{"acronym":"camp2019","aspect_ratio":"16:9","updated_at":"2026-04-04T23:15:06.658+02:00","title":"Chaos Communication Camp 2019","schedule_url":"","slug":"conferences/camp/2019","event_last_released_at":"2019-09-11T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/camp/2019","logo_url":"https://static.media.ccc.de/media/conferences/camp2019/camp2019_logo.png","images_url":"https://static.media.ccc.de/media/conferences/camp2019","recordings_url":"https://cdn.media.ccc.de/events/camp2019","url":"https://api.media.ccc.de/public/conferences/camp2019","events":[{"guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","title":"Climate breakdown – the bleak reality","subtitle":null,"slug":"thms-24-climate-breakdown-the-bleak-reality","link":"http://talx.thm.cloud/thms/talk/FLXJRA/","description":"Heat waves, wildfires and new movements like Fridays for Future and Extinction Rebellion have brought the climate crisis back into the news. However, meaningful political action is still not happening and the world is on track to three to four degrees of warming. Where are we heading and why did humanity fail so badly at tackling the problem?\n\nA look at the scientific reality of the climate crisis is dire. Sinking coastal cities with millions of inhabitants, dying coral reefs, and large uninhabitable areas are practically impossible to avoid by now. But that doesn’t even come close to capture the worst outlooks: A runaway climate change where feedback loops accelerate heating [1], without any option for humanity to do anything about it. The end result may very well be a planet largely uninhabitable for humans.\n\nAvoiding just the worst of these consequences requires unprecedented political action on a scale that’s not even part of the political discourse yet.\n\nThe talk will give an overview of the troubling scientific facts. Furthermore I’ll provide some discussion why humanity failed so badly at doing anything about it. This includes undeserved optimism by traditional environmental organizations about international climate diplomacy and the Kyoto and Paris accords, a wrong understanding about relative versus absolute emission reductions and false hopes in technology fixes.\n\nWith all that dire outlook, it’s important to realize that the difference between “business as usual” and ambitious changes is still huge. A new wave of climate doomsdayers that say it’s too late to do anything may be just as harmful as the climate deniers, because they share the wrong message of doing nothing.\n\n[1] https://www.pik-potsdam.de/news/press-releases/planet-at-risk-of-heading-towards-irreversible-201chothouse-earth201d-state?set_language=en","original_language":"eng","persons":["hanno"],"tags":["thms","24","Talk"],"view_count":462,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2024-08-19T22:00:02.351+02:00","length":3923,"duration":3923,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/24-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/24-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/24-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/24-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-24-climate-breakdown-the-bleak-reality","url":"https://api.media.ccc.de/public/events/54aa059d-1205-5afb-8a11-68ef351b0ab9","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":6},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":28},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":20},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":3},{"event_id":7398,"event_guid":"31dfe9ce-3291-497b-80e2-1b7a82344834","weight":5},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":19},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":7},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":3},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":19},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":15},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":5},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":19},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":5},{"event_id":7431,"event_guid":"508fe23f-bc69-4521-abc3-59b649598eb5","weight":18},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":9},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":15},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":15},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":41},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":15},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":5},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":6}]},{"guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","title":"DoH or Don't","subtitle":"The dilemma of DNS privacy protocols","slug":"Camp2019-10213-doh_or_don_t","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10213.html","description":"Seldom have DNS protocol changes sparked such fierce debate as happen in the case of DNS-over-HTTPs (Doh) and it's little cousin, DNS-over-TLS (DoT). While for many people it is a matter of black and white, the reality out there is various shades of grey ;)\n\nThis talk will discuss the technical and political aspects of these DNS privacy protocols, where they come from, who is implementing DoH/DoT (both in the browser space and otherwise) and why it is a [good|bad] idea to support these protocol implementations.\n\nSince the Snowden revelations, the \u003ca href=\"https://datatracker.ietf.org/wg/dprive/documents/\"\u003eDPRIVE (DNS Privacy Exchange) working group\u003c/a\u003e inside the IETF has been working on ways to make DNS, the Domain Name System, leaking less privacy related information (aka metadata).\n\nTwo new protocols from this working group are DNS-over-TLS \u003ca href=\"https://tools.ietf.org/html/rfc7858\"\u003eRFC 7858\u003c/a\u003e (DoT) and DNS-over-HTTPS \u003ca href=\"https://tools.ietf.org/html/rfc8484\"\u003eRFC 8484\u003c/a\u003e (DoH). Both protocols secure DNS queries between client systems and DNS resolver using encryption and authentication. DoT runs on a dedicated port 853, while DoH piggybacks on HTTPS (port 443).\n\nWhile DoT was initially mostly ignored by OS vendors, ISPs and users alike, DoH was adopted by browser vendors (Mozilla/Firefox and Google/Chrome) and created heated discussions among security and privacy experts. Even to the point that governments discussing way to outlaw DoH.","original_language":"eng","persons":["Carsten Strotmann"],"tags":["camp19","10213","Security"],"view_count":1086,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-16T18:30:07.068+01:00","length":2580,"duration":2580,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10213-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10213-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10213-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10213-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10213-doh_or_don_t","url":"https://api.media.ccc.de/public/events/ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":19},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":29},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":31},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":30},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":34},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":68},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":28},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":39},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":26},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":28},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":27}]},{"guid":"e9010267-d885-4982-92ff-4341dff3d5ea","title":"Was tun gegen Digitale Gewalt gegen Frauen","subtitle":"\"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen\" (Aus einer Antwort der Bundesregierung)","slug":"Camp2019-10346-was_tun_gegen_digitale_gewalt_gegen_frauen","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10346.html","description":"Digitale Gewalt ist mehr als Hatespeech: Dazu gehören Doxing, Identitätsdiebstahl, Bildmanipulationen und deren Veröffentlichung, Spy Apps und noch mehr. Das meiste davon ist verboten, gilt aber nicht als 'Cybercrime'. Der Talk beschreibt, was dazu gehört, wer betroffen ist, was sich bei dem Thema seit den Doxing-Fällen im Januar getan hat und was nötig wäre, um langfristig etwas zu ändern. \n\nAuf die Frage, ob Digitale Gewalt gegen Frauen auch ‚Cybercrime‘ sei, antwortete die Bundesregierung Ende November 2018: „Da es sich bei digitaler Gewalt nicht um Straftaten handelt, die sich gegen das Internet, Datennetze, informationstechnische Systeme oder deren Daten richten, sind sie nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen.“\n\nWenige Wochen später drehte sich der Wind, als Anfang Januar bekannt wurde, dass 1000 Prominente gedoxt* worden waren, darunter viele Bundestagsabgeordnete. Mit diesem Fall wurde ein Vorgehen zum schwerwiegenden IT-Sicherheitsproblem, von dem vorher schon viele andere Menschen betroffen waren, ohne dass ein Hahn danach krähte.\n\nIn diesem Talk wird im ersten Teil der aktuelle Stand der Erkenntnisse zu den verschiedenen Phänomen erläutert, die unter den Sammelbegriff Digitale Gewalt gegen Frauen fallen: Beleidigungen, Bedrohungen, Erpressung mit der Drohung, intime Bilder zu veröffentlichen oder das Veröffentlichen solcher Bilder - auch bekannt als ‚Revenge Porn‘ - , geheime Ton-/Bild-/Videoaufnahmen und die Weitergabe an Dritte, Online-Stalking, das Installieren von Spy-Apps, Identitätsdiebstahl und -missbrauch, Doxing, Manipulation und Veröffentlichung von Bildern bspw. zusammen mit der Wohnadresse usw. usf. \n\nDas alles ist verboten, aber aus verschiedenen Gründen ist es oft schwierig, sich dagegen zu wehren. \n\nDeswegen geht es im zweiten Teil darum, dass und wobei Betroffene zu wenig Unterstützung bekommen: praktisch, juristisch, durch Polizei und Politik. Das beginnt oft bei der Frage der Zuständigkeit. Unter Cybercrime wird in der Regel kriminelles Verhalten gegenüber Geräten, Unternehmen oder Infrastrukturen verstanden, jedenfalls nach Auffassung deutscher Innenpolitiker. Dazu kommen Fälle, bei denen es ums Geld geht und natürlich auch Kinderpornographie. \n\nInnenminister Seehofer hat im Januar verkündet, dass das neue IT-Sicherheitsgesetz die Probleme lösen soll, die zu den Doxingfällen des „Adventskalenders“ geführt haben. Auf dem Tisch liegen Vorschläge für mehr Überwachung, weniger Verschlüsselung und mehr Geld für die Sicherheitsbehörden. Immerhin: Das BSI soll sich mehr um Verbraucherschutz kümmern. So wie es aussieht, ist die digitale Seite der häuslichen Gewalt aber wieder nicht dabei – dafür ist ja das Familien- und Frauenministerium zuständig. \n\nBetroffene von Doxing, Revenge Porn, ferngesteuerten ‚Smart Devices‘ oder Spy Apps haben es meist schwer, kompetente Ansprechpartner*innen bei Polizei und Justiz zu finden. Es gibt auch kaum Beratungsstellen für diese Fälle, obwohl die Folgen manchmal schwerwiegend sind. \n\nDeswegen gibt es im dritten Teil konkrete Tips für Betroffene und Hinweise, wo derzeit Lücken bestehen und Vorschläge, wie die geschlossen werden können\n\nVielleicht - hoffentlich - ergibt sich im Anschluss an den Talk die Gelegenheit darüber zu sprechen, wie in manchem Fällen ganz praktisch Abhilfe geschaffen werden kann. \n\n\n*Doxing bezeichnet das Veröffentlichen privater Daten oder Informationen (= Dokumente, ‚Docs‘) im Netz\n\nImage by \u003ca href=\"https://pixabay.com/users/ElisaRiva-1348268/?utm_source=link-attribution\u0026amp;utm_medium=referral\u0026amp;utm_campaign=image\u0026amp;utm_content=1831016\"\u003eElisaRiva\u003c/a\u003e from \u003ca href=\"https://pixabay.com/?utm_source=link-attribution\u0026amp;utm_medium=referral\u0026amp;utm_campaign=image\u0026amp;utm_content=1831016\"\u003ePixabay\u003c/a\u003e","original_language":"deu","persons":["Anne Roth"],"tags":["camp19","10346","Ethics, Society \u0026 Politics"],"view_count":368,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2025-12-30T06:45:09.585+01:00","length":2494,"duration":2494,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10346-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10346-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10346-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10346-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10346-was_tun_gegen_digitale_gewalt_gegen_frauen","url":"https://api.media.ccc.de/public/events/e9010267-d885-4982-92ff-4341dff3d5ea","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":9},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":4},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":9},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":5},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":16},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":9},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":4},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":14},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":9},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":10},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":12},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":11},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":9},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":10},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":11}]},{"guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","title":"Als Netzaktivistin im Bundestag – Insider Einblicke und Mitmachmöglichkeiten","subtitle":null,"slug":"thms-50-als-netzaktivistin-im-bundestag-insider-einblicke-und-mitmachmglichkeiten","link":"http://talx.thm.cloud/thms/talk/GRRQTX/","description":"Der Bundestag ist anders als man denkt. Analoger als man ohnehin\nvermutet, mit irrsinnigen Abläufen und unvorstellbaren Papierbergen. Es\nist viel anstrengender, als man sich je hätte ausmalen können. Man hat\nzu viel Durst und zu wenig Schlaf und kaum noch ein Privatleben. Aber\nman kann einen Unterschied machen und deshalb will ich zeigen, dass\nPolitik auch kompetent, transparent und partizipativ möglich ist. In\ndieser Session gebe ich Insider Einblicke in den Alltag als netzpolitische Sprecherin der Linksfraktion im Bundestag,\nzeige die Handlungsmöglichkeiten einer Oppositionspolitikerin und wie\nIhr als Netzcommunity mich als Eure Volksvertreterin nutzen könnt, um\nz.B. auf offiziellen Kanälen Informationen abzufragen, an die man sonst\nnicht kommt, denn Wissen ist Macht.\n\nDie Arbeit einer Bundestagsabgeordneten hatte ich mir anders\nvorgestellt. Schon rein vom praktischen Alltag her. Mich überraschten\nTrinkverbote, 17-stündige Plenartage ohne Pausen, Schreibmaschinen,\nKarteikarten und Faxgeräte, ich verlief mich in unterirdischen\nLabyrinthen, fing 19 Mäuse im Büro und freute mich, als 2018 endlich das\nWLAN kam. Ich wurde netzpolitische Sprecherin der Linksfraktion, Mitglied bzw. stellvertretendes Mitglied im\nDigitalausschuss, im Beirat der Bundesnetzagentur (Megathema 5G\nLizenzversteigerung), der Enquete Kommission Künstliche Intelligenz, in\nden Ausschüssen für Bildung/Forschung/Technikfolgen sowie für Verkehr\nund digitale Infrastruktur. In 22 Monaten hielt ich 19 Reden, stellte 43\nschriftliche Fragen, 33 Kleine Anfragen, 5 Anträge und reichte einen\neigenen Gesetzentwurf ein. Es ging um Überwachung am Südkreuz, Open\nSource, das NetzDG, Hackbacks, IPv6, Künstliche Intelligenz, DNA\nAnalysen in der Stammbaumforschung, Uploadfilter, IT Sicherheit,\nImpressumpflichten, barrierefreie Notrufe, Whistleblower, Mobilfunk,\nOpen Data, KfZ Scanning, Funkzellenabfragen und stille SMS, digitale\nGewalt gegen Frauen, Bundeswehr bei re:publica, Verschlüsselung,\nLobbyregister, social Innovation und vieles mehr. Auf parlamentarischen\nReisen im Ausland lernte ich, wie weit das links regierte Uruguay in der\ndigitalen Bildung ist, wie man in Oman durch kluge Regulierung die\nFunklöcher auf dem Land los wurde und wie viele Lichtjahre wir vom\neGovernment in Dänemark entfernt sind. Seit 10 Jahren setze ich mich für\ntransparente und partizipative Politik ein. Jetzt will ich meine eigenen\nAnsprüche daran auch erfüllen. Ich berichte vor allem auf Twitter und\nInstagram live aus Ausschüssen, Anhörungen und von Parlamentarierreisen\nund greife Anregungen auf, die mich auf irgendeinem Kanal erreichen. Ich\nverstehe mich als Volksvertreterin im Wortsinn und möchte als\nNetzaktivistin ganz besonders Sprachrohr der Netzcommunity sein. Als\nPolitikerin einer Oppositionspartei kann ich Themen setzen und\nInformationen beschaffen, ich kann fiese Fragen stellen – in langen und\nkurzen Formaten und die Bundesregierung muss darauf antworten. In dieser\nSession werde ich Beispiele zeigen, über meine Pläne reden und Euch\nfragen, was Ihr schon immer von der Bundesregierung in Netzfragen wissen\nwollten, damit ich die GroKo weiter nerven kann und wir alle besser\nwissen, was sie tun.","original_language":"deu","persons":["Anke Domscheit-Berg"],"tags":["thms","50","Talk"],"view_count":450,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-09-05T02:45:02.666+02:00","length":3565,"duration":3565,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/50-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/50-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/50-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/50-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-50-als-netzaktivistin-im-bundestag-insider-einblicke-und-mitmachmglichkeiten","url":"https://api.media.ccc.de/public/events/c26d6ec7-2701-56dc-8110-9896c6f6a659","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":13},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":6},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":12},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":2},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":11},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":3},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":11},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":5},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":7},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":16},{"event_id":7440,"event_guid":"cf5d0389-ea8b-55d9-966c-2669e88de93a","weight":11},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":13},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":5},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":13},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":15}]},{"guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","title":"ZpS - Bildung einer kriminellen Vereinigung","subtitle":null,"slug":"thms-45-zps-bildung-einer-kriminellen-vereinigung","link":"http://talx.thm.cloud/thms/talk/QHMZQM/","description":"Zentrum für politische Schönheit\n\nDas Holocaustmahnmal Bornhagen des Zentrums für Politische Schönheit veranlasste den Kaisertreuen Staatsanwalt Martin Zschächner gegen jene Gruppe als \"kriminelle Vereinigung\" zu ermitteln - bzw: nicht zu ermitteln. Wie kam das Zentrum auf eine Liste mit der Al-Nusra-Front und was macht Zschächner heute? Eine reise in den tiefen rechten Sumpf der Thüringer Justiz.","original_language":"deu","persons":["Stefan","Jasser Almaamoun"],"tags":["thms","45","Talk"],"view_count":1398,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-25T00:00:05.424+01:00","length":1765,"duration":1765,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/45-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/45-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/45-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/45-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-45-zps-bildung-einer-kriminellen-vereinigung","url":"https://api.media.ccc.de/public/events/d6b8d105-2540-5f33-955a-f73ae31831ca","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":42},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":39},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":41},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":35},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":41},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":72},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":47},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":70},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":41},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":63},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":95},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":42},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":12},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":79},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":71},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":69},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":82},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":61}]},{"guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","title":"Blockchain: Proof of ignorance","subtitle":"With liberty and justice for some! ...a rant.","slug":"thms-39-blockchain-proof-of-ignorance","link":"http://talx.thm.cloud/thms/talk/WCSCAX/","description":"\u003cp\u003eA rant about liberty and autonomy for some! The Blockchain is celebrated for solving all the hard questions, trusted third-parties? Done! Supply-chain-control? Easy! Deliberation of the individual? Complete! But how come, that so many users move to Exchanges (Bitcoin), lawyers consider smart contracts not contracts (Etherium) and most other actually used Blockchains are either permissioned or private (read: databases). So, why does blockchain does not solve any problem and only grants liberty and autonomy for some \u0026ndash; the techies themselves? Come hear my take on this and let's debate the present misunderstanding of what the blockchain technology actually can deliver.\u003c/p\u003e","original_language":"eng","persons":["Rainer Rehak"],"tags":["thms","39","Talk"],"view_count":742,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-02-01T15:30:12.648+01:00","length":3235,"duration":3235,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/39-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/39-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/39-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/39-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-39-blockchain-proof-of-ignorance","url":"https://api.media.ccc.de/public/events/0ef9486d-7f7a-5298-9042-3e55c19768d2","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":5},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":4},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":5},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":20},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":13},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":30},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":5},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":16},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":26},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":16},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":13},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":13},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":16},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":2},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":17},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":8},{"event_id":7408,"event_guid":"ecc2fea1-4e7c-5dce-a88c-e808dd245271","weight":4},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":4},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":18},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":17},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":13},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":13},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":13},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":13},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":14},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":13},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":13},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":15},{"event_id":7460,"event_guid":"94273ff5-ae50-49bd-a892-5a5f2e8c8451","weight":13}]},{"guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","title":"Privacy leaks in smart devices: Extracting data from used smart home devices","subtitle":null,"slug":"Camp2019-10355-privacy_leaks_in_smart_devices_extracting_data_from_used_smart_home_devices","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10355.html","description":"Remember the good old fun sport, where people bought random hard drives from ebay and did forensics on them?\nDid you know you can do the same thing with used IoT devices too? Most end-users have no idea what kind of information their devices are storing and how to securely clean their devices (if that even is possible). Lets explore together what the risks are and how we can extract that data.\n\nMany IoT devices collect a lot of data and log files. Of course, most of this data is sent to the Cloud. However, often this data is also stored locally on the device and never deleted in the lifetime of those devices, not even on a factory reset (in contrast to Smart Phones nowadays). This might surprise many people, and especially\nend users might not be aware of that. Due to the design of IoT devices, there is usually no real way, like for notebooks or PCs, for end users to clean the devices before they sell them on eBay or discard them. The devices may hold sensitive information like Wi-Fi credentials, nearby access points, cloud communication log files, maps, or audio samples.\n\nIn this talk I will show some examples of interesting IoT devices from various vendors and how to extract the corresponding information.\nWe will use software methods (rooting) and hardware methods (flash dumping). Using this information, I will show how I am able to find the original owner of the device.  Also I discuss various challenges and tricks of the methods, and how to prevent this kind of data leakage for yourself.\n","original_language":"eng","persons":["Dennis Giese"],"tags":["camp19","10355","Security"],"view_count":909,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-02-23T13:15:08.445+01:00","length":3106,"duration":3106,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10355-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10355-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10355-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10355-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10355-privacy_leaks_in_smart_devices_extracting_data_from_used_smart_home_devices","url":"https://api.media.ccc.de/public/events/045e8a2c-63d0-4335-886e-cbd6323afc73","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":28},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":34},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":21},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":16},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":30},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":28},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":33},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":55},{"event_id":7370,"event_guid":"7c043172-6fbe-4a23-a990-69c5bcab8f5d","weight":19},{"event_id":7372,"event_guid":"a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","weight":12},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":33},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":31},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":43},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":43},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":41},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":33},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":37}]},{"guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","title":"Physical Unclonable Functions: The Future Technology for Physical Security Enclosures?","subtitle":null,"slug":"Camp2019-10326-physical_unclonable_functions_the_future_technology_for_physical_security_enclosures","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10326.html","description":"In this talk, I will give an overview of the past, present, and possible future of physical security enclosures, i.e., the physical boundary that protects Hardware Security Modules (HSMs) and separates the untrusted outside from the secret data inside the module. I will present an analysis of the hardware security features in some selected HSMs, ranging from sensitive carbon meshes, over light detectors, up to temperature sensors. Since the security of these solutions has recently been questioned and some of them have been discontinued, new technologies have been proposed by several research groups, which will be presented in the second half of my talk. I will give insight into the current research regarding future solutions whose security is based on Physical Unclonable Functions (PUFs). Via this technology, cryptographic keys are extracted from intrinsic manufacturing variation of the enclosure itself. Thus, a violation of the delicate enclosure results in immediate loss of information and thereby voids cryptographic keys - in theory. Finally, I will discuss existing drawbacks and issues which have to be resolved, which currently prevent PUFs from protecting HSMs.\n\nHardware Security modules (HSMs) in servers, such as for VPN or banking applications, are commonly protected via physical security enclosures. This boundary, which consists of a conductive mesh that entirely surrounds the module under protection, is continuously monitored to detect any physical intrusion and subsequently wipe critical data. Since attack tools have improved and some enclosure solutions have been discontinued, a desire for a new technology has emerged.\n\nAt first, I present state-of-the-art solutions for HSMs which conform up to the highest security level: FIPS 140-2 level 4. Knowledge about these solutions was gained by accurate disassembly of such modules, obtained via a famous online market place. While some solutions have a very delicate mesh surrounding the entire device, others have additional light and temperature sensors that are countermeasures against common physical attacks.\nHowever, many physical security enclosures have been discontinued, sometimes due to suspected insecurity, thus, there is demand for a successor.\n\nThe second part of my presentation focuses on a novel technology for enclosures, based on Physical Unclonable Functions (PUFs). These PUFs, which are currently investigated by several research groups, are uncontrollable minuscule manufacturing variations which are present, for example, in a conductive mesh of a security enclosure. One solution, that I am doing research at, is able to extract femto-farad (10^-15) capacitance variations from electric traces contained in the enclosure. Cryptographic keys are derived from the PUF which is subsequently used to encrypt the underlying system data. If an attacker damages the enclosure in an attempt to gain access, these delicate variations are altered, the key changes, and critical data cannot be recovered anymore.\nDespite PUFs provide real tamper-sensitive key storage, they are accompanied by some drawbacks, e.g., sensitivity to environmental conditions, aging, etc. which have to be tackled via additional means.\n\nFinally, I will discuss the current status of the development of PUF enclosures and outline the issues that have to be resolved to enable PUF-based security enclosures to secure future HSMs.\n\n(I will try to bring some real-world samples, so that there is the option to have a close look after the talk. However, I have to check this with my institute first.)\n\nAbout the presenter:\n\nI am currently doing my PhD at a research institute that focuses on embedded security. I am in the final phase of my dissertation about physical security enclosures, based on PUFs. This offers me a deep insight into the current development status of Physical Security Enclosures. In this talk, I want to share my experience with various solutions, from an analysis of a few up to the development of others. My goal is to discuss novel PUF-based solutions openly to raise awareness and to encourage more research into this interesting direction - from attacks up to countermeasures.","original_language":"eng","persons":["Johannes"],"tags":["camp19","10326","Security"],"view_count":288,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-04-04T12:45:03.845+02:00","length":2876,"duration":2876,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10326-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10326-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10326-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10326-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10326-physical_unclonable_functions_the_future_technology_for_physical_security_enclosures","url":"https://api.media.ccc.de/public/events/2d4d7279-ed46-431f-919b-ed5dccfd7c90","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":9},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":7},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":4},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":8},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":7},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":6},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":4},{"event_id":7427,"event_guid":"0d45023b-ddb8-4048-bf39-1bffc11ff097","weight":2},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":8},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":8},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":6},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":7},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":4},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":7},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":7},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":6},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":7},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":8},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":6}]},{"guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","title":"Sozial-ökologische Dimensionen von Digitalisierung","subtitle":null,"slug":"thms-41-sozial-kologische-dimensionen-von-digitalisierung","link":"http://talx.thm.cloud/thms/talk/VFBKTL/","description":"Der Vortrag soll einen Überblick über die sozialen und ökologischen Auswirkungen der Digitalisierung von Dienstleistungen oder Prozessen und der steigenden Vernetzung von elektronischen Geräten geben. Dabei spielt die materielle Basis von Digitalisierung mit der Rohstoffgewinnung und dem Ressourcenverbrauch eine entscheidende Rolle, sowie die enorm steigende Datennutzung. \nAnhand von Beispielen wird gezeigt, welche Rebound-Effekte in dem Zusammenhang bestehen und wie sie Effizienzsteigerungen zunichte machen.\n\nDer Titel bezieht sich auf das Versprechen der Dematerialisierung, welches oft mit Digitalisierung in Verbindung gebracht wird. Es soll kritisch hinterfragt werden, ob Digitalisierung dabei helfen kann, die Umwelt zu schonen, indem weniger Ressourcen verbraucht werden. Am Beispiel des Konsums wird gezeigt, dass die derzeitige Art von Digitalisierung die Umweltzerstörung vorantreibt, als sie zu verringern.","original_language":"deu","persons":["Anja"],"tags":["thms","41","Talk"],"view_count":257,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2025-12-02T17:00:08.812+01:00","length":2910,"duration":2910,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/41-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/41-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/41-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/41-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-41-sozial-kologische-dimensionen-von-digitalisierung","url":"https://api.media.ccc.de/public/events/74ebea5d-e24e-55a0-99a4-f13879394f48","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7365,"event_guid":"02e04525-2163-4080-bc88-f14d3ec30270","weight":1},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":11},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":1},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":7},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":11},{"event_id":7408,"event_guid":"ecc2fea1-4e7c-5dce-a88c-e808dd245271","weight":13},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":8},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":4},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":10},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":8},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":11},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":8},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":9}]},{"guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","title":"Achtung, Datenpannen!","subtitle":"Die große Datenschutz- und DSGVO-Show","slug":"Camp2019-10344-achtung_datenpannen","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10344.html","description":"\u003cp\u003eEine Mischung aus einem Vortrag und einer Spiel- und Lernshow rund um die Datenschutz-Grundverordnung, die spielerisch Wissenswertes rund um Datenschutz und die Datenschutz-Grundverordnung vermittelt – anhand von tatsächlichen Beratungsanfragen und Datenpannen-Meldungen, die tagtäglich bei den Aufsichtsbehörden eingehen. Im Stil der Spielshow „Der Große Preis“ stehen Kandidaten Rede und Antwort zu skurrilen Fällen und heiß diskutierten Problemen rund um Datenschutz, technischen Maßnahmen und die DS-GVO.\u003c/p\u003e\n\n\n\u003cp\u003eBei Diskussionen über Datenschutz kommen technische Maßnahmen aus dem Bereich der IT-Sicherheit bisher oftmals viel zu kurz. Dabei können fehlende oder falsch implementierte Maßnahmen Sanktionen der Aufsichtsbehörden nach sich ziehen.\u003c/p\u003e\n\u003cp\u003eDie große \u003cstrong\u003eDatenschutz- und DSGVO-Show\u003c/strong\u003e vermittelt auf spielerische Weise rechtliche, technische und praktische Hilfe rund um Datenschutz und die EU-Datenschutz-Grundverordnung. \u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eWelche Verschlüsselungs-Verfahren muss ein Datenverarbeiter verwenden, um kein Bußgeld zu riskieren?\u003c/li\u003e\n\u003cli\u003eErfüllt ein verschlüsselter ZIP-Anhang in einer E-Mail die Anforderungen der DS-GVO auf „Sicherheit der Verarbeitung“?\u003c/li\u003e\n\u003cli\u003eOder die „bisher ungeknackte Vollbitverschlüsselung“?\u003c/li\u003e\n\u003cli\u003eIst ein Messenger-Dienst „sicher“, wenn er Telefonnummern als SHA-256-Hash speichert?\u003c/li\u003e\n\u003cli\u003eMuss ein Online-Shop wirklich alle Kunden informieren, wenn „ein Hacker“ erfolgreich „nur die E-Mail-Adressen der Kunden“ kopiert hat?\u003c/li\u003e\n\u003cli\u003eUnd was ist mit Google Analytics oder Facebook-Plugins auf Websites?\u003c/li\u003e\n\u003cli\u003eWelche Rechte hat ein Betroffener gegenüber Datenkraken?\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eDie Moderatoren sind der \u003cem\u003eLandesbeauftragte für den Datenschutz und die Informationsfreiheit Baden-Württemberg\u003c/em\u003e Stefan Brink und zwei Referenten und berichten aus der praktischen Arbeit einer Aufsichtsbehörde. Vor und während dem eigentlichen Quiz geben sie eine kurze Einführung über häufige Datenpannen-Meldungen, rechtliche Grundlagen, Hinweise zu technischen Maßnahmen nach Artikel 32 DS-GVO und die oftmals schwierige Risikoabschätzung.\u003c/p\u003e\n\n\u003cp\u003eIm Quiz selbst müssen die Kandidaten in ihren Antworten praktische Lösungsvorschläge für häufige technische und rechtliche Probleme vorschlagen, zum Beispiel welche technischen Maßnahmen bei bestimmten Datenpannen nach dem „Stand der Technik“ angebracht sind, ob man als Website-Betreiber denn nun Google Analytics nutzen darf oder wie man sich gegen rechtswidrige Datensammler wehrt. Dadurch können Teilnehmer wie Zuschauer die praktische Anwendung der DS-GVO spielerisch lernen.\u003c/p\u003e\n","original_language":"deu","persons":["Alvar C.H. Freude","Stefan Brink"],"tags":["camp19","10344","Entertainment"],"view_count":3572,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-02-23T11:15:11.279+01:00","length":6495,"duration":6495,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10344-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10344-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10344-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10344-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10344-achtung_datenpannen","url":"https://api.media.ccc.de/public/events/ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":96},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":99},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":107},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":83},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":72},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":43},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":91},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":46},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":172},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":81},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":41},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":29},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":183},{"event_id":7376,"event_guid":"36b973e6-6203-4506-9317-4959d04ce0d0","weight":27},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":33},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":198},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":107},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":171},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":99},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":32},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":71},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":30},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":130},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":27},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":113},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":108},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":70},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":56},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":154},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":92}]},{"guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","title":"A mobile phone that respects your freedom","subtitle":"Experiences and lessons learned from 2 years of development and still ongoing","slug":"Camp2019-10238-a_mobile_phone_that_respects_your_freedom","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10238.html","description":"Motivation and challenges building a mobile phone that respects your freedom, privacy and digital rights - and is hackable. This talk will present a summary of a two year journey, which is still ongoing.\n\nToday mobile phones are _the_ computing device of the decade, maybe even of this century. Almost everyone carries one, every day to every place. They are pretty much always connected and we entrust almost our entire digital life to them - any form of communication (voice, text, video), all kinds of entertainment (reading, web surfing, video/movies), personal information (address books, social media), location (navigation, location sharing) etc. Pretty much our entire digital life is mirrored by these devices and to a growing extent happening right on them.\nWhat is often not fully recognized is that this huge ecosystem of mobile hard- and software is controlled by only a very few globe spanning companies. Our digital life is to a large part controlled by these companies and currently there is little way around them.\n\nThis talk will present the experiences we had and have in this industry creating a mobile phone that is running 100% free software, respects the user's digital rights and gives back full control over data and communication to the user - by separating radios from the main CPU, by providing hardware kill switches and by using only free software for the full stack. We will also talk about the huge challenges encountered, from CPU choice to radio choice up through the software stack. It will also share our approaches to solve these challenges and share experience in working with hardware manufacturing companies (globally), from electronics design to product manufacturing.","original_language":"eng","persons":["Nicole Faerber"],"tags":["camp19","10238","Hardware \u0026 Making"],"view_count":14592,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-24T04:15:03.899+01:00","length":2700,"duration":2700,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10238-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10238-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10238-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10238-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10238-a_mobile_phone_that_respects_your_freedom","url":"https://api.media.ccc.de/public/events/e988c76b-3a47-46de-a2c7-77c49a5e731b","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":123},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":137},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":89},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":86},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":54},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":38},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":78},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":39},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":74},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":222},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":93},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":43},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":54},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":136},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":32},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":81},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":126},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":111},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":33},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":34},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":198},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":34},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":32},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":70},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":93},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":98},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":42},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":69},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":41},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":34},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":102},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":73}]},{"guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","title":"Robotron ","subtitle":"a tech opera","slug":"Camp2019-10293-robotron","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10293.html","description":"In den letzten 2 Jahren habe ich mich in meiner künstlerischen Arbeit mit der Computerherstellung in der DDR beschäftigt. Technikproduktion in der DDR war durch Planwirtschaft und dem COCOM-Hochtechnologieembargo besonderen Bedingungen unterworfen. Entlang der künstlerischen Ausseinandersetzung möchte ich in dem Vortrag ein Bild über Ostdeutsche Computertechnologie nachzeichnen.\n\nDie Web Serie Robotron – a tech opera spielt im VEB Kombinat Robotron, dem größten Computerhersteller der ehemaligen DDR und einer der bedeutendsten Produzenten von Informationstechnologie im sozialistischen Osteuropa. Anhand der eigenen Familiengeschichte zeichne ich eine Technikgeschichte nach die heute niemanden mehr interessiert. Weil sie nicht der Logik einer Erfolgsgeschichte entspricht und es sich bereits um obsolete Technik handelt. \n\nAls zeitgenössisches Netzformat tauchen in den meisten ASMR Videos nur aktuelle High-tech Utensilien auf um Tingles (Kopfkribbeln) hervorzurufen. In Soft Nails ~ ♥ [ASMR] Kleincomputer Robotron KC87 ♥ greife ich bewusst auf High-tech aus der DDR zurück und überführe sie in ein popkulturelles Format. Der Versuch einer gängigen US-amerikanischen Technikerfolgsgeschichte ein alternatives Narrativ entgegensetzen/ hinzufügen.\n\nIn der Arbeit The Adventures of WH beschäftige ich mich in Kollaboration mit der Künstlerin Anne Baumann, mit Werner Hartmann (1912 - 1988), mein Stiefopa und der Begründer der Mikroelektronik in Ostdeutschland. Von 1961 – 1974 war er Leiter der AME, auch genannt AMD (Arbeitstelle für Molekularelektronik Dresden). Werner Hartmann gehörte einer wissenschaftlichen Elite in der DDR an und wurde aufgrund seiner Parteilosigkeit seit 1965 in der DDR systematisch beschattet und sogar 1974 wegen Spionage-Vorwürfen als Direktor der Arbeitsstelle für Molekularelektronik in Dresden suspendiert. Die Stasi hat 49 Ordner zur Überwachung von WH angelegt. Parallel legte WH ein Archiv mit seinen Memoiren (wissenschaftl. Tätigkeit in der Nazizeit, Sowjetunion und der DDR) sowie seinen Gedanken zur Mikroelektronik, u.a. an.","original_language":"deu","persons":["Nadja Buttendorf"],"tags":["camp19","10293","Art \u0026 Culture"],"view_count":1130,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-16T22:30:08.359+01:00","length":1925,"duration":1925,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10293-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10293-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10293-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10293-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10293-robotron","url":"https://api.media.ccc.de/public/events/acc3dd01-bec3-444f-80c1-5dd37f522aa4","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":44},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":47},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":43},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":40},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":72},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":37},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":52},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":42},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":81},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":70},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":62},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":107},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":38},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":70},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":56},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":57}]},{"guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","title":"Wo lässt Du zwecklose Widerstände?","subtitle":null,"slug":"thms-14-wo-lsst-du-zwecklose-widerstnde-","link":"http://talx.thm.cloud/thms/talk/ASYLJ8/","description":"Einladung zu einer qualitativen Studie über den Umgang mit Elektroschrott auf dem CCCamp\n\nFür meine Hausarbeit in Umweltpsychologie rede ich mit Hardware-Leuten über Müll. Hier möchte ich meine Studie vorstellen und Dich zu einem lockeren Interview einladen.\n\nSchon im heimischen Hackerspace können Entsorgungskonzepte an unausgesprochenen Hindernissen scheitern: Niemand will die Öko-Spießer-Nervensäge spielen, wenn nach dem Löt-Workshop der Boden gefegt wird. Den Elektroschrott-Eimer wegzubringen, gilt als Strafarbeit. Hoppla, schon wieder im Halbschlaf Pizza- und Löt-Ofen verwechselt...\n\nHier auf dem Camp ist es noch härter, denn die nächste legale Entsorgungsmöglichkeit ist mehrere Kilometer entfernt. Deshalb interessiert mich, wie Du hier wirklich, echt, ehrlich mit kaputten Platinen und Bauteilen umgehst. Was (de-)motiviert Dich, alles ordentlich wieder mitzunehmen? Was könnte Dich auf zukünftigen Events antreiben, \"sauberer\" zu hacken - und was Dir helfen, das tatsächlich zu schaffen?\n\nDer Kurzvortrag gibt einen Einstieg ins Thema und erklärt, was ich vorhabe, wenn ich Dich plötzlich auf dem Campgelände anspreche.","original_language":"deu","persons":["coco"],"tags":["thms","14","Talk"],"view_count":309,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-01-29T08:30:06.506+01:00","length":832,"duration":832,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/14-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/14-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/14-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/14-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-14-wo-lsst-du-zwecklose-widerstnde-","url":"https://api.media.ccc.de/public/events/d1d313f5-926b-5357-b764-4c85cb9dddfc","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":12},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":17},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":25},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":20},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":2},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":18},{"event_id":7408,"event_guid":"ecc2fea1-4e7c-5dce-a88c-e808dd245271","weight":2},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":12},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":12},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":18},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":18},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":17},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":17},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":8}]},{"guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","title":"Love, CyBorgs, Art and Open Source – an artistic approach on how to stay golden","subtitle":"How to educate society through the language of art","slug":"Camp2019-10381-love_cyborgs_art_and_open_source-_an_artistic_approach_on_how_to_stay_golden","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10381.html","description":"Here we are, a new generation. Actually not only that, we are moving forward in evolution. The Antropocene is screaming for action, but -  „Yeah right, I know... we‘re working on it!“ she told me. Does Sophia really know? Do I care? 42?\n\nIn some people‘s minds, utopian thoughts are blizzering around in thunderstorms of beautiful insanity, yet unfortunately  some others‘ minds seem to be hopeless cases if it comes to the essential understanding of problems. Sure, everyone knows what we‘re talking about. In theory, there is a strong need to change things, not only concerning politics, philosophy, art or physics: almost every academic discipline seems to grow some kind of interdisciplinary necessity into an important status. Sadly, the worlds` leaders suck horribly at reaching any fair and positive social state for all the inhabitants of this beautiful planet. But, since education can be based on solidarity, and swarm intelligence apparently grows into neural networks, there is no better time to sit down and talk about all those moral problems than now. Any change needs to be made by an individual, as far as we know. Let‘s get together, exchange knowledge, fight in peace and use the language of conceptual art as a weapon!","original_language":"eng","persons":["Lio"],"tags":["camp19","10381","Art \u0026 Culture"],"view_count":124,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2023-12-30T04:45:03.464+01:00","length":1839,"duration":1839,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10381-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10381-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10381-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10381-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10381-love_cyborgs_art_and_open_source-_an_artistic_approach_on_how_to_stay_golden","url":"https://api.media.ccc.de/public/events/2fe00b49-1471-4c79-8a75-8da73f71b63d","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":3},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":2},{"event_id":7372,"event_guid":"a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","weight":2},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":3},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":5},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":5},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":5},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":3},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":5},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":4},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":5},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":9},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":5},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":5},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":5},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":5},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":5},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":7},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":4},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":7},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":5},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":2},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":3}]},{"guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","title":"75 Jahre Journalismus im WWW","subtitle":"the untold stories","slug":"Camp2019-10210-75_jahre_journalismus_im_www","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10210.html","description":"Detlef Borchers, Peter Glaser und Erich Moechel erzählen, was sie im digitalen Neolithikum gesehen und erlebt, aber nie geschrieben haben. Episoden aus der Frühzeit über Gier \u0026 Dummheit \u0026 Illusionen bis die Dot.com-Blase brannte \u0026 die Datengeilheit in die digitale Welt kam. Geschichten aus den \"Crypto Wars\" samt schrägen Begegnungen mit Schattenmenschen, wie schnell man in was hineingeschlittert wurde \u0026 was dabei kaputtging. Wie das WWW halt wurde, was es heute ist.\n\n\nDer genauere Inhalt musst erst gemeinsam festgelegt werden, es wird auch Bilder geben. Sicher ist, wir werden Klartext reden, wobei auch ein Outing nicht auszuschließen ist.  ","original_language":"deu","persons":["Erich Moechel","Detlef Borchers","peter"],"tags":["camp19","10210","Entertainment"],"view_count":471,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-03-10T18:00:07.347+01:00","length":2716,"duration":2716,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10210-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10210-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10210-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10210-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10210-75_jahre_journalismus_im_www","url":"https://api.media.ccc.de/public/events/3ecdc823-95bb-4654-ad74-6eedb93dc1ed","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":14},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":9},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":18},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":14},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":27},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":65},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":27},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":14},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":30},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":25},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":15},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":16},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":16},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":18},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":19}]},{"guid":"a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","title":"Math Protected Social Interactions","subtitle":null,"slug":"Camp2019-10286-math_protected_social_interactions","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10286.html","description":"We have learned that Math might be our last defence line against\na real existing all-encompassing surveillance. One central challenge\nin this conflict is to combine authentication and anonymity.\nNumber theory provides us many tools to create really surprising\ntechnologies for social communication. A lot of these technologies\nhave not yet been brought to the world of concrete implementations.\nThis has the implication that some ideas which have been presented\nyears ago are not covered by patents any more.\n\n\nWe have learned that Math might be our last defence line against\na real existing all-encompassing surveillance. One central challenge\nin this conflict is to combine authentication and anonymity.\nNumber theory provides us many tools to create really surprising\ntechnologies for social communication. A lot of these technologies\nhave not yet been brought to the world of concrete implementations.\nThis has the implication that some ideas which have been presented\nyears ago are not covered by patents any more.\n","original_language":"eng","persons":["ruedi"],"tags":["camp19","10286","Security"],"view_count":283,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2025-12-12T14:00:08.767+01:00","length":2325,"duration":2325,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10286-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10286-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10286-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10286-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10286-math_protected_social_interactions","url":"https://api.media.ccc.de/public/events/a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":6},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":11},{"event_id":7365,"event_guid":"02e04525-2163-4080-bc88-f14d3ec30270","weight":11},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":11},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":6},{"event_id":7370,"event_guid":"7c043172-6fbe-4a23-a990-69c5bcab8f5d","weight":13},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":21},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":6},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":11},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":21},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":15},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":12},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":15},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":18}]},{"guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","title":"Wisdom of OS","subtitle":"An Inquiry into the Limits of the Possible","slug":"Camp2019-10202-wisdom_of_os","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10202.html","description":"Klimakrise, Artensterben, die Grundlagen des Leben – unsere Herausforderungen sind dringend, global und komplex. Seit dem Anthropozän wissen wir, dass der Planet in unserer Hand liegt. Jetzt müssen wir unsere Köpfe zusammenstecken und gemeinsam Lösungen entwickeln. Anknüpfend an historischen Konzepte von einer das Weltwissen allgemein zugänglich machenden World Encyclopedia und des künstlich intelligenten Word Brain kann eine interdisziplinäre Betrachtung durch unterschiedliche Herangehensweisen spannende neue Sichtweisen eröffnen.\n\nDie Wahrnehmung von Betriebssystemen als Schnittstelle zwischen Mensch und Maschine, die Auswirkung von Softwarelizenzen auf die Gestaltung der Verhältnisse zwischen Maschinen, Menschen, Firmen und Staaten und die mit einer weltweiten Vernetzung entstehenden Chancen und Risiken können aus Hackersicht von einem sehr technischen Startpunkt analysiert werden.\n\nDas Anthropzän verlangt den Übergang in die Noosphäre. Und das heißt, wir müssen das  Urheberrecht als juristisches Betriebssystem unserer Wissensordnung in Ordnung bringen, das Netz als seine technische Infrastruktur redezentralisieren und semantifizieren, unser wissenschaftliches, journalistisches und künstlerisches Sensorium stärken und Werkzeuge entwickeln, die es uns erlauben, gemeinsam zu denken und zu enstscheiden. Mehr als künstliche brauchen wir menschliche kollektive Intelligenz, um die Betriebssysteme unserer Gesellschaft mit kollektiver Weisheit auszustatten.","original_language":"deu","persons":["vgrass","ruedi"],"tags":["camp19","10202","Ethics, Society \u0026 Politics"],"view_count":190,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-09-19T09:30:10.378+02:00","length":2889,"duration":2889,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10202-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10202-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10202-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10202-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10202-wisdom_of_os","url":"https://api.media.ccc.de/public/events/c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":8},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":6},{"event_id":7402,"event_guid":"b516cbe6-9225-449a-9298-1bb1a2fdb3c6","weight":7},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":8},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":9},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":7},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":12},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":8},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":8},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":8}]},{"guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","title":"Logbuch:Netzpolitik 311","subtitle":"I love you but I have chosen Datenschutz","slug":"thms-7-logbuch-netzpolitik","link":"http://talx.thm.cloud/thms/talk/LJQNKC/","description":"Logbuch:Netzpolitik ist ein in der Regel wöchentlich erscheinender Podcast, der im Dialog zwischen Linus Neumann und Tim Pritlove die wichtigsten Themen und Ereignisse mit netzpolitischem Bezug aufgreift und diskutiert.\r\n\r\nhttps://logbuch-netzpolitik.de/lnp311-i-love-you-but-i-have-chosen-datenschutz\r\n\r\nEs war wieder Camp und es war wieder einmal das tollste Camp, was es je gab. Und Logbuch:Netzpolitik war mit dabei auf der Bühne des wundervollen Three Headed Monkeys Village. Und wie so oft haben wir wieder ein paar Gäste dabei, die die Grenzen zwischen Kunst und Aktivismus verschwimmen lassen. Wir sprechen mit Markus und Johannes über ihre Analysen der Twitter-Aktivitäten von dem ehemaligen Verfassungsschutz-Chefs Maaßen und mit Sofia und Viktor von der Digitalen Freiheit, die auch noch gemeinsam als Band auftreten.","original_language":"deu","persons":["Linus Neumann","Tim Pritlove"],"tags":["thms","7","Entertainment"],"view_count":3377,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-02-05T23:30:06.906+01:00","length":3533,"duration":3533,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/7-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/7-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/7-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/7-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-7-logbuch-netzpolitik","url":"https://api.media.ccc.de/public/events/49498e74-3b88-599b-9fb5-f28663b3c8bc","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":46},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":49},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":16},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":49},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":41},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":88},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":69},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":60},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":108},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":41},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":51},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":81},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":4},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":6},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":46},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":79},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":58},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":328},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":4},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":66}]},{"guid":"0850ac34-342c-4352-89d5-6c31f0f1fe6b","title":"schleuderpackung 2.0","subtitle":"TeXnische Aspekte und Umsetzung in der DS-Redaktion","slug":"Camp2019-10223-schleuderpackung_2_0","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10223.html","description":"Technischer Überblick zum Build-Prozess der Datenschleuder. Vom LaTeX-Backend (schleuderpackung) über Continous Integration (Zentrifuge) zum PDF, Epub und HTML-Auszügen.\n\nSeit der Reanimation der Datenschleuder sind bisher drei Ausgaben erschienen. In dieser Zeit hat sich der technische Prozess deutlich professionalisiert. Der Vortrag gibt einen kurzen Überblick über die Redaktionsarbeit und fokussiert sich anschließend auf die TeXnische Umsetzung inklusive des Buildsystems und der unterschiedlichen Ausgabemodi (PDF/ePUB/HTML).\n\nDie Anwendung auf allgemeinere Zeitschriftenprojekte wird am Beispiel des Forks einer Schülerzeitung gezeigt und mit dem geplanten Release  zum Camp bietet sich damit die Möglichkeit der Nutzung für eigene Zeitschriftenprojekte. \n\nDarüber hinaus liefert der Vortrag durch die Struktur der Schleuderpackung einen Einblick in aktuelle Entwicklungen aus dem LaTeX-Umfeld, wie expl3 Programmierung, die Lua Kopplung und die weitere Planung in Richtung Barrierefreiheit.","original_language":"deu","persons":["marei"],"tags":["camp19","10223","2019","CCC"],"view_count":319,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-31T02:00:00.000+02:00","updated_at":"2025-11-23T18:00:05.016+01:00","length":2369,"duration":2369,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10223-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10223-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10223-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10223-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10223-schleuderpackung_2_0","url":"https://api.media.ccc.de/public/events/0850ac34-342c-4352-89d5-6c31f0f1fe6b","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":6},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":7},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":5},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":3},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":6},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":9},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":12},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":4},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":11},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":7},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":7},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":7},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":8},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":8},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":10},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":7},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":8},{"event_id":7460,"event_guid":"94273ff5-ae50-49bd-a892-5a5f2e8c8451","weight":7},{"event_id":7761,"event_guid":"ebffdad1-55ef-4b66-b7cd-a170c801c147","weight":7}]},{"guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","title":"The Great British Drone Panic","subtitle":"Asking for better standards of official investigation and media reporting into British drone incident stories.","slug":"Camp2019-10235-the_great_british_drone_panic","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10235.html","description":"Looking at the sorry saga of drone incident reports and drone-related airport closures in the UK, and shining a light on the woefully poor quality of official investigations, police response, and media reporting.\n\nOver the last few years the UK has seen a public moral panic over reported air proximity incidents between drones and aircraft, including highly-publicised closures of major airports. This has resulted in ever more stringent rules being proposed for drone and multirotor hobbyists. Unfortunately while there have been a lot of reports and a huge amount of hype, in none of the cases has any tangible evidence or proof been produced. Reading official reports raises only questions about their woeful inadequacy, police responses have been ham-fisted and incompetent, and media reporting has been sensationalist and devoid of factual basis or responsible investigation. This talk is built upon several years of reporting on these stories, and aims to throw some light upon the whole sorry saga.","original_language":"eng","persons":["JennyList"],"tags":["camp19","10235","Ethics, Society \u0026 Politics"],"view_count":1143,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-13T05:30:04.147+01:00","length":2608,"duration":2608,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10235-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10235-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10235-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10235-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10235-the_great_british_drone_panic","url":"https://api.media.ccc.de/public/events/97576344-49ba-4fd0-a2e5-9af7923fbffb","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":45},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":50},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":46},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":60},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":40},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":52},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":66},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":38},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":36},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":50},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":43}]},{"guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","title":"Privacy: An Unequally Distributed Resource","subtitle":"A Study of Privacy as Privilege in Our World","slug":"Camp2019-10192-privacy_an_unequally_distributed_resource","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10192.html","description":"In this talk, we'll investigate how privacy has become an indicator of privilege in our world. Does everyone have equal access to privacy? How does unequal privacy affect the lives of people? Should we treat privacy like other privileges (i.e. wealth, race, gender)? If we have access to privacy, is this something we can share? By the end of the talk, we'll have explored how the concept of privacy has changed, what we can do about these changes and some practical steps for making privacy more accessible for those who most need it.\n\n\nThis is not your average privacy talk. This is, instead, a study of how the word and concept of privacy has changed over time. These changes, which are in part our own creation, have enabled privacy to be both unequally applied and co-opted by a variety of companies and movements. In this lecture, we’ll discuss the following questions:\n\n- What is privacy in our current society?\n- How has our understanding of privacy changed over time?\n- Does everyone have equal access to privacy? Why or why not?\n- Who is most impacted by the rise of technological surveillance?\n- How can we use our privilege to help protect others’ privacy?\n\nWho should attend:\n\n- People interested in privacy regardless of \"professional\" knowledge or level of experience\n- Folks doing anti-oppression work\n- People who already disagree with me after reading this abstract :-D\n\nWhile the format is a lecture, I hope we can find an open space afterwards to continue debating and discussing these questions and the theme as a whole. My goal is to help educate and inspire work around privacy that benefits not just those who attend the Camp, but instead reaches beyond our privacy-aware social circles, to help those who do not have access to privacy. ","original_language":"eng","persons":["Katharine Jarmul"],"tags":["camp19","10192","Ethics, Society \u0026 Politics"],"view_count":175,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-10T14:45:17.026+01:00","length":2727,"duration":2727,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10192-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10192-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10192-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10192-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10192-privacy_an_unequally_distributed_resource","url":"https://api.media.ccc.de/public/events/b1fc7b95-1b31-4504-9b67-e9d766b40f73","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7364,"event_guid":"0a99f1db-dfad-4534-888c-bd98acc576b3","weight":7},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":8},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":4},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":6},{"event_id":7394,"event_guid":"14a2c922-697c-4073-885c-568850a390a7","weight":4},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":5},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":3},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":3},{"event_id":7406,"event_guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","weight":6},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":6},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":6},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":6},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":8},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":8},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":3},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":7},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":10},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":3},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":5},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":3},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":5}]},{"guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","title":"Dissecting the AMD Platform Security Processor","subtitle":null,"slug":"thms-38-dissecting-the-amd-platform-security-processor","link":"http://talx.thm.cloud/thms/talk/LEA7LY/","description":"The AMD Platform Security Processor (PSP) is a security subsystem in AMD CPUs comparable to the Intel ME and was introduced in 2013. It is essential for system startup – in fact, in runs before the main processor is even started – and offers runtime services to the main processor. For this, it has full access to the system memory space (inlcuding MMIO).\n\nThe PSP runs undocumented, proprietary firmware. This talk presents efforts of investigating what the PSP does and if it's secure. For the first time, it documents the PSP firmware's proprietary filesystem and provides insights into reverse-engineering such a deeply embedded system as the PSP. The talk further sheds light on how we might regain trust in AMD CPUs despite the delicate nature of the PSP.\n\nWith the ongoing digitalization, not only the number of IT systems is increasing in many domains, but also the amount of software and hardware that forms the trusted computing base of an application. Applications in industrial systems, infrastructure and consumer electronics rely on the security of these systems. Emerging security technologies try to mitigate the risk of insecure software and hardware by embedding secure components into these untrusted systems. \n\nAMD introduced the AMD Secure Processor to provide a trusted execution environment for critical operations. This talk comprehensively analyzes the undocumented and largely unknown security co-processor and discovers its inner workings. It aims to find out if it is able to keep its promise – or if it opens up another attack vector.","original_language":"eng","persons":["Christian Werling","Robert Buhren"],"tags":["thms","38","Talk"],"view_count":2138,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-04-04T17:45:03.882+02:00","length":2962,"duration":2962,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/38-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/38-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/38-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/38-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-38-dissecting-the-amd-platform-security-processor","url":"https://api.media.ccc.de/public/events/4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":13},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":13},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":1},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":1},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":27},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":14},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":13},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":9},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":5},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":9},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":1},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":8},{"event_id":7400,"event_guid":"e9010267-d885-4982-92ff-4341dff3d5ea","weight":1},{"event_id":7402,"event_guid":"b516cbe6-9225-449a-9298-1bb1a2fdb3c6","weight":5},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":11},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":15},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":1},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":10},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":9},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":10},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":9}]},{"guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","title":"Technopolice: calling out so-called \"Safe Cities\"","subtitle":"Decentralising the fight against automated surveillance in cities.","slug":"Camp2019-10329-technopolice_calling_out_so-called_safe_cities","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10329.html","description":"In many French cities (and beyond), mayors are pushing towards \"safe Smart Cities\", pushing for technology everywhere. Microphones, video-surveillance, automated drones, facial recognition, machine learning is the recipe of their fantasised secure city.\n\nThis talk will introduce Technopolice, the new campaign from La Quadrature du Net, its goals, its tools, and the way we will make it happen.\n\nAll over the French territory, the “Smart City” is slowly revealing its true colours: a complete and constant surveillance of the urban area for police purposes, based on partnerships between industrial companies such as Thalès or Engie and the cities themselves.\u003c/br\u003e\n\nMultiple cities are experimenting \"smart\" videosurveillance based on automated treatment of videos, in order to make face recognition or detecting behaviours deemed to be abnormal. Another city is teaming up with a start-up to deploy microphones and drones in the city. The idea is to detect so-called abnormal sounds to alert the\npolice, which can then use video-surveillance to check if a patrol is needed or not. The city of Nice wants to have its own custom citizen reporting application. Marseille wants to use AI and Big Data to predict behaviours\nand to help in decision making.\u003c/br\u003e\n\nThis is what they want our future to be: a huge automated surveillance system, with behaviour analysis, emotion recognition, pre-emption of threats, automation of the police, repression of any unwanted behaviour.\u003c/br\u003e\n\nThis comes at a huge cost: instead of the \u003ci\u003e polis \u003c/i\u003e, which means Democratic City, a place to stroll around, to meet and gather, we will have a dehumanised, unwanted place, a place to experiment the most advanced forms of social control: there is no such as surveilling just \"to look\", our behaviours are modified just by knowing we are being surveilled. Not to mention the financial and experimental cost of such an architecture.\u003c/br\u003e\n\nIn this talk, I will detail the \"Technopolice\" campaign, its importance for every single human being willing to protect their freedom of movement and right to exist without being constantly subjected to surveillance. I'll explain the importance of decentralising such a campaign, and how we will try to federate the data and the organisations around this project.\u003c/br\u003e","original_language":"eng","persons":["Guinness"],"tags":["camp19","10329","Ethics, Society \u0026 Politics"],"view_count":164,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-01-06T18:15:14.548+01:00","length":2392,"duration":2392,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10329-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10329-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10329-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10329-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10329-technopolice_calling_out_so-called_safe_cities","url":"https://api.media.ccc.de/public/events/a296ba81-78b7-4500-be34-5f80d0a329c7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":7},{"event_id":7388,"event_guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","weight":7},{"event_id":7418,"event_guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","weight":8},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":3},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":6},{"event_id":7427,"event_guid":"0d45023b-ddb8-4048-bf39-1bffc11ff097","weight":2},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":8},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":8},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":3},{"event_id":7440,"event_guid":"cf5d0389-ea8b-55d9-966c-2669e88de93a","weight":9},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":7},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":6},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":3},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":5}]},{"guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","title":"#Fusionbleibt","subtitle":"Wie das Fusion Festival sich erfolgreich gegen anlasslose Polizeipräsenz wehren konnte.","slug":"Camp2019-10438-fusionbleibt","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10438.html","description":"Polizeiwache mitten auf dem Festival? Wasserwerfer? Räumpanzer? WTF?? dachte sich da auch das Fusion Festival. Der Kampf gegen die absurden Pläne von Polizeipräsident Nils Hoffmann-Ritterbusch konnte zum Glück gewonnen werden. Und ist ein Lehrstück dafür, dass zivilgesellschaftlicher Druck eben doch Berge versetzen kann. Wir lassen Drohungen, Protest und Absurditäten aus diesem Lehrstücks gemeinsam Revue passieren. Und ja: es darf gelacht werden.","original_language":"deu","persons":["Stefan Pelzer"],"tags":["camp19","10438","Ethics, Society \u0026 Politics"],"view_count":855,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-02-03T21:15:09.080+01:00","length":3069,"duration":3069,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10438-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10438-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10438-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10438-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10438-fusionbleibt","url":"https://api.media.ccc.de/public/events/b4e3314b-cab3-4eb4-b69a-49c461bcc30c","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":26},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":22},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":3},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":3},{"event_id":7402,"event_guid":"b516cbe6-9225-449a-9298-1bb1a2fdb3c6","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":25},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":33},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":3},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":32},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":71},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":33},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":27},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":3},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":20}]},{"guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","title":"Zombie Apocalypse vs. International Health Regulations","subtitle":"Introducing a very important piece of international law and how to circumvent it","slug":"Camp2019-10367-zombie_apocalypse_vs_international_health_regulations","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10367.html","description":"The little known International Health Regulations are Earth's last defence line against world-wide health risks. I discuss how they would perform during a Zombie Apocalypse.\n\nThe International Health Regulations (IHR) are a piece of legally binding, international law that (theoretically) all countries have to adhere to. After the catastrophic 2003 SARS outbreaks, unlikely partners such as the USA and Iran, together with 192 other member states of the World Health Organisation, agreed upon these rules that entered into force in 2007. This set of rules aims to prevent international spread of health risks (usually communicable diseases) while balancing international travel and, of course, trade. \nI will use the popular Zombie Apocalypse metaphor to illustrate the various prevention mechanisms of the IHR and how they were (and will be) circumvented by past and future epidemics. \n","original_language":"eng","persons":["florian"],"tags":["camp19","10367","Ethics, Society \u0026 Politics"],"view_count":293,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2025-09-22T20:15:07.838+02:00","length":2558,"duration":2558,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10367-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10367-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10367-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10367-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10367-zombie_apocalypse_vs_international_health_regulations","url":"https://api.media.ccc.de/public/events/823efec2-9c83-45d6-bec9-6a07db561cc2","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":11},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":14},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":11},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":14},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":15},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":14},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":11},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":11},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":11},{"event_id":7400,"event_guid":"e9010267-d885-4982-92ff-4341dff3d5ea","weight":7},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":11}]},{"guid":"94273ff5-ae50-49bd-a892-5a5f2e8c8451","title":"Ethikrichtlinien für Künstliche Intelligenz? Wie wär's mit Gesetzen?","subtitle":"Wie die Industrie mit Debatten um \"ethische KI\" Zeit kauft","slug":"Camp2019-10231-ethikrichtlinien_fur_kunstliche_intelligenz_wie_war_s_mit_gesetzen","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10231.html","description":"Bisweilen kann man sich des Eindrucks nicht erwehren, jede zweite Woche würde eine neue, wachsweiche Selbstverpflichtung für den ethischen Einsatz von Algorithmen bekanntgegeben. Privatwirtschaftliche wie öffentliche Organisationen übertrumpfen sich geradezu dabei zu betonen, dass der Mensch bei allen maschinellen Entscheidungen im Mittelpunkt stehen soll und dass diese transparent sein müssen. Aber was bringt einem das Wissen um benachteiligende oder falsche Funktionsweise der Algorithmen, wenn man sie dennoch nicht verbieten kann? Und: sollten wir die Regeln für den zukünftigen Einsatz von Maschinen wirklich von den Konzernen gestalten lassen, die diese Technologien entwickeln? \n\nWir zeigen, wie wenig konkret die verschiedenen Selbstverpflichtungen der Unternehmen, Verbände und Organisationen sind und wie all das Reden über Ethik  in den meisten Fällen einem Ziel dient: gesetzliche Regulierung verhindern.\n\nBisweilen kann man sich des Eindrucks nicht erwehren, jede zweite Woche würde eine neue, wachsweiche Selbstverpflichtung oder Empfehlung für den ethischen Einsatz von Algorithmen bekanntgegeben. Privatwirtschaftliche wie öffentliche Organisationen übertrumpfen sich geradezu dabei, ein weiteres Mal zu betonen, dass der Mensch bei allen maschinellen Entscheidungen im Mittelpunkt stehen soll, dass sie fair und nachvollziehbar sein müssen und es stets die Möglichkeit zum Widerspruch gegen eine solche Entscheidung geben muss. Transparenz, Transparenz und nochmals Transparenz sei das Maß aller Dinge. Aber was heißt das konkret für diejenigen, die nur noch per Gesichtserkennung in ihr Büro oder Wohnung reinkommen, deren Kredit, Wohnungs- oder Arbeitsgesuch abgelehnt wird oder sie vom Jobcenter keine Förderung bekommen dank einem Algorithmus? Was bringt einem das Wissen um benachteiligende oder falsche Funktionsweise der Algorithmen, wenn man sie dennoch nicht verbieten kann? Welchen Sinn hat das Recht darauf, sich a posteriori wehren zu dürfen, wenn man bereits alles verloren hat? Und: sollten wir die Regeln für den zukünftigen Einsatz von Maschinen wirklich von den Konzernen gestalten lassen, die diese Technologien entwickeln? Ethikforscher, die sich für Selbstregulierung einsetzen, verschweigen oft, dass ihre Einrichtungen von Techfirmen finanziert werden. Selbst die neuen Ethischen Richtlinien der EU sind von Google, IBM, Facebook und Zalando mitgeschrieben worden.\n\nWir zeigen, wie wenig konkret die verschiedenen Selbstverpflichtungen der Unternehmen, Verbände und Organisationen sind und wie all das Reden über Ethik  in den meisten Fällen einem Ziel dient: gesetzliche Regulierung verhindern.","original_language":"deu","persons":["Chris Köver"],"tags":["camp19","10231","2019","Ethics, Society \u0026 Politics"],"view_count":609,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-15T17:45:06.765+01:00","length":3022,"duration":3022,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10231-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10231-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10231-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10231-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10231-ethikrichtlinien_fur_kunstliche_intelligenz_wie_war_s_mit_gesetzen","url":"https://api.media.ccc.de/public/events/94273ff5-ae50-49bd-a892-5a5f2e8c8451","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":7},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":7},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":14},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":8},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":11},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":13},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":9},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":14},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":14},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":10},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":17},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":10}]},{"guid":"4263620e-f36f-4408-b702-01481e0efbd7","title":"Infrastructure Review","subtitle":null,"slug":"Camp2019-10390-infrastructure_review","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10390.html","description":null,"original_language":"eng","persons":[],"tags":["camp19","10390","2019","CCC"],"view_count":2295,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-30T12:30:08.190+02:00","length":2808,"duration":2808,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10390-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10390-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10390-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10390-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10390-infrastructure_review","url":"https://api.media.ccc.de/public/events/4263620e-f36f-4408-b702-01481e0efbd7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":76},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":43},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":84},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":43},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":49},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":93},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":124},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":73},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":55},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":92},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":62},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":52},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":66},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":61},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":114},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":121}]},{"guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","title":"Domain computers have accounts, too!","subtitle":"Owning machines through relaying and delegation","slug":"Camp2019-10207-domain_computers_have_accounts_too","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10207.html","description":"In Microsoft Active Directory, computers also have their accounts. We used to consider them useless when they turned up during pentests, but recent research showed that successfully relaying a machine account can actually lead to completely owning the machine. This talk will explain the foundation of such attacks and end with a demonstration of how a non-privileged domain user can get SYSTEM privileges on remote machines.\n\nActive Directory is notorious for using long-broken protocols and preserving them for ages because backwards compatibility. In recent years, pentesters are realizing more and more how terrible these protocols can be, and security experts are finding more and more abuse scenarios.\n\nTake for example the NTLMv2 challenge-response protocol: It was first introduced back in Windows NT 4.0 SP4 and is still readily available on modern windows. Apart from not being very resistant to cracking (using just a few MD5s), it turned out it's not resistant to MITM attacks at all. An attacker in a MITM position can relay any authentication attempts to almost any target. There were some mitigitations for this over the years, but we are just now starting to see people actually starting to use them.\n\nSo when relaying came to existence, security researches focused on \"what can we do with this\"? Obviously, if you manage to succesfully relay a Domain Administrator account, you have won; but that's not always possible. \n\nAnother protocol used extensively in Active Directory is Kerberos. The Microsoft implementation has several delegation/impersonation techniques available. And now, we know how to combine all these to be able to impersonate any user to a computer, given we were able to relay that computer's authentication at least once.\n\nThe talk will cover these main areas:\n\u003cul\u003e\n\u003cli\u003eNTLM Relaying\u003c/li\u003e\n\u003cli\u003eKerberos delegation\u003c/li\u003e\n\u003cli\u003eGetting machines to authenticate to us\u003c/li\u003e\n\u003c/ul\u003e\n\nAll tools necessary to perform this attack will be released as impacket modules.\n\nThis talk is mainly based on research by @tifkin_ (Lee Christensen), @harmj0y (Will Schroeder), @enigma0x3 (Matt Nelson), @elad_shamir (Elad Shamir), @_dirkjan (Dirk-jan). ","original_language":"eng","persons":["JaGoTu"],"tags":["camp19","10207","Security"],"view_count":603,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-23T15:30:08.311+01:00","length":2434,"duration":2434,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10207-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10207-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10207-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10207-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10207-domain_computers_have_accounts_too","url":"https://api.media.ccc.de/public/events/7d8aff66-f15e-4fdd-b5aa-af555f7a626f","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":4},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":16},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":15},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":14},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":13},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":17},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":4},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":25},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":9},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":27},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":22},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":13},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":8},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":18}]},{"guid":"4f94b6e0-3e6c-5b5d-9d47-45c06304c063","title":"(emulate|fuzz|break) kernels","subtitle":null,"slug":"thms-32--emulate-fuzz-break-kernels","link":"http://talx.thm.cloud/thms/talk/QULQKV/","description":"This talk will give an introduction to kernel fuzzing using *unicorefuzz*.\n\nYes, yes. We all know fuzzing is a powerful tool to find bugs.\nFor user space software, this is so 2014. Fuzzing kernels, however, can still be a daunting task.\nThe state of the art kernel fuzzer, syzkaller, is somewhat complex to set up. \nSo many unhappy parsers in the kernel remain unfuzzed to this day!\nWhy can we not simply start fuzzing from some random breakpoint in the kernel, you ask?\nWell of course we can. Let's drop the whole thing into Unicorn Engine, a CPU emulator, and give it input.\nSimple as that.\nTo stay on the punny side of things, we shall call this method *unicorefuzz*.","original_language":"eng","persons":["domenukk"],"tags":["thms","32","Talk"],"view_count":618,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-20T00:15:04.309+01:00","length":1339,"duration":1339,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/32-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/32-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/32-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/32-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-32--emulate-fuzz-break-kernels","url":"https://api.media.ccc.de/public/events/4f94b6e0-3e6c-5b5d-9d47-45c06304c063","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":2},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":2},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":7},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":2},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":3},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":2},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":1},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":5},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":1},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":6},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":5},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":1},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":6},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":4},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":7},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":1},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":1},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":1},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":4},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":2},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":6},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":2},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":4},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":5},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":3},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":1},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":4},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":4}]},{"guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","title":" Fully Open, Fully Sovereign mobile devices","subtitle":null,"slug":"Camp2019-10378-fully_open_fully_sovereign_mobile_devices","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10378.html","description":"Removing the barriers to making network independent mobile communications.\n\nIn this talk I will discuss our thinking and progress towards making personal mobile communications devices, i.e., things that you use like a smart-phone, but that are fully under the control of the owner.  While this has been done before, we have been focusing on how to make this much easier to do, so that individuals or small teams can create their own custom devices, with whatever features, inclusions and physical form they like, without huge time or cost requirements.  This makes it possible to solve security and privacy problems, and also problems like creating custom devices for people living with disability, so that they can have a device that works for them and with their abilities and needs.\n\nI will discuss our work-in-progress in this area, the MEGAphone, which is not only a mobile phone, but also includes UHF packet radio and a modular expansion scheme, that can allow allow the incorporation of satellite and other communications.  It is also backwards compatible with the Commodore 64, so can already play loads of privacy-preserving games, and has its own open-source slide presentation software that we hope to use to deliver the talk.\n\nPrivate UHF and VHF radio communications is a complex space, in terms of regulation, which we have some experience in due to the Serval Project, which has informed our design of the MEGAphone.  I will thus discuss issues such as using \"license free\" bands around the world, as well as options for using either licensed spectrum or existing legacy public spectrum allocations, such as Citizen Band (CB) radio.  As the MEGAphone platform is FPGA based, it is quite possible to implement software defined radio solutions to allow flexible and low-cost access to such spectrum.","original_language":"eng","persons":["Paul Gardner-Stephen"],"tags":["camp19","10378","Hardware \u0026 Making"],"view_count":670,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-03-28T05:15:02.769+01:00","length":2523,"duration":2523,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10378-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10378-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10378-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10378-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10378-fully_open_fully_sovereign_mobile_devices","url":"https://api.media.ccc.de/public/events/d219432f-68ed-4162-8e7a-1d53a3e3e17c","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":12},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":20},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":11},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":20},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":12},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":93},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":19},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":5},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":5},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":17},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":13},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":13},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":13},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":17},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":12},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":13},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":14},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":12}]},{"guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","title":"card10 Badge","subtitle":"","slug":"Camp2019-10365-card10_badge","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10365.html","description":"\u003cp\u003eIntroducing you to card10, the 2019 camp badge, bio monitor, wrist worn POV device, and everything else your imagination comes up with. This year's 0b10nd edition of the camp badge is card10. It comes packed with biosensors and can talk to many devices with BLE (Bluetooth Low Energy). As always with camp badges, it comes with some space to extend it with further electronics and this time a programming interface that is even easier to use, so you can individualize your card10 and pick up some new skills on the way. In this talk, we will tell you more about the technical details of card10, the considerations behind making the new badge, and what card10 taught us on the way to camp. You, too, can join us in integrating the badge into 2019 camp life, by creating your own interh4cktions. We will show you how, with some examples of interh4cktions we already know about for inspiration. Before you leave to forge your own path through camp2019 with card10 by your side, we will share some highlights from the camp events around card10, how you can keep your finger on the pulse of card10 news, release your card10 interh4cktions to camp, and add your own self organised card10 sessions. other card10 devices, probably also your find out more: https://card10.badge.events.ccc.de/ FAQ: https://card10.badge.events.ccc.de/en/faq/\u003c/p\u003e","original_language":"eng","persons":["card10-Team"],"tags":["camp19","10365","CCC"],"view_count":2254,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-28T04:30:02.722+01:00","length":1906,"duration":1906,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10365-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10365-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10365-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10365-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10365-card10_badge","url":"https://api.media.ccc.de/public/events/c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":112},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":337},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":187},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":83},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":46},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":71},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":64},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":84},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":102},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":86},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":50},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":83},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":58},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":43}]},{"guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","title":"\"Service Point\" The Display","subtitle":"A tale of four generations","slug":"Camp2019-10339-service_point_the_display","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10339.html","description":"The walls of CCC Berlin are filled with posters, analog as well as digital art, and also: a large LED display! The display is a proper piece of dual-use technology, serving both as hack material for fun and as a useful tool e.g. for taking notes during meetings.\n\nCome join us on a technology tour through the history of this fun piece of kit, starting with a look at the original hardware and software architecture and moving on through the many following software, hardware and mechanical hack generations in and around the display.\n\nThe display has come quite far. Originally one could watch individual characters render on the 71680 LEDs, now 35 fps video playback is effortless, and it functions as a hub for collaborative visual expression using both text and graphics.\n\nKey words: 6502, CSS, Ethernet, ATXMEGA, JavaScript, Cortex-M3, WebSockets, AM335x, BeagleBone Black, PRU, Etherpad, CNC machining, Aluminium Welding","original_language":"eng","persons":["Peter Stuge","mrflix"],"tags":["camp19","10339","Hardware \u0026 Making"],"view_count":381,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-23T06:15:06.527+01:00","length":2310,"duration":2310,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10339-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10339-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10339-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10339-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10339-service_point_the_display","url":"https://api.media.ccc.de/public/events/ca82c94e-28b1-4c77-b7c1-0ab024a46c25","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":5},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":27},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":15},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":2},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":15},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":17},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":2},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":5},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":30},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":10},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":2},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":10},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":15},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":2},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":3},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":32},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":6},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":32},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":17},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":15},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":6}]},{"guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","title":"15 Jahre netzpolitik.org","subtitle":null,"slug":"thms-8-15-jahre-netzpolitik-org","link":"http://talx.thm.cloud/thms/talk/9P8DR9/","description":"Im Sommer 2004 erschienen die erste Artikel auf netzpolitik.org. Was als Seitenprojekt begann, entwickelte sich in 15 Jahren zu einer der schlagkräftigsten Organisationen zur Verteidigung von digitalen Grundrechten in Deutschland.\n\nDer Vortrag will einen nicht ganz ernsten Überblick über die Geschichte von netzpolitik.org geben, was auch eine kleine Geschichte der digitalen Zivilgesellschaft in Deutschland ist. Von den erfolgreichen Kämpfen gegen Softwarepatente über die Vorratsdatenspeicherung und Zensursula bis hin zu ACTA und den Uploadfiltern.\n\nMit Bildern, Screenshots und vielleicht auch dem einen oder anderen kurzen Video.","original_language":"deu","persons":["Markus Beckedahl"],"tags":["thms","8","Talk"],"view_count":261,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2024-12-30T02:00:11.880+01:00","length":3200,"duration":3200,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/8-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/8-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/8-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/8-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-8-15-jahre-netzpolitik-org","url":"https://api.media.ccc.de/public/events/da999f3a-edf0-590a-85f8-37cb00cf21d9","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":11},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":6},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":18},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":13},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":13},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":21},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":11},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":29},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":17},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":17},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":13},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":16}]},{"guid":"ca134284-32df-48e0-b811-42c79dc71fa0","title":"Nachhaltige Blockchains","subtitle":" statt Digital und Dreckig","slug":"Camp2019-10285-nachhaltige_blockchains","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10285.html","description":"Erfolg der kryptographischen Währung Bitcoin, zu einer der\n  meistdiskutierten \"neuen\" Technologien entwickelt. Der sehr schnelle\n  Aufstieg von Bitcoin hat viele Problemstellungen zum verteilten\n  Vertrauensmanagement, dem Energieverbrauch und dem Schutz der\n  Privatsphäre von interessanten Forschungsfragen zu wichtigen\n  Herausforderungen für eine nachhaltige wirtschaftliche und\n  gesellschaftliche Entwicklung werden lassen. Wir diskutieren, wie wir\n  mit recht überschaubaren mathematischen Verbesserungen für weniger\n  umweltschädliche, weniger sich zentralisierende und\n  datenschutzfreundliche Systeme sorgen können. \n\n  Innerhalb weniger Jahre haben sich Blockchains, insbesondere durch den Erfolg der kryptographischen Währung Bitcoin, zu einer der\n  meistdiskutierten \"neuen\" Technologien entwickelt. Der sehr schnelle\n  Aufstieg von Bitcoin hat viele Problemstellungen zum verteilten\n  Vertrauensmanagement, dem Energieverbrauch und dem Schutz der\n  Privatsphäre von interessanten Forschungsfragen zu wichtigen\n  Herausforderungen für eine nachhaltige wirtschaftliche und\n  gesellschaftliche Entwicklung werden lassen. Wir diskutieren, wie wir\n  mit recht überschaubaren mathematischen Verbesserungen für weniger\n  umweltschädliche, weniger sich zentralisierende und\n  datenschutzfreundliche Systeme sorgen können.\n","original_language":"deu","persons":["ruedi"],"tags":["camp19","10285","Science"],"view_count":526,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2025-12-10T08:45:04.971+01:00","length":2794,"duration":2794,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10285-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10285-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10285-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10285-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10285-nachhaltige_blockchains","url":"https://api.media.ccc.de/public/events/ca134284-32df-48e0-b811-42c79dc71fa0","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":13},{"event_id":7372,"event_guid":"a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","weight":18},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":16},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":6},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":15},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":15},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":22},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":16},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":14},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":26},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":15}]},{"guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","title":"Was ihr schon immer (nicht) über Koffein wissen wolltet","subtitle":null,"slug":"Camp2019-10232-was_ihr_schon_immer_nicht_uber_koffein_wissen_wolltet","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10232.html","description":"Koffein als Substanz wird Tag für Tag aufgrund seiner anregenden Wirkung von vielen Menschen konsumiert, doch was genau steckt eigentlich hinter dieser Substanz? In diesem Talk blicken wir in die Chemie, Herkunft, Wirkung, Gefahren und weitere Aspekte des Koffeins.\n\nKoffein, ein Stoff, den viele (hackende) Menschen tagtäglich in unterschiedlichen Formen konsumieren. Was genau ist diese Substanz eigentlich und wo kommt sie überall vor? Was passiert mit Koffein und mit uns, wenn dieses Molekül durch unseren Körper reist? Und kann Koffein ab einer bestimmten Menge gefährlich werden? Diese und weitere Fragen werden zusammen mit vielem, was Wissenswertes zur Chemie von Koffein existiert, hier thematisiert.","original_language":"deu","persons":["Lea Rain"],"tags":["camp19","10232","Science"],"view_count":2417,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-29T17:15:06.000+02:00","length":2176,"duration":2176,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10232-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10232-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10232-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10232-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10232-was_ihr_schon_immer_nicht_uber_koffein_wissen_wolltet","url":"https://api.media.ccc.de/public/events/84c25f65-998a-43a8-bd32-2fe91fe42ff7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":54},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":40},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":52},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":49},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":44},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":80},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":77},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":66},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":98},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":56},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":115},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":61},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":113},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":39},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":114},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":8},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":81},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":95},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":58},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":120},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":52}]},{"guid":"cd241757-8364-4eb1-8173-f049b54efca7","title":"Die Zukunft hat zwei Wellen","subtitle":"Ein Blick auf die Zukunft der Freifunk-Hardware (und was wir mit der alten tun können)","slug":"Camp2019-10272-die_zukunft_hat_zwei_wellen","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10272.html","description":"Freifunk steht vor dem Abgrund, der Flash ist voll, der RAM ist zu klein, so löt doch einfach neuen ein? Wir betrachten hier die aktuellen Probleme die viele Communities mit ihrer Hardwarebasis erleben und betrachten die Vor- und Nachteile der verschiedenen Wege, diese Probleme zu lösen.\n\nFreifunk steht vor dem Abgrund, der Flash ist voll, der RAM ist zu klein, so löt doch einfach neuen ein? Wir betrachten hier die aktuellen Probleme die viele Communities mit ihrer Hardwarebasis erleben und betrachten die Vor- und Nachteile der verschiedenen Wege, diese Probleme zu lösen.\n\nDabei schauen wir uns zurerst die aktuelle Entwicklung auf dem WLAN-Hardwaremarkt an und welche Unterstützung Gluon bereits für Moderne WLAN-Hardware bietet, wie man selber die Unterstützung neuer Hardware verbessern kann und dem angehenden Freifunker erleichtert das richtige Gerät für sich und seinen Anwendungsfall zu finden.\n\nIm Anschluss betrachten wir die aktuellen Herausforderungen die viele Communities gerade mit stark limitierter Hardware trifft und möchten auch einen Blick auf kommende Herausforderungen werfen.","original_language":"deu","persons":["blocktrron"],"tags":["camp19","10272","Hardware \u0026 Making"],"view_count":685,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-07-07T19:30:04.687+02:00","length":1881,"duration":1881,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10272-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10272-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10272-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10272-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10272-die_zukunft_hat_zwei_wellen","url":"https://api.media.ccc.de/public/events/cd241757-8364-4eb1-8173-f049b54efca7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":20},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":22},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":32},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":23},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":21},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":20},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":28},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":20},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":23},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":23},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":35},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":6},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":21},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":22},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":28}]},{"guid":"28293a80-2dff-433b-8c79-a714ca4e84bc","title":"TAPS Transport Services API","subtitle":"Retiring the BSD Socket API","slug":"Camp2019-10298-taps_transport_services_api","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10298.html","description":"In the last year, a group of researchers and some industry people at the IETF decided to join forces and design a replacement of the BSD Socket API. This talk gives an overview about why the BSD Socket API is considered harmful for the Internet's future and how TAPS tries to solve this problem. Besides the facts, also gives some hints about how standardisation at the IETF works and why all this takes so long…\n\nThe BSD Socket API was designed more than 30 years ago. No one back than imagined hosts with multiple access networks, concurrent use of multiple communication protocols, e.g., IPv4 vs IPv6 and TCP/TLS vs QUIC,  and incorporating quality of service (QoS), security and cost constrains for setting up communications. The result is a complex ecosystem of APIs and techniques that must be manually combined in order to write state of the art network applications. \n\nThe talk will give a brief overview on what choices state of the art network applications can make, why the BSD socket API does not support it and how TAPS tries to solve this. I will also talk a little bit about how standardisation at the IETF works, why one may want to get involved and why all this takes so long…","original_language":"eng","persons":["phils"],"tags":["camp19","10298","Security"],"view_count":159,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2025-11-20T16:00:05.252+01:00","length":2669,"duration":2669,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10298-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10298-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10298-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10298-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10298-taps_transport_services_api","url":"https://api.media.ccc.de/public/events/28293a80-2dff-433b-8c79-a714ca4e84bc","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":5},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":7},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":8},{"event_id":7378,"event_guid":"25ea0487-9dc1-4dc6-8df7-75b4872a164c","weight":6},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":10},{"event_id":7382,"event_guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","weight":5},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":8},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":7},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":6},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":5},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":8},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":6}]},{"guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","title":"The Limits of General Purpose SDR devices","subtitle":"Why an SDR board like a USRP or LimeSDR is not a cellular base station","slug":"Camp2019-10248-the_limits_of_general_purpose_sdr_devices","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10248.html","description":"It's tempting to buy a SDR device like a LimeSDR or USRP family member in the expectation of operating any wireless communications system out there from pure software.  In reality, however, the SDR board is really only one building block.  Know the limitations and constraints of your SDR board and what you need around it to build a proper transceiver.\n\nFor many years, there's an expectation that general purpose SDR devices like the Ettus USRP families, HackRF, bladeRF, LimeSDR, etc. can implement virtually any wireless system.\n\nWhile that is true in principle, it is equally important to understand the limitations and constraints.\n\nPeople with deep understanding of SDR and/or wireless communications systems will likely know all of those.  However, SDRs are increasingly used by software developers and IT security experts.  They often acquire an SDR board without understanding that this SDR board is only one building block, but by far not enough to e.g. operate a cellular base station.  After investing a lot of time, some discover that they're unable to get it to work at all, or at the very least unable to get it to work reliably.  This can easily lead to frustration on both the user side, as well as on the side of the authors of software used with those SDRs.\n\nThe talk will particularly focus on using General Purpose SDRs in the context of cellular technologies from GSM to LTE.  It will cover aspects such as band filters, channel filters, clock stability, harmonics as well as Rx and Tx power level calibration.  \n\nThe talk contains the essence of a decade of witnessing struggling SDR users (not only) with running Osmocom software with them. Let's share that with the next generation of SDR users, to prevent them falling into the same traps.","original_language":"eng","persons":["LaForge"],"tags":["camp19","10248","Hardware \u0026 Making"],"view_count":1462,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-04-01T17:45:07.316+02:00","length":2787,"duration":2787,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10248-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10248-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10248-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10248-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10248-the_limits_of_general_purpose_sdr_devices","url":"https://api.media.ccc.de/public/events/4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":28},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":27},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":28},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":56},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":45},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":31},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":33},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":8},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":54},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":37},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":48},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":41},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":37},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":29},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":35},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":25}]},{"guid":"df91b683-2f32-4400-8043-b1d88aa0b454","title":"Die 5G-Überwachungsstandards  ","subtitle":"Cops Gegen Telekoms im ETSI","slug":"Camp2019-10211-die_5g-uberwachungsstandards","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10211.html","description":"Europol und die nationalen Polizeibehörden laufen Sturm gegen die neuen Überwachungsstandards, die im „European Telecom Standards Institute“ (ETSI) gerade für die 5G-Netze entwickelt werden. Die Telekom-Industrie hatte die Strafverfolger im ETSI überstimmt. Es sei \"jetzt wichtig, politischen Druck“ auszuüben, \"um die Definition des Standards noch zu beeinflussen“, heißt es in einem internen Schreiben von Anti-Terror-Koordinator Gilles de Kerchove an den EU-Ministerrat. Konkret will man die Terlekoms zwingen, ihre 5G-Netzarchitektur entlang der Bedürfnisse der Strafverfolger auf- und Sicherheitslücken für IMSI-Catcher einzubauen. Der Vortrag schildert den letzten Stand dieser Auseinandersetzung. ","original_language":"deu","persons":["Erich Moechel"],"tags":["camp19","10211","Ethics, Society \u0026 Politics"],"view_count":1615,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-01-18T21:45:16.119+01:00","length":2395,"duration":2395,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10211-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10211-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10211-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10211-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10211-die_5g-uberwachungsstandards","url":"https://api.media.ccc.de/public/events/df91b683-2f32-4400-8043-b1d88aa0b454","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":36},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":29},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":29},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":33},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":59},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":44},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":41},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":35},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":111},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":62},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":143},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":29},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":99},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":45},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":80},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":65},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":61},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":47}]},{"guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","title":"Solare Brennstoffe - Wasserstoff aus Sonnenlicht","subtitle":"Solarzellen können nicht nur Strom erzeugen","slug":"Camp2019-10377-solare_brennstoffe_-_wasserstoff_aus_sonnenlicht","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10377.html","description":"Sonnenenergie deckt heute erst etwas über 2% des weltweiten Energiebedarfs durch Umwandlung von Sonnenlicht in elektrische Energie. Eine der Möglichkeiten, um diese zu speichern, ist die Elektrolyse von Wasser, um Wasserstoff zu erhalten.\nWas aber wäre, wenn man Wasserstoff direkt gewinnen könnte?\n\nEine schnelle Übersicht über Sonnenlicht, das Prinzip hinter Photovoltaischen Solarzeiien, und wie photoelektrochemische Zellen, die flüssiges Wasser in seine Bestandteile Wasserstoff und Sauerstoff spalten können, beide Prozesse miteinander kombinieren können.\n\nDie von uns Menschen verantworteten CO2-Emissionen müssen reduziert werden, aber wie? \nDie Erzeugung von elektrischer Energie aus Sonnenlicht wird mit großer Sicherheit einen signifikanten Beitrag zur Deckung des weltweiten Energiebedarfs liefern. \nZuerst sehen wir uns das Spektrum der Sonne an, und wie viel dieser Energie wo auf der Erde ankommt.\nWenn dieses Licht auf Atome trifft, wie die Siliziumatome in einer Solarzelle, kann es diese in einen energiereicheren Zustand anregen, aber nur ein Teil des Sonnenlichts hat genug Energie, um diese Anregung zu erreichen. Was für Konsequenzen hat das für die Effizienz von Photovoltaik-Zellen?\nJeder kennt die blau-schillernde Silizium Photovoltaikzelle, die Größen von wenigen Quadratzentimeter in einem Taschenrechner über Installationen auf Hausdächern mit einigen Kilowatt bis zu Solarparks, die mehrere Megawatt Spitzenleistung abgeben können.\nSolarenergie ist vom Tag-Nacht-Zyklus der Erde und von der Jahreszeit abhängig. Um die Energieversorgung auch z.B. im Winter bei geringerer Sonnenintensität decken zu können, muss diese längerfristig gespeichert werden. Verschiedene Strategien sind denkbar, eine davon die Umwandlung in chemische Energie in Form von Wasserstoff durch Elektrolyse von Wasser.\nBeide Technologien bringen Umwandlungsverluste mit sich und erfordern teilweise teure Metalle und viel Energie bei der Herstellung.\n\nAber es gibt eine Klasse an Halbleiter-Materialien, die, wenn man sie in Wasser eintaucht und mit Sonnenlicht bestrahlt, die Lichtenergie direkt auf das Wasser übertragen, und es in Wasserstoff und Sauerstoff spalten können. Man umgeht die Kopplung von Photovoltaik und Elektrolyse.\nViele dieser halbleitenden Materialien sind mit weit weniger Energieaufwand herzustellen als Silizium. Besondere Aufmerksamkeit ist auf häufig vorkommende und damit gut verfügbare Metalle gerichtet. Eisenoxid - Rost, oder Titandioxid - das Pigent aus weißer Wandfarbe, sind zwei Beispiele, die jeder kennt, ihre Superpower aber sehr warscheinlich nicht.\nNoch sind die Wirkungsgrade gering und marktreife Lösungen noch nicht absehbar. Wenn der Ansatz allerdings erfolgreich ist, könnte dies ein Durchbruch für unsere Energieerzeugung sein, und nebenbei einen Teil des Problems lösen, Energie zu speichern und zu transportieren. ","original_language":"deu","persons":["Stormwind"],"tags":["camp19","10377","Science"],"view_count":511,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-10T23:00:22.082+01:00","length":2513,"duration":2513,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10377-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10377-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10377-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10377-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10377-solare_brennstoffe_-_wasserstoff_aus_sonnenlicht","url":"https://api.media.ccc.de/public/events/e1cba2cc-d83f-44dc-869e-51fdfc628563","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":1},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":1},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":9},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":1},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":1},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":12},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":14},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":15},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":1},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":1},{"event_id":7406,"event_guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","weight":1},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":17},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":13},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":1},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":15},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":17},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":1},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":1},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":12},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":1},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":1},{"event_id":7427,"event_guid":"0d45023b-ddb8-4048-bf39-1bffc11ff097","weight":1},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":1},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":4},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":1},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":1},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":11},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":12},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":11},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":9},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":1},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":16},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":10},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":1},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":1}]},{"guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","title":"Closing ceremony","subtitle":null,"slug":"Camp2019-10387-closing_ceremony","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10387.html","description":"A farewell.","original_language":"eng","persons":["jinxx","smtw"],"tags":["camp19","10387","2019","CCC"],"view_count":605,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-28T05:00:08.726+01:00","length":1758,"duration":1758,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10387-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10387-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10387-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10387-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10387-closing_ceremony","url":"https://api.media.ccc.de/public/events/f5ef88a8-0fb3-4310-bb04-358db302a13b","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":27},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":26},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":53},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":24},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":56},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":26},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":26},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":30},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":40},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":121}]},{"guid":"36b973e6-6203-4506-9317-4959d04ce0d0","title":"OpenCodes","subtitle":"Hacker im Museum","slug":"Camp2019-10400-opencodes","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10400.html","description":"Computer können Kunst erzeugen. Museen können Kunst ausstellten. Wie kann das zusammen kommen? Und welche Rolle spielen Community- und OpenSource-Gedanken darin? Der Vortrag ist die Geschichte eines Ausstellungs- und Bildungskonzeptes, welches auch von Hackern entworfen wurde.\n\nDie Ausstellung 'Open Codes' wurde zusammen mit Karlsruher Communities, unter anderem dem Entropia, FabLab und Freifunk entworfen und erweitert. Es geht um einen Blick hinter die Kulissen einer Gesellschaft, die immer weiter in das Digitale wandert.\n\nKostenloser Eintritt, Freifunk-WLAN, Tische, Sofas, Tischtennisplatte, kostenlose Getränke und Snacks, Hackathons, die Gulaschprogrammiernacht, PyCon, Wikimedia usw. lassen einen fast vergessen, dass man in einem Museum steht. Programmieren und hacken im Museum, wie geht das? \n\nDie Ausstellung ist weit mehr als eine kuratierte Sammlung von Medienkunstwerken, die sich mit dem Thema Code befasst. Es werden auch Themen wie OpenSource und die Hackercommunity greifbar gemacht. Die Werke sind Eckpunkte für Diskussionen, die bereits in Hacker-, Mackerspaces und digitalen Communities passiert. \n\nDer Vortrag verfolgt den gesamten Weg der letzten drei Jahre: von der ersten Konzeptskizze und Tschunkparties mit Kuratorinnen und Hackern über die Ausstellungseröffnung mit Feldtelefon, Hackcenter und Häppchen, \"Bitte nicht hacken, das ist Kunst\"-Schildern bis zu einer Lovestory - Still a Better Love Story than Twilight - zwischen zwei Welten, die anders nicht sein könnten. Da dürfen Indien und China auch nicht fehlen...","original_language":"deu","persons":["obelix"],"tags":["camp19","10400","Art \u0026 Culture"],"view_count":269,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2024-07-21T23:30:04.160+02:00","length":2158,"duration":2158,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10400-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10400-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10400-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10400-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10400-opencodes","url":"https://api.media.ccc.de/public/events/36b973e6-6203-4506-9317-4959d04ce0d0","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":11},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":18},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":23},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":11},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":19},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":26},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":14},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":27},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":11},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":11},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":12}]},{"guid":"b516cbe6-9225-449a-9298-1bb1a2fdb3c6","title":"Introduction to OpenGLES and GLSL programming","subtitle":null,"slug":"Camp2019-10256-introduction_to_opengles_and_glsl_programming","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10256.html","description":"This foundation talk describes the basic concepts of the OpenGLES 2.0 real-time rasterizer. We will explain the different stages of the rendering pipeline, briefly introduce the mathematics involved, show the boilerplate code required to setup an OpenGLES program, and finally look at the real fun stuff, which is the GLSL language used in vertex and fragment shaders.\n\n\nFrom notebooks and smartphones to embedded systems and game consoles, every modern computing platform contains chips for hardware accelerated 3d rendering. The OpenGL standard and API describes the drawing directives provided by these chips and is used to compose and animate user interfaces and to render interactive virtual scenes. Basically, every pixel that you see has been processed by an OpenGL pipeline.\n\nEngines like Unity3d provide a convenient way to describe and render threedimensional scenes without having to deal with the low level drawing directives. But this convenience makes it difficult to understand the path by which your logic becomes pixels, and coding closee to the hardware can be a lot of fun.\n\nThis foundation talk describes the basic concepts of the OpenGLES 2.0 real-time rasterizer. We will explain the different stages of the rendering pipeline, briefly introduce the mathematics involved, show the boilerplate code required to setup an OpenGLES program, and finally look at the real fun stuff, which is the GLSL language used in vertex and fragment shaders.\n\nAfter watching this talk, you will have a better understanding of the pipelines that are used to create the pixels on your screen. If you already know a high-level programming language such as C/C++, Java or Go, the examples provided will help you get started with coding your own 3d app, game or demo.\n\n","original_language":"eng","persons":["folkert"],"tags":["camp19","10256","Hardware \u0026 Making"],"view_count":338,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-03-27T01:30:04.290+01:00","length":2287,"duration":2287,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10256-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10256-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10256-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10256-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10256-introduction_to_opengles_and_glsl_programming","url":"https://api.media.ccc.de/public/events/b516cbe6-9225-449a-9298-1bb1a2fdb3c6","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":8},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":7},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":8},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":6},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":4},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":10},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":7},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":9},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":5},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":11},{"event_id":7398,"event_guid":"31dfe9ce-3291-497b-80e2-1b7a82344834","weight":4},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":5},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":7},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":6},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":7},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":7},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":7},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":7},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":8},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":9}]},{"guid":"02e04525-2163-4080-bc88-f14d3ec30270","title":"Make Your Tech and Wear It Too","subtitle":"Stories from an e-textile tailor","slug":"Camp2019-10375-make_your_tech_and_wear_it_too","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10375.html","description":"In this talk i’d like to give an introduction to the materials, tools, skills and energies involved in making electronic textiles and tailoring wearable technology, which has been my practice for the past 13 years.\n\nIn this talk i’d like to give an introduction to the materials, tools, skills and energies involved in making electronic textiles and tailoring wearable technology, which has been my practice for the past 13 years.\nI would like to demonstrate examples of textile sensors and actuators and explain the technical details involved in both the engineering and crafting of the open source designs which i publish on my website titled How To Get What You Want.\nAnd i would like to walk through my process of tailoring wearable technology commissions that have been for artistic, prosthetic and research purposes.\nI have many photos and videos to show, not only of the finished works but also of the often messy struggle it takes to get things to work. I can also bring live demonstrations of some of the designs.\n","original_language":"eng","persons":["Plusea"],"tags":["camp19","10375","Art \u0026 Culture"],"view_count":722,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-22T09:30:05.938+01:00","length":3087,"duration":3087,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10375-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10375-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10375-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10375-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10375-make_your_tech_and_wear_it_too","url":"https://api.media.ccc.de/public/events/02e04525-2163-4080-bc88-f14d3ec30270","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":16},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":16},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":17},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":17},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":20},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":19},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":21},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":20},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":16}]},{"guid":"8e743367-04a1-4232-ab03-a54fc210e548","title":"Fangespielen mit IMSI-Catchern","subtitle":"Warum IMSI Catcher schlecht \"Verstecken\" spielen","slug":"Camp2019-10357-fangespielen_mit_imsi-catchern","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10357.html","description":"Mobiltelefone hinterlassen aufgrund ihrer Funkaktivität in der Umgebung vielfältige Spuren, die von entsprechendem passiven Equipment aufgespürt und verarbeitet werden kann. Doch um tiefer in die Kommunikation zu schauen, braucht es aktive Netzwerkomponenten – sogenannte IMSI-Catcher oder Stingrays, die den Kontakt zu ihren Zielen direkt suchen und Informationen austauschen.\n\nDoch wenn sich solche hinterhältigen Basisstationen auf die Lauer legen, müssen sie sich zu Erkennen geben – und können erkannt werden. Der Vortrag erörtert technische Hintergründe, verräterische Anzeichen eines Angriffs und was Netzwerkbetreiber und Nutzer dagegen tun können.\n\nOshie arbeitet seit 4 Jahren an Heuristiken zur Erkennung und Werkzeugen zur Visualisierung von rogue base stations.\n\nDer Vortrag gibt einen Überblick wie IMSI Catcher arbeiten, was sie heutzutage leisten und wie sie dabei beobachtet werden können. Hierbei werden Sicherheitsfeatures der unterschiedlichen Netzgenerationen, von 2g bis 4g, betrachtet und was das konkret für den Einsatz von IMSI Catchern bedeutet. ","original_language":"deu","persons":["oshie"],"tags":["camp19","10357","Hardware \u0026 Making"],"view_count":1996,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-04-04T07:45:03.373+02:00","length":2049,"duration":2049,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10357-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10357-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10357-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10357-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10357-fangespielen_mit_imsi-catchern","url":"https://api.media.ccc.de/public/events/8e743367-04a1-4232-ab03-a54fc210e548","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":66},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":50},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":50},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":55},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":50},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":52},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":49},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":98},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":73},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":67},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":126},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":70},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":143},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":27},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":171},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":66},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":152},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":115},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":60},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":72},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":66},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":55}]},{"guid":"31dfe9ce-3291-497b-80e2-1b7a82344834","title":"Mapping Doomsday","subtitle":"Using OSINT to monitor and predict environmental conflicts","slug":"Camp2019-10350-mapping_doomsday","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10350.html","description":"The world is entering a new era of instability. The climate crisis will put great pressure on the (relatively) peaceful balance of world politics. But the field of open source intelligence (OSINT) provides us with a new and unique way to map, study and predict these flashpoints. This talk will look at several technical approaches for using these techniques and include several example studies.\n\nIntelligence agencies, NGOs, business groups, and insurance companies all agree that the worsening climate crisis will fuel war and global crises. Some go further, saying that societal collapse is all but inevitable. Whatever your view on this is, it is difficult to see our current paradigm of general peace continuing into the next few decades. \n\nBut as this crisis worsens, modern technology has also gifted us with new tools to monitor, analyse and predict flashpoints. The emerging field of Open Source Intelligence (OSINT) is one such tool. OSINT uses publically available data (such as social media posts, video footage, satellite imagery, public databases and remote sensing) as the basis for in-depth investigations. \n\nThis talk will look at the ways in which these techniques can be usefully applied, both journalistically and analytically, within the context of the aforementioned crisis. Specifically, it will look at two examples of how OSINT can be used to analyse past events over the last year, and one concept for predicting a future event. \n\n","original_language":"eng","persons":["Michael Cruickshank"],"tags":["camp19","10350","Science"],"view_count":441,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-03-04T19:15:07.961+01:00","length":2570,"duration":2570,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10350-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10350-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10350-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10350-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10350-mapping_doomsday","url":"https://api.media.ccc.de/public/events/31dfe9ce-3291-497b-80e2-1b7a82344834","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":6},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":7},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":8},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":9},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":10},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":9},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":5},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":6},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":9},{"event_id":7394,"event_guid":"14a2c922-697c-4073-885c-568850a390a7","weight":5},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":12},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":7},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":6},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":9},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":6},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":13},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":9}]},{"guid":"d178f21d-4837-4a49-ae27-0f6abf703465","title":"Hambacher Forst #hambibleibt ","subtitle":"Vom Widerstand gegen Braunkohletagebaue, die Klimakatastrophe und über das Leben in einer Waldbesetzung","slug":"Camp2019-10389-hambacher_forst_hambibleibt","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10389.html","description":"Seit 2012 ist der Hambacher Wald besetzt. ","original_language":"deu","persons":["mynameisnotimportant / hambacher forst"],"tags":["camp19","10389","Ethics, Society \u0026 Politics"],"view_count":671,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-11-16T11:00:03.750+01:00","length":2590,"duration":2590,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10389-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10389-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10389-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10389-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10389-hambacher_forst_hambibleibt","url":"https://api.media.ccc.de/public/events/d178f21d-4837-4a49-ae27-0f6abf703465","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":22},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":26},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":23},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":21},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":22},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":24},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":14},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":30},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":9},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":35},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":42},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":33},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":20},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":33},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":33},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":21}]},{"guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","title":"Power-to-X","subtitle":"How to make (nearly) everything from electricity.","slug":"Camp2019-10295-power-to-x","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10295.html","description":"This talk will give an introduction into the general concepts of power-to-x and then go more into detail on carbon capture and utilization (CCU). CCU is the idea of building up a closed carbon cycle, where CO2 is recycled, towards fuels and base chemicals, under the use of renewable energy. The talk will give insight in the technology, chemistry, possibilities and challenges. \n\nWhile redesigning our electric supply network towards renewable energies, we face the problem of the fluctuating behavior of the renewables. To solve this, higher nameplate capacities need to be installed, as compared to traditional power plants. This frequently leads to high overcapacities, which we should use, as they would be wasted otherwise. Some of this energy needs to be stored for periods where the energy generation is lower than our consumption. The rest can be used to produce all kinds of things that we need. This would allow a sector coupling of electricity with other fields like transport, heat or chemical industry and lead to more sustainable processes in all those fields.\nIf we see this on a global scale, we can also think of a redistribution of energy not only in time and sector of application, but as well in space. This can be realized, by producing fuels and other energy intensive products in areas of the world with a high potential in the generation of renewable electricity, and transport them to places where they are needed.\nThe technologies that would make this possible are often subsumed as power-to-x technologies. The Wikipedia names twelve different x’s: power-to-ammonia, power-to-chemicals, power-to-fuel, power-to-gas, power-to-heat, power-to-hydrogen, power-to-liquid, power-to-methane, power-to-mobility, power-to-food, power-to-power, and power-to-syngas. In addition, one could still think of many more.\nI want to give a brief introductive overview on these different approaches and then focus on the technologies, which are using carbon dioxide as a feedstock. Here the idea of power-to-x is combined with the aim of a closed carbon cycle. Emitted CO2 would be recycled to products, like fuels, plastics or fine chemicals. While today these are mainly produced form crude oil, in future they could be implemented in a sustainable process cycle. \n\nFor these carbon capture and utilization (CCU) concepts, like for example electrolysis of water coupled with a second catalytic CO2 reduction step or direct electrocatalytic CO2-reduction, I will present the technical working principles, the chemistry behind it and discuss possibilities and challenges. ","original_language":"eng","persons":["Jonas Geisler"],"tags":["camp19","10295","Science"],"view_count":928,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-30T08:15:05.371+02:00","length":2856,"duration":2856,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10295-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10295-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10295-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10295-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10295-power-to-x","url":"https://api.media.ccc.de/public/events/f0730982-2990-418e-9b15-20a6b9e86dd2","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":19},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":17},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":25},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":20},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":9},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":7},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":11},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":7},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":20},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":36},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":12},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":19},{"event_id":7431,"event_guid":"508fe23f-bc69-4521-abc3-59b649598eb5","weight":27},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":26},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":16},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":11},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":20}]},{"guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","title":"Cyborg Foundation ","subtitle":"Transpecies Society","slug":"Camp2019-10312-cyborg_foundation","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10312.html","description":"Presentation of the Cyborg Foundation, its philosophy, members and developed projects. Based in Barcelona and founded in 2017, CFL is an association that gives voice to non-human identities.  \n\nThe world around us is full of things that our body is not able to perceive. However, what would happen if we could create new senses that would allow us to decide how we want to perceive our surroundings? \nSupported by a multidisciplinary team, we conform a group of engineers, philosophers, designers and artists dedicated to exploring the relationship between species, machines and organs. With an eye on nature and analyzing the different senses found on living beings,  our purpose is the creation of new sense organs to expand human capabilities. Our team is focused on translating the suggested idea to a hardware/software device, that will not only process data but also transmit it to the body through the brain. \nIn the course of becoming cyborg, different phases are found: the creation of the organ, the implantation of it and the acclimatization of the brain and body to the new sense. The brain is a plastic organ that can be moulded. Just like Neil Harbisson says “The brain is like a sculpture to be shaped”. \nBy now, considerable results have been obtained. We will take a closer look at it by introducing the several members whose organs have been already implanted, how this has affected their life and way of interact with the physical world. We will, as well, explain the different senses and its design. Just for a quick view we will talk about:\nNeil Harbisson - Eyeborg. Color sense antenna. \nMoon Ribas - Seismic sense \nManel Muñoz - Weather station\nKai Landre - Cosmic rays\n\nIn addition, we have the satisfaction of announcing that the CCC will be the first to know about the pioneering technology that we are developing to power the devices.","original_language":"eng","persons":["Mo"],"tags":["camp19","10312","Hardware \u0026 Making"],"view_count":234,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-12-11T01:45:02.652+01:00","length":1665,"duration":1665,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10312-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10312-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10312-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10312-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10312-cyborg_foundation","url":"https://api.media.ccc.de/public/events/6d0b0f86-3969-4cd9-974f-69ba90cfce64","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":7},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":11},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":2},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":5},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":9},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":10},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":4},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":9},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":6},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":6},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":2},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":8},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":2},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":8},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":6},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":8},{"event_id":7440,"event_guid":"cf5d0389-ea8b-55d9-966c-2669e88de93a","weight":8},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":9},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":2},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":9},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":2},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":6},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":2},{"event_id":7460,"event_guid":"94273ff5-ae50-49bd-a892-5a5f2e8c8451","weight":2}]},{"guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","title":"20 Jahre Camp","subtitle":"die Evolution des Chaos Communication Camps","slug":"Camp2019-10413-20_jahre_camp","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10413.html","description":"Aus der Gruppe, die 1999 das erste Camp organisiert hat, reden Tim, Andre und Markus über die Verschmelzung von Open-Air- und Hacker-kultur.\n\nTim hat gemeinsam mit den Pyonen – Andre und Markus – das erste Camp 1999 ins Rollen gebracht. Gemeinsam blicken sie zurück auf die Entstehungsgeschichte des Camps und die besonderen Herausforderungen bei der Planung und Logistik des Events.\n\nDas erste Camp auf einer Pferdewiese in Altlandsberg war für den CCC ein Kraftakt. Aus der Vorlage der niederländischen Camps 1993 (Hacking at the End of the Universe, HEU) und 1997 (Hacking In Progress, HIP) wurde versucht, eine Veranstaltung zu kreieren, die sowohl den Geist des Clubs als auch den schon damals starken Einfluss der damaligen Techno-Open-Air-Szene kombiniert.\n\nBestärkt durch den erfolgreichen Umzug des Chaos Communication Congress Ende 1998 nach Berlin nahm der Club die Herausforderungen an und entwickelte mit den Pyonen eine fruchtbare Kooperation, bei der jede Gruppe Ihre Stärken ausspielen konnte. Der Club kümmerte sich um Netz und Inhalte, die Pyonen stellten sicher, dass die Produktion der Veranstaltung in sicheren Bahnen verlief.\n\nAm Ende gelang es dem ersten Camp, die Grundlage zu legen für die Veranstaltung, die es heute ist: ein Ort der Freiheit und Kreativität, der dem Spaß am Gerät, der Ästhetik und der Kommunikation den notwendigen Raum bietet.","original_language":"deu","persons":["Markus Ossevorth","Marc-André Janizewski","Tim Pritlove"],"tags":["camp19","10413","CCC"],"view_count":5303,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-03-26T23:00:04.900+01:00","length":5219,"duration":5219,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10413-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10413-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10413-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10413-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10413-20_jahre_camp","url":"https://api.media.ccc.de/public/events/d8db148c-39e4-4f1e-af23-a26a477c82ee","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":198},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":117},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":255},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":102},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":66},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":62},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":94},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":84},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":12},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":136},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":52},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":67},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":183},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":50},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":66},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":88},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":154},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":56},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":124}]},{"guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","title":"IT-Sicherheit in vernetzten Gebäuden","subtitle":"Was kann man noch retten, wenn langlebigen Strukturen grundlegende Sicherheitskonzepte fehlen?","slug":"Camp2019-10349-it-sicherheit_in_vernetzten_gebauden","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10349.html","description":"Ein automatisiertes Gebäude ist schön, komfortabel und praktisch. Doch das wäre nicht Thema für einen Vortrag beim CCCamp, wenn es nicht einige gravierende Schwachstellen in den Bussystemen gäbe. Der Vortrag bietet eine Einführung in die Funktionalität von vernetzten Gebäuden am Beispiel des KNX Standards. Ohne dass ihr großes Vorwissen benötigt, berichte ich euch von Sicherheitsproblemen und möglichen Lösungsansätzen zur nachträglichen Steigerung der Sicherheit solcher Gebäudeautomatisierungssysteme.\n\nFeldbusse wie KNX werden in modernen Gebäuden eingesetzt, um typische Vorteile der Gebäudeautomation zu erzielen. Man verspricht sich Komfortgewinn, Kosteneinsparungen und Flexibilität. Klassische Schutzziele wurden beim Design dieser Bussysteme hintenangestellt und IT-Sicherheit so sträflich missachtet. Funktionalitäten wie Verschlüsselung oder Authentifikation der Kommunikationsteilnehmer sucht man bisweilen vergeblich. Sind die Gebäude erst einmal gebaut, wird die installierte Infrastruktur über Jahrzehnte betrieben. Das Licht des Kollegen im Nachbarbüro zu schalten ist ebenso leicht, wie das Steuern einer an den Feldbus angebundenen Heizung. Was im Büro noch verhältnismäßig harmlos erscheint, wird bedrohlich, wenn man bedenkt, dass auch Kraftwerke und andere kritische Infrastrukturen ähnliche Systeme nutzen.\n\nNach einer Einführung in den KNX Bus geht der Vortrag auf Schwachstellen und deren mögliche Folgen in automatisierten Gebäuden ein. Es wird gezeigt, dass sich aus scheinbar harmlosen Sensoraktivitätsdaten bereits intime, personenbezogene Informationen herausarbeiten lassen.\n\nUm die Sicherheit bereits installierter, langlebiger Gebäudeinfrastrukturen dennoch zu erhöhen, werden bereits bekannte Verfahren aus der IP-Welt auf Feldbusse übertragen. Netzwerksegmentierung, IDS und Filterung sind erste Ansätze, auf die der Vortrag eingeht. Es werden deren Möglichkeiten und Grenzen beschrieben.\n\n Darüber hinaus wird ein entwickelter Testdatensatz zur Evaluierung solcher und anderer Ansätze vorgestellt.","original_language":"deu","persons":["Simeon"],"tags":["camp19","10349","Security"],"view_count":1214,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-15T14:45:08.896+01:00","length":2788,"duration":2788,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10349-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10349-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10349-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10349-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10349-it-sicherheit_in_vernetzten_gebauden","url":"https://api.media.ccc.de/public/events/95a8ea24-a2dd-479f-86fd-6e96ce66a47e","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":57},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":33},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":31},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":32},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":38},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":66},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":45},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":18},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":71},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":27},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":27},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":90},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":39},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":41},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":41},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":31},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":38}]},{"guid":"f828fab4-661b-4b16-836c-cdf786550e4d","title":"Making video games in a weekend","subtitle":"The why and how of game jams","slug":"Camp2019-10278-making_video_games_in_a_weekend","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10278.html","description":"Are you curious about making your own video game? Game jams are a brilliant opportunity to try that, and a fun challenge for interdisciplinary teams of all skill levels! They're basically hackathons, but for video games - you're given a certain theme, and are encouraged to make a game around that in two or three days. In this talk, I want to empower and inspire you to try that yourself!\n\nWhen I first joined in the large, international game jam \"Ludum Dare\" in 2016, I found it a very rewarding experience, that got me in a flow-like state of mind. I liked it so much that I've since participated 10 times in a row - at this point, I have tons of experience, which I want to share with you!\n\nThis talk is split into three parts: First, I'll quickly go over the history of game jams, and introduce you to some of the largest ones, like Ludum Dare and the Global Game Jam.\n\nSecond, I'll talk about my personal experience with game jams: I'll explain how I got into it, and showcase some games I worked on! I'll also share the development process behind them, and reflect on what went well and what didn't.\n\nAnd finally, I want to empower you to try this for yourself. Specifically, I'll explain how the \"Ludum Dare\" game jam works, and share some tips, tricks, and resources I have assembled over the years, that would have been useful for myself as I just was starting out.\n","original_language":"eng","persons":["blinry"],"tags":["camp19","10278","2019","Art \u0026 Culture"],"view_count":563,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-30T08:00:10.901+01:00","length":2086,"duration":2086,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10278-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10278-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10278-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10278-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10278-making_video_games_in_a_weekend","url":"https://api.media.ccc.de/public/events/f828fab4-661b-4b16-836c-cdf786550e4d","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":25},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":11},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":13},{"event_id":7402,"event_guid":"b516cbe6-9225-449a-9298-1bb1a2fdb3c6","weight":2},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":11},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":15},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":14},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":18},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":6},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":26},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":2},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":9},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":15},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":18},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":9},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":14},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":2},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":11},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":2},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":32},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":10},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":24},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":9},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":11},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":6}]},{"guid":"25ea0487-9dc1-4dc6-8df7-75b4872a164c","title":"Beyond the Pile of Knobs","subtitle":"Redesigning NoScript’s UX","slug":"Camp2019-10368-beyond_the_pile_of_knobs","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10368.html","description":"This case study of NoScript’s UX redesign showcases tried and true design principles that make security tools usable to a wider range of audiences. \n\n\nOpen source security tools are often associated with customizability and transparency: users are given many options (configurations, self-hosting), and system states are more often than not visible to users (detailed connection info, logs). Sometimes, that means bulky user interfaces and technical language, making an otherwise useful and recommended tool less usable for non-technical audiences. This presents a distinct design challenge: is it possible to build tools that are more usable without compromising on customizability and transparency?\n\nIn this talk, we will present some UX design principles based on our work with NoScript, a browser extension that allows users to fine-tune their script blocking in Firefox and Chrome/Chromium. We will focus on 1) understanding the value you add for your users, 2) choosing sensible default options, and 3) updating interface language for a wider audience.\n\nIn the course of that, we will also present our process of human-centered design for improving security tools. (Outlined here: https://simplysecure.org/what-we-do/usable-security-audit/ )\n","original_language":"eng","persons":["Eileen Wagner"],"tags":["camp19","10368","Security"],"view_count":351,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-01-22T14:30:13.994+01:00","length":2799,"duration":2799,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10368-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10368-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10368-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10368-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10368-beyond_the_pile_of_knobs","url":"https://api.media.ccc.de/public/events/25ea0487-9dc1-4dc6-8df7-75b4872a164c","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":10},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":14},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":10},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":19},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":13},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":9}]},{"guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","title":"Automated security testing for Software Developers who dont know security!","subtitle":"secure your apps and servers through continuous integration","slug":"Camp2019-10181-automated_security_testing_for_software_developers_who_dont_know_security","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10181.html","description":"i'll show how the average developer (like me) can secure their software and systems by automatically checking for known vulnerabilities and security issues as part of their CI-Toolchain.\nThe Talk will introduce basic security knowhow, then show how you can use Open Source Frameworks to check for vulnerable dependencies, containers and (web-)APIs in a live demo","original_language":"eng","persons":["cy"],"tags":["camp19","10181","Security"],"view_count":481,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-18T00:15:05.417+01:00","length":2962,"duration":2962,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10181-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10181-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10181-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10181-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10181-automated_security_testing_for_software_developers_who_dont_know_security","url":"https://api.media.ccc.de/public/events/0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":10},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":26},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":15},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":11},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":27},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":11},{"event_id":7378,"event_guid":"25ea0487-9dc1-4dc6-8df7-75b4872a164c","weight":3},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":15},{"event_id":7382,"event_guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","weight":3},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":22},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":3},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":11},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":5},{"event_id":7388,"event_guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","weight":3},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":20},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":14},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":13},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":14},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":13}]},{"guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","title":"Fighting back against Libra - Decentralizing Facebook Connect","subtitle":"Nym Anonymous Authentication Credentials ","slug":"Camp2019-10317-fighting_back_against_libra_-_decentralizing_facebook_connect","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10317.html","description":"The power of Facebook derives from its control over your digital identity. However, the fundamental technologies behind anonymous (attribute-based) authentication credentials have existed since the mid-90s. This talk will cover new advances in anonymous authentication credentials, how the work was nearly killed by Facebook, and their real-world implementation, including their use in the Nym project's mix-net, cryptocurrency, and decentralized messaging applications. \n\nHow do we pratically defeat Facebook and build an anonymous internet? Let's start with the building blocks: Getting rid of Facebook Connect using decentralized and privacy-enhancing technologies, then using that as a lever to build the rest of the system.\n\nAnonymous authentication credentials have existed since early blind signature schemes, but have historically been both inefficient and required centralized (if often blind!) trusted third parties. New advances such as UnlimitID and the Coconut signature scheme have allowed the creation of \"Nym credentials\" that are both decentralized and privacy-preserving. We'll go into three use-cases:\n\u003cli\u003e\u003cb\u003eMix-networks\u003c/b\u003e Credentials allow mix-nets, which provide anonymity at the network level in even a stronger manner than Tor, to both avoid spam (sybil) attacks and grow in a robust, decentralized manner, avoiding the need of proof of work algorithms.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eMessaging\u003c/b\u003e In combination with the new IETF MLS (Message Layer Security) protocol to replace Signal, anonymous authentication credentials can enable a more privacy-preserving messenger.\u003c/li\u003e\n\u003cli\u003e\u003cb\u003eCryptocurrency\u003c/b\u003e If Facebook is building Libra, we'll show how we can take their fundamental design and make it - or any other cryptocurrency - privacy--preserving using Nym credentials\u003c/li\u003e\n\nLastly, we'll review how we build the initial work using European Commission funding from NEXTLEAP and PANORAMIX, how Facebook nearly killed the project, and now how we are building from both non-profit and private sector sources, including hiring ex-Facebook employees to work on privacy. ","original_language":"eng","persons":["Harry Halpin"],"tags":["camp19","10317","Security"],"view_count":301,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-11-25T12:45:04.741+01:00","length":2467,"duration":2467,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10317-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10317-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10317-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10317-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10317-fighting_back_against_libra_-_decentralizing_facebook_connect","url":"https://api.media.ccc.de/public/events/9150324f-d11c-48f6-9c0f-a0dbed7f2387","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":13},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":9},{"event_id":7418,"event_guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","weight":7},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":8},{"event_id":7427,"event_guid":"0d45023b-ddb8-4048-bf39-1bffc11ff097","weight":3},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":7},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":5},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":7},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":4},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":16},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":7},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":4},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":8}]},{"guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","title":"Architecture of secure IoT devices","subtitle":"Security by design","slug":"Camp2019-10268-architecture_of_secure_iot_devices","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10268.html","description":"This talk will present a secure IoT architecture by design, incorporating secure boot (such as HAB of iMx6), secure update processes, system partitioning and redundancy, system recovery, flash wear-out, and secure remote access, \n\nThis talk will present a secure IoT architecture by design, incorporating secure boot (such as HAB of iMx6), secure update processes, system partitioning and redundancy, system recovery, flash wear-out, and secure remote access, ","original_language":"eng","persons":["frehberg"],"tags":["camp19","10268","Security"],"view_count":420,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-01T19:15:05.527+01:00","length":2887,"duration":2887,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10268-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10268-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10268-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10268-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10268-architecture_of_secure_iot_devices","url":"https://api.media.ccc.de/public/events/260ac343-6ccd-4652-8667-adf4e6d5cdeb","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":20},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":13},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":14},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":8},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":25},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":8},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":7},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":6},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":8},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":8},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":15},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":17},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":19},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":13},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":13},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":8},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":12},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":14},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":18},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":17}]},{"guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","title":"LO! An LLVM Obfuscator","subtitle":null,"slug":"Camp2019-10299-lo_an_llvm_obfuscator","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10299.html","description":"In this talk we will present how intermediate code transformations can be used to obfuscate code and the advantadges and limitations they introduce. We will also brielfy discuss some techniques that could help detect and reverse code obfuscated in such ways.\n\n\u003cp\u003eDespite their limitations, intermediate languages like LLVM-IR provide the best way to write code transformations that work well for all the input and output languages supported by the compiler framework.\u003c/p\u003e\n\u003cp\u003eUsually, this is used to write optimization passes, but nothing prevents you from using them to make the resulting code less inteligible to an external reader.\u003c/p\u003e\n\u003cp\u003eThis talk will focus on how different obfuscation techniques can be implemented and used as such passes and what are the limitations that may make implementing, for example, an unpacker a bit harder.\n\u003cp\u003eWe will also cover how some of these techniques can be reversed (specially when perfoming comparative analysis).\u003c/p\u003e\n\u003cp\u003eKeep in mind that although LO started as a way to provide a way to deterministically increase variability in generated code and make finding out the patched flaws harder, many of it's techniques like code flattening or constant expansions are also used by other users of obfuscated code, for example malware.\u003c/p\u003e","original_language":"eng","persons":["Klondike"],"tags":["camp19","10299","Security"],"view_count":550,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-18T13:45:06.867+01:00","length":2756,"duration":2756,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10299-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10299-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10299-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10299-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10299-lo_an_llvm_obfuscator","url":"https://api.media.ccc.de/public/events/078e6819-edca-4b0a-a417-a964a9c08ce3","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":8},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":7},{"event_id":7380,"event_guid":"28293a80-2dff-433b-8c79-a714ca4e84bc","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":10},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":6},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":7},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":3},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":7},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":6},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":2},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":7},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":3},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":8},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":4},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":4},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":11},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":6},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":6}]},{"guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","title":"Hacking Containers and Kubernetes ","subtitle":"Exploiting and protecting containers with a few lines of scripting","slug":"Camp2019-10178-hacking_containers_and_kubernetes","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10178.html","description":"The talks shows the security model of Kubernetes and how to detect and fight security weaknesses with a few lines of scripting.\n\nHidden under the hood of Kubernetes are a lot of security features. Starting from the Linux namespaces used in containers to the network there are a lot of configurations with many bells and whistles supporting or totally destroying the security of a cluster\n\nThe talk gives an overview of the container escape vulnerabilities in the wild, that are documented in the CVE database. Simple scripts are shown to check clusters for vulnerabilities. The scripts are used to analyze Istio, the \"trust nothing\" distributed firewall solution, and find an exploitable attack immediately. This would be a script kiddie attack, if they already would have started using Kubernetes and Istio.\n\nFinally, it is shown, how Istio has handled the bug report and how future versions from 1.2 will close the exploit using the Container Network Interface (CNI).","original_language":"eng","persons":["Thomas Fricke"],"tags":["camp19","10178","Security"],"view_count":2034,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-24T04:45:02.091+01:00","length":2582,"duration":2582,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10178-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10178-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10178-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10178-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10178-hacking_containers_and_kubernetes","url":"https://api.media.ccc.de/public/events/24b58c74-2bba-412e-84ac-c206f714f0b7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":68},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":69},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":109},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":71},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":51},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":40},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":56},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":137},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":62},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":78},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":52},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":91},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":44},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":52},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":49}]},{"guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","title":"card10 assembly","subtitle":null,"slug":"camp2019-2323-card10","link":"https://c3voc.de","description":"card10 assembly","original_language":"eng","persons":[],"tags":["camp19","2323"],"view_count":3282,"promoted":false,"date":"2019-08-20T23:42:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-28T04:15:03.185+01:00","length":273,"duration":273,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/2323-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/2323-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/2323-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/2323-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/camp2019-2323-card10","url":"https://api.media.ccc.de/public/events/b69c19ce-7c89-4afd-9396-ea664f80dba8%20","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":228},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":209},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":337},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":63},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":69},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":49},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":129},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":52},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":117},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":137},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":44},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":66},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":99},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":43},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":40},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":37},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":80},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":43}]},{"guid":"7c043172-6fbe-4a23-a990-69c5bcab8f5d","title":"On bendy inflatables and travelling techno","subtitle":"Or, making hackercamp installations for cheap","slug":"Camp2019-10324-on_bendy_inflatables_and_travelling_techno","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10324.html","description":"I’ve made several interactive hackercamp installations over the years. I’ll talk about how they work, how they were made (generally very cheaply), about how people found ways to interact with them, and about what I’ve learned about experience design from them. And about where you can find the source code, obviously.","original_language":"eng","persons":["Jarkman"],"tags":["camp19","10324","Hardware \u0026 Making"],"view_count":448,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-01-23T22:30:16.808+01:00","length":2621,"duration":2621,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10324-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10324-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10324-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10324-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10324-on_bendy_inflatables_and_travelling_techno","url":"https://api.media.ccc.de/public/events/7c043172-6fbe-4a23-a990-69c5bcab8f5d","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":13},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":31},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":13},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":20},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":18},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":23},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":22},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":25},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":41},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":20},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":16},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":13},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19}]},{"guid":"6d16f60d-11cd-53ca-88bb-ccd014b20a9e","title":"Nice View Reporter","subtitle":null,"slug":"thms-33-nice-view-reporter","link":"http://talx.thm.cloud/thms/talk/PEXUEM/","description":"Projektwoche an einer Schule in Msambweni, Kenia\n\nDie Nice View Gratitude School in der kenianischen Kleinstadt Msambweni hat zwar einen eigenen IT-Raum, in dem die rund 150 Schülerinnen und Schüler lernen, mit Computern umzugehen. Aber die Schule hatte bislang keinen Internet-Anschluss. Und das in Kenia, einem Land, das im Grunde ein riesiger Hub in Sachen Internet-Technik ist, wo an jeder Ecke brauchbare, pragmatische und innovative digitale Anwendungen programmiert werden und mehr als 85 Prozent der Bevölkerung – meist mobilen – Zugang zum Internet hat. FLMH hat im Januar 2019 die Schule mit einem Internetanschluss ausgerüstet und zusammen mit den Schüler*innen und Lehrern eine Projektwoche veranstaltet.\n\nWebiste der Nice View Reporter: https://nice-view-reporter.org/\nProjektbeschreibung: https://www.flmh.de/projekte/nice-view-reporter/","original_language":"deu","persons":["Martin Thomas","Ralf Mueller von der Haegen"],"tags":["thms","33","Talk"],"view_count":116,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2025-05-18T19:30:03.849+02:00","length":3048,"duration":3048,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/33-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/33-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/33-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/33-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-33-nice-view-reporter","url":"https://api.media.ccc.de/public/events/6d16f60d-11cd-53ca-88bb-ccd014b20a9e","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":2},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":4},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":4},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":4},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":4},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":1},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":5},{"event_id":7380,"event_guid":"28293a80-2dff-433b-8c79-a714ca4e84bc","weight":4},{"event_id":7382,"event_guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","weight":4},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":3},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":1},{"event_id":7394,"event_guid":"14a2c922-697c-4073-885c-568850a390a7","weight":1},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":4},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":3},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":2},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":2},{"event_id":7406,"event_guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","weight":4},{"event_id":7408,"event_guid":"ecc2fea1-4e7c-5dce-a88c-e808dd245271","weight":8},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":1},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":3},{"event_id":7418,"event_guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","weight":4},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":6},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":2},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":2},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":4},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":4},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":2},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":4},{"event_id":7440,"event_guid":"cf5d0389-ea8b-55d9-966c-2669e88de93a","weight":5},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":4},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":4},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":4},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":5},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":4}]},{"guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","title":"River Crab, Harmony and Euphemism","subtitle":"A Peek at Chinese Online Culture under the Censorship","slug":"Camp2019-10239-river_crab_harmony_and_euphemism","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10239.html","description":"An informative and lighthearted overview of contemporary Chinese online culture \n\nA river crab (Hé Xiè) is a homophone of “harmony”(Hé Xié) in Mandarin Chinese. The word \"harmonious society\" was brought up by ex-Chinese leader Hu Jintao's in his speech on signature ideology, which gradually led to the censorship policy that we see nowadays on Chinese internet. The talk will introduce its recent history and status quo of the censorship with actual cases. \n\nI’ll explain, as a native speaker of Chinese language, the subversive humor and ingenious creativity that Chinese netizens employ to get around the infamous online censorship. The censorship scheme is as bad as portrayed in Western media, however you don’t often see people talk about its inefficiency, if not futility. Due to the complicated nature of Chinese language, the collective intelligence can always quickly come up with many ways- homophones being one of them - to circumvent the existing list of censorship. \n\nYou won’t become a China expert after the talk but your will definitely know a bit more about the linguistic and cultural aspects of the gigantic country than before. ","original_language":"eng","persons":["Brusda"],"tags":["camp19","10239","Ethics, Society \u0026 Politics"],"view_count":280,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2025-12-28T16:15:11.028+01:00","length":2733,"duration":2733,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10239-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10239-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10239-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10239-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10239-river_crab_harmony_and_euphemism","url":"https://api.media.ccc.de/public/events/4f0aca57-b1b1-4cbc-9538-70fb76bf3216","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":8},{"event_id":7370,"event_guid":"7c043172-6fbe-4a23-a990-69c5bcab8f5d","weight":10},{"event_id":7372,"event_guid":"a4e27089-dc12-4e83-93c9-8ac5cb8bad6e","weight":8},{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":9},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":13},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":12},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":9},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":12},{"event_id":7388,"event_guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":8}]},{"guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","title":"Introduction to (home) network security.","subtitle":"A beginner-friendly guide to network segmentation for privacy and security in the age of the Internet of Insecure Things.","slug":"Camp2019-10225-introduction_to_home_network_security","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10225.html","description":"Typical home networks use a closed-source Internet Service Provider supplied router/firewall and contain no restrictions on communications between clients within the network. The widespread deployment of network-connected appliances, control systems, lighting, etc, means that this design is insecure. This talk will cover the basics of networking, including why and how segregation of different types of network clients and traffic can be achieved to increase privacy and security.\n\nAn introduction to wired and wireless networking aimed at home users, but equally applicable in a business context. We will examine basic network theory, typical designs, threats to privacy and security, and steps to reduce the risks presented by these threats. If you are a networking guru, then this is probably not the talk for you. This talk is for anyone interested in learning more about how a small network operates and things they should consider with regards to privacy and security. Topics to be covered: What is Ethernet; how network devices communicate; what is a broadcast zone; what is a subnet; network layers; physical and logical segregation of network traffic;  basic WiFi theory; basics of firewall and wireless access point security and why running your own is better than letting your ISP do it for you.","original_language":"eng","persons":["Egor"],"tags":["camp19","10225","Security"],"view_count":2639,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-02-18T16:00:10.342+01:00","length":2465,"duration":2465,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10225-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10225-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10225-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10225-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10225-introduction_to_home_network_security","url":"https://api.media.ccc.de/public/events/e1b56229-fb1e-480c-9691-c137ec11ee51","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":110},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":129},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":135},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":84},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":84},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":66},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":137},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":68},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":86},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":61},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":55},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":45},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":94},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":222},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":72},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":98},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":59},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":172},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":57},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":75},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":80},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":49},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":39},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":92},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":93}]},{"guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","title":"Introduction to Mix Networks and Katzenpost","subtitle":"a new anonymity movement","slug":"Camp2019-10226-introduction_to_mix_networks_and_katzenpost","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10226.html","description":"This talk will introduce the fundamental concepts of mix networks as\nwell as the Katzenpost mix network free software project. We are not\njust implementing a new mix network but starting a new anonymity\nmovement and we welcome others to join us! Like Tor, mix networks\nprotect metadata by using layered encryption and routing packets\nbetween a series of independent nodes. Mix networks resist vastly more\npowerful adversary models than Tor though, including partial defense\nagainst global passive adversaries. In so doing, mix networks add both\nlatency and cover traffic. I shall outline the basic components of a\nmix network, touch on their roles in resisting active and passive\nattacks. In particular I'll mention how mix networks can be used with\nencrypted messaging applications and crypto currency to resist global\nnetwork surveillance and traffic analysis.\n\n\nAcademics have proposed various anonymity technologies with far\nstronger threat models than Tor, but by far the most practical and\nefficient option remains mix networks, which date to the founding of\nanonymity research by David Chaum in 1981. Tor was inspired by mix\nnetworks and shares some superficial similarities, but mix networks'\nare vastly stronger if they judiciously add latency and decoy traffic.\n\nThere are several historical reasons why mixnets lost popularity and\nwhy Tor's onion routing won. Namely, Tor is low latency and can be\nused to browse the web. This is in contrast to mix networks which are\nessentially an unreliable packet switching network. Historically mix\nnetworks achieved enough mix entropy by using long delays whereas it\nis becoming more widely understood that there exists a trade off\nbetween legit traffic, decoy traffic and latency. After this\nintroduction to mix networks I'll talk a bit about the Katzenpost mix\nnetwork software project which is based off of the recently published\nacademic paper \"The Loopix Anonymity System\". These new insights into\nmix network designs allow modern mix networks to make the correct\ndesign trade offs so that we can keep the latency relatively\nlow. Historically high latency and unreliability has been a major\nobstacle to mass adoption. I shall explain how Katzenpost solves both\nof these problems and allows developers to easily add network services\nto the mix network to support a wide variety of client applications\nincluding but not limited to: encrypted messaging, crypto currency\ntransaction transport, offline browsing and, transporting client\ninteractions with Distributed Hash Tables and Conflict Free\nReplicating Data Types et cetera.\n","original_language":"eng","persons":["David Stainton","mo"],"tags":["camp19","10226","Security"],"view_count":589,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-03-27T21:30:07.066+01:00","length":2828,"duration":2828,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10226-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10226-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10226-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10226-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10226-introduction_to_mix_networks_and_katzenpost","url":"https://api.media.ccc.de/public/events/9e141f51-1fd3-482b-8af8-92f7f65653f7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":10},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":9},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":9},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":8},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":24},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":9},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":5},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":12},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":13},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":28},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":6},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":23},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":16},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":13},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":19},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":9},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":17},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":12}]},{"guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","title":"Denn so wissen wir, was sie tun: Das Berliner Transparenzgesetz","subtitle":null,"slug":"thms-15-denn-so-wissen-wir-was-sie-tun-das-berliner-transparenzgesetz","link":"http://talx.thm.cloud/thms/talk/MRJQ7S/","description":"Ein Hoch auf Volksentscheide! Wir erzählen vom Berliner Volksentscheid für ein Transparenzgesetz, das wir ins Leben gerufen haben. Hier könnt ihr unterschreiben. Und wir zeigen, wie ihr mitmachen könnt.\n\nIm August hat die Unterschriftensammlung für das Berliner Transparenzgesetz begonnen. Ein breites Bündnis aus Open Knowledge Foundation, Mehr Demokratie, CCC und vielen weiteren hat einen 64-seitigen Gesetzentwurf geschrieben, der in Berlin zu mehr Transparenz und Bürgerbeteiligung führen würde. Und nebenbei müsste die Berliner Verwaltung auch den Quelltext ihrer Software offenlegen.","original_language":"deu","persons":["Arne"],"tags":["thms","15","Talk"],"view_count":256,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-03T21:30:19.958+01:00","length":1667,"duration":1667,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/15-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/15-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/15-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/15-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-15-denn-so-wissen-wir-was-sie-tun-das-berliner-transparenzgesetz","url":"https://api.media.ccc.de/public/events/ca81a392-cd83-55b0-abd5-1ed379611b37","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":13},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":13},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":14},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":11},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":5},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":8},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":29},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":27},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":3},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":17},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":21},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":10},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":5}]},{"guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","title":"Updates from the Onion","subtitle":"The Road to Mobile Tor and Improved Censorship Circumvention","slug":"Camp2019-10340-updates_from_the_onion","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10340.html","description":"The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we have been up to in the past months, what happened in the wider Tor ecosystem, and what lies ahead of us.\n\nIn the last year the Tor Project has been working hard on improving the software, building and training communities around the world as well as creating an anti-censorship team and roadmap that can push forward technologies to circumvent censorship. This talk will cover major milestones we achieved and will give an outline about what is lying ahead. In particular, we'll talk about the release of Tor Browser for Android and restructuring our anti-censorship efforts as well as working on next generation pluggable transports. Moreover, we'll explain our defense against website traffic fingerprinting attacks and plans for improving onion services and making them more usable (DDoS resistance, better user interfaces for authentication and dealing with errors). Finally, we'll shed some light on efforts to get Tor support directly embedded into other browsers, like Firefox and Brave, and educating users both by reorganizing the content on our website and extensive trainings throughout the world.","original_language":"eng","persons":["GeKo"],"tags":["camp19","10340","Security"],"view_count":458,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2025-05-02T18:00:08.547+02:00","length":2625,"duration":2625,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10340-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10340-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10340-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10340-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10340-updates_from_the_onion","url":"https://api.media.ccc.de/public/events/a9b096f5-3db7-4c83-af7c-289afa1d886c","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":1},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":8},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":24},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":34},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":14},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":17},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":21},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":14},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":14},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":14},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":28},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":17},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":16}]},{"guid":"ebffdad1-55ef-4b66-b7cd-a170c801c147","title":"c3Power Monitoring CCCamp 19","subtitle":"Strom in Bits und Bytes visualisiert","slug":"Camp2019-10397-c3power_monitoring_cccamp_19","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10397.html","description":"\u003cpre class=\"moz-quote-pre\"\u003eInfrastructure Review des Camp 2019 Stromnetz aus Sicht des auf der GPN in der Theorie vorgestellten Low Cost Power Monitoring. Aufbau des Monitoring-Netzes, Inbetriebnahme und Ergebnisse von Tag -1 bis Tag 4.\r\n\r\nWie verh\u0026auml;lt sich das Netz von c3Power auf dem Camp 2019 zu den verschiedene Tageszeiten, wie sieht die Auswertung von z.B. Lastverteilung, Netzoberwellen, Fehlerrate aus. Visualisierung der Daten in Grafana, Server Infrastruktur. Do:s and don't:s vom Aufbau der Hardware, Betrieb bei 50 Grad plus und 10 cm Wasserstand im Freien. Stabilit\u0026auml;t des Campnetzes in den ersten 4 Tagen. Integration ins DMR Funknetz \u0026uuml;ber MMDVM Hotspots zum Absenden der Fehlermeldungen als DMR SMS. Abhandeln der St\u0026ouml;rmeldungen. Impressionen vom c3power Team w\u0026auml;hrend des Events.\u003c/pre\u003e","original_language":"deu","persons":["RFguy"],"tags":["camp19","10397","2019","Hardware \u0026 Making"],"view_count":909,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-09-02T02:00:00.000+02:00","updated_at":"2026-03-27T08:30:05.721+01:00","length":2394,"duration":2394,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10397-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10397-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10397-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10397-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10397-c3power_monitoring_cccamp_19","url":"https://api.media.ccc.de/public/events/ebffdad1-55ef-4b66-b7cd-a170c801c147","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":14},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":3},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":22},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":16},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":16},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":13},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":20},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":8},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":8},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":9},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":8},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":20},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":11},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":8},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":11},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":9},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":8},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":21},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":5},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":41},{"event_id":7760,"event_guid":"0850ac34-342c-4352-89d5-6c31f0f1fe6b","weight":3}]},{"guid":"ecc2fea1-4e7c-5dce-a88c-e808dd245271","title":"Konviviale Software vor und jenseits des digitalen Kapitalismus","subtitle":null,"slug":"thms-42-konviviale-software-vor-und-jenseits-des-digitalen-kapitalismus","link":"http://talx.thm.cloud/thms/talk/ET9CFU/","description":"Der Vortrag geht der Frage nach, welche Aspekte der Geschichte des digitalen Wandels mit der Bestrebung nach einer sozial-ökologischen Gestaltung von Technik zu tun haben. Dabei wird gezeigt, was die Nachhaltigkeitsbewegung von der Free-Software-Bewegung und der Hacker-Ethik lernen kann, insbesondere bzgl. der Autonomie gegenüber digitalen Großkonzernen durch Selbstverwaltung und kollaborative Entwicklung. Andersherum wird diskutiert, was die Techszene über die Notwendigkeit und Möglichkeiten einer sozial-ökologischen Transformation lernen kann. Im Grunde genommen geht es hier darum, die emanzipatorischen Elemente der digitalen Technikentwicklung (die vor dem digitalen Kapitalismus des 21. Jahrhunderts existierten und sich ihm weiterhin entgegenstellen) und die Botschaften der politischen Ökologie in eine gemeinsame Erzählung zusammenzuführen.\n\nDer Begriff \"Konvivialität\" wurde in der politischen Ökologie eingeführt, um eine Vorstellung von Technik zu beschreiben, die sich von der industriellen Produktivität unterscheidet. Dabei geht es darum, Technik auf der Grundlage sozial-ökologischer Kriterien zu bewerten. Diese Kriterien werden vorgestellt und auf den Bereich digitale Technik angewandt. Ein Überblick über die Geschichte der Softwareentwicklung und des digitalen Kapitalismus wird zeigen, dass Konvivialität viel mit FOSS-Prinzipien zu tun hat, im Gegensatz zu kommerzieller Software, die von Konzernen entwickelt wird. Die Analyse anhand von Konvivialitätskriterien wird dadurch zur nützlichen Methode, um über digitale Technik zu reflektieren. Perspektivisch könnte das zu einer Annäherung der kritischen Tech- und Ökologiebewegungen führen: die etablierte Praxis der Free-Software-Bewegung könnte zu einer Keimform einer sozial-ökologischen Utopie jenseits des digitalen Kapitalismus werden.","original_language":"deu","persons":["Nicolas"],"tags":["thms","42","Talk"],"view_count":149,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2025-10-20T04:00:03.149+02:00","length":2690,"duration":2690,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/42-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/42-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/42-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/42-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-42-konviviale-software-vor-und-jenseits-des-digitalen-kapitalismus","url":"https://api.media.ccc.de/public/events/ecc2fea1-4e7c-5dce-a88c-e808dd245271","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7377,"event_guid":"117f530f-a20b-4071-b208-39e989a42408","weight":4},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":8},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":4},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":6},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":6},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":4},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":4},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":4},{"event_id":7406,"event_guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","weight":13},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":6},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":8},{"event_id":7410,"event_guid":"6d16f60d-11cd-53ca-88bb-ccd014b20a9e","weight":8},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":4},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":5},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":6},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":5}]},{"guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","title":"Little Big Data","subtitle":"Spurensuche in elektronischen Teilnehmerverzeichnissen","slug":"Camp2019-10257-little_big_data","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10257.html","description":"Ein Geheimdienst im 21. Jahrhundert, der was auf sich hält, muss Big Data machen: Möglichst alles über alle Bürger sammeln, horten, sortieren, filtern, rastern und ja niemandem was von den Ergebnissen mitteilen. Da haben wir uns gedacht: Das können wir auch! Daher machen wir für unseren eigenen Kurznachrichtendienst eben in Little Big Data.\n\nPraktischerweise stellt die Deutsche Telekom im Halbjahrestakt eine digitale Offlinedatenbank bereit, die schonmal Adressen, Telefonnummern und Geokoordinaten der meisten Einwohner enthält - und das seit 1992. Einzige Nachlässigkeit: Die Informationen sind in binärer Form auf den Datenträgern abgelegt und die Gewissenhaftigkeit der Informanten im Post- und Telekomdienst lässt ausweislich offensichtlicher Fehler in den Datensätzen zu wünschen übrig.\n\nBegleitet uns in einem besinnlichen Diavortrag bei Geschichten einer abenteuerlichen Jagd nach den Datensätzen, von nervenaufreibendem Starren auf Binärmuster, um den Geheimnissen der Encraption auf den Grund zu gehen und dem überwältigenden Gefühl, mal an Datenmengen zu schnuppern, die noch vor ein paar Jahren problemlos als “Big Data” durchgegangen wären.","original_language":"deu","persons":["erdgeist","Andreas Lehner"],"tags":["camp19","10257","Ethics, Society \u0026 Politics"],"view_count":1098,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-04-03T21:30:05.919+02:00","length":2784,"duration":2784,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10257-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10257-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10257-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10257-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10257-little_big_data","url":"https://api.media.ccc.de/public/events/65d27021-12c5-4e4c-8cfd-20c50ec9795a","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":9},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":20},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":24},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":20},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":3},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":25},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":26},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":25},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":13},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":7},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":10},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":13},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":34},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":19},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":5},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":3},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":32},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":21},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":19}]},{"guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","title":"FridaysForFuture was, wie, warum?","subtitle":null,"slug":"thms-48-fridaysforfuture-was-wie-warum-","link":"http://talx.thm.cloud/thms/talk/KXW3SP/","description":"“Wir sind nicht nur verantwortlich für das, was wir tun, sondern auch für das was wir nicht tun” \n\nFridaysForFuture - die größte SchülerInnenbewegung aller Zeiten weltweit. Wie Jugendliche im Konsens der Wissenschaft um ihre Zukunft kämpfen.\n\n“Wir sind nicht nur verantwortlich für das, was wir tun, sondern auch für das was wir nicht tun” \n\nFridaysForFuture - die größte SchülerInnenbewegung aller Zeiten weltweit. Wie Jugendliche im Konsens der Wissenschaft um ihre Zukunft kämpfen.","original_language":"deu","persons":["Lucia und Ben"],"tags":["thms","48","Talk"],"view_count":250,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2024-05-22T19:45:06.779+02:00","length":1209,"duration":1209,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/48-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/48-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/48-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/48-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-48-fridaysforfuture-was-wie-warum-","url":"https://api.media.ccc.de/public/events/b4902bdb-38ab-5abb-9884-5efdb4bca02f","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":24},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":15},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":12},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":5},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":11},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":12},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":15},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":5},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":14},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":19},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":19},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":12},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":13},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":12},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":16},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":10},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":12},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":12}]},{"guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","title":"Why Nobody cares, and only You can save the World","subtitle":"Technology, Intuitions \u0026 Moral Expertise","slug":"Camp2019-10251-why_nobody_cares_and_only_you_can_save_the_world","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10251.html","description":"This talk aims to provide a possible explanation why most people seem to care very little about the unethicality of much of today’s technologies. It outlines what science and philosophy tell us about the biological and cultural evolutionary origins of (human) morality and ethics, introduces recent research in moral cognition and the importance of moral intuitions in human decision making, and discusses how these things relate to contemporary issues such as A(G)I, self-driving cars, sex-robots, “surveillance capitalism”, the Snowden revelations and many more. Suggesting an “intuition void effect” leading standard users to remain largely oblivious to the moral dimensions of many technologies, it identifies technologists as “learned moral experts”, and emphasizes their responsibility to assume an active role in safeguarding the ethicality of today’s and future technologies.\n\nWhy is it that in a technological present full of unethical practices – from the “attention economy” to “surveillance capitalism”, “planned obsolescence”, DRM, and so on and so forth – so many appear to care so little? \n\nTo attempt to answer this question, the presentation begins its argument with an introduction into our contemporary understanding about the origins of (human) morality / ethics.  From computational approaches a la Axelrod’s Tit for Tat, Frans De Waal’s cucumber-throwing monkeys and Steven Pinker’s “Better Angles of our Nature”, to contemporary moral psychology and moral cognition and these fields’ work on moral intuitions. \n\nAs research in the last couple of decades in these fields suggest, it appears that much, if not most of (human) moral / ethical decision making is based on moral intuitions rather than careful, rational reasoning. Joshua Greene likens this to the difference between the “point-and-shoot” mode and the manual mode of a digital camera. Jonathan Haidt uses a metaphorical elephant (moral intuition) and his rider (conscious deliberation) to emphasize the difference in weight. These intuitions are the result of both biological and cultural evolution – the former carrying most of the weight. \n\nThe problem with this basis for our moral decision making is, as this presentation will argue, that \nwe have not (yet) had the time to evolve (both culturally and biologically), “appropriate” moral intuitions towards the technologies that surround us everyday, resulting in an “moral intuition void” effect. And without initial moral intuitions in the face of a technological artifact, neither sentiment nor reason may be activated to pass judgment on its ethicality. \n\nThis perspective allows for some interesting conclusions. Firstly, technologists (i.e. hackers, engineers, programmers etc.) for one, who exhibit strong moral intuitions toward certain artifacts have to be understood as “learned moral experts”, whose ability to intuitively grasp the ethical dimensions of a certain technology is not shared by the majority of users. \n\nSecondly, users cannot be expected to possess an innate sense of “right and wrong” with regards to technologies. Thirdly, entities (such as for-profit corporations) need to be called out for making deliberate use of the “moral intuition void” effect.\n\nAll in all, this presentation aims to provide a tool for thinking that may be put to use in various cases and discussions. It formulates the ethical imperative for technologists to act upon their expertise-enabled moral intuitions, and calls for an active “memetic engineering process” to “intelligently design” appropriate, culturally learned societal intuitions and responses for our technological present and future.","original_language":"eng","persons":["Wilhelm Klein"],"tags":["camp19","10251","2019","Ethics, Society \u0026 Politics"],"view_count":289,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-06-20T12:00:03.460+02:00","length":2689,"duration":2689,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10251-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10251-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10251-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10251-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10251-why_nobody_cares_and_only_you_can_save_the_world","url":"https://api.media.ccc.de/public/events/abb70bc3-9d18-4db1-ad60-ddfd5c272944","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":9},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":15},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":12},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":9},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":9},{"event_id":7418,"event_guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","weight":10},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":3},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":15},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":7},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":14},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":4},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":16},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":4},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":12},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":17},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":6},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":9},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":6}]},{"guid":"508fe23f-bc69-4521-abc3-59b649598eb5","title":"Deaths per TWh","subtitle":"The Price of Energy and Reducing CO2 Emissions","slug":"Camp2019-10193-deaths_per_twh","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10193.html","description":"Climate change and the discussion about reducing CO2 emissions to ensure matching the Paris agreement currently is the most important topic in our political and economic discussions. We all agree reducing emissions is a necessity, but how can we possibly achieve this in a world that consumes more energy than ever before? And which price are we willing to pay for it?\n\nClimate change and the discussion about reducing CO2 emissions to ensure matching the Paris agreement currently is the most important topic in our political and economic discussions. We all agree reducing emissions is a necessity, but how can we possibly achieve this in a world that consumes more energy than ever before? And which price are we willing to pay for it?\n\n[The Paris agreement](https://ec.europa.eu/clima/policies/international/negotiations/paris_en) sets out a global action plan to put the world on track to avoid dangerous climate change by limiting global warming to well below 2°C and pursuing efforts to limit it to 1.5°C. This can only be achieved by reducing emissions - this primarily means CO2 emission.\n\nSo far, so good. But let's face the truth: We NEED energy. Our whole world is addicted to it, and cutting the power lines is no option for today's society, economy, and our daily lives. \n\nWe need energy, therefor we need power plants. Power plants need energy sources for transforming them into electrical energy. These plants can be fuelled by various sources: Coal, wind, solar, nuclear, natural gas, biomass, and oil, just to name the major ones.\n\nLet's assume for a moment we could build a completely new power infrastructure for a country from scratch under the following prerequisites:\n\n* Minimal CO2 emissions\n* As little impact as possible (environment, health, economics etc.)\n* Affordable price\n* Available sources\n* Lowest possible fuckup factor\n\nThis task can be approached by translating it into an optimization problem: Finding the ideal energy mix taking into account the conditions listed above.\n\nThis talk presents an analysis of this optimization problem by comparison of the relevant factors (emissions, affordability, impact, sources) of different energy sources (coal, natural gas, wind, solar, biomass, nuclear and oil). Our aim is to categorize different energy sources under a strict scientific regime without emotional debates, putting price tags on each of them not only made of money but also factors like emissions, fuckup factors, health concerns, and the cost of human lives per TWh. ","original_language":"deu","persons":["Julia Riede"],"tags":["camp19","10193","Science"],"view_count":1028,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-02-09T00:00:09.796+01:00","length":2478,"duration":2478,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10193-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10193-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10193-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10193-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10193-deaths_per_twh","url":"https://api.media.ccc.de/public/events/508fe23f-bc69-4521-abc3-59b649598eb5","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":4},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":8},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":2},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":16},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":16},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":22},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":10},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":2},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":23},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":13},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":2},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":2},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":13},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":2},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":27},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":31},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":18},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":15},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":29},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":17},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":18},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":19},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":14}]},{"guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","title":"500.000 Recalled Pacemakers, 2 Billion $ Stock Value Loss","subtitle":"The Story Behind","slug":"Camp2019-10288-500_000_recalled_pacemakers_2_billion_stock_value_loss","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10288.html","description":"During an independent security assessment of several pacemaker vendors multiple lethal and highly critical vulnerabilities were found. Based on previous experience with one specific vendor a new way of monetising vulnerabilities has been chosen. After going public a huge discussion on vulnerability disclosure ethics and responsibilities began. The stock value of the affected vendor dropped by 2 billion dollar just in one single day. The security researchers got discredited and a huge lawsuit was started. After a year of mutual accusations and denial more than 500.000 pacemakers got recalled. This talk will provide insights into pacemaker security and share first-hand experience gathered during this project. A special focus will also be on ethical vulnerability disclosure and lessons learned for future security research.","original_language":"eng","persons":["Tobias Zillner "],"tags":["camp19","10288","Security"],"view_count":621,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-02-26T20:15:09.755+01:00","length":2666,"duration":2666,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10288-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10288-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10288-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10288-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10288-500_000_recalled_pacemakers_2_billion_stock_value_loss","url":"https://api.media.ccc.de/public/events/9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":27},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":30},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":37},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":33},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":26},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":45},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":29},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":32},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":25},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":29}]},{"guid":"9f38e10d-39e2-4380-83bf-26626396e476","title":"Visualization of networks using physics","subtitle":"How algorithms inspired by the laws of physics can create elegant and informative visual representations of complex networks","slug":"Camp2019-10352-visualization_of_networks_using_physics","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10352.html","description":"The beautifully complex structures often found in Nature arise from the collective interaction of huge numbers of particles moving under very simple forces.\nStarting from this fact, I will present how we can encode simple physical properties into large scale networks in a way that mimics a physical system and leads to elegant structures in 2d or 3d space. \nAfter introducing some basic concepts, a large part of the talk will consist of animated demonstrations of network evolution towards a final layout. The talk is aimed at scientists and curious non-scientists alike.\n\nLarge networks (graphs) appear in many types of human activity: computer, social, transportation, biological, and other networks that model the various connections and interactions in a system.\nNetworks are often depicted visually as sets of points on a plane connected by lines - at large scales however, this image becomes too difficult to interpret due to high density of points and/or too many line crossings. So it is essential to determine an ideal placement of the network's parts in order to reveal its structure in the most clear and informative way.\nThe laws of physics inherently contain dynamics capable of creating aesthetically appealing arrangements of high complexity, as can be seen in snowflakes, soap bubbles, crystals, or molecules in 3d space. By encoding physical qualities and dynamics in a network, we can leverage the laws of motion and the corresponding forces to let them shape the network. As the network is now acting like a physical system, it evolves towards a configuration of minimum energy and reaches a final state that exposes the symmetries, connected parts, and other features, in analogy to the wonderfully complex structures found in Nature.","original_language":"eng","persons":["aphotic"],"tags":["camp19","10352","2019","Science"],"view_count":252,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-11-12T12:30:07.447+01:00","length":2166,"duration":2166,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10352-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10352-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10352-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10352-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10352-visualization_of_networks_using_physics","url":"https://api.media.ccc.de/public/events/9f38e10d-39e2-4380-83bf-26626396e476","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":6},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":7},{"event_id":7376,"event_guid":"36b973e6-6203-4506-9317-4959d04ce0d0","weight":1},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":1},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":20},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":3},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":3},{"event_id":7388,"event_guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","weight":1},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":1},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":8},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":15},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":1},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":1},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":12},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":19},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":3},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":4},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":6},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":5},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":14},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":1},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":24},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":32},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":1},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":4},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":3}]},{"guid":"14a2c922-697c-4073-885c-568850a390a7","title":"Exposing Systems of Power and Injustice","subtitle":"5 Years of Disruption Network Lab","slug":"Camp2019-10200-exposing_systems_of_power_and_injustice","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10200.html","description":"Presenting the Disruption Network Lab programme in Berlin, we will connect the debate on surveillance and whistleblowing to a cultural framework, analysing the influence of whistleblowing in empowering both experts and non-experts. A talk with Tatiana T_Bazz Bazzichelli and Lieke Ploeger / Disruption Network Lab.\n\nThe act of whistleblowing is a concrete process able to reveal hidden facts, misconducts and wrongdoings of institutions and corporations, producing awareness about social, political and technological matters, informing about the reality we live in. Presenting the Disruption Network Lab programme in Berlin, we will connect the debate on surveillance and whistleblowing to a cultural framework, analysing the influence of whistleblowing in empowering both experts and non-experts. The talk will present the mutual interference between whistleblowing, art, hacking, and network development, as well as reflect on the influence of whistleblowing in the art \u0026 cultural field. This presentation aims to further question what we can collectively offer to encourage a critical debate on the effects of whistleblowing in society, as well as to generate experimental ways of thinking within the digital scenario.","original_language":"eng","persons":["Tatiana Bazzichelli / Disruption Network Lab"],"tags":["camp19","10200","Art \u0026 Culture"],"view_count":113,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2024-10-20T15:45:02.063+02:00","length":2225,"duration":2225,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10200-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10200-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10200-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10200-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10200-exposing_systems_of_power_and_injustice","url":"https://api.media.ccc.de/public/events/14a2c922-697c-4073-885c-568850a390a7","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":4},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":4},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":3},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":4},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":7},{"event_id":7382,"event_guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","weight":5},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":7},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":6},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":6},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":7},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":6},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":6},{"event_id":7398,"event_guid":"31dfe9ce-3291-497b-80e2-1b7a82344834","weight":5},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":7},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":4},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":6},{"event_id":7418,"event_guid":"b1fc7b95-1b31-4504-9b67-e9d766b40f73","weight":4}]},{"guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","title":"E-Mail-Privatheit und Mailbox-Verschlüsselung","subtitle":null,"slug":"thms-34-e-mail-privatheit-und-mailbox-verschlsselung","link":"http://talx.thm.cloud/thms/talk/ACSFZ7/","description":"Überblick über den aktuellen Stand der Privatheit von E-Mails und Präsentation von [Userli](https://systemli.github.io/userli/), einer Webapplikation um E-Mailboxen zu verschlüsseln.\n\nZuerst werden die derzeitigen Probleme der Privatheit von E-Mail beleuchtet. Dies soll zeigen, dass es sich um eine Vielzahl von Problemen handelt, welche einzeln gelöst werden müssen. \nDanach wird Userli präsentiert, welches einen Teil dieser Probleme angeht: Die Privatheit des E-Mail-Storage.\nUserli ist eine FOSS-Webapplikation um die Verwaltung von E-Mail-Konten für Communities zu unterstützen und Postfächer zu verschlüsseln. Auch die Admins eines Servers können dann nicht mehr in die gespeicherten E-Mails schauen.\nUserli fokussiert sich auf die Selbstverwaltung kleiner Communities und bietet daher auch Einladungsmechanismen, Domain-spezifische Admins und weitere Rollen. Alias-Adressen helfen deine Identität vor Dritten zu verschleiern.\nUserli verwendet das Dovecot MailCrypt Plugin und libsodium um Postfächer zu verschlüsseln und einen Passwort-Reset-Mechanismus anzubieten, welcher ohne persönliche Informationen auskommt.","original_language":"deu","persons":["Tim"],"tags":["thms","34","2019","Talk"],"view_count":678,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-24T16:00:08.618+01:00","length":2132,"duration":2132,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/34-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/34-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/34-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/34-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-34-e-mail-privatheit-und-mailbox-verschlsselung","url":"https://api.media.ccc.de/public/events/361c6e0f-a89b-50a7-acc8-66e3c975e6b4","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":12},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":11},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":12},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":13},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":6},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":8},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":10},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":15},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":15},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":10},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":7},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":2},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":18},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":13},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":12},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":6},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":12},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":14},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":6}]},{"guid":"0d45023b-ddb8-4048-bf39-1bffc11ff097","title":"Participatory art event tools, co-creation and silk road networks","subtitle":"Collide, connect, cartography","slug":"Camp2019-10204-participatory_art_event_tools_co-creation_and_silk_road_networks","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10204.html","description":"The Borderland is a participatory art event in Denmark with 3210 co-creators. Over the last three years, we have created online tools to keep participation and co-creation high as the event has tripled in size in only three years. This seminar is about the design philosophy behind these tools, drawing parallels to the ancient silk road. These tools have since been spread to at least five other events around the world.\n\nIn developing the Borderland community online and offline, we've built tools that help us create denser networks, allowing for share creative processes, distributed art-grant allocation, empowered community members and decentralized decision making. \n\nThese tools, called Dreams and Realities are run alongside a customized version of the Loomio platform and our own instance of the Pretix ticketing platform. Dreams is for distributed art-grant distribution and project guidance. Realites is for stakeholder-mapping to understand how the needs, responsibilities, people and dependencies fit together in a decentralized organization.","original_language":"eng","persons":["hugi"],"tags":["camp19","10204","Art \u0026 Culture"],"view_count":181,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-13T14:30:09.898+01:00","length":2633,"duration":2633,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10204-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10204-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10204-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10204-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10204-participatory_art_event_tools_co-creation_and_silk_road_networks","url":"https://api.media.ccc.de/public/events/0d45023b-ddb8-4048-bf39-1bffc11ff097","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":3},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":3},{"event_id":7426,"event_guid":"7926f5ba-d424-4523-890b-08736b08a9b9","weight":3},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":2},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":3},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":3},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":3},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":3},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":3},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":3}]},{"guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","title":"Tales from Hardware Security Research","subtitle":"From Research over Vulnerability Discovery to Public Disclosure","slug":"Camp2019-10292-tales_from_hardware_security_research","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10292.html","description":"Almost every microcontroller features firmware readout protection. It aims at securing the code, algorithms, and cryptographic keys against unauthorized access. Despite datasheets are promising strong security, our research shows that this is often far from being true. In this talk we want to shed light onto the \"why?\" and especially \"how?\" we approach the security testing of such protection mechanisms. Furthermore, we will talk about our attempts, discussions, and hassles from the vulnerability disclosure process - from successful ones to dead ends.\n\nSince several years, we, Johannes and Marc, do practical research in the field of embedded system security at a research institute. In this talk, we want to give an insight into the daily work as hardware security researchers. This ranges from giving recommendations on how to secure systems up to verifying microcontroller security in real environments. However, no practical experience and information on the resilience of common microcontrollers is publicly available - a gap we want to close. Especially when trying to make use of the integrated security features, their effectiveness often collapses quickly due to design weaknesses.\n\nOur focus lies on firmware protection mechanisms since they often are the root of security in embedded systems.\nDuring our research we were able to circumvent several mechanisms implemented from different manufacturers.\nIn most cases, each attack requires only low-priced equipment, thereby increasing the impact of each weakness and resulting in a severe threat altogether.\nWe will present one of those attacks, which can be performed within minutes, on stage.\n\nDue to the severe impact of these results, we immediately informed the manufacturers in a coordinated disclosure process.\nHowever, this is often not as simple as expected and maybe even risky.\nIn this talk we will shortly state the chosen approach and will then compare our expectations on coordinated disclosure with the real reactions of the addressed manufacturers - ranging from a friendly discussion, over tricking-into-NDA, up to ghosting.\n\nFinally we will give some ideas on how to read between the lines in datasheets. Additionally, we will outline the legal gray area of applied security research in academia.","original_language":"eng","persons":["Johannes","marc"],"tags":["camp19","10292","Security"],"view_count":493,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-02-01T20:45:12.018+01:00","length":2752,"duration":2752,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10292-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10292-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10292-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10292-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10292-tales_from_hardware_security_research","url":"https://api.media.ccc.de/public/events/5337766f-3676-4a2a-b1f6-4bd66b4d71af","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":15},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":19},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":17},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":9},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":25},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":17},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":18},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":11},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":10},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":11},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":15},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":11},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":13},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":19},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":18},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":11},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":11},{"event_id":7412,"event_guid":"0ef9486d-7f7a-5298-9042-3e55c19768d2","weight":17},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":15},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":16},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":19},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":29}]},{"guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","title":"Chaosradio 254","subtitle":"","slug":"thms-37-chaosradio-254","link":"http://talx.thm.cloud/thms/talk/FMQ3UN/","description":"\u003cp\u003eChaosradio 254 live von der THM-Stage auf dem Chaos Communication Congress 2019. Die erste Folge nach der Pause! Anl\u0026auml;sslich des Camps hei\u0026szlig;t Marcus Richter interessante G\u0026auml;ste aus dem Chaosumfeld willkommen, die ihre Projekte pr\u0026auml;sentieren. Gestreamt wird nat\u0026uuml;rlich live und in Farbe!\u003c/p\u003e","original_language":"deu","persons":["Marcus Richter"],"tags":["thms","37","Entertainment"],"view_count":561,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-08-05T13:45:07.053+02:00","length":5471,"duration":5471,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/37-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/37-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/37-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/37-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-37-chaosradio-254","url":"https://api.media.ccc.de/public/events/2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":16},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":16},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":22},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":21},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":19},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":16},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":16},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":7},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":16},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":6},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":46},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":31},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":9},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":6},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":23},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":18},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":69}]},{"guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","title":"Freak Show","subtitle":null,"slug":"thms-27-freak-show","link":"http://talx.thm.cloud/thms/talk/ULS83P/","description":"Der Freak Show Podcast live on stage\n\nAusgabe FS239 von der Freak Show.\n\nhttps://freakshow.fm","original_language":"deu","persons":["Tim Pritlove","Roddi","Letty","Clemens Schrimpe","hukl","Denis Ahrens"],"tags":["thms","27","2019","Entertainment"],"view_count":5758,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-14T14:15:06.505+01:00","length":6179,"duration":6179,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/27-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/27-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/27-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/27-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-27-freak-show","url":"https://api.media.ccc.de/public/events/ffa61ddc-7493-5c90-8976-ca25cf368bd0","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":94},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":80},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":99},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":58},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":52},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":37},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":92},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":48},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":154},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":102},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":57},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":66},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":154},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":31},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":60},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":120},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":33},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":69},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":328},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":82},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":57},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":40},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":114}]},{"guid":"f650773d-d9df-4050-814c-a9505c439b30","title":"Mit dem Getränkeautomaten in die Cloud","subtitle":"Über die (Un-)Sicherheit eines Bezahlsystems","slug":"Camp2019-10201-mit_dem_getrankeautomaten_in_die_cloud","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10201.html","description":"Ob an Getränkeautomaten oder in der Kantine: Oft wird in Universitäten oder großen Firmen mit einem internen Ausweis bezahlt.\nWir haben eines dieser internen Bezahlsysteme einmal genauer in Bezug auf seine IT-Sicherheit untersucht und dabei überraschend viele Schwachstellen festgestellt.\n\nInterne, bargeldlose Bezahlsysteme können Transaktionen über einen Cloud-Dienst abwickeln.\nDie Informationssicherheit ist bei diesen Systemen von großer Bedeutung, um das Geld der Kunden und auch das Geld des Betreibers, der für die Abwicklung der Zahlung an die jeweiligen Abteilungen oder Dienstleistern die Verantwortung trägt, zu schützen.\nIn diesem Talk soll die Sicherheit eines dieser Cloud-basierten Systeme genauer beleuchtet und dabei ein Großteil seiner Sicherheitsarchitektur auseinandergenommen werden.","original_language":"deu","persons":["Janis Streib"],"tags":["camp19","10201","Security"],"view_count":1575,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-04-04T23:15:06.653+02:00","length":1850,"duration":1850,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10201-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10201-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10201-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10201-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10201-mit_dem_getrankeautomaten_in_die_cloud","url":"https://api.media.ccc.de/public/events/f650773d-d9df-4050-814c-a9505c439b30","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":43},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":40},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":37},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":55},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":75},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":37},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":50},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":70},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":70},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":152},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":80},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":130},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":90},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":16},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":114},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":51},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":63},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":60},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":62}]},{"guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","title":"Knoten 101","subtitle":"Can you knot or can you not ?","slug":"Camp2019-10189-knoten_101","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10189.html","description":"Die CCC-family geht campen, das heisst der Knoten wird ausnahmsweise vom abstrakten mathematischen Konzept zur ganz realen Anwendung von Seil und Schnur. Was da alles schiefgehen kann, wo Knoten herkommen und wer sie verwendet wird hier kurz und knackig bearbeitet.\n\nKnoten sind eines dieser Dinge, die man anwendet bevor man sich bewusst ist was man da gerade tut, und gleichzeitig gibt es so viele verschiedene Knoten die in anderen Umfeldern verwendet werden, dass ein ganzheitlicher Überblick über die Materie kaum zu kriegen ist, nicht zuletzt wegen den horrenden Nomenklaturproblemen. In relativ kurzer Zeit werden hier die gefährlichsten, schlechtesten, praktischsten und unbekanntesten Knoten gezeigt, komplett ohne Mathematik und dergleichen.","original_language":"deu","persons":["Lukas \"cube\" Hannen"],"tags":["camp19","10189","Hardware \u0026 Making"],"view_count":969,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-16T21:15:06.972+01:00","length":2000,"duration":2000,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10189-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10189-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10189-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10189-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10189-knoten_101","url":"https://api.media.ccc.de/public/events/977957d7-ef42-4ea0-8380-b9a48bd583f0","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":57},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":63},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":88},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":83},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":60},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":51},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":53},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":84},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":66},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":54},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":55},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":72},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":49}]},{"guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","title":"Opening Ceremony","subtitle":null,"slug":"Camp2019-10386-opening_ceremony","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10386.html","description":"A hearty welcome me lasses and lads!","original_language":"eng","persons":["jinxx","smtw"],"tags":["camp19","10386","CCC"],"view_count":1936,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-19T07:45:03.988+01:00","length":2215,"duration":2215,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10386-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10386-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10386-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10386-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10386-opening_ceremony","url":"https://api.media.ccc.de/public/events/a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":348},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":209},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":187},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":88},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":50},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":109},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":63},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":135},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":51},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":255},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":89},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":50},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":107},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":52},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":49},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":99},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":53},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":84}]},{"guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","title":"Fomu - an FPGA inside your USB port!","subtitle":null,"slug":"Camp2019-10174-fomu_-_an_fpga_inside_your_usb_port","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10174.html","description":null,"original_language":"eng","persons":["Tim 'mithro' Ansell","Sean \"xobs\" Cross"],"tags":["camp19","10174","Hardware \u0026 Making"],"view_count":1178,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-03-14T17:30:06.529+01:00","length":2665,"duration":2665,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10174-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10174-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10174-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10174-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10174-fomu_-_an_fpga_inside_your_usb_port","url":"https://api.media.ccc.de/public/events/afbc3b87-4156-470d-9385-c18e7b29f97b","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":41},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":49},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":63},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":64},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":53},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":52},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":56},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":86},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":42},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":56},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":74},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":40},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":49},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":46},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":55}]},{"guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","title":"Sinn von Unsinn unterscheiden - Glaub ich's oder glaub ich's nicht?","subtitle":null,"slug":"thms-65-sinn-von-unsinn-unterscheiden-glaub-ich-s-oder-glaub-ich-s-nicht-","link":"http://talx.thm.cloud/thms/talk/ARDC3J/","description":"Pyramiden wurden von Außerirdischen gebaut! Impfen macht Autismus! Gott hat die Welt geschaffen!\n\nKornkreise, Handystrahlung, Chemtrails, Homöopathie, Astrologie, Wasserkristallbilder, Aurafotografie, Quantenheilung...","original_language":"deu","persons":["Steini"],"tags":["thms","65","Talk"],"view_count":2317,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-29T17:15:06.664+02:00","length":3426,"duration":3426,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/65-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/65-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/65-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/65-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-65-sinn-von-unsinn-unterscheiden-glaub-ich-s-oder-glaub-ich-s-nicht-","url":"https://api.media.ccc.de/public/events/f86ec299-33c8-52ec-a207-62a444e8acbf","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":40},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":28},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":34},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":29},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":27},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":56},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":27},{"event_id":7406,"event_guid":"74ebea5d-e24e-55a0-99a4-f13879394f48","weight":2},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":28},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":58},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":2},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":33},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":32},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":58},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":69},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":33},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":2},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":57},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":6}]},{"guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","title":"Elektroschrott - Welchen letzten Weg geht mein PC?","subtitle":null,"slug":"thms-36-elektroschrott-welchen-letzten-weg-geht-mein-pc-","link":"http://talx.thm.cloud/thms/talk/GYWNQP/","description":"Elektronikschrott ist eine Handelsware. Schrott wird zu Gold. Geräte werden überall in der Welt mal gut, mal nicht so gut zerlegt. Wer verdient daran? Und was können wir tun, dass sich der Export nicht mehr lohnt?\n\nDie digitale Gesellschaft produziert Elektronikschrott. Dieser besteht aus Kunststoffen, Metallen und Platinen, die unterschiedlichen Verwertungswegen zugeführt werden müssen. Die beste Trennung ist immer noch das Zerlegen per Hand. Dabei können außerdem nutzbare Einzelteile extrahiert und direkt weiterverwendet werden. Dieses Vorgehen ist ökologisch sinnvoll, aber nicht besonders ökonomisch. Das spielt aber im Rahmen eines \"Dismantling Cafés\" (vis á vis dem Repair Café) keine Rolle. Dafür gibt es die Sicherheit, dass die eigenen Geräte nicht in einer der zahlreichen Dokumentationen über Agbotbloshie, den großen Elektroschrottplatz in Ghana, auftauchen.","original_language":"deu","persons":["lasermax"],"tags":["thms","36","2019","Talk"],"view_count":353,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-11-28T13:30:09.355+01:00","length":2366,"duration":2366,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/36-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/36-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/36-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/36-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-36-elektroschrott-welchen-letzten-weg-geht-mein-pc-","url":"https://api.media.ccc.de/public/events/879d54a4-a90e-5e0d-8c56-c189ba166c72","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":3},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":17},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":15},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":12},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":19},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":3},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":11},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":12},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":2},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":9},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":2},{"event_id":7449,"event_guid":"93312758-6925-5e84-85b5-3b80f92a0faa","weight":2},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":19},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":15},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":3},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":11}]},{"guid":"7926f5ba-d424-4523-890b-08736b08a9b9","title":"#Defensive statt #Offensive am Beispiel von KRITIS","subtitle":"aka Ethik rekalibrieren","slug":"Camp2019-10208-defensive_statt_offensive_am_beispiel_von_kritis","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10208.html","description":"Es wird in einer aktuellen Übersicht aufgezeigt, dass die Cybersicherheitsstrategie in Deutschland keine Strategie darstellt. Darüber Hinaus wird aufgezeigt, welche Gesetzesvorhaben die Sicherheit schwächen oder bereits geschwächt haben und was das für Auswirkungen auf kritische Infrastrukturen (KRITIS) - und somit auf uns als Gesamtbevölkerung - haben kann. Zuletzt werden mögliche Optionen als Forderungen aufgezeigt, durch die sich das aktuelle Lagebild bessern kann.\n\nNeun Sektoren wurden in den ersten zwei Körben des IT-Sicherheitsgesetz als kritische Infrastrukturen definiert. Darunter fallen Energieversorgung, Finanz- und Versicherungswesen,\nWasser, Ernährung, Gesundheit, IT und TK, Transport und Verkehr. Deren durch IT-Störungen bedingter Versorgungsausfall kann zu einem Großlagebild oder sogar zu einer Krise führen, in der eine Versorgung eines großen Teils der Bevölkerung nicht mehr gewährleistet werden könnte. Wie riskiert der Staat durch eine offensive Cyberwar Vorgehensweise und hybride Kriegsführung dazu, diese Risiken zu erhöhen und warum trifft uns das als Bevölkerung ganz konkret und spielt sich nicht nur im Internet ab? Wie kann es zu physischen IT-Störungen und Ausfällen kommen und was müsste man als Forderungen dagegen vornehmen, um von einer offensiven zu einer defensiven Vorgehensweise zurück zu kommen. Und wieso liegt darin die einzig wahre Lösung für die Bevölkerung?","original_language":"deu","persons":["HonkHase"],"tags":["camp19","10208","Ethics, Society \u0026 Politics"],"view_count":629,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-02-20T19:00:08.519+01:00","length":3758,"duration":3758,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10208-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10208-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10208-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10208-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10208-defensive_statt_offensive_am_beispiel_von_kritis","url":"https://api.media.ccc.de/public/events/7926f5ba-d424-4523-890b-08736b08a9b9","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":5},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":6},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":9},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":10},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":5},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":9},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":11},{"event_id":7411,"event_guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","weight":8},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":5},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":13},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":5},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":8},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":6},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":8},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":6},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":2},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":9},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":9},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":2},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":12},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":6},{"event_id":7838,"event_guid":"fe835824-3b1b-5d02-86a7-09098145c1dc","weight":10}]},{"guid":"eda75c8d-fe02-5986-a6c3-d0b699231b6a","title":"Über die Nachhaltigkeit von Software","subtitle":null,"slug":"thms-49-ber-die-nachhaltigkeit-von-software","link":"http://talx.thm.cloud/thms/talk/NWNHJ3/","description":"Software ist essenzieller Bestandteil und Ressource unserer Dienstleistungs-\nund Wissensgesellschaft sowie unserer Infrastrukturen. Als Ressource\nbetrachtet verhält sich der Konsum und Erhalt von Software jedoch in vielen\nDingen konträr zu natürlichen Ressourcen. Eine Reflektion über die besonderen\nEigenschaften der \"Ressource Software\" und wie wir diese nutzen können um\nSoftware nachhaltig zu gestalten und damit auch für die Zukunft zu erhalten.\n\nWenig wird bisher über digitale Nachhaltigkeit geredet, aber noch weniger über\nnachhaltige Software. Dabei ist Software essenzieller Bestandteil und\nRessource unserer Dienstleistungs- und Wissensgesellschaften sowie unserer\nInfrastrukturen. Kein Telefon, keine Ampel und keine moderne Verwaltung würden\nnoch ohne Software funktionieren. Möchten wir diese Systeme erhalten, müssen\nwir folglich auch Verfügbarkeit und Zugang zu diesen Ressourcen garantieren.\n\nWas im Zeitalter von copy\u0026paste und der prinzipiell unbegrenzten Menge\ndigitaler Rohstoffe zunächst einfach klingt wird schnell komplex. Durch Recht,\nTechnik und Architektur werden Verfügbarkeit und Menge von Software häufig\nkünstlich verknappt. Das birgt die Gefahr zu realen Versorgungsengpässen bis\nhin zu kompletten Ressourcenverlusten und widerspricht damit dem von den\nVereinten Nationen formulierten Ziel einer nachhaltigen Entwicklung und\n\"Generationengerechtigkeit\". Und auch wenn sich Software immer\nweiterentwickelt und Ressourcen von heute vielleicht schon morgen nicht länger\nfür nötig gehalten werden, können als Folge von Abhängigkeiten in komplexen\nSystemen schnell Domino-Effekte entstehen.\n\nDer Vortrag erörtert wie und wo sich nachhaltiges Wirtschaften und Konsum von\nSoftware in vielen Dingen konträr zum nachhaltigen Konsum natürlicher\nRessourcen verhält. Und wie wir diese uns diese besonderen Eigenschaften\nzunutze machen können um Software nachhaltig zu gestalten und damit auch für\ndie Zukunft zu erhalten","original_language":"deu","persons":["Erik Albers"],"tags":["thms","49","Talk"],"view_count":532,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2024-09-15T22:00:02.875+02:00","length":2119,"duration":2119,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/49-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/49-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/49-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/49-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-49-ber-die-nachhaltigkeit-von-software","url":"https://api.media.ccc.de/public/events/eda75c8d-fe02-5986-a6c3-d0b699231b6a","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":6},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":2},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":8},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":17},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":17},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":7},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":20},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":15},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":17},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":11},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":5},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":5},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":5},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":22},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":25},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":18},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":20},{"event_id":7450,"event_guid":"cd241757-8364-4eb1-8173-f049b54efca7","weight":20},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":28},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":9}]},{"guid":"d57b03ce-cc47-403d-8d18-c707dcd61bd1","title":"Caught in the Net","subtitle":"The Impact of Anti-Extremism Content Regulation on Human Rights","slug":"Camp2019-10255-caught_in_the_net","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10255.html","description":"Increasingly, governments are moving to impose regulatory measures that would require the removal of extremist speech or privatize enforcement of existing laws. But all too often, these regulations infringe on human rights. What should societies be doing to counter extremism while ensuring the rights of the vulnerable are preserved?\n\nSocial media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, such content is often vaguely defined. Governments increasingly rely on platforms to regulate speech for them, relying on the very same rulesets.\n\nThese vague policies, coupled with the practice of for-profit commercial content moderation, has led to mistakes at scale that are decimating human rights content on these platforms and threatening our civil liberties. Furthermore, the very idea that censorship can solve the deeply rooted\nproblems of extremism in modern society is a mistake. ","original_language":"eng","persons":["Jillian C. York"],"tags":["camp19","10255","Ethics, Society \u0026 Politics"],"view_count":160,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-02-03T01:30:05.533+01:00","length":2691,"duration":2691,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10255-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10255-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10255-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10255-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10255-caught_in_the_net","url":"https://api.media.ccc.de/public/events/d57b03ce-cc47-403d-8d18-c707dcd61bd1","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7364,"event_guid":"0a99f1db-dfad-4534-888c-bd98acc576b3","weight":7},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":8},{"event_id":7378,"event_guid":"25ea0487-9dc1-4dc6-8df7-75b4872a164c","weight":6},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":6},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":12},{"event_id":7382,"event_guid":"4f0aca57-b1b1-4cbc-9538-70fb76bf3216","weight":10},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":9},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":10},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":8},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":7},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":7}]},{"guid":"493770fd-2347-5707-98bc-22ee77cc9129","title":"Cryptography of Killing Proof-of-Work","subtitle":null,"slug":"thms-26-cryptography-of-killing-proof-of-work","link":"http://talx.thm.cloud/thms/talk/Z3VR8P/","description":"We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete.  We shall focus primarily on these cryptographic building blocks themselves, not overly on the different protocols built form them.\n\nThere are a handful of protocols consuming enormous amounts of energy in proof-of-work schemes, which provide only rather tenuous security assurances.   In practice, proof-of-work also invalidates these protocols original goal of being distributed.\n\nThere is also a zoo of protocols designs, both new and from the 80s, that provide far stronger security than proof-of-work at minimal cost.  We shall discuss the distinctive cryptographic primitives used by these protocols, without examining any of these critters too closely.\n\nIn essence, our taxonomy splits as blind signatures vs. verifiable random functions (VRFs) vs. randomness beacons, with the latter consisting of publicly verifiable secret sharing (PVSS) and verifiable delay functions (VDFs).  We only have time for a cursory look at the mathematics usable to build each of these, but this should explain some of their uses, strengths, and weaknesses.","original_language":"eng","persons":["Jeff Burdges"],"tags":["thms","26","2019","Talk"],"view_count":318,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-09-11T02:00:00.000+02:00","updated_at":"2025-11-17T16:45:06.026+01:00","length":1668,"duration":1668,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/26-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/26-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/26-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/26-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-26-cryptography-of-killing-proof-of-work","url":"https://api.media.ccc.de/public/events/493770fd-2347-5707-98bc-22ee77cc9129","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":2529,"event_guid":"59a1be98-a1b0-4031-bbc4-18ca3feeb189","weight":1},{"event_id":6246,"event_guid":"4e314886-d08c-4660-8dca-2ab5443c2b52","weight":1},{"event_id":6362,"event_guid":"d86c7136-8c6b-416b-b2fe-94480b2e2ba0","weight":1},{"event_id":6520,"event_guid":"64d3f3f5-5665-4050-ba15-0db530ecc262","weight":1},{"event_id":7085,"event_guid":"XiMGzrAdPuzVluYhoPCNzA","weight":1},{"event_id":7176,"event_guid":"064dfcac-df2d-4e9c-b1a0-efd1bcc16c5b","weight":1},{"event_id":7177,"event_guid":"a15c9d68-1bf9-4252-ba17-963a615cc127","weight":1},{"event_id":7184,"event_guid":"74156859-544c-5d8a-857b-790a3cbd7630","weight":1},{"event_id":7186,"event_guid":"168a9113-e1e2-5596-9d2e-c7a442826933","weight":1},{"event_id":7188,"event_guid":"f7c9e37f-648d-5b45-9a0f-84a190c3df2f","weight":1},{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":2},{"event_id":7262,"event_guid":"6636c191-d2c2-4255-98e9-5ad7a656bbbe","weight":1},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":1},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":1},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":4},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":3},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":2},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":1},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":5},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":4},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":7},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":2},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":3},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":3},{"event_id":7394,"event_guid":"14a2c922-697c-4073-885c-568850a390a7","weight":3},{"event_id":7404,"event_guid":"d219432f-68ed-4162-8e7a-1d53a3e3e17c","weight":5},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":4},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":2},{"event_id":7410,"event_guid":"6d16f60d-11cd-53ca-88bb-ccd014b20a9e","weight":2},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":4},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":2},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":4},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":1},{"event_id":7436,"event_guid":"2d4d7279-ed46-431f-919b-ed5dccfd7c90","weight":3},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":3},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":1},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":4},{"event_id":7487,"event_guid":"6f1b8b15-b44a-592c-b3e9-96bd9e0fbce3","weight":1},{"event_id":7522,"event_guid":"74922ed0-86dd-5568-98fb-6fc812852441","weight":1},{"event_id":7761,"event_guid":"ebffdad1-55ef-4b66-b7cd-a170c801c147","weight":3},{"event_id":7786,"event_guid":"ff1553b4-c5d3-58c8-af63-d3b8064b5754","weight":1},{"event_id":7798,"event_guid":"6260c933-5ab0-4c58-b335-ee419b180712","weight":7},{"event_id":7809,"event_guid":"6d4facc3-4724-5fc7-ade8-8e720efa1ed1","weight":3},{"event_id":7810,"event_guid":"804c48c9-c7b2-5e93-afb9-ab2ee3ad2c79","weight":2},{"event_id":7811,"event_guid":"e1f5c8f5-6b61-543f-9996-b4799d13ba27","weight":2},{"event_id":7822,"event_guid":"9b1a393c-1dcd-53a0-85cd-523b4b078487","weight":2},{"event_id":7837,"event_guid":"cc76e6dd-0c1b-5686-a3c3-858c6d7d27e3","weight":2},{"event_id":7842,"event_guid":"4cea7604-1f84-5345-8ebd-4c745fef76eb","weight":3},{"event_id":7844,"event_guid":"0d9112f3-d8b0-5cf3-adf0-842be6380d20","weight":2},{"event_id":7846,"event_guid":"dc8b3e8c-0831-5725-a64a-2c8cd7737580","weight":2},{"event_id":7973,"event_guid":"696a345a-9ef1-5985-8dd6-84c9ef22950c","weight":3},{"event_id":7988,"event_guid":"f1b2d665-2521-4f00-a8ba-b3e6b55d78ca","weight":4},{"event_id":8012,"event_guid":"4f28726f-ffc4-432c-a6ae-60866f823cd1","weight":2}]},{"guid":"117f530f-a20b-4071-b208-39e989a42408","title":"Lightning Talks","subtitle":null,"slug":"Camp2019-10380-lightning_talks","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10380.html","description":null,"original_language":"eng","persons":["bigalex","honky"],"tags":["camp19","10380","CCC"],"view_count":922,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-04-04T17:15:06.109+02:00","length":10701,"duration":10701,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10380-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10380-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10380-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10380-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10380-lightning_talks","url":"https://api.media.ccc.de/public/events/117f530f-a20b-4071-b208-39e989a42408","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":28},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":18},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":21},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":18},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":24},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":32},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":42},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":29},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":20},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":33},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":19},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":20},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":18},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":21}]},{"guid":"93312758-6925-5e84-85b5-3b80f92a0faa","title":"Global Warming Sucks!","subtitle":null,"slug":"thms-11-global-warming-sucks-","link":"http://talx.thm.cloud/thms/talk/P9JCSV/","description":"Alle reden vom Klimawandel, doch niemand erklärt was da gerade passiert. Wird es in Zukunft einfach nur schön warm oder wird die Veränderung der Umwelt die Menschheit in die Knie zwingen? Warum der Temperaturanstieg der Atmosphäre einzigartig ist und welche Folgen dies für Land, Meer und Gletscher hat, erklärt die angehende Polarforscherin Maria-Elena Vorrath.\n\nDie Diskussion über den menschengemachten Klimawandel ist in den Medien stark verzerrt und es ist schwer sich als Laie in der Informationsflut zu orientieren. Der Vortrag \"Global Warming Sucks!\" soll eine breiten Zuhörerschaft über die aktuelle Situation des sich wandelnden Erdklimas sachlich aufklären. Es wird erklärt, wie der Ausstoß von Treibhausgasen die Atmosphäre seit der Industrialisierung beeinflusst und auf die bisherigen beobachteten Veränderungen in allen Teilen der Erde eingegangen. Anschließend werden einige globale Kipppunkte, die sensiblen Bausteine des Klimasystems, vorgestellt, und ihre Reichweite, Verwundbarkeit und Bedeutung für die Menschheit verdeutlicht. Angesichts der wissenschaftlichen Erkenntnisse können die Zuschauer nun öffentliche Auseinandersetzungen besser einordnen und kommentieren und ihren Beitrag zur Lösung der Klimakrise bestimmen. Fragen sind ausdrücklich erwünscht.","original_language":"deu","persons":["Maria-Elena Vorrath"],"tags":["thms","11","2019","Talk"],"view_count":609,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-24T14:15:07.963+01:00","length":4103,"duration":4103,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/11-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/11-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/11-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/11-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-11-global-warming-sucks-","url":"https://api.media.ccc.de/public/events/93312758-6925-5e84-85b5-3b80f92a0faa","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":25},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":10},{"event_id":7409,"event_guid":"b4902bdb-38ab-5abb-9884-5efdb4bca02f","weight":16},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":11},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":17},{"event_id":7423,"event_guid":"54aa059d-1205-5afb-8a11-68ef351b0ab9","weight":41},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":12},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":5},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":2},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":10},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":10},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":2},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":17},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":2},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":13},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":15},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":10},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":2},{"event_id":7457,"event_guid":"879d54a4-a90e-5e0d-8c56-c189ba166c72","weight":2},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":6},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":4},{"event_id":7460,"event_guid":"94273ff5-ae50-49bd-a892-5a5f2e8c8451","weight":10},{"event_id":7856,"event_guid":"d7c44ea4-ca2c-51d1-b5b1-87aa7c6a1253","weight":10}]},{"guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","title":"Aufstand oder Aussterben? Ein Vortrag über die Klimakrise, ökologischen Kollaps und zivilen Ungehorsam.","subtitle":null,"slug":"Camp2019-10370-aufstand_oder_aussterben_ein_vortrag_uber_die_klimakrise_okologischen_kollaps_und_zivilen_ungehorsam","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10370.html","description":"EXTINCTION REBELLION (XR) ist eine schnell wachsende globale Graswurzel-Bewegung von Klima-Aktivist*innen, die mit gewaltfreien zivilen Ungehorsam einen radikalen Wandel herbeiführen möchte um die Risiken des ökologischen Kollaps und des Aussterbens der Menschheit zu minimieren. Wir bringen die Gefahr des Klimakollaps auf die Agenda, informieren die Öffentlichkeit, und üben Druck auf die Regierungen aus, den Klimanotstand auszurufen, und entsprechend angemessen zu handeln.\n\nXR hat drei Forderungen:\n\n1. TELL THE TRUTH - Die Regierung muss die Wahrheit über die ökologische Krise offenlegen und den Klimanotstand ausrufen. Die Dringlichkeit des sofortigen Kurswechsels muss von allen gesellschaftlichen Institutionen kommuniziert werden. \n\n2. ACT NOW - Die Regierung muss jetzt handeln, um das Artensterben zu stoppen und die Treibhausgasemissionen bis zum Jahr 2025 auf Netto-Null zu senken.\n\n3. BEYOND POLITICS - Die Regierung beruft eine Bürger'innenversammlung zu Klima- und ökologischer Gerechtigkeit ein, die die notwendigen Maßnahmen erarbeitet und verpflichtet sich, deren Beschlüsse umzusetzen.\n","original_language":"deu","persons":["Dan","Maria"],"tags":["camp19","10370","Ethics, Society \u0026 Politics"],"view_count":1674,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-03-24T14:15:08.670+01:00","length":3157,"duration":3157,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10370-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10370-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10370-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10370-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10370-aufstand_oder_aussterben_ein_vortrag_uber_die_klimakrise_okologischen_kollaps_und_zivilen_ungehorsam","url":"https://api.media.ccc.de/public/events/074a5ea0-fd00-4529-912c-c986a8856f6b","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":54},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":52},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":51},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":46},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":13},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":61},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":84},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":93},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":73},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":44},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":81},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":36},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":77},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":41},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":41},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":40},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":48}]},{"guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","title":"From DC to RF...starting where?","subtitle":"An analog engineer dives into RF circuits","slug":"Camp2019-10184-from_dc_to_rf_starting_where","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10184.html","description":"This talk will focus on learning and re-learning RF topics, from the perspective of a  semi-experienced engineer. We will review rules of thumb, practical experience and the theory of RF and how it all fits together for your next PCB design. This will also be contrasted with best-practices for designing lower frequency circuits and how it all fits together. \n\nStarting my engineering career working on low level analog measurement, anything above 1kHz kind of felt like \"high frequency\". This is very obviously not the case. This talk will go over the journey of discovering and rediscovering higher frequency techniques and squaring them with the low level measurement basics that I learned at the beginning my career. The talk will include a discussion of Maxwell's equations and some of the assumptions that we make when we're working on different types of circuits. \n \nAttendees of this talk will find this information useful in the context of RF calculations around cellular, wifi, bluetooth and other commonly available communication methods. CCCamp attendees will walk away knowing a little bit more about how to interact with the elements that power their everyday projects.","original_language":"eng","persons":["Chris Gammell"],"tags":["camp19","10184","Hardware \u0026 Making"],"view_count":464,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-01-09T11:45:29.966+01:00","length":2611,"duration":2611,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10184-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10184-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10184-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10184-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10184-from_dc_to_rf_starting_where","url":"https://api.media.ccc.de/public/events/50ed583c-4871-4e8e-a31b-4b2b84385413","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":6},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":24},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":14},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":15},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":19},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":14},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":13},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":9},{"event_id":7413,"event_guid":"4ea406aa-1c4b-5694-b1aa-f86dd3057d8a","weight":9},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":4},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":20},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":8},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":23},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":7},{"event_id":7431,"event_guid":"508fe23f-bc69-4521-abc3-59b649598eb5","weight":2},{"event_id":7433,"event_guid":"078e6819-edca-4b0a-a417-a964a9c08ce3","weight":6},{"event_id":7441,"event_guid":"e1cba2cc-d83f-44dc-869e-51fdfc628563","weight":9},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":14},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":14},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":12}]},{"guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","title":"What you see is not what you get - when homographs attack","subtitle":null,"slug":"Camp2019-10258-what_you_see_is_not_what_you_get_-_when_homographs_attack","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10258.html","description":"This talk offers a brief overview about homograph attacks, describes part of the mechanics behind the registration of homograph domains, highlights their risks and presents a chain of two practical exploits against Signal, Telegram and Tor Browser that could lead to nearly impossible to detect phishing scenarios and also situations where more powerful exploits could be used against an opsec-aware target.\n\nSince the introduction of Unicode in domain names (known as Internationalized Domain Names, or simply IDN) by ICANN\nover two decades ago, a series of brand new security implications were also brought into light together with the\npossibility of registering domain names using different alphabets and Unicode characters.\n\nThis talk offers a brief overview about homograph attacks, describes part of the mechanics behind the registration of homograph domains, highlights their risks and presents a chain of two practical exploits against Signal, Telegram and Tor Browser that could lead to nearly impossible to detect phishing scenarios and also situations where more powerful exploits could be used against an opsec-aware target.\n\nHistorical security issues related to Unicode and confusable homographs, as well as other attack vectors not discovered by the author will also be explored in this presentation.","original_language":"eng","persons":["Julio"],"tags":["camp19","10258","Security"],"view_count":375,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-04-02T10:00:07.704+02:00","length":1764,"duration":1764,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10258-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10258-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10258-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10258-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10258-what_you_see_is_not_what_you_get_-_when_homographs_attack","url":"https://api.media.ccc.de/public/events/8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7370,"event_guid":"7c043172-6fbe-4a23-a990-69c5bcab8f5d","weight":7},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":7},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":21},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":7},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":10},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":7},{"event_id":7391,"event_guid":"823efec2-9c83-45d6-bec9-6a07db561cc2","weight":4},{"event_id":7392,"event_guid":"7d8aff66-f15e-4fdd-b5aa-af555f7a626f","weight":10},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":4},{"event_id":7396,"event_guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","weight":9},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":12},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":16},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":18},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":9},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":7},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":17},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":18},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":15},{"event_id":7451,"event_guid":"9f38e10d-39e2-4380-83bf-26626396e476","weight":15}]},{"guid":"6963b184-207a-4ac3-9aea-530120c1445f","title":"Fast Global Internet Scanning - Challenges and new Approaches","subtitle":"Or how to become your own ISP","slug":"Camp2019-10353-fast_global_internet_scanning_-_challenges_and_new_approaches","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10353.html","description":"Current search engines such as censys or shodan give everyone an insight into the global Internet. Unfortunately, they don't provide a comprehensive view of the Internet because you can't access the raw data. Consequently, you have to scan the Internet yourself.\nAnyone can perform a one-shot scan via Mass-Scan \u0026 Co. However, how to build an infrastructure for regular Internet scans that is not blocked after a short time by Intrussion Detection Systems and Spam/Blacklists is not easy. \nFirst we will talk about the right scan setup, infrastructure, scan strategies, and data enrichment. We will then take a look at the data and gain common and interesting insights into the structure of the Internet.\n\nCurrent search engines such as censys or shodan give everyone an insight into the global Internet. Unfortunately, they don't provide a comprehensive view of the Internet because you can't access the raw data. Consequently, you have to scan the Internet yourself.\nAnyone can perform a one-shot scan via Mass-Scan \u0026 Co. However, how to build an infrastructure for regular Internet scans that is not blocked after a short time by Intrussion Detection System and Spam/Blacklists is not easy. The following questions must be answered:\nWhich scanning algorithms are used (centralized, distributed, BGP prefix hit lists)? How could you reduce scan traffic?  How do I process the data in the long term (up to 600GB / scan)? With which further data do I enrich the scans for further analyses (BGP prefixes, Inetnum objects) ? How do I build the right server without a bottleneck and how do I connect it to the internet (rent a server or become a RIPE-Member/ your own ISP with a /22 IPv4 /32 IPv6 Block)? \n\nIn the first half of the talk we will deal with these questions. In the second half of the lecture we will discuss real scan data. We will concentrate on the analysis of the network topology and distribution of BGP prefixes, whois blocks and network services of well-known autonomous systems on the Internet. As a further example, we will look at the network structure of a large well-known German hoster, which gives us a good overview of its internal organization of data centers and other services. Finally, we will look at some data and analysis from a security perspective.","original_language":"eng","persons":["Johannes Klick 'Garak'"],"tags":["camp19","10353","Security"],"view_count":548,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2025-11-11T07:15:03.415+01:00","length":2537,"duration":2537,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10353-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10353-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10353-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10353-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10353-fast_global_internet_scanning_-_challenges_and_new_approaches","url":"https://api.media.ccc.de/public/events/6963b184-207a-4ac3-9aea-530120c1445f","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7251,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","weight":7},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":8},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":12},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":14},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":11},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":10},{"event_id":7403,"event_guid":"8f17b808-466d-4aa9-8bac-a2b3afcdf0a2","weight":6},{"event_id":7407,"event_guid":"d1d313f5-926b-5357-b764-4c85cb9dddfc","weight":10},{"event_id":7415,"event_guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","weight":13},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":10},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":12},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":13},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":13},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":13}]},{"guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","title":"Anykernels meet fuzzing","subtitle":"how to make NetBSD a better software for you and me","slug":"Camp2019-10334-anykernels_meet_fuzzing","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10334.html","description":"Battle of making the NetBSD better software by leveraging anykernels\n\nThe NetBSD offers RUMP anykernel which lets users to do the magic and execute drivers, network stacks or file systems in userspace. Having kernel parts running in user space is a great opportunity to fuzz them efficiently without fancy kernel approaches. First general information about RUMP will be discussed to get the audience familiar with the subject, then results focused on testing network stack will be presented along with encountered problems and other fuzzing efforts that currently are taking place in the NetBSD project.","original_language":"eng","persons":["Akat1 Majorana"],"tags":["camp19","10334","Security"],"view_count":370,"promoted":false,"date":"2019-08-22T00:00:00.000+02:00","release_date":"2019-08-23T02:00:00.000+02:00","updated_at":"2026-03-23T00:15:04.559+01:00","length":2638,"duration":2638,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10334-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10334-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10334-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10334-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10334-anykernels_meet_fuzzing","url":"https://api.media.ccc.de/public/events/8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":15},{"event_id":7369,"event_guid":"f7df9294-6e67-4def-bf45-441663d489f6","weight":20},{"event_id":7379,"event_guid":"0c8f7472-290c-4bdf-bff0-4a7ce16c4f84","weight":7},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":34},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":11},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":13},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":6},{"event_id":7386,"event_guid":"9b7f0485-2ff1-4302-b1b7-98cbc8b502f4","weight":9},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":9},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":18},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":18},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":13},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":13}]},{"guid":"b69c19ce-7c89-4afd-9396-ea664f80dba7 ","title":"Intro","subtitle":"","slug":"camp19-2342-intro","link":"https://c3voc.de","description":"\u003cp\u003eMusic: ODESZA \u0026ndash; \u0026ldquo;A Moment Apart\u0026rdquo;\u003c/p\u003e\r\n\u003cp\u003e\u003ca class=\"moz-txt-link-freetext\" href=\"http://odesza.com\"\u003ehttp://odesza.com\u003c/a\u003e \u003cbr /\u003ehttp://odesza.co/facebook \u003cbr /\u003ehttp://odesza.co/twitter \u003cbr /\u003ehttp://odesza.co/instagram \u003cbr /\u003e\u003ca class=\"moz-txt-link-freetext\" href=\"http://odesza.co/soundcloud\"\u003ehttp://odesza.co/soundcloud\u003c/a\u003e\u003c/p\u003e\r\n\u003cp\u003eArt \u0026amp; Video Design: Sven Sedivy http://www.graphorama.de\u003c/p\u003e","original_language":"eng","persons":[],"tags":["camp19","2342"],"view_count":5883,"promoted":false,"date":"2019-07-09T23:42:00.000+02:00","release_date":"2019-07-09T02:00:00.000+02:00","updated_at":"2026-03-26T11:45:06.253+01:00","length":110,"duration":110,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/2342-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/2342-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/2342-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/2342-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/camp19-2342-intro","url":"https://api.media.ccc.de/public/events/b69c19ce-7c89-4afd-9396-ea664f80dba7%20","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":44},{"event_id":2465,"event_guid":"d1f3810f-43b1-4856-b8ee-7c767234d185","weight":27},{"event_id":2530,"event_guid":"a4478dbf-90c0-4633-aa8e-4fe993840089","weight":15},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":14},{"event_id":2550,"event_guid":"3064add4-ab1e-4d05-84b8-d753b9733097","weight":13},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":10},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":22},{"event_id":6497,"event_guid":"93c1500d-c639-4247-854e-6e51e167dbec","weight":31},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":21},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":3},{"event_id":7226,"event_guid":"f7df52c8-b762-489e-accd-c65d63fe88df","weight":13},{"event_id":7231,"event_guid":"6e585f42-52f3-4015-8a7a-f2e204f7afe8","weight":17},{"event_id":7234,"event_guid":"8996a0a1-1829-4eef-a534-c67dc52a3707","weight":11},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":24},{"event_id":7238,"event_guid":"2f82bad2-97cb-59a2-b1da-428048e5baab","weight":43},{"event_id":7241,"event_guid":"92325d1f-704c-5a95-892f-f539bbfc8d95","weight":9},{"event_id":7245,"event_guid":"f681a9f2-7d22-5e8a-be3c-8d4faaf15062","weight":33},{"event_id":7250,"event_guid":"a97c8df9-30a7-59e5-bbe4-dbe18cd13572","weight":3},{"event_id":7252,"event_guid":"456fb60c-5ce7-11e8-be47-1fb2912eb8101","weight":15},{"event_id":7253,"event_guid":"ab70ea5e-ae4a-5f32-b0b1-820243d1fea3","weight":13},{"event_id":7254,"event_guid":"9172a6ee-4963-558f-8619-613d29c3ddc0","weight":12},{"event_id":7255,"event_guid":"265fd581-ed2b-5985-879c-0d51c45c70c8","weight":54},{"event_id":7256,"event_guid":"ccab9927-22fe-52a3-a14a-e33f5dffb485","weight":47},{"event_id":7259,"event_guid":"942a7a7e-a7d3-11e9-a2a3-2a2ae2dbcce4","weight":34},{"event_id":7264,"event_guid":"6ceb890a-a419-5fc6-bc42-3ffd7fbd73f7","weight":14},{"event_id":7281,"event_guid":"bb5b04bd-9599-4d93-bd12-c779f381cf5e","weight":8},{"event_id":7287,"event_guid":"0ff8cbfa-b751-4107-beec-33a2678939d8","weight":9},{"event_id":7296,"event_guid":"b8424140-1639-44f7-a19a-67af58ad61e9","weight":9},{"event_id":7332,"event_guid":"50ad5991-1b2f-4a92-ba87-dec6456f085a","weight":22},{"event_id":7341,"event_guid":"7100ad0c-e4f3-4784-b707-46759cd3cb6a","weight":13},{"event_id":7357,"event_guid":"38775ee6-c151-4cc6-974c-4d121f95b159","weight":13},{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":228},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":348},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":112},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":57},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":45},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":68},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":41},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":110},{"event_id":7371,"event_guid":"074a5ea0-fd00-4529-912c-c986a8856f6b","weight":54},{"event_id":7373,"event_guid":"045e8a2c-63d0-4335-886e-cbd6323afc73","weight":22},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":198},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":123},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":35},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":47},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":36},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":96},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":26},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":54},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":46},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":94},{"event_id":7458,"event_guid":"f5ef88a8-0fb3-4310-bb04-358db302a13b","weight":27},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":76}]},{"guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","title":"Taking Bluetooth lockpicking to the next level","subtitle":"...or the 37th floor of a Hotel","slug":"Camp2019-10241-taking_bluetooth_lockpicking_to_the_next_level","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10241.html","description":"If hacking chinese padlocks and bike sharing systems isn't enough any more, let's go and open some new doors. Like the ones of some 37th floor Hotel Suites...\n\nWe're taking Bluetooth LE hacking from toys and padlocks to the real world. Improving the tools and methods we used in previous research to break the AES cryptography of the NOKE Padlock, we went to do the one thing a mobile hotel key is supposed to prevent: wirelessly sniff someone entering his room - or just unlocking the elevator - and then reconstruct the needed data to open the door with any BTLE enabled PC or even a raspberry pi.\n\nIn this talk we will show and explain the tools and methods we used and developed to break the BTLE based mobile phone key system of a large hotel chain. And then come from the academic proof of concept to a reliable setup that can be used in real life scenarios to carry out the attack.\n\nMethods shown will cover the reverse engineering of the wireless protocol based on BTLE captures, analyzing phone apps and intercepting the TLS encrypted traffic to the back end API, which in combination led to the compromise of a system used in quite some big and expensive hotels for their \"next level\" customer experience: mobile room keys.","original_language":"eng","persons":["Ray","mh"],"tags":["camp19","10241","Security"],"view_count":1292,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2026-03-22T00:45:08.077+01:00","length":2779,"duration":2779,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10241-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10241-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10241-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10241-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10241-taking_bluetooth_lockpicking_to_the_next_level","url":"https://api.media.ccc.de/public/events/06bcc268-f0db-48dc-963d-d3d54c6769a8","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":22},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":25},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":23},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":15},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":42},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":37},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":20},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":25},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":25},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":29},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":6},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":3},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":25},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":3},{"event_id":7435,"event_guid":"65d27021-12c5-4e4c-8cfd-20c50ec9795a","weight":6},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":23},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":23},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":26},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":30},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":6},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":23}]},{"guid":"f7df9294-6e67-4def-bf45-441663d489f6","title":"spispy: SPI flash device emulation","subtitle":"Open source tools for flash emulation and research","slug":"Camp2019-10186-spispy_spi_flash_device_emulation","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10186.html","description":"\u003ca href=\"https://github.com/osresearch/spispy\"\u003espispy\u003c/a\u003e is an open source hardware tool for emulating SPI flash chips that makes firmware development and boot security research easier. In this talk we'll discuss the challenges of interfacing on the SPI bus and emulating SPI devices, as well as demonstrate how to use it quickly debug issues with coreboot and how we used spispy to discover a critical class of TOCTOU vulnerabilities in secure boot systems like Intel BootGuard.","original_language":"eng","persons":["Trammell Hudson"],"tags":["camp19","10186","Hardware \u0026 Making"],"view_count":914,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-22T02:00:00.000+02:00","updated_at":"2026-03-16T15:45:07.126+01:00","length":1928,"duration":1928,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10186-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10186-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10186-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10186-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10186-spispy_spi_flash_device_emulation","url":"https://api.media.ccc.de/public/events/f7df9294-6e67-4def-bf45-441663d489f6","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":19},{"event_id":7360,"event_guid":"c9edea6f-1da1-4772-a0a9-6dd4e33f11bb","weight":18},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":42},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":20},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":31},{"event_id":7375,"event_guid":"d8db148c-39e4-4f1e-af23-a26a477c82ee","weight":14},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":29},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":13},{"event_id":7387,"event_guid":"8dc5712b-c14d-4aa0-9aa2-e598bbfc6a6d","weight":20},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":19},{"event_id":7425,"event_guid":"06bcc268-f0db-48dc-963d-d3d54c6769a8","weight":18}]},{"guid":"0a99f1db-dfad-4534-888c-bd98acc576b3","title":"Reporting from Brussels: The state of Digital Rights","subtitle":"How is our fight impacted by the new EU political landscape?","slug":"Camp2019-10309-reporting_from_brussels_the_state_of_digital_rights","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10309.html","description":"Come and find out how digital rights will be impacted by the new European Parliament, European Commission and Brexit. In the process, get updates about the burning topics we are following in the EU institutions. \n\nNew European Parliament (EP), new European Commission(EC), possibly Brexit. Nevertheless, the same digital rights we're fighting for. \n\nIn this talk we will give you an update on what the results of the European Parliament look like, what characterises the new EU Commission and how likely it is that Brexit happens in November 2019. \n\nMore, we'll update you on the topics we have our eyes on in the EU institutions: the future of content moderation and platform liability in Europe, confidentiality of our communications (ePrivacy), access to data cross-borders by law enforcement, net neutrality, data retention reloaded, algorithms (including upload filters), AI regulation.Finally, we unite the 2 parts: what do the new developments in the EP, EC and Brexity mean for our digital rights fight? How will our rights and freedoms online be impacted by the new environment? Are there new ways and avenues to mobilise and influence policy-making across Europe?\n\nThere's only one way to find out. See you at the talk!","original_language":"eng","persons":["Chloé Berthélémy (EDRi)","Andreea Belu (EDRi)"],"tags":["camp19","10309","Ethics, Society \u0026 Politics"],"view_count":213,"promoted":false,"date":"2019-08-21T00:00:00.000+02:00","release_date":"2019-08-21T02:00:00.000+02:00","updated_at":"2026-01-04T02:30:10.881+01:00","length":2744,"duration":2744,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10309-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10309-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10309-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10309-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10309-reporting_from_brussels_the_state_of_digital_rights","url":"https://api.media.ccc.de/public/events/0a99f1db-dfad-4534-888c-bd98acc576b3","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":11},{"event_id":7359,"event_guid":"a0a0fcfe-b7fb-46e3-84b6-97a5406016b4","weight":22},{"event_id":7361,"event_guid":"977957d7-ef42-4ea0-8380-b9a48bd583f0","weight":16},{"event_id":7362,"event_guid":"97576344-49ba-4fd0-a2e5-9af7923fbffb","weight":18},{"event_id":7363,"event_guid":"24b58c74-2bba-412e-84ac-c206f714f0b7","weight":14},{"event_id":7366,"event_guid":"ca6fc2d4-7b9e-4d1c-b90a-8741cf9bb399","weight":11},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":10},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":18}]},{"guid":"5af5134f-a56d-4a42-88e1-d179be98b8db","title":"From the Sputnik 'Beep' to messages from Pluto","subtitle":"Signals from Space 101","slug":"Camp2019-10351-from_the_sputnik_beep_to_messages_from_pluto","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10351.html","description":"To tinker with receivers for space-signals, its good to know the different space communication standards. And to understand space standards, it doesn't hurt to get an overview of how to transmit data in the first place.\n\nSince the first \"beep\" from Sputnik, there have been many different artificial signals from satellites, capsules and space stations being send back to earth. These multitude of RF (and laser...) signals not only show how different mission requirements dictate the system design for different spacecrafts, but also chronicle advances in communication technology since the advent of the space age.\nSo get to know how to understand the languages spoken by Voyager, GPS and satellite TV, and learn basics of RF communication in the process! ","original_language":"eng","persons":["INCO"],"tags":["camp19","10351","Science"],"view_count":433,"promoted":false,"date":"2019-08-24T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-09-11T20:30:09.461+02:00","length":2131,"duration":2131,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10351-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10351-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10351-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10351-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10351-from_the_sputnik_beep_to_messages_from_pluto","url":"https://api.media.ccc.de/public/events/5af5134f-a56d-4a42-88e1-d179be98b8db","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7358,"event_guid":"b69c19ce-7c89-4afd-9396-ea664f80dba8 ","weight":6},{"event_id":7367,"event_guid":"afbc3b87-4156-470d-9385-c18e7b29f97b","weight":15},{"event_id":7368,"event_guid":"e1b56229-fb1e-480c-9691-c137ec11ee51","weight":14},{"event_id":7374,"event_guid":"4965ee72-6d7b-4e68-85f7-4d6c4f0c9041","weight":17},{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":22},{"event_id":7383,"event_guid":"acc3dd01-bec3-444f-80c1-5dd37f522aa4","weight":7},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":15},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":12},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":9},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":17},{"event_id":7405,"event_guid":"5337766f-3676-4a2a-b1f6-4bd66b4d71af","weight":14},{"event_id":7414,"event_guid":"6963b184-207a-4ac3-9aea-530120c1445f","weight":10},{"event_id":7416,"event_guid":"f0730982-2990-418e-9b15-20a6b9e86dd2","weight":20},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":24},{"event_id":7419,"event_guid":"c1146d2e-c4cf-44ed-8d83-3fe3c3a4ba0e","weight":8},{"event_id":7420,"event_guid":"260ac343-6ccd-4652-8667-adf4e6d5cdeb","weight":5},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":15},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":16},{"event_id":7443,"event_guid":"50ed583c-4871-4e8e-a31b-4b2b84385413","weight":20},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":16},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":12},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":15}]},{"guid":"cf5d0389-ea8b-55d9-966c-2669e88de93a","title":"Capitana vs. Benito Salvini - über die Erosion von Grundrechten und was wir dagegen tun können","subtitle":null,"slug":"thms-19-capitana-vs-benito-salvini-ber-die-erosion-von-grundrechten-und-was-wir-dagegen-tun-knnen","link":"http://talx.thm.cloud/thms/talk/TX3WKW/","description":"TBD\n\nDie Erosion von Grundrechten schreitet überall in Europa voran, besonders deutlich wird dies anhand der Situation auf dem Mittelmeer. Hier geht es um die aktuelle Lage, darum dass die Bundesregierung genauso verantwortlich dafür ist wie Benito Salvini und um Strategien und was wir gemeinsam dagegen tun können - außer noch mehr Racketen auf dem Mittelmeer zu stationieren.","original_language":"deu","persons":["Ruben Neugebauer"],"tags":["thms","19","Talk"],"view_count":118,"promoted":false,"date":"2019-08-25T00:00:00.000+02:00","release_date":"2019-08-25T02:00:00.000+02:00","updated_at":"2025-05-17T11:30:06.523+02:00","length":2015,"duration":2015,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/19-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/19-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/19-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/19-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/thms-19-capitana-vs-benito-salvini-ber-die-erosion-von-grundrechten-und-was-wir-dagegen-tun-knnen","url":"https://api.media.ccc.de/public/events/cf5d0389-ea8b-55d9-966c-2669e88de93a","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":6},{"event_id":7417,"event_guid":"84c25f65-998a-43a8-bd32-2fe91fe42ff7","weight":4},{"event_id":7421,"event_guid":"c26d6ec7-2701-56dc-8110-9896c6f6a659","weight":11},{"event_id":7422,"event_guid":"ca81a392-cd83-55b0-abd5-1ed379611b37","weight":9},{"event_id":7424,"event_guid":"d178f21d-4837-4a49-ae27-0f6abf703465","weight":7},{"event_id":7428,"event_guid":"a296ba81-78b7-4500-be34-5f80d0a329c7","weight":9},{"event_id":7429,"event_guid":"6d0b0f86-3969-4cd9-974f-69ba90cfce64","weight":8},{"event_id":7430,"event_guid":"2e215ec0-4745-581d-bc12-b5ce7a4b3ff2","weight":1},{"event_id":7437,"event_guid":"49498e74-3b88-599b-9fb5-f28663b3c8bc","weight":1},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":16},{"event_id":7442,"event_guid":"b4e3314b-cab3-4eb4-b69a-49c461bcc30c","weight":5},{"event_id":7444,"event_guid":"9150324f-d11c-48f6-9c0f-a0dbed7f2387","weight":1},{"event_id":7445,"event_guid":"abb70bc3-9d18-4db1-ad60-ddfd5c272944","weight":1},{"event_id":7446,"event_guid":"2fe00b49-1471-4c79-8a75-8da73f71b63d","weight":1},{"event_id":7447,"event_guid":"f828fab4-661b-4b16-836c-cdf786550e4d","weight":3},{"event_id":7448,"event_guid":"ca82c94e-28b1-4c77-b7c1-0ab024a46c25","weight":8},{"event_id":7452,"event_guid":"f86ec299-33c8-52ec-a207-62a444e8acbf","weight":3},{"event_id":7453,"event_guid":"ffa61ddc-7493-5c90-8976-ca25cf368bd0","weight":3},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":3},{"event_id":7456,"event_guid":"361c6e0f-a89b-50a7-acc8-66e3c975e6b4","weight":3},{"event_id":7459,"event_guid":"4263620e-f36f-4408-b702-01481e0efbd7","weight":8}]},{"guid":"ffe2c816-e1d4-4457-8a2d-6c953cc3de17","title":"Neue europäische Überwachungslandschaft","subtitle":null,"slug":"Camp2019-10195-neue_europaische_uberwachungslandschaft","link":"https://fahrplan.events.ccc.de/camp/2019/Fahrplan/events/10195.html","description":"Mit neuen Verordnungen und Richtlinien wachsen in der Europäischen Union weitere Datentöpfe heran. Internetanbieter sollen außerdem Inhalte entfernen und Telekommunikationsdaten auf Verlangen herausgeben. Auch der Kreis der Zugriffsberechtigten wird deutlich erweitert. Ganz legal könnten sogar US-Behörden bald in Europa Abhören dürfen.\n\nUnter dem Stichwort „Interoperabilität“ vernetzt die Europäische Union ihre großen Datenbanken im Bereich Justiz und Inneres. Der Beschluss fiel bereits, nun steht die Umsetzung an. Fingerabdrücke und Gesichtsbilder werden in einem „gemeinsamen Identitätsspeicher“ abgelegt und mit einem „Europäischen Suchportal“ prozessiert. Mit dem Projekt wird der polizeiliche Datenverkehr drastisch steigen, allein Europol rechnet mit 100.000 täglichen Abfragen seiner Dateien.\nIm Herbst, wenn sich das neue Parlament konstituiert hat, will die EU außerdem den Zugriff auf elektronische Beweismittel auf drei Wegen vereinfachen. Die „E-Evidence“-Verordnung“ soll die polizeiliche Abfrage von Daten bei Internetfirmen in anderen EU-Staaten unter Androhung hoher Bußgelder drastisch erleichtern. Für Firmen mit Sitz in den USA plant die EU-Kommission ein Durchführungsabkommen im Rahmen des „CLOUD Act“, den die US-Regierung erlassen hat. Dann können auch US-Behörden Daten von Sozialen Netzwerken oder Messengern in Europa abfragen, möglich wäre sogar das Abhören in Echtzeit. Zusätzlich verhandelt auch der Europarat über die schnelle Herausgabe elektronischer Beweismittel. Die „Budapest-Konvention“ zur Kooperation bei Computerstraftaten soll um eine „Sicherungsanordnung“ erweitert werden.\nEbenfalls auf der Tagesordnung stehen die weiteren Verhandlungen für eine Verordnung zur „Verhinderung der Verbreitung terroristischer Online-Inhalte“. Hierzu sollen die Strafverfolgungsbehörden Anordnungen erlassen, denen innerhalb einer Stunde entsprochen werden muss. Die Firmen sollen außerdem Uploadfilter („automatisierte Werkzeuge“ gegen erneutes Hochladen) installieren. Auch das BKA beteiligt sich an den Vorbereitungen mit einer „nationalen Meldestelle“, die seit ihrem kurzen Bestehen bereits 6.000 Meldungen zur Entfernung von Inhalten verschickt hat.\nSchließlich arbeitet die EU an einer Neuauflage der Vorratsdatenspeicherung von Telekommunikationsdaten. Im Juni haben die Innenminister hierzu Schlussfolgerungen erlassen, die den Fahrplan vorgeben. Zwar ist die Rede von einer „beschränkten“ Vorratsdatenspeicherung. Tatsächlich wollen die Polizeien und Geheimdienste aber nur auf wenige Informationen verzichten, darunter die Länge genutzter Antennen, die Verbindungsqualität oder die Zahl der Klingeltöne des genutzten Telefons. Auch Berufsgeheimnisträger werden anlasslos überwacht, außer sie stellen einen Antrag auf Befreiung.\nLängst beschlossen und umgesetzt ist die EU-Richtlinie zur Speicherung von Fluggastdaten. Airlines, Reisebüros und andere Reiseanbieter müssen vor jedem internationalen Flug „Passenger Name Records“ (PNR) an die zuständige Fluggastdatenzentralstelle übermitteln. Allein in Deutschland werden in den nächsten Monaten 500 neue Stellen bei BKA, Bundespolizei, Zoll und Verwaltungsamt besetzt. Diese ufer- und anlasslose Vorratsdatenspeicherung ist ein gutes schlechtes Beispiel, weshalb den noch zu beschließenden EU-Vorhaben entschlossen entgegengetreten werden muss.","original_language":"deu","persons":["Matthias Monroy"],"tags":["camp19","10195","Ethics, Society \u0026 Politics"],"view_count":378,"promoted":false,"date":"2019-08-23T00:00:00.000+02:00","release_date":"2019-08-24T02:00:00.000+02:00","updated_at":"2026-02-12T20:15:07.179+01:00","length":2566,"duration":2566,"thumb_url":"https://static.media.ccc.de/media/conferences/camp2019/10195-hd.jpg","poster_url":"https://static.media.ccc.de/media/conferences/camp2019/10195-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/camp2019/10195-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/camp2019/10195-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/Camp2019-10195-neue_europaische_uberwachungslandschaft","url":"https://api.media.ccc.de/public/events/ffe2c816-e1d4-4457-8a2d-6c953cc3de17","conference_title":"Chaos Communication Camp 2019","conference_url":"https://api.media.ccc.de/public/conferences/camp2019","related":[{"event_id":7381,"event_guid":"e988c76b-3a47-46de-a2c7-77c49a5e731b","weight":20},{"event_id":7384,"event_guid":"8e743367-04a1-4232-ab03-a54fc210e548","weight":31},{"event_id":7385,"event_guid":"df91b683-2f32-4400-8043-b1d88aa0b454","weight":24},{"event_id":7389,"event_guid":"ed4b6c75-14f4-49fe-a11e-3762bd6b54e3","weight":30},{"event_id":7390,"event_guid":"ca134284-32df-48e0-b811-42c79dc71fa0","weight":22},{"event_id":7393,"event_guid":"a9b096f5-3db7-4c83-af7c-289afa1d886c","weight":19},{"event_id":7395,"event_guid":"95a8ea24-a2dd-479f-86fd-6e96ce66a47e","weight":27},{"event_id":7397,"event_guid":"f650773d-d9df-4050-814c-a9505c439b30","weight":35},{"event_id":7399,"event_guid":"3ecdc823-95bb-4654-ad74-6eedb93dc1ed","weight":30},{"event_id":7401,"event_guid":"9e141f51-1fd3-482b-8af8-92f7f65653f7","weight":23},{"event_id":7438,"event_guid":"d6b8d105-2540-5f33-955a-f73ae31831ca","weight":24}]}]}