{"acronym":"hackerhotel2024","aspect_ratio":"16:9","updated_at":"2026-04-15T15:30:03.965+02:00","title":"HackerHotel 2024","schedule_url":"https://pretalx.hackerhotel.nl/hackerhotel-2024/schedule/export/schedule.xml","slug":"conferences/hackerhotel/2024","event_last_released_at":"2024-02-14T00:00:00.000+01:00","link":"","description":"","webgen_location":"conferences/hackerhotel/2024","logo_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/HackerHotel2024.png","images_url":"https://static.media.ccc.de/media/events/hackerhotel/2024","recordings_url":"https://cdn.media.ccc.de/events/hackerhotel/2024","url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","events":[{"guid":"7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55","title":"Unmasking the Bullshit in Cybersecurity","subtitle":null,"slug":"hackerhotel-2024-86-unmasking-the-bullshit-in-cybersecurity","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XDAAAH/","description":"How organisations adopt buzzwords from the market and incorporate them into tenders, RFPs etc.\n\nDuring this session we will look at all the marketing buzzwords like SIEM/SOC, we go in-depth on topics such as pentesting, Unicorns, SIEM, signatures and, of course, compliancy vs. security. There will be a short panel discussion on how we as a community can change the mindset and make sure organisations will get the right tooling and knowledge (people) to become more cyber resilient.","original_language":"eng","persons":["Ronald Kingma","Jasper Dijkgraaf"],"tags":["hackerhotel2024","86","2024","Talks"],"view_count":1015,"promoted":false,"date":"2024-02-10T22:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-07T16:15:06.736+02:00","length":2230,"duration":2230,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/86-7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/86-7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/86-7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/86-7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-86-unmasking-the-bullshit-in-cybersecurity","url":"https://api.media.ccc.de/public/events/7b43314d-3d0b-5f69-8ae6-aaa9f99e7c55","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"4531e650-44d4-5c10-8aef-92d2a11c1dfc","title":"Top secret surprise","subtitle":null,"slug":"hackerhotel-2024-108-top-secret-surprise","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VL9CGG/","description":"More information will be added soon, or not...\n\nMore information will be added soon, or not...","original_language":"eng","persons":["Nancy Beers"],"tags":["hackerhotel2024","108","2024","Talks"],"view_count":333,"promoted":false,"date":"2024-02-09T22:00:00.000+01:00","release_date":"2024-02-10T00:00:00.000+01:00","updated_at":"2025-10-14T15:45:07.123+02:00","length":852,"duration":852,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/108-4531e650-44d4-5c10-8aef-92d2a11c1dfc.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/108-4531e650-44d4-5c10-8aef-92d2a11c1dfc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/108-4531e650-44d4-5c10-8aef-92d2a11c1dfc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/108-4531e650-44d4-5c10-8aef-92d2a11c1dfc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-108-top-secret-surprise","url":"https://api.media.ccc.de/public/events/4531e650-44d4-5c10-8aef-92d2a11c1dfc","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"cd1f327b-c7b0-568e-8504-eed89efeabf0","title":"Closing Hackerhotel 2024","subtitle":null,"slug":"hackerhotel-2024-133-closing-hackerhotel-2024","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/KQUPNG/","description":"Closing talk of Hackerhotel 2024 with NFIR CTF award ceremony.\n\nClosing talk of Hackerhotel 2024 with NFIR CTF award ceremony.","original_language":"eng","persons":["Dimitri"],"tags":["hackerhotel2024","133","2024","Talks"],"view_count":227,"promoted":false,"date":"2024-02-11T17:30:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-12-11T21:00:07.291+01:00","length":1602,"duration":1602,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/133-cd1f327b-c7b0-568e-8504-eed89efeabf0.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/133-cd1f327b-c7b0-568e-8504-eed89efeabf0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/133-cd1f327b-c7b0-568e-8504-eed89efeabf0.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/133-cd1f327b-c7b0-568e-8504-eed89efeabf0.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-133-closing-hackerhotel-2024","url":"https://api.media.ccc.de/public/events/cd1f327b-c7b0-568e-8504-eed89efeabf0","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6","title":"Opening electronic safe locks with ketchup and lasers","subtitle":null,"slug":"hackerhotel-2024-115-opening-electronic-safe-locks-with-ketchup-and-lasers","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/3PFXDX/","description":"Mechanical safe locks are quickly replaced with their electronic counterparts. While there are many benefits, the security implications are far less understood than the mechanical systems. Jan-Willem collects and researches electronic safe locks and will share his thoughts. From dumping chips with lasers to locks which can be opened with ketchup.\n\nWe use safes to protect our valuables from threats. We trust these systems to keep the assets safe. Mechanical combination locks can be quite cumbersome to operate, and don't have the benefits including auditing, remote access, multi-user, time lock, and much more. But how the additional electronics impacts the security of the safe isn't widely understood.  \n\nThis talk goes into researching the security of electronic safe locks, from reverse engineering known attacks, to learning from scratch. For example, we used laser fault injection to read out the memory of several chips to analyze the code looking for bugs and back doors. While at the low-end, we reverse engineered lock spiking, and use ketchup to open locks.","original_language":"eng","persons":["Jan-Willem Markus"],"tags":["hackerhotel2024","115","2024","Talks"],"view_count":489,"promoted":false,"date":"2024-02-10T14:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-03-06T11:30:08.675+01:00","length":2638,"duration":2638,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/115-c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/115-c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/115-c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/115-c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-115-opening-electronic-safe-locks-with-ketchup-and-lasers","url":"https://api.media.ccc.de/public/events/c6bd3d75-754a-58a2-82ed-fcbfa3b8cdd6","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"8cbf1644-899a-54db-ad0e-f1ebd36d152d","title":"Crytocalypse Now! And why the Dutch government is investing so much in Post Quantum Crypto already.","subtitle":null,"slug":"hackerhotel-2024-82-crytocalypse-now-and-why-the-dutch-government-is-investing-so-much-in-post-quantum-crypto-already-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/RFAGVM/","description":"In this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.\n\nIn this talk i will share the plans of the Dutch government on building a quantum computer resistive infrastructure. The government actually started last year with its program. Whats the plan of the central government now and in the next years, nation wide and internationally.\n\nThe national intelligence agency (AIVD) also published a migration handbook. What is in this book and how might it help you too.","original_language":"eng","persons":["Oscar Koeroo"],"tags":["hackerhotel2024","82","2024","Talks"],"view_count":162,"promoted":false,"date":"2024-02-10T16:45:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-02-15T23:45:05.365+01:00","length":2927,"duration":2927,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/82-8cbf1644-899a-54db-ad0e-f1ebd36d152d.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/82-8cbf1644-899a-54db-ad0e-f1ebd36d152d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/82-8cbf1644-899a-54db-ad0e-f1ebd36d152d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/82-8cbf1644-899a-54db-ad0e-f1ebd36d152d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-82-crytocalypse-now-and-why-the-dutch-government-is-investing-so-much-in-post-quantum-crypto-already-","url":"https://api.media.ccc.de/public/events/8cbf1644-899a-54db-ad0e-f1ebd36d152d","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"ab3921b7-f4bb-585a-af7b-3b2bc0021862","title":"EOS/Thuisbatterij techtalk","subtitle":null,"slug":"hackerhotel-2024-87-eos-thuisbatterij-techtalk","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/AYHRPY/","description":"Lets talk about battery's! \n\nLi-ion, salt, H2 or LFP, veel systemen zijn er op dit moment beschikbaar of komen beschikbaar. Alleen zijn er nieuwe regelgevingen op de loer en wordt de positie van de netbeheerder belangrijker. Welke ontwikkelingen zijn er en hoe vormt het zich? \n\nIk neem jullie mee in mijn reis waarin ik een thuisbatterij heb gebouwd. Tijdens mijn presentatie deel ik basale informatie welke ik ook deel met mijn klanten. \n\nKleine discussie is leuk, maar houd de temperatuur in de gaten, geen thermal runaway ;-)\n\nEOS, LFP, NCA, Li-Ion, nen4046, netbeheerders, grid capacity (NL), ckomende wetgeving, etc/wvttk","original_language":"nld","persons":["[M]ichiel"],"tags":["hackerhotel2024","87","2024","Talks"],"view_count":134,"promoted":false,"date":"2024-02-09T16:30:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-08-24T09:00:04.924+02:00","length":1987,"duration":1987,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/87-ab3921b7-f4bb-585a-af7b-3b2bc0021862.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/87-ab3921b7-f4bb-585a-af7b-3b2bc0021862_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/87-ab3921b7-f4bb-585a-af7b-3b2bc0021862.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/87-ab3921b7-f4bb-585a-af7b-3b2bc0021862.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-87-eos-thuisbatterij-techtalk","url":"https://api.media.ccc.de/public/events/ab3921b7-f4bb-585a-af7b-3b2bc0021862","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"52abbd84-0409-5a42-be09-ca37f965460e","title":"Cyberonderzoeksraad: Computer says no, the law says yes","subtitle":null,"slug":"hackerhotel-2024-98-cyberonderzoeksraad-computer-says-no-the-law-says-yes","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/XVE39C/","description":"More and more decisions are made or prepared automatically, with \"computer says no\" making it really harmful at crucial moments. For many people, it is then unclear whether you have rights and what those rights are. Yet there are steps you can take to successfully fend for yourself. This talk lays out some hacks and will be the presentation of the report 'Computer says no, but the law says yes'.\n\nGood thoughts are frequently accompanied by procedures that are not always well thought out. The victims are often not the organizations, but the customers or citizens on the receiving end of the processes. Sometimes the consequences are severe, such as no longer being able to use your phone, blocking a bank account or credit card to actually closing a bank account.\n\nIn the presentation of the study \"Computer says no, but the law says yes,\" we look at causes and possible solutions. Of course we lend a hand with advice for businesses, but we also look at legal frameworks that give the common man some guidance.","original_language":"nld","persons":["Brenno de Winter","jos"],"tags":["hackerhotel2024","98","2024","Talks"],"view_count":360,"promoted":false,"date":"2024-02-09T23:30:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-03-17T22:45:06.232+01:00","length":2478,"duration":2478,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/98-52abbd84-0409-5a42-be09-ca37f965460e.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/98-52abbd84-0409-5a42-be09-ca37f965460e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/98-52abbd84-0409-5a42-be09-ca37f965460e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/98-52abbd84-0409-5a42-be09-ca37f965460e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-98-cyberonderzoeksraad-computer-says-no-the-law-says-yes","url":"https://api.media.ccc.de/public/events/52abbd84-0409-5a42-be09-ca37f965460e","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"31bcd956-caed-5005-8493-5aebb46e1751","title":"Counting the votes, a quest to create new software for the Dutch elections","subtitle":null,"slug":"hackerhotel-2024-159-counting-the-votes-a-quest-to-create-new-software-for-the-dutch-elections","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WTE3FQ/","description":"The Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. What is needed and how can you help?\n\nThe Dutch Electoral Council has asked a bunch of nerds to help them with new software for the elections. \n\nThe main source of truth in the Dutch elections are the paper documents, the software is there to support the process and assist with simple tasks. Given the age and complexity of the current setup, the Council is looking for something new and more simple. By law, it will be open source! \n\nThis lecture will take you into the inner workings of the Dutch election system and give an insight into the questions the still growing devteam of the Electoral Council asks itself. What exactly does the current software do, how do we plan to make it better and how can you help? Come in, it is open!","original_language":"nld","persons":["nino"],"tags":["hackerhotel2024","159","2024","Talks"],"view_count":72,"promoted":false,"date":"2024-02-10T16:45:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-02-15T23:45:07.131+01:00","length":3327,"duration":3327,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/159-31bcd956-caed-5005-8493-5aebb46e1751.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/159-31bcd956-caed-5005-8493-5aebb46e1751_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/159-31bcd956-caed-5005-8493-5aebb46e1751.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/159-31bcd956-caed-5005-8493-5aebb46e1751.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-159-counting-the-votes-a-quest-to-create-new-software-for-the-dutch-elections","url":"https://api.media.ccc.de/public/events/31bcd956-caed-5005-8493-5aebb46e1751","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162","title":"How to (try to) rebuild your hackerspace after a disaster","subtitle":null,"slug":"hackerhotel-2024-88-how-to-try-to-rebuild-your-hackerspace-after-a-disaster","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/PJZEAZ/","description":"Hackerspace Pixelbar was once the hottest hackerspace in the Netherlands, things happened and awesome people gathered once again to fix things.\n\nAfter a terrible fire at hackerspace Pixelbar (Rotterdam) on 28th of June 2023 (https://pixelbar.nl/2023/06/28/Pixelbar-has-experienced-an-unexpected-issue/) There was a need to rebuild the awesome and safe space we got to love. In this talk we will take you on a tour on the process, and how we got to where we are today. Maybe we’ll slide in some exclusive pictures and other cool stuff. Join us for an hour of drama, friendship, memes, hackers and most of all, the warmth(pun intended) of the community","original_language":"eng","persons":["Miep","Pixelbar","TeQ","Field of View"],"tags":["hackerhotel2024","88","2024","Talks"],"view_count":515,"promoted":false,"date":"2024-02-11T14:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-02-16T17:45:07.832+01:00","length":1909,"duration":1909,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/88-cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/88-cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/88-cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/88-cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-88-how-to-try-to-rebuild-your-hackerspace-after-a-disaster","url":"https://api.media.ccc.de/public/events/cc5c44fc-8cc2-59cf-9ce9-ad9397e7b162","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"abddd9b0-849e-5d5e-ad76-fdec267c4d92","title":"Opening Hackerhotel 2024","subtitle":null,"slug":"hackerhotel-2024-132-opening-hackerhotel-2024","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ZQHVMN/","description":"Opening and welcome by Dimitri Modderman\n\nOpening and welcome by Dimitri Modderman","original_language":"eng","persons":["Dimitri"],"tags":["hackerhotel2024","132","2024","Talks"],"view_count":258,"promoted":false,"date":"2024-02-09T21:00:00.000+01:00","release_date":"2024-02-10T00:00:00.000+01:00","updated_at":"2025-12-24T19:45:04.198+01:00","length":3675,"duration":3675,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/132-abddd9b0-849e-5d5e-ad76-fdec267c4d92.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/132-abddd9b0-849e-5d5e-ad76-fdec267c4d92_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/132-abddd9b0-849e-5d5e-ad76-fdec267c4d92.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/132-abddd9b0-849e-5d5e-ad76-fdec267c4d92.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-132-opening-hackerhotel-2024","url":"https://api.media.ccc.de/public/events/abddd9b0-849e-5d5e-ad76-fdec267c4d92","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"510225c3-677b-5191-bc39-5dbd0d11d491","title":"Badge Talk","subtitle":null,"slug":"hackerhotel-2024-165-badge-talk","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/YHMDZ8/","description":"Our workflow, challenges and other fun things\n\nFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people.","original_language":"eng","persons":[],"tags":["hackerhotel2024","165","2024","Talks"],"view_count":213,"promoted":false,"date":"2024-02-11T16:45:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-09-20T13:45:09.567+02:00","length":2004,"duration":2004,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/165-510225c3-677b-5191-bc39-5dbd0d11d491.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/165-510225c3-677b-5191-bc39-5dbd0d11d491_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/165-510225c3-677b-5191-bc39-5dbd0d11d491.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/165-510225c3-677b-5191-bc39-5dbd0d11d491.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-165-badge-talk","url":"https://api.media.ccc.de/public/events/510225c3-677b-5191-bc39-5dbd0d11d491","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"56210a92-3680-5954-ab1a-9609f864a2b1","title":"Energie-Hacken: Dynamische Zelfopslag en Power-Tech","subtitle":null,"slug":"hackerhotel-2024-72-energie-hacken-dynamische-zelfopslag-en-power-tech","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/SJLFPA/","description":"Van een defecte UPS tot een autonome huisomgeving die zelf energie inkoopt en verkoopt op de meest gunstige en voordelige momenten.\n\nHoe je een huis uit 1928 toch energiezuinig kunt maken door middel van het slimme gebruik van domotica, IOT, zonnepanelen, accu's, infraroodpanelen, warmtewerend folie, airco's en slim gasverbruik met een HR-ketel. Als kers op de taart laten we je zien hoe je gebruik kunt maken van dynamische stroomtarieven. Betaal per uur je stroomverbruik met dynamische prijzen.\n\nDynamisch is het nieuwe crypto: Navigeer door de energiemarkt met de behendigheid van een Bitcoin-trader!","original_language":"nld","persons":["Arjen Halma"],"tags":["hackerhotel2024","72","2024","Talks"],"view_count":297,"promoted":false,"date":"2024-02-11T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-13T11:45:04.749+02:00","length":3787,"duration":3787,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/72-56210a92-3680-5954-ab1a-9609f864a2b1.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/72-56210a92-3680-5954-ab1a-9609f864a2b1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/72-56210a92-3680-5954-ab1a-9609f864a2b1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/72-56210a92-3680-5954-ab1a-9609f864a2b1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-72-energie-hacken-dynamische-zelfopslag-en-power-tech","url":"https://api.media.ccc.de/public/events/56210a92-3680-5954-ab1a-9609f864a2b1","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"3ebc61c2-4499-55ff-a9b8-0c4619391870","title":"WOOt does the government do?","subtitle":null,"slug":"hackerhotel-2024-97-woot-does-the-government-do-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FTWP3P/","description":"WOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.\n\nIn contrast to this lovely abstract, the talk will be in Dutch.\n\nWOOt do we want? Freedom for our software! When do we WOOnt it? Now! This talk is about the journey into opensourcing software used and made by our governement. We will introduce you to the Wet Open Overheid (WOO) and explain how this law allows you to request the source of certain software. Then we’ll provide you with a step-by-step guide how you can woo (yes, that’s a new verb we made up) software of your interest and in which cases you may want or not want to do so. This may all sound nice in theory but Mendel will of course also tell you about his personal journey of requesting the DigiD code base and how this eventually lead to opensourcing the complete code base.\n\nIn contrast to this lovely description, the talk will be in Dutch.","original_language":"nld","persons":["Lord BugBlue","Maja","Lisette Meij"],"tags":["hackerhotel2024","97","2024","Talks"],"view_count":123,"promoted":false,"date":"2024-02-09T22:30:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-06-28T12:00:04.186+02:00","length":3245,"duration":3245,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/97-3ebc61c2-4499-55ff-a9b8-0c4619391870.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/97-3ebc61c2-4499-55ff-a9b8-0c4619391870_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/97-3ebc61c2-4499-55ff-a9b8-0c4619391870.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/97-3ebc61c2-4499-55ff-a9b8-0c4619391870.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-97-woot-does-the-government-do-","url":"https://api.media.ccc.de/public/events/3ebc61c2-4499-55ff-a9b8-0c4619391870","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"dde0849f-e105-5de4-ac50-fbb3f87868e7","title":"Hacking your Dreams","subtitle":null,"slug":"hackerhotel-2024-135-hacking-your-dreams","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HHBEZH/","description":"You can hack all sorts of things. Software, hardware. But being a hacker, what makes more sense than to hack oneself? Hackers have been turning themselves into bionic man, but we can also just hack our brain, using just out brain. I am talking about lucid dreaming: dreaming while you are aware of doing so and able to shape your dream. This talk will discuss what we know so far about lucid dreams and how they relate to other special states of the mind. The main focus will be on how to hack your own mind to start experiencing lucid dreams, what you can do in them, and how they differ from real life.\n\nWhat could be more fun than gaining control over your dreamworld? Go to sleep, and find yourself doing things that would be impossible in the real world. Flying? No problem! You can be superman and have it feel more real than reality. Now if that's not a fun hacking project..","original_language":"eng","persons":["Walter Belgers"],"tags":["hackerhotel2024","135","2024","Talks"],"view_count":510,"promoted":false,"date":"2024-02-10T11:00:00.000+01:00","release_date":"2024-02-13T00:00:00.000+01:00","updated_at":"2026-01-29T07:15:05.450+01:00","length":2910,"duration":2910,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/135-dde0849f-e105-5de4-ac50-fbb3f87868e7.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/135-dde0849f-e105-5de4-ac50-fbb3f87868e7_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/135-dde0849f-e105-5de4-ac50-fbb3f87868e7.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/135-dde0849f-e105-5de4-ac50-fbb3f87868e7.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-135-hacking-your-dreams","url":"https://api.media.ccc.de/public/events/dde0849f-e105-5de4-ac50-fbb3f87868e7","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"dabcb596-ea40-5661-a31d-6bf37f1d400a","title":"Everything you always wanted to know about cryptography but were afraid to ask","subtitle":null,"slug":"hackerhotel-2024-158-everything-you-always-wanted-to-know-about-cryptography-but-were-afraid-to-ask","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/B7BL3K/","description":"What is this DES and why is it bad? Should I always use AES-256, bigger is better right? Who are these RSA-dudes in the first place and why do I need 25519 elliptic curves in my life? Is quantum really that bad for encryption and what can I do about it?  \nIf these are questions keeping you up at 05:00, then this talk might be for you!\n\nCryptography is not only essential in our modern-day lives, but it has been for thousands of years.  \nAfter some historical context, we will dive into some modern ciphers like DES, AES, RSA and ECC. I will show you how they work (using simple to understand high-school math and pretty pictures) and how to use them. We will then see how quantum computers are bad for cryptography and show techniques that can counter that.\n\nThe slides are in English, the spoken language can be English or Dutch (depending on the audience).\n\nPre-talk disclaimer: the provided explanations are very high-level and leave out details that make the ciphers actually secure. **DO NOT USE THEM IN YOUR PROJECTS!**","original_language":"eng","persons":["Lord egeltje"],"tags":["hackerhotel2024","158","2024","Talks"],"view_count":320,"promoted":false,"date":"2024-02-10T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-02-16T02:00:03.903+01:00","length":3602,"duration":3602,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/158-dabcb596-ea40-5661-a31d-6bf37f1d400a.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/158-dabcb596-ea40-5661-a31d-6bf37f1d400a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/158-dabcb596-ea40-5661-a31d-6bf37f1d400a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/158-dabcb596-ea40-5661-a31d-6bf37f1d400a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-158-everything-you-always-wanted-to-know-about-cryptography-but-were-afraid-to-ask","url":"https://api.media.ccc.de/public/events/dabcb596-ea40-5661-a31d-6bf37f1d400a","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"0dbf21f8-d38e-53c9-8c3a-aeb9cebff164","title":"Ransomware never really left","subtitle":null,"slug":"hackerhotel-2024-145-ransomware-never-really-left","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/CXLP8X/","description":"Ransomware is still a serious threat to a lot of people and organisations and nowadays using more and more advanced techniques. And now also with new open AI technology, criminals are able to organise a sophisticated attack in minutes to target you and steal your data.\n\nThis talk will tell us what Ransomware actually is, who’s writing the code and making money out of it, it shows us a bit of the Ransomware history and what types are out there, to better understand what we’re dealing with. And explain all of the ransomware attack stages and what you can do in terms of detection and defence inside your security operations.\n\nFor the security analysts out there this talk will be beneficial when looking for traces Ransomware attacks are leaving behind. Including a demonstration of a Ransomware scenario making use of open AI technology in a sandboxed environment and show all of the attack stages to learn and recognise the IOCs in a Red and blue teaming scenario.\n\nThis ain’t everything. I’ll show what kind of information ransomware groups are sharing and what happened when a random organization was hit by a ransomware attack and their sensitive information was published on the dark web..\n\nLife has been good until that day a phishing mail arrived. Out of curiosity you clicked the link in the email and after that the desktop background on your screen changes with the message to immediately transfer an amount of bitcoins to retrieve your files.","original_language":"eng","persons":["Erik Heskes"],"tags":["hackerhotel2024","145","2024","Talks"],"view_count":192,"promoted":false,"date":"2024-02-11T11:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-12-13T10:30:04.640+01:00","length":2528,"duration":2528,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/145-0dbf21f8-d38e-53c9-8c3a-aeb9cebff164.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/145-0dbf21f8-d38e-53c9-8c3a-aeb9cebff164_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/145-0dbf21f8-d38e-53c9-8c3a-aeb9cebff164.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/145-0dbf21f8-d38e-53c9-8c3a-aeb9cebff164.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-145-ransomware-never-really-left","url":"https://api.media.ccc.de/public/events/0dbf21f8-d38e-53c9-8c3a-aeb9cebff164","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"728b4db4-dbaa-5c52-ac27-fe4d1e4af727","title":"Empowering Cybersecurity Excellence: Unveiling the DIVD Academy Journey","subtitle":null,"slug":"hackerhotel-2024-105-empowering-cybersecurity-excellence-unveiling-the-divd-academy-journey","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/897EXD/","description":"Dive into the World of Cybersecurity Excellence with DIVD Academy: A Journey of Skill Enhancement and Threat Mitigation. This talk explores the pivotal role of DIVD Academy in shaping cybersecurity professionals, fostering skill development, and equipping individuals to combat evolving digital threats. Discover the cutting-edge training methodologies, industry insights, and real-world scenarios that make DIVD Academy a cornerstone in the pursuit of cybersecurity mastery. Join us as we unravel the transformative experience awaiting those who embark on the DIVD Academy adventure.\n\nIn this engaging talk, we delve into the dynamic landscape of cybersecurity through the lens of DIVD Academy. Unpacking the essential components of the academy's curriculum, we explore how it cultivates expertise and resilience in the face of digital adversaries. From hands-on training modules to strategic insights, attendees will gain a comprehensive understanding of the DIVD Academy's role in fostering cybersecurity excellence. Whether you're a seasoned professional or just starting in the field, this talk offers valuable insights into the world of DIVD Academy and its impact on shaping the next generation of cyber defenders.","original_language":"nld","persons":["Astrid Oosenbrug"],"tags":["hackerhotel2024","105","2024","Talks"],"view_count":95,"promoted":false,"date":"2024-02-10T16:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-09-25T20:00:09.092+02:00","length":1789,"duration":1789,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/105-728b4db4-dbaa-5c52-ac27-fe4d1e4af727.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/105-728b4db4-dbaa-5c52-ac27-fe4d1e4af727_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/105-728b4db4-dbaa-5c52-ac27-fe4d1e4af727.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/105-728b4db4-dbaa-5c52-ac27-fe4d1e4af727.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-105-empowering-cybersecurity-excellence-unveiling-the-divd-academy-journey","url":"https://api.media.ccc.de/public/events/728b4db4-dbaa-5c52-ac27-fe4d1e4af727","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"7d271302-352d-5c3e-8d21-acbfd19f831c","title":"Reinventing the Single 8 home movie format","subtitle":null,"slug":"hackerhotel-2024-85-reinventing-the-single-8-home-movie-format","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/VZC8LK/","description":"An engineer buys a camera in a second hand store, and finds herself bringing back a defunct film format.\n\nWhen home movies on 8mm film were king, there was a format war between Kodak's Super 8 and Fuji's Single 8. Just like Sony's Betamax in the home video wars, Fuji's technically superior contender lost the battle, and the final Single 8 cartridges were manufactured in about 2010.\n\nThe physical dimensions of the film are the same though, so here in 2023 it should be possible to load a Single 8 camera with film from a Super 8 cartridge. This is the story of the revival and reinvention of a lost film format through OpenSCAD and 3D printing, done mostly without an original cartridge to copy.","original_language":"eng","persons":["Jenny List"],"tags":["hackerhotel2024","85","2024","Talks"],"view_count":168,"promoted":false,"date":"2024-02-11T14:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-11-13T11:45:04.919+01:00","length":1279,"duration":1279,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/85-7d271302-352d-5c3e-8d21-acbfd19f831c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/85-7d271302-352d-5c3e-8d21-acbfd19f831c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/85-7d271302-352d-5c3e-8d21-acbfd19f831c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/85-7d271302-352d-5c3e-8d21-acbfd19f831c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-85-reinventing-the-single-8-home-movie-format","url":"https://api.media.ccc.de/public/events/7d271302-352d-5c3e-8d21-acbfd19f831c","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"d35c6e1f-fa72-5b77-8929-22581e414cf1","title":"OSINT - How AI fuels disinformation","subtitle":null,"slug":"hackerhotel-2024-146-osint-how-ai-fuels-disinformation","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ED8Z7P/","description":"Nico Dekens a.k.a Dutch_OSINTguy, a renowned open source intelligence professional, has noticed recurring patterns in\ncontent created using artificial intelligence. He demonstrates how he has used OSINT tools and even\nbasic search engines to locate and identify online accounts that appear to be using autogenerated\nwebsite content, social media posts, reviews, and hate speech.\n\nThe proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years have\nseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulent\nproduct reviews, and more. As mainstream access to AI tools spreads, the opportunities to use the\ntechnology for malicious purposes are on the rise.\n\n\nNico Dekens, a renowned open source intelligence professional, has noticed recurring patterns in\ncontent created using artificial intelligence. He demonstrates how he has used OSINT tools and even\nbasic search engines to locate and identify online accounts that appear to be using autogenerated\nwebsite content, social media posts, reviews, and hate speech.\n\n\nInvestigative approaches and techniques are covered, including a list of string text that can be easily\nsearched to locate these types of accounts. There is also a detailed example for generating high-quality\ndeep fake photos using Midjourney.\n\n\nThe author takes an ethical stance on the use of artificial intelligence and advocates for validating online\ncontent using OSINT investigative methodology. This paper provides an investigative study for\nidentifying AI-generated content.","original_language":"eng","persons":["Nico Dekens"],"tags":["hackerhotel2024","146","2024","Talks"],"view_count":382,"promoted":false,"date":"2024-02-10T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-06T18:30:04.707+02:00","length":2446,"duration":2446,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/146-d35c6e1f-fa72-5b77-8929-22581e414cf1.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/146-d35c6e1f-fa72-5b77-8929-22581e414cf1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/146-d35c6e1f-fa72-5b77-8929-22581e414cf1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/146-d35c6e1f-fa72-5b77-8929-22581e414cf1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-146-osint-how-ai-fuels-disinformation","url":"https://api.media.ccc.de/public/events/d35c6e1f-fa72-5b77-8929-22581e414cf1","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"5f66f994-85c0-523c-86f3-8e9932a9981e","title":"Ham Radio for hackers","subtitle":null,"slug":"hackerhotel-2024-123-ham-radio-for-hackers","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/WAFHXM/","description":"Ham radio is a nice hobby, with a bit of overlap with the hacker community.\nIt's a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.\n\nHam radio is a nice hobby, with a bit of overlap with the hacker community.\nIt's a very technical hobby, with a lot of variation. Much more than an Old Man talking on the radio all day.\nAs a licensed HAM you have access to many frequency bands\n- HF, these are low frequencies that can travel 1000ths of kilometers without repeater\n- But also frequencies close to 'commercial' products, a ham could use LoRa 433MHz with over 100W to see what that does.\n- Also on 2.4GHz and 5GHz there is a HAM radio frequency band next to the WiFi band that can be used with much power.\n- There are a bunch of satellites that can be used for (data) communication as well.\n\nI'll show you some possibilities with a HAM radio license, and tell you a bit about how you can get into it.","original_language":"eng","persons":["Ward De Ridder"],"tags":["hackerhotel2024","123","2024","Talks"],"view_count":448,"promoted":false,"date":"2024-02-10T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-03-09T16:00:05.570+01:00","length":2205,"duration":2205,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/123-5f66f994-85c0-523c-86f3-8e9932a9981e.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/123-5f66f994-85c0-523c-86f3-8e9932a9981e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/123-5f66f994-85c0-523c-86f3-8e9932a9981e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/123-5f66f994-85c0-523c-86f3-8e9932a9981e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-123-ham-radio-for-hackers","url":"https://api.media.ccc.de/public/events/5f66f994-85c0-523c-86f3-8e9932a9981e","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"1a004edb-8d92-5a49-911a-fd1739e0159c","title":"Crypterella Stories: Fortigate","subtitle":null,"slug":"hackerhotel-2024-114-crypterella-stories-fortigate","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/QB3Z87/","description":"We all love bedtime stories, and these stories are even better when they turn into reality. This cinderella story is about how a big vendor rolled its own algorithm to \"encrypt\" its firmware images to deter poor hackers like us from fiddling around and potentially uncover flaws. But what if your motive is not to uncover potential flaws, but simply to agnostically fingerprint devices left vulnerable on the internet? \n\nJoin us into a semi-deepdive of reverse engineering the Fortigate firmware \"encryption\" to satisfy our own curiosity, but also to make the web that little bit more secure by fingerprinting vulnerable devices in a non-obtrusive manner with the endgoal of notifying the related parties.\n\nThis talk will go into the process of reverse engineering the Fortigate firmware images with the purpose of developing a non-obtrusive version identification that can be used to fingerprint device firmware versions on the internet, this in turn can be used to notify the related party. Next to a technical deep dive the audience will be presented with a set of questions and thoughts on the topic of encrypting such firmware devices and if this really is the way to go for big vendors, or if these things are only making matters worse by limiting the scope to not just the \"bad\" people, but also the \"good\" people.","original_language":"eng","persons":["axel"],"tags":["hackerhotel2024","114","2024","Talks"],"view_count":960,"promoted":false,"date":"2024-02-11T14:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-03-30T14:30:06.603+02:00","length":1611,"duration":1611,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/114-1a004edb-8d92-5a49-911a-fd1739e0159c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/114-1a004edb-8d92-5a49-911a-fd1739e0159c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/114-1a004edb-8d92-5a49-911a-fd1739e0159c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/114-1a004edb-8d92-5a49-911a-fd1739e0159c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-114-crypterella-stories-fortigate","url":"https://api.media.ccc.de/public/events/1a004edb-8d92-5a49-911a-fd1739e0159c","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"99a50082-6362-5ce7-abbe-6aa778007ca3","title":"A black hat in our white hat collective... a lesson in (incident response|human trust|pr|.*)","subtitle":null,"slug":"hackerhotel-2024-147-a-black-hat-in-our-white-hat-collective-a-lesson-in-incident-response-human-trust-pr-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/HYZ7WU/","description":"We always knew it coulde happen, and thus that it, accoording to Murphey's law, would happen. A member of DIVD got arrested in relation to computer crime. And about a year ago it did, Pepijn van der S. got arrested. \nIn this (no press) talk we will walk you through the events that happened, the impact they had on our organisation and the lessons we learned.\n\nBeing a, white hat, hackers collective has it's risks. The most obvious risk is a legal risk. And we always considered it likely that a mebmer of DIVD would be arrested in relation to computer crime. And we prepared for it.\n\nBut then, when it does happen, you find our how prepared you really are.","original_language":"eng","persons":["Chris van 't Hof","Frank Breedijk"],"tags":["hackerhotel2024","147","2024","Talks"],"view_count":363,"promoted":false,"date":"2024-02-09T16:00:00.000+01:00","release_date":"2024-02-10T00:00:00.000+01:00","updated_at":"2026-02-15T23:45:07.111+01:00","length":2706,"duration":2706,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/147-99a50082-6362-5ce7-abbe-6aa778007ca3.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/147-99a50082-6362-5ce7-abbe-6aa778007ca3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/147-99a50082-6362-5ce7-abbe-6aa778007ca3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/147-99a50082-6362-5ce7-abbe-6aa778007ca3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-147-a-black-hat-in-our-white-hat-collective-a-lesson-in-incident-response-human-trust-pr-","url":"https://api.media.ccc.de/public/events/99a50082-6362-5ce7-abbe-6aa778007ca3","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"0242121a-af14-56f6-9fcf-fd0499f62807","title":"Hacking influence","subtitle":null,"slug":"hackerhotel-2024-96-hacking-influence","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/U3BFMC/","description":"Social Engineering 102: Hacking influence. \nHow to get people to trust your judgement.\n\nYour level of influence, in buisines or daily life, has little to do with your level of compentence. It can be very frustrating to see all your great ideas getting shot down by the people in charge. More so when silly ideas dó get accepted. But how does influence work? Hoe can you get the higher-ups to listen and value your contribution for what it really is?","original_language":"eng","persons":["IJskimo"],"tags":["hackerhotel2024","96","2024","Talks"],"view_count":144,"promoted":false,"date":"2024-02-10T14:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-04-30T15:30:05.079+02:00","length":2281,"duration":2281,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/96-0242121a-af14-56f6-9fcf-fd0499f62807.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/96-0242121a-af14-56f6-9fcf-fd0499f62807_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/96-0242121a-af14-56f6-9fcf-fd0499f62807.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/96-0242121a-af14-56f6-9fcf-fd0499f62807.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-96-hacking-influence","url":"https://api.media.ccc.de/public/events/0242121a-af14-56f6-9fcf-fd0499f62807","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"ea448f39-7688-5ed3-bcaa-b25df337bd76","title":"Basisbeveiliging / Internet Cleanup Foundation - State of the map","subtitle":null,"slug":"hackerhotel-2024-112-basisbeveiliging-internet-cleanup-foundation-state-of-the-map","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/ADQKKH/","description":"An overview of the new maps and new metrics added in 2023, and what it did.\n\nAn overview of the new maps and new metrics added in 2023, and what it did.","original_language":"eng","persons":["Elger \"Stitch\" Jonker"],"tags":["hackerhotel2024","112","2024","Talks"],"view_count":199,"promoted":false,"date":"2024-02-09T17:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-02-13T10:00:12.654+01:00","length":2282,"duration":2282,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/112-ea448f39-7688-5ed3-bcaa-b25df337bd76.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/112-ea448f39-7688-5ed3-bcaa-b25df337bd76_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/112-ea448f39-7688-5ed3-bcaa-b25df337bd76.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/112-ea448f39-7688-5ed3-bcaa-b25df337bd76.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-112-basisbeveiliging-internet-cleanup-foundation-state-of-the-map","url":"https://api.media.ccc.de/public/events/ea448f39-7688-5ed3-bcaa-b25df337bd76","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"43758271-7747-5283-a799-d43526401d0c","title":"A feline approach to NIS2","subtitle":null,"slug":"hackerhotel-2024-140-a-feline-approach-to-nis2","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/NYAXKU/","description":"In security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven't got a clue. But what do you need to do? And what does that mean? \n\nOne of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. \n\nIn this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.\n\nIn security one of the biggest changes will be the fact that on Oct 17th a lot of organisations need to have implemented. A big challenge for many organisations who haven't got a clue. But what do you need to do? And what does that mean? \n\nOne of the solutions maybe to take a feline approach to NIS2 and fulfill parts of the compliance needs with OpenKAT. Not just for organisations, but also for software solutions that are used with in the chain. \n\nIn this talk the main points of NIS2 will be explained as well as the parts where automation with OpenKAT can make a change.","original_language":"eng","persons":["Brenno de Winter"],"tags":["hackerhotel2024","140","2024","Talks"],"view_count":279,"promoted":false,"date":"2024-02-10T16:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-01-11T15:45:11.397+01:00","length":2925,"duration":2925,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/140-43758271-7747-5283-a799-d43526401d0c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/140-43758271-7747-5283-a799-d43526401d0c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/140-43758271-7747-5283-a799-d43526401d0c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/140-43758271-7747-5283-a799-d43526401d0c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-140-a-feline-approach-to-nis2","url":"https://api.media.ccc.de/public/events/43758271-7747-5283-a799-d43526401d0c","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"0208d912-e399-57ba-9bb3-7c7690d3f374","title":"Build your own hackersguild!","subtitle":null,"slug":"hackerhotel-2024-95-build-your-own-hackersguild-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/K39SKE/","description":"This talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting internal pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization's security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds' potential for a more secure future.\n\nThis talk explores the concept of hackersguilds, groups of engineers collaborating to enhance internal information security. Through various activities such as answering inquiries, conducting pentesting exercises, and participating in CTF competitions, hackersguilds empower engineers to actively contribute to an organization's security efforts. The talk provides practical insights into initiating and nurturing hackersguilds, fostering a collaborative environment that taps into collective expertise. By leveraging hackersguilds, organizations can enhance resilience against cyber threats and foster a culture of continuous learning. Attendees will gain a comprehensive understanding of hackersguilds' potential for a more secure future.","original_language":"nld","persons":["Sp0Q"],"tags":["hackerhotel2024","95","2024","Talks"],"view_count":124,"promoted":false,"date":"2024-02-10T11:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2025-06-20T21:30:05.628+02:00","length":2405,"duration":2405,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/95-0208d912-e399-57ba-9bb3-7c7690d3f374.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-95-build-your-own-hackersguild-","url":"https://api.media.ccc.de/public/events/0208d912-e399-57ba-9bb3-7c7690d3f374","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"1112138b-0866-5f86-83fe-3d7f5debee8b","title":"Geschiedenis van Mediapiraterij in Nederland: onvoorstelbaar groot","subtitle":null,"slug":"hackerhotel-2024-113-geschiedenis-van-mediapiraterij-in-nederland-onvoorstelbaar-groot","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/TFWDPD/","description":"Als je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd's illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. \"And so we did\": duizenden cd's, tapes en DVD's later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.\n\nAls je je eigen opsporingsteam krijgt, dan doe je het pas goed.  Piraterij van muziek en films was midden jaren 90 zo groot dat 1 op de 4 verkochte cd's illegaal was. De piratenmerken waren bekend in ieder huishouden. De tientallen merken werden aangevoerd door MTV en Twilight. Hoe groot was het nou echt: dat zie je pas als je alles gaat verzamelen. \"And so we did\": duizenden cd's, tapes en DVD's later is het tijd om eens te duiken in verhalen achter het archief. De collectie is nu te zien in het Homecomputer Museum in Helmond.","original_language":"eng","persons":["Elger \"Stitch\" Jonker"],"tags":["hackerhotel2024","113","2024","Talks"],"view_count":175,"promoted":false,"date":"2024-02-11T16:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-03-16T13:15:07.403+01:00","length":3003,"duration":3003,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/113-1112138b-0866-5f86-83fe-3d7f5debee8b.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/113-1112138b-0866-5f86-83fe-3d7f5debee8b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/113-1112138b-0866-5f86-83fe-3d7f5debee8b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/113-1112138b-0866-5f86-83fe-3d7f5debee8b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-113-geschiedenis-van-mediapiraterij-in-nederland-onvoorstelbaar-groot","url":"https://api.media.ccc.de/public/events/1112138b-0866-5f86-83fe-3d7f5debee8b","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"62340b1e-7028-54a0-bacb-2c1e39c16e31","title":"OT Cyberchallenges","subtitle":null,"slug":"hackerhotel-2024-75-ot-cyberchallenges","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/BNJRFV/","description":"Meet Acme, a wonderful company where nice people make beautiful things... and then management and sales want nice statistics.\n\nAcme is a company like many others. They have been making beautiful things in their factory and workshops for years, but the recent modernization drive also appears to have another side...\n\nWhat is OT and why is it so special? Join us for a short journey through the wonderful world of industrial automation and the challenges we encountered in our daily engineering lives.","original_language":"eng","persons":["Elborro","Ad"],"tags":["hackerhotel2024","75","2024","Talks"],"view_count":169,"promoted":false,"date":"2024-02-11T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-01-15T23:00:12.182+01:00","length":3391,"duration":3391,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/75-62340b1e-7028-54a0-bacb-2c1e39c16e31.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/75-62340b1e-7028-54a0-bacb-2c1e39c16e31_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/75-62340b1e-7028-54a0-bacb-2c1e39c16e31.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/75-62340b1e-7028-54a0-bacb-2c1e39c16e31.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-75-ot-cyberchallenges","url":"https://api.media.ccc.de/public/events/62340b1e-7028-54a0-bacb-2c1e39c16e31","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"25afdf8d-c3a0-53d4-bb98-baa373113855","title":"Where physical security meets cyber security.","subtitle":null,"slug":"hackerhotel-2024-106-where-physical-security-meets-cyber-security-","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/9FQXNF/","description":"Critical infrastructure like data centers needs to be well protected. While there is lots of cyber security knowledge around at Hacker Hotel, in this talk we want to share knowledge on the physical security side of protection. Physical security measures are mostly controlled by PLC's. Thus physical security bears cyber risks as well.\n\nThe talk will cover:\nHow are physical security measures designed?\nHow do you create stand-off distance? (airgap)\nHow are physical security measures pen-tested?\nWhat controllers / PLCs and converters are used? (IP, RS-485:IP)\nThe presentation will contain practical examples and crash test movies.","original_language":"eng","persons":["Jasper Weijman"],"tags":["hackerhotel2024","106","2024","Talks"],"view_count":232,"promoted":false,"date":"2024-02-11T11:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-15T14:45:06.561+02:00","length":2620,"duration":2620,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/106-25afdf8d-c3a0-53d4-bb98-baa373113855.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/106-25afdf8d-c3a0-53d4-bb98-baa373113855_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/106-25afdf8d-c3a0-53d4-bb98-baa373113855.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/106-25afdf8d-c3a0-53d4-bb98-baa373113855.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-106-where-physical-security-meets-cyber-security-","url":"https://api.media.ccc.de/public/events/25afdf8d-c3a0-53d4-bb98-baa373113855","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"cd78ce30-1413-5038-bd1c-736caaab030e","title":"Ally talk","subtitle":null,"slug":"hackerhotel-2024-91-ally-talk","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/Y3WFEZ/","description":"Nancy and Chantal want to talk about being an ally in the community.\n\nmore info is coming!\nNancy and Chantal will take you through a way to be a better ally.","original_language":"eng","persons":["Nancy Beers","Chantal Stekelenburg"],"tags":["hackerhotel2024","91","2024","Talks"],"view_count":679,"promoted":false,"date":"2024-02-10T21:00:00.000+01:00","release_date":"2024-02-14T00:00:00.000+01:00","updated_at":"2026-04-07T16:45:05.199+02:00","length":3027,"duration":3027,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/91-cd78ce30-1413-5038-bd1c-736caaab030e.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/91-cd78ce30-1413-5038-bd1c-736caaab030e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/91-cd78ce30-1413-5038-bd1c-736caaab030e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/91-cd78ce30-1413-5038-bd1c-736caaab030e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-91-ally-talk","url":"https://api.media.ccc.de/public/events/cd78ce30-1413-5038-bd1c-736caaab030e","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c","title":"Threat Modeling for Privacy and against Stalkers","subtitle":null,"slug":"hackerhotel-2024-93-threat-modeling-for-privacy-and-against-stalkers","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/JTUNBY/","description":"When we talk about tech stacks we usually think about big organizations running systems, but in the current day and age we too have a large digital footprint. In this talk we will go over mapping out our personal tech stack and start identifying any threats that could be useful to help prevent stalking and harassment, or at least be aware of the risks you encounter so you can make informed choices about data that you share.\n\nIn the presentation I’ll give an example of a basic threat modeling that can be applied to our personal digital footprint to help improve privacy and protect yourself against nosey governments and digital stalking.\n\nWe start with creating an overview of all apps, services and accounts that we use and contain personal information, focusing on those that can be exploited for stalking or bullying purposes. From there we will apply threat modeling methods, mainly persona non grata, to identify how they can be exploited by malicious actors. Either working from publicly shared information or who might have gained access to private details in legitimate or illegitimate ways.","original_language":"eng","persons":["Dany"],"tags":["hackerhotel2024","93","2024","Talks"],"view_count":200,"promoted":false,"date":"2024-02-10T16:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-08T14:30:07.484+02:00","length":2217,"duration":2217,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/93-d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/93-d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/93-d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/93-d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-93-threat-modeling-for-privacy-and-against-stalkers","url":"https://api.media.ccc.de/public/events/d4fc9bb0-af2a-5c1f-adcc-80c1c35e2a5c","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]},{"guid":"6a62a2cc-df57-5432-b1c3-2001d8809d3f","title":"Plucking the low hanging fruit of data and security breaches. How to be rewarded even if there's no bug bounty program","subtitle":null,"slug":"hackerhotel-2024-110-plucking-the-low-hanging-fruit-of-data-and-security-breaches-how-to-be-rewarded-even-if-there-s-no-bug-bounty-program","link":"https://pretalx.hackerhotel.nl/hackerhotel-2024/talk/FPMLCB/","description":"I call myself \"The Lamest Hacker You Know\". I don 't use Kali, 0days, Burp Suite or any tools besides Curl, A browser, and clients for existing software, combined with (semi) open data sources. Probably 90% of my findings are for companies that don't have a CISO an never even heard the term \"Bug Bounty Program\", In this talk I will give some tips on how to reach out to a company out-of-the-blue and not have them hate you.\n\nI call myself \"The Lamest Hacker You Know\". \nI don 't use Kali, 0days, burp suite or any tools besides Curl and some (semi) open data sources.\n\nProbably 90% of my findings are for companies that don't even have a CISO and never even heard of a Bug Bounty Program and yet, I have been rewarded for finds that will make you go \"yikes\".\n\nI never once got into trouble because of how I operate: Being radically open. \n\nIn this talk I will look back on some cases I never made public, show you how I work, the upsides and the downsides, and give some tips on how to reach out to a company out-of-the-blue and not have them hate you.","original_language":"eng","persons":["SchizoDuckie"],"tags":["hackerhotel2024","110","2024","Talks"],"view_count":640,"promoted":false,"date":"2024-02-11T15:00:00.000+01:00","release_date":"2024-02-11T00:00:00.000+01:00","updated_at":"2026-04-15T15:30:03.957+02:00","length":3021,"duration":3021,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/110-6a62a2cc-df57-5432-b1c3-2001d8809d3f.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/110-6a62a2cc-df57-5432-b1c3-2001d8809d3f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/110-6a62a2cc-df57-5432-b1c3-2001d8809d3f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2024/110-6a62a2cc-df57-5432-b1c3-2001d8809d3f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/hackerhotel-2024-110-plucking-the-low-hanging-fruit-of-data-and-security-breaches-how-to-be-rewarded-even-if-there-s-no-bug-bounty-program","url":"https://api.media.ccc.de/public/events/6a62a2cc-df57-5432-b1c3-2001d8809d3f","conference_title":"HackerHotel 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2024","related":[]}]}