{"acronym":"hackmas2024","aspect_ratio":"16:9","updated_at":"2026-04-04T21:15:05.398+02:00","title":"Hack ma's Castle 2024","schedule_url":"","slug":"conferences/hackmas/2024","event_last_released_at":"2024-09-01T00:00:00.000+02:00","link":"","description":"","webgen_location":"conferences/hackmas/2024","logo_url":"https://static.media.ccc.de/media/events/hackmas/2024/hackmas2024-logo.png","images_url":"https://static.media.ccc.de/media/events/hackmas/2024","recordings_url":"https://cdn.media.ccc.de/events/hackmas/2024","url":"https://api.media.ccc.de/public/conferences/hackmas2024","events":[{"guid":"eb152df9-cc58-5f0d-a18e-83683c6a7ff5","title":"Machine learning from the ground up","subtitle":null,"slug":"machine-learning-from-the-ground-up","link":"https://sessions.hack-mas.at/event/BGinNaMNhqf8ZWNjA/machine-learning-from-the-ground-up","description":"An exploration of the theoretical fundamentals of machine learning and and how machine learning frameworks work. We’ll cover key concepts such as functions, parametrizing functions from data, judging the accuracy of models, GPU computing and some basic model architectures.This session is designed for those interested in the foundational ideas behind machine learning—no coding or advanced mathematics required. Our focus will be on the basics, without digging to much into specific AI applications or large language models (LLMs).English or German possible.Duration: 30min + 15min Q\u0026ADevices: Beamer, Laserpointer would be nice","original_language":"eng","persons":["martinloretzzz"],"tags":["hackmas2024","1618296081","2024",""],"view_count":265,"promoted":false,"date":"2024-08-29T19:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-03-05T16:30:07.398+01:00","length":1806,"duration":1806,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1618296081-eb152df9-cc58-5f0d-a18e-83683c6a7ff5.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1618296081-eb152df9-cc58-5f0d-a18e-83683c6a7ff5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1618296081-eb152df9-cc58-5f0d-a18e-83683c6a7ff5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1618296081-eb152df9-cc58-5f0d-a18e-83683c6a7ff5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/machine-learning-from-the-ground-up","url":"https://api.media.ccc.de/public/events/eb152df9-cc58-5f0d-a18e-83683c6a7ff5","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"ecd54f7a-2acd-5d98-85f2-db391335a4c9","title":"Closing","subtitle":null,"slug":"closing","link":"https://sessions.hack-mas.at/event/6uHXTqeW8azcXsDf3/closing","description":"We close the event","original_language":"deu","persons":["Orgateam"],"tags":["537540358","hackmas2024","Lise Meitner (1.OG)","2024","Day 4"],"view_count":184,"promoted":false,"date":"2024-08-31T20:00:00.000+02:00","release_date":"2024-09-01T00:00:00.000+02:00","updated_at":"2026-03-21T20:30:07.989+01:00","length":4427,"duration":4427,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/537540358-ecd54f7a-2acd-5d98-85f2-db391335a4c9.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/537540358-ecd54f7a-2acd-5d98-85f2-db391335a4c9_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/537540358-ecd54f7a-2acd-5d98-85f2-db391335a4c9.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/537540358-ecd54f7a-2acd-5d98-85f2-db391335a4c9.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/closing","url":"https://api.media.ccc.de/public/events/ecd54f7a-2acd-5d98-85f2-db391335a4c9","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"64561f44-762a-579d-a2bd-aeaace466c6d","title":"Praxistipps zur sicheren Authentifikation","subtitle":null,"slug":"praxistipps-zur-sicheren-authentifikation","link":"https://sessions.hack-mas.at/event/zf77xEvjmJogsf4Ce/praxistipps-zur-sicheren-authentifikation","description":"Diese Session klärt Fragen wie folgende: Wie soll man denn so viele verschiedene eindeutige Passwörter verwalten? Was ist der Unterschied zwischen den verschiedenen Mehrfaktorauthentifizierungsverfahren (TOTP, FIDO2, Passkeys, SMS, PINs, CardTANs, ...)? Welche TOTP-Apps (Google Authenticator, FreeOTP, Aegis, ...) sind vertrauenswürdig? Welche der Verfahren soll ich verwenden? Was schützt gegen Phishing (und was nicht)? Was sind die Nachteile von Passkeys, die aktuell so gehypt werden? Bei welchen Verfahren muss ich jemand anders inwieweit vertrauen?Teile des Inhaltes sind bereits mit https://karl-voit.at/2023/03/05/Passwortsicherheit/ und https://karl-voit.at/2023/03/05/TOTP-Auswahl/ von Karl verbloggt und haben beim Barcamp Graz 2023 einen Best-Session-Award erhalten.","original_language":"deu","persons":["publicvoit"],"tags":["hackmas2024","1672412959","2024",""],"view_count":803,"promoted":false,"date":"2024-08-29T17:10:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-04-04T21:15:05.394+02:00","length":2830,"duration":2830,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1672412959-64561f44-762a-579d-a2bd-aeaace466c6d.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1672412959-64561f44-762a-579d-a2bd-aeaace466c6d_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1672412959-64561f44-762a-579d-a2bd-aeaace466c6d.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1672412959-64561f44-762a-579d-a2bd-aeaace466c6d.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/praxistipps-zur-sicheren-authentifikation","url":"https://api.media.ccc.de/public/events/64561f44-762a-579d-a2bd-aeaace466c6d","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"3b9cdb10-b534-58f0-a1d1-51aadbdfe275","title":"Gameboy Gamedev in 2024 - ein Überblick","subtitle":null,"slug":"gameboy-gamedev-in-2024-ein-ueberblick","link":"https://sessions.hack-mas.at/event/2mnKTTNjreMx356Fq/gameboy-gamedev-in-2024-ein-ueberblick","description":"Was, den gibts noch?!1? Dank geupdateter C-Toolchain gibt es in der Gameboy-Homebrew-Szene regelmäßig neue Releases.        Worauf muss man achten wenn man ein Spiel für den Gameboy entwickeln möchte? Ist das nicht mühsam?Wie verhält es sich im Vergleich zu normaler C Programmierung?Was für Frameworks und Game Engines (?!) gibt es? Wie erstellt man Graphiken und Musik?        Nach einem kurzem eher High-Level-Überblick über die Gameboy-Hardware würde ich ein paar spezifische Tools vergleichen und danach könnten wir eine Diskussionsrunde starten oder so...        Programmierkenntnisse sind von Vorteil, aber nicht zwingend notwendig, weil es mittlerweile auch ein Drag'n drop Tool gibt","original_language":"deu","persons":["clouds"],"tags":["hackmas2024","1658365363","2024",""],"view_count":165,"promoted":false,"date":"2024-08-29T20:15:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-01-02T00:45:16.645+01:00","length":2967,"duration":2967,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1658365363-3b9cdb10-b534-58f0-a1d1-51aadbdfe275.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1658365363-3b9cdb10-b534-58f0-a1d1-51aadbdfe275_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1658365363-3b9cdb10-b534-58f0-a1d1-51aadbdfe275.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1658365363-3b9cdb10-b534-58f0-a1d1-51aadbdfe275.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gameboy-gamedev-in-2024-ein-ueberblick","url":"https://api.media.ccc.de/public/events/3b9cdb10-b534-58f0-a1d1-51aadbdfe275","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa","title":"Image generative AI - FOSS only","subtitle":null,"slug":"image-generative-ai-foss-only","link":"https://sessions.hack-mas.at/event/w4DZtGfeNK86AGbhr/image-generative-ai-foss-only","description":"Try out open source image generation - and learn how to control AI magic. No prior knowlege needed. Bring ideas on what you want to generate.First theory / terminology you'll need for the toolsPropriety tools and why they suckThe 3 major base-models SD1.5, SDXL and FLUX.1/SD3 - diffusion vs flow modelsELI5: latent spaces, u-nets, [un]CLIP, VAE, cfg-scale, samplers and schedulersThen I'll show you how to use the 2 major web UIs:The beginner tool a1111 stable diffusion web uiThe pro tool comfyuiFast view over other tools that I haven't triedThen I'll explain what you can customize - with example workflows in comfyui    Models: LoRAs - low rank adapters - diff/patches to base models for generation guidance, i.e. pose, canny edge, styles, concepts, etc.    IPAdapter: Transfer styles, faces and do per-layer-prompting    Hyper/turbo models: Generate 20 1kx1k images per second on a 4090    Conditioning: unCLIP use pictures as prompt. Latent space walks + Different CLIPs for different layersInitialization: Start from a (masked) image - inpainting, outpainting, overpainting, refining, transformingSpecial models for upscaling (SUPIR) and animation (AnimateDiff)Bring a laptop / tablet / phone if you want to try it. I'll rent a 3090/4090 and provide you a beginner setup for at least 20h during/after the talk.A matrix channel / mastodon hashtag for AI art would be cool. Maybe we can do a contest / exhibition?Slides: https://schickmas.at/2dd2f1cbd7c3","original_language":"eng","persons":["rnbwdsh"],"tags":["hackmas2024","245326662","2024",""],"view_count":229,"promoted":false,"date":"2024-08-30T19:30:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-04-01T23:00:05.475+02:00","length":3363,"duration":3363,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/245326662-ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/245326662-ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/245326662-ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/245326662-ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/image-generative-ai-foss-only","url":"https://api.media.ccc.de/public/events/ee03c2d6-c1d3-5ac8-87f0-df5ce3bef3fa","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"e615986f-1f70-5b66-b9fa-5902e135db54","title":"Lesezeichen zum Scrapen, Pimpen und Hosten von Webseiten","subtitle":null,"slug":"lesezeichen-zum-scrapen-pimpen-und-hosten-von-webseiten","link":"https://sessions.hack-mas.at/event/yf9RMPHR86nooaP3p/lesezeichen-zum-scrapen-pimpen-und-hosten-von-webseiten","description":"Nur Adressen speichern? Bookmarklets mit JS und HTML bieten mehr 🤖In meinem Vortrag werde ich die Eigenschaften von Lesezeichen vorstellen, wie z.B. die persönliche Sammlung und die Möglichkeit, sie über Schlüsselwörter in der Adressleiste zu öffnen. Außerdem werde ich auf die Verwendung von Bookmarklets eingehen, die aus HTML, CSS und JavaScript bestehen und die Erstellung von persönlichen Webseiten ermöglichen.Ein Schwerpunkt meines Vortrags ist das Scraping von Webseiten, wobei ich anhand eines Beispiels die schrittweise Entwicklung von JavaScript-Code in der Konsole demonstrieren werde. Weiter werde ich zeigen, wie Webseiten durch Pimpen individualisiert werden können, z.B. durch das Ersetzen von Links oder die Implementierung eines Dark Mode.Ein weiterer Aspekt meines Vortrags wird das Hosten von Webseiten sein. Dazu werde ich ein Bookmarklet vorstellen, das einen minimalen HTML-Editor ermöglicht. Zudem werde ich auf den kreativen Einsatz von Bookmarklets zur Erstellung interaktiver Webseiten, am Beispiel eines einfachen Countdowns, eingehen. Ich freue mich darauf, meine Erkenntnisse zu teilen.https://etherpad.wikimedia.org/p/hackwords","original_language":"deu","persons":["birdy"],"tags":["hackmas2024","1999328617","2024",""],"view_count":162,"promoted":false,"date":"2024-08-29T18:00:00.000+02:00","release_date":"2024-08-30T00:00:00.000+02:00","updated_at":"2026-03-18T14:45:07.816+01:00","length":1846,"duration":1846,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1999328617-e615986f-1f70-5b66-b9fa-5902e135db54.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1999328617-e615986f-1f70-5b66-b9fa-5902e135db54_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1999328617-e615986f-1f70-5b66-b9fa-5902e135db54.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1999328617-e615986f-1f70-5b66-b9fa-5902e135db54.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/lesezeichen-zum-scrapen-pimpen-und-hosten-von-webseiten","url":"https://api.media.ccc.de/public/events/e615986f-1f70-5b66-b9fa-5902e135db54","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"454aaba8-764e-5166-8cca-b71d3aaa98cd","title":"Reliable Radio Communications","subtitle":null,"slug":"reliable-radio-communications","link":"https://sessions.hack-mas.at/event/ZF2xn38oXxWTDKHx8/reliable-radio-communications","description":"Jetzt auch ausführlich erklärt in deutscher Sprache. Der lange steinige Weg vom Bit in den Äther und zurück. English available.- Übersicht der Arten von Funkgeräten, ihren Eigenschaften und Fähigkeiten mit Fokus auf Datenübertragung (ISM Module, Sprechfunkgeräte, LoRa, vllt bis Bluetooth WLAN DVB-T/C/S und UMTS/LTE)- Bausteine der nachrichtentechnischen Übertragungskette folglich Kodierschritte und ihre Aufgaben (Quell, Kanal, Leitungs)- Golay Implementation nach DO3RB, die versucht möglichst alles möglichst einfach umzusetzen (2MBit/s auf CM0+ @ 48 MHz) bietet Synchronisationsmarker, Fehlerkorrektur und Lauflängenbegrenzung, alles was ISM Module glücklich macht :)Using Coding Theory to get LoRa-like performance from every ISM Radio Transceiver.","original_language":"deu","persons":["Bernerd"],"tags":["hackmas2024","797293014","2024",""],"view_count":328,"promoted":false,"date":"2024-08-29T16:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-03-25T00:30:03.783+01:00","length":3205,"duration":3205,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/797293014-454aaba8-764e-5166-8cca-b71d3aaa98cd.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/797293014-454aaba8-764e-5166-8cca-b71d3aaa98cd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/797293014-454aaba8-764e-5166-8cca-b71d3aaa98cd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/797293014-454aaba8-764e-5166-8cca-b71d3aaa98cd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/reliable-radio-communications","url":"https://api.media.ccc.de/public/events/454aaba8-764e-5166-8cca-b71d3aaa98cd","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"3cac644a-fd19-5a5f-90f2-87ac108a5e95","title":"Alle können PETG – hast du schon mal Keramik 3D-gedruckt?","subtitle":null,"slug":"alle-koennen-petg-hast-du-schon-mal-keramik-3d-gedruckt","link":"https://sessions.hack-mas.at/event/efptiTfAKjFmRE9Q5/alle-koennen-petg-hast-du-schon-mal-keramik-3d-gedruckt","description":"Von der Teetasse über das Flugzeugtriebwerk zum Knochenimplantat ist das Motto dieses Talks, der dem geneigten Publikum 3D-Druck von Hochleistungskeramik näherbringt. Dabei gibt es einen Crashkurs, wieso Keramiken die Nerds der Materialien sind, wieso ein 3D-Drucker für Keramik noch etwas nur für gut betuchte Bastlerinnen und Bastler ist und wofür 3D-gedruckte Keramikteile schon heute genutzt werden. Ob alternative Energieversorgung oder neue Therapiekonzepte in der Medizin - einige Anwendungen werden erst durch die Möglichkeiten des Keramik-3D-Drucks geschaffen. Hier lernt ihr, wie damit die Welt ein klein wenig besser gemacht werden kann. Aber natürlich darf auch die Technik dahinter nicht zu kurz kommen und daher gibt es Einblicke in die bunte Welt des Lithography-based Ceramic Manufacturing.","original_language":"deu","persons":["Potassium"],"tags":["1202781287","hackmas2024","Lise Meitner (1.OG)","2024","Day 3"],"view_count":314,"promoted":false,"date":"2024-08-30T21:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-03-24T11:30:07.630+01:00","length":2794,"duration":2794,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1202781287-3cac644a-fd19-5a5f-90f2-87ac108a5e95.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1202781287-3cac644a-fd19-5a5f-90f2-87ac108a5e95_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1202781287-3cac644a-fd19-5a5f-90f2-87ac108a5e95.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1202781287-3cac644a-fd19-5a5f-90f2-87ac108a5e95.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/alle-koennen-petg-hast-du-schon-mal-keramik-3d-gedruckt","url":"https://api.media.ccc.de/public/events/3cac644a-fd19-5a5f-90f2-87ac108a5e95","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"a7bf1d34-c2ff-5328-b0c5-d439e7148f74","title":"Dateimanagement mal anders","subtitle":null,"slug":"dateimanagement-mal-anders","link":"https://sessions.hack-mas.at/event/YaEdYnu5FZ4K96T7F/dateimanagement-mal-anders","description":"Man nehme ein paar hundertausend Dateien und ein flexibles Wissensmanagement-Werkzeug und lässt seiner Fantasie freien Lauf.Nun stell' dir vor, du kannst deine Dateien in dein Wissensmanagement-System verlinken und trotzdem von einem Verzeichnis in ein anderes verschieben, ohne, dass deine Links brechen.Dein Datei-Management als auch dein Wissensmanagement bauen unter anderem auf Multi-Klassifikation mittels Schlagworten (Tags) auf.Wie ist es, wenn man vergessen darf, wo die Dateien abgelegt wurden?Was kann man mit der Idee machen, zu seinen Dateien alle möglichen Meta-Daten im Wissensmanagement zu verwalten?Wenn dich diese Gedanken interessieren, dann schau' bei dieser Session vorbei, wo Karl gerne seine Dateimanagementworkflows herzeigt, die in seinem Fall auf Org-mode und der filetags-Werkzeuge aufbauen.Motivationsartikel, der meine filetags-Tools zusammenfasst: https://karl-voit.at/managing-digital-photographs/Online demo: https://karl-voit.at/demo-filetags-intro/filetags: https://github.com/novoid/filetags/","original_language":"deu","persons":["publicvoit"],"tags":["hackmas2024","563265343","2024",""],"view_count":497,"promoted":false,"date":"2024-08-30T18:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-03-22T10:45:07.058+01:00","length":4180,"duration":4180,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/563265343-a7bf1d34-c2ff-5328-b0c5-d439e7148f74.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/563265343-a7bf1d34-c2ff-5328-b0c5-d439e7148f74_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/563265343-a7bf1d34-c2ff-5328-b0c5-d439e7148f74.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/563265343-a7bf1d34-c2ff-5328-b0c5-d439e7148f74.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/dateimanagement-mal-anders","url":"https://api.media.ccc.de/public/events/a7bf1d34-c2ff-5328-b0c5-d439e7148f74","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"e3563136-5e8a-5cca-b00a-1579d8dfa77f","title":"CrashIT! Eine Security Gruselgeschichte","subtitle":"","slug":"crashit-eine-security-gruselgeschichte","link":"https://sessions.hack-mas.at/event/9yNBZjgCs2k9PhJdA/crashit-eine-security-gruselgeschichte","description":"Vor mehr als 2 Jahren habe ich einem österreichischen Einmannunternehmen mehrere kritische Schwachstellen in der Software, die sie an Kunden vertreiben, gemeldet. Trotz Unterstützung des österreichischen CERT.at gelingt es mir seit 2 Jahren nicht, sie dazu zu bringen, diese Lücken zu schließen, was mich zum unfreiwilligen Admin von mehr als 100 Registrierkassen österreichischer Unternehmen macht. Ich würde gerne in einem kurzen (mit viel Galgenhumor gespickten) Vortrag erzählen, wie es dazu gekommen ist.","original_language":"deu","persons":["TTH"],"tags":["hackmas2024","2004308610","2024"],"view_count":2192,"promoted":false,"date":"2024-08-30T17:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-04-01T21:00:04.136+02:00","length":2900,"duration":2900,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/2004308610-e3563136-5e8a-5cca-b00a-1579d8dfa77f.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/crashit-eine-security-gruselgeschichte","url":"https://api.media.ccc.de/public/events/e3563136-5e8a-5cca-b00a-1579d8dfa77f","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"c2201246-5b96-5de1-98ca-7638bf7416fb","title":"GDPRhub - the European wiki for data protection decisions","subtitle":null,"slug":"gdprhub-the-european-wiki-for-data-protection-decisions","link":"https://sessions.hack-mas.at/event/en2ypCh2pqyg2z44t/gdprhub-the-european-wiki-for-data-protection-decisions","description":"I could briefly present noyb's GDPRhub.eu, a wiki for data protection decisions from all over Europe, in case a number of people are interested. There we collect and document national and European data protection cases in English, so that lawyers, researchers and other interested people from all over the world can get an idea of the state of the GDPR.I could present in both German and English, though I would only prepare English slides, since it's all a bit last-minute.","original_language":"eng","persons":["SimonRN"],"tags":["173420240","hackmas2024","Lise Meitner (1.OG)","2024","Day 4"],"view_count":100,"promoted":false,"date":"2024-08-31T16:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2025-08-12T12:30:04.224+02:00","length":1045,"duration":1045,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/173420240-c2201246-5b96-5de1-98ca-7638bf7416fb.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/173420240-c2201246-5b96-5de1-98ca-7638bf7416fb_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/173420240-c2201246-5b96-5de1-98ca-7638bf7416fb.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/173420240-c2201246-5b96-5de1-98ca-7638bf7416fb.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/gdprhub-the-european-wiki-for-data-protection-decisions","url":"https://api.media.ccc.de/public/events/c2201246-5b96-5de1-98ca-7638bf7416fb","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"66ff7eec-3110-5cee-8d8a-f9e6712dd1c5","title":"How to build post-quantum cryptographic protocols and why wall clocks are not to be trusted.","subtitle":null,"slug":"how-to-build-post-quantum-cryptographic-protocols-and-why-wall-clocks-are-not-to","link":"https://sessions.hack-mas.at/event/jzGHNoejBMT5hNBbC/how-to-build-post-quantum-cryptographic-protocols-and-why-wall-clocks-are-not-to","description":"Rosenpass is a post-quantum secure cryptographic protocol, an implementation of that protocol in the Rust programming language, and a governance organization stewarding development of both protocol and implementation. When used with WireGuard, Rosenpass functions as a ready-to-use virtual private network with full security against quantum attackers.The development of a technology like Rosenpass is complex and requires a good footing in cryptographic research, software engineering, industry practices, and science communication. Bringing together these diverse threads of activity is an ongoing challenge. Individual work is not enough, it takes a group; an organization. We are the group that tries to tackle these challenges for Rosenpass.In this talk, we will focus on Rosenpass as a protocol and explain the principles used and challenges encountered when designing such a protocol. Equipped with ample time and many scientific illustrations, we hope to give insight to an audience with many different levels of knowledge about cryptographic subjects.This is not a lecture for experts. This is supposed to be entertainment for the technologically inclined.In the talk we are going to explain what key encapsulation methods are, how they are different from \"non-interactive key exchanges\" – often just called \"Diffie-Hellman\" operations. We will demonstrate how key encapsulation methods can be used to build a secure cryptographic key exchange protocol and how the X-Wing fighter can be used to provide cryptographic redundancy.Finally, we will turn our attention to attacks we found against WireGuard, show off a protocol level denial-of-service attack against WireGuard and explain how we solved that attack in Rosenpass.","original_language":"eng","persons":["mapc"],"tags":["1927564986","hackmas2024","Lise Meitner (1.OG)","2024","Day 3"],"view_count":259,"promoted":false,"date":"2024-08-30T22:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-01-24T09:30:10.063+01:00","length":4460,"duration":4460,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1927564986-66ff7eec-3110-5cee-8d8a-f9e6712dd1c5.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1927564986-66ff7eec-3110-5cee-8d8a-f9e6712dd1c5_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1927564986-66ff7eec-3110-5cee-8d8a-f9e6712dd1c5.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1927564986-66ff7eec-3110-5cee-8d8a-f9e6712dd1c5.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/how-to-build-post-quantum-cryptographic-protocols-and-why-wall-clocks-are-not-to","url":"https://api.media.ccc.de/public/events/66ff7eec-3110-5cee-8d8a-f9e6712dd1c5","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]},{"guid":"26cd6d27-247f-5cf3-8adb-54c87bc372b2","title":"Secure Messaging (and current attacks against it)","subtitle":null,"slug":"secure-messaging-and-current-attacks-against-it","link":"https://sessions.hack-mas.at/event/FzXNrZZ9aWunEByvY/secure-messaging-and-current-attacks-against-it","description":"Secure messaging apps are one of the most-used app categories on current mobile devices, and a significant subset of human communication is handled through them. This makes them an interesting target for forensics, surveillance, and general information collection for intelligence services and police institutions. In this talk, we will discuss various options for such surveillance and their respective difficulties, pointing out which options do not seem realistic given all the practical considerations.Speaker: Rene Mayrhofer","original_language":"eng","persons":["Rene Mayrhofer"],"tags":["hackmas2024","1389566271","2024",""],"view_count":979,"promoted":false,"date":"2024-08-29T22:00:00.000+02:00","release_date":"2024-08-31T00:00:00.000+02:00","updated_at":"2026-04-01T21:15:04.351+02:00","length":5007,"duration":5007,"thumb_url":"https://static.media.ccc.de/media/events/hackmas/2024/1389566271-26cd6d27-247f-5cf3-8adb-54c87bc372b2.jpg","poster_url":"https://static.media.ccc.de/media/events/hackmas/2024/1389566271-26cd6d27-247f-5cf3-8adb-54c87bc372b2_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/hackmas/2024/1389566271-26cd6d27-247f-5cf3-8adb-54c87bc372b2.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/hackmas/2024/1389566271-26cd6d27-247f-5cf3-8adb-54c87bc372b2.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/secure-messaging-and-current-attacks-against-it","url":"https://api.media.ccc.de/public/events/26cd6d27-247f-5cf3-8adb-54c87bc372b2","conference_title":"Hack ma's Castle 2024","conference_url":"https://api.media.ccc.de/public/conferences/hackmas2024","related":[]}]}