{"acronym":"gpn19","aspect_ratio":"16:9","updated_at":"2026-04-12T20:15:05.122+02:00","title":"Gulaschprogrammiernacht 19","schedule_url":"","slug":"conferences/gpn/gpn19","event_last_released_at":"2019-06-02T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/gpn/gpn19","logo_url":"https://static.media.ccc.de/media/events/gpn/gpn19/logo.png","images_url":"https://static.media.ccc.de/media/events/gpn/gpn19","recordings_url":"https://cdn.media.ccc.de/events/gpn/gpn19","url":"https://api.media.ccc.de/public/conferences/gpn19","events":[{"guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","title":"Entzifferte Geheimnisse","subtitle":null,"slug":"gpn19-124-entzifferte-geheimnisse","link":"https://pretalx.entropia.de/gpn19/talk/ALXHLB/","description":"Zeitreise durch 1000 Jahre Chiffrierung und dechiffrierung von der Skytale zur Post Quantum Kryptografie\n\nÜber Verschlüsselungen und wie sie gebrocjhen wurden und werden. Über vermeintlich sichere Ideen, welche sich als sehr unsicher entpuppten zur perfekten Verschlüsselung\n\nEin Vortrag für alle Nicht Mathematiker, Nicht Kryptologen und nicht Kryptografen.","original_language":"deu","persons":["Uli Kleemann"],"tags":["gpn19","124","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":450,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-03T13:45:08.857+02:00","length":4068,"duration":4068,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/124-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/124-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/124-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/124-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-124-entzifferte-geheimnisse","url":"https://api.media.ccc.de/public/events/2fe507c8-3ad5-56ec-8b9c-87485877ce09","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":2},{"event_id":7116,"event_guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","weight":2},{"event_id":7117,"event_guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","weight":15},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":16},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":19},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":13},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":4},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":31},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":16},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":6},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":2},{"event_id":7142,"event_guid":"33728e28-3031-59ad-88e6-3a38369c1cd3","weight":4},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":14},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":16},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":16},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":14},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":15}]},{"guid":"616abe87-ec1b-5ac0-af77-9162a5630f80","title":"Client-side AI in JavaScript using Tensorflow.js","subtitle":null,"slug":"gpn19-108-client-side-ai-in-javascript-using-tensorflow-js","link":"https://pretalx.entropia.de/gpn19/talk/ZHNT9Q/","description":"We will learn how to build a gesture classifier for a browser game using Tensorflow.js. Furthermore, we will go into the details of why MobileNets are so efficient and how to use transfer learning to reduce the amount of necessary training data.\n\nIn a practical example I will show you how to build a gesture classifier for a vertical scrolling browser game. Along the way, we will discuss the Tensorflow.js API and a specific model architecture called MobileNet.\n\nIn practice, edge computing is becoming evermore important and workloads are moved away from the backend. Tensorflow.js enables you to run AI models completely in the browser, which is also great for data privacy because often there is no more need to transfer sensitive data to backend servers.","original_language":"eng","persons":["Mathias Burger"],"tags":["gpn19","108","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":189,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-07-03T23:00:06.338+02:00","length":2220,"duration":2220,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/108-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/108-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/108-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/108-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-108-client-side-ai-in-javascript-using-tensorflow-js","url":"https://api.media.ccc.de/public/events/616abe87-ec1b-5ac0-af77-9162a5630f80","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":6},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":7},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":5},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":5},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":6},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":3},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":6},{"event_id":7142,"event_guid":"33728e28-3031-59ad-88e6-3a38369c1cd3","weight":6},{"event_id":7150,"event_guid":"09d6fe81-7337-5a06-b90f-763a7943a113","weight":4}]},{"guid":"0497df23-618b-5678-b69b-27c583e43bf0","title":"Securing your Router with RPKI","subtitle":null,"slug":"gpn19-47-securing-your-router-with-rpki","link":"https://pretalx.entropia.de/gpn19/talk/ZGYK9U/","description":"RPKI is a tool to bring signatures to the trust based mess called BGP and the internet. Lets see how a small ISP can deploy this on free software\n\nI will talk about the basics of RPKI; the history and where it came from. \n\nI will show briefly how I have started implementing it and what my rollout plan will be, and how it looks like if you start validating and midterm, drop invalid routes (right now, it would cut us off of free.fr at the time this talk was submitted)","original_language":"eng","persons":["pcdog"],"tags":["gpn19","47","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":187,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-02-18T21:15:08.934+01:00","length":1501,"duration":1501,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/47-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/47-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/47-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/47-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-47-securing-your-router-with-rpki","url":"https://api.media.ccc.de/public/events/0497df23-618b-5678-b69b-27c583e43bf0","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":10},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":12},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":12},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":13},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":14},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":13},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":2},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":8},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":13},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":8},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":13},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":9}]},{"guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","title":"Automate your virtual server deployments","subtitle":null,"slug":"gpn19-111-automate-your-virtual-server-deployments","link":"https://pretalx.entropia.de/gpn19/talk/UQTVS7/","description":"Infrastructure as code is mainly known from cloud, but we can use the same tools to build environments with Vmware vSphere too.\n\nI will show my workflow to create test and production server on Vmware vSphere with Packer, Terraform and Ansible. We talk about the basics of Infrastructure as Code and the advantages building environments automatically.","original_language":"eng","persons":["Christoph Stoettner"],"tags":["gpn19","111","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":501,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-02-18T11:15:11.021+01:00","length":3098,"duration":3098,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/111-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/111-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/111-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/111-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-111-automate-your-virtual-server-deployments","url":"https://api.media.ccc.de/public/events/8441d9d7-059e-5e58-9e4d-82b4540b500d","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":2},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":24},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":9},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":2},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":2},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":16},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":15},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":17},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":15},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":35},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":23},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":15},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":16},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":17}]},{"guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","title":"A living fossil: introduction to the s390x architecture","subtitle":null,"slug":"gpn19-88-a-living-fossil-introduction-to-the-s390x-architecture","link":"https://pretalx.entropia.de/gpn19/talk/GAVRKT/","description":"A tongue-in-cheek introduction to the s390x architecture, still used in IBM mainframes, focusing on the craziest or most unexpected features.\n\nA tongue-in-cheek introduction to the s390x architecture, its history, its weirdest quirks, and its unexpected features. But also the cool bits!\n\nHave you ever wondered why anybody would ever have a need for a *\"Compare and swap and triple store\"* instruction?\n\nWhat about a *\"Rotate then or selected bits\"* instruction?\n\nAnd what about vector BCD instructions? Or decimal floating point?\n\nHave you ever wondered how an architecture would look like if it could access 16 distinct address spaces at the same time? Or... why?\n\nNo?  *We don't care*!  We will present those (and many more) instructions and features anyway!","original_language":"eng","persons":["Claudio Imbrenda","Janosch Frank"],"tags":["gpn19","88","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":809,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-04-03T17:30:04.904+02:00","length":3465,"duration":3465,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/88-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/88-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/88-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/88-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-88-a-living-fossil-introduction-to-the-s390x-architecture","url":"https://api.media.ccc.de/public/events/40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":3104,"event_guid":"b2bc162c-1745-4f45-ba56-766b4174095b","weight":1},{"event_id":5792,"event_guid":"f5c68cea-eb34-49ae-bb15-d0fc1085985b","weight":1},{"event_id":5810,"event_guid":"291fe17d-80ca-46a9-9978-c61509a4f9c9","weight":1},{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":5},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":1},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":1},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":1},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":14},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":9},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":10},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":9},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":1},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":9},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":12},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":9},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":1},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":5},{"event_id":7128,"event_guid":"8af7bd79-ee5b-58a3-a565-b33fe3ccc947","weight":3},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":5},{"event_id":7131,"event_guid":"f6b9f07b-3b80-57d0-aada-f3e60c53ee27","weight":9},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":13},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":8}]},{"guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","title":"Lifehacks aus dem Leben einer Produkttesterin","subtitle":null,"slug":"gpn19-35-lifehacks-aus-dem-leben-einer-produkttesterin","link":"https://pretalx.entropia.de/gpn19/talk/GJHQHU/","description":"Oder: Wie mich VINE,  Transportdienstleister und Googles Punkte in den Wahnsinn treiben - und was Ihr daraus lernen könnt\n\nWas ist eigentlich dieses Amazon VINE? \nAndere Produkttester-Programme und ihre Nachteile \n\nFake Rezensionen erkennen - und dennoch darum gebeten werden,\n\nTransportdienstleister hacken \n\nGoogle Dots und Amazon oder wie ich dem Nervenzusammenbruch nur knapp entging","original_language":"deu","persons":["Tanja Schrödinger"],"tags":["gpn19","35","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":999,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-03-07T14:00:06.443+01:00","length":2810,"duration":2810,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/35-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/35-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/35-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/35-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-35-lifehacks-aus-dem-leben-einer-produkttesterin","url":"https://api.media.ccc.de/public/events/4ad50a8c-38de-5023-9cde-06b1620303b2","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":70},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":2},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":16},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":35},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":110},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":43},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":2},{"event_id":7114,"event_guid":"9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","weight":2},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":3},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":44},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":113},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":57},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":44},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":43},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":50},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":68},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":63},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":67},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":37},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":83}]},{"guid":"8af7bd79-ee5b-58a3-a565-b33fe3ccc947","title":"User-Space Treiber für Netzwerkkarten","subtitle":null,"slug":"gpn19-91-user-space-treiber-fr-netzwerkkarten","link":"https://pretalx.entropia.de/gpn19/talk/A7Q9FH/","description":"Wir schauen uns am Beispiel von Netzwerkkarten an wie man effiziente User-Space Treiber programmiert.\n\nWir haben einen User-Space Treiber für Intel 10 Gbit/s NICs und virtuelle VirtIO NICs geschrieben und erklären wie das eigentlich funktioniert und warum man das machen will.\nDie meisten vorgestellten Techniken lassen sich auch auf andere PCIe-Karten übertragen.\n\nMehr Details gibt's auf [GitHub](https://github.com/emmericp/ixy) und in unserem Paper [Writing User Space Network Drivers](https://arxiv.org/abs/1901.10664).\n\nDer Code ist so geschrieben dass man ihn als Referenz für User-Space Treiberentwicklung nehmen kann: voll mit Kommentaren und Referenzen auf Datenblätter und Spezifikationen.","original_language":"deu","persons":["Paul Emmerich"],"tags":["gpn19","91","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":240,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-12-21T16:30:06.528+01:00","length":3226,"duration":3226,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/91-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/91-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/91-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/91-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-91-user-space-treiber-fr-netzwerkkarten","url":"https://api.media.ccc.de/public/events/8af7bd79-ee5b-58a3-a565-b33fe3ccc947","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":5},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":8},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":12},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":4},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":7},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":7},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":6},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":10},{"event_id":7132,"event_guid":"dd84485f-993d-5715-952e-511a6d93dbbf","weight":7},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":5},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":11},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":7}]},{"guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","title":"Everything and a kitchensink - What to find in a modern x86_64 firmware image","subtitle":null,"slug":"gpn19-103-everything-and-a-kitchensink-what-to-find-in-a-modern-x8664-firmware-image","link":"https://pretalx.entropia.de/gpn19/talk/Q8VZXQ/","description":"Overview of x86_64 firmware components and how to parse them.\nFocus on Intel and AMD specifics\n\nAfter a year of taking firmware-images apart, i feel comfortable to share my learnings and findings from the internals of todays computers firmware.\nIgnoring legacy BIOS this talk will cover as much from the following topics as can possibly cramped into one hour...\n\n- Intel specifics\n    - Flash Descriptor\n    - Management Engine\n- AMD specifics\n    -  Firmware Entry Table\n    -  PSP\n- Other Components\n    - Microcode\n- UEFI\n- Coreboot\n    - Payloads\n    - Linuxboot\n- Update Mechanisms\n- Root of Trust / Security","original_language":"eng","persons":["Mimoja"],"tags":["gpn19","103","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":366,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-20T13:45:08.208+01:00","length":1917,"duration":1917,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/103-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/103-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/103-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/103-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-103-everything-and-a-kitchensink-what-to-find-in-a-modern-x8664-firmware-image","url":"https://api.media.ccc.de/public/events/1089da9b-4f3a-5b05-a9c3-712e2145cff7","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":10},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":2},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":5},{"event_id":7107,"event_guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","weight":10},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":13},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":9},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":10},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":10},{"event_id":7116,"event_guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","weight":12},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":14},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":13},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":10},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":12},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":10},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":13},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":12},{"event_id":7144,"event_guid":"0497df23-618b-5678-b69b-27c583e43bf0","weight":12},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":14}]},{"guid":"9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","title":"von Analogien nach Digitalien","subtitle":null,"slug":"gpn19-80-von-analogien-nach-digitalien","link":"https://pretalx.entropia.de/gpn19/talk/AAFWHY/","description":"Telematik und Digitalisierung in der Medizin - ein Jahr unterwegs - ein Reisebericht\n\nNach 15 Jahren Planung und 2 Milliarden Euro Kosten sollte es im letzten Jahr endlich losgehen. \nVon dieser Reise nach Digitalien ist den meisten nichts bekannt. Wissen Sie wovon die Rede ist? Nein? Es geht um Ihre Gesundheitsdaten und wie diese zukünftig aufbewahrt werden!\nIch berichte was bei der Digitalisierung in der Medizin im letzten Jahr passierte, vor allem aber davon, was nicht passierte. Von den Gründen dafür und von den Abgründen. \nDie Klärung, ob Ihre Gesundheitsdaten bei dem geplanten, permanent ein- und ausgehenden Datenaustausch der Krankenakte in der Arztpraxis sicher sind, steht aus. Da es Zweifel gibt, besteht dringender Handlungsbedarf.\nKommen Sie in meinen Talk. Erfahren Sie was los ist und was man tun kann. Ich freue mich. \n\nAlso bis dann, Stefan Streit.","original_language":"deu","persons":["Stefan Streit"],"tags":["gpn19","80","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":583,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-04T20:15:09.872+01:00","length":1952,"duration":1952,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/80-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/80-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/80-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/80-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-80-von-analogien-nach-digitalien","url":"https://api.media.ccc.de/public/events/9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":4},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":13},{"event_id":7117,"event_guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","weight":12},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":7},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":19},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":21},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":14},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":18},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":14},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":13}]},{"guid":"822892f3-a720-5a46-b933-2eb5524f6f28","title":"Einführung in OpenBSD","subtitle":null,"slug":"gpn19-120-einfhrung-in-openbsd","link":"https://pretalx.entropia.de/gpn19/talk/RE9NDF/","description":"Eine Einführung das freie Unix-Betriebssystem OpenBSD mit Hauptaugenmerk auf die Features, die es zu einem sicheren Betriebssystem machen.\n\nIn dem Talk will ich euch die Unix-Welt ausserhalb Linux zeigen, das freie BSD-UNIX OpenBSD. Es wird Infos zur Geschichte, den unterschiedlichen Versionen und insbesondere zu den Features die OpenBSD als \"sicherestes\" Betriebssystem gelten lassen.\n\nTalk will be held in German. If there is enough demand I can switch to English.","original_language":"deu","persons":["xhr"],"tags":["gpn19","120","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1253,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-03-29T01:45:04.637+01:00","length":3574,"duration":3574,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/120-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/120-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/120-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/120-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-120-einfhrung-in-openbsd","url":"https://api.media.ccc.de/public/events/822892f3-a720-5a46-b933-2eb5524f6f28","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":1},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":14},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":14},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":22},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":1},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":16},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":18},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":28},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":17},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":24},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":14},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":31},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":14},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":30},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":23},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":40},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":15},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":35},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":25}]},{"guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","title":"Linux package manager sind zu langsam!","subtitle":null,"slug":"gpn19-56-linux-package-manager-sind-zu-langsam-","link":"https://pretalx.entropia.de/gpn19/talk/EDVCZY/","description":"Linux package manager sind zu langsam, und ich stelle Ideen vor, wie man sie schneller machen könnte.\n\nDie verbreiteten Linux package manager (dpkg, rpm) sind unnötig langsam. Ich erkläre, warum das so ist und eliminiere dann systematisch die einzelnen Gründe in einem eleganteren Design.\n\nEs sind keine Vorkenntnisse erforderlich, und ich denke, dass für jede(n) ein paar interessante Ansätze dabei sind.","original_language":"deu","persons":["Michael Stapelberg"],"tags":["gpn19","56","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1236,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-11-03T14:45:05.153+01:00","length":3508,"duration":3508,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/56-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/56-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/56-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/56-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-56-linux-package-manager-sind-zu-langsam-","url":"https://api.media.ccc.de/public/events/e809e177-1a90-53f1-bf93-1f0aeb4c7caf","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":39},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":1},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":42},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":74},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":28},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":1},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":1},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":1},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":37},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":1},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":77},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":37},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":38},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":1},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":1},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":62},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":60},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":118},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":1},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":35},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":78}]},{"guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","title":"Moderne Kommandozeilen-Werkzeuge (endgültig_letzte_Version)","subtitle":null,"slug":"gpn19-112-moderne-kommandozeilen-werkzeuge-endgltigletzteversion-","link":"https://pretalx.entropia.de/gpn19/talk/8FBYWU/","description":"Linux ohne einer Kommandozeile ist wie ein Himmel ohne Sterne. Aber die meisten Werkzeuge, die wir täglich verwenden, stammen aus den späten 1980ern oder sind zum Teil sogar noch viel älter. Dabei gäbe es durchaus zeitgemäße Alternativen, die ich in diesem Talk vorstellen möchte.\n\nEigentlich dachte ich, letztes Jahr alle relevanten Kommandozeilen-Werkzeuge vorgestellt zu haben. Dank vieler lieber Menschen und neuer Anforderungen im Job haben sich jedoch erneut so viele neue Tools gefunden, dass ich nochmal einen Talk darüber machen kann. Es erwartet Euch also 95% neuer Inhalte in diesem Talk, nur die Witze sind alt.","original_language":"deu","persons":["leyrer"],"tags":["gpn19","112","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":3373,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-06T16:30:07.188+02:00","length":3627,"duration":3627,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/112-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/112-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/112-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/112-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-112-moderne-kommandozeilen-werkzeuge-endgltigletzteversion-","url":"https://api.media.ccc.de/public/events/5fe8bbbe-116b-5d42-ad17-90208755ce30","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":5355,"event_guid":"8afc16c2-d76a-53f6-85e4-90494665835d","weight":26},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":65},{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":72},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":26},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":88},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":194},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":42},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":24},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":32},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":67},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":164},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":56},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":46},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":53},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":62},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":23},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":144},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":106},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":23},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":40},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":118},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":26},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":141},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":27},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":29}]},{"guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","title":"Pimp my Baukasten - Die Grenzen von Konstruktionsspielzeug erweitern","subtitle":null,"slug":"gpn19-61-pimp-my-baukasten-die-grenzen-von-konstruktionsspielzeug-erweitern","link":"https://pretalx.entropia.de/gpn19/talk/XZNPPF/","description":"Lego und fischertechnik sind das Zeug, das aus Kindern Hacker macht. In Kombination mit Arduino, Raspberry Pi, 3D-Druckern und billiger Chinahardware bieten die Baukästen aber auch viel Potenzial für weitergehenden Spass.\n\nJeder von uns hat als Kind gerne Legoroboter gebaut und sich gewünscht damit das Kinderzimmer nicht mehr selbst aufräumen zu müssen. Jetzt haben wir die dafür nötigen Arduinos und Raspberry-Pis. Aber wer nicht gerade eine gut ausgerüstete Werkstatt hat scheitert schnell an der Mechanik. \n\nWir haben z.B. mit dem ftDuino (http://ftduino.de) ein Gerät entwickelt, um die Brücke zu schlagen und Arduino und fischertechnik zu verbinden. Auf Basis von in China gefertigten Platinen und Gehäusen aus dem 3D-Drucker sind Geräte entstanden, die sich mechanisch und elektrisch mit den üblichen Baukastensystemen kombinieren lassen. \n\nWir zeigen, wie man mit einfachen Mitteln die alten fischertechnik-Reste vom Dachboden reaktiviert. Mit passenden Gehäusen und Adaptern aus dem 3D-Drucker lassen sich Schrittmotoren, Servos und Sensoren mit fischertechnik und Lego verbinden.\n\nAber auch auf die von fischertechnik und Lego selbst angebotenen Controller werden wir einen Blick werfen. Nicht nur die Linux-basierte Controller laden zum Hacken ein. Auch die USB- oder Bluetooth-basierten kleineren Controller lassen sich mit PC oder Rasp-Pi koppeln und zum Aufbau von Robotern nutzen.\n\nMan muss keine gut ausgestattete Werkstatt besitzen, um selbst Roboter zu bauen. Wir zeigen, wie man Konstruktionsbaukästen mit gängigem Hacker-Equipment koppelt.","original_language":"deu","persons":["Till Harbaum"],"tags":["gpn19","61","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":377,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-04T09:30:07.253+01:00","length":2182,"duration":2182,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/61-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/61-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/61-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/61-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-61-pimp-my-baukasten-die-grenzen-von-konstruktionsspielzeug-erweitern","url":"https://api.media.ccc.de/public/events/dcbb310b-acc9-5ddc-9e40-6307ecc40515","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":13},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":20},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":3},{"event_id":7119,"event_guid":"383825fc-c122-58f8-9575-e6f81177479c","weight":3},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":13},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":22},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":21},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":14},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":12},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":10}]},{"guid":"328b4a00-b129-5a61-b06e-5c8b4580461d","title":"Autismus, mehr als nur zu viele Reize","subtitle":null,"slug":"gpn19-99-autismus-mehr-als-nur-zu-viele-reize","link":"https://pretalx.entropia.de/gpn19/talk/73GHJJ/","description":"Ein Vortrag zum Podcast\n\nAuf der Easterhegg habe ich einen Vortrag über Autismus gehalten. Da dieser sehr gut angenommen wurde und es auch im Chaosumfeld viele Autist:innen gibt, möchte ich auch auf der GPN 19 auch einen Vortrag über Autismus halten.\n\nIn diesem Vortrag werden ich etwas über Autismus und meine Wahrnehmungen erzählen. Ich rede darüber, warum Autist:innen die Welt anders wahrnehmen und warum manche schneller überreizt sind. Auch wird es um Stimming und die Diagnostik gehen, Und zum Schluss könnt ihr mir ganz viele Fragen stellen. Und auch  Overloads, Meltdowns und was NTs sind, werde ich erklären.\n\nDenn: Nicht alle Autisten sind gut in Mathe und Informatik und manche reden trotzdem viel...","original_language":"deu","persons":["fairsein"],"tags":["gpn19","99","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":854,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-03-29T23:00:05.753+02:00","length":3016,"duration":3016,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/99-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/99-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/99-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/99-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-99-autismus-mehr-als-nur-zu-viele-reize","url":"https://api.media.ccc.de/public/events/328b4a00-b129-5a61-b06e-5c8b4580461d","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":2659,"event_guid":"e757e434-1104-45ff-80f6-9c022d028dc0","weight":1},{"event_id":5393,"event_guid":"faea7134-21b2-5264-9e02-a8706b63e7fc","weight":1},{"event_id":6946,"event_guid":"7f58ea23-0bb4-502b-a754-a2c31c713398","weight":18},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":10},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":23},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":20},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":11},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":17},{"event_id":7145,"event_guid":"b7f4fac0-3283-5c65-8f2d-2fa8e15cb54c","weight":4},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":18},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":11},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":8},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":12},{"event_id":7159,"event_guid":"8aab30c5-44da-5d20-80b8-a764ba588381","weight":5}]},{"guid":"3878fd29-4440-50af-8700-63f4391bd42e","title":"Survival außerhalb der Cobol Gruft","subtitle":null,"slug":"gpn19-37-survival-auerhalb-der-cobol-gruft","link":"https://pretalx.entropia.de/gpn19/talk/REWYDE/","description":"Oder: als Geek mit autistischen Zügen und Helikopter-Personal mit ADHS und Generisierter Angststörung im Freizeitpark. \n\nWarum wir uns diese Menschenmassen dennoch mit Leidenschaft antun, unsere Survival-Strategien und was uns an Freizeitparks so fasziniert.\n\nFür alle Nicht-Freizeitpark-Junkies müssen wir mit trockener Theorie anfangen. Also lasst uns kurz Begriffe wie Freizeitpark und CCC vorstellen. \nKeine Angst: Es gibt Bilder! \n\nDann zeigen wir euch, was ein \"Alien\" im Freizeitpark sieht - im Kontrast dazu die Wahrnehmung eines Geeks mit autistischen Zügen. Wusstet ihr, wie viel Technik und Formeln ein Mensch sehen kann, wenn er vor einem Stahlkoloss steht?\n\nAutismus und ADHS gemeinsam ist die Reizüberflutung/Hypersensibilität, die gerade im Freizeitpark mit vielen anderen Besuchern, Geräuschen aus allen möglichen Richtungen, bunten Farben und verwirrenden optischen Eindrücken zuschlagen kann. Wir haben für uns Strategien zum Umgang damit entwickelt, die uns auch im Alltag helfen, und wollen euch diese heute vorstellen. \n\nAuch für Betroffene mit Angst- und Panikstörungen sind Freizeitparks eine Herausforderung. Ich stelle euch meine Strategien zum Umgang mit unter anderem der Angst vor Achterbahnen, vor allem das Wissen über die Sicherheitsmaßnahmen der Freizeitparks für ihre Fahrgeschäfte, vor. \n\nZu einem besonders feurigen Ereignis wollen wir euch zum Abschluss von einem der größten Software Crashs erzählen, den sich Freizeitparkjunkies und Geeks nicht vorstellen wollen, der aber die Wahrnehmung eines Geeks mit autistischen Zügen nochmal verdeutlicht.","original_language":"deu","persons":["Tanja Schrödinger","Habrok"],"tags":["gpn19","37","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":321,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-04T20:30:17.108+01:00","length":3441,"duration":3441,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/37-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/37-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/37-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/37-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-37-survival-auerhalb-der-cobol-gruft","url":"https://api.media.ccc.de/public/events/3878fd29-4440-50af-8700-63f4391bd42e","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":14},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":4},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":16},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":14},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":31},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":8},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":14},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":17},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":24},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":14},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":18},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":16}]},{"guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","title":"Ein Tag hat nur 24±1 Stunden","subtitle":null,"slug":"gpn19-15-ein-tag-hat-nur-24-1-stunden","link":"https://pretalx.entropia.de/gpn19/talk/B7ZANV/","description":"Konntest du am letzten Oktobersonntag tatsächlich eine Stunde “länger schlafen”, oder hast du mehrere Stunden lang in deinem Code nach Fehlern gesucht, weil er mit der Zeitumstellung und allgemein mit Zeitzonen nicht richtig umgehen konnte? Vielleicht warst du gar nicht daran schuld…\n\nWir werden uns ein paar Fallstricke ansehen, die bei der Arbeit mit Datumsangaben in beliebiger Programmiersprache auftreten können, mit Python als Beispiel.\n\nWir schauen uns an, wie und wann die Zeitzoneninformation in unsere Systeme reinkommt, warum nur eine Bibliothek in Frage kommt, warum diese über vierhundert einzelne Zeitzonen enthält, und warum wir in Deutschland sogar zwei Zeitzonen haben: Berlin und B… nein, Bonn ist es nicht.\n\nWir stellen uns vor, was in Europa passiert, wenn es ab 2021 keine Zeitumstellung mehr gibt und warum es hier noch nie eine Winterzeit gab. Und wir können noch vom Glück sprechen, dass wir in Europa leben.\n\nZwei Jahrhunderte kurzsichtiger Propaganda und langfristiges Chaos in sechzig Minuten. Möglicherweise wollt ihr nach diesem Vortrag alle Zeitzonen in Ihrem Code vollständig vermeiden!","original_language":"deu","persons":["miro"],"tags":["gpn19","15","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":757,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-03-16T16:30:06.835+01:00","length":2724,"duration":2724,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/15-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/15-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/15-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/15-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-15-ein-tag-hat-nur-24-1-stunden","url":"https://api.media.ccc.de/public/events/e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":3},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":23},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":51},{"event_id":7117,"event_guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","weight":9},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":22},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":44},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":59},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":31},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":34},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":29},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":32},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":32}]},{"guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","title":"What to hack","subtitle":null,"slug":"gpn19-11-what-to-hack","link":"https://pretalx.entropia.de/gpn19/talk/YMDYMK/","description":"Opening and overview of the GPN19","original_language":"deu","persons":["Christian Lölkes"],"tags":["gpn19","11","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":750,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-30T02:00:00.000+02:00","updated_at":"2026-01-19T13:30:12.595+01:00","length":1518,"duration":1518,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/11-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/11-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/11-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/11-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-11-what-to-hack","url":"https://api.media.ccc.de/public/events/9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":19},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":36},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":40},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":43},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":67},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":120},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":45},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":70},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":92},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":37},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":50},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":51},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":72},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":39},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":57}]},{"guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","title":"Die Vorbereitung und den Besuch eines Chaosevents smart gestalten","subtitle":null,"slug":"gpn19-98-die-vorbereitung-und-den-besuch-eines-chaosevents-smart-gestalten","link":"https://pretalx.entropia.de/gpn19/talk/73VS8D/","description":"Der Besuchs eines Chaosevents kann entweder spontan oder geplant erfolgen. Dargelegt wird, was bei der Vorbereitung und beim Besuch eines Chaosevents alles zu beachten ist. Dabei wird auf unterschiedliche Arten von Events und deren Besonderheiten eingegangen.\n\nDie Themen, die besonders vertieft werden, sind:\n* Wie reise ich an?\n* Was packe ich ein?\n* Wann und wie bekomme ich mein Ticket?\n* Wo finde ich wichtige Informationen?\n* Was muss ich vor Ort beachten?","original_language":"deu","persons":["skyangel"],"tags":["gpn19","98","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":323,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-04-06T21:45:06.916+02:00","length":1860,"duration":1860,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/98-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/98-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/98-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/98-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-98-die-vorbereitung-und-den-besuch-eines-chaosevents-smart-gestalten","url":"https://api.media.ccc.de/public/events/3d181ba9-ae1b-5071-9f50-09aec13c0151","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":32},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":20},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":14},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":17},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":21},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":13},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":24},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":28},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":15},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":16}]},{"guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","title":"Bahn API Chaos","subtitle":null,"slug":"gpn19-67-bahn-api-chaos","link":"https://pretalx.entropia.de/gpn19/talk/SMVBTN/","description":"Was für APIs bietet die Bahn eigentlich an? Sind die alle Sinnvoll struktiert und einheitlich? Oder eher nicht?\nEin Einblick in die Datengrundlage von https://marudor.de","original_language":"deu","persons":["marudor"],"tags":["gpn19","67","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":10770,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-04-12T20:15:05.120+02:00","length":1848,"duration":1848,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/67-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/67-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/67-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/67-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-67-bahn-api-chaos","url":"https://api.media.ccc.de/public/events/3e7f1444-b72c-594f-b033-d96b21c1961c","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":120},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":21},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":32},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":27},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":46},{"event_id":7101,"event_guid":"0417bbdb-31ee-5cb5-9a6b-907d3620a085","weight":30},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":59},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":112},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":31},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":20},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":89},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":20},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":24},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":51},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":110},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":18},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":33},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":206},{"event_id":7132,"event_guid":"dd84485f-993d-5715-952e-511a6d93dbbf","weight":21},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":90},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":47},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":62},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":41},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":32},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":133},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":86},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":194},{"event_id":7149,"event_guid":"328b4a00-b129-5a61-b06e-5c8b4580461d","weight":23},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":22},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":74},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":30},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":176},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":31},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":18},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":21},{"event_id":7236,"event_guid":"e3bdda0e-c95f-4021-8500-3718a2913352","weight":35},{"event_id":7729,"event_guid":"9d030aa8-27aa-509b-913f-ee9eff97257b","weight":21},{"event_id":7820,"event_guid":"9a497fd7-62b4-5b5b-bf09-5dd123d18305","weight":137},{"event_id":7870,"event_guid":"878e4754-c346-5b93-96d2-1ca8bf5109c3","weight":23},{"event_id":7973,"event_guid":"696a345a-9ef1-5985-8dd6-84c9ef22950c","weight":30},{"event_id":7989,"event_guid":"a75f727b-b87b-4e64-a8c0-a80a20325b94","weight":58}]},{"guid":"8aab30c5-44da-5d20-80b8-a764ba588381","title":"Demoshow: Nachlese","subtitle":"","slug":"gpn19-14-demoshow-nachlese","link":"https://pretalx.entropia.de/gpn19/talk/NAXZTB/","description":"\u003cp\u003eEin nachlese der besten Demos seit der letzten GPN, live gerendert Demos sind live-gerenderte Computergrafikanimationen, die oft mit einer Gr\u0026ouml;\u0026szlig;enbeschr\u0026auml;nknung daherkommen. Verschiedene Gruppen versuchen sich gegenseitig mit Stil, epischem Effektbombastement und technischer Raffinesse zu \u0026uuml;berbieten und das ganze im Zweifelsfall in obsz\u0026ouml;n kleine Dateigr\u0026ouml;\u0026szlig;e zu packen. Also, greift euch ein ~~Bier~~ Tschunk und genie\u0026szlig;t Strobo und Effektgeballer!\u003c/p\u003e","original_language":"deu","persons":["/madonius"],"tags":["gpn19","14","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":426,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-01-29T23:00:13.044+01:00","length":6757,"duration":6757,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/14-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/14-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/14-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/14-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-14-demoshow-nachlese","url":"https://api.media.ccc.de/public/events/8aab30c5-44da-5d20-80b8-a764ba588381","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":13},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":15},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":13},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":12},{"event_id":7149,"event_guid":"328b4a00-b129-5a61-b06e-5c8b4580461d","weight":5},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":14},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":26},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":16}]},{"guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","title":"Analyzing the eMail Tracking Ecosystem","subtitle":null,"slug":"gpn19-59-analyzing-the-email-tracking-ecosystem","link":"https://pretalx.entropia.de/gpn19/talk/RU3VWM/","description":"Online tracking is not exclusive to websites, but also widespread in eMails. We built an open platform to detect eMail tracking, and we'd like to show some results and invite you to participate.\n\nThese days, tracking on websites is old news - we all know that it is happening, and we have our established defenses like ad blockers. However, website-based tracking tells only half the story, because many companies also track their eMails to see if you open them, and if you click any links. This area of online privacy has been mostly overlooked in the past, and not a lot of defenses exist.\n\nWe're trying to at least make this tracking visible by building an automated eMail newsletter analysis platform that you can use right now to find out if your favourite newsletters are tracking you. Similar to our previous project on web tracking, the [PrivacyScore Platform](https://privacyscore.org) (previously presented at [MRMCD'17](https://media.ccc.de/v/DC9AG9)), we are looking to crowd-source a large dataset to establish a birds-eye view on the eMail tracking ecosystem. Anyone can sign up a new newsletter, and we will automatically analyze it and make the results available on our website, privacymail.info.\n\nIn this talk, we will give an introduction to eMail tracking, present the technology that powers the PrivacyMail system, and show first results from our analyses.","original_language":"eng","persons":["@malexmave"],"tags":["gpn19","59","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":323,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-03-27T20:00:08.245+01:00","length":2151,"duration":2151,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/59-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/59-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/59-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/59-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-59-analyzing-the-email-tracking-ecosystem","url":"https://api.media.ccc.de/public/events/2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":14},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":15},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":5},{"event_id":7117,"event_guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","weight":10},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":17},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":21},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":21},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":18},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":15},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":17}]},{"guid":"0417bbdb-31ee-5cb5-9a6b-907d3620a085","title":"Moderne App-Programmierung mit Flutter und Dart","subtitle":null,"slug":"gpn19-133-moderne-app-programmierung-mit-flutter-und-dart","link":"https://pretalx.entropia.de/gpn19/talk/JZCPW3/","description":"Der Vortrag ist eine Einführung in die Programmierung mit der Programmiersprache Dart und Flutter, einem Framework für die Entwicklung mobiler Anwendungen.\n\n## Motivation \n\nEnde des Jahres 2018 veröffentlichte Google ein neues Framework zur Programmierung von plattformübergreifenden Apps für Android und IOS: Flutter in der Version 1.0. Die Entwicklung soll damit einfacher und schneller als bisher vor sich gehen. \n\n## Ablauf des Vortrags\n\nNach einer allgemeinen Einfügung in das Thema wird zuerst auf das Google Material Design, der Design-Philosophie von Flutter, eingegangen. Anschließend werden kurz moderne Programmiertechniken der Sprache Dart vorgestellt, beispielsweise die asynchrone Programmierung mit sogenannten Future-Objekten, die eine asynchrone Ausführung von Programmteilen ermöglichen. Danach werden Layout-Grundlagen mit Widgets, den Grund-Bausteinen bei Flutter, behandelt. Anschließend wird die Implementierung von Navigations-Elementen und Screens erläutert. Ein wichtiger Punkt bei der Entwicklung mit Flutter ist die Benutzung von Plugins, die die Möglichkeit der Nutzung von Plattform-Spezifischen Fähigkeiten der Hardware bieten. Auf die Programmierung der 2D-Game-Engine „Flame“ wird näher eingegangen. Diese bietet die Möglichkeit der Animation von Sprites und kann mit Tilemaps, gekachelten Flächen, umgehen.","original_language":"deu","persons":["Dieter Meiller"],"tags":["gpn19","133","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1763,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-09T17:45:16.457+01:00","length":3780,"duration":3780,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/133-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/133-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/133-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/133-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-133-moderne-app-programmierung-mit-flutter-und-dart","url":"https://api.media.ccc.de/public/events/0417bbdb-31ee-5cb5-9a6b-907d3620a085","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":19},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":10},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":12},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":8},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":8},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":17},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":30},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":10},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":9},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":14},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":18},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":15},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":15},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":15}]},{"guid":"33728e28-3031-59ad-88e6-3a38369c1cd3","title":"BADPDF – Stealing Windows Credentials via PDF Files","subtitle":null,"slug":"gpn19-45-badpdf-stealing-windows-credentials-via-pdf-files","link":"https://pretalx.entropia.de/gpn19/talk/PH83V8/","description":"Microsoft NTLM is protocol is an authentication protocol used on networks that include systems running the Windows operating system and stand-alone systems. Despite Microsoft's implementation of Kerberos, NTLM is still in use in order to support older systems. Many exploits in the past targeted Microsoft Office and Windows OS internal functions in order to cause the leaking of Windows user's NTLM hashes, which can then be cracked and disclose the original passwords. Are those the only products vulnerable to NTLM credential theft? Find out how PDF files can be weaponized to automatically achieve NTLM hash leaks with no user interaction.\n\nShortly after it was reported that malicious actors can exploit a vulnerability in MS outlook to leak a Windows user’s NTLM hashes, our research team revealed that NTLM hash leak can be achieved via PDF files with no user interaction or exploitation. Rather than exploiting a vulnerability in Microsoft Office files or Outlook, attackers can weaponize a PDF file by exploiting a feature that allows embedding remote documents and files within it. By pointing the embedded object to a remote SMB server, the target automatically leaks credentials in the form of NTLM hashes when the PDF is opened.\nIn this presentation I will first cover the basic structure of a PDF file and its objects, in particular the Dictionary object where this vulnerability lies.\nNext I will present our team’s Proof of Concept, injecting malicious code into a benign PDF file, weaponizing it, and causing an NTLM hash leak upon opening the file.\nI will then discuss the impact of this attack, by showing the leaked NTLM hash captured on the remote SMB server and how it can be cracked to retrieve the victim’s original password.","original_language":"eng","persons":["Ido Solomon"],"tags":["gpn19","45","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":494,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-08T16:15:04.951+02:00","length":1086,"duration":1086,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/45-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/45-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/45-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/45-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-45-badpdf-stealing-windows-credentials-via-pdf-files","url":"https://api.media.ccc.de/public/events/33728e28-3031-59ad-88e6-3a38369c1cd3","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":4},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":7},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":6},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":8},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":1},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":1},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":2},{"event_id":7129,"event_guid":"b449b12a-31a9-597e-8d80-b4636e443d2b","weight":1},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":2},{"event_id":7131,"event_guid":"f6b9f07b-3b80-57d0-aada-f3e60c53ee27","weight":2},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":2},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":7},{"event_id":7138,"event_guid":"616abe87-ec1b-5ac0-af77-9162a5630f80","weight":6},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":10},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":4},{"event_id":7144,"event_guid":"0497df23-618b-5678-b69b-27c583e43bf0","weight":8},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":2},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":12},{"event_id":7150,"event_guid":"09d6fe81-7337-5a06-b90f-763a7943a113","weight":6},{"event_id":7155,"event_guid":"4376339b-49f6-5b8e-ab5a-26ecd6233e5c","weight":2},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":7}]},{"guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","title":"Virtual Reality für Arme","subtitle":null,"slug":"gpn19-73-virtual-reality-fr-arme","link":"https://pretalx.entropia.de/gpn19/talk/SYFXTN/","description":"Wie man für unter 100€ zu einer echten VR-Brille kommt, und was man damit unterwegs / ohne dicken Gaming-PC so anstellen kann.\nKurzer Überblick über den Stand der Technik in Indie-VR.\n\nDieser Talk soll Möglichkeiten aufzeigen, im virtuellen Raum mitzuspielen ohne sich an teure, proprietäre und vor allem immobile Gaming-Hardware zu binden.\n\nEs werden Wege zu günstigen VR-Sets vorgestellt, und die technischen Grundlagen von Head-Mounted Displays (HMD) erklärt.\n\nZum Schluss gibt es einen Überblick den freien Software-Stack, und mögliche Anwendung, von Augentraining bis VR-Desktop.","original_language":"deu","persons":["strfry"],"tags":["gpn19","73","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":243,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-06-27T22:45:02.947+02:00","length":1365,"duration":1365,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/73-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/73-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/73-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/73-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-73-virtual-reality-fr-arme","url":"https://api.media.ccc.de/public/events/cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":9},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":4},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":17},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":9},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":17},{"event_id":7114,"event_guid":"9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","weight":9},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":10},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":10},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":12},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":13},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":17},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":11}]},{"guid":"fcb166a9-72b4-5b77-832c-05a63251863e","title":"Hacking CCTVS + public space","subtitle":null,"slug":"gpn19-54-hacking-cctvs-public-space","link":"https://pretalx.entropia.de/gpn19/talk/LMKW9N/","description":"Kreative Strategien zum Hacken von Überwachungstools im öffentlichen Raum.\n\nWie kannst du dir den öffentlichen Raum nicht nur zurückerobern sondern seine permanente Überwachung sogar  nutzen, um deine Botschaft auf demselben Kanal zurück zu senden? Im Schnelldurchlauf stelle ich euch meine all-time-favourites der medialen „civil disobedience“ vor. Wir lernen die Arbeit von Surveillance-Pionieren kennen, die CCTVs aktivistisch für ihren Protest (aus)genutzt haben, sprechen über künstlerische Strategien, mit denen man virtuelle Globen wie Google Earth und Co. ganz einfach hacken kann und garnieren das Ganze mit ein paar Facts und modischen Beispielen aus der Gesichtserkennungs-Verweigerungs-Praxis.\n\nDem willst du was hinzufügen? Davon willst du noch mehr wissen? Oder bist du auf der Suche nach Geistesverwandten für eine Aktion? In der Fragerunde können wir uns eigene Hacks ausdenken, die uns im öffentlichen Raum unsichtbar machen (oder sogar Widerstand gegen einen Überwachungsstaat ausdrücken?!) – oder wir steigen mit deinen Fragen einfach noch n bisschen tiefer in die Materie ein.\n\nNatürlich wird der Vortrag zu deiner eigenen Sicherheit aufgezeichnet…","original_language":"deu","persons":["Lisa Bensel"],"tags":["gpn19","54","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":367,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-28T14:00:06.507+01:00","length":1741,"duration":1741,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/54-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/54-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/54-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/54-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-54-hacking-cctvs-public-space","url":"https://api.media.ccc.de/public/events/fcb166a9-72b4-5b77-832c-05a63251863e","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":23},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":33},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":21},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":19},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":21},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":26},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":22},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":22}]},{"guid":"9085e975-1f31-5921-81cf-78f390862e28","title":"Two thousand Eighty-Four by Copyright Reform","subtitle":null,"slug":"gpn19-132-two-thousand-eighty-four-by-copyright-reform","link":"https://pretalx.entropia.de/gpn19/talk/EBZJTR/","description":"In 2016 the European Commission announced it proposal for a Copyright Reform, a reform we were all expecting to come, but could not foresee the controversies that would arise. Copyright law in the EU has long been recognised as obsolete, due to its failure to provide for technology neutral provisions that respond to the demands of the digital era. Among the controversial provisions of the new law lie two Articles known as 11 and 13 (currently 15 and 17 of the final text. The first introduces a neighbouring right for news publishers (a.k.a. link tax), while the second annuls the current regime of intermediary liability, raises the barriers of liability for internet platforms and suggests a damaging for the internet-as-we-know-it system of a priori censorship (a.k.a upload filters, censorship machines). \nThis law passed the EU legislative procedure and has entered the step of its \"national implementation\". This means that we still have a chance to get informed and act! How's that? Join the presentation and we'll discuss it all step-by-step.\n\nThis presentation-talk would like to clarify to the audience the EU legislative procedure, summarise the developments as regards the Copyright Reform and ultimately, raise awareness and interest for the upcoming national implementation of a rather controversial piece of legislation. The structure of the presentation will be as follows:\n1. Legislative Procedure - who is in charge, how do the European Institutions cooperate, how do they make decisions\n2. Copyright Reform - from birth till... now.\n3. What is wrong with copyright? Can we still do something about it? Yes? What?\n4. Questions and time for discussion.","original_language":"eng","persons":["Aimilia Givropoulou"],"tags":["gpn19","132","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":94,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-06T12:00:10.817+01:00","length":2720,"duration":2720,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/132-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/132-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/132-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/132-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-132-two-thousand-eighty-four-by-copyright-reform","url":"https://api.media.ccc.de/public/events/9085e975-1f31-5921-81cf-78f390862e28","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":9},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":5},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":9},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":6},{"event_id":7103,"event_guid":"b8b3a361-4832-518c-a850-7c354e2e975f","weight":7},{"event_id":7104,"event_guid":"be47fbb7-4a05-5586-8816-40ea53c45447","weight":7},{"event_id":7107,"event_guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","weight":5},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":6},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":5},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":6},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":7}]},{"guid":"b8b3a361-4832-518c-a850-7c354e2e975f","title":"recheck and the Sorcerer's Stone: Turning Selenium into Adamantium","subtitle":null,"slug":"gpn19-131-recheck-and-the-sorcerer-s-stone-turning-selenium-into-adamantium","link":"https://pretalx.entropia.de/gpn19/talk/ENFJTE/","description":"The NoSuchElementException is probably one of the most prominent problems when using Selenium. The open source project recheck solves this problem in an elegant and simple way. And on top of that, test are easier to create and maintain and yet more complete.\n\nEver had that: after a simple change, suddenly 50+ tests are failing! Brittle tests that hinge on GUI specifics and result in the dreaded NoSuchElementException are a main headache when testing with Selenium. \n\nThe open source project recheck offers a simple and elegant solution. Not only is a virtual identifier unaffected by UI changes, you can define it for otherwise hard to specify elements, i.e. that would require complex xpath or CSS selector expressions. And on top of that, tests are easier to create and maintain and yet much more complete in what they check. This talk gives a practical introduction to the underlying approach and the tool, complete with a life coding session.","original_language":"eng","persons":["Jeremias Rößler"],"tags":["gpn19","131","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":93,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2024-05-23T23:30:04.262+02:00","length":2136,"duration":2136,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/131-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/131-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/131-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/131-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-131-recheck-and-the-sorcerer-s-stone-turning-selenium-into-adamantium","url":"https://api.media.ccc.de/public/events/b8b3a361-4832-518c-a850-7c354e2e975f","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":5},{"event_id":7098,"event_guid":"2cb7b45b-af85-5ee7-981d-5b4265d4e342","weight":5},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":5},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":6},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":7},{"event_id":7105,"event_guid":"9085e975-1f31-5921-81cf-78f390862e28","weight":7},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":4},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":6},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":4},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":5},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":6},{"event_id":7144,"event_guid":"0497df23-618b-5678-b69b-27c583e43bf0","weight":5}]},{"guid":"65da5605-4c79-57cc-8114-ab413d97189f","title":"5G - Was ist das eigentlich?","subtitle":null,"slug":"gpn19-75-5g-was-ist-das-eigentlich-","link":"https://pretalx.entropia.de/gpn19/talk/M3FDA3/","description":"Milliarden werden für ein paar MHz Spektrum geboten und 5G wird als eierlegende Wollmilchsau der Zukunft gepriesen. Aber was ist 5G eigentlich konkret und was werden wir davon in der Praxis in nächster Zeit sehen?\n\nViel wird in der Presse zur Zeit über 5G geschrieben, das Meiste hat aber leider nicht viel mit dem zu tun, was wir von 5G in nächster Zeit sehen werden. Ein Grund dafür ist, dass das zuständige Standardisierungsgremium so ungefähr alle Träume des Mobilfunks in 5G gesteckt hat, die in den letzten 20 Jahren aufgelaufen sind. Dieser Kurzvortrag soll deshalb einen Überblick über die Funktionsweise derjenigen Teile des neuen 5G Standards geben, die in nächster Zeit auch in die Praxis umgesetzt werden und dann auch tatsächlich nutzbar sind. Angefangen mit einem kurzen Überblick über das aktuelle LTE Kernnetz sowie dem LTE Radionetzwerk soll gezeigt werden, welche Neuerungen mit 5G ‘New Radio’ (NR) kommen, wie 5G und LTE zusammenarbeiten, was man dann als Kunde davon haben wird, und wie die Reise dann weitergehen wird.","original_language":"deu","persons":["Heurekus"],"tags":["gpn19","75","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":2387,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-02-20T11:00:09.198+01:00","length":1834,"duration":1834,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/75-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/75-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/75-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/75-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-75-5g-was-ist-das-eigentlich-","url":"https://api.media.ccc.de/public/events/65da5605-4c79-57cc-8114-ab413d97189f","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":37},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":39},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":90},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":34},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":31},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":57},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":91},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":51},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":47},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":20},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":20},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":107},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":37},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":56},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":17},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":24},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":18},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":62},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":18},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":22}]},{"guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","title":"Einen Server daheim ohne öffentliche IPv4 Adresse","subtitle":null,"slug":"gpn19-76-einen-server-daheim-ohne-ffentliche-ipv4-adresse","link":"https://pretalx.entropia.de/gpn19/talk/99ZV7N/","description":"Ohne öffentliche IPv4 Adresse muss man sich etwas einfallen lassen, wenn man einen öffentlich erreichbaren Server daheim betreiben möchte. Dieser Kurzvortrag soll zeigen, wie man sich trotzdem ‚erreichbar‘ macht.\n\nBei vielen alternativen Internet Providern bekommen Kunden für ihren Anschluss keine öffentliche IPv4 Adresse mehr. Bei einer Serveranbindung über Mobilfunk oder hinter diversen NATs die man nicht selber kontrolliert hat man in den meisten Fällen das gleiche Problem. IPv6 ist die theoretische Lösung in manchen Fällen, man ist dann aber nicht von überall her erreichbar.  Also muss man ‚tunneln‘. Dieser Kurzvortrag soll einen Überblick mit praktischem Beispiel vor Ort geben, wie das in der Praxis geht.","original_language":"deu","persons":["Heurekus"],"tags":["gpn19","76","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":4692,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-01T13:15:06.578+02:00","length":1796,"duration":1796,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/76-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/76-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/76-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/76-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-76-einen-server-daheim-ohne-ffentliche-ipv4-adresse","url":"https://api.media.ccc.de/public/events/95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":50},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":21},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":77},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":133},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":43},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":28},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":20},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":68},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":128},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":107},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":71},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":62},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":54},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":20},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":21},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":107},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":144},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":30},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":62},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":24},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":120},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":24},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":23},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":35}]},{"guid":"4376339b-49f6-5b8e-ab5a-26ecd6233e5c","title":"eKFV: Elektrokleinstfahrzeuge-Verordnung – Stand der Dinge","subtitle":null,"slug":"gpn19-115-ekfv-elektrokleinstfahrzeuge-verordnung-stand-der-dinge","link":"https://pretalx.entropia.de/gpn19/talk/DSS79D/","description":"Ihr wollt auch endlich legal auf eurem e-Tretroller/e-Einrad/e-Skateboard fahren dürfen? Keine zwei Wochen vor der GPN wird sich gezeigt haben, was aus der eKFV geworden ist. Was gilt, wie kamen wir hierhin und was wird kommen?","original_language":"deu","persons":["NicApicella"],"tags":["gpn19","115","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":567,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2025-09-23T15:30:16.468+02:00","length":1945,"duration":1945,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/115-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/115-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/115-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/115-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-115-ekfv-elektrokleinstfahrzeuge-verordnung-stand-der-dinge","url":"https://api.media.ccc.de/public/events/4376339b-49f6-5b8e-ab5a-26ecd6233e5c","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":11},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":11},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":11},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":16},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":18},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":15},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":12},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":11},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":10},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":16},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":11},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":7},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":18},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":15},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":8}]},{"guid":"383825fc-c122-58f8-9575-e6f81177479c","title":"Schülermedienmentoren - Schülermitverantwortung in der IT","subtitle":null,"slug":"gpn19-63-schlermedienmentoren-schlermitverantwortung-in-der-it","link":"https://pretalx.entropia.de/gpn19/talk/SNP9VF/","description":"Schülermitverantwortung kennt man ja normalerweise nur in Form \"politischer\" Verantwortung und Vertretung (SMV). Am WHG in Durmersheim jedoch gibt es die seit 2017 Schülermedienmentoren, die rund um die digitalen neuen Medien und IT Verantwortung übernehmen. Wie es dazu gekommen ist und was Pentesting in der Schule zu suchen hat, erfahrt ihr im Talk :D\n\n- Schülermitverantwortung in Sachen digitaler Bildung und IT.\n- Wie hat sich unser Team gebildet/entwickelt?\n- Welche Aufgaben übernehmen wir?","original_language":"deu","persons":["Niklas Arnitz"],"tags":["gpn19","63","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":154,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-02-12T16:15:05.327+01:00","length":1439,"duration":1439,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/63-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/63-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/63-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/63-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-63-schlermedienmentoren-schlermitverantwortung-in-der-it","url":"https://api.media.ccc.de/public/events/383825fc-c122-58f8-9575-e6f81177479c","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":8},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":7},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":8},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":3},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":11},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":8},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":9},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":8},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":12}]},{"guid":"be47fbb7-4a05-5586-8816-40ea53c45447","title":"Foundations for Decentralization: Data with IPLD","subtitle":null,"slug":"gpn19-105-foundations-for-decentralization-data-with-ipld","link":"https://pretalx.entropia.de/gpn19/talk/D8W7XL/","description":"IPLD -- \"InterPlanetary Linked Data\" -- is a data format with a canonical hashing scheme.  With canonical hashing, we get immutable linking; and with this, we aim to build libraries and tools for decentralizing anything and everything.   We need foundations for building whole ecosystems that are immune to \"Error 451\": IPLD is a mechanism for getting there.\n\nDo you wish building decentralized systems was easier?  That building content-addressable storage for application data was simple?  That APIs could be well-documented and developed in a way that's agnostic to the serialization format?  That addressing structured data with an immutable hash was just a function call away?\n\nIPLD is making all that happen.\n\nThe end goal is that a developer can build an application that's like \"the next git\" -- or something even more ambitious and similarly decentralized -- and with the IPLD libraries in hand, it should take hours instead of weeks.\n\nCome hear about:\n\n- The IPLD Format layer -- how we make JSON, CBOR, and other formats interchangeable (and how you can bring your own);\n- The IPLD Data Model -- how we define canonical hashing over all the formats IPLD supports;\n- and The IPLD Schema System -- how we define some simple, and optional, but incredibly useful standards for typing structured data: both for making data validation easier, making schema evolution possible, and making a clear road for advanced operations like deterministic sharding for large dataset support.\n\nWe're building both specs and library implementations (starting in Go, Java, and JS); this talk will show some example snippets.\n\nIn comparison to existing systems, you can think of it like: Protobuf schemas and graphQL queries had a baby, but rather than being built entirely for big-enterprise needs, it's got native support for both human-readable of JSON and fast binary message formats like CBOR; it's built for people of the \"bazaar\" rather than the \"cathedral\"; and we're Apache2/MIT licensed FOSS through and through.","original_language":"eng","persons":["Eric Myhre"],"tags":["gpn19","105","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":478,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-12-24T21:15:02.772+01:00","length":3348,"duration":3348,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/105-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/105-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/105-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/105-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-105-foundations-for-decentralization-data-with-ipld","url":"https://api.media.ccc.de/public/events/be47fbb7-4a05-5586-8816-40ea53c45447","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":3},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":2},{"event_id":7098,"event_guid":"2cb7b45b-af85-5ee7-981d-5b4265d4e342","weight":6},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":2},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":2},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":2},{"event_id":7103,"event_guid":"b8b3a361-4832-518c-a850-7c354e2e975f","weight":2},{"event_id":7105,"event_guid":"9085e975-1f31-5921-81cf-78f390862e28","weight":7},{"event_id":7117,"event_guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","weight":5},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":2},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":3},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":5},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":2},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":2},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":3},{"event_id":7150,"event_guid":"09d6fe81-7337-5a06-b90f-763a7943a113","weight":4},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":3}]},{"guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","title":"Monitoring mit einer Kiste, aber mehreren Leuten","subtitle":null,"slug":"gpn19-36-monitoring-mit-einer-kiste-aber-mehreren-leuten","link":"https://pretalx.entropia.de/gpn19/talk/AG7MZF/","description":"Wer privat einen Server betreibt, möchte vielleicht gerne wissen, wann Dinge kaputtgehen, gleichzeitig aber keinen zweiten Server nur für Monitoring betreiben. Als Lösung für dieses Dilemma betrachten wir in diesem Vortrag das Konzept eines Prometheus-Monitoring-Systems mit mehreren Nutzern.\n\nWer einen Server hat, möchte, dass dieser Server auch erreichbar ist. Bei einem privaten Jabberserver mag es lediglich ärgerlich sein, wenn der nicht online ist, bei einem Mailserver sind die Konsequenzen eines unbemerkten Ausfalls schon gravirenender.\nWas braucht man also? Monitoring. Also einen zweiten Server, der nur dazu da ist, den ersten Server zu monitoren? Ein Server zum Preis von zweien? Dabei muss ein Monitoringserver ja eigentlich gar nicht soviel können.\nDie Lösung: zusammenwerfen und für das Monitoring geteilte Infrastruktur anschaffen, die von mehreren genutzt werden kann. Damit bleibt's günstig und der Overhead klein.\n\nIn diesem Vortrag schauen wir uns ein Beispiel eines solchen Systems basierend auf Prometheus an, was es kann und wo die Stolpersteinchen liegen, wenn man soetwas bauen möchte.\n\nVorkenntnisse in Prometheus nicht erforderlich, aber hilfreich (z.B. via [0]).\nWenn man das dann später selber bauen möchte, gibt's für die Nicht-per-Hand-Klöppler auch ein Ansible-Repo zum klonen.\n\n\n[0] https://media.ccc.de/v/MRMCD16-7754-prometheus_in_der_praxis","original_language":"deu","persons":["Jonas 'cherti' Große Sundrup"],"tags":["gpn19","36","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":247,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-01-15T20:00:11.599+01:00","length":2727,"duration":2727,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/36-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/36-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/36-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/36-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-36-monitoring-mit-einer-kiste-aber-mehreren-leuten","url":"https://api.media.ccc.de/public/events/a2165fcc-571a-5128-87e0-335ca4b279a2","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":26},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":5},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":13},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":22},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":13},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":20},{"event_id":7144,"event_guid":"0497df23-618b-5678-b69b-27c583e43bf0","weight":13},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":20},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":12},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":13},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":15},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":15}]},{"guid":"07b9277b-3c42-5455-bc35-58072a795d99","title":"Open_Open Codes","subtitle":null,"slug":"gpn19-85-openopen-codes","link":"https://pretalx.entropia.de/gpn19/talk/WCWWV7/","description":"Erfahrungen und Berichte aus dem Ausstellungs- und Bildungsprojekt.\n\n„Open Codes“ - eine Ausstellung aus Daten, Codes, Cryptokitties, free drinks, Bananen und VR. Was hat Code mit Kunst zu tun? Wie stellt man Code aus? Und wie kommt man überhaupt auf die Idee, das zu tun?\nIn unserem Talk möchten wir die Geschichte der ZKM Ausstellung „Open Codes. Leben in digitalen Welten“ bzw. „Open Codes II. Die Welt als Datenfeld\" erzählen und einen Einblick hinter die ZKM-Kulissen bieten. Ganz nach dem Motto „Open_Open Codes“.","original_language":"deu","persons":["Blanca Giménez","LíviaNolasco-Rózsás","Barbara Kiolbassa"],"tags":["gpn19","85","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":184,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-09-07T12:30:04.265+02:00","length":1707,"duration":1707,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/85-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/85-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/85-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/85-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-85-openopen-codes","url":"https://api.media.ccc.de/public/events/07b9277b-3c42-5455-bc35-58072a795d99","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7105,"event_guid":"9085e975-1f31-5921-81cf-78f390862e28","weight":7},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":7},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":4},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":4},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":7},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":6},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":13},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":8},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":4},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":4},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":6},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":9},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":8},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":8},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":8},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":6},{"event_id":7159,"event_guid":"8aab30c5-44da-5d20-80b8-a764ba588381","weight":6},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":6}]},{"guid":"dd84485f-993d-5715-952e-511a6d93dbbf","title":"Programmieren in Minecraft","subtitle":null,"slug":"gpn19-104-programmieren-in-minecraft","link":"https://pretalx.entropia.de/gpn19/talk/CNGMQG/","description":"Minecraft zur spielerischen Einführung in die Programmierung\n\nComputerCraftEdu ist ein Mod für Minecraft (Java Edition) das eine Schildkröte und eine „Fernbedienung“, um die Schildkröte zu steuern, bietet. Mit grafischen Befehls-Kacheln können Programme zusammengebaut werden, um die Schildkröte graben oder etwas bauen zu lassen. So lassen sich spielerisch die grundlegenden Konzepte von Computerprogrammen, wie Schleifen, Variablen, bedingte  Anweisungen usw., auch für jüngere Kinder vermitteln. Der Vortrag zeigt, was getan werden muss, um loslegen zu können, erste einfache Schildkröten-Programme und berichtet über Erfahrungen aus dem Unterricht mit Grundschülern.\n\nDas Mod ComputerCraftEdu ist nicht mehr ganz frisch, funktioniert aber tadellos. Es wird nicht Minecraft Education Edition verwendet und solange lokal gearbeitet wird, fallen keine Kosten an.","original_language":"deu","persons":["Frank Schwichtenberg"],"tags":["gpn19","104","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":863,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-02T21:45:05.063+02:00","length":2005,"duration":2005,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/104-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/104-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/104-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/104-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-104-programmieren-in-minecraft","url":"https://api.media.ccc.de/public/events/dd84485f-993d-5715-952e-511a6d93dbbf","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":21},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":4},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":14},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":16},{"event_id":7128,"event_guid":"8af7bd79-ee5b-58a3-a565-b33fe3ccc947","weight":4},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":16},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":18},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":12},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":16},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":9},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":18},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":14}]},{"guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","title":"Traue keiner App, die du nicht selbst getestet hast","subtitle":null,"slug":"gpn19-42-traue-keiner-app-die-du-nicht-selbst-getestet-hast","link":"https://pretalx.entropia.de/gpn19/talk/KPNDCC/","description":"Apps lassen sich super einfach auf dem Handy installieren, aber was genau machen diese eigentlich? Wie sollte man vorgehen, wenn man in seiner Firma \"die neue Mailapp\" freigibt?","original_language":"deu","persons":["Felix Kazuya"],"tags":["gpn19","42","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":675,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-17T07:30:03.503+01:00","length":1105,"duration":1105,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/42-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/42-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/42-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/42-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-42-traue-keiner-app-die-du-nicht-selbst-getestet-hast","url":"https://api.media.ccc.de/public/events/a9f845a6-6b27-5331-835b-9291de08cd1f","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":11},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":5},{"event_id":7101,"event_guid":"0417bbdb-31ee-5cb5-9a6b-907d3620a085","weight":9},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":15},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":9},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":20},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":13},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":9},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":16},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":12},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":12},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":11},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":11},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":13},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":18}]},{"guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","title":"State of the Frickel","subtitle":null,"slug":"gpn19-89-state-of-the-frickel","link":"https://pretalx.entropia.de/gpn19/talk/K8ZGPN/","description":"Im letzten Jahr hat sich im Hintergrund von Freifunk Karlsruhe viel getan. Wir öffnen unseren Machinenraum und zeigen euch wie Freifunk Karlsruhe betreiben wird, was es neues gibt und welche Projekte auf deine Mithilfe warten.","original_language":"deu","persons":["herrbett","julez"],"tags":["gpn19","89","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":392,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-11-14T22:15:03.643+01:00","length":3359,"duration":3359,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/89-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/89-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/89-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/89-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-89-state-of-the-frickel","url":"https://api.media.ccc.de/public/events/911f8286-875e-50a9-a298-2c8ffbe06fa7","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":6},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":1},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":1},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":18},{"event_id":7101,"event_guid":"0417bbdb-31ee-5cb5-9a6b-907d3620a085","weight":1},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":1},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":25},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":24},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":1},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":1},{"event_id":7119,"event_guid":"383825fc-c122-58f8-9575-e6f81177479c","weight":1},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":1},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":19},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":31},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":33},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":20},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":28},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":24},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":20}]},{"guid":"f6b9f07b-3b80-57d0-aada-f3e60c53ee27","title":"RetroComputing: Emulator VZ200 / Z80","subtitle":null,"slug":"gpn19-114-retrocomputing-emulator-vz200-z80","link":"https://pretalx.entropia.de/gpn19/talk/TVWQBM/","description":"Z80-Emulatoren gibt es bereits zahlreiche.  Meiner, dessen Implementierungsanfänge bis in die späten 90er zurück reichen, ist jedoch in Java implementiert und bringt dabei hohe Emulationsgeschwindigkeit mit hoher Flexibilität beim Befehlssatz der CPU unter einen Hut, so dass sich mit nur geringen Änderungen des Quellcodes auch Emulatoren für ähnliche CPUs recht schnell erzeugen lassen.  Architektonisch ist der Emulator als Schichtenmodell implementiert: Auf der Emulation der Z80-CPU setzt als weitere Architekturschicht die Emulation der übrigen Hardware des Z80-basierten VZ200-Rechners auf, einschließlich der Emulation von Sound- und Video-Hardware.\n\nIn den frühen 80er Jahren habe ich auf meinem damaligen Z80-basierten Homecomputer „VZ200“ umfangreiche Software entwickelt.  Da dieser Rechner mittlerweile leider nicht mehr funktioniert (u.a. mechanisch kaputte Gummitastatur), lagern die entsprechenden Datenträger (Magnetcassettenbänder) seither unbenutzbar herum.  Um die Software wieder zum Leben zurück zu erwecken und sie bei Bedarf auf neuere Systeme portieren zu können, entstand die Idee, einen Emulator des kompletten Rechners (Z80-CPU, Videohardware, Audio-/Datenspeicherinterfaces, Betriebssystem, etc.) in Java zu implementieren.  In der Session möchte ich die Architektur des Emulators vorstellen sowie exemplarisch einige algorithmisch interessante Aspekte herausgreifen.\n\nDamit die Datenein- und –ausgabe (Lautsprecher, Cassetteninterface, etc.) des Emulators in der Real World dem Verhalten des Originals entspricht, muss für deren Emulation die Abarbeitung der Prozessorbefehle virtuell mit einer relativen Genauigkeit zueinander im Mikrosekundenbereich erreicht werden.  Insbesondere muss das Scheduling heutiger Mehrprozessbetriebssysteme mit den daraus resultierenden Abarbeitungspausen berücksichtigt werden, wenn nach außen ein genaues Timing erzielt werden soll.  Ich stelle einen Algorithmus vor, der auf Basis einer virtuellen „Processor Wall-Clock Time“ das entsprechende Mikrotiminig gewährleistet.\n\nFerner werde ich darauf eingehen, wie die einzelnen Teile der zu emulierenden Z80-CPU (Code/Data Fetching, Instruction Decoding \u0026 Dispatching, ALU, IRQs, etc.) effizient, aber dennoch generisch (etwa im Hinblick auf die Emulation verwandter Prozessoren wie dem 8080 mit seinen vom Z80 abweichenden Mnemonics) gestaltet werden können.  Dabei setze ich Techniken aus dem Compilerbau ein, z.B. die automatische Generierung eines Zustandsautomaten als Tokenizer für das Instruction Decoding aus einer deskriptiven, Bit-Masken-orientierten Spezifikation der Prozessor-Instruktionen.\n\nDas dem Emulator beigefügte Monitor-Programm ermöglicht das Hineindebuggen in den Z80-Assember-Code, um z.B. die als „stack trickery“ in der damaligen Zeit von zahlreichen Softwareentwicklern beliebten (und heute eher von Malware-Autoren eingesetzten) Manipulationen am Aufrufstack verfolgen.\n\nProjektsite auf Github:\nhttps://github.com/soundpaint/VZ200-Emulator\n\nVorläufiges Demo-Video:\nhttps://www.youtube.com/watch?time_continue=5\u0026v=S65sOWSTnGA\n\nWeitere Demos / Screenshots werden in Kürze auf der Projektsite verlinkt werden.","original_language":"deu","persons":["Jürgen Reuter"],"tags":["gpn19","114","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":342,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-04T01:15:03.845+02:00","length":1457,"duration":1457,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/114-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/114-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/114-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/114-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-114-retrocomputing-emulator-vz200-z80","url":"https://api.media.ccc.de/public/events/f6b9f07b-3b80-57d0-aada-f3e60c53ee27","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":4},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":4},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":4},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":8},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":8},{"event_id":7116,"event_guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","weight":9},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":6},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":8},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":6},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":16},{"event_id":7132,"event_guid":"dd84485f-993d-5715-952e-511a6d93dbbf","weight":6},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":7},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":4},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":6},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":7}]},{"guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","title":"Schlangenprogrammiernacht 2.0","subtitle":null,"slug":"gpn19-70-schlangenprogrammiernacht-2-0","link":"https://pretalx.entropia.de/gpn19/talk/HFUGLZ/","description":"Das bytewerk bringt zur GPN19 eine Neuauflage der Schlangenprogrammiernacht inkl. neuem Backend mit. In diesem Vortrag zeigen wir für Neulinge kurz das Konzept und stellen die Änderungen gegenüber der letzten Version vor.\n\nZur GPN18 hat das bytewerk ein neues Programmierspiel, die „Schlangenprogrammiernacht“ (SPN) vorgestellt. Dieses Jahr gibt es eine Neuauflage mit neuer Programmiersprache, neuer Schnittstelle zu den Bots, neuen Bugs und mehr Performance¹.\n\nDas Spielprinzip ist das Gleiche geblieben, daher möchten wir hier auf [den\nVortrag](https://entropia.de/GPN18:Einf%C3%BChrung:_Schlangenprogrammiernacht_2018) ([Video](https://media.ccc.de/v/gpn18-153-einfhrung-schlangenprogrammiernacht-2018)) vom letzten Jahr verweisen.\n\n¹ Wir erinnern uns: letztes Jahr hatten wir am Ende ca. 300 Bots bei 5 FPS auf dem Spielfeld. Dieses Jahr sollten wir 60 FPS schaffen :-)","original_language":"deu","persons":["Thomas Kolb"],"tags":["gpn19","70","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":421,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-03-01T01:30:04.903+01:00","length":2238,"duration":2238,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/70-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/70-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/70-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/70-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-70-schlangenprogrammiernacht-2-0","url":"https://api.media.ccc.de/public/events/cfbdf1b4-0f47-583a-967e-f1508b3e40fa","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":36},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":20},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":8},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":19},{"event_id":7101,"event_guid":"0417bbdb-31ee-5cb5-9a6b-907d3620a085","weight":8},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":21},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":32},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":15},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":14},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":13},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":13},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":21},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":15}]},{"guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","title":"Lightning Talks powered by Haecksen","subtitle":null,"slug":"gpn19-135-lightning-talks-powered-by-haecksen","link":"https://pretalx.entropia.de/gpn19/talk/MHGUTZ/","description":"Lightning Talks (nicht nur) von Haecksen\n\nEinreichungen am Teezelt im ZKM-Foyer oder per Mail an mimi@entropia.de\n\n\n* blipp – Ola Bini: unfairly detained for working in cryptography, security and privacy\n* Fynn – soon-to-be-on-fdroid Bandcamp-App “bandcampDirect\"","original_language":"deu","persons":["Eve Entropia"],"tags":["gpn19","135","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":217,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-06-24T23:00:04.187+02:00","length":3111,"duration":3111,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/135-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/135-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/135-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/135-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-135-lightning-talks-powered-by-haecksen","url":"https://api.media.ccc.de/public/events/7b1dd85b-e0b4-5626-8ee5-bf8c23951562","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":11},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":11},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":9},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":22},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":17},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":11},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":9},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":7},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":13},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":9}]},{"guid":"a67cb552-9062-57ff-95fa-0a3a86c375d4","title":"Plenopticam - Open-Source Light Field Photography Software","subtitle":null,"slug":"gpn19-95-plenopticam-open-source-light-field-photography-software","link":"https://pretalx.entropia.de/gpn19/talk/SSXFFP/","description":"This talk unveils the underlying physical and computational concept of the Lytro-type plenoptic camera in a concise and simplified manner while presenting an open-source software tool capable of rendering light field photogaphs.\n\nPlenoptic cameras and their ability to change focus and perspective view after the fact has intrigued scientists, programmers, photographers and tech-hobbyists world-wide. With this presentation, the fundamentals of a light field captured by a plenoptic camera are provided to a broader audience without requiring prior knowledge of such. It is of primary interest to raise awareness of this technology and invite peers to contribute to presented open-source software tool [plenopticam](https://github.com/hahnec/plenopticam).\n\nMore technical details and further educational material is found on my research website https://www.plenoptic.info.","original_language":"eng","persons":["Christopher Hahne"],"tags":["gpn19","95","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":441,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-02-01T13:45:13.673+01:00","length":1453,"duration":1453,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/95-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/95-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/95-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/95-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-95-plenopticam-open-source-light-field-photography-software","url":"https://api.media.ccc.de/public/events/a67cb552-9062-57ff-95fa-0a3a86c375d4","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":2},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":5},{"event_id":7107,"event_guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","weight":6},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":7},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":2},{"event_id":7114,"event_guid":"9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","weight":5},{"event_id":7116,"event_guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","weight":4},{"event_id":7118,"event_guid":"dcbb310b-acc9-5ddc-9e40-6307ecc40515","weight":6},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":2},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":4},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":6},{"event_id":7131,"event_guid":"f6b9f07b-3b80-57d0-aada-f3e60c53ee27","weight":6},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":2},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":8},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":8},{"event_id":7142,"event_guid":"33728e28-3031-59ad-88e6-3a38369c1cd3","weight":2},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":5},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":6},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":3},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":2},{"event_id":7155,"event_guid":"4376339b-49f6-5b8e-ab5a-26ecd6233e5c","weight":2},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":5}]},{"guid":"b449b12a-31a9-597e-8d80-b4636e443d2b","title":"Fotografie an speziellen Orten – Der Unterwasserfotograf","subtitle":null,"slug":"gpn19-43-fotografie-an-speziellen-orten-der-unterwasserfotograf","link":"https://pretalx.entropia.de/gpn19/talk/G3N8Q9/","description":"Wie ist es eigentlich, wenn man Nemo selbst auf SD bannen möchte? Was muss beachtet werden, was brauch man so?","original_language":"deu","persons":["Felix Kazuya"],"tags":["gpn19","43","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":159,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-12-01T21:00:07.003+01:00","length":1831,"duration":1831,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/43-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/43-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/43-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/43-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-43-fotografie-an-speziellen-orten-der-unterwasserfotograf","url":"https://api.media.ccc.de/public/events/b449b12a-31a9-597e-8d80-b4636e443d2b","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":4},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":8},{"event_id":7111,"event_guid":"a9f845a6-6b27-5331-835b-9291de08cd1f","weight":5},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":5},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":10},{"event_id":7132,"event_guid":"dd84485f-993d-5715-952e-511a6d93dbbf","weight":7}]},{"guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","title":"Beton","subtitle":null,"slug":"gpn19-2-beton","link":"https://pretalx.entropia.de/gpn19/talk/ETBTBJ/","description":"Beton ein 2300 Jahre alter hightech Werkstoff","original_language":"deu","persons":["couchsofa"],"tags":["gpn19","2","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":546,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-02-06T12:30:07.699+01:00","length":3971,"duration":3971,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/2-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/2-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/2-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/2-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-2-beton","url":"https://api.media.ccc.de/public/events/c0ee4085-d710-5bb5-94cc-a098fa246b6a","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":17},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":32},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":16},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":18},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":27},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":30},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":20},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":7},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":43},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":21},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":18},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":23},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":14},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":16}]},{"guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","title":"Closing and Infrastructure Review","subtitle":null,"slug":"gpn19-12-closing-and-infrastructure-review","link":"https://pretalx.entropia.de/gpn19/talk/NG9TV9/","description":"Last talk of GPN19","original_language":"deu","persons":["Christian Lölkes"],"tags":["gpn19","12","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":434,"promoted":false,"date":"2019-06-02T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2025-10-18T04:15:03.460+02:00","length":1506,"duration":1506,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/12-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/12-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/12-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/12-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-12-closing-and-infrastructure-review","url":"https://api.media.ccc.de/public/events/05a13a26-45fb-53e8-ba9a-245ae662b42c","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":33},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":31},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":22},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":18},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":18},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":24},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":19},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":27},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":18},{"event_id":7159,"event_guid":"8aab30c5-44da-5d20-80b8-a764ba588381","weight":26},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":36}]},{"guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","title":"Lightning Talks","subtitle":null,"slug":"gpn19-134-lightning-talks","link":"https://pretalx.entropia.de/gpn19/talk/7PRHB8/","description":"# Lightning Talks\n* 10min pro Speaker\n* Einreichungen bitte per Mail an gpn-content@lists.entropia.de\n\n# Programm\n* \"How to get stinking rich\" - Joachim\n* \"Call to action on developing the professional green techie community in Karlsruhe\" - Aaron Gilbee","original_language":"deu","persons":["Eve Entropia"],"tags":["gpn19","134","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":191,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-25T22:15:10.423+01:00","length":3752,"duration":3752,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/134-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/134-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/134-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/134-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-134-lightning-talks","url":"https://api.media.ccc.de/public/events/0b2f0f69-686d-5aef-8913-aeabe86d1bfc","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":18},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":14},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":15},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":14},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":19},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":12},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":22}]},{"guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","title":"CyberMorningshow","subtitle":null,"slug":"gpn19-68-cybermorningshow","link":"https://pretalx.entropia.de/gpn19/talk/JKKXWT/","description":"Die CyberMorningshow ist wieder da. Mehr Cyber. Mehr Spass. Mehr gut.\n\nDie CyberMorningshow. Unbekannt und nicht im Funk und Fernsehen.\n\nAn einem grauen Morgen im kalten Hannover begab es sich, dass eine Gruppe von Nerds auf einem eskalationsbedürftigen Event zusammenkamen und beschlossen eine Morningshow ins Leben zu rufen.\nDies war die Geburtsstunde der CyberMorningshow.\n\nWir sind wieder da und diesmal sogar mit Programm!\nSeit dabei und lasst euch von der wundervollen Welt des CYBER vercy^Wzaubern, während wir uns spannende Fragen zum Thema Cyber stellen.","original_language":"deu","persons":["td00","Tii","F1fth","couchsofa"],"tags":["gpn19","68","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":348,"promoted":false,"date":"2019-06-02T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-02-21T16:15:08.376+01:00","length":4832,"duration":4832,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/68-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/68-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/68-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/68-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-68-cybermorningshow","url":"https://api.media.ccc.de/public/events/078a2d38-1bb1-5bc4-8194-83892f3b11a0","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":19},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":18},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":18},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":22},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":14},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":23},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":29},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":23},{"event_id":7159,"event_guid":"8aab30c5-44da-5d20-80b8-a764ba588381","weight":16},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":36}]},{"guid":"2cb7b45b-af85-5ee7-981d-5b4265d4e342","title":"aehostd -- NSS/PAM-Dienst für Æ-DIR","subtitle":null,"slug":"gpn19-138-aehostd-nss-pam-dienst-fr--dir","link":"https://pretalx.entropia.de/gpn19/talk/L9ZH9Q/","description":"Dieser Vortag stellt aehostd vor, ein speziell für Æ-DIR angepasster NSS/PAM-Dienst.\n\nMit grossen Widerwillen hat der Autor einen NSS/PAM-Dienst als Ersatz für _sssd_ und _nss-pam-ldapd_ implementiert, obwohl es ihm grundsätzlich sehr widerstrebt das Rad neu zu erfinden.\n\nDer Vortrag stellt dar, warum für den Einsatzzweck eine eigene Implementierung sinnvoll erschien, wie es genau gemacht wurde und warum das Ergebnis namens [aehostd](https://www.ae-dir.com/aehostd.html) für die Integration mit [Æ-DIR](https://ae-dir.com) besser ist als andere Implementierungen. Insbesondere wird auch die Anbindung (Enrollment) einer VM ohne lokalen Login-Account gezeigt.\n\nNützliche Vorkenntnisse: Login unter Linux, SSH, PAM, nsswitch.conf\n\nLinks:\n\n   * [Æ-DIR -- Authorized Entities Directory](https://ae-dir.com)\n   * [aehostd -- Custom NSS/PAM demon for Æ-DIR](https://ae-dir.com/aehostd.html)","original_language":"deu","persons":["Michael Ströder"],"tags":["gpn19","138","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":80,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2025-12-13T03:45:04.547+01:00","length":2511,"duration":2511,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/138-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/138-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/138-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/138-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-138-aehostd-nss-pam-dienst-fr--dir","url":"https://api.media.ccc.de/public/events/2cb7b45b-af85-5ee7-981d-5b4265d4e342","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7093,"event_guid":"dVYz0GFKsKPfIUQDmTJmqQ","weight":6},{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":5},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":5},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":5},{"event_id":7103,"event_guid":"b8b3a361-4832-518c-a850-7c354e2e975f","weight":5},{"event_id":7104,"event_guid":"be47fbb7-4a05-5586-8816-40ea53c45447","weight":6},{"event_id":7105,"event_guid":"9085e975-1f31-5921-81cf-78f390862e28","weight":5},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":6},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":5}]},{"guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","title":"Hacking Building Automation Security - or how to have keyless entry at your neighbors...","subtitle":null,"slug":"gpn19-33-hacking-building-automation-security-or-how-to-have-keyless-entry-at-your-neighbors-","link":"https://pretalx.entropia.de/gpn19/talk/399UPZ/","description":"Ein kritischer Blick auf den Stand der Sicherheit in modernen Smart-Building Systemen\n\nSmart Building Security - in der Praxis oft ein Widerspruch in sich.\nBei fast allen größeren öffentlichen Gebäuden sowie im gehobenen Wohnungsbau kommen unterschiedliche Gebäudeautomationssysteme zum Einsatz. Wir werfen einen Blick auf verschiedene gängige Techniken und Bussysteme, besprechen praktische Angriffszenarien und zeigen vorbeugende Maßnahmen auf.","original_language":"deu","persons":["Kevin Heneka"],"tags":["gpn19","33","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":547,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-18T20:15:16.073+01:00","length":3034,"duration":3034,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/33-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/33-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/33-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/33-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-33-hacking-building-automation-security-or-how-to-have-keyless-entry-at-your-neighbors-","url":"https://api.media.ccc.de/public/events/d4c06f9d-2021-5194-b65e-cfd92c086879","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":40},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":10},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":15},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":8},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":30},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":46},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":21},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":25},{"event_id":7127,"event_guid":"fcb166a9-72b4-5b77-832c-05a63251863e","weight":23},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":34},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":21},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":22}]},{"guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","title":"Das Leben mit der DSGVO","subtitle":null,"slug":"gpn19-38-das-leben-mit-der-dsgvo","link":"https://pretalx.entropia.de/gpn19/talk/ZRCDEJ/","description":"Was hat sich für uns durch die DSGVO geändert, was müssen wir nun beachten? Ein Mittelmaß zwischen absoluter Panik und Entspannung wäre doch toll.\n\nIm RL bin ich als Datenschutzkoordinator für den Datenschutz innerhalb unserer Firma verantwortlich, aber was bedeutet es und was kann sich der normalblogger für sein tägliches Leben mitnehmen?","original_language":"deu","persons":["Felix Kazuya"],"tags":["gpn19","38","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":493,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-09T00:00:21.662+01:00","length":2312,"duration":2312,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/38-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/38-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/38-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/38-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-38-das-leben-mit-der-dsgvo","url":"https://api.media.ccc.de/public/events/756ad06c-d1f8-5867-acc6-eafb5eea3b90","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":27},{"event_id":7097,"event_guid":"cfbdf1b4-0f47-583a-967e-f1508b3e40fa","weight":7},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":18},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":29},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":22},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":27},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":15},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":13},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":18},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":22},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":16}]},{"guid":"628aecf3-690d-5a66-a879-3b6717471883","title":"Emoji, wie funktionieren die eigentlich?","subtitle":null,"slug":"gpn19-117-emoji-wie-funktionieren-die-eigentlich-","link":"https://pretalx.entropia.de/gpn19/talk/X3JUSE/","description":"Emoji werden überall verwendet und sind aus unserer täglichen Kommunikation nicht mehr wegzudenken. Aber wie funktionieren Emoji eigentlich und woher kommen sie? Besuche diesen Talk und lerne über die Semiotik im 21. Jahrhundert!\n\n# Emoji\n\nWoher kommen sie? Wie sind sie geschichtlich entstanden und was hat das mit Asien zu tun?\nWie funktionieren Emoji technisch und warum sind sie für die IT-Security relevant?\nWelche kulturellen und sprachlichen Verwirrungen verursachen Emoji im Alltag und wie kommt es dazu?\n\nDamit das alles nicht langweilig und fürchterlich technisch wird gibts zwischendurch natürlich allerhand obskure Trivia rund um die beliebten Unicode Zeichen.","original_language":"deu","persons":["MacLemon"],"tags":["gpn19","117","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1156,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-03-31T15:00:05.596+02:00","length":4476,"duration":4476,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/117-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/117-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/117-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/117-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-117-emoji-wie-funktionieren-die-eigentlich-","url":"https://api.media.ccc.de/public/events/628aecf3-690d-5a66-a879-3b6717471883","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":12},{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":5},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":30},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":18},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":18},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":22},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":27},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":18},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":17},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":22},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":23},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":24},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":20},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":26},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":17},{"event_id":7155,"event_guid":"4376339b-49f6-5b8e-ab5a-26ecd6233e5c","weight":18},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":49}]},{"guid":"e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","title":"Post-Quantum-Sicherheit - Stand der Dinge","subtitle":"","slug":"gpn19-93-post-quantum-sicherheit-stand-der-dinge","link":"https://pretalx.entropia.de/gpn19/talk/DVZPXU/","description":"Die Zukunft befindet sich wie Schrödingers Katze in einer ungewissen Superposition aus zwei Zuständen. Während die Katze nach dem Öffnen der Box entweder tot oder lebendig ist, befindet sich die Zukunft nach dem Öffnen der Box in einer aus zwei möglichen Welten: 1. Quantencomputer machen die moderne Kryptographie komplett kaputt. 2. Quantencomputer werden nie aus dem bisherigen Stand herauskommen und man ist froh wenn sie zweistellige Zahlen multiplizieren können. Bis wir die Box geöffnet haben wissen wir jedoch nicht in welcher dieser Welten wir uns befinden und müssen auf alles vorbereitet sein.\r\n\r\nViele bisherige kryptographische Verfahren sind gegen Angreifer mit Zugriff auf Quantencomputern unsicher. Dies betrifft vor allem das bekannte RSA-Verfahren welches auf dem Faktorisierungsproblem basiert. Im ersten Teil des Vortrags wird die Funktionsweise von Quantencomputern kurz erläutert. Zudem wird die Auswirkung auf das Faktorisierungsproblem hervorgehoben.\r\n\r\nDie Kryptographiewelt schläft natürlich nicht sondern hat mehrere Bausteine entwickelt mit denen sich Verfahren entwickeln lassen die nicht von Quantenangreifern gebrochen werden können. Der zweite Teil des Vortrags wird diese Bausteine vorstellen und etwas Licht auf das momentan laufende Standardisierungsverfahren der NIST werfen.","original_language":"deu","persons":["Roland Gröll"],"tags":["gpn19","93","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":466,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-01-23T11:15:09.022+01:00","length":2865,"duration":2865,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/93-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/93-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/93-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/93-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-93-post-quantum-sicherheit-stand-der-dinge","url":"https://api.media.ccc.de/public/events/e51691a8-f0d9-5aa1-9ae8-3fc9eca3dbbb","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":12},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":15},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":19},{"event_id":7113,"event_guid":"2c28a388-3cf9-5b52-a25f-3a4bd91b32d8","weight":13},{"event_id":7114,"event_guid":"9578b7f9-9bd8-58c4-b4cc-625ef5b7168d","weight":12},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":20},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":13},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":20},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":15}]},{"guid":"6f9550f9-1960-5d4f-b5ad-f6666d235c5e","title":"damalsTM: Eine Podcastfolge über das Phänomen der Zeit","subtitle":null,"slug":"gpn19-65-damalstm-eine-podcastfolge-ber-das-phnomen-der-zeit","link":"https://pretalx.entropia.de/gpn19/talk/8TPLDQ/","description":"Livepodcasting mit telegnom und ajuvo\n\ntelegnom und ajuvo nehmen vor Livepublikum eine Folge des damals(tm)-Podcasts auf. ( https://damals-tm-podcast.de ) Es geht um das Thema der Zeit und ihrer Wahrnehmung, damals(tm), als man begann, Uhren zu bauen, die Nacht zu beleuchten, sich über den Planeten zu bewegen und zu kommunizieren, so dass das Phänomen der Zeit als ein globales wahrzunehmen begonnen wurde.\n\nUnd wie es kam, dass es kam, so dass es ist, wie es ist mit Uhren, Seenavigation, Telegrafen, Telefonen, politischen, technischen und ökonomischen Zeitzonen, Atomzeiten und Zeitabweichungen.\n\nEs geht, wie immer bei damals(tm), um alte Technik und wie sie uns heute (noch) beeinflusst. Auf unterhaltsame Weise. Ein Bildungserlebnis. Herzlich Willkommen.","original_language":"deu","persons":["ajuvo"],"tags":["gpn19","65","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":229,"promoted":false,"date":"2019-06-02T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-01-06T10:30:15.788+01:00","length":5158,"duration":5158,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/65-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/65-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/65-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/65-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-65-damalstm-eine-podcastfolge-ber-das-phnomen-der-zeit","url":"https://api.media.ccc.de/public/events/6f9550f9-1960-5d4f-b5ad-f6666d235c5e","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":2868,"event_guid":"0549d204-604a-46c5-92a2-e64b85aa9892","weight":5},{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":6},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":6},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":8},{"event_id":7126,"event_guid":"0b2f0f69-686d-5aef-8913-aeabe86d1bfc","weight":6},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":5},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":8},{"event_id":7141,"event_guid":"07b9277b-3c42-5455-bc35-58072a795d99","weight":5},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":13},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":5},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":5},{"event_id":7159,"event_guid":"8aab30c5-44da-5d20-80b8-a764ba588381","weight":4},{"event_id":7160,"event_guid":"05a13a26-45fb-53e8-ba9a-245ae662b42c","weight":6},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":10}]},{"guid":"b7f4fac0-3283-5c65-8f2d-2fa8e15cb54c","title":"\"Hacking the human brain\" - Wie beeinflussen uns Hormone?","subtitle":null,"slug":"gpn19-128--hacking-the-human-brain-wie-beeinflussen-uns-hormone-","link":"https://pretalx.entropia.de/gpn19/talk/QT9VBD/","description":"Kurze Darstellung des Neuronalen Systems und eine kleine Einführung der Einflüsse von Hormonen und Neurotransmittern auf die menschliche Psyche.\n\nOftmals ist Menschen nicht bekannt, was eigentlich genau in ihrem Gehirn abläuft - was der Auslöser für verschiedene Krankheitsbilder ist als auch die Frage, wie stark wir von unserem eigenen neuronalen System beeinflusst werden. \n\nIn diesem Talk möchte ich erlätern, wie einige psychiatrische und neuronale Krankheitsbilder entstehen, welchen Einfluss Hormone und Neuromodulatoren auf unsere Laune und Wahrnehmung haben und wie diese ganze Zusammenschaltung eigentlich genau funktioniert.\n\nEin Vortrag für jede Person, welche sich mal schon über die neuronalen Basics Gedanken gemacht hat und wissen möchte, wie der State of the Art der aktuellen Forschung ist.","original_language":"deu","persons":["Celuiell"],"tags":["gpn19","128","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":234,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-03-02T16:00:11.415+01:00","length":3806,"duration":3806,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/128-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/128-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/128-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/128-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-128--hacking-the-human-brain-wie-beeinflussen-uns-hormone-","url":"https://api.media.ccc.de/public/events/b7f4fac0-3283-5c65-8f2d-2fa8e15cb54c","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":8},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":8},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":15},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":4},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":8},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":4},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":2},{"event_id":7149,"event_guid":"328b4a00-b129-5a61-b06e-5c8b4580461d","weight":8},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":6},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":7},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":7}]},{"guid":"d810803b-cf2f-5756-9571-c15373f50fa8","title":"Glasfasernetze \u0026 Beton wie auch immer das zusammen passt","subtitle":null,"slug":"gpn19-5-glasfasernetze-beton-wie-auch-immer-das-zusammen-passt","link":"https://pretalx.entropia.de/gpn19/talk/RP3RPN/","description":"Nachdem wir dank Marc \u0026 Momo nun Glasfaser haben, brauchen wir nun einen Keller oder Beton um damit zu Arbeiten. Ich zeige euch, was alles für ein Datacenter erforderlich ist.\n\nIch zeige euch, was man alles für den Betrieb eines full size Datacenters braucht \u0026 wie der eigene Keller auch mal schnell eskaliert. Das ganze gewürzt mit ausflügen in die Abgründe der IT.","original_language":"deu","persons":["Jana / zENjA"],"tags":["gpn19","5","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":859,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-01T22:15:07.192+02:00","length":2593,"duration":2593,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/5-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/5-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/5-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/5-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-5-glasfasernetze-beton-wie-auch-immer-das-zusammen-passt","url":"https://api.media.ccc.de/public/events/d810803b-cf2f-5756-9571-c15373f50fa8","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":34},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":62},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":33},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":34},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":43},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":61},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":47},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":7},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":43},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":62},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":59},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":53},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":37},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":31}]},{"guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","title":"Verkack es. Das kannste!","subtitle":null,"slug":"gpn19-144-verkack-es-das-kannste-","link":"https://pretalx.entropia.de/gpn19/talk/DYGEKS/","description":"Oder wie die Liebe zu Fehlern und die Haltung \"scheiter heiter weiter\" neue Schätze und Möglichkeiten zu Tage fördert.\n\n*Was ändert sich, wenn man keine Angst mehr hätte Fehler zu machen?*\n\nPotentiell interaktiv vermittelt **Leonie Michaelis** ihre Haltung zu Fehlern und Scheitern. \nGeprägt von angewandter Improvisation zeigt sie Chancen und Möglichkeiten auf und macht diese so gleich erlebbar.\nFalls ihr das nicht gelingt - hat sie halt verkackt.  Das kann sie ;)\n\n\u003e\u003e www.Leonie-Michaelis.com","original_language":"deu","persons":["Leonie Michaelis || Die Leonie."],"tags":["gpn19","144","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1683,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2025-11-17T12:15:04.150+01:00","length":2500,"duration":2500,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/144-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/144-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/144-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/144-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-144-verkack-es-das-kannste-","url":"https://api.media.ccc.de/public/events/7bf66344-5900-5a5e-8657-8e1d20be92f5","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":92},{"event_id":7096,"event_guid":"3d181ba9-ae1b-5071-9f50-09aec13c0151","weight":28},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":34},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":33},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":114},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":206},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":65},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":31},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":59},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":113},{"event_id":7131,"event_guid":"f6b9f07b-3b80-57d0-aada-f3e60c53ee27","weight":9},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":91},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":68},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":61},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":44},{"event_id":7139,"event_guid":"c0ee4085-d710-5bb5-94cc-a098fa246b6a","weight":30},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":128},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":82},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":164},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":28},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":77},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":27},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":148},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":36}]},{"guid":"2fd22199-6ded-5230-b959-c568d36f8f57","title":"What every programmer should know about inline assembler","subtitle":null,"slug":"gpn19-121-what-every-programmer-should-know-about-inline-assembler","link":"https://pretalx.entropia.de/gpn19/talk/UV3RDG/","description":"Viele Programmierer kommen mit Inline-Assembler in Berührung, üblicherweise bei\nhardwarenaher Programmierung oder dem Bestreben noch etwas Geschwindigkeit aus\ndem Rechner rauszuquetschen.  Der Inline-Assembler von GCC ist sehr vielseitig,\nverlangt jedoch beim Umgang große Sorgfalt und leider kursieren viele\nFehlinformationen darüber.  In diesem Vortrag möchte ich mit letzeren\naufräumen, seine Funktionsweise erklären, die korrekte Verwendung darlegen und\nzeigen, wie man ihn einsetzt -- und wann eben auch nicht.","original_language":"deu","persons":["Christoph Mallon"],"tags":["gpn19","121","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":290,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-03-09T19:45:05.862+01:00","length":3379,"duration":3379,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/121-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/121-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/121-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/121-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-121-what-every-programmer-should-know-about-inline-assembler","url":"https://api.media.ccc.de/public/events/2fd22199-6ded-5230-b959-c568d36f8f57","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":12},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":2},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":11},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":12},{"event_id":7103,"event_guid":"b8b3a361-4832-518c-a850-7c354e2e975f","weight":2},{"event_id":7109,"event_guid":"3878fd29-4440-50af-8700-63f4391bd42e","weight":14},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":17},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":8},{"event_id":7116,"event_guid":"40ecb878-6d04-5aa6-bfa4-afeddaf3bb81","weight":14},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":11},{"event_id":7121,"event_guid":"1089da9b-4f3a-5b05-a9c3-712e2145cff7","weight":13},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":6},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":11},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":11},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":11},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":17},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":11},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":11},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":11}]},{"guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","title":"Software testen? Ja bitte!","subtitle":null,"slug":"gpn19-118-software-testen-ja-bitte-","link":"https://pretalx.entropia.de/gpn19/talk/9CPVCK/","description":"Systematisch durchgeführte Software-Tests können dazu beitragen, qualitativ angemessene Software auszuliefern - aber leider lassen sich nicht alle Tests adäquat automatisieren, und gerade bei manuell durchgeführten Tests wird häufig geschlampt (nicht nur in der FOSS-Szene). \n\nDer Vortrag stellt die freie Webanwendung \"SystemTestPortal\" vor, dank der auch kleine Projekte mühelos (Software) professionell testen können.\n\nDas Testen von Software ist wichtig, um Nutzer nicht durch verbuggte Releases zu vergraulen. Vieles  lässt sich heute zwar automatisieren, viele kritische Fehler werden aber oftmals erst durch händisch durchgeführte Tests entdeckt. Gerade kleinere FLOSS-Projekte verzichten leider noch immer auf systematisch durchgeführte Tests und fördern so das \"Frickelware\"-Klischee.\n\nSystematisches Testen klingt langweilig, kann aber richtig Spaß machen und dabei Entwickler, Tester und Endanwender näher zusammenbringen. Die an der Universität Stuttgart entwickelte freie Software \"SystemTestPortal\" ist eine leichtgewichtige Webanwendung, die die Erstellung, Protokollierung und Analyse systematischer Tests deutlich vereinfacht. Sie bietet zudem auch Management-Funktionen für die Planung und Steuerung von Tests (Dashboards, Zuweisung von Testaufgaben an Tester usw.).\n\nDer Vortrag diskutiert die Wichtigkeit und die Schwierigkeiten des Testens und stellt das SystemTestPortal als praktibable Lösung vor, die gerade für kleinere Projekte interessant sein könnte.","original_language":"deu","persons":["Daniel Kulesz"],"tags":["gpn19","118","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":620,"promoted":false,"date":"2019-05-30T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-04-07T17:30:07.978+02:00","length":2424,"duration":2424,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/118-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/118-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/118-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/118-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-118-software-testen-ja-bitte-","url":"https://api.media.ccc.de/public/events/045f855d-1bd3-5c93-b9f3-74c5347f4ce8","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":43},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":29},{"event_id":7100,"event_guid":"d4c06f9d-2021-5194-b65e-cfd92c086879","weight":30},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":37},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":59},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":33},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":34},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":33},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":26}]},{"guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","title":"Nur ein Fauler Admin ist ein guter Admin","subtitle":null,"slug":"gpn19-39-nur-ein-fauler-admin-ist-ein-guter-admin","link":"https://pretalx.entropia.de/gpn19/talk/8DANRN/","description":"Das Spiel mit Ansible und Docker kann das leben eines Admins sehr angenehm, machen, aber warum sollten nur faule Admins in der IT arbeiten?","original_language":"deu","persons":["Felix Kazuya"],"tags":["gpn19","39","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1675,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-08T09:00:05.617+02:00","length":1893,"duration":1893,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/39-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/39-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/39-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/39-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-39-nur-ein-fauler-admin-ist-ein-guter-admin","url":"https://api.media.ccc.de/public/events/da767a60-2f04-511e-bcc8-9cb136de77f7","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":51},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":63},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":86},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":21},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":63},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":82},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":37},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":66},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":59},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":47},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":107},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":106},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":35},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":23},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":60},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":77}]},{"guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","title":"Ich habe doch nichts zu verbergen","subtitle":null,"slug":"gpn19-123-ich-habe-doch-nichts-zu-verbergen","link":"https://pretalx.entropia.de/gpn19/talk/8VDCXK/","description":"Eine Einführung in die digitale Selbstverteidigung und Selbstbestimmung\n\nIch habe doch nichts zu verbergen -meien Daten kann doch jeder haben - ich bin doch nicht so interessant und weiterer Unsinn - wieso diese Aussagen sämtlich Quatsch sind.\nFür Email, Messanger, Webspace bezahlen warum bekomm ich doch alles für lau - warum es niemals, nichts für umsonst geben kann\nGratis, umsonst, für null Euro, Gewinn, Pay-Back Punkte, Rabatte und weiterer Schwindel, um an deine Daten zu kommen - was die Datenkraken so alles anstellen, um an deine Daten zu kommen\n\nDieser Vortrag rüttelt auf und fordert zum Nachdenken auf. Sicherheit hat viele Gesichter nur wenn ich weiss wogegen ich mich schützen will kann ich mich dagegen schützen  dazu ist es jedoch vorher zwingend nötig zu wissen wer was von mir will und wie diese Leute ticken .\nIch will mit diesem Vortrag bewusst  verwirren und dazu anregen über vieles nochmals scharf nachzudenken.","original_language":"deu","persons":["Uli Kleemann"],"tags":["gpn19","123","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1543,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-02-26T14:15:07.890+01:00","length":2793,"duration":2793,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/123-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/123-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/123-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/123-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-123-ich-habe-doch-nichts-zu-verbergen","url":"https://api.media.ccc.de/public/events/8f035c60-97b4-53f1-b2de-32e65f6f2844","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":34},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":29},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":47},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":31},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":44},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":68},{"event_id":7132,"event_guid":"dd84485f-993d-5715-952e-511a6d93dbbf","weight":10},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":51},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":29},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":34},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":31},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":71},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":66},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":46},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":44},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":27}]},{"guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","title":"Dämliche Dinge mit Git Repositorys anstellen","subtitle":null,"slug":"gpn19-4-dmliche-dinge-mit-git-repositorys-anstellen","link":"https://pretalx.entropia.de/gpn19/talk/GJDTBC/","description":"Ständig versuchen Leute Git richtig zu erklären. So auch ich, schließlich hat sich Git schon seit einigen Jahren als Standard festgesetzt. Viele nutzen zwar Git, kennen aber nicht alle Funktionen oder verstehen die Arbeit damit richtig. Nichtsdestotroz ist Git nicht für alle Probleme eine Lösung.\n\nDIeser Vortrag stellt einige dämliche Ideen vor, die Menschen schon mit Git Repositorys getrieben haben. Es werden einige Beispiele genannt, die man ausdrücklich \u003cstrong\u003enicht\u003c/strong\u003e machen sollte. Darüber hinaus wird natürlich auch noch darauf eingegangen, warum solche Aktionen nicht sinnvoll mit Git umzusetzen sind und was für Alternativen es gibt.","original_language":"deu","persons":["Sujeevan Vijayakumaran"],"tags":["gpn19","4","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":2487,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-06-02T02:00:00.000+02:00","updated_at":"2026-03-06T11:45:09.088+01:00","length":2631,"duration":2631,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/4-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/4-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/4-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/4-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-4-dmliche-dinge-mit-git-repositorys-anstellen","url":"https://api.media.ccc.de/public/events/64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":57},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":72},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":176},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":48},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":32},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":83},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":148},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":62},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":44},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":31},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":45},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":120},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":77},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":141},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":25},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":78},{"event_id":7157,"event_guid":"628aecf3-690d-5a66-a879-3b6717471883","weight":49},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":23},{"event_id":7180,"event_guid":"562d487d-d84a-4fc7-98a5-5267710587d9","weight":26}]},{"guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","title":"Blockchain - Ein außer Kontrolle geratenes Laborexperiment?","subtitle":null,"slug":"gpn19-92-blockchain-ein-auer-kontrolle-geratenes-laborexperiment-","link":"https://pretalx.entropia.de/gpn19/talk/H8VF83/","description":"Die praktische Realisierung eines Verfahrens, das trotz des gegenseitigen Misstrauens seiner Teilnehmer eine Manipulationsresistenz garantiert, gilt als heiliger Gral der Kryptographie. Bitcoin konnte das Problem, im Kontext von digitalen Währungen, durch Kombination von verschiedenen, bereits bestehenden Techniken elegant lösen. Unter Laborbedingungen wurde dann der erste Prototyp des Bitcoins in einem engen Kreis von Kryptoenthusiasten eingesetzt und getestet. Die daraufhin los getretenen Welle der Begeisterung hat, im Laufe der letzten Jahre, Aufmerksamkeit auf diese Technologie bis in die höchsten Regierungskreise gespült. Heutzutage lässt sich die Sehnsucht nach dem Einsatz der Blockchain überall in der Medien-, Unternehmens- und Politiklandschaft spüren. Doch das Prinzip der Blockchain ist längst über den Einsatz als Kryptowährung hinaus gewachsen. Selbst dort wo weder Manipulationsresistenz benötigt wird, noch Misstrauen herrscht wird die Blockchain als universeller Problemlöser verehrt.  Vom dezentralen und hochredundanten Speicher bis hin zum unfehlbaren Betriebssystem sprießt der Regenbogen der White-, Purple-, Blue- und Yellowpaper aus dem Äther des Internets. Allesamt predigen sie das tägliche Vaterunser der Blockchain: Unveränderlichkeit und Transparenz für alle. Die Frage, ob die eingesetzte Technologie überhaupt zu den Anforderungen des jeweiligen Einsatzzweckes passt und unter welchen Bedingungen sie überhaupt welche Sicherheitsgarantien gewährleisten kann ist hier unerwünscht, fast schon blasphemisch. Dabei wissen Experten schon seit langem, dass es in der IT-Sicherheit keine alle Angreifer vernichtende Allzweckwaffe gibt sondern, dass das genaue Erfassen von Anforderungen und eine darauf aufbauende, sorgfältige Auswahl von Sicherheitsmechanismen die Voraussetzung für ein sicheres Systemdesign ist. Es drängt sich also der Verdacht auf, dass Blockchain-Systeme, entgegen der landläufigen Meinung, vielleicht überhaupt nicht von IT-Sicherheitsexperten entworfen und eingesetzt werden. \n\nUm dieser Frage auf den Grund zu gehen, verabschieden wir uns in diesem Vortrag für eine Weile aus dem Glaubenskrieg über die Sinnhaftigkeit und versuchen stattdessen mit Methoden der Kryptographie und IT-Sicherheit zu ergründen was die Blockchain leisten kann und was nicht. Wir werfen dazu auch einen tiefen Blick unter die Haube und beleuchten wie sicher die Bauteile sind, die die Blockchain wirklich antreiben.","original_language":"deu","persons":["Kompetenzzentrum IT-Sicherheit am FZI Forschungszentrum Informatik","Jochen Rill","Wasilij Beskorovajnov"],"tags":["gpn19","92","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1930,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-01T15:45:12.242+01:00","length":3361,"duration":3361,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/92-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/92-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/92-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/92-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-92-blockchain-ein-auer-kontrolle-geratenes-laborexperiment-","url":"https://api.media.ccc.de/public/events/3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":45},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":33},{"event_id":7106,"event_guid":"e5435c9d-3e16-5419-b326-391df1522988","weight":27},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":89},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":43},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":65},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":34},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":31},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":28},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":43},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":42},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":28},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":48}]},{"guid":"09d6fe81-7337-5a06-b90f-763a7943a113","title":"CryptPad: practice and theory","subtitle":null,"slug":"gpn19-79-cryptpad-practice-and-theory","link":"https://pretalx.entropia.de/gpn19/talk/HAWWJJ/","description":"Members of the Piratenpartei IT crew \"Bundes-IT\" and CryptPad development team will speak about their perspectives on the encrypted collaboration platform.\n\nIn this two-part talk, Adrian Nöthlich and Aaron MacSween will talk about the CryptPad project from two different perpectives.\n\nAdrian will speak from his experience as an administrator of the instance hosted for the German Pirateparty, including some facts about Piratenpad, some of the difficulties in running one of the world's largest Etherpad instances, and their migration to CryptPad.\n\nAaron will represent the CryptPad development team, explaining their motivations, how the project is funded, and what features are planned for the next year of development.","original_language":"eng","persons":["Adrian Nöthlich","Aaron MacSween"],"tags":["gpn19","79","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":473,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-06T19:00:09.052+02:00","length":3013,"duration":3013,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/79-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/79-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/79-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/79-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-79-cryptpad-practice-and-theory","url":"https://api.media.ccc.de/public/events/09d6fe81-7337-5a06-b90f-763a7943a113","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7108,"event_guid":"2fd22199-6ded-5230-b959-c568d36f8f57","weight":5},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":6},{"event_id":7119,"event_guid":"383825fc-c122-58f8-9575-e6f81177479c","weight":2},{"event_id":7136,"event_guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","weight":4},{"event_id":7137,"event_guid":"a2165fcc-571a-5128-87e0-335ca4b279a2","weight":7},{"event_id":7138,"event_guid":"616abe87-ec1b-5ac0-af77-9162a5630f80","weight":4},{"event_id":7140,"event_guid":"2fe507c8-3ad5-56ec-8b9c-87485877ce09","weight":1},{"event_id":7142,"event_guid":"33728e28-3031-59ad-88e6-3a38369c1cd3","weight":6},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":7},{"event_id":7144,"event_guid":"0497df23-618b-5678-b69b-27c583e43bf0","weight":7},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":4},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":9},{"event_id":7148,"event_guid":"8441d9d7-059e-5e58-9e4d-82b4540b500d","weight":5},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":8},{"event_id":7152,"event_guid":"7b1dd85b-e0b4-5626-8ee5-bf8c23951562","weight":7},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":8},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":6},{"event_id":7161,"event_guid":"078a2d38-1bb1-5bc4-8194-83892f3b11a0","weight":6}]},{"guid":"5f0f75c1-2e0f-5374-898b-40a00b85ce14","title":"Plain Text: Die unerträgliche Leichtigkeit des Seins","subtitle":null,"slug":"gpn19-126-plain-text-die-unertrgliche-leichtigkeit-des-seins","link":"https://pretalx.entropia.de/gpn19/talk/WNUWVT/","description":"Hacker lieben ihre Editoren und Shells und möchten sie am liebsten nie verlassen. Wie sie trotzdem ohne Browser und Office-Suite, nur mit einem Text-Editor bewaffnet, ihre Kalender pflegen, Todo-Listen verwalten, und Rechnungen schreiben können, soll in diesem Talk beleuchtet werden.","original_language":"deu","persons":["rohieb"],"tags":["gpn19","126","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":938,"promoted":false,"date":"2019-06-01T00:00:00.000+02:00","release_date":"2019-06-01T02:00:00.000+02:00","updated_at":"2026-04-07T16:00:04.953+02:00","length":3289,"duration":3289,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/126-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/126-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/126-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/126-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-126-plain-text-die-unertrgliche-leichtigkeit-des-seins","url":"https://api.media.ccc.de/public/events/5f0f75c1-2e0f-5374-898b-40a00b85ce14","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":41},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":28},{"event_id":7120,"event_guid":"911f8286-875e-50a9-a298-2c8ffbe06fa7","weight":8},{"event_id":7122,"event_guid":"e7a9b17e-3644-5cf2-9356-d38ad0a3e1da","weight":29},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":50},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":44},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":34},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":27},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":54},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":47},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":62},{"event_id":7151,"event_guid":"822892f3-a720-5a46-b933-2eb5524f6f28","weight":31},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":38},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":45}]},{"guid":"e5435c9d-3e16-5419-b326-391df1522988","title":"Beyond Monitoring","subtitle":null,"slug":"gpn19-74-beyond-monitoring","link":"https://pretalx.entropia.de/gpn19/talk/UQ3HSD/","description":"Mit welchem System ihr eure Services und Geräte überwacht ist egal, solange die Alarme ankommen. Aber was sollten wir eigentlich alarmieren? Und viel wichtiger: Wie gehen wir mit dem Alarm oder gar einem großen Incident um?\n\nWir beschäftigen uns mit Fragen wie:\n- Woher weiß meine Monitoring-Software überhaupt was sie überwachen soll?\n- Nur Blackbox oder nur Whitebox Monitoring?\n- Wer darf Alarme anlegen/ändern?\n- Was ist ein guter Alarm?\n- Brauche ich dashboards?\n- Was passiert wenn es knallt? Wie gehe ich mit dem Alarm um? Wie wird ein Incident aufgearbeitet?","original_language":"deu","persons":["momo"],"tags":["gpn19","74","GPN","gpn19","Gulasch","Programmier","Nacht","Karlsruhe","Error","Entropia"],"view_count":1738,"promoted":false,"date":"2019-05-31T00:00:00.000+02:00","release_date":"2019-05-31T02:00:00.000+02:00","updated_at":"2026-02-09T14:00:08.251+01:00","length":2293,"duration":2293,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn19/74-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn19/74-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn19/74-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn19/74-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn19-74-beyond-monitoring","url":"https://api.media.ccc.de/public/events/e5435c9d-3e16-5419-b326-391df1522988","conference_title":"Gulaschprogrammiernacht 19","conference_url":"https://api.media.ccc.de/public/conferences/gpn19","related":[{"event_id":7095,"event_guid":"9e0c19c0-935b-5f08-9fbe-a9daaebbc2c6","weight":67},{"event_id":7099,"event_guid":"756ad06c-d1f8-5867-acc6-eafb5eea3b90","weight":10},{"event_id":7102,"event_guid":"045f855d-1bd3-5c93-b9f3-74c5347f4ce8","weight":37},{"event_id":7107,"event_guid":"cc51f8c3-b9c8-5383-aec5-e4c0735bfc62","weight":9},{"event_id":7110,"event_guid":"3e7f1444-b72c-594f-b033-d96b21c1961c","weight":112},{"event_id":7112,"event_guid":"3d00e8e0-4193-5e3a-bea4-ac3dbb32ce31","weight":27},{"event_id":7124,"event_guid":"4ad50a8c-38de-5023-9cde-06b1620303b2","weight":35},{"event_id":7130,"event_guid":"7bf66344-5900-5a5e-8657-8e1d20be92f5","weight":114},{"event_id":7133,"event_guid":"65da5605-4c79-57cc-8114-ab413d97189f","weight":39},{"event_id":7134,"event_guid":"8f035c60-97b4-53f1-b2de-32e65f6f2844","weight":29},{"event_id":7135,"event_guid":"d810803b-cf2f-5756-9571-c15373f50fa8","weight":34},{"event_id":7143,"event_guid":"95fb5f56-4e01-5a6f-8fcd-cd6a235c08e0","weight":77},{"event_id":7146,"event_guid":"da767a60-2f04-511e-bcc8-9cb136de77f7","weight":63},{"event_id":7147,"event_guid":"5fe8bbbe-116b-5d42-ad17-90208755ce30","weight":88},{"event_id":7153,"event_guid":"e809e177-1a90-53f1-bf93-1f0aeb4c7caf","weight":42},{"event_id":7158,"event_guid":"64e6fe15-bbdd-5b85-b28f-b1f77d83ee11","weight":72}]}]}