4f6c-a46d-0bb3e1788a67-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/23d59026-ab98-4f6c-a46d-0bb3e1788a67-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9021-squeezing_a_key_through_a_carry_bit","url":"https://api.media.ccc.de/public/events/23d59026-ab98-4f6c-a46d-0bb3e1788a67","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":13},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":53},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":51},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":44},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":64},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":41},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":58},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":41},{"event_id":4797,"event_guid":"c7b3314c-165c-446d-963c-609922ea990f","weight":46},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":48},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":51},{"event_id":4818,"event_guid":"c02f6777-5e55-46ca-8d60-1810a8d5f3c7","weight":51},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":57},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":53},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":43},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":49},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":42}]},{"guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","title":"Simulating the future of the global agro-food system","subtitle":"Cybernetic models analyze scenarios of interactions between future global food consumption, agriculture, landuse, and the biogeochemical cycles of water, nitrogen and carbon.","slug":"34c3-8935-simulating_the_future_of_the_global_agro-food_system","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8935.html","description":"How can we feed a growing world population within a resilient Earth System? This session will present results from our cybernetic computer models that simulate how future trends in population growth, diets, technology and policy may change the global land cover, freshwater usage, the nitrogen cycle and the climate system, and how more sustainable pathways can be reached. We want to discuss how our computer models and our data can be made accessible and usable by a broader community, and which new ways exist to visualize key insights and provide decision support to our society. We will also showcase some interactive physical installations that have been developed jointly with a group of art students to visualize future scenarios.\n\nPotsdam Institute for Climate Impact Research is specialized on simulations of the Earth System using supercomputing facilities, pushing the cybernetic concepts of the 20st century to the next level. Dozens of researchers jointly coded for more than a decade a number of Integrated Assessment Models that simulate the complex interactions between humans and the environment in great detail, drawing concepts from both natural and social sciences. Building such computer-supported macroscopes allow us to make the vast complexity of the Earth System comprehensible and supports decision makers in finding sustainable pathways into the future. \n\nThis session will address the question: How can we feed a growing world population within a resilient Earth System? It will present results from our cybernetic computer models that simulate how future trends in population growth, diets, technology and policy may change the global land cover, freshwater usage, the nitrogen cycle and the climate system, and how more sustainable pathways can be reached. We want to discuss how our computer models and our data can be made accessible and usable by a broader community, and which new ways exist to visualize key insights and provide decision support to our society. \n\nWe will also showcase some interactive physical installations that have been developed jointly with a group of art students to visualize future scenarios.","original_language":"eng","persons":["Benjamin Leon Bodirsky"],"tags":["34c3","8935","Science"],"view_count":654,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2025-10-21T14:15:05.194+02:00","length":2116,"duration":2116,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8935-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8935-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/eaf5d978-ea98-4474-9d40-7f493167d26d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/eaf5d978-ea98-4474-9d40-7f493167d26d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8935-simulating_the_future_of_the_global_agro-food_system","url":"https://api.media.ccc.de/public/events/eaf5d978-ea98-4474-9d40-7f493167d26d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":25},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":1},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":18},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":21},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":12},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":1},{"event_id":4847,"event_guid":"6d9ee2da-4907-415f-84b4-61ecfa783895","weight":19},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":10},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":9},{"event_id":4854,"event_guid":"81125495-9d1d-481a-8c63-0d3ef9ff0617","weight":18},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":12},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":1},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1},{"event_id":4872,"event_guid":"c26fa336-680b-49e5-80e6-24432305e94d","weight":19},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":18},{"event_id":4881,"event_guid":"b4ec41ce-8c36-47a3-87a3-984c111cb2a6","weight":18},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":23},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":41},{"event_id":4890,"event_guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","weight":31},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":19},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":20},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":19},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":19},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":28},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":26},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":24}]},{"guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","title":"Ein Festival der Demokratie","subtitle":"Von Technik, Kollaborationen und Erreichtem zum G20-Gipfel 2017","slug":"34c3-9119-ein_festival_der_demokratie","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9119.html","description":"Erfahrungen und Details zu den zwei kritischen Medienprojekten FC/MC (alternatives Medienzentrum im Herzen der Stadt) und THERE IS NO TIME (Live-Talks am Rande des Sperrgebiets und über die Stadt verteilte Video-Empfangsstationen) und ihrer Kollaboration mit dem VOC zum G20 Gipfel in Hamburg.\n\n\u003cb\u003eInfo\u003c/b\u003e\nAls im Sommer 2016 klar wurde, dass ein in einem Jahr die Avatare der 20 größten Industriestaaten nach Hamburg kommen würden, entwickelten die Gruppen um die Projekte FC/MC und THERE IS NO TIME, zunächst unabhängig und später im Austausch miteinander, zwei komplementäre Medienformate, die den G20-Gipfel begleiten sollten.\nFC/MC als Plattform für kritische Berichterstattung und Bereitstellung von Infrastruktur für diese, TINT mit eigens produzierten Live-Talks, orientiert an den Punkten der offiziellen Gipfelagenda, und einem Netzwerk von Empfangsstationen in der ganzen Stadt.\nBeide Gruppen arbeiteten dabei mit dem VOC und weiteren Hackern aus dem CCC zusammen, um die produzierten Inhalte zu verteilen sowie die Technische infrastruktur für das FCMC zu schaffen.\n\u003cb\u003eWhy tho?\u003c/b\u003e\nErfahrungsgemäß verläuft die Berichterstattung zu Events wie dem G20 oft tendenziös und eng am Narrativ der offiziellen Polizeiberichte. Auch rückblickend ist dies in Anbetracht von Repression und Umgang mit Polizeigewalt ein augenscheinliches Problem. Eine Auseinandersetzung mit den Themen, die beim Gipfel verhandelt werden oder werden sollten, findet in der Regel nicht statt oder verliert sich im Rausch des Spektakels. Sowohl der mangelnden Qualität und der Behinderung von Berichterstattung, als auch dem Fehlen einer verständlichen Auseinandersetzung mit den politischen Inhalten dieses \"Festivals der Demokratie\" wollten wir etwas entgegensetzen.\n\u003cb\u003eProposal\u003c/b\u003e\nIm Talk möchten wir aus unterschiedlichen Perspektiven von unseren Erfahrungen berichten. Von technischen Hürden, von Arbeit in Gruppenstrukturen, von Organisation, Schwierigkeiten und Erfolgen:\nAls FC/MC (mit großem Aufgebot an Infrastruktur und Raum im Herzen von Hamburg) und als TINT (mit einem schwimmenden Studio auf einem Hamburger Kanal und den Relays bis in die Sperrgebiete)\nEs geht darum ein verständliches Bild zu zeichnen von dem, was in Hamburg während und vor dem Gipfel bei uns passiert ist und erreicht wurde. Zum anderen um Erkenntnisse für die Zukunft: Was hat es gebracht und wie können, sollten und wollen wir weiter machen? Dabei wollen wir besonders die Fruchtbarkeit von Kollaborationen dieser Art, in unserem Fall zwischen Aktivist_innen, Künstler_innen und Hacker_innen unterstreichen.","original_language":"deu","persons":["Daniel Möring (TINT Kollektiv)","h01ger","nuriye@thereisnotime.net","maren@nadir.org","Oliver Gemballa"],"tags":["34c3","9119","Resilience"],"view_count":2429,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-04-01T15:45:06.411+02:00","length":3665,"duration":3665,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9119-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9119-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ca89efbd-5061-436d-91e6-1e7e376ee77a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ca89efbd-5061-436d-91e6-1e7e376ee77a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9119-ein_festival_der_demokratie","url":"https://api.media.ccc.de/public/events/ca89efbd-5061-436d-91e6-1e7e376ee77a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":77},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":85},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":104},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":72},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":73},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":77},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":86},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":72},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":78},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":112},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":79},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":96},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":92},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":161},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":179},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":21},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":120},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":21},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":72},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":109},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":187},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":97},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":103},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":161}]},{"guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","title":"Type confusion: discovery, abuse, and protection","subtitle":null,"slug":"34c3-8848-type_confusion_discovery_abuse_and_protection","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8848.html","description":"Type confusion, often combined with use-after-free, is the main attack vector to compromise modern C++ software like browsers or virtual machines. Typecasting is a core principle that enables modularity in C++. For performance, most typecasts are only checked statically, i.e., the check only tests if a cast is allowed for the given type hierarchy, ignoring the actual runtime type of the object. Using an object of an incompatible base type instead of a derived type results in type confusion. Attackers have been abusing such type confusion issues to compromise popular software products including Adobe Flash, PHP, Google Chrome, or Firefox, raising critical security concerns.\n\nWe discuss the details of this vulnerability type and how such vulnerabilities relate to memory corruption. Based on an LLVM-based sanitizer that we developed, we will show how to discover such vulnerabilities in large software through fuzzing and how to protect yourself against this class of bugs.\n\nC++ is popular in large software projects that require both the modularity of object-oriented programming and the high efficiency offered by low-level access to memory and system intrinsics. Examples of such software are Google Chrome, Microsoft Windows, Mozilla Firefox, or Oracle's JVM.  Unfortunately, C++ enforces neither type nor memory safety. This lack of safety leads to type confusion vulnerabilities that can be abused to attack programs.  Type confusion arises when the program interprets an object of one type as an object of a different type due to unsafe typecasting, leading to reinterpretation of memory areas in different contexts.  For instance, a program may cast an instance of a parent class to a descendant class, even though this is not safe if the parent class lacks some of the fields or virtual functions of the descendant class. When the program subsequently uses these fields or functions, it may use data, say, as a regular field in one context and as a virtual function table (vtable) pointer in another. Exploitable type confusion bugs have been found in a wide range of software products, such as Adobe Flash (CVE-2015-3077), Microsoft Internet Explorer (CVE-2015-6184), PHP (CVE-2016-3185), and Google Chrome (CVE-2013-0912). According to Microsoft, type confusion is the 4th most common vulnerability type in their bug bounty program (after use-after-free, memory corruption, and heap out-of-bounds read) with the majority of type confusion bugs also fitting into one of the earlier categories.\n\nWe have developed an extension to the Clang/LLVM compiler that detects type-confusion bugs with low overhead and high coverage. Our prototype consists of two parts: an object tracing facility and typecasting verification. Such an enforcement mechanism is useful as a runtime monitor and online defense mechanism to protect applications against attacks. In a development setting, the mechanism can be combined with a fuzzing framework to detect type confusion before the underlying memory corruption triggers.\n\nIn this talk we will first discuss how type safety protects against type confusion-based attacks. We will then introduce our prototype implementation and show how it actively defeats realistic attacks. Finally, we show how to leverage type safety in a fuzzing framework to find security vulnerabilities faster.  We will release all components as open-source.\n\nWe introduce the concept of a type sanitizer that checks all casts in an application (replacing static casts with fully explicit runtime checks) and show how we have developed a low-overhead framework for these checks. Building on this framework we argue that it can be used as a runtime monitor in an always on configuration to protect users against attacks and how developers, security researchers, and hackers can use it to find new vulnerabilities in real software.\n\nThe expected audience includes people interested in system software, reverse engineering, fuzzing, type confusion-based attacks, and memory corruption-based attacks and their defense mechanisms. General programming and low-level knowledge is expected but the talk will be self contained and does not expect the audience to know the upcoming defense mechanisms or attacks.","original_language":"eng","persons":["gannimo"],"tags":["34c3","8848","Security"],"view_count":1555,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-14T22:30:09.011+01:00","length":3398,"duration":3398,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8848-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8848-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/51b646f8-7afc-46be-8f77-50f7787c1f5d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/51b646f8-7afc-46be-8f77-50f7787c1f5d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8848-type_confusion_discovery_abuse_and_protection","url":"https://api.media.ccc.de/public/events/51b646f8-7afc-46be-8f77-50f7787c1f5d","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":25},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":23},{"event_id":4811,"event_guid":"16c756dd-cb07-4c0e-9885-98243026f7cf","weight":19},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":24},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":25},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":26},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":34},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":25},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":23},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":23},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":18},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":23},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":21},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":34},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":54},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":9},{"event_id":4932,"event_guid":"d30b21b9-726d-4ceb-bc68-6858cd158e36","weight":24}]},{"guid":"07d5227a-169e-4b1e-8123-cd6f2c6445e5","title":"OONI: Let's Fight Internet Censorship, Together!","subtitle":"The Open Observatory of Network Interference","slug":"34c3-8923-ooni_let_s_fight_internet_censorship_together","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8923.html","description":"How can we take a stand against the increasing shadow of Internet censorship? With OONI Probe you can join us in uncovering evidence of network interference!\n\nDuring this talk we will give you an overview of the challenges people around the world face when accessing the internet. In 2017, we have witnessed multiple cases of Internet censorship being used as a tool to suppress controversial political views. We've also seen increasing censorship of conversations between individuals, reflected by the blocks on chat networks like WhatsApp and Signal.\n\nOONI, the Open Observatory of Network Interference is a project for documenting and revealing these violations of Internet Connectivity. In 2017, we released mobile applications, reported on policy changes, expanded our testing to detect throttling, and now process close to 100,000 measurements from over 200 countries each month. We'll share how we're thinking about increasing transparency and accountability around the issues of access and censorship, and how you can join this growing, open, movement.","original_language":"eng","persons":["Arturo Filastò (hellais)"],"tags":["34c3","8923","Resilience"],"view_count":508,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-25T00:15:11.175+01:00","length":1827,"duration":1827,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8923-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8923-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/07d5227a-169e-4b1e-8123-cd6f2c6445e5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/07d5227a-169e-4b1e-8123-cd6f2c6445e5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8923-ooni_let_s_fight_internet_censorship_together","url":"https://api.media.ccc.de/public/events/07d5227a-169e-4b1e-8123-cd6f2c6445e5","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":12},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":7},{"event_id":4792,"event_guid":"6abb1f81-c163-4382-8838-8b684147d10c","weight":24},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":25},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":8},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":7},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":18},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":7},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":19},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":23},{"event_id":4867,"event_guid":"8d87b905-24e0-461e-bff8-d122207ea2e4","weight":31},{"event_id":4869,"event_guid":"d86672a7-22fc-44a1-b6d3-20fd9bb51cfa","weight":17},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":7},{"event_id":4873,"event_guid":"8453f8f1-d934-4d10-bcfa-a857fa65b8df","weight":21},{"event_id":4874,"event_guid":"68a0f7fd-fb06-4447-b6eb-da17b998d240","weight":7},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":19},{"event_id":4877,"event_guid":"fef3624a-9732-4fdd-bae4-aa2ab0c5b5dc","weight":14},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":15},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":33},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":24},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":26},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":19},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":14}]},{"guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","title":"DPRK Consumer Technology","subtitle":"Facts to fight lore","slug":"34c3-9279-dprk_consumer_technology","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9279.html","description":"The DPRK has largely succeeded at hiding its consumer technology. While versions of the desktop operating system, Red Star, have leaked, the mobile equivalent hasn't, and there remains little knowledge of the content available on the intranet. Let's fix that!","original_language":"eng","persons":["Will Scott","Gabe Edwards"],"tags":["34c3","9279","Security"],"view_count":5330,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-20T22:15:06.694+01:00","length":1887,"duration":1887,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9279-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9279-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/22027440-b3fb-49d5-a35b-b86e7d77cfb9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/22027440-b3fb-49d5-a35b-b86e7d77cfb9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9279-dprk_consumer_technology","url":"https://api.media.ccc.de/public/events/22027440-b3fb-49d5-a35b-b86e7d77cfb9","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":103},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":172},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":98},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":206},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":145},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":144},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":130},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":164},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":223},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":105},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":177},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":219},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":147},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":222},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":274},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":176},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":127},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":150},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":127},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":121},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":123}]},{"guid":"da934433-0092-4749-b606-56b65e84214f","title":"Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit","subtitle":"Warum das Laden eines Elektroautos unsicher ist","slug":"34c3-9092-ladeinfrastruktur_fur_elektroautos_ausbau_statt_sicherheit","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9092.html","description":"Wir retten das Klima mit Elektroautos — und bauen die Ladeinfrastruktur massiv aus. Leider werden dabei auch Schwachstellen auf allen Ebenen sichtbar: Von fehlender Manipulationssicherheit der Ladesäulen bis hin zu inhärent unsicheren Zahlungsprotokollen und kopierbaren Zahlkarten. Ladesäulenhersteller und Ladenetzbetreiber lassen ihre Kunden im Regen stehen — geht das schnelle Wachstum des Marktanteils zu Lasten der Kundensicherheit?","original_language":"deu","persons":["Mathias Dalheimer"],"tags":["34c3","9092","Security"],"view_count":26108,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-04-04T22:30:09.669+02:00","length":3174,"duration":3174,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9092-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9092-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/da934433-0092-4749-b606-56b65e84214f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/da934433-0092-4749-b606-56b65e84214f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9092-ladeinfrastruktur_fur_elektroautos_ausbau_statt_sicherheit","url":"https://api.media.ccc.de/public/events/da934433-0092-4749-b606-56b65e84214f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2938,"event_guid":"03c8501f-d327-4228-a9fe-2635370d25d2","weight":101},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":1843},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1633},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":729},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":777},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1942},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":245},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":120},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":600},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":152},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":99},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":212},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":290},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":164},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":146},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":247},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":246},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":792},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":98},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1548},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":531},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":86},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":923},{"event_id":4801,"event_guid":"043eab4c-751b-4f60-b849-daa81cd83997","weight":89},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":173},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":324},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":126},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":89},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":75},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1066},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":415},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":110},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":365},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":146},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":139},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":224},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":296},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":273},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1335},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":289},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":875},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":216},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":210},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":113},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":637},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":103},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":130},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":141},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":115},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":109}]},{"guid":"57d3ba9e-49c8-440e-a30a-c0297204848a","title":"Making Experts Makers and Makers Experts","subtitle":null,"slug":"34c3-8814-making_experts_makers_and_makers_experts","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8814.html","description":"Over the past year, we have been developing open source wheelchair add-ons through user research, ideation, design, prototyping and testing. We present the outcome and insights from the process.","original_language":"eng","persons":["Daniel Wessolek","Isabelle Dechamps"],"tags":["34c3","8814","Hardware \u0026 Making"],"view_count":610,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2025-12-28T16:45:12.893+01:00","length":1994,"duration":1994,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8814-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8814-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/57d3ba9e-49c8-440e-a30a-c0297204848a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/57d3ba9e-49c8-440e-a30a-c0297204848a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8814-making_experts_makers_and_makers_experts","url":"https://api.media.ccc.de/public/events/57d3ba9e-49c8-440e-a30a-c0297204848a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":22},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":18},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":14},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":14},{"event_id":4783,"event_guid":"79c1ee55-8004-4dcd-9282-9f7acae9c94a","weight":23},{"event_id":4789,"event_guid":"684193b5-696e-495f-88eb-04f8d3114e01","weight":23},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":20},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":28},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":19},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":27},{"event_id":4806,"event_guid":"af131b56-3423-4f8a-87ff-79b9f21e0656","weight":21},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":34},{"event_id":4815,"event_guid":"f6265504-14b2-41e6-a134-6fec8c00cee4","weight":23},{"event_id":4816,"event_guid":"1d7b2355-60b1-453c-bf0e-64228466d2cc","weight":24},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":47},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":18},{"event_id":4846,"event_guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","weight":21},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":23},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":22}]},{"guid":"d30b21b9-726d-4ceb-bc68-6858cd158e36","title":"Public FPGA based DMA Attacking","subtitle":null,"slug":"34c3-9111-public_fpga_based_dma_attacking","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9111.html","description":"Most thought Direct Memory Access (DMA) attacks were a thing of the past after CPU vendors introduced IOMMUs and OS vendors blocked Firewire DMA. At least until the PCILeech direct memory access attack toolkit was presented a year ago and quickly became popular amongst red teamers and governments alike.\n\nA year later the situation has improved but some firmware and operating systems still remain vulnerable by default. The hardware used to perform the attacks was however limited both in capabilities and supply. FPGA support was introduced and made available to the public to overcome these problems. In this talk I will subvert kernels, defeat full disk encryption and spawn system shells - all by using affordable publically available FPGAs and open source software!","original_language":"eng","persons":["Ulf Frisk"],"tags":["34c3","9111","Hardware \u0026 Making"],"view_count":2030,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-31T01:00:00.000+01:00","updated_at":"2026-03-27T21:45:07.029+01:00","length":1886,"duration":1886,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9111-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9111-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/d30b21b9-726d-4ceb-bc68-6858cd158e36-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/d30b21b9-726d-4ceb-bc68-6858cd158e36-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9111-public_fpga_based_dma_attacking","url":"https://api.media.ccc.de/public/events/d30b21b9-726d-4ceb-bc68-6858cd158e36","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":16},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":34},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":19},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":17},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":24},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":15},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":54},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":36},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":19},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":20},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":21},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":22},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":33},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":3},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":15},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":21},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":27},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":24},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":24},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":29},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":28},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":3},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":43}]},{"guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","title":"Deconstructing a Socialist Lawnmower","subtitle":"Obsolete Technologies + Critical Material Studies in Media Art","slug":"34c3-9288-deconstructing_a_socialist_lawnmower","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9288.html","description":"Darsha Hewitt is a Canadian artist working in new media and sound. She is known for her examinations of communication technology in the domestic sphere and her use of DIY aesthetics and practices as an artistic method. She makes electromechanical sound installations, drawings, audio-visual works, how-to videos and experimental performances with handmade electronics. Through deconstruction and experimentation with failed and obsolete technology, her work demystifies hidden systems within machines as a way to trace-out structures of economy, power and control embedded throughout capitalist culture.\n\nAlongside her artistic practice, Darsha is presently a fellow at the Berlin Centre for Advanced Studies in Arts and Sciences (BAS) in the Graduate School at the Art University of Berlin and a Guest Professor in New Media and Sound Art at the Karlsruhe University of Art and Design. From 2015-16 she shared a joint guest professorship in New Media with Aram Bartholl at the Art University of Kassel. She is also a Lecturer in the Media Arts Environments  Research Chair at the Bauhaus University Weimar. Her do-it-yourself electronics workshops are an integral part of her discipline and are presented internationally. Her work in this field was a subject in the Music, Digitization, Mediation: Towards Interdisciplinary Music Studies project based in the Faculty of Music at Oxford University. Darsha is a collaborating facilitator of the Music Makers Hack Lab with Create Digital Music .","original_language":"eng","persons":["Darsha Hewitt"],"tags":["34c3","9288","Art \u0026 Culture"],"view_count":784,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-04-22T18:00:03.300+02:00","length":3413,"duration":3413,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9288-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9288-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/bb975ea3-1b67-4a0d-a166-48f435dc9515-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/bb975ea3-1b67-4a0d-a166-48f435dc9515-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9288-deconstructing_a_socialist_lawnmower","url":"https://api.media.ccc.de/public/events/bb975ea3-1b67-4a0d-a166-48f435dc9515","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":31},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":15},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":22},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":36},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":13},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":22},{"event_id":4857,"event_guid":"5cbe3344-f83a-492d-afc2-f1697959ff5e","weight":31},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":22},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":37},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":7},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":26},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":32},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":25},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":36},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":6},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":28},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":16},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":32},{"event_id":4908,"event_guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","weight":25},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":20},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":19},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":22},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":18},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":36},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":22}]},{"guid":"043eab4c-751b-4f60-b849-daa81cd83997","title":"Bildung auf dem Weg ins Neuland","subtitle":null,"slug":"34c3-9194-bildung_auf_dem_weg_ins_neuland","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9194.html","description":"An unseren Schulen besteht ein großes Defizit hinsichtlich der Vermittlung digitaler Mündigkeit. Da mittlerweile weitgehender Konsens besteht, dass an Schulen bezüglich digitaler Technologien mehr passieren muss, reagiert die Bildungspolitik und integriert neue Medien in die Bildungspläne. Auf Basis unserer Erfahrungen, die wir im Rahmen vom Chaos Macht Schule gesammelt haben, diskutieren wir die aktuellen bildungspolitischen Entwicklungen.","original_language":"deu","persons":["benni","dorina","steffen"],"tags":["34c3","9194","CCC"],"view_count":2907,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-01T17:00:05.110+02:00","length":3608,"duration":3608,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9194-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9194-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/043eab4c-751b-4f60-b849-daa81cd83997-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/043eab4c-751b-4f60-b849-daa81cd83997-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9194-bildung_auf_dem_weg_ins_neuland","url":"https://api.media.ccc.de/public/events/043eab4c-751b-4f60-b849-daa81cd83997","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":82},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":78},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":89},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":130},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":138},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":81},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":138},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":143},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":130},{"event_id":4804,"event_guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","weight":81},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":343},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":164},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":111},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":119},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":121},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":118},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":94},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":78},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":124},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":115},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":89}]},{"guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","title":"Organisational Structures for Sustainable Free Software Development","subtitle":null,"slug":"34c3-9087-organisational_structures_for_sustainable_free_software_development","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9087.html","description":"What kind of organisational structures exist for free software projects? What funding sources? How can you avoid pitfalls with funding, support volunteers, and stay a happy family?\n\nWe will look at various options for structuring projects on an organisational level, the protections (and dangers) of legal entities, and the difficulties of meeting the expectations of financial backers while keeping the volunteers and the community alive. Moritz will draw from his experience with dozens of Free Software projects and funding sources, both from the perspective of a funder and as recipient of grants, contracts and donations. ","original_language":"eng","persons":["mo"],"tags":["34c3","9087","Resilience"],"view_count":471,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-11-11T12:00:07.016+01:00","length":1911,"duration":1911,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9087-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9087-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/15858ba2-f109-48f3-9934-a4362a0f5e78-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/15858ba2-f109-48f3-9934-a4362a0f5e78-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9087-organisational_structures_for_sustainable_free_software_development","url":"https://api.media.ccc.de/public/events/15858ba2-f109-48f3-9934-a4362a0f5e78","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":15},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":17},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":6},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":14},{"event_id":4890,"event_guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","weight":16},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":4},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":10},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":9},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":19},{"event_id":4906,"event_guid":"85d76a77-0d89-4820-8d99-8c5a8509eb24","weight":14},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":31},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":19},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":25},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":20},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":50},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":14},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":16},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":22},{"event_id":4927,"event_guid":"edfd7686-0117-43c4-8e42-030408de5e91","weight":14},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":19},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":30},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":4}]},{"guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","title":"Tiger, Drucker und ein Mahnmal","subtitle":"Neues vom Zentrum für Politische Schönheit","slug":"34c3-8896-tiger_drucker_und_ein_mahnmal","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8896.html","description":"Flüchtlingsfressende Tiger in Berlin, zum Diktatorensturz aufrufende Flugblätter in Istanbul und ein Mahnmal das den Rechtsextremisten Björn Höcker in seinem Thüringer Dorf heimsucht: Viel ist geschehen, seit das Zentrum für Politische Schönheit vor 3 Jahren auf dem Kongress gesprochen hat. \n\nGrund genug mal wieder Bericht zu erstatten, aus dem Nähkästchen zu plaudern und unveröffentlichtes Material mit euch zu begutachten. Aber Vorsicht: das ZPS ist die einzige Organisation die von Björn Höcke das Gütesiegel \"terroristische Vereinigung\" verliehen bekommen hat. Es könnte also lustig werden.\n","original_language":"deu","persons":["Stefan Pelzer","Philipp Ruch","Morius Enden"],"tags":["34c3","8896","Ethics, Society \u0026 Politics"],"view_count":10020,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2018-01-04T01:00:00.000+01:00","updated_at":"2026-03-22T20:30:06.089+01:00","length":3645,"duration":3645,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8896-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8896-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/fa2a2506-f54d-4e3f-9fc2-e808d0a580b6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/fa2a2506-f54d-4e3f-9fc2-e808d0a580b6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8896-tiger_drucker_und_ein_mahnmal","url":"https://api.media.ccc.de/public/events/fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":848},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":152},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":138},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":109},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":48},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":116},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":69},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":44},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":59},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":80},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":67},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":41},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":191},{"event_id":4805,"event_guid":"ed1d9ef6-23e1-4213-be8d-b97625ff20da","weight":49},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":73},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":157},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":82},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":94},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":93},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":191},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":47},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":175},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":175},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":271},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":46},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":59},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":141},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":123},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":54},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":169},{"event_id":4934,"event_guid":"4d3d9d56-7617-44da-b620-21ce5389a0b2","weight":136},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":194}]},{"guid":"832b8fb8-beb1-4d92-93d0-ba3b7568905a","title":"Growing Up Software Development","subtitle":"From Hacker Culture to the Software of the Future","slug":"34c3-9044-growing_up_software_development","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9044.html","description":"Hacker culture overcomes limitations in computer systems through creativity and tinkering.  At the same time, hacker culture has shaped the practice of software development to this day.  This is problematic - techniques effective for breaking (into) a computer systems are not necessarily suitable for developing resilient and secure systems.  It does not have to be this way: We can approach software development as a methodical, systematic activity rather than tinkering, and teach it accordingly.  I'll review my experience teaching these methods for the past 18 years and give some suggestions on what *you* may do.\n\nHacker culture, which originated CCC (or vice versa?), overcomes limitations in computer systems through creativity and tinkering. Many activities of the hacker community have focussed on discovering weaknesses of IT systems, and creativity and tinkering have been enormously successful at this endeavour.  At the same time, hacker culture has shaped the practice of software development to this day. This is problematic - techniques effective for breaking (into) a computer systems are not necessarily suitable for developing resilient and secure systems.  The long, long list of vulnerabilities with always the same root causes bears testament to this.  Thus, ironically, the very techniques hackers have used to discover and fight vulnerabilities are responsible for them in the first place.\n\nIt does not have to be this way: It is possible to construct resilient software systematically, greatly reducing the risk of failure. However, this requires significant changes in culture, methodology, and the tools we use to develop software.  We need to approach software development as a methodical, systematic activity rather than tinkering, and teach it accordingly.  This will lead to a set of systematic, proven methods that lead to robust and correct software. This talk will introduce available methods, tools, and languages supporting such methodologies: program by design, type-based modelling, mathematics, and functional programming.  I'll review my experience teaching these methods for the past 18 years and give some suggestions on what *you* may do.","original_language":"eng","persons":["Mike Sperber"],"tags":["34c3","9044","Resilience"],"view_count":1973,"promoted":false,"date":"2017-12-28T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-03-15T09:30:05.252+01:00","length":1895,"duration":1895,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9044-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9044-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/832b8fb8-beb1-4d92-93d0-ba3b7568905a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/832b8fb8-beb1-4d92-93d0-ba3b7568905a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9044-growing_up_software_development","url":"https://api.media.ccc.de/public/events/832b8fb8-beb1-4d92-93d0-ba3b7568905a","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":65},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":72},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":44},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":59},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":62},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":68},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":40},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":53},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":103},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":57},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":65},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":70},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":78},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":55},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":83},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":58},{"event_id":4849,"event_guid":"9ba995df-b1ca-402d-b1c8-c21e5faacd3b","weight":67},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":47},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":64},{"event_id":4861,"event_guid":"bdccda64-ee80-43fb-8e56-931199444188","weight":53},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":177},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":59}]},{"guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","title":"Designing PCBs with code","subtitle":"Is designing circuits with code instead of CAD the future of electronic design automation?","slug":"34c3-8818-designing_pcbs_with_code","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8818.html","description":"An overview and history of various tools and languages that allow you to use code rather than CAD software to design circuits. \n\nFor anyone used to expressing their ideas with code using a CAD tool to design electronics can be an even more frustrating exercise than normal. If you are a programmer thinking about getting into designing circuits or if you have ever thought \"I could easily solve this with a for-loop\" when using KiCad then this talk is for you.\n\nWe will cover the short history of ideas of using code to describe electronic circuits and culminate in some of the presenter's own experiments in this area.","original_language":"eng","persons":["Kaspar"],"tags":["34c3","8818","Hardware \u0026 Making"],"view_count":1671,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-01-12T15:00:23.316+01:00","length":1273,"duration":1273,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8818-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8818-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/f552b4b5-7446-4cc4-836b-0aa3639b994f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/f552b4b5-7446-4cc4-836b-0aa3639b994f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8818-designing_pcbs_with_code","url":"https://api.media.ccc.de/public/events/f552b4b5-7446-4cc4-836b-0aa3639b994f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":84},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":93},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":56},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":60},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":118},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":91},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":94},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":66},{"event_id":4845,"event_guid":"c21cb389-aba3-4eaa-ba1f-76f966b1686e","weight":88},{"event_id":4852,"event_guid":"77aaf0be-d2a8-4531-be02-c91c19b1ca77","weight":88},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":76},{"event_id":4856,"event_guid":"c5bfac96-8290-438a-a47a-ebdbf0ab5365","weight":83},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":97},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":127},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":73},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":56}]},{"guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","title":"institutions for Resolution Disputes","subtitle":"Rosa Menkman investigates video compression, feedback, and glitches","slug":"34c3-9286-institutions_for_resolution_disputes","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9286.html","description":"The institutions of Resolution Disputes [iRD] call attention to media resolutions. While a ’resolution’ generally simply refers to a standard (measurement) embedded in the technological domain, the iRD reflect on the fact that a resolution is indeed a settlement (solution), but at the same time a space of compromise between different actors (objects, materialities and protocols) who dispute their stakes (framerate, number of pixels etc.) within the growing digital territories.\n\nRosa Menkman is a Dutch artist, curator and researcher. In 2011 Menkman wrote the Glitch Moment/um, a little book on the exploitation and popularization of glitch artifacts (published by the Institute of Network Cultures), co-facilitated the GLI.TC/H  festivals in both Chicago and Amsterdam and curated the Aesthetics symposium of Transmediale 2012.","original_language":"eng","persons":["Rosa Menkman"],"tags":["34c3","9286","Art \u0026 Culture"],"view_count":353,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2026-03-14T03:45:04.974+01:00","length":2019,"duration":2019,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9286-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9286-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/d8db120c-29f7-48f6-b9de-27ea8d1e9a9b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/d8db120c-29f7-48f6-b9de-27ea8d1e9a9b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9286-institutions_for_resolution_disputes","url":"https://api.media.ccc.de/public/events/d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":5},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":3},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":3},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":5},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":17},{"event_id":4894,"event_guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","weight":20},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":18},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":17},{"event_id":4910,"event_guid":"264c9958-ba75-487e-b23f-703e837336de","weight":17},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":15},{"event_id":4915,"event_guid":"15858ba2-f109-48f3-9934-a4362a0f5e78","weight":25},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":7},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":17},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":17},{"event_id":4922,"event_guid":"02489143-0b78-4302-9603-605d1c674fbb","weight":26},{"event_id":4923,"event_guid":"58ffa60d-607b-405f-9363-213097ef3920","weight":13},{"event_id":4924,"event_guid":"51b646f8-7afc-46be-8f77-50f7787c1f5d","weight":16},{"event_id":4925,"event_guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","weight":17},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":12},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":23},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":22}]},{"guid":"a13dc0d2-55af-4b60-a07c-1786094da593","title":"How risky is the software you use? ","subtitle":"CITL: Quantitative, Comparable Software Risk Reporting","slug":"34c3-9225-how_risky_is_the_software_you_use","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9225.html","description":"\u003cp\u003eSoftware vendors like to claim that their software is secure, but the effort and techniques applied to this end vary significantly across the industry. From an end-user's perspective, how do you identify those vendors who are effective at securing their software? From a vendor's perspective, how do you identify those techniques which are effective at improving security? Presenting joint work with Sarah Zatko, mudge, Patrick Stach, and Parker Thompson.\u003c/p\u003e","original_language":"eng","persons":["Tim Carstens","Parker Thompson"],"tags":["34c3","9225","Ethics, Society \u0026 Politics"],"view_count":3029,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-03-07T01:15:04.954+01:00","length":3530,"duration":3530,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9225-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9225-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a13dc0d2-55af-4b60-a07c-1786094da593-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a13dc0d2-55af-4b60-a07c-1786094da593-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9225-how_risky_is_the_software_you_use","url":"https://api.media.ccc.de/public/events/a13dc0d2-55af-4b60-a07c-1786094da593","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":284},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":366},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":245},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":332},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":347},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":371},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":129},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":195},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":138},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":168},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":152},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":88},{"event_id":4781,"event_guid":"44e7cb13-011e-4242-b26a-1edf4ac15b83","weight":82},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":84},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":142},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":99},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":111},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":173},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":86},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":86},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":88},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":197},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":82},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":116}]},{"guid":"39564fce-b35b-4f9e-a976-ef71c1fa21e8","title":"This is NOT a proposal about mass surveillance!","subtitle":"Analysing the terminology of the UK’s  Snooper’s Charter","slug":"34c3-9176-this_is_not_a_proposal_about_mass_surveillance","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9176.html","description":"In November 2016 the UK has passed the Investigatory Powers Act (aka Snooper’s Charter). This act unprecedentedly extends surveillance powers of the state –  p.e. legalising the hacking of devices or forcing Internet Service Providers to collect web browsing histories – one does not even need to be suspected of a crime. This talk investigates the choice of words of the parliamentary debates and reveals how euphemistic and understating terminology discloses the extent of surveillance and justifies the causeless intrusion into everyone’s privacy. \n\n\nMuch research has been dedicated to analysing the rhetorics of political discourse but this talk focuses on the semantics of surveillance discourse from a corpus linguistic perspective. Corpus linguistics is the study of language based on examples of real life language use and works with large amount of data.  In this talk I will analyse the context of keywords which are used in the parliamentary debates and the respective media coverage concerning the passing of the Snooper’s Charter. Using methods of corpus linguistics I want to show how central terms are constructed entirely different in these two spheres. While newspaper articles present the inconvenient consequences of this legislation and classify the proposed measures in categories which are familiar to the reader, the parliamentary debates open up new categories for practices known as mass surveillance and deny the existence of the latter. Let me assure you that this does not meet the criteria of doublethink...","original_language":"eng","persons":["Lisa"],"tags":["34c3","9176","Ethics, Society \u0026 Politics"],"view_count":746,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-12-30T12:15:13.706+01:00","length":2609,"duration":2609,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9176-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9176-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/39564fce-b35b-4f9e-a976-ef71c1fa21e8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/39564fce-b35b-4f9e-a976-ef71c1fa21e8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9176-this_is_not_a_proposal_about_mass_surveillance","url":"https://api.media.ccc.de/public/events/39564fce-b35b-4f9e-a976-ef71c1fa21e8","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":24},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":39},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":20},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":33},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":18},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":31},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":50},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":30},{"event_id":4862,"event_guid":"82d8204a-7147-452d-b5a3-91969e3a3ac6","weight":25},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":27},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":26},{"event_id":4891,"event_guid":"2dd1ed02-2a4f-4c15-93e5-6d171fea74df","weight":9},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":28},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":29},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":14},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":25},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":24},{"event_id":4907,"event_guid":"1a4ac7bc-1ca5-4674-a736-38d796b0c36a","weight":36},{"event_id":4916,"event_guid":"57f82be5-77f2-46aa-ba55-94e922e6cb77","weight":26},{"event_id":4918,"event_guid":"ad3d2b65-ce5b-4c18-bf9d-1f56942aa0d3","weight":31},{"event_id":4928,"event_guid":"4042ac64-4a70-482f-a527-c5509f7694b9","weight":24},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":41},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":25},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":22}]},{"guid":"0cccbcdd-1e5c-4457-883b-6141c04d754c","title":"Science is broken","subtitle":"How much can we trust science in light failed replications, bogus results and widespread questionable research practices?","slug":"34c3-9055-science_is_broken","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9055.html","description":"We're supposed to trust evidence-based information in all areas of life. However disconcerting news from several areas of science must make us ask how much we can trust scientific evidence.","original_language":"eng","persons":["hanno"],"tags":["34c3","9055","Science"],"view_count":3078,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-04-01T23:45:06.813+02:00","length":1845,"duration":1845,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9055-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9055-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/0cccbcdd-1e5c-4457-883b-6141c04d754c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/0cccbcdd-1e5c-4457-883b-6141c04d754c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9055-science_is_broken","url":"https://api.media.ccc.de/public/events/0cccbcdd-1e5c-4457-883b-6141c04d754c","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":125},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":182},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":101},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":117},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":102},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":123},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":112},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":161},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":107},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":105},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":148},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":143},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":124},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":137},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":197},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":104},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":153},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":109},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":99}]},{"guid":"e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","title":"Ensuring Climate Data Remains Public","subtitle":null,"slug":"34c3-9063-ensuring_climate_data_remains_public","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9063.html","description":"How do we keep important environmental and climate data accessible amidst political instability and risk? What even counts as an “accessible” dataset? Could we imagine better infrastructures for vital data? By describing the rapid data preservation efforts of U.S. environmental data that started in the wake of the recent election, I’ll address these questions and the new and existing issues that preservation surfaced about the vulnerability of data infrastructures. I'll focusing on specific projects, including the work of EDGI, that is trying to address these challenges by creating alternate forms of access and infrastructure!\n\nClimate change data often relies on state-supported scientific research infrastructure-- ranging from agency data centres, satellites, and the compute clusters powering climate, air, and water modelling. Days after the 2016 US election, scholars and activists mobilized to preserve both environmental data and the research infrastructure generating it. While rapid data preservation efforts encouraged many people to act, we are faced with long-standing vulnerabilities in data infrastructure.\n\nIn this talk I will describe the range of groups involved in data preservation efforts that have been ongoing since November 2016, unpack some of the recent and long-standing issues with data preservation, and speak to the ways people are actively addressing these challenges. In particular, I’ll talk about an organization I am a member of, the Environmental Data and Governance Initiative (EDGI), a distributed network of academics and non-profits that has engaged in a range of projects including guerilla archiving of federal datasets, ongoing monitoring of content changes on environmental and energy websites, and contributing to growing conversations around Environmental Data Justice.","original_language":"eng","persons":["dcwalk"],"tags":["34c3","9063","Science"],"view_count":339,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2024-10-01T09:15:03.179+02:00","length":1669,"duration":1669,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9063-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9063-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9063-ensuring_climate_data_remains_public","url":"https://api.media.ccc.de/public/events/e22f47ae-a45d-4e01-8e4b-fcfd1e6585d4","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":18},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":14},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":9},{"event_id":4864,"event_guid":"6dcdb702-ce9b-4351-aab9-2a2ac3780a17","weight":5},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":23},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":12},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":11},{"event_id":4886,"event_guid":"eaf5d978-ea98-4474-9d40-7f493167d26d","weight":19},{"event_id":4887,"event_guid":"2541602b-f58c-4dec-9722-db72b1dea19e","weight":24},{"event_id":4889,"event_guid":"8b136e88-ea36-4398-bac2-13cf2a509d5e","weight":28},{"event_id":4890,"event_guid":"f64a902e-db0e-4a8e-b5b7-b6e3136a4dea","weight":27},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":9},{"event_id":4896,"event_guid":"44949d62-284f-46b6-ad7b-2359aa1f7a0b","weight":21},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":11},{"event_id":4899,"event_guid":"c297bff4-55ca-473c-afef-0064970a47b2","weight":21},{"event_id":4900,"event_guid":"e4eaa421-652a-4309-9e04-fe46aa3da50d","weight":18},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":8},{"event_id":4914,"event_guid":"d8db120c-29f7-48f6-b9de-27ea8d1e9a9b","weight":20},{"event_id":4925,"event_guid":"d9421381-5934-46ba-9fe8-3f4cc0a3f187","weight":19}]},{"guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","title":"Demystifying Network Cards","subtitle":"Things you always wanted to know about NIC drivers","slug":"34c3-9159-demystifying_network_cards","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9159.html","description":"Network cards are often seen as black boxes: you put data in a socket on one side and packets come out at the other end - or the other way around.\nLet's have a deeper look at how a network card actually works at the lower levels by writing a simple user space driver from scratch for a 10 Gbit/s NIC.\n","original_language":"eng","persons":["Paul Emmerich"],"tags":["34c3","9159","Hardware \u0026 Making"],"view_count":13629,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-27T01:00:00.000+01:00","updated_at":"2026-04-02T21:00:04.977+02:00","length":1889,"duration":1889,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9159-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9159-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/19b7e5d7-bba7-46da-afbc-f16d43fe395f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/19b7e5d7-bba7-46da-afbc-f16d43fe395f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9159-demystifying_network_cards","url":"https://api.media.ccc.de/public/events/19b7e5d7-bba7-46da-afbc-f16d43fe395f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":852},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1132},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":777},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":776},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":862},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":347},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":129},{"event_id":4770,"event_guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","weight":608},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":238},{"event_id":4774,"event_guid":"6588e4a4-d0ac-4082-ad9e-7a13329217ee","weight":92},{"event_id":4776,"event_guid":"825add58-9218-4afe-a489-4dd8c4408e45","weight":113},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":199},{"event_id":4778,"event_guid":"34fb21bd-34f5-40cc-b081-7fc427c452b6","weight":93},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":546},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":107},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":588},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":143},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":316},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":583},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":206},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":702},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":566},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":160},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":275},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":237},{"event_id":4812,"event_guid":"7edaed35-e938-4a13-b21c-aac4bb0ebf94","weight":218},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":103},{"event_id":4817,"event_guid":"be19fbe3-e825-4e67-93f9-a6aeda2e31af","weight":175},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":124},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":197},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":904},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":250},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":242},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":450},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":722},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":142},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":138},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":245},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":344},{"event_id":4860,"event_guid":"f552b4b5-7446-4cc4-836b-0aa3639b994f","weight":93},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":579},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":218},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":283},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":175},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":96},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":147},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":424},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":142},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":508}]},{"guid":"a890dbd3-8859-4788-a72f-ded5c5c08e5f","title":"Gamified Control?","subtitle":"China's Social Credit Systems","slug":"34c3-8874-gamified_control","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8874.html","description":"In 2014 China’s government announced the implementation of big data based social credit systems (SCS). The SCS will rate online and offline behavior to create a score for each user. One of them is planned to become mandatory in 2020. This lecture will review the current state of governmental and private SCS and different aspects of these systems.","original_language":"eng","persons":["Katika Kühnreich"],"tags":["34c3","8874","Ethics, Society \u0026 Politics"],"view_count":16469,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-28T08:45:06.313+01:00","length":2369,"duration":2369,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8874-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8874-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/a890dbd3-8859-4788-a72f-ded5c5c08e5f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/a890dbd3-8859-4788-a72f-ded5c5c08e5f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8874-gamified_control","url":"https://api.media.ccc.de/public/events/a890dbd3-8859-4788-a72f-ded5c5c08e5f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":683},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1070},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":600},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":584},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":608},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":727},{"event_id":4768,"event_guid":"a13dc0d2-55af-4b60-a07c-1786094da593","weight":195},{"event_id":4769,"event_guid":"c9ae7564-9156-4d31-9f8a-168793a1bb18","weight":175},{"event_id":4772,"event_guid":"0ff9c9c4-a561-4ec0-afa2-93647a740f26","weight":262},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":252},{"event_id":4779,"event_guid":"544e7736-6b59-4c05-87a7-c013ef993688","weight":511},{"event_id":4780,"event_guid":"af65b0d3-5e43-49e3-9ec0-c225f6c57d46","weight":159},{"event_id":4782,"event_guid":"de1b5916-8052-4a25-bded-25d96a43aff7","weight":210},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":271},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":339},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":635},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":145},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":694},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":359},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":581},{"event_id":4802,"event_guid":"4f8ec815-f761-4fb5-a786-a9d29cc34d17","weight":156},{"event_id":4808,"event_guid":"acab4111-aba7-44f7-b56e-ef805dcacd00","weight":460},{"event_id":4821,"event_guid":"aed02b65-9a16-4a42-ac28-2883da680d0a","weight":134},{"event_id":4823,"event_guid":"bf924a39-2860-4e27-8741-b8fa0c010363","weight":135},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1008},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":363},{"event_id":4831,"event_guid":"f068c5df-f969-4206-befb-540326e3d053","weight":153},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":267},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":255},{"event_id":4838,"event_guid":"59c664ea-425d-44e0-957c-09317cbfd382","weight":169},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":193},{"event_id":4850,"event_guid":"949bee69-3be0-4cc8-915b-5f1167141dcc","weight":296},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":214},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":594},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":202},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":326},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":153},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":255},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":446}]},{"guid":"edfd7686-0117-43c4-8e42-030408de5e91","title":"Lightning Talks Day 4","subtitle":null,"slug":"34c3-9258-lightning_talks_day_4","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9258.html","description":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!\n\nTo get involved and learn more about what is happening please visit the Lightning Talks Wikipage at \u003ca href=\"https://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\"\u003ehttps://events.ccc.de/congress/2017/wiki/index.php/Static:Lightning_Talks\u003c/a\u003e","original_language":"eng","persons":["gedsic","bigalex"],"tags":["34c3","9258","CCC"],"view_count":1055,"promoted":false,"date":"2017-12-30T00:00:00.000+01:00","release_date":"2017-12-30T01:00:00.000+01:00","updated_at":"2025-01-08T11:45:05.869+01:00","length":7379,"duration":7379,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9258-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9258-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/edfd7686-0117-43c4-8e42-030408de5e91-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/edfd7686-0117-43c4-8e42-030408de5e91-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9258-lightning_talks_day_4","url":"https://api.media.ccc.de/public/events/edfd7686-0117-43c4-8e42-030408de5e91","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":19},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":19},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":22},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":31},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":114},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":33},{"event_id":4902,"event_guid":"c02bcac2-4df7-4264-83e3-c7277913cbd8","weight":21},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":31},{"event_id":4905,"event_guid":"e145a0be-1450-4e31-a493-4db81c970f08","weight":20},{"event_id":4913,"event_guid":"aa99c1b2-80cf-4a67-8106-55e7a097294e","weight":25},{"event_id":4917,"event_guid":"9e774be1-eb68-4ccc-94bd-a65f9abd752d","weight":19},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":20},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":28},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":45},{"event_id":4930,"event_guid":"9a0efbf6-94d6-4c86-864c-caa1f3e929c7","weight":36},{"event_id":4931,"event_guid":"8720ee73-f47b-4594-bfab-26206c0d6cfc","weight":22},{"event_id":4939,"event_guid":"439d7085-4f24-45ac-843f-987f89c4446d","weight":62}]}]}