{"acronym":"gpn20","aspect_ratio":"16:9","updated_at":"2026-04-03T20:30:06.450+02:00","title":"Gulaschprogrammiernacht 20","schedule_url":"","slug":"conferences/gpn/gpn20","event_last_released_at":"2022-05-22T00:00:00.000+02:00","link":"https://entropia.de/GPN20","description":"Hacken, Gulasch, Vorträge, Cloud, Tschunk, Workshops, Lounge, Mate, Spaß am Gerät.","webgen_location":"conferences/gpn/gpn20","logo_url":"https://static.media.ccc.de/media/events/gpn/gpn20/logo.png","images_url":"https://static.media.ccc.de/media/events/gpn/gpn20","recordings_url":"https://cdn.media.ccc.de/events/gpn/gpn20","url":"https://api.media.ccc.de/public/conferences/gpn20","events":[{"guid":"42cd6de5-6cd7-5987-a7f7-aa4957c10958","title":"Elektrische Sicherheit für Hacker","subtitle":null,"slug":"gpn20-37-elektrische-sicherheit-fr-hacker","link":"https://cfp.gulas.ch/gpn20/talk/3XH7UG/","description":"Sicherheit von elektrischen Installationen und Anlagen\n\nElektrotechnik ist Sicherheitstechnik.\nOb am Arbeitsplatz, im Hackerspace, zu Hause oder auf Reisen - oft sind wir mit teils „kreativen“ elektrischen Installationen konfrontiert.\nIn diesem Talk geht es hauptsächlich um die elektrische Sicherheit von Anlagen und Installationen:\n- was müssen wir beim Installieren/ Erweitern beachten\n- physiologische Auswirkungen von Strom\n- rechtliche Grundlagen und Normen\n- Beispiele aus der Praxis eines Prüfers","original_language":"deu","persons":["Kevin Heneka"],"tags":["gpn20","37","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":906,"promoted":false,"date":"2022-05-20T17:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-01-23T11:00:11.814+01:00","length":3559,"duration":3559,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/37-42cd6de5-6cd7-5987-a7f7-aa4957c10958.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-37-elektrische-sicherheit-fr-hacker","url":"https://api.media.ccc.de/public/events/42cd6de5-6cd7-5987-a7f7-aa4957c10958","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"2e2663fa-b898-5c63-badf-e4ca371dedae","title":"Schweißen, down the rabbit hole","subtitle":null,"slug":"gpn20-29-schweien-down-the-rabbit-hole","link":"https://cfp.gulas.ch/gpn20/talk/WXNW7T/","description":"Schweißen aus Nerdsicht. Basics, Metallurgie und worin man sonst noch abtauchen kann.\n\nAus dem \"ich brate mir einen\" ist im Laufe der Zeit ein \"Oh, das ist komplexer als gedacht\". Je tiefer es in diesen Kaninchenbau hinab geht, desto spannender wird das Ganze.","original_language":"deu","persons":["Sarah"],"tags":["gpn20","29","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":511,"promoted":false,"date":"2022-05-21T14:00:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-03-11T00:15:08.334+01:00","length":3598,"duration":3598,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/29-2e2663fa-b898-5c63-badf-e4ca371dedae.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/29-2e2663fa-b898-5c63-badf-e4ca371dedae_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/29-2e2663fa-b898-5c63-badf-e4ca371dedae.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/29-2e2663fa-b898-5c63-badf-e4ca371dedae.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-29-schweien-down-the-rabbit-hole","url":"https://api.media.ccc.de/public/events/2e2663fa-b898-5c63-badf-e4ca371dedae","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"797d9bbd-bd63-5efe-ab2c-de91f035b4a0","title":"Gender Diversity in der Elektrotechnik - Die bunte Welt der Steckverbinder","subtitle":null,"slug":"gpn20-53-gender-diversity-in-der-elektrotechnik-die-bunte-welt-der-steckverbinder","link":"https://cfp.gulas.ch/gpn20/talk/Q8CWJM/","description":"Steckverbinder gibt es nur in weiblich und männlich, oder? Genauso wie  die echte Welt viel bunter ist, gibt es auch in der Verbindungstechnik unzählige Arten und Weisen, wie Energie oder Daten jenseits der üblichen Heteronormativität übertragen werden können. Und hinter den mechanischen Lösungen verbergen sich sehr oft interessante Probleme und Anwendungen.\n\nElektrische Verbindungstechnik ist in unserer Welt so omnipräsent, dass man sie oft als gegeben hinnimmt und gar nicht genauer fragt, warum Steckverbinder eigentlich so funktionieren, wie sie das tun. Heteronormativ, male \u003c\u003e female. Welche Grundkonzepte gibt es, und was sind die Ideen dahinter?\n\nDoch das eigentlich Spannende sind ja die Dinge, die seltener vertreten sind, vor allem in einem Feld, in dem viel genormt ist und noch mehr nur als 'Industriestandard' existiert. Und so sind die interessantesten Steckverbinder oft die, die nicht in die üblichen Kategorien passen, warum auch immer.\n\nUnd natürlich dürfen die schönsten Steckverbinder-Anekdoten auch nicht fehlen, genauso wenig wie der HDMI auf Gardena Adapter.","original_language":"deu","persons":["bazjo"],"tags":["gpn20","53","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":653,"promoted":false,"date":"2022-05-21T22:45:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-04-02T23:00:06.157+02:00","length":3045,"duration":3045,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/53-797d9bbd-bd63-5efe-ab2c-de91f035b4a0.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/53-797d9bbd-bd63-5efe-ab2c-de91f035b4a0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/53-797d9bbd-bd63-5efe-ab2c-de91f035b4a0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/53-797d9bbd-bd63-5efe-ab2c-de91f035b4a0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-53-gender-diversity-in-der-elektrotechnik-die-bunte-welt-der-steckverbinder","url":"https://api.media.ccc.de/public/events/797d9bbd-bd63-5efe-ab2c-de91f035b4a0","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"e09b645b-e34d-5a84-9e84-70ca126d8661","title":"Automating Cookie Consent and GDPR Violation Detection","subtitle":null,"slug":"gpn20-49-automating-cookie-consent-and-gdpr-violation-detection","link":"https://cfp.gulas.ch/gpn20/talk/EDN8N9/","description":"The European Union’s General Data Protection Regulation (*GDPR*) requires websites to inform users about personal data collection and request consent for cookies. Yet the majority of websites do not give users any choices, and others attempt to deceive them into accepting all cookies. We document the severity of this situation through an analysis of potential GDPR violations in cookie banners in almost 30k websites. We identify six novel violation types, such as incorrect category assignments and misleading expiration times, and we find at least one potential violation in a surprising 94.7% of the analyzed websites.\n\nWe address this issue by giving users the power to protect their privacy. We develop a browser extension, called CookieBlock, that uses machine learning to enforce GDPR cookie consent at the client. It automatically categorizes cookies by usage purpose using only the information provided in the cookie itself. At a mean validation accuracy of 84.4%, our model attains a prediction quality competitive with expert knowledge in the field. Additionally, our approach differs from prior work by not relying on the cooperation of websites themselves. We empirically evaluate CookieBlock on a set of 100 randomly sampled websites, on which it filters roughly 90% of the privacy-invasive cookies without significantly impairing website functionality.","original_language":"eng","persons":["Karel Kubicek"],"tags":["gpn20","49","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":217,"promoted":false,"date":"2022-05-20T16:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-22T12:30:06.138+01:00","length":3509,"duration":3509,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/49-e09b645b-e34d-5a84-9e84-70ca126d8661.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/49-e09b645b-e34d-5a84-9e84-70ca126d8661_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/49-e09b645b-e34d-5a84-9e84-70ca126d8661.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/49-e09b645b-e34d-5a84-9e84-70ca126d8661.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-49-automating-cookie-consent-and-gdpr-violation-detection","url":"https://api.media.ccc.de/public/events/e09b645b-e34d-5a84-9e84-70ca126d8661","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"949c77cb-3db7-580c-b254-64afa485ea05","title":"Lightning Talks - Day 1","subtitle":null,"slug":"gpn20-95-lightning-talks-day-1","link":"https://cfp.gulas.ch/gpn20/talk/BDJ9RV/","description":"A 60min lightning talk session","original_language":"deu","persons":[],"tags":["gpn20","95","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":246,"promoted":false,"date":"2022-05-19T20:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-19T09:45:06.301+01:00","length":3710,"duration":3710,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/95-949c77cb-3db7-580c-b254-64afa485ea05.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/95-949c77cb-3db7-580c-b254-64afa485ea05_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/95-949c77cb-3db7-580c-b254-64afa485ea05.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/95-949c77cb-3db7-580c-b254-64afa485ea05.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-95-lightning-talks-day-1","url":"https://api.media.ccc.de/public/events/949c77cb-3db7-580c-b254-64afa485ea05","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"b152597e-cbf6-5e93-b6e9-12f05a186fca","title":"Lattice Attacks on Ethereum, Bitcoin, and HTTPS","subtitle":null,"slug":"gpn20-66-lattice-attacks-on-ethereum-bitcoin-and-https","link":"https://cfp.gulas.ch/gpn20/talk/YPWBLP/","description":"The ECDSA signature scheme, which is used in Bitcoin, Ethereum and others, requires a fresh secret number, the 'nonce', for each signature. When this number is not generated uniformly at random, the security of the signature is in danger, and the private key may be recovered from the signatures, using a lattice-based algorithm.\n\nIn this talk, we have a brief look at the math behind elliptic curve signatures and how to break the encryption when the “random nonce” isn't really random. Nadia Heninger and Joachim Breitner ran ran these attacks against some blockchains and not only found vulnerable implementations, but could even find traces of bad programming by malicious parties out there.\n\nThe talk has some brief section of serious math (lattice reduction), but the rest is accessible and hopefully entertaining to all.","original_language":"eng","persons":["Joachim Breitner"],"tags":["gpn20","66","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":439,"promoted":false,"date":"2022-05-20T20:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-04-03T14:45:07.507+02:00","length":1863,"duration":1863,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/66-b152597e-cbf6-5e93-b6e9-12f05a186fca.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/66-b152597e-cbf6-5e93-b6e9-12f05a186fca_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/66-b152597e-cbf6-5e93-b6e9-12f05a186fca.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/66-b152597e-cbf6-5e93-b6e9-12f05a186fca.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-66-lattice-attacks-on-ethereum-bitcoin-and-https","url":"https://api.media.ccc.de/public/events/b152597e-cbf6-5e93-b6e9-12f05a186fca","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"1bc6cdef-d6b8-5829-877c-0e45558085f1","title":"Die Softwarekrise v4.0","subtitle":null,"slug":"gpn20-78-die-softwarekrise-v4-0","link":"https://cfp.gulas.ch/gpn20/talk/LCVWDU/","description":"Die Softwarekrise v4.0\n\n\nSeit Mitte der 1960er Jahre wird über \"Softwarekrisen\" unterschiedlicher Ursachen, Auswirkungen und Erscheinungsformen berichtet und diskutiert.\nNach einer gängigen Zählung steht nun die 4. Iteration dieses alten Problems auf der Tagesordnung.\n\nSeit Mitte der 1960er Jahre wird über \"Softwarekrisen\" unterschiedlicher Ursachen, Auswirkungen und Erscheinungsformen berichtet und diskutiert. Die ersten Phasen bzw. Iterationen sind gut verstanden und Bestandteil von Lehrveranstaltungen. Es handelt sich um feststehende Begriffe im Software Engineering.\n\nDerzeit wird, je nach Lesart, die dritte Krise abgearbeitet, die sich gegenwärtig in immer langwierigeren, teuereren und im Ergebnis unter den Erwartungen bleibenden Softwareprojekten ausdrückt.\n\nWas kommt danach? Damit beschäftigen sich nicht nur Informatiker, Softwarepraktiker und Betriebswirte in Konzernen, sondern es geschieht auch Begleitforschung aus anderen Disziplinen.\n\nDieser kurze Talk will kurz erklären, was die Technikphilosophie möglicherweise beizutragen haben könnte und wie dort der Stand der Dinge ist und was man unter Version 4.0 der \"Softwarekrise\" zu verstehen hätte.\n\nDer Talk richtet sich nicht nur an Systems Engineers, sondern an die interessierte Hackeröffentlichkeit. Mit den Mitteln der Technikphilosophie wird versucht werden, ohne Schwadronieren die grundsätzlichen Probleme zu formulieren und Denkanstöße zu geben, insbesondere dazu worauf man sich vorzubereiten hat wenn man in der Zukunft Managementverantwortung in der Softwareerstellung hat.\n\nEs gibt ein wenig Zeit für Diskussion und Nachfragen.","original_language":"deu","persons":["Stephan Ajuvo"],"tags":["gpn20","78","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":551,"promoted":false,"date":"2022-05-20T12:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2025-09-23T19:45:04.532+02:00","length":1741,"duration":1741,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/78-1bc6cdef-d6b8-5829-877c-0e45558085f1.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/78-1bc6cdef-d6b8-5829-877c-0e45558085f1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/78-1bc6cdef-d6b8-5829-877c-0e45558085f1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/78-1bc6cdef-d6b8-5829-877c-0e45558085f1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-78-die-softwarekrise-v4-0","url":"https://api.media.ccc.de/public/events/1bc6cdef-d6b8-5829-877c-0e45558085f1","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"91acab21-bebe-5ec5-8442-85b701aaef66","title":"Come to the dark side, they have cookies","subtitle":"How dark patterns manipulate users to do things they don’t want to","slug":"gpn20-5-come-to-the-dark-side-they-have-cookies-how-dark-patterns-manipulate-users-to-do-things-they-don-t-want-to","link":"https://cfp.gulas.ch/gpn20/talk/NVSH7V/","description":"Everyone knows these annoying cookie \"consent\" banners, subscriptions that are way easier to sign up for then to cancel and general \"bad\" UX design that seems to stop you from getting where you want. In this talk I want to explain how this works, show some especially bad examples and talk a bit about why this is even worse than you might think\r\n\r\nThis talk is a bit of a \"reboot\" of my [talk at 2021s Divoc](https://media.ccc.de/v/divoc-reboot-to-respawn-2021-2-dark-patterns-what-they-are-and-what-having-to-implement-them-says-about-your-job). It’s gonna be created from the ground up and adding some more things while also reiterating on some of the things I said a year ago.\r\n\r\nWhile I will talk about the technical aspects of these dark patterns, I also want to focus on the social implications on both users and developers.","original_language":"eng","persons":["dysphoricUnicorn"],"tags":["gpn20","5","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":309,"promoted":false,"date":"2022-05-20T12:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-01-19T11:15:25.090+01:00","length":1718,"duration":1718,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/5-91acab21-bebe-5ec5-8442-85b701aaef66.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/5-91acab21-bebe-5ec5-8442-85b701aaef66_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/5-91acab21-bebe-5ec5-8442-85b701aaef66.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/5-91acab21-bebe-5ec5-8442-85b701aaef66.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-5-come-to-the-dark-side-they-have-cookies-how-dark-patterns-manipulate-users-to-do-things-they-don-t-want-to","url":"https://api.media.ccc.de/public/events/91acab21-bebe-5ec5-8442-85b701aaef66","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"1bb40b7c-ff94-5b88-a611-551fd11b735a","title":"The LCH, CMS and the future of high energy Physics (and why we would like your help)","subtitle":null,"slug":"gpn20-86-the-lch-cms-and-the-future-of-high-energy-physics-and-why-we-would-like-your-help-","link":"https://cfp.gulas.ch/gpn20/talk/XEB3EF/","description":"With the LHC having begun Run 3 and the High-Luminosity upgrades of the accelerator and it’s experiments well underway, it is as important as ever to try and convey the passion and motivation behind this massive endeavour. This talk will try to convey the what, why and how of the hunt for the unknowns of the Universal machinery to the uninitiated. It will try to give an overview of the basics of the (little?) we know and what is still out there and then give a guided tour through this truly magnificent effort focusing on the CMS (Compact Muon Solenoid) detector. It will finish by telling a few stories from the front line of trying to build one of the most ambitious (Sub)Detectors in the history of the LHC for the High luminosity upgrade of the CMS detector.\n\nThe abstract may sound daunting, but rest assured, that is the case for everyone at some point. In this talk I’d like to share the principles and functioning of one of the most complex machines I know of in a way that makes sense. I have had the privilege of working at CERN on the HGCAL subdetector of CMS and was able to gather first hand experience of the many different challenges of building this one of a kind machine that at the end of the day is nothing more than a terribly overengineered photo camera. I hope that I can share my motivation and passion with you and get you stoked for all of what is still to come.","original_language":"deu","persons":["Alexander (Nabla) Becker"],"tags":["gpn20","86","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":109,"promoted":false,"date":"2022-05-21T16:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-12-10T20:45:03.464+01:00","length":3561,"duration":3561,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/86-1bb40b7c-ff94-5b88-a611-551fd11b735a.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/86-1bb40b7c-ff94-5b88-a611-551fd11b735a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/86-1bb40b7c-ff94-5b88-a611-551fd11b735a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/86-1bb40b7c-ff94-5b88-a611-551fd11b735a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-86-the-lch-cms-and-the-future-of-high-energy-physics-and-why-we-would-like-your-help-","url":"https://api.media.ccc.de/public/events/1bb40b7c-ff94-5b88-a611-551fd11b735a","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"cc0edfbb-612a-58ac-a4b4-fdbaf479ff74","title":"\"EU Digital COVID Certificate\" - Keine schwarze Magie","subtitle":null,"slug":"gpn20-10--eu-digital-covid-certificate-keine-schwarze-magie","link":"https://cfp.gulas.ch/gpn20/talk/SN8Y8Z/","description":"Glaubt mensch der öffentlichen und politischen Kommunikation rund um das \"EU Convid Certificate\" aka. den \"Green Pass\", wie er in der Politik gerne genannt wird, so könnte mensch den Eindruck gewinnen, dass es sich dabei um schwarze Magie handelt, die niemand verstehen kann.\n\nIn diesem Talk möchte ich aufzeigen, wie elegant das \"EU Digital COVID Certificate\" eigentlich entworfen wurde, dass die Technologie dahinter eigentlich sehr einfach zu verstehen ist, die Limitation (zusätzlicher Ausweis notwendig, ...) nachvollziehbar sind und warum die Wahl des Begriffs \"Grüner Pass\" dafür der größte Fehler der PolitikerInnen in \"EU Digital COVID Certificate\" - Keine schwarze Magieder Kommunikation war.\n\nZielpublikum für diesen Talk sind Personen mit dem IT Wissen auf Niveau des ECDL (European Computer Driving Licence) oder gleichwertig. Wenn Du einen Computer einschalten und im Web surfen kannst, bist Du hier also richtig. ;)","original_language":"deu","persons":["Leyrer"],"tags":["gpn20","10","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":428,"promoted":false,"date":"2022-05-20T14:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-10T18:00:09.368+01:00","length":3265,"duration":3265,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/10-cc0edfbb-612a-58ac-a4b4-fdbaf479ff74.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/10-cc0edfbb-612a-58ac-a4b4-fdbaf479ff74_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/10-cc0edfbb-612a-58ac-a4b4-fdbaf479ff74.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/10-cc0edfbb-612a-58ac-a4b4-fdbaf479ff74.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-10--eu-digital-covid-certificate-keine-schwarze-magie","url":"https://api.media.ccc.de/public/events/cc0edfbb-612a-58ac-a4b4-fdbaf479ff74","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"36ce364b-9166-56b8-bd49-7c3bb0ae0cca","title":"Breaking things with emoji 💥","subtitle":null,"slug":"gpn20-6-breaking-things-with-emoji-","link":"https://cfp.gulas.ch/gpn20/talk/LLVMZV/","description":"Are you the kind of person who, when given a personalized link with some number in it, will always try out different numbers to see if things are secured?  \nDo you enjoy exposing security mishaps and edge cases that weren’t thought off by developers, not for profit but for the simple fun of it?  \nIf that describes you, I’ve got another thing you could try to feed your curiosity: putting emoji where they don’t belong.   \nIt‘s gonna break more stuff than you’d think.🏳️‍⚧️\n\nIn early 2021, I started experimenting with emoji domains: something that wasn’t really intended and is a consequence of a way to include non Roman letters in domain names.\n\nIt was pretty broken and just fun to do.  \nThe fact that not much software seems to handle emoji domains properly motivated me to try putting regular emoji in spaces where they don’t belong.  \nThe results were pretty funny, if you share my screwed up sense of humor.\n\nIn this talk I want to share some of my \"findings\", adding to the things I already spoke about [at last year’s divoc](https://media.ccc.de/v/divoc-reboot-to-respawn-2021-1-emoji-domains-and-how-wonderfully-broken-they-are).","original_language":"eng","persons":["dysphoricUnicorn"],"tags":["gpn20","6","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":1617,"promoted":false,"date":"2022-05-19T18:15:00.000+02:00","release_date":"2022-05-19T00:00:00.000+02:00","updated_at":"2026-03-31T15:00:09.424+02:00","length":1689,"duration":1689,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/6-36ce364b-9166-56b8-bd49-7c3bb0ae0cca.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/6-36ce364b-9166-56b8-bd49-7c3bb0ae0cca_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/6-36ce364b-9166-56b8-bd49-7c3bb0ae0cca.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/6-36ce364b-9166-56b8-bd49-7c3bb0ae0cca.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-6-breaking-things-with-emoji-","url":"https://api.media.ccc.de/public/events/36ce364b-9166-56b8-bd49-7c3bb0ae0cca","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"f4225b7b-2d9b-5ed8-b090-28e81f5f44aa","title":"Running personal infrastructure on Kubernetes","subtitle":null,"slug":"gpn20-7-running-personal-infrastructure-on-kubernetes","link":"https://cfp.gulas.ch/gpn20/talk/QNVWV9/","description":"In summer 2021 I migrated my personal infra from a simple docker-compose based host to my very own Kubernetes cluster.  \nWhy? Because I wanted to.  \nOther people made sourdough, I made overengineered infrastructure.\n\nIn this talk I‘m gonna be explaining how I did it, what difficulties I faced and answer the question if it even was a good idea and if others should do this as well.\n\nKubernetes is about as enterprise as software can get, while also not steering into the terrible NDA plagued environment that most enterprise solutions seem to be living in.\n\nIt has a large and very welcoming community, who will happily help newcomers out.\n\nSeems like a pretty great place to start if you want to learn more about cloud hosting and enterprise stuff in general.\n\nWell, that’s what I did.  \nIn my dayjob, I don’t do much infrastructure related tasks. I‘m mostly a frontend developer and while I knew my way around a docker environment, I knew that if I wanted to do more infra stuff, I’d have a lot to learn.\n\nOver the course of a month, I set up a testing cluster on a couple of VMs at home, migrated all of my applications to work on that, and deployed on my own public production cluster.  \nThis whole process was really fun and I learned a lot, however it also was not entirely without tears.\n\nMore than a year later, everything is still running without any major outages or security incidents.\n\n[insert funny Star Trek enterprise joke somewhere in here]","original_language":"eng","persons":["dysphoricUnicorn"],"tags":["gpn20","7","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":501,"promoted":false,"date":"2022-05-21T17:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-07-21T19:30:05.486+02:00","length":1557,"duration":1557,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/7-f4225b7b-2d9b-5ed8-b090-28e81f5f44aa.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/7-f4225b7b-2d9b-5ed8-b090-28e81f5f44aa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/7-f4225b7b-2d9b-5ed8-b090-28e81f5f44aa.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/7-f4225b7b-2d9b-5ed8-b090-28e81f5f44aa.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-7-running-personal-infrastructure-on-kubernetes","url":"https://api.media.ccc.de/public/events/f4225b7b-2d9b-5ed8-b090-28e81f5f44aa","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"d56448c5-022e-5288-bd24-ada78a765982","title":"Log4Shell - Bug oder Feature","subtitle":null,"slug":"gpn20-60-log4shell-bug-oder-feature","link":"https://cfp.gulas.ch/gpn20/talk/77BCXN/","description":"Um den Jahreswechsel ging ein Aufschrei durch die IT-Abteilungen der Welt, der es bis in die Mainstream-Medien geschafft hat. Noch Wochen später zeigen sich Folgeprobleme in weit verbreiteter Software.\n \nIn Log4j, einer weit verbreiteten Java-Bibliothek wurde eine massive Sicherheitslücke gefunden, die die Ausführung von Schadcode auf einem entfernten System erlaubt.\nIn diesem Vortrag soll rekapitulierend erklärt werden, warum und wann es zu dem Problem kam und welche Auswirkungen bisher erkennbar sind. Ausserdem werden die technischen Details der Schwachstelle erklärt und in einer Live-Demo gezeigt, wie die Schwachstelle ausgenutzt werden kann.","original_language":"deu","persons":["cy"],"tags":["gpn20","60","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":427,"promoted":false,"date":"2022-05-20T21:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-01-24T23:45:11.125+01:00","length":3546,"duration":3546,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/60-d56448c5-022e-5288-bd24-ada78a765982.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/60-d56448c5-022e-5288-bd24-ada78a765982_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/60-d56448c5-022e-5288-bd24-ada78a765982.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/60-d56448c5-022e-5288-bd24-ada78a765982.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-60-log4shell-bug-oder-feature","url":"https://api.media.ccc.de/public/events/d56448c5-022e-5288-bd24-ada78a765982","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"8c75e66c-01ab-5611-af92-b6bcc1250a26","title":"Linux Security Monitoring mit Audit Events: Schmerzen reduzieren","subtitle":null,"slug":"gpn20-23-linux-security-monitoring-mit-audit-events-schmerzen-reduzieren","link":"https://cfp.gulas.ch/gpn20/talk/EM3NJD/","description":"Die Erkennung von Angriffen auf Netzwerke setzt die Arbeit mit hostbasierten Indikatoren voraus, die über das normal übliche \"syslog\"-Maß \"ssh-Login als User U mit Key X\", \"User U wird root\", \"Logout User U\" hinausgehen. Linux Audit Subsystem (\"auditd\") ist geeignet, um feingranulare Events aufzuzeichnen, aber das Format taugt nicht zur Weiterverarbeitung. Ich gehe auf die Probleme des Formats ein, zeige, wie man dieses Problem mit vertretbarem CPU-Overhead gelöst bekommt und was man bei der Gelegenheit noch tun kann, um dem Analysten, der in sein SIEM starrt, die Arbeit zu erleichtern.\n\nNetzwerktraffic im Klartext ist eher zu einer Seltenheit geworden, das ist natürlich gut. Die Kehrseite der Medallie ist, dass für die Erkennung von Angriffen in Unternehmens- und anderen Netzwerken netzwerkbasierte Indikatoren an Bedeutung verloren haben und hostbasierte Indikatoren heute eine größere Rolle spielen. Wir wollen nicht nur schauen sondern sehen, sind aber nicht bereit, dafür auf jedem System eine Horde von Blockchain-AI-EDR-Agenten zu installieren. Also müssen wir etwas fürs Logging tun, und zwar mehr als die üblichen Authentifizierungs- und Autorisierungs-Events.\n\nFür Windows gibt es hierfür das bei SysInternals entwickelte \"Sysmon\", es ist closed source aber kostenlos und kein von Microsoft unterstütztes Produkt. Auf Linux-Systemen haben wir dafür seit 15 Jahren mit dem Audit-Subsystem eine gut funktionierende aber leider schlecht verständliche Quelle der Wahrheit: Das textbasierte Logformat ist für typische SIEM-Systeme zu irregulär und schlecht zu parsen. Unterschiedliche Aspekte eines Events sind auf mehrere Zeilen verteilt; nun sind die üblichen SIEM-Systeme im Kern eher Suchmaschinen und nicht besonders gut darin, JOIN-Operationen auszuführen. Leider ist das alles kaum noch zu ändern, weil die Rohdaten direkt im Kernel-Code erzeugt werden und als Teil einer Kompatibilitätszusage verstanden werden.\n\nBestehende Lösungsansätze ersetzen ohne Not das bestehende auditd-Userland (go-audit, auditbeat),  bringen große Performanceprobleme mit sich (auditbeat, osquery, Skriptsprachen) oder setzen mit eBPF ohne Not auf \"shiny new tech\", ohne daraus einen Erkenntnis- oder Performancegewinn zu ziehen (Sysmon for Linux).\n\nUm die bestehenden Schmerzen zu lindern, ist [LAUREL](https://github.com/threathunters-io/laurel) als _auditd_-Plugin entstanden, das die Events in Echtzeit aufbereitet und in ein SIEM- und Analysten-verträgliches JSONlines-Format kodiert. Dabei kommt LAUREL auch bei hoher Event-Rate mit vertretbarem CPU-Overhead aus.\n\nWar es ursprünglich als reines Umkodierungstool gedacht, fallen nach der ersten produktiven Bewährungsprobe natürlich weitere Use-Cases auf, mit der wir uns z.B. über die Markierung von Prozess-Beziehungen die Arbeit erheblich ereleichtern können, ohne dass aus dem Plugin zur Log-Aufbereitungs gleich ein EDR-Agent mit zu vielen Rechten und Pflichten werden muss.","original_language":"deu","persons":["Hilko Bengen"],"tags":["gpn20","23","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":385,"promoted":false,"date":"2022-05-20T21:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-03-27T19:00:05.365+01:00","length":2689,"duration":2689,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/23-8c75e66c-01ab-5611-af92-b6bcc1250a26.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/23-8c75e66c-01ab-5611-af92-b6bcc1250a26_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/23-8c75e66c-01ab-5611-af92-b6bcc1250a26.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/23-8c75e66c-01ab-5611-af92-b6bcc1250a26.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-23-linux-security-monitoring-mit-audit-events-schmerzen-reduzieren","url":"https://api.media.ccc.de/public/events/8c75e66c-01ab-5611-af92-b6bcc1250a26","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"9cdcf379-7c76-512a-ad8a-6393888545d6","title":"Datenökonomie im Gesundheitsdatenraum - muss das sein?","subtitle":null,"slug":"gpn20-35-datenkonomie-im-gesundheitsdatenraum-muss-das-sein-","link":"https://cfp.gulas.ch/gpn20/talk/QZKCCE/","description":"Datenökonomie im Gesundheitsdatenraum \n\nklingt genauso sexy wie Darmspiegelung im Endoskopieraum – man fragt sich muss das sein?\n\nDatenökonomie findet statt, jetzt. Allerdings noch sehr begrenzt. Als Arzt interessiert mich natürlich besonders der Gesundheitsdatenraum. Gegenwärtig stehen Medienbrüche, inkompatible Datenformate, fehlende digitale Akzeptanz der Datenweitergabe im Gesundheitswesen im Wege. \nDas soll sich ändern. \n2020 veröffentlichte die EU-Kommission ein Strategiepapier zur Datenökonomie: die EU-Datenstrategie (1). Auf 39 Seiten wird dort zur Entwicklung verschiedener Datenräumen in der Datenwirtschaft aufgerufen.\n\nAndrus Ansip, der Vizepräsident der EU-Kommission von 2017 beschreibt: „Es sollte ein freier Datenfluss zwischen Standorten, über Grenzen hinweg und innerhalb eines einheitlichen Datenraumes möglich sein. Wenn unsere Datenwirtschaft Wachstum und Beschäftigung hervorbringen soll, müssen Daten genutzt werden. Dafür müssen sie allerdings verfügbar sein und analysiert werden können.“ \n\nDie Fragen, muss das sein? und brauchen wir wirklich Wachstum?, entsprechen im gegenwärtigen ökonomischen Mainstream in etwa der Frage, muss ich vor der Darmspiegelung ein Abführmittel trinken. Hier gibt es kein Nein! \n\nIn Anbetracht der begrenzten Ressourcen und der Umweltkrise sind andere Fragen allerdings genauso wichtig: Was passiert im Gesundheitsdatenraum? Welche Schutzkonzepte für die Menschen sind vorgesehen? Braucht Datenökonomie im Gesundheitsdatenraum überhaupt Wachstum? Oder ist Datenökonomie vielleicht sogar der Weg, heraus aus dem Wachstum, hinein in eine nachhaltige Degrowth-Ökonomie? \nUnd als Arzt möchte ich noch hinzufügen, dass eine Vorsorgedarmspiegelung sein muss. \nSchauen Sie rein in meinen Talk, hier wird der Gesundheitsdatenraum ganzheitlich behandelt. \n\n(1) https://eur-lex.europa.eu/legal-content/DE/TXT/PDF/?uri=CELEX:52020DC0066\u0026from=DE","original_language":"deu","persons":["Dr. med. Stefan Streit"],"tags":["gpn20","35","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":418,"promoted":false,"date":"2022-05-21T20:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-02-18T21:00:07.942+01:00","length":3634,"duration":3634,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/35-9cdcf379-7c76-512a-ad8a-6393888545d6.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/35-9cdcf379-7c76-512a-ad8a-6393888545d6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/35-9cdcf379-7c76-512a-ad8a-6393888545d6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/35-9cdcf379-7c76-512a-ad8a-6393888545d6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-35-datenkonomie-im-gesundheitsdatenraum-muss-das-sein-","url":"https://api.media.ccc.de/public/events/9cdcf379-7c76-512a-ad8a-6393888545d6","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"d86c1288-480d-5abf-94ad-cf96e194cba7","title":"Was ist eigentlich Farbe?","subtitle":null,"slug":"gpn20-92-was-ist-eigentlich-farbe-","link":"https://cfp.gulas.ch/gpn20/talk/VXHVG3/","description":"Wie funktioniert Farbwahrnehmung? Was genau meinen wir, wenn wir \"#ff0000\" sagen? Was sind unmögliche Farben? Und gibt es eigentlich pinkes Licht? All diese Fragen werde ich in diesem Vortrag beantworten! Wir machen eine Reise durch Physik, Biologie und Informatik, die bei diesem Thema auf sehr befriedigende Art und Weise zusammenspielen!","original_language":"deu","persons":["blinry"],"tags":["gpn20","92","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":750,"promoted":false,"date":"2022-05-20T22:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-02-22T07:30:05.612+01:00","length":4153,"duration":4153,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/92-d86c1288-480d-5abf-94ad-cf96e194cba7.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/92-d86c1288-480d-5abf-94ad-cf96e194cba7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/92-d86c1288-480d-5abf-94ad-cf96e194cba7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/92-d86c1288-480d-5abf-94ad-cf96e194cba7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-92-was-ist-eigentlich-farbe-","url":"https://api.media.ccc.de/public/events/d86c1288-480d-5abf-94ad-cf96e194cba7","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"81b64e29-0841-5479-b3d4-0bf19cbd8342","title":"Ich möchte online fliegen: Wie geht das?","subtitle":null,"slug":"gpn20-64-ich-mchte-online-fliegen-wie-geht-das-","link":"https://cfp.gulas.ch/gpn20/talk/BZPSC9/","description":"Flugsimulatoren bieten einem viele Möglichkeiten Dinge zu probieren, die man so nie machen könnte. Richtig faszinierend wird es, wenn man in einem der Online Netzwerken unterwegs ist. Ich möchte euch erzählen, welche Netzwerke es gibt, was man braucht, und was man auf keinen Fall tun sollte.\n\nFliegen ist faszinierend. Große, blechernde Doßen die mit Hilfe von vielen Explosionen, Menschen auf schnellste weiße von A nach B bringen. Die meisten werden die Faszination des Filegens nur als Passagier erleben. Doch wer mehr möchte hat zwei Möglichkeiten: Einen Flugschein machen (teuer) oder einen Simulator installieren (kann auch teuer werden :P).\nNachdem man die Grundlagen des Fliegens raus hat, fragt man sich oft \"Und jetzt?\". Da kommen das Online Fliegen ins Spiel: Auf Realismus getrimmte Netzwerke, mit Ausbildungssystemen, und einer menge neuer Dinge die man erlernen muss.\nFür viele wirkt dies oft einschüchternd, oder wissen nicht wo und wie sie anfangen sollen. Hier möchte ich mit diesem Vortrag helfen. Grob geht es darum\n- Welche Netzwerke gibt es\n- Wie unterscheiden sich diese\n- Wie ist so ein Netzwerk aufgebaut\n- Was brauch ich, um in einem Netzwerk fliegen zu können\n- Was kann ich tun / Was sollte ich nicht machen\n- Wie mache ich meinen ersten Flug","original_language":"deu","persons":["Marvin"],"tags":["gpn20","64","2022","Games","gulaschprogrammiernacht","gpn","entropia"],"view_count":179,"promoted":false,"date":"2022-05-20T20:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-09-15T18:45:06.657+02:00","length":2760,"duration":2760,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/64-81b64e29-0841-5479-b3d4-0bf19cbd8342.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/64-81b64e29-0841-5479-b3d4-0bf19cbd8342_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/64-81b64e29-0841-5479-b3d4-0bf19cbd8342.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/64-81b64e29-0841-5479-b3d4-0bf19cbd8342.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-64-ich-mchte-online-fliegen-wie-geht-das-","url":"https://api.media.ccc.de/public/events/81b64e29-0841-5479-b3d4-0bf19cbd8342","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"fc14eeca-4aa7-5e3e-852f-677b43b93c5c","title":"Understanding Alerting - How to come up with a good enough alerting strategy","subtitle":null,"slug":"gpn20-22-understanding-alerting-how-to-come-up-with-a-good-enough-alerting-strategy","link":"https://cfp.gulas.ch/gpn20/talk/PZVU3V/","description":"Have you ever considered that your incident from last night might actually be something very positive? No? Then you should watch this talk!\nI'm going to introduce you to some concepts in the domain of resiliency engineering and then have a look into how you can build an alerting strategy that doesn't page you unnecessarily at 3am.\nWe will have a look into various topics inside the monitoring and alerting domain and how to connect them to make your monitoring and alerting solution better.\nWe will not talk about particular tools or ready-to-use solutions but rather concepts how you can build a comprehensive system with any tool.","original_language":"eng","persons":["Cedi"],"tags":["gpn20","22","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":438,"promoted":false,"date":"2022-05-20T13:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-02-27T10:15:05.747+01:00","length":1980,"duration":1980,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/22-fc14eeca-4aa7-5e3e-852f-677b43b93c5c.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/22-fc14eeca-4aa7-5e3e-852f-677b43b93c5c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/22-fc14eeca-4aa7-5e3e-852f-677b43b93c5c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/22-fc14eeca-4aa7-5e3e-852f-677b43b93c5c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-22-understanding-alerting-how-to-come-up-with-a-good-enough-alerting-strategy","url":"https://api.media.ccc.de/public/events/fc14eeca-4aa7-5e3e-852f-677b43b93c5c","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"eefd1a87-81a4-5a2c-9984-1730a39310ab","title":"Die unterhaltsamsten österreichischen IT Fails der letzen Jahre und was wir daraus lernen können","subtitle":null,"slug":"gpn20-12-die-unterhaltsamsten-sterreichischen-it-fails-der-letzen-jahre-und-was-wir-daraus-lernen-knnen","link":"https://cfp.gulas.ch/gpn20/talk/8LBVNF/","description":"Die letzten Jahre, und insbesondere das Agieren der Bundes- und Landesregierungen wenn IT Infrastruktur im Umgang mit der Pandemie bzw. deren Auswikrungen benötigt worden wären, haben zu zahlreichen \"interessanten\" Meldungen in den Medien geführt.\nIch möchte in diesem Talk einige der Ereignisse nochmal Revue passieren lassen und aus den Ereignissen und Vorkommnissen auch Handlungsempfehlungen und Grundlagen für weitere Diskussionen zu dem Thema ableiten.\n\nDies ist ein \"bring your own popcorn\" Vortrag.","original_language":"deu","persons":["Leyrer"],"tags":["gpn20","12","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":3927,"promoted":false,"date":"2022-05-19T19:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-04T05:30:02.463+01:00","length":3627,"duration":3627,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/12-eefd1a87-81a4-5a2c-9984-1730a39310ab.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/12-eefd1a87-81a4-5a2c-9984-1730a39310ab_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/12-eefd1a87-81a4-5a2c-9984-1730a39310ab.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/12-eefd1a87-81a4-5a2c-9984-1730a39310ab.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-12-die-unterhaltsamsten-sterreichischen-it-fails-der-letzen-jahre-und-was-wir-daraus-lernen-knnen","url":"https://api.media.ccc.de/public/events/eefd1a87-81a4-5a2c-9984-1730a39310ab","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"b9440040-192b-5d27-9644-de6b01731379","title":"Rückengesundheit für Nerds","subtitle":null,"slug":"gpn20-90-rckengesundheit-fr-nerds","link":"https://cfp.gulas.ch/gpn20/talk/K9XUXV/","description":"In dem Vortrag soll es darum gehen zu erklären und vereinfacht darzustellen wie der die Wirbelsäule und die umliegende Muskulatur aufgebaut ist wie diese zusammen arbeitet und wie es letztendlich zu Rückenschmerzen kommt.\nWie man mit Rückenschmerzen umgeht sie vorbeugt oder selbst lindern kann.","original_language":"deu","persons":["Robin Dunn"],"tags":["gpn20","90","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":2915,"promoted":false,"date":"2022-05-21T12:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-03-23T18:30:08.289+01:00","length":3627,"duration":3627,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/90-b9440040-192b-5d27-9644-de6b01731379.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/90-b9440040-192b-5d27-9644-de6b01731379_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/90-b9440040-192b-5d27-9644-de6b01731379.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/90-b9440040-192b-5d27-9644-de6b01731379.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-90-rckengesundheit-fr-nerds","url":"https://api.media.ccc.de/public/events/b9440040-192b-5d27-9644-de6b01731379","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"2784103f-85b2-57ea-888c-e0aeb88f5772","title":"0x5f3759df - ein WTF für mehr FPS","subtitle":null,"slug":"gpn20-91-0x5f3759df-ein-wtf-fr-mehr-fps","link":"https://cfp.gulas.ch/gpn20/talk/DJHG7X/","description":"Im Source von Quake III Arena von 1999 findet sich ein auf den ersten Blick kurioser Algorithmus \u003ctt\u003eQ_rsqrt\u003c/tt\u003e mit \"\u003ci\u003eevil floating point bit level hacking\u003c/i\u003e\" zur schnellen und genauen Berechnung des Kehrwerts von Quadratwurzeln, der ein Grund für die schnelle Grafik des Spiels ist. Was für Prinzipien stecken hinter der Konstruktion des Verfahrens, und warum ist die Idee des Algorithmus über 20 Jahre später immer noch relevant?\n\nhttps://github.com/id-Software/Quake-III-Arena/blob/master/code/game/q_math.c\n\n\t/* Copyright (C) 1999-2005 Id Software, Inc., GPLv2 */\n\t     \n\tfloat Q_rsqrt( float number )\n\t{\n\t\tlong i;\n\t\tfloat x2, y;\n\t\tconst float threehalfs = 1.5F;\n\n\t\tx2 = number * 0.5F;\n\t\ty  = number;\n\t\ti  = * ( long * ) \u0026y;\t\t\t\t\t\t// evil floating point bit level hacking\n\t\ti  = 0x5f3759df - ( i \u003e\u003e 1 );               // what the fuck?\n\t\ty  = * ( float * ) \u0026i;\n\t\ty  = y * ( threehalfs - ( x2 * y * y ) );   // 1st iteration\n\t //\ty  = y * ( threehalfs - ( x2 * y * y ) );   // 2nd iteration, this can be removed\n\t\n\t\treturn y;\n\t}","original_language":"deu","persons":["Sebastian Ritterbusch"],"tags":["gpn20","91","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":467,"promoted":false,"date":"2022-05-20T16:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-31T15:45:06.610+02:00","length":3297,"duration":3297,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/91-2784103f-85b2-57ea-888c-e0aeb88f5772.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/91-2784103f-85b2-57ea-888c-e0aeb88f5772_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/91-2784103f-85b2-57ea-888c-e0aeb88f5772.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/91-2784103f-85b2-57ea-888c-e0aeb88f5772.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-91-0x5f3759df-ein-wtf-fr-mehr-fps","url":"https://api.media.ccc.de/public/events/2784103f-85b2-57ea-888c-e0aeb88f5772","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"f5d2d128-ab78-56bf-ad6d-47df7e54cf7f","title":"Geschichte des Presserechts","subtitle":null,"slug":"gpn20-81-geschichte-des-presserechts","link":"https://cfp.gulas.ch/gpn20/talk/URDD8C/","description":"Kulturgeschichtlicher Vortrag über Entwicklung der Pressefreiheit als Vorraussetzung für eine funktionierende Demokratie\n\nIn Spätantike und Mittelalter lähmte die Zensur den kulturellen Fortschritt. Die Erfindung des Buchdrucks vervielfachte Informationen sowie unterschiedliche Meinungen, was Staat und Kirche alsbald einhegten. Im Zeitalter der Aufklärung erkannte man Pressefreiheit als Voraussetzung der Demokratie, nach der Französischen Revolution garantierte man sie als Menschenrecht, in Deutschland wurde sie erstmals im Kaiserreich Gesetz. Der scharfen politischen Presse der Weimarer Republik folgte die totalitäre Medienkontrolle der Nazis. Die Erfahrungen mit Monopol und Missbrauch von Medienmacht prägten das deutsche Presse- und Rundfunkrecht. Aus dem Grundrecht der Menschenwürde leitete man Persönlichkeitsrechte her, die dem Individuum Ansprüche gegen Rufmord gewähren.","original_language":"deu","persons":["Markus Kompa"],"tags":["gpn20","81","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":94,"promoted":false,"date":"2022-05-21T12:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2024-11-13T18:15:03.267+01:00","length":3338,"duration":3338,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/81-f5d2d128-ab78-56bf-ad6d-47df7e54cf7f.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/81-f5d2d128-ab78-56bf-ad6d-47df7e54cf7f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/81-f5d2d128-ab78-56bf-ad6d-47df7e54cf7f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/81-f5d2d128-ab78-56bf-ad6d-47df7e54cf7f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-81-geschichte-des-presserechts","url":"https://api.media.ccc.de/public/events/f5d2d128-ab78-56bf-ad6d-47df7e54cf7f","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f","title":"PoC: Implementing evil maid attack on encrypted /boot","subtitle":null,"slug":"gpn20-32-poc-implementing-evil-maid-attack-on-encrypted-boot","link":"https://cfp.gulas.ch/gpn20/talk/YTTQ7Q/","description":"Even if you use full disk encryption, there is still unencrypted code on the disk that asks you for the password. An evil maid attack is an attack on an unattended device, in which an attacker with physical access can backdoor the bootloader to grab the full disk encryption password. \n\nThis attack is easy to perform if the target uses an unencrypted boot partition. GRUB2 also supports encrypted boot partitions, where stage 1.5 of the bootloader decrypts the boot partition. Conceptual, evil maid attack is still possible, but it's harder to implement. I couldn't find a public exploit, so I wrote my own.\n\nIn this talk, I will explain the Linux boot process and the process of backdooring GRUB2 to get the full disk encryption password. The talk only covers Linux and GRUB2. There will be some slides, but most of the time you will see my terminal and some python code.","original_language":"eng","persons":["kmille"],"tags":["gpn20","32","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":357,"promoted":false,"date":"2022-05-19T22:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-25T08:15:04.305+01:00","length":2030,"duration":2030,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/32-ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/32-ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/32-ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/32-ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-32-poc-implementing-evil-maid-attack-on-encrypted-boot","url":"https://api.media.ccc.de/public/events/ee3737d9-3232-56e7-8cad-7e4cbcfb4d4f","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"cc176824-c1d9-5b48-9683-7bd31b8268e0","title":"Auctioning computational resources","subtitle":null,"slug":"gpn20-58-auctioning-computational-resources","link":"https://cfp.gulas.ch/gpn20/talk/KRSXCZ/","description":"The speaker is neither an economist nor a professional sysadmin. Still, he likes to invite to a thought experiment on alternative payment/organization schemes for computational resources \"in the cloud\". Could such schemes help regulate or reduce the load in data centers? Could they help keeping the power grid stable?","original_language":"eng","persons":["neithernut"],"tags":["gpn20","58","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":58,"promoted":false,"date":"2022-05-21T18:30:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2024-12-24T04:45:03.318+01:00","length":1335,"duration":1335,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/58-cc176824-c1d9-5b48-9683-7bd31b8268e0.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/58-cc176824-c1d9-5b48-9683-7bd31b8268e0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/58-cc176824-c1d9-5b48-9683-7bd31b8268e0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/58-cc176824-c1d9-5b48-9683-7bd31b8268e0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-58-auctioning-computational-resources","url":"https://api.media.ccc.de/public/events/cc176824-c1d9-5b48-9683-7bd31b8268e0","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"16d27b67-aec0-5c15-97d0-81f1c7201a17","title":"Saubere Luft","subtitle":null,"slug":"gpn20-72-saubere-luft","link":"https://cfp.gulas.ch/gpn20/talk/UVTFCS/","description":"3D-Druck für mobile Luftfilter, schwedische Feinstaubmesser und Simulationen\n\nLuftfilter können nicht nur helfen Infektionen zu vermeiden, sondern dezimieren auch Feinstaub und die Pollenbelastung und reduzieren Lötdämpfe. Ein parametrisiertes und optimiertes Luftfiltermodell ermöglicht durch 3D-Druck den einfachen Aufbau von per RiSU-konformen Niederspannung wie USB oder 12V-betriebenen Filtern. Mit einem Staubsensor eines schwedischen Möbelhauses wird die Filterwirkung selbst sichtbar, der Filtereinsatz automatisch steuerbar und der Verlauf der gemessenen Feinstaubbelastung vergleichbar zur erwarteten simulierten Luftreininigung in Innenräumen.","original_language":"deu","persons":["Sebastian Ritterbusch"],"tags":["gpn20","72","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":205,"promoted":false,"date":"2022-05-21T11:00:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-10-14T19:30:06.681+02:00","length":3338,"duration":3338,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/72-16d27b67-aec0-5c15-97d0-81f1c7201a17.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/72-16d27b67-aec0-5c15-97d0-81f1c7201a17_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/72-16d27b67-aec0-5c15-97d0-81f1c7201a17.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/72-16d27b67-aec0-5c15-97d0-81f1c7201a17.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-72-saubere-luft","url":"https://api.media.ccc.de/public/events/16d27b67-aec0-5c15-97d0-81f1c7201a17","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"c38aa1af-d573-556b-a887-5cfcd9001137","title":"Besser leben mit SSH","subtitle":null,"slug":"gpn20-8-besser-leben-mit-ssh","link":"https://cfp.gulas.ch/gpn20/talk/LEZ8RD/","description":"Du \"benützt\" schon ssh auf der Kommandozeile? Wenn Du dich per ssh wohin verbindest, gibst du Benutzername, Hostnamen und privaten Schlüssel jedes mal as Parameter an? Du meldest dich manuell am jump/bastion host an, bevor Du dich auf Dein eigentliches Zielsystem anmeldest? \nDann schau in meiner Session vorbei, in deren Rahmen ich Dir zeige, wie Du Dir Deine Arbeit mit ssh einfacher und effektiver gestalten kannst. Und das alles mit minimalem Aufwand und geringer Vorbereitung. Weiters werfen wir natürlich einen Blick auf best practices und wie ihr euer SSH Setup verbessern könnt.\n\nAm meisten nimmst Du aus dem Talk mit, wenn Du ssh schon mal verwendet, aber ansonsten noch nicht viel darüber nachgedacht hast. SSH EinsteigerInnen sind selbstverständlich auch herzlich willkommen. SSH Profis finden maximal die Witze in diesem Vortrag interessant.","original_language":"deu","persons":["Leyrer"],"tags":["gpn20","8","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":5642,"promoted":false,"date":"2022-05-21T15:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-04-03T20:30:06.446+02:00","length":3618,"duration":3618,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/8-c38aa1af-d573-556b-a887-5cfcd9001137.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/8-c38aa1af-d573-556b-a887-5cfcd9001137_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/8-c38aa1af-d573-556b-a887-5cfcd9001137.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/8-c38aa1af-d573-556b-a887-5cfcd9001137.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-8-besser-leben-mit-ssh","url":"https://api.media.ccc.de/public/events/c38aa1af-d573-556b-a887-5cfcd9001137","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"f573418c-bb4c-5ca6-b533-bda832d57123","title":"Was ist denn eigentlich ein Supraleiter?","subtitle":null,"slug":"gpn20-39-was-ist-denn-eigentlich-ein-supraleiter-","link":"https://cfp.gulas.ch/gpn20/talk/Q7JC9P/","description":"Eine kurze Einführung in Supraleiter. Dabei wird erklärt, was Supraleiter eigentlich sind, und einige Beispiele gegeben, wozu man diese verwenden kann.","original_language":"deu","persons":["SolidTux"],"tags":["gpn20","39","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":130,"promoted":false,"date":"2022-05-20T19:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2025-10-11T00:00:06.992+02:00","length":2945,"duration":2945,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/39-f573418c-bb4c-5ca6-b533-bda832d57123.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/39-f573418c-bb4c-5ca6-b533-bda832d57123_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/39-f573418c-bb4c-5ca6-b533-bda832d57123.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/39-f573418c-bb4c-5ca6-b533-bda832d57123.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-39-was-ist-denn-eigentlich-ein-supraleiter-","url":"https://api.media.ccc.de/public/events/f573418c-bb4c-5ca6-b533-bda832d57123","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"197b9a36-c4c2-5471-a67b-5a2a104c24f5","title":"After the Metaverse: An Introduction to Brain–machine interfaces","subtitle":null,"slug":"gpn20-94-after-the-metaverse-an-introduction-to-brain-machine-interfaces","link":"https://cfp.gulas.ch/gpn20/talk/ZKYMZD/","description":"We use them everyday: Touchscreens, keyboards, screens, these are all interfaces our brain uses to interact with the digital world. But what comes after VR glasses and haptic feedback? This is a hacker-friendly introduction to the biological, technical and ethical challenges of high-bandwidth direct brain communication.\ncw: blood, pictures of brains\n\nLike computers, our brain uses electrical signals for computation. By building devices capable of recording and decoding these patterns of neural activity, we can read information from the brain. By encoding and stimulating neurons using electric fields, we can establish bidirectional brain-machine communication.\n\nThis talk highlights why increasing the bandwidth of our interaction with computers is a key technology in the Information Age. We talk about where we are today, comparing non-invasive (EEG,  EOG, MRI) and partially invasive (ECoG and endovascular) to invasive (microelectrode array) approaches. After this talk, you'll have a basic understanding of current engineering challenges, and why your next open-source project should be a brain-machine interface.","original_language":"eng","persons":["Lucy Fauth"],"tags":["gpn20","94","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":614,"promoted":false,"date":"2022-05-21T17:45:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-21T08:30:05.250+01:00","length":3587,"duration":3587,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/94-197b9a36-c4c2-5471-a67b-5a2a104c24f5.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/94-197b9a36-c4c2-5471-a67b-5a2a104c24f5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/94-197b9a36-c4c2-5471-a67b-5a2a104c24f5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/94-197b9a36-c4c2-5471-a67b-5a2a104c24f5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-94-after-the-metaverse-an-introduction-to-brain-machine-interfaces","url":"https://api.media.ccc.de/public/events/197b9a36-c4c2-5471-a67b-5a2a104c24f5","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"da92dcb5-672b-5425-9369-26061a4b2137","title":"Fuzion — Eine neue Programmiersprache für Sicherheit","subtitle":null,"slug":"gpn20-87-fuzion-eine-neue-programmiersprache-fr-sicherheit","link":"https://cfp.gulas.ch/gpn20/talk/QCEVG9/","description":"Fuzion ist ein Open Source Projekt, das vor drei Jahren gestartet wurde mit dem Ziel, eine neue Programmiersprache für sicherheitskritische Anwendungen zu entwickeln. Der Vortrag erklärt, wie Sicherheitsprobleme wie log4shell oder spring4shell automatisch erkannt werden.\n\nDer Ansatz von Fuzion ist es, Bestandteile anderer Sprachen in ein einziges, einheitliches Konzept zu vereinigen.  Beispiele dieser Bestandteile sind Funktionen, Klassen, Methoden, Packages, Argumente.  Fuzion vereinheitlicht diese als Fuzion Features.  Das macht die Sprache einfacher und gleichzeitig mächtiger.\n\nFuzion unterstützt pur funktionale Programmierung ohne mutierbare Variablen. Nicht-funktionale (Seiten-) Effekte werden als Fuzion Effects modelliert und werden Teil der Signatur von Features.\n\nFuzion definiert ein einfaches Zwischenformat, das es ermöglicht, mächtige statische Analysewerkzeuge zu entwickeln um Sicherheitsaspekte nachzuweisen.\n\nFuzion ist ein Open Source Projekt, das vor drei Jahren gestartet wurde mit dem Ziel, eine neue Programmiersprache für sicherheitskritische Anwendungen zu entwickeln. Der Vortrag erklärt, wie Sicherheitsprobleme wie log4shell oder spring4shell automatisch erkannt werden.\n\nDer Ansatz von Fuzion ist es, Bestandteile anderer Sprachen in ein einziges, einheitliches Konzept zu vereinigen.  Beispiele dieser Bestandteile sind Funktionen, Klassen, Methoden, Packages, Argumente.  Fuzion vereinheitlicht diese als Fuzion Features.  Das macht die Sprache einfacher und gleichzeitig mächtiger.\n\nFuzion unterstützt pur funktionale Programmierung ohne mutierbare Variablen. Nicht-funktionale (Seiten-) Effekte werden als Fuzion Effects modelliert und werden Teil der Signatur von Features.\n\nFuzion definiert ein einfaches Zwischenformat, das es ermöglicht, mächtige statische Analysewerkzeuge zu entwickeln um Sicherheitsaspekte nachzuweisen.\nFuzion ist ein Open Source Projekt, das vor drei Jahren gestartet wurde mit dem Ziel, eine neue Programmiersprache für sicherheitskritische Anwendungen zu entwickeln. Der Vortrag erklärt, wie Sicherheitsprobleme wie log4shell oder spring4shell automatisch erkannt werden.\n\nDer Ansatz von Fuzion ist es, Bestandteile anderer Sprachen in ein einziges, einheitliches Konzept zu vereinigen.  Beispiele dieser Bestandteile sind Funktionen, Klassen, Methoden, Packages, Argumente.  Fuzion vereinheitlicht diese als Fuzion Features.  Das macht die Sprache einfacher und gleichzeitig mächtiger.\n\nFuzion unterstützt pur funktionale Programmierung ohne mutierbare Variablen. Nicht-funktionale (Seiten-) Effekte werden als Fuzion Effects modelliert und werden Teil der Signatur von Features.\n\nFuzion definiert ein einfaches Zwischenformat, das es ermöglicht, mächtige statische Analysewerkzeuge zu entwickeln um Sicherheitsaspekte nachzuweisen.\n\nRessourcen:\n\nWebseite: https://flang.dev\n\nTwitter: @FuzionLang\n\nGitHub: https://github.com/tokiwa-software/fuzion","original_language":"deu","persons":["Fridtjof Siebert"],"tags":["gpn20","87","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":302,"promoted":false,"date":"2022-05-22T12:00:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2025-04-01T19:45:03.502+02:00","length":3853,"duration":3853,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/87-da92dcb5-672b-5425-9369-26061a4b2137.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/87-da92dcb5-672b-5425-9369-26061a4b2137_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/87-da92dcb5-672b-5425-9369-26061a4b2137.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/87-da92dcb5-672b-5425-9369-26061a4b2137.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-87-fuzion-eine-neue-programmiersprache-fr-sicherheit","url":"https://api.media.ccc.de/public/events/da92dcb5-672b-5425-9369-26061a4b2137","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"e0023d6e-51aa-5890-9db0-28b112fe9c97","title":"The Rube Goldberg Database - Introduction to Postgres functions and triggers","subtitle":null,"slug":"gpn20-69-the-rube-goldberg-database-introduction-to-postgres-functions-and-triggers","link":"https://cfp.gulas.ch/gpn20/talk/PHPHGW/","description":"Brief introduction to some neat and underappreciated Postgres features that let you do stuff within the database that you probably hadn't imagined was even possible.\n\nSounds complicated? Don't be daunted! If you know some SQL and a programming language, that should be enough to follow along.\n\nPostgres gives you the power to write your own functions that run *in the database*. This talk will give an overview over *why* you might want to do that and demonstrate with some hands-on examples.\nFor even more magic, we will look at triggers, which let you automatically run functions when data is being modified.\n\nSlides: https://leftshift.github.io/postgres-functions-triggers/#/","original_language":"eng","persons":["uberardy"],"tags":["gpn20","69","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":147,"promoted":false,"date":"2022-05-20T21:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-10-31T17:00:08.200+01:00","length":1557,"duration":1557,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/69-e0023d6e-51aa-5890-9db0-28b112fe9c97.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/69-e0023d6e-51aa-5890-9db0-28b112fe9c97_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/69-e0023d6e-51aa-5890-9db0-28b112fe9c97.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/69-e0023d6e-51aa-5890-9db0-28b112fe9c97.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-69-the-rube-goldberg-database-introduction-to-postgres-functions-and-triggers","url":"https://api.media.ccc.de/public/events/e0023d6e-51aa-5890-9db0-28b112fe9c97","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"0945db14-bba5-5565-a730-db72100b5666","title":"Infrastructure Review","subtitle":null,"slug":"gpn20-62-infrastructure-review","link":"https://cfp.gulas.ch/gpn20/talk/FSCKSV/","description":"Infrastructure Review der GPN20","original_language":"deu","persons":[],"tags":["gpn20","62","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":899,"promoted":false,"date":"2022-05-22T13:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2025-12-14T17:00:03.669+01:00","length":1343,"duration":1343,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/62-0945db14-bba5-5565-a730-db72100b5666.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/62-0945db14-bba5-5565-a730-db72100b5666_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/62-0945db14-bba5-5565-a730-db72100b5666.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/62-0945db14-bba5-5565-a730-db72100b5666.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-62-infrastructure-review","url":"https://api.media.ccc.de/public/events/0945db14-bba5-5565-a730-db72100b5666","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"1633dc90-e0f3-5fe1-9714-f3cfdc082faf","title":"International humanitarian law","subtitle":null,"slug":"gpn20-18-international-humanitarian-law","link":"https://cfp.gulas.ch/gpn20/talk/3RCGMG/","description":"This talk tries to cover the following:\n* What is the IHL\n* History of the IHL \n* Contents of the IHL\n\nWith what is currently happening in 2022 it seams the right time to talk about a the international humanitarian law. Not many people seam to know what regulations there are and what they contain.\nThis talk tries to change that.","original_language":"eng","persons":["blickfeldkurier"],"tags":["gpn20","18","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":40,"promoted":false,"date":"2022-05-21T12:15:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2023-11-24T20:30:03.593+01:00","length":2788,"duration":2788,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/18-1633dc90-e0f3-5fe1-9714-f3cfdc082faf.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/18-1633dc90-e0f3-5fe1-9714-f3cfdc082faf_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/18-1633dc90-e0f3-5fe1-9714-f3cfdc082faf.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/18-1633dc90-e0f3-5fe1-9714-f3cfdc082faf.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-18-international-humanitarian-law","url":"https://api.media.ccc.de/public/events/1633dc90-e0f3-5fe1-9714-f3cfdc082faf","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"99822296-fad0-55dd-a3cf-af9a35dd3877","title":"Linux secure boot","subtitle":null,"slug":"gpn20-67-linux-secure-boot","link":"https://cfp.gulas.ch/gpn20/talk/7STF98/","description":"Mit \"secure boot\" wird ein gefährliches Einfallstor für Schadsoftware und manipulierte Betriebssysteme geschlossen: Es können nur Betriebssysteme gestartet werden, die über eine gültige kryptographische Signature verfügen.\n\nDer Vortrag stellt das Konzept von secure boot vor und erzählt von den Erfahrungen, so etwas auf Linux-Systemen auch wirklich zum Laufen zu bringen.","original_language":"deu","persons":["Christoph Biedl"],"tags":["gpn20","67","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":972,"promoted":false,"date":"2022-05-19T19:00:00.000+02:00","release_date":"2022-05-19T00:00:00.000+02:00","updated_at":"2026-04-01T14:45:09.416+02:00","length":3414,"duration":3414,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/67-99822296-fad0-55dd-a3cf-af9a35dd3877.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/67-99822296-fad0-55dd-a3cf-af9a35dd3877_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/67-99822296-fad0-55dd-a3cf-af9a35dd3877.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/67-99822296-fad0-55dd-a3cf-af9a35dd3877.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-67-linux-secure-boot","url":"https://api.media.ccc.de/public/events/99822296-fad0-55dd-a3cf-af9a35dd3877","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"45cb7493-dd32-5c3e-a976-a4532f1434e9","title":"Querfunk @ GPN","subtitle":null,"slug":"gpn20-77-querfunk-gpn","link":"https://cfp.gulas.ch/gpn20/talk/T3JAUA/","description":"Querfunk 104,8Mhz - Das Freie Radio Karlsruhe stellt sich vor.\n\nNa, auch zusammen gezuckt bei der Silbe „Quer“? Ihr braucht euch auf jeden Fall keine Sorgen machen. Die Schwurbler werden die GPN nicht infiltrieren! Wir sind‘s nur :) Euer Freies Radio für Karlsruhe und Umgebung. Wir sind ein gemeinnütziger Verein von Hobbyisten und semi-professionals die einfach Bock auf Radio haben. So richtig mit UKW-Frequenz und Studios, weil online kann ja jeder. Um genau zu sein ist „broadcast yourself“ seit unserer Gründung 1995 unser Ding und wenn das mit der Sendelizenz nicht geklappt hätte, hätten wir halt einen Piratensender aufgemacht.\n\nQuerfunk - Wir lassen uns nicht gerade biegen!","original_language":"deu","persons":["HAQKsülze"],"tags":["gpn20","77","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":140,"promoted":false,"date":"2022-05-20T17:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-13T04:15:04.093+01:00","length":1706,"duration":1706,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/77-45cb7493-dd32-5c3e-a976-a4532f1434e9.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/77-45cb7493-dd32-5c3e-a976-a4532f1434e9_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/77-45cb7493-dd32-5c3e-a976-a4532f1434e9.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/77-45cb7493-dd32-5c3e-a976-a4532f1434e9.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-77-querfunk-gpn","url":"https://api.media.ccc.de/public/events/45cb7493-dd32-5c3e-a976-a4532f1434e9","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"b8684a6f-2ddb-5d7a-ad00-52e305be7821","title":"Wie viele Ellas braucht es für eine funktionierende Bildungsplattform?","subtitle":null,"slug":"gpn20-88-wie-viele-ellas-braucht-es-fr-eine-funktionierende-bildungsplattform-","link":"https://cfp.gulas.ch/gpn20/talk/NY9GX7/","description":"In diesem Vortrag geht es um die Geschichte der digitalen Bildungsplattform in Baden-Württemberg und wie es von der ersten Idee 2011 bis heute noch nicht so ganz will.","original_language":"deu","persons":["Lennard Indlekofer","Kevin Erath"],"tags":["gpn20","88","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":1674,"promoted":false,"date":"2022-05-20T11:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-20T12:45:06.835+01:00","length":3467,"duration":3467,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/88-b8684a6f-2ddb-5d7a-ad00-52e305be7821.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/88-b8684a6f-2ddb-5d7a-ad00-52e305be7821_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/88-b8684a6f-2ddb-5d7a-ad00-52e305be7821.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/88-b8684a6f-2ddb-5d7a-ad00-52e305be7821.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-88-wie-viele-ellas-braucht-es-fr-eine-funktionierende-bildungsplattform-","url":"https://api.media.ccc.de/public/events/b8684a6f-2ddb-5d7a-ad00-52e305be7821","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"06ca61f3-bf41-5375-91f5-b04663558586","title":"Kubernetes - The good, the bad, the ugly","subtitle":null,"slug":"gpn20-21-kubernetes-the-good-the-bad-the-ugly","link":"https://cfp.gulas.ch/gpn20/talk/AV8ENB/","description":"In diesem Talk wird es darum gehen eine kleine Einführung in Kubernetes zu geben, ausgeschmückt mit Anekdoten aus der Praxis und absoluten anti-patterns die es zu vermeiden gilt","original_language":"deu","persons":["Cedi"],"tags":["gpn20","21","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":1074,"promoted":false,"date":"2022-05-20T18:45:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-27T12:15:07.513+01:00","length":543,"duration":543,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/21-06ca61f3-bf41-5375-91f5-b04663558586.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/21-06ca61f3-bf41-5375-91f5-b04663558586_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/21-06ca61f3-bf41-5375-91f5-b04663558586.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/21-06ca61f3-bf41-5375-91f5-b04663558586.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-21-kubernetes-the-good-the-bad-the-ugly","url":"https://api.media.ccc.de/public/events/06ca61f3-bf41-5375-91f5-b04663558586","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"43ffb79d-ab95-57bf-957f-9bda7160de9e","title":"Leben mit Borderline","subtitle":null,"slug":"gpn20-13-leben-mit-borderline","link":"https://cfp.gulas.ch/gpn20/talk/AGF39N/","description":"Kurzer Einblick in Leben, Symptome und Therapie der Borderline-Persönlichkeitsstörung - Trigger versuche ich zu vermeiden","original_language":"deu","persons":["Tanja Wawuschel"],"tags":["gpn20","13","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":676,"promoted":false,"date":"2022-05-19T22:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-28T17:30:05.905+01:00","length":3580,"duration":3580,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/13-43ffb79d-ab95-57bf-957f-9bda7160de9e.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/13-43ffb79d-ab95-57bf-957f-9bda7160de9e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/13-43ffb79d-ab95-57bf-957f-9bda7160de9e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/13-43ffb79d-ab95-57bf-957f-9bda7160de9e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-13-leben-mit-borderline","url":"https://api.media.ccc.de/public/events/43ffb79d-ab95-57bf-957f-9bda7160de9e","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"9304f894-6ed9-5f6c-8c30-0d40b0311e47","title":"Dependency-Management für faule Software-Entwickler","subtitle":null,"slug":"gpn20-73-dependency-management-fr-faule-software-entwickler","link":"https://cfp.gulas.ch/gpn20/talk/3SKYGQ/","description":"In der modernen Softwareentwicklung wird häufig auf die Verwendung externer Bibliotheken gesetzt. Bei einem neuen Projekt auf der “grünen Wiese” sind diese leicht auf einem aktuellen Stand zu halten, doch was passiert mit langlebigen Projekten?\n\nBei größeren Anwendungen kann hier schnell eine dreistellige Anzahl von Bibliotheken benötigt werden, entsprechend groß ist der Aufwand, diese stetig auf einem aktuellen Stand zu halten, um z.B. etwaige Sicherheitsprobleme schnell zu patchen.\n\nDiese Aufwände lassen sich zum Glück einfach automatisieren. In einer Demo wird gezeigt, wie man dies z.B. mit “Renovate” als Teil von Continuous Integration erreichen kann, und Voraussetzungen besprochen.\n\nDarüber hinaus werden auch Auswirkungen auf Prozesse im Software-Entwickler- bzw. Projekt-Alltag Teil des Vortrags werden.\n\nDer Vortrag richtet sich an Software-Entwickler. Grundlegendes Verständnis von Continuous Integration ist hilfreich.","original_language":"deu","persons":["cy"],"tags":["gpn20","73","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":513,"promoted":false,"date":"2022-05-20T18:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-18T00:00:07.425+01:00","length":3649,"duration":3649,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/73-9304f894-6ed9-5f6c-8c30-0d40b0311e47.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/73-9304f894-6ed9-5f6c-8c30-0d40b0311e47_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/73-9304f894-6ed9-5f6c-8c30-0d40b0311e47.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/73-9304f894-6ed9-5f6c-8c30-0d40b0311e47.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-73-dependency-management-fr-faule-software-entwickler","url":"https://api.media.ccc.de/public/events/9304f894-6ed9-5f6c-8c30-0d40b0311e47","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"98900bc6-7c32-5017-b841-93fed9a14797","title":"Nichts als die Wahrheit bloggen - Ist der Medienstaatsvertrag verfassungsgemäß?","subtitle":null,"slug":"gpn20-82-nichts-als-die-wahrheit-bloggen-ist-der-medienstaatsvertrag-verfassungsgem-","link":"https://cfp.gulas.ch/gpn20/talk/VHUMU8/","description":"Der Ende 2020 in Kraft getretene Medienstaatsvertrag erlegt Online-Medien behördlich kontrollierbare Wahrheitspflichten auf - im Gegensatz zu Presse und Rundfunk\n\nZur Bekämpfung politisch unerwünschter Fakenews und Hate-Speech regulierte man nach den Plattformbetreibern auch die sogenannten reichweitenstarken Online-Medien. Seit Inkrafttreten des Medienstaatsvertrags am 7.11.2020 müssen Online-Medien nachweisen, dass sie sogenannte journalistische Sorgfaltspflichten beachten und wahrheitsgemäß berichten. Konventionelle Medien dürfen jedoch weiterhin ohne staatliche Sanktionen lügen. \nBislang machten die Landesmedienanstalten von ihrer Zensurmacht kaum Gebrauch. Erstmals nun wurde ein Privatmann wegen eines missverständlichen Blopgpostings über schnüffelnde Hunde mit einem Maulkorb und Bußgeld belegt. Juristen halten den Medienstaatsvertrag für verfassungswidrig - und den konkreten Fall für einen dicken Hund.","original_language":"deu","persons":["Markus Kompa"],"tags":["gpn20","82","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":153,"promoted":false,"date":"2022-05-21T13:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-01-23T18:00:13.978+01:00","length":3418,"duration":3418,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/82-98900bc6-7c32-5017-b841-93fed9a14797.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/82-98900bc6-7c32-5017-b841-93fed9a14797_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/82-98900bc6-7c32-5017-b841-93fed9a14797.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/82-98900bc6-7c32-5017-b841-93fed9a14797.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-82-nichts-als-die-wahrheit-bloggen-ist-der-medienstaatsvertrag-verfassungsgem-","url":"https://api.media.ccc.de/public/events/98900bc6-7c32-5017-b841-93fed9a14797","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"47551156-10a2-5860-b04e-103e678e8288","title":"HowTo ISP: Netzwerkautomatisierung im Studentenwohnheim","subtitle":null,"slug":"gpn20-19-howto-isp-netzwerkautomatisierung-im-studentenwohnheim","link":"https://cfp.gulas.ch/gpn20/talk/Q939G9/","description":"Ein Studentenwohnheim ersetzt seine Netzwerkhardware und nimmt dies zum Anlass die Netzwerkautomatisierung komplett neu zu denken und zu entwickeln.\nDieser Talk gibt einen Einblick in den Entwicklungsprozess, die fertige Infrastruktur und Stolpersteine.\n\nDas Hans-Dickmann-Kolleg (HaDiKo) in Karlsruhe ist das größte selbstverwaltete Studentenwohnheim in Deutschland.\nDie Abteilung HaDiNet des HaDiKo e.V. versorgt die 1102 Bewohner u.A. mit Internet.\nNachdem die bestehende Infrastruktur auf HP Procurve 5400zl so langsam ihren Geist aufgibt, wurde beschlossen auf Aruba CX zu migrieren.\n\nDer Technologiewechsel wurde zum Anlass genommen die bestehende Automatisierung vom Netzwerk, welche basierend auf Eingaben in der Benutzer-/Vertragsverwaltung Einstellungen auf den Switches vornimmt, in Gänze zu überdenken und eine zukunftsfähige, erweiterbare Plattform zu schaffen, mit der das Netzwerk langfristig betrieben werden kann.\n\nDieser Talk bietet, am Beispiel der Umgestaltung der Infrastruktur, einen Einblick in die Arbeit als ISP, in Probleme bei Automatisierungen und das Management von Abhängigkeiten.","original_language":"deu","persons":["Promasu"],"tags":["gpn20","19","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":651,"promoted":false,"date":"2022-05-20T19:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-06T23:30:07.947+01:00","length":3105,"duration":3105,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/19-47551156-10a2-5860-b04e-103e678e8288.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/19-47551156-10a2-5860-b04e-103e678e8288_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/19-47551156-10a2-5860-b04e-103e678e8288.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/19-47551156-10a2-5860-b04e-103e678e8288.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-19-howto-isp-netzwerkautomatisierung-im-studentenwohnheim","url":"https://api.media.ccc.de/public/events/47551156-10a2-5860-b04e-103e678e8288","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"5848f3d4-8b76-5cfe-92c8-54b718e74658","title":"Purple Dome - Kein Schwein greift mich an","subtitle":null,"slug":"gpn20-74-purple-dome-kein-schwein-greift-mich-an","link":"https://cfp.gulas.ch/gpn20/talk/ZWVLV3/","description":"Purple Dome (https://github.com/avast/PurpleDome) ist eine Umgebung, um Hacking-Angriffe mit Caldera, Metasploit und Kali zu simulieren und die Reaktion von Sensoren auf den Zielsystemen zu beobachten.\n\nEndlich kann man unter Angriffsbedingungen\n* sein EDR System, seine Systemlogs und ähnliches  beobachten,\n* Verhalten verschiedener Softwareversionen sehen,\n* checken: Ist meine Systemhärtung auch hart genug?\n\nDer Vortrag stellt die Simulationsumgebung \"Purple Dome\" vor, beschreibt die Möglichkeiten zum Einsatz und für Erweiterungen und soll schließlich die Zuschauenden mit vielen neuen Ideen zurücklassen.","original_language":"deu","persons":["Thorsten Sick"],"tags":["gpn20","74","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":222,"promoted":false,"date":"2022-05-20T11:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-01-07T19:00:27.671+01:00","length":1995,"duration":1995,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/74-5848f3d4-8b76-5cfe-92c8-54b718e74658.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/74-5848f3d4-8b76-5cfe-92c8-54b718e74658_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/74-5848f3d4-8b76-5cfe-92c8-54b718e74658.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/74-5848f3d4-8b76-5cfe-92c8-54b718e74658.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-74-purple-dome-kein-schwein-greift-mich-an","url":"https://api.media.ccc.de/public/events/5848f3d4-8b76-5cfe-92c8-54b718e74658","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"72305d90-a459-5da7-8ca5-947516e075c6","title":"Behavioral Biometrics vs. Privacy","subtitle":null,"slug":"gpn20-65-behavioral-biometrics-vs-privacy","link":"https://cfp.gulas.ch/gpn20/talk/QLLU3M/","description":"Was biometrische Daten sind, ist heute weitläufig bekannt. Vielen Menschen ist bewusst, dass ihre Fingerabdrücke, Gesichter, oder Iris sie eindeutig identifizieren. Es gibt aber noch viele andere biometrische Merkmale, die zur Identifizierung und zur Inferenz von sensiblen Daten genutzt werden können. Dieser Vortrag gibt einen kurzen Einblick in die Verhaltensbiometrie (behavioral biometrics) und wie diese unsere Privatsphäre gefährden. Verhaltensbiometrie beschäftigt sich mit den einzigartigen Mustern, die sich daraus geben, wie wir uns bewegen, reden, oder denken. Ein Problem werden diese Muster, wenn sie gegen uns eingesetzt werden, z. B. um herauszufinden, welche sexuelle Orientierung eine Person hat. Wichtig wird diese Form der Biometrie, weil die Aufnahme unseres Verhaltens zunimmt und immer präziser wird. So können z. B. Mixed Reality Headsets heute schon die Handbewegungen, Kopfbewegungen und Augenbewegungen ihrer Nutzer aufzeichnen.","original_language":"deu","persons":["Simon Hanisch"],"tags":["gpn20","65","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":110,"promoted":false,"date":"2022-05-20T15:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-02-10T01:45:06.178+01:00","length":1847,"duration":1847,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/65-72305d90-a459-5da7-8ca5-947516e075c6.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/65-72305d90-a459-5da7-8ca5-947516e075c6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/65-72305d90-a459-5da7-8ca5-947516e075c6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/65-72305d90-a459-5da7-8ca5-947516e075c6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-65-behavioral-biometrics-vs-privacy","url":"https://api.media.ccc.de/public/events/72305d90-a459-5da7-8ca5-947516e075c6","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8","title":"RP2040 PIO Emulator as DevTool","subtitle":null,"slug":"gpn20-51-rp2040-pio-emulator-as-devtool","link":"https://cfp.gulas.ch/gpn20/talk/7BKJ7J/","description":"Developing PIO programs for the Raspberry Pico RP2040 chip is really hard, since -- in contrast to the ARM cores -- access to the PIO's inner state is very limited, and debugging output and tracing almost impossible.\nTherefore, in early 2021, I implemented an emulator for the RP2040 PIO, and a set of tools (for the command line as well as GUI based) and a very simple scripting language for program control and debugging output.  The tool set thus supports developing PIO programs by running on the emulator, step by step, if desired, and inspecting as well as logging the PIO's inner state and all GPIO output.  Source code is available on GitHub (https://github.com/soundpaint/rp2040pio), and detailed documentation on Read the Docs (https://rp2040pio-docs.readthedocs.io/en/latest/).","original_language":"deu","persons":["Jürgen Reuter"],"tags":["gpn20","51","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":375,"promoted":false,"date":"2022-05-20T15:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-22T13:30:05.732+01:00","length":1754,"duration":1754,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/51-3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/51-3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/51-3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/51-3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-51-rp2040-pio-emulator-as-devtool","url":"https://api.media.ccc.de/public/events/3bf90d0f-8c50-5b9b-b919-d6cbf0c5b4c8","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"bdf717d9-938f-5d56-85a1-64d9ad4cb93e","title":"Lightning Talks - Day 3","subtitle":null,"slug":"gpn20-97-lightning-talks-day-3","link":"https://cfp.gulas.ch/gpn20/talk/FY7EUH/","description":"A 60min lightning talk session","original_language":"eng","persons":[],"tags":["gpn20","97","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":290,"promoted":false,"date":"2022-05-21T20:00:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-01-21T23:45:13.580+01:00","length":3629,"duration":3629,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/97-bdf717d9-938f-5d56-85a1-64d9ad4cb93e.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/97-bdf717d9-938f-5d56-85a1-64d9ad4cb93e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/97-bdf717d9-938f-5d56-85a1-64d9ad4cb93e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/97-bdf717d9-938f-5d56-85a1-64d9ad4cb93e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-97-lightning-talks-day-3","url":"https://api.media.ccc.de/public/events/bdf717d9-938f-5d56-85a1-64d9ad4cb93e","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"d9b0d26f-446f-59c4-8615-263c28854109","title":"Solarinsel im Gartenhaus","subtitle":null,"slug":"gpn20-83-solarinsel-im-gartenhaus","link":"https://cfp.gulas.ch/gpn20/talk/WGJEJS/","description":"Eine Gartenhütte ohne Anschluss ans öffentliche Stromnetz mit einer Solar-Inselanlage elektrifizieren ist nicht schwer, muss aber geplant werden. Ich möchte die folgenden Fragen klären: Welches Panel, welchen Laderegler, welche Batterie und wie kommt das ganze zusammen.\n\nIch beschreibe und erläutere den Neuaufbau meiner Solar-Inselanlage und erkläre wie man selbst eine solche realisieren kann. Wie wähle ich die Komponenten, worauf muss man achten bei der Umsetzung damit das ganze auch elektrisch halbwegs sicher ist. Und wofür ich den geernteten Strom dann letztlich nutze.","original_language":"deu","persons":["Markus Seifert"],"tags":["gpn20","83","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":413,"promoted":false,"date":"2022-05-21T14:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-03-30T14:30:06.171+02:00","length":3606,"duration":3606,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/83-d9b0d26f-446f-59c4-8615-263c28854109.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/83-d9b0d26f-446f-59c4-8615-263c28854109_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/83-d9b0d26f-446f-59c4-8615-263c28854109.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/83-d9b0d26f-446f-59c4-8615-263c28854109.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-83-solarinsel-im-gartenhaus","url":"https://api.media.ccc.de/public/events/d9b0d26f-446f-59c4-8615-263c28854109","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"3febba34-038a-55bd-9b5f-4c46222c5a59","title":"Daten helfen heilen? Warum die elektronische Patientenakte nicht gesünder macht","subtitle":null,"slug":"gpn20-61-daten-helfen-heilen-warum-die-elektronische-patientenakte-nicht-gesnder-macht","link":"https://cfp.gulas.ch/gpn20/talk/GREC7K/","description":"Stellt euch vor, ihr würdet zur Arbeit mit einem System gezwungen, \n- bei dem Anschluss und die nötigen Geräte wochenlang nicht funktionieren,\n- das dann permanent Systemabstürze wegen elektrostatischer Entladungen erzeugt, \n- bei dem der nötige elektronische Versand von Formularen nicht funktioniert, \n- bei dem ihr wegen Störungen teilweise wochenlang abgehängt seid, \n- wofür ihr teure Updates installieren müsst, ob ihr wollt oder nicht, \n- bei dem ihr Bauchschmerzen habt, was mit sensiblen Daten eurer Kunden passiert, die zentral in Clouds gespeichert werden (alternativlos vorgegeben).\n\n Ihr fürchtet um Vertrauen und Schweigepflicht. Wehe aber, ihr installiert und nützt dieses System nicht! Wer sich verweigert, bekommt weniger Honorar für seine Arbeit!\n\nWo sich dieser Wahnsinn abspielt? Im deutschen Gesundheitswesen. Der Anschluss an die Telematikinfrastruktur (TI) zur Vernetzung von Praxen, Kliniken und anderen Akteuren ist seit 2018 Pflicht. Darüber läuft nun auch die elektronische Patientenakte (ePA), die die Gesetzlichen Krankenkassen seit 1.1.2021 anbieten müssen. \n\nDie Nachfrage der Patienten hält sich bisher in Grenzen, in meiner Praxis gleich null. Die zentrale Speicherung sensibler Daten in Clouds verunsichert viele Menschen. Sie wollen sich oft auch mit nötiger Technik und PINs nicht beschäftigen - verständlich. Und das E-Rezept, kurz vor Zwangseinführung zum 1.1.2022 doch noch verschoben, können viele meiner Patienten gar nicht empfangen – über die Hälfte aller 65-Jährigen nützt kein Smartphone.\n\nPapier, Fax und Rezept mögen oldfashioned und rückständig sein. Aber sie sind einfach, schnell zu bedienen und relativ billig. \nTI und ePA aber sind komplex (Entropie!), teuer, bringen wenig Mehrwert und bremsen dafür den workflow in den Praxen. Burnout durch digitalisierungsbedingte Mehrarbeit? In den USA heute schon Realität. \n\nGesünder macht die ePA leider auch nicht. Patienten brauchen eher analoge Beratung und Beziehung. Jetzt aber werden Ärzte und Patienten zu Datenlieferanten für die Industrie gemacht – die schon großes Interesse an den Daten signalisiert hat. Das deutsche Gesundheitswesen bisher ist gut, aber sowieso schon teuer. Der nötige Aufwand für entsprechenden Output (Entropie!) wird durch TI und ePA nur verstärkt. Dabei gäbe es andere dringende Notwendigkeiten im Gesundheitswesen.\n\nVorschläge für eine sichere, dezentrale e-Health-Struktur wurden bereits gemacht, bisher aber ignoriert. Manches wäre ja sinnvoll, etwa schnelle Befundübermittlung auf sicheren Kanälen direkt an Patienten und Kollegen – ohne Speicherung auf Servern. Es müsste einfach bedienbar sein, Mehrwert haben – und freiwillig sein!","original_language":"deu","persons":["Dr. med. Andreas Meißner"],"tags":["gpn20","61","2022","Ethics, Society \u0026 Politics","gulaschprogrammiernacht","gpn","entropia"],"view_count":811,"promoted":false,"date":"2022-05-21T19:00:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2025-11-14T11:45:04.773+01:00","length":3608,"duration":3608,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/61-3febba34-038a-55bd-9b5f-4c46222c5a59.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/61-3febba34-038a-55bd-9b5f-4c46222c5a59_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/61-3febba34-038a-55bd-9b5f-4c46222c5a59.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/61-3febba34-038a-55bd-9b5f-4c46222c5a59.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-61-daten-helfen-heilen-warum-die-elektronische-patientenakte-nicht-gesnder-macht","url":"https://api.media.ccc.de/public/events/3febba34-038a-55bd-9b5f-4c46222c5a59","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"94e75c09-fbb1-584c-86c5-3f2d17853626","title":"Unikernel Security Analysis","subtitle":null,"slug":"gpn20-4-unikernel-security-analysis","link":"https://cfp.gulas.ch/gpn20/talk/UDRUQZ/","description":"This talk will give an introduction into the concept of unikernels and basic operating system security features and will discuss how this security features are (not) implemented in unikernels.\n\nWhen creating a unikernel, the application is compiled together with an operating system library into a single address space image. Thus, it only contains the code necessary to fulfill the single purpose it was created for. Most unikernels run on top of a hypervisor. Due to the minimalist approach, unikernels are very resource efficient, which makes them attractive for cloud and high performance computing.\nMultiple unikernels claim to be more secure than a traditional operating system due to their massively reduced attack surface. But is this really true? Or are they too minimalist and leave out important security features? What are the implications of a single address space? Is every security problem solved when rewriting the unikernel in Rust?\n\nWhile there are multiple papers analyzing unikernels from a performance perspective, there are only few analyzing them from a security perspective and none of them analyzes a unikernel written in a memory safe language from scratch.\nThus, I decided to analyze and discuss unikernel security in my master thesis. The core part is an extensive analysis of the RustyHermit unikernel, a unikernel written in Rust and developed as a research project at RWTH Aachen University. In addition, I analyzed multiple unikernels for the most basic security features present in traditional operating systems, e.g.  ASLR, W^X and stack canaries.","original_language":"eng","persons":["harryr"],"tags":["gpn20","4","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":205,"promoted":false,"date":"2022-05-21T16:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-02-10T10:30:07.233+01:00","length":3317,"duration":3317,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/4-94e75c09-fbb1-584c-86c5-3f2d17853626.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/4-94e75c09-fbb1-584c-86c5-3f2d17853626_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/4-94e75c09-fbb1-584c-86c5-3f2d17853626.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/4-94e75c09-fbb1-584c-86c5-3f2d17853626.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-4-unikernel-security-analysis","url":"https://api.media.ccc.de/public/events/94e75c09-fbb1-584c-86c5-3f2d17853626","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"10a73315-d0cf-5440-8fbe-2694cad76984","title":"The State of Analog Photography and how to build a bridge towards the Digital Domain","subtitle":null,"slug":"gpn20-45-the-state-of-analog-photography-and-how-to-build-a-bridge-towards-the-digital-domain","link":"https://cfp.gulas.ch/gpn20/talk/GDRCW8/","description":"Why it is still cool to expose silver halides to light and how to convert them into pixels.\n\nAnalog photography has often been claimed dead and obsolete. However, quite the opposite is the case: It has merely transformed from the mostly functional technology it used to be towards an exciting artistic playground and many people are getting into it for either the first time or again. Yet, since we live in an age where most of our media is digital, it is more important than ever to also make our pictures usable in a digital form, which is not as straightforward as one might think, but instead introduces its own perils to the process.\nThis talk wants to give a brief overview of the market situation in 2022 and show how the digitization process can be done. Solutions using present technology as well as the restoration of vintage scanners will be discussed.","original_language":"eng","persons":["dasha","Mimoja"],"tags":["gpn20","45","2022","Art \u0026 Culture","gulaschprogrammiernacht","gpn","entropia"],"view_count":135,"promoted":false,"date":"2022-05-20T13:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2025-09-15T19:00:03.669+02:00","length":3736,"duration":3736,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/45-10a73315-d0cf-5440-8fbe-2694cad76984.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/45-10a73315-d0cf-5440-8fbe-2694cad76984_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/45-10a73315-d0cf-5440-8fbe-2694cad76984.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/45-10a73315-d0cf-5440-8fbe-2694cad76984.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-45-the-state-of-analog-photography-and-how-to-build-a-bridge-towards-the-digital-domain","url":"https://api.media.ccc.de/public/events/10a73315-d0cf-5440-8fbe-2694cad76984","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"b085edb9-f5ac-5c82-9095-41c7246a8781","title":"GPN NOC Q\u0026A","subtitle":null,"slug":"gpn20-100-gpn-noc-q-a","link":"https://cfp.gulas.ch/gpn20/talk/FMFKMU/","description":"Das Team vom GPN NOC stellt sich allen Fragen über die Arbeit im NOC.\nDie ideale Gelegenheit um einen Einblick in die Arbeit im NOC zu bekommen oder zu erfahren, wie man zukünftig selber mitwirken kann.","original_language":"deu","persons":["Promasu"],"tags":["gpn20","100","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":247,"promoted":false,"date":"2022-05-20T13:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2025-08-27T20:30:03.062+02:00","length":2789,"duration":2789,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/100-b085edb9-f5ac-5c82-9095-41c7246a8781.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/100-b085edb9-f5ac-5c82-9095-41c7246a8781_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/100-b085edb9-f5ac-5c82-9095-41c7246a8781.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/100-b085edb9-f5ac-5c82-9095-41c7246a8781.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-100-gpn-noc-q-a","url":"https://api.media.ccc.de/public/events/b085edb9-f5ac-5c82-9095-41c7246a8781","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"dc0958f2-896d-597d-99f0-c27000cd9e51","title":"What to hack","subtitle":null,"slug":"gpn20-3-what-to-hack","link":"https://cfp.gulas.ch/gpn20/talk/EQCVYX/","description":"Eröffnung und Vorstellung der GPN20\n\nHandtuch, Zahnbürste und ein Projekt: Mehr braucht es nicht um an der GPN teil zu nehmen. Welche Highlights euch auf der GPN erwarten und was ihr beachten müsst, erfahrt ihr alles in dieser Eröffnung.","original_language":"deu","persons":["obelix"],"tags":["gpn20","3","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":732,"promoted":false,"date":"2022-05-19T17:00:00.000+02:00","release_date":"2022-05-19T00:00:00.000+02:00","updated_at":"2025-12-20T09:30:03.556+01:00","length":1815,"duration":1815,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/3-dc0958f2-896d-597d-99f0-c27000cd9e51.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/3-dc0958f2-896d-597d-99f0-c27000cd9e51_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/3-dc0958f2-896d-597d-99f0-c27000cd9e51.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/3-dc0958f2-896d-597d-99f0-c27000cd9e51.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-3-what-to-hack","url":"https://api.media.ccc.de/public/events/dc0958f2-896d-597d-99f0-c27000cd9e51","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"1a1323ee-72c0-5231-b91f-a860a06d1363","title":"Wie hackt man einen Analogrechner","subtitle":null,"slug":"gpn20-50-wie-hackt-man-einen-analogrechner","link":"https://cfp.gulas.ch/gpn20/talk/LW7W79/","description":"Die Digitaltechnik hat unsere Welt auf den Kopf gestellt. Aber trotzdem gibt es viele Bereiche, zB. künstliche Intelligenz, die extrem anspruchsvolle Rechnungen benötigen. Es werden neue Computerarchitekturen gebraucht, um dort Fortschritte zu machen. In diesem Vortrag will ich das Feld des \"unconventional Computings\" abstecken und die Zukunftstechnik \"Continous Computing\" (auch bekannt als Analogrechnen) vorstellen.\n\nAm Ende erzähle ich, wie man Analogrechner hackt.\n\nUnser tragbarer Open Source Analogrechner \"The Analog Thing\" steht auf den roten Tischen.\n\nDer Vortrag richtet sich an alle, die über den Tellerrand der gewohnten algorithmischen Informationsverabreitung schauen wollen. Aktuelle Themen wie Quantencomputing und Künstliche Intelligenz werden im Zusammenhang mit den Fronten der Computersimulation allgemeinverständlich erklärt.\n\n[Der Sprecher](https://svenk.org) ist Mitgründer des [Berliner Deep-Tech-Startups Anabrid](https://anabrid.com), welches die historische Technik der Analogrechner auf einen Mikrochip bringen möchte. Es handelt sich dabei um eine enorm schnelle und energiesparsame Art der Informationsverarbeitung. In diesem einstündigen Vortrag wird auf viele technische Aspekte eingegangen werden können, die erkären, warum einige Entwicklungen in der Prozessortechnik in eine Sackgasse führen und Alternativen nötig sind.\n\nEin Highlight des Vortrags wird die Vorstellung des kleinen Lehr-Analogrechners [The Analog Thing](https://the-analog-thing.org), mit dem auf der Bühne einige interessante Probleme gelöst werden, soweit es die Zeit zulässt.\n\nEin Veritasium-Video, einen TEDx-Talk und noch mehr Videos und Podcats zum Thema gibt es auf  https://anabrid.com/videos-podcasts/","original_language":"deu","persons":["Sven Köppel"],"tags":["gpn20","50","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":229,"promoted":false,"date":"2022-05-21T17:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-10-23T18:45:04.779+02:00","length":3580,"duration":3580,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/50-1a1323ee-72c0-5231-b91f-a860a06d1363.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/50-1a1323ee-72c0-5231-b91f-a860a06d1363_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/50-1a1323ee-72c0-5231-b91f-a860a06d1363.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/50-1a1323ee-72c0-5231-b91f-a860a06d1363.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-50-wie-hackt-man-einen-analogrechner","url":"https://api.media.ccc.de/public/events/1a1323ee-72c0-5231-b91f-a860a06d1363","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880","title":"⚠️ May Contain Hackers 2022 - (Orga) Meet and Greet","subtitle":null,"slug":"gpn20-55--may-contain-hackers-2022-orga-meet-and-greet","link":"https://cfp.gulas.ch/gpn20/talk/9QVMHG/","description":"May Contain Hackers is the 2022 Dutch hacker camp in the tradition of European hacker camps. The organization comes from all kinds of hacker platforms and meets wherever they can. Join this session if you want to know more about the MCH organization, the next Dutch camp and talk to others from the organization.\n\nThis talk details the progress of the May Contain Hackers 2022 camp. It shows where the organization is at and what the next steps will be to come to a happy camp.","original_language":"eng","persons":["Stitch"],"tags":["gpn20","55","2022","Meetup","gulaschprogrammiernacht","gpn","entropia"],"view_count":157,"promoted":false,"date":"2022-05-21T13:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-02-22T00:00:05.833+01:00","length":949,"duration":949,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/55-5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/55-5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/55-5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/55-5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-55--may-contain-hackers-2022-orga-meet-and-greet","url":"https://api.media.ccc.de/public/events/5e7d8c3e-fdc3-5d0c-bc3d-4c337be72880","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"83ad96fd-81b7-538e-aa7e-c8980b6b909a","title":"Lightning Talks - Day 2","subtitle":null,"slug":"gpn20-96-lightning-talks-day-2","link":"https://cfp.gulas.ch/gpn20/talk/QCRWZH/","description":"A 60min lightning talk session","original_language":"deu","persons":[],"tags":["gpn20","96","2022","Entropia / CCC","gulaschprogrammiernacht","gpn","entropia"],"view_count":186,"promoted":false,"date":"2022-05-20T20:00:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2025-03-17T20:15:04.988+01:00","length":3441,"duration":3441,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/96-83ad96fd-81b7-538e-aa7e-c8980b6b909a.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/96-83ad96fd-81b7-538e-aa7e-c8980b6b909a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/96-83ad96fd-81b7-538e-aa7e-c8980b6b909a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/96-83ad96fd-81b7-538e-aa7e-c8980b6b909a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-96-lightning-talks-day-2","url":"https://api.media.ccc.de/public/events/83ad96fd-81b7-538e-aa7e-c8980b6b909a","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"5c50ee79-92a2-57f3-a4a5-34401a487fe8","title":"Smartphone Security - how to prevent audio surveillance","subtitle":null,"slug":"gpn20-38-smartphone-security-how-to-prevent-audio-surveillance","link":"https://cfp.gulas.ch/gpn20/talk/EALKLP/","description":"How to prevent using smartphones as Bugs - \nOverview of technologies and solutions.\n\nIn our world electronic espionage is constantly increasing.\nEven without expert knowledge is possible to turn modern smartphones into audio bugs. By hacked smartphones it is possible for attackers to listen to the Audio in the room.\nIn this talk we show and compare different approaches and solutions to prevent mobile phones getting misused for audio surveillance.","original_language":"eng","persons":["Kevin Heneka"],"tags":["gpn20","38","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":348,"promoted":false,"date":"2022-05-21T20:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-09T08:30:05.898+01:00","length":1778,"duration":1778,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/38-5c50ee79-92a2-57f3-a4a5-34401a487fe8.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/38-5c50ee79-92a2-57f3-a4a5-34401a487fe8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/38-5c50ee79-92a2-57f3-a4a5-34401a487fe8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/38-5c50ee79-92a2-57f3-a4a5-34401a487fe8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-38-smartphone-security-how-to-prevent-audio-surveillance","url":"https://api.media.ccc.de/public/events/5c50ee79-92a2-57f3-a4a5-34401a487fe8","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"cb9a11b2-2cdc-5270-9171-ea6c0c0972e8","title":"Why I wrote my own rsync","subtitle":null,"slug":"gpn20-41-why-i-wrote-my-own-rsync","link":"https://cfp.gulas.ch/gpn20/talk/R7H8ED/","description":"I wrote my own rsync implementation in Go! Why? Check out my talk and find out :D\n\nI have become philosophically opposed to running C software in my home, so I’m replacing old C software with new Go programs for more fun, performance, learning and security! 🤓\n\nIn this talk you’ll learn more about how rsync works, and how and where I’m running my own implementation.\n\nrsync is just one part of the bigger puzzle. I’ll also (briefly) explain router7, my own home internet router, which is running on gokrazy, my own Go appliance platform (not only) for the Raspberry Pi.","original_language":"eng","persons":["Michael Stapelberg"],"tags":["gpn20","41","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":3331,"promoted":false,"date":"2022-05-20T14:15:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-31T12:45:08.352+02:00","length":2930,"duration":2930,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/41-cb9a11b2-2cdc-5270-9171-ea6c0c0972e8.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/41-cb9a11b2-2cdc-5270-9171-ea6c0c0972e8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/41-cb9a11b2-2cdc-5270-9171-ea6c0c0972e8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/41-cb9a11b2-2cdc-5270-9171-ea6c0c0972e8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-41-why-i-wrote-my-own-rsync","url":"https://api.media.ccc.de/public/events/cb9a11b2-2cdc-5270-9171-ea6c0c0972e8","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"371e8a37-bac7-5209-a243-46e1811a4f57","title":"Testmark: a Markdown Convention for Test Fixtures and Data","subtitle":null,"slug":"gpn20-70-testmark-a-markdown-convention-for-test-fixtures-and-data","link":"https://cfp.gulas.ch/gpn20/talk/EYQZZS/","description":"Have you ever struggled with keeping examples and documentation up-to-date?  Do you write standards and test fixtures that need to be used in lots of languages, so you need a format everyone can agree on?  And lastly, do you use Markdown?\n\nTestmark is a simple convention for annotating code blocks in markdown so they can be loaded into your program as data.  It's great for test fixtures and executable examples.  Libraries let you treat it as a pseudofilesystem: you can put as many data hunks as you want in one file, and also update them programmatically.  The testmark parsers also carefully leave the rest of your markdown _alone_, meaning you can intersperse whatever prose and styling with your code blocks you want.\n\nIn this talk, we'll show the testmark syntax, the testmark libraries (yes, in multiple languages), and examples of testmark in the wild and the impact it had on projects that adopted it.  Also, there are extensions to testmark dedicated to blackbox testing of executables; come see those in action too!","original_language":"eng","persons":["Eric Myhre"],"tags":["gpn20","70","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":109,"promoted":false,"date":"2022-05-20T22:00:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-03-21T15:30:07.666+01:00","length":1123,"duration":1123,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/70-371e8a37-bac7-5209-a243-46e1811a4f57.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/70-371e8a37-bac7-5209-a243-46e1811a4f57_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/70-371e8a37-bac7-5209-a243-46e1811a4f57.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/70-371e8a37-bac7-5209-a243-46e1811a4f57.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-70-testmark-a-markdown-convention-for-test-fixtures-and-data","url":"https://api.media.ccc.de/public/events/371e8a37-bac7-5209-a243-46e1811a4f57","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"d02926da-94b6-59e8-a706-3ba0b2bbf556","title":"Moderne Linux Kommandozeilenwerkzeuge - Edition \"Allein zu Haus\"","subtitle":null,"slug":"gpn20-9-moderne-linux-kommandozeilenwerkzeuge-edition-allein-zu-haus-","link":"https://cfp.gulas.ch/gpn20/talk/ZT8ZGY/","description":"Zwei Jahre \"Kontaktreduzierung\" haben eine lange Liste an neuen, modernen oder einfach nur \"interessanten\" Kommandozeilenwerkzeugen für Linux hervor gebracht. Schaut vorbei, wenn ich erkläre, warum ihr eure bekannten und gelibeten Werkzeuge auf der Kommandozeile gegen neue, bessere Versionen eintauschen solltet und ich euch Werkzeuge aufzeige, die ihr eventuell noch gar nicht kanntet. Macht euch doch eure tagtägliche Arbeit auf der Kommandozeile einfacher.\n\nUnd ja, \"Save the planet! Recycle talks!\" gilt auch 2022. Ein paar \"must haves\" aus meinen früheren Talks werde sich sicher auch wieder erwähnen. Und die Witze sind auch nicht besser geworden.\n\n\"Linux ohne einer Kommandozeile ist wie ein Himmel ohne Sterne.\"","original_language":"deu","persons":["Leyrer"],"tags":["gpn20","9","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":4718,"promoted":false,"date":"2022-05-21T21:30:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-27T23:30:06.340+01:00","length":3715,"duration":3715,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/9-d02926da-94b6-59e8-a706-3ba0b2bbf556.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/9-d02926da-94b6-59e8-a706-3ba0b2bbf556_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/9-d02926da-94b6-59e8-a706-3ba0b2bbf556.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/9-d02926da-94b6-59e8-a706-3ba0b2bbf556.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-9-moderne-linux-kommandozeilenwerkzeuge-edition-allein-zu-haus-","url":"https://api.media.ccc.de/public/events/d02926da-94b6-59e8-a706-3ba0b2bbf556","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"bfc3327c-2af0-56fd-8845-4440c9421e87","title":"IoT-Security nach ETSI/EN303645","subtitle":null,"slug":"gpn20-36-iot-security-nach-etsi-en303645","link":"https://cfp.gulas.ch/gpn20/talk/PSA8ND/","description":"Betrachtung Norm ETSI/EN 303 645 \"Cyber Security for Consumer Internet of Things\"\n\nUm eine Basis für sichere IoT Hardware zu schaffen, hat die ETSI die praktische Norm EN 303 645 \"Cyber Security for Consumer Internet of Things\" herausgebracht.\n\nIm Talk betrachten wir u.a.\n\n- Aufbau und Inhalte der Norm EN303645\n- Ganzheitlicher Ansatz zu sicheren IoT-Geräten\n- Best Practices zur Umsetzung einzelner Punkte","original_language":"deu","persons":["Kevin Heneka"],"tags":["gpn20","36","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":258,"promoted":false,"date":"2022-05-21T21:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-11T02:00:05.512+01:00","length":1825,"duration":1825,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/36-bfc3327c-2af0-56fd-8845-4440c9421e87.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-36-iot-security-nach-etsi-en303645","url":"https://api.media.ccc.de/public/events/bfc3327c-2af0-56fd-8845-4440c9421e87","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"afb29c11-5f9f-5370-ab74-b4ec270b39c2","title":"Build Anything with Warpforge -- Reproducibly, Decentralized, With Friends","subtitle":null,"slug":"gpn20-68-build-anything-with-warpforge-reproducibly-decentralized-with-friends","link":"https://cfp.gulas.ch/gpn20/talk/H3DSZL/","description":"Warpforge is a \"Build Anything\" tool for the modern era with a deep emphasis on the ability to \"factory reset\" the build environment at any time -- and not just reset one environment to a checkpoint, but also to be able to effortlessly reproduce all the prior builds and computations that produce the \"factory floor\" itself, too: on demand, and without fuss.\n\nHow much time have you lost to debugging library versioning mismatches?  How often has a system update left your machine in a broken state?  How often have you installed something on your machine just to try to \"make it work\"?  If you've moved to containers -- how much time have you spent trying to build \"the perfect base image\", and trying to maintain and wrangle your container build scripts?  How much work would still remain in front of you if you needed to reproduce a container image you snapshotted months ago?  If the answer to any of these questions troubles you -- we hope Warpforge will present a viable way to help fix all that.\n\nIn this talk, we'll introduce Warpforge, describe its objectives, give an overview of its declarative API, briefly cover how the guts work (spoiler: LOTS of hashes)... and ultimately, demonstrate it working, live, because seeing is believing.\n\nAlso in this talk, we'll discuss some conventions in package management and dynamic library linking -- and how we can do these differently, to produce systems of more reusable components.  We've started pursuing this together with building Warpforge, in a quest to make the most transparent and the most reusable systems possible.\n\nComparisons to Bazel/Blaze, Nix, Guix, and even to Docker all abound -- we hope you'll find some of the best parts of each visible in Warpforge, plus a few key innovations and user experience improvements of our own, together all in one bundle.\n\nWarpforge's approach to becoming a powerful \"Build Anything\" tool is to orient itself around providing the user with \"computation-addressable\" systems -- meaning: the same idea as content-addressable systems, but now extended to also apply to data processing and software compilation.  The use of cryptographic hashes to identify data has valuable properties for both security and for simplifying organization; in Warpforge, we apply that same idea to hashing the descriptions of environments and the computations we want to run within them, for similar victories in both security and simplification.  What Git did for source code version control, Warpforge wants to do for build instructions and data processing: decentralized, snapshottable, portable, and utterly agnostic to whatever you put in it.\n\nWarpforge is granular: although it uses containers for hermeticity, Warpforge lets you compose the filesystem from as many pieces as you want.  Warpforge features a freeform filesystem assembly syntax, which lets you state any content you want shall appear at any path you want.  This stands in stark contrast to most other container systems which limit you to monolithic \"images\" -- which invariably devolve into balls-of-mud, becoming difficult to maintain, difficult to introspect, and almost impossible to compose.\n\nWarpforge is a hackable tool.  Everything works via a JSON API.  There are both \"high\" and \"low\" level variants of this API: the \"high\" level lets you describe pipelines of computations, wired together with human-readable names of your choosing; the \"low\" level API always uses only content-addressable hashes for all data input, and always hashes things immediate upon output.  The interaction of these two APIs is the secret sauce: it makes a system that's both usable and also highly precise and highly auditable and reproducible.\n\nWarpforge aims to be a developer productivity tool, but at the same time, shift the culture: much like Git taught the world about hash trees, Warpforge wants to teach the world about reproducible builds.  Because every output is hashed, computation that fails to reproduce the same output becomes noticed immediately.\n\nWarpforge is a perfect tool for those interested in SBOMs (Software Bill Of Materials).  Because Warpforge identifies all inputs explicitly, it can very naturally produce an SBOM.  In fact, it does so in standard operation -- and unlike many other sytems, Warpforge doesn't just produce a descriptive, after-the-fact SBOM: Warpforge instructions are actually a load-bearing bill-of-materials by nature.\n\nWarpforge stops slightly short of doing package management.  However, Warpforge does offer some suggestions on ways to build package management systems... with more merkle trees, so that things remain reproducible, introspectable, and auditable even as they grow in systemic complexity.  (That's enough spoilers; come the talk to see how!)\n\nYou can find out more about Warpforge at http://warpforge.io/ and https://github.com/warpfork/warpforge/ .","original_language":"eng","persons":["Eric Myhre"],"tags":["gpn20","68","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":151,"promoted":false,"date":"2022-05-20T16:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2025-04-29T10:45:09.019+02:00","length":2831,"duration":2831,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/68-afb29c11-5f9f-5370-ab74-b4ec270b39c2.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/68-afb29c11-5f9f-5370-ab74-b4ec270b39c2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/68-afb29c11-5f9f-5370-ab74-b4ec270b39c2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/68-afb29c11-5f9f-5370-ab74-b4ec270b39c2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-68-build-anything-with-warpforge-reproducibly-decentralized-with-friends","url":"https://api.media.ccc.de/public/events/afb29c11-5f9f-5370-ab74-b4ec270b39c2","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"57b88890-c9e6-58fb-9669-9c51bba9c548","title":"Code for Germany","subtitle":"Open Data + Digitales Ehrenamt","slug":"gpn20-79-code-for-germany-open-data-digitales-ehrenamt","link":"https://cfp.gulas.ch/gpn20/talk/NR8SVW/","description":"Code for Germany \u003cb\u003eKaleidoskop\u003c/b\u003e\r\n\r\n\u003ca href=\"https://codefor.de/\"\u003eCode for Germany\u003c/a\u003e verbindet Menschen mit ähnlichen Interessen aus ganz unterschiedlichen Bereichen, die sich in \u003cb\u003eOpen Knowledge Labs\u003c/b\u003e für Freie und Offene Software, Offene Daten und Open Government engagieren.\r\n\r\nVertreter*Innen aus mehreren Labs berichten über ihre Themen, Ideen und Forderungen. Fragen und Anregungen sind willkommen!","original_language":"deu","persons":["Andreas Kugel","Sonja Fischbauer","Wolfram","Jörg","Thomas Werner","Marco"],"tags":["gpn20","79","2022","Ethics, Society \u0026 Politics","","gpn","entropia"],"view_count":1681,"promoted":false,"date":"2022-05-21T16:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-04-02T20:30:04.454+02:00","length":3189,"duration":3189,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/79-57b88890-c9e6-58fb-9669-9c51bba9c548.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/79-57b88890-c9e6-58fb-9669-9c51bba9c548_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/79-57b88890-c9e6-58fb-9669-9c51bba9c548.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/79-57b88890-c9e6-58fb-9669-9c51bba9c548.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-79-code-for-germany-open-data-digitales-ehrenamt","url":"https://api.media.ccc.de/public/events/57b88890-c9e6-58fb-9669-9c51bba9c548","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"e2585f23-dda2-5a32-8f51-15f454a66dc4","title":"Demoszene Nachlese","subtitle":null,"slug":"gpn20-17-demoszene-nachlese","link":"https://cfp.gulas.ch/gpn20/talk/ZCNJU3/","description":"Die Nachlese der besten Demos der letzten paar Jahre\n\nDemos sind live-gerenderte Computergrafikanimationen, die oft mit einer Größenbeschränknung daherkommen. Verschiedene Gruppen versuchen sich gegenseitig mit Stil, epischem Effektbombastement und technischer Raffinesse zu überbieten und das ganze im Zweifelsfall in obszön kleine Dateigröße zu packen.\n\nAlso, greift euch ein ~Bier~ Tschunk und genießt Strobo und Effektgeballer!","original_language":"deu","persons":["madonius"],"tags":["gpn20","17","2022","Entertainment","gulaschprogrammiernacht","gpn","entropia"],"view_count":1159,"promoted":false,"date":"2022-05-21T22:00:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-26T14:30:06.173+01:00","length":6927,"duration":6927,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/17-e2585f23-dda2-5a32-8f51-15f454a66dc4.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/17-e2585f23-dda2-5a32-8f51-15f454a66dc4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/17-e2585f23-dda2-5a32-8f51-15f454a66dc4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/17-e2585f23-dda2-5a32-8f51-15f454a66dc4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-17-demoszene-nachlese","url":"https://api.media.ccc.de/public/events/e2585f23-dda2-5a32-8f51-15f454a66dc4","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"531201db-e7ec-5afb-ae18-67dd9b0834c7","title":"DDoS kommt aus dem Internet und schmeckt AUA!","subtitle":null,"slug":"gpn20-20-ddos-kommt-aus-dem-internet-und-schmeckt-aua-","link":"https://cfp.gulas.ch/gpn20/talk/NXHD8F/","description":"DDoS ist seit Jahren in aller Munde, aber was ist ein DDoS eigentlich? Woher kommt er und was kann ich dagegen tun? In diesem Talk erklären wir die Grundlagen und bieten einige Möglichkeiten zur Prävention und Selbstverteidigung für jede/n, vom kleinen Webhoster bis zum Multi-Terabit internationalen Backbone.","original_language":"deu","persons":["Moritz Frenzel","Sebastian Neuner"],"tags":["gpn20","20","2022","Security","gulaschprogrammiernacht","gpn","entropia"],"view_count":1304,"promoted":false,"date":"2022-05-21T19:00:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2026-03-24T15:15:06.224+01:00","length":2861,"duration":2861,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/20-531201db-e7ec-5afb-ae18-67dd9b0834c7.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/20-531201db-e7ec-5afb-ae18-67dd9b0834c7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/20-531201db-e7ec-5afb-ae18-67dd9b0834c7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/20-531201db-e7ec-5afb-ae18-67dd9b0834c7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-20-ddos-kommt-aus-dem-internet-und-schmeckt-aua-","url":"https://api.media.ccc.de/public/events/531201db-e7ec-5afb-ae18-67dd9b0834c7","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"829e3689-ab34-5946-90a1-66f561036d7c","title":"Radiosonden - STM32 Devboards, die (buchstäblich) vom Himmel fallen","subtitle":null,"slug":"gpn20-52-radiosonden-stm32-devboards-die-buchstblich-vom-himmel-fallen","link":"https://cfp.gulas.ch/gpn20/talk/UE7LWK/","description":"Radiosonden sind die Messgeräte, die an Wetterballons hängend tagtäglich Daten für die Wettervorhersage generieren. Diese Geräte sind Einweg-Wegwerfprodukte, die nach der Landung die Umwelt vermüllen. Doch nicht nur der Wetterdienst weiß, wo die Sonden unterwegs sind - wir können sie einsammeln und für unsere eigenen Zwecke hacken.\n\nWas ursprünglich einmal das Hobby von einigen Funkamateuren war, ist dank der fortschreitenden Technik moderner Radiosonden heute deutlich einfacher geworden. Trotzdem ist die Sondenjagd immernoch eine extremere Form des Geocaching.\n\nNach einem kurzen Primer was Radiosonden eigentlich sind, wer sie wann und wo startet und wie daraus die Wettervorhersage wird, gucken wir uns die Hardware an, und wie wir die Sondensignale selber empfangen können.\n\nDanach geht es ans Eingemachte. Wie läuft eine Sondenjagd ab, was sollte man dabei haben und was macht man, wenn auch andere es auf die Sonde abgesehen haben?\n\nAbschließend soll es dann um die Nachnutzungsmöglichkeiten der Hardware gehen. Zuletzt werfen wir noch einen Blick darauf, wie die Community mit den durch Amateuren generierten Daten auch Wetterdiensten helfen kann.","original_language":"deu","persons":["bazjo"],"tags":["gpn20","52","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":416,"promoted":false,"date":"2022-05-21T11:30:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2026-01-27T15:30:14.686+01:00","length":3411,"duration":3411,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/52-829e3689-ab34-5946-90a1-66f561036d7c.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/52-829e3689-ab34-5946-90a1-66f561036d7c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/52-829e3689-ab34-5946-90a1-66f561036d7c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/52-829e3689-ab34-5946-90a1-66f561036d7c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-52-radiosonden-stm32-devboards-die-buchstblich-vom-himmel-fallen","url":"https://api.media.ccc.de/public/events/829e3689-ab34-5946-90a1-66f561036d7c","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"6db0907e-03cd-5dfc-952c-e0e34a7c3a60","title":"Can't touch this - DIY'ing a Hardware Security Module","subtitle":null,"slug":"gpn20-48-can-t-touch-this-diy-ing-a-hardware-security-module","link":"https://cfp.gulas.ch/gpn20/talk/WLZYLJ/","description":"Hardware Security Modules (HSMs) are cryptographic co-processors that self-erase when manipulated to stop physical attacks. They are old tech, but have not yet made their way into hackers' hands because they cost tens of thousands of euros each. In this talk, I will show you how you can DIY' an HSM that is as secure as those 10k€ commercial ones for less than 100€.","original_language":"eng","persons":["jaseg"],"tags":["gpn20","48","2022","Hardware \u0026 Making","gulaschprogrammiernacht","gpn","entropia"],"view_count":864,"promoted":false,"date":"2022-05-19T20:30:00.000+02:00","release_date":"2022-05-20T00:00:00.000+02:00","updated_at":"2026-03-31T09:15:05.819+02:00","length":3550,"duration":3550,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/48-6db0907e-03cd-5dfc-952c-e0e34a7c3a60.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/48-6db0907e-03cd-5dfc-952c-e0e34a7c3a60_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/48-6db0907e-03cd-5dfc-952c-e0e34a7c3a60.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/48-6db0907e-03cd-5dfc-952c-e0e34a7c3a60.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-48-can-t-touch-this-diy-ing-a-hardware-security-module","url":"https://api.media.ccc.de/public/events/6db0907e-03cd-5dfc-952c-e0e34a7c3a60","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"d1365d24-368c-5672-90de-0ed58f367f23","title":"Standardizing error codes: Introducing Serum, and the Serum Analyzer for Golang","subtitle":null,"slug":"gpn20-56-standardizing-error-codes-introducing-serum-and-the-serum-analyzer-for-golang","link":"https://cfp.gulas.ch/gpn20/talk/ZJJKTG/","description":"Serum is standard for serializable, easy-to-observe, cross-language, error handling.  It's meant to be a \"just enough\" standard: canonically defined in JSON, easy to adopt, and easy to extend -- and just enough structure to support static analysis.   Serum is meant to work within languages that have a \"errors are values\" philosophy, but can work with exception-oriented languages too.  \n\nAlong with the Serum specifications, we also introduce go-serum-analzyer, a static analysis tool which can be used in golang programs to analyze their error handling, and enforce contracts and documentation about error codes that functions may yield.","original_language":"eng","persons":["Eric Myhre"],"tags":["gpn20","56","2022","Science","gulaschprogrammiernacht","gpn","entropia"],"view_count":96,"promoted":false,"date":"2022-05-21T19:15:00.000+02:00","release_date":"2022-05-22T00:00:00.000+02:00","updated_at":"2025-12-27T12:15:07.777+01:00","length":1640,"duration":1640,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/56-d1365d24-368c-5672-90de-0ed58f367f23.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/56-d1365d24-368c-5672-90de-0ed58f367f23_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/56-d1365d24-368c-5672-90de-0ed58f367f23.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/56-d1365d24-368c-5672-90de-0ed58f367f23.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-56-standardizing-error-codes-introducing-serum-and-the-serum-analyzer-for-golang","url":"https://api.media.ccc.de/public/events/d1365d24-368c-5672-90de-0ed58f367f23","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]},{"guid":"f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e","title":"Testing Window","subtitle":null,"slug":"gpn20-57-testing-window","link":"https://cfp.gulas.ch/gpn20/talk/XHJDRA/","description":"In software engineering, continuous integration is common practice nowadays. Common CI setups have a few drawbacks. This talk highlights them and introduces a different approach with additional benefits.\n\nMany projects will operate on the premise that there is merit in an \"evergreen\" main (git) branch, i.e. that for each of the commits on that branch passed some CI jobs.\n\nCommon CI setups will schedule runs for a number of jobs for newly created or updated branch tips in some development repository, including the main branch. However, the latter will only be tested after the merge is done and that test may fail.\n\nThe speaker proposes a different workflow which avoids this problem and, in theory, introduces opportunities to safe operational costs by requiring less CI runs overall.","original_language":"eng","persons":["neithernut"],"tags":["gpn20","57","2022","Software \u0026 Infrastructure","gulaschprogrammiernacht","gpn","entropia"],"view_count":156,"promoted":false,"date":"2022-05-20T17:45:00.000+02:00","release_date":"2022-05-21T00:00:00.000+02:00","updated_at":"2024-12-22T19:15:01.948+01:00","length":2209,"duration":2209,"thumb_url":"https://static.media.ccc.de/media/events/gpn/gpn20/57-f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e.jpg","poster_url":"https://static.media.ccc.de/media/events/gpn/gpn20/57-f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/gpn/gpn20/57-f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/gpn/gpn20/57-f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gpn20-57-testing-window","url":"https://api.media.ccc.de/public/events/f877553b-cd8a-5ea6-8c4e-c0ca24d68e1e","conference_title":"Gulaschprogrammiernacht 20","conference_url":"https://api.media.ccc.de/public/conferences/gpn20","related":[]}]}