{"acronym":"hackerhotel2025","aspect_ratio":"16:9","updated_at":"2026-04-03T22:15:05.061+02:00","title":"HackerHotel 2025","schedule_url":"https://pretalx.hackerhotel.nl/2025/schedule/export/schedule.xml","slug":"conferences/hackerhotel/2025","event_last_released_at":"2025-02-16T00:00:00.000+01:00","link":"https://hackerhotel.nl/","description":"","webgen_location":"conferences/hackerhotel/2025","logo_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/HackerHotel2025.png","images_url":"https://static.media.ccc.de/media/events/hackerhotel/2025","recordings_url":"https://cdn.media.ccc.de/events/hackerhotel/2025","url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","events":[{"guid":"aff18a44-01ea-54da-8b4d-47c4f19fea2c","title":"Meshtastic Fantastic","subtitle":null,"slug":"2025-193-meshtastic-fantastic","link":"https://pretalx.hackerhotel.nl/2025/talk/33SUDX/","description":"Meshtastic and LoRa, what is it and what can you do with it?\n\nLoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.\n\nOne of the most exciting applications making waves is Meshtastic. But what exactly is Meshtastic, and how does the mysterious Hackerhotel bridge play into the picture?\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Elborro"],"tags":["193","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 2"],"view_count":498,"promoted":false,"date":"2025-02-15T16:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-03T22:15:05.055+02:00","length":2311,"duration":2311,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/193-aff18a44-01ea-54da-8b4d-47c4f19fea2c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/193-aff18a44-01ea-54da-8b4d-47c4f19fea2c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/193-aff18a44-01ea-54da-8b4d-47c4f19fea2c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/193-aff18a44-01ea-54da-8b4d-47c4f19fea2c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-193-meshtastic-fantastic","url":"https://api.media.ccc.de/public/events/aff18a44-01ea-54da-8b4d-47c4f19fea2c","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"8d73b361-5304-5fa2-b243-ac5fc2f3673f","title":"Crypto 101","subtitle":null,"slug":"2025-195-crypto-101","link":"https://pretalx.hackerhotel.nl/2025/talk/KPBZKG/","description":"A short introduction to cryptography, its past, present and future for the not yet fully initiated.\n\nMany talks mentioned cryptography somewhere along the presentation and everybody just nods. But how many people actually know the insights of cryptography? Why some things work and some things don't? During this talk I will explain the difference between encoding and encryption, the most common uses of cryptography, the difference between synchronous and asynchronous encryption, hashes. I will include some history and some future developments like quantum and why wel call cryptocoin cryptocoin. In a slow pace, scratching the surface for uninitiated, but the scratches will go deep enough for more initiated to get some more background.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Dirk Maij"],"tags":["195","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 1"],"view_count":181,"promoted":false,"date":"2025-02-14T16:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-02-28T13:45:06.604+01:00","length":3254,"duration":3254,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/195-8d73b361-5304-5fa2-b243-ac5fc2f3673f.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/195-8d73b361-5304-5fa2-b243-ac5fc2f3673f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/195-8d73b361-5304-5fa2-b243-ac5fc2f3673f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/195-8d73b361-5304-5fa2-b243-ac5fc2f3673f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-195-crypto-101","url":"https://api.media.ccc.de/public/events/8d73b361-5304-5fa2-b243-ac5fc2f3673f","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"032596af-f8ed-597e-8036-358643c1f8ec","title":"Workshop loosing weight","subtitle":null,"slug":"2025-185-workshop-loosing-weight","link":"https://pretalx.hackerhotel.nl/2025/talk/HPGGPC/","description":"I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code\" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.\n\nIn this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual participants. What works, what doesn't. \n\nIn the end you will know what should work for you, and how you can loose weight effortlessly.\n\nI have been struggling with my weight for over 25 years. After reading the book : The Obesity Code\" everything clicked. Since I have lost 13 lg within 6 months. The great thing about this is that it is effortless.\n\nIn this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual participants. What works, what doesn't. \n\nIn the end you will know what should work for you, and how you can loose weight effortlessly.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Jeroen Baten"],"tags":["185","2025","hackerhotel2025","Workshops","Mission Critical Room (Rembrandt)","hackerhotel2025-nld","Day 2"],"view_count":271,"promoted":false,"date":"2025-02-15T10:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-20T07:15:03.089+01:00","length":3651,"duration":3651,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/185-032596af-f8ed-597e-8036-358643c1f8ec.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/185-032596af-f8ed-597e-8036-358643c1f8ec_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/185-032596af-f8ed-597e-8036-358643c1f8ec.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/185-032596af-f8ed-597e-8036-358643c1f8ec.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-185-workshop-loosing-weight","url":"https://api.media.ccc.de/public/events/032596af-f8ed-597e-8036-358643c1f8ec","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"e52286ad-0ea0-5c4a-be75-eed7e82d6bf4","title":"What's that CubeSat Satellite stuff anyhow?","subtitle":null,"slug":"2025-189-what-s-that-cubesat-satellite-stuff-anyhow-","link":"https://pretalx.hackerhotel.nl/2025/talk/QTVJFY/","description":"CubeSats are small satellites comprised of 10x10x10cm \"units\" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?\n\nCubeSats are small satellites comprised of 10x10x10cm \"units\" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?\n\nI will go in to a brief history as well as some applications with examples. The goal is to keep this talk TLP:Clear\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Wouter"],"tags":["189","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 2"],"view_count":244,"promoted":false,"date":"2025-02-15T15:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-24T00:00:04.408+01:00","length":3320,"duration":3320,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/189-e52286ad-0ea0-5c4a-be75-eed7e82d6bf4.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/189-e52286ad-0ea0-5c4a-be75-eed7e82d6bf4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/189-e52286ad-0ea0-5c4a-be75-eed7e82d6bf4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/189-e52286ad-0ea0-5c4a-be75-eed7e82d6bf4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-189-what-s-that-cubesat-satellite-stuff-anyhow-","url":"https://api.media.ccc.de/public/events/e52286ad-0ea0-5c4a-be75-eed7e82d6bf4","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"92c3d18f-f0c1-5341-ab83-ab2ba09fd69c","title":"De validatiecrisis","subtitle":null,"slug":"2025-213-de-validatiecrisis","link":"https://pretalx.hackerhotel.nl/2025/talk/7VXSPZ/","description":"De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie, en de gevaren van een gebrek aan kritische evaluatie. Hij toont aan hoe deze crisis niet alleen technologie, maar ook maatschappelijke besluitvorming ondermijnt.\n\nEen belangrijk deel van de lezing is gewijd aan de MIAUW-methodiek (Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde). Dit gestructureerde framework biedt een oplossing voor de validatiecrisis in informatiebeveiliging door de nadruk te leggen op reproduceerbaarheid, transparantie en auditwaarde. MIAUW stelt organisaties in staat om kwetsbaarheden niet alleen te identificeren, maar ook te documenteren op een manier die zowel controleerbaar als bruikbaar is voor bredere compliance- en risicomanagementstrategieën.\n\nTijdens de lezing bespreekt Brenno de Winter praktische voorbeelden, biedt hij concrete handvatten om kritisch denken te bevorderen, en illustreert hij hoe MIAUW organisaties kan helpen de kloof tussen complexe technologie en verantwoorde toepassing te overbruggen.\n\nTechnologie en kunstmatige intelligentie hebben onze samenleving fundamenteel veranderd, maar brengen ook een diepe uitdaging met zich mee: de validatiecrisis. In deze lezing onthult Brenno de Winter, cybersecurity-expert en auteur van De Validatiecrisis, hoe een gebrek aan kritische controle en grondige evaluatie van data en technologieën leidt tot risico’s op het gebied van veiligheid, ethiek en besluitvorming. De validatiecrisis is een fenomeen dat zich niet alleen in de echte wereld afspeelt, maar zelfs in fictieve experimenten fascinerende en leerzame inzichten biedt.\n\nDe Validatiecrisis: Wat Gaat Er Mis?\nDe validatiecrisis is een fundamenteel probleem waarbij aannames en technologieën zonder grondige controle worden geaccepteerd. Dit leidt tot mislukte projecten, gebrekkige AI-systemen en besluitvorming gebaseerd op onjuiste gegevens. De Winter illustreert dit met praktijkvoorbeelden, waaronder AI-modellen die falen in het herkennen van nuance, en situaties waarin vertrouwen in onbewezen technologie desastreuze gevolgen heeft. Hij legt de nadruk op het belang van kritische evaluatie en hoe een gebrek daaraan leidt tot blinde vlekken in onze technologische ontwikkeling.\n\nEen Lessenpakket van de Maan\nEen belangrijk onderdeel van de lezing zijn de fictieve experimenten op de maan, waarin menselijke en technologische interacties werden onderzocht in een context waar katten een sleutelrol spelen. In deze hypothetische samenleving, waar katten niet alleen huisdieren maar politieke actoren zijn, faalden AI-systemen in het begrijpen van de complexe hiërarchieën en sociale dynamiek. Dit leidde tot een fictieve oorlog met de planeet Bananie, die volledig had kunnen worden voorkomen als technologie op een grondigere manier gevalideerd was.\n\nDe experimenten fungeren als een metafoor voor de gevaren van slecht gevalideerde technologieën. Ze tonen hoe kleine fouten in de basis van systemen kunnen leiden tot grote gevolgen, of het nu gaat om ethische kwesties, veiligheid of zelfs internationale relaties. Dit fictieve voorbeeld onderstreept de bredere boodschap: technologie moet niet blind worden vertrouwd, maar moet voortdurend worden getest en gecontroleerd.\n\nDe MIAUW-methodiek: Een Gestructureerde Aanpak\nAls antwoord op de validatiecrisis presenteert De Winter de MIAUW-methodiek (Methodiek voor Informatiebeveiligingsonderzoek met Auditwaarde). Dit framework biedt een gestructureerde aanpak voor penetratietesten die niet alleen technische kwetsbaarheden identificeert, maar deze ook documenteert op een manier die reproduceerbaar en controleerbaar is. MIAUW stelt organisaties in staat om niet alleen inzicht te krijgen in risico’s, maar ook om deze te verbinden aan bredere compliance- en risicomanagementstrategieën.\n\nMet concrete voorbeelden laat De Winter zien hoe MIAUW organisaties helpt om niet alleen veiliger te worden, maar ook om transparant en verantwoord om te gaan met hun technologie. Door reproduceerbare resultaten en sterke auditwaarde mogelijk te maken, biedt MIAUW een praktische oplossing voor de uitdagingen van moderne technologie.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Brenno de Winter"],"tags":["213","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 1"],"view_count":69,"promoted":false,"date":"2025-02-14T22:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-25T21:15:05.304+01:00","length":3092,"duration":3092,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/213-92c3d18f-f0c1-5341-ab83-ab2ba09fd69c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/213-92c3d18f-f0c1-5341-ab83-ab2ba09fd69c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/213-92c3d18f-f0c1-5341-ab83-ab2ba09fd69c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/213-92c3d18f-f0c1-5341-ab83-ab2ba09fd69c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-213-de-validatiecrisis","url":"https://api.media.ccc.de/public/events/92c3d18f-f0c1-5341-ab83-ab2ba09fd69c","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"4f3212af-1776-50dc-8d1a-1c6022c81bdb","title":"Van de GHP  tot why2025: De geschiedenis en toekomst van de nederlandse hackercamps","subtitle":null,"slug":"2025-207-van-de-ghp-tot-why2025-de-geschiedenis-en-toekomst-van-de-nederlandse-hackercamps","link":"https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/","description":"De geschiedenis en toekomst van de nederlandse hackercamps\n\nKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Boekenwuurm"],"tags":["207","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-nld","Day 2"],"view_count":78,"promoted":false,"date":"2025-02-15T16:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-02-25T15:45:06.347+01:00","length":2602,"duration":2602,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/207-4f3212af-1776-50dc-8d1a-1c6022c81bdb.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/207-4f3212af-1776-50dc-8d1a-1c6022c81bdb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/207-4f3212af-1776-50dc-8d1a-1c6022c81bdb.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/207-4f3212af-1776-50dc-8d1a-1c6022c81bdb.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-207-van-de-ghp-tot-why2025-de-geschiedenis-en-toekomst-van-de-nederlandse-hackercamps","url":"https://api.media.ccc.de/public/events/4f3212af-1776-50dc-8d1a-1c6022c81bdb","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"abd4487d-192a-5fad-9fcc-6cd3c1b9b555","title":"Ask me anything, with Huib Modderkolk","subtitle":null,"slug":"2025-224-ask-me-anything-with-huib-modderkolk","link":"https://pretalx.hackerhotel.nl/2025/talk/NBZPQZ/","description":"This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.\n\nBooks: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and everyone can see it now. “Der digitale Weltkrieg, den keiner bemerkt”\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Chris van 't Hof","Huib Modderkolk"],"tags":["224","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 1"],"view_count":127,"promoted":false,"date":"2025-02-14T21:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-11T01:45:03.774+01:00","length":2477,"duration":2477,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/224-abd4487d-192a-5fad-9fcc-6cd3c1b9b555.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/224-abd4487d-192a-5fad-9fcc-6cd3c1b9b555_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/224-abd4487d-192a-5fad-9fcc-6cd3c1b9b555.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/224-abd4487d-192a-5fad-9fcc-6cd3c1b9b555.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-224-ask-me-anything-with-huib-modderkolk","url":"https://api.media.ccc.de/public/events/abd4487d-192a-5fad-9fcc-6cd3c1b9b555","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"cbafaf75-caf3-54d7-95bc-278bda999389","title":"Nerding out over silly machines","subtitle":null,"slug":"2025-216-nerding-out-over-silly-machines","link":"https://pretalx.hackerhotel.nl/2025/talk/XSSZ9J/","description":"You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.\n\nBeside Schuberg Philis, DIVD, attending the farm and keeping my bees I als build machines.\n\nIt is an interesting process and I want to share it with you.\n\nMachiens I will be talking about:\n* The (worlds?) 1st 3d color printer from TNO\n* The raking robot\n* AI/Twitter/Telegram/Slack connected Telex\n* ASCII photo booth\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Frank Breedijk"],"tags":["216","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 1"],"view_count":109,"promoted":false,"date":"2025-02-14T17:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-19T14:00:06.719+01:00","length":3438,"duration":3438,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/216-cbafaf75-caf3-54d7-95bc-278bda999389.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/216-cbafaf75-caf3-54d7-95bc-278bda999389_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/216-cbafaf75-caf3-54d7-95bc-278bda999389.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/216-cbafaf75-caf3-54d7-95bc-278bda999389.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-216-nerding-out-over-silly-machines","url":"https://api.media.ccc.de/public/events/cbafaf75-caf3-54d7-95bc-278bda999389","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"7f33700c-7e2f-57fd-8bf7-69ff47027b9e","title":"Hacking the international travel system","subtitle":null,"slug":"2025-221-hacking-the-international-travel-system","link":"https://pretalx.hackerhotel.nl/2025/talk/9ZGMCC/","description":"It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.\n\nIt's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.\n \nWe are experts in moving people to places that various governments would rather we didn't. The global immigration, customs, and travel system is an absolutely massive technological and human system designed to make sure things happen according to the government's agenda. We have our own agenda, and it all makes for great hacking potential.\n \nInsert clever engineering, some interesting math, more than a bit of skullduggery, and you end up with our routing system and what we humbly suggest is an epic hack for a life saving purpose.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Anne Ogborn"],"tags":["221","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 3"],"view_count":308,"promoted":false,"date":"2025-02-16T11:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T01:15:03.441+01:00","length":1892,"duration":1892,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/221-7f33700c-7e2f-57fd-8bf7-69ff47027b9e.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/221-7f33700c-7e2f-57fd-8bf7-69ff47027b9e_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/221-7f33700c-7e2f-57fd-8bf7-69ff47027b9e.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/221-7f33700c-7e2f-57fd-8bf7-69ff47027b9e.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-221-hacking-the-international-travel-system","url":"https://api.media.ccc.de/public/events/7f33700c-7e2f-57fd-8bf7-69ff47027b9e","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"196fa942-a603-5b26-998a-f58c8af8f7b4","title":"Hacking with screenreaders as tool or utility","subtitle":null,"slug":"2025-220-hacking-with-screenreaders-as-tool-or-utility","link":"https://pretalx.hackerhotel.nl/2025/talk/AXL9WT/","description":"How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.\n\nHow to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.\n\nOther topics are:\n* Reading and analysing logging\n* Capture a scrolling text\n* Query of classes etc\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Peter op 't Hof"],"tags":["220","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 2"],"view_count":108,"promoted":false,"date":"2025-02-15T10:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2025-10-11T13:45:05.267+02:00","length":3117,"duration":3117,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/220-196fa942-a603-5b26-998a-f58c8af8f7b4.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/220-196fa942-a603-5b26-998a-f58c8af8f7b4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/220-196fa942-a603-5b26-998a-f58c8af8f7b4.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/220-196fa942-a603-5b26-998a-f58c8af8f7b4.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-220-hacking-with-screenreaders-as-tool-or-utility","url":"https://api.media.ccc.de/public/events/196fa942-a603-5b26-998a-f58c8af8f7b4","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"5bd7e1a2-2981-50cc-b187-f044e6932d97","title":"Frank talks AI, keynote style","subtitle":null,"slug":"2025-217-frank-talks-ai-keynote-style","link":"https://pretalx.hackerhotel.nl/2025/talk/U7W3YQ/","description":"Frank talks about AI, why it all of a sudden is everywhere and what it means.\n\nThe keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom us? Or is it too soon to tell?\n\nWith the invention of the car, the car accident, vehicle man slaughter and the getaway car were also invented, as well as the police car and motorized ambulances. How does this apply to artificial intelligence?\n\nWhat is the current state of A.I., what does it mean to our perception of the truth, and can it help us make the world more secure? How do classical security measures apply to the A.I. world, where do they fall short, and can we expect new or improved measures with the help of A.I.? Spoiler: yes, they do, and yes, we can.\n\nIn this talk, Frank will look at the A.I. wave from his unique and down to earth perspective. And hopefully you will walk away with a better understanding of AI in the context of (cyber) security.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Frank Breedijk"],"tags":["217","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":339,"promoted":false,"date":"2025-02-15T20:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-02T19:15:06.527+02:00","length":2637,"duration":2637,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/217-5bd7e1a2-2981-50cc-b187-f044e6932d97.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/217-5bd7e1a2-2981-50cc-b187-f044e6932d97_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/217-5bd7e1a2-2981-50cc-b187-f044e6932d97.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/217-5bd7e1a2-2981-50cc-b187-f044e6932d97.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-217-frank-talks-ai-keynote-style","url":"https://api.media.ccc.de/public/events/5bd7e1a2-2981-50cc-b187-f044e6932d97","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"c866b0a5-f72a-51be-b776-0e3c25b339dc","title":"How to do vulnerability disclosure in Japan","subtitle":null,"slug":"2025-210-how-to-do-vulnerability-disclosure-in-japan","link":"https://pretalx.hackerhotel.nl/2025/talk/GEVFSR/","description":"With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclose zero days to vendors and report vulnerabilities to website operators. Also, the Nation Institute for Information Communication Technology scans and notifies vulnerable IoT, and the Japanese government has adjusted laws to allow this.\n\nWith the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for the Dutch Institute for Vulnerability Disclosure. \n\nKey findings:\nJapan’s governmental policy on CVD dates back to 2004. The Japanese Computer Emergency Response Team Coordination Center (JPCERT/CC) is an independent institute founded in 1996 and currently funded by METI. The center handles incidents, analyses and shares information on online threats, monitors internet traffic, and has published Vulnerability Notes with Advisories since 2004.\n\nJapanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure as Dutch case law does. In Japan, doing CVD on a broader scope and without informed consent is perceived as very rare. Security researchers generally fear prosecution as they may violate cyber security and privacy laws. A common statement at hacker events was: “I only report if they provide a bug bounty.”\n\nJapanese institutes help citizens disclose zero days to vendors and report vulnerabilities to website operators. Organizations like IPA and JPCERT/CC provide structured processes for reporting vulnerabilities, focusing primarily on zero days affecting software or websites widely used in Japan. These reports are forwarded to vendors and operators, though researchers must navigate strict conditions.\n\nThe Nation institute for Information Communition Technology scans and notifies vulnerable IoT, and the Japanese government has adjusted laws to allow this. The NOTICE project aims to prevent cyber-attacks by scanning IoT devices on weak passwords by attempting to log in. These activities run parallel to the Handling Regulations for Information Related to Vulnerabilities in Software Products and clearly violate cyber security laws. In order to proceed on this endeavor, the Cabinet overruled the Act on Prohibition of Unauthorized Computer Access by a special law, which provided NICT the mandate. To my knowledge, this is unique in the world.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Chris van 't Hof"],"tags":["210","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 2"],"view_count":148,"promoted":false,"date":"2025-02-15T14:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-21T13:15:05.603+01:00","length":1523,"duration":1523,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/210-c866b0a5-f72a-51be-b776-0e3c25b339dc.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/210-c866b0a5-f72a-51be-b776-0e3c25b339dc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/210-c866b0a5-f72a-51be-b776-0e3c25b339dc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/210-c866b0a5-f72a-51be-b776-0e3c25b339dc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-210-how-to-do-vulnerability-disclosure-in-japan","url":"https://api.media.ccc.de/public/events/c866b0a5-f72a-51be-b776-0e3c25b339dc","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"12a34943-f051-577b-94e0-1f47412edcf6","title":"Basisbeveiliging / Internet Cleanup Foundation - State of the map 2024","subtitle":null,"slug":"2025-202-basisbeveiliging-internet-cleanup-foundation-state-of-the-map-2024","link":"https://pretalx.hackerhotel.nl/2025/talk/MDKVVA/","description":"The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of other institutions cleaned up their baseline security issues.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Elger \"Stitch\" Jonker"],"tags":["202","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 3"],"view_count":187,"promoted":false,"date":"2025-02-16T16:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-31T08:15:04.581+02:00","length":1899,"duration":1899,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/202-12a34943-f051-577b-94e0-1f47412edcf6.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/202-12a34943-f051-577b-94e0-1f47412edcf6_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/202-12a34943-f051-577b-94e0-1f47412edcf6.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/202-12a34943-f051-577b-94e0-1f47412edcf6.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-202-basisbeveiliging-internet-cleanup-foundation-state-of-the-map-2024","url":"https://api.media.ccc.de/public/events/12a34943-f051-577b-94e0-1f47412edcf6","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"62c9a6a9-2e3b-56a0-888a-43151e63153b","title":"A Communication’s Guide To The Hackerscene","subtitle":null,"slug":"2025-191-a-communication-s-guide-to-the-hackerscene","link":"https://pretalx.hackerhotel.nl/2025/talk/Z38YHU/","description":"Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.\n\nStrijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 effectief communiceert met de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶𝘴 (de niet hackende mens). \n\nWaarom? Communicatie is fantastisch, duh. En doelgerichte communicatie zorgt ervoor dat die 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt. \n\nTip: neem een pen mee\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Marieke","Roxane"],"tags":["191","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-nld","Day 3"],"view_count":132,"promoted":false,"date":"2025-02-16T14:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T22:30:06.534+01:00","length":2511,"duration":2511,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/191-62c9a6a9-2e3b-56a0-888a-43151e63153b.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/191-62c9a6a9-2e3b-56a0-888a-43151e63153b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/191-62c9a6a9-2e3b-56a0-888a-43151e63153b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/191-62c9a6a9-2e3b-56a0-888a-43151e63153b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-191-a-communication-s-guide-to-the-hackerscene","url":"https://api.media.ccc.de/public/events/62c9a6a9-2e3b-56a0-888a-43151e63153b","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"0c1247dc-59b6-55c2-af99-f32d1718eb4d","title":"Getting a feel for lockpicking (opening up the world of locksport for the visual impaired)","subtitle":null,"slug":"2025-169-getting-a-feel-for-lockpicking-opening-up-the-world-of-locksport-for-the-visual-impaired-","link":"https://pretalx.hackerhotel.nl/2025/talk/WBSRED/","description":"Lockpicking is a sport where you open locks without force and mostly without keys. While doing this activity nothing much can be seen of the actual process. In stead you need to rely on sound and feel (tactile feedback from the lock). \nTherefor a lot of people (including us) think a visual impaired person could be rather good at this (as they are more trained to use the \"other\" senses)\nThe firsts steps into locksport however are VERY visually heavy (video's, pictures, diagrams) which makes it rather hard for a visual impaired person to get started.\nWe believe we fixed that now.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["jos"],"tags":["169","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 1"],"view_count":176,"promoted":false,"date":"2025-02-14T16:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-02-14T01:45:05.799+01:00","length":2627,"duration":2627,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/169-0c1247dc-59b6-55c2-af99-f32d1718eb4d.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/169-0c1247dc-59b6-55c2-af99-f32d1718eb4d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/169-0c1247dc-59b6-55c2-af99-f32d1718eb4d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/169-0c1247dc-59b6-55c2-af99-f32d1718eb4d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-169-getting-a-feel-for-lockpicking-opening-up-the-world-of-locksport-for-the-visual-impaired-","url":"https://api.media.ccc.de/public/events/0c1247dc-59b6-55c2-af99-f32d1718eb4d","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"c1b01745-de8f-5aa1-bb31-7abef02831b8","title":"Build your own parametric speaker","subtitle":null,"slug":"2025-201-build-your-own-parametric-speaker","link":"https://pretalx.hackerhotel.nl/2025/talk/9V7W9G/","description":"In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speaker\n\nParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive for hobbyists.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Orange_Murker (Luna)"],"tags":["201","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 3"],"view_count":2425,"promoted":false,"date":"2025-02-16T13:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-03T14:45:06.159+02:00","length":940,"duration":940,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/201-c1b01745-de8f-5aa1-bb31-7abef02831b8.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/201-c1b01745-de8f-5aa1-bb31-7abef02831b8_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/201-c1b01745-de8f-5aa1-bb31-7abef02831b8.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/201-c1b01745-de8f-5aa1-bb31-7abef02831b8.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-201-build-your-own-parametric-speaker","url":"https://api.media.ccc.de/public/events/c1b01745-de8f-5aa1-bb31-7abef02831b8","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"ea83dc76-0592-5edc-a4ac-919e6fb5f9a1","title":"AiTM: Lessons Learned","subtitle":null,"slug":"2025-172-aitm-lessons-learned","link":"https://pretalx.hackerhotel.nl/2025/talk/WYLJK3/","description":"\"AiTM: Lessons Learned\" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like Evilginx. And now the SaaS providers allowing anyone to buy access to an AiTM platform.\n\nWe give an insight into a popular AiTM SaaS platform and the revenue stream hosting such software creates. The session ends by outlining common techniques to prevent these types of attacks. Most organizations use M365 and experience attacks using AITM to bypass MFA. At the same time SaaS providers are building AITM services that allow targeteted attacks allowing for supply chain attacks (AITM targeted against admin sites for: pypi, npmjs and rubygems). At the same time used for very specific scams for example against booking.com. Attackers use the booking.com hotel login to extract creditcard information for upcomming hotel guests.\n\nThere's been an uprising in the amount of AITM based attacks. BEC fraud operators use it as MFA is more and more common. But the apearance of SaaS providers in the AITM space make these attacks easier to perform and therefore making them more common. Booking.com has been a popular target allowing attackers to use the hotel operator login to phish creditcards by sending upcomming guests reminders to pay. The fact that these reminders are sent via the booking.com app makes them super trustworthy. At the same time environments such as M365/EntraID are popular targets for other operators. This past year we've been trying to prevent and detect these types of attacks. The goal of the presentation is make attendees aware of the risks, the different operators and types of attacks happening today.\n\noutline:\n1) What is AiTM/BITB\n1.1) Phishing history\n1.2) Old school phish\n1.3) Introduction of commong framework (UADMIN, opwelk, haiku)\n1.4) Evilginx\n1.5) AiTM SaaS providers\n\n2) How to detect phishes\n2.1) The concept\n2.2) What we have built - didsomeoneclone.me\n2.3) Then came the Microsoft idea\n2.4) Gaining insight into the amount of phishes\n\n3) Fingerprint tool\n3.1) The goal\n3.2) How does it work?\n3.3) Adding certificate transparency to preempt attacks\n3.4) Outcome and statistics\n\n4) What we see\n4.1) How often does it actually occur?\n4.2) Different actors. Example.com. Evilginx Rick Roll, MSPHP\n4.3) Microsoft sandbox also visits the URLs and they come in\n4.4) How quickly is Evilginx taken down\n\n5) actors\n5.1) various offers\n5.2) actor revenue\n\n6) Future work\n6.1) automatically finding victims in our EDR tooling\n6.2) Attempts at improvement - CSS exfil.\n6.3) Roadmap\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Rik van Duijn","Wesley Neelen"],"tags":["172","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":76,"promoted":false,"date":"2025-02-15T11:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-02-18T23:45:08.033+01:00","length":2375,"duration":2375,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/172-ea83dc76-0592-5edc-a4ac-919e6fb5f9a1.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/172-ea83dc76-0592-5edc-a4ac-919e6fb5f9a1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/172-ea83dc76-0592-5edc-a4ac-919e6fb5f9a1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/172-ea83dc76-0592-5edc-a4ac-919e6fb5f9a1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-172-aitm-lessons-learned","url":"https://api.media.ccc.de/public/events/ea83dc76-0592-5edc-a4ac-919e6fb5f9a1","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"ecf49852-b498-56c8-9dc8-f890523f6b7b","title":"Abacus - about the new software for the Dutch Elections","subtitle":null,"slug":"2025-197-abacus-about-the-new-software-for-the-dutch-elections","link":"https://pretalx.hackerhotel.nl/2025/talk/7YBMR3/","description":"The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.\n\nThe Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it works, in a production style setting involving test data. After all the counting we take a tour through the GitHub repo (https://github.com/kiesraad/abacus), explain the architecture and choices behind the project so far. \n\nCome to this workshop if you are interested in the Dutch Elections and want to understand the actual process, learn about the software development that is being done and ask everything you always wanted to know. Do visit the presentation by Fleur van Leusden, our CISO.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Niels Hatzmann"],"tags":["197","2025","hackerhotel2025","Workshops","Willem van Oranje","hackerhotel2025-nld","Day 2"],"view_count":124,"promoted":false,"date":"2025-02-15T11:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-20T03:15:03.239+01:00","length":2792,"duration":2792,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/197-ecf49852-b498-56c8-9dc8-f890523f6b7b.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/197-ecf49852-b498-56c8-9dc8-f890523f6b7b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/197-ecf49852-b498-56c8-9dc8-f890523f6b7b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/197-ecf49852-b498-56c8-9dc8-f890523f6b7b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-197-abacus-about-the-new-software-for-the-dutch-elections","url":"https://api.media.ccc.de/public/events/ecf49852-b498-56c8-9dc8-f890523f6b7b","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"073dd80e-198c-5752-b4d5-59a54964f8b3","title":"Android Auto (Flitsmeister)","subtitle":null,"slug":"2025-205-android-auto-flitsmeister-","link":"https://pretalx.hackerhotel.nl/2025/talk/ZQ3RYV/","description":"How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.\n\nFrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.\nThis navigation app uses MapLibre to render a map on the Car screen.\nDuring this talk, we will discuss how this works and how you can create your own Android Auto-based app.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["FrankkieNL"],"tags":["205","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 1"],"view_count":461,"promoted":false,"date":"2025-02-14T17:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-04-02T23:15:07.124+02:00","length":2798,"duration":2798,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/205-073dd80e-198c-5752-b4d5-59a54964f8b3.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/205-073dd80e-198c-5752-b4d5-59a54964f8b3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/205-073dd80e-198c-5752-b4d5-59a54964f8b3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/205-073dd80e-198c-5752-b4d5-59a54964f8b3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-205-android-auto-flitsmeister-","url":"https://api.media.ccc.de/public/events/073dd80e-198c-5752-b4d5-59a54964f8b3","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"2a77bed5-0a87-55fb-be17-04d786811705","title":"Automating incident response: scalable \u0026 fast, within minutes","subtitle":null,"slug":"2025-175-automating-incident-response-scalable-fast-within-minutes","link":"https://pretalx.hackerhotel.nl/2025/talk/ARDG3T/","description":"In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in  digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that combines the investigative prowess of a digital detective with a DevOps mindset. \n\nIn this talk, we will present how the incident response process of acquiring data, processing data, and analyzing information can be automated. Based on how we have built our incident response lab using open-source software packages developed by Microsoft (AVML), Google (Timesketch, WinPmem), Rapid7 (Velociraptor), Fox-IT (Dissect), Elastic, KROLL (KAPE) and HashiCorp (Terraform, Vault). We will guide you from using tools manually to using these tools automatically and magically. Well not really magically, but we will emphasise the application of a DevOps mindset to the process that most incident responders execute on a daily basis including ourselves, combined with examples that can be put into practice.\n\nIn today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in the perspective of digital forensics, is no longer sufficient. It's time for a shift towards an automated incident response strategy that combines the investigative prowess of a digital detective with a DevOps mindset.\n\nIn this talk, we will present how the incident response process of acquiring data, processing data, and analyzing information can be automated. We will guide you from using tools manually to using these tools automatically and magically . Well not really magically, but we will emphasize the application of a DevOps mindset to the process that most incident responders execute on a daily basis including ourselves, combined with examples  that can be put into practice. \nAn example of this is that the human knowledge of an incident responder should feed into the repeatable methods and should not stay in the mind of the best incident responder in the team. By using feedback loops, the knowledge that is gained during a case can be transformed into methods that can be re-used during new cases. \n\nIn setting up our incident response service, we had the benefit that we could start from scratch, without any legacy, in a cloud native world and with a significant number of lessons learned in the past, we have built an innovative incident response lab using open-source software packages developed by Microsoft, Google, Rapid7, Fox-IT, Elastic, KROLL and HashiCorp. By using Infrastructure as Code (IaC) we can automatically provision the lab on the Google Cloud Platform, acquire and process data and perform analysis using various methods within two hours, without the intervention of an incident responder.\n\nWe still need humans, but we should focus on doing the creative and research part of an incident response case. Besides that, there is no silver bullet, humans cannot fully trust the automated analysis. This is where the investigative prowess of a digital detective comes into play, ensuring the validation of results and the reproducibility of findings throughout the entire incident response process, from data acquisition to analysis of information.\n\nReferences\n\nhttps://hackernoon.com/the-devops-mindset-a-step-by-step-plan-to-implement-devops-s03p35rr \n\nhttps://nluug.nl/bestanden/presentaties/2022-11-29-francisco-dominguez-en-zawadi-done-automating-incident-response-should-be-the-default.pdf \n\nhttps://zawadidone.nl/automating-dfir-using-cloud-services/\n\nhttps://www.huntandhackett.com/blog/scalable-forensics-timeline-analysis-using-dissect-and-timesketch\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Zawadi Done","Mattijs"],"tags":["175","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 1"],"view_count":317,"promoted":false,"date":"2025-02-14T17:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-27T21:15:06.484+01:00","length":3034,"duration":3034,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/175-2a77bed5-0a87-55fb-be17-04d786811705.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/175-2a77bed5-0a87-55fb-be17-04d786811705_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/175-2a77bed5-0a87-55fb-be17-04d786811705.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/175-2a77bed5-0a87-55fb-be17-04d786811705.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-175-automating-incident-response-scalable-fast-within-minutes","url":"https://api.media.ccc.de/public/events/2a77bed5-0a87-55fb-be17-04d786811705","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"c4240d09-0e81-5661-ad48-5d52cd0b701d","title":"Hackerhotel Badge talk","subtitle":null,"slug":"2025-226-hackerhotel-badge-talk","link":"https://pretalx.hackerhotel.nl/2025/talk/CQRYEL/","description":"Our workflow, challenges and other fun things\n\nFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yield badges and what it took to deliver these in the hands of the Hacker Hotel people.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Pim"],"tags":["226","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 3"],"view_count":304,"promoted":false,"date":"2025-02-16T16:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-23T12:45:04.430+01:00","length":1549,"duration":1549,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/226-c4240d09-0e81-5661-ad48-5d52cd0b701d.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/226-c4240d09-0e81-5661-ad48-5d52cd0b701d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/226-c4240d09-0e81-5661-ad48-5d52cd0b701d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/226-c4240d09-0e81-5661-ad48-5d52cd0b701d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-226-hackerhotel-badge-talk","url":"https://api.media.ccc.de/public/events/c4240d09-0e81-5661-ad48-5d52cd0b701d","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"cfeb2e64-4d4c-5d97-8264-85d463503143","title":"Closing Hackerhotel 2025","subtitle":null,"slug":"2025-227-closing-hackerhotel-2025","link":"https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/","description":"Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Dimitri"],"tags":["227","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 3"],"view_count":163,"promoted":false,"date":"2025-02-16T17:15:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2025-09-22T21:00:09.965+02:00","length":1899,"duration":1899,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/227-cfeb2e64-4d4c-5d97-8264-85d463503143.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/227-cfeb2e64-4d4c-5d97-8264-85d463503143_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/227-cfeb2e64-4d4c-5d97-8264-85d463503143.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/227-cfeb2e64-4d4c-5d97-8264-85d463503143.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-227-closing-hackerhotel-2025","url":"https://api.media.ccc.de/public/events/cfeb2e64-4d4c-5d97-8264-85d463503143","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"437617bc-0429-5bce-b1df-38bd00d87868","title":"Tanmatsu/WHY2025 badge PCB design","subtitle":null,"slug":"2025-188-tanmatsu-why2025-badge-pcb-design","link":"https://pretalx.hackerhotel.nl/2025/talk/G79YRC/","description":"This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, challenges and insights from working with pre-release chip prototypes, and a discussion on the practical aspects of MIPI DSI/SCI interfaces, including LVDS and impedance. The session will share both the hurdles and triumphs encountered during the design process.\n\nA talk about the technical aspects of the hardware design of the latest hardware design created by badge team.\nThe Tanmatsu hardware design is finished, and will be available for the community as soon as the ESP32-P4 chips are available. The design will also be the bases for the WHY2025 badge.\nIn this talk we'll take a deep dive into developing a badge project in a neurodiverse community:\n- PCB high level design\n- Cost considerations when designing a 4000x PCB\n- Some horror and beauty on the design path\n- MIPI DSI/SCI (LVDS, multi layer, impedance and clearance)\n- Mass production considerations\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Renze Nicolai","Paul Honig"],"tags":["188","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":457,"promoted":false,"date":"2025-02-15T16:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-23T12:45:04.448+01:00","length":2922,"duration":2922,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/188-437617bc-0429-5bce-b1df-38bd00d87868.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/188-437617bc-0429-5bce-b1df-38bd00d87868_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/188-437617bc-0429-5bce-b1df-38bd00d87868.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/188-437617bc-0429-5bce-b1df-38bd00d87868.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-188-tanmatsu-why2025-badge-pcb-design","url":"https://api.media.ccc.de/public/events/437617bc-0429-5bce-b1df-38bd00d87868","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"04739ca8-234e-5abb-805c-8bff4189a2cb","title":"I love historical computing. to the moon and back","subtitle":null,"slug":"2025-168-i-love-historical-computing-to-the-moon-and-back","link":"https://pretalx.hackerhotel.nl/2025/talk/B7GZJY/","description":"This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.\n\nI will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.\n\nBack in the period 1962 to 1969 the US went on a mission to get people on the moon. This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) that were used during that time on board the Apollo missions that got us to the moon and back.\n\nI will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Jeroen Baten"],"tags":["168","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 2"],"view_count":83,"promoted":false,"date":"2025-02-15T11:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-02-28T13:45:07.419+01:00","length":2106,"duration":2106,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/168-04739ca8-234e-5abb-805c-8bff4189a2cb.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/168-04739ca8-234e-5abb-805c-8bff4189a2cb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/168-04739ca8-234e-5abb-805c-8bff4189a2cb.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/168-04739ca8-234e-5abb-805c-8bff4189a2cb.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-168-i-love-historical-computing-to-the-moon-and-back","url":"https://api.media.ccc.de/public/events/04739ca8-234e-5abb-805c-8bff4189a2cb","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867","title":"Dutch Fun! (damentals)","subtitle":null,"slug":"2025-199-dutch-fun-damentals-","link":"https://pretalx.hackerhotel.nl/2025/talk/NZZUQV/","description":"This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff your way into pub talk with locals. Please bring pen and paper for the old school school experience!\n\nI am a Dutch native teacher \u003ci\u003eDutch as a second language\u003c/i\u003e, with experience teaching expats. My background in general linguistics and artificial intelligence as well as participating in the hackers' community enables me to present a language workshop tailored for hackers. In fact, as a teacher for a a general audience I must refrain myself from being too \"logical, analytical or just plain geeky\" to keep all students happy.\n\nIn this workshop I will focus on:\n* providing structure of the Dutch language, similar to how you would explain a programming language, showing the regularities that are present\n* giving small examples of words as well as expressions and grammatical rules to show a more specific idea of Dutch\n* interaction: exercises, individually and in groups, puzzle-like, but also speaking exercises (this is always a tough one, so we'll try)\n* concrete focus will be on gender of nouns: the article \"the\" in English can be \"de\" or \"het\" in Dutch, depending on the gender. Some grammar (demonstratives, adjectives) depends on this gender, following small yet counterintuitive rules\n* have fun: I will present weird exceptions, false friends and we will also listen to and analyze a Dutch song\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Dina Tuinhof"],"tags":["199","2025","hackerhotel2025","Workshops","Willem van Oranje","hackerhotel2025-eng","Day 2"],"view_count":79,"promoted":false,"date":"2025-02-15T14:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-01-12T19:30:21.970+01:00","length":4888,"duration":4888,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/199-ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/199-ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/199-ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/199-ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-199-dutch-fun-damentals-","url":"https://api.media.ccc.de/public/events/ebf8bbc1-dfc5-5f1b-8e4d-e73b1420e867","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"583c7c4b-79a6-5c13-8db1-45295d313ab3","title":"Don't Trust Us","subtitle":null,"slug":"2025-174-don-t-trust-us","link":"https://pretalx.hackerhotel.nl/2025/talk/DHTDEM/","description":"In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.\n\nBut you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The Netherlands to make sure you can trust the outcome of our elections, without having to trust us.\n\nOn average, we have one election each year.\n\nBut not everyone knows how elections in our country are protected against security risks. We know we don't use voting machines anymore, but we do use software. We are currently working on new software. In this presentation you will learn:\n\n- Why the software we use doesn't have to be able to resist every type of \"cyber\" attack.\n- How voters can verify the results of elections either physically or from the comfort of their computer from home.\n- Why voting machines or internet voting are not currently a real alternative worth considering.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Fleur van Leusden"],"tags":["174","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":612,"promoted":false,"date":"2025-02-15T17:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-21T21:00:05.635+01:00","length":1832,"duration":1832,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/174-583c7c4b-79a6-5c13-8db1-45295d313ab3.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/174-583c7c4b-79a6-5c13-8db1-45295d313ab3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/174-583c7c4b-79a6-5c13-8db1-45295d313ab3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/174-583c7c4b-79a6-5c13-8db1-45295d313ab3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-174-don-t-trust-us","url":"https://api.media.ccc.de/public/events/583c7c4b-79a6-5c13-8db1-45295d313ab3","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"c89d8259-0789-5e93-9bde-db958583b15a","title":"Aid to Ukraine - with Roman from Kharkiv","subtitle":null,"slug":"2025-198-aid-to-ukraine-with-roman-from-kharkiv","link":"https://pretalx.hackerhotel.nl/2025/talk/QD8VRX/","description":"Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.\n\nThe IT community in Kharkiv is doing their best to help their city and country to counter the effects of the invasion and war. Roman Kniaziev comes over from Kharkiv to explain how, together with all the volunteers of ETOC he tries to help out. We are helping him, with all kinds of humanitarian support through our foundation Aid to Ukraine (https://aidtoukraine.nl). \n\nThe war has shown us there is something to do for everyone, that it is useful and well received. The war still rages and help is always welcome. This talk will show you what has happened last year and how we all can help Ukraine during this horrible time.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Niels Hatzmann"],"tags":["198","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":157,"promoted":false,"date":"2025-02-15T15:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-01-29T11:00:10.198+01:00","length":3335,"duration":3335,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/198-c89d8259-0789-5e93-9bde-db958583b15a.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/198-c89d8259-0789-5e93-9bde-db958583b15a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/198-c89d8259-0789-5e93-9bde-db958583b15a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/198-c89d8259-0789-5e93-9bde-db958583b15a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-198-aid-to-ukraine-with-roman-from-kharkiv","url":"https://api.media.ccc.de/public/events/c89d8259-0789-5e93-9bde-db958583b15a","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"d91e50cc-8f98-55a7-a9bf-13c250daf6e9","title":"Openingstalk Hackerhotel 2025","subtitle":null,"slug":"2025-166-openingstalk-hackerhotel-2025","link":"https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/","description":"Openingstalk by Dimitri opening Hackerhotel 2025\n\nIn this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Dimitri"],"tags":["166","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 1"],"view_count":229,"promoted":false,"date":"2025-02-14T20:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-04-03T00:00:04.933+02:00","length":3947,"duration":3947,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/166-d91e50cc-8f98-55a7-a9bf-13c250daf6e9.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/166-d91e50cc-8f98-55a7-a9bf-13c250daf6e9_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/166-d91e50cc-8f98-55a7-a9bf-13c250daf6e9.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/166-d91e50cc-8f98-55a7-a9bf-13c250daf6e9.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-166-openingstalk-hackerhotel-2025","url":"https://api.media.ccc.de/public/events/d91e50cc-8f98-55a7-a9bf-13c250daf6e9","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"5d3a6fa9-3034-56f1-b9e8-b233194de3aa","title":"How do models like ChatGPT (LLM) work, can you hack them and run them offline?","subtitle":null,"slug":"2025-186-how-do-models-like-chatgpt-llm-work-can-you-hack-them-and-run-them-offline-","link":"https://pretalx.hackerhotel.nl/2025/talk/GR78YQ/","description":"What is an LLM? Can you run it yourself? Can you hack it?\n\nThis session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself.\n\nKeyword: Supervised Learning and Reenforced Learning, Hugging Face, Quantization, Ollama, open-webui, Prompt Hacking, Tokens, Context Length\n\nI will explain basics of Machine Learning concepts\nHow these ML concepts have created LLMs and how they somewhat work\nWhat is needed to run LLMs (Inference) and how you can run it your self\nhow to test various LLMs\nprompt hacking\nusing LLMs for coding\nMany live demos\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Anykey"],"tags":["186","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 3"],"view_count":763,"promoted":false,"date":"2025-02-16T11:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-27T15:00:04.201+01:00","length":3510,"duration":3510,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/186-5d3a6fa9-3034-56f1-b9e8-b233194de3aa.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/186-5d3a6fa9-3034-56f1-b9e8-b233194de3aa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/186-5d3a6fa9-3034-56f1-b9e8-b233194de3aa.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/186-5d3a6fa9-3034-56f1-b9e8-b233194de3aa.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-186-how-do-models-like-chatgpt-llm-work-can-you-hack-them-and-run-them-offline-","url":"https://api.media.ccc.de/public/events/5d3a6fa9-3034-56f1-b9e8-b233194de3aa","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"937f25c1-8ce3-52bc-b647-d5db9ef64d57","title":"Don’t judge a vulnerability by its CVSS score","subtitle":null,"slug":"2025-204-don-t-judge-a-vulnerability-by-its-cvss-score","link":"https://pretalx.hackerhotel.nl/2025/talk/DHNUWQ/","description":"The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intelligence are way more important. Expect real-world examples, a touch of humor, and actionable insights to help you move beyond the CVSS score and toward a smarter, risk-based approach to vulnerability management.\n\nBecause let’s face it: a CVSS 7 can be way more critical to your organization then a CVSS 9!\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Stefan Lambregts"],"tags":["204","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 2"],"view_count":287,"promoted":false,"date":"2025-02-15T14:30:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-27T21:30:06.237+01:00","length":1652,"duration":1652,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/204-937f25c1-8ce3-52bc-b647-d5db9ef64d57.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/204-937f25c1-8ce3-52bc-b647-d5db9ef64d57_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/204-937f25c1-8ce3-52bc-b647-d5db9ef64d57.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/204-937f25c1-8ce3-52bc-b647-d5db9ef64d57.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-204-don-t-judge-a-vulnerability-by-its-cvss-score","url":"https://api.media.ccc.de/public/events/937f25c1-8ce3-52bc-b647-d5db9ef64d57","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"6ac0e56e-9301-521e-92a0-ce9b642e5a7c","title":"Helpful hackers preventing evil hackers from crashing the grid","subtitle":null,"slug":"2025-212-helpful-hackers-preventing-evil-hackers-from-crashing-the-grid","link":"https://pretalx.hackerhotel.nl/2025/talk/TFJCBD/","description":"The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it.\n\nVarious institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. DIVD is allowed to do this and by identifying devices that can form a botnet, DIVD helps to make the smart grid more secure.\n\nDIVD has been conducting research into vulnerabilities in equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to reduce the digital vulnerability of our energy system. DIVD will also build a hardware lab to test devices and scenarios. You may join too and help to save the grid.\n\nIn this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination…\n\nThe European electricity network has become a ‘smart grid’. Consumers are not only users but also producers of energy. More and more devices are connected, smart and online, so supply and demand can be more easily matched. This offers many opportunities for sustainability and possibilities for new players to enter the market. But also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy system and do everything we can to prevent it.\n\nIn the Netherlands and Europe, various institutions test smart devices, set safety standards, and monitor compliance with these standards. However, parties such as our grid operators only have control over the energy grid equipment up to the front door. They are not allowed to look beyond the electricity meter, where most smart equipment is located. Being an independent non-profit research institute, DIVD is allowed to do this. By looking for devices that can form a botnet, DIVD helps to make the smart grid more secure.\n\nDIVD has been scanning the entire internet for vulnerabilities since 2020 and reporting them to the owners of systems. This may involve known vulnerabilities (Common Vulnerabilities and Exposures), new vulnerabilities (Zero-days), leaked credentials (username-password combinations) and online sources that are unintentionally accessible. DIVD is also a CVE Numbering Authority (CNA) and can publish new vulnerabilities. Our way of working is supported by the parties responsible for digital security in the Netherlands, such as NCTV, NCSC, AIVD, police, and many cyber security companies.\n\nIn addition to these activities, DIVD also conducts research into vulnerabilities in the equipment of the energy system, such as charging stations, solar panel inverters, home batteries, and (Home) Energy Management Systems. Previous findings have led to several parliamentary questions and follow-up actions by authorities such as RDI, the Dutch Authority on Digital Infrastructure. With the CVD in the Energy Sector project, DIVD will set up a research and education line with the DIVD.academy in collaboration with the energy sector to jointly reduce the digital vulnerability of our energy system. In 2025, we will:\n- Incorporate all energy-related research by DIVD into a research line under a Research Lead Energy.\n- Establish structural partnerships with the energy sector to jointly resolve vulnerabilities.\n- Build our own hardware lab where we will test peripheral equipment for security and collaborate with other hardware labs.\n- Set up our CNA to receive, process, and publish CVEs of digital solutions used in the energy system.\nShare research findings with authorities to support their enforcement. DIVD.academy familiarize students with basic knowledge of energy systems and energy equipment and involve them in practice-oriented research.\n- Develop teaching materials for the installation sector and training courses to increase awareness of vulnerabilities in the energy system.\n- Share our knowledge via hacker events and security conferences.\n\nIn this talk, we will demonstrate how we could have generated outages using zero-days we found in solar converters and electric car chargers. But we also did it with just one user-password combination…\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Chris van 't Hof"],"tags":["212","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 3"],"view_count":205,"promoted":false,"date":"2025-02-16T15:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T20:30:06.394+01:00","length":3011,"duration":3011,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/212-6ac0e56e-9301-521e-92a0-ce9b642e5a7c.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/212-6ac0e56e-9301-521e-92a0-ce9b642e5a7c_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/212-6ac0e56e-9301-521e-92a0-ce9b642e5a7c.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/212-6ac0e56e-9301-521e-92a0-ce9b642e5a7c.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-212-helpful-hackers-preventing-evil-hackers-from-crashing-the-grid","url":"https://api.media.ccc.de/public/events/6ac0e56e-9301-521e-92a0-ce9b642e5a7c","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"e919fcca-fd30-5166-b407-5b582c960b29","title":"Operation Check Mate: De Rechtszaak","subtitle":null,"slug":"2025-228-operation-check-mate-de-rechtszaak","link":"https://pretalx.hackerhotel.nl/2025/talk/DMAMKD/","description":"Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.\n\nIn teams werk je aan een intrigerende zaak, waarbij alle aspecten van recherchewerk aan bod komen:\n🔍 Recherchewerk: Analyseer de zaak, stel kritische vragen en bepaal de volgende stappen.\u2028\n🗣️ Verhoor: Onderzoek hoe je informatie boven tafel krijgt tijdens een verhoor.\u2028\n🏠 Doorzoeking: Plan en voer een doorzoeking uit. Wat mag wel en wat niet?\u2028\n📱 Digitaal forensisch: Werk met echte digitale sporen en leer hoe je deze effectief kunt vorderen en analyseren.\u2028\n📂 Dossieropbouw: Bouw een sterk strafdossier dat standhoudt in de rechtszaal.\n\nDeze game is méér dan een simulatie: je werkt met scenario’s die zijn ontwikkeld door experts uit het veld, waaronder forensisch onderzoekers, pentesters en professionals uit de strafrechtketen (denk aan politie, OM en rde Rechtspraak). Bovendien hebben creatieve geesten met een verknipte blik gezorgd voor onverwachte twists en uitdagingen.\n\nMaar hier komt de echte uitdaging: hackers zijn vaak kritisch over de politie. Toch, als je nu écht in de schoenen van een rechercheur staat, is het allemaal wel zo simpel als het lijkt? Kun je jouw technische en tactische skills combineren met juridische en ethische overwegingen? En hoe ga je om met druk, complexe gegevens en menselijke factoren?\n\nHet hoogtepunt? Op zondag mondt de zaak uit in een rechtszaak waarin jouw werk op de proef wordt gesteld. Durf jij het aan om jouw skills in de praktijk te brengen en een zaak tot een succesvol einde te brengen?\n\nPraktisch:\n📅 Start: Vrijdag 14 februari 2025 om 13:37\n⚖️ Rechtszaak: Zondag 16 februari om 14:30\n📍 Meld je aan via: sollicitatie@cyberom.nl\n💡 Let op: Het aantal plaatsen is beperkt.\n\nGrijp deze kans, sluit je aan bij een rechercheteam en ontdek of jij het in je hebt om een zaak op te lossen in een wereld vol uitdagingen.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Brenno de Winter"],"tags":["228","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 3"],"view_count":127,"promoted":false,"date":"2025-02-16T14:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-02T15:00:12.322+01:00","length":4309,"duration":4309,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/228-e919fcca-fd30-5166-b407-5b582c960b29.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/228-e919fcca-fd30-5166-b407-5b582c960b29_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/228-e919fcca-fd30-5166-b407-5b582c960b29.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/228-e919fcca-fd30-5166-b407-5b582c960b29.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-228-operation-check-mate-de-rechtszaak","url":"https://api.media.ccc.de/public/events/e919fcca-fd30-5166-b407-5b582c960b29","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"98817d57-9311-5451-8282-16dbe9e54804","title":"A criminal, and victim view of phishing and phishing panels, live of stage.","subtitle":null,"slug":"2025-184-a-criminal-and-victim-view-of-phishing-and-phishing-panels-live-of-stage-","link":"https://pretalx.hackerhotel.nl/2025/talk/KT8ZGY/","description":"The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included.\n\nThis presentation will show several examples of daily phishing that the Dutch Tax and Customs Administration deals with. The Dutch Tax and Customs Administration receives over 60,000 reports of phishing every year. The second part of the presentation includes a live demo of a phishing panel. Using a phishing panel ensures the phishing victim pays for purchasing a 75\" OLED TV without knowing it. The TV is delivered to the cybercriminal's address. All of this is live on stage.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Karl Lovink"],"tags":["184","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-eng","Day 3"],"view_count":158,"promoted":false,"date":"2025-02-16T11:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T03:00:02.554+01:00","length":3083,"duration":3083,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/184-98817d57-9311-5451-8282-16dbe9e54804.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/184-98817d57-9311-5451-8282-16dbe9e54804_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/184-98817d57-9311-5451-8282-16dbe9e54804.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/184-98817d57-9311-5451-8282-16dbe9e54804.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-184-a-criminal-and-victim-view-of-phishing-and-phishing-panels-live-of-stage-","url":"https://api.media.ccc.de/public/events/98817d57-9311-5451-8282-16dbe9e54804","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a","title":"My stairs use 6 IP Addresses and run JavaScript","subtitle":null,"slug":"2025-187-my-stairs-use-6-ip-addresses-and-run-javascript","link":"https://pretalx.hackerhotel.nl/2025/talk/YNQQN7/","description":"I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off of a simple USB power bank for days and costs under about €40 in parts.\n\nCome watch this talk if you want to hear me nerd out for an hour and go deep into the challenges and lessons learned, new skills unlocked and how I wrote a ridiculous Timeline based custom Animation Engine in JavaScript that can render it's output as either PWM or CSS animations to run the whole thing and make it do what I envisioned.\n\nThis talk goes from 3D design and printing to Arduino/Esp32 IOT hardware, software and programming, woodworking and heavy construction to how I finally used Claude to take it to the final iteration and a public release.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["SchizoDuckie"],"tags":["187","2025","hackerhotel2025","Talks","Mission Critical Room (Rembrandt)","hackerhotel2025-eng","Day 2"],"view_count":483,"promoted":false,"date":"2025-02-15T17:00:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-02T23:00:04.424+02:00","length":2460,"duration":2460,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/187-b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/187-b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/187-b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/187-b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-187-my-stairs-use-6-ip-addresses-and-run-javascript","url":"https://api.media.ccc.de/public/events/b4c70ec8-b0dc-5f89-99f5-8d307c2acf7a","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"b4651142-97ea-5681-9088-ef1a08462c64","title":"OT Cyberchallenges 2","subtitle":null,"slug":"2025-190-ot-cyberchallenges-2","link":"https://pretalx.hackerhotel.nl/2025/talk/J33HDT/","description":"A year later, we are back at the wonderful company Acme where nice people make beautiful things.\n\nThis time we will follow up on that and tell you how the company can improve their own maturity and security levels as explained in the standard.\n\nA year later, we are back at the wonderful company Acme where nice people make beautiful things. How did they fare, and what steps can they take now to protect their beautiful company from unwanted incidents.\n\nLast time we explained the challenges the company faces and how they could start their OT cybersecurity journey.\n\nThis time we will follow up on that and tell you how the company can improve their own maturity and security levels as explained in the standard.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Elborro","Ad"],"tags":["190","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 1"],"view_count":89,"promoted":false,"date":"2025-02-14T16:00:00.000+01:00","release_date":"2025-02-15T00:00:00.000+01:00","updated_at":"2026-03-10T22:30:09.237+01:00","length":3567,"duration":3567,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/190-b4651142-97ea-5681-9088-ef1a08462c64.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/190-b4651142-97ea-5681-9088-ef1a08462c64_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/190-b4651142-97ea-5681-9088-ef1a08462c64.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/190-b4651142-97ea-5681-9088-ef1a08462c64.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-190-ot-cyberchallenges-2","url":"https://api.media.ccc.de/public/events/b4651142-97ea-5681-9088-ef1a08462c64","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"8a9f690f-b3c4-5aee-9253-96200cedb732","title":"Wat is data","subtitle":null,"slug":"2025-171-wat-is-data","link":"https://pretalx.hackerhotel.nl/2025/talk/UHZ3EJ/","description":"Sociale constructen gebruikt in software context  en alles wat daar entertainment mee maakt :)\n\nEen interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.\n\nWat is data?\nHoe lang duurt een dag?\nHoe lang duurt een uur?\nHoe lang is een maand?\nWat is een jaartal?\nWat is een geboortedatum?\nWat is een naam?\nHoe lang is een pincode?\nWaaruit bestaat een pincode?\nHoe veilig is een private key?\nWat zijn mooie ronde getallen?\nHoe groot is een bit?\nHoe groot is een byte?\nWaarom zou je sorteren op afmeting?\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Lord BugBlue"],"tags":["171","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 2"],"view_count":178,"promoted":false,"date":"2025-02-15T22:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T10:00:06.476+01:00","length":930,"duration":930,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/171-8a9f690f-b3c4-5aee-9253-96200cedb732.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/171-8a9f690f-b3c4-5aee-9253-96200cedb732_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/171-8a9f690f-b3c4-5aee-9253-96200cedb732.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/171-8a9f690f-b3c4-5aee-9253-96200cedb732.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-171-wat-is-data","url":"https://api.media.ccc.de/public/events/8a9f690f-b3c4-5aee-9253-96200cedb732","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"fb57add8-a097-57df-a61f-464ebcfd8863","title":"The \"O\" in OT","subtitle":null,"slug":"2025-173-the-o-in-ot","link":"https://pretalx.hackerhotel.nl/2025/talk/7BDKGK/","description":"Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid rising cyber threats targeting critical infrastructure. By fostering executive insight into OT management, organizations can improve resilience, enhance security, and gain a competitive edge, ultimately positioning OT as an asset in operational stability and corporate strategy.\n\nThis presentation, titled \"The 'O' in OT,\" explores the importance of executive-level understanding of Operational Technology (OT) within strategic frameworks. It highlights the distinct challenges OT faces compared to IT, including legacy infrastructure, strict uptime requirements, and rising cyber threats. Participants will gain insight into how a strategic focus on OT security and management enhances organizational resilience and competitive strength. By bridging the gap between OT’s operational demands and executive decision-making, this session outlines steps for integrating OT into a cohesive, secure, and future-ready corporate strategy.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Jean-Paul Sablerolle"],"tags":["173","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-nld","Day 3"],"view_count":134,"promoted":false,"date":"2025-02-16T16:15:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-30T19:45:06.211+02:00","length":2252,"duration":2252,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/173-fb57add8-a097-57df-a61f-464ebcfd8863.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/173-fb57add8-a097-57df-a61f-464ebcfd8863_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/173-fb57add8-a097-57df-a61f-464ebcfd8863.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/173-fb57add8-a097-57df-a61f-464ebcfd8863.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-173-the-o-in-ot","url":"https://api.media.ccc.de/public/events/fb57add8-a097-57df-a61f-464ebcfd8863","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"fd841c10-1a08-5a72-bae8-e44aa431784b","title":"How to become your own ISP","subtitle":null,"slug":"2025-170-how-to-become-your-own-isp","link":"https://pretalx.hackerhotel.nl/2025/talk/V7QUX3/","description":"This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.\n\nEver wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're at the right place.\n\nThis talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and what you need to do if you want to participate. You will walk away with practical knowledge on how you can get started. \n\nWe'll also take a short tour of my own network, how I set it up and what I use it for.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Nick Bouwhuis"],"tags":["170","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 3"],"view_count":771,"promoted":false,"date":"2025-02-16T15:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-01T00:30:05.611+02:00","length":2871,"duration":2871,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/170-fd841c10-1a08-5a72-bae8-e44aa431784b.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/170-fd841c10-1a08-5a72-bae8-e44aa431784b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/170-fd841c10-1a08-5a72-bae8-e44aa431784b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/170-fd841c10-1a08-5a72-bae8-e44aa431784b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-170-how-to-become-your-own-isp","url":"https://api.media.ccc.de/public/events/fd841c10-1a08-5a72-bae8-e44aa431784b","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"fcb49a3c-9130-57c7-9127-3c3830e3b71f","title":"Evolution and history of 33.333 years of Hardcore Music","subtitle":null,"slug":"2025-218-evolution-and-history-of-33-333-years-of-hardcore-music","link":"https://pretalx.hackerhotel.nl/2025/talk/UPGVLX/","description":"The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)\n\nI wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samples and watch some video clips. The talk will provide background about the scene: from art to cheese. There will also be some tech about \"how it's made\", but mostly pointers. This talk is __**TOTALLY NOT INTENDED AS**__ a gateway into a permanent desire to listen to distorted and grainy audio.\n\nThis talk mostly focusing on fun and interesting stuff, but due to the inherent nature of hardcore music there might (=guarantee) be references to sex, drugs, violence, profanity, recklessness and spooky scary skeletons in the first ten seconds. This talk is not for all ages and minds.\n\nSo there you have it: licensing AND content AND audience problems galore in just one submission! This is finally giving the hacker hotel producers the missing challenge that they have been searching for all these years.\n\nPS1: If you like this talk in advance, please get in touch if you'd like to add or validate things: it's pretty hard it compress 33.333 years into an hour. PS2: Maybe we'll also do the accompanying dance afterwards, who knows, i'm not really good at it but i know some of you are.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Elger \"Stitch\" Jonker"],"tags":["218","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 2"],"view_count":774,"promoted":false,"date":"2025-02-15T21:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-04-03T20:30:08.558+02:00","length":3931,"duration":3931,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/218-fcb49a3c-9130-57c7-9127-3c3830e3b71f.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/218-fcb49a3c-9130-57c7-9127-3c3830e3b71f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/218-fcb49a3c-9130-57c7-9127-3c3830e3b71f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/218-fcb49a3c-9130-57c7-9127-3c3830e3b71f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-218-evolution-and-history-of-33-333-years-of-hardcore-music","url":"https://api.media.ccc.de/public/events/fcb49a3c-9130-57c7-9127-3c3830e3b71f","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"e0337ddf-5927-50c4-a49c-6763d3a3eb55","title":"How Thermonuclear fusion works, free energy without waste","subtitle":null,"slug":"2025-203-how-thermonuclear-fusion-works-free-energy-without-waste","link":"https://pretalx.hackerhotel.nl/2025/talk/YJZ9KL/","description":"Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:\n- A recap of the physics that makes fusion work\n- How to build a fusion reactor at home\n- How nuclei collide and what is needed to the coulomb barrier\n- Challenges in how to scale it up and make it generate more power \n- How far are we to have fusion energy on the power grid\n- Current technical challenges in fusion\n- How we can solve problems using machine learning\n\nNuclear fusion promises a clean, safe, and abundant source of energy by fusing hydrogen isotopes to release more power than is put in. In this talk, we will start by clarifying the fundamental physics of fusion—how overcoming the Coulomb barrier allows two hydrogen nuclei to fuse.\n\nWe will then explore the path to industrial-scale fusion power, focusing on international prototypes such as ITER, designed to demonstrate an energy output of Q=10 (50 MW in, 500 MW out). Alongside the incredible engineering achievements involved in building such large machines, we will discuss the complexities of controlling high-temperature plasmas, mitigating disruptions, and managing edge-localized modes (ELMs).\n\nThroughout the talk, we will highlight novel control and diagnostic strategies, including machine-learning-based models that can aid real-time plasma monitoring and regulation. Ultimately, we will address how these technologies, with deeper physical understanding, can bring us closer to fusion’s full potential as a reliable and low-waste energy source.\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"eng","persons":["Richard Kraaijenhagen"],"tags":["203","2025","hackerhotel2025","Talks","Willem van Oranje","hackerhotel2025-eng","Day 3"],"view_count":262,"promoted":false,"date":"2025-02-16T14:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-18T07:30:03.797+01:00","length":2230,"duration":2230,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/203-e0337ddf-5927-50c4-a49c-6763d3a3eb55.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/203-e0337ddf-5927-50c4-a49c-6763d3a3eb55_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/203-e0337ddf-5927-50c4-a49c-6763d3a3eb55.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/203-e0337ddf-5927-50c4-a49c-6763d3a3eb55.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-203-how-thermonuclear-fusion-works-free-energy-without-waste","url":"https://api.media.ccc.de/public/events/e0337ddf-5927-50c4-a49c-6763d3a3eb55","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]},{"guid":"nonesense","title":"Onaangekondigde Persconferentie","subtitle":null,"slug":"2025-999-persconferentie-hackerhotel-2025","link":"-","description":"Onaangekondigde Persconferentie by Hackerhotel 2025\n\n-\n\nLicensed to the public under http://creativecommons.org/licenses/by/4.0","original_language":"nld","persons":["Dimitri"],"tags":["999","2025","hackerhotel2025","Talks","Leonardo Da Vinci","hackerhotel2025-nld","Day 2"],"view_count":117,"promoted":false,"date":"2025-02-15T22:30:00.000+01:00","release_date":"2025-02-16T00:00:00.000+01:00","updated_at":"2026-03-31T12:15:07.262+02:00","length":383,"duration":383,"thumb_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/999-nonesense.jpg","poster_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/999-nonesense_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/999-nonesense.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackerhotel/2025/999-nonesense.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/2025-999-persconferentie-hackerhotel-2025","url":"https://api.media.ccc.de/public/events/nonesense","conference_title":"HackerHotel 2025","conference_url":"https://api.media.ccc.de/public/conferences/hackerhotel2025","related":[]}]}