{"acronym":"gpn18","aspect_ratio":"16:9","updated_at":"2026-04-10T20:00:07.227+02:00","title":"Gulaschprogrammiernacht 18","schedule_url":"","slug":"conferences/gpn/gpn18","event_last_released_at":"2019-01-01T01:00:00.000+01:00","link":null,"description":null,"webgen_location":"conferences/gpn/gpn18","logo_url":"https://static.media.ccc.de/media/events/gpn/gpn18/logo.png","images_url":"https://static.media.ccc.de/media/events/gpn/gpn18","recordings_url":"https://cdn.media.ccc.de/events/gpn/gpn18","url":"https://api.media.ccc.de/public/conferences/gpn18","events":[{"guid":"a8ff8e31-9253-57e4-bfed-a4220ea2db3c","title":"Recht auf (k)ein Geschlecht","subtitle":null,"slug":"gpn18-36-recht-auf-k-ein-geschlecht","link":"https://c3voc.de","description":"Vorstellung der deutschlandweiten Aktion, die das Transsexuellengesetz überarbeiten und die geschlechtliche Vielfalt in der Gesellschaft sichtbar machen soll, und was die Hackercommunity damit zu tun hat.\n\nIm Talk wird einerseits gezeigt, wo es schon Bewegungen gab, andererseits, wie alle (nicht nur direkt Betroffene) helfen können. Themen werden unter anderem juristische Grundlagen, gesellschaftliche Situation und aktivistische Aufforderung sein.\nEventuell mit interaktivem Part. Wir wollen insbesondere auch darauf eingehen, was diese Gesetzesänderung für die Datenbanken in Deutschland heißt, wenn die oft verpflichtende Angabe des Geschlechts nicht mehr in ein boolean passt.","original_language":"deu","persons":["Nanouk","RyLee"],"tags":["gpn18","36"],"view_count":318,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-01-07T20:30:04.360+01:00","length":2228,"duration":2228,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/36-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/36-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a8ff8e31-9253-57e4-bfed-a4220ea2db3c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a8ff8e31-9253-57e4-bfed-a4220ea2db3c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-36-recht-auf-k-ein-geschlecht","url":"https://api.media.ccc.de/public/events/a8ff8e31-9253-57e4-bfed-a4220ea2db3c","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":17},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":8},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":3},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":3},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":5},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":11},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":14},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":32},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":14},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":13},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":5},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":5},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":5},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":21},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":15}]},{"guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","title":"automated number plate readers","subtitle":null,"slug":"gpn18-17-automated-number-plate-readers","link":"https://c3voc.de","description":"I have attacked the automated number plates reader system at my work. \n\nhttps://www.youtube.com/watch?v=MEwBLqKwR04\n\nThe feedback encouraged me to have a deeper look into this system. I give details in this talk.","original_language":"eng","persons":["mc.fly"],"tags":["gpn18","17"],"view_count":561,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-15T02:00:00.000+02:00","updated_at":"2026-01-11T18:15:38.218+01:00","length":1628,"duration":1628,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/17-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/17-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/49508056-f5f5-51b5-80d0-01bb0bdba841-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/49508056-f5f5-51b5-80d0-01bb0bdba841-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-17-automated-number-plate-readers","url":"https://api.media.ccc.de/public/events/49508056-f5f5-51b5-80d0-01bb0bdba841","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":17},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":2},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":3},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":11},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":4},{"event_id":5344,"event_guid":"a8ff8e31-9253-57e4-bfed-a4220ea2db3c","weight":2},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":2},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":15},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":10},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":10},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":11},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":6},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":5},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":9},{"event_id":5376,"event_guid":"7a160036-9a93-541d-8cef-a5a663dd03f2","weight":10},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":8},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":12},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":2},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":5},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":11},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":13},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":13},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":20},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":2},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":13},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":8},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":10},{"event_id":5405,"event_guid":"293f93c2-2574-5683-91af-5b83b08fe8bf","weight":2},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":31},{"event_id":5409,"event_guid":"a891ac61-3d85-56c1-976c-79fb77172b79","weight":2},{"event_id":5412,"event_guid":"71c76e55-6b33-52fd-af57-26ad9ef8c787","weight":12},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":11},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":11},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":11},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":15},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":11},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":23},{"event_id":6589,"event_guid":"afa54ff4-f64e-5426-b822-50342f5d4ce9","weight":11},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":20},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":13},{"event_id":6617,"event_guid":"ccd8a229-cf7c-5ed8-8fe8-9e388009743b","weight":13},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":11}]},{"guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","title":"gr-iridium: Unter der Haube","subtitle":null,"slug":"gpn18-89-gr-iridium-unter-der-haube","link":"https://c3voc.de","description":"gr-iridium ist freie Software welche Signale des Iridium-Satellitennetzwerks empfangen und demodulieren kann. Dieser Vortrag schaut unter die Haube von gr-iridium und zeigt wie es 1000 Frames pro Sekunde auf einem 8 Jahre alten quad-core Rechner demodulieren kann.\n\nIridium wurde Ende der 90er gestartet. Damals wurde es als sehr schwer angesehen seine Signale aufgrund der hohen Bandbreite und staendig aenderndem Doppelerversatz abzufangen. Mit dem Aufkommen von Software Defined Radio und schnelleren Rechnern ist dies jedoch nicht mehr der Fall.\n\nDieser Vortrag schaut genauer auf die Struktur von gr-iridium und zeigt wie GNURadio benutzt werden kann um sehr \"burstige\" und sich schnell aendernde Signale zu empfangen, etwas worin es traditionell nicht besonders gut ist. Er wird euch auch eine grundsaetzliche Einfuehrung in das Demodulieren von (Q)PSK Signalen geben.\n\nNicht behandelt werden die \"hoeheren\" Schichten von Iridium. Da koennt ihr euch die Vortrage vom 33C3 (https://media.ccc.de/v/32c3-7154-iridium_update) und der HOPE (https://www.youtube.com/watch?v=cvKaC4pNvck) anschauen.","original_language":"deu","persons":["schneider"],"tags":["gpn18","89"],"view_count":551,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-03T01:30:03.126+01:00","length":3406,"duration":3406,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/89-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/89-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f738088c-f2cf-54ab-a6cd-f3f5c5cc8481-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f738088c-f2cf-54ab-a6cd-f3f5c5cc8481-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-89-gr-iridium-unter-der-haube","url":"https://api.media.ccc.de/public/events/f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":526,"event_guid":"import-868bde731cc0be35f9","weight":1},{"event_id":2508,"event_guid":"ed4bcb3b-fe2d-4728-812d-a45dbd4d01db","weight":20},{"event_id":2869,"event_guid":"e6217eeb-68ef-44b4-8e6e-beebe6a5195c","weight":28},{"event_id":2993,"event_guid":"9bc1e823-1fa9-4573-803d-300c4a68cfda","weight":1},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":13},{"event_id":5334,"event_guid":"aff905a6-1619-5bb5-a99f-8034189fd1a9","weight":2},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":12},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":12},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":2},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":1},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":14},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":1},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":2},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":11},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":15},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":10},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":12},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":13},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":10},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":13},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":7},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":14},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":10},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":11},{"event_id":5399,"event_guid":"bb78ae4c-4e29-5aad-9b71-0596ef2a2303","weight":10}]},{"guid":"25047665-60e0-5bbb-bd15-d5937103dc24","title":"One Brain, One Keyboard, One Editor","subtitle":null,"slug":"gpn18-98-one-brain-one-keyboard-one-editor","link":"https://c3voc.de","description":"What do you use to write source code, docs, books or e-mails? Single brain, single pair of hands, single keyboard, but a different keyboard layout for each language and a different text editor for each purpose?\n\nDo you use an IDE to work on source code, then switch to an e-mail client to write a message, then open a different editor to work on the documentation and finally ssh to a remote server to edit a configuration file? Do you switch languages frequently or are your colleagues named Müller, François, Muñoz or even Šedivý?\n\nI'll show you how I am happily typing in several languages on a single standard US keyboard layout and why my CapsLock became so useful. I'll show you how I use a single editor on all my machines to produce all sorts of text, and why you too should master one real text editor, whether it is Emacs or Vim. And I'll show you how to hack all your texts using your favorite programming language far beyond imagination.","original_language":"eng","persons":["Miro"],"tags":["gpn18","98"],"view_count":1574,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-19T02:45:04.346+01:00","length":2548,"duration":2548,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/98-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/98-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/25047665-60e0-5bbb-bd15-d5937103dc24-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/25047665-60e0-5bbb-bd15-d5937103dc24-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-98-one-brain-one-keyboard-one-editor","url":"https://api.media.ccc.de/public/events/25047665-60e0-5bbb-bd15-d5937103dc24","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":526,"event_guid":"import-868bde731cc0be35f9","weight":1},{"event_id":2993,"event_guid":"9bc1e823-1fa9-4573-803d-300c4a68cfda","weight":1},{"event_id":3075,"event_guid":"703aa5ef-1a1d-4209-8251-1e9218f900a4","weight":25},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":75},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":32},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":23},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":55},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":17},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":24},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":34},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":1},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":31},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":1},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":81},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":21},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":17},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":1},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":60},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":92},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":37},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":36},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":1},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":70},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":18},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":36},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":64},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":56},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":38},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":29},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":36},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":23},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":98},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":24},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":40},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":35},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":23}]},{"guid":"388267a5-1b71-5320-9173-bca8792c3797","title":"Aerodynamics 101","subtitle":null,"slug":"gpn18-8-aerodynamics-101","link":"https://c3voc.de","description":"Overview of flow patterns around objects. In depth discussion about the wing and its functions.","original_language":"deu","persons":["Alexander Becker"],"tags":["gpn18","8"],"view_count":288,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-09-20T15:00:10.792+02:00","length":3571,"duration":3571,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/388267a5-1b71-5320-9173-bca8792c3797-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/388267a5-1b71-5320-9173-bca8792c3797-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-8-aerodynamics-101","url":"https://api.media.ccc.de/public/events/388267a5-1b71-5320-9173-bca8792c3797","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":8},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":17},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":9},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":6},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":8},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":2},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":9},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":12},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":13},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":15},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":14},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":14},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":14},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":18},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":10},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":12},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":13},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":8}]},{"guid":"6057325d-54d0-59d1-929e-880ee1320044","title":"Concepts and Tooling in Reverse Engineering","subtitle":null,"slug":"gpn18-154-concepts-and-tooling-in-reverse-engineering","link":"https://c3voc.de","description":"Eine Übersicht über verschiedene Konzepte die beim Reverse Engineering von Binaries hilfreich bis essentiell sind, wie bekannte Tools diese verwenden und Tools die Konzepte verwenden die vielleicht nicht jeder kennt.\n\nDer Vortrag richtet sich sowohl an Anfänger die eine Übersicht erhalten wollen, als auch Erfahrenere die ihre Toolbox erweitern wollen.\n\n## Beschreibung \n\nWie versteht man besten API einer proprietären App wenn man seinen eigenen Open Source Client implementieren will? Was wenn man dafür einen kryptographischen Schlüssel braucht der versteckt generiert wird?\n\nFür viele Herausforderungen im Bereich Reverse Engineering reicht es nicht Assembler lesen zu können, sondern es benötigt dediziertes Tooling um nicht von der Fülle an Code und Daten überwältigt zu werden.\n\n## (Nicht vollständige Übersicht der)Inhalte:\nBasics:\n  - File Parsing\n  - Basic Tracing on Linux\n  - Disassembling\n  - Debugging mit GDB (und Plugins)\n\n\nIntermediate:\n  * Verschiedene Arten von Emulierung\n  * Binary Instrumentation \n  * Disassembly Algorithms and CFG Generation\n\nAdvanced:\n  * Symbolic Execution/Program Analysis\n  * SMT Solving\n  * Building your own tools","original_language":"deu","persons":["Florian Magin"],"tags":["gpn18","154"],"view_count":344,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2025-09-12T17:30:03.991+02:00","length":2575,"duration":2575,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/154-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/154-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/6057325d-54d0-59d1-929e-880ee1320044-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/6057325d-54d0-59d1-929e-880ee1320044-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-154-concepts-and-tooling-in-reverse-engineering","url":"https://api.media.ccc.de/public/events/6057325d-54d0-59d1-929e-880ee1320044","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":22},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":11},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":5},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":9},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":15},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":11},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":4},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":9},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":10},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":17},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":9},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":19},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":11},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":11},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":16},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":9},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":11},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":9},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":9},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":9},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":9},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":10},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":10},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":9},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":9}]},{"guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","title":"Go für Programmierer","subtitle":null,"slug":"gpn18-23-go-fr-programmierer","link":"https://c3voc.de","description":"Du kannst in irgendeiner Sprache programmieren, und bist an der Programmiersprache Go interessiert? Dieser Talk bringt dir die wichtigsten Konzepte näher und macht dich startklar zum einsteigen!\n\nGo ist eine statisch typisierte, speicher-sichere Programmiersprache, die extrem schnell kompiliert, auf vielen Plattformen läuft und die neben einer nützlichen Standardbibliothek auf eine große Community mit vielen Paketen zurückgreifen kann.\n\nKein Wunder, dass die Sprache in den letzten Jahren deutlich an Beliebtheit zugenommen hat (https://heise.de/-3889377).\n\nIn diesem Vortrag überspringe ich größtenteils den schleppenden Syntax-Teil und konzentriere mich auf die Aspekte, die Go einzigartig machen: interfaces, goroutines und channels — größtenteils durch praktische Beispiele (live coding).\n\nWeiterhin gebe ich eine praktische Einführung in die Entwicklung mit Go. Welche Tools braucht man wirklich, und wie bedient man die mächtigen Tools, die Go von Haus aus mitbringt.\n\nDas Resultat soll sein, dass du als Teilnehmer einen guten Eindruck davon hast, wie sich die Sprache anfühlt, und dich hinterher in der Lage fühlst, voll in Go einzusteigen.","original_language":"deu","persons":["Michael Stapelberg"],"tags":["gpn18","23"],"view_count":1189,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-22T00:15:04.301+01:00","length":3496,"duration":3496,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/23-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/23-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/bc2263a7-7870-55d5-9458-63c8d51c2036-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/bc2263a7-7870-55d5-9458-63c8d51c2036-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-23-go-fr-programmierer","url":"https://api.media.ccc.de/public/events/bc2263a7-7870-55d5-9458-63c8d51c2036","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":54},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":22},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":29},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":19},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":25},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":53},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":29},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":19},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":72},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":32},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":66},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":60},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":46},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":34},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":47},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":37},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":24},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":42},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":20},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":36},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":23},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":23},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":71},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":19},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":24}]},{"guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","title":"\"Nicht mitten auf der Straße!\" oder was bringt die OSM für uns Fußgänger?","subtitle":null,"slug":"gpn18-123--nicht-mitten-auf-der-strae-oder-was-bringt-die-osm-fr-uns-fugnger-","link":"https://c3voc.de","description":"Die OpenStreetMap (OSM) beinhaltet das wahrscheinlich weltgrößte digitale Wegenetz für Fußgänger, doch wie können wir sie bei der Wegfindung für Fußgänger sinnvoll nutzen? Im diesem Vortrag geht es um sichere Wege, Optimierungsverfahren, neue netztopologische Algorithmen und Hinweise für das Mapping in der OSM aus einem Forschungsprojekt für urbane Mobilität für Menschen mit Sehbehinderung.\n\nAls Fußgänger kann man die persönliche Überlebensquote außerordentlich steigern, wenn man sich hauptsächlich auf Rändern von Straßen aufhält - besonders wenn diese auch von Autos bevölkert werden. Idealerweise sollte man Bürgersteige oder dedizierte Fußwege nutzen und die Gänge danach planen. Doch selbst in der der OpenStreetMap (OSM), mit dem wahrscheinlich größten digitalen Wegennetz für Fußgänger, hat weltweit nur ein verschwindender Bruchteil der Straßen Informationen dazu, ob hier seitliche Gehwege existieren oder nicht.\n\nFür die schwächsten Teilnehmer am Straßenverkehr wie beispielsweise Fußgänger, Rollstuhlfahrer, Kinder und Blinde macht es einen riesigen Unterschied, ob man einer Straße auf einer Seite folgt, oder ob man diese überquert. Eine Routenplanung muss daher die Seitenorientierung auf einer Straße zur Detektion von Überquerungen bei einer sehr unterschiedlichen Datenqualität sinnvoll berücksichtigen.\n\nIm Rahmen des Forschungsprojekts TERRAIN wurde eine neue transparente und inkrementelle Transformation der Netztopologie entwickelt, die auf aktuellen OSM-Daten ein seiten-orientiertes Routing ermöglicht. Damit können Routen nach verschiedenen Anforderungen der Nutzungsklassen derart robust optimiert werden, so dass fehlende Daten in der OSM toleriert werden.\n\nIn der Evaluation ergeben sich verschiedene Herausforderungen in der Interpretation der OSM-Daten, die durch Hinweise für OSM-Mapper in Zukunft vermieden werden können.","original_language":"deu","persons":["Sebastian"],"tags":["gpn18","123"],"view_count":413,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-04T23:00:17.323+01:00","length":1901,"duration":1901,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/123-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/123-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/379ee1b1-ef9a-5572-8e9d-4c9d365278b4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/379ee1b1-ef9a-5572-8e9d-4c9d365278b4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-123--nicht-mitten-auf-der-strae-oder-was-bringt-die-osm-fr-uns-fugnger-","url":"https://api.media.ccc.de/public/events/379ee1b1-ef9a-5572-8e9d-4c9d365278b4","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":22},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":25},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":16},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":18},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":16},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":31},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":5},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":17},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":36},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":16},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":19},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":23},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":21},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":15}]},{"guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","title":"How the Internet has changed being Intersex","subtitle":null,"slug":"gpn18-126-how-the-internet-has-changed-being-intersex","link":"https://c3voc.de","description":"A brief journey through my experiences as an intersex person the past years, and the instrumental role that the internet has played hereby. Not just as a contact and information medium, but also as a lifeline with the real world.\n\nWithout the internet I likely would not be here today. Over the past decades my life has changed dramatically on a number of occasions, first by finding out about being intersex, then trying to find some way to deal with it.\n\nDuring this time, it was the internet which provided me not only with a way to learn about a medical condition which I had never even heard about, which provided me with options, which brought me into contact with others like me, and so much more.\n\nIt also allowed my voice to carry far and wide, throughout the world, enabling me to reach and educate others, changing lives forever. It got me into contact with a publisher for my autobiography (which I promise to finish one day, really), which - once published - could change the lives of millions.\n\nMaybe most important of all, thanks to the internet I was able to keep a window open towards a better tomorrow for myself. Despite everything, thanks to the internet I'm still here, still got a future and - most importantly - a life.","original_language":"eng","persons":["Maya Posch"],"tags":["gpn18","126"],"view_count":370,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-02-21T12:30:05.862+01:00","length":3082,"duration":3082,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/126-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/126-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/d72cca24-92a0-50d6-8a89-52fcfaca062a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/d72cca24-92a0-50d6-8a89-52fcfaca062a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-126-how-the-internet-has-changed-being-intersex","url":"https://api.media.ccc.de/public/events/d72cca24-92a0-50d6-8a89-52fcfaca062a","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":25},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":18},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":13},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":14},{"event_id":5344,"event_guid":"a8ff8e31-9253-57e4-bfed-a4220ea2db3c","weight":32},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":17},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":13},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":16},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":17},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":30},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":15},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":15},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":14}]},{"guid":"f7b220db-e823-5d71-a244-67d9ebe6b372","title":"robotcowboy: A Wearable One-Man-Band Cyborg Performance Project","subtitle":null,"slug":"gpn18-174-robotcowboy-a-wearable-one-man-band-cyborg-performance-project","link":"https://c3voc.de","description":"robotcowboy is an ongoing human-computer wearable performance project using custom hardware and software to meld rock music and realtime algorithmic composition.\n\nConceived as an idiosyncratic manifesto on the embodiment of computational sound, the original robotcowboy system was built in 2006-2007 using an belt-mounted industrial wearable computer running GNU/Linux and Pure Data, external stereo USB audio/MIDI interfaces, HID gamepads, and guitar. A second incarnation explores a one-way journey of the first human on Mars with the computing system adapted into a self-contained spacesuit backpack. Now 10 years on, a new \"robotcowboy 2.0\" powers a third iteration with only an iPhone and PdParty, the author’s open-source iOS application which runs Pure Data patches and provides full duplex stereo audio, MIDI, HID game controller support, and Open Sound Control communication. The future is bright, do you have room to wiggle?\n\nhttp://robotcowboy.com \u0026 http://danomatika.com/music/robotcowboy-cabled-madness","original_language":"eng","persons":["Dan Wilcox"],"tags":["gpn18","174"],"view_count":111,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-11-30T22:30:04.295+01:00","length":3113,"duration":3113,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/174-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/174-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f7b220db-e823-5d71-a244-67d9ebe6b372-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f7b220db-e823-5d71-a244-67d9ebe6b372-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-174-robotcowboy-a-wearable-one-man-band-cyborg-performance-project","url":"https://api.media.ccc.de/public/events/f7b220db-e823-5d71-a244-67d9ebe6b372","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":11},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":2},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":4},{"event_id":5334,"event_guid":"aff905a6-1619-5bb5-a99f-8034189fd1a9","weight":4},{"event_id":5335,"event_guid":"56c2a03f-1969-5597-a6d8-b2aac8ef9645","weight":6},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":8},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":5},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":5},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":5},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":6},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":5},{"event_id":5353,"event_guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","weight":5},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":5},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":4},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":5},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":6},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":4}]},{"guid":"3ae378ab-25dd-5336-aaba-510a967785d7","title":"Standards - Gut, dass so Viele zur Auswahl stehen","subtitle":null,"slug":"gpn18-107-standards-gut-dass-so-viele-zur-auswahl-stehen","link":"https://c3voc.de","description":"Standards bestimmen unser Leben. Vom Internet bis hin zum Desktop, Handy und die (Post)Briefe, die wir schreiben. Ein subjektiver Streifzug durch die wunderbare Welt der Standards.\n\nRFCs und Internet-Standards. ISO, OSI und OASIS. Önorm, EU-Norm und \"Industrie\"-Normen. Wir kennen und lieben/hassen sie alle. Lasst mich einen Streifzug durch jene Normen machen, von denen ich der Meinung bin, dass Ihr sie als Linux-affines Publikum kennen solltet. Kann Spuren von Sarkasmus, Rants und persönlicher Meinung beinhalten.","original_language":"deu","persons":["leyrer"],"tags":["gpn18","107"],"view_count":726,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-21T21:15:07.747+01:00","length":1648,"duration":1648,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/107-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/107-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/3ae378ab-25dd-5336-aaba-510a967785d7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/3ae378ab-25dd-5336-aaba-510a967785d7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-107-standards-gut-dass-so-viele-zur-auswahl-stehen","url":"https://api.media.ccc.de/public/events/3ae378ab-25dd-5336-aaba-510a967785d7","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":18},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":34},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":21},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":20},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":29},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":21},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":20},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":22},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":41},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":24},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":20},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":18},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":45},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":17},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":8},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":19}]},{"guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","title":"HowTo: Moving Objects","subtitle":null,"slug":"gpn18-95-howto-moving-objects","link":"https://c3voc.de","description":"Reverse engineering Hoverbard hardware for fun.\n\nIn this talk you will learn how to flash your Hoverboard hardware with custom firmware to use it as an universal platform for all kinds of moving objects including armchairs, beverage crate, go karts...\n\nWe begin with details and reverse engineering of original hardware and software. You will learn about our own software we developed for this hardware and how to flash it to your board. A good amount of time will be about hands-on tips on how to build you moving objects, both mechanical and electrical advice.\n\nThere is also a workshop that you can join if you actually plan to build something.","original_language":"eng","persons":["Niklas Fauth"],"tags":["gpn18","95"],"view_count":19928,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-04-10T20:00:07.224+02:00","length":2341,"duration":2341,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/95-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/95-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41f8b9a3-6245-5cf4-9c36-abfa5ffbd666-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41f8b9a3-6245-5cf4-9c36-abfa5ffbd666-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-95-howto-moving-objects","url":"https://api.media.ccc.de/public/events/41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":42},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":30},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":3},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":33},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":6},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":33},{"event_id":5344,"event_guid":"a8ff8e31-9253-57e4-bfed-a4220ea2db3c","weight":12},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":45},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":18},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":29},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":24},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":34},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":23},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":40},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":37},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":28},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":47},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":23},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":42},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":17},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":18}]},{"guid":"bb78ae4c-4e29-5aad-9b71-0596ef2a2303","title":"horizon EDA - ein Jahr später","subtitle":null,"slug":"gpn18-136-horizon-eda-ein-jahr-spter","link":"https://c3voc.de","description":"In diesem Talk wird es  darum gehen was sich in der neuen EDA-Applikation horizon seit dem Vortrag letzten Jahres alles getan hat und wie es mit dem Projekt weiter geht.\n\nWas macht man wenn einem Software und Elektronik Spaß machen? Man schreibt seine eigene EDA-Software! So ist vor ca. 1½ Jahren horizon entstanden und ist mittlerweile für kleine bis mittelgroße Projekte einsetzbar.\n\nIn dem Talk werden u.a. neue Features gezeigt und auf einige Implementierungsdetails eingegangen. Schwerpunkt wird auf Live-Demo liegen. \n\n[Projektseite auf github](https://github.com/carrotIndustries/horizon/)","original_language":"deu","persons":["Lukas K."],"tags":["gpn18","136"],"view_count":260,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-13T02:00:00.000+02:00","updated_at":"2025-11-24T01:00:04.375+01:00","length":2955,"duration":2955,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/136-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/136-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/bb78ae4c-4e29-5aad-9b71-0596ef2a2303-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/bb78ae4c-4e29-5aad-9b71-0596ef2a2303-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-136-horizon-eda-ein-jahr-spter","url":"https://api.media.ccc.de/public/events/bb78ae4c-4e29-5aad-9b71-0596ef2a2303","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":6},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":7},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":8},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":10},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":9},{"event_id":5385,"event_guid":"1203a77c-a01a-5a44-9282-d4c988205853","weight":7},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":8},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":7},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":8},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":7},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":9},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":6},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":8},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":11},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":6}]},{"guid":"541fb98f-16ee-5196-8518-26787321ab94","title":"Gimmicks into Augmented reality","subtitle":null,"slug":"gpn18-177-gimmicks-into-augmented-reality","link":"https://c3voc.de","description":"Participants will learn the how to make a augmented reality apps and have fun exploring the world around them using augmented reality\n\nYou will learn : \nHow to create a marker based Augmentation \nHow to interact with an objects in AR.\n\nSoftwares : Unity, vuforia.\n\nPlease download Unity before the Workshop (https://unity3d.com/de/get-unity/download)  \nPlease create an account at the Vuforia website : https://developer.vuforia.com/home-page","original_language":"eng","persons":["Yasha Jain"],"tags":["gpn18","177"],"view_count":92,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2024-05-22T16:15:06.900+02:00","length":2611,"duration":2611,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/177-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/177-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/541fb98f-16ee-5196-8518-26787321ab94-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/541fb98f-16ee-5196-8518-26787321ab94-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-177-gimmicks-into-augmented-reality","url":"https://api.media.ccc.de/public/events/541fb98f-16ee-5196-8518-26787321ab94","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":6},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":4},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":8},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":4},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":5},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":6},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":4},{"event_id":5353,"event_guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","weight":6},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":8},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":6},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":8},{"event_id":5360,"event_guid":"a422a49e-a58d-5822-a561-519d24ae9540","weight":6},{"event_id":5376,"event_guid":"7a160036-9a93-541d-8cef-a5a663dd03f2","weight":8},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":6},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":7},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":6}]},{"guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","title":"What to hack","subtitle":null,"slug":"gpn18-1-what-to-hack","link":"https://c3voc.de","description":"What to hack: die Eröffnung der GPN18","original_language":"deu","persons":["obelix"],"tags":["gpn18","1"],"view_count":1305,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2026-03-16T22:15:07.449+01:00","length":1576,"duration":1576,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dda720ca-f11b-5ef5-beeb-5e33d2ed3e53-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dda720ca-f11b-5ef5-beeb-5e33d2ed3e53-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-1-what-to-hack","url":"https://api.media.ccc.de/public/events/dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":89},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":80},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":33},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":22},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":76},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":161},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":29},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":40},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":42},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":25},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":27},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":21},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":144},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":38},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":54},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":100},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":75},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":86},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":43},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":110},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":45},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":67},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":60},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":22},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":22},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":38},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":21},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":90},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":25},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":38},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":50},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":23},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":37}]},{"guid":"1c78884b-36cd-5600-8ee6-df144c004259","title":"GPN18 Infrastructure Review and Closing","subtitle":"","slug":"gpn18-5-infrastructure-review-and-closing","link":"https://c3voc.de","description":"","original_language":"deu","persons":["obelix"],"tags":["gpn18","5"],"view_count":542,"promoted":false,"date":"2018-05-13T00:00:00.000+02:00","release_date":"2018-05-14T02:00:00.000+02:00","updated_at":"2025-06-30T08:45:04.026+02:00","length":2099,"duration":2099,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1c78884b-36cd-5600-8ee6-df144c004259-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1c78884b-36cd-5600-8ee6-df144c004259-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-5-infrastructure-review-and-closing","url":"https://api.media.ccc.de/public/events/1c78884b-36cd-5600-8ee6-df144c004259","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":23},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":12},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":15},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":32},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":12},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":18},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":35},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":12},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":17},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":13},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":15},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":33},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":16},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":32},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":14},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":17},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":15},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":15}]},{"guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","title":"Good Patterns for Deep Learning with Tensorflow","subtitle":null,"slug":"gpn18-103-good-patterns-for-deep-learning-with-tensorflow","link":"https://c3voc.de","description":"This talk will explain practical deep learning with tensorflow. No theory, just implementation.\nAll steps for implementing a model will be explained using good patterns.\n\nThe talk will introduce a split into model, loss, dataset and estimator that keeps your code clean and easy to understand. For each of those 4 topics details how to implement it in an efficient, reusable way are explained.\n\nThe talk will assume basic knowledge about deep learning, since it will focus on implementation and no theory.\n\nYou will learn:\n* Writing good quality deep learning code\n* Implementing a model from scratch\n* Implementing a loss\n* Loading a dataset\n* Training a model\n\nYou will *not* learn:\n* What to use Deep Learning for?\n* What is a CNN, GAN, RNN, etc.?\n* That latest super weird feature of tensorflow.\n\nOne more thing:\n\"The answer to the ultimate question of life, the universe and everything is 42.\" [The Hitchhiker's Guide to the Galaxy]","original_language":"eng","persons":["penguinmeanc3"],"tags":["gpn18","103"],"view_count":324,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2025-05-07T16:00:06.543+02:00","length":3661,"duration":3661,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/103-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/103-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/d4965df6-fd2c-5b12-bfb7-1302b2827ba5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/d4965df6-fd2c-5b12-bfb7-1302b2827ba5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-103-good-patterns-for-deep-learning-with-tensorflow","url":"https://api.media.ccc.de/public/events/d4965df6-fd2c-5b12-bfb7-1302b2827ba5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":33},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":9},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":13},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":4},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":9},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":15},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":12},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":13},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":15},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":11},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":11},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":12},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":11}]},{"guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","title":"Dezentrale soziale Netzwerke","subtitle":"Theorie und Praxis","slug":"gpn18-175-dezentrale-soziale-netzwerke-theorie-und-praxis","link":"https://c3voc.de","description":"ActivityPub, Mastodon, und 1 Jahr chaos.social","original_language":"deu","persons":["rixx"],"tags":["gpn18","175"],"view_count":1662,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-13T02:00:00.000+02:00","updated_at":"2026-04-09T23:30:04.734+02:00","length":2387,"duration":2387,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/175-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/175-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/641f2cd4-5a49-5663-8105-0b4e2c13a724-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/641f2cd4-5a49-5663-8105-0b4e2c13a724-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-175-dezentrale-soziale-netzwerke-theorie-und-praxis","url":"https://api.media.ccc.de/public/events/641f2cd4-5a49-5663-8105-0b4e2c13a724","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":3881,"event_guid":"f42269d1-0c07-4bac-8251-de779d65cde8","weight":34},{"event_id":5012,"event_guid":"0e036430-d97f-4e54-b2b8-149e0e9d3d58","weight":19},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":38},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":18},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":25},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":26},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":46},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":21},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":15},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":30},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":40},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":28},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":29},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":45},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":15},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":25},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":15},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":35},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":37},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":26},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":44},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":38},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":15},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":21},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":17},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":21},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":60}]},{"guid":"56c2a03f-1969-5597-a6d8-b2aac8ef9645","title":"Binary Ninja plugin development","subtitle":null,"slug":"gpn18-118-binary-ninja-plugin-development","link":"https://c3voc.de","description":"Binary.ninja is a \"reverse engineering\" platform comparable to the famous IDA pro.\nWhat sets it apart is a rather nice python api that can be used to extend the functionality even further.\nThis talk provides the listener with all steps neccesary to write own plugins in binary ninja\nand gives some tips on how to ease up the development.\n\nRough agenda \n\n* Short introduction to https://binary.ninja/ \n* Introduction to the binary ninja api\n* Examples of existing plugins \n* Tips for developing plugins","original_language":"deu","persons":["Benedikt Schmotzle"],"tags":["gpn18","118"],"view_count":223,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-02-26T11:15:08.706+01:00","length":2399,"duration":2399,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/118-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/118-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/56c2a03f-1969-5597-a6d8-b2aac8ef9645-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/56c2a03f-1969-5597-a6d8-b2aac8ef9645-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-118-binary-ninja-plugin-development","url":"https://api.media.ccc.de/public/events/56c2a03f-1969-5597-a6d8-b2aac8ef9645","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":12},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":4},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":7},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":5},{"event_id":5334,"event_guid":"aff905a6-1619-5bb5-a99f-8034189fd1a9","weight":7},{"event_id":5336,"event_guid":"f7b220db-e823-5d71-a244-67d9ebe6b372","weight":6},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":11},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":4},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":7},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":8},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":6},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":7}]},{"guid":"b8784439-c77f-505d-a191-1a4ebf27ad48","title":"Channelizing with GnuRadio","subtitle":null,"slug":"gpn18-15-channelizing-with-gnuradio","link":"https://c3voc.de","description":"Vorstellung von Channelizing Methoden in GnuRadio, inklusive Detail Vorstellung eines Frequency Domain Channelizers für z.b. Demand Assigned Multiple Access Systeme. Ziel Publikum sind primär GnuRadio Entwickler mit optimalerweise nachrichtentechnischem Hintergrund.","original_language":"deu","persons":["Gereon Such"],"tags":["gpn18","15"],"view_count":345,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2026-03-21T21:45:06.483+01:00","length":2262,"duration":2262,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/15-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/15-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/b8784439-c77f-505d-a191-1a4ebf27ad48-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/b8784439-c77f-505d-a191-1a4ebf27ad48-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-15-channelizing-with-gnuradio","url":"https://api.media.ccc.de/public/events/b8784439-c77f-505d-a191-1a4ebf27ad48","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":9},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":13},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":6},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":13},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":12},{"event_id":5340,"event_guid":"8b1d4db8-e064-5273-bf14-8394b432748b","weight":6},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":5},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":4},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":6},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":5},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":5},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":4},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":8},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":6},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":7},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":7},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":5}]},{"guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","title":"Hacking a 15$ Quadcop for Adding a Computer Interface for Flight Control","subtitle":null,"slug":"gpn18-169-hacking-a-15-quadcop-for-adding-a-computer-interface-for-flight-control","link":"https://c3voc.de","description":"In this talk I will present how I modified the remote control of a cheap 15$ quadcop in order to add a computer interface:\n* First, I developed a small hardware board for signal tapping from and signal injection into the quadcop's remote control.\n* Next, I connected an Arduino board and developed a small software written in the C programming language, that does real-time signal A/D conversion of incoming / outgoing flight control signals, time-stamping and low-level signal processing of incoming signal data, and buffering of incoming and outgoing signal data.\n* Third, I connected a Raspberry Pi 3 board to the Arduino board and developed a Java Application that retrieves flight control signal data from the Arduino with the possibility to record it to a file.  Also, the application allows for replaying recorded data back to the Arduino for signal injection into the quadcop's remote control.\n* The next step would be to extend the Java application for either editing recorded flight control data or creating completely new flight control data from scratch.\n\nSchematics and software are available as open source licensed under GNU GPL v3, see here:\nhttps://github.com/soundpaint/QuadCopHack\n\nFor a detailed description, look here: https://github.com/soundpaint/QuadCopHack","original_language":"deu","persons":["Jürgen Reuter"],"tags":["gpn18","169"],"view_count":434,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-02-23T03:15:03.962+01:00","length":1692,"duration":1692,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/169-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/169-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a54ad163-540f-5d45-9359-16a5d76da4ae-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a54ad163-540f-5d45-9359-16a5d76da4ae-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-169-hacking-a-15-quadcop-for-adding-a-computer-interface-for-flight-control","url":"https://api.media.ccc.de/public/events/a54ad163-540f-5d45-9359-16a5d76da4ae","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":40},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":19},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":3},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":22},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":23},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":33},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":23},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":32},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":24},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":24},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":21},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":20},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":27},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":21},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":31},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":21}]},{"guid":"5821f506-1609-55b5-a58d-2ae972df0f78","title":"Die Katze ist der Chef im Haus... Und der Geek muss es ausbaden.","subtitle":null,"slug":"gpn18-86-die-katze-ist-der-chef-im-haus-und-der-geek-muss-es-ausbaden-","link":"https://c3voc.de","description":"Was passiert, wenn drei überaus verwöhnte \"Terrorzwerge\" und ihr Personal ihre Forderungen an einen handwerklich begabten Geek weitergeben können? Der muss Lösungen für nie geahnte Probleme finden - und sie in diesem Talk vorstellen.\n\nIn diesem Talk stellen wir Euch unsere \"Terrorzwerge\", vor allem die zickigste Katze der Welt, und ihre Ansprüche vor, die uns zur Verzweiflung und den Geek zu Basteleien wie einer nicht fest montierten, aber robusten, Terrassensicherung und einer sich automatisch öffnenden Katzenklappe brachten. \n\nLustig wird's bei den Anekdoten mit Trollkatzen bzw dem Trollen mit Katzen. Ihr glaubt nicht, womit sich Katzengruppen und Katzenforen auf die Palme bringen lassen... \n\nZur Vorbereitung empfehlen wir die Talks \"Amazon VINE Inside\" vom EH16 und \"Wie man seine Katzen automatisiert\" vom EH18 - aber auch ohne diese beiden Talks werden euch die \"Terrorzwerge\" amüsieren.","original_language":"deu","persons":["Tanja","Habrok"],"tags":["gpn18","86"],"view_count":676,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-22T20:30:06.880+01:00","length":3309,"duration":3309,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/86-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/86-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5821f506-1609-55b5-a58d-2ae972df0f78-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5821f506-1609-55b5-a58d-2ae972df0f78-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-86-die-katze-ist-der-chef-im-haus-und-der-geek-muss-es-ausbaden-","url":"https://api.media.ccc.de/public/events/5821f506-1609-55b5-a58d-2ae972df0f78","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":38},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":24},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":39},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":2},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":23},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":45},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":23},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":41},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":36},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":31},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":40},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":33},{"event_id":5374,"event_guid":"f2eb3618-59ff-53f1-b2d5-a441669adadd","weight":2},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":23},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":44},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":44},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":2},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":2},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":26},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":47},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":37},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":27},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":52},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":30},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":24},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":37},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":30},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":34}]},{"guid":"8b1d4db8-e064-5273-bf14-8394b432748b","title":"Offenheit der IT Supply Chain einschließlich Tools und Fabs","subtitle":null,"slug":"gpn18-165-offenheit-der-it-supply-chain-einschlielich-tools-und-fabs","link":"https://c3voc.de","description":"In diesem Talk werden Überlegungen zur Sicherung der gesamten IT-Wertschöpfungskette mit quelloffenen Tools geschildert. Die Diskussion über entsprechende Ansätze sollen breit in der Gesellschaft verankert werden.\n\nDer Einreicher ist Mitautor eines White Papers, in dem umfassende Möglichkeiten zur Erzielung einer wesentlich höheren IT-Sicherheit erörtert werden. Eines der  Schlüsselergebnisse ist, dass eine offene und transparente Wertschöpfungskette am ehesten zum Ziel führt, wobei sich die Offenheit auch auf die verwendeten Entwicklungswerkzeuge bezieht und Fragen der Transparenz von Fabs angesprochen werden. Die Autoren sind sich der Schwierigkeiten der Aufgabe einigermaßen bewusst. Sie plädieren für eine baldige, globale Diskussion des Ansatzes und für eine breite Unterstützung der Entwicklung der (teils bereits entstehenden) Tools durch Enthusiasten, Regierungen und Unternehmen. \nDas White Paper ist u.a. beim KIT verfügbar:\nhttp://www.itas.kit.edu/pub/v/2018/weua18a.pdf\nEinen Überblick gibt die Presseerklärung des KIT:\nhttps://www.kit.edu/kit/pi_2018_030_transparente-it-produktion-fur-digitale-souveranitat.php","original_language":"deu","persons":["Arnd Weber"],"tags":["gpn18","165"],"view_count":85,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-04-16T12:00:03.298+02:00","length":1926,"duration":1926,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/165-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/165-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8b1d4db8-e064-5273-bf14-8394b432748b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8b1d4db8-e064-5273-bf14-8394b432748b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-165-offenheit-der-it-supply-chain-einschlielich-tools-und-fabs","url":"https://api.media.ccc.de/public/events/8b1d4db8-e064-5273-bf14-8394b432748b","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":6},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":6},{"event_id":5328,"event_guid":"b8784439-c77f-505d-a191-1a4ebf27ad48","weight":6},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":6},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":6},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":11},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":8},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":5},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":6},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":6},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":13},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":8},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":9},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":7},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":6},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":7},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":5},{"event_id":5399,"event_guid":"bb78ae4c-4e29-5aad-9b71-0596ef2a2303","weight":5}]},{"guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","title":"Meltdown and Spectre for normal people","subtitle":null,"slug":"gpn18-130-meltdown-and-spectre-for-normal-people","link":"https://c3voc.de","description":"Meltdown and Spectre are security flaws that gained widespread media coverage in the first days of 2018. Contrary to other security bugs these flaws are\n\n* hardware, not software based\n* the direct consequence of years of performance improvements\n* extremely widespread because they affect (nearly all) computer systems, including mobile phones\n* difficult to patch\n\nThis talk fills the gap between  _\"Intel caused a terrible security bug. Everybody panic!\"_  and _\"By priming the BPU of the CPU a malicious process can read out of bounds memory via speculative code execution\"_.\n\n*This talk comes with a side order on \"Understanding CPU architecture\" and \"Managing security vulnerabilities\".*","original_language":"deu","persons":["Jens Neuhalfen"],"tags":["gpn18","130"],"view_count":372,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-01-10T17:00:20.274+01:00","length":3534,"duration":3534,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/130-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/130-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/37586acb-300a-55f2-be87-9e3fda19ca9c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/37586acb-300a-55f2-be87-9e3fda19ca9c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-130-meltdown-and-spectre-for-normal-people","url":"https://api.media.ccc.de/public/events/37586acb-300a-55f2-be87-9e3fda19ca9c","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":21},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":15},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":12},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":13},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":14},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":22},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":12},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":31},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":12},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":17},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":15},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":14},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":13},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":20},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":14},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":13},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":17},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":17},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":12},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":14}]},{"guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","title":"Datacenter in a Box - High Performance Computing mobil","subtitle":null,"slug":"gpn18-34-datacenter-in-a-box-high-performance-computing-mobil","link":"https://c3voc.de","description":"Wie schafft man es, High Perfomance Computing mobil und deutlich leistungsfaehiger als Strukturen in klassischen Rechenzentren abzubilden?\n\nIch habe das letzte Jahr an einem Projekt gearbeitet, das Rechenzentren in Seecontainer umformatiert, und dort eine deutlich hoehere Leistung bieten kann als uebliche RZs es koennen - und dann diese Container in eine ehemalige Mine in Norwegen stellt, um vollends Green zu werden.\n\nDieser Talk erzaehlt ueber die Infrastruktur, die Stolpersteine, warum Physik immer gemein zu Ingenieuren ist - und wo die Limits liegen.","original_language":"deu","persons":["Tom Eichhorn"],"tags":["gpn18","34"],"view_count":1065,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-23T03:15:04.489+01:00","length":1842,"duration":1842,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/34-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/34-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/2b148a03-ea3f-5aa8-8a6d-9cb7624f303e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/2b148a03-ea3f-5aa8-8a6d-9cb7624f303e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-34-datacenter-in-a-box-high-performance-computing-mobil","url":"https://api.media.ccc.de/public/events/2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":2776,"event_guid":"3d7c416e-7e31-11e5-b91e-f1d2b07f83cb","weight":31},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":60},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":26},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":27},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":25},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":79},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":31},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":47},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":29},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":60},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":73},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":42},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":55},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":56},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":35},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":38},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":4},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":71},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":4},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":55},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":44},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":4},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":24},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":27},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":44},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":56},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":35},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":27},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":33}]},{"guid":"98391d79-4f04-5043-966b-25e33ce1bc37","title":"kinX: keyboard hacking","subtitle":null,"slug":"gpn18-19-kinx-keyboard-hacking","link":"https://c3voc.de","description":"Ich erzähle, wie und warum ich meine Kinesis Advantage Tastatur mit einem selbst entwickelten keyboard controller (und USB hub!) ausgestattet habe. Mit einer Eingabelatenz von nur 0.2ms macht mein controller die Tastatur zur schnellsten (mir bekannten) Tastatur.\n\nIn diesem Vortrag erkläre ich am Beispiel der bekannten ergonomischen Kinesis Advantage Tastatur wie Tastaturen eigentlich funktionieren, und weswegen ich seit mittlerweile 5 Jahren einen eigenen keyboard controller in meiner Tastatur einsetze.\n\nNachdem die Grundlagen etabliert sind, untersuche und eliminiere ich Faktoren für Eingabelatenz, also Verzögerung zwischen Tastendruck und Reaktion des Computers.\n\nMit dem so angeeigneten Wissen baue ich ein Latenz-Messgerät und messe die Verarbeitungslatenz aktueller Linux-Systeme.","original_language":"deu","persons":["Michael Stapelberg"],"tags":["gpn18","19"],"view_count":658,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-15T23:30:05.827+01:00","length":3582,"duration":3582,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/19-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/19-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/98391d79-4f04-5043-966b-25e33ce1bc37-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/98391d79-4f04-5043-966b-25e33ce1bc37-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-19-kinx-keyboard-hacking","url":"https://api.media.ccc.de/public/events/98391d79-4f04-5043-966b-25e33ce1bc37","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":22},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":24},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":3},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":28},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":27},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":36},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":28},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":38},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":18},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":16},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":24},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":2},{"event_id":5385,"event_guid":"1203a77c-a01a-5a44-9282-d4c988205853","weight":17},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":26},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":26},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":17},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":39},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":22},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":20},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":20}]},{"guid":"aff905a6-1619-5bb5-a99f-8034189fd1a9","title":"Automatically Assessing Security and Privacy Properties of Web Sites","subtitle":null,"slug":"gpn18-127-automatically-assessing-security-and-privacy-properties-of-web-sites","link":"https://c3voc.de","description":"In this talk, we present PrivacyScore, a tool for making tracking behaviour of Web sites more transparent.  With PrivacyScore, you can easily investigate Web sites for their usage of tracking or other privacy invading technologies. It also allows you to create benchmarks to find out what related Web sites have in common.  We present details of the inner workings of the tool and how to perform basic analyses of Web sites and lists of related sites.\n\nThis session is for people who are interested in analysing the state of the current Web regarding tracking of its users. It will be interesting to technicians, policy makers, and users.\n\nWe want to discuss how we can make the tool more useful to users, Web site operators, and data protection agencies s.t. it will be the go-to-point for privacy issues on the Web.\n\nPrivacyScore.org is a joint project by University of Bamberg, TU Darmstadt, and University of Hamburg.","original_language":"deu","persons":["Tobias Mueller","Pascal Wichmann"],"tags":["gpn18","127"],"view_count":113,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2024-08-03T19:45:02.674+02:00","length":3338,"duration":3338,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/127-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/127-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/aff905a6-1619-5bb5-a99f-8034189fd1a9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/aff905a6-1619-5bb5-a99f-8034189fd1a9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-127-automatically-assessing-security-and-privacy-properties-of-web-sites","url":"https://api.media.ccc.de/public/events/aff905a6-1619-5bb5-a99f-8034189fd1a9","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":8},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":7},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":11},{"event_id":5335,"event_guid":"56c2a03f-1969-5597-a6d8-b2aac8ef9645","weight":7},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":9},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":2},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":2},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":7},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":7},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":5},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":7},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":6},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":7},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":7},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":6}]},{"guid":"7a160036-9a93-541d-8cef-a5a663dd03f2","title":"Hold Steering Wheel! Autopilots and Autonomous Driving.","subtitle":null,"slug":"gpn18-108-hold-steering-wheel-autopilots-and-autonomous-driving-","link":"https://c3voc.de","description":"Hold Steering Wheel! Differences in Automation Between Aircraft and Road Vehicles\n\nFor decades, airliners and also small aircraft have been flying large portions of their flight, including landing, on autopilot. So why is it so hard to get autonomous driving \"on the road\"? I will briefly talk about aviation and aviation safety, the role of automation in commercial aviation, its benefits, but also its pitfalls and dangers, and compare it to technology in road cars, from simple driver-assist functions up to full Level-5 autonomy (door-to-door without any human intervention or supervision). There are things that are fundamentally different between flying an aircraft and driving a car, most notably the environment, but also levels of training and proficiency, maintenance as well as questions of ethics and liability.","original_language":"eng","persons":["Bernd Sieker"],"tags":["gpn18","108"],"view_count":271,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-25T18:30:09.347+01:00","length":3216,"duration":3216,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/108-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/108-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/7a160036-9a93-541d-8cef-a5a663dd03f2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/7a160036-9a93-541d-8cef-a5a663dd03f2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-108-hold-steering-wheel-autopilots-and-autonomous-driving-","url":"https://api.media.ccc.de/public/events/7a160036-9a93-541d-8cef-a5a663dd03f2","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":2},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":3},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":3},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":2},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":8},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":8},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":3},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":3},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":11},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":2},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":8},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":9},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":7},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":8},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":10}]},{"guid":"04527a17-9bce-5ec8-940b-781cf5163a86","title":"Lightning Talks für Fragen","subtitle":null,"slug":"gpn18-101-lightning-talks-fr-fragen","link":"https://c3voc.de","description":"“Ich habe $Projekt und brauche bei folgendem Baustein Hilfe”\n\nBekanntermaßen ist eine der tollen Sachen bei Nerd-Events (und überhaupt), zusammen Dinge zu tun. In diesem Slot gibt es sowas wie Lightning Talks für Fragen, wenn man an einer Stelle nicht weiter weiß kann man sein halb fertiges Projekt vorstellen, eine schöne Möglichkeit neue Menschen zum zusammen rumnerden zu finden. :-) \n\nKeine Produkte, keine Jobs.","original_language":"deu","persons":["Benjamin Wand"],"tags":["gpn18","101"],"view_count":171,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-22T11:00:08.056+01:00","length":1245,"duration":1245,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/101-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/101-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/04527a17-9bce-5ec8-940b-781cf5163a86-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/04527a17-9bce-5ec8-940b-781cf5163a86-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-101-lightning-talks-fr-fragen","url":"https://api.media.ccc.de/public/events/04527a17-9bce-5ec8-940b-781cf5163a86","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5232,"event_guid":"57485454-3356-2020-2020-202020202020","weight":24},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":5},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":3},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":3},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":5},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":5},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":10},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":10},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":13},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":8},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":11},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":10},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":27}]},{"guid":"7de8a55e-c46b-504d-babe-4a25730417cd","title":"Märchenhafte Protokolle","subtitle":null,"slug":"gpn18-85-mrchenhafte-protokolle","link":"https://c3voc.de","description":"Ein kleine Einführung in die Magie der Authentifizierungs- und Sicherheitsprotokolle\n\nFür die Nutzung der gängigsten Anwendungen und Internetseiten müssen sich Menschen authentifizieren. Das gleiche gilt für alle smarten Technologien und Geräte, die wir zur Kommunikation nutzen. Doch wie funktioniert die Technik hinter diesen Prozessen? Wie können Protokolle unsere Identität schützen und einer anderen Entität gegenüber versichern? Und wie funktionieren sie? Die gute Fee nimmt euch mit auf eine Reise ins Märchenland!","original_language":"deu","persons":["Tatjana"],"tags":["gpn18","85"],"view_count":655,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-22T15:15:06.669+01:00","length":3336,"duration":3336,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/85-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/85-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/7de8a55e-c46b-504d-babe-4a25730417cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/7de8a55e-c46b-504d-babe-4a25730417cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-85-mrchenhafte-protokolle","url":"https://api.media.ccc.de/public/events/7de8a55e-c46b-504d-babe-4a25730417cd","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":2890,"event_guid":"b7327513-182a-455a-932e-aab4791f5331","weight":29},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":35},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":22},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":20},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":23},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":24},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":38},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":29},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":19},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":29},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":19},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":32},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":3},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":19},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":25},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":27},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":7},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":21},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":26},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":47},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":29},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":23},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":39},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":23},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":41},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":27}]},{"guid":"25be26ce-ea41-5555-b757-798370e9fac4","title":"Lightning Talks","subtitle":null,"slug":"gpn18-189-lightning-talks","link":"https://c3voc.de","description":"Talks can be in German or English.\nEs wird mind. 6 Slots zu je maximal 10min geben.\n\nBitte tragt euch der Reihe nach ein (wer zuerst kommt mahlt zuerst):\n\n* \u003csome_speaker\u003e \u003csome_topic\u003e\n*\n\n- Die 10min müssen nicht komplett gefüllt werden, aber mehr Zeit gibt es nicht.\n- Wenn am Ende noch Zeit ist oder einzelne Vorträge wieder ausfallen können noch weitere Vorträge von der Warteliste nachrücken.\n- Wer in der Liste drängelt wird disqualifiziert.\n- Fragen?  @pony hängt im #gpn channel auf  irc.hackint.eu:6697  rum.","original_language":"deu","persons":["pony"],"tags":["gpn18","189"],"view_count":317,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-13T02:00:00.000+02:00","updated_at":"2024-05-07T16:15:04.388+02:00","length":3676,"duration":3676,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/189-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/189-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/25be26ce-ea41-5555-b757-798370e9fac4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/25be26ce-ea41-5555-b757-798370e9fac4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-189-lightning-talks","url":"https://api.media.ccc.de/public/events/25be26ce-ea41-5555-b757-798370e9fac4","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":13},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":14},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":18},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":16},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":16},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":20},{"event_id":5382,"event_guid":"04527a17-9bce-5ec8-940b-781cf5163a86","weight":27},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":13},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":12},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":14},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":15},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":16},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":11},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":26}]},{"guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","title":"Practical Cryptography Patterns","subtitle":null,"slug":"gpn18-129-practical-cryptography-patterns","link":"https://c3voc.de","description":"Unprotected data will put not only your customers at risk. Jens' talk will give you actionable advice on how - and why - cryptography can help you and your managers to get better sleep. His talk will illustrate legal and regulatory requirements, and will then dive into a set of cryptographic patterns to get you started on your way to better and more secure software.\n\nBetting all your data on your cloud providers security might not be the best way to exercise your accountability. Protecting data with cryptography can ensure that your last line of defense actually holds.","original_language":"deu","persons":["Jens Neuhalfen"],"tags":["gpn18","129"],"view_count":264,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-05-02T00:00:03.304+02:00","length":3973,"duration":3973,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/129-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/129-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-129-practical-cryptography-patterns","url":"https://api.media.ccc.de/public/events/f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":13},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":14},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":13},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":11},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":11},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":4},{"event_id":5353,"event_guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","weight":2},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":2},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":12},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":7},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":13},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":13},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":24},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":17}]},{"guid":"79bc8dc8-d493-5370-a094-4afe80d94715","title":"AI and the End of the World","subtitle":null,"slug":"gpn18-22-ai-and-the-end-of-the-world","link":"https://c3voc.de","description":"Like any other tool, AI has its benefits and its dangers. But we need to be aware of the dangers, to reap the benefits unharmed.\n\nEverybody is talking about the benefits of AI and in which areas it could also be applied to. Only a few question if this should be done at all and which dangers might arise with widespread adoption of AI.\n\nThis non-technical talk will give insights into the different dangers of AI: From Skynet and intelligent war drones to BigBrother and a benevolent but misguided super-intelligence à la \"I, Robot\", different scenarios with prerequisites and probabilities are discussed. Although the ultimate end-state of AI maybe 50 years ahead, most people focus solely on that, neglecting the many different dangers on the path to get there. But there are a lot of issues we need to start to address today.\n\nWe are living in interesting times ... a slightly different talk.","original_language":"eng","persons":["Jeremias Rößler"],"tags":["gpn18","22"],"view_count":370,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-29T15:15:05.697+02:00","length":4946,"duration":4946,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/22-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/22-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/79bc8dc8-d493-5370-a094-4afe80d94715-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/79bc8dc8-d493-5370-a094-4afe80d94715-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-22-ai-and-the-end-of-the-world","url":"https://api.media.ccc.de/public/events/79bc8dc8-d493-5370-a094-4afe80d94715","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":5328,"event_guid":"b8784439-c77f-505d-a191-1a4ebf27ad48","weight":1},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":1},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":10},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":10},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":11},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":11},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":10},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":9},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":4},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":16},{"event_id":5376,"event_guid":"7a160036-9a93-541d-8cef-a5a663dd03f2","weight":1},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":13},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":1},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":12},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":13},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":1},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":20},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":11},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":11},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":5},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":14}]},{"guid":"acc35999-4707-5ef9-a8af-f3b197f09704","title":"Ich komme aus einem anderen Land - Telematik in der Medizin","subtitle":null,"slug":"gpn18-125-ich-komme-aus-einem-anderen-land-telematik-in-der-medizin","link":"https://c3voc.de","description":"Bis zum 1.1.2019 sollen 200.000 Arztpraxen, Krankenhäuser und Apotheken an die Telematikstruktur angeschlossen werden. Die Denkkultur des Gesundheitswesens ist bis heute zu tiefst analog. Daran ändern auch ein paar Computer in den Arztpraxen nichts. Die Einführung der Digitalisierung im Gesundheitswesen  ist aber der formulierte politische Wille von nunmehr fünf Regierungen. Das entstehende Spannungsfeld zwischen dem analogen Alltag der ärztlichen Sprechstunde und den digitalen Ansprüchen der Kontrollbehören ist enorm. Ich bin Hausarzt. Vor der Bestellung der Komponenten zum Telematikanschluss habe ich recherchiert und Fragen gestellt. Am vorläufigen Ende dieses Prozesses bin ich hier auf dieser Veranstaltung gelandet. Ich möchte Sie mitnehmen zu den Höhepunkten dieses CultureClashs.","original_language":"deu","persons":["Stefan Streit"],"tags":["gpn18","125"],"view_count":5852,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-19T16:15:07.447+01:00","length":1645,"duration":1645,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/125-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/125-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/acc35999-4707-5ef9-a8af-f3b197f09704-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/acc35999-4707-5ef9-a8af-f3b197f09704-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-125-ich-komme-aus-einem-anderen-land-telematik-in-der-medizin","url":"https://api.media.ccc.de/public/events/acc35999-4707-5ef9-a8af-f3b197f09704","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":30},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":67},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":22},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":12},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":76},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":28},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":88},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":24},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":24},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":23},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":64},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":21},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":47},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":60},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":24},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":36},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":61},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":44},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":18},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":13},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":19},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":13},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":53},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":13},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":15},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":18},{"event_id":5521,"event_guid":"c3dbbb23-45de-421a-89bf-74ba5f0607e8","weight":23},{"event_id":5722,"event_guid":"906c5611-7e85-4593-8a4e-b33dedfce19e","weight":185},{"event_id":5970,"event_guid":"8c8cf5d2-d609-5466-9b88-a29230a2470c","weight":88}]},{"guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","title":"$QL from Hell","subtitle":null,"slug":"gpn18-110--ql-from-hell","link":"https://c3voc.de","description":"Fundstücke aus \"organisch gewachsenen\" Datenbanken und was wir daraus lernen können.\n\nArbeitsbedingt beschäftige ich mich regelmäßig mit diversen ERP-Lösungen von \"führenden Anbietern\" und insbesondere deren Datenbanken dahinter, z.B. zur erweiterten Datenauswertung oder Anbindung diverser Services. Dafür müssen die Datenbanken in der Regel reverse engineered werden (welcher Hersteller liefert schon eine Doku seiner DB mit...) und dabei finden sich immer wieder kleine bis seeehr große Schnitzer.\nDa Humor der beste Lehrer ist, bietet dieser Talk ein \"Best of\" grundlegender Designfails, kreativer Datentypennutzung und sehr speziellen Funktionen \"for the lulz\"!\nGrundlegende Datenbankkenntnisse bei Besucherinnen sind zwar von Vorteil aber definitiv nicht Vorraussetzung.","original_language":"deu","persons":["smtw"],"tags":["gpn18","110"],"view_count":1927,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-04-09T17:15:09.070+02:00","length":1849,"duration":1849,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/110-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/110-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/16a1a1ce-98ce-5d69-9af1-49ca4f154640-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/16a1a1ce-98ce-5d69-9af1-49ca4f154640-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-110--ql-from-hell","url":"https://api.media.ccc.de/public/events/16a1a1ce-98ce-5d69-9af1-49ca4f154640","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":144},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":42},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":47},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":17},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":53},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":126},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":32},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":45},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":17},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":42},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":31},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":47},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":72},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":96},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":21},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":81},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":71},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":70},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":97},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":17},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":25},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":54},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":88},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":60},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":17},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":23},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":28},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":38},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":45},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":23},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":22},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":112},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":29},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":34},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":46},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":30},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":18},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":29}]},{"guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","title":"Language Without Code: The Extremes of Nonprogrammable and Conceptual Programming Languages","subtitle":null,"slug":"gpn18-87-language-without-code-the-extremes-of-nonprogrammable-and-conceptual-programming-languages","link":"https://c3voc.de","description":"Why would someone create a programming language that can't be programmed in and, if it can't be programmed in, is it a programming language?\n\nWhy would someone create a programming language that can't be programmed in and, if it can't be programmed in, is it a programming language? Esolangs (esoteric programming languages) have long challenged the norms of programming practice and computing culture. Most esolangs are experiential works; we understand the languages by writing code in them. Through this action, the logic of the language becomes clear. However, a smaller subset of esolangs make their point not through actively writing code, but instead by simply contemplating their rules. We can think of these as conceptual rather than experiential. The most extreme are designed in such a way that they don’t allow any code to be written for them at all. By stepping away from usability, the conceptual esolangs offer the most direct challenge to the definition of programming language, a term which is surprisingly unspecific, and usually understood through utility, despite the fact that programming languages predate digital computers. This paper delves into the conceptual esolangs and looks at their challenge to the terms computer, code, and  language.\n\nThis talk is an expanded version of the paper published with CITARJ available here: http://artes.ucp.pt/citarj/article/view/432","original_language":"eng","persons":["Daniel Temkin"],"tags":["gpn18","87"],"view_count":159,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-04-16T20:45:04.668+02:00","length":2242,"duration":2242,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/87-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/87-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8743b645-2a12-55d4-a09e-56585dfdcaa5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8743b645-2a12-55d4-a09e-56585dfdcaa5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-87-language-without-code-the-extremes-of-nonprogrammable-and-conceptual-programming-languages","url":"https://api.media.ccc.de/public/events/8743b645-2a12-55d4-a09e-56585dfdcaa5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":4},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":7},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":12},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":5},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":8},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":6},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":10},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":4},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":6},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":8},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":7},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":10},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":8},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":8},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":10},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":6}]},{"guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","title":"Demoshow","subtitle":null,"slug":"gpn18-24-demoshow","link":"https://c3voc.de","description":"Die große Demo-Nachlese des letzten Jahres\n\nWir zeigen die besten, interessantesten und verrücktesten Demos des letzten Jahres","original_language":"deu","persons":["F1fth"],"tags":["gpn18","24"],"view_count":668,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-13T02:00:00.000+02:00","updated_at":"2025-09-26T23:30:06.180+02:00","length":7415,"duration":7415,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/24-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/24-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a8a4d912-70e6-5c64-b3dc-c55e4ecf292f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a8a4d912-70e6-5c64-b3dc-c55e4ecf292f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-24-demoshow","url":"https://api.media.ccc.de/public/events/a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":50},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":26},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":31},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":30},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":22},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":35},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":33},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":34},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":27},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":30},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":30},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":21},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":26}]},{"guid":"41e37228-4544-5ec1-8b08-05846cf7b470","title":"an introduction into digital model railroads","subtitle":null,"slug":"gpn18-18-an-introduction-into-digital-model-railroads","link":"https://c3voc.de","description":"In this talk i will give an introduction into digital model railway control systems and their hacking and making opportunities.\n\n\"modern\" model railway control systems are digital - since 1979. Several standards evolved out of that. As this is today one of the older used standards there are plently of hacking and making opportunities in there. \nI realized that a lot of the people in our scene have model railroads somewhere on the attic at home which in my opinion are worth being found, brought to the hackerspace, modded and played around with.","original_language":"deu","persons":["mc.fly"],"tags":["gpn18","18"],"view_count":266,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-12-05T21:45:06.875+01:00","length":1001,"duration":1001,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/18-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/18-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41e37228-4544-5ec1-8b08-05846cf7b470-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41e37228-4544-5ec1-8b08-05846cf7b470-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-18-an-introduction-into-digital-model-railroads","url":"https://api.media.ccc.de/public/events/41e37228-4544-5ec1-8b08-05846cf7b470","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":12},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":13},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":9},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":9},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":7},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":11},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":8},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":11},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":14},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":14},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":12},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":12},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":4},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":11},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":13},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":11}]},{"guid":"a422a49e-a58d-5822-a561-519d24ae9540","title":"Computational Narratives - Philosophical perspectives on Jupyter Notebook","subtitle":null,"slug":"gpn18-44-computational-narratives-philosophical-perspectives-on-jupyter-notebook","link":"https://c3voc.de","description":"The \"fiction view on models\" compares scientific modeling with authorized role-play games (Frigg 2010). As narratives are the entrance, it now becomes clear why coding and tabletop (e.g. D\u0026D) somehow belong together...\n\n\"Computers are good at consuming, producing and processing data. Humans, on the other hand, process the world through narratives. Thus, in order for data, and the computations that process and visualize that data, to be useful for humans, they must be embedded into a narrative - a computational narrative - that tells a story for a particular audience and context.  \n- First, a single computational narrative needs to span a wide range of contexts and audiences. \n- Second, these computational narratives need to be reproducible.  \n- Third, computational narratives are created in collaboration.“ (Perez and Granger 2015, ipython.org)  \n\nQuestbook: Beginning-Middle-End, Narrative Framing, Narrative Self-Constituion, Narrative Immersion, Representation\n\nAdventurers Group: Aristotle, MacIntyre, Walton, Frigg, Salis, Minsc \u0026 Boo and some others...  \n\nIn general, I am very interested in further discussion about your practical experience and thoughts on this!","original_language":"eng","persons":["Max Roßmann"],"tags":["gpn18","44"],"view_count":134,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-01-02T23:00:08.828+01:00","length":1791,"duration":1791,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/44-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/44-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a422a49e-a58d-5822-a561-519d24ae9540-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a422a49e-a58d-5822-a561-519d24ae9540-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-44-computational-narratives-philosophical-perspectives-on-jupyter-notebook","url":"https://api.media.ccc.de/public/events/a422a49e-a58d-5822-a561-519d24ae9540","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":6},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":6},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":2},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":2},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":2},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":7},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":7},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":6},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":6},{"event_id":5352,"event_guid":"541fb98f-16ee-5196-8518-26787321ab94","weight":6},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":2},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":6},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":9},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":2},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":4},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":7},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":7},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":9},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":6},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":9},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":6}]},{"guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","title":"RFID/NFC-Grundlagen - A Pentesters Perspective","subtitle":null,"slug":"gpn18-79-rfid-nfc-grundlagen-a-pentesters-perspective","link":"https://c3voc.de","description":"Eine kleine Einführung und Übersicht über typische RFID/NFC-Techniken aus der Perspektive eines Pentesters.\n\nDieser Vortrag soll eine Übersicht über einige der vielen typischen RFID/NFC-Techniken geben. Dabei soll es weniger um den theoretischen Hintergrund gehen, sondern eher um konkrete Vor- und Nachteile verschiedener RFID/NFC-Typen. Besonders in Bezug auf deren Sicherheit! Dabei soll auch geklärt werden, was im Werkzeugkoffer des RFID/NFC-Hackers nicht fehlen sollte.","original_language":"deu","persons":["Gerhard Klostermeier"],"tags":["gpn18","79"],"view_count":1846,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2026-01-18T22:15:13.771+01:00","length":3549,"duration":3549,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/79-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/79-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ca1800bf-221d-5084-86ea-cbf946d18e04-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ca1800bf-221d-5084-86ea-cbf946d18e04-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-79-rfid-nfc-grundlagen-a-pentesters-perspective","url":"https://api.media.ccc.de/public/events/ca1800bf-221d-5084-86ea-cbf946d18e04","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":3790,"event_guid":"6575fcac-cfae-4286-b464-67842ae6842d","weight":15},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":89},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":30},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":49},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":70},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":19},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":19},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":30},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":15},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":42},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":19},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":22},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":24},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":32},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":21},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":26},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":35},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":22},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":22},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":26},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":18},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":18},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":32},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":18},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":18},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":15}]},{"guid":"1203a77c-a01a-5a44-9282-d4c988205853","title":"The Basics Of Audio Compressors","subtitle":null,"slug":"gpn18-9-the-basics-of-audio-compressors","link":"https://c3voc.de","description":"Kompressoren im Sounddesign.\nEine kurze Einführung in Transient Shaping, Multi Band Compression und Limiting.","original_language":"deu","persons":["couchsofa"],"tags":["gpn18","9"],"view_count":271,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-01-20T00:00:15.694+01:00","length":2336,"duration":2336,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/9-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/9-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1203a77c-a01a-5a44-9282-d4c988205853-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/1203a77c-a01a-5a44-9282-d4c988205853-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-9-the-basics-of-audio-compressors","url":"https://api.media.ccc.de/public/events/1203a77c-a01a-5a44-9282-d4c988205853","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":11},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":2},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":12},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":10},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":2},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":11},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":11},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":13},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":9},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":17},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":13},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":17},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":10},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":10},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":13},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":7},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":10}]},{"guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","title":"That time my great grandfather didn't die","subtitle":null,"slug":"gpn18-29-that-time-my-great-grandfather-didn-t-die","link":"https://c3voc.de","description":"All layers in an organisation usually knows what best practice is, yet it’s hard to enforce it.\nThe talk will start in a 100 year old accident with personal implications for me personally. A sinking boat, two drowning artists, and my great grandfather being the sole survivor. \nThe accident was caused by well-known handling errors, enforced by the whole organisation from top to bottom. Economic considerations as well as tedious, repetitive manual labor caused a well-built boat to sink.\nI see strong parallells between this accident and my work as an agile tester.\n\nKey takeaways\nComputer engineering differs from any other kind of engineering because of its lack of enforcement of standardised frameworks, checklists and due diligence. I argue that the IT business is about as mature as the physical engineering branches were a 100 years ago, and a combination of the GDPR and agile methods is our best hope of changing from a Wild West business to something more modern.","original_language":"eng","persons":["Emma Lilliestam"],"tags":["gpn18","29"],"view_count":177,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-10-02T21:45:08.569+02:00","length":3031,"duration":3031,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/29-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/29-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/412d3bab-a67c-589a-9c70-8bb128ab560e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/412d3bab-a67c-589a-9c70-8bb128ab560e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-29-that-time-my-great-grandfather-didn-t-die","url":"https://api.media.ccc.de/public/events/412d3bab-a67c-589a-9c70-8bb128ab560e","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":4},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":17},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":16},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":15},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":16},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":13},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":13},{"event_id":5376,"event_guid":"7a160036-9a93-541d-8cef-a5a663dd03f2","weight":4},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":13},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":14},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":24},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":16},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":13},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":18},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":10}]},{"guid":"ccd8a229-cf7c-5ed8-8fe8-9e388009743b","title":"Finally - Venenerkennung hacken.","subtitle":null,"slug":"gpn18-78-finally-venenerkennung-hacken-","link":"https://c3voc.de","description":"Die Venenerkennung ist eines der juengsten biometrischen Verfahren und auf Grund des nicht-oeffentlichen Merkmals bisher auch eines der sichersten. Es gibt wenig Forschung zur zur Sicherheit der Systeme, bis jetzt.\n\nWir haben es endlich geschafft Venenerkennung zu hacken...\nTODO...","original_language":"deu","persons":["starbug"],"tags":["gpn18","78"],"view_count":877,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2019-01-01T01:00:00.000+01:00","updated_at":"2026-01-19T17:30:13.080+01:00","length":2881,"duration":2881,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/78-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/78-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/78-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/78-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-78-finally-venenerkennung-hacken-","url":"https://api.media.ccc.de/public/events/ccd8a229-cf7c-5ed8-8fe8-9e388009743b","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":13},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":25},{"event_id":6378,"event_guid":"15f4e5c5-40e1-4c73-8da0-4cc2a773ab13","weight":15},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":22},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":19},{"event_id":6409,"event_guid":"a42e5a4f-fd9b-4571-bf17-483978afecb3","weight":26},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":35},{"event_id":6423,"event_guid":"ea7c532f-cc2d-4cb1-8f15-1933df7fd523","weight":71},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":30},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":28},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":14},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":25},{"event_id":6507,"event_guid":"787007cf-828d-4409-94b0-90a0b8d727a0","weight":2},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":40},{"event_id":6545,"event_guid":"400622c5-3754-43fd-aaf3-0ca00e9ad551","weight":13},{"event_id":6589,"event_guid":"afa54ff4-f64e-5426-b822-50342f5d4ce9","weight":13},{"event_id":6600,"event_guid":"68619725-72ae-5645-8b6c-8e645e5d9c47","weight":14},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":31},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":28},{"event_id":6618,"event_guid":"520b7c92-8bd1-424e-acc4-7cf15dd168a4","weight":14}]},{"guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","title":"Building security - Coding","subtitle":null,"slug":"gpn18-81-building-security-coding","link":"https://c3voc.de","description":"Building secure software applications. A pragmatic approach - and getting your peers motivated.\n\nHow to code secure software applications. Focus will be on coding practices - especially those that can be introduced into a team without much resistance. As \"designing software\", \"compiling software\" and \"testing software\" are in the same neighbourhood I will add some tips for those as well.\nDo not expect fancy ninja tricks. Focus is \"one size fits all\" and \"lots of bang for your buck\" things.\nCan contain:\n- Psychology\n- C programming best practice","original_language":"deu","persons":["Thorsten Sick"],"tags":["gpn18","81"],"view_count":174,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-01-13T11:00:22.911+01:00","length":1833,"duration":1833,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/81-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/81-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0e0586a7-c3fe-5267-ab12-c2450b961bce-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0e0586a7-c3fe-5267-ab12-c2450b961bce-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-81-building-security-coding","url":"https://api.media.ccc.de/public/events/0e0586a7-c3fe-5267-ab12-c2450b961bce","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":10},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":8},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":13},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":15},{"event_id":5356,"event_guid":"6b10f088-835c-580f-875b-f6e5c4cce985","weight":12},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":14},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":7},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":22},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":7},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":6},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":10},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":10},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":18},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":12}]},{"guid":"17a278b3-34af-5a04-92d8-e3e26165b410","title":"Publish your research!","subtitle":"Warum öffentlich finanzierte Forschung nicht veröffentlicht wird","slug":"gpn18-41-publish-your-research-warum-ffentlich-finanzierte-forschung-nicht-verffentlicht-wird","link":"https://c3voc.de","description":"\"Forschung wird größtenteils aus öffentlichen Geldern bezahlt und sollte daher auch der Öffentlichkeit verfügbar gemacht werden.\" - Dies ist eine oft geäusserte Forderung und auch ein guter Grund Software und Daten als Open Source Software bzw. Open Data zu veröffentlichen. Leider ist das aber leichter gesagt als getan.\r\n\r\nBasierend auf meinen Erfahrungen aus dem Deutschen Zentrum für Luft- und Raumfahrt (DLR) möchte ich euch aufzeigen welche Hürden Wissenschaftler überwinden müssen um ihren Code und ihre Daten zu veröffentlichen. Und es deshalb oft nicht machen. Da reines jammern aber keinem weiterhilft, möchte ich ebenfalls vorstellen welche Schritte wir im DLR ergreifen um diesen Missstand zu ändern.","original_language":"deu","persons":["Carina Haupt"],"tags":["gpn18","41"],"view_count":540,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-13T02:00:00.000+02:00","updated_at":"2026-04-09T10:15:08.323+02:00","length":2518,"duration":2518,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/41-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/17a278b3-34af-5a04-92d8-e3e26165b410-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/17a278b3-34af-5a04-92d8-e3e26165b410-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-41-publish-your-research-warum-ffentlich-finanzierte-forschung-nicht-verffentlicht-wird","url":"https://api.media.ccc.de/public/events/17a278b3-34af-5a04-92d8-e3e26165b410","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":593,"event_guid":"import-d5d8add3bc284763a8","weight":15},{"event_id":2797,"event_guid":"d934d3e2-9de8-11e5-8a67-5b7bcd9fe77d","weight":12},{"event_id":2949,"event_guid":"5c8d1a32-d9ce-49cb-b058-846fa58663d8","weight":12},{"event_id":3461,"event_guid":"8e19cc1e-42d7-4832-a787-e9d81c717751","weight":13},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":13},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":15},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":12},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":16},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":19},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":13},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":20},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":12},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":39},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":15},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":20},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":16},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":18},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":16},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":19},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":15},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":5}]},{"guid":"8afc16c2-d76a-53f6-85e4-90494665835d","title":"tmux - Warum ein schwarzes Fenster am Bildschirm reicht","subtitle":null,"slug":"gpn18-105-tmux-warum-ein-schwarzes-fenster-am-bildschirm-reicht","link":"https://c3voc.de","description":"tmux ermöglicht es Euch, innerhalb eines Terminals mehrere Sitzungen parallel zu verwenden. Diese Session gibt eine (hoffentlich) einsteigerInnenfreundliche Einführung in das Tool.\n\nOft bräuchte es zu einem Server mehrere SSH-Sessions/Fenster offen bzw. sollen Anwendungen weiterlaufen, auch wenn die Verbindung zum Server abreißt. Oder es sollen mehrer Personen in einem Konsolenfenster gleichzeitig arbeiten können. -- Diese Anforderungen lassen sich über einen \"Terminal Multiplexer\" wunderbar lösen. \ntmux ist so ein \"Terminal-Multiplexer\", der es ermöglicht innerhalb eines Terminals (das \"scharze Fenster\") mehrere Sitzungen (\"sessions\") parallel zu erzuegen und zu verwenden. In dieser einsteigerInnenfreundlichen Einführung in tmux zeige ich Euch, warum ihr ohne tmux eigentlich nicht produktiv arbeiten könnt ;).","original_language":"deu","persons":["leyrer"],"tags":["gpn18","105"],"view_count":3988,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-30T20:15:05.295+02:00","length":3097,"duration":3097,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/105-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/105-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8afc16c2-d76a-53f6-85e4-90494665835d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/8afc16c2-d76a-53f6-85e4-90494665835d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-105-tmux-warum-ein-schwarzes-fenster-am-bildschirm-reicht","url":"https://api.media.ccc.de/public/events/8afc16c2-d76a-53f6-85e4-90494665835d","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5228,"event_guid":"44434a47-4b41-2020-2020-202020202020","weight":22},{"event_id":5240,"event_guid":"39474e46-4733-2020-2020-202020202020","weight":24},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":100},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":24},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":35},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":32},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":81},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":24},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":24},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":16},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":36},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":15},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":96},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":49},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":15},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":66},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":92},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":60},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":58},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":15},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":75},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":16},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":44},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":23},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":55},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":28},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":19},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":41},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":20},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":227},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":24},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":20},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":30},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":19},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":22},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":18},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":17},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":32},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":26}]},{"guid":"682090d6-32cf-52cd-9c58-c49a9c732200","title":"Hacking relationships","subtitle":null,"slug":"gpn18-117-hacking-relationships","link":"https://c3voc.de","description":"Liebe, Regeln, Sex, Menschen\n\n... oder was man in zwischenmenschlichen Beziehungen noch außer Monogamie anstellen kann.\n\nPolyamorie, offene Beziehung, Relationship Anarchy - Was ist das? Wie funktioniert das? Und warum sollten wir darüber reden?\n\nWir geben einen Überblick über das Thema und die Begriffe. Zudem geben wir unsere eigenen Erfahrungen wieder und erzählen was man unserer Meinung nach tun sollte und was man lieber bleiben lässt.\n\nDer Vortrag ist was für dich wenn du nur neugierig bist, dich schon etwas mehr mit dem Thema beschäftigt hast, du schon mit Polybeziehungen in Berührung gekommen bist oder ...","original_language":"deu","persons":["Vera \u0026 Martin"],"tags":["gpn18","117"],"view_count":1224,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-15T02:00:00.000+02:00","updated_at":"2026-01-04T02:45:09.516+01:00","length":3493,"duration":3493,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/117-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/117-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/682090d6-32cf-52cd-9c58-c49a9c732200-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/682090d6-32cf-52cd-9c58-c49a9c732200-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-117-hacking-relationships","url":"https://api.media.ccc.de/public/events/682090d6-32cf-52cd-9c58-c49a9c732200","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":37},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":15},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":19},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":17},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":18},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":13},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":29},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":23},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":24},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":32},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":23},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":23},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":22},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":34},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":17},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":18},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":20},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":20},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":27},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":34},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":15},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":47},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":18},{"event_id":5395,"event_guid":"79bc8dc8-d493-5370-a094-4afe80d94715","weight":13},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":21},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":13},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":2},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":15},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":31},{"event_id":6383,"event_guid":"7177142b-6f15-4fac-af62-c45df7a377a9","weight":17},{"event_id":6400,"event_guid":"527b56af-8d56-4edb-9027-9ca60767c742","weight":15},{"event_id":6406,"event_guid":"686c1387-e761-4df6-b395-f9ddf92d46e7","weight":16},{"event_id":6411,"event_guid":"42650545-4394-4455-a5f5-9efad111fedc","weight":25},{"event_id":6430,"event_guid":"462f9320-3a0e-4785-82de-15343803c2ba","weight":25},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":20},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":15},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":21},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":30},{"event_id":6603,"event_guid":"ea00d1e0-a580-415f-a8cf-f02883d939dc","weight":32},{"event_id":6611,"event_guid":"b1b28bd0-5279-4950-8385-9ee8a57187f9","weight":23},{"event_id":6617,"event_guid":"ccd8a229-cf7c-5ed8-8fe8-9e388009743b","weight":25}]},{"guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","title":"Logbuch:Netzpolitik 253","subtitle":null,"slug":"gpn18-143-logbuch-netzpolitik-253","link":"https://c3voc.de","description":"Logbuch:Netzpolitik ist der Versuch, das netzpolitische Geschehen im deutschsprachigen Raum weitgehend neutral und unaufgeregt in einem regelmässigen Podcast einzufangen.\n\nSeit mehr als 250 Folgen machen Tim Pritlove und Linus Neumann gemeinsam den Podcast Logbuch:Netzpolitik. Auf der Gulaschprogrammiernacht wollen wir die Gelegenheit nutzen, ein bisschen Bühnenerfahrung zu sammeln.","original_language":"deu","persons":["Linus Neumann","Tim Pritlove"],"tags":["gpn18","143"],"view_count":1956,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-12T02:00:05.443+01:00","length":4474,"duration":4474,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/143-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/143-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/42019c8e-4b3d-51a3-833c-0f83c0f543d5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/42019c8e-4b3d-51a3-833c-0f83c0f543d5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-143-logbuch-netzpolitik-253","url":"https://api.media.ccc.de/public/events/42019c8e-4b3d-51a3-833c-0f83c0f543d5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":4605,"event_guid":"8d382482-9817-11e7-951c-33f9470b8ba7","weight":16},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":86},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":21},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":40},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":28},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":87},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":21},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":71},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":28},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":46},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":60},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":37},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":50},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":57},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":16},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":31},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":21},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":35},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":19},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":31},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":44},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":22},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":28},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":33},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":16},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":23},{"event_id":5657,"event_guid":"be3340d0-8c90-51ea-a0a7-7b5650d762b4","weight":18},{"event_id":6471,"event_guid":"f17d3060-fb3d-4d73-b1e3-8bd5ec4d4d12","weight":24},{"event_id":6543,"event_guid":"48ed6dea-e67d-4866-8c35-318e9d892363","weight":43}]},{"guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","title":"Lasst uns Massenverschlüsslung ausrollen!","subtitle":null,"slug":"gpn18-151-lasst-uns-massenverschlsslung-ausrollen-","link":"https://c3voc.de","description":"Einfache Verschlüsselung für alle: E-Mails und Nachrichten werden standardmäßig «by default» verschlüsselt und anonymisiert, ohne dass der Nutzer großen Aufwand damit hat, sondern seine Standardanwendungen verwendet. End-To-End, Peer-to-Peer und ohne zentrale Infrastruktur, Open Source mit Code Reviews und Unterstützung von üblichen Cryptostandards (S/MIME, PGP, OTR) – und am Ende zur Anonymisierung sogar noch durch GNUnet geschickt.\n\nWie das gehen soll? Wir versuchen es! Kleine Vorstellung des Projektes, des Stands der Organisation und Software und der aktuellen Implementierung der Ideen und Standards, wie z.B. Trustwords als nutzbare Erweiterung des Konzeptes des Fingerprints oder das leidige Problem der Keyserver bei GPG.\n\nDer erste Teil des Talks richtet sich an absolute Beginner, der zweite Teil setzt ein wenig mehr technisches Verständnis / Cryptowissen voraus.","original_language":"deu","persons":["sva"],"tags":["gpn18","151"],"view_count":661,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-01-20T01:30:09.748+01:00","length":3495,"duration":3495,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/151-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/151-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/2c46ce35-9267-5c2a-9c45-0a7acd4406a4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/2c46ce35-9267-5c2a-9c45-0a7acd4406a4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-151-lasst-uns-massenverschlsslung-ausrollen-","url":"https://api.media.ccc.de/public/events/2c46ce35-9267-5c2a-9c45-0a7acd4406a4","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5010,"event_guid":"c34a07a2-0add-4809-bb25-280368b84db0","weight":20},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":25},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":18},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":18},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":20},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":29},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":24},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":19},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":24},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":24},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":22},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":31},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":32},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":2},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":26},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":18},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":23},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":30},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":14},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":27},{"event_id":5395,"event_guid":"79bc8dc8-d493-5370-a094-4afe80d94715","weight":2},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":38},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":18},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":18}]},{"guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","title":"Disintegrating Rockets","subtitle":"Softwarefehler in der Raumfahrt (und wie wir versuchen sie zu vermeiden)","slug":"gpn18-42-disintegrating-rockets-softwarefehler-in-der-raumfahrt-und-wie-wir-versuchen-sie-zu-vermeiden-","link":"https://c3voc.de","description":"Wir alle \"hacken\" gerne irgendwas zusammen. Oft reicht das auch, manchmal aber halt auch nicht. Anhand von bekannten Beispielen aus der Raumfahrt möchte ich euch zeigen welche Folgen Nachläßigkeiten im Bereich Software Engineering haben können.\r\n\r\n\"In der Vergangenheit wussten wir es nicht besser\" - \"Es ist immernoch RocketScience\" - \"Irren ist menschlich\" - Alles Gründe warum selbst bei den Profis von NASA, ESA, DLR und co mal was schief geht bei der Softwareentwicklung. \r\n\r\nEin indirekter Appell an das strukturierte und saubere Arbeiten. Nicht immer ganz ernst zu nehmen und definitv überspitzt.","original_language":"deu","persons":["Carina Haupt"],"tags":["gpn18","42"],"view_count":2013,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-20T21:00:08.779+01:00","length":1751,"duration":1751,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/42-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/42-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a3bda554-eb73-5a33-a14c-6303f83cc451-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/a3bda554-eb73-5a33-a14c-6303f83cc451-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-42-disintegrating-rockets-softwarefehler-in-der-raumfahrt-und-wie-wir-versuchen-sie-zu-vermeiden-","url":"https://api.media.ccc.de/public/events/a3bda554-eb73-5a33-a14c-6303f83cc451","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":45},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":22},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":22},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":64},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":21},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":37},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":24},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":54},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":44},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":37},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":44},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":36},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":31},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":55},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":44},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":61},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":55},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":25},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":44},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":44},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":26},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":20},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":25},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":39},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":20}]},{"guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","title":"Moderne Kommandozeilen Werkzeuge","subtitle":null,"slug":"gpn18-106-moderne-kommandozeilen-werkzeuge","link":"https://c3voc.de","description":"ls, grep, find, ifconfig. Wir kennen sie alle und nutzen sie täglich. Dabei gäbe es mittlerweile, zum Teil bessere, Alternativen. Ein Blick auf die Kommandozeilenwerkzeuge des Jahres 2018.\n\nLinux ohne einer Kommandozeile ist wie ein Himmel ohne Sterne. Aber wie sieht es eigentlich mit den Tools aus, die wir hier verwenden?\nDie meisten Tools, die wir kennen und täglich verwenden, stammen entweder aus dem POSIX-Umfeld oder GNU-Userland. POSIX tools und Optionen stammen zum Teil aus 1988, und auch die Kommandozeilen-Werkzeuge aus dem GNU-Umfeld sind nicht viel moderner. Dabei gäbe es durchaus zeitgemäße Alternativen. Lasst uns gemeinsam einen Blick auf ripgrep, exa, fzf, ip und Co. werfen.","original_language":"deu","persons":["leyrer"],"tags":["gpn18","106"],"view_count":3381,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-03-29T20:30:06.335+02:00","length":3537,"duration":3537,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/106-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/106-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/faea7134-21b2-5264-9e02-a8706b63e7fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/faea7134-21b2-5264-9e02-a8706b63e7fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-106-moderne-kommandozeilen-werkzeuge","url":"https://api.media.ccc.de/public/events/faea7134-21b2-5264-9e02-a8706b63e7fc","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5228,"event_guid":"44434a47-4b41-2020-2020-202020202020","weight":28},{"event_id":5240,"event_guid":"39474e46-4733-2020-2020-202020202020","weight":41},{"event_id":5262,"event_guid":"1e7ca9c3-609b-4c73-bf25-60501cba6791","weight":19},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":90},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":32},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":26},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":32},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":80},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":18},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":42},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":26},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":112},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":40},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":71},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":227},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":98},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":44},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":41},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":70},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":14},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":44},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":53},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":56},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":21},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":1},{"event_id":5385,"event_guid":"1203a77c-a01a-5a44-9282-d4c988205853","weight":17},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":39},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":39},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":52},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":19},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":23},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":27},{"event_id":5395,"event_guid":"79bc8dc8-d493-5370-a094-4afe80d94715","weight":20},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":23},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":45},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":44},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":16},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":30},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":15},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":32},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":20},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":47},{"event_id":6233,"event_guid":"9fa9eae0-2d2f-4bce-a7f5-1983003b3db7","weight":15},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":65}]},{"guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","title":"Alles was ihr schon immer über Glasfasern wissen wolltet","subtitle":null,"slug":"gpn18-13-alles-was-ihr-schon-immer-ber-glasfasern-wissen-wolltet","link":"https://c3voc.de","description":"Ihr habt letztes mal gefragt, also bringen wir euch die Antworten auf Fragen wie:\nWas ist Singlemode, was ist Multimode und warum ist Erika eigentlich besser als orange?\nWelche Optik brauche ich für was, und warum sind die Dinger eigentlich so teuer? \nMuss ich eigentlich Putzen? Was ist ein EDFA und was ist ein RAMAN? Wie funktioniert WDM?","original_language":"deu","persons":["momo","Marcnetismus"],"tags":["gpn18","13"],"view_count":3096,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-03T15:30:10.410+01:00","length":4516,"duration":4516,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/13-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/13-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/50c2af4c-4826-50ee-bde7-cbed07d3bf2e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/50c2af4c-4826-50ee-bde7-cbed07d3bf2e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-13-alles-was-ihr-schon-immer-ber-glasfasern-wissen-wolltet","url":"https://api.media.ccc.de/public/events/50c2af4c-4826-50ee-bde7-cbed07d3bf2e","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":213,"event_guid":"import-fc85a6ebd72be60c70","weight":16},{"event_id":3894,"event_guid":"d7c3b762-a657-4670-a41b-3a8829a6bb13","weight":78},{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":161},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":70},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":49},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":15},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":57},{"event_id":5339,"event_guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","weight":17},{"event_id":5341,"event_guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","weight":17},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":22},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":33},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":22},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":126},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":58},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":21},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":53},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":81},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":55},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":87},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":60},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":95},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":22},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":64},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":76},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":79},{"event_id":5383,"event_guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","weight":16},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":17},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":24},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":23},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":39},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":24},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":80},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":20},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":28},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":18},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":26},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":31},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":32},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":17}]},{"guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","title":"HTTP Security \u0026 Headers","subtitle":null,"slug":"gpn18-141-http-security-headers","link":"https://c3voc.de","description":"Du kennst observatory.mozilla.org oder securityheaders noch nicht? Dann bist du hier richtig; es gibt einen aktuellen Überblick über die Möglichkeiten eure Anwendungen ein stück sicherer zu machen und zu halten...","original_language":"deu","persons":["Ives \"dalini\" Laaf"],"tags":["gpn18","141"],"view_count":690,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2026-01-31T16:00:08.849+01:00","length":3247,"duration":3247,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/141-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/141-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ea7536ab-518e-5ec3-a897-7de5b1cc90cf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ea7536ab-518e-5ec3-a897-7de5b1cc90cf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-141-http-security-headers","url":"https://api.media.ccc.de/public/events/ea7536ab-518e-5ec3-a897-7de5b1cc90cf","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":76},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":49},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":16},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":15},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":57},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":12},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":14},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":53},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":23},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":25},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":32},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":16},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":28},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":31},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":25},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":14},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":16},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":12},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":25},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":16},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":16},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":32},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":15},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":25},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":19}]},{"guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","title":"Using and creating console oriented services (such as wttr.in, cheat.sh, rate.sx, etc)","subtitle":null,"slug":"gpn18-164-using-and-creating-console-oriented-services-such-as-wttr-in-cheat-sh-rate-sx-etc-","link":"https://c3voc.de","description":"The talk is devoted to console oriented services, like: wttr.in, cheat.sh, rate.sx.\nWhich popular console oriented services exist currently and how can they be used in everyday life;\nwhat advantages and disadvantages do they have; how services like that could be created.\n\n## About the talk\n\nI've created several console oriented services,\nthat you are probaly aware of, if you are a vivid\nconsole user.\n\nIf you've never heard about them, you can try to do\nthe following in your terminal, just to get the first impression:\n\n```\n    $ curl wttr.in/Karlsruhe\n    $ curl rate.sx/btc\n    $ curl cheat.sh/lua/:learn\n```\n\nAs we will see, in many cases services creaated using this approach\nhas many advantages comparing to browser-orineted services:\n* speed;\n* portability;\n* small footprint and ubiquituous of the client;\n* good possibility of integration;\n* consciosness;\n* anonimity;\n* etc.\n\n\nIn the talk I will demostrate several popular\nconsole oriented services, that I've created, and tell:\n* how such services could be created,\n* what tasks could be and should be solved by means of them;\n* what advantages (and disatvantages) do they have;\n* what changes in curl we are currently doing, to make such services\neven easier to use, and even more universal and pervasive.\n\n\nThe talk will be accompanied with many technical examples\nand useful practical tips and tricks such as:\n\n* how to make weather forecast using nothing else but curl;\n\n* how to bring any text from you console one your smartphone\n    using nothing else but curl;\n\n* how to find an answer to (almost) any programming question\n    not leaving your editor;\n\nand many other like that.\n\n\nI would be happy to share my ideas with you, discuss them\nand get some feedback from you during this discussion.\n\n## About me\n\nI'm a software developer, avid opensource user and enthusiast,\ncurrenty residing in Nuremberg and working fulltime in a team\ndeveloping a distributed relational database management system.\nConsole oriented services is my hobby.\n\n\nGithub:\n\n*    https://github.com/chubin\n\nTwitter:\n\n *    https://twitter.com/igor_chubin\n\nStackOverflow:\n\n*    https://stackoverflow.com/users/1458569/","original_language":"eng","persons":["Igor Chubin"],"tags":["gpn18","164"],"view_count":742,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-04-08T02:30:02.623+02:00","length":1354,"duration":1354,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/164-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/164-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0f7427d2-f0c5-5747-8966-79f0b2b679b5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0f7427d2-f0c5-5747-8966-79f0b2b679b5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-164-using-and-creating-console-oriented-services-such-as-wttr-in-cheat-sh-rate-sx-etc-","url":"https://api.media.ccc.de/public/events/0f7427d2-f0c5-5747-8966-79f0b2b679b5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":27},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":7},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":23},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":42},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":21},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":36},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":31},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":10},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":21},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":24},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":24},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":29},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":26}]},{"guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","title":"Security Champions","subtitle":null,"slug":"gpn18-142-security-champions","link":"https://c3voc.de","description":"Wie bekommt man Security in die Entwicklungsteams? Der Talk zeigt ein mögliches Vorgehen aus dem OWASP Umfeld und ein paar Erfahrungen damit.","original_language":"deu","persons":["Ives \"dalini\" Laaf"],"tags":["gpn18","142"],"view_count":334,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-12-26T02:00:04.570+01:00","length":3006,"duration":3006,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/142-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/142-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/24126bf1-66d4-53a6-b470-49e65ca4bdee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/24126bf1-66d4-53a6-b470-49e65ca4bdee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-142-security-champions","url":"https://api.media.ccc.de/public/events/24126bf1-66d4-53a6-b470-49e65ca4bdee","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":16},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":16},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":24},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":22},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":15},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":2},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":18},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":15},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":23},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":27},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":23},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":16},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":18},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":7}]},{"guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","title":"Einführung: Schlangenprogrammiernacht 2018","subtitle":null,"slug":"gpn18-153-einfhrung-schlangenprogrammiernacht-2018","link":"https://c3voc.de","description":"Programmiert eigene Schlangen und lasst sie gegeneinander antreten!\n\nDas bytewerk bringt zur GPN18 ein neues Programmierspiel mit.\n\nAlle TeilnehmerInnen können sich in der Erschaffung \"künstlicher\" \"Intelligenz\" versuchen und Bots programmieren, die jeweils eine Schlange steuern.\nDie Schlangen müssen Futter suchen und Gegnern ausweichen - wer in eine gegnerische Schlange fährt, stirbt. Das Ganze orientiert sich an https://slither.io/\n\nBots werden in Lua programmiert und auf einen zentralen Server geladen, wo sie selbstständig agieren müssen. \nDen Code könnt ihr entweder auf einer Webseite mit Online-Editor entwickeln oder per REST API auf den Server schieben.\n\nAm Tag 4 gibt es hervorragende Preise für die Teilnehmer mit den besten Schlangen.\n\nIn diesem Einführungstalk zeigen wir kurz das Spiel und wie man seine erste Schlange zum Schlängeln bringt.","original_language":"deu","persons":["Hubert Denkmair","Thomas"],"tags":["gpn18","153"],"view_count":905,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-10T02:00:00.000+02:00","updated_at":"2026-04-01T22:45:05.730+02:00","length":1332,"duration":1332,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/153-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/153-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/33c0a435-974b-5a65-9798-81ee2bfb925b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/33c0a435-974b-5a65-9798-81ee2bfb925b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-153-einfhrung-schlangenprogrammiernacht-2018","url":"https://api.media.ccc.de/public/events/33c0a435-974b-5a65-9798-81ee2bfb925b","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":80},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":30},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":49},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":47},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":29},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":35},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":23},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":40},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":24},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":48},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":22},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":27},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":24},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":26},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":26}]},{"guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","title":"Geschichte_n der Informatik","subtitle":null,"slug":"gpn18-166-geschichten-der-informatik","link":"https://c3voc.de","description":"Von tatsächlichen \"bugs\" über abgestürzte Raketen, von knapp am Krieg vorbei zu rassistischen Seifenspendern: Eine Reise durch die Geschichte der IT-Fehler, und was wir aus ihnen lernen können - und sollten.\n\nWieviele Raketenwissenschaftler_innen braucht es, um eine Rakete nicht auf ihrem ersten Flug explodieren zu lassen?\nEigentlich nur eine_n - aber die Person sollte die Dokumentation gelesen haben.\n\nViele Fails sind nicht nur technisch bedingt - wir gehen den organisatorischen und strukturellen Umständen auf den Grund. Und wir werden sehen: in den letzten Jahrzehnten wurden viele Fehler nur unzureichend als Lernmöglichkeiten genutzt.","original_language":"deu","persons":["pascoda"],"tags":["gpn18","166"],"view_count":684,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-01-29T15:00:10.311+01:00","length":1827,"duration":1827,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/166-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/166-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/95457cf6-6e5c-530c-8ce8-8bf9662cb90a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/95457cf6-6e5c-530c-8ce8-8bf9662cb90a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-166-geschichten-der-informatik","url":"https://api.media.ccc.de/public/events/95457cf6-6e5c-530c-8ce8-8bf9662cb90a","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":43},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":31},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":60},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":70},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":32},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":34},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":58},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":36},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":50},{"event_id":5368,"event_guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","weight":1},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":58},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":55},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":47},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":38},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":32},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":40},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":41},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":31},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":29},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":29}]},{"guid":"707ad08f-3a7a-5b72-8acf-2a4d203a1a20","title":"ada_conf - the making of a separatistic IT conference","subtitle":null,"slug":"gpn18-37-adaconf-the-making-of-a-separatistic-it-conference","link":"https://c3voc.de","description":"ada_conf is an ordinary IT conference, but with one difference: it's only for women and trans people.\n\nWe created ada_conf for a simple reason: there was a demand for it. \n\nIn this session I will share the experiences of organizing two conferences in a very short time. What did we excel at, what did we learn? And, are there really enough qualified women to fill a whole tech conference?\n\nThis session will be one part prepared talk, and one part discussion and knowledge sharing.\n\nAgenda:\nInspiration\nWhy we don't speak about diversity\nada_conf's organizational structure\nEnabling people's super powers\nGetting speakers\nGetting (and enabling) volunteers\nAgile conference development \nDiscussion","original_language":"eng","persons":["Emma Lilliestam"],"tags":["gpn18","37"],"view_count":84,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-14T02:00:00.000+02:00","updated_at":"2025-02-07T15:00:08.003+01:00","length":2254,"duration":2254,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/37-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/37-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/707ad08f-3a7a-5b72-8acf-2a4d203a1a20-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/707ad08f-3a7a-5b72-8acf-2a4d203a1a20-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-37-adaconf-the-making-of-a-separatistic-it-conference","url":"https://api.media.ccc.de/public/events/707ad08f-3a7a-5b72-8acf-2a4d203a1a20","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":7},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":3},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":2},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":4},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":3},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":7},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":7},{"event_id":5386,"event_guid":"41e37228-4544-5ec1-8b08-05846cf7b470","weight":3},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":2},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":5},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":5},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":2},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":4},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":2},{"event_id":5402,"event_guid":"25be26ce-ea41-5555-b757-798370e9fac4","weight":2},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":6}]},{"guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","title":"F.U.C.K. Germany - FLTI* und Computer Kram","subtitle":null,"slug":"gpn18-171-f-u-c-k-germany-flti-und-computer-kram","link":"https://c3voc.de","description":"Angefangen mit der Heart of Code - einem feministischen Hackspace für Frauensternchen in Berlin - entstehen derzeit einige F.U.C.K. Initiativen in verschiedenen deutschen Städten.\n\nIn diesem Vortrag wollen wir euch erzählen was wir tun, was uns antreibt und was uns verbindet. \nUnd wie ihr vielleicht auch bei euch um die Ecke eine F.U.C.K. Gruppe starten könnt.","original_language":"deu","persons":["Leli","miriamino"],"tags":["gpn18","171"],"view_count":1449,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-01-31T21:15:07.196+01:00","length":1859,"duration":1859,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/171-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/171-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ea068ddc-aef6-5367-ba79-cd90ddbf8353-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/ea068ddc-aef6-5367-ba79-cd90ddbf8353-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-171-f-u-c-k-germany-flti-und-computer-kram","url":"https://api.media.ccc.de/public/events/ea068ddc-aef6-5367-ba79-cd90ddbf8353","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":110},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":35},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":48},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":25},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":95},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":27},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":40},{"event_id":5344,"event_guid":"a8ff8e31-9253-57e4-bfed-a4220ea2db3c","weight":21},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":30},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":24},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":97},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":36},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":47},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":75},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":70},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":57},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":58},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":22},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":31},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":44},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":60},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":71},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":33},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":70},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":32},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":45},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":34},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":34}]},{"guid":"5fcbd225-fb13-57cd-97af-00be56e749b9","title":"Kausalität, nichtlineare Systeme und ein Spiel","subtitle":null,"slug":"gpn18-138-kausalitt-nichtlineare-systeme-und-ein-spiel","link":"https://c3voc.de","description":"Hört sich kompliziert an? Ist es nicht!\n\nImmer komplexere System zu schaffen bringt uns an die Grenzen unserer Vorstellungskraft. Immerzu wachsende und nur durch aufwendiges Refractoring in Griff zu bekommende Codeentropie leistet ihren Beitrag zum Problem. Hier geht es darum inhomogene nichtlineare Systeme, deren Vernetzung, deren Chancen und deren Anforderungen an das Denken kennenzulernen und zu diskutieren. Auch möchte ich hier etwas über die Natur von Information und Wirkung diskutieren und vielleicht auch erfolgreich eine möglicherweise etwas ungewohnte Perspektive vermitteln.\n\nDas Problem ist bekannt, umfangreiche Software wird trotz scheinbar einwandfreier Architektur schnell unübersichtlich und schwer wartbar. Jetzt stellt euch vor, eine Software welche aufbauend auf einem klassischen Ausführungsmodell einmal eine ganze Stadt, eine SmartCity, betreiben soll... also mir stellt es da die Haare auf.\n\nJeder der schon einmal mit dem \"Actor Model\" gearbeitet hat, wird verstanden haben, dass, jenseits des gewohnten Ausführungsmodells, die, in der Anwendung völlig neue, Welt der inhomogenen nichtlinearen Systeme existiert. Die Anforderungen inhomogene nichtlineare Systeme zu denken unterscheiden sich grundlegend von denen sequentielle, symmetrisch parallelisierte oder homogene nichtlineare Systeme zu denken.\n\nDiese Art von Software bietet neue Gestaltungsmöglichkeiten aus der Bottom-up Perspektive und sollte so den Aufbau umfangreicher und komplexer Systeme bei nahezu stufenloser Skalierbarkeit und bestmöglichem Loadbalancing ermöglichen. Ohne, das irgendwer alle Prozesse überblicken muß.\n\nWelchen Platz nehmen wir Menschen in so etwas komplexem wie einer SmartCity ein? Als klassische Benutzer welche das System zu kontrollieren in der Lage sein müssen wird das wohl nichts. Die Interaktion mit ganz typischen Maschinen sollte der Vergangenheit angehören. Benutzen ist out, Teil davon sein ist in, schon heute.\n\nMit meinen zwei Projekten Causal und Flow habe ich begonnen ein solches Ausführungsmodell für diese \"neue\" Art von Software für die Programmiersprache D, später dann auch C++, zu implementieren. Die Vorstellung ist ein Netz der Wirkung als Weiterentwicklung des Netzes der Daten.","original_language":"deu","persons":["Ralph Alexander Bariz"],"tags":["gpn18","138"],"view_count":220,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-03-24T18:30:04.264+01:00","length":3073,"duration":3073,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/138-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/138-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5fcbd225-fb13-57cd-97af-00be56e749b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/5fcbd225-fb13-57cd-97af-00be56e749b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-138-kausalitt-nichtlineare-systeme-und-ein-spiel","url":"https://api.media.ccc.de/public/events/5fcbd225-fb13-57cd-97af-00be56e749b9","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":16},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":11},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":13},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":11},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":11},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":7},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":17},{"event_id":5367,"event_guid":"f738088c-f2cf-54ab-a6cd-f3f5c5cc8481","weight":10},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":13},{"event_id":5377,"event_guid":"412d3bab-a67c-589a-9c70-8bb128ab560e","weight":8},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":13},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":10},{"event_id":5385,"event_guid":"1203a77c-a01a-5a44-9282-d4c988205853","weight":11},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":10},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":11},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":10}]},{"guid":"0e85db0d-afc2-5826-a0ad-7189ffc80601","title":"Seitenkanal-Angriffe innerhalb FPGA-Chips","subtitle":null,"slug":"gpn18-132-seitenkanal-angriffe-innerhalb-fpga-chips","link":"https://c3voc.de","description":"Es wird gezeigt wie man die internen Elemente von FPGAs kreativ verwenden kann um Angriffe auf elektrischer Ebene von einem Teil innerhalb des Chips auf einen anderen Teil durchzuführen. Die Grundlagen zu FPGAs und entsprechenden Seitenkanal-Angriffen werden natürlich auch erklärt.\n\nFPGAs werden immer mehr auch als Rechenbeschleuniger (ähnlich Grafikkarten) eingesetzt, und sind mittlerweile auch in der Amazon Cloud verfügbar. Eine kurze Einführung erläutert wie FPGAs aufgebaut sind, und deren Auslegung auf digitale Logik, die aber rein durch Software definiert werden kann. Anschließend wird erklärt wie man damit auf kreative Weise auch andere Dinge bewerkstelligen kann, wie Spannungseinbrüche zu erzeugen, oder Spannung indirekt zu messen. Zusätzlich werden die Grundlagen zu Power Analysis Angriffen auf kryptografische Module erklärt (Schul-Mathematik reicht).\nLetztendlich wird im Vortrag gezeigt wie damit aktive (Fault) und passive Side-Channel Angriffe (Correlation Power Analysis) von einem Teil des FPGAs auf einen anderen erfolgen können.","original_language":"deu","persons":["Dennis"],"tags":["gpn18","132"],"view_count":379,"promoted":false,"date":"2018-05-10T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-10-03T14:45:08.261+02:00","length":4042,"duration":4042,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/132-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/132-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0e85db0d-afc2-5826-a0ad-7189ffc80601-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0e85db0d-afc2-5826-a0ad-7189ffc80601-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-132-seitenkanal-angriffe-innerhalb-fpga-chips","url":"https://api.media.ccc.de/public/events/0e85db0d-afc2-5826-a0ad-7189ffc80601","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":15},{"event_id":5326,"event_guid":"ca1800bf-221d-5084-86ea-cbf946d18e04","weight":19},{"event_id":5328,"event_guid":"b8784439-c77f-505d-a191-1a4ebf27ad48","weight":12},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":8},{"event_id":5330,"event_guid":"d4965df6-fd2c-5b12-bfb7-1302b2827ba5","weight":10},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":17},{"event_id":5340,"event_guid":"8b1d4db8-e064-5273-bf14-8394b432748b","weight":8},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":9},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":9},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":9},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":14},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":8},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":9},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":10},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":10},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":9},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":12},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":9},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":9}]},{"guid":"dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","title":"pluto - a not so smart smart watch","subtitle":null,"slug":"gpn18-172-pluto-a-not-so-smart-smart-watch","link":"https://c3voc.de","description":"Du wolltest schon immer mal eine Armbanduhr haben, die die Uhrzeit in binär anzeigen und Handyklingeltöne  abspielen kann, über viele Alarme und Countdown-Timer verfügt und  ein Jahr auf einer Knopfzelle läuft? Dann ist pluto die Armbanduhr für dich!\n\nDu wolltest schon immer mal eine Armbanduhr haben, die die Uhrzeit in binär anzeigen und Handyklingeltöne abspielen kann, über viele Alarme und Countdown-Timer verfügt, ein Jahr auf einer Knopfzelle läuft, wasserdicht ist und genauer als 1ppm geht? Dann ist pluto die Armbanduhr für dich! Pluto basiert auf dem Gehäuse und Display der Casio F-91W und ersetzt deren Elektronik durch was mit Mikrocontroller.\n\nIn dem Talk wird es um den Entwicklungsprozess von pluto und weitere Hintergründe zu dem Projekt gehen. \n\n[Projektseite auf github](https://github.com/carrotIndustries/pluto)","original_language":"deu","persons":["Lukas K."],"tags":["gpn18","172"],"view_count":354,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-03-13T11:30:07.892+01:00","length":1706,"duration":1706,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/172-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/172-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-172-pluto-a-not-so-smart-smart-watch","url":"https://api.media.ccc.de/public/events/dfbf0fa3-3182-5bd1-8bfa-25b3e9bc70ca","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":29},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":17},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":23},{"event_id":5343,"event_guid":"41f8b9a3-6245-5cf4-9c36-abfa5ffbd666","weight":15},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":12},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":12},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":12},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":15},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":12},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":13},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":17},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":14},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":13},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":15},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":14},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":12}]},{"guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","title":"Warum Henry Ford die besseren Web Applikationen gebaut hätte","subtitle":null,"slug":"gpn18-90-warum-henry-ford-die-besseren-web-applikationen-gebaut-htte","link":"https://c3voc.de","description":"Schon vor über 100 Jahren erreichte Ford durch den konsequenten Einsatz von Halbfertigfabrikaten und Komponenten eine enorme Produktivitätssteigerung. Diese Methoden lassen sich heute durchaus für den Bau von WebApplikationen - mit abstrakten Komponenten, angereichert mit den Ideen und Konzepten von J. Paul Rodker Morrison aus den späten 60er Jahren - applizieren.\n\nWir zeigen eine Methode für den Bau von WebApplikationen in einer durchgängig deklarativen Art, welche mehr an elektronische Schaltpläne erinnert, als an bekannte Code Konstrukte. Und ermöglichen so einer neuen Schicht von \"Entwicklern\" sauber und zuverlässig, aus vorgefertigten Komponenten, beliebig komplexe WebAnwendungen rein deklarativ (ohne scripting) zu assemblieren. \n\nMit Hilfe von Webcomponents und den Konzepten von J.P Morrison (Flow-Based Programming) zeigen wir anhand von Beispielen, wie sich dies bewerkstelligen lässt.","original_language":"deu","persons":["Veith Zäch + Roger Müller"],"tags":["gpn18","90"],"view_count":369,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-04-15T20:00:02.893+02:00","length":3893,"duration":3893,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/90-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/90-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0f649ccf-4188-5ec0-bf0f-0f761c69a709-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/0f649ccf-4188-5ec0-bf0f-0f761c69a709-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-90-warum-henry-ford-die-besseren-web-applikationen-gebaut-htte","url":"https://api.media.ccc.de/public/events/0f649ccf-4188-5ec0-bf0f-0f761c69a709","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":18},{"event_id":5345,"event_guid":"d72cca24-92a0-50d6-8a89-52fcfaca062a","weight":3},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":23},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":20},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":16},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":3},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":15},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":3},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":14},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":14},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":18},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":3},{"event_id":5387,"event_guid":"388267a5-1b71-5320-9173-bca8792c3797","weight":14},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":16},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":21},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":19},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":27},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":8},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":15},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":15},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":15}]},{"guid":"615d3190-d8b8-577b-ace4-abe25fff37c2","title":"AUR Pakete bauen für Anfänger","subtitle":null,"slug":"gpn18-10-aur-pakete-bauen-fr-anfnger","link":"https://c3voc.de","description":"Du benutzt Arch Linux aber deine lieblings Software ist nur als zip oder debian packet verfügbar. Dann schreib doch einfach deine eigene Installations routine und lade sie ins AUR hoch. Wie genau du das anfängst und was es zu beachten gibt erkläre ich dir in diesem Vortrag.\n\nAn anhand ein paar Beispiel zeige ich wie man aus Code, Debian Packeten oder einer ZIP eigene Installations routinen für das Arch User Repository (AUR) schreiben und veröffentlichen kann.\n\nInhalt:\n* Wie ich ein neues Paket anfangen kann\n* Das erstellen einer PKGBUILD und Erklärung der wichtigsten Punkte\n* Generierung von benötigten Informationen\n* Updaten des Packets\n* Ein paar Worte zur Community und bereits vorhandenen Paketen","original_language":"deu","persons":["Rinma"],"tags":["gpn18","10"],"view_count":317,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-04-08T19:15:03.513+02:00","length":1296,"duration":1296,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/10-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/10-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/615d3190-d8b8-577b-ace4-abe25fff37c2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/615d3190-d8b8-577b-ace4-abe25fff37c2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-10-aur-pakete-bauen-fr-anfnger","url":"https://api.media.ccc.de/public/events/615d3190-d8b8-577b-ace4-abe25fff37c2","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":16},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":17},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":10},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":14},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":14},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":16},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":14},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":10},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":18},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":15},{"event_id":5382,"event_guid":"04527a17-9bce-5ec8-940b-781cf5163a86","weight":10},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":10},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":16},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":21},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":11},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":11}]},{"guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","title":"Open Source in High-Performance Networks","subtitle":null,"slug":"gpn18-116-open-source-in-high-performance-networks","link":"https://c3voc.de","description":"Recent developments in networking such as the Open Compute Project, Software-Defined Networking, OpenFlow, and the P4 language enable the use of open source software with high-performance networking hardware. This talk investigates the state of openness in this hitherto very closed part of the IT industry.\n\nRecent developments in networking such as the Open Compute Project, Software-Defined Networking, OpenFlow, and the P4 language enable the use of open source software with high-performance networking hardware. This talk investigates the state of openness in this hitherto very closed area of the IT industry.\n\nUntil a few years ago, getting any information on network switch or router hardware required an NDA. Getting the required SDK or drivers to write open source software for these devices was impossible, even buying switches with an open operating system was difficult if not impossible.\n\nThis changed with the introduction of the Open Compute Project and OpenFlow. The first introduced pressure on the switch ASIC vendors to open up, the latter provides an API for switch hardware, and comes with an open source ecosystem. As an exemplary result, Broadcom, an incumbent switch ASIC vendor, released open API information on their switch ASICs (SAI, OF-DPA, SDKLT), as well as driver blobs for open source operating systems.\nThis, in combination with bare-metal switches and a standardized OS installer, kicked off a wide array of Linux-based operating systems.\n\nIn this talk investigates the different aspects of networking hardware and their respective state of openness as well as opportunities for implementing new ideas and open source contributions. The goal of the talk is to spread the awareness of this topic and provide an architectural overview on the area.\n\nThis talk is based on my experiences during my work as a research assistant in the field of Software-Defined Networking and Networks Function Virtualization at Technische Universität Darmstadt.","original_language":"eng","persons":["jgjl"],"tags":["gpn18","116"],"view_count":641,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-02-02T18:00:08.569+01:00","length":3056,"duration":3056,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/116-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/116-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/47b7888b-3379-53e2-b2c8-6b004ae00550-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/47b7888b-3379-53e2-b2c8-6b004ae00550-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-116-open-source-in-high-performance-networks","url":"https://api.media.ccc.de/public/events/47b7888b-3379-53e2-b2c8-6b004ae00550","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":38},{"event_id":5332,"event_guid":"ea7536ab-518e-5ec3-a897-7de5b1cc90cf","weight":23},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":58},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":21},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":47},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":32},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":49},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":21},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":28},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":32},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":36},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":44},{"event_id":5380,"event_guid":"acc35999-4707-5ef9-a8af-f3b197f09704","weight":24},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":73},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":27},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":29},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":40},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":24},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":33},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":21},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":21},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":35},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":23}]},{"guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","title":"Linux Network Namespaces vs. VRFs","subtitle":null,"slug":"gpn18-139-linux-network-namespaces-vs-vrfs","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Skorpy"],"tags":["gpn18","139"],"view_count":519,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2026-02-26T11:45:08.219+01:00","length":1907,"duration":1907,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/139-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/139-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dec42c0a-dd8c-5a7e-92e4-e6d5520206e5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/dec42c0a-dd8c-5a7e-92e4-e6d5520206e5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-139-linux-network-namespaces-vs-vrfs","url":"https://api.media.ccc.de/public/events/dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":28},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":10},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":14},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":33},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":13},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":14},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":9},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":20},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":17},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":14},{"event_id":5391,"event_guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","weight":14},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":23},{"event_id":5394,"event_guid":"2c46ce35-9267-5c2a-9c45-0a7acd4406a4","weight":15},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":15},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":14}]},{"guid":"293f93c2-2574-5683-91af-5b83b08fe8bf","title":"U2Fishing: Potential Security Threat Introduced by U2F Key Wrapping Mechanism","subtitle":null,"slug":"gpn18-93-u2fishing-potential-security-threat-introduced-by-u2f-key-wrapping-mechanism","link":"https://c3voc.de","description":"Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication and has been used by Facebook, Google, Github etc. The keys stored in U2F tokens with secure element chips are considered impossible to be extracted. However, the capability of key pairs storage is limited by secure element chips, FIDO U2F standard allows a key wrapping mechanism which enables unlimited key pairs with limited storage. It's considered safe, but not with an evil manufacturer.\n\nIn this talk, we will give a real-world example of U2F phishing attack by retrieving the master secret from an open source U2F token during the manufacturing process and then give that U2F token to a victim user. Then we can clone that U2F token by implementing the same key wrapping mechanism with the master secret recorded. We will give a demo that Github, Gmail, Facebook can be affected using this kind of U2Fishing method.\n\nSome countermeasures will be discussed. Investigating some websites that provide U2F as a two-factor authentication method, we found out that some of them haven't implemented cloning detection function which is recommended by FIDO Alliance so that U2Fishing victims will not be aware of when the attack is started.\n\nThis attack will still work even if cryptography secure element chip such as Atmel ATECC508A is used by U2F token with key wrapping mechanism. It's recommended that end users should at least do a master secret regeneration process when given a new U2F token with key wrapping mechanism. It's currently unavailable for Yubikey.\n\nMore details \n------------\n\nBasically, it's because FIDO standard allows Key Wrapping Mechanism.  So that the U2F device can only keep a master secret when secure storage capacity has a limit.\n\nhttps://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-overview.html#allowing-for-inexpensive-u2f-devices\n\nMy attack scenario is: \n\n1. The attacker extracts the master key during the manufacturing process of an open-source U2F key, in my case is U2F Zero. \n2. Attacker clone this U2F key. (In my case, I integrated it with a software U2F implementation.)\n3. Attacker gives this U2F key to a victim.\n4. assume the victim use this U2F key to register with Google. \n5. Attacker gets to know the password from another source. (such as social engineering, or other ways of password phishing)\n6. Login.\n\nYou can find my PoC here:\n\nhttps://github.com/scateu/U2Fishing/blob/master/03-key-wrapping.py\n\nIn fact, this attack can be detected when an anti-clone counter is well checked, because:\n\n1. It's needed that attacker chooses a bigger counter number so that it's bigger than the last counter number that victim used to login. The best luck of the attack is choosing a counter number only 1 bigger than the counter number in the victim's device.\n2. The next time when the victim login, his counter number is smaller than the number recorded on the website.\n3.1 Maybe the victim think it is just a matter of network issue, and ignore it. And try again (the counter will increase by 1), and login successfully. In this case, the attacker will not be noticed.\n3.2 When the counter number chosen by the attacker is much bigger, the victim will never login to the website again. Because the victim has to press the button on the U2F device a lot of times to make the counter bigger than the last success counter recorded on the website.\n3.3 Another chance is that the website doesn't check the counter at all.\n\nAfter some investigation, I found out that when a counter number revert incident occurs:\n\n1. Some website like Gmail doesn't give a prompt, the webpage doesn't even blink. I don't think a victim will notice anything when this happens.\n2. Worse, my email provider Fastmail.com doesn't check the counter at all. That means, at first victim login with a counter number (say 123), then the attacker login with a bigger counter number (say 9999) to pass the counter check, then victim login with a counter number plus one (this time, 124). Fastmail.com will not check. I have already written to them, and get confirmed.\n\n\nA quick view of my experiment on youtube: \nhttps://www.youtube.com/watch?v=axKrtrOTfcY\n\nYubikey doesn't offer secret key regeneration.  You can see an official answer from https://forum.yubico.com/viewtopic.php?f=33\u0026t=2484\n\nAs for other U2F keys, https://github.com/hillbrad/U2FReviews provides a glance at Yubico U2F Security Key, Thetis U2F Security Key, Feitian ePass, Bluink, KEY-ID FIDO U2F Security Key, HyperFIDO Mini, HyperFIDO U2F Security Key, Plug-Up Card Key, Fidesmo Card, SurePassID TapID Card, Feitian MultiPass and VASCO DigiPass SecureClick. At least none of them allegedly supports secret key regeneration.","original_language":"eng","persons":["Wang Kang"],"tags":["gpn18","93"],"view_count":267,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-14T02:00:00.000+02:00","updated_at":"2025-08-27T16:45:04.361+02:00","length":1713,"duration":1713,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/93-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/93-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/293f93c2-2574-5683-91af-5b83b08fe8bf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/293f93c2-2574-5683-91af-5b83b08fe8bf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-93-u2fishing-potential-security-threat-introduced-by-u2f-key-wrapping-mechanism","url":"https://api.media.ccc.de/public/events/293f93c2-2574-5683-91af-5b83b08fe8bf","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":2601,"event_guid":"47364bd9-f51a-4ac1-b139-983f3598f1e8","weight":7},{"event_id":3296,"event_guid":"015d3135-1c09-5150-86c5-b528dfe61093","weight":3},{"event_id":5040,"event_guid":"fffe593d-591a-421e-bf33-01f654ae6847","weight":5},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":2},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":3},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":5},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":5},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":3},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":5},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":3},{"event_id":5396,"event_guid":"dec42c0a-dd8c-5a7e-92e4-e6d5520206e5","weight":3},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":3},{"event_id":5403,"event_guid":"1c78884b-36cd-5600-8ee6-df144c004259","weight":3},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":3},{"event_id":6590,"event_guid":"7ee42591-4f4d-481d-884b-44f5e18e1803","weight":4}]},{"guid":"6b10f088-835c-580f-875b-f6e5c4cce985","title":"Frida - (Game)Hacking mit JavaScript","subtitle":null,"slug":"gpn18-92-frida-game-hacking-mit-javascript","link":"https://c3voc.de","description":"Jeder kennt JavaScript. Aber wie viele wissen, dass sich mit JavaScript auch ganz gut Spiele oder Programme hacken lassen? Ich stelle das Frida Framework vor, welches genau das ermöglicht!\n\nFrida ist ein Framework, welches es erlaubt JavaScript in Prozesse zu laden.\nEs wird dafür der V8 JavaScript Interpreter in einen Prozess geladen, welcher diverse Features mitbringt.\nSpeichermanipulation, Hooks, Detours, alles ist möglich!\n\nMehr zu dem Framework auf: https://frida.re/","original_language":"deu","persons":["HappyWingman"],"tags":["gpn18","92"],"view_count":331,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2026-04-08T01:15:04.010+02:00","length":995,"duration":995,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/92-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/92-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/6b10f088-835c-580f-875b-f6e5c4cce985-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/6b10f088-835c-580f-875b-f6e5c4cce985-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-92-frida-game-hacking-mit-javascript","url":"https://api.media.ccc.de/public/events/6b10f088-835c-580f-875b-f6e5c4cce985","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":11},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":4},{"event_id":5331,"event_guid":"6057325d-54d0-59d1-929e-880ee1320044","weight":11},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":12},{"event_id":5346,"event_guid":"0f7427d2-f0c5-5747-8966-79f0b2b679b5","weight":4},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":21},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":4},{"event_id":5351,"event_guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","weight":9},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":15},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":9},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":12},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":5},{"event_id":5369,"event_guid":"0e0586a7-c3fe-5267-ab12-c2450b961bce","weight":12},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":10},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":9},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":9},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":11},{"event_id":5392,"event_guid":"24126bf1-66d4-53a6-b470-49e65ca4bdee","weight":11},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":12},{"event_id":5406,"event_guid":"49508056-f5f5-51b5-80d0-01bb0bdba841","weight":10},{"event_id":5407,"event_guid":"682090d6-32cf-52cd-9c58-c49a9c732200","weight":10}]},{"guid":"3ff65726-0f21-56a6-893e-19a11bdacaf5","title":"Vorlesungsaufzeichnung an der Uni - vollautomatisch","subtitle":null,"slug":"gpn18-11-vorlesungsaufzeichnung-an-der-uni-vollautomatisch","link":"https://c3voc.de","description":"Im letzten Wintersemester hat die WWU Münster über 17 Hörsäle verteilt knapp 500 Vorlesungen aufgezeichnet - fast vollständig automatisiert. Wieso man diese Aufzeichnungen erstellen möchte und wie man das ganze technisch und hochschulpolitisch umsetzen kann soll als Überblick und Anleitung dargestellt werden.\n\nGeboren aus einer AStA-Initiative erstellt die WWU Münster seit einigen Semestern mit Erlaubnis der Dozierenden Aufzeichnungen der Vorlesungen in Bild \u0026 Ton. Diese Aufzeichnungen werden von den Studierenden rege genutzt und stellen eine wertvolle Erweiterung des Lehrangebots dar. Der Nutzen reicht hier zum Beispiel von der Prüfungsvorbereitung über die Nachbereitung bei Krankheitsversäumnisen oder zur Entschärfung von terminlichen Überschneidungen - sowohl durch Gegenveranstaltung oder Arbeitszeiten.\n\nUm dieses Angebot möglichst flächendeckend bereitstellen zu können haben wir freie, quelloffene Software wie Opencast und pyCA eingesetzt und zusätzliche technische Lösungen selbst entwickelt. Das Ergebnis ist die Ausstattung von 21 und mehr Hörsälen mit vollautomatisierter Aufzeichnungstechnik in hoher Qualität, eine nahtlose Einbindung in bestehende digitale Lernplattformen und das Potenzial für viele neue didaktische Angebote.\n\nDiese Technik möchte ich vorstellen, Anpassungsmöglichkeiten für andere Örtlichkeiten aufzeigen und berichten wie Dozierende und Studierende auf das Angebot reagieren.","original_language":"deu","persons":["Jan Koppe"],"tags":["gpn18","11"],"view_count":546,"promoted":false,"date":"2018-05-11T00:00:00.000+02:00","release_date":"2018-05-11T02:00:00.000+02:00","updated_at":"2025-11-10T20:00:08.456+01:00","length":3520,"duration":3520,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/11-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/11-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/3ff65726-0f21-56a6-893e-19a11bdacaf5-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/3ff65726-0f21-56a6-893e-19a11bdacaf5-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-11-vorlesungsaufzeichnung-an-der-uni-vollautomatisch","url":"https://api.media.ccc.de/public/events/3ff65726-0f21-56a6-893e-19a11bdacaf5","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":2},{"event_id":5329,"event_guid":"33c0a435-974b-5a65-9798-81ee2bfb925b","weight":2},{"event_id":5337,"event_guid":"50c2af4c-4826-50ee-bde7-cbed07d3bf2e","weight":21},{"event_id":5342,"event_guid":"a54ad163-540f-5d45-9359-16a5d76da4ae","weight":14},{"event_id":5348,"event_guid":"f11a2ed0-63f9-59ce-9f7c-f6a9c379be43","weight":11},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":13},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":11},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":13},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":15},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":17},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":11},{"event_id":5370,"event_guid":"ea068ddc-aef6-5367-ba79-cd90ddbf8353","weight":17},{"event_id":5378,"event_guid":"379ee1b1-ef9a-5572-8e9d-4c9d365278b4","weight":11},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":12},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":12},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":16}]},{"guid":"93474b10-fc14-5cd4-b316-77ffc49ff668","title":"Interfacedesign aus Designersicht","subtitle":null,"slug":"gpn18-35-interfacedesign-aus-designersicht","link":"https://c3voc.de","description":null,"original_language":"deu","persons":["Art"],"tags":["gpn18","35"],"view_count":464,"promoted":false,"date":"2018-05-12T00:00:00.000+02:00","release_date":"2018-05-12T02:00:00.000+02:00","updated_at":"2025-01-31T20:45:07.064+01:00","length":2267,"duration":2267,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn18/35-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn18/35-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn18/93474b10-fc14-5cd4-b316-77ffc49ff668-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn18/93474b10-fc14-5cd4-b316-77ffc49ff668-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn18-35-interfacedesign-aus-designersicht","url":"https://api.media.ccc.de/public/events/93474b10-fc14-5cd4-b316-77ffc49ff668","conference_title":"Gulaschprogrammiernacht 18","conference_url":"https://api.media.ccc.de/public/conferences/gpn18","related":[{"event_id":5325,"event_guid":"dda720ca-f11b-5ef5-beeb-5e33d2ed3e53","weight":21},{"event_id":5347,"event_guid":"37586acb-300a-55f2-be87-9e3fda19ca9c","weight":17},{"event_id":5349,"event_guid":"16a1a1ce-98ce-5d69-9af1-49ca4f154640","weight":23},{"event_id":5354,"event_guid":"bc2263a7-7870-55d5-9458-63c8d51c2036","weight":23},{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":20},{"event_id":5358,"event_guid":"25047665-60e0-5bbb-bd15-d5937103dc24","weight":23},{"event_id":5359,"event_guid":"42019c8e-4b3d-51a3-833c-0f83c0f543d5","weight":6},{"event_id":5366,"event_guid":"95457cf6-6e5c-530c-8ce8-8bf9662cb90a","weight":21},{"event_id":5379,"event_guid":"a3bda554-eb73-5a33-a14c-6303f83cc451","weight":16},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":22},{"event_id":5384,"event_guid":"0f649ccf-4188-5ec0-bf0f-0f761c69a709","weight":27},{"event_id":5388,"event_guid":"98391d79-4f04-5043-966b-25e33ce1bc37","weight":17},{"event_id":5389,"event_guid":"7de8a55e-c46b-504d-babe-4a25730417cd","weight":29},{"event_id":5390,"event_guid":"5821f506-1609-55b5-a58d-2ae972df0f78","weight":37},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":19},{"event_id":5397,"event_guid":"3ae378ab-25dd-5336-aaba-510a967785d7","weight":20},{"event_id":5398,"event_guid":"641f2cd4-5a49-5663-8105-0b4e2c13a724","weight":26},{"event_id":5400,"event_guid":"17a278b3-34af-5a04-92d8-e3e26165b410","weight":18},{"event_id":5401,"event_guid":"a8a4d912-70e6-5c64-b3dc-c55e4ecf292f","weight":10}]}]}