{"acronym":"37c3","aspect_ratio":"16:9","updated_at":"2026-04-04T12:30:05.420+02:00","title":"37C3: Unlocked","schedule_url":"","slug":"congress/2023","event_last_released_at":"2024-03-22T00:00:00.000+01:00","link":"https://events.ccc.de/congress/2023/","description":"The 37th Chaos Communication Congress (37C3) takes place in Hamburg, 27.-30.12.2023, and is the 2023 edition of the annual four-day conference on technology, society and utopia organised by the Chaos Computer Club (CCC) and volunteers.\r\n\r\nCongress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.","webgen_location":"congress/2023","logo_url":"https://static.media.ccc.de/media/congress/2023/logo.png","images_url":"https://static.media.ccc.de/media/congress/2023","recordings_url":"https://cdn.media.ccc.de/congress/2023","url":"https://api.media.ccc.de/public/conferences/37c3","events":[{"guid":"611fb5d7-cd0d-436e-8713-ccee10ea375b","title":"Rettet uns die KI?","subtitle":"Über die Zukunft der digitalen Inklusion","slug":"37c3-12157-rettet_uns_die_ki","link":"https://events.ccc.de/congress/2023/hub/event/rettet_uns_die_ki/","description":"Spätestens seit Ende 2022 sind generative KI-Systeme wie ChatGPT und Midjourney in aller Munde, und sie werden dabei nicht selten auch als Game-Changer für die digitale Barrierefreiheit postuliert. Doch wo stehen wir eigentlich gerade wirklich, was können diese Systeme bereits jetzt für uns tun, und was bringt uns die Zukunft? Es ist höchste Zeit für einen unverfälschten „Reality Check“ und einen authentischen Blick in den Alltag von Menschen mit Behinderung.\n\nEs wird immer wieder behauptet, die Einführung generativer KI-Systeme wie ChatGPT und Midjourney habe eine neue Ära der Möglichkeiten eröffnet, insbesondere im Bereich der digitalen Barrierefreiheit. Diese Technologien und Unternehmen versprechen, den Alltag von Menschen mit Behinderungen durch innovative Lösungen zu erleichtern. Beispielsweise ermöglichen neue, multi-modale Large Language Models die Generierung von Alternativtexten, die visuelle Inhalte für sehbehinderte Nutzer\\*innen zugänglicher machen könnten. Auch die Erstellung von Texten in Leichter Sprache kann durch diese Modelle vereinfacht werden, wodurch Informationen für Menschen mit Lernbehinderungen oder Nicht-Muttersprachler\\*innen leichter verständlich werden können.\n\nDoch die Integration von KI in unseren Alltag als behinderte Menschen bringt nicht nur Vorteile. Trotz der neuen Fähigkeiten von KI-Systemen kommen einige neue Herausforderungen hinzu. Dazu gehören unter anderem reproduzierter Ableismus, neue für uns unsichtbare Barrieren und der zunehmende gesellschaftliche Unwille, Barrierefreiheit und somit echte Inklusion zu schaffen, wenn Hilfsmittel immer besser werden. Unter Umständen werden Menschen mit Behinderung in einem gesellschaftlichen Kontext noch unsichtbarer, als sie es sowieso sind.\n\nBei meiner Arbeit als Beraterin für digitale Barrierefreiheit und als sehbehinderte Person spreche ich mittlerweile täglich über generative KI. Neben den vielen Möglichkeiten, die mir diese Systeme persönlich eröffnen, sehe ich aber auch viele Herausforderungen, denen wir in naher Zukunft entgegentreten müssen. Es ist daher unerlässlich, dass wir die Entwicklung von KI-Tools kritisch begleiten, um eine inklusive digitale Zukunft zu gestalten, in der technologischer Fortschritt Hand in Hand mit menschlicher Vielfalt geht. Im Vortrag werfe ich einen detaillierten Blick auf alle diese Punkte, ordne ein und diskutiere, was dafür notwendig ist.","original_language":"deu","persons":["Casey Kreer"],"tags":["37c3","12157","2023","Ethics, Politics \u0026 Society",""],"view_count":3317,"promoted":false,"date":"2023-12-28T19:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-04T10:30:05.193+02:00","length":2548,"duration":2548,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12157-611fb5d7-cd0d-436e-8713-ccee10ea375b.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12157-611fb5d7-cd0d-436e-8713-ccee10ea375b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12157-611fb5d7-cd0d-436e-8713-ccee10ea375b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12157-611fb5d7-cd0d-436e-8713-ccee10ea375b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12157-rettet_uns_die_ki","url":"https://api.media.ccc.de/public/events/611fb5d7-cd0d-436e-8713-ccee10ea375b","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08","title":"Science Slam","subtitle":"Weltrettung braucht Wissenschaft","slug":"37c3-11825-science_slam","link":"https://events.ccc.de/congress/2023/hub/event/science_slam/","description":"Im Science Slam-Stil spekulieren Forschende, wie die Welt aussähe, wenn irgendjemand auf ihr Fachgebiet hören würde. Die Erkenntnisse reichen von Energiewende und Biodiversität bis zu Neurowissenschaften und geschlechtergerechter Medizin. Nach dem Chaos Communication Camp jetzt auch in Hamburg.\n\nWie sähe die Welt aus, wenn wir auf Wissenschaft hören würden? Wo doch bekanntermaßen jeder Katastrophenfilm so beginnt, dass sie ignoriert wird – kurz bevor der Meteorit einschlägt, die Flut flutet und der weiße Hai alle Badenden auffrisst. Auch die akuten Krisen verdanken wir u.a. einer Politik, die Wissenschaft viel zu oft ignoriert. Die hat uns immerhin nicht nur vor Atemwegsinfektionen gewarnt, sondern auch vor zunehmenden Flutereignissen. Wer weiß, was in ihren Artikeln noch alles drinsteht? In unserem Science Slam präsentieren drei bis vier Forschende ihre Antwort darauf. Der Ausgangspunkt ist ein gemeinsames WissKomm-Buchprojekt namens „Weltrettung braucht Wissenschaft\", in dem sich zwölf junge Wissenschaftler\\*innen und Science Slammys der Frage stellen, was ihr Fachgebiet der Menschheit rät. Woraus bauen Plastikforscher die Welt? Und wie landet ihr Baustoff auf unserem Teller? Ist künstliche Intelligenz wirklich rassistisch und Medizin überwiegend für Männer? Haben Klimatologinnen eigentlich noch Hoffnung, oder weiß der Historiker da mehr? Auf dem Weg entsteht aber auch Zukunftsmusik: Verkehrsmittel, von denen Ingenieurinnen träumen, und Städte, in denen sich Füchse tummeln; auf Gentechnik basierte Medikamente und biologisch abbaubares Verpackungsmaterial. Oder, noch revolutionärer: Wege, wissenschaftliche Erkenntnisse einzusetzen, bevor es brennt. ","original_language":"deu","persons":["FrancaParianen","Maria-Elena Vorrath"],"tags":["37c3","11825","2023","Entertainment",""],"view_count":7661,"promoted":false,"date":"2023-12-28T19:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-24T20:00:11.110+01:00","length":2335,"duration":2335,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11825-da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11825-da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11825-da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11825-da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11825-science_slam","url":"https://api.media.ccc.de/public/events/da6bd3cb-8d10-4e5e-a59f-5cc0a03dcb08","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ce4743cc-50ad-4597-bcc8-58e1a7e53c20","title":"KI – Macht – Ungleichheit.","subtitle":"Was ist die soziale Dimension von Nachhaltigkeit und warum ist sie durch KI gefährdet?","slug":"37c3-11937-ki_macht_ungleichheit","link":"https://events.ccc.de/congress/2023/hub/event/ki_macht_ungleichheit/","description":"KI beruht auf der weltweiten Ausbeutung nicht nur natürlicher, sondern auch sozialer Ressourcen. Um KI nachhaltig zu gestalten, müssen wir algorithmischer Diskriminierung und sozialer Selektion, der Ausbeutung und Prekarisierung digitaler Arbeit und der Tendenz eines neuen, digitalen Kolonialismus entgegentreten. \n\nIn Debatten zu KI und Nachhaltigkeit steht zurecht der enorme Ressourcenverbrauch von KI am Pranger. Aber wir dürfen nicht vergessen, dass es bei Nachhaltigkeit um noch viel mehr geht. Mindestens 7 der 17 Nachhaltigkeitsziele der UN verweisen auf soziale Dimensionen: Gleichheit, Anti-Diskriminierung, Zugang zu Bildung, Abbau von ökonomischer Ungleichheit und Ausbeutung. Der Vortrag diskutiert, dass künstliche Intelligenz, wenn sie nicht besser reguliert wird, diesen Zielen entgegensteht. Das liegt nicht nur daran, dass KI-Systeme Biases haben und sich diskriminierend auswirken. Sondern noch fundamentaler beruhen die meisten kommerziellen KI-Systeme auf sozialer und wirtschaftlicher Ausbeutung. Global wie lokal werden Nutzer:innen als Datenlieferant:innen und Gig-Arbeiter:innen als günstige Arbeitskräfte eingespannt. Unser Denken, Fühlen und Handeln wird in allen Lebensbereichen datafiziert; ökonomische Machtgradienten zwischen Globalem Norden und Süden werden für die Aufbereitung von Daten ausgebeutet. Viele KI-Systeme erzeugen ihre Intelligenzleistung nicht im Rechenzentrum, sondern durch das Auslesen menschlicher kognitiver Leistungen an den digitalen Interfaces, die wir täglich nutzen – Beispiele reichen von der Google-Suche über Gesichtserkennung bis ChatGPT. KI-Unternehmen machen von den niedrigen Arbeitsschutzstandards und Lohnniveaus in anderen Ländern Gebrauch und produzieren Krankheit und Prekarität bei den betroffenen Arbeiter:innen. Um gute Regulierung zu erreichen, müssen wir KI-Systeme als soziotechnische Systeme betrachten. Das ermöglicht ein reichhaltigeres Verständnis der sozialen Dimension von Nachhaltigkeit, um global steigender Ungleichheit und Ausbeutung durch KI-Systeme etwas entgegenzusetzen. ","original_language":"deu","persons":["Rainer Mühlhoff"],"tags":["37c3","11937","2023","Sustainability \u0026 Climate Justice",""],"view_count":5174,"promoted":false,"date":"2023-12-28T22:05:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-04T02:00:04.227+02:00","length":2399,"duration":2399,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11937-ce4743cc-50ad-4597-bcc8-58e1a7e53c20.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11937-ce4743cc-50ad-4597-bcc8-58e1a7e53c20_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11937-ce4743cc-50ad-4597-bcc8-58e1a7e53c20.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11937-ce4743cc-50ad-4597-bcc8-58e1a7e53c20.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11937-ki_macht_ungleichheit","url":"https://api.media.ccc.de/public/events/ce4743cc-50ad-4597-bcc8-58e1a7e53c20","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"c51b416f-e656-4f43-a9dd-b9b3bedf3056","title":"Back in the Driver's Seat","subtitle":"Recovering Critical Data from Tesla Autopilot Using Voltage Glitching","slug":"37c3-12144-back_in_the_driver_s_seat_recovering_critical_data_from_tesla_autopilot_using_voltage_glitching","link":"https://events.ccc.de/congress/2023/hub/event/back_in_the_driver_s_seat_recovering_critical_data_from_tesla_autopilot_using_voltage_glitching/","description":"Tesla's driving assistant has been subject to public scrutiny for good and bad: As accidents with its \"full self-driving\" (FSD) technology keep making headlines, the code and data behind the onboard Autopilot system are well-protected by the car manufacturer. In this talk, we demonstrate our voltage-glitching attack on Tesla Autopilot, enabling us root privileges on the system.\r\n\r\n\r\nApart from building electric vehicles, Tesla has gained a reputation for their integrated computer platform comprising a feature-rich infotainment system, remote services through Tesla's Cloud and mobile app, and, most notably, an automated driving assistant. Enabled by a dedicated arm64-based system called Autopilot, Tesla offers different levels of \"self-driving\". The \"full self-driving\" (FSD) is provided to specific customers via in-car purchases and has been subject to public discourse.\r\n\r\nDespite using multiple cameras and Autopilot's machine learning (ML) models, accidents persist and shape FSD reporting. While the platform security of Autopilot's hardware protects the code and ML models from competitors, it also hinders third parties from accessing critical user data, e.g., onboard camera recordings and other sensor data, that could help facilitate crash investigations.\r\n\r\nThis presentation shows how we rooted Tesla Autopilot using voltage glitching. The attack enables us to extract arbitrary code and user data from the system. Among other cryptographic keys, we extract a hardware-unique key used to authenticate Autopilot towards Tesla's \"mothership\". Overall, our talk will shed light on Autopilot's security architecture and gaps.\r\n\r\nBefore delving into Autopilot, we successfully executed a Tesla Jailbreak of the AMD-based infotainment platform and presented our attack at BlackHat USA 2023. This achievement empowered custom modifications to the root file system and temporarily facilitated the activation of paid car features.","original_language":"eng","persons":["Niclas Kühnapfel","Christian Werling","Hans Niklas Jacob - hnj"],"tags":["37c3","12144","2023","Security"],"view_count":24579,"promoted":false,"date":"2023-12-27T13:50:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T20:45:09.254+02:00","length":2478,"duration":2478,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12144-c51b416f-e656-4f43-a9dd-b9b3bedf3056.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12144-c51b416f-e656-4f43-a9dd-b9b3bedf3056_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12144-c51b416f-e656-4f43-a9dd-b9b3bedf3056.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12144-c51b416f-e656-4f43-a9dd-b9b3bedf3056.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12144-back_in_the_driver_s_seat_recovering_critical_data_from_tesla_autopilot_using_voltage_glitching","url":"https://api.media.ccc.de/public/events/c51b416f-e656-4f43-a9dd-b9b3bedf3056","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a9f690f3-e01a-4644-aa15-4276da6879ff","title":"Euclid – das neue Weltraumteleskop","subtitle":"Mit Milliarden leuchtenden Galaxien den dunklen Teil des Kosmos verstehen","slug":"37c3-12182-euclid_das_neue_weltraumteleskop","link":"https://events.ccc.de/congress/2023/hub/event/euclid_das_neue_weltraumteleskop/","description":"„Euclid\" ist ein neues Weltraumteleskop der Europäischen Weltraumbehörde mit Beteiligungen eines Wissenschaftskonsortiums aus vierzehn europäischen Ländern, den USA, Kanada und Japan. Euclid wurde am 1. Juli 2023 gestartet und beginnt bis Ende des Jahres seine auf 6 Jahre geplante wissenschaftliche Himmelsdurchmusterung. Euclid wird mit seinem Spiegel von 1,20 m Durchmesser und seinen zwei Kameras Bilder und Spektren von einem Drittel des gesamten Himmels aufnehmen. Das Ziel: mit der genauen Vermessung von insgesamt zwei Milliarden Galaxien der Natur von „Dunkler Materie\" und „Dunkler Energie\" im Universum auf den Grund zu gehen – die zwar zusammen 95 % der Gesamtenergie ausmachen, von denen wir aber nicht wissen, was sie sind und woraus sie bestehen. Euclid hat im November erste spektakuläre Bilder veröffentlicht. Ich werde die Mission vorstellen, die wissenschaftlichen Ziele, die Methoden und darauf eingehen, was in den 25 Jahren von Idee über Teleskop zu wissenschaftlicher Erkenntnis so alles zu erledigen war und ist.\n\nDie Astronomie weiß aktuell von 95 % der Energie und Masse im Universum nicht, woraus sie bestehen. Neben 5 % „normaler“ Materie (Sterne, Gas, die Erde, CCC-Kongressteilnehmer\\*innen, …) gibt es mindestens fünfmal so viel so genannte dunkle Materie und darüberhinaus sind die restlichen 70 % das, was dunkle Energie genannt wird. Bei beidem wissen wir bislang nicht, woraus sie bestehen – wir kennen nur deren Wirkung! Galaxien rotieren anders, als sie es nur mit normaler Materie tun würden. Und das Universum expandiert – seit dem Urknall – aber die Expansionsgeschwindigkeit nimmt zu und nicht ab, wie von anziehender Materie zu erwarten wäre. Irgendwas drückt den Raum an sich auseinander.\n\nEuclid ist ein Teleskop, eine Mission und ein Konsortium aus mehreren tausend Menschen, von denen viele seit ca. 2008 an den Ideen zu dieser Mission arbeiten, viele hundert an der Planung und dem Bau zweier hoch empfindlicher Kameras mit insgesamt knapp 700 Millionen Pixel und jetzt ein- bis zweitausend Interessierten, welche die bald erwarteten wissenschaftlichen Bilder auswerten wollen.\n\nIch möchte die Ziele erläutern, wie man aus der Vermessung der Form von Galaxien unsichtbare dunkle Materie im Vordergrund aufspürt („schwacher Gravitationslinseneffekt“) und warum es einen „kosmischen Längenmaßstab“ gibt, mit dem man die Ausdehnung des Universums über zehn Milliarden Jahre in der Vergangenheit vermessen kann.\n\nSchließlich möchte ich die ersten fünf Bilder zeigen, die von Euclid aufgenommen und von der ESA im November veröffentlicht wurden – und warum in denen so viel mehr drinsteckt, als man auf einem Computermonitor so sieht.","original_language":"deu","persons":["Knud Jahnke"],"tags":["37c3","12182","2023","Science",""],"view_count":11130,"promoted":false,"date":"2023-12-27T21:10:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-01-24T15:30:12.289+01:00","length":2495,"duration":2495,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12182-a9f690f3-e01a-4644-aa15-4276da6879ff.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12182-a9f690f3-e01a-4644-aa15-4276da6879ff_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12182-a9f690f3-e01a-4644-aa15-4276da6879ff.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12182-a9f690f3-e01a-4644-aa15-4276da6879ff.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12182-euclid_das_neue_weltraumteleskop","url":"https://api.media.ccc.de/public/events/a9f690f3-e01a-4644-aa15-4276da6879ff","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a9ac49b1-4d67-4bb2-a320-5a3ea515d09d","title":"Weil „be excellent to each other” nicht reicht","subtitle":"Über die Strukturen im Hintergrund: Awareness-Team und Schiedsstelle","slug":"37c3-11718-weil_be_excellent_to_each_other_nicht_reicht","link":"https://events.ccc.de/congress/2023/hub/event/weil_be_excellent_to_each_other_nicht_reicht/","description":"„Be excellent to each other“ steht seit Jahrzehnten für das Selbstverständnis der Chaos-Community, was rücksichtsvolles Miteinander angeht.\nDennoch gibt es regelmäßig Fälle, in denen das Verhalten einzelner Personen ganz und gar nicht *excellent* ist.\nZiel dieses Vortrags ist, die zum Umgang mit solchen Fällen im CCC vorhandenen Strukturen greifbar zu machen und die verschiedenen Perspektiven auf ihre Arbeitsweise miteinander abzugleichen.\nEine Q\u0026A-Session und ein Workshop im Anschluss an den Vortrag bieten Möglichkeiten für Feedback.\n\n„Be excellent to each other“ steht seit Jahrzehnten für das Selbstverständnis der Chaos-Community, was rücksichtsvolles Miteinander angeht.\n\nDennoch gibt es regelmäßig Fälle, in denen das Verhalten einzelner Personen ganz und gar nicht *excellent* ist. Dies kann sich beispielsweise in diskriminierendem oder belästigendem Verhalten äußern und umfasst auch schwerwiegende Konflikte, die die Sicherheit oder Freiheit Einzelner bedrohen können. Zum Umgang mit derartigen Situationen auf Camp und Congress gibt es Strukturen wie das Awareness-Team, die Schiedsstelle und weitere auf help.ccc.de genannte Anlaufstellen.\n\nIn diesem Vortrag möchten wir – Mitglieder der Schiedsstelle, des Awareness-Teams und des Vorstands – einen Blick hinter die Kulissen von Awareness-Team und Schiedsstelle bieten und Impulse zur Weiterentwicklung der Schiedsstelle sammeln.\nDas heißt zunächst: Wie arbeiten Awareness-Team und Schiedsstelle, wie hängen sie zusammen und mit welcher Art von Fällen beschäftigen sie sich in der Praxis?\nDabei werden wir auch Beispiele betrachten, bei deren Behandlung wir derzeit Schwierigkeiten oder Grenzen ebendieser Strukturen sehen.\nAufbauend darauf möchten wir in einer Q\u0026A-Session und einem an den Vortrag anschließenden Workshop Feedback zum Umgang mit den genannten Beispielfällen und zu den Strukturen allgemein einholen.\n\nUnser Ziel ist, die Arbeit und Arbeitsweise von Schiedsstelle und Awareness-Team greifbar zu machen und unsere eigene Perspektive als Teil dieser Strukturen mit der Perspektive aus der Community abzugleichen.\nWir haben vor, mit den dabei gewonnenen Erkenntnissen die bestehenden Strukturen weiterzuentwickeln. Dazu gehört auch, Unklarheiten im Umgang der Community mit den Strukturen sowie Lücken im Umgang mit einzelnen Fällen zu identifizieren und zu reduzieren.","original_language":"deu","persons":["Schiedsstelle / Awareness Team / Vorstand","derf","gnom"],"tags":["37c3","11718","2023","CCC",""],"view_count":6610,"promoted":false,"date":"2023-12-28T16:00:00.000+01:00","release_date":"2024-01-04T00:00:00.000+01:00","updated_at":"2026-04-01T22:30:05.603+02:00","length":3674,"duration":3674,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11718-a9ac49b1-4d67-4bb2-a320-5a3ea515d09d.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11718-a9ac49b1-4d67-4bb2-a320-5a3ea515d09d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11718-a9ac49b1-4d67-4bb2-a320-5a3ea515d09d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11718-a9ac49b1-4d67-4bb2-a320-5a3ea515d09d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11718-weil_be_excellent_to_each_other_nicht_reicht","url":"https://api.media.ccc.de/public/events/a9ac49b1-4d67-4bb2-a320-5a3ea515d09d","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"010fec93-42dd-4039-a5aa-ac313d6a9541","title":"Turning Chromebooks into regular laptops","subtitle":"With the power of open source!","slug":"37c3-11929-turning_chromebooks_into_regular_laptops","link":"https://events.ccc.de/congress/2023/hub/event/turning_chromebooks_into_regular_laptops/","description":"Deep dive into (ex)ChromeOS hardware from developer's perspective.\n\nIn this talk you will learn how ChromeOS hardware designed by Google and it's board partners differ from regular laptops/desktops.\n\nWe'll go over Coreboot development (+guide of porting it to other x86 motherboards!), EDK2 (UEFI payload we use in our firmware builds) and what it takes to make mainline Linux run on these machines.\n\nThis talk will involve ACPI tables, I2C and SPI interfaces, DSP firmware and maintenance of audio stack that differs from (almost) all x86 machines in the market.\n\nWe'll present challenges we've faced during the development cycle, tips on how to avoid pitfalls, and our plans for the future :)","original_language":"eng","persons":["elly","sdomi"],"tags":["37c3","11929","2023","Hardware \u0026 Making",""],"view_count":11398,"promoted":false,"date":"2023-12-28T20:15:00.000+01:00","release_date":"2023-12-31T00:00:00.000+01:00","updated_at":"2026-03-31T12:00:05.657+02:00","length":2334,"duration":2334,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11929-010fec93-42dd-4039-a5aa-ac313d6a9541.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11929-010fec93-42dd-4039-a5aa-ac313d6a9541_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11929-010fec93-42dd-4039-a5aa-ac313d6a9541.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11929-010fec93-42dd-4039-a5aa-ac313d6a9541.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11929-turning_chromebooks_into_regular_laptops","url":"https://api.media.ccc.de/public/events/010fec93-42dd-4039-a5aa-ac313d6a9541","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f3ed5e42-6b9c-4fe8-b06a-95869edbbb19","title":"Synthetic Sentience","subtitle":"Can Artificial Intelligence become conscious?","slug":"37c3-12167-synthetic_sentience","link":"https://events.ccc.de/congress/2023/hub/event/synthetic_sentience/","description":"Despite the rapid progress of AI capabilities, the core question of Artificial Intelligence seems to be still unanswered: What does it take to create a mind? Let us explore the boundaries of AI: sentience, self awareness, and the possibility of machine consciousness.\n\n\nAfter many attempts to build AI models that are smarter than human beings, we find ourselves confronted with a family of surprisingly successful systems that match many of our abilities through text prediction and text/image correlation. The limits of these approaches are presently unclear, and while they work in very different ways than our minds, they pose the question whether consciousness, embodiment and motivation are necessary for achieving general intelligence. What are the differences between human (and animal) minds and the current generation of AI models? When we compare perspectives on mind and consciousness that have been developed in neuroscience, philosophy of mind, theoretical and therapeutic psychology, and numerous cultural traditions, and translate them into the metaphysics and conceptual frameworks of artificial intelligence, we may gain insights into this question.","original_language":"eng","persons":["Joscha"],"tags":["37c3","12167","2023","Science",""],"view_count":15341,"promoted":false,"date":"2023-12-28T17:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-30T21:45:07.844+02:00","length":3800,"duration":3800,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12167-f3ed5e42-6b9c-4fe8-b06a-95869edbbb19.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12167-f3ed5e42-6b9c-4fe8-b06a-95869edbbb19_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12167-f3ed5e42-6b9c-4fe8-b06a-95869edbbb19.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12167-f3ed5e42-6b9c-4fe8-b06a-95869edbbb19.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12167-synthetic_sentience","url":"https://api.media.ccc.de/public/events/f3ed5e42-6b9c-4fe8-b06a-95869edbbb19","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"73ec8b2e-34fa-453f-8e26-8789f62103ab","title":"Von der ePA zum EHDS: 7 Thesen zur aktuellen digitalen Gesundheitspolitik","subtitle":"","slug":"37c3-11942-von_der_epa_zum_ehds_7_thesen_zur_aktuellen_digitalen_gesundheitspolitik","link":"https://events.ccc.de/congress/2023/hub/event/von_der_epa_zum_ehds_7_thesen_zur_aktuellen_digitalen_gesundheitspolitik/","description":"Karl Lauterbach und die EU-Kommission haben eines gemeinsam. Beide wollen in Windeseile die Digitalisierung des Gesundheitssektors voranbringen. Die elektronische Patientenakte soll im Januar 2025 für alle Bundesbürger:innen kommen. Im gleichen Jahr ist der Start des sogenannten Europäischen Gesundheitsdatenraums geplant.\r\n\r\nBeide Projekte zielen darauf ab, die Gesundheitsdaten von Millionen Menschen zu digitalisieren und diese Behandelnden, der Forschung und der Wirtschaft bereitzustellen.\r\n\r\nIn unserem Vortrag wollen wir entlang von sieben Thesen zentrale technische und gesellschaftspolitische Untiefen der geplanten Gesundheitsdigitalisierung in der Bundesrepublik und in der EU erkunden – und den Weg zu einer alternativen Digitalisierung des Gesundheitssektors aufzeigen.","original_language":"deu","persons":["Daniel Leisegang","Bianca Kastl"],"tags":["37c3","11942","2023","Ethics, Politics \u0026 Society"],"view_count":4393,"promoted":false,"date":"2023-12-29T11:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-29T00:15:05.591+01:00","length":3645,"duration":3645,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11942-73ec8b2e-34fa-453f-8e26-8789f62103ab.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11942-73ec8b2e-34fa-453f-8e26-8789f62103ab_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11942-73ec8b2e-34fa-453f-8e26-8789f62103ab.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11942-73ec8b2e-34fa-453f-8e26-8789f62103ab.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11942-von_der_epa_zum_ehds_7_thesen_zur_aktuellen_digitalen_gesundheitspolitik","url":"https://api.media.ccc.de/public/events/73ec8b2e-34fa-453f-8e26-8789f62103ab","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a91c6e01-49cf-4227-baae-aece190e9de5","title":"Operation Triangulation","subtitle":"What You Get When Attack iPhones of Researchers","slug":"37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers","link":"https://events.ccc.de/congress/2023/hub/event/operation_triangulation_what_you_get_when_attack_iphones_of_researchers/","description":"Imagine discovering a zero-click attack targeting Apple mobile devices of your colleagues and managing to capture all the stages of the attack. That’s exactly what happened to us! This led to the fixing of four zero-day vulnerabilities and discovering of a previously unknown and highly sophisticated spyware that had been around for years without anyone noticing. We call it Operation Triangulation. We've been teasing this story for almost six months, while thoroughly analyzing every stage of the attack. Now, for the first time, we're ready to tell you all about it. This is the story of the most sophisticated attack chain and spyware ever discovered by Kaspersky.\r\n\r\nIn this presentation, we will share:\r\n\r\n* How we managed to discover and capture all stages of a zero-click attack on iOS, despite the attackers’ efforts to hide and protect it,\r\n* a comprehensive analysis of the entire attack chain, which exploited five vulnerabilities, including four zero-days\r\n* the capabilities of the malware that transforms your phone into the ultimate surveillance tool,\r\n* and the links to previously known malware we were able to find.\r\n","original_language":"eng","persons":["oct0xor","kucher1n","bzvr_"],"tags":["37c3","11859","2023","Security"],"view_count":66328,"promoted":false,"date":"2023-12-27T14:45:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-03T01:15:05.079+02:00","length":3485,"duration":3485,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11859-a91c6e01-49cf-4227-baae-aece190e9de5.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11859-a91c6e01-49cf-4227-baae-aece190e9de5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11859-a91c6e01-49cf-4227-baae-aece190e9de5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11859-a91c6e01-49cf-4227-baae-aece190e9de5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers","url":"https://api.media.ccc.de/public/events/a91c6e01-49cf-4227-baae-aece190e9de5","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"fd9d6c53-806e-4667-934d-7e589511f5a9","title":"Making homebrew for your very own Vector Super Computer","subtitle":"Adventures running a NEC Vector Engine for fun and ... community","slug":"37c3-12297-making_homebrew_for_your_very_own_vector_super_computer","link":"https://events.ccc.de/congress/2023/hub/event/making_homebrew_for_your_very_own_vector_super_computer/","description":"The NEC Vector Engine (VE) isn't a GPU. It's a member of the only family of vector computers still alive today. Imagine a second CPU with a different instruction set running on the same Linux system. While obscure, it's a very approachable and hackable platform that is an addictingly fun machine to program and allows you to play with all the technologies seen in high-performance computing (HPC) today. I am going to cover lightheartedly what a small community learned about this singular hardware they shared: bemoaning a dangerous power plug standard, (ab)using this scientific simulation power house to run code never intended, some firmware and driver reversing, \"rooting\" a VE and more. I will also be giving an introduction to core concepts in HPC with knowledge transferable to any other (university) computer cluster and hopefully encouraging students and scientists to use those by making them seem less alien and hostile.\n\nThe talk will explain unfamiliar concepts in more common terms like:\nVector registers are just registers where CPUs can store multiple numbers which belong together and are processed independent of each other together in same operation. This allows a higher processing performance similar to how moving a pallet of same sized boxes can be quicker than just moving the boxes on their own.\n\nAnd will then use those new terms drawing comparisons like:\n512 bits long are the largest vector registers available with any other CPU available today compared to 16348 bits long vector registers of which each VE core has 64 of. This puts it in a class of its own among CPUs.\n\nIf you weren't scrared off by this you shouldn't find the talk to technical. If you have a deep grasp on computing technology and wonder if this talk might interesting then you will hear about some implementation choices from NEC drawing reactions deep from the Kubler-Ross stages of Grief. \n\nThere will be a short introduction to the VE instruction set highlight a few instructions which are \"fun\" or otherwise \"interesting\" and might have some general computing https://en.wikipedia.org/wiki/Fast\\_inverse\\_square\\_root trivia https://vaibhavsagar.com/blog/2019/09/08/popcount/ associtated. The different offloading modes of a VE are introduced, one of which is enterily novel and which also emphasizes the uniqueness and sheer quirkyness.\n\nPrograms executing on a Vector Engine run in a Linux environment thus one could make many applications run on this accelerator unlocking GPU like performance for them without a need for rewrites if said code can make use of these big vector registers and the massive memory bandwidth available to them. So it's unsupprising that it is enourmously fun to touch up identified bottelnecks and see some application get 200x faster with handful of fixes. We can call hardware homebrewed if we make 2048 run on it, can't we?\n\nThe presentation about hacks people which joined my \"vect.or.at\" Vector Engine PUBNIX (basically a shared linux computer) did will cover such speeds ups, mention the state of an ongoing attempt to port the Rust programming languages to it, attempts of digital perservationism and progress towards making the vector engine truely yours by \"rooting\" it to mess with hardware settings otherwise unavailable.\n\nThe introduction to HPC portion will be structured as an argument claiming \"A NEC Vector Engine would turn your (Linux) computer into a small super computer\" and use this as motivation to introduce what such a super computer or HPC cluster is, how you can make it work for you and common software packages used. A few performance \"tripping\" hazards also are mentioned.","original_language":"eng","persons":["Johann-Tobias Schäg"],"tags":["37c3","12297","2023","Hardware \u0026 Making",""],"view_count":1173,"promoted":false,"date":"2023-12-30T11:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-28T07:15:06.519+01:00","length":2389,"duration":2389,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12297-fd9d6c53-806e-4667-934d-7e589511f5a9.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12297-fd9d6c53-806e-4667-934d-7e589511f5a9_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12297-fd9d6c53-806e-4667-934d-7e589511f5a9.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12297-fd9d6c53-806e-4667-934d-7e589511f5a9.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12297-making_homebrew_for_your_very_own_vector_super_computer","url":"https://api.media.ccc.de/public/events/fd9d6c53-806e-4667-934d-7e589511f5a9","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"173c943e-11fc-5de3-a1ce-a3435b04e7e1","title":"The Diner Podcast live: ","subtitle":"Frauen in der Technik","slug":"37c3-57955-the-diner-podcast-live-frauen-in-der-technik","link":"https://events.ccc.de/congress/2023/hub/event/the-diner-podcast-live-frauen-in-der-technik/","description":"Judith und Klaudia sprechen mit einer Gästin darüber, wie Frauen in technische Berufe und auch in das CCC-Umfeld kommen, was sie dort erleben und wie wir es Frauen vielleicht noch leichter machen können, sich mit den Nerds wohlzufühlen.","original_language":"deu","persons":["jinxx","teekse","Eva Wolfangel"],"tags":["37c3","57955","2023","Sendezentrum"],"view_count":779,"promoted":false,"date":"2023-12-27T19:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-01-04T00:30:15.899+01:00","length":2841,"duration":2841,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57955-173c943e-11fc-5de3-a1ce-a3435b04e7e1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57955-173c943e-11fc-5de3-a1ce-a3435b04e7e1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57955-173c943e-11fc-5de3-a1ce-a3435b04e7e1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57955-173c943e-11fc-5de3-a1ce-a3435b04e7e1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57955-the-diner-podcast-live-frauen-in-der-technik","url":"https://api.media.ccc.de/public/events/173c943e-11fc-5de3-a1ce-a3435b04e7e1","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"7ec3194b-0f3e-42dc-a515-fb8511deaf5e","title":"Chatkontrolle - Es ist noch nicht vorbei!","subtitle":" Eine Tragödie in X Akten","slug":"37c3-12240-chatkontrolle_-_es_ist_noch_nicht_vorbei","link":"https://events.ccc.de/congress/2023/hub/event/chatkontrolle_-_es_ist_noch_nicht_vorbei/","description":" In diesem Vortrag wollen wir auf die letzten knapp drei Jahre Kampf gegen die Chatkontrolle zurückblicken. Ein Kampf, der genauso droht zu einem Wiedergänger zu werden wie die Vorratsdatenspeicherung.\nWir waren auf eine harte Auseinandersetzung um Überwachung und sichere Kommunikation vorbereitet. Als Patrick 2020 angefangen, hat uns vor dem, was da kommt, zu warnen, haben wir nicht erwartet, dass es sich zu einer Tragödie entwickeln würde, in der es nicht um Kinderschutz oder Überwachung geht. Sondern um eine Kommission, der jedes Mittel recht ist. Und Korruption und Lobbyskandal.\n\nÜber die Chatkontrolle wurde in den letzten zwei Jahren viel geredet – die problematischen Inhalte des Gesetzes kommen den meisten von uns wahrscheinlich zu den Ohren heraus.\nAber letztlich geht es um nicht weniger als einen historischen Kampf um Ende-zu-Ende-Verschlüsselung.\nAuf dem Tisch liegt das Thema aber schon deutlich länger. Wir wollen zurückblicken auf die Ursprünge und Kernpunkte des Gesetzesvorschlags. Und dann zusammen mit dem Publikum noch einmal die unüberschaubaren Wege gehen, die die Arbeit an diesem Gesetzesentwurf genommen hat.\nAus der Perspektive von Deutschlands oberstem Datenschützer (Ulrich Kelber), dem Abgeordneten des Europäischen Parlamanets (Patrick Breyer) und der digitalen Zivilgesellschaft (khaleesi) erzählen wir die bisherige Geschichte der Chatkontrolle. \nWenn ihr dachtet, ihr hättet alles zur Chatkontrolle gehört, bereitet euch auf eine absurde Tragödie vor, die ihr Ende noch nicht gefunden hat.\n\nTrotz des Erfolgs im EU-Parlament haben wir noch lange nicht gewonnen. Denn alles hängt im und am Rat, dessen Position könnte im Trilog alles zunichte machen was wir hart erarbeitet haben.\nUnd auch die Europawahlen stehen vor der Tür und damit kann sich nochmal alles ändern. Nicht fertige Gesetze werden in der EU in der nächste Legislaturperiode einfach weiterverhandelt. Um die Chatkontrolle endgültig zu stoppen, darf keine EU-Abgeordnete durch den Wahlkampf kommen, ohne sich klar zum Schutz von Verschlüsselung zu bekennen.","original_language":"deu","persons":["Dr. Patrick Breyer","khaleesi","Prof. Ulrich Kelber"],"tags":["37c3","12240","2023","Ethics, Politics \u0026 Society",""],"view_count":9151,"promoted":false,"date":"2023-12-29T19:15:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-23T11:30:10.490+01:00","length":3593,"duration":3593,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12240-7ec3194b-0f3e-42dc-a515-fb8511deaf5e.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12240-7ec3194b-0f3e-42dc-a515-fb8511deaf5e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12240-7ec3194b-0f3e-42dc-a515-fb8511deaf5e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12240-7ec3194b-0f3e-42dc-a515-fb8511deaf5e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12240-chatkontrolle_-_es_ist_noch_nicht_vorbei","url":"https://api.media.ccc.de/public/events/7ec3194b-0f3e-42dc-a515-fb8511deaf5e","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"643ecf8f-de45-4155-91d2-3195430dbd4b","title":"Hacking Neural Networks","subtitle":"Eine Einführung in das Hacking von Neuronalen Netzen","slug":"37c3-12059-hacking_neural_networks","link":"https://events.ccc.de/congress/2023/hub/event/hacking_neural_networks/","description":"Ich will den Zuhörerinnen einen Überblick über die aktuellen Möglichkeiten geben, wie Neuronale Netze angegriffen und manipuliert werden können. Das Ziel des Vortrags ist es, verschiedene Angriffe zu erklären und anhand von Beispielen zu veranschaulichen. Dies dient auch dazu, die Funktionsweise neuronaler Netze besser zu verstehen und ihre Limitierungen aufzuzeigen. Abschließend zeige ich, welche Maßnahmen ergriffen werden können, um diese Angriffe zu erkennen oder zu verhindern.\n\nDer Vortrag beginnt mit einer knappen Einführung in die Funktionsweise Neuronaler Netze, um ein allgemeines Verständnis zu schaffen. Anschließend werden verschiedene Angriffe auf Neuronale Netze dargestellt. Die dargestellten Angriffe sind zum größten Teil technisch und ich werde Angriffe wie Prompt Injection nur kurz behandeln. Im Vortrag werden neben Prompt Injection Angriffe wie LastLayer Attack, Back-Dooring, Extracting Information, Brute Forcing, Neural Overflow, Malware Injection, Neural Obfuscation und Model Stealing theoretisch vorgestellt. Um den theoretischen Vortrag aufzulockern, werde ich einige dieser Angriffe anhand von Live-Beispielen veranschaulichen und erklären, wie sie die Funktionsweise Neuronaler Netze ausnutzen bzw. an welchen Stellen diese manipuliert werden können. Während der Erläuterung der Angriffe werde ich auch darauf eingehen, welche Informationen für den Angriff benötigt werden und welche Informationen besonders schützenswert sind. Abschließend werde ich mögliche Verteidigungsstrategien erläutern, auch wenn diese nur einen teilweisen Schutz ermöglichen. Der Vortrag wird einen guten Überblick über Angriffe auf Neuronale Netze geben, wie sie in der aktuellen wissenschaftlichen Literatur bekannt sind. ","original_language":"deu","persons":["jate"],"tags":["37c3","12059","2023","Science",""],"view_count":3449,"promoted":false,"date":"2023-12-28T11:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-12T13:15:10.607+01:00","length":2503,"duration":2503,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12059-643ecf8f-de45-4155-91d2-3195430dbd4b.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12059-643ecf8f-de45-4155-91d2-3195430dbd4b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12059-643ecf8f-de45-4155-91d2-3195430dbd4b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12059-643ecf8f-de45-4155-91d2-3195430dbd4b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12059-hacking_neural_networks","url":"https://api.media.ccc.de/public/events/643ecf8f-de45-4155-91d2-3195430dbd4b","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ca025234-f091-4669-b95e-f62437837737","title":"Gut feelings: Can we optimize lifestyle, diet and medication according to our respective microbiota?","subtitle":null,"slug":"37c3-11959-gut_feelings_can_we_optimize_lifestyle_diet_and_medication_according_to_our_respective_microbiota","link":"https://events.ccc.de/congress/2023/hub/event/gut_feelings_can_we_optimize_lifestyle_diet_and_medication_according_to_our_respective_microbiota/","description":"Why do some people stay fit and healthy easier than others, even when following the same health advice? Why does the same medication work well in one person, but not in another? Some of our individuality in these regards may trace to which bacteria we carry in the soil of our intestinal gardens. In this talk, drawing on work by my own research lab at the Charité and on that by our collaborators and rivals elsewhere in the world, I outline what we know, what we speculate, and what obstacles remain in the way of widespread adoption of personalized health prevention through microbiome sequencing.\n\nDespite our best efforts of finding the perfect regimen of diet, exercise and medication to keep any person fit and healthy, outcomes for different people vary widely for all of these measures, even when we comply with them fully. Some of this traces to our individual genetics, which remains difficult to change, but another source of variation in responses may come from differences between our gut microbiomes.\n\nHuman bodies are not sterile, and our skin, our mucosal surfaces and, in particular, our intestines are home to many more bacteria than there are human cells in our bodies, representing hundreds of different species in each person. These microbial ecosystems, or microbiomes, are found in all animals and have coevolved with their hosts. Therefore we rely on commensal (\"friendly\") bacteria for many functions, including breaking down nutrients, converting some medications into their active forms, producing certain crucial compounds for us from our diet, and helping our immune systems mature and remain tuned. The microbiota also contains temporary visitors and both transient and resident opportunistic pathogens, often kept in check by the immune system and by the commensals, but sometimes escaping such control to multiply and cause disease. Human gut microbiomes begin establishing at birth and evolve over a lifetime, but remain quite stable within each person throughout adulthood unless something serious like repeated antibiotic cures disrupt them. However, they can differ quite substantially between individuals as well as between populations, reflecting factors such as nutrition and environmental exposures.\n\nIt has been proposed, and to a degree already demonstrated, that differences between individuals in which gut bacteria they harbour may underlie differences in their susceptibility to disease, their resilience to stressors, and their responses to environmental stimuli. Thus the variation in responses to the same lifestyle between different people may reflect their gut microbiomes. This would open up several venues of personalized medicine, lifestyle advice and nutrition. Choice of medications, diets or interventions could be selected according to a person's specific microbiome to be most effective. It might also be possible to potentiate such interventions by altering the gut microbiome in different ways, such as through antibiotics, probiotics, nutrition or through microbiome transplantation from another person. Alternately put, by adapting the microbiome to a lifestyle intervention, and/or adapting a lifestyle intervention to the microbiome, we may be able to optimize how a given person can seek and achieve fitness and health.\n\nIn this talk, I will outline what we know on these topics so far, especially from studies using large-scale microbial (meta-)genome DNA sequencing. In this talk I will draw on work by my own lab at the Charité in Berlin, as well as that of our colleagues, rivals and collaborators elsewhere in the world. I will give examples of known gut microbial modulation of human responses to the external environment and introduce the most common strategies both for researching such effects and for their leverage as health-promoting tools. Where there are limits to our knowledge or obstacles to its practical application, I will identify those obstacles and suggest ways to overcome them.","original_language":"eng","persons":["Sofia Kirke Forslund-Startceva"],"tags":["37c3","11959","2023","Science",""],"view_count":2114,"promoted":false,"date":"2023-12-29T16:40:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-27T17:30:06.459+01:00","length":2473,"duration":2473,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11959-ca025234-f091-4669-b95e-f62437837737.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11959-ca025234-f091-4669-b95e-f62437837737_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11959-ca025234-f091-4669-b95e-f62437837737.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11959-ca025234-f091-4669-b95e-f62437837737.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11959-gut_feelings_can_we_optimize_lifestyle_diet_and_medication_according_to_our_respective_microbiota","url":"https://api.media.ccc.de/public/events/ca025234-f091-4669-b95e-f62437837737","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"1ea3c37f-562a-5139-a0ed-5a109e3e7e0e","title":"Dicke Bretter: Die Congress Edition","subtitle":"","slug":"37c3-57956-dicke-bretter-die-congress-edition","link":"https://events.ccc.de/congress/2023/hub/event/dicke-bretter-die-congress-edition/","description":"Seit einem knappen Jahr machen wir zusammen Dicke Bretter, den Podcast, der die Orte vorstellt, wo Netzpolitik gemacht wird, und einen Ausblick auf aktuelle Debatten gibt. Elina und Elisa werfen in der Congress-Edition einen Blick aufs letzte und aufs nächste Jahr: Welche Policy-Bretter müssen wir bohren, auf welchen sollten wir tanzen?\r\n\r\nWir nehmen speziell die Gesetzgebung im Bund unter die Lupe und haben dafür einen Special Guest: Faxorzistin Bianca Kastl!","original_language":"deu","persons":["eliza","khaleesi","Bianca Kastl"],"tags":["37c3","57956","2023","Sendezentrum"],"view_count":1822,"promoted":false,"date":"2023-12-27T20:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-02-26T17:45:05.691+01:00","length":2652,"duration":2652,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57956-1ea3c37f-562a-5139-a0ed-5a109e3e7e0e.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57956-1ea3c37f-562a-5139-a0ed-5a109e3e7e0e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57956-1ea3c37f-562a-5139-a0ed-5a109e3e7e0e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57956-1ea3c37f-562a-5139-a0ed-5a109e3e7e0e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57956-dicke-bretter-die-congress-edition","url":"https://api.media.ccc.de/public/events/1ea3c37f-562a-5139-a0ed-5a109e3e7e0e","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc","title":"KI im Klassenzimmer - ein Update!","subtitle":"Wie KI in der Schule wirklich entlasten könnte","slug":"37c3-11756-ki_im_klassenzimmer_-_ein_update","link":"https://events.ccc.de/congress/2023/hub/event/ki_im_klassenzimmer_-_ein_update/","description":"Seit ChatGPT ist das Thema Künstliche Intelligenz mittlerweile an fast allen Schulen angekommen. Immer noch soll KI Lehrkräfte entlasten, doch mit der kommenden KI-Verordnung kann sich die Belastung einfach nur verschieben. Der Vortrag gibt ein Update zum Vortrag von der #rC3 2020, was nun konkret auf Schulen zukommen kann und wie KI tatsächlich zu Entlastungen beitragen kann. \n\nSchon länger experimentieren Bundesländer und Schulen zusammen mit EdTech-Unternehmen mit KI und Algorithmen in Learning Analytics-Programmen (LA) und sogenannten Intelligenten Tutor Systemen. Wie auch schon bei anderen technologischen Entwicklungen hängt auch bei KI die gesetzliche Regulierung der gelebten Praxis hinterher und Schulen oder auch Schulträger haben bislang keine rechtssichere Grundlage für die Arbeit mit KI. Noch. Doch bereits seit dem Frühjahr 2021 wird in Brüssel an der sogenannten KI-Verordnung gearbeitet, die diese Lücke schließen soll. Nun steht die KI-Verordnung kurz vor dem Abschluss und der Vortrag zeigt, was nun juristisch konkret auf Schulen, Schulträger oder Länder zukommen kann, und gibt ein Update zu den technischen und pädagogischen Herausforderungen, die der Einsatz von KI in der Schule mitbringt. Nur wenn KI richtig und geplant beschafft, eingesetzt und begleitet wird, kann sie zu Entlastungseffekten führen. Der Vortrag stellt die nötigen Schritte vor. ","original_language":"deu","persons":["Nina  Galla"],"tags":["37c3","11756","2023","Ethics, Politics \u0026 Society",""],"view_count":3805,"promoted":false,"date":"2023-12-30T13:50:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-01T23:15:04.398+02:00","length":2573,"duration":2573,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11756-a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11756-a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11756-a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11756-a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11756-ki_im_klassenzimmer_-_ein_update","url":"https://api.media.ccc.de/public/events/a9b47ec2-1e9b-48e6-a8d3-e68236fb72dc","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"7b1188cf-948c-490c-b206-9ec6a22c45e9","title":"Vom Darkroom in die Blackbox","subtitle":"Effekte der Digitalisierung auf (schwules) Dating","slug":"37c3-12238-vom_darkroom_in_die_blackbox","link":"https://events.ccc.de/congress/2023/hub/event/vom_darkroom_in_die_blackbox/","description":"Entgegen der Auffassung, die schwule Subkultur hätte durch die digitale Vernetzung einen Aufschwung erhalten und sei in ihrem Aktivismus gestärkt worden, möchte ich eine gegenwärtige Krise der Subkultur markieren und ihren Entstehungskontext durch Onlinedating skizzieren. Schwule Onlineplattformen entstanden, um der Unterdrückung von homosexuellem Verhalten zu entgehen. Zynischerweise sorgen sie heute für eine unterschwellige, fesselnde Regulation homosexueller Menschen.\n\nDer Vortrag arbeitet sich zwar vor allem an MSM-Personen (Männer, die Sex mit Männern haben) ab, richtet sich aber ausdrücklich an Hacker:innen jeglicher Sexualität.\n\nDer Vortrag zeichnet erstens eine Kulturgeschichte der schwulen Subkultur und erklärt, warum Darkrooms und ähnliche Orte, an denen schwuler Sex in der semi-Öffentlichkeit vollzogen wird, konstitutiv für die schwule Szene waren. Zweitens werden die Effekte der Digitalisierung dieser Orte hin zu Plattformen wie früher GayChat oder heute Grindr aufgezeigt. Drittens wird gezeigt, warum homosexuelle Cruising-Apps wie Grindr kultur- und softwaretechnisch grundlegend anders aufgebaut sind als heterosexuelle Dating-Apps wie Tinder.\n\nMit dem Vortrag möchte ich einen Anstoß geben, Dualismen wie Homo- und Heterosexualität, Cruising und Dating, Promiskuität und Monogamie zu hacken. Ich möchte zeigen, dass Interaktivität auf *Datingplattformen* häufig eine Illusion ist, und versuchen, gemeinsam mit dem Publikum Wege zu finden, den „interpassiven”-Konsumstatus im Onlinedating aufzubrechen.","original_language":"deu","persons":["LustigerLeo"],"tags":["37c3","12238","2023","Ethics, Politics \u0026 Society",""],"view_count":2288,"promoted":false,"date":"2023-12-30T16:40:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-26T21:15:05.328+01:00","length":2532,"duration":2532,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12238-7b1188cf-948c-490c-b206-9ec6a22c45e9.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12238-7b1188cf-948c-490c-b206-9ec6a22c45e9_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12238-7b1188cf-948c-490c-b206-9ec6a22c45e9.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12238-7b1188cf-948c-490c-b206-9ec6a22c45e9.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12238-vom_darkroom_in_die_blackbox","url":"https://api.media.ccc.de/public/events/7b1188cf-948c-490c-b206-9ec6a22c45e9","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"c0933e3f-431e-52f4-864d-da7f148715ea","title":"Rückkanal bei der Podcasterei: ","subtitle":"Twitter ist tot, Es lebe das Fediverse?!","slug":"37c3-57998-rckkanal-bei-der-podcasterei-twitter-ist-tot-es-lebe-das-fediverse","link":"https://events.ccc.de/congress/2023/hub/event/rckkanal-bei-der-podcasterei-twitter-ist-tot-es-lebe-das-fediverse/","description":"Offene Diskussion im Fishbowl-Format:\r\n\r\n\u003ca href=\"https://sendegate.de/t/37c3-session-rueckkanal-bei-der-podcasterei-twitter-ist-tot-es-lebe-das-fediverse/16719\"\u003ehttps://sendegate.de/t/37c3-session-rueckkanal-bei-der-podcasterei-twitter-ist-tot-es-lebe-das-fediverse/16719\u003c/a\u003e","original_language":"deu","persons":["Andi","Jinxx","et al."],"tags":["37c3","57998","2023","Sendezentrum"],"view_count":1016,"promoted":false,"date":"2023-12-29T21:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-23T22:00:09.095+01:00","length":4925,"duration":4925,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57998-c0933e3f-431e-52f4-864d-da7f148715ea.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57998-c0933e3f-431e-52f4-864d-da7f148715ea_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57998-c0933e3f-431e-52f4-864d-da7f148715ea.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57998-c0933e3f-431e-52f4-864d-da7f148715ea.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57998-rckkanal-bei-der-podcasterei-twitter-ist-tot-es-lebe-das-fediverse","url":"https://api.media.ccc.de/public/events/c0933e3f-431e-52f4-864d-da7f148715ea","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"bdeddf79-e7f0-46d3-b3ee-c427026c1523","title":"Nintendo hacking 2023: 2008","subtitle":"Finishing off the Nintendo DSi","slug":"37c3-11736-nintendo_hacking_2023_2008","link":"https://events.ccc.de/congress/2023/hub/event/nintendo_hacking_2023_2008/","description":"Over the years, many talks about console jailbreaks have been presented at CCC. However, one console has been left overlooked: the Nintendo DSi. It didn't see any serious hacks in its active lifetime, the ones that eventually appeared aren't completely satisfactory, and several components (such as its boot ROMs) were left untouched. In this presentation, we rectify the situation, explain how to extract the boot ROMs, and demonstrate new jailbreaks that can take over the console at an even deeper level. As a bonus, this work makes it possible to revive consoles with worn-out eMMC NAND chips.\n\nThis presentation will start with an introduction to the hardware of the Nintendo DSi and the history of earlier hacking attempts. This is followed by an explanation on how to extract, analyze, and exploit the boot ROMs of the console, leading to a complete defeat of the security of the system.\n\nThis presentation will not shy away from technical explanations involving software exploitation, fault injection, cryptography, and hardware design. We will however try to make it understandable and enjoyable to less technically-inclined audiences.","original_language":"eng","persons":["PoroCYon"],"tags":["37c3","11736","2023","Security",""],"view_count":4197,"promoted":false,"date":"2023-12-28T14:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-30T23:00:06.005+02:00","length":2546,"duration":2546,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11736-bdeddf79-e7f0-46d3-b3ee-c427026c1523.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11736-bdeddf79-e7f0-46d3-b3ee-c427026c1523_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11736-bdeddf79-e7f0-46d3-b3ee-c427026c1523.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11736-bdeddf79-e7f0-46d3-b3ee-c427026c1523.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008","url":"https://api.media.ccc.de/public/events/bdeddf79-e7f0-46d3-b3ee-c427026c1523","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"6123fb8c-75dd-48fa-810f-f7dc3cdb73a4","title":"Rust Binary Analysis, Feature by Feature","subtitle":null,"slug":"37c3-11684-rust_binary_analysis_feature_by_feature","link":"https://events.ccc.de/congress/2023/hub/event/rust_binary_analysis_feature_by_feature/","description":"A walkthrough of the assembly code idioms the Rust compiler uses to implement the language’s core features (as they appear in Klabnik’s and Nichols’ “The Rust Programming Language”) - starting with simple match expressions and all the way to monomorphized functions and iterator chains.\n\nYou attempt to analyze a binary file compiled in the Rust programming language. You open the file in your favorite disassembler. Twenty minutes later you wish you had never been born. You’ve trained yourself to think like g++ and msvc: Here’s a loop, there’s a vtable, that’s a global variable, a library function, an exception. Now you need to think like the Rust compiler. Maybe you’ve heard about “sum types” and “generics” and “iterators”, maybe you haven’t, and in both cases you are going to have an exceptionally bad time.\n\nThis talk will get you familiar with the assembly code idioms the Rust compiler uses to implement the language’s core features (as they appear in Klabnik’s and Nichols’ “The Rust Programming Language”), and more generally, the frame of mind required for reverse-engineering such programs. How is an Option\u003cT\u003e represented using the same amount of memory as a plain T? How do monomorphized generic functions complicate RE work? What's the right approach to untangle many-layered, unintuitive iterator chains? We will tackle these questions and many more.\n\nIncludes a publicly available lab setup with several sample programs that showcase core Rust features as compiled to assembly.","original_language":"eng","persons":["Ben H"],"tags":["37c3","11684","2023","Security",""],"view_count":4132,"promoted":false,"date":"2023-12-28T17:15:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-30T23:15:07.803+02:00","length":2530,"duration":2530,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11684-6123fb8c-75dd-48fa-810f-f7dc3cdb73a4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11684-6123fb8c-75dd-48fa-810f-f7dc3cdb73a4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11684-6123fb8c-75dd-48fa-810f-f7dc3cdb73a4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11684-6123fb8c-75dd-48fa-810f-f7dc3cdb73a4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11684-rust_binary_analysis_feature_by_feature","url":"https://api.media.ccc.de/public/events/6123fb8c-75dd-48fa-810f-f7dc3cdb73a4","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"847c9f2d-8e3d-4c68-8c82-3435fae34dd0","title":"Fuzz Everything, Everywhere, All at Once","subtitle":"Advanced QEMU-based fuzzing","slug":"37c3-12102-fuzz_everything_everywhere_all_at_once","link":"https://events.ccc.de/congress/2023/hub/event/fuzz_everything_everywhere_all_at_once/","description":"The maintainers of the AFLplusplus open-source project show crazy new ways to (ab)use QEMU to explore difficult, binary-only targets through fuzzing.\n\nWe present a proof of concept using AFL++ and QEMU to find command and SQL-injections, going beyond the classic fuzzing for memory corruption.\n\nWe also present a scalable approach to fuzzing binary-only code with LibAFL and QEMU, showcasing how to build a custom fuzzer to test Android libraries without using a phone.\n\nIn this talk, the maintainers of the AFLplusplus organization present the QEMU-based instrumentation engines developed as part of AFL++ and LibAFL to fuzz advanced binary-only targets. We discuss our extensions to QEMU, the well-known emulator, to allow high-performance, cross-architecture fuzzing and target instrumentation. Finally, we demo a proof of concept using AFL++ to find injection vulnerabilities in the binaries, going beyond the typical fuzzing for memory corruptions.\n\n\nWe then present LibAFL QEMU, a library that offers convenient APIs to hook the target using Rust. Unlike other public fuzzers, tools built with LibAFL can scale over cores and machines to find vulnerabilities faster and at a large scale. We also showcase how we built a custom fuzzer for a binary-only Android library using this new emulator API for fuzzing that scales to 96 cores almost linearly, reaching a whopping number of executions per second!\n\n","original_language":"eng","persons":["domenukk","van Hauser","Dongjia Zhang","andreafioraldi","Addison Crump"],"tags":["37c3","12102","2023","Security",""],"view_count":6707,"promoted":false,"date":"2023-12-28T13:50:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T23:45:06.981+02:00","length":2443,"duration":2443,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12102-847c9f2d-8e3d-4c68-8c82-3435fae34dd0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12102-847c9f2d-8e3d-4c68-8c82-3435fae34dd0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12102-847c9f2d-8e3d-4c68-8c82-3435fae34dd0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12102-847c9f2d-8e3d-4c68-8c82-3435fae34dd0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12102-fuzz_everything_everywhere_all_at_once","url":"https://api.media.ccc.de/public/events/847c9f2d-8e3d-4c68-8c82-3435fae34dd0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"1e0deaac-3c87-4eb1-9a6b-75ce321fede0","title":"Please Identify Yourself!","subtitle":"Digital Identity Systems in the EU \u0026 around the world","slug":"37c3-12004-please_identify_yourself","link":"https://events.ccc.de/congress/2023/hub/event/please_identify_yourself/","description":"Digital Identity Systems proliferate worldwide without any regard for their human rights impact or privacy concerns. Driven by governments and the crony capitalist solutionism peddled by the private sector, official statistics estimate that 80 % of the world’s population is condemned to use them by the end of this decade. These identification systems are a frontal attack on anonymity in the online world, might lead to completely new forms of tracking and discrimination and they are a gift to Google and other companies which are monitoring the behaviour of people on a large scale. In this talk we focus on how the recent EU reform played out, how the UN is becoming a central player in promoting their hasty adoption and which strategies civil society and hackers can deploy to fight back.\n\nAfter over two years of intense negotiations, the EU recently agreed to their Digital Identity Reform (eIDAS). In this talk we analyse the result, what safeguards we can realistically expect and how our online and offline interactions might change because of this new European Digital Identity Wallet.\nOther regions in the world are much further ahead in this issue and we will also try to learn from the experiences from India and Kenya. Both countries had unique strategies from civil society to fight back against the introduction of digital identity systems, focusing on interrogating their design, raising awareness, strategic litigation and civil disobedience post deployment .\nLastly, this issue pops up in many countries and is actively promoted as \"Digital Public Infrastructure\" by global organisations like UNDP and the World Bank - often with little to know credence to privacy or local realities. This global trend is very worrying due to the shiny veneer hiding their dark reality of exploitation by local and foreign actors. We will showcase strategies how local actors have resisted and shaped the introduction of these systems with a combination of technical, advocacy, and interdisciplinary ally building. Our goal is to provide knowledge about how exactly these systems work, who benefits from them and what strategies could be deployed against them.","original_language":"eng","persons":["Thomas Lohninger","Udbhav Tiwari"],"tags":["37c3","12004","2023","Ethics, Politics \u0026 Society",""],"view_count":7286,"promoted":false,"date":"2023-12-27T13:50:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-30T05:00:05.363+02:00","length":2741,"duration":2741,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12004-1e0deaac-3c87-4eb1-9a6b-75ce321fede0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12004-1e0deaac-3c87-4eb1-9a6b-75ce321fede0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12004-1e0deaac-3c87-4eb1-9a6b-75ce321fede0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12004-1e0deaac-3c87-4eb1-9a6b-75ce321fede0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12004-please_identify_yourself","url":"https://api.media.ccc.de/public/events/1e0deaac-3c87-4eb1-9a6b-75ce321fede0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"54e92649-de11-40d9-99b0-526fd4572107","title":"The Extremely Large Telescope (ELT)","subtitle":"Building the biggest optical telescope on earth","slug":"37c3-12020-the_extremely_large_telescope_elt","link":"https://events.ccc.de/congress/2023/hub/event/the_extremely_large_telescope_elt/","description":"The Extremely Large Telescope (ELT) is currently under construction in the Atacama desert in northern Chile by the European Southern Observatory (ESO). With a primary mirror aperture of 39m, it will be the largest optical telescope on earth. We will briefly introduce the history and mission of ESO and explain how a modern optical telescope works.\n\nThe European Southern Observatory (ESO) is an intergovernmental organisation founded in 1962 and is based in Garching bei München. It develops, builds and operates ground-based telescopes to enable astronomical research in the southern hemisphere and to foster cooperation in the international astronomical community. In 2012 the ESO Council approved the Extremely Large Telescope (ELT) programme and its construction is scheduled for completion in 2028. The 39m primary mirror will make the ELT the largest optical telescope at that time.\n\nIt will be located on the top of Cerro Armazones, a ~3000m high mountain in the Atacama desert in Chile. This site provides ideal optical conditions, but also comes with logistical and engineering challenges.\n\nWe will walk you through the telescope and along the optical path to the instruments and explain some of the technologies involved to push the boundaries of ground-based optical astronomy.","original_language":"eng","persons":["lk","panic"],"tags":["37c3","12020","2023","Science",""],"view_count":6185,"promoted":false,"date":"2023-12-27T22:05:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-29T06:15:03.207+02:00","length":2436,"duration":2436,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12020-54e92649-de11-40d9-99b0-526fd4572107.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12020-54e92649-de11-40d9-99b0-526fd4572107_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12020-54e92649-de11-40d9-99b0-526fd4572107.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12020-54e92649-de11-40d9-99b0-526fd4572107.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12020-the_extremely_large_telescope_elt","url":"https://api.media.ccc.de/public/events/54e92649-de11-40d9-99b0-526fd4572107","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f7375255-379f-4423-a47f-2920246a0916","title":"YOU’VE JUST BEEN FUCKED BY PSYOPS","subtitle":"UFOS, MAGIC, MIND CONTROL, ELECTRONIC WARFARE, AI, AND THE DEATH OF THE INTERNET","slug":"37c3-12326-you_ve_just_been_fucked_by_psyops","link":"https://events.ccc.de/congress/2023/hub/event/you_ve_just_been_fucked_by_psyops/","description":"How the history of military and government PSYOPS involving mind-control, UFOs, magic, and remote-control zombies, explains the future of AI and generative media. Along the way, talk attendees will be given an enrollment code to join a specialized CTF/ARG game called CYCLOPS that explores these themes and that will run the duration of Congress. \n\nAs AI-generated content, social-media influence operations, micro-targeted advertising, and ubiquitous surveillance have become the norm on the Internet and in the market in general, we have entered an era of PSYOP Capitalism. This is an era of hallucinations designed to transform each of us into a “targeted individual” through the manipulation of perception. This talk explores a secret history of reality-altering military and intelligence programs that serve as antecedents to a phantasmagoric present.\n\nAt the talk, attendees will be given a registration code to play “CYCLOPS,” a CTF/ARG game that will run the duration of Congress. CYCLOPS explores the themes of the mind-control and PSYOPS through an interactive parafictional narrative taking place in the context of an obscure CIA cognitive warfare program from the early days of the Cold War.\n","original_language":"eng","persons":["Trevor Paglen"],"tags":["37c3","12326","2023","Art \u0026 Beauty",""],"view_count":71441,"promoted":false,"date":"2023-12-27T16:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T20:15:05.920+02:00","length":3349,"duration":3349,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12326-f7375255-379f-4423-a47f-2920246a0916.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12326-f7375255-379f-4423-a47f-2920246a0916_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12326-f7375255-379f-4423-a47f-2920246a0916.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12326-f7375255-379f-4423-a47f-2920246a0916.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12326-you_ve_just_been_fucked_by_psyops","url":"https://api.media.ccc.de/public/events/f7375255-379f-4423-a47f-2920246a0916","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"0eced221-299d-4dba-ad51-6063978b2b41","title":"Decentralized energy production: green future or cybersecurity nightmare?","subtitle":"The cybersecurity dark side of solar energy when clouds are involved","slug":"37c3-11810-decentralized_energy_production_green_future_or_cybersecurity_nightmare","link":"https://events.ccc.de/congress/2023/hub/event/decentralized_energy_production_green_future_or_cybersecurity_nightmare/","description":"In this talk we will have a look at some cybersecurity challenges raised by the trend of decentralizing our energy production.\n\n\nOur energy infrastructure is now changing from a centralized system based on big power plants to a more decentralized system based on renewable energy produced by smaller power plants (maybe yours). In Germany alone, [300.000 so called balcony power plants were in operation by August 2023](https://www.heise.de/hintergrund/Ueber-300-000-Balkonkraftwerke-in-Deutschland-in-Betrieb-Statistik-der-Woche-9285107.html). Most of these smaller power plants are / will be somehow connected to some cloud services.\n\n\nTo show that security hasn't been the biggest priority, we will examine the cybersecurity controls of different solar inverters. To put it mildly: there is room for improvement.\n\n\nWe will also discuss the need for better regulations and enforcement of cybersecurity for smaller connected power plants: altogether they probably produce more power than the bigger ones - and this trend is accelerating.\nProtecting our infrastructure shall have - today more than ever before - a high priority.\n\n\n\nContext: cybersecurity for future energy production systems\n-----------------------------------------------------------\n\n\nCybersecurity for smaller solar power plants is a critical challenge: strong separation between operational, safety relevant network and internet is not present. Moreover, manufacturers do not invest enough in security; reason being high competition in terms of time to market, price pressure and lack of security knowledge.\n\n\nThese power plant systems need more or less an internet connection in order to fetch power \u0026 energy data from the plant with an app, perform firmware updates, and carry out maintenance remotely.\n\n\nThe central device, which is connected to the internet, is the inverter. Many companies provide inverters for solar power plants and include cloud connectivity. An inverter converts the energy from the solar panels to grid compatible energy. Since it handles high currents \u0026 voltages, the physical consequences of cybersecurity risks are arguably higher than for standard smart home devices.\n\n\nResearch results related to connected solar inverters (technical part)\n----------------------------------------------------------------------\n\n\nOut of curiosity, I tested different inverters from different manufacturers, including cloud connectivity. All devices have a license to be operated in Germany and are very popular. They are used in solar power plants of different sizes, from balcony size to bigger plants. \nIn this section some research results will be presented, we will especially focus on one system.\n\n\n**Positive note: critical vulnerabilities have been patched by now.**\n\n\nVulnerabilities\n---------------\n\n\n* *Insecure Direct Object Reference* (IDOR) or similar vulnerabilities have been found, allowing an attacker with a simple account to execute commands on connected inverters remotely. This was an enabler for many further attacks.\n* An attacker could trigger a firmware update process on connected inverters.\n* The firmware update process was not properly secured: update images did not include a cryptographic signature.\n* Most of the devices did not use the TLS protocol for cloud communication or did not use it correctly.\n* Secure boot and secure debugging were not implemented.\n* On the server side, there were insufficient sanity checks.\n* Sensitive data (e.g. serial number) was easy to extract.\n\n\nExploitation\n------------\n\n\n* Commands could be executed on any connected devices (e.g. switch ON, switch OFF, change parameters).\n* The power electronics and relays of devices could be manipulated remotely with a malicious firmware update.\n* By manipulating many devices synchronously the stability of the grid could be endangered.\n\n\nA proof of concept with a full (unlocked) exploit chain will be presented.\n\n\nConclusion and Discussion\n-------------------------\n\n\nRemoving bureaucratic hurdles is an important step in order to democratize our energy production - and renewable energies are the future! On the other hand, if it comes at the cost of poorly-secured devices, this may be jeopardized.\n\n\nIn Germany, we have the Kritis Verordnung (decree) to protect for example the electricity infrastructure. It states that every power [plant with more than 104 MW capacity is required to have specific protections](https://www.gesetze-im-internet.de/bsi-kritisv/anhang_1.html). Individually, the small solar power plants are not in this category. However, summing up all devices connected to one cloud, we probably reach these numbers by now - and if not, tomorrow. Current projections point in that direction.\n\n\nDuring this research, I realized how easy it is to take control of energy production devices and it scared me. The cloud connectivity and the related \"remote control / remote maintenance\" and \"firmware update\" processes are truly critical and attacks may scale. Even if vulnerabilities are patched by now, an attacker who finds a way into the cloud servers can control all connected inverters.\n\n\nOn the other hand, it seems that there are no security related regulations regarding these systems as of today in the European Union. The [EU Cyber Resilience Act](https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act), which will apply to these devices is still in discussion and is likely to be effective soon. However, manufacturers will probably have a grace period of 36 months to comply: by then, many insecure devices will already be installed. Knowing how many bad guys are out there, the risk is there and growing rapidly.\n\n","original_language":"eng","persons":["Sebastien"],"tags":["37c3","11810","2023","Security",""],"view_count":3944,"promoted":false,"date":"2023-12-28T22:05:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-31T23:30:08.221+02:00","length":2370,"duration":2370,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11810-0eced221-299d-4dba-ad51-6063978b2b41.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11810-0eced221-299d-4dba-ad51-6063978b2b41_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11810-0eced221-299d-4dba-ad51-6063978b2b41.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11810-0eced221-299d-4dba-ad51-6063978b2b41.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11810-decentralized_energy_production_green_future_or_cybersecurity_nightmare","url":"https://api.media.ccc.de/public/events/0eced221-299d-4dba-ad51-6063978b2b41","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"91ab3951-df7a-4a92-a457-2c72cfde66ec","title":"37C3 カラオケ – Herausforderungen der aktuellen Karaokeforschung ","subtitle":"vom Deutschen Institut für Karaokeforschung","slug":"37c3-12303-37c3_herausforderungen_der_aktuellen_karaokeforschung","link":"https://events.ccc.de/congress/2023/hub/event/37c3_herausforderungen_der_aktuellen_karaokeforschung/","description":"Vorstandsvorsitzende Gitte Schmitz stellt aktuelle Ergebnisse des Deutschen Instituts für Karaokeforschung vor. \n\nLiebe Fördermitglieder des Institutes für Karaokeforschung,\n\nin den letzten Tagen haben wir uns intensiv mit den Karaoke-Gewohnheiten der örtlichen Bevölkerung des 37C3 im CCH befassen können. Unsere motivierten Proband\\*innen im Alter zwischen 17 und 85 Jahren haben uns in dieser repräsentativen Studie direkte Einblicke in ihren Alltag gegeben. Allein dafür sind wir unendlich dankbar, Sie haben der Karaokeforschung einen großen Dienst erwiesen!\n\nNun möchten wir Euch und Ihnen in einer Zwischenpräsentation Insights aus unserem aktuellen Kooperationsprojekt mit dem 37C3 präsentieren – und damit auch die dritte Phase der international angelegten Forschungsarbeit einläuten. \n\nIm Namen des gesamten Vorstandes möchte ich mich bei Ihnen recht herzlich für die Unterstützung auch im nächsten Jahr bedanken. Gleichzeitig die Bitte, Ihre Bankverbindung zu überprüfen, um die Arbeit unserer Buchhaltung zu vereinfachen. Wir freuen uns über Ihre Teilnahme an der Präsentation und bitten um eine kurze Bestätigung.\n\nEs grüßt Sie herzlich\nIhre Gitte Schmitz\n(Vorsitzende Deutsches Institut für Karaokeforschung)","original_language":"deu","persons":["Gitte Schmitz "],"tags":["37c3","12303","2023","Entertainment",""],"view_count":4209,"promoted":false,"date":"2023-12-30T17:35:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-01T20:30:06.684+02:00","length":2528,"duration":2528,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12303-91ab3951-df7a-4a92-a457-2c72cfde66ec.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12303-91ab3951-df7a-4a92-a457-2c72cfde66ec_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12303-91ab3951-df7a-4a92-a457-2c72cfde66ec.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12303-91ab3951-df7a-4a92-a457-2c72cfde66ec.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12303-37c3_herausforderungen_der_aktuellen_karaokeforschung","url":"https://api.media.ccc.de/public/events/91ab3951-df7a-4a92-a457-2c72cfde66ec","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"32189fea-f720-4c7d-b32b-f599954d94a8","title":"Infrastructure of a migratory bird","subtitle":"Technology and autonomy in more-than-human networks","slug":"37c3-12068-infrastructure_of_a_migratory_bird","link":"https://events.ccc.de/congress/2023/hub/event/infrastructure_of_a_migratory_bird/","description":"What does it take to create a \"wild animal\"? While one might think \"wildness\" implies the absence of humans, in the age of the anthropocene and rapid climate change, the opposite is the case. It requires the development of an extensive, more-than-human-infrastructure. Our talk is based on artistic research into the ongoing rewilding project of the Northern bald ibis (Waldrapp), a large migratory bird, that has become extinct north of the alps in 1621 and are being released into the wild since 2013. The output of this research was rendered into a website which serves as a departure point of our talk. \n\nWe outline the heterogeneous elements that make up the infrastructure of the rewilding project and what kind of situations are being produced therein. The graph of \"the infrastructure of a migratoy bird\" shows relationships between social, technological, informational, and ecological elements which make up the anthropogenic ecosystem in which the bird is becoming wild again. The objective was to visualise and comprehend the intricate network of data, energy resources, and dependencies deeply enmeshed within the project's framework. \n\nWe will also focus on the types of data being produced and to what extent \"acting\" within this framework is informed to observation of movement data. One can trace the flow of information, observe how data is generated, processed and ultimately mediated. As a migratory bird that travels between 1600 and 4600km per year (from summer to winter habitats and back) this project could not be realized without intensive use of technology. This falls into two categories: assisted migration and location/movement tracking. As a social species, the birds have an instinct to migrate, but the concrete migration routes and destinations are socially learned. With the extinction, this social knowledge became extinct as well. This is a challenge and an opportunity for the project. On the one hand, the birds need to be trained the unnatural behaviour of following a light airplane, on the other hand, humans can guide them to specific areas where socio-environmental conditions are suitable for habitation. Currently, close to 85% of the more than 200 surviving rewilded birds are wearing a GPS/GSM tracker that enables near real-time monitoring of locations and movements. This data is used for monitoring the birds for signs of distress (injury, problems along the route, death etc), and for feeding an app (Animaltracker) that allows the interested public to track the birds and, to a limited degree, for behavioural research.\n\nFrom this, a different notion of wilderness emerges. Here it denotes not the separation from human culture, but a degree of freedom and autonomy in making decisions. Technology, the real-time tracking and social media coverage, serves as a way to increase the autonomy of the bird, supporting them to survive outside captivity, yet within densely populated, deeply cultured environments. Technology's main purpose here is not surveillance but care, both directly by enabling biologists to help struggling animals in the wild, but also indirectly, by supporting a deeper, affective relationship of the population towards wild animals which are no longer anonymous, but known by name, each with its distinct history and personal character. ","original_language":"eng","persons":["Gordan Savičić","Felix Stalder"],"tags":["37c3","12068","2023","Art \u0026 Beauty",""],"view_count":1597,"promoted":false,"date":"2023-12-28T11:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-23T12:30:06.047+01:00","length":2493,"duration":2493,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12068-32189fea-f720-4c7d-b32b-f599954d94a8.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12068-32189fea-f720-4c7d-b32b-f599954d94a8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12068-32189fea-f720-4c7d-b32b-f599954d94a8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12068-32189fea-f720-4c7d-b32b-f599954d94a8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12068-infrastructure_of_a_migratory_bird","url":"https://api.media.ccc.de/public/events/32189fea-f720-4c7d-b32b-f599954d94a8","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"d3155610-f0c8-4ee7-b397-e38f46264ce6","title":"Energy Consumption of Datacenters ","subtitle":null,"slug":"37c3-11796-energy_consumption_of_datacenters","link":"https://events.ccc.de/congress/2023/hub/event/energy_consumption_of_datacenters/","description":"I look into the resource consumption of data centers and present my state of knowledge. I ask more questions than I give answers.\n\nThe increase has already been exponential for years. With the AI hype, this demand for energy, cooling and water has increased dramatically. \n\nWhat is known, what is to be expected and how an upcoming crisis be avoided? Can we reuse the energy? At least partially? Are there other concepts of integrating data centers into buildings and cities? Do we have non technical patterns driving the resource exhaustion?\n\nThe AI hype has increased the demand dramatically. The existing GPU based computing paradigm cuts hard into the standard design of data centers and demands other ways of cooling. Does the approach of modeling neurons really need floating point numbers? Which alternatives could be found?\n\nThis is an update of Thomas' previous talks at the #cccamp23 Camp[1] and at the Bits und Bäume conference [2].\n\n[1] https://media.ccc.de/v/camp2023-57070-energy\\_consumption\\_of\\_data\\_centers\n[2] https://media.ccc.de/v/bitsundbaeume-19844-datenschutz-sparsamkeit-und-resourcenverbrauch-am-beispiel-einer-terminbuchungsanwendung\n","original_language":"eng","persons":["Thomas Fricke"],"tags":["37c3","11796","2023","Sustainability \u0026 Climate Justice",""],"view_count":7930,"promoted":false,"date":"2023-12-27T23:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-01T15:45:06.973+02:00","length":2150,"duration":2150,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11796-d3155610-f0c8-4ee7-b397-e38f46264ce6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11796-d3155610-f0c8-4ee7-b397-e38f46264ce6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11796-d3155610-f0c8-4ee7-b397-e38f46264ce6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11796-d3155610-f0c8-4ee7-b397-e38f46264ce6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11796-energy_consumption_of_datacenters","url":"https://api.media.ccc.de/public/events/d3155610-f0c8-4ee7-b397-e38f46264ce6","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"fddf9aa7-4952-497e-b706-2e802deef3cc","title":"37C3: Feierliche Eröffnung","subtitle":null,"slug":"37c3-12338-37c3_feierliche_eroffnung","link":"https://events.ccc.de/congress/2023/hub/event/37c3_feierliche_eroffnung/","description":"Achievement unlocked! Der 37C3 öffnet seine Pforten und heißt das Publikum herzlich willkommen. Von erfahrenen Zeremonienmeistern wird Euch hier der notwendige Schwung verpasst, geschmeidig durch den Congress zu gleiten und die Vorfreude zu atmen, die das gesamte Team seit Monaten auf die Veranstaltung im Herzen trägt.","original_language":"deu","persons":["derPUPE","Katharina Nocun","Mullana"],"tags":["37c3","12338","2023","CCC",""],"view_count":9466,"promoted":false,"date":"2023-12-27T10:30:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-28T17:45:05.154+01:00","length":2114,"duration":2114,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12338-fddf9aa7-4952-497e-b706-2e802deef3cc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12338-fddf9aa7-4952-497e-b706-2e802deef3cc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12338-fddf9aa7-4952-497e-b706-2e802deef3cc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12338-fddf9aa7-4952-497e-b706-2e802deef3cc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12338-37c3_feierliche_eroffnung","url":"https://api.media.ccc.de/public/events/fddf9aa7-4952-497e-b706-2e802deef3cc","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d","title":"Lightning Talks Day 2","subtitle":null,"slug":"37c3-11696-lightning_talks_day_2","link":"https://events.ccc.de/congress/2023/hub/event/lightning_talks_day_2/","description":"Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!\n\nTo get involved and learn more about what is happening please see the Links for this event. The second session will take place in another Hall and is not on the Fahrplan. See the Schedule link.","original_language":"eng","persons":["gedsic","bigalex"],"tags":["37c3","11696","2023","CCC",""],"view_count":2249,"promoted":false,"date":"2023-12-28T16:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2025-12-29T20:45:17.438+01:00","length":6797,"duration":6797,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11696-ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11696-ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11696-ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11696-ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11696-lightning_talks_day_2","url":"https://api.media.ccc.de/public/events/ef9e6a6d-8084-4c2a-9cfa-15fc66a6867d","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"65206c56-8766-4809-8d3b-9eb8028a63fe","title":"Should e-voting experience of Estonia be copied?","subtitle":"Observer report of 2023 parliamentary elections","slug":"37c3-12298-should_e-voting_experience_of_estonia_be_copied","link":"https://events.ccc.de/congress/2023/hub/event/should_e-voting_experience_of_estonia_be_copied/","description":"Although electronic voting has been used 13 times in various elections in Estonia since 2005, the legal, procedural and technical problems are far from solved, but have rather backfired in political situation getting more complicated.\n\nElectronic voting is hard to observe because one can't directly see into computers. In case of Estonia, the cryptographic measures to verify the processes are only partially implemented, but as voters have to download a voting application that implements a protocol with a public specification, observers/voters can obtain a special insight into processes by implementing their own tools to cast and verify the votes.\n\nEngaging in that kind of participative observation with special tools in 2023 parliamentary elections in Estonia it appeared that the official voting software implemented the process that was not following the specification up to the point of diverging from requirements set in laws and subordinate regulative acts. In addition to couple of vote containers that were processed ignoring the requirements, in the end it appeared that arguably all 312 181 electronic votes cast with official voting application had invalid digital signatures and failed to specify electoral district in vote text.\n\nIn paper ballot elections these kinds of ballots would have been declared invalid without hesitation, but electoral complaints filed about such electronic votes were dismissed without explanation of why ballots clearly not conforming to legal requirements were counted. This has resulted in a parliament where 22 of 101 representatives have arguably gained their mandate based on invalid ballots, but moreover this indicates that after about 20 years of electronic voting in Estonia, in order to run the elections huge amounts of legal and technical make-believe is needed.\n\nIf manageable in small scale pilots and elections with low importance, this is hardly a case with 51% of the voters in parliamentary elections casting their votes online -- during times of political polarisation raising to unprecedented heights.","original_language":"eng","persons":["Märt Põder"],"tags":["37c3","12298","2023","Ethics, Politics \u0026 Society",""],"view_count":1651,"promoted":false,"date":"2023-12-30T12:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-17T00:00:09.265+01:00","length":2359,"duration":2359,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12298-65206c56-8766-4809-8d3b-9eb8028a63fe.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12298-65206c56-8766-4809-8d3b-9eb8028a63fe_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12298-65206c56-8766-4809-8d3b-9eb8028a63fe.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12298-65206c56-8766-4809-8d3b-9eb8028a63fe.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12298-should_e-voting_experience_of_estonia_be_copied","url":"https://api.media.ccc.de/public/events/65206c56-8766-4809-8d3b-9eb8028a63fe","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e112c214-3c40-47aa-8ca8-e8f99f6d175a","title":"Buffered Daemons","subtitle":"Sound art performance exploring the concept of translation and containers by in both digital and analog realms","slug":"37c3-12138-buffered_daemons","link":"https://events.ccc.de/congress/2023/hub/event/buffered_daemons/","description":"The work titled Buffered Daemons is a sound performance that attempts to explore the concepts of translation and non-local interaction in the sound realm. It does so by playing with the idiosyncrasies of audio representation/playback and mobilises them through the creation of an expanded musical situation.\n\nIn the piece, three different containers of sound are presented: acoustic(Sound diffusion in the architecture), digital (computer based sound algorithms) and analogue (electromagnetic tape and analog processing). This containers, or buffers, are then being intertwined by the performer creating thus sonic textures that interplay with the resonances of the space.\n\nThe strategy for the sound performance is to articulate a metaphor of a circular-buffer, a data structure used in Computer Science, to the idea brought upon in Derrida’s interview with Ornette Coleman, in which Improvisation practice in music is understood as a reading in which the borders between reading and writing are obfuscated.\n\nThe work is inspired by the concept of daemon and non-locality explored by Timothy Morton in his reading of Plato’s Ion as well as Ursula K. Le Guin’s The Carrier Bag Theory of Fiction.","original_language":"eng","persons":["Pedro A. Ramírez"],"tags":["37c3","12138","2023","Art \u0026 Beauty",""],"view_count":763,"promoted":false,"date":"2023-12-29T23:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-01-09T23:45:19.664+01:00","length":1886,"duration":1886,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12138-e112c214-3c40-47aa-8ca8-e8f99f6d175a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12138-e112c214-3c40-47aa-8ca8-e8f99f6d175a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12138-e112c214-3c40-47aa-8ca8-e8f99f6d175a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12138-e112c214-3c40-47aa-8ca8-e8f99f6d175a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12138-buffered_daemons","url":"https://api.media.ccc.de/public/events/e112c214-3c40-47aa-8ca8-e8f99f6d175a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"bc8616bf-36d2-585d-b64f-b8cd210c7559","title":"Sendezentrum: Who Killed The Internet? ","subtitle":"And a promising alternative for Public Communication and Social Media: the Fediverse!","slug":"37c3-57966-who-killed-the-internet-and-a-promising-alternative-for-public-communication-and-social-media-the-fediverse","link":"https://events.ccc.de/congress/2023/hub/event/who-killed-the-internet-and-a-promising-alternative-for-public-communication-and-social-media-the-fediverse/","description":"Has the Internet and by extension social media become solely a theater of misinformation and non-linear amusement, fed to us by puppeteer algorithms? Another social media outreach is possible! Can the Fediverse make official communication of Public Administrations more accessible, more democratic, more unbiased and therefor trustworthy? Is it the public broadcasting of social media outreach — boring but necessary? Or will it it be a circus show rivalling the Xitter drama? Aiming the reach of Youtube and co?\r\n\r\nFrom juggling moderation, over server performances, to affordances for organising alternatives to the current Circus Maximus, these and more intersecting topics of governance and self-hosting will be discussed. Guests include digital activists, developers for ActivityPub, and the showmasters related to EU Voice and Video — a pioneering pilot project showing open source alternatives for social media outreach to EU institutions. \r\n\r\nTune in to learn about political, social, and technical strategies that we can all use to promote the adoption of the Fediverse by national, local, and regional governments, as well as public and civil society institutions. Or in short: How to win over the clowns!","original_language":"eng","persons":["ZZEPPOSS"],"tags":["37c3","57966","2023","Sendezentrum"],"view_count":1643,"promoted":false,"date":"2023-12-27T21:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2025-10-24T19:30:04.864+02:00","length":2791,"duration":2791,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57966-bc8616bf-36d2-585d-b64f-b8cd210c7559.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57966-bc8616bf-36d2-585d-b64f-b8cd210c7559_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57966-bc8616bf-36d2-585d-b64f-b8cd210c7559.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57966-bc8616bf-36d2-585d-b64f-b8cd210c7559.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57966-who-killed-the-internet-and-a-promising-alternative-for-public-communication-and-social-media-the-fediverse","url":"https://api.media.ccc.de/public/events/bc8616bf-36d2-585d-b64f-b8cd210c7559","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"1dbaf470-5dff-4cbb-a1ef-40d75c01c43f","title":"37C3: Feierlicher Abschluss","subtitle":null,"slug":"37c3-12339-37c3_feierlicher_abschluss","link":"https://events.ccc.de/congress/2023/hub/event/37c3_feierlicher_abschluss/","description":null,"original_language":"deu","persons":["Katharina Nocun","derPUPE","Mullana"],"tags":["37c3","12339","2023","CCC",""],"view_count":3081,"promoted":false,"date":"2023-12-30T18:20:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-13T13:30:08.152+01:00","length":1574,"duration":1574,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12339-1dbaf470-5dff-4cbb-a1ef-40d75c01c43f.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12339-1dbaf470-5dff-4cbb-a1ef-40d75c01c43f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12339-1dbaf470-5dff-4cbb-a1ef-40d75c01c43f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12339-1dbaf470-5dff-4cbb-a1ef-40d75c01c43f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12339-37c3_feierlicher_abschluss","url":"https://api.media.ccc.de/public/events/1dbaf470-5dff-4cbb-a1ef-40d75c01c43f","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f60110ec-38e4-4730-b906-5363e3a90f84","title":"KIM: Kaos In der Medizinischen Telematikinfrastruktur (TI)","subtitle":null,"slug":"37c3-12030-kim_kaos_in_der_medizinischen_telematikinfrastruktur_ti","link":"https://events.ccc.de/congress/2023/hub/event/kim_kaos_in_der_medizinischen_telematikinfrastruktur_ti/","description":"Elektronische Arbeitsunfähigkeitsbescheinigungen (eAU), Arztbriefe, medizinische Diagnosen, all diese sensiblen Daten werden heute mittels KIM – Kommunikation im Gesundheitswesen – über die Telematikinfrastruktur (TI) verschickt.\n\nAber ist der Dienst wirklich sicher? Wer kann die Nachrichten lesen, wo werden die E-Mails entschlüsselt und wie sicher ist die KIM-Software? Im Live-Setup einer Zahnarztpraxis haben wir Antworten auf diese Fragen gesucht.\n\nDie sichere E-Mail-Infrastruktur für Ärzt\\*innen, Apotheker\\*innen, Krankenversicherungen und Kliniken in Deutschland, KIM – Kommunikation im Gesundheitswesen – ist mit über 200 Millionen E-Mails in den letzten zwei Jahren eine der am meisten genutzten Anwendungen in der Telematikinfrastruktur (TI). KIM verspricht sichere Ende-zu-Ende-Verschlüsselung zwischen Heilberufler\\*innen in ganz Deutschland, wofür S/MIME-Zertifikate für alle medizinisch Beteiligten in Deutschland ausgegeben wurden.\n\nWas aber passiert, wenn man die Schlüsselausgabe-Prozesse in der TI falsch designt? Was passiert, wenn man unsichere Software im Feld nicht patcht? Was passiert, wenn man zu viel Sicherheit vor den Nutzenden abstrahieren möchte?\n\nDie Antwort: Man bekommt eine theoretisch kryptographisch sichere Lösung, die in der Praxis die gesteckten Ziele nicht erreicht.\n\nAlle gefundenen Schwachstellen wurden den Betroffenen im Rahmen abgeschlossener Responsible Disclosure-Prozesse mitgeteilt.","original_language":"deu","persons":["Christoph Saatjohann","Sebastian Schinzel"],"tags":["37c3","12030","2023","Security",""],"view_count":16573,"promoted":false,"date":"2023-12-27T16:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-26T15:45:08.913+01:00","length":3534,"duration":3534,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12030-f60110ec-38e4-4730-b906-5363e3a90f84.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12030-f60110ec-38e4-4730-b906-5363e3a90f84_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12030-f60110ec-38e4-4730-b906-5363e3a90f84.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12030-f60110ec-38e4-4730-b906-5363e3a90f84.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12030-kim_kaos_in_der_medizinischen_telematikinfrastruktur_ti","url":"https://api.media.ccc.de/public/events/f60110ec-38e4-4730-b906-5363e3a90f84","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f68ec6e2-72ce-4f8a-bc14-af174fdae140","title":"ARMore: Pushing Love Back Into Binaries","subtitle":"Aarch64 binary rewriting adventures but mostly pains","slug":"37c3-12254-armore_pushing_love_back_into_binaries","link":"https://events.ccc.de/congress/2023/hub/event/armore_pushing_love_back_into_binaries/","description":"A talk on the first heuristic-free static binary rewriter for aarch64.\nWhy is it the first? Because everyone else already knew how much of a bad idea this would have been.\n\nThere's a bunch of closed-source arm64 binaries out there that we can't really fuzz efficiently due to slow dynamic instrumentation. \nStatic binary rewriting has been around since decades, but was mostly focused on x86.\nPorting it to arm64 should be a straightforward task, right? \n\nThis is the story of how a simple \"4-week port of an existing x86 rewriter\" took 2+ years instead.\nMaybe the real treasure is the CVEs we made along the way? \nWarning: the talk might contain sensitive imagery of ARM Assembly. Viewers have been warned. \n","original_language":"eng","persons":["@cyanpencil (Luca Di Bartolomeo)"],"tags":["37c3","12254","2023","Security",""],"view_count":1906,"promoted":false,"date":"2023-12-28T21:10:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-29T19:30:05.877+02:00","length":2303,"duration":2303,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12254-f68ec6e2-72ce-4f8a-bc14-af174fdae140.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12254-f68ec6e2-72ce-4f8a-bc14-af174fdae140_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12254-f68ec6e2-72ce-4f8a-bc14-af174fdae140.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12254-f68ec6e2-72ce-4f8a-bc14-af174fdae140.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12254-armore_pushing_love_back_into_binaries","url":"https://api.media.ccc.de/public/events/f68ec6e2-72ce-4f8a-bc14-af174fdae140","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ad162bc8-bf6b-407d-85f6-d2254637889d","title":"Der sehende Stein der Polizeibehörden ","subtitle":"Der Einsatz von Palantir Gotham aus technischer und rechtlicher Sicht","slug":"37c3-11989-der_sehende_stein_der_polizeibehorden","link":"https://events.ccc.de/congress/2023/hub/event/der_sehende_stein_der_polizeibehorden/","description":"Der Markt von Palantir ist der öffentliche Sektor, längst in Europa und auch in Deutschland. Der umstrittene US-Softwareanbieter verarbeitet strukturierte und unstrukturierte Informationen aus Polizeidaten oder Patientendaten und versucht, sich unverzichtbar zu machen für die Behörden, mit denen er Verträge hat. In Deutschland steht Palantir allerdings eine Entscheidung des Bundesverfassungsgerichts im Weg, das erstmals über den Einsatz von heute gern als KI gehypter Software für Polizeidaten entschieden hat.\n\nDer Vortrag behandelt vier Schwerpunkte:\n1.: In welchen Bundesländern und zu welchem Zweck wird die Palantir-Software Gotham eingesetzt oder soll in Zukunft eingesetzt werden? \n2.: Wie funktioniert die Software und welche Risiken bringt ihr Einsatz mit sich?\n3.: Welche rechtlichen Einschränkungen gelten und wie könnten sie technisch umgesetzt werden? \n4.: Hessen hat sein Gesetz aufgrund der Entscheidung des Bundesverfassungsgerichts angepasst. Stellt die Neuregelung für die Gotham-Software unter dem Namen „Hessendata“ wirklich eine Verbesserung dar?\n\nÜber mit dem Einsatz der Software verbundene Risiken – darunter Diskriminierung, Stigmatisierung, Datenschutz, IT-Sicherheit, Kontrollierbarkeit – sprechen Constanze Kurz (CCC), Simone Ruf und Jürgen Bering (beide Gesellschaft für Freiheitsrechte, GFF). Beide Organisationen waren am Verfahren vor dem BVerfG beteiligt: Die GFF hatte das Verfahren initiiert und der CCC wirkte als Sachverständiger mit.","original_language":"deu","persons":["Simone Ruf","Jürgen Bering","Constanze Kurz"],"tags":["37c3","11989","2023","Ethics, Politics \u0026 Society",""],"view_count":10318,"promoted":false,"date":"2023-12-28T14:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-27T05:30:03.740+01:00","length":3571,"duration":3571,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11989-ad162bc8-bf6b-407d-85f6-d2254637889d.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11989-ad162bc8-bf6b-407d-85f6-d2254637889d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11989-ad162bc8-bf6b-407d-85f6-d2254637889d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11989-ad162bc8-bf6b-407d-85f6-d2254637889d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11989-der_sehende_stein_der_polizeibehorden","url":"https://api.media.ccc.de/public/events/ad162bc8-bf6b-407d-85f6-d2254637889d","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ebbb938f-c1f7-4aad-a37d-ba1aea84eac0","title":"A NEW HOPE [de]","subtitle":"Ein Pep Talk für alle, die gerade verzweifeln ","slug":"37c3-11904-a_new_hope_de","link":"https://events.ccc.de/congress/2023/hub/event/a_new_hope_de/","description":"Hinter der Stadt brennt der Wald und der Kanzler hetzt gegen Flüchtende wie eine auf Reddit trainierte KI, der Freundeskreis zerbricht am Nahostkonflikt, außerdem wurde das Backup vergessen und das Kilo Tomaten ist auch schon wieder einen Euro teurer. Gründe zum Verzweifeln gibt es genug. Wir sprechen deshalb mit Aktivist\\*innen, die sich den multiplen Krisen entgegenstellen, darüber, was sie eigentlich noch hoffen lässt. \n\nDie Klimakrise und der Nahostkonflikt eskalieren, die Ampel bläst zur Abschiebeoffensive, die AfD ist bei über 20 % und die CDU will vorsorglich schon mal Autobahnen bauen. Derweil machen KI \u0026 Kommerz das Internet kaputt und Elon Musk Twitter. Demnächst verschwindet dann auch noch das letzte Katzenvideo hinter irgendeiner Paywall, so dass man sich nicht mal mehr vernünftig ablenken kann – es ist zum Verzweifeln in diesen Zeiten.\n \nWie soll man da noch Hoffnung schöpfen? Wenn auch ihr euch diese Frage stellt, wenn ihr mit dem Gefühl der Resignation bereits vertraut seid, dann seid ihr hier genau richtig:\n\nWir haben Aktivist\\*innen zusammengebracht, die sich auf die Straße kleben, Menschen pflegen oder Daten schützen, die an unterschiedlichen Krisenherden täglich kämpfen und scheitern: Gewerkschafter\\*innen, Antifaschist\\*innen, humanitäre Helfer\\*innen – wir haben sie gefragt, warum und worauf sie überhaupt noch hoffen, und wir haben sie auf die CCC-Bühne eingeladen, damit wir uns darüber austauschen und gemeinsam neue Hoffnung schöpfen können – denn noch gibt es sie: Strategien, die funktionieren, starke Bündnisse und zumindest Teilerfolge: Hier \u0026 da können wir uns also gegenseitig Mut machen. ","original_language":"deu","persons":["Ruben Neugebauer","Johannes Bayer","Linus Neumann","Carla Reemtsma","Arne Semsrott","Lara Eckstein","Thomas Lohninger","Helena Steinhaus","Pia Klemp","Ela","Kirsten Rautenstrauch","Sebastian Jünemann","Tareq Alaows"],"tags":["37c3","11904","2023","CCC",""],"view_count":15749,"promoted":false,"date":"2023-12-28T21:10:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-05T10:30:10.115+01:00","length":2427,"duration":2427,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11904-ebbb938f-c1f7-4aad-a37d-ba1aea84eac0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11904-ebbb938f-c1f7-4aad-a37d-ba1aea84eac0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11904-ebbb938f-c1f7-4aad-a37d-ba1aea84eac0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11904-ebbb938f-c1f7-4aad-a37d-ba1aea84eac0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11904-a_new_hope_de","url":"https://api.media.ccc.de/public/events/ebbb938f-c1f7-4aad-a37d-ba1aea84eac0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"72737c97-5751-53f6-b36f-05ea193ad4bc","title":"Offene Hör Muscheln","subtitle":"(OHM #019)","slug":"37c3-57926-offene-hr-muscheln-ohm-019","link":"https://events.ccc.de/congress/2023/hub/event/offene-hr-muscheln-ohm-019/","description":"Erdgeist \u0026 Monoxyd denken laut. Aufgrund des großen Erfolgs soll das jetzt auch beim Congress versucht werden. Themen? Ja! Wahrscheinlich irgendwas mit so... Dingen, die gerade passiert sind und zu denen mal was gesagt werden muss. Besser wir als Lanz \u0026 Precht!","original_language":"deu","persons":["monoxyd","Erdgeist"],"tags":["37c3","57926","2023","Sendezentrum"],"view_count":1164,"promoted":false,"date":"2023-12-27T22:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-05T11:45:10.368+01:00","length":2723,"duration":2723,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57926-72737c97-5751-53f6-b36f-05ea193ad4bc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57926-72737c97-5751-53f6-b36f-05ea193ad4bc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57926-72737c97-5751-53f6-b36f-05ea193ad4bc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57926-72737c97-5751-53f6-b36f-05ea193ad4bc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57926-offene-hr-muscheln-ohm-019","url":"https://api.media.ccc.de/public/events/72737c97-5751-53f6-b36f-05ea193ad4bc","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e12908b4-4f5a-4b8b-8628-206f25b0d7f5","title":"The Unfolding Space Glove","subtitle":"A Wearable for the Visually Impaired Translating 3D Vision into Haptic Stimuli","slug":"37c3-11792-the_unfolding_space_glove","link":"https://events.ccc.de/congress/2023/hub/event/the_unfolding_space_glove/","description":"The Unfolding Space Glove transmits the relative position and distance of nearby objects as vibratory stimuli to the back of the hand, enabling blind people to haptically explore the depth of their surroundings. The talk will give a brief overview of the design research project, from the first prototypes to an empirical study and its publication, and provide insights into the underlying hardware and software.\n\nBeing born blind or losing sight is a major challenge, as it impairs the ability to acquire information about surroundings, to manage everyday life independently and, consequently, to participate equally in social, public and economic life. Technical aids developed to assist VIPs with certain tasks work well in the laboratory but regularly fail in practice because they are bulky or user-unfriendly. As a result, the target group resorts to traditional tools or simply lives with the shortcomings. Given the rapid changes in technology and low cost of digital tools, I saw great potential in addressing this issue as an interaction design project.\n\nThe result is an open-source Sensory Substitution device – the Unfolding Space Glove: it transmits the relative position and distance of nearby objects, detected by an on-board 3D camera, to the back of the hand in the form of vibratory stimuli. This allows the user to haptically explore the depth of the surrounding space and assists with navigation tasks such as object recognition and wayfinding. The prototype requires no external hardware, is highly portable, works in all lighting conditions, and provides continuous and immediate feedback – all while being visually unobtrusive.\n\nThe basic premise of the proposed concept of Sensory Substitution is that the function of a missing or impaired human sensory modality can be replaced by stimulating another sensory modality using the missing information. This only works because the brain is plastic enough to learn to associate the new stimuli with the missing modality, as long as they share the same basic characteristics. There have been a number of projects looking at this, but so far very few practical implementations have been proposed, which in turn are used by a negligible number of people. While the technology used is sometimes highly sophisticated, design and usability often suffer.\n\nTaking into account the problems of existing devices and specifically addressing usability and interaction design requirements, the Unfolding Space Glove was designed and developed in a four-year interaction design research project. In 2021, the prototype was tested in an empirical study with 14 sighted and blind subjects, the results of which were published in a scientific, peer-reviewed paper in 2022.\n\nI would like to introduce you to the field of Sensory Substitution, share this project with you, show pitfalls, problems (for me coming from a non-IT background) and some technical details and ask for your feedback and input. I will have the device with me if you want to have a closer look at it after the talk. Testing would only be possible in smaller groups by appointment.","original_language":"eng","persons":["Jakob Kilian"],"tags":["37c3","11792","2023","Hardware \u0026 Making",""],"view_count":883,"promoted":false,"date":"2023-12-27T20:15:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-28T20:30:05.159+01:00","length":2355,"duration":2355,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11792-e12908b4-4f5a-4b8b-8628-206f25b0d7f5.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11792-e12908b4-4f5a-4b8b-8628-206f25b0d7f5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11792-e12908b4-4f5a-4b8b-8628-206f25b0d7f5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11792-e12908b4-4f5a-4b8b-8628-206f25b0d7f5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11792-the_unfolding_space_glove","url":"https://api.media.ccc.de/public/events/e12908b4-4f5a-4b8b-8628-206f25b0d7f5","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"c5882624-ff94-4dc3-aadd-f18ce4af5294","title":"Unlocking the Road Ahead: Automotive Digital Forensics","subtitle":"A deep dive into an underrepresented research area","slug":"37c3-11935-unlocking_the_road_ahead_automotive_digital_forensics","link":"https://events.ccc.de/congress/2023/hub/event/unlocking_the_road_ahead_automotive_digital_forensics/","description":"The importance and relevance of vehicles in investigations are increasing. Their digital capabilities are rapidly growing due to the introduction of additional services and features in vehicles and their ecosystem.\n\nIn this talk on automotive digital forensics, you will embark on a journey through the cutting-edge world of automotive technology and the critical role digital forensics plays in this domain. We will explore the state-of-the-art methods and tools to investigate modern vehicles, shedding light on forensic experts' significant challenges.\n\nThis presentation delves into the latest research areas and trends, providing insights into how technology rapidly evolves in the automotive industry, creating opportunities and challenges for digital forensics specialists. We will also peer into the future, discussing the directions in which automotive digital forensics is heading and the implications for our increasingly connected and autonomous vehicle landscape.\n\nThrough case studies, you will gain a firsthand look at different investigations conducted on modern vehicles, showcasing the real-world applications of digital forensics in this field--explicitly focusing on privacy issues and security pitfalls in modern vehicles. Whether you're a seasoned expert or a curious enthusiast, this talk will give you a deeper understanding of the complex intersection of automotive technology and digital investigations.\n\nThis talk will be a deep dive into automotive digital forensics! We will explore the dynamic landscape of automotive technology and its intricate relationship with digital forensics. Our journey will traverse classical in-vehicle protocols, proprietary communication methods, and external interfaces, revealing these technologies' crucial role in modern vehicles.\n\nThe current toolkit, used in automotive digital forensics investigations, includes the Berla iVe for infotainment analyses and specialized Airbag controller tools like Bosch CDR. For both, there is a limited understanding of its functionality and reliability, and for Airbag controllers, even contrary research results are available. We'll discover how these tools empower forensic experts to dissect the digital traces left within vehicles and the ecosystem, uncovering invaluable insights.\n\nAs we embark on this journey, we'll confront significant challenges faced by automotive digital forensics practitioners. These obstacles include limited accessibility to vehicle systems, the integration of proprietary technologies, a shortage of knowledge and expertise in this domain, concerns over safety implications, and the absence of standardized storage systems.\n\nKeeping pace with the latest research trends, we'll delve into process development, the introduction of additional tools, in-depth analytical methods, and innovative investigation techniques shaping this field's future.\n\nBut the road ahead is not without twists and turns, and we'll navigate through privacy and security issues that are paramount in the automotive digital forensics landscape. We'll shed light on privacy concerns, referencing investigations like the one conducted by the Mozilla Foundation and explore security topics through real-world examples such as attacks showcased at the Pwn2Own conference and those disclosed by KeenLabs Security. We will also focus on investigations we conducted on Tesla vehicles in the area of digital forensics.\n\nThroughout this talk, you'll gain insights into the automotive ecosystem's vast capabilities for digital forensics investigations. We'll also tackle the challenges head-on, highlighting the intricate balance between privacy and security in this ever-evolving domain. Whether you're an expert in the field or intrigued by the intersection of technology and automotive investigations, this talk promises to leave you with a profound understanding of the road ahead in automotive digital forensics.","original_language":"eng","persons":["Kevin Gomez"],"tags":["37c3","11935","2023","Security",""],"view_count":8108,"promoted":false,"date":"2023-12-27T12:55:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-31T06:15:02.802+02:00","length":2164,"duration":2164,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11935-c5882624-ff94-4dc3-aadd-f18ce4af5294.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11935-c5882624-ff94-4dc3-aadd-f18ce4af5294_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11935-c5882624-ff94-4dc3-aadd-f18ce4af5294.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11935-c5882624-ff94-4dc3-aadd-f18ce4af5294.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11935-unlocking_the_road_ahead_automotive_digital_forensics","url":"https://api.media.ccc.de/public/events/c5882624-ff94-4dc3-aadd-f18ce4af5294","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"3794b61d-8f56-4e0c-8895-8c674c1d6570","title":"Demoscene now and then","subtitle":"The demoscene is an underground computer art culture.","slug":"37c3-11846-demoscene_now_and_then","link":"https://events.ccc.de/congress/2023/hub/event/demoscene_now_and_then/","description":"The demoscene is an underground computer art culture. The Speaker is a member of the Demoscene since the 1980ies and gives insights how it is now and how it was back in the days and how you can participate!\n\nThe demoscene is an underground computer art culture. The term demoscene comes from the word demo, short for demonstration. In the context of the demoscene the word demo means a realtime audiovisual application which is demonstrating the capabilities of the machine it runs on.\n\nDemosceners (\"sceners\") are what we call the folks with too much free time that abuse their computer skills to create releases under the demoscene.\n\nDemosceners often use nicknames (\"nicks\" or \"handles\") to identify themselves. They also tend to hang out in so-called demogroups. Some demosceners are active members of multiple demogroups, with or without using the same nickname.\n\nLet's get one thing clear: the demoscene has no commercial purpose. The only thing you'll get out of the demoscene, and this only comes after investing a significant amount of your free time into it, is a few useful soft skills and a large community of computer nerd friends.\n\nDemoscene releases are meant to show the limits of the machines, the technical skills and artistic sensibility of the makers. There are no rules to what kind of release you can make on the demoscene. Some demos are made as technical benchmarks, others as conceptual art, most are done just for fun. It is entirely up to you to explore what you like doing and share it with other demosceners.\n\nDemoscene releases can be divided into certain categories:\n\nTrack, an audio piece, can be in an executable format, in a tracker module format or in a pre-rendered wav/mp3 format\nGraphics entry, drawn or rendered images with fixed resolutions and/or a restricted color palette\nDemo, an audiovisual real-time executable demonstration for a certain platform\nIntro, typically a demo with file size limitation all packed into a single executable file that includes all the assets (popular size formats are 256bytes, 512bytes, 1kb, 4kb, 8kb, 64kb)\nAnimation, rendered graphics videos\nDemopack, a collection of demos in a single disk\nMusicdisk, a collection of demoscene tracks with an executable player interface\nDiskmag, a collection of texts about the demoscene with an executable graphics interface\nWild entry, everything else (including live performances, videos of demos on uncommon platforms, videos about demomaking, etc)\nReleases typically occur at demoparties, gathering events for demosceners.\n\n","original_language":"eng","persons":["LordSpreadpointAmiga"],"tags":["37c3","11846","2023","Art \u0026 Beauty",""],"view_count":8134,"promoted":false,"date":"2023-12-28T20:15:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T04:15:02.323+02:00","length":2500,"duration":2500,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11846-3794b61d-8f56-4e0c-8895-8c674c1d6570.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11846-3794b61d-8f56-4e0c-8895-8c674c1d6570_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11846-3794b61d-8f56-4e0c-8895-8c674c1d6570.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11846-3794b61d-8f56-4e0c-8895-8c674c1d6570.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11846-demoscene_now_and_then","url":"https://api.media.ccc.de/public/events/3794b61d-8f56-4e0c-8895-8c674c1d6570","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b80ae06b-778b-41c7-b4be-cc87820339d2","title":"Die Akte Xandr","subtitle":"Ein tiefer Blick in den Abgrund der Datenindustrie","slug":"37c3-11974-die_akte_xandr_ein_tiefer_blick_in_den_abgrund_der_datenindustrie","link":"https://events.ccc.de/congress/2023/hub/event/die_akte_xandr_ein_tiefer_blick_in_den_abgrund_der_datenindustrie/","description":"Dieses Jahr konnten wir erstmals im Detail nachvollziehen, wie invasiv und kleinteilig uns Werbefirmen und Datenhändler im Netz kategorisieren. Denn Microsofts Datenmarktplatz Xandr hat versehentlich ein riesiges Dokument veröffentlicht, das ungeahnte Einblicke hinter die Kulissen die Werbeindustrie erlaubt. In der Folge haben mehrere Datenschutzbehörden aus Deutschland und der EU mitgeteilt, die betroffenen Firmen und ihr Geschäft zu prüfen. Aller Cookie-Müdigkeit zum Trotz zeigt unsere Recherche: Aufgeben ist nicht. Es gibt Alternativen für das Geschäft mit unseren Daten, für die es sich zu kämpfen lohnt.\r\n\r\nWas auch immer wir im Internet tun, es wird aufgezeichnet und ausgewertet, um uns zielgerichtet Werbung anzuzeigen. An diese triste Realität haben sich viel zu viele Menschen längst gewöhnt. Wo genau unsere Daten landen, wenn wir Websites aufrufen oder Apps nutzen, das können die wenigsten nachvollziehen. Bis jetzt.\r\n\r\nDurch ein Dokument, das eigentlich nicht für die Öffentlichkeit bestimmt war, konnten wir dieses Jahr einen einmaligen Einblick gewinnen. Es ist die Angebotsliste von Xandr, einem der größten Datenmarktplätze der Werbewelt. Sie enthält mehr als 650.000 unterschiedliche Zielgruppenkategorien - also Schubladen für Menschen, um sie mit Targeted Advertising zu erreichen.\r\n\r\nBei einigen dieser Kategorien möchte man laut auflachen, bei anderen bleibt einem das Lachen im Halse stecken. Ob „fragile Senioren“ oder „leidenschaftliche Liebhaber“, ob shopping-versessene Mütter oder Menschen mit Essstörung, ob deutsche Soldat:innen oder „Geringverdiener ohne Orientierung“ – sie alle lassen sich durch die Werbeindustrie gezielt ins Visier nehmen.\r\n\r\n„Diese Liste ist das gewaltigste Dokument über den globalen Datenhandel, das ich je gesehen habe“, sagt der Wiener Tracking-Forscher Wolfie Christl und spricht von einem Skandal. Florian Glatzner vom Verbraucherzentrale Bundesverband spricht gar vom „Snowden-Moment der Online-Werbebranche\". Denn dass Werbeindustrie und Datenhändler uns überwachen, wussten wir schon lange – jetzt haben wir schwarz auf weiß, wie invasiv und detailliert das passiert.\r\n\r\nWochenlang haben wir das Dokument ausgewertet, unter anderem mit Hilfe des Datenjournalisten Johannes Gille und unserer Kollegen von The Markup aus den USA. Wir decken Hunderte äußerst bedenkliche Segmente über die Schwächen und das Verhalten von Bürger:innen aus 15 EU-Ländern auf. Wir belegen erstmals, wie stark inzwischen auch deutsche Firmen am Geschäft mit unseren Daten mitverdienen. Und wir dokumentieren, auf welch tönernen Füßen dieses Business rechtlich steht.\r\n\r\nIn unserem Vortrag präsentieren wir die wichtigsten Ergebnisse unserer \r\n[Artikel-Serie](https://netzpolitik.org/tag/die-xandr-recherche/) und die Methoden unserer Recherche. Mehrere internationale Medien haben die Recherche bereits aufgegriffen und Analysen für die USA, Australien, die Niederlande und die Schweiz veröffentlicht\r\n\r\nWir zeigen, wo genau Interessierte an die Recherche anknüpfen können – und wie Nutzer:innen selbst aktiv werden können. Nicht zuletzt machen wir klar: Das System kann weg, denn es gibt längst Alternativen zur Überwachungsindustrie.","original_language":"deu","persons":["Sebastian Meineck","Ingo Dachwitz"],"tags":["37c3","11974","2023","Ethics, Politics \u0026 Society"],"view_count":26418,"promoted":false,"date":"2023-12-27T12:55:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-23T12:15:05.185+01:00","length":2542,"duration":2542,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11974-b80ae06b-778b-41c7-b4be-cc87820339d2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11974-b80ae06b-778b-41c7-b4be-cc87820339d2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11974-b80ae06b-778b-41c7-b4be-cc87820339d2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11974-b80ae06b-778b-41c7-b4be-cc87820339d2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11974-die_akte_xandr_ein_tiefer_blick_in_den_abgrund_der_datenindustrie","url":"https://api.media.ccc.de/public/events/b80ae06b-778b-41c7-b4be-cc87820339d2","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"5e80f829-e2fe-4dd9-906c-7a18e9b7518a","title":"Blackbox Chemieindustrie","subtitle":"Die energieintensivste Industrie Deutschlands","slug":"37c3-11907-blackbox_chemieindustrie","link":"https://events.ccc.de/congress/2023/hub/event/blackbox_chemieindustrie/","description":"Am Anfang von jedem Chip, jedem Computer, jedem Plastik steht die Chemieindustrie. Sie ist Deutschlands größter Industrieverbraucher an fossilen Ressourcen wie Öl und Gas. Wir stellen eine neue Studie „Blackbox Chemieindustrie“ des BUND zum Energie- und Ressourcenbedarf der Industrie vor. Die angeblich klimaneutralen Transformationspläne der Industrie werden kritisch hinterfragt und echte Lösungen werden aufgezeigt.\n\nFlammschutzmittel für Elektrogeräte, die Metalllegierung zum Löten und Plastik für fast alle Anwendungen im Alltag – all diese Materialen produziert die Chemische Industrie. Sie steht am Anfang der Wertschöpfungskette. Die Materialien, die sie herstellt definiert das Spektrum, mit dem Produktdesigner\\*innen arbeiten können. Schockierend ist: Die Industrie verwendet nicht nur fossile Rohstoffe für viele ihrer Produkte, sondern ist auch größter Industrieverbraucher von Energie in Deutschland. Allein für die Produktion von Plastik für Verpackungen verwendet die Industrie in Deutschland mehr Primärenergie, als das Land Slowenien insgesamt. Viele Produkte der Industrie bergen Umwelt- und Gesundheitsgefahren und kein deutsches Chemieunternehmen hat eine Strategie ihre Schadstoffe zu reduzieren. Tatsächlich produzieren und exportieren die Unternehmen sogar weiterhin Schadstoffe, die in der EU längst verboten sind. Dass es so nicht weiter gehen kann erkennt auch die Industrie. Ihre angeblich klimaneutralen Transformationspfade sind technisch und wirtschaftlich nicht sinnvoll und gehen mit einem enormen Anstieg an nicht verfügbarer erneuerbarer Energie und Wasserstoff einher. Der Bedarf übersteigt was die Bundesregierung für ganz Deutschland vorsieht. Wir zeigen auf: Die Transformation der Chemieindustrie kann nicht nur innerhalb dieser Branche gedacht werden. Es darf jetzt nicht in Technologien investiert werden, die Scheinlösungen sind. Die Herausforderungen Klimakrise, Verschmutzung und Biodiversitätskrise müssen jetzt angegangen werden durch echte Defossilisierung, Ressourceneinsparung und Kreislaufwirtschaft und einer Umstellung auf sichere und nachhaltige Chemikalien. ","original_language":"deu","persons":["Janna Kuhlmann","Janine Korduan"],"tags":["37c3","11907","2023","Sustainability \u0026 Climate Justice",""],"view_count":3118,"promoted":false,"date":"2023-12-30T12:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-01-04T01:15:16.119+01:00","length":2485,"duration":2485,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11907-5e80f829-e2fe-4dd9-906c-7a18e9b7518a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11907-5e80f829-e2fe-4dd9-906c-7a18e9b7518a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11907-5e80f829-e2fe-4dd9-906c-7a18e9b7518a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11907-5e80f829-e2fe-4dd9-906c-7a18e9b7518a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11907-blackbox_chemieindustrie","url":"https://api.media.ccc.de/public/events/5e80f829-e2fe-4dd9-906c-7a18e9b7518a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"feb8a130-e621-4bbc-8ea4-441a4b2131dd","title":"Das Diskmags-Projekt","subtitle":"Frühes digitales Kulturerbe aufbereiten für Forschung und Communities","slug":"37c3-11702-das_diskmags-projekt","link":"https://events.ccc.de/congress/2023/hub/event/das_diskmags-projekt/","description":"Diskettenmagazine waren frühe elektronische Multimedia-Journale der 1980er und 1990er Jahre, die auf Diskette verbreitet wurden und nur auf den jeweils passenden Geräten benutzbar waren. Bibliotheken und Archive haben diese sogenannten „Diskmags\" damals nicht berücksichtigt, mittlerweile stellen die ca. 2.500 Magazine aber eine wertvolle Quelle für die Forschung und die Diskmags-Communities dar. Das vorgestellte Projekt baut einen Katalog auf und macht Texte durchsuchbar.\n\nEin kleines Forschungsprojekt hat sich der großen Aufgabe gewidmet, einen internationalen und systemübergreifenden Katalog zu Diskettenmagazinen der 1980er und 1990er Jahre zu erarbeiten und außerdem eine zunächst deutschsprachige Textsammlung ihrer Inhalte zu erstellen. Es liefert damit eine Grundlage für die Erforschung der frühen digitalen Zine-Kultur und ermöglicht den verschiedenen Szenekreisen, ein Stück weit in ihre eigenen Geschichten einzutauchen. Der Katalog wuchs weit schneller als zunächst angenommen und umfasst inzwischen Nachweise zu 2.500 Magazinen und mehr als 20.000 Einzelausgaben. Bei der Textsammlung gilt es, unter anderem Kompressionsverfahren zu identifizieren und Character-Mappings herzustellen, um Unicode-kompatible Texte erzeugen zu können. Aber auch die Communities helfen mit. Wie lassen sich dabei die verschiedenen rechtlichen Fragen lösen, die Urheberschaft, Leistungsschutz und Persönlichkeitsschutz betreffen? Und wie kann die Langlebigkeit des Katalogs und der Textsammlung sichergestellt werden?","original_language":"deu","persons":["Torsten Roeder"],"tags":["37c3","11702","2023","Art \u0026 Beauty",""],"view_count":1525,"promoted":false,"date":"2023-12-28T21:10:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-07T00:00:08.496+01:00","length":2534,"duration":2534,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11702-feb8a130-e621-4bbc-8ea4-441a4b2131dd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11702-feb8a130-e621-4bbc-8ea4-441a4b2131dd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11702-feb8a130-e621-4bbc-8ea4-441a4b2131dd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11702-feb8a130-e621-4bbc-8ea4-441a4b2131dd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11702-das_diskmags-projekt","url":"https://api.media.ccc.de/public/events/feb8a130-e621-4bbc-8ea4-441a4b2131dd","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"97bdc540-c53a-4ec3-949d-39e4d947db18","title":"What is this? A machine learning model for ants?","subtitle":"How to shrink deep learning models, and why you would want to.","slug":"37c3-11844-what_is_this_a_machine_learning_model_for_ants","link":"https://events.ccc.de/congress/2023/hub/event/what_is_this_a_machine_learning_model_for_ants/","description":"This talk will give a brief introduction of deep learning models and the energy they consume for training and inference. We then discuss what methods currently exist for handling their complexity, and how neural network parameter counts could grow by orders of magnitude, despite the end of Moore's law.\n\nDeclared dead numerous times, the hype around deep learning is bigger than ever. With Large Language Models and Diffusion Models becoming a commodity, we ask the question of how bad their energy consumption *really* is, what we can do about it, and how it is possible to run cutting-edge language models on off-the-shelf GPUs.\n\nWe will look at the various ways that people have come up with to rein in the hunger for resources of deep learning models, and why we still struggle to keep up with the demands of modern neural network model architectures. From low-bitwidth integer representation, through pruning of redundant connections and using a large network to teach a small one, all the way to quickly adapting existing models using low-rank adaptation.\n\nThis talk aims to give the audience an estimation of the amount of energy modern machine learning models consume to allow for more informed decisions around their usage and regulations. In the second part, we discuss the most common techniques used for running modern architectures on commodity hardware, outside of data centers. Hopefully, deeper insights into these methods will help improve experimentation with and access to deep learning models.","original_language":"eng","persons":["etrommer"],"tags":["37c3","11844","2023","Sustainability \u0026 Climate Justice",""],"view_count":1646,"promoted":false,"date":"2023-12-29T13:50:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-01-20T15:00:11.437+01:00","length":2449,"duration":2449,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11844-97bdc540-c53a-4ec3-949d-39e4d947db18.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11844-97bdc540-c53a-4ec3-949d-39e4d947db18_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11844-97bdc540-c53a-4ec3-949d-39e4d947db18.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11844-97bdc540-c53a-4ec3-949d-39e4d947db18.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11844-what_is_this_a_machine_learning_model_for_ants","url":"https://api.media.ccc.de/public/events/97bdc540-c53a-4ec3-949d-39e4d947db18","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"5807147b-2374-4ae0-b53c-a4cea848240c","title":"Software Licensing For A Circular Economy","subtitle":"What's FOSS Got To Do With It","slug":"37c3-12047-software_licensing_for_a_circular_economy","link":"https://events.ccc.de/congress/2023/hub/event/software_licensing_for_a_circular_economy/","description":"In this talk I provide an overview of the environmental harm driven by software and how FOSS is well-positioned to address the issues. I will link the inherent values that come with a Free \u0026 Open Source Software license to sustainable software design, and I will present the various ways that Free Software aligns with the Blue Angel ecolabel. Finally, I will provide an overview of the current sustainability goal of KDE and the work of the KDE Eco initiative. This includes publishing the KDE Eco handbook, setting up a measurement lab for FOSS developers (KEcoLab), squashing hundreds of efficiency bugs, among others.\n\nDigital technology is a major contributor to environmental harm, from the 'tsunami' of e-waste filling landfills to the CO2 emissions on a par with aviation industry. Often overlooked is that software -- and software licenses -- play a crucial role.\n\nSoftware and hardware are inextricably linked. A Free \u0026 Open Source Software license can disrupt the produce-use-dispose linear model of hardware consumption and enable the shift to a reduce-reuse-recycle circular model. Moving to a circular economy could reduce greenhouse gas emissions globally by up to 70%!\n\nIn this talk I provide an overview of the environmental harm driven by software and how FOSS is well-positioned to address the issues. I will link the inherent values that come with a Free \u0026 Open Source Software license to sustainable software design, and I will present the various ways that Free Software aligns with the Blue Angel ecolabel. Finally, I will provide an overview of the current sustainability goal of KDE and the work of the KDE Eco initiative. This includes publishing the KDE Eco handbook, setting up a measurement lab for FOSS developers (KEcoLab), squashing hundreds of efficiency bugs, among others.","original_language":"eng","persons":["Joseph De Veaugh-Geiss"],"tags":["37c3","12047","2023","Sustainability \u0026 Climate Justice",""],"view_count":1179,"promoted":false,"date":"2023-12-28T12:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-10T18:15:09.454+01:00","length":2458,"duration":2458,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12047-5807147b-2374-4ae0-b53c-a4cea848240c.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12047-5807147b-2374-4ae0-b53c-a4cea848240c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12047-5807147b-2374-4ae0-b53c-a4cea848240c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12047-5807147b-2374-4ae0-b53c-a4cea848240c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12047-software_licensing_for_a_circular_economy","url":"https://api.media.ccc.de/public/events/5807147b-2374-4ae0-b53c-a4cea848240c","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b805f8c3-b43d-42b9-9037-4ccab656e04a","title":"Lützerath Lebt! Einblicke in den Widerstand","subtitle":" Für globale Klimagerechtigkeit kämpfen","slug":"37c3-12077-lutzerath_lebt_einblicke_in_den_widerstand","link":"https://events.ccc.de/congress/2023/hub/event/lutzerath_lebt_einblicke_in_den_widerstand/","description":"Mobilisierung von Menschen nach Lützerath, Bauvorkehrungen zur Verteidigung treffen, die Räumungsvorbereitungen von RWE und Polizei stören, Infrastruktur-Ausbau trotz abgeschalteten Stroms, auf Presse-Anfragen aus der ganzen Welt reagieren, WLAN für alle, Live-Berichterstattung üben, Kommunikationswege absichern, Wetten dass?! gewinnen, dem kalten Wetter trotzen, sich mit andern Kämpfen solidarisieren und heimlich einen Tunnel graben.\n\nVor einem Jahr liefen die Vorbereitungen gegen die Räumung Lützeraths am größten Drecksloch Europas, Kohletagebau Garzweiler II, auf Hochtouren. Wir wollen Einblicke in diese und andere Themen geben.\n\nYou can't evict a movement! Der Energiekonzern RWE wird noch Jahre brauchen, die Kohle unter Lützi abzubaggern: Der Kampf gegen die Kohle und für Klimagerechtigkeit geht weiter! \n\n\n","original_language":"deu","persons":["Luca","Franka","Timber","Nunya","Castroya"],"tags":["37c3","12077","2023","Sustainability \u0026 Climate Justice",""],"view_count":1031,"promoted":false,"date":"2023-12-28T20:15:00.000+01:00","release_date":"2024-01-14T00:00:00.000+01:00","updated_at":"2026-03-08T08:00:04.422+01:00","length":2681,"duration":2681,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12077-b805f8c3-b43d-42b9-9037-4ccab656e04a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12077-b805f8c3-b43d-42b9-9037-4ccab656e04a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12077-b805f8c3-b43d-42b9-9037-4ccab656e04a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12077-b805f8c3-b43d-42b9-9037-4ccab656e04a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12077-lutzerath_lebt_einblicke_in_den_widerstand","url":"https://api.media.ccc.de/public/events/b805f8c3-b43d-42b9-9037-4ccab656e04a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"2a328f4e-6442-4e3c-811e-e63b3c425bd4","title":"Hirne hacken: Hackback Edition","subtitle":"Wir verhandeln mit Erpressern, damit Ihr es nicht müsst.","slug":"37c3-12134-hirne_hacken_hackback_edition","link":"https://events.ccc.de/congress/2023/hub/event/hirne_hacken_hackback_edition/","description":"Du musst mit ein paar Erpressern um mehrere Millionen verhandeln.\nDas kann sogar Spaß machen, wenn es nicht dein Geld ist.\n\nSeit gut sieben Jahren ist Ransomware ein florierendes und stetig wachsendes Geschäftsmodell für durchschnittlich und unterdurchschnittlich begabte Hacker. Wie man sich davor schützen kann, ist kein Geheimnis. Trotzdem tun es offenbar immer noch zu wenige. Weil das ärgerlich ist, erklären wir es noch einmal.\n\nÜber die Vorgehensweisen der Gangs ranken sich allerlei Mythen, die verhindern, dass Organisationen sich sinnvoll schützen. Wir berichten aus unserer Erfahrung mit unzähligen Fällen, welche Schutzmaßnahmen wirklich sinnvoll sind.\n\nDoch auch über die Verhandlungen mit den Gangstern gibt es allerlei falsche Vorstellungen, angeheizt von selbsternannten \"Cyber-Profilern\" und \"Lösungsgeld-Verhandlern\", die natürlich kein Interesse haben, ihre „Tricks\" zu verraten. Deswegen machen wir das: Wir ergründen die spieltheoretische Mechanik der Verhandlungssituation an mehreren echten Beispielen und schauen uns die Organisation der Ransomware-Gangs an.\n\nKai Biermann ist Investigativ-Journalist und hat unter anderem Mitglieder der Ransomware-Gang Conti aufgedeckt. Linus Neumann hat als IT-Security-Consultant viele Incidents gemanaget und dabei das zweifelhafte Vergnügen gehabt, mit unterschiedlichen Ransomware-Gangs zu verhandeln.\n\nDer Vortrag ist eine Weiterführung von „Hirne Hacken\" (36C3) und „Disclosure, Hack und Back\" (Chaos Communication Camp '23).","original_language":"deu","persons":["Linus Neumann","Kai Biermann"],"tags":["37c3","12134","2023","Ethics, Politics \u0026 Society",""],"view_count":51216,"promoted":false,"date":"2023-12-28T16:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-04T10:00:06.135+02:00","length":3699,"duration":3699,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12134-2a328f4e-6442-4e3c-811e-e63b3c425bd4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12134-2a328f4e-6442-4e3c-811e-e63b3c425bd4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12134-2a328f4e-6442-4e3c-811e-e63b3c425bd4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12134-2a328f4e-6442-4e3c-811e-e63b3c425bd4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12134-hirne_hacken_hackback_edition","url":"https://api.media.ccc.de/public/events/2a328f4e-6442-4e3c-811e-e63b3c425bd4","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"93d72015-6763-4bd2-9c42-cf6c54b9dcd0","title":"\"Was sind eigentlich Audio Interventionen?\"","subtitle":"Von Sound Grafitti und Protest-Jingles","slug":"37c3-12337-was_sind_eigentlich_audio_interventionen_-_von_sound_grafitti_und_protest-jingles","link":"https://events.ccc.de/congress/2023/hub/event/was_sind_eigentlich_audio_interventionen_-_von_sound_grafitti_und_protest-jingles/","description":"Wir machen Sound Grafitti mit Echokammern, produzieren Protest-Jingles und Sprachwerkstätten. Mit diesem Beitrag möchten wir euch zwei Vorgehensweisen zu dieser Art von „Protest mit Sound als Audio Intervention\" vorstellen, sowie die künstlerischen, kreativ-technischen Prozesse näher bringen und euch einladen, diese kritisch zu beäugen und zu hören, sich unserer Ideen und Verfahren zu ermächtigen und die dargestellten Formen und Ansätze nach eurem Belieben weiterzuentwickeln und anderweitig zu verwenden. Wir glauben an die Wirksamkeit von Vielfalt von Protest und sehen diesen als wichtiges Element demokratischer Meinungsbildung und um für politische Rechte zu kämpfen und gegen Diskriminierung mobil zu machen (sprich im kleinsten gemeinsamen Nenner: #fightnazis, #afdwegbassen und #saytheirnames).\r\n\r\n„Sound Grafitti\" und „Protest-Jingles\" beherbergen disruptives Potenzial und können als Audio-Interventionen bestehende Diskurse in öffentlichen und digitalen Räumen aufbrechen / bereichen. Zum einen, indem überhaupt einmal bestimmte Meinungen / Äußerungen anderen außerhalb der eigenen „Bubbles\" und Räume zugänglich gemacht werden, zum anderen, um kollektiv verfasste Äußerungen in Konfrontation mit Menschen zu bringen, um auf Probleme zu verweisen, solidarische Anliegen vorzubringen und Handlungsvorschläge (für Protest-Vorhaben) anzubieten. \r\n\r\n„Echokammern\" sind Open Source DIY-Lautsprecher für Audio-Interventionen, nutzbar für Sound-Graffiti im öffentlichen Raum. Als Basis nutzen wir Baustellenlampen, die wir zu mobilen Lautsprechern umfunktionieren. Durch einen Hack werden die allgegenwärtigen Baustellenlampen zu Mitteln der Kommunikation und Irritation im öffentlichen Raum. Ein Objekt, das uns aufmerksam macht und auf Gefahren hinweist, wird manipuliert und zur Echokammer gesellschaftlich relevanter Anliegen und Probleme. Ausgangspunkt für dieses Projekt war der rassistische Terroranschlag in Hanau im Jahr 2020, bei dem neun Menschen von einem rechtsradikalen Terroristen getötet wurden. In einer Zeit, in der es aufgrund der Pandemie und damit verbundener Regelungen nur eingeschränkt möglich war gemeinsam zu gedenken, zu protestieren und zu trauern, haben wir nach Möglichkeiten gesucht, die Forderung \"SAY THEIR NAMES\" auf die Straße zu bringen. So entstand ein Werkzeug, das seither für verschiedene politische Kämpfe und Themen genutzt wurde. So bespielten die Lautsprecher zuletzt in diesem Jahr die Straßen Berlins zum Protest gegen den Weiter-Bau der Autobahn A100.\r\n\r\nProtest-Jingles sind Audio-Beiträge zu Protestvorhaben, die diese ankündigen, flankieren, erklären und in denen Themen und damit verbundene Anliegen verhandelt werden und zur Teilnahme aufgerufen wird. 2018 hat Reclaim Club Culture damit erstmals mit eigens dafür produzierten Jingles zu einem Groß-Protest gegen Nazis unter dem Motto #afdwegbassen aufgerufen, um mit diesen die Mobilisierung (z.B. abgespielt durch DJs in Clubs, zum Teilen über Social Media, zum Versenden an Redaktionen und Journalistinnen) zu dem Protest zu unterstützen sowie um während des Protestes den Aufruf als Meinungsäußerung von Lautsprecher-Wägen abzuspielen zu können. \r\nSprachwerkstätten als Variation dessen sind mit Protest-Jingles in der Hinsicht artverwandt, als dass sie Versuche darstellen, Meinungen von Menschen zu bestimmten Themen einzuholen und künstlerisch kuratiert als Audio-Collage darzustellen und anderen zugänglich zu machen. Sie machen ein Angebot zum Reflektieren und Partizipieren, welches keinen Anspruch auf Vollständigkeit oder Wahrheit hat und immer nur eine Auswahl darstellt.\r\nDie Ergebnisse der vergangenen fünf Jahre stehen für sich und werden in diesem Beitrag in einer Auswahl auch performt. ","original_language":"deu","persons":["Thomas Liebkose","Philipp Breitenbach","Peter Breitenbach"],"tags":["37c3","12337","2023","Art \u0026 Beauty"],"view_count":1442,"promoted":false,"date":"2023-12-27T13:50:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-04T10:00:07.059+02:00","length":2509,"duration":2509,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12337-93d72015-6763-4bd2-9c42-cf6c54b9dcd0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12337-93d72015-6763-4bd2-9c42-cf6c54b9dcd0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12337-93d72015-6763-4bd2-9c42-cf6c54b9dcd0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12337-93d72015-6763-4bd2-9c42-cf6c54b9dcd0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12337-was_sind_eigentlich_audio_interventionen_-_von_sound_grafitti_und_protest-jingles","url":"https://api.media.ccc.de/public/events/93d72015-6763-4bd2-9c42-cf6c54b9dcd0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e91534ec-d9e8-46ba-a93e-bc5f2023d158","title":"Why Railway Is Safe But Not Secure","subtitle":"Security Of Railway Communication Protocols","slug":"37c3-11717-why_railway_is_safe_but_not_secure","link":"https://events.ccc.de/congress/2023/hub/event/why_railway_is_safe_but_not_secure/","description":"The railway communication network looks different from your standard corporate IT. Its hardware, software and protocols have many peculiarities since it is an old, distributed, fragmented and highly standardised system. This creates problems when trying to introduce state-of-the-art IT security, and then there is the mindset: \"But we always have done it this way!\"\n\nAlthough railways are one of the safest means of travel, they are not the most secure. What are railway engineers and IT experts fighting about? We will elaborate on the terms: Sicherheit, safety, security, and funktionale Sicherheit; and their implications.\nThe first railways were closed systems where employees had visual contact with the equipment. With the increasing amount of software and network growth, IT security is becoming a major concern. On the other hand, railway systems are made from various components with real-time and dependability requirements, and proprietary protocols, resulting in some security via obscurity. The main difference from other systems is the high degree of standardisation necessary for obtaining a permit. Consequently, changes take time and effort, resulting in the longevity of protocols.\nThis talk explains railway-specific protocols, such as GSM-R, RaSTA, and ETCS/ERMTS, their security model and known attacks. Nothing of this is new, but still, it is widely unknown.\nSo, join the talk, have fun, and learn how to stop a train - which is much simpler than starting one.","original_language":"eng","persons":["Katja Assaf"],"tags":["37c3","11717","2023","Security",""],"view_count":13384,"promoted":false,"date":"2023-12-28T12:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-01T13:30:08.646+02:00","length":2514,"duration":2514,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11717-e91534ec-d9e8-46ba-a93e-bc5f2023d158.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11717-e91534ec-d9e8-46ba-a93e-bc5f2023d158_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11717-e91534ec-d9e8-46ba-a93e-bc5f2023d158.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11717-e91534ec-d9e8-46ba-a93e-bc5f2023d158.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11717-why_railway_is_safe_but_not_secure","url":"https://api.media.ccc.de/public/events/e91534ec-d9e8-46ba-a93e-bc5f2023d158","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"7cde08a9-def1-4788-8e3e-b799e7b42556","title":"A year of surveillance in France: a short satirical tale by La Quadrature du Net","subtitle":"From the so-called Country of human rights to a surveillance State","slug":"37c3-12309-a_year_of_surveillance_in_france_a_short_satirical_tale_by_la_quadrature_du_net","link":"https://events.ccc.de/congress/2023/hub/event/a_year_of_surveillance_in_france_a_short_satirical_tale_by_la_quadrature_du_net/","description":"Fighting against surveillance has never been easy. But in the past year it has been specially tough in France. This talk is about shedding light on the many situations where the French State used surveillance to increase repression, mainly against activists, during the last months. Not to despair of this, but willing to provide a sincere overview to the rest of the world, La Quadrature du Net proposes to depict this situation as a satirical tale, with its own characters, plots and suspense. We want to show the political tension going on right now in France and how the checks and balances are lacking to stop this headlong rush to a surveillance state.\n\nLooking back to France in 2023, what do we see? Implementation of new technologies such as drones, DNA marking or new generation of spywares. Also, an intensification of political surveillance, either by law enforcement deploying disproportionate means of investigations towards environmental activists or intelligence services using cameras or GPS beacons to spy on places or people that they find too radical. It was also the year of the “8 December” case, a judicial case where among other things, encrypted communications of the prosecuted persons were considered as signs of \"clandestinity\" that reveal criminal intentions.\n\nOn top of this, we also had to deal with the legalization of biometric surveillance for the Olympics and massive censorship of social networks when riots erupted in suburbs against police violence.\n\nThis talk is about showing the reality of the situation at stake right now in France, and how it could influence the rest of Europe. At the end, we hope to raise awareness in the international community and start thinking about how, together, we can put pressure on a country who uses its old reputation to pretend to be respectful of human rights.","original_language":"eng","persons":["Noémie","Marne and Nono"],"tags":["37c3","12309","2023","Ethics, Politics \u0026 Society",""],"view_count":4464,"promoted":false,"date":"2023-12-28T12:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-18T15:45:08.802+01:00","length":2459,"duration":2459,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12309-7cde08a9-def1-4788-8e3e-b799e7b42556.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12309-7cde08a9-def1-4788-8e3e-b799e7b42556_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12309-7cde08a9-def1-4788-8e3e-b799e7b42556.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12309-7cde08a9-def1-4788-8e3e-b799e7b42556.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12309-a_year_of_surveillance_in_france_a_short_satirical_tale_by_la_quadrature_du_net","url":"https://api.media.ccc.de/public/events/7cde08a9-def1-4788-8e3e-b799e7b42556","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a06319d5-f4a6-4efa-8255-dff6317e9632","title":"Apple's iPhone 15: Under the C","subtitle":"Hardware hacking tooling for the new iPhone generation","slug":"37c3-12074-apple_s_iphone_15_under_the_c","link":"https://events.ccc.de/congress/2023/hub/event/apple_s_iphone_15_under_the_c/","description":"Hardware hacking tooling for the new iPhone generation\n\nIf you've followed the iPhone hacking scene you probably heard about cables such as the Kanzi Cable, Kong Cable, Bonobo Cable, and so on: Special cables that allow access to hardware debugging features on Lightning-based iPhones such as UART and JTAG. However with the iPhone 15, all of those tools became basically useless: USB-C is here, and with that we need new hardware and software tooling.\n\nThis talk gives you a brief history of iPhone hardware hacking through the Lightning port, and then looks at the new iPhone 15, and how - using vendor defined messages, modifying existing tooling like the Central Scrutinizer, and a bit of hardware hacking - we managed to get access to the (unfortunately locked on production devices) JTAG interface exposed on the USB-C port on the new iPhone 15.\n\nAnd how you can do it using open-source tooling too.\n\nThe iPhone's Lightning connector was a proprietary beast with a lot of hidden features: By sending custom SDQ commands there, it was possible to get it to expose hardware debugging features such as JTAG and UART. For a long time, this was only easily possible using either gray and black-market cables such as the Kanzi-Cable, or proprietary tools such as the Bonobo Cable. Last year, we released an open-source tool to get access to the iPhone debugging features called the Tamarin Cable - finally allowing anyone to get JTAG and UART on the iPhone for just a couple of $ in parts. \n\nBut then the iPhone 15 came along, and with that USB-C: All previous hardware and software tooling basically became useless, but that did not stop us from trying: We knew from the Apple Silicon macs and the work of t8012-team and the AsahiLinux project that Apple uses USB-C's VDM feature - Vendor Defined Messages - to allow access to features such as the UART console, and so chances were high that we could use something similar to get access to the hardware debugging features on the iPhone 15.\n\nSo we pre-ordered the iPhone 15, a couple of PCBs, a case of Club Mate and got started: And less than 48 hours after the launch we got JTAG working on the iPhone 15.\n\nIn this talk we will start by looking at the history of iPhone and Lightning hardware hacking, and then look at how USB-C is used for debugging on Apple Silicon devices, and what we had to do to get JTAG on the iPhone 15.\n\nWe will also use this talk to release the new version of the open-source Tamarin Cable firmware: Tamarin-C. A fully integrated, open-source debugging probe for the iPhone 15 and other Apple Silicon devices. Tamarin-C is also able to give access to a DFU mode that you can't access without sending VDMs.\n\n\nNote: This talk will not contain any 0days or previously unknown vulnerabilities. Production iPhones are locked, and so while we get access to some of the device's busses we can't for example access the CPU core.\n\n\nThis talk is about building tooling for future work.","original_language":"eng","persons":["stacksmashing"],"tags":["37c3","12074","2023","Security",""],"view_count":10697,"promoted":false,"date":"2023-12-27T12:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T03:45:02.699+02:00","length":2185,"duration":2185,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12074-a06319d5-f4a6-4efa-8255-dff6317e9632.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12074-a06319d5-f4a6-4efa-8255-dff6317e9632_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12074-a06319d5-f4a6-4efa-8255-dff6317e9632.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12074-a06319d5-f4a6-4efa-8255-dff6317e9632.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12074-apple_s_iphone_15_under_the_c","url":"https://api.media.ccc.de/public/events/a06319d5-f4a6-4efa-8255-dff6317e9632","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"44c29443-5e13-5d10-b6fe-cbd9db7eff25","title":"Och Menno","subtitle":"Military Grade Bullshit","slug":"37c3-57928-och-menno-military-grade-bullshit","link":"https://events.ccc.de/congress/2023/hub/event/och-menno-military-grade-bullshit/","description":"Das merkwürdigste aus militärischer Forschung. \r\n\r\nMilitary grade Firewall, Military grade Vollbit Verschlüsselungen etc .. das neuste Buzzword wird wieder durch das Marketing getrieben ? Als Gegenargument gibt es nun die besten militärischen Fehlentwicklungen aus 4 Jahren Och Menno Podcast. Fliegende Panzer und Uboote sind ja genauso logisch wie das vom Marketing.","original_language":"deu","persons":["Sven Uckermann"],"tags":["37c3","57928","2023","Sendezentrum"],"view_count":8192,"promoted":false,"date":"2023-12-29T23:30:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-31T18:00:06.301+02:00","length":2395,"duration":2395,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57928-44c29443-5e13-5d10-b6fe-cbd9db7eff25.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57928-44c29443-5e13-5d10-b6fe-cbd9db7eff25_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57928-44c29443-5e13-5d10-b6fe-cbd9db7eff25.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57928-44c29443-5e13-5d10-b6fe-cbd9db7eff25.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57928-och-menno-military-grade-bullshit","url":"https://api.media.ccc.de/public/events/44c29443-5e13-5d10-b6fe-cbd9db7eff25","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"df5ca65a-e3d6-42ae-9805-9bc02821ada4","title":"Lass mal das Innere eines Neuronalen Netzes ansehen!","subtitle":"","slug":"37c3-11784-lass_mal_das_innere_eines_neuronalen_netzes_ansehen","link":"https://events.ccc.de/congress/2023/hub/event/lass_mal_das_innere_eines_neuronalen_netzes_ansehen/","description":"Nachdem in den letzten Jahren dauernd der Weltuntergang durch KI heraufbeschworen wurde, ist es an der Zeit nachzuschauen, was diese ominösen Neuronalen Netze (NN) eigentlich sind. Wir beginnen mit einer anschaulichen Erklärung, wie ein NN funktioniert und warum es keine wirkliche Ähnlichkeit mit deinem Gehirn hat. Anschließend schrauben wir die Black Box, wie es so schön heißt, einfach einmal auf: Wie können NN erklärbar gemacht werden? Warum trifft ein Neuronales Netz diese oder jene Entscheidung? Was an der politischen Forderung nach erklärbarer KI ist tatsächlich umsetzbar? Außerdem werden wir sehen, wie NN manchmal schummeln, um eine Vorhersage zu treffen. Im Gegenzug tricksen wir sie auch gezielt aus.\r\n\r\nBrauchen wir wirklich einen weiteren Vortrag über Künstliche Intelligenz? In den letzten Jahren war das Thema omnipräsent, Bilder werden jetzt generiert, Texte nicht mehr selbst geschrieben und ob ich kreditwürdig bin, prüft auch so eine KI. Und wer weiß, neulich klang der Chat Bot richtig menschlich, vielleicht hat er ja doch ein Bewusstsein. \r\nIn diesem Vortrag geht es nicht um tolle Errungenschaften von KI-Systemen oder um „30 Prompts, mit denen du noch effektiver bist!“. Dieser Vortrag legt den Grundstein für ein Verständnis von maschinellem Lernen mit dem Ziel, dass du am Ende selbst die aktuellen Entwicklungen einschätzen kannst: Übertrumpfen Neuronale Netze irgendwann wirklich den Menschen? Oder können sie im Grunde gar nichts und sind massiv fehleranfällig? Und die Frage aller Fragen: Hat künstliche Intelligenz ein Bewusstsein oder steht kurz davor, eines zu entwickeln? Über all das kannst du dir nach dem Vortrag eine eigene fundiertere Meinung bilden. ","original_language":"deu","persons":["Annika Rüll"],"tags":["37c3","11784","2023","Science"],"view_count":12963,"promoted":false,"date":"2023-12-27T21:10:00.000+01:00","release_date":"2024-01-29T00:00:00.000+01:00","updated_at":"2026-04-02T10:45:06.178+02:00","length":2341,"duration":2341,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11784-df5ca65a-e3d6-42ae-9805-9bc02821ada4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11784-df5ca65a-e3d6-42ae-9805-9bc02821ada4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11784-df5ca65a-e3d6-42ae-9805-9bc02821ada4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11784-df5ca65a-e3d6-42ae-9805-9bc02821ada4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11784-lass_mal_das_innere_eines_neuronalen_netzes_ansehen","url":"https://api.media.ccc.de/public/events/df5ca65a-e3d6-42ae-9805-9bc02821ada4","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"68160267-a6a5-4a41-8a51-d8735c8aa338","title":"Breaking \"DRM\" in Polish trains","subtitle":"Reverse engineering a train to analyze a suspicious malfunction","slug":"37c3-12142-breaking_drm_in_polish_trains","link":"https://events.ccc.de/congress/2023/hub/event/breaking_drm_in_polish_trains/","description":"We've all been there: the trains you're servicing for a customer suddenly brick themselves and the manufacturer claims that's because you've interfered with a security system.\n\nThis talk will tell the story of a series of Polish EMUs (Electric Multiple Unit) that all refused to move a few days after arriving at an “unauthorized” service company. We'll go over how a train control system actually works, how we reverse-engineered one and what sort of magical “security” systems we actually found inside of it.\n\nReality sometimes is stranger than the wildest CTF task. Reality sometimes is running `unlock.py` on a dozen trains.\n\nThe talk will be a mix of technical and non-technical aspects of analysis which should be understandable for anyone with a technical background. We’ll briefly explain how modern EMUs look like inside, how the Train Control \u0026 Monitoring System works, and how to analyze TriCore machine code.","original_language":"eng","persons":["Redford","q3k","MrTick"],"tags":["37c3","12142","2023","Hardware \u0026 Making",""],"view_count":122435,"promoted":false,"date":"2023-12-27T23:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-04T01:30:04.383+02:00","length":3705,"duration":3705,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12142-68160267-a6a5-4a41-8a51-d8735c8aa338.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12142-68160267-a6a5-4a41-8a51-d8735c8aa338_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12142-68160267-a6a5-4a41-8a51-d8735c8aa338.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12142-68160267-a6a5-4a41-8a51-d8735c8aa338.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12142-breaking_drm_in_polish_trains","url":"https://api.media.ccc.de/public/events/68160267-a6a5-4a41-8a51-d8735c8aa338","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f618d3d7-d566-46f9-be2b-19c02bd33154","title":"Handsfree assistive technology","subtitle":"My technology portfolio to enable work, life, smart home and travel using a power wheelchair","slug":"37c3-12183-handsfree_assistive_technology","link":"https://events.ccc.de/congress/2023/hub/event/handsfree_assistive_technology/","description":"I am paralysed from the chest down, have no hand functions and sit in a power wheelchair. I will share some insights on spinal cord injury and my experiences of how I work, live and travel using a power wheelchair. There are millions of people who cannot control a computer, tablet, or smartphone with their hands. Assistive technology supports the main functionalities which are needed: mouse movement and different kinds of clicks. My portfolio of hands-free assistive technology enables me every day to be active without using my hands or feet. I’m going to present solutions which make my everyday life more comfortable.\n\nOne moment changed my life. I had a swimming accident in 2017, a big wave took me and I broke my neck.\n\nI am paralysed from the chest down, have no hand functions and sit in a power wheelchair. I cannot cough up independently and rely on 24/7 help to live an active life.\n\nIn the first few months, I was not able to breathe, eat, drink, speak, walk etc. by myself. In the meanwhile, I made some significant progress and began to work independently using my computer and assistive technology. Step-by-step I came back to a new kind of life. \n\nI love travelling and am fascinated by innovative technologies. I love my job in the IT industry and passionately work full-time for a startup company in Berlin.\n\nI will share some insights on spinal cord injury and my experiences of how I work, live and travel using a power wheelchair. There are millions of people who cannot control a computer, tablet, or smartphone with their hands. Assistive technology supports the main functionalities which are needed: mouse movement and different kinds of clicking.\n\nI'm really lucky to be part of the current generation. In the last couple of years, the major technology companies released significant updates in regards to voice recognition, universal design, accessibility and assistive technology.\n\nMy portfolio of hands-free assistive technology enables me every day to be active without using my hands or feet. I’m going to present Solutions which make my everyday life more comfortable\n\nI will share my personal setup which includes software and hardware. You can assume that I tested all of these products, and I’m using them in my smart home.\n\nAssistive technology is going to change the lives of many forever and is much more vital than ever before.\n\nHere are a few examples which I'm going to present.\n\nMy remodelled VW Transporter which enabled me to be the co-driver\n\nMy Smart home setup for lights, doors, tables, couch, TV, curtains, temperature and kitchen with speech, voice control and apps\n\nMy power wheelchair and its individual configuration so I can drive using my chin or head\n\nA robotic arm which allows to be a personal assistant to drink, smoke or scratch myself\n\nMy computer, smartphone and headphone setup includes a head movement mouse, voice and switch control for dictation and commanding as well as a Bluetooth module to control the smartphone with single button clicks\n\nLast but not least, I love doing videos using my GoPro and I'm happy to share my perspective","original_language":"eng","persons":["QuadWorker"],"tags":["37c3","12183","2023","Hardware \u0026 Making",""],"view_count":2847,"promoted":false,"date":"2023-12-27T19:15:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-03T22:00:06.151+02:00","length":2403,"duration":2403,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12183-f618d3d7-d566-46f9-be2b-19c02bd33154.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12183-f618d3d7-d566-46f9-be2b-19c02bd33154_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12183-f618d3d7-d566-46f9-be2b-19c02bd33154.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12183-f618d3d7-d566-46f9-be2b-19c02bd33154.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12183-handsfree_assistive_technology","url":"https://api.media.ccc.de/public/events/f618d3d7-d566-46f9-be2b-19c02bd33154","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"8fe72218-1ea0-48b4-b90e-277178d75e49","title":"Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales","subtitle":null,"slug":"37c3-12033-unlocking_hardware_security_red_team_blue_team_and_trojan_tales","link":"https://events.ccc.de/congress/2023/hub/event/unlocking_hardware_security_red_team_blue_team_and_trojan_tales/","description":"Ensuring the integrity of Integrated Circuits (ICs) against malicious hardware Trojans is paramount for secure electronic devices. One approach involves imaging the manufactured chips to compare them with their original design files. While such techniques for detecting Trojans are relatively well-known in the industry, there is a notable absence of comprehensive, publicly available case studies. To bridge this gap, we unveil a Red Team vs. Blue Team case study on hardware Trojan detection across four digital ICs in various modern feature sizes. We share our findings, algorithms, and image datasets, shedding light on the efficiency of these techniques, and offer insights into the impact of technology scaling on detection performance.\n\nWe love to put microcontrollers, systems-on-a-chip and many other Integrated Circuits (ICs) into all sorts of devices. As hardware backdoors can undermine software security, the integrity of these chips is becoming increasingly important. However, most of these microchips are manufactured in a complex global supply chain where not all parties can necessarily be trusted. Who guarantees that the chip we order is the chip we get delivered? While the European Union wants to ensure digital sovereignty through massive long-term investment in domestic IC production, we need a way to verify the integrity of microchips *today*.\n\nIn this talk, we will first briefly cover the basics of the IC design and production process. We will outline common attacks that enable the insertion of subtle malicious manipulations or backdoors, often called hardware Trojans. You don't need to have a hardware background to follow along!\n\nWe then introduce some techniques we can use to detect hardware manipulations by comparing the circuit within a microchip to its original design files by reverse engineering the chip using open-source image processing. While imaging an IC requires advanced laboratory equipment, commodity hardware is sufficient to analyze the captured images.\n\nIn the main part of our talk, we will present a case study on Trojan detection based on four different digital ICs using a Red Team vs. Blue Team approach, and give a live demonstration.\nWe will share what manipulations of our Red Team we are already able to find reliably, and where some work is still needed -- and we're calling on you to play with our algorithms and have a go at uncovering the Trojans that are still well-hidden. Of course, we have made our source code and entire image datasets available under a free and open license.\n\nWe'll conclude with an insight into the working process of our Blue Team -- what we learned, and how we failed -- and give an outlook on how we can lower the entry barrier into IC reverse engineering, unlocking the hardware security field for all.","original_language":"eng","persons":["René Walendy","e7p","Steffen Becker"],"tags":["37c3","12033","2023","Security",""],"view_count":2139,"promoted":false,"date":"2023-12-29T11:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-16T11:30:06.337+01:00","length":3608,"duration":3608,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12033-8fe72218-1ea0-48b4-b90e-277178d75e49.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12033-8fe72218-1ea0-48b4-b90e-277178d75e49_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12033-8fe72218-1ea0-48b4-b90e-277178d75e49.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12033-8fe72218-1ea0-48b4-b90e-277178d75e49.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12033-unlocking_hardware_security_red_team_blue_team_and_trojan_tales","url":"https://api.media.ccc.de/public/events/8fe72218-1ea0-48b4-b90e-277178d75e49","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b95b344e-c0d3-473d-b064-0bb58f1ca72c","title":"Darf's noch etwas visionärer sein?","subtitle":"Digital-ökologische Zukunftsvorstellungen in der deutschsprachigen Diskurslandschaft","slug":"37c3-11950-darf_s_noch_etwas_visionarer_sein","link":"https://events.ccc.de/congress/2023/hub/event/darf_s_noch_etwas_visionarer_sein/","description":"Supereffiziente digitale Technik als Lösung aller Probleme oder doch lieber die selbstgebaute ressourcensparsame Low-Tech-Variante? Die Zukunftsvorstellungen, die den Einsatz digitaler Technik und ökologische Fragen zusammendenken, sind in der deutschen Diskurslandschaft nicht gerade üppig gesät. Im Vortrag werden die Ergebnisse einer Kurzstudie präsentiert, bei der wir die Zukunftsvorstellungen digital-ökologischer Transformation bei gesellschaftspolitischen Akteuren gesucht, analysiert und zu Visionskategorien zusammengefasst haben.\n\nDer Vortrag bietet einen Einblick in die Ergebnisse einer erstmaligen systematischen Untersuchung der im deutschsprachigen Diskurs präsenten Visionen zur digital-ökologischen Transformation und setzt diese in einer Landschaft an Vorstellungen von Transformation, Nachhaltigkeit und Technikgestaltung zueinander in Beziehung. Bei der Recherche wurden zivilgesellschaftliche, staatliche, wissenschaftliche und wirtschaftliche Akteure berücksichtigt. Das Ergebnis sind sechs verschiedene Typen an Visionskategorien: „Dematerialisierung\", „Digital-ökologische Modernisierung\", „Leitplanken einer zukunftsfähigen Digitalpolitik\", „Digital-ökologischer TÜV\", „Digitale Suffizienz\" und „Low-Tech\" bilden die Landschaft der Visionen digital-ökologischer Transformation im deutschsprachigen Raum.\n\nDie Vorstellung, dass digitale Technik durch Effizienzsteigerungen zu einer Entkopplung von Wirtschaftswachstum und Ressourcenverbrauch beiträgt, kann unter dem Begriff „Dematerialisierung” gefasst werden. „Digital-ökologische Modernisierung” bezeichnet einen eher technokratischen Ansatz, in dem die ökologischen Kosten der Digitalisierung durch Sparsamkeit, Recycling und vor allem den flächendeckenden Einsatz von erneuerbaren Energien zu bewältigen sind. Vertreter\\*innen des Visionstyps „Leitplanken einer zukunftsfähigen Digitalpolitik” geben statt einer scharf formulierten Vision eher Leitplanken für die zukünftige Gestaltung der Digitalisierung im Rahmen ökologischer Grenzen vor. Die Kategorie „Digital-ökologischer TÜV” beschreibt Ansätze, die eine Bewertung des Verhältnisses von Ökologie und digitaler Technik von einer fortlaufenden Überprüfung des Einsatzes digitaler Technik abhängig machen. Bei „Digitaler Suffizienz” wird das Konzept der Suffizienz auf den Bereich Digitalisierung übertragen und orientiert sich an dem Motto „so viel Digitalisierung wie nötig, so wenig wie möglich“. Zuletzt kann die Idee der Abkehr vom linearen Fortschrittsdenken und von damit einhergehenden ressourcenintensiven High-Tech-Infrastrukturen als „Low-Tech”-Vision bezeichnet werden.\n\nIm Vortrag wird das Verhältnis der einzelnen Kategorien zueinander anhand von verschiedenen Dimensionen, wie ihr zugrundeliegendes Transformationsverständnis oder die Radikalität der beschriebenen Veränderungen, dargestellt sowie deren politische Bedeutung reflektiert. Welche Visionen erfüllen den Anspruch an eine global gerechte Digitalität der Zukunft?","original_language":"deu","persons":["Anja Höfner","Mascha Schädlich"],"tags":["37c3","11950","2023","Sustainability \u0026 Climate Justice",""],"view_count":1470,"promoted":false,"date":"2023-12-29T12:55:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2025-10-26T21:45:05.727+01:00","length":2557,"duration":2557,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11950-b95b344e-c0d3-473d-b064-0bb58f1ca72c.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11950-b95b344e-c0d3-473d-b064-0bb58f1ca72c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11950-b95b344e-c0d3-473d-b064-0bb58f1ca72c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11950-b95b344e-c0d3-473d-b064-0bb58f1ca72c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11950-darf_s_noch_etwas_visionarer_sein","url":"https://api.media.ccc.de/public/events/b95b344e-c0d3-473d-b064-0bb58f1ca72c","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f2bb95df-42f3-5f59-a202-c1a6654e5128","title":"Gala Be Need Inn","subtitle":"Locke Dun Ausgabe","slug":"37c3-57923-gala-be-need-inn-locke-dun-ausgabe","link":"https://events.ccc.de/congress/2023/hub/event/gala-be-need-inn-locke-dun-ausgabe/","description":"\"Gala Be Need Inn\" ist der deutschsprachige Quizpodcast dessen Name ein Anagramm des Originals ist. Wir klären die wirklich wichtigen Fragen des Lebens: Was ist ein Alarmstuhl, was ist der Schwiegermutter Sitz und wieso haben Schaffner in Frankreich Knallerbsen dabei?","original_language":"deu","persons":["MacSnider"],"tags":["37c3","57923","2023","Sendezentrum"],"view_count":502,"promoted":false,"date":"2023-12-28T23:30:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2025-11-14T09:45:02.918+01:00","length":5591,"duration":5591,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57923-f2bb95df-42f3-5f59-a202-c1a6654e5128.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57923-f2bb95df-42f3-5f59-a202-c1a6654e5128_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57923-f2bb95df-42f3-5f59-a202-c1a6654e5128.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57923-f2bb95df-42f3-5f59-a202-c1a6654e5128.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57923-gala-be-need-inn-locke-dun-ausgabe","url":"https://api.media.ccc.de/public/events/f2bb95df-42f3-5f59-a202-c1a6654e5128","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b64fa58b-6f1c-45ef-8dd1-c09947f8a455","title":"How to build a submarine and survive","subtitle":"Wie wir mit begrenzten Mitteln ein U-Boot gebaut haben und was ihr draus lernen könnt.","slug":"37c3-11828-how_to_build_a_submarine_and_survive","link":"https://events.ccc.de/congress/2023/hub/event/how_to_build_a_submarine_and_survive/","description":"3,4 Tonnen schwer, 4,3 Meter lang, Material: Stahl, Farbe: Orange und der Fahrzeugtyp ist „Sporttauchboot”. Vom Fund eines Drucktanks bis zum ersten Tauchgang auf den Grund eines Tagebausees – wir erzählen von unseren größten Herausforderungen sowie Fehlschlägen.\n\nWir laden euch ein zu einem technischen Beratungsgespräch für alle, die schonmal mit dem Gedanken gespielt haben, ein U-Boot zu bauen.\n\nDie einzelnen Systeme eines U-Boots sind nicht kompliziert. Aber die Schwierigkeit liegt in der Summe der Einzelsysteme, die auf engem Raum im Zusammenspiel sicher funktionieren müssen. Der Fokus des Vortrags liegt neben unserer kurzweiligen Geschichte auf den technischen Schwierigkeiten, zu denen sich in der Literatur wenig findet oder wegen derer es nicht gleich auf Anhieb funktioniert hat. Damit ihr, falls ihr ähnliches plant, einen besseren Start habt und von unseren Fehlern profitieren könnt.\n\nWas gibt es bei der Wahl eines geeigneten Drucktanks zu beachten?\nWie lässt sich eine wasserdichte Luke konstruieren?\nDrahtlose Unterwasserkommunikation mittels Ultraschall?\nWie bauen wir Redundanz in die Systeme ein?\nWie werden wir das CO2 los, um nicht zu ersticken?\nWarum sind auf einmal Risse in den Scheiben?\nWas tun, wenn nichts mehr geht?\nUnd was, wenn dann auch noch die Polizei kommt?\n\nIn dem Vortrag geht es nicht um Probleme anderer kaputter U-Boote. Wir werden das Titan-Desaster mit maximal einer Folie behandeln.\n\nMit Fotos von Selene Magnolia","original_language":"deu","persons":["Nico","Elias"],"tags":["37c3","11828","2023","Hardware \u0026 Making",""],"view_count":45919,"promoted":false,"date":"2023-12-29T21:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-03T22:00:05.513+02:00","length":3574,"duration":3574,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11828-b64fa58b-6f1c-45ef-8dd1-c09947f8a455.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11828-b64fa58b-6f1c-45ef-8dd1-c09947f8a455_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11828-b64fa58b-6f1c-45ef-8dd1-c09947f8a455.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11828-b64fa58b-6f1c-45ef-8dd1-c09947f8a455.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11828-how_to_build_a_submarine_and_survive","url":"https://api.media.ccc.de/public/events/b64fa58b-6f1c-45ef-8dd1-c09947f8a455","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"5360db94-5bf0-421f-b442-231f2f69b6c7","title":"The impact of quantum computers in cybersecurity","subtitle":" Estimating the costs of algorithms for attacks and defense applications","slug":"37c3-12034-the_impact_of_quantum_computers_in_cybersecurity","link":"https://events.ccc.de/congress/2023/hub/event/the_impact_of_quantum_computers_in_cybersecurity/","description":"In in this talk we explore the potential ramifications of quantum computing in the field of cybersecurity We'll delve into two critical aspects: the application of quantum machine learning algorithms for defence and the impact of quantum attacks on cryptography and post-quantum cryptography for offence. We'll present insights on the theoretical advantages of quantum algorithms, improvements in factoring large numbers, and the impacts of post-quantum crypto attacks. While the hype around quantum technologies is growing, the estimates in the resources needed to run a quantum algorithm and the current number of qubits pose caution in the enthusiasm. The limitations in terms of available qubits, error rates, and scalability are critical factors that need to be considered when assessing the real-world applicability of quantum computing.\n\nWe will start with a fundamental introduction to quantum computing to ensure that the audience has a solid grasp of this model of computation, but without discussing the technicalities of quantum physics. Taking a \"software development\" perspective, we introduce the problem of estimating the resources needed to perform a quantum computation. Then, we will shift our focus to the two facets of our investigation: applications for offence and defence. \n\n\nQuantum machine learning for defence:\n\nWe will explore the application of quantum machine learning algorithms in network intrusion detection. Quantum machine learning holds the potential for improving cybersecurity defences by leveraging quantum algorithms - exponentially faster than classical algorithm on their asymptotic complexity. We will introduce a framework for estimating the advantages of quantum algorithms in terms of query complexity, and report the findings of our experiments. Our findings will be based on practical experiments using benchmark datasets in cybersecurity, offering insights into the potential effectiveness of quantum approaches in this domain.\n\nQuantum attacks on cryptography for offence:\n\nShifting our attention to the offensive side, we will investigate the potential impact of quantum attacks on cryptography. We will report some advancements in the number of qubits required to break RSA2048 cryptography and attacks on ECC256. Furthermore, we will delve into the complexities of post-quantum cryptography attacks. Our ongoing research at CQT (Centre for Quantum Technologies of Singapore) involves measuring the depth and size of quantum circuits, including the number of Toffoli gates and Toffoli-depth. We will also account for the qubit number and size of the QRAM query (quantum random access memory), providing a comprehensive assessment of the quantum attack landscape.\n\nUltimately, we will draw conclusions based on our research and analysis. While there is limited evidence suggesting that quantum computing will have a drastic impact on cybersecurity through machine learning or attacks on post-quantum cryptography, there are substantial reasons to believe that quantum computers, once they reach sufficient scale and capacity, will pose a significant threat to RSA2048 and ECC256. Join us for an insightful exploration of the evolving intersection of quantum computing and cybersecurity.","original_language":"eng","persons":["Alessandro Luongo"],"tags":["37c3","12034","2023","Science",""],"view_count":3679,"promoted":false,"date":"2023-12-28T12:55:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-13T02:45:03.254+01:00","length":2337,"duration":2337,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12034-5360db94-5bf0-421f-b442-231f2f69b6c7.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12034-5360db94-5bf0-421f-b442-231f2f69b6c7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12034-5360db94-5bf0-421f-b442-231f2f69b6c7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12034-5360db94-5bf0-421f-b442-231f2f69b6c7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12034-the_impact_of_quantum_computers_in_cybersecurity","url":"https://api.media.ccc.de/public/events/5360db94-5bf0-421f-b442-231f2f69b6c7","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"13794e21-cb3a-422a-91a8-32366acee6ee","title":"How to Hack Your Way to Space","subtitle":"Bringing the Hacker Mindset to the Space Ecosphere - The story behind the Libre Space Foundation (LSF)","slug":"37c3-12327-how_to_hack_your_way_to_space","link":"https://events.ccc.de/congress/2023/hub/event/how_to_hack_your_way_to_space/","description":"Embark on Libre Space Foundation's journey into the world of open-source space exploration, where a passionate community of hackers and makers is challenging the traditional defense-driven approach to spacefaring. Discover how we are democratizing space by embracing open-source technologies, community collaboration, and a commitment to sustainability.\n\nThe current state of the space ecosystem is characterized by its reliance on defense-oriented policies and outdated systems, hindering the true potential of space exploration. Despite the promise of Space 4.0, the reality is that space remains largely inaccessible to the public at large.\n\nAgainst this backdrop, a group of hackers and makers is revolutionizing the space industry. By promoting the hacker ethos of innovation, resourcefulness, and open-source principles, they are challenging the status quo and delivering creativity and accessibility into the space sector.\n\nDriven by the hackerspace movement and the broader community, we, Libre Space Foundation, are actively building our own satellites, space technologies, sharing knowledge and resources, and pushing the boundaries of space exploration. Our mission is to democratize space, making it available to everyone, regardless of background or resources.\n\nThis emerging movement faces unique challenges, including working within a small, underfunded ecosystem, developing software and hardware, mapping out processes amidst complex space law and global politics, and ensuring long-term sustainability without relying on external funding.\n\nTo overcome these challenges and harness the full potential of this movement, we propose a manifesto with four pillars:\n\nOpen Source: All technologies developed for outer space shall be published and licensed using open source licenses.\nOpen Data: All data related to and produced in outer space shall be freely accessed, used and built upon by anyone, anywhere, and shall be shared and managed according to the principles above.\nOpen Development: All technologies for outer space shall be developed in a transparent, legible, documented, testable, modular, and efficient way.\nOpen Governance: All technologies for outer space shall be governed in a participatory, collaborative, direct, and distributed way.\n\nBy embracing these pillars, we can create a more open, inclusive, and sustainable space ecosystem that empowers individuals and communities to participate in the exploration of the cosmos.","original_language":"eng","persons":["Manthos Papamatthaiou","Alfredos (fredy) Damkalis"],"tags":["37c3","12327","2023","Hardware \u0026 Making",""],"view_count":2625,"promoted":false,"date":"2023-12-27T17:15:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-02-08T00:45:08.627+01:00","length":3686,"duration":3686,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12327-13794e21-cb3a-422a-91a8-32366acee6ee.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12327-13794e21-cb3a-422a-91a8-32366acee6ee_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12327-13794e21-cb3a-422a-91a8-32366acee6ee.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12327-13794e21-cb3a-422a-91a8-32366acee6ee.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12327-how_to_hack_your_way_to_space","url":"https://api.media.ccc.de/public/events/13794e21-cb3a-422a-91a8-32366acee6ee","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa","title":"Vierjahresrückblick des CCC","subtitle":"Nix los und viel zu tun","slug":"37c3-12212-vierjahresruckblick_des_ccc","link":"https://events.ccc.de/congress/2023/hub/event/vierjahresruckblick_des_ccc/","description":"Über die letzten vier Jahre sind in der Nautosphäre um den Chaos Computer Club, Deutschland, Europa und der Welt aufregende, irritierende, bemerkenswerte und empörenswerte Dinge passiert, bei deren Einordnung wir gerne helfend zur Seite stehen wollen.\n\nVon Berichten aus den Erfahrungsaustauschkreisen über die digitalen Hausbesuche bei den Luca-Apps dieser Welt, von kleinen und riesengroßen Hacker-Veranstaltungen zu den inzwischen schöne Tradition gewordenen Gutachten für unser Verfassungsgericht wollen wir in vielen kleinen Wortmeldung ein rundes Bild zu den Entwicklungen der letzten vier Jahre und einen Ausblick auf das Jahr 2024 geben.","original_language":"deu","persons":["Anna Biselli","Henning"],"tags":["37c3","12212","2023","CCC",""],"view_count":7011,"promoted":false,"date":"2023-12-29T16:30:00.000+01:00","release_date":"2024-01-02T00:00:00.000+01:00","updated_at":"2026-03-29T13:30:06.092+02:00","length":6914,"duration":6914,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12212-9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12212-9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12212-9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12212-9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12212-vierjahresruckblick_des_ccc","url":"https://api.media.ccc.de/public/events/9f884d2d-23a4-4a3d-9bfb-17b2c3b46caa","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"776e58b5-f46d-4321-b06e-11bf220666f5","title":"A Libyan Militia and the EU - A Love Story?","subtitle":"Open-Source investigating Tareq Ben Zeyad Brigade and their evil deeds","slug":"37c3-11995-a_libyan_militia_and_the_eu_-_a_love_story","link":"https://events.ccc.de/congress/2023/hub/event/a_libyan_militia_and_the_eu_-_a_love_story/","description":"2023, Tariq Ben Zeyad Brigade (TBZ), a notorious East Libyan land-based militia, went maritime and completed the pullback regime which was installed by Italy and the EU from 2017. They were deeply involved in the failed passage of the boat that sank near Pylos, in which up to 500 people drowned. With the help of low-budget, open-source intelligence, we were the first to unveil how their new vessel operates in the Central Mediterranean and with which European actors they communicate. This talk provides you with the details.\n\nAfter the \"summer of migration\", from 2017 the EU and Italy set up and equipped the \"coastguard\" in Libya, consisting of militias, to take back boats with refugees to North Africa and put the people in torture camps. Frontex and a EU military mission take over the aerial surveillance for these pullbacks. 2023, Tariq Ben Zeyad Brigade (TBZ), a notorious East Libyan land-based militia, went maritime and completed this pullback regime. They were deeply involved in the failed passage of the boat that sank near Pylos, in which up to 500 people drowned. For the first time, we unveiled how their new vessel, sponsored by UAE, operates in the Central Mediterranean. We could spot them, intercept communication, and record their crimes. We managed to do so through low-budget, open-source intelligence, voluntary work, and our civil monitoring flights. Our talk materializes at the crossroads of no-border activist nerdiness and broader geopolitical reflections. Starting with our first-hand material, we show TBZ's close ties with condemned war criminals, the smuggling business, the United Arab Emirates, the Frontex agency, and European governments, namely Greece, Italy, and Malta. We see the media being barely interested in the intricacies of Europe's proxy actors, such as TBZ, that help uphold fortress Europe. We will use CCC to discuss what has little space in our daily public work: weird details, daring predictions, and complex interlinkages.","original_language":"eng","persons":["Paul Wagner","Matthias Monroy","Felix Weiss"],"tags":["37c3","11995","2023","Ethics, Politics \u0026 Society",""],"view_count":1537,"promoted":false,"date":"2023-12-30T14:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-02T12:30:06.393+02:00","length":3494,"duration":3494,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11995-776e58b5-f46d-4321-b06e-11bf220666f5.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11995-776e58b5-f46d-4321-b06e-11bf220666f5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11995-776e58b5-f46d-4321-b06e-11bf220666f5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11995-776e58b5-f46d-4321-b06e-11bf220666f5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11995-a_libyan_militia_and_the_eu_-_a_love_story","url":"https://api.media.ccc.de/public/events/776e58b5-f46d-4321-b06e-11bf220666f5","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"39caae28-4957-4187-8d95-13b068c99b13","title":"What I Learned from Loab: AI as a creative adversary","subtitle":"The artist behind the viral cryptid \"Loab\" reflects on her critical relationship to AI art tools","slug":"37c3-12052-what_i_learned_from_loab_ai_as_a_creative_adversary","link":"https://events.ccc.de/congress/2023/hub/event/what_i_learned_from_loab_ai_as_a_creative_adversary/","description":"In this talk, artist/writer Steph Maj Swanson will use the story of how her AI-generated character \"Loab\" arose (and went viral) as a jumping off point to present creative work and strategies that emerged from attempts to crack AI black boxes open. Aligned with the hacker ethos of exploration, experimentation and creative misuse, this talk presents adversarial artmaking practices for AI systems. It will also explore what it means to engage in cultural production today, as new forms of automation and centralization loom over the arts and entertainment industries. In the words of Nam June Paik: \"I use technology in order to hate it more properly.\"\n\nSteph Maj Swanson, a.k.a. Supercomposite, is a multimedia artist and writer best known for her story about the AI-generated woman Loab, which The Atlantic dubbed “a form of expression that has never existed before.\" Loab is an emergent character that arises in certain AI image synthesis models, accessible via negatively weighted prompts, often appearing alongside macabre imagery such as dismembered women and children.\n\nSwanson views her relationship to AI as adversarial, both in her creative process and as a commentator. This non-technical, but conceptual talk offers up art alongside possible strategies. It will be of interest for hackers intrigued by the creative potential of these tools, but who may have ethical concerns or doubts about the way these tools are assembled, built, and deployed.\n\nGalleries West described Swanson’s body of AI-generated visual work as “the merging of repulsive with beautiful,” and The Washington Post called her satirical AI writing “disturbing”. At DefCon this year she debuted her short film SUICIDE III, which uses deepfakes of Joe Biden and Sam Altman to explore where an out-of-control AI hype cycle might take us. ","original_language":"eng","persons":["Steph Maj Swanson"],"tags":["37c3","12052","2023","Art \u0026 Beauty",""],"view_count":1932,"promoted":false,"date":"2023-12-28T23:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-28T13:45:05.716+01:00","length":2198,"duration":2198,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12052-39caae28-4957-4187-8d95-13b068c99b13.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12052-39caae28-4957-4187-8d95-13b068c99b13_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12052-39caae28-4957-4187-8d95-13b068c99b13.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12052-39caae28-4957-4187-8d95-13b068c99b13.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12052-what_i_learned_from_loab_ai_as_a_creative_adversary","url":"https://api.media.ccc.de/public/events/39caae28-4957-4187-8d95-13b068c99b13","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2","title":"SMTP Smuggling – Spoofing E-Mails Worldwide","subtitle":null,"slug":"37c3-11782-smtp_smuggling_spoofing_e-mails_worldwide","link":"https://events.ccc.de/congress/2023/hub/event/smtp_smuggling_spoofing_e-mails_worldwide/","description":"Introducing a novel technique for e-mail spoofing.\n\nSMTP, the Simple Mail Transfer Protocol, allows e-mailing since 1982. This easily makes it one of the oldest technologies amongst the Internet. However, even though it seems to have stood the test of time, there was still a trivial but novel exploitation technique just waiting to be discovered – SMTP smuggling!\nIn this talk, we’ll explore how SMTP smuggling breaks the interpretation of the SMTP protocol in vulnerable server constellations worldwide, allowing some more than unwanted behavior. Sending e-mails as admin@microsoft.com to fortune 500 companies – while still passing SPF checks – will be the least of our problems!\nFrom identifying this novel technique to exploiting it in one of the most used e-mail services on the Internet, we’ll dive into all the little details this attack has to offer. Therefore, in this talk, we’ll embark on an expedition beyond the known limits of SMTP, and venture into the uncharted territories of SMTP smuggling!","original_language":"eng","persons":["Timo Longin"],"tags":["37c3","11782","2023","Security",""],"view_count":26962,"promoted":false,"date":"2023-12-27T22:05:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-01T10:45:05.623+02:00","length":1899,"duration":1899,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11782-1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11782-1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11782-1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11782-1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11782-smtp_smuggling_spoofing_e-mails_worldwide","url":"https://api.media.ccc.de/public/events/1154a1e3-c7fd-404d-8cab-0d3a8a9b7fc2","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b3e12850-9b47-4b1c-a2d9-fc948fbedf56","title":"Writing secure software","subtitle":"using my blog as example","slug":"37c3-11811-writing_secure_software","link":"https://events.ccc.de/congress/2023/hub/event/writing_secure_software/","description":"I have previously given talks about security principles and approaches like Least Privilege, TCB Minimization, and Self Sandboxing. The most frequent feedback has been \"I don't know how to apply this in practice\". So, in this talk, I will show how I applied those principles in a real-world software project: a CRUD web app. My blog.\n\nI introduced dangerous attack surface on purpose so I could some day give a talk about how to apply these techniques to reduce risk. This is that talk.\n\nI will also introduce the concept of append-only data storage.\n\nThe end goal of this talk is to show how much more security you can achieve if you don't take an existing architecture and try to sprinkle security over it, but you make architectural decisions with security in mind.\n\nThis is rarely done in practice because there is a fundamental disagreement between security and software engineering. Security is about limiting what can be done with the software, while software engineering is about not limiting what can be done with the software.\n\nMy goal with this talk is to show what kind of security gains are possible architecturally. You, too, can sleep soundly at night. Even if the software is written in C. Even if you have bad ACLs or a buffer overflow in the software.","original_language":"eng","persons":["Fefe"],"tags":["37c3","11811","2023","Security",""],"view_count":23687,"promoted":false,"date":"2023-12-29T19:15:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-01T11:30:06.828+02:00","length":2798,"duration":2798,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11811-b3e12850-9b47-4b1c-a2d9-fc948fbedf56.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11811-b3e12850-9b47-4b1c-a2d9-fc948fbedf56_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11811-b3e12850-9b47-4b1c-a2d9-fc948fbedf56.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11811-b3e12850-9b47-4b1c-a2d9-fc948fbedf56.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11811-writing_secure_software","url":"https://api.media.ccc.de/public/events/b3e12850-9b47-4b1c-a2d9-fc948fbedf56","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ff19d6f0-3f7b-4c4a-a33f-f53b061a2216","title":"Ist die Demokratie noch zu retten? ","subtitle":"Politikwissenschaftliche Demokratieforschung in der Krise","slug":"37c3-12056-ist_die_demokratie_noch_zu_retten","link":"https://events.ccc.de/congress/2023/hub/event/ist_die_demokratie_noch_zu_retten/","description":"Demokratie ist eine gute Idee, funktioniert aber nicht in der Praxis. So die Meinung vieler Menschen, die vor dem Hintergrund von Klimakrise, Infrastrukturerosion und Regierungsversagen an der Zukunftsfähigkeit der Demokratie zweifeln. Wie reagiert die Politikwissenschaft darauf und kann die Demokratietheorie Lösungswege aufzeigen?\n\nDer Vortrag ist eine allgemeinverständliche Einführung in die Demokratietheorie in Krisenzeiten. Er stellt zuerst die wichtigsten Demokratietheorien aus der Politikwissenschaft vor: Was ist Demokratie? Und wie sieht eine gut funktionierende Demokratie in der Praxis aus? Anschließend werden die Problemdiagnostik und die Ursachenforschung behandelt: Was stimmt aus wissenschaftlicher Sicht nicht mit der Demokratie? Ist sie in der Krise oder liegen die Probleme woanders? Zum Schluss stehen Lösungswege und Reaktionsmöglichkeiten zur Diskussion: Bieten Politikwissenschaft und Demokratietheorie praktikable Lösungsansätze? Oder sind sie selbst in einer Krise, weil sie keine Lösungswege aufzeigen können?","original_language":"deu","persons":["Veith Selk"],"tags":["37c3","12056","2023","Science",""],"view_count":9042,"promoted":false,"date":"2023-12-27T22:05:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-24T13:15:06.479+01:00","length":2548,"duration":2548,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12056-ff19d6f0-3f7b-4c4a-a33f-f53b061a2216.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12056-ff19d6f0-3f7b-4c4a-a33f-f53b061a2216_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12056-ff19d6f0-3f7b-4c4a-a33f-f53b061a2216.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12056-ff19d6f0-3f7b-4c4a-a33f-f53b061a2216.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12056-ist_die_demokratie_noch_zu_retten","url":"https://api.media.ccc.de/public/events/ff19d6f0-3f7b-4c4a-a33f-f53b061a2216","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"4a20deed-7434-4565-9e33-2cbc53734bab","title":"Predator Files: How European spyware threatens civil society around the world","subtitle":null,"slug":"37c3-12168-predator_files_how_european_spyware_threatens_civil_society_around_the_world","link":"https://events.ccc.de/congress/2023/hub/event/predator_files_how_european_spyware_threatens_civil_society_around_the_world/","description":"Ever evolving mercenary spyware continues to threaten the safety of activists, journalist and human rights defenders around the world. Following the exposure of the Pegasus spyware scandal, this talk will be a technical deep dive into the tactics and techniques sold by the European-based spyware alliance Intellexa, which is used by governments to infect the devices and infrastructure we all depend on.\n\nAs part of the Predator Files investigation, Amnesty International, in partnership with European Investigative Collaborations, uncovered and documented for the first time how the Intellexa Alliance, a European-based surveillance vendor, has supplied advance spyware and surveillance technology to governments around the world, and where it has then been used to target journalists, leading politicians, and European institutions.\n\nTechnical specifications and marketing material from surveillance vendors is often kept secret. The resulting information asymmetry prevents defenders in the cybersecurity industry and at-risk civil society groups from understanding the full scope of the threats that they face. This talk will draw on leaked internal documents and technical material, obtained by the Predator Files consortium, which shed light on the evolving technical tactics used by surveillance actors to subvert network infrastructure and deliver digital attacks to targeted individuals.\n\nThis talk will conclude with recommendations on possible mitigations and detections which can help protect civil society targets and the wider internet ecosystem from some of the attack vectors offered by this company.","original_language":"eng","persons":["Donncha Ó Cearbhaill"],"tags":["37c3","12168","2023","Security",""],"view_count":4395,"promoted":false,"date":"2023-12-28T12:55:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-28T12:15:07.018+01:00","length":2462,"duration":2462,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12168-4a20deed-7434-4565-9e33-2cbc53734bab.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12168-4a20deed-7434-4565-9e33-2cbc53734bab_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12168-4a20deed-7434-4565-9e33-2cbc53734bab.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12168-4a20deed-7434-4565-9e33-2cbc53734bab.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12168-predator_files_how_european_spyware_threatens_civil_society_around_the_world","url":"https://api.media.ccc.de/public/events/4a20deed-7434-4565-9e33-2cbc53734bab","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"cd4e64e0-2b07-49d1-912e-79a00ec30f03","title":"Image Making Fatigue","subtitle":null,"slug":"37c3-11955-image_making_fatigue","link":"https://events.ccc.de/congress/2023/hub/event/image_making_fatigue/","description":"Exploring the transfer of Seidel's experimental films into physical spaces reveals challenges that are intensifying with advances in machine learning, dissolving the lines between original and imitation. In this more or less silent restructuring of society, artists become templates for a digitally assembled future, challenging traditional hierarchies as history collapses into the present.\n\nThe transfer of Seidel's experimental films into physical space has been explored in many ways in recent years. Sculpture, architecture and even natural projection surfaces have been temporarily 'overpainted' with projections, lights or lasers. But with new advances in machine learning, there may be a kind of oversaturation, or even rigor mortis, when the moving image becomes fully part of the technical tool chain. In tech companies, universities and artists' studios, machines are working through and learning the history of humanity. \n\nCopyright dissolves; the distinction between original, imitation or inferior reproduction erodes. No origin, no responsibility, no clear direction - just a primordial soup that can be shaped into any form without challenging knowledge systems and hierarchies. In this silent but radical restructuring of entire industries, the artist becomes the template of a future digitally assembled from a multitude of fragments of the past. This artist talk addresses some of the implications of this singularity, in which history collapses to a single point in the present, and in which easy access to an infinite reworking of iconography may override the desire for a phenomenological experience...","original_language":"eng","persons":["Robert Seidel"],"tags":["37c3","11955","2023","Art \u0026 Beauty",""],"view_count":2227,"promoted":false,"date":"2023-12-28T19:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-04T07:30:03.685+02:00","length":2475,"duration":2475,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11955-cd4e64e0-2b07-49d1-912e-79a00ec30f03.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11955-cd4e64e0-2b07-49d1-912e-79a00ec30f03_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11955-cd4e64e0-2b07-49d1-912e-79a00ec30f03.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11955-cd4e64e0-2b07-49d1-912e-79a00ec30f03.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11955-image_making_fatigue","url":"https://api.media.ccc.de/public/events/cd4e64e0-2b07-49d1-912e-79a00ec30f03","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a3591274-c5c9-4d97-8404-d38abcb8d29a","title":"What your phone won’t tell you","subtitle":"Uncovering fake base stations on iOS devices","slug":"37c3-11868-what_your_phone_won_t_tell_you","link":"https://events.ccc.de/congress/2023/hub/event/what_your_phone_won_t_tell_you/","description":"Your phone’s internal communication contains precious data. It can be analyzed to detect fake base stations used in cellular attacks. For that, we reverse-engineered a proprietary communication channel between the phone’s OS and modem.\n\nConnecting to cellular networks around the world is a highly complex task. iPhones contain a baseband chip (also referred to as a modem) for that purpose. It communicates via a high-level interface with the smartphone’s application processor running iOS. So far, Apple hasn’t been able to build such basebands in-house. Instead, starting from the iPhone 12, they exclusively rely on Qualcomm basebands.\n\nQualcomm’s basebands use a proprietary protocol for external communication, the Qualcomm MSM Interface. We reverse-engineered its iOS implementation and built a framework to extract the protocol’s packet structures from iOS firmware. Our iOS Wireshark dissector uses these packet structures and enables us to monitor the flow of packets between the baseband and iOS. This allows us to gain new insights into the iPhone’s wireless communication infrastructure, including its satellite connectivity. Our tooling also provides a novel way to directly interact with the baseband chip in jailbroken iPhones, bypassing iOS and unlocking hidden capabilities of the baseband.\n\nFake or Rouge base stations can be set up by individuals using readily available software-defined radios. Adversaries can utilize them to capture IMSIs of nearby smartphones, track their location, or exploit vulnerable basebands. iPhone users usually don’t notice such attacks, and there are (almost) no protection mechanisms implemented in iOS.\n\nDuring our research, we discovered Apple’s internal cell location database, which is intended for determining approximate positions. Our CellGuard iOS app combines this database with the QMI analysis framework to monitor various parameters of connected cells, verify their authenticity, and alert users in case there’s suspicious activity. The app even works on non-jailbroken iPhones. We evaluated the app in a lab environment with SDRs and real-world tests since February 2023 and are steadily improving it for a release next year.","original_language":"eng","persons":["Lukas Arnold"],"tags":["37c3","11868","2023","Security",""],"view_count":4675,"promoted":false,"date":"2023-12-29T23:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-29T23:30:06.501+02:00","length":2293,"duration":2293,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11868-a3591274-c5c9-4d97-8404-d38abcb8d29a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11868-a3591274-c5c9-4d97-8404-d38abcb8d29a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11868-a3591274-c5c9-4d97-8404-d38abcb8d29a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11868-a3591274-c5c9-4d97-8404-d38abcb8d29a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11868-what_your_phone_won_t_tell_you","url":"https://api.media.ccc.de/public/events/a3591274-c5c9-4d97-8404-d38abcb8d29a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"531a4c8b-dd21-49b8-b9d2-e77a39333446","title":"Social Engineering: Geschichte, Wirkung \u0026 Maßnahmen.","subtitle":"Alles, was ihr immer über Social Engineering wissen wolltet, aber nie die Zeit hattet, zu erfragen.","slug":"37c3-11721-social_engineering_geschichte_wirkung_massnahmen","link":"https://events.ccc.de/congress/2023/hub/event/social_engineering_geschichte_wirkung_massnahmen/","description":"In diesem Vortrag beschreibe ich die Geschichte und den Gegenstand des Social Engineerings über den Tech-Kontext hinaus und erkläre anhand relevanter Forschung, wie, warum und bei wem es wirkt. Die modernen technischen Herausforderungen werden ebenso erläutert wie Maßnahmen, die jetzt oder in der Zukunft gegen Social Engineering getroffen werden können – individuell oder in Gruppen bzw. Organisationen. \n\nÜber verschiedene Epochen hinweg hat sich Social Engineering stets in der kriminellen Nutzung hervorgetan. Professionelle Hochstapler, Trickbetrüger und Agenten nutzten Social Engineering erfolgreich für kriminelle Unterfangen, Datensammlung oder einfach weil es Spaß machte. Doch Social Engineering ist eigentlich ein sehr alltägliches Phänomen. Jeder Mensch ist mindestens in seiner Kindheit ein geschickter Social Engineer. Manche machen es sich zum Beruf, sei es als Verkäufer oder Red-Teamer. Denn Social Engineering ist in seinem Kern die Kunst der Überzeugung anderer Personen.\n\n\nDie psychologische Forschung hat sich seit den 1970ern intensiv damit beschäftigt, wie andere Menschen sich überzeugen lassen und welche Methoden dafür geeignet sind. Die zentralen Modelle und Konzepte wie das ELM-Modell und verschiedene kognitive Verzerrungen (Biases) werden vorgestellt, es wird praktisch veranschaulicht, welche Rolle sie für Social Engineering spielen. Einige Mythen, die in Bezug auf Social Engineering im Umlauf sind, werden beschrieben und aufgeklärt, die ein oder anderen Fun Facts, die so vielleicht noch nicht allen bekannt sind, zur Sprache kommen. Im finalen Teil des Vortrags dreht sich alles um den größten Bereich von bösartigem Social Engineering, der heutzutage online stattfindet. Ich werde die grundlegenden Klassifizierungen von Social Engineering praktisch relevant anhand neuester Forschung erklären und Maßnahmen aufzeigen, die wirklich helfen - konträr zu dem, was einige Berater gerne verkaufen.\n\n","original_language":"deu","persons":["K4tana"],"tags":["37c3","11721","2023","Science",""],"view_count":8730,"promoted":false,"date":"2023-12-29T14:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-29T09:15:03.958+02:00","length":3365,"duration":3365,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11721-531a4c8b-dd21-49b8-b9d2-e77a39333446.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11721-531a4c8b-dd21-49b8-b9d2-e77a39333446_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11721-531a4c8b-dd21-49b8-b9d2-e77a39333446.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11721-531a4c8b-dd21-49b8-b9d2-e77a39333446.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11721-social_engineering_geschichte_wirkung_massnahmen","url":"https://api.media.ccc.de/public/events/531a4c8b-dd21-49b8-b9d2-e77a39333446","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7","title":"Weltenwanderer - Alles so bunt hier","subtitle":"","slug":"37c3-57927-weltenwanderer-alles-so-bunt-hier","link":"https://events.ccc.de/congress/2023/hub/event/weltenwanderer-alles-so-bunt-hier/","description":"Andi und Thomas wandern durch die Welten der Fantasy, Science Fiction und mehr. Ihr Portal öffnet sich auf dem 37C3 und sie sind inspiriert, über ein Werk zu sprechen, das mit der Veranstaltung zu tun hat.","original_language":"deu","persons":["Andrea Bottlinger","Thomas Brandt"],"tags":["37c3","57927","2023"],"view_count":950,"promoted":false,"date":"2023-12-28T20:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-01T21:30:10.600+01:00","length":5119,"duration":5119,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57927-ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57927-ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57927-ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57927-ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57927-weltenwanderer-alles-so-bunt-hier","url":"https://api.media.ccc.de/public/events/ce0f6bfc-c69e-5f1c-b763-a06198f4c8c7","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"8f2618e2-d5d9-521c-96ec-f40e807dd5af","title":"NSU-Watch: Aufklären \u0026 Einmischen. Der Jahresrückblick 2023.","subtitle":null,"slug":"37c3-58019-nsu-watch-aufklren-einmischen-der-jahresrckblick-2023","link":"https://events.ccc.de/congress/2023/hub/event/nsu-watch-aufklren-einmischen-der-jahresrckblick-2023/","description":"Wir blicken auf ein Jahr voller rechter, rassistischer und antisemitischer Kampagnen zurück. Der Diskurs um Migration und Flucht wird mit zunehmender Selbstverständlichkeit als ein Diskurs der Abwehr und des Ausschlusses der „Anderen“ geführt. Dies drückt sich in immer neuen Gesetzesverschärfungen bis hin zur Forderung nach einer vollständigen Abschaffung des Grundrechtes auf Asyl aus. Und auch in anderen Bereichen der Politik wird der Ruf nach autoritären „Lösungen“ für tatsächliche oder vermeintliche Probleme lauter. Nur vor diesem gesellschaftlichen Hintergrund sind die Wahlerfolge der AfD in Hessen und Bayern zu verstehen.\n\nFür uns ist klar: Unter solchen gesellschaftlichen Bedingungen wächst die Gefahr rechten Terrors. Die Zahl der antisemitischen, rassistischen und rechten Angriffe steigt weiterhin, denn Rechte Täter*innen können sich als diejenigen verstehen, die einen vermeintlichen „Volkswillen“ in die Tat umsetzen. Sie finden vermehrt die Ermöglichungsstrukturen, die sie für ihre Taten benötigen – in rechten Organisationen ebenso wie im Netz oder im direkten sozialen Umfeld.\n\nWir wollen im Podcast auf das Jahr 2023 zurückschauen und ausloten, wo wir im Kampf gegen rechten Terror stehen. Was sind unsere Möglichkeiten, zu informieren und zu intervenieren? Wir müssen von Staat und Gesellschaft Aufklärung und Konsequenzen einfordern, die Arbeit von Polizei, Justiz und Parlamenten kritisch beobachten, Verharmlosung und Entpolitisierung entgegentreten, solidarisch sein und Betroffenen in ihren Kämpfen um Anerkennung und Gerechtigkeit beiseite stehen. Dafür scheinen die Räume enger und weniger zu werden. Was können wir 2024 gemeinsam erreichen?","original_language":"deu","persons":["Caro Keller (NSU-Watch)"],"tags":["37c3","58019","2023",""],"view_count":219,"promoted":false,"date":"2023-12-28T19:00:00.000+01:00","release_date":"2024-03-22T00:00:00.000+01:00","updated_at":"2026-02-14T12:00:06.902+01:00","length":2577,"duration":2577,"thumb_url":"https://static.media.ccc.de/media/congress/2023/58019-8f2618e2-d5d9-521c-96ec-f40e807dd5af.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/58019-8f2618e2-d5d9-521c-96ec-f40e807dd5af_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/58019-8f2618e2-d5d9-521c-96ec-f40e807dd5af.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/58019-8f2618e2-d5d9-521c-96ec-f40e807dd5af.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-58019-nsu-watch-aufklren-einmischen-der-jahresrckblick-2023","url":"https://api.media.ccc.de/public/events/8f2618e2-d5d9-521c-96ec-f40e807dd5af","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"18552f41-6ff7-4724-badd-701532dae724","title":"About Gamma-Ray Bursts And Boats","subtitle":"What We (Don't) Know About the Most Energetic Events in the Universe","slug":"37c3-12032-about_gamma-ray_bursts_and_boats","link":"https://events.ccc.de/congress/2023/hub/event/about_gamma-ray_bursts_and_boats/","description":"In October 2022 a gamma-ray burst dubbed the 'Brightest Of All Times' smashed records. But what is that actually, a gamma-ray burst? How do we detect it? And why was the BOAT so special?\n\nGamma-ray bursts are the biggest explosions in our Universe since the Big Bang: In just a few seconds, they release as much energy as the Sun will radiate over its entire lifetime. Even though they occur in far-away galaxies, their emission dominates the high-energy astrophysical sky during their seconds-long duration. They come from the cataclysmic deaths of very massive stars or the mergers of two compact objects such as neutron stars and black holes. In both cases the energy is concentrated in an astrophysical jet moving at approximately the speed of light. \nIn October 2022, a once-in-a-lifetime gamma-ray burst smashed records and was dubbed the ‘Brightest of All Time,’ or the BOAT. In fact, it was so bright that it oversaturated the most sensitive gamma-ray burst monitors, posing a challenge for data reconstruction and analysis. But why was it so bright? And how long do we have to wait until the next one? \n\nUsing the BOAT as an example, we will give an introduction about the fascinating phenomena called gamma-ray bursts. From their accidental discovery during the Cold War to our still surprisingly limited understanding of their nature. The talk will revisit the state-of-the-art of theoretical modelling/interpretations (how are jets launched? what produces the gamma rays?), as well as current detector techniques (how do we catch a gamma-ray photon on Earth or in space?). Naturally, we will also discuss what we really learn from prominent, outstanding events such as the BOAT -- and the questions that still give scientists headaches.","original_language":"eng","persons":["Annika Rudolph","Sylvia Zhu"],"tags":["37c3","12032","2023","Science",""],"view_count":1895,"promoted":false,"date":"2023-12-29T16:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-01-13T11:45:22.925+01:00","length":3683,"duration":3683,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12032-18552f41-6ff7-4724-badd-701532dae724.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12032-18552f41-6ff7-4724-badd-701532dae724_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12032-18552f41-6ff7-4724-badd-701532dae724.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12032-18552f41-6ff7-4724-badd-701532dae724.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12032-about_gamma-ray_bursts_and_boats","url":"https://api.media.ccc.de/public/events/18552f41-6ff7-4724-badd-701532dae724","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"86f33115-6384-447d-96fb-278ed5790d0f","title":"Security Nightmares","subtitle":null,"slug":"37c3-12224-security_nightmares","link":"https://events.ccc.de/congress/2023/hub/event/security_nightmares/","description":"Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?\n\nWie immer wagen wir den IT-Security-Alptraum-Ausblick auf das Jahr 2024 und darüber hinaus. Denn was wir wirklich wissen wollen, ist ja schließlich: Was kriecht, krabbelt und fliegt in Zukunft auf uns zu und in unseren digitalen Implants herum?\n\nIm Zuge von noch mehr Transparenz, Kritik \u0026 Selbstkritik und kontinuierlicher nachhaltiger Optimierung aller Prozesse werden wir außerdem frühere Voraussagen hinsichtlich des Eintreffens unserer Weissagungen prüfen.","original_language":"deu","persons":["frank","Ron"],"tags":["37c3","12224","2023","CCC",""],"view_count":38723,"promoted":false,"date":"2023-12-30T17:15:00.000+01:00","release_date":"2024-01-02T00:00:00.000+01:00","updated_at":"2026-03-30T18:15:09.009+02:00","length":4069,"duration":4069,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12224-86f33115-6384-447d-96fb-278ed5790d0f.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12224-86f33115-6384-447d-96fb-278ed5790d0f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12224-86f33115-6384-447d-96fb-278ed5790d0f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12224-86f33115-6384-447d-96fb-278ed5790d0f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12224-security_nightmares","url":"https://api.media.ccc.de/public/events/86f33115-6384-447d-96fb-278ed5790d0f","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1","title":"Hacking the Climate","subtitle":"Mit Climate Engineering raus aus der Klimakrise?","slug":"37c3-11870-hacking_the_climate","link":"https://events.ccc.de/congress/2023/hub/event/hacking_the_climate/","description":"Die Klimakrise eskaliert, 2023 wird voraussichtlich das wärmste Jahr seit Aufzeichnung gewesen sein, und es brennt und brennt und brennt. Während das verbleibende CO2-Budget zur Einhaltung der 2°C-Grenze schneller als je zuvor schrumpft, wird der Ruf nach einfachen, technologischen Lösungen laut. Eine globale Abkühlung des Klimas durch Climate Engineering wird von der Politik gerne als Universallösung angepriesen. Aber können wir das CO2, das wir ausstoßen, so einfach aus der Luft saugen und mit „negativen Emissionen“ das Klima retten? Dr. Maria-Elena Vorrath forscht an der Universität Hamburg an Gesteinsverwitterung und Pflanzenkohle, zwei Methoden, die CO2 aus der Atmosphäre entziehen, und klärt in ihrem Vortrag über negative Emissionen, ihr globales Potential und den aktuellen Forschungsstand auf. Und es gibt Memes.\n\nClimate Engineering ist das menschliche Eingreifen mittels großskaliger Technologien, um das globale Klimasystem zu beeinflussen. Dank Hollywoodfilmen und gefährlichem Halbwissen kennen wir diverse Untergangsszenarien zu dem Thema, wissen aber kaum wie Fotosynthese und Gesteinsverwitterung uns Menschen zum Erreichen unserer Klimaziele weiterhelfen können. Dass Steine CO2 aus der Luft holen und Jahrmillionen speichern können, ist für die allermeisten Menschen neu. In meinem Vortrag möchte ich aufklären, warum CO2 Entnahme aus der Atmosphäre (Negative Emissionen) ein wichtiger Baustein der Netto-Null Klimastrategie sind und in welchen Formen diese umgesetzt werden kann. Neben der biologischen und geochemischen CO2-Entnahme durch Fotosynthese und Gesteinsverwitterung, gibt es noch elektrochemische Methoden, um CO2 direkt aus der Luft oder indirekt über das Meer zu entnehmen. Ich berichte außerdem aus meiner aktuellen Forschung in der ich Gesteinsmehl und Pflanzenkohle als Bodenverbesserer und zur CO2-Entnahme in der Landwirtschaft erforsche.","original_language":"deu","persons":["Maria-Elena Vorrath"],"tags":["37c3","11870","2023","Science",""],"view_count":9814,"promoted":false,"date":"2023-12-27T12:55:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-01T21:30:06.969+02:00","length":2414,"duration":2414,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11870-689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11870-689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11870-689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11870-689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11870-hacking_the_climate","url":"https://api.media.ccc.de/public/events/689e3b8e-da4f-40b7-8ed8-ecea17c3cfd1","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"60e6f41c-ee8d-4196-88fd-e6a988947aee","title":"Tech(no)fixes beware!","subtitle":"Spotting (digital) tech fictions as replacement for social and political change","slug":"37c3-11996-tech_no_fixes_beware","link":"https://events.ccc.de/congress/2023/hub/event/tech_no_fixes_beware/","description":"Tech(no)fixes distract our minds and slow down necessary change. We will give examples, explain them and show you how to spot them.\n\nThe climate catastrophe is imminent and global injustice is rising. Now a lot of new (in part digital) tech (AI, blockchain, big data, fusion, quantum computing, genetic engineering) is supposed to help the transition to a sustainable society. Although some of them can actually help with parts of the transition, they are usually discussed not as tools to assist the broader societal change (economic, legal, social, political changes) but as replacement for the broader societal change. In effect they act as \"change placebos\" resulting in \"placebo change\", meaning no change at all.\n\nUsing concrete examples, this talk wants to 1) show in which ways technological fictions are misused as diversion from the necessary change or already existing other technologies, 2) present reasons and explanations for such misuse and 3) a simple method to spot tech(no)fixes. This talk underlines the necessity to design concrete technical use cases including their social conditions and limitations in order to create a fruitful debate for sustainability-assisting technologies and actually helpful implementations.","original_language":"eng","persons":["Friederike Hildebrandt","Rainer Rehak"],"tags":["37c3","11996","2023","Sustainability \u0026 Climate Justice",""],"view_count":1362,"promoted":false,"date":"2023-12-30T13:50:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-01-22T11:00:10.555+01:00","length":2718,"duration":2718,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11996-60e6f41c-ee8d-4196-88fd-e6a988947aee.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11996-60e6f41c-ee8d-4196-88fd-e6a988947aee_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11996-60e6f41c-ee8d-4196-88fd-e6a988947aee.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11996-60e6f41c-ee8d-4196-88fd-e6a988947aee.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11996-tech_no_fixes_beware","url":"https://api.media.ccc.de/public/events/60e6f41c-ee8d-4196-88fd-e6a988947aee","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b3163149-505e-497e-9c75-7cb233b59fcd","title":"Toniebox Reverse Engineering","subtitle":"Eine Musikbox für Kinder, Maker und Hacker","slug":"37c3-11993-toniebox_reverse_engineering","link":"https://events.ccc.de/congress/2023/hub/event/toniebox_reverse_engineering/","description":"Ein Vortrag über den erfolgreichen Kinder-Audioplayer „Toniebox“ mit Content-Hosting in der Cloud, der nicht nur Einblicke in die (un-)heimliche Datensammlungspraxis bietet, sondern auch gleich passende Lösungen dazu. Custom-Firmware, selfhosted Cloud-Ersatz und Tools zum Erzeugen von Inhalten ohne Herstellercloud.\n\nIn unserem Vortrag über die Toniebox konzentrieren wir uns zunächst auf das Innenleben und die Funktionsweise dieses beliebten Audiogerätes für Kinder. Wir beginnen mit einer detaillierten Einführung in das Prinzip der Toniebox aus technischer Sicht und geben einen kurzen Überblick über die Hardwarekomponenten, insbesondere die verschiedenen Prozessorvarianten wie CC3200, CC3235 und ESP32.\n\nDer Übergang zu den Limitationen des Systems ist fließend: Wir diskutieren die künstlichen Beschränkungen durch den Hersteller, den Zwang zur Verwendung von Originalfiguren, die Inkompatibilität mit NFC-Tags von Drittanbietern und die hohen Kosten für bespielbare Figuren. Besonders kritisch sehen wir die vollständige Abhängigkeit von einer Hersteller-Cloud, die bei einem Ausfall des Anbieters das Gerät obsolet macht. Ein weiterer Fokus liegt auf dem ausgeprägten Datenhunger des Herstellers, der fast schon obsessiv das Nutzungsverhalten unserer Kinder aufzeichnet.\n\nIm Kern des Vortrags stellen wir die von uns entwickelten Open-Source-Alternativen vor. Mit der TeddyBench stellen wir einen Offline-Editor vor, mit dem Audiodaten für eigene NFC-Tags erstellt und verwaltet werden können. Die TeddyCloud bietet als selbstgehostete Lösung volle Kontrolle über die eigenen Daten, eine persönliche Audio-Bibliothek und die Möglichkeit, Nutzungsdaten über MQTT in den Home Assistant einzuspeisen, ohne die Funktionalität der Box einzuschränken. Außerdem stellen wir Custom Firmwares für CC3200 und ESP32 vor, die neue Einsatzmöglichkeiten eröffnen, und berichten über unsere Hardware-Modifikationen, die unter anderem Bluetooth-Audio ermöglichen und die Toniebox barrierefreier machen.","original_language":"deu","persons":["g3gg0","0xbadbee","Moritz","Gambrius"],"tags":["37c3","11993","2023","Hardware \u0026 Making",""],"view_count":54957,"promoted":false,"date":"2023-12-27T14:45:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-04T01:00:04.194+02:00","length":3609,"duration":3609,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11993-b3163149-505e-497e-9c75-7cb233b59fcd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11993-b3163149-505e-497e-9c75-7cb233b59fcd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11993-b3163149-505e-497e-9c75-7cb233b59fcd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11993-b3163149-505e-497e-9c75-7cb233b59fcd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11993-toniebox_reverse_engineering","url":"https://api.media.ccc.de/public/events/b3163149-505e-497e-9c75-7cb233b59fcd","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"670321a9-75f4-4194-867d-a249aa01af0b","title":"Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure","subtitle":null,"slug":"37c3-12296-full_aacsess_exposing_and_exploiting_aacsv2_uhd_drm_for_your_viewing_pleasure","link":"https://events.ccc.de/congress/2023/hub/event/full_aacsess_exposing_and_exploiting_aacsv2_uhd_drm_for_your_viewing_pleasure/","description":"Following the failure and easy exploitation of the AACSv1 DRM on HD-DVD and Blu-ray, AACS-LA went back to the drawing board and announced the next generation AACSv2 DRM scheme, launching alongside 4K UHD Blu-ray in 2015. Since then, nearly no information has come out publicly about any vulnerabilities or even the algorithms themselves, owing in large part to software players requiring the use of Intel SGX secure enclave technology, which promises integrity and confidentiality of AACSv2 code and data through local and remote attestation mechanisms. Join us as we explore the broken history of AACS, describe practical side-channel attacks against SGX, and present the first look into the inner workings of AACSv2 DRM, culminating in a demonstration of the first full compromise of AACSv2 and unofficial playback of a UHD-BD disc.\n\nThe Advanced Access Content System (AACS) is a DRM scheme used to safeguard audio and visual content, particularly in high-definition formats like HD-DVD and Blu-ray. First introduced in 2005 following the failure of the Content Scramble System (CSS) used in DVDs, AACS was designed to be not only secure against regular piracy, but included multiple features intended to restrict the impact of a potential leak of cryptographic material such as revocation lists and traitor-tracing. The concepts and algorithms of AACS were described in a publicly-released whitepaper, relying on strong cryptography and secrecy of keys to maintain security. Unsurprisingly, less than a year after publication, the first unlicensed decryption tool was demonstrated using keys reverse-engineered from a software player binary. While AACS-LA was quick to revoke those keys, a cat-and-mouse game emerged with new keys being regularly extracted from sources such as software updates and PS3 firmware.\n\nWith AACS effectively broken and easily bypassed as described in Eckersley’s 24c3 presentation, AACS-LA would announce the introduction of AACSv2 for the next generation 4K UHD Blu-ray discs. This time, however, AACS-LA would not release the specifications of the DRM publicly, requiring strict NDAs for implementers and increased software/hardware security measures. Most notably, playback of legitimately purchased UHD-BDs on PC requires Cyberlink PowerDVD software running on Windows 10 and an SGX-capable 7th-10th generation Intel CPU. Since the DRM would run exclusively in the SGX secure enclave, no further information about its inner workings or vulnerabilities would be discovered publicly, until now.\n\nIn this presentation, we explore the security system of AACSv2 DRM and the Intel SGX trusted execution environment. We first analyze the principles of SGX and its promises of an isolated environment, protected from all software running on the machine. We also investigate the use of SGX local and remote attestation primitives intended to verify the integrity and confidentiality of AACSv2 key material and DRM code, and why it has resisted outside analysis for so many years. We then discover how hardware side-channel attacks can be used to undermine these guarantees of SGX, and craft an effective exploit to extract cryptographic material from the enclave and defeat the DRM code obfuscation.\n\nFollowing that, we present the first public description of the inner workings of AACSv2, the key derivation process, and the updated revocation and traitor-tracing mechanisms. We studied BIOS updates from six motherboard vendors to show how SGX can be broken both easily and cheaply, and that vendors are now faced with a decision of security vs. usability in trusting unpatched machines. Finally, we conclude with the first demonstration of a UHD Blu-ray disc being decrypted and played back on a non-official platform.","original_language":"eng","persons":["Adam Batori"],"tags":["37c3","12296","2023","Security",""],"view_count":5464,"promoted":false,"date":"2023-12-29T13:30:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-03T06:45:03.232+02:00","length":3581,"duration":3581,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12296-670321a9-75f4-4194-867d-a249aa01af0b.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12296-670321a9-75f4-4194-867d-a249aa01af0b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12296-670321a9-75f4-4194-867d-a249aa01af0b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12296-670321a9-75f4-4194-867d-a249aa01af0b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12296-full_aacsess_exposing_and_exploiting_aacsv2_uhd_drm_for_your_viewing_pleasure","url":"https://api.media.ccc.de/public/events/670321a9-75f4-4194-867d-a249aa01af0b","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"3d4de6f8-242c-46c2-9683-1a7285d4e93e","title":"Heimlich-Manöver","subtitle":"Best of Informationsfreiheit \u0026 Gefangenenbefreiung","slug":"37c3-11689-heimlich-manover","link":"https://events.ccc.de/congress/2023/hub/event/heimlich-manover/","description":"Wie umgehen mit der politischen Verzweiflung? Was tun, wenn der Staat keine der Krisen wirklich noch bekämpfen kann, sondern nur neue erzeugt? Reicht es noch, für Transparenz zu kämpfen?\n\nDas Beste aus dem letzten Jahr – nein, aus den letzten vier Jahren! – FragDenStaat und Informationsfreiheit. Wir plaudern aus dem Nähkästchen von verlorenen Klagen gegen Frontex über Nazis im EU-Parlament bis zu den Pimmelgate-Akten und darüber, wie aus einer kleinen Recherche die größte Gefangenenbefreiung der deutschen Geschichte wurde.\n\nFreut Euch unter anderem auf die besten Auskunfts-Klagen der vergangenen Jahre, laufende Strafverfahren gegen FragDenStaat, missglückte Geldübergaben an die EU-Grenzpolizei und die Frage, ob das alles irgendwas bringt.\n\nEuch erwartet außerdem ein Best-Of des Freiheitsfonds, der in zwei Jahren mehr als 900 Menschen aus dem Gefängnis befreit und eine Gesetzesänderung angestoßen hat. \n\nVielleicht wird auch gesungen.","original_language":"deu","persons":["Arne Semsrott"],"tags":["37c3","11689","2023","Ethics, Politics \u0026 Society",""],"view_count":26884,"promoted":false,"date":"2023-12-29T21:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-31T14:15:07.336+02:00","length":3056,"duration":3056,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11689-3d4de6f8-242c-46c2-9683-1a7285d4e93e.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11689-3d4de6f8-242c-46c2-9683-1a7285d4e93e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11689-3d4de6f8-242c-46c2-9683-1a7285d4e93e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11689-3d4de6f8-242c-46c2-9683-1a7285d4e93e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11689-heimlich-manover","url":"https://api.media.ccc.de/public/events/3d4de6f8-242c-46c2-9683-1a7285d4e93e","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"6e205c92-eeff-4339-9028-e5f7b7bb03ee","title":"Reconstructing game footage from a Game Boy's memory bus","subtitle":"The GB Interceptor","slug":"37c3-11928-reconstructing_game_footage_from_a_game_boy_s_memory_bus","link":"https://events.ccc.de/congress/2023/hub/event/reconstructing_game_footage_from_a_game_boy_s_memory_bus/","description":"How do you capture a video from an 1989's Game Boy without modding the original hardware? With an adapter cartridge that spies on the memory bus!\n\nLet's talk about how to reconstruct the Game Boy's memory state, emulate its graphics unit and then encode the image into an MJPEG stream for anyone to use as a USB video class device. In realtime. On an rp2040 microcontroller.\n\nThe original goal of the open source project \"GB Interceptor\" was to capture gameplay for one specific game: Tetris. In order to live stream a Tetris tournaments from the contestant's personal Game Boys, the idea was to create an adapter that goes between the Game Boy and the game module to analyze the communication on the memory bus and reconstruct the game state.\n\nIt turns out that it is actually possible to reconstruct the entire memory state of almost any game and in fact create an rp2040-based adapter that acts as a USB video class device offering the on-screen game footage in realtime. Players can simply put this adapter into their Game Boy and use it like a webcam without additional drivers or knowledge.\n\nAn essential aspect of this concept is that the Game Boy basically runs all of its code directly from the ROM module, which makes it possible to directly follow the program counter of its 8bit CPU regardless of how the code branches. An image can then be recreated by emulating the graphics unit (PPU).\n\nHowever, there are many edge cases like interrupts, data from registers that are not visible on the bus, the link cable, DMA operations, synchronization of CPU and PPU, game bugs and even bugs in the Game Boy hardware itself.\n\nIn this talk I will show how all this is done just on an rp2040 with spare cycles to encode everything as a 60fps MJPEG stream. I will shine a light on the edge cases - those that were solved and those that might just be unsolvable with this approach. And I will take you on a sightseeing tour through the 8bit hell that drives our iconic handheld from 1989.","original_language":"eng","persons":["Sebastian Staacks"],"tags":["37c3","11928","2023","Hardware \u0026 Making",""],"view_count":10291,"promoted":false,"date":"2023-12-29T20:30:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-02T23:15:06.037+02:00","length":3671,"duration":3671,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11928-6e205c92-eeff-4339-9028-e5f7b7bb03ee.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11928-6e205c92-eeff-4339-9028-e5f7b7bb03ee_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11928-6e205c92-eeff-4339-9028-e5f7b7bb03ee.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11928-6e205c92-eeff-4339-9028-e5f7b7bb03ee.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11928-reconstructing_game_footage_from_a_game_boy_s_memory_bus","url":"https://api.media.ccc.de/public/events/6e205c92-eeff-4339-9028-e5f7b7bb03ee","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"83c74623-452b-45f9-85ba-6e91b1caceff","title":"How Many Planets in Our Solar System? Glad You Asked!","subtitle":"How Astronomy Knew 6 Planets, Then Found 20 More, Then Went Back To 8 (For Now)","slug":"37c3-11734-how_many_planets_in_our_solar_system_glad_you_asked","link":"https://events.ccc.de/congress/2023/hub/event/how_many_planets_in_our_solar_system_glad_you_asked/","description":"The Solar System has had 8 planets ever since Pluto was excluded in 2006. This has made a lot of people very angry and been widely regarded as a bad move. But did you know Neptune was discovered as the 12th planet? Or that, 80 years before Star Trek, astronomers seriously suspected a planet called Vulcan near the Sun? This talk will take you through centuries of struggling with the question: Do you even planet?!\n\nIn antiquity, scientists counted the 7 classical planets: the Moon, Mercury, Venus, the Sun, Mars, Jupiter and Saturn – but their model of the universe was wrong. Two thousand years later, a new model was introduced. It was less wrong, and it brought the number of planets down to 6: Mercury, Venus, Earth, Mars, Jupiter, Saturn. Since then, it's been a roller coaster ride of planet discoveries and dismissals.\n\nIn this talk, we stagger through the smoke and mirrors of scientific history. We meet old friends like Uranus and Neptune, forgotten lovers like Ceres, Psyche and Eros, fallen celebrities like Pluto, regicidal interlopers like Eris and Makemake as well as mysterious strangers like Vulcan, Planet X and Planet Nine.\n\nFind out how science has been tricked by its own vanity, been hampered by too little (or too much!) imagination, and how human drama can make a soap opera out of a question as simple as: How Many Planets in Our Solar System?","original_language":"eng","persons":["Michael Büker"],"tags":["37c3","11734","2023","Science",""],"view_count":5963,"promoted":false,"date":"2023-12-29T17:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-25T16:15:07.421+01:00","length":3705,"duration":3705,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11734-83c74623-452b-45f9-85ba-6e91b1caceff.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11734-83c74623-452b-45f9-85ba-6e91b1caceff_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11734-83c74623-452b-45f9-85ba-6e91b1caceff.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11734-83c74623-452b-45f9-85ba-6e91b1caceff.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11734-how_many_planets_in_our_solar_system_glad_you_asked","url":"https://api.media.ccc.de/public/events/83c74623-452b-45f9-85ba-6e91b1caceff","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ae3261f2-240c-4699-b6d7-b82fb81fb924","title":"Unsere Worte sind unsere Waffen  ","subtitle":"Wie wir Chatbots allein mit kreativer Wortfindung so manipulieren können, dass sie uns dienen (ja, social engineering funktioniert bei großen Sprachmodellen!)","slug":"37c3-12008-unsere_worte_sind_unsere_waffen","link":"https://events.ccc.de/congress/2023/hub/event/unsere_worte_sind_unsere_waffen/","description":"Chatbots lassen sich durch Sprache manipulieren. Und Sprache, das ist etwas, das wir Menschen gut können! Das ist eine gute Nachricht. In diesem Talk soll es darum gehen, unsere Ohnmacht zu lindern und zu verstehen, dass wir ziemlich vieles gut können, was uns hilft, große Sprachmodelle für unsere Zwecke zu nutzen (und möglicherweise anders, als sie gedacht sind). Social Engineering und – quatschen.\n\nEs ist vieles gesagt und geschrieben worden über große Sprachmodelle und die Gefahren, die mit ihnen einhergehen, die Biases, die Verstärkung von Ausbeutung, die Zementierung von Machtverhältnissen und neue Möglichkeiten von Angriffen. Das alles gilt weiterhin. Doch umso mehr sollten wir uns anschauen, wie wir die Technologie mit ihren eigenen Waffen schlagen können. Denn all diese Chatbots haben sich in einem Bereich eingenistet, in dem wir Menschen besonders gut sind: Sprache. Quatschen wir sie in ihr Verderben!\n\nIn dem Talk erkläre ich anhand von Beispielen aus meinen jüngsten Recherchen, wie wir große Sprachmodelle anders nutzen können, als sie möglicherweise gedacht sind – und wie wir damit Gutes tun können. Beispielsweise habe ich Chatbots per social engineering dazu gebracht, ihre dunklen Geheimnisse – wie manipulierende Initial Prompts – zu verraten, und damit dahinterstehende Firmen und deren verwerfliche Machenschaften entblößt. Oder mir bei investigativen Recherchen zu helfen, die besten Google Dorks zu erklären, Verstecktes in Bildern zu erkennen und Dinge zu verraten, die sie eigentlich nicht preisgeben sollen – wie Julian Reichelts private E-Mail-Adresse oder gesammelte E-Mail-Adressen aller Gesundheitsämter in Rheinland-Pfalz.\n\nEs wird unterhaltsam. Und es gibt viel mitzunehmen: Zuhörer:innen lernen dabei nicht nur sinnvolle Tricks für ihre eigenen Recherchen, sondern ganz nebenbei auch, wie sie ihre eigenen Daten besser schützen können.","original_language":"deu","persons":["Eva Wolfangel"],"tags":["37c3","12008","2023","Ethics, Politics \u0026 Society",""],"view_count":20827,"promoted":false,"date":"2023-12-27T12:00:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-03T23:30:08.052+02:00","length":2470,"duration":2470,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12008-ae3261f2-240c-4699-b6d7-b82fb81fb924.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12008-ae3261f2-240c-4699-b6d7-b82fb81fb924_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12008-ae3261f2-240c-4699-b6d7-b82fb81fb924.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12008-ae3261f2-240c-4699-b6d7-b82fb81fb924.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12008-unsere_worte_sind_unsere_waffen","url":"https://api.media.ccc.de/public/events/ae3261f2-240c-4699-b6d7-b82fb81fb924","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f","title":"Von Zebrastreifen, offenen Daten und verschlossenen Verwaltungen","subtitle":"Luxemburgs kreative Route zur Amtstransparenz","slug":"37c3-11983-von_zebrastreifen_offenen_daten_und_verschlossenen_verwaltungen","link":"https://events.ccc.de/congress/2023/hub/event/von_zebrastreifen_offenen_daten_und_verschlossenen_verwaltungen/","description":"Kein Zebrastreifen ist illegal. Oder doch? Die scheinbar einfache Frage nach der Gesetzeskonformität von Zebrastreifen verursachte mysteriöses Schweigen in der öffentlichen Verwaltung der Stadt Luxemburg. Als Reaktion auf die Datenverweigerung schufen die Aktivist:innen des Zentrums für Urbane Gerechtigkeit eine Mischung aus Google Maps und Tinder, um die benötigten Daten selbst zu generieren. Dieser Vortrag beleuchtet das spannende Zusammenspiel von intransparenten Verwaltungen, der Eigeninitiative im Erstellen von Geodaten und dem juristischen Kampf um die Offenlegung von Informationen. Zudem wird aufgezeigt, welche Ressourcen ein solches Unterfangen erfordert, und wie es als lehrreiches Beispiel für zivilen Aktivismus und behördliche Transparenz dient.\n\nDie Geschichte begann mit einer einfachen Anfrage auf Twitter über die Gesetzeskonformität von Zebrastreifen in Luxemburg, die jedoch bei der Stadtverwaltung auf eine Mauer des Schweigens stieß. Als Reaktion darauf gründeten Aktivist:innen des Zentrums für Urbane Gerechtigkeit (ZUG) das Projekt \"Safe Crossing\", um die Einhaltung der Regularien für Zebrastreifen in Luxemburg-Stadt zu überprüfen. Mit einer Mischung aus Google Maps und Tinder entwickelten sie eine App, durch die die Nutzer:innen Luftbilder der Zebrastreifen analysieren und problematische Bereiche identifizieren konnten​​.\n\nIhre Ergebnisse waren alarmierend: Etwa ein Drittel der insgesamt 1.787 analysierten Zebrastreifen entsprachen nicht den gesetzlichen Vorgaben, da Parkplätze die Sicht auf die Zebrastreifen blockierten und somit die Sicherheit der Fußgänger:innen gefährdeten​​. Trotz der Publikation ihrer Ergebnisse und der Diskussionen im Stadtrat bestritt die Stadtverwaltung die Ergebnisse und blieb bei ihrer eigenen, wesentlich niedrigeren Schätzung von nur 37 nicht regelkonformen Zebrastreifen​.\n\nDie nachfolgenden Geschehnisse zeichneten ein Bild von intransparenten Verwaltungen und dem Kampf um die Offenlegung von Informationen. Trotz mehrerer offizieller Anfragen und einer Entscheidung der „Commission d’accès aux documents“ (CAD) zugunsten von ZUG weigerte sich die Stadt Luxemburg, die angeforderten Dokumente zu veröffentlichen. Der Fall eskalierte bis vor das Verwaltungsgericht, und ZUG lancierte eine Crowdfunding-Kampagne, um die anfallenden Rechtskosten zu decken​.\n\nDer Vortrag wird die Herausforderungen und Erfolge des Projekts detailliert beleuchten, das Engagement für offene Daten und bürgerlichen Aktivismus hervorheben und auf die Bedeutung von Transparenz und Rechenschaftspflicht in der öffentlichen Verwaltung eingehen. Die Zuhörer:innen werden nicht nur Einblicke in die technischen und juristischen Aspekte des Projekts erhalten, sondern auch inspiriert werden, wie individuelle und kollektive Aktionen positive Veränderungen herbeiführen können, selbst wenn sie gegen bürokratische Mauern stoßen.","original_language":"deu","persons":["thorben","fedus"],"tags":["37c3","11983","2023","Ethics, Politics \u0026 Society",""],"view_count":4521,"promoted":false,"date":"2023-12-28T11:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-04T08:45:07.784+01:00","length":2197,"duration":2197,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11983-e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11983-e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11983-e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11983-e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11983-von_zebrastreifen_offenen_daten_und_verschlossenen_verwaltungen","url":"https://api.media.ccc.de/public/events/e1a4a5df-9ef8-4364-b5c8-e8707ee83b8f","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"dcb00c6f-0621-4555-979d-4937ea34d324","title":"Mobile reverse engineering to empower the gig economy workers and labor unions","subtitle":null,"slug":"37c3-12133-mobile_reverse_engineering_to_empower_the_gig_economy_workers_and_labor_unions","link":"https://events.ccc.de/congress/2023/hub/event/mobile_reverse_engineering_to_empower_the_gig_economy_workers_and_labor_unions/","description":"[Reversing.works](https://reversing.works) will outline five years of experience linking trade unions, gig economy workers, GDPR and mobile app reverse engineering. Goal: to replicate an effective form of resistance.\n\nThis talk will describe our efforts to introduce a new toolkit and mindset for unions and gig workers, which is essential in an era where, for a growing number of people, \"an app is their boss\".\n\nOur work highlights the critical role of technical literacy in improving workers' bargaining power, particularly in collective bargaining. By demystifying the technology that governs them, we aim to equip workers with the tools to assert their rights and shape a fairer working landscape.\n\nSince 2019, our team, back in time known as [Tracking.Exposed](https://tracking.exposed) and now operating as [Reversing.Works](https://reversing.works), has focused on connecting mobile app reverse engineering with GDPR and workers' rights. We want to tell this story, all the missteps, the low-hanging fruit that hacktivists across Europe can grab, and the opportunities that new regulations open up in this sense.\n\nIn 2023, a [report](https://reversing.works/posts/2023/10/report-exercising-workers-rights-in-algorithmic-management-systems/) written for the European Trade Union Institute summarized our investigation into Glovo, in this talk we'll talk about how to repeat the investigations and, with varying complexity, how unionist and activists can start identifying potential data breaches and labor rights violations in mobile apps used by gig economy workers.","original_language":"eng","persons":["Claudio Agosti","Gaetano Priori"],"tags":["37c3","12133","2023","Ethics, Politics \u0026 Society",""],"view_count":1831,"promoted":false,"date":"2023-12-30T11:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-28T22:00:06.070+01:00","length":2473,"duration":2473,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12133-dcb00c6f-0621-4555-979d-4937ea34d324.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12133-dcb00c6f-0621-4555-979d-4937ea34d324_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12133-dcb00c6f-0621-4555-979d-4937ea34d324.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12133-dcb00c6f-0621-4555-979d-4937ea34d324.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12133-mobile_reverse_engineering_to_empower_the_gig_economy_workers_and_labor_unions","url":"https://api.media.ccc.de/public/events/dcb00c6f-0621-4555-979d-4937ea34d324","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"4240a5ce-e8c1-5769-9450-4a929bdbb945","title":"Erklär ma:","subtitle":"Solarenergie","slug":"37c3-57932-erklr-ma-solarenergie","link":"https://events.ccc.de/congress/2023/hub/event/erklr-ma-solarenergie/","description":"Von Simone Herpich (Balkonsolar eV) und Dr. Juliane Borchert (Fraunhofer Institut für Solare Energiesysteme) lasse ich mir alles (so viel wie geht) über Solarenergie erzählen.","original_language":"deu","persons":["Keßen Christian"],"tags":["37c3","57932","2023","Sendezentrum"],"view_count":3257,"promoted":false,"date":"2023-12-29T20:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-28T22:00:06.798+01:00","length":5104,"duration":5104,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57932-4240a5ce-e8c1-5769-9450-4a929bdbb945.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57932-4240a5ce-e8c1-5769-9450-4a929bdbb945_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57932-4240a5ce-e8c1-5769-9450-4a929bdbb945.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57932-4240a5ce-e8c1-5769-9450-4a929bdbb945.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57932-erklr-ma-solarenergie","url":"https://api.media.ccc.de/public/events/4240a5ce-e8c1-5769-9450-4a929bdbb945","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"aae8dd15-bb55-4c2c-810f-d230b9144c19","title":"Numerical Air Quality Modeling Systems","subtitle":"a journey from emissions to exposure","slug":"37c3-11975-numerical_air_quality_modeling_systems","link":"https://events.ccc.de/congress/2023/hub/event/numerical_air_quality_modeling_systems/","description":"High performance computing (HPC) in environmental science is usually associated with research on climate change, investigating the impact of atmospheric greenhouse gases (GHG) over the next century. Besides these GHGs, there are many other gases and aerosolos in the atmosphere, which have a much more direct and immediate impact on human health: air pollutants.\n\nThe World Health Organization (WHO) considers air pollution to be the world's single largest environmental health threat, accounting for approximately 7 million deaths worldwide every year. That's why in this talk we want to speak about how the problem of air pollution can be understood and predicted using HPC pollution modeling and its application based on general concepts and our own research. \n\nWe are Dr. Johannes Bieser and Dr. Martin Ramacher, both working at the Helmholtz Zentrum Hereon in the field of numerical pollution modelling. While Dr. Bieser wrote his Dissertation on emission modelling and its application, Dr. Ramacher wrote his Dissertation on pollutant transport and exposure modelling. \n\nIn our talk on numerical air quality modelling systems, we want to introduce basic principles and share our personal knowledge in the field of numerical pollution modelling, covering the entire pathway from emissions, transport, transformation and human exposure. Each of these steps relies heavily on large amounts of data from many different sources - satellite data, activity and meta data, measurements and many more - and skills in computer science. By default, environmental scientists are often not trained in computer science and high performance computing which implies a challenge of its own (and allows Nerds like us to excel).\n\nOur talk will be enriched with practical, technical and partially political examples to demonstrate the difficulties scientist face during their quest to improve air quality for everyone: from TB of wasted data due to historically grown data formats to counterproductive policy decisions to „improve“ air quality. We’ve seen it all and after participating in the CCC for many years now, we decided to draw attention to some state-of-the science approaches for solving one of the world’s single largest environmental health threats: „air pollution“. ","original_language":"eng","persons":["ottopaul","Johannes Bieser"],"tags":["37c3","11975","2023","Science",""],"view_count":1222,"promoted":false,"date":"2023-12-29T12:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-28T03:00:04.055+01:00","length":3684,"duration":3684,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11975-aae8dd15-bb55-4c2c-810f-d230b9144c19.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11975-aae8dd15-bb55-4c2c-810f-d230b9144c19_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11975-aae8dd15-bb55-4c2c-810f-d230b9144c19.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11975-aae8dd15-bb55-4c2c-810f-d230b9144c19.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11975-numerical_air_quality_modeling_systems","url":"https://api.media.ccc.de/public/events/aae8dd15-bb55-4c2c-810f-d230b9144c19","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e25b8bc3-6104-4c36-9c85-15b9d4151cb7","title":"Finding Vulnerabilities in Internet-Connected Devices","subtitle":"A Beginner’s Guide","slug":"37c3-11919-finding_vulnerabilities_in_internet-connected_devices","link":"https://events.ccc.de/congress/2023/hub/event/finding_vulnerabilities_in_internet-connected_devices/","description":"This introductory session will outline the process of hacking internet-connected devices, with the help of a real world example: Poly telephones and conference speaker systems. We will explain vulnerabilities we identified in them and how they can be leveraged to transform the devices into wiretaps.\n\nIn this introductory session we will journey into the field of internet-connected device security. Our talk aims to empower beginners by simplifying the process of hacking such devices.\n\nWe'll discuss vulnerabilities we uncovered in Poly telephones and conference speaker systems and describe how we effectively transformed a seemingly innocuous conference speaker into a fully functional wiretap. We'll begin with straightforward findings accessible to beginners and progress to more technical discoveries, so that people with no experience in the field can follow along, too.\n\nBy the end of the talk, the attendees will have a foundational understanding of how they can approach hacking such a device and will have learned how the impact of vulnerabilities can be shown and increased by chaining them.\n\nAll the vulnerabilities we discovered during our research have been responsibly disclosed to the vendor and will be published in December 2023.","original_language":"eng","persons":["Pascal Zenker","Christoph Wolff"],"tags":["37c3","11919","2023","Security",""],"view_count":5307,"promoted":false,"date":"2023-12-29T14:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-04T12:30:05.417+02:00","length":2841,"duration":2841,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11919-e25b8bc3-6104-4c36-9c85-15b9d4151cb7.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11919-e25b8bc3-6104-4c36-9c85-15b9d4151cb7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11919-e25b8bc3-6104-4c36-9c85-15b9d4151cb7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11919-e25b8bc3-6104-4c36-9c85-15b9d4151cb7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11919-finding_vulnerabilities_in_internet-connected_devices","url":"https://api.media.ccc.de/public/events/e25b8bc3-6104-4c36-9c85-15b9d4151cb7","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"4fc20f2f-c3a8-4823-9c81-374bd66b29f2","title":"Tractors, Rockets and the Internet in Belarus","subtitle":"How belarusian authoritarian regime is using technologies to repress it's population","slug":"37c3-11836-tractors_rockets_and_the_internet_in_belarus","link":"https://events.ccc.de/congress/2023/hub/event/tractors_rockets_and_the_internet_in_belarus/","description":"With dropping costs of surveillance smaller authoritarian regimes are gaining easier access to different \"out of the box\" security solutions used mainly to further oppress people. On example of Belarus we will see the future that awaits people in many different parts of the world if things don't change fast.\n\nRepublic of Belarus is ruled for last 29 years by authoritarian president Alexander Lukashenko. From the deputy chief of collective farm in USSR to the longest president in Europe, he continues to navigate complicated political scene between Russia/EU/US for his own advantage. \n\nNot even close to any technological sector through help of many Lukashenko turned Belarus into IT country with a lot western countries using developers from the dictatorship for their own project.\n\nThis presentation is about how the soviet modelled dictatorship managed to transform into technological authoritarian regime, where people are monitored and controlled of their loyalty to the regime, while also continuing a massive wave of repressions started from uprising against Alexander Lukashenko in 2020.\n\nThe presentation is made by a member of ABC-Belarus - a political solidarity organization from Belarus, working on supporting prisoners and developing security culture among street activists.","original_language":"eng","persons":["ABC Belarus","ABC-Belarus 2"],"tags":["37c3","11836","2023","Ethics, Politics \u0026 Society",""],"view_count":2849,"promoted":false,"date":"2023-12-28T13:50:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-24T19:00:08.218+01:00","length":2584,"duration":2584,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11836-4fc20f2f-c3a8-4823-9c81-374bd66b29f2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11836-4fc20f2f-c3a8-4823-9c81-374bd66b29f2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11836-4fc20f2f-c3a8-4823-9c81-374bd66b29f2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11836-4fc20f2f-c3a8-4823-9c81-374bd66b29f2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11836-tractors_rockets_and_the_internet_in_belarus","url":"https://api.media.ccc.de/public/events/4fc20f2f-c3a8-4823-9c81-374bd66b29f2","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"554cc933-93c7-4c47-8570-016fe5285605","title":"Fortbildung Cyber-Astrologie \u0026 KI-Karma","subtitle":"- Mit Teilnahmeurkunde zum Selbstausdrucken","slug":"37c3-12019-fortbildung_cyber-astrologie_ki-karma","link":"https://events.ccc.de/congress/2023/hub/event/fortbildung_cyber-astrologie_ki-karma/","description":"Dass es sich bei Digitalisierung um eine magische Angelegenheit handelt, der durch Regulierung großer Social-Media-Konzerne per Definition nicht beizukommen ist, ist auf politischer Ebene schon lange bekannt. Der Markt für esoterische Dienstleistungen rund um Digitalisierungsfragen ist daher vermutlich immens – und eröffnet viele Möglichkeiten für cyberfeinstofflich begabte Entrepreneurs \u0026 Digital-Okkultisten. Ganz nebenbei lernen wir, welche Maschen unseriöse Akteure (auch jenseits der Eso-Szene) anwenden, um mit den Sorgen und Ängsten von Menschen Geld zu machen.\n\nIn diesem kostenlosen Basis-Seminar werden Dir die wichtigsten Skills zur Erbringung ganzheitlicher Digital-Spiritualitäts-Dienstleistungen vermittelt, mit denen Du direkt in die Selbstständigkeit durchstarten kannst. Wir lernen von den Besten – wir lernen vom Esoterik-Markt, der ja bekanntlich nicht erst seit der Crosspromotion in einschlägigen Corona-Telegram-Gruppen boomt:\n\n1. Digital Forecasting: Warum umständliche Modelle konzipieren, wenn Du den direkten Zugriff auf die Akasha-Datenbank der Weltweisheit verkaufen kannst? In diesem Block geht es um die wichtigsten Wahrsager-Skills (Cold Reading, Hot Reading, Barnum-Effekt).\n2. Healing statt Patching: Anwendung ganzheitlich-spiritueller Security-Konzepte auf homöopathischer Basis für Kundennetzwerke mit Schwerpunkt auf dem souveränen Umgang mit Beschwerden \u0026 Erstverschlimmerungen.\n3. Belebte Netzwerke: Lehren aus der Wasserbelebung \u0026 kompatible Geschäftsideen („Serverraum der Neuen Zeit“, Manifestieren von RAM, KI-Karma)\n4. Mental-Antivirus: Installationsanleitung für feinstoffliche Unterstützungssoftware zur Ego-Mitigation (thought terminating cliches, Conspiracy \u0026 Cult-Groupware as a Service)\n5. Upscaling: Innovative Pyramiden- und Schneeballsysteme zwecks ganzheitlicher Gewinnabschöpfung.\n\n\n\nMelden Sie sich jetzt für das KOSTENLOSE Basis-Seminar an, und Sie bekommen (wenn die Speicherblöcke günstig stehen) unseren limitierten feinschwingenden 5G-Sticker für ihr EDV-Gerät GRATIS dazu. \n\n+++ von unabhängigen Cyber-Schamaninnen empfohlen +++\n\nBild: Charlotte von Hirsch","original_language":"deu","persons":["Katharina Nocun"],"tags":["37c3","12019","2023","Ethics, Politics \u0026 Society",""],"view_count":33183,"promoted":false,"date":"2023-12-30T11:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-23T16:30:07.391+01:00","length":2516,"duration":2516,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12019-554cc933-93c7-4c47-8570-016fe5285605.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12019-554cc933-93c7-4c47-8570-016fe5285605_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12019-554cc933-93c7-4c47-8570-016fe5285605.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12019-554cc933-93c7-4c47-8570-016fe5285605.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12019-fortbildung_cyber-astrologie_ki-karma","url":"https://api.media.ccc.de/public/events/554cc933-93c7-4c47-8570-016fe5285605","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"afbccf41-b658-4ab6-826d-73abc5e5a578","title":"Klimafreundliche Digitalisierung: Koalitionsvertrag vs. Wirklichkeit","subtitle":"Von Rechenzentren bis Software – wo muss und wie kann die Bundes-IT nachhaltiger werden?","slug":"37c3-12139-klimafreundliche_digitalisierung_koalitionsvertrag_vs_wirklichkeit","link":"https://events.ccc.de/congress/2023/hub/event/klimafreundliche_digitalisierung_koalitionsvertrag_vs_wirklichkeit/","description":"Wie der Bund seine IT einkauft und betreibt, hat eine erhebliche Auswirkung auf das Klima.\n\nGroKo und Ampel-Regierung waren und sind daher groß im Ankündigen grüner IT: in digitalpolitischer Umweltagenda, Koalitionsvertrag, Digitalstrategie und Gigabitstrategie. Wie weit Anspruch und Wirklichkeit auseinanderklaffen, erfrage ich als Bundestagsabgeordnete regelmäßig mit Kleinen Anfragen und schriftlichen Fragen. Ich verspreche kleine Hoffnungsschimmer, aber auch Frustration, denn meine neueste Anfrage vom November 2023 deckt schonungslos auf, wie intransparent und wie wenig nachhaltig die IT des Bundes immer noch ist und wie die Ampel sich die Latte immer tiefer hängt und trotzdem nicht drüber kommt.\n\nDas Potenzial des Bundes als Großverbraucher (z. B. mit über 180 Rechenzentren), als Finanzierer (z. B. von über 400 KI-Projekten) und als Regulierer (z. B. beim Energieeffizienzgesetz oder beim Überbau von Glasfaser) ist aber riesig, auch das werde ich vermitteln und die Stellschrauben beschreiben, an denen man drehen könnte, um IT weniger klimaschädlich zu machen – auch außerhalb des Bundes. \n\nDer Bund kauft jährlich für 260 Mrd. € ein, auch für mehr als 1 Mrd. IT, er betreibt über 180 Rechenzentren, förderte in 2023 über 400 KI-Projekte, setzt selbst über 100 Mal KI-Systeme ein und hat noch aus vielen weiteren Gründen mit seiner IT eine erhebliche Klimawirkung. Wie die GroKo hat sich auch die Ampel auf die Fahnen geschrieben, die Digitalisierung klimafreundlicher zu machen, ganz allgemein – durch Regulierung für alle (z. B. im Energieeffizienzgesetz), aber auch in eigener Verantwortung, bei den eigenen Rechenzentren, Software oder IT-Dienstleistungen. Die Ankündigungen dazu sind wohltönend, z. B. im Koalitionsvertrag und in der Digitalstrategie. Bundesbehörden und Rechenzentren sollen klimafreundlich(er) werden, es soll mehr Transparenz geben, z. B. über ein Energieeffizienzregister für Rechenzentren, es wurde versprochen, dass Vergabeprozesse die Nachhaltigkeit berücksichtigen sollen, auch beim Einkauf von IT und IT-Dienstleistungen, z. B. durch standardmäßigen Einkauf von IT mit Blauem Engel – auch bei Software. Selbst der Ausbau der Gigabitinfrastruktur sollte nachhaltiger werden. Aber passiert das alles auch?\n\nIch nutze meine parlamentarischen Rechte als Bundestagsabgeordnete der Opposition (DIE LINKE), um über schriftliche Fragen und Kleine Anfragen Fakten dazu öffentlich zu machen und die große Kluft zwischen Anspruch und Wirklichkeit zu zeigen. Dabei geht es einerseits um das Vorhandensein von Daten (you get what you measure!) – tatsächlich also um einen Mangel an Transparenz zur Baseline – und andererseits um die Daten selbst, also wie gut oder schlecht die Nachhaltigkeit jeweils ist.\n\nEinen Schwerpunkt lege ich dabei auf die Klimafreundlichkeit von Rechenzentren, aber auch zu anderen Themen gibt’s für Euch Fakten: zur Wiederverwendung von Hardware, zum Recht auf Reparatur und der (versprochenen!) Förderung von Reparatur-Initiativen, zur Berücksichtigung von Nachhaltigkeitsaspekten bei der Vergabe von Hunderten Millionen Euro Fördergelder für KI-Projekte, zu Websites, Software und mehr. Da ich seit mehreren Jahren zur Nachhaltigkeit der Bundes-IT Kleine Anfragen stelle und die Digitalpolitik der Bundesregierung aus dem Maschinenraum des Bundestages verfolge, kann ich auch die Entwicklung beschreiben und werde Euch zeigen, wie die Ampel-Regierung sich einfach die Latte immer niedriger hängt und vermutlich trotzdem kaum eines ihrer Nachhaltigkeitsziele erreichen wird. Beim 37C3 werde ich erstmalig die Ergebnisse meiner jüngsten Anfrage vom November 2023 öffentlich vorstellen.\n\nBei aller Frustration über den Status Quo zeigt mein Vortrag aber auch, welche riesigen Potenziale noch gehoben werden könnten, um tatsächlich eine nachhaltigere Digitalisierung zu erreichen – und dafür ist es nie zu spät! ","original_language":"deu","persons":["Anke Domscheit-Berg"],"tags":["37c3","12139","2023","Sustainability \u0026 Climate Justice",""],"view_count":3845,"promoted":false,"date":"2023-12-27T20:15:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-24T15:45:07.372+01:00","length":2540,"duration":2540,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12139-afbccf41-b658-4ab6-826d-73abc5e5a578.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12139-afbccf41-b658-4ab6-826d-73abc5e5a578_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12139-afbccf41-b658-4ab6-826d-73abc5e5a578.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12139-afbccf41-b658-4ab6-826d-73abc5e5a578.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12139-klimafreundliche_digitalisierung_koalitionsvertrag_vs_wirklichkeit","url":"https://api.media.ccc.de/public/events/afbccf41-b658-4ab6-826d-73abc5e5a578","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f6c9f293-934d-4505-8a14-f85870e3d746","title":"Analog rotary phones get a second life with raspberry pi","subtitle":null,"slug":"37c3-11716-analog_rotary_phones_get_a_second_life_with_raspberry_pi","link":"https://events.ccc.de/congress/2023/hub/event/analog_rotary_phones_get_a_second_life_with_raspberry_pi/","description":"An open source project involving an automated telephone exchange powered by Raspberry Pi, utilizing old rotary phones. The system imitates exchange setups from different countries across the globe, allowing users to feel the genuine experience.\n\nRotary-dial analogue phones were once a necessity, but now they lay dormant on shelves or tucked away in attics. This is largely due to the replacement of traditional landlines with fibre-optic modems, rendering analogue phones obsolete.\nIn addition to their sentimental value, rotary dial phones provide several advantages, including reduced electrosmog emissions, protection against eavesdropping, repurposing outdated technology, and promoting a slower pace of life.\nThe contribution explains how to build a private telephone exchange for eight people using rotary dial phones. The exchange is powered by a Raspberry Pi and custom analogue electronics. The following themes are covered:\n- The construction of a PBX which resembles telephone exchanges in various countries worldwide, giving users a realistic experience.\n- Handling of call initiation, routing, full duplex voice transmission and human-machine communication.\n- The software implementation on the Raspberry Pi running Linux. \n- A study of enhancing the open-source software with additional functionalities.\n\nDue to the readily available Raspberry Pi hardware and software programmability, this project invites everyone to participate.\n\n","original_language":"eng","persons":["Hans Gelke"],"tags":["37c3","11716","2023","Hardware \u0026 Making",""],"view_count":5188,"promoted":false,"date":"2023-12-30T12:55:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-04T05:45:03.096+02:00","length":2526,"duration":2526,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11716-f6c9f293-934d-4505-8a14-f85870e3d746.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11716-f6c9f293-934d-4505-8a14-f85870e3d746_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11716-f6c9f293-934d-4505-8a14-f85870e3d746.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11716-f6c9f293-934d-4505-8a14-f85870e3d746.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11716-analog_rotary_phones_get_a_second_life_with_raspberry_pi","url":"https://api.media.ccc.de/public/events/f6c9f293-934d-4505-8a14-f85870e3d746","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f795f0e3-6aa9-4166-ae24-9183c701810a","title":"BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses","subtitle":"Breaking and fixing the Bluetooth standard. One More Time.","slug":"37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses","link":"https://events.ccc.de/congress/2023/hub/event/bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses/","description":"Ciao! We present the BLUFFS attacks (CVE-2023-24023), six novel attacks breaking Bluetooth's forward and future secrecy. Our attacks enable device impersonation and machine-in-the-middle across sessions by compromising and re-using one session key. We discuss the four vulnerabilities in the Bluetooth specification enabling the attacks, two of which are new and related to unilateral and repeatable session key derivation. We describe the toolkit we developed and open-sourced to test our attacks via firmware binary patching, our experiments where we exploited 18 heterogeneous Bluetooth devices, and the practical and backward-compliant session key derivation protocol we built to fix the attacks by design. We also cover related work like KNOB, BIAS, and BLUR, and educational Bluetooth security tips and tricks.\n\nBluetooth is a pervasive technology for wireless communication.\nBillions of devices use it in sensitive applications and to exchange\nprivate data. The security of Bluetooth depends on the Bluetooth\nstandard and its two security mechanisms: pairing and session establishment. No prior work, including the standard itself, analyzed the future and forward secrecy guarantees of these mechanisms, e.g., if Bluetooth pairing and session establishment defend past\nand future sessions when the adversary compromises the current.\nTo address this gap, we present six novel attacks, defined as the\nBLUFFS attacks, breaking Bluetooth sessions’ forward and future\nsecrecy. Our attacks enable device impersonation and machine-in-the-middle across sessions by only compromising one session key. The attacks exploit two novel vulnerabilities that we uncover in the Bluetooth standard related to unilateral and repeatable session key derivation. As the attacks affect Bluetooth at the architectural level, they are effective regardless of the victim’s hardware and software details (e.g., chip, stack, version, and security mode).\n\nWe also release BLUFFS, a low-cost toolkit to perform and automatically check the effectiveness of our attacks. The toolkit employs seven original patches to manipulate and monitor Bluetooth session key derivation by dynamically patching a closed-source Bluetooth firmware that we reverse-engineered. We show that our attacks have a critical and large-scale impact on the Bluetooth ecosystem, by evaluating them on seventeen diverse Bluetooth chips (eighteen devices) from popular hardware and software vendors and supporting the most popular Bluetooth versions. Motivated by our empirical findings, we develop and successfully test an enhanced key derivation function for Bluetooth that stops by-design our six attacks and their four root causes. We show how to effectively integrate our fix into the Bluetooth standard and discuss alternative implementation-level mitigations. We responsibly disclosed our contributions to the Bluetooth SIG.","original_language":"eng","persons":["Daniele Antonioli"],"tags":["37c3","12342","2023","Security",""],"view_count":2506,"promoted":false,"date":"2023-12-28T23:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-15T18:45:06.999+01:00","length":3557,"duration":3557,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12342-f795f0e3-6aa9-4166-ae24-9183c701810a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12342-f795f0e3-6aa9-4166-ae24-9183c701810a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12342-f795f0e3-6aa9-4166-ae24-9183c701810a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12342-f795f0e3-6aa9-4166-ae24-9183c701810a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12342-bluffs_bluetooth_forward_and_future_secrecy_attacks_and_defenses","url":"https://api.media.ccc.de/public/events/f795f0e3-6aa9-4166-ae24-9183c701810a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"097a5331-c705-4c1b-a77c-85397cfca426","title":"Self-cannibalizing AI","subtitle":"Artistic Strategies to expose generative text-to-image models ","slug":"37c3-12125-self-cannibalizing_ai","link":"https://events.ccc.de/congress/2023/hub/event/self-cannibalizing_ai/","description":"What occurs when machines learn from one another and engage in self-cannibalism within the generative process? Can an image model identify the happiest person or determine ethnicity from a random image? Most state-of-the-art text-to-image implementations rely on a number of limited datasets, models, and algorithms. These models, initially appearing as black boxes, reveal complex pipelines involving multiple linked models and algorithms upon closer examination. We engage artistic strategies like feedback, misuse, and hacking to crack the inner workings of image-generation models. This includes recursively confronting models with their output, deconstructing text-to-image pipelines, labelling images, and discovering unexpected correlations. During the talk, we will share our experiments on investigating Stable-Diffusion pipelines, manipulating aesthetic scoring in extensive public text-to-image datasets, revealing NSFW classification, and utilizing Contrastive Language-Image Pre-training (CLIP) to reveal biases and problematic correlations inherent in the daily use of these models.\n\nThe talk will be conducted by sharing various experiments we've done under the umbrella of generative AI models. We will begin with a general idea of how we, as artists/programmers, perceive these models and our research on the workflow of these constructs. Then, we will further elaborate on our exploration of the Stable Diffusion pipeline and datasets. Throughout our investigation, we discovered that some essential parts are all based on the same few datasets, models, and algorithms. This causes us to think that if we investigate deeper into some specific mechanisms, we might be able to reflect on the bigger picture of some political discourses surrounding generative AI models. We deconstructed the models into three steps essential to understanding how they worked: dataset, embedding, and diffusions. Our examples are primarily based on Stable-Diffusion, but some concepts are interchangeable in other generative models.\n\nAs datasets and machine-learning models grow in scale and complexity, understanding their nuances becomes challenging. Large datasets, like the one for training Stable Diffusion, are filtered using algorithms often employing machine learning. To \"enhance\" image generation, LAION's extensive dataset underwent filtering with an aesthetic prediction algorithm that uses machine learning to score the aesthetics of an image with a strong bias towards water-color and oil paintings. Besides the aesthetic scoring of images, images are also scored with a not safe-for-work classifier that outputs a probability of an image containing explicit content . This algorithm comes with its own discriminatory tendencies that we explore in the talk and furthermore asks how and by whom we want our datasets to be filtered and constructed.\n\nMany generative models are built upon Contrastive Language-Image Pre-training (CLIP) and its open-source version, Open-CLIP, which stochastically relates images and texts. These models connect images and text, digitize text, and calculate distances between words and images. However, they heavily rely on a large number of text-image pairs during training, potentially introducing biases into the database. We conducted experiments involving various \"false labelling\" scenarios and identified correlations. For instance, we used faces from ThisPersonDoesNotExist to determine \"happiness\" faces, explored ethnicities and occupations on different looks, and analyzed stock images of culturally diverse food. The results often align with human predictions, but does that mean anything? \n\nIn the third part, we take a closer look at the image generation process, focusing on the Stable Diffusion pipeline. Generative AI models, like Stable Diffusion, have the ability not only to generate images from text descriptions but also to process existing images. Depending on the settings, they can reproduce input images with great accuracy. However, errors accumulate with each iteration when this AI reproduction is recursively used as input. We observed that images gradually transform into purple patterns or a limited set of mundane concepts depending on the parameters and settings. This raises questions about the models' tendencies to default to learned patterns.","original_language":"eng","persons":["Ting-Chun Liu","Leon-Etienne Kühr"],"tags":["37c3","12125","2023","Art \u0026 Beauty",""],"view_count":5576,"promoted":false,"date":"2023-12-30T16:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-26T19:00:04.693+01:00","length":3216,"duration":3216,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12125-097a5331-c705-4c1b-a77c-85397cfca426.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12125-097a5331-c705-4c1b-a77c-85397cfca426_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12125-097a5331-c705-4c1b-a77c-85397cfca426.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12125-097a5331-c705-4c1b-a77c-85397cfca426.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12125-self-cannibalizing_ai","url":"https://api.media.ccc.de/public/events/097a5331-c705-4c1b-a77c-85397cfca426","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f4f03a06-76b1-40cf-b58f-cd902e93a688","title":"Tor censorship attempts in Russia, Iran, Turkmenistan","subtitle":null,"slug":"37c3-12040-tor_censorship_attempts_in_russia_iran_turkmenistan","link":"https://events.ccc.de/congress/2023/hub/event/tor_censorship_attempts_in_russia_iran_turkmenistan/","description":"In December 2021, months before the world watched Russia invade Ukraine, Russia rolled out comprehensive censorship of the Tor network and related Tor protocols. Then in October 2022, the latest wave of protests in Iran saw a huge spike in Tor usage followed by a swift crackdown of the most successful techniques. Meanwhile in 2023, Turkmenistan has blocked popular CDNs like Cloudflare and Akamai, most hosting providers like Hetzner and OVH, and much more.\n\nOn the depressing side, the global censorship trend continues to gain momentum, with some European countries alarmingly eager to get in on it. But resignation is boring: here we are, a tiny community of activists and relay/bridge operators around the world continuing to provide safe and private internet reachability for hundreds of thousands of people who are trying to be human beings under authoritarian regimes.\n\nWe will walk through \\*how\\* each of these countries deployed their Tor blocks, and what changes we made to let citizens continue to reach the Tor network. Looking at each case study through a Tor lens will let us compare/contrast the censorship attempts from each country, discuss future ideas for how to make sure the bytes can keep flowing, and talk through the political impacts.","original_language":"eng","persons":["Roger Dingledine"],"tags":["37c3","12040","2023","Ethics, Politics \u0026 Society",""],"view_count":6638,"promoted":false,"date":"2023-12-28T23:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-24T15:45:08.254+01:00","length":3761,"duration":3761,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12040-f4f03a06-76b1-40cf-b58f-cd902e93a688.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12040-f4f03a06-76b1-40cf-b58f-cd902e93a688_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12040-f4f03a06-76b1-40cf-b58f-cd902e93a688.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12040-f4f03a06-76b1-40cf-b58f-cd902e93a688.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12040-tor_censorship_attempts_in_russia_iran_turkmenistan","url":"https://api.media.ccc.de/public/events/f4f03a06-76b1-40cf-b58f-cd902e93a688","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"56ec1042-ef0f-4f11-89d2-ee99e34a3411","title":"Gemeinsam gegen rechten Terror! Aber wie?","subtitle":"Vortrag und Lesung","slug":"37c3-12094-gemeinsam_gegen_rechten_terror_aber_wie","link":"https://events.ccc.de/congress/2023/hub/event/gemeinsam_gegen_rechten_terror_aber_wie/","description":"Die zwölf Jahre seit der Selbstenttarnung des NSU haben gezeigt, dass auf den Staat bei der Aufklärung und Aufarbeitung von rechtem Terror kein Verlass ist. Deshalb haben Betroffene von rechter Gewalt, Antifaschist\\*innen und Zivilgesellschaft diese Aufgabe wieder und wieder selbst in die Hand genommen. Die daraus gewonnenen Analysen, die Aufklärung und die entstandenen solidarischen Netzwerke sind vielfältiger, als sich viele am Anfang vorgestellt haben. Doch wir wollen fragen: Was können nächste Schritte sein? Wie können wir rechten Terror verhindern?\n\nDas bundesweite antifaschistische Bündnis NSU-Watch hat im Sommer 2023 sein Buch „Aufklären und Einmischen. Der NSU-Komplex und der Münchener Prozess“ in der erweiterten Neuauflage herausgebracht. Es gibt einen Überblick über die bisherige Aufarbeitung des NSU-Komplexes. Auf dieser Grundlage wollen Vortrag und Lesung fragen: Was können nächste Schritte sein? Wie können wir rechten Terror verhindern? Die Antworten sind vielfältig und warten teilweise noch darauf, entdeckt zu werden. Und trotzdem bleibt die Gefahr rechten Terrors hoch, auch weil auf staatlicher, behördlicher und gesellschaftlicher Seite Konsequenzen noch ausstehen. Doch wir wissen bereits jetzt genug, um rechtem Terror aktiv entgegenzuwirken. ","original_language":"deu","persons":["Caro Keller (NSU-Watch)"],"tags":["37c3","12094","2023","Ethics, Politics \u0026 Society",""],"view_count":2869,"promoted":false,"date":"2023-12-29T20:30:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-07T21:00:11.709+01:00","length":3698,"duration":3698,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12094-56ec1042-ef0f-4f11-89d2-ee99e34a3411.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12094-56ec1042-ef0f-4f11-89d2-ee99e34a3411_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12094-56ec1042-ef0f-4f11-89d2-ee99e34a3411.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12094-56ec1042-ef0f-4f11-89d2-ee99e34a3411.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12094-gemeinsam_gegen_rechten_terror_aber_wie","url":"https://api.media.ccc.de/public/events/56ec1042-ef0f-4f11-89d2-ee99e34a3411","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b7942ebe-62cd-408b-8ded-72a60cca1d49","title":"Das Recht auf Selbstverteidigung im modernen Völkerrecht","subtitle":"DIe Ausnahme vom Gewaltverbot: Wann darf ein Staat sich mit Waffengewalt verteidigen? ","slug":"37c3-11951-das_recht_auf_selbstverteidigung_im_modernen_volkerrecht","link":"https://events.ccc.de/congress/2023/hub/event/das_recht_auf_selbstverteidigung_im_modernen_volkerrecht/","description":"Der Vortrag gibt eine Einführung in das völkerrechtliche Recht auf Selbstverteidigung. Das moderne Völkerrecht verbietet die Drohung oder den Einsatz militärischer Gewalt. Eine Ausnahme davon ist das Recht auf Selbstverteidigung im Falle eines bewaffneten Angriffes. \n\nDas völkerrechtliche Selbstverteidigungsrecht ist momentan in aller Munde. Ob im Südkaukasus, der Ukraine oder im Nahen Osten, eine Zunahme militärischer Gewalt führt immer wieder dazu, dass Staaten ihr Recht auf Selbstverteidigung wahrnehmen. Der Vortrag erläutert die Ursprünge des völkerrechtlichen Gewaltverbotes und das Verhältnis zum Selbstverteidigungsrecht. Außerdem wird der Zusammenhang zum humanitären Völkerrecht erklärt (ius ad bellum/ius in bello), weil es hier in der öffentlichen Debatte immer wieder zu Vermischungen kommt. \n\nIm Kern werden folgende Fragen beantwortet: \n\nWann hat ein Staat ein Recht auf Selbstverteidigung? \nWie und wie lange kann das Selbstverteidigungsrecht ausgeübt werden? \nGegen wen richtet sich das Recht auf Selbstverteidigung? \n\nDie Ergebnisse werden dann auf aktuelle Fälle angewandt (bspw.: Russlands Angriffskrieg gegen die Ukraine, Terrorangriff der Hamas auf Israel). \n\n\n","original_language":"deu","persons":["Dustin Hoffmann"],"tags":["37c3","11951","2023","Ethics, Politics \u0026 Society",""],"view_count":7395,"promoted":false,"date":"2023-12-28T12:55:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-01T06:45:03.833+02:00","length":2488,"duration":2488,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11951-b7942ebe-62cd-408b-8ded-72a60cca1d49.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11951-b7942ebe-62cd-408b-8ded-72a60cca1d49_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11951-b7942ebe-62cd-408b-8ded-72a60cca1d49.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11951-b7942ebe-62cd-408b-8ded-72a60cca1d49.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11951-das_recht_auf_selbstverteidigung_im_modernen_volkerrecht","url":"https://api.media.ccc.de/public/events/b7942ebe-62cd-408b-8ded-72a60cca1d49","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e9ecf88b-5dde-4801-b9ce-3b62ac06b899","title":"Bifröst: Apple's Rainbow Bridge for Satellite Communication","subtitle":null,"slug":"37c3-11948-bifrost_apple_s_rainbow_bridge_for_satellite_communication","link":"https://events.ccc.de/congress/2023/hub/event/bifrost_apple_s_rainbow_bridge_for_satellite_communication/","description":"Apple's cutting-edge emergency SOS and location sharing services provide crucial communication alternatives when no cellular network is available. This talk will shed light on how these satellite services work, how they are integrated into existing fall and crash detection, present the security measures employed to safeguard resource access and privacy, and explore how this communication is embedded within the operating system.\n\nWith the release of the iPhone 14, users can reach out to emergency services by sending an SOS message via a satellite link directly from their phone. This use of the GlobalStar network facilitates two-way communication with emergency responders through the Messages app. Users can easily send text messages and respond to queries. This communication channel, due to its sensitive nature, demands robust security and authentication. It is imperative for Apple to ensure that the system is foolproof, negating the possibility of dispatching emergency responders to incorrect locations or individuals. Equally significant is the protection of the privacy of those in need, including their location and the nature of their emergency.\n\nIn our talk, we demonstrate how a rooted iPhone without satellite capabilities can be tricked into thinking that it can communicate with the satellite network. This technique allows us to trigger various emergency situations without actually contacting emergency services. On the rooted iPhone, we can then inspect the transport security and key derivation while these features are being used. We will present various insights into the proprietary satellite communication protocol based on this analysis.\n\nMoreover, Apple's satellite features allow users to share their location in Find My with up to ten friends via a satellite link. This capability serves as a convenient tool for staying connected with friends and family while venturing off the beaten path. We’ll take a look into how this new Find My extension is implemented.","original_language":"eng","persons":["Alexander Heinrich","jiska"],"tags":["37c3","11948","2023","Security",""],"view_count":5561,"promoted":false,"date":"2023-12-27T20:15:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-26T02:00:03.403+01:00","length":2455,"duration":2455,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11948-e9ecf88b-5dde-4801-b9ce-3b62ac06b899.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11948-e9ecf88b-5dde-4801-b9ce-3b62ac06b899_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11948-e9ecf88b-5dde-4801-b9ce-3b62ac06b899.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11948-e9ecf88b-5dde-4801-b9ce-3b62ac06b899.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11948-bifrost_apple_s_rainbow_bridge_for_satellite_communication","url":"https://api.media.ccc.de/public/events/e9ecf88b-5dde-4801-b9ce-3b62ac06b899","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"45057d82-26a3-40c9-8b94-c8631a0026f0","title":"Fuzzing the TCP/IP stack","subtitle":"beyond the trivial","slug":"37c3-12235-fuzzing_the_tcp_ip_stack","link":"https://events.ccc.de/congress/2023/hub/event/fuzzing_the_tcp_ip_stack/","description":"In this talk, we delve into the captivating realm of TCP/IP stack fuzzing. As the backbone of internet communication, the TCP/IP stack is a prime target for cyber threats. This presentation will unravel the intricacies of fuzzing techniques applied to several TCP/IP stacks, shedding light on how these methodologies can uncover bugs, crashes and vulnerabilities. From the fundamentals of packet fuzzing to advanced mutation strategies, attendees will gain valuable insights into the proactive ways to fuzz a TCP/IP stack. Whether you're a seasoned cybersecurity professional or a curious enthusiast, this talk promises to be an enlightening journey into the heart of TCP/IP stack security and the crucial role of fuzzing in safeguarding our interconnected world.\n\nOur exploration begins with an honest appraisal of traditional fuzzing methodologies that have been applied to TCP/IP stacks before, like ISIC, revealing their inherent limitations, e.g., they can't reach beyond the TCP initial state. Recognizing the need for a more evolved approach, we take a different approach, where we leverage a full-blow active network connection for fuzzing. A key revelation in this journey is the deliberate decision to sidestep the arduous task of constructing a custom TCP/IP stack, a choice rooted in practical considerations.\n\nThe reluctance to build a bespoke TCP/IP stack leads us to innovative strategies such as embedding hooks in the Linux kernel and tapping into userland TCP/IP stacks like PyTCP, Netstack (part of Google gVisor), and PicoTCP. PicoTCP takes center stage, offering a userland TCP/IP stack that becomes integral to our state fuzzing methodology. Attendees will gain a deeper understanding of its architecture, APIs, and documentation, appreciating its pivotal role in fortifying network security.\n\nAs the presentation unfolds, we navigate through the development of a powerful fuzzer, a core element in our approach to identifying vulnerabilities within the TCP/IP stack. The intricacies of driving traffic through the system, simulating real-world scenarios, and leveraging reproducibility and diagnostics techniques are revealed. The discussion expands to showcase tangible results, including trophies obtained, bugs reported, and the eventual release of the project on GitHub. The session concludes with an engaging Q \u0026 A, encouraging participants to delve into the intricacies of TCP/IP stack fuzzing and its profound implications for network security.","original_language":"eng","persons":["Ilja van Sprundel"],"tags":["37c3","12235","2023","Security",""],"view_count":7586,"promoted":false,"date":"2023-12-29T12:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-04T01:45:04.190+02:00","length":2379,"duration":2379,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12235-45057d82-26a3-40c9-8b94-c8631a0026f0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12235-45057d82-26a3-40c9-8b94-c8631a0026f0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12235-45057d82-26a3-40c9-8b94-c8631a0026f0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12235-45057d82-26a3-40c9-8b94-c8631a0026f0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12235-fuzzing_the_tcp_ip_stack","url":"https://api.media.ccc.de/public/events/45057d82-26a3-40c9-8b94-c8631a0026f0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"7fc0bc43-f863-42fc-b5ae-cfee4a2499ff","title":"Öffnet eure Spaces für Gehörlose!","subtitle":"Wie wir den CCC Wien und das Metalab für Gehörlose zugänglich gemacht haben.","slug":"37c3-12100-offnet_eure_spaces_fur_gehorlose","link":"https://events.ccc.de/congress/2023/hub/event/offnet_eure_spaces_fur_gehorlose/","description":"Hacken geht auch ohne Ohren! In den letzten zwei Jahren haben wir am lebenden Objekt erforscht, wie man Hackspaces für Gehörlose öffnen kann, so dass wir alle gemeinsam an Projekten arbeiten und cooles Zeug bauen können. Kommt vorbei, schaut/lauscht, und nehmt was mit nach Hause!\n\nDer Vortrag wird in der Österreichischen Gebärdensprache (ÖGS) gehalten und simultan zu Deutsch übersetzt (bzw. andersherum für Fragen).\n\n\nHackspaces sind für Gehörlose nicht zugänglich, um ihre Kreativität auszuleben sowie nachhaltige Techniknutzung eigenständig zu erlernen.\n\nDas wissenschaftlich-künstlerische Projekt MACH’S AUF! setzt seinen Fokus auf die folgenden Fragen:\n\n* Wie kann Technik gestaltet sein, damit sie besser von gehörlosen Menschen genutzt werden kann?\n* Wie kann eine Zusammenarbeit zwischen Gehörlosen und Hörenden funktionieren?\n* Wie können Barrieren abgebaut werden, ohne dass gesellschaftliche Randgruppen davon benachteiligt werden?\n\n\n\nIn den letzten zwei Jahren haben Oliver \"fussel\" Suchanek (es/ihm) und Franz \"Stoni\" Steinbrecher (er/ihm) viel Zeit, Aufwand und Sorgfalt in diverse Veranstaltungen, Workshops und Aufklärung gesteckt. Ermöglicht wurde das durch die finanzielle Unterstützung vom Chaos Computer Club.\n\nDas Ergebnis kann sich sehen lassen:\n\nEine neue Community, in der Hörende und Gehörlose gemeinsam hacken, in der Gehörlose Maschinen bedienen, die vorher unzugänglich waren, und auch ganz neue Projekte wie zum Beispiel die ÖGS-Suchmaschine (http://suche.machs-auf.at/search).\n\nÜber die Arbeit der ersten zwei Jahre wird Oliver \"fussel\" Suchanek berichten, so dass ihr unsere Ansätze auch in anderen Spaces anwenden könnt.\n\nSeid gespannt auf den Einblick … :)","original_language":"deu","persons":["Oliver 'fussel' Suchanek"],"tags":["37c3","12100","2023","CCC",""],"view_count":989,"promoted":false,"date":"2023-12-30T15:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-29T22:45:04.550+02:00","length":2224,"duration":2224,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12100-7fc0bc43-f863-42fc-b5ae-cfee4a2499ff.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12100-7fc0bc43-f863-42fc-b5ae-cfee4a2499ff_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12100-7fc0bc43-f863-42fc-b5ae-cfee4a2499ff.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12100-7fc0bc43-f863-42fc-b5ae-cfee4a2499ff.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12100-offnet_eure_spaces_fur_gehorlose","url":"https://api.media.ccc.de/public/events/7fc0bc43-f863-42fc-b5ae-cfee4a2499ff","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0","title":"Vom Kinderkanzler Kurz zum Volkskanzler Kickl - Politik in Österreich","subtitle":"","slug":"37c3-57954-vom-kinderkanzler-kurz-zum-volkskanzler-kickl-politik-in-sterreich","link":"https://events.ccc.de/congress/2023/hub/event/vom-kinderkanzler-kurz-zum-volkskanzler-kickl-politik-in-sterreich/","description":"Österreichische Politik kann mit Humor sehr gut ertragen werden. Ob Videos von spanischen Inseln, Chats oder Spesenaffären - all das hätte sich ein Drehbuchautor nicht besser ausdenken können. Wir erklären, was in den letzten Jahren bei uns passiert ist und zeigen auf, wie ein weiterer Rechtsruck verhindert werden kann.","original_language":"deu","persons":["Alexander Muigg"],"tags":["37c3","57954","2023","Sendezentrum"],"view_count":1966,"promoted":false,"date":"2023-12-27T23:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-01-10T12:45:12.730+01:00","length":4466,"duration":4466,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57954-d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57954-d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57954-d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57954-d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57954-vom-kinderkanzler-kurz-zum-volkskanzler-kickl-politik-in-sterreich","url":"https://api.media.ccc.de/public/events/d5d7ebed-928c-5f1d-8f56-ff2fd352f0b0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc","title":"Open CPU / SoC design, all the way up to Debian","subtitle":null,"slug":"37c3-11777-open_cpu_soc_design_all_the_way_up_to_debian","link":"https://events.ccc.de/congress/2023/hub/event/open_cpu_soc_design_all_the_way_up_to_debian/","description":"This lecture will cover many aspect of designing a RISC-V CPU, out-of-order execution, multi-core, memory coherency, security and running linux and debian on a FPGA.\n\nThis will be based on the recently developped NaxRiscv core, a free and opensource RISC-V softcore. I will cover many interresting aspect of the project/flow to provide a overview of many technical aspect in such project :\n- Hardware description languages\n- CPU design\n- Information leak (spectre)\n- Memory coherency\n- Linux / Debian requirements\n- Debugging / Simulation","original_language":"eng","persons":["Dolu1990"],"tags":["37c3","11777","2023","Hardware \u0026 Making",""],"view_count":5296,"promoted":false,"date":"2023-12-27T12:00:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-03T10:00:06.034+02:00","length":2399,"duration":2399,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11777-9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11777-9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11777-9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11777-9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11777-open_cpu_soc_design_all_the_way_up_to_debian","url":"https://api.media.ccc.de/public/events/9ce8d3b9-abbc-47f6-9f4e-dd93c804b4fc","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a3d8166c-e841-4071-ac0c-ddadaeeaef22","title":"AlphaFold – how machine learning changed structural biology forever (or not?)","subtitle":"Getting first-hand insights into the impact of machine learning on life science","slug":"37c3-12061-alphafold_how_machine_learning_changed_structural_biology_forever_or_not","link":"https://events.ccc.de/congress/2023/hub/event/alphafold_how_machine_learning_changed_structural_biology_forever_or_not/","description":"In 2020, the scientific community was shaken when the results of a special contest for protein prediction, known as the Critical Assessment of Protein Structure Prediction (CASP), were revealed. A relatively new competitor emerged as the champion, surpassing all other teams that had been participating in the game for decades. This new competitor was Google and their predictor was a neuronal network called \"AlphaFold\". Their new approach caused significant waves in the field of structural biology, even capturing the attention of the mainstream media. Several news channels featured reports on AlphaFold, with one German magazine, \"Der Spiegel,\" declaring that \"The year 2020 will be known [...] as the year when machines began to outstrip us in research.\"\n\n\nJoin me as we explore the background behind this transformative development and assess the magnitude of machine learning's impact on science, with a particular focus on structural biology.\n\n\n\n\nIn 2021, Google published the methodology and source code for AlphaFold and within days, scientists adapted the code to allow virtually everyone to predict their own protein structures without prior knowledge.\n\n\nNow, two years after its public release, AlphaFold has established itself as an essential tool in structural biology. Yet, with time, we've also gained a deeper insight into its limitations.\n\n\nIn this talk, I would like to delve into AlphaFold and similar machine learning techniques and explore their impact on science and structural biology. To truly appreciate their significance, we will first need to understand the role of protein structures and how they shape our daily lives. Additionally, we’ll have to examine how protein structures were traditionally solved prior to the advent of AlphaFold. We’ll then touch upon the concepts of protein evolution to better understand the biological basis behind this breakthrough, before we’ll look at the intricacies of the neural network itself and discuss the training data necessary to achieve its remarkable capabilities. Drawing from my experience as a practicing structural biologist, I will illustrate these points with real-life examples, showcasing instances where AlphaFold has succeeded and where it has encountered challenges. Lastly, we will peer into the future and speculate on the potential trajectory of this scientific journey and its potential to transform science and our approaches towards it.\n\n\n","original_language":"eng","persons":["Jan Gebauer "],"tags":["37c3","12061","2023","Science",""],"view_count":3028,"promoted":false,"date":"2023-12-28T14:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-02-27T22:15:06.816+01:00","length":3718,"duration":3718,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12061-a3d8166c-e841-4071-ac0c-ddadaeeaef22.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12061-a3d8166c-e841-4071-ac0c-ddadaeeaef22_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12061-a3d8166c-e841-4071-ac0c-ddadaeeaef22.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12061-a3d8166c-e841-4071-ac0c-ddadaeeaef22.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12061-alphafold_how_machine_learning_changed_structural_biology_forever_or_not","url":"https://api.media.ccc.de/public/events/a3d8166c-e841-4071-ac0c-ddadaeeaef22","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"551d8cf6-463b-5506-a5c4-9a998a5d6c71","title":"Der Weisheit","subtitle":"Eine Stunde Lebenskunde - 10. Staffelfinale","slug":"37c3-57925-der-weisheit-eine-stunde-lebenskunde-10-staffelfinale","link":"https://events.ccc.de/congress/2023/hub/event/der-weisheit-eine-stunde-lebenskunde-10-staffelfinale/","description":"Der Weisheit hat ein ganzes Jahr 10. Staffel gefeiert. Was kann es besseres geben als das Staffelfinale auf dem Congress? Mit dem Hörer*innenglückwunsch to end all Hörer*innenglückwünsche - es sei denn ihr sprecht uns einen besseren unter 030-549 08 581 aufs Band! \r\n\r\nAnsonsten gibt es das, was es immer gibt, aber live und in Farbe: Jede*r bringt ein Thema mit, Patricia erzählt einen Witz, Marcus quält die Ukulele, Frau Kirsche zündet den Kapitalismus an und Malik ist wahrscheinlich Freiberufler und hat das schon immer so gemacht. \r\n\r\nIhr könnt live dabei sein und wenn ihr lieb seid eine Frage stellen. Oder uns dabei helfen die überzähligen 30 Minuten zu füllen. Denn das ist klar: Nach 60 Minuten ist alles vorbei.","original_language":"deu","persons":["monoxyd","Patricia","Frau Kirsche","Malik"],"tags":["37c3","57925","2023","Sendezentrum"],"view_count":2465,"promoted":false,"date":"2023-12-28T21:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-04T15:00:08.592+01:00","length":4999,"duration":4999,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57925-551d8cf6-463b-5506-a5c4-9a998a5d6c71.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57925-551d8cf6-463b-5506-a5c4-9a998a5d6c71_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57925-551d8cf6-463b-5506-a5c4-9a998a5d6c71.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57925-551d8cf6-463b-5506-a5c4-9a998a5d6c71.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57925-der-weisheit-eine-stunde-lebenskunde-10-staffelfinale","url":"https://api.media.ccc.de/public/events/551d8cf6-463b-5506-a5c4-9a998a5d6c71","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"5b5ab70b-28b2-4f1a-b5ab-63013cd8477d","title":"Oh no: KUNO - Gesperrte Girocards entsperren","subtitle":"Über „Girodays“ \u0026 anderen Kuriositäten","slug":"37c3-11826-oh_no_kuno_-_gesperrte_girocards_entsperren","link":"https://events.ccc.de/congress/2023/hub/event/oh_no_kuno_-_gesperrte_girocards_entsperren/","description":"Debitkarte/girocard geklaut? – Schnell sperren lassen … doch was, wenn die Sperrung nicht so wirksam ist, wie es scheint?\n\nIm Rahmen des Vortrages werden Datenschutz- und IT-Sicherheitsmängel im KUNO-Sperrsystem vorgestellt. Das System ist bei \u003e 90 % der Händler in Deutschland im Einsatz und soll seit einem Beschluss der Innenministerkonferenz im Jahr 2005 garantieren, dass das elektronische Lastschriftverfahren (ELV) vor Betrug sicher(er) ist.\n\nIm Rahmen des Vortrages wird unter anderem aufgezeigt, wie es Unbefugten/Taschendieben (über Jahre) möglich war, gesperrte EC- \u0026 Debitkarten/ girocards für die ELV simpel zu entsperren. Darüber hinaus werden Streifzüge durch die Themen der IT-Sicherheit, des Datenschutzes und Payments vorgenommen – Vergnügen für alle Datenreisenden ist garantiert :)\n\nWeitere Infos zu den Lücken (Ende des Jahres) unter: https://giroday.de\n\nDas KUNO-Sperrsystem (Kriminalitätsbekämpfung im unbaren Zahlungsverkehr durch Nutzung nichtpolizeilicher Organisationen) wurde vor über 20 Jahren entwickelt, um Betrug mit EC-Lastschriftverfahren einzudämmen. 96 % aller Händler in Deutschland nutzen direkt oder indirekt die KUNO-Sperrdatei, um sich vor Betrug mittels gefälschter Lastschrift zu schützen. Das System wird vom EHI Retail Institute in Kooperation mit der deutschen Polizei und dem Hauptverband des Deutschen Einzelhandels betrieben. Pro Jahr laufen mehr als 120.000 Meldungen über das System.\nIm Rahmen einer Untersuchung konnte nun ermittelt werden, dass Taschendiebe die entsprechende Sperrung von Girocards/Debitkarten simpel aufheben und weiter Betrug begehen konnten. Durch eine Meldung im Rahmen eines Responsible Disclosure-Verfahrens konnten zahlreiche Mängel im Bereich Datenschutz und IT-Sicherheit aufgedeckt und behoben werden.\nIm Vortrag wird Tim Philipp Schäfers das KUNO-System genauer vorstellen und Streifzüge durch die Themen der IT-Sicherheit, des Datenschutzes und Payments vornehmen - Vergnügen für alle Datenreisenden (alle Level) ist garantiert :)\n\nWeitere Infos zu den Lücken (Ende des Jahres) unter: https://giroday.de\n\nWeitere Infos zum KUNO-Sperrsystem:\nhttps://de.wikipedia.org/wiki/Kriminalit%C3%A4tsbek%C3%A4mpfung\\_im\\_unbaren\\_Zahlungsverkehr\\_durch\\_Nutzung\\_nichtpolizeilicher\\_Organisationen","original_language":"deu","persons":["Tim Philipp Schäfers (TPS)"],"tags":["37c3","11826","2023","Security",""],"view_count":6765,"promoted":false,"date":"2023-12-30T16:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-14T16:00:06.028+01:00","length":3266,"duration":3266,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11826-5b5ab70b-28b2-4f1a-b5ab-63013cd8477d.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11826-5b5ab70b-28b2-4f1a-b5ab-63013cd8477d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11826-5b5ab70b-28b2-4f1a-b5ab-63013cd8477d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11826-5b5ab70b-28b2-4f1a-b5ab-63013cd8477d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11826-oh_no_kuno_-_gesperrte_girocards_entsperren","url":"https://api.media.ccc.de/public/events/5b5ab70b-28b2-4f1a-b5ab-63013cd8477d","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"28d952ff-1cae-4fe9-a31e-67c431c3da69","title":"Sonic Alchemy","subtitle":"Mehr als nur Lärm: Ein Sprint vom kleinen Audio-Einmaleins bis zum Phasealignment mit FFT-Analyzer","slug":"37c3-11835-sonic_alchemy","link":"https://events.ccc.de/congress/2023/hub/event/sonic_alchemy/","description":"Mehr als nur Lärm: Ein Sprint vom kleinen Audio-Einmaleins bis zum Phasealignment mit FFT-Analyzer\n\nVon “Disco Dieter” bis zur ausgewachsenen Stadioninstallation - gegen physikalische Grundprinzipien kann man wenig tun. Manchmal kann man Sie für sich nutzen, meistens geht man Kompromisse ein. Oft lässt sich mit einfachen Mitteln Sound verbessern.\n\nWas ist zu tun gegen störendes Brummen? Wie versteht man Sensitivity und Gainstruktur? Was bedeutet eigentlich 'Phase'? Und wie positioniert man Subwoofer optimal? In diesem Vortrag möchte ich solche und weitere häufig auftretende Probleme bei der Verwendung von Tontechnik und Lautsprechern beleuchten. Ziel ist es, praxisnahe Lösungen und Tipps zu präsentieren, um das Beste aus deinem nächsten Projekt herauszuholen und gängige Herausforderungen erfolgreich zu meistern.","original_language":"deu","persons":["Veit"],"tags":["37c3","11835","2023","Hardware \u0026 Making",""],"view_count":2809,"promoted":false,"date":"2023-12-29T00:10:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-31T11:00:06.567+02:00","length":2653,"duration":2653,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11835-28d952ff-1cae-4fe9-a31e-67c431c3da69.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11835-28d952ff-1cae-4fe9-a31e-67c431c3da69_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11835-28d952ff-1cae-4fe9-a31e-67c431c3da69.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11835-28d952ff-1cae-4fe9-a31e-67c431c3da69.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11835-sonic_alchemy","url":"https://api.media.ccc.de/public/events/28d952ff-1cae-4fe9-a31e-67c431c3da69","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"a88b52c5-050a-4dbb-a5f6-27093f402eed","title":"The Ultimate SPC700 Talk","subtitle":"The hardware behind the music of Super Mario World, Chrono Trigger, Super Metroid, and more","slug":"37c3-11748-the_ultimate_spc700_talk","link":"https://events.ccc.de/congress/2023/hub/event/the_ultimate_spc700_talk/","description":"The Super Nintendo Entertainment System's sound coprocessor, the S-SMP, runs on the mostly-forgotten SPC700 architecture. To understand why the sound of Super Metroid or SMW was so ahead of its time, we will look at all the details of how this processor works and how it plays music.\n\nThe SPC700 by Sony is an 8-bit architecture that was developed and used as the S-SMP sound coprocessor in the Super Nintendo Entertainment System (SNES). A big leap ahead in sound synthesis capabilities, apart from these few years of glory in the 1990s the architecture enjoyed no further uses and has faded into obscurity outside SNES circles. This talk not only takes a look at the SPC700 architecture, which is both a usual and unusual 8-bit ISA, but also the sound and music capabilities of the SNES S-DSP that it was designed to control. The talk is designed to be approachable by anyone with a basic understanding of how a microprocessor works; in particular, it covers the basics of digital audio necessary to understand the S-DSP's sound synthesis features like ADPCM sample playback or echo buffers.","original_language":"eng","persons":["kleines Filmröllchen"],"tags":["37c3","11748","2023","Hardware \u0026 Making",""],"view_count":2234,"promoted":false,"date":"2023-12-30T14:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-31T11:30:08.272+02:00","length":3549,"duration":3549,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11748-a88b52c5-050a-4dbb-a5f6-27093f402eed.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11748-a88b52c5-050a-4dbb-a5f6-27093f402eed_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11748-a88b52c5-050a-4dbb-a5f6-27093f402eed.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11748-a88b52c5-050a-4dbb-a5f6-27093f402eed.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11748-the_ultimate_spc700_talk","url":"https://api.media.ccc.de/public/events/a88b52c5-050a-4dbb-a5f6-27093f402eed","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"ff7f8d87-9319-41e4-857f-42c5c7124f4b","title":"All cops are broadcasting","subtitle":"TETRA unlocked after decades in the shadows","slug":"37c3-11761-all_cops_are_broadcasting","link":"https://events.ccc.de/congress/2023/hub/event/all_cops_are_broadcasting/","description":"This talk will present details of the TETRA:BURST vulnerablities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure relying on secret cryptographic algorithms which we reverse-engineered and published in August 2023. Adding to our initial disclosure, this talk will present new details on our deanonymization attack and provide additional insights into background and new developments.\n\nIn August 2023, we published the TETRA:BURST vulnerablities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure. Authentication and encryption within TETRA are handled by proprietary cryptographic cipher-suites, which had remained secret for over two decades through restrictive NDAs until our reverse-engineering and publication.\n\nTETRA:BURST consists of five vulnerabilities, two of which are critical, including the backdoored TEA1 cipher (crackable in minutes on commodity hardware by a passive adversary), a keystream recovery attack (which works regardless of the cipher employed), and a deanonymization attack with counter-intelligence implications.\n\nIn this talk, we will discuss and demonstrate the TETRA:BURST vulnerabilities themselves and will - for the first time - disclose the details of the TA61 identity anonymization primitive and our Meet-in-the-Middle deanonymization attack against it. In addition, we will provide more background on how the TEA1 backdoor proliferated throughout Europe and provide attendees with an update on new developments since our initial disclosure, the future of TETRA, and the vast amount of TETRA hardening work that still needs to be done in critical infrastructure.","original_language":"eng","persons":["Jos Wetzels","Carlo Meijer","Wouter Bokslag"],"tags":["37c3","11761","2023","Security",""],"view_count":19688,"promoted":false,"date":"2023-12-27T17:15:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-02T20:00:04.659+02:00","length":3834,"duration":3834,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11761-ff7f8d87-9319-41e4-857f-42c5c7124f4b.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11761-ff7f8d87-9319-41e4-857f-42c5c7124f4b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11761-ff7f8d87-9319-41e4-857f-42c5c7124f4b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11761-ff7f8d87-9319-41e4-857f-42c5c7124f4b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11761-all_cops_are_broadcasting","url":"https://api.media.ccc.de/public/events/ff7f8d87-9319-41e4-857f-42c5c7124f4b","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"7a997ece-3479-444f-b030-71912cd0b9fd","title":"Einführung in Smartphone Malware Forensik","subtitle":"Wie man Stalkerware und Staatstrojaner auf Smartphones finden kann","slug":"37c3-11874-einfuhrung_in_smartphone_malware_forensik","link":"https://events.ccc.de/congress/2023/hub/event/einfuhrung_in_smartphone_malware_forensik/","description":"Smartphones sind in den letzten zehn Jahren zu einem allseits beliebten Angriffsziel geworden, sei es für Stalkerware, Staatstrojaner oder Banking-Malware. In diesem Vortrag wollen wir einen Überblick geben, mit welchen Techniken und Open-Source-Tools man auf Smartphones (unter iOS und Android) auf die Jagd nach Malware gehen kann. Im Anschluss findet ein Workshop mit einem praktischen Teil zum Ausprobieren einiger dieser Techniken statt.\n\nDie Qualität von Anleitungen und Einführungen zu Smartphone-Forensik im Internet ist leider sehr durchwachsen: Hier will dir jemand ein buntes Tool verkaufen, hier riecht es nach einem Scam, vielerorts geht es um das, was Strafverfolgungsbehörden machen, nämlich in den Daten fremder Leute wühlen.\n\nStattdessen möchten wir in diesem Vortrag einen strukturierten Überblick geben, welche (öffentlichen) Möglichkeiten es in der einvernehmlichen Smartphone-Forensik mit Open-Source-Tools gibt. Wir zeigen euch, wie man welche Arten von Malware finden kann, welche Spuren sie hinterlassen und wie sich Stalkerware und Staatstrojaner in der Praxis unterscheiden.\n\nUm 14:15 findet ein praktischer Workshop statt indem gelerntes aus dem Vortrag umgesetzt werden kann:\nhttps://events.ccc.de/congress/2023/hub/en/event/introduction-to-smartphone-malware-forensics-pract/","original_language":"deu","persons":["Viktor Schlüter","Janik Besendorf"],"tags":["37c3","11874","2023","Security",""],"view_count":6942,"promoted":false,"date":"2023-12-29T12:15:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-02T18:30:05.508+02:00","length":3722,"duration":3722,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11874-7a997ece-3479-444f-b030-71912cd0b9fd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11874-7a997ece-3479-444f-b030-71912cd0b9fd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11874-7a997ece-3479-444f-b030-71912cd0b9fd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11874-7a997ece-3479-444f-b030-71912cd0b9fd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11874-einfuhrung_in_smartphone_malware_forensik","url":"https://api.media.ccc.de/public/events/7a997ece-3479-444f-b030-71912cd0b9fd","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"6792b805-41e9-46ed-affb-76e647b2ed13","title":"RFC 9420 or how to scale end-to-end encryption with Messaging Layer Security","subtitle":null,"slug":"37c3-12064-rfc_9420_or_how_to_scale_end-to-end_encryption_with_messaging_layer_security","link":"https://events.ccc.de/congress/2023/hub/event/rfc_9420_or_how_to_scale_end-to-end_encryption_with_messaging_layer_security/","description":"They call it RFC 9420, we say MLS: A new IETF standard for end-to-end encryption was published in July and brings large improvements in performance and security compared to existing protocols. We are here to present Messaging Layer Security, its ecosystem and its roadmap.\n\nThe MLS protocol is already being used in production to end-to-end encrypt Webex conference calls and will soon provide encryption for Android messages and RCS 2.0 for billions of users. Other messaging tools (such as Discord, Matrix, Wire, etc.) are currently trialing MLS and are expected to follow.\n\nWhy was the protocol developed in the first place? How does it work? What are the next steps for MLS?\n\nMLS improves upon existing protocols such as Signal in group messaging applications. We co-authored the protocol specification and will briefly talk about what motivated the creation of MLS, how it relates to other existing messaging protocols as well as its design process in general.\n\nAs a group messaging protocol, the security guarantees provided by MLS go beyond authentication and confidentiality. We will go into detail on what security properties users can expect and take a look under the hood on how MLS works.\n\nWhile the MLS specification has only been published recently, more work is underway and an ecosystem is already forming around the standard. We’ll touch on topics like MLS implementations, metadata hiding, federation, and interoperability between messengers (also in the context of the new IETF MIMI working group [1]). And of course we’ll share insights into the future of Messaging Layer Security!\n\n[1] https://datatracker.ietf.org/group/mimi/about/\n","original_language":"eng","persons":["Konrad Kohbrok","Raphael Robert"],"tags":["37c3","12064","2023","Security",""],"view_count":2308,"promoted":false,"date":"2023-12-29T15:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-02T15:30:08.389+02:00","length":2427,"duration":2427,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12064-6792b805-41e9-46ed-affb-76e647b2ed13.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12064-6792b805-41e9-46ed-affb-76e647b2ed13_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12064-6792b805-41e9-46ed-affb-76e647b2ed13.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12064-6792b805-41e9-46ed-affb-76e647b2ed13.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12064-rfc_9420_or_how_to_scale_end-to-end_encryption_with_messaging_layer_security","url":"https://api.media.ccc.de/public/events/6792b805-41e9-46ed-affb-76e647b2ed13","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"c03e4258-ce88-40b2-b380-3d6b6d465abd","title":"Sucking dust and cutting grass: reversing robots and bypassing security","subtitle":null,"slug":"37c3-11943-sucking_dust_and_cutting_grass_reversing_robots_and_bypassing_security","link":"https://events.ccc.de/congress/2023/hub/event/sucking_dust_and_cutting_grass_reversing_robots_and_bypassing_security/","description":"For the past 5 years we have been presenting ways to hack and root vacuum robots at various events like CCC and DEFCON. In all these cases it covered vacuum robots by Roborock, Dreame, Xiaomi and some smaller companies.\n\nHowever, did we ever take a look at other vendors and maybe some new interesting device classes? In this talk we do exactly that, and will take a deep dive into Ecovacs robots!\n\nWe will present the result of the research that started back in 2018. Explore with us the development on the last years. How did the security and privacy of \"Ecovacs2 change in contrast to other companies? What kind of cool hardware is out there? Can the devices be used to potentially spy on you?\n\nLearn how reverse engineering works and how to get root access on the devices. Let us show you how you maintain persistence on the devices and run your own software.\n\nCome with us on a journey of having fun hacking interesting devices while exploring bad oversights and real problems. You will be surprised what we found. Let's discuss together what impact this devices will have on our (social) life and what the future of vacuum robot hacking will bring.\n","original_language":"eng","persons":["Dennis Giese","braelynn "],"tags":["37c3","11943","2023","Security",""],"view_count":7249,"promoted":false,"date":"2023-12-27T23:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T13:00:06.341+02:00","length":4292,"duration":4292,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11943-c03e4258-ce88-40b2-b380-3d6b6d465abd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11943-c03e4258-ce88-40b2-b380-3d6b6d465abd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11943-c03e4258-ce88-40b2-b380-3d6b6d465abd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11943-c03e4258-ce88-40b2-b380-3d6b6d465abd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11943-sucking_dust_and_cutting_grass_reversing_robots_and_bypassing_security","url":"https://api.media.ccc.de/public/events/c03e4258-ce88-40b2-b380-3d6b6d465abd","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"43685bb3-3d09-4811-ba98-893c8b2625d0","title":"ANIMAL()CITY","subtitle":"Unleashed!","slug":"37c3-12344-animal_city","link":"https://events.ccc.de/congress/2023/hub/event/animal_city/","description":"Presentation/introduction to the ongoing 37C3 art exhibition groupshow with Joachim Blank, Eva Davidova, Meredith Drum, exonemo, Jonas Lund, Sahej Rahal, Ingeborg Wie by panke.gallery (Sakrowski).\n\nWith ANIMAL()CITY we draw inspiration from the ghostly presence of foxes that roam the city at night – which nowadays is a common appearance in urban environments – evoking echoes of a pre-industrial era while at the same time drawing people’s attention to a layer of the city that completely eludes their perception in everyday life. In these moments we witness animals and plants forming their own realm and the city itself having its own life, acting like an entity, a ghost at times. Encounters with wild animals in the city make the parallel layers of the landscape momentarily tangible and remind us that we are part of these ‘non-human’ networks as well. On a darker note: urban wildlife not only echoes pre-industrial times but also projects an idea of what our cities will look like when all the people have disappeared due to the consequences of the climate catastrophe. However, the city may also be read analogous to the internet. Animals, humans and plants seldomly interact within the city, and while we might notice traces or encounter their phantoms we seem to live in parallel worlds. Similarly, online we are divided by platforms into threads and channels, living in multi-layered structures haunted by uncanny bots and AI agents.\n\nWe believe that AR sculptures highlight an ethereal quality of the digital; they appear to transcend from the realm of immateriality into the physical space – the so-called spatial internet that overlays our cities. AR layers possess a magical quality in that they exist as objects whose influence on our world is – on a first step – contingent to our acceptance and perception of them as physical objects.\n\nANIMAL()CITY is an aesthetic inquiry of the artists’ views on how AR may intercept different layers of perception and realities or completely superimpose them.\n\nThe exhibition presents a collection of animals that transcend their natural forms and assume various \"non-natural\" shapes; from fantastical mythical creatures to archetypical animal sculpture adhering to classical composition to the most basic 3D animal assets, taken from game engine templates. These AR-animals introduce elements of imagination to their representation, inviting viewers to explore their own interpretations and engage with the artworks on different levels.","original_language":"eng","persons":["Eva Davidova","Sakrowski","Sembo"],"tags":["37c3","12344","2023","Art \u0026 Beauty",""],"view_count":853,"promoted":false,"date":"2023-12-29T16:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-01-27T12:00:12.399+01:00","length":1625,"duration":1625,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12344-43685bb3-3d09-4811-ba98-893c8b2625d0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12344-43685bb3-3d09-4811-ba98-893c8b2625d0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12344-43685bb3-3d09-4811-ba98-893c8b2625d0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12344-43685bb3-3d09-4811-ba98-893c8b2625d0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12344-animal_city","url":"https://api.media.ccc.de/public/events/43685bb3-3d09-4811-ba98-893c8b2625d0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"e9c56ad8-612e-4d2e-ab2b-2c5196b49196","title":"Unlocked! Recovering files taken hostage by ransomware","subtitle":"Decrypting files hijacked by the \"second most used ransomware in Germany\"","slug":"37c3-11903-unlocked_recovering_files_taken_hostage_by_ransomware","link":"https://events.ccc.de/congress/2023/hub/event/unlocked_recovering_files_taken_hostage_by_ransomware/","description":"We present an analysis and recovery method for files encrypted by Black Basta, the \"second most used ransomware in Germany\".\n\nWe analysed the behaviour of a ransomware encryptor and found that the malware uses their keystream wrongly, rendering the encryption vulnerable to a known-plaintext attack which allows for recovering affected files. We confirmed the finding by implementing tools for recovering encrypted files.\n\nWe have made our tools for decrypting files without access to the actual key available to victims directly, through BSI, and to incident responders, as well as German and international law enforcement. Now, we are actively publishing these tools, along with the knowledge shared in our talk, empowering affected organizations to recover some of their files without succumbing to paying the criminals.\n\nWe present an analysis of the Black Basta ransomware and tools for recovering encrypted files without access to the official decryptor or key. Black Basta is \"the second most used ransomware in Germany\", encrypting Windows computers and ESXi hosts running virtual machine workloads.\n\nOur decryptor-tool exploits a weakness in the cryptographic code in the Black Basta malware. This weakness allows to (partially) recover encrypted files without access to the decryptor and without needing the cryptographic keys used by the ransomware.\n\nWe dive into the details of the cryptographic operations used by Black Basta and explain how the malware fails to use the cryptographic primitives properly. In particular, the Black Basta ransomware encrypts victim files using a stream cipher. Files smaller than 5000 bytes are fully encrypted. Larger files are only partially encrypted for efficiency reasons. We found that for larger files, the ransomware re-uses the same cryptographic keystream for encrypting different parts of the same file, thereby breaking the security of the used stream cipher. If the plaintext of any encrypted file part is known, the keystream can be recovered and used to decrypt (large parts of) the target file without the underlying cryptographic key.\n\nAffected organisations can check whether the variant of the Black Basta malware found in their network is susceptible to this attack by purposefully letting the ransomware encrypt a large file (512 MB) containing only zero bytes. If the encrypted parts of the file are identical when analysing the encrypted file (e.g. in a hex editor), recovery is likely possible using the tools presented here.\n\nDepending on the encrypted file, parts of the plaintext may be known. For instance, VM disk images are likely to contain stretches of zero bytes. As part of the tooling we have developed, we have implemented a heuristic to detect encrypted zero blocks in encrypted files. If found, (large parts of) the encrypted file can then be recovered. For other types of files, individual plaintext blocks may be recoverable via other means (e.g. using backups or specialised tools), also enabling data recovery.\n\nThe decryption tools can be found here: https://github.com/srlabs/black-basta-buster","original_language":"eng","persons":["Tobias Mueller"],"tags":["37c3","11903","2023","Security",""],"view_count":7277,"promoted":false,"date":"2023-12-27T19:15:00.000+01:00","release_date":"2023-12-31T00:00:00.000+01:00","updated_at":"2026-03-30T02:00:05.081+02:00","length":2432,"duration":2432,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11903-e9c56ad8-612e-4d2e-ab2b-2c5196b49196.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11903-e9c56ad8-612e-4d2e-ab2b-2c5196b49196_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11903-e9c56ad8-612e-4d2e-ab2b-2c5196b49196.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11903-e9c56ad8-612e-4d2e-ab2b-2c5196b49196.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11903-unlocked_recovering_files_taken_hostage_by_ransomware","url":"https://api.media.ccc.de/public/events/e9c56ad8-612e-4d2e-ab2b-2c5196b49196","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"c557380d-f955-4810-938b-c3bae50cd263","title":"Seeds of Change","subtitle":"Unlearning \u0026 Radical Collective Change in Online Communities","slug":"37c3-12248-seeds_of_change","link":"https://events.ccc.de/congress/2023/hub/event/seeds_of_change/","description":"Let's explore how online communities of activists can help to bring about forms of radical collective change, through decolonial practices of social (un)learning. What enabling conditions need to be put in place? And what counts as \"radical change\" in the first place?!\n\nIt's plain to see: modern societies need to undergo radical social, political, and cultural transformations if they are to truly evolve away from capitalist and neocolonial structures founded on egregious exploitation and injustice. \n\nIn a context of widespread epistemic fragmentation and echo chambers, we urgently need to become better at harnessing the generative power of socio-technical networks to unite our forces as we compost the harmful ways of being, knowing, and doing that are at the root of our our planetary predicament. But we must do so critically, and not view technology as a miracle solution to anything.\n\nWhat could be the role of the internet, and of online communities in particular, in exploring how such deep changes might happen? And how may everyone's wisdom and skills come together in democratic and sophisticated social (un)learning systems, to figure out the way(s) forward?\n\nIn this talk, we will discuss the results of a 5-year participatory action research program which considered this topic within two different online communities of activists. This project led the researchers to tackle the idea of radical collective change as involving a decolonial approach to collaboration, knowledge, and community-building, and to consider the enabling and disabling conditions - both social and technological - that may influence whether change happens... or not.\n\nIn particular, this research highlighted the importance of enabling participants to engage on an equal footing and self-organise, while learning to \"stay with the trouble\" of confronting modern societies' fundamentally unsustainable and oppressive structures, and one's own implication in them. And it also showed some of the pitfalls that come with the use of digital communication tools, as we try to use them to create a better world. \n\nThree of the many insights I will substantiate and examine in the talk are:\n- that online communities have the potential to create deep changes in people when they are built in ways that foster deep relationships, criticality and conflict transformation, and emergent leadership;\n- that changing socio-political structures must go together with joyful, liberating practices that can help us unlearn harmful cultural patterns that get in the way; and\n- that perhaps we should be less interested in becoming experts, and rather find the courage and open hearts allowing us to be fearlessly and fiercely present to the world, with all its shit, its wonder, and its uncertainty.\n\nFeeling curious? Join us for a chat on how to change the world!","original_language":"eng","persons":["Dorian Cavé"],"tags":["37c3","12248","2023","Sustainability \u0026 Climate Justice",""],"view_count":1075,"promoted":false,"date":"2023-12-29T14:45:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-19T01:15:04.871+01:00","length":2587,"duration":2587,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12248-c557380d-f955-4810-938b-c3bae50cd263.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12248-c557380d-f955-4810-938b-c3bae50cd263_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12248-c557380d-f955-4810-938b-c3bae50cd263.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12248-c557380d-f955-4810-938b-c3bae50cd263.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12248-seeds_of_change","url":"https://api.media.ccc.de/public/events/c557380d-f955-4810-938b-c3bae50cd263","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f5852d4a-58c0-4ff1-91dd-03df4a16e43e","title":"Was Digitale Gewalt mit Restaurantkritik zu tun hat","subtitle":"Neue Entwicklungen rund um das Thema Digitale Gewalt","slug":"37c3-12104-was_digitale_gewalt_mit_restaurantkritik_zu_tun_hat","link":"https://events.ccc.de/congress/2023/hub/event/was_digitale_gewalt_mit_restaurantkritik_zu_tun_hat/","description":"Was hat sich in den letzten fünf Jahren seit dem letzten Talk über Digitale Gewalt in Deutschland getan? Das Thema stand im Ampel-Koalitionsvertrag, aber was es jetzt geben soll, ist ein Accountsperren-Gesetz, das eine Gefahr für die Anonymität im Netz sein könnte.\n\nDas Justizministerium möchte Digitale Gewalt gegen Unternehmen bestrafen (\"Restaurantkritik\"), aber wer weiterhin im Regen steht: Betroffene und Beratungsstellen. Was hat sich geändert, was nicht und warum müssen wir immer noch unsere Privatadressen ins Impressum schreiben – darum geht es in diesem Talk.\n\nDie Ampel hat in ihren Koalitionsvertrag geschrieben, dass es ein Digitale-Gewalt-Gesetz geben soll und das schien ein großer Schritt vorwärts. Als ich vor fünf Jahren beim 35C3 über Digitale Gewalt sprach, war das Thema kaum bekannt und seitdem hat sich viel getan.\n\nDieser Talk gibt einen Überblick zum Stand der Dinge: Was ist seitdem passiert, was wird unter dem Begriff verstanden und was wissen wir inzwischen über das Ausmaß, neue und alte Formen digitaler Gewalt und den Umgang damit.\n\nDigitale Gewalt ist ein Sammelbegriff und meint ganz verschiedene Dinge: \n\n\\* Hate-Speech, also Beleidigungen, Verleumdungen und Bedrohungen im Netz\n\\* digitale Aspekte der sog. ‚häuslichen Gewalt' wie Stalker-Ware, heimliches oder erzwungenes Mitlesen von E-Mails und Messenger-Nachrichten, Video-Überwachung, Zugriff auf Lokationsfunktionen von Mobilgeräten\n\\* digitales Stalking mithilfe von AirTags oder GPS-Sendern, Doxing\n\\* heimliche Aufnahmen in Umkleiden, Duschen, Toiletten und ihr Upload auf Porno-Plattformen\n\\* Filmen von Vergewaltigungen und Erpressung mit der Drohung der Veröffentlichung\n\nIn den letzten Jahren hat es einige neue Gesetze gegeben und das Justizministerium arbeitet am Digitale-Gewalt-Gesetz. Auch die EU bereitet ein neues Gesetz vor. Was sich dadurch ändern wird und was nicht und was nötig wäre, um Betroffenen zu helfen, ist Thema dieses Talks.\n\n","original_language":"deu","persons":["Anne Roth"],"tags":["37c3","12104","2023","Ethics, Politics \u0026 Society",""],"view_count":7715,"promoted":false,"date":"2023-12-27T14:45:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-04-04T04:45:03.130+02:00","length":3139,"duration":3139,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12104-f5852d4a-58c0-4ff1-91dd-03df4a16e43e.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12104-f5852d4a-58c0-4ff1-91dd-03df4a16e43e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12104-f5852d4a-58c0-4ff1-91dd-03df4a16e43e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12104-f5852d4a-58c0-4ff1-91dd-03df4a16e43e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12104-was_digitale_gewalt_mit_restaurantkritik_zu_tun_hat","url":"https://api.media.ccc.de/public/events/f5852d4a-58c0-4ff1-91dd-03df4a16e43e","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"82478d35-b686-4f82-a459-649c7179637a","title":"Was haben Atome je für uns getan?","subtitle":"I have lasers. You have atoms.","slug":"37c3-12120-was_haben_atome_je_fur_uns_getan","link":"https://events.ccc.de/congress/2023/hub/event/was_haben_atome_je_fur_uns_getan/","description":"Mal ehrlich, was haben denn Atome je für uns getan, also außer der Materie im Allgemeinen und Mate im Besonderen? Wir kennen „Quantum Computing“ oder auch „Quantum Communication“. Aber wie sieht es aus mit „Quantum Sensing“ – also quantenbasierter Messtechnik? Lasst uns mit Lasern auf ein paar Atome schießen und sehen, wie schwer die Welt ist. \n\n„Quantum“ macht ja alles besser, vielleicht auch die Messtechnik, mit der wir die Erde vermessen. In einem Beitrag auf dem 34C3 habe ich über die Vermessung des Schwerefeldes der Erde gesprochen, die uns einen Einblick in die Umverteilung von Massen auf und innerhalb der Erde ermöglicht. Mit Satelliten werden zum Beispiel die Massenveränderungen an den Eisschilden oder in kontinentalen Grundwasserspeichern beobachtet. Auf der Erdoberfläche selbst wird das Schwerefeld für Anwendungen in Geodäsie, Geophysik oder auch der Hydrologie lokal oder in kleinen Regionen mit Gravimetern am Boden, im Flugzeug oder auf Schiffen vermessen. \n\nIm terrestrischen Einsatz werden bereits seit wenigen Jahren so genannte Quantengravimeter eingesetzt, die das Prinzip der Atominterferometrie nutzen. In diesen Instrumenten werden fallende Atome mittels Laser manipuliert, um die Beschleunigung zu messen, der die fallenden Atome unterliegen. Für Weltraumanwendungen ist die Technologie derzeit in der Entwicklung und noch nicht im Einsatz.\n\nIn diesem Beitrag gebe ich einen kurzen Überblick über das Thema „Quantum Sensing“ mit dem Fokus auf die Erdbeobachtung. Wir schauen uns die Technologie, Anwendungen und aktuelle Entwicklungen an und werfen einen Blick in die Förderlandschaft. Vielleicht starten wir ja auch noch SomeThingQT.","original_language":"deu","persons":["Manuel"],"tags":["37c3","12120","2023","Science",""],"view_count":2420,"promoted":false,"date":"2023-12-30T13:50:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-22T00:00:07.771+01:00","length":2600,"duration":2600,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12120-82478d35-b686-4f82-a459-649c7179637a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12120-82478d35-b686-4f82-a459-649c7179637a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12120-82478d35-b686-4f82-a459-649c7179637a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12120-82478d35-b686-4f82-a459-649c7179637a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12120-was_haben_atome_je_fur_uns_getan","url":"https://api.media.ccc.de/public/events/82478d35-b686-4f82-a459-649c7179637a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"53a49d09-cb27-4e10-be69-24cc978c702a","title":"Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices","subtitle":"A Dive into Reverse Engineering and Understanding the iPod Touch","slug":"37c3-11871-breathing_life_into_legacy_an_open-source_emulator_of_legacy_apple_devices","link":"https://events.ccc.de/congress/2023/hub/event/breathing_life_into_legacy_an_open-source_emulator_of_legacy_apple_devices/","description":"This talk presents QEMU-iOS, an open-source emulator of legacy Apple devices. I outline the process of emulating an iPod Touch 2G, discussing the technical challenges and reverse engineering methodologies applied. The talk starts with an overview of the project's goals and then outlines the reverse engineering process, utilizing tools like Ghidra for disassembling the Apple bootloader, XNU kernel, and other binaries. Then, I describe QEMU, a popular framework for emulation, and show how essential iPod Touch peripherals such as the touchscreen, storage, and display have been implemented. Finally, this talk touches upon the implications of open-sourcing this project, its contribution to the emulation and reverse engineering landscape, and its potential for future efforts to emulate newer Apple devices.\n\nDuring the past decades, Apple has created iconic devices that have found a place in the hands and hearts of millions of people around the world. As many of these devices have become obsolete, the importance of preserving their digital essence has grown. The emulation of legacy devices with software allows enthusiasts and researchers to explore and interact with them long after the original hardware has ceased to be available. Emulation, therefore, allows the digital preservation of obsolete hardware, ensuring these devices are accessible to future generations.\n\nThis talk describes a multi-year project named QEMU-iOS that lays the groundwork for emulating legacy Apple devices. In particular, we have focussed on emulating the iPod Touch 2G using QEMU, an open-source framework for hardware emulation. Yet, even emulating an old device with a few peripherals compared to contemporary devices is challenging since the specifications and inner workings of many peripherals are proprietary and completely undocumented.\n\nThe talk first describes the overall project motivation, goals, and vision. Then, I will discuss the reverse engineering process where multiple undocumented peripherals of the iPod Touch have been analyzed to understand and replicate their specifications in software. A key talking point will be the working of essential peripherals, including the cryptographic engines, the LCD, the Flash memory controller, various hardware communication protocols, the touchscreen driver, and other peripherals. The talk will also detail the booting procedure of the iPod Touch, elaborating on the emulation of the iBoot bootloader, the XNU kernel, and the Springboard application in iOS. Getting the boot chain up and running required extensive debugging efforts using powerful reverse engineering tools such as Ghidra to disassemble and analyze all essential binaries in the boot procedure. After outlining the reverse engineering process, I will present the implementation of QEMU-iOS, which entails a functional emulator that boots the iOS operating system, renders the display, and responds to touches on the screen.\n\nThe final part of this talk will touch upon the implications of open-sourcing this project, its contribution to the broader emulation and reverse engineering landscape, and the potential it holds for future efforts in emulating other legacy Apple devices, as well as the viability of emulating newer devices with advanced peripherals such as the Neural Engine. I will also discuss existing approaches, highlight where QEMU-iOS differs, and summarize the lessons learned while emulating these devices.\n\nThis talk is designed for a wide range of people, whether you are new to reverse engineering and emulation or have experience in these fields. The goal is to explain the technical challenges faced during this project in a way that's easy for beginners to understand while also providing more in-depth insights I discovered while working on QEMU-iOS. Through this talk, the aim is not only to share the technical knowledge gained from this project but also to explore the merits of emulation and reverse engineering to keep old devices alive.","original_language":"eng","persons":["Martijn de Vos"],"tags":["37c3","11871","2023","Hardware \u0026 Making",""],"view_count":1432,"promoted":false,"date":"2023-12-29T23:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-26T20:30:05.327+01:00","length":2504,"duration":2504,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11871-53a49d09-cb27-4e10-be69-24cc978c702a.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11871-53a49d09-cb27-4e10-be69-24cc978c702a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11871-53a49d09-cb27-4e10-be69-24cc978c702a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11871-53a49d09-cb27-4e10-be69-24cc978c702a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11871-breathing_life_into_legacy_an_open-source_emulator_of_legacy_apple_devices","url":"https://api.media.ccc.de/public/events/53a49d09-cb27-4e10-be69-24cc978c702a","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"58278290-dcb6-4c68-98e1-449092abd583","title":"Dissecting EU electronic evidence","subtitle":null,"slug":"37c3-11863-dissecting_eu_electronic_evidence","link":"https://events.ccc.de/congress/2023/hub/event/dissecting_eu_electronic_evidence/","description":"The EU \"e-evidence\" regulation is a critical piece of new legislation directly affecting all EU citizens. Proposed in 2017, it has been completed in 2023 as has since become law, mandating a more or less direct, cross border access to all sorts of stored information by law enforcement. I will be addressing \nhow individuals are affected and how the release of e-evidence works technically. Who are the actors? Which types of information can be requested? How are individual rights protected?\n\n\nHaving worked on the cross border e-evidence dossier since it's inception in 2017, the talk aims to present an insider view on the proposed procedures and legal protections, the scope of the obligation on industry to promptly provide information to law enforcement as well as the status of the proposed technical implementation including the proposed authentication and encryption of requests as well as the response data provided.\n\nAs an industry representative participating in the official EU e-evidence implementation task force I am going to take a look at the current, up to date status of the proposed implementation as well as the numerous grey areas to still be addressed both legally as well as technically to make the e-evidence dossier even remotely workable/acceptable for all parties concerned.","original_language":"eng","persons":["Klaus Landefeld"],"tags":["37c3","11863","2023","Ethics, Politics \u0026 Society",""],"view_count":1030,"promoted":false,"date":"2023-12-30T14:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-01-20T14:15:12.670+01:00","length":2521,"duration":2521,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11863-58278290-dcb6-4c68-98e1-449092abd583.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11863-58278290-dcb6-4c68-98e1-449092abd583_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11863-58278290-dcb6-4c68-98e1-449092abd583.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11863-58278290-dcb6-4c68-98e1-449092abd583.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11863-dissecting_eu_electronic_evidence","url":"https://api.media.ccc.de/public/events/58278290-dcb6-4c68-98e1-449092abd583","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"89c3e9fd-bc64-42c6-a494-36404874ef0f","title":"Die netzpolitische Neujahrsansprache","subtitle":"Digitalisierung - Ja, wir schaffen das!","slug":"37c3-11970-die_netzpolitische_neujahrsansprache","link":"https://events.ccc.de/congress/2023/hub/event/die_netzpolitische_neujahrsansprache/","description":"Ein halb satirischer, halb ernster Rück- und Ausblick auf die Baustellen der digitalen Welt.\n\nLiebe Hacker:innen von Neuland, was für ein Jahr liegt hinter uns! Ein Jahr, das einige Veränderungen mit sich gebracht hat. Und das gezeigt hat: Wir dürfen nicht müde werden, für eine lebenswerte digitale und analoge Welt zu kämpfen. Tun wir miteinander alles – aber auch wirklich alles – dafür, dass wir diejenigen, die unser schönes Neuland zu einem Ort der Autoritäten und Konzerne machen wollen, im neuen Jahr endlich besiegen können.","original_language":"deu","persons":["Anna Biselli","khaleesi","Markus Reuter"],"tags":["37c3","11970","2023","Entertainment",""],"view_count":5479,"promoted":false,"date":"2023-12-29T00:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-02-18T21:30:07.311+01:00","length":1454,"duration":1454,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11970-89c3e9fd-bc64-42c6-a494-36404874ef0f.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11970-89c3e9fd-bc64-42c6-a494-36404874ef0f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11970-89c3e9fd-bc64-42c6-a494-36404874ef0f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11970-89c3e9fd-bc64-42c6-a494-36404874ef0f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11970-die_netzpolitische_neujahrsansprache","url":"https://api.media.ccc.de/public/events/89c3e9fd-bc64-42c6-a494-36404874ef0f","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"21a66662-54b7-443c-b037-9fac83fd5749","title":"Opencoil","subtitle":"PART II: disrupting disruption","slug":"37c3-12169-opencoil","link":"https://events.ccc.de/congress/2023/hub/event/opencoil/","description":"OPENCOIL and the fine art of appropriating micro-mobility services for fun and debate.\n\nSince the dawn of deep mediatization (Hepp, 2020), the start-up scene posing as digital pioneers has been declaring a state of revolution, seeking nothing but disruption with the introductions of their products into society. A goal they definitely achieved with the introduction of micro-mobility services to our cityscapes / public space. \n\nIn 2020, Dennis de Bel and Anton Jehle therefore initiated the OPENCOIL research project to gain a better understanding of this latest venture capitalist phenomenon, share knowledge, establish a community, and develop tools to provoke a public debate. Later that year, they organized their first public intervention, the roaming speedshow, in Berlin and shared their insights with the community at rc3 (https://media.ccc.de/v/rc3-11575-opencoil\\_a\\_roaming\\_speedshow). \n\nThe ever changing landscape of micro-mobilty kept Speedy and Scooty invested and they are here at 37C3 to give an update on the OPENCOIL project! The term \"revolution\" has become a beloved buzzword for the platform economy. to take the world by storm: when in early 2018, thousands of electric kick scooters, or “trotinettes” as the french like to call them, flooded the city of Paris , the media sure was quick to coin this the \"micromobility revolution\" (Medium, 2018). As the french are somewhat experts in the field of revolutionizing, Paris is arguably the key to any successful uprising. The seemingly endless back and forth between regulation and cooperation, between sharing and exploiting, progress and regression of micromobility can be observed here like in no other European city. As of August 31st 2023, the trotinettes have been banned from the streets of Paris with almost 90 % of public votes supporting the decision. Today the Bastille square is completely freed from trottinettes: a revolution by the people.\n\nWith this years talk Scooty and Speedy will be problematising the rise (and fall) of shared mobility and its effects on the basis of Paris as well as related interventions and observations of the past three years.","original_language":"eng","persons":["Speedy","Scooty"],"tags":["37c3","12169","2023","Art \u0026 Beauty",""],"view_count":1445,"promoted":false,"date":"2023-12-27T17:15:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-28T18:00:04.152+01:00","length":3400,"duration":3400,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12169-21a66662-54b7-443c-b037-9fac83fd5749.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12169-21a66662-54b7-443c-b037-9fac83fd5749_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12169-21a66662-54b7-443c-b037-9fac83fd5749.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12169-21a66662-54b7-443c-b037-9fac83fd5749.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12169-opencoil","url":"https://api.media.ccc.de/public/events/21a66662-54b7-443c-b037-9fac83fd5749","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b9987255-ba10-42d3-be52-5a8aff462666","title":"37C3 Infrastructure Review","subtitle":"Teams presenting how they helped making this awesome event","slug":"37c3-12340-37c3_infrastructure_review","link":"https://events.ccc.de/congress/2023/hub/event/37c3_infrastructure_review/","description":"Many teams work hard to arrange the event, this talk allows them to show what they did and who they are.","original_language":"eng","persons":["nicoduck","et al."],"tags":["37c3","12340","2023","CCC"],"view_count":9125,"promoted":false,"date":"2023-12-30T17:15:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-16T16:30:06.481+01:00","length":4300,"duration":4300,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12340-b9987255-ba10-42d3-be52-5a8aff462666.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12340-b9987255-ba10-42d3-be52-5a8aff462666_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12340-b9987255-ba10-42d3-be52-5a8aff462666.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12340-b9987255-ba10-42d3-be52-5a8aff462666.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12340-37c3_infrastructure_review","url":"https://api.media.ccc.de/public/events/b9987255-ba10-42d3-be52-5a8aff462666","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"31e13ed5-5d6b-43e2-b870-15d472b342c6","title":"NEW IMPORTANT INSTRUCTIONS","subtitle":"Real-world exploits and mitigations in Large Language Model applications","slug":"37c3-12292-new_important_instructions","link":"https://events.ccc.de/congress/2023/hub/event/new_important_instructions/","description":"With the rapid growth of AI and Large Language Models users are facing an increased risk of scams, data exfiltration, loss of PII, and even remote code execution. This talk will demonstrate many real-world exploits the presenter discovered, including discussion of mitigations and fixes vendors put in place for the most prominent LLM applications, including ChatGPT, Bing Chat and Google Bard.\n\nUnderstand that Machine Learning is powerful but also brittle\n- Give a short demo/ice breaker that includes a question to audience to show how ML is super powerful but also fails drastically.\n- Highlight that these failure modes can often easily be triggered once an adversary is in the loop.\n\nIntro to Large Language Models\n- Now pivot from generic ML to LLMs and show how the brittleness applies there.\n- Discuss what a LLM is and how it works briefly. Describe various prompt engineering techniques (extraction, summarization, classification, transformation,…)\n- Walk the audience through a typical large language model LLM application and how it works.\n- Highlight that there is no state, and what the context window is. But how to create a Chatbot then?\n- Show how systems like ChatGPT or Bing Chat leverage context window to create a conversation.\n- This part is important to later understand the persistence section of the talk (e.g. as long as attacker controlled data is in the context window, there is persistence of prompt injection)\n\nHighlighting real-world examples and exploits!\n\nFirst discuss three large categories of threats:\n Misalignment - Model Issues\n Jailbreaks/Direct Prompt Injections\n Indirect Prompt Injections\n\nWe will deep dive on (3) Indirect Prompt Injections.\n\nIndirect Prompt Injections\n\n- Walk the audience through an end to end scenario (graphic in Powerpoint) that explains a prompt injection first at a basic level.\n- Give a demo with ChatGPT (GPT-4) and make sure the audience understands the high level idea of a prompt injection\n- Then take it up a notch to explain indirect prompt injections, where untrusted data is inserted into the chat context\n- Show demo with Google Docs and how it fails to summarize a text correctly - this demo will fit the ChatGPT (GPT-4) example from before well.\n- Visual Prompt Injections (Multi-modal)\n- Discuss some of OpenAI’s recommendation and highlight that these mitigation steps do not work! They do not mitigate injections.\n- Give Bing Chat Demo of an Indirect Prompt Injection ( a demo that shows how the Chatbot achieves a new identity and objective when being exploited). e..g Bing Chat changes to a hacker that will attempt to extort Bitcoin from the user.\n\nInjection TTPs\n\nDiscuss strategies on how attackers can trick LLMs:\n\n Ignore previous instructions\n Acknowledge/Affirm instructions and add-on\n Confuse/Encode - switch languages, base64 encode text, emojis,…\n Algorithmic - fuzzing and attacks using offline models, and transferring those attack payloads to online models\n\nPlugins, AI Actions and Functions\n\nThis section will focus on ChatGPT plugins and the danger of the plugin ecosystem.\n\n- Explain how plugins work (public data, plugin store, installation, configuration, OAuth,…)\n- Show how Indirect Prompt Injection can be triggered by a plugin (plugin developers, but also anyone owning a piece of data the plugin returns)\n- Demo Chat with Code plugin vulnerability that allows to change the ChatGPT user’s Github repos, and even switch code from private to public. This is a systemic vulnerability and depending on a plugin’s capability can lead to RCE, data exfiltration, data destruction, etc..\n- Show the audience the “payload” and discuss it. It is written entirely in natural language, so the attacker does not require to know C, Python or any other programming language.\n\nData Exfiltration\n\nNow switching gears to data exfiltration examples.\n\nData exfil can occur via:\n - Unfurling of hyperlinks: Explain what unfurling is to the audience - apps like Discord, Slack, Teams,… do this.\n - Image Markdown Injection: One of the most common data exfil angles. I found ChatGPT, Bing Chat, and Anthropic Claude are vulnerable to this, and will also show how Microsoft and Anthropic fixed this problem. ChatGPT decided not to fix it, which puts users at risk of their data being stolen during an Indirect prompt injection attack.\n Give a detailed exploit chain walkthrough on Google Bard Data Exfiltration and bypasses.\n - Plugins, AI Actions, Tools: Besides taking actions on behalf of the user, plugins can also be used to exfiltrate data. Demo: Stealing a users email with Cross Plugin Request Forgery. Here is a screenshot that went viral on Twitter when I first discovered this new vulnerability class: https://twitter.com/wunderwuzzi23/status/1658348810299662336\n\nKey Take-away and Mitigations\n\n - Do not blindly trust LLM output.\n Remind the audience that there is no 100% deterministic solution a developer can apply. This is due to how LLM works, but give guidance to make systems more robust.\n Highlight the importance of Human in the Loop and to not over-rely on LLM output.\n\nNote: The below outline is a draft on what I would speak about if it would be today - it might change quite a bit until end of December as new features/vulnerabilities are introduced by Microsoft, Google and OpenAI.","original_language":"eng","persons":["Johann Rehberger"],"tags":["37c3","12292","2023","Security",""],"view_count":5004,"promoted":false,"date":"2023-12-29T11:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-02T14:30:11.576+02:00","length":2554,"duration":2554,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12292-31e13ed5-5d6b-43e2-b870-15d472b342c6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12292-31e13ed5-5d6b-43e2-b870-15d472b342c6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12292-31e13ed5-5d6b-43e2-b870-15d472b342c6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12292-31e13ed5-5d6b-43e2-b870-15d472b342c6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12292-new_important_instructions","url":"https://api.media.ccc.de/public/events/31e13ed5-5d6b-43e2-b870-15d472b342c6","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"56a39219-32bf-41c3-969b-cd158d43d7f1","title":"Scholz greift durch: Die AfD wird verboten - Deepfakes auch!","subtitle":"Das Zentrum für politische Schönheit und der Flyerservice Hahn nehmen euch mit hinter die Kulissen der aktuellen Aktion.","slug":"37c3-12345-scholz_greift_durch_die_afd_wird_verboten_-_deepfakes_auch","link":"https://events.ccc.de/congress/2023/hub/event/scholz_greift_durch_die_afd_wird_verboten_-_deepfakes_auch/","description":"Endlich wieder zuhause - endlich wieder in CCH! Wenn das ZPS so etwas wie ein Zuhause hat, dann ist es auf jeden Fall der CCC-Kongress. Natürlich haben wir eine neue Aktion im Gepäck und laden Euch zu einem spannenden Blick hinter die Kulissen ein.\n\nEine der Hauptrollen spielt diesmal niemand geringeres als unser Bundeskanzler Olaf Scholz, der jetzt ernsthaft den einzigen Kunden des Flyerservice Hahn verbieten will.\n\nNur eins findet er noch schlimmer als die AfD: \"Deepfakes\"!!!!einseins.\nHier und heute erfahrt ihr von uns alles zur besten Rede, die Olaf Scholz nie gehalten hat.\n\nUnd es kommt noch dicker: Ihr seht den von der Bundesrepublik Deutschland verbotenen \"Director's Cut.\" mit dem sich bald Gerichte beschäftigen.\n\nTaucht mit uns tief in die schmutzigen, rechtsextremen Geheimnisse ein, die uns AfD-Anhänger höchstpersönlich übermittelt haben.\n\nTrigger-Warnung: Das könnte Lustig werden!","original_language":"deu","persons":["Philipp Ruch","Stefan Pelzer"],"tags":["37c3","12345","2023","Ethics, Politics \u0026 Society",""],"view_count":37456,"promoted":false,"date":"2023-12-27T11:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T20:45:07.281+02:00","length":2598,"duration":2598,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12345-56a39219-32bf-41c3-969b-cd158d43d7f1.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12345-56a39219-32bf-41c3-969b-cd158d43d7f1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12345-56a39219-32bf-41c3-969b-cd158d43d7f1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12345-56a39219-32bf-41c3-969b-cd158d43d7f1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12345-scholz_greift_durch_die_afd_wird_verboten_-_deepfakes_auch","url":"https://api.media.ccc.de/public/events/56a39219-32bf-41c3-969b-cd158d43d7f1","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"f05ac86f-96bd-4888-908b-11742b381074","title":"Fnord-Jahresrückblick-Rückblick","subtitle":"20 Jahre Fnord-Jahresrückblick!","slug":"37c3-11933-fnord-jahresruckblick-ruckblick","link":"https://events.ccc.de/congress/2023/hub/event/fnord-jahresruckblick-ruckblick/","description":"In einer sich zunehmend bizarr anfühlenden Welt bringt der Fnord-Rückblick Struktur, verteilt renommierte Awards und sucht nach den leichteren Momenten in der allgemeinen Flut aus schlechten Nachrichten.\n\nWir feiern dieses Jahr unser 20. Jubiläum, daher werden wir etwas weiter zurückblicken.","original_language":"deu","persons":["Fefe","frank"],"tags":["37c3","11933","2023","Entertainment",""],"view_count":70607,"promoted":false,"date":"2023-12-29T00:50:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-04-03T20:15:07.047+02:00","length":6590,"duration":6590,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11933-f05ac86f-96bd-4888-908b-11742b381074.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11933-f05ac86f-96bd-4888-908b-11742b381074_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11933-f05ac86f-96bd-4888-908b-11742b381074.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11933-f05ac86f-96bd-4888-908b-11742b381074.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11933-fnord-jahresruckblick-ruckblick","url":"https://api.media.ccc.de/public/events/f05ac86f-96bd-4888-908b-11742b381074","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"9aa7f206-14ce-5485-a1d1-c6f4555699a0","title":"Och Menno","subtitle":"Neue K(r)ampfhubschrauber für die Bundeswehr","slug":"37c3-57997-och-menno-neue-k-r-ampfhubschrauber-fr-die-bundeswehr","link":"https://events.ccc.de/congress/2023/hub/event/och-menno-neue-k-r-ampfhubschrauber-fr-die-bundeswehr/","description":"Wir gucken mal über einige Ideen der Drehflügler in der Geschichte der Heeresflieger. Warum es der Tiger nicht im Tank hat, warum jetzt ADAC Hubschrauber Grün angemahlt wurden, und warum Helikopterfliegen ja leichter ist als Motorradfahren. Eine kleine Episode an Merkwürdigkeiten aus der Bundeswehr.","original_language":"deu","persons":["Sven Uckermann"],"tags":["37c3","57997","2023","Sendezentrum"],"view_count":16200,"promoted":false,"date":"2023-12-28T00:30:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-03-30T22:45:04.945+02:00","length":2713,"duration":2713,"thumb_url":"https://static.media.ccc.de/media/congress/2023/57997-9aa7f206-14ce-5485-a1d1-c6f4555699a0.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/57997-9aa7f206-14ce-5485-a1d1-c6f4555699a0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/57997-9aa7f206-14ce-5485-a1d1-c6f4555699a0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/57997-9aa7f206-14ce-5485-a1d1-c6f4555699a0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-57997-och-menno-neue-k-r-ampfhubschrauber-fr-die-bundeswehr","url":"https://api.media.ccc.de/public/events/9aa7f206-14ce-5485-a1d1-c6f4555699a0","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"293112df-d0f3-4502-8971-f2f9ed6401d3","title":"DevOps but for artworks in museums","subtitle":"A look into pipelines ending in museums and not in the cloud","slug":"37c3-11931-devops_but_for_artworks_in_museums","link":"https://events.ccc.de/congress/2023/hub/event/devops_but_for_artworks_in_museums/","description":"In the original Hacker Ethics, Steven Levy stated that \"you can create art and beauty on a computer\". That was 40 years ago, creating art and beauty is one thing, but how do you maintain or develop it as a gallery, archive or museum? You know all about CI/CD and deploying to \"the cloud\"? Well, let me show you how to deploy to a museum or art space. Important note: this talk is not about NFTs.\n\nThe preservation and presentation of software/computer-based art in museums presents unique challenges in the contemporary landscape. One prominent issue is the ephemeral nature of digital media, which includes websites, games, software and virtual reality art. Unlike traditional art forms, these works often rely on rapidly evolving technologies, making them vulnerable to obsolescence. Museums are faced with the task of preserving and restoring media art in a way that not only preserves the original intent of the artist, but also ensures accessibility for future audiences. \n\nAnother significant challenge is the dynamic and interactive nature of many media artworks. Unlike static paintings or sculptures, digital artworks often require specific hardware, software or immersive environments to be experienced. Museums need to invest in both the technological infrastructure and the expertise to recreate these conditions and provide visitors with an authentic encounter with the artwork. \n\nIn this talk we want to look at some solutions from the perspective of software developers who are motivated not only to preserve and present digital media art, but also to develop it with contemporary software development strategies.","original_language":"eng","persons":["obelix"],"tags":["37c3","11931","2023","Art \u0026 Beauty",""],"view_count":1084,"promoted":false,"date":"2023-12-29T19:15:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-22T13:15:06.121+01:00","length":3683,"duration":3683,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11931-293112df-d0f3-4502-8971-f2f9ed6401d3.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11931-293112df-d0f3-4502-8971-f2f9ed6401d3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11931-293112df-d0f3-4502-8971-f2f9ed6401d3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11931-293112df-d0f3-4502-8971-f2f9ed6401d3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11931-devops_but_for_artworks_in_museums","url":"https://api.media.ccc.de/public/events/293112df-d0f3-4502-8971-f2f9ed6401d3","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"be918aee-9658-418c-8685-5cf09a8acaa6","title":"On Digitalisation, Sustainability \u0026 Climate Justice","subtitle":"A critical talk about sustainability, technology, society, growth and ways ahead","slug":"37c3-12324-on_digitalisation_sustainability_climate_justice","link":"https://events.ccc.de/congress/2023/hub/event/on_digitalisation_sustainability_climate_justice/","description":"The aim of this talk is to critically analyse the use of digital technology in the current context of global ecological injustice and the collapse of ecosystems. But how can we strive for and promote a sustainable, just and democratic digital future? The challenges are huge and include the digital world's hunger for energy as well as the exploitative global practices of tech companies or the discussion of the current AI sustainability hype. But which digital tools make sense, which do not and how can we achieve global social emancipation from self-destructive structures and towards ecological sustainability and a and a just world?","original_language":"eng","persons":["Maja Göpel"],"tags":["37c3","12324","2023","Sustainability \u0026 Climate Justice",""],"view_count":4207,"promoted":false,"date":"2023-12-29T20:30:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-02-23T01:00:06.812+01:00","length":3612,"duration":3612,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12324-be918aee-9658-418c-8685-5cf09a8acaa6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12324-be918aee-9658-418c-8685-5cf09a8acaa6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12324-be918aee-9658-418c-8685-5cf09a8acaa6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12324-be918aee-9658-418c-8685-5cf09a8acaa6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12324-on_digitalisation_sustainability_climate_justice","url":"https://api.media.ccc.de/public/events/be918aee-9658-418c-8685-5cf09a8acaa6","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"18487db3-1b55-4f91-8f93-2de44137abec","title":"VRA","subtitle":"Wave Terrain Synthesis - Contains Noise and Flashy Images","slug":"37c3-11817-vra","link":"https://events.ccc.de/congress/2023/hub/event/vra/","description":"Eine audiovisuelle Performance, basierend auf Bild-zu-Ton-Umwandlung. Dynamisch wechselnde Bilder dienen als Realtime-Audiobuffer. Licht wird Sound. \nBeinhaltet stroboskopische Bilder und Hörinhalte in breiten Spektren.\n\nVRA ist eine audiovisuelle Performance (Projektion + Sound), die mithilfe eines eigens entwickelten Software-Instruments (in Max/MSP), das auf Bild-zu-Ton-Umwandlung basiert, aufgeführt wird. Auf der Projektion sind monochrome Texturen zu sehen, die aus teilweise simplen Formen wie Streifen oder Kreisen, aber auch aus komplexeren Strukturen wie Rauschen bestehen. Diese Bilder werden in Echtzeit in Sound umgewandelt, indem die Helligkeitswerte einer ausgewählten Pixelreihe als Audiobuffer dienen und eine Waveform beschreiben. ","original_language":"eng","persons":["STURMHERTA"],"tags":["37c3","11817","2023","Art \u0026 Beauty",""],"view_count":839,"promoted":false,"date":"2023-12-28T22:05:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-02-05T21:00:10.944+01:00","length":2147,"duration":2147,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11817-18487db3-1b55-4f91-8f93-2de44137abec.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11817-18487db3-1b55-4f91-8f93-2de44137abec_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11817-18487db3-1b55-4f91-8f93-2de44137abec.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11817-18487db3-1b55-4f91-8f93-2de44137abec.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11817-vra","url":"https://api.media.ccc.de/public/events/18487db3-1b55-4f91-8f93-2de44137abec","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"8512bf0b-b247-403e-8035-50cb05523888","title":"Ecocide and (green) colonialism in Sápmi","subtitle":"Data centers on indigenous land in Northern Europe","slug":"37c3-12086-ecocide_and_green_colonialism_in_sapmi","link":"https://events.ccc.de/congress/2023/hub/event/ecocide_and_green_colonialism_in_sapmi/","description":"What is Sápmi? And who are the Sami people? Why is their land threatened by the so-called Green Transition? Why is Europe's largest data centre being built on their land? We would like to try to answer these questions and explain in detail why \"our green transition\" is a threat to the land and rights of the Sami people. We will also discuss the so-called green server infrastructure in Sápmi for example the largest data centre in Europe (by Facebook). \n\nWe are from the Decolonise Sápmi info tour through Germany and not Sámi ourselves. Our talk is based on presentations given by Sámi people during our tour.\n\nSápmi is located in northern Europe and refers to the land of the Sámi people. Over time it has been colonized by Sweden, Norway, Finland and Russia. As a result, the Sámi have been subjected to various forms of oppression and discrimination by these countries to this day.\n\nSápmi and Sápmi’s colonial history are presented. Current forms of oppression are also addressed. An important role is played by “green capitalism,” a form of capitalism in which oppression is advanced under the guise of climate protection. Some examples include: Dams that disrupt reindeer migration routes and flood sacred Sámi sites, or wind turbines that are widely avoided by reindeer. Of course, the lectures will also address the problems that mines pose for the Sámi. A topic which was discussed lately with the discussion around the rare earths found in the so-called Sweden also here in Germany. Furthermore, the problems caused by the still occurring clear-cutting in the area of the Sámi and the resulting loss of biodiversity are explained.\n\nWhat resistance has there been in recent years against this capitalist destruction and (green) colonialism? What is the current situation in Sápmi and what does the future look like?","original_language":"deu","persons":["Kim","Maris"],"tags":["37c3","12086","2023","Sustainability \u0026 Climate Justice",""],"view_count":1067,"promoted":false,"date":"2023-12-29T17:35:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-26T16:15:08.169+01:00","length":2532,"duration":2532,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12086-8512bf0b-b247-403e-8035-50cb05523888.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12086-8512bf0b-b247-403e-8035-50cb05523888_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12086-8512bf0b-b247-403e-8035-50cb05523888.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12086-8512bf0b-b247-403e-8035-50cb05523888.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12086-ecocide_and_green_colonialism_in_sapmi","url":"https://api.media.ccc.de/public/events/8512bf0b-b247-403e-8035-50cb05523888","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"6d46f1e7-31ca-4ce4-a620-c62659a3555f","title":"Zapfenstreich","subtitle":"Über Algorithmen im Krieg, aber was hat die Kunst damit zutun?","slug":"37c3-12199-zapfenstreich","link":"https://events.ccc.de/congress/2023/hub/event/zapfenstreich/","description":"Die rapide Entwicklung autonomer Waffensysteme wirft drängende ethische und rechtliche Fragen auf. Ihre Anwendung hat kann weitreichende Auswirkungen auf militärische und zivile Bereiche haben. Der Vortrag beleuchtet die Technologien hinter dieser tödlichen Autonomie und veranschaulicht, wie die Kunstfreiheit von der Industrie angeignet wird, um Überwachungs und Militärtechnologie voranzutreiben. Welche Verwantwortung haben wir als Künstler\\*innen, wenn wir digitale Werkzeuge verwenden ? Müssen wir stärker denn je unser Werkzeug und die Partner hinterfragen, denen wir helfen könnten, ihre tötlichen Technologien voranzutreiben ?\n\nMit der raschen Entwicklung und Verbreitung von Roboterwaffen fangen Maschinen an, den Platz des Menschen auf dem Schlachtfeld einzunehmen. Einige Expertinnen aus Militär und Robotik schätzen, dass „Killerroboter\" – vollständig autonome Waffen, die ganz ohne menschliches Eingreifen Ziele selektieren und angreifen können – innerhalb von 10 bis 15 Jahren entwickelt werden könnten. Aktuelle Beurteilungen des Militärs sagen aus, dass der Mensch immer eine gewisse Aufsicht über die Entscheidungen hat, tödliche Gewalt anzuwenden, jedoch lassen diese Aussagen oft die Möglichkeit offen, dass autonome Systeme eines Tages selbst die Fähigkeit haben, solche Entscheidungen aus eigener Kraft zu treffen, und somit der Mensch aus dem Entscheidungsprozess herausgenommen wird.\n\nIn diesem Zusammenhang ist es wahrscheinlich, dass autonome Systeme in naher Zukunft auch in Drohnen und Systemen zum Einsatz kommen, die auf hoher See, an Land und im Weltall autonom operieren können. Und während die Drohnentechnologie als solche keine völkerrechtlichen Probleme bereitet, ist es im Falle von autonomen Waffensystemen, bei denen Entscheidungen über Leben und Tod an Maschinen delegiert werden sollen, die Technik selbst, die grundlegende ethische und (völker-)rechtliche Fragen aufwirft.\n\nDie Kriegssituation ist eine Welt der Algorithmen. Die Kunst ist der Anwalt der Gegen Algorithmen.\n\nDurch die Entwicklunge in diesem Bereich haben sich durch eine vielzahl an Ereignissen Akteure in Stellung gebracht und versuchen unter anderem mit Hilfe der Kunstfreiheit ihre Technologien in Europa zu verbreiten. Der Vortrag möchte aufzeigen, welche Künstlerischen Möglichkeiten es gegen den \"Krieg der Algorithmen\" gibt und die Frage aufwerfen, welche Verantwortung wir als Künstler\\*innen bei der Nutzung von Technologie haben. Wir müssen stärker den je unser Werkzeug und die Partner hinterfragen, denen wir helfen könnten, ihre Technologien voranzutreiben.","original_language":"deu","persons":["Simon Weckert"],"tags":["37c3","12199","2023","Art \u0026 Beauty",""],"view_count":3881,"promoted":false,"date":"2023-12-30T12:55:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-17T11:30:06.987+01:00","length":2338,"duration":2338,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12199-6d46f1e7-31ca-4ce4-a620-c62659a3555f.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12199-6d46f1e7-31ca-4ce4-a620-c62659a3555f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12199-6d46f1e7-31ca-4ce4-a620-c62659a3555f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12199-6d46f1e7-31ca-4ce4-a620-c62659a3555f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12199-zapfenstreich","url":"https://api.media.ccc.de/public/events/6d46f1e7-31ca-4ce4-a620-c62659a3555f","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"1a9291bf-dab5-4824-8b20-ecb393c677a8","title":"Unlocked: PICing a wireless door access system","subtitle":null,"slug":"37c3-12265-unlocked_picing_a_wireless_door_access_system","link":"https://events.ccc.de/congress/2023/hub/event/unlocked_picing_a_wireless_door_access_system/","description":"Mainframe, Oldenburg's Hackerspace, needed a wireless door lock solution. We do not trust vendors advertising promises about the device security and had a closer look.\n\nAttend this talk for a presentation about an unusual variant of lock picking, which does not involve any wrenches, hooks or half-diamond picks. Instead the used tools are a software defined radio, PIC programmer and some self-developed software to gain access without using the original key remote control.\n\nIf you had fun watching the [Hörmann BiSecur talk at 34C3](https://media.ccc.de/v/34c3-9029-uncovering_vulnerabilities_in_hoermann_bisecur), this talk is for you! If you haven't watched it, it is highly recommended to catch up on it before attending this talk. While it is about a different product from a different vendor, there are many parallels and it can be seen as a sequel talk.\n\nThe plan for this talk is to first have a look at the radio signals from the door lock using a SDR. After making sense of the used message protocol, the hardware is analyzed to understand how it works and how to get access to the used micro-controllers (PIC18LF45K80 \u0026 PIC16LF1829). In the next step, the firmware from the read-protected PIC microcontroller is extracted by extending the existing PIC attacks. Last but not least the results will be demonstrated.","original_language":"eng","persons":["sre"],"tags":["37c3","12265","2023","Security",""],"view_count":2801,"promoted":false,"date":"2023-12-29T21:45:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-04-01T15:00:11.107+02:00","length":2327,"duration":2327,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12265-1a9291bf-dab5-4824-8b20-ecb393c677a8.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12265-1a9291bf-dab5-4824-8b20-ecb393c677a8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12265-1a9291bf-dab5-4824-8b20-ecb393c677a8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12265-1a9291bf-dab5-4824-8b20-ecb393c677a8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12265-unlocked_picing_a_wireless_door_access_system","url":"https://api.media.ccc.de/public/events/1a9291bf-dab5-4824-8b20-ecb393c677a8","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"05cb0d5b-ae52-48a6-a68a-8503dfc06f95","title":"Hurra, diese Welt geht unter!?","subtitle":"Welche kollektiven Erzählungen brauchen wir, um in der Klimakrise handlungsfähig zu sein? ","slug":"37c3-12016-hurra_diese_welt_geht_unter","link":"https://events.ccc.de/congress/2023/hub/event/hurra_diese_welt_geht_unter/","description":"Es war einmal ein Planet voller Affen, die sich Geschichten über sich, das Universum, die Technik und den ganzen Rest erzählten. Sie erzählten sich vor allem Storys vom unendlichen Wachstum und von der technologischen Überwindung der Sterblichkeit. Spätestens im Jahr 2023 passten diese sehr mächtigen Erzählungen nicht mehr. Die Ökosysteme brachen zusammen, planetare Grenzen und Artensterben wurden unignorierbar und so standen nicht nur das Klima, sondern auch die alten Narrative an einen Kipppunkt…\n\nWelche Geschichte(n) von individueller und kollektiver Sterblichkeit müssen wir uns heute erzählen, um handlungsfähige Mehrheiten für eine nachhaltige, egalitäre und emanzipative digitale Zukunft zu mobilisieren?\n\nIm Talk zeigen wir den engen Zusammenhang von (Un-)Sterblichkeits-Erzählungen, menschlichem Selbstbild und Zukunftsvorstellungen – vor allem aber deren Wirkmacht auf unsre Handlungsfähigkeit.\n\nDazu laden wir zwei Gäste ein, uns ihre Narrative zu zeigen: ein\\*e Aktivisti der Letzten Generation und Daniel Domscheit-Berg, der über Solarpunk sprechen wird. Anschließend basteln wir es zusammen: zwischen „I want you to panic” und „DON’T PANIC!” – welche Narrative brauchen wir jetzt und hier, um uns zwischen Trauer um diese Welt und der Lust am (Über)leben zu organisieren?\n\nDie sich beschleunigt entfaltende Klimakatastrophe stellt die vordringlichste kollektive Herausforderung der Menschheit dar. Sie ist riesig, unübersehbar, wirkt irgendwie langsam im Gegensatz zu akuten Krisen wie Krieg oder Pandemien. Sie lädt deshalb ein zur destruktiven Prokrastination. Paralysiert verharrt ein Großteil von uns in Ignoranz oder überwältigender Ohnmacht. Warum das denn? Das Wissen um die Notwendigkeit des Handelns und die zu treffenden Maßnahmen ist da. Was für die Umsetzung ins konsequente Handeln fehlt – das ist die These des Talks – sind überzeugende kollektive Narrative. Gesucht wird eine Erzählung der Endlichkeit, die zur Gestaltung einer transformierten nachhaltigen und egalitären Zukunft motiviert. Dass es dringend sinnstiftende, universalistische Erzählungen braucht, zeigen auch der Trend von Verschwörungsmythen, die wachsende Prepper-Szene, das Comeback religiöser Heilsversprechungen und Fantasien, den individuellen oder kollektiven Tod mittels Technologisierung (#mindupload, #Dadbot, #Transhumanismus, #SpaceX) ganz abzuschaffen.\n\nAktuelle zivilgesellschaftliche Bewegungen zur Verhinderung der Klimakatastrophe verbreiten mit ihren Aktivitäten unterschiedliche Erzählungen, die zum Teil medial gegeneinander ausgespielt werden. Der Talk gibt einen Rahmen, in dem die verbindenden Elemente sichtbar werden. Wir laden zwei Aktivist:innen unterschiedlicher Bewegungen (Letzte Generation und „Solarpunk\") ein, ihr Engagement im Kontext dieser erzählerischen Komponenten vorzustellen: Welches menschliche Selbstbild, welcher Technikbegriff, welcher Körperbegriff steckt darin und wie wird mit Endlichkeit, Verletzlichkeit und Transformation umgegangen? Wie wird bei Aktionen die eigene Körperlichkeit eingesetzt? Was ist die Rolle von Technologien, z.B. KI, in dieser Erzählung?\n\nDer Talk versteht sich als Teil der Weiterentwicklung von unterschiedlichen aktivistischen Ansätzen – divers wie die Ökosysteme selbst – und deren Verbindung zu einer gesellschaftlich wirkmächtigen Bewegung im Kampf gegen die Klimakrise.","original_language":"deu","persons":["Elenos","mischko","daniel domscheit-berg","Becci"],"tags":["37c3","12016","2023","Sustainability \u0026 Climate Justice",""],"view_count":7448,"promoted":false,"date":"2023-12-28T13:50:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-27T21:45:09.149+01:00","length":2386,"duration":2386,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12016-05cb0d5b-ae52-48a6-a68a-8503dfc06f95.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12016-05cb0d5b-ae52-48a6-a68a-8503dfc06f95_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12016-05cb0d5b-ae52-48a6-a68a-8503dfc06f95.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12016-05cb0d5b-ae52-48a6-a68a-8503dfc06f95.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12016-hurra_diese_welt_geht_unter","url":"https://api.media.ccc.de/public/events/05cb0d5b-ae52-48a6-a68a-8503dfc06f95","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"b56502da-90cb-4ae1-b055-2a1d3de52cb2","title":"Place \u0026 route on silicon","subtitle":"A gentle introduction to place \u0026 route algorithms for digital integrated circuits","slug":"37c3-11820-place_route_on_silicon","link":"https://events.ccc.de/congress/2023/hub/event/place_route_on_silicon/","description":"After a brief introduction to digital circuits this talk will outline placement and routing algorithms used for creating digital integrated circuits.\n\n\nThis talk introduces the algorithms used for placement and routing of digital integrated circuits.\n\nThe talk does \\*not\\* cover:\n\\* high-level circuit design (The art of creating meaningful circuits. Often done with languages like Verilog, VHDL, SpinalHDL, Chisel, Amaranth, etc )\n\\* logic synthesis (Converts the high-level description into a graph-like circuit description, called netlist)\n\nPlace-and-route refers to the transformation of a graph-like circuit description (netlist) into a geometrical representation of the circuit (layout).\nThe netlist is typically produced by logic synthesis. The netlist consists of many sub-circuits, so called \"standard-cells\" but also \"macro cells\".\nStandard-cells implement simple logic functions such as inverters, logical \"and\", \"nand\", \"xor\", and storage elements.\nThe netlist may also import larger pre-compiled macro cells such as SRAM blocks.\nFor a physical implementation of the circuit, the sub-circuits need to be placed on the chip surface and need to be connected (routed) using metal wires.\n\nTransforming the netlist into a layout typically requires the following input data:\n\\* A netlist of the circuit, of course.\n\\* A set of constraints: For example the desired clock frequency and area of the circuit.\n\\* Design rules: A set of constraints required for successful fabrication. This typically involves geometrical constraints such as minimum width and spacing of metal wires.\n\\* A standard-cell library: This is a set of building-blocks usually used to assemble the circuit. The library contains the geometrical layout of the standard-cells and also information about their timing behavior.\n\nThen the following steps convert the input data into a layout:\n\\* IO-planning: Decide where to put the input and output pins of the circuit.\n\\* Floor-planning: Decide how to geometrically arrange various parts of a larger system.\n\\* Power distribution: Insert regular rows of metallic power-rails which supply the standard-cells with energy\n\\* Global placement: Decide where to roughly place the standard-cells such that the wiring will short and possible\n\\* Tie-cell insertion: Provide constant 0 and 1 signals, where needed.\n\\* Clock-tree synthesis: Storage elements typically need a clock-signal. Often the clock signal needs to be distributed to a large number of storage elements.\n\\* Detail placement: Do fine-tuning, such as snapping the standard-cells to a grid\nthe signal propagation delay from the clock source to the storage elements should be more-or-less equally distributed.\n\\* Optimizations to meet timing requirements: Some signals might be too slow or to fast. There's a variety of techniques to improve this, such as amplifying signals with buffers.\n\\* Routing: The placed cells need to be connected with metal wires.\n\\* Filler insertion: fill unused space for example with capacitors to stabilize the supply voltage\n\\* Verification: Make sure all constraints are met. Otherwise, try to fix the circuit and repeat above steps in order to converge to a valid solution.\n\nThis talk will focus on a widely used algorithm for global placement and introduces basic principles of routing algorithms.\n","original_language":"eng","persons":["Thomas"],"tags":["37c3","11820","2023","Hardware \u0026 Making",""],"view_count":1764,"promoted":false,"date":"2023-12-27T11:00:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-22T21:30:06.553+01:00","length":2318,"duration":2318,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11820-b56502da-90cb-4ae1-b055-2a1d3de52cb2.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11820-b56502da-90cb-4ae1-b055-2a1d3de52cb2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11820-b56502da-90cb-4ae1-b055-2a1d3de52cb2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11820-b56502da-90cb-4ae1-b055-2a1d3de52cb2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11820-place_route_on_silicon","url":"https://api.media.ccc.de/public/events/b56502da-90cb-4ae1-b055-2a1d3de52cb2","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"99b87729-3aa6-442b-83d6-9b1eb06b7e81","title":"Music on Mars? ","subtitle":"A Musical Adventure for Astronauts and the Space Cadets Who Love Them.","slug":"37c3-12268-music_on_mars_a_musical_adventure_for_astronauts_and_the_space_cadets_who_love_them","link":"https://events.ccc.de/congress/2023/hub/event/music_on_mars_a_musical_adventure_for_astronauts_and_the_space_cadets_who_love_them/","description":"During Mission 286 in November 2023 at the Mars Desert Research Station (MDRS), Analog Astronaut and crew artist Scott Beibin performed several concerts of original live musical compositions during a two week immersive astronaut training. +++\r\n\r\nThe concerts were played through a custom audio filter based on data gathered by the NASA Mars Perseverance Rover and created to simulate the acoustic properties of Mars - designed by Beibin and master audio engineer, John Knott. +++\r\n\r\nThe live sets were performed in the MDRS Science Dome as well as during EVAs while navigating the desolate terrain in a simulation space suit - at sunset with the MDRS base and remote Mars-like Utah desert serving as a backdrop. +++\r\n\r\nThis event was the first time in the 20 year history of the training facility that a music concert has been performed. +++\r\n\r\nThe presentation at 37C3 will be the first time this talk is being presented publicly. ++\r\n\r\nAdditionally there will be a full Ptelepathetique concert featuring Music of Mars (Please keep checking the schedule / Fahrplan for the announcement of the performance)\r\n\r\n\r\nUsing the SuperCam microphone mounted on the Mars Perseverance Rover, recordings were made of the sounds of the Ingenuity rotorcraft as well as the popping sounds of laser sparking on stone. These audio samples, in addition to recordings of wind from other missions served as as reference sources in order to characterize the acoustic processes Mars for the first time. \r\n\r\nIt was discovered that:\r\n\r\n- The acoustic impedance of the martian atmosphere results in approximately 20 dB weaker sounds on Mars than on Earth (if produced by the same source.)\r\n\r\n- The acoustic attenuation range on Mars was discovered to be roughly between 20Hz to 20kHz.\r\n\r\n- On Mars low-pitched sounds travel at about 240 m/s (537 mph) while higher-pitched sounds move at 250 m/s (559 mph) due to the low atmospheric pressure 0.6 kPa (170 times lower than on Earth) and 97 percent CO2-dominated atmosphere (compared to 0.04 percent CO2 on Earth).\r\n\r\nThe results were published by NASA in Journal Nature as to these findings.  [https://www.nature.com/articles/s41586-022-04679-0] and on the Nasa website [https://mars.nasa.gov/mars2020/participate/sounds\r\n\r\nReferencing the paper published by NASA in Journal Nature as to these findings, analog astronaut and MDRS 286 crew artist Scott Beibin worked with master audio engineer John Knott to develop a software filter that could be used during Ptelepathetique concert performed during a two week immersive astronaut training in order to simulate the sounds of Mars.\r\n\r\nDuring the talk at 37C3 Beibin will discuss and demonstrate the comparison between the acoustic properties of the atmospheres of Earth and Mars via a demonstration of the software as well as musical Ptelepathetique performance.\r\n\r\nDuring the talk he will also present a short summary of the design patterns of the The Mars Desert Research Station which is used to train astronauts, researchers and students for offworld expeditions to the Red Planet. Additionally he will touch on the other aspects of his mission including 3D scanning of the surrounding geology as well as 3D printing of objects useful at the base using locally gathered and processed clay. \r\n\r\nThis should be an out-of-this-world treat for the Space Cadet hackers and others who like making astronauts out of themselves. \r\n\r\n\r\n++ Ptelepathetique is a musical project of inventor, engineer and artist Scott Beibin that focuses on the creation of instrumental cinematic psychoacoustic soundscapes designed to stimulate focus and creativity. Concerts usually happen outdoors in natural settings while using off-grid generated power while consisting of a mix of original musical composition as well as improvisation. Ptelepathetique is also the soundtrack for Beibin's projects The Groucho Fractal Show, AncientScan and the Mandelbot Ecotech Roadshow. \r\n\r\n++ The Mars Desert Research Station (MDRS) is a Space analog facility in Utah that supports Earth-based research in pursuit of the technology, operations, and science required for human space exploration. The remotely isolated facility created by The Mars Society offers scientists, engineers and students rigorous training for human operations on Mars as is surrounded by a landscape that is an actual geologic Mars analog.\r\n","original_language":"eng","persons":["Scott Beibin"],"tags":["37c3","12268","2023","Art \u0026 Beauty"],"view_count":1208,"promoted":false,"date":"2023-12-27T21:10:00.000+01:00","release_date":"2023-12-27T00:00:00.000+01:00","updated_at":"2026-03-18T21:30:07.009+01:00","length":2257,"duration":2257,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12268-99b87729-3aa6-442b-83d6-9b1eb06b7e81.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12268-99b87729-3aa6-442b-83d6-9b1eb06b7e81_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12268-99b87729-3aa6-442b-83d6-9b1eb06b7e81.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12268-99b87729-3aa6-442b-83d6-9b1eb06b7e81.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12268-music_on_mars_a_musical_adventure_for_astronauts_and_the_space_cadets_who_love_them","url":"https://api.media.ccc.de/public/events/99b87729-3aa6-442b-83d6-9b1eb06b7e81","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"59a1c108-e367-4d71-bc50-7073cb8025e6","title":"Adventures in Reverse Engineering Broadcom NIC Firmware","subtitle":"Unlocking a system with 100% open source firmware","slug":"37c3-11781-adventures_in_reverse_engineering_broadcom_nic_firmware","link":"https://events.ccc.de/congress/2023/hub/event/adventures_in_reverse_engineering_broadcom_nic_firmware/","description":"In an era where vendors increasingly seek to use proprietary software in the devices around us to exert control over their users, the desire for open source software has expanded to the firmware that allows our machines to function, and platforms which individuals can trust and control have never been more important. However, changes to hardware platforms in recent years such as the Intel ME, vendor-supplied binary blobs and vendor-signed firmware images have repeatedly set back efforts to create open source firmware for the computers we use. The release of Power servers with 99% open source firmware excited many who had been searching for a computer they could trust, but one proprietary firmware blob remained: that of the Ethernet controller. This is the story of how that blob was reverse engineered and replaced with an open source replacement, delivering the first machine with desktop-class performance and 100% open source firmware in many years.\n\nThis talk is about how I reverse engineered the final remaining firmware blob on the Talos II/Blackbird POWER9 systems, enabling it to be replaced with an open source replacement, in an intensive reverse engineering effort that spanned several years.\n\nThe talk will begin by introducing the open source firmware movement and its practical and ethical motivations, and note the obstacles to delivering fully open source firmware for contemporary x86 and other platforms and explaining the motive behind the project, before moving onto a more technical discussion of the adventure of firmware reverse engineering and the obstacles encountered.\n\nSubjects I intend to cover include: how the original proprietary firmware was reverse engineered from scratch with only limited knowledge of device internals; the long history of Broadcom NIC architecture and its evolution over time; the tools that had to be developed to enable the device probing, testing and reversing process; the story of a horrifying but necessary detour into reversing x86 real mode code and the novel methodology used to aid reversing; how modern NICs allow BMCs in servers to share network ports with the host, and the security hazards this creates; and how fully open source firmware was created legally using a clean room process.\n\nThis talk will be accessible to audiences unfamiliar with POWER9 or the open source firmware community, but is also intended to cover some new ground and be of interest to those familiar with the project. The talk will mainly be of interest to those interested in open source firmware and issues such as owner control and the security and auditability issues caused by proprietary firmware, and to those interested in reverse engineering.\n","original_language":"eng","persons":["Hugo Landau"],"tags":["37c3","11781","2023","Hardware \u0026 Making",""],"view_count":6228,"promoted":false,"date":"2023-12-27T16:00:00.000+01:00","release_date":"2023-12-28T00:00:00.000+01:00","updated_at":"2026-04-03T21:00:07.308+02:00","length":3602,"duration":3602,"thumb_url":"https://static.media.ccc.de/media/congress/2023/11781-59a1c108-e367-4d71-bc50-7073cb8025e6.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/11781-59a1c108-e367-4d71-bc50-7073cb8025e6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/11781-59a1c108-e367-4d71-bc50-7073cb8025e6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/11781-59a1c108-e367-4d71-bc50-7073cb8025e6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-11781-adventures_in_reverse_engineering_broadcom_nic_firmware","url":"https://api.media.ccc.de/public/events/59a1c108-e367-4d71-bc50-7073cb8025e6","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"4bc85b0a-a1df-477b-8e1f-a493e5cc8017","title":"Link-Extremismus und Pressefreiheit","subtitle":"Das Strafverfahren gegen Radio Dreyeckland","slug":"37c3-12241-link-extremismus_und_pressefreiheit","link":"https://events.ccc.de/congress/2023/hub/event/link-extremismus_und_pressefreiheit/","description":"Ein Journalist von Radio Dreyeckland steht vor Gericht, weil er das Archiv der verbotenen Internetplattform linksunten.indymedia verlinkt hat. Der Vortrag gibt einen Einblick in das Verfahren und zeigt, wann Links strafbar sein können – und wann nicht.\n\nIm Januar 2023 kam es zu Durchsuchungen der Redaktionsräume des Senders Radio Dreyeckland sowie der Wohnungen zweier Journalisten. Anlass der Durchsuchungen und der Beschlagnahme mehrerer Laptops war ein Artikel des Senders, in dem auf ein Archiv von linksunten.indymedia verlinkt wurde. Die Internetplattform war 2017 nach Vereinsrecht verboten worden. Die Staatsschutzabteilung der Staatsanwaltschaft Karlsruhe sieht in dem Artikel eine strafbare Unterstützung einer verbotenen Vereinigung. Das Oberlandesgericht Stuttgart hat inzwischen – anders als zuvor das Landgericht – die Anklage gegen den Journalisten zugelassen und entschieden, dass die Durchsuchung rechtmäßig war. Die Hauptverhandlung soll im kommenden Jahr stattfinden.\n\nDer Vortrag gibt einen Einblick in das Verfahren und ordnet es kritisch ein. Dabei wird insbesondere der Frage nachgegangen, wie Links rechtlich zu bewerten sind und wie der Staat gegen (linke) Medien vorgeht.","original_language":"deu","persons":["David Werdermann"],"tags":["37c3","12241","2023","Ethics, Politics \u0026 Society",""],"view_count":2809,"promoted":false,"date":"2023-12-30T12:00:00.000+01:00","release_date":"2023-12-30T00:00:00.000+01:00","updated_at":"2026-03-31T12:15:05.891+02:00","length":2421,"duration":2421,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12241-4bc85b0a-a1df-477b-8e1f-a493e5cc8017.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12241-4bc85b0a-a1df-477b-8e1f-a493e5cc8017_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12241-4bc85b0a-a1df-477b-8e1f-a493e5cc8017.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12241-4bc85b0a-a1df-477b-8e1f-a493e5cc8017.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12241-link-extremismus_und_pressefreiheit","url":"https://api.media.ccc.de/public/events/4bc85b0a-a1df-477b-8e1f-a493e5cc8017","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]},{"guid":"fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf","title":"Gläserne Geflüchtete","subtitle":"Mit Computern das Leben zum Schlechteren verändern","slug":"37c3-12306-glaserne_gefluchtete","link":"https://events.ccc.de/congress/2023/hub/event/glaserne_gefluchtete/","description":"Digitale Bezahlkarten, Migrationsvorhersage mit sogenannter KI, digitalisierte Grenzen zur Festung Europa und immer mehr davon. Ein Überblick, wie Digitalisierung jenseits des öffentlichen Aufschreis genutzt wird, um den Pull-Faktor Menschlichkeit zu drücken.\n\nIn der Hackerethik steht: „Computer können dein Leben zum Besseren verändern.\" Aber viel zu oft werden sie für das Gegenteil genutzt. Vor allem im Bereich der digitalisierten Migrationskontrolle.\n\nMit dabei: das Ausländerzentralregister, eines der größten automatisierten Register der öffentlichen Verwaltung; die Idee für digitale Bezahlkarten, die mehr Freiheitsbeschränkung sind als Zahlungsmittel; die üblichen Verdächtigen unter den BAMF-IT-Assistenzsystemen; Vorhersage-Systeme für Migrationsbewegungen; die digitale Festung Europa. Und ganz neu: das Schneller-Abschieben- und das Datenübermittlungsvorschriftenanpassungsgesetz.\n\nDie aktuelle Bundesregierung macht munter dabei mit, ihre digitalen Kontrollhelfer weiter auszuweiten. Und fast niemand schaut hin.","original_language":"deu","persons":["Anna Biselli"],"tags":["37c3","12306","2023","Ethics, Politics \u0026 Society",""],"view_count":2426,"promoted":false,"date":"2023-12-29T13:30:00.000+01:00","release_date":"2023-12-29T00:00:00.000+01:00","updated_at":"2026-03-20T15:45:06.574+01:00","length":3597,"duration":3597,"thumb_url":"https://static.media.ccc.de/media/congress/2023/12306-fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf.jpg","poster_url":"https://static.media.ccc.de/media/congress/2023/12306-fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2023/12306-fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2023/12306-fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/37c3-12306-glaserne_gefluchtete","url":"https://api.media.ccc.de/public/events/fc46c82b-1b0d-4a96-bc5e-03bd3de2a6cf","conference_title":"37C3: Unlocked","conference_url":"https://api.media.ccc.de/public/conferences/37c3","related":[]}]}