schedule.en.ics - libical - A simple ical library.
(HTM) git clone git://r-36.net/libical
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
schedule.en.ics (77649B)
---
1 BEGIN:VCALENDAR
2 VERSION:2.0
3 CALSCALE:GREGORIAN
4 PRODID:-//Pentabarf//Schedule//EN
5 BEGIN:VEVENT
6 DURATION:PT1H00M
7 LOCATION:Saal 1
8 SEQUENCE:0
9 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5333.en.html
10 DTSTART;TZID=Europe/Berlin:20121230T124500
11 UID:5333@29C3@pentabarf.org
12 DTSTAMP:20121226T143018
13 CATEGORIES:Lecture
14 DESCRIPTION:Did you notice 262 42 in your mobile phone network search list
15 at the last CCC events? Did you and your friends buy SIM cards at the PoC a
16 nd help test the network by calling each other\, or by calling through the
17 bridge to the DECT network services? Did you ever wonder about the details
18 of this open source test network\, set up by a team of volunteers in the mi
19 ddle of the city? We would like to tell you all the details of the cell pho
20 ne network we operate at 29C3\, and show you some fancy graphs based on the
21 network activity!
22 SUMMARY:29C3 GSM: Cell phone network review - 262 42 - The full spectrum
23 STATUS:CONFIRMED
24 END:VEVENT
25 BEGIN:VEVENT
26 DURATION:PT1H00M
27 LOCATION:Saal 1
28 SEQUENCE:0
29 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5205.en.html
30 DTSTART;TZID=Europe/Berlin:20121229T140000
31 UID:5205@29C3@pentabarf.org
32 DTSTAMP:20121226T143018
33 CATEGORIES:Lecture
34 DESCRIPTION:There are hundreds\, if not thousands\, of news articles and bl
35 og posts about the BlackHole Exploit Kit. Usually\, each story covers only
36 a very narrow part of the subject matter. This talk will summarize the hist
37 ory of the BlackHole Exploit Kit into one easy to follow story. There will
38 be diagrams and flow-charts for explaining code\, rather than a giant blob
39 of illegible Javascript\, PHP\, or x86 Assembly.
40 SUMMARY:Analytical Summary of the BlackHole Exploit Kit - Almost Everything
41 You Ever Wanted To Know About The BlackHole Exploit Kit
42 STATUS:CONFIRMED
43 END:VEVENT
44 BEGIN:VEVENT
45 DURATION:PT1H00M
46 LOCATION:Saal 6
47 SEQUENCE:0
48 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5146.en.html
49 DTSTART;TZID=Europe/Berlin:20121229T160000
50 UID:5146@29C3@pentabarf.org
51 DTSTAMP:20121226T143018
52 CATEGORIES:Lecture
53 DESCRIPTION:There's about 100 top-level domains signed with DNSSEC and .nl
54 recently hit 1M second-level domains. At this occasion\, we take a look at
55 the goods and the bads of DNSSEC deployment\, including amplification attac
56 ks\, Zensursula-like DNS redirects\, China DNS injection and NASA key rollo
57 ver mistakes. We will find out what DNSCurve and Namecoin promise to make b
58 etter and what Zooko's triangle has all to do with this.
59 SUMMARY:An Overview of Secure Name Resolution - DNSSEC\, DNSCurve and Namec
60 oin
61 STATUS:CONFIRMED
62 END:VEVENT
63 BEGIN:VEVENT
64 DURATION:PT1H00M
65 LOCATION:Saal 6
66 SEQUENCE:0
67 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5237.en.html
68 DTSTART;TZID=Europe/Berlin:20121229T203000
69 UID:5237@29C3@pentabarf.org
70 DTSTAMP:20121226T143018
71 CATEGORIES:Lecture
72 DESCRIPTION:With Visa and Mastercard pushing for EMV (http://www.emvco.com\
73 , aka “chip and pin”) rollout in the United States\, the uptake of contactl
74 ess payment and the use of mobile NFC wallets\, the chipcard security commu
75 nity will soon be getting more eyes to analyze the protocols in use with ch
76 ip and contactless credit card transactions.
77 SUMMARY:A Rambling Walk Through an EMV Transaction
78 STATUS:CONFIRMED
79 END:VEVENT
80 BEGIN:VEVENT
81 DURATION:PT1H00M
82 LOCATION:Saal 1
83 SEQUENCE:0
84 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5299.en.html
85 DTSTART;TZID=Europe/Berlin:20121230T113000
86 UID:5299@29C3@pentabarf.org
87 DTSTAMP:20121226T143018
88 CATEGORIES:Lecture
89 DESCRIPTION:Verfassungsschutzskandale gibt es nicht erst seit der Entdeckun
90 g des NSU vor einem Jahr. Vorgestellt werden: sie Affaire Traube\, der Schm
91 ücker-Prozess\, das Celler Loch\, die Vulkan-Affaire\, der Anschlagsversuch
92 auf das Jüdische Gemeindehaus West-Berlin\, vier Jahrzehnte Beobachtung vo
93 n Rolf Gössner. Vielleicht sind aber gar nicht die Pannen der Skandal\, son
94 dern vielmehr der ganz gewöhnliche Alltag des Verfassungsschutzes.
95 SUMMARY:Best of ... Verfassungsschutz - Der Verfassungsschutz schützt die V
96 erfassung so wie Zitronenfalter Zitronen falten.
97 STATUS:CONFIRMED
98 END:VEVENT
99 BEGIN:VEVENT
100 DURATION:PT2H15M
101 LOCATION:Saal 1
102 SEQUENCE:0
103 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5379.en.html
104 DTSTART;TZID=Europe/Berlin:20121229T113000
105 UID:5379@29C3@pentabarf.org
106 DTSTAMP:20121226T143018
107 CATEGORIES:Lecture
108 DESCRIPTION:Wir schauen nicht zurück im Zorn\, aber jetzt auch nicht grade
109 mit Euphorie. Im CCC-Jahresrückblick präsentieren wir Euch einige der hackt
110 ivistischen Themen des vergangenen Jahres\, an denen der CCC gearbeitet ode
111 r sich abgearbeitet hat. Diesmal mit schönen neuen Gesetzen\, Hacker-Humor\
112 , versäumten Gerichtsterminen\, bunten Blinkenlichtern und Iggy Pop. Wir ha
113 ben uns wirklich das ganze Jahr bemüht\, nur in begrenztem Umfange zu prokr
114 astinieren.
115 SUMMARY:CCC-Jahresrückblick
116 STATUS:CONFIRMED
117 END:VEVENT
118 BEGIN:VEVENT
119 DURATION:PT1H00M
120 LOCATION:Saal 1
121 SEQUENCE:0
122 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5319.en.html
123 DTSTART;TZID=Europe/Berlin:20121228T124500
124 UID:5319@29C3@pentabarf.org
125 DTSTAMP:20121226T143018
126 CATEGORIES:Lecture
127 DESCRIPTION:Hypertext Transfer Protocol Secure (HTTPS) has evolved into the
128 de facto standard for secure web browsing. But in the security community\,
129 it has long been known that HTTPS is fundamentally broken\, and this has b
130 een confirmed by alarming hacks and security breaches at several Certificat
131 e Authorities (CAs). To tackle the global collapse of trust in these centra
132 l mediators of HTTPS communications and to augment HTTPS security\, the EU
133 has launched a proposal for strict regulation. Will these efforts succeed?
134 SUMMARY:Certificate Authority Collapse - Will the EU Succeed in Regulating
135 HTTPS?
136 STATUS:CONFIRMED
137 END:VEVENT
138 BEGIN:VEVENT
139 DURATION:PT1H00M
140 LOCATION:Saal 6
141 SEQUENCE:0
142 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5263.en.html
143 DTSTART;TZID=Europe/Berlin:20121230T171500
144 UID:5263@29C3@pentabarf.org
145 DTSTAMP:20121226T143018
146 CATEGORIES:Lecture
147 DESCRIPTION:Wir brauchen ein maschinenlesbares und -schreibbares Gesetzgebu
148 ngsverfahren\, in dem jede Änderung transparent diskutiert und beschlossen
149 wird. Der Bundestag öffnet und digitalisiert sich eher langsam und widerwil
150 lig\, dennoch kann man schon heute anfangen\, die Werkzeuge der parlamentar
151 ischen Zukunft in Deutschland zu gestalten und auszuprobieren. Dazu stellen
152 wir die Projekte OffenesParlament.de und das Bundes-Git vor und zeigen\, w
153 ie es in Zukunft weitergehen könnte.
154 SUMMARY:chmod o+rw bundestag - Mehr Transparenz und Teilhabe im Gesetzgebun
155 gsprozess
156 STATUS:CONFIRMED
157 END:VEVENT
158 BEGIN:VEVENT
159 DURATION:PT1H00M
160 LOCATION:Saal 1
161 SEQUENCE:0
162 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5398.en.html
163 DTSTART;TZID=Europe/Berlin:20121230T183000
164 UID:5398@29C3@pentabarf.org
165 DTSTAMP:20121226T143018
166 CATEGORIES:Lecture
167 DESCRIPTION:Some facts and stats about Congress\, plus stories and legends.
168 SUMMARY:Closing Event
169 STATUS:CONFIRMED
170 END:VEVENT
171 BEGIN:VEVENT
172 DURATION:PT1H00M
173 LOCATION:Saal 6
174 SEQUENCE:0
175 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5221.en.html
176 DTSTART;TZID=Europe/Berlin:20121227T140000
177 UID:5221@29C3@pentabarf.org
178 DTSTAMP:20121226T143018
179 CATEGORIES:Lecture
180 DESCRIPTION:Wir sind Zeugen eines seit einigen Jahren stattfindenden Wettrü
181 stens im Cyberspace. Immer mehr Staaten bauen militärische Cyberware Einhei
182 ten auf\, die aus IT Spezialisten bestehen und dem Zweck dienen\, bestenfal
183 ls IT Systeme abzusichern oder schlechterdings Systeme von „Feinden“ anzug
184 reifen.
185 SUMMARY:Cyberpeace statt Cyberwar
186 STATUS:CONFIRMED
187 END:VEVENT
188 BEGIN:VEVENT
189 DURATION:PT1H00M
190 LOCATION:Saal 4
191 SEQUENCE:0
192 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5301.en.html
193 DTSTART;TZID=Europe/Berlin:20121228T203000
194 UID:5301@29C3@pentabarf.org
195 DTSTAMP:20121226T143018
196 CATEGORIES:Lecture
197 DESCRIPTION:Aside from further development of traditional forensic techniqu
198 es which involve post-mortem hard disk analysis\, in the last couple of yea
199 rs the field of computer forensics has been marked by significant developme
200 nt of live forensic techniques and tools.Memory forensics is composed of tw
201 o main activities: memory aquisition/capture and analysis. This presentatio
202 n will give an overview of the memory acquisition and analysis techniques a
203 nd tools on the Windows operating systems. The main part of the presentatio
204 n will cover current exploitation techniques and methods for defeating both
205 acquisition and analysis phase of the memory forensics\, as well as presen
206 t a new approach for hiding specific artifacts from forensic tools. Based o
207 n the covered exploitation techniques\, some suggestions and improvements o
208 f the current tools will be given.
209 SUMMARY:Defeating Windows memory forensics
210 STATUS:CONFIRMED
211 END:VEVENT
212 BEGIN:VEVENT
213 DURATION:PT1H00M
214 LOCATION:Saal 4
215 SEQUENCE:0
216 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5159.en.html
217 DTSTART;TZID=Europe/Berlin:20121227T203000
218 UID:5159@29C3@pentabarf.org
219 DTSTAMP:20121226T143018
220 CATEGORIES:Lecture
221 DESCRIPTION:Over the years we learned impressively how to oppose bad legisl
222 ation hurting our freedoms online. We are now facing an even bigger challen
223 ge: how to guarantee that a Free\, open\, decentralized Internet will be pr
224 otected in the long run? In 2012 The Internetz won major battles against SO
225 PA/PIPA in the US\, and against ACTA in the EU. Yet\, we know that the powe
226 rful industries and governments behind these projects will never stop. They
227 have an incentive to gain control of the Internet\, attacking fundamental
228 rights and promoting technologies like "Deep Packet Inspection"\, now being
229 deployed in each and every corner of the Net\, and used indifferently to b
230 reak Net neutrality\, to filter\, block and censor communications or to ins
231 pect citizens traffic.How to push for proposals that will ensure that the s
232 haring of knowledge and culture\, citizens freedoms\, and access to an open
233 infrastructure will be guaranteed in the future public policies? How to be
234 come as successful in proposition as we are now in opposition?(Hint: it's p
235 olitical\, stupid!)
236 SUMMARY:Defend your Freedoms Online: It's Political\, Stupid! - A Positive
237 agenda against the next ACTA\, SOPA\, and such
238 STATUS:CONFIRMED
239 END:VEVENT
240 BEGIN:VEVENT
241 DURATION:PT1H00M
242 LOCATION:Saal 1
243 SEQUENCE:0
244 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5401.en.html
245 DTSTART;TZID=Europe/Berlin:20121228T171500
246 UID:5401@29C3@pentabarf.org
247 DTSTAMP:20121226T143018
248 CATEGORIES:Lecture
249 DESCRIPTION:Die Debatte um die Tarifreform der GEMA war eines der großen Th
250 emen des Jahres 2012: Die Verwertungsgesellschaft geriet quer durch alle po
251 litischen Lager und gesellschaftlichen Schichten in die Kritik\, die Warnun
252 gen vor einem großen Clubsterben wurden von Tausenden auf die Straße getrag
253 en. Dies steigerte auch das Interesse an der »Cultural Commons Collecting S
254 ociety« (C3S)\, einem Graswurzelprojekt zur Gründung einer neuen\, modernen
255 und internetverstehenden Verwertungsgesellschaft\, die u. a. auch vollen S
256 upport für Creative-Commons-Lizenzen bieten soll. 2012 war daher auch ein e
257 reignisreiches Jahr für dieses Projekt\, und 2013 sollen nach Plan die Grün
258 dung als Europäische Genossenschaft und die Antragsstellung beim Deutschen
259 Patent- und Markenamt folgen.
260 SUMMARY:Der Mord fällt aus - Ein Werkstattbericht der GEMA-Alternative C3S
261 STATUS:CONFIRMED
262 END:VEVENT
263 BEGIN:VEVENT
264 DURATION:PT1H00M
265 LOCATION:Saal 1
266 SEQUENCE:0
267 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5382.en.html
268 DTSTART;TZID=Europe/Berlin:20121227T160000
269 UID:5382@29C3@pentabarf.org
270 DTSTAMP:20121226T143018
271 CATEGORIES:Lecture
272 DESCRIPTION:Am 6. November 2012 war der CCC vor dem Bundesverfassungsgerich
273 t zur Anhörung über die Antiterrordatei und die Grenzen polizeilicher Daten
274 verarbeitung geladen. Wir berichten über die Anhörung\, die dort vorgebrach
275 ten Argumente und die technische Konzeption der ATD. Und wir orakeln über e
276 in mögliches Urteil im nächsten Jahr.
277 SUMMARY:Die Antiterrordatei
278 STATUS:CONFIRMED
279 END:VEVENT
280 BEGIN:VEVENT
281 DURATION:PT1H00M
282 LOCATION:Saal 1
283 SEQUENCE:0
284 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5181.en.html
285 DTSTART;TZID=Europe/Berlin:20121227T124500
286 UID:5181@29C3@pentabarf.org
287 DTSTAMP:20121226T143018
288 CATEGORIES:Lecture
289 DESCRIPTION:In den vergangenen Jahren wurde vor allem die Sprache von Polit
290 ikern auf dem Congress beleuchtet. Aber die schwurbelnde Politiker sind noc
291 h nicht die ganze Wahrheit. Wir möchten das Ganze daher um den zweiten wich
292 tigen Mitspieler bei der Konstruktion von Realität ergänzen\, um die Presse
293 bzw. die Medien. Die Äußerungen von Politikern (zum Beispiel auf Pressekon
294 ferenzen) sollen dabei der Mediendarstellung gegenübergestellt werden. Dabe
295 i wird deutlich werden\, dass es zwischen Politikern und Medien Rückkopplun
296 gseffekte gibt.
297 SUMMARY:Die Wahrheit\, was wirklich passierte und was in der Zeitung stand
298 - Wie Medien unsere Wahrnehmung beeinflussen
299 STATUS:CONFIRMED
300 END:VEVENT
301 BEGIN:VEVENT
302 DURATION:PT2H15M
303 LOCATION:Saal 1
304 SEQUENCE:0
305 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html
306 DTSTART;TZID=Europe/Berlin:20121227T203000
307 UID:5338@29C3@pentabarf.org
308 DTSTAMP:20121226T143018
309 CATEGORIES:Lecture
310 DESCRIPTION:With the post 9/11 rise of the leviathan national security stat
311 e\, the rule of law in the United States under the Constitution is increasi
312 ngly rule by secrecy\, surveillance and executive fiat.
313 SUMMARY:Enemies of the State: What Happens When Telling the Truth about Sec
314 ret US Government Power Becomes a Crime - Blowing the Whistle on Spying\, L
315 ying & Illegalities in the Digital Era
316 STATUS:CONFIRMED
317 END:VEVENT
318 BEGIN:VEVENT
319 DURATION:PT1H00M
320 LOCATION:Saal 4
321 SEQUENCE:0
322 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5104.en.html
323 DTSTART;TZID=Europe/Berlin:20121228T230000
324 UID:5104@29C3@pentabarf.org
325 DTSTAMP:20121226T143018
326 CATEGORIES:Lecture
327 DESCRIPTION:This presentation will cover a demonstration of the new version
328 of the Canape protocol analysis tool being released for Ruxcon. During the
329 course of the presentation various attack scenarios against the VMWare ESX
330 i binary protocol will be demonstrated using Canape.
331 SUMMARY:ESXi Beast - Exploiting VMWARE ESXi Binary Protocols Using CANAPE
332 STATUS:CONFIRMED
333 END:VEVENT
334 BEGIN:VEVENT
335 DURATION:PT0H30M
336 LOCATION:Saal 6
337 SEQUENCE:0
338 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5077.en.html
339 DTSTART;TZID=Europe/Berlin:20121229T131500
340 UID:5077@29C3@pentabarf.org
341 DTSTAMP:20121226T143018
342 CATEGORIES:Lecture
343 DESCRIPTION:Recently\, several research papers in the area of computer secu
344 rity were published that may or may not be considered unethical. Looking at
345 these borderline cases is relevant as today’s research papers will influen
346 ce how young researchers conduct their research. In our talk we address var
347 ious cases and papers and highlight emerging issues for ethic committees\,
348 internal review boards (IRBs) and senior researchers to evaluate research p
349 roposals and to finally decide where they see a line that should not be cro
350 ssed.
351 SUMMARY:Ethics in Security Research
352 STATUS:CONFIRMED
353 END:VEVENT
354 BEGIN:VEVENT
355 DURATION:PT1H00M
356 LOCATION:Saal 6
357 SEQUENCE:0
358 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5085.en.html
359 DTSTART;TZID=Europe/Berlin:20121228T113000
360 UID:5085@29C3@pentabarf.org
361 DTSTAMP:20121226T143018
362 CATEGORIES:Lecture
363 DESCRIPTION:We know\, that cooking is an art. Selecting the ingredients\, c
364 arefully washing\, pealingand cutting them before you put them into the rig
365 ht dish at the right time with the right heat.Watching the food change his
366 color\, form and consistency\, seasoning it to develop it'sflavors and serv
367 ing it on beautiful plates is a pleasure.For some\, but not for all.Those
368 who love cooking can spend hours at the stove andrelax while preparing deli
369 cious meals. For others cooking is pure stress. What is the difference betw
370 een orange and yellowcarrots? Did I forget something? Is the pan hot enough
371 ? Or too hot? How long after thepasta do I start cooking the steak? Will it
372 be healthy? Is it sustainable?So many questionsappear if one starts to thi
373 nk about food. The answers are complicatedand ambiguous. They require resea
374 rch and analyzing. Many have stopped thinkingabout food. They just believe
375 what is written on thepackage.I can't cookis such an easy answer. And it is
376 accepted in our society. Nobody isashamed of it. This gives more and more
377 control tomultinational corporations. Through precookedfood and shiny comme
378 rcials they calm our conscience and stimulate our laziness.The consequences
379 are dramatic!The profit-focused approach of multinationalcorporations have
380 led to things like:• Patented genetically modified seeds. Lawyers suing fa
381 rmers for copyrights.• Destruction of South-American jungle to make soya to
382 feed European cows so theymake more milk. Although a cow as never born to
383 eat proteins.• Chickens that can't stand on their own feet due to the weigh
384 t of their breasts. Theywill never see soil\, worms or even sunlight.• Oran
385 -Utangs losing their homes for palm oil• Vegetables getting grown in the de
386 sert\, wasting huge amounts of drinking water.Conclusions:• We must know mo
387 re about our food• We have to cook more ourselves• So we will recover some
388 control over what we eat
389 SUMMARY:EveryCook - Cooking gets digital
390 STATUS:CONFIRMED
391 END:VEVENT
392 BEGIN:VEVENT
393 DURATION:PT1H00M
394 LOCATION:Saal 1
395 SEQUENCE:0
396 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html
397 DTSTART;TZID=Europe/Berlin:20121228T183000
398 UID:5275@29C3@pentabarf.org
399 DTSTAMP:20121226T143018
400 CATEGORIES:Lecture
401 DESCRIPTION:RSA is the dominant public-key cryptosystem on the Internet. Th
402 is talk will explain the state of the art in techniques for the attacker to
403 figure out your secret RSA keys.
404 SUMMARY:FactHacks - RSA factorization in the real world
405 STATUS:CONFIRMED
406 END:VEVENT
407 BEGIN:VEVENT
408 DURATION:PT1H00M
409 LOCATION:Saal 1
410 SEQUENCE:0
411 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5198.en.html
412 DTSTART;TZID=Europe/Berlin:20121229T230000
413 UID:5198@29C3@pentabarf.org
414 DTSTAMP:20121226T143018
415 CATEGORIES:Lecture
416 DESCRIPTION:Neues Jahr\, neue Fnords :-)
417 SUMMARY:Fnord-Jahresrückblick - Diesmal mit noch mehr Eurozonen-Spaltung!
418 STATUS:CONFIRMED
419 END:VEVENT
420 BEGIN:VEVENT
421 DURATION:PT1H00M
422 LOCATION:Saal 1
423 SEQUENCE:0
424 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5226.en.html
425 DTSTART;TZID=Europe/Berlin:20121229T214500
426 UID:5226@29C3@pentabarf.org
427 DTSTAMP:20121226T143018
428 CATEGORIES:Lecture
429 DESCRIPTION:The calypso baseband and its companion chips are used on the Mo
430 torola C123 among other and are now well known for being supported by the O
431 smocom-BB open source GSM baseband implementation. A couple years ago\, it
432 was hacked a little further by using it as a raw bits capture device allowi
433 ng the interception of GSM traffic very cheaply.
434 SUMMARY:Further hacks on the Calypso platform - or how to turn a phone into
435 a BTS
436 STATUS:CONFIRMED
437 END:VEVENT
438 BEGIN:VEVENT
439 DURATION:PT2H00M
440 LOCATION:Saal 4
441 SEQUENCE:0
442 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5250.en.html
443 DTSTART;TZID=Europe/Berlin:20121228T001500
444 UID:5250@29C3@pentabarf.org
445 DTSTAMP:20121226T143018
446 CATEGORIES:Lecture
447 DESCRIPTION:Beim Googlequiz treten Teams gegeneinander an\, die *ohne Inter
448 net* Aufgaben zu Googlesuchen und Suchergebnissen raten.
449 SUMMARY:Googlequiz - Wie man (spaßorientiert) mehr als 5% seines Googleverm
450 ögens trainiert
451 STATUS:CONFIRMED
452 END:VEVENT
453 BEGIN:VEVENT
454 DURATION:PT2H00M
455 LOCATION:Saal 1
456 SEQUENCE:0
457 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5309.en.html
458 DTSTART;TZID=Europe/Berlin:20121228T230000
459 UID:5309@29C3@pentabarf.org
460 DTSTAMP:20121226T143018
461 CATEGORIES:Lecture
462 DESCRIPTION:
463 SUMMARY:Hacker Jeopardy - Zahlenraten für Geeks
464 STATUS:CONFIRMED
465 END:VEVENT
466 BEGIN:VEVENT
467 DURATION:PT1H00M
468 LOCATION:Saal 1
469 SEQUENCE:0
470 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5024.en.html
471 DTSTART;TZID=Europe/Berlin:20121228T203000
472 UID:5024@29C3@pentabarf.org
473 DTSTAMP:20121226T143018
474 CATEGORIES:Lecture
475 DESCRIPTION:Hackers are a high-risk population. This talk will provide hack
476 ers with tools to reduce the risk to themselves and their communities using
477 harm reduction methodology.
478 SUMMARY:Hackers As A High-Risk Population - Harm Reduction Methodology
479 STATUS:CONFIRMED
480 END:VEVENT
481 BEGIN:VEVENT
482 DURATION:PT1H00M
483 LOCATION:Saal 1
484 SEQUENCE:0
485 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html
486 DTSTART;TZID=Europe/Berlin:20121227T230000
487 UID:5400@29C3@pentabarf.org
488 DTSTAMP:20121226T143018
489 CATEGORIES:Lecture
490 DESCRIPTION:We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco
491 NativeUnix)\, the operating system that powers all Cisco TNP IP phones. Wed
492 emonstrate the reliable exploitation of all Cisco TNP phones viamultiple vu
493 lnerabilities found in the CNU kernel. We demonstratepractical covert surve
494 illance using constant\, stealthy exfiltration ofmicrophone data via a numb
495 er of covert channels. We also demonstrate theworm-like propagation of our
496 CNU malware\, which can quickly compromiseall vulnerable Cisco phones on th
497 e network. We discuss the feasibilityof our attacks given physical access\,
498 internal network access and remoteaccess across the internet. Lastly\, we
499 built on last year's presentationby discussing the feasibility of exploitin
500 g Cisco phones fromcompromised HP printers and vice versa.
501 SUMMARY:Hacking Cisco Phones - Just because you are paranoid doesn't mean y
502 our phone isn't listening to everything you say
503 STATUS:CONFIRMED
504 END:VEVENT
505 BEGIN:VEVENT
506 DURATION:PT1H00M
507 LOCATION:Saal 6
508 SEQUENCE:0
509 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5179.en.html
510 DTSTART;TZID=Europe/Berlin:20121229T183000
511 UID:5179@29C3@pentabarf.org
512 DTSTAMP:20121226T143018
513 CATEGORIES:Lecture
514 DESCRIPTION:Wir sehen in der digitalen Technik großes Potential zur Demokra
515 tisierung und Befreiung der Menschen. Doch machen wir uns nichts vor. Techn
516 ik kann genausogut der Entmündigung von Menschen dienen. Je komplexer sie w
517 ird\, desto mehr sind wir von Vereinfachung abhängig und desto weniger Einf
518 luss können wir selber auf die Technik nehmen.
519 SUMMARY:Hacking Philosophy - Digitale Mündigkeit\, Technikpaternalismus und
520 warum wir Netzphilosophie brauchen
521 STATUS:CONFIRMED
522 END:VEVENT
523 BEGIN:VEVENT
524 DURATION:PT1H00M
525 LOCATION:Saal 4
526 SEQUENCE:0
527 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5270.en.html
528 DTSTART;TZID=Europe/Berlin:20121229T001500
529 UID:5270@29C3@pentabarf.org
530 DTSTAMP:20121226T143018
531 CATEGORIES:Lecture
532 DESCRIPTION:This is fun stuff for the late night program\, not a serious ta
533 lk.Is it possible to read sb. others mind? In the late 1920ies/early 1930ie
534 s Berlin was excited by the famous mindreader and fortune teller Erik Jan H
535 anussen who performed his strange abilities on stage. His act was so convin
536 cing that leading nazis beleaved in his powers and wanted him for advice -
537 until they decided to murder him.
538 SUMMARY:Hanussen's mindreading - Experiment's of the historical psychic
539 STATUS:CONFIRMED
540 END:VEVENT
541 BEGIN:VEVENT
542 DURATION:PT1H00M
543 LOCATION:Saal 4
544 SEQUENCE:0
545 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html
546 DTSTART;TZID=Europe/Berlin:20121229T214500
547 UID:5152@29C3@pentabarf.org
548 DTSTAMP:20121226T143018
549 CATEGORIES:Lecture
550 DESCRIPTION:At 28C3\, Klink and Waelde showed that a number of technologies
551 (PHP\, ASP.NET\,Ruby\, Java\, Python\, etc.) were vulnerable to the decade
552 -old hash-flooding DoSattacks. The vulnerability was then often fixed by ad
553 opting stronger hashfunctions and "randomizing" them.
554 SUMMARY:Hash-flooding DoS reloaded: attacks and defenses
555 STATUS:CONFIRMED
556 END:VEVENT
557 BEGIN:VEVENT
558 DURATION:PT1H00M
559 LOCATION:Saal 1
560 SEQUENCE:0
561 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5287.en.html
562 DTSTART;TZID=Europe/Berlin:20121227T183000
563 UID:5287@29C3@pentabarf.org
564 DTSTAMP:20121226T143018
565 CATEGORIES:Lecture
566 DESCRIPTION:NSU-Untersuchungsausschuss in Thüringen und NSU-Untersuchungsau
567 sschuss des Bundestages\, über die Mordserie des NSU\, das System der V-Leu
568 te und die Rolle des Verfassungsschutzes.Zwölf Jahre lang konnte der „Natio
569 nalsozialistische Untergrund“ (NSU) unerkannt in Deutschland eine rassistis
570 che Mordserie an neun migrantischen Gewerbetreibenden\, zwei Bombenanschläg
571 e mit mehr als zwanzig Verletzten\, den Mord an einer jungen Polizistin sow
572 ie ein Dutzend Banküberfälle verüben.
573 SUMMARY:Hinter den Kulissen: Der NSU und das V-Leute-System
574 STATUS:CONFIRMED
575 END:VEVENT
576 BEGIN:VEVENT
577 DURATION:PT1H00M
578 LOCATION:Saal 6
579 SEQUENCE:0
580 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5219.en.html
581 DTSTART;TZID=Europe/Berlin:20121228T203000
582 UID:5219@29C3@pentabarf.org
583 DTSTAMP:20121226T143018
584 CATEGORIES:Lecture
585 DESCRIPTION:An approach to the problem of fuzzing proprietary protocols wil
586 l be shown\, focusing on network protocols and native software. In the cour
587 se of this talk I will combine several methods in order to force the client
588 software to work as a “double agent” against the server.
589 SUMMARY:"How I met your pointer" - Hijacking client software for fuzz and p
590 rofit
591 STATUS:CONFIRMED
592 END:VEVENT
593 BEGIN:VEVENT
594 DURATION:PT1H00M
595 LOCATION:Saal 4
596 SEQUENCE:0
597 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5395.en.html
598 DTSTART;TZID=Europe/Berlin:20121227T140000
599 UID:5395@29C3@pentabarf.org
600 DTSTAMP:20121226T143018
601 CATEGORIES:Lecture
602 DESCRIPTION:Legal systems have a huge impact on what we do as hackers\, but
603 also on internet users in general. Laws can restrict our freedom to use th
604 e internet in ways we deem to be natural and it can impede the tools which
605 we hackers use on a daily basis. Which is not to say that laws cannot also
606 protect our freedom and ensure that all bits are treated equally. Most impo
607 rtantly\, these laws can be hacked and tweaked to fit our needs - like most
608 things in this world.
609 SUMMARY:HOWTO Hack the law
610 STATUS:CONFIRMED
611 END:VEVENT
612 BEGIN:VEVENT
613 DURATION:PT1H00M
614 LOCATION:Saal 6
615 SEQUENCE:0
616 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5368.en.html
617 DTSTART;TZID=Europe/Berlin:20121229T113000
618 UID:5368@29C3@pentabarf.org
619 DTSTAMP:20121226T143018
620 CATEGORIES:Lecture
621 DESCRIPTION:Sechs Jahre nach seinem Inkrafttreten wurde das Informationsfre
622 iheitsgesetz (IFG) des Bundes für den Deutschen Bundestag evaluiert. Auch a
623 us einzelnen Bundesländern liegen zwischenzeitlich wissenschaftlich unterma
624 uerte Erkenntnisse zum Stand oder Nichtstand der Informationsfreiheit in De
625 utschland vor.
626 SUMMARY:IFG: Chance oder Bürgerbluff? - Informationsfreiheit in Deutschland
627 . Ein Sachstand.
628 STATUS:CONFIRMED
629 END:VEVENT
630 BEGIN:VEVENT
631 DURATION:PT1H00M
632 LOCATION:Saal 6
633 SEQUENCE:0
634 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5397.en.html
635 DTSTART;TZID=Europe/Berlin:20121227T183000
636 UID:5397@29C3@pentabarf.org
637 DTSTAMP:20121226T143018
638 CATEGORIES:Lecture
639 DESCRIPTION:INFECT: "Bei der Forschung an unserem neuen Killervirus hat uns
640 ere Ethikkommission penibelst darauf geachtet\, dass niemand der Forscher s
641 ich ansteckt."
642 SUMMARY:INDECT\, Verhaltenserkennung & Co - automatisierte staatliche Verdä
643 chtigung
644 STATUS:CONFIRMED
645 END:VEVENT
646 BEGIN:VEVENT
647 DURATION:PT1H00M
648 LOCATION:Saal 6
649 SEQUENCE:0
650 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5112.en.html
651 DTSTART;TZID=Europe/Berlin:20121227T124500
652 UID:5112@29C3@pentabarf.org
653 DTSTAMP:20121226T143018
654 CATEGORIES:Lecture
655 DESCRIPTION:This talk is aimed to give an insight into CPE WAN Management P
656 rotocol (CWMP) and its GPLv2 implementations that were developed in the pas
657 t year.
658 SUMMARY:ISP's black box - provisioning behind the scenes
659 STATUS:CONFIRMED
660 END:VEVENT
661 BEGIN:VEVENT
662 DURATION:PT1H00M
663 LOCATION:Saal 4
664 SEQUENCE:0
665 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html
666 DTSTART;TZID=Europe/Berlin:20121228T214500
667 UID:5216@29C3@pentabarf.org
668 DTSTAMP:20121226T143018
669 CATEGORIES:Lecture
670 DESCRIPTION:In the last years\, mobile security and specifically GSM has be
671 en attacked in many different ways. It was demonstrated how to sniff and cr
672 ack traffic\, how to impersonate a subscriber by placing a fake call and th
673 e general security characteristics of this mobile protocol stack have been
674 evaluated.In this presentation\, we will check out a part of the protocol p
675 rocedures that hasn't been looked at yet\, specifically Mobile Terminated s
676 ervices.
677 SUMMARY:Let Me Answer That for You - adventures in mobile paging
678 STATUS:CONFIRMED
679 END:VEVENT
680 BEGIN:VEVENT
681 DURATION:PT2H15M
682 LOCATION:Saal 4
683 SEQUENCE:0
684 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5316.en.html
685 DTSTART;TZID=Europe/Berlin:20121228T124500
686 UID:5316@29C3@pentabarf.org
687 DTSTAMP:20121226T143018
688 CATEGORIES:Lecture
689 DESCRIPTION:
690 SUMMARY:Lightning Talks 1 - 5 Minutes of Fame
691 STATUS:CONFIRMED
692 END:VEVENT
693 BEGIN:VEVENT
694 DURATION:PT2H15M
695 LOCATION:Saal 4
696 SEQUENCE:0
697 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5383.en.html
698 DTSTART;TZID=Europe/Berlin:20121229T124500
699 UID:5383@29C3@pentabarf.org
700 DTSTAMP:20121226T143018
701 CATEGORIES:Lecture
702 DESCRIPTION:
703 SUMMARY:Lightning Talks 2 - 5 Minutes of Fame
704 STATUS:CONFIRMED
705 END:VEVENT
706 BEGIN:VEVENT
707 DURATION:PT2H15M
708 LOCATION:Saal 4
709 SEQUENCE:0
710 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5384.en.html
711 DTSTART;TZID=Europe/Berlin:20121230T124500
712 UID:5384@29C3@pentabarf.org
713 DTSTAMP:20121226T143018
714 CATEGORIES:Lecture
715 DESCRIPTION:
716 SUMMARY:Lightning Talks 3 - 5 Minutes of Fame
717 STATUS:CONFIRMED
718 END:VEVENT
719 BEGIN:VEVENT
720 DURATION:PT1H00M
721 LOCATION:Saal 6
722 SEQUENCE:0
723 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5305.en.html
724 DTSTART;TZID=Europe/Berlin:20121229T171500
725 UID:5305@29C3@pentabarf.org
726 DTSTAMP:20121226T143018
727 CATEGORIES:Lecture
728 DESCRIPTION:We're winning! The future looks like network politics!Wait\, w
729 hat the hell are network politics and how do they work? Is that like the P
730 irate Party\, or the IETF\, or Anonymous?
731 SUMMARY:Long live the protocoletariat!
732 STATUS:CONFIRMED
733 END:VEVENT
734 BEGIN:VEVENT
735 DURATION:PT1H00M
736 LOCATION:Saal 4
737 SEQUENCE:0
738 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5124.en.html
739 DTSTART;TZID=Europe/Berlin:20121229T183000
740 UID:5124@29C3@pentabarf.org
741 DTSTAMP:20121226T143018
742 CATEGORIES:Lecture
743 DESCRIPTION:Security is moving deeper into hardware and so should security
744 research. This talks introduces microprobing\, an old technique for snoopin
745 g on data inside chips\, and details a low-cost probing setup.
746 SUMMARY:Low-Cost Chip Microprobing
747 STATUS:CONFIRMED
748 END:VEVENT
749 BEGIN:VEVENT
750 DURATION:PT1H00M
751 LOCATION:Saal 4
752 SEQUENCE:0
753 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5088.en.html
754 DTSTART;TZID=Europe/Berlin:20121228T171500
755 UID:5088@29C3@pentabarf.org
756 DTSTAMP:20121226T143018
757 CATEGORIES:Lecture
758 DESCRIPTION:You might remember Tamagotchi virtual pets from the 1990's. The
759 se toys are still around and just as demanding as ever! This talk covers my
760 attempts to hack the latest Tamagotchis. Starting with the IR interface\,
761 and moving down into the hardware\, this presentation will discuss techniqu
762 es for reverse engineering a device with limited inputs\, computing power a
763 nd debugging capabilities.
764 SUMMARY:Many Tamagotchis Were Harmed in the Making of this Presentation
765 STATUS:CONFIRMED
766 END:VEVENT
767 BEGIN:VEVENT
768 DURATION:PT1H00M
769 LOCATION:Saal 1
770 SEQUENCE:0
771 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5180.en.html
772 DTSTART;TZID=Europe/Berlin:20121230T160000
773 UID:5180@29C3@pentabarf.org
774 DTSTAMP:20121226T143018
775 CATEGORIES:Lecture
776 DESCRIPTION:Autonomer Drumroboter\, robotisches Glockenspiel oder klingende
777 Installation: Musikinstrumente zu modifizieren und selbstzubauen bietet mu
778 sik- und technikaffinen Geeks die Möglichkeit\, vorgefertigten Klang-Setups
779 etwas eigenständiges entgegenzusetzen. Drumroboter und Klanginstallationen
780 üben dabei sowohl physisch als auch optisch einen besonderen Reiz aus: die
781 Quelle des Klangs wird entdeckt.
782 SUMMARY:Marvin und der Blues - Wie Roboterinstrumente zum Musik machen benu
783 tzt werden können
784 STATUS:CONFIRMED
785 END:VEVENT
786 BEGIN:VEVENT
787 DURATION:PT1H00M
788 LOCATION:Saal 6
789 SEQUENCE:0
790 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5282.en.html
791 DTSTART;TZID=Europe/Berlin:20121228T214500
792 UID:5282@29C3@pentabarf.org
793 DTSTAMP:20121226T143018
794 CATEGORIES:Lecture
795 DESCRIPTION:Mit RFID-Lesegeräten Menschen tracken - keine Zukunftsvision.
796 SUMMARY:Meine Kleidung funkt - Tracking von Menschen durch in Kleidung inte
797 grierte RFID-Chips
798 STATUS:CONFIRMED
799 END:VEVENT
800 BEGIN:VEVENT
801 DURATION:PT1H00M
802 LOCATION:Saal 4
803 SEQUENCE:0
804 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5289.en.html
805 DTSTART;TZID=Europe/Berlin:20121228T113000
806 UID:5289@29C3@pentabarf.org
807 DTSTAMP:20121226T143018
808 CATEGORIES:Lecture
809 DESCRIPTION:Meldegesetz und der erfolgreiche Protest dagegen.
810 SUMMARY:Meldegesetz - Was aus dem 57-Sekunden-Gesetz wurde
811 STATUS:CONFIRMED
812 END:VEVENT
813 BEGIN:VEVENT
814 DURATION:PT1H00M
815 LOCATION:Saal 6
816 SEQUENCE:0
817 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5285.en.html
818 DTSTART;TZID=Europe/Berlin:20121229T214500
819 UID:5285@29C3@pentabarf.org
820 DTSTAMP:20121226T143018
821 CATEGORIES:Lecture
822 DESCRIPTION:Unsichere Studierenden- und Mensakarten. Eine wissenschaftliche
823 Auswertung.
824 SUMMARY:Men who stare at bits - RFID-Studierendenkarten mit Fehlern
825 STATUS:CONFIRMED
826 END:VEVENT
827 BEGIN:VEVENT
828 DURATION:PT1H00M
829 LOCATION:Saal 1
830 SEQUENCE:0
831 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5393.en.html
832 DTSTART;TZID=Europe/Berlin:20121229T203000
833 UID:5393@29C3@pentabarf.org
834 DTSTAMP:20121226T143018
835 CATEGORIES:Lecture
836 DESCRIPTION:Contactless smartcards have become widespread for applications
837 such as ticketing\, access control\, identification and payments. Side-chan
838 nel analysis (SCA) is a powerful type of passive implementation attack that
839 enables to extract the secret keys of cryptographic devices. At the exampl
840 e of NXP's Mifare DESfire MF3ICD40 smartcards we demonstrate that SCA attac
841 ks can be applied to cryptographic RFID devices: By exploiting the electro-
842 magnetic information leakage of the cards\, its cryptographic keys are reve
843 aled.We introduce our open-source tools for analyzing contactless smartcard
844 s\, i.e.\, an ISO 14443 RFID reader (http://sourceforge.net/projects/reader
845 14443) and the card emulator Chameleon (http://sourceforge.net/projects/cha
846 meleon14443). We then present the probably worst realization of a commercia
847 l contactless payment system ever and detail on various real-world attacks
848 on this widespread (in Germany) system\, e.g.\, how to 'milk the digital ca
849 sh cow' by modifying the credit balance and convert zeros and ones into rea
850 l money. The content of the talk is joint work with Ingo von Maurich\, Davi
851 d Oswald and Christof Paar.
852 SUMMARY:Milking the Digital Cash Cow - Extracting Secret Keys of Contactles
853 s Smartcards
854 STATUS:CONFIRMED
855 END:VEVENT
856 BEGIN:VEVENT
857 DURATION:PT1H00M
858 LOCATION:Saal 6
859 SEQUENCE:0
860 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5280.en.html
861 DTSTART;TZID=Europe/Berlin:20121230T113000
862 UID:5280@29C3@pentabarf.org
863 DTSTAMP:20121226T143018
864 CATEGORIES:Lecture
865 DESCRIPTION:Massive open online courses are the vogue of the season when it
866 comes to discussing the future of university-level education. But we’re on
867 ly starting to see what education at this scope means and how it can be sup
868 ported best\, in terms of both didactics and technology. This talk is an in
869 side report by two instructors who have delved into the experience of teach
870 ing large audiences online. We share the lessons that we have learned: how
871 to spark student interest\, how to put intuition before formal theories\, h
872 ow to streamline production and much more. And we point out what needs to b
873 e done to truly democratize education from the viewpoint of both the studen
874 ts and the instructors.
875 SUMMARY:Millions of Lessons Learned on Electronic Napkins - On the way to f
876 ree(ing) education
877 STATUS:CONFIRMED
878 END:VEVENT
879 BEGIN:VEVENT
880 DURATION:PT1H00M
881 LOCATION:Saal 6
882 SEQUENCE:0
883 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5102.en.html
884 DTSTART;TZID=Europe/Berlin:20121227T171500
885 UID:5102@29C3@pentabarf.org
886 DTSTAMP:20121226T143018
887 CATEGORIES:Lecture
888 DESCRIPTION:In den letzten Jahren haben sich netzpolitische Kräfteverhältni
889 sse auf interessante Weise verschoben. Neue Allianzen bilden sich sowohl ge
890 gen\, als auch für das freie Internet – und dennoch bleibt der Aktivismus w
891 eit hinter seinem Potential zurück.
892 SUMMARY:Netzaktivsten! Ist das alles\, was wir drauf haben? - Eine subjekti
893 ve Bestandsaufnahme
894 STATUS:CONFIRMED
895 END:VEVENT
896 BEGIN:VEVENT
897 DURATION:PT1H00M
898 LOCATION:Saal 6
899 SEQUENCE:0
900 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5134.en.html
901 DTSTART;TZID=Europe/Berlin:20121227T214500
902 UID:5134@29C3@pentabarf.org
903 DTSTAMP:20121226T143018
904 CATEGORIES:Lecture
905 DESCRIPTION:Human interface design for musical instruments presents unique
906 challenges and vast new possibilities. The proliferation of low cost rapid
907 -prototyping tools has put the means of fabricating instruments within reac
908 h of the performing musician. In this talk\, I'll go through the design pr
909 ocess for my main performance controller (The Mojo)\, my multiplayer instru
910 ments (aka Jamboxes) and my new RoboCaster guitar-controller.
911 SUMMARY:New Human Interfaces for Music - DIY MIDI Controllers
912 STATUS:CONFIRMED
913 END:VEVENT
914 BEGIN:VEVENT
915 DURATION:PT0H30M
916 LOCATION:Saal 6
917 SEQUENCE:0
918 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5404.en.html
919 DTSTART;TZID=Europe/Berlin:20121230T160000
920 UID:5404@29C3@pentabarf.org
921 DTSTAMP:20121226T143018
922 CATEGORIES:Lecture
923 DESCRIPTION:
924 SUMMARY:NOC Review - NOC Review about the 29C3
925 STATUS:CONFIRMED
926 END:VEVENT
927 BEGIN:VEVENT
928 DURATION:PT1H00M
929 LOCATION:Saal 1
930 SEQUENCE:0
931 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5385.en.html
932 DTSTART;TZID=Europe/Berlin:20121227T113000
933 UID:5385@29C3@pentabarf.org
934 DTSTAMP:20121226T143018
935 CATEGORIES:Lecture
936 DESCRIPTION:On the topic of resistance.
937 SUMMARY:Not my department
938 STATUS:CONFIRMED
939 END:VEVENT
940 BEGIN:VEVENT
941 DURATION:PT1H00M
942 LOCATION:Saal 1
943 SEQUENCE:0
944 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5037.en.html
945 DTSTART;TZID=Europe/Berlin:20121228T001500
946 UID:5037@29C3@pentabarf.org
947 DTSTAMP:20121226T143018
948 CATEGORIES:Lecture
949 DESCRIPTION:Gut gereift und mit verbesserter Rezeptur.Aber immer noch:Zwei
950 sich auf Couchen fläzende Teams gehirnwinden\, spitzfinden und assoziieren
951 gegeneinander an\, um Bilderrätsel aus den Gefilden IT\, Netzgesellschaft u
952 nd Informatik zu entwirren.(Hashtag: #Nougatbytes)
953 SUMMARY:Nougatbytes 10 - Gebilde(r)ter Hirnsalat – die rhekkcüЯ der Bilderr
954 ätsel
955 STATUS:CONFIRMED
956 END:VEVENT
957 BEGIN:VEVENT
958 DURATION:PT0H30M
959 LOCATION:Saal 6
960 SEQUENCE:0
961 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5203.en.html
962 DTSTART;TZID=Europe/Berlin:20121228T143000
963 UID:5203@29C3@pentabarf.org
964 DTSTAMP:20121226T143018
965 CATEGORIES:Lecture
966 DESCRIPTION:Polish government decided in favour of open-licensed e-textbook
967 s. This is not to liking of big textbook publishers\, reaping in profits ha
968 nd over fist. While their black PR campaign focuses on technicalities\, it
969 seems obvious that their real beef is with the liberal licensing.
970 SUMMARY:OMG! OER! - How big business fights open education in Poland\, and
971 how open education fights back!
972 STATUS:CONFIRMED
973 END:VEVENT
974 BEGIN:VEVENT
975 DURATION:PT0H30M
976 LOCATION:Saal 6
977 SEQUENCE:0
978 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5210.en.html
979 DTSTART;TZID=Europe/Berlin:20121229T140000
980 UID:5210@29C3@pentabarf.org
981 DTSTAMP:20121226T143018
982 CATEGORIES:Lecture
983 DESCRIPTION:The Security Assertion Markup Language (SAML) is a widely adopt
984 ed language for making security statements about subjects. It is a critical
985 component for the development of federated identity deployments and Single
986 Sign-On scenarios. In order to protect integrity and authenticity of the e
987 xchanged SAML assertions\, the XML Signature standard is applied. However\,
988 the signature verification algorithm is much more complex than in traditio
989 nal signature formats like PKCS#7. The integrity protection can thus be suc
990 cessfully circumvented by application of different XML Signature specific a
991 ttacks\, under a weak adversarial model.
992 SUMMARY:On Breaking SAML - Be Whoever You Want to Be
993 STATUS:CONFIRMED
994 END:VEVENT
995 BEGIN:VEVENT
996 DURATION:PT0H15M
997 LOCATION:Saal 1
998 SEQUENCE:0
999 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5399.en.html
1000 DTSTART;TZID=Europe/Berlin:20121227T110000
1001 UID:5399@29C3@pentabarf.org
1002 DTSTAMP:20121226T143018
1003 CATEGORIES:Lecture
1004 DESCRIPTION:
1005 SUMMARY:Opening Event
1006 STATUS:CONFIRMED
1007 END:VEVENT
1008 BEGIN:VEVENT
1009 DURATION:PT1H00M
1010 LOCATION:Saal 1
1011 SEQUENCE:0
1012 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5308.en.html
1013 DTSTART;TZID=Europe/Berlin:20121229T160000
1014 UID:5308@29C3@pentabarf.org
1015 DTSTAMP:20121226T143018
1016 CATEGORIES:Lecture
1017 DESCRIPTION:Was bedeutet das Zeitalter offener Designs für die Sicherheit v
1018 on Schlössern? Zum Beispiel solchen\, die auf eine geringe Verbreitung eine
1019 s Schlüssels setzen? Ein Beispiel sind die sogenannten Hochsicherheitsversi
1020 onen von Polizeihandschellen. Der Talk zeigt was (und wie) sich in diesem B
1021 ereich mit Lasercuttern und 3D Druckern erreichen lässt - sowie welche komp
1022 lexeren Angriffsziele noch warten. Als Ausweg aus der Problematik kopierbar
1023 er Schlüssel gelten digitale Schlösser\, aber sie kranken anders an offenen
1024 Quellen: sie haben keine! Im Rahmen eines Open Source Lock Projektes haben
1025 wir uns daher ein reflashbares Vorhängeschloss angesehen\, doch noch ehe w
1026 ir den Programmieradapter angeschlossen hatten fanden wir eine Schwachstell
1027 e der Hardware... Leider kein Einzelfall!
1028 SUMMARY:Open Source Schlüssel und Schlösser - Offene Quellen zum Bösen und
1029 Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektronischen
1030 Schlössern
1031 STATUS:CONFIRMED
1032 END:VEVENT
1033 BEGIN:VEVENT
1034 DURATION:PT1H00M
1035 LOCATION:Saal 4
1036 SEQUENCE:0
1037 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5265.en.html
1038 DTSTART;TZID=Europe/Berlin:20121230T171500
1039 UID:5265@29C3@pentabarf.org
1040 DTSTAMP:20121226T143018
1041 CATEGORIES:Lecture
1042 DESCRIPTION:x86 processors contain a surprising amount of built-in memory t
1043 ranslation logic\, which is driven by various data tables with intricate en
1044 try formats\, and can produce various kinds of traps and other interesting
1045 computational effects. These features are mostly relics of earlier\, more c
1046 ivilized times\, when Jedi Knights tried to protect the Old Republic OSes w
1047 ith segmentation\, supervisor bits\, and hardware task support\, but were d
1048 efeated by processor de-optimizations and performance concerns and left unu
1049 sed by both Windows and UNIX systems – and explored only by hackers. For th
1050 e rest of the world\, an x86 PC was a "von Neumann architecture" with most
1051 of its strangeness unused.
1052 SUMMARY:Page Fault Liberation Army or Gained in Translation - a history of
1053 creative x86 virtual memory uses
1054 STATUS:CONFIRMED
1055 END:VEVENT
1056 BEGIN:VEVENT
1057 DURATION:PT1H00M
1058 LOCATION:Saal 4
1059 SEQUENCE:0
1060 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5323.en.html
1061 DTSTART;TZID=Europe/Berlin:20121229T230000
1062 UID:5323@29C3@pentabarf.org
1063 DTSTAMP:20121226T143018
1064 CATEGORIES:Lecture
1065 DESCRIPTION:Der Vortrag handelt über Getreidezüchtung. Am Beispiel von Weiz
1066 en soll der langjährige Prozess beschrieben werden\, den es benötigt\, um
1067 eine neue Sorte auf den Markt zu bringen. Es sollen die biologischen Grundl
1068 agen sowie die benötigte Technik vorgestellt werden. Außerdem wird auf die
1069 Problematik eingegangen\, die die Konzentration des Marktes auf wenige groß
1070 e Konzerne mit sich bringt.
1071 SUMMARY:Pflanzenhacken richtig - Einblicke in die Weizenzüchtung
1072 STATUS:CONFIRMED
1073 END:VEVENT
1074 BEGIN:VEVENT
1075 DURATION:PT1H00M
1076 LOCATION:Saal 4
1077 SEQUENCE:0
1078 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5095.en.html
1079 DTSTART;TZID=Europe/Berlin:20121227T183000
1080 UID:5095@29C3@pentabarf.org
1081 DTSTAMP:20121226T143018
1082 CATEGORIES:Lecture
1083 DESCRIPTION:To date\, remote vehicle communications have provided little in
1084 the way of privacy. Much information and misinformation has been spread on
1085 what the system is and can do\, especially within the information security
1086 community. The recent field trial in the US of a connected vehicle infrast
1087 ructure raises the level of concern amongst all who are aware of existing p
1088 rivacy issues.
1089 SUMMARY:Privacy and the Car of the Future - Considerations for the Connecte
1090 d Vehicle
1091 STATUS:CONFIRMED
1092 END:VEVENT
1093 BEGIN:VEVENT
1094 DURATION:PT1H00M
1095 LOCATION:Saal 4
1096 SEQUENCE:0
1097 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5101.en.html
1098 DTSTART;TZID=Europe/Berlin:20121229T160000
1099 UID:5101@29C3@pentabarf.org
1100 DTSTAMP:20121226T143018
1101 CATEGORIES:Lecture
1102 DESCRIPTION:ACTA war das beherrschende Thema des zweiten Halbjahres. Mit AC
1103 TA sollte der Weg einer Privatisierung der Rechtsdurchsetzung weiter gegang
1104 en werden. Was das konkret bedeutet\, können wir bereits im Ausland sehen:
1105 Netzsperren\, 3-Strikes-Systeme und eine Echtzeit-Überwachung des Datenverk
1106 ehrs zur Bekämpfung von Urheberrechtsverletzungen. Existierende Modelle in
1107 anderen europäischen Staaten zeigen\, dass diese Maßnahmen erhebliche grund
1108 - und datenschutzrechtliche Probleme aufwerfen.
1109 SUMMARY:Privatisierung der Rechtsdurchsetzung - Von ACTA\, IPRED und Freund
1110 en
1111 STATUS:CONFIRMED
1112 END:VEVENT
1113 BEGIN:VEVENT
1114 DURATION:PT1H00M
1115 LOCATION:Saal 1
1116 SEQUENCE:0
1117 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5266.en.html
1118 DTSTART;TZID=Europe/Berlin:20121230T140000
1119 UID:5266@29C3@pentabarf.org
1120 DTSTAMP:20121226T143018
1121 CATEGORIES:Lecture
1122 DESCRIPTION:Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Tools
1123 wie Proxies\, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge unters
1124 tützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? Der Vortrag s
1125 tellt einige von diesen vor und zeigt die Stärken und Schwächen.
1126 SUMMARY:Proximax\, Telex\, Flashproxy oder Tor Bridges - Übersicht über akt
1127 uelle Zensurumgehungssoftware
1128 STATUS:CONFIRMED
1129 END:VEVENT
1130 BEGIN:VEVENT
1131 DURATION:PT1H00M
1132 LOCATION:Saal 4
1133 SEQUENCE:0
1134 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5374.en.html
1135 DTSTART;TZID=Europe/Berlin:20121227T171500
1136 UID:5374@29C3@pentabarf.org
1137 DTSTAMP:20121226T143018
1138 CATEGORIES:Lecture
1139 DESCRIPTION: This talk will give an overview of the ongoing work by the W3C
1140 on a controversial general purpose Javascript cryptography API in context
1141 of the larger desire to create trusted and encrypted cloud services with ri
1142 ch web applications. Today\, cryptography is difficult to use and the Web i
1143 s an insecure environment at best\, but can this situation be improved and
1144 cryptography be put in the hands of ordinary developers and users? The W3C
1145 specification\, currently under development\, will be described\, as well a
1146 s its interaction with other parts of the emerging Web Security Model at th
1147 e W3C and IETF such as Content Security Policy\, HTTP Strict Transport Secu
1148 rity\, and Certificate Transparency. A number of use-cases\, ranging from d
1149 ecentralized identity systems to secure cloud services for activists\, will
1150 be detailed. As the specification will be under active development until a
1151 utumn 2013\, feedback from the hacker community is needed!
1152 SUMMARY:Re-igniting the Crypto Wars on the Web
1153 STATUS:CONFIRMED
1154 END:VEVENT
1155 BEGIN:VEVENT
1156 DURATION:PT0H30M
1157 LOCATION:Saal 6
1158 SEQUENCE:0
1159 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5138.en.html
1160 DTSTART;TZID=Europe/Berlin:20121228T131500
1161 UID:5138@29C3@pentabarf.org
1162 DTSTAMP:20121226T143018
1163 CATEGORIES:Lecture
1164 DESCRIPTION:In 1791\, the political reformer Jeremy Bentham theorized the P
1165 anopticon\, whose design promised to allow a single Inspector to surveil (e
1166 xercise "inspective force" over) large numbers of criminals or workers. In
1167 recent years\, the advent of a suitable technical apparatus – CCTV\, ISP ta
1168 ps (network traffic interception)\, data banks\, and so on – has extended t
1169 he proposed 30m circumference of Bentham’s structure to\, and beyond\, the
1170 physical boundaries of entire countries. While total surveillance is often
1171 perceived as a feature of modernity\, its conceptual and epistemological fr
1172 amework is rooted in the Romantic period\, moreover at a key juncture in th
1173 e history of ideas concerning individual subjectivity\, rights and freedoms
1174 . David Barnard-Wills refers to inspective culture as a "nexus of surveilla
1175 nce\, identity and language" (2012). In this talk\, we examine this nexus i
1176 n the historical period that first\, and so powerfully\, imagined the fully
1177 surveilled world.
1178 SUMMARY:Romantic Hackers - Keats\, Wordsworth and Total Surveillance
1179 STATUS:CONFIRMED
1180 END:VEVENT
1181 BEGIN:VEVENT
1182 DURATION:PT1H00M
1183 LOCATION:Saal 1
1184 SEQUENCE:0
1185 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5402.en.html
1186 DTSTART;TZID=Europe/Berlin:20121229T183000
1187 UID:5402@29C3@pentabarf.org
1188 DTSTAMP:20121226T143018
1189 CATEGORIES:Lecture
1190 DESCRIPTION:Privacy International\, Agentura.Ru\, the Russian secret servic
1191 es watchdog\, and Citizen Lab have joined forces to launch a new project en
1192 titled 'Russia’s Surveillance State'. The aims of the project are to undert
1193 ake research and investigation into surveillance practices in Russia\, incl
1194 uding the trade in and use of surveillance technologies\, and to publicise
1195 research and investigative findings to improve national and international a
1196 wareness of surveillance and secrecy practices in Russia. The project is m
1197 ade possible with support from the Canada Centre for Global Security Studie
1198 s\, Munk School of Global Affairs\, at the University of Toronto.
1199 SUMMARY:Russia’s Surveillance State
1200 STATUS:CONFIRMED
1201 END:VEVENT
1202 BEGIN:VEVENT
1203 DURATION:PT1H00M
1204 LOCATION:Saal 1
1205 SEQUENCE:0
1206 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5140.en.html
1207 DTSTART;TZID=Europe/Berlin:20121228T214500
1208 UID:5140@29C3@pentabarf.org
1209 DTSTAMP:20121226T143018
1210 CATEGORIES:Lecture
1211 DESCRIPTION:The triple meltdown of the Fukushima Dai-Ichi nuclear power pla
1212 nt in March last year and the release of radioactive material that has ensu
1213 ed have left a good part of Northern Japan contaminated with unknown amount
1214 of radioactivity. An outstanding lack of transparency from both the govern
1215 ment and the power utility then resulted in a near total lack of informatio
1216 n concerning the levels of radiation in the\, yet unknown\, contaminated ar
1217 eas. As a response\, concerned citizen have started to take upon themselves
1218 this challenging task. However it quickly became clear that handheld measu
1219 rements wouldn't scale up to the full magnitude of the area to cover. New m
1220 eans of measuring radiation accurately\, quickly and cheaply were needed.
1221 SUMMARY:Safecast: DIY and citizen-sensing of radiation - Empowering citizen
1222 in the wake of Fukushima triple-meltdown disaster
1223 STATUS:CONFIRMED
1224 END:VEVENT
1225 BEGIN:VEVENT
1226 DURATION:PT1H00M
1227 LOCATION:Saal 6
1228 SEQUENCE:0
1229 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5059.en.html
1230 DTSTART;TZID=Europe/Berlin:20121227T230000
1231 UID:5059@29C3@pentabarf.org
1232 DTSTAMP:20121226T143018
1233 CATEGORIES:Lecture
1234 DESCRIPTION:Modern civilization unconditionally depends on information syst
1235 ems. It is paradoxical but true that ICS/SCADA systems are the most insecur
1236 e systems in the world. From network to application\, SCADA is full of conf
1237 iguration issues and vulnerabilities.
1238 SUMMARY:SCADA Strangelove - or: How I Learned to Start Worrying and Love Nu
1239 clear Plants
1240 STATUS:CONFIRMED
1241 END:VEVENT
1242 BEGIN:VEVENT
1243 DURATION:PT1H00M
1244 LOCATION:Saal 4
1245 SEQUENCE:0
1246 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5177.en.html
1247 DTSTART;TZID=Europe/Berlin:20121229T113000
1248 UID:5177@29C3@pentabarf.org
1249 DTSTAMP:20121226T143018
1250 CATEGORIES:Lecture
1251 DESCRIPTION:This talk will go into some of challenges\, solutions\, and sto
1252 ries from securing a campaign for the 2012 US presidential election.
1253 SUMMARY:Securing the Campaign - Security and the 2012 US Presidential Elect
1254 ion
1255 STATUS:CONFIRMED
1256 END:VEVENT
1257 BEGIN:VEVENT
1258 DURATION:PT1H00M
1259 LOCATION:Saal 4
1260 SEQUENCE:0
1261 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5225.en.html
1262 DTSTART;TZID=Europe/Berlin:20121229T203000
1263 UID:5225@29C3@pentabarf.org
1264 DTSTAMP:20121226T143018
1265 CATEGORIES:Lecture
1266 DESCRIPTION:In this talk we will survey some 30 recent attacks on the Russi
1267 an GOST block cipher.Background: GOST cipher is the official encryption sta
1268 ndard of the Russian federation\, and also has special versions for the mos
1269 t important Russian banks. Until 2012 there was no attack on GOST when it i
1270 s used in encryption with random keys. I have developed more than 30 differ
1271 ent academic attacks on GOST the fastest has complexity of 2^118 to recover
1272 some but not all 256-bit keys generated at random\, which will be presente
1273 d for the first time at CCC conference. It happens only once per decade tha
1274 t a government standard is broken while it is still an official government
1275 standard (happened for DES and AES\, no other cases known). All these are b
1276 roken only in academic sense\, for GOST most recent attacks are sliding int
1277 o maybe arguably practical in 30 years from now instead of 200 years... Our
1278 earlier results were instrumental at ISO for rejecting GOST as an internat
1279 ional encryption standard last year. Not more than 5+ block cihers have eve
1280 r achieved this level of ISO standardisation in 25 years and it NEVER happe
1281 nded in history of ISO that a cipher got broken during the standardization
1282 process. Two main papers with 70+30 pages respectively which are http://epr
1283 int.iacr.org/2011/626 and http://eprint.iacr.org/2012/138. Two other papers
1284 have been already published in Cryptologia journal which specializes in se
1285 rious military and government crypto. The talk will cover three main famili
1286 es of attacks on GOST: high-level transformations\, low- level inversion/MI
1287 TM/guess-then-software/algebraic attacks and advanced truncated differentia
1288 l cryptanalysis of GOST.
1289 SUMMARY:Security Evaluation of Russian GOST Cipher - Survey of All Known At
1290 tacks on Russian Government Encryption Standard
1291 STATUS:CONFIRMED
1292 END:VEVENT
1293 BEGIN:VEVENT
1294 DURATION:PT1H00M
1295 LOCATION:Saal 1
1296 SEQUENCE:0
1297 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5244.en.html
1298 DTSTART;TZID=Europe/Berlin:20121230T171500
1299 UID:5244@29C3@pentabarf.org
1300 DTSTAMP:20121226T143018
1301 CATEGORIES:Lecture
1302 DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? We
1303 lche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Tre
1304 nds waren zu sehen?
1305 SUMMARY:Security Nightmares - Damit Sie auch morgen schlecht von Ihrem Comp
1306 uter träumen.
1307 STATUS:CONFIRMED
1308 END:VEVENT
1309 BEGIN:VEVENT
1310 DURATION:PT1H00M
1311 LOCATION:Saal 4
1312 SEQUENCE:0
1313 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5167.en.html
1314 DTSTART;TZID=Europe/Berlin:20121227T160000
1315 UID:5167@29C3@pentabarf.org
1316 DTSTAMP:20121226T143018
1317 CATEGORIES:Lecture
1318 DESCRIPTION:In The Netherlands\, this year the community-driven mobile telc
1319 o Limesco has started operations. We're providing voice\, SMS and data serv
1320 ices to dozens of hackers in our country.One of the founders of Limesco wil
1321 l give a lecture about mobile telephony in The Netherlands\, encompassing t
1322 opics like what companies are involved in the system\, how tariffs are cons
1323 tructed and the role of government regulations.
1324 SUMMARY:Setting mobile phones free - An overview of a mobile telephony mark
1325 et and how a community-driven operator is born
1326 STATUS:CONFIRMED
1327 END:VEVENT
1328 BEGIN:VEVENT
1329 DURATION:PT1H00M
1330 LOCATION:Saal 6
1331 SEQUENCE:0
1332 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5164.en.html
1333 DTSTART;TZID=Europe/Berlin:20121228T160000
1334 UID:5164@29C3@pentabarf.org
1335 DTSTAMP:20121226T143018
1336 CATEGORIES:Lecture
1337 DESCRIPTION:Der Betrieb von WLAN-Funk-Netzen und auch von offenen oder frei
1338 en Netzen ist heute weit verbreitet und Teil der Diskussion um die "Culture
1339 s of Sharing". Der Vortrag soll die Grundlagen der Haftung für offene Netze
1340 und die Entwicklung der Rechtsprechung vom Landgericht Hamburg ("gestern")
1341 zum BGH-Urteil "Sommer unseres Lebens" und den Einfluss aktueller Rechtspr
1342 echung des Europäischen Gerichtshofs\, des Bundesgerichtshofs und der Insta
1343 nzgerichte darstellen ("heute"). Ein Ausblick auf die Folgen dieser neuen\,
1344 teilweise abweichenden Rechtsprechung und auf die Gesetzesinitiativen der
1345 SPD und der Linken ("morgen") soll den Vortrag abrunden.
1346 SUMMARY:Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze - Stand
1347 gestern\, heute und morgen
1348 STATUS:CONFIRMED
1349 END:VEVENT
1350 BEGIN:VEVENT
1351 DURATION:PT1H00M
1352 LOCATION:Saal 4
1353 SEQUENCE:0
1354 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5127.en.html
1355 DTSTART;TZID=Europe/Berlin:20121227T124500
1356 UID:5127@29C3@pentabarf.org
1357 DTSTAMP:20121226T143018
1358 CATEGORIES:Lecture
1359 DESCRIPTION:Der Eid des Hippokrates\, der das Handeln von Ärzten ethisch le
1360 iten soll\, ist zwischen 2.500 und 2.000 Jahre alt und tatsächlich wohl die
1361 erste 'Datenschutz-Vorschrift' überhaupt. So heißt es: "Was ich bei der Be
1362 handlung oder auch außerhalb meiner Praxis im Umgange mit Menschen sehe un
1363 d höre\, das man nicht weiterreden darf\, werde ich verschweigen und als Ge
1364 heimnis bewahren." [1]
1365 SUMMARY:Siechtum und Sterben der ärztlichen Schweigepflicht
1366 STATUS:CONFIRMED
1367 END:VEVENT
1368 BEGIN:VEVENT
1369 DURATION:PT1H00M
1370 LOCATION:Saal 4
1371 SEQUENCE:0
1372 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5121.en.html
1373 DTSTART;TZID=Europe/Berlin:20121229T171500
1374 UID:5121@29C3@pentabarf.org
1375 DTSTAMP:20121226T143018
1376 CATEGORIES:Lecture
1377 DESCRIPTION:Green-IT kennen wir inzwischen zur Genüge. Computer können aber
1378 nicht nur nicht "green" sein\, sondern auch unfair und unsozial\, von der
1379 Rohstoffgewinnung bis zur Verschrottung. Unfair spart nämlich Geld. Der Ged
1380 anke\, faire Produkte anzubieten und zu kaufen\, ist inzwischen weit verbre
1381 itet\, allerdings eher bei Kaffee oder Kleidung. Ein Angebot an fairer IT f
1382 ehlt. Die Industrie hat sich noch nicht auf den Weg gemacht\, faire Compute
1383 r herzustellen. Wir Nutzer haben kaum die Wahl – verändern können wir aber
1384 durchaus etwas. Der Vortrag erklärt\, was und wie.
1385 SUMMARY:Sind faire Computer möglich?
1386 STATUS:CONFIRMED
1387 END:VEVENT
1388 BEGIN:VEVENT
1389 DURATION:PT0H30M
1390 LOCATION:Saal 6
1391 SEQUENCE:0
1392 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5123.en.html
1393 DTSTART;TZID=Europe/Berlin:20121229T143000
1394 UID:5123@29C3@pentabarf.org
1395 DTSTAMP:20121226T143018
1396 CATEGORIES:Lecture
1397 DESCRIPTION:The lecture would address topics related to reverse engineering
1398 for mobile platforms\, especially from the Android point of view. The main
1399 aspects of the presentation is a new approach to reverse engineering side
1400 effects problem: some low footprint inspection techniques that grant analys
1401 ts with the ability to access the program memory without altering its behav
1402 ior. One technique is presented in particular - Android service injection -
1403 and is demonstrated.
1404 SUMMARY:Small footprint inspection techniques for Android - Reverse enginee
1405 ring on Android platforms
1406 STATUS:CONFIRMED
1407 END:VEVENT
1408 BEGIN:VEVENT
1409 DURATION:PT1H00M
1410 LOCATION:Saal 4
1411 SEQUENCE:0
1412 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5239.en.html
1413 DTSTART;TZID=Europe/Berlin:20121228T183000
1414 UID:5239@29C3@pentabarf.org
1415 DTSTAMP:20121226T143018
1416 CATEGORIES:Lecture
1417 DESCRIPTION:This talk will give an overview on the technology\, the laws an
1418 d the technical guidelines of the smartMeter roll-out in Germany.
1419 SUMMARY:SmartMeter - A technological overview of the German roll-out
1420 STATUS:CONFIRMED
1421 END:VEVENT
1422 BEGIN:VEVENT
1423 DURATION:PT1H00M
1424 LOCATION:Saal 4
1425 SEQUENCE:0
1426 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5336.en.html
1427 DTSTART;TZID=Europe/Berlin:20121230T113000
1428 UID:5336@29C3@pentabarf.org
1429 DTSTAMP:20121226T143018
1430 CATEGORIES:Lecture
1431 DESCRIPTION:Forderungen nach einer gerechten Sprache (also einer Sprache fr
1432 ei von Rassismus\, Sexismus und anderen menschenfeindlichen Ideologien) sto
1433 ßen häufig auf Unverständnis und Ablehnung. Unverständnis\, weil statt der
1434 sozialen Wirklichkeit die Sprache kritisiert wird\, mit der sie beschrieben
1435 wird. Ablehnung\, weil Sprachkritik häufig als Sprechverbot empfunden wird
1436 .
1437 SUMMARY:Sprache\, Ungleichheit und Unfreiheit
1438 STATUS:CONFIRMED
1439 END:VEVENT
1440 BEGIN:VEVENT
1441 DURATION:PT0H30M
1442 LOCATION:Saal 6
1443 SEQUENCE:0
1444 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5378.en.html
1445 DTSTART;TZID=Europe/Berlin:20121229T124500
1446 UID:5378@29C3@pentabarf.org
1447 DTSTAMP:20121226T143018
1448 CATEGORIES:Lecture
1449 DESCRIPTION:Stabilitätsanker & Wachstumslokomotive geben als politische Met
1450 aphern ungewollt Auskunft über das Ausmaß der europäischen Wirtschafts- und
1451 Finanzkrise. Wie kommt so ein Begriff in Verkehr? Wer gebraucht ihn? Zu we
1452 lchem Zweck? Was fördert die Analyse der Metaphern zutage?
1453 SUMMARY:Stabilitätsanker & Wachstumslokomotive
1454 STATUS:CONFIRMED
1455 END:VEVENT
1456 BEGIN:VEVENT
1457 DURATION:PT1H00M
1458 LOCATION:Saal 6
1459 SEQUENCE:0
1460 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5230.en.html
1461 DTSTART;TZID=Europe/Berlin:20121228T230000
1462 UID:5230@29C3@pentabarf.org
1463 DTSTAMP:20121226T143018
1464 CATEGORIES:Lecture
1465 DESCRIPTION:Stylometry uses linguistic information found in a document to p
1466 erform authorship recognition. In this talk\, we will present how stylometr
1467 y can be used to deanonymize users in multilingual underground forums. Our
1468 initial result shows that in spite of differences in languages and text len
1469 gths\, regular stylometric methods perform well in identifying users in thi
1470 s context. We will also present the improved version of Anonymouth\, a tool
1471 to anonymize written document\, with user studies.
1472 SUMMARY:Stylometry and Online Underground Markets
1473 STATUS:CONFIRMED
1474 END:VEVENT
1475 BEGIN:VEVENT
1476 DURATION:PT0H30M
1477 LOCATION:Saal 6
1478 SEQUENCE:0
1479 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5390.en.html
1480 DTSTART;TZID=Europe/Berlin:20121228T140000
1481 UID:5390@29C3@pentabarf.org
1482 DTSTAMP:20121226T143018
1483 CATEGORIES:Lecture
1484 DESCRIPTION:Don't call us if your campaign does not work! And worse\, every
1485 one's been harassed or arrested.
1486 SUMMARY:Tactical Tech - Bridging the Gap
1487 STATUS:CONFIRMED
1488 END:VEVENT
1489 BEGIN:VEVENT
1490 DURATION:PT0H30M
1491 LOCATION:Saal 6
1492 SEQUENCE:0
1493 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5228.en.html
1494 DTSTART;TZID=Europe/Berlin:20121230T124500
1495 UID:5228@29C3@pentabarf.org
1496 DTSTAMP:20121226T143018
1497 CATEGORIES:Lecture
1498 DESCRIPTION:The Role of Technology in Post-Revolution Tunisia & Egypt: Inte
1499 rnet activists have embarked on many online projects to empower citizens wi
1500 th necessary information about their elected officials.
1501 SUMMARY:Technology in Post-Revolution Tunisia and Egypt
1502 STATUS:CONFIRMED
1503 END:VEVENT
1504 BEGIN:VEVENT
1505 DURATION:PT1H00M
1506 LOCATION:Saal 4
1507 SEQUENCE:0
1508 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5195.en.html
1509 DTSTART;TZID=Europe/Berlin:20121230T160000
1510 UID:5195@29C3@pentabarf.org
1511 DTSTAMP:20121226T143018
1512 CATEGORIES:Lecture
1513 DESCRIPTION:The Executable and Linkable Format (ELF) is omnipresent\; relat
1514 ed OS and library code is run whenever processes are set up and serviced (e
1515 .g.\, dynamically linked). The loader is the stage manager for every execut
1516 able. Hardly anyone appreciates the work that the ELF backstage crew (inclu
1517 ding the linker and the loader) puts in to make an executable run smoothly.
1518 SUMMARY:The Care and Feeding of Weird Machines Found in Executable Metadata
1519 STATUS:CONFIRMED
1520 END:VEVENT
1521 BEGIN:VEVENT
1522 DURATION:PT1H00M
1523 LOCATION:Saal 4
1524 SEQUENCE:0
1525 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5206.en.html
1526 DTSTART;TZID=Europe/Berlin:20121227T214500
1527 UID:5206@29C3@pentabarf.org
1528 DTSTAMP:20121226T143018
1529 CATEGORIES:Lecture
1530 DESCRIPTION:In the world of digital activism\, distributed denial of servic
1531 e attacks present relatively low barriers to popular participation\, have a
1532 high potential for attracting large numbers of first-time and repeat parti
1533 cipants\, and can attract large amounts of media attention. But though suc
1534 h actions popular\, are they ethical? In this talk I will be presenting an
1535 ethical framework for the analysis of activist DDOS actions. The framework
1536 is grounded in a historical analysis of various activist DDOS actions\, suc
1537 h as the IGC attacks in Spain in the late 90s\, Electronic Disturbance Thea
1538 ter actions in the early 2000s\, and the Anonymous-led Operation Payback at
1539 tacks in 2010. Each historical case study presents a unique confluence of
1540 technological\, political\, legal and operational factors allowing for a fu
1541 ll spectrum of ethical analysis.
1542 SUMMARY:The Ethics of Activist DDOS Actions - A Historical Analysis
1543 STATUS:CONFIRMED
1544 END:VEVENT
1545 BEGIN:VEVENT
1546 DURATION:PT1H00M
1547 LOCATION:Saal 6
1548 SEQUENCE:0
1549 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html
1550 DTSTART;TZID=Europe/Berlin:20121229T230000
1551 UID:5256@29C3@pentabarf.org
1552 DTSTAMP:20121226T143018
1553 CATEGORIES:Lecture
1554 DESCRIPTION:Have you ever been staring for nights at binary or hexadecimal
1555 data flows extracted from an USB channel? Don't you remember yourself searc
1556 hing for some patterns and similarities in this fuc***g mess of zeros and o
1557 nes grabbed from a binary configuration file? How long did it take you to f
1558 ind an 16 bits decimal size field last time you reversed an IPC communicati
1559 on protocol?Did you know you were not alone and that among them\, Rob Savoy
1560 e (@ FOSDEM-08) and Drew Fisher (@ 28C3) have already reported the main dif
1561 ficulties of the RE operations. Both of them called for the creation of a t
1562 ool which would help experts in their work.
1563 SUMMARY:The future of protocol reversing and simulation applied on ZeroAcce
1564 ss botnet - Mapping your enemy Botnet with Netzob
1565 STATUS:CONFIRMED
1566 END:VEVENT
1567 BEGIN:VEVENT
1568 DURATION:PT1H00M
1569 LOCATION:Saal 1
1570 SEQUENCE:0
1571 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5274.en.html
1572 DTSTART;TZID=Europe/Berlin:20121227T171500
1573 UID:5274@29C3@pentabarf.org
1574 DTSTAMP:20121226T143018
1575 CATEGORIES:Lecture
1576 DESCRIPTION:The current European data protection directive is from 1995\, w
1577 hich was when the internet had not hit Brussels' decision-makers yet. Now\,
1578 17 years later\, it is being completely re-writen. Will it meet the challe
1579 nges of the age of big data? Will it have any effect on non-EU data hoarder
1580 s? How will it deal with user-generated consent? What is this strange new "
1581 right to be forgotten"? And what about privacy by design?
1582 SUMMARY:The Grand EU Data Protection Reform - A latest battle report by so
1583 me key actors from Brussels
1584 STATUS:CONFIRMED
1585 END:VEVENT
1586 BEGIN:VEVENT
1587 DURATION:PT1H00M
1588 LOCATION:Saal 6
1589 SEQUENCE:0
1590 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html
1591 DTSTART;TZID=Europe/Berlin:20121228T171500
1592 UID:5306@29C3@pentabarf.org
1593 DTSTAMP:20121226T143018
1594 CATEGORIES:Lecture
1595 DESCRIPTION:At the very beginning\, Tor was just a socks proxy that protect
1596 ed the origin and/or destination of your TCP flows. Now the broader Tor eco
1597 system includes a diverse set of projects -- browser extensions to patch Fi
1598 refox and Thunderbird's privacy issues\, Tor controller libraries to let yo
1599 u interface with the Tor client in your favorite language\, network scanner
1600 s to measure relay performance and look for misbehaving exit relays\, LiveC
1601 Ds\, support for the way Android applications expect Tor to behave\, full-n
1602 etwork simulators and testing frameworks\, plugins to make Tor's traffic lo
1603 ok like Skype or other protocols\, and metrics and measurement tools to kee
1604 p track of how well everything's working. Many of these tools aim to be use
1605 ful beyond Tor: making them modular means they're reusable for other anonym
1606 ity and security projects as well. In this talk\, Roger and Jake will walk
1607 you through all the tools that make up the Tor software world\, and give yo
1608 u a better understanding of which ones need love and how you can help.
1609 SUMMARY:The Tor software ecosystem
1610 STATUS:CONFIRMED
1611 END:VEVENT
1612 BEGIN:VEVENT
1613 DURATION:PT1H00M
1614 LOCATION:Saal 6
1615 SEQUENCE:0
1616 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5178.en.html
1617 DTSTART;TZID=Europe/Berlin:20121230T140000
1618 UID:5178@29C3@pentabarf.org
1619 DTSTAMP:20121226T143018
1620 CATEGORIES:Lecture
1621 DESCRIPTION:Galaksija was to be in Yugoslavia what Commodore and Sinclair w
1622 ere in the west. Whether it succeeded or not\, its deceptively simple desig
1623 n can still teach us a lot of interesting tricks on how to make a usable co
1624 mputer and operating system with as few transistors and bits as possible.
1625 SUMMARY:The ultimate Galaksija talk - Everything about a Yugoslavian microc
1626 omputer halfway between a TRS-80 and a ZX 80
1627 STATUS:CONFIRMED
1628 END:VEVENT
1629 BEGIN:VEVENT
1630 DURATION:PT1H00M
1631 LOCATION:Saal 4
1632 SEQUENCE:0
1633 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5044.en.html
1634 DTSTART;TZID=Europe/Berlin:20121227T230000
1635 UID:5044@29C3@pentabarf.org
1636 DTSTAMP:20121226T143018
1637 CATEGORIES:Lecture
1638 DESCRIPTION:In this year’s talk\, I tie on my 28c3 talk and present timing
1639 side channels from a defending viewpoint: How can one mitigate timing side
1640 channels? Aren’t random delays sufficient to prevent timing side channels i
1641 n practice? What is the minimum size of random delays to be effective? Are
1642 there other delay strategies besides random delays that are more effective
1643 and efficient?
1644 SUMMARY:Time is NOT on your Side - Mitigating Timing Side Channels on the W
1645 eb
1646 STATUS:CONFIRMED
1647 END:VEVENT
1648 BEGIN:VEVENT
1649 DURATION:PT1H00M
1650 LOCATION:Saal 1
1651 SEQUENCE:0
1652 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5380.en.html
1653 DTSTART;TZID=Europe/Berlin:20121228T140000
1654 UID:5380@29C3@pentabarf.org
1655 DTSTAMP:20121226T143018
1656 CATEGORIES:Lecture
1657 DESCRIPTION:Wir wissen seit ein paar Jahren\, dass der Staat technisch in d
1658 er Lage ist\, die Computer einiger seiner Bürger zu infiltrieren. Aber soll
1659 er das auch dürfen? Was hat sich in den letzten Monaten beim Staatstrojane
1660 r getan?
1661 SUMMARY:Trojaner-Blindflug - Spionage-Software von Staats wegen
1662 STATUS:CONFIRMED
1663 END:VEVENT
1664 BEGIN:VEVENT
1665 DURATION:PT0H30M
1666 LOCATION:Saal 6
1667 SEQUENCE:0
1668 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html
1669 DTSTART;TZID=Europe/Berlin:20121228T124500
1670 UID:5091@29C3@pentabarf.org
1671 DTSTAMP:20121226T143018
1672 CATEGORIES:Lecture
1673 DESCRIPTION:Hardware-basierte Festplattenvollverschlüsselungen in Form soge
1674 nannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere und perf
1675 ormante Alternative zu Software-basierter Verschlüsselung wie BitLocker und
1676 TrueCrypt gesehen. Während der Performance-Gewinn und die Benutzerfreundli
1677 chkeit von SEDs\, bspw. Intel's SSD 320 bzw. SSD 520\, außer Frage stehen\,
1678 ist der Sicherheits-Gewinn deutlich geringer als bisher angenommen. Teilwe
1679 ise sind Systeme die auf SEDs basieren gar schwächer als vergleichbare Syst
1680 eme die auf Software-Verschlüsselung basieren.
1681 SUMMARY:(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung
1682 STATUS:CONFIRMED
1683 END:VEVENT
1684 BEGIN:VEVENT
1685 DURATION:PT1H00M
1686 LOCATION:Saal 1
1687 SEQUENCE:0
1688 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5396.en.html
1689 DTSTART;TZID=Europe/Berlin:20121228T160000
1690 UID:5396@29C3@pentabarf.org
1691 DTSTAMP:20121226T143018
1692 CATEGORIES:Lecture
1693 DESCRIPTION:Weltbilder der Informatik sind in mancher Hinsicht denen in der
1694 Hacker- und Hackerinnen-Community nicht unähnlich.
1695 SUMMARY:Was ist\, was kann\, was soll Gender Studies Informatik?
1696 STATUS:CONFIRMED
1697 END:VEVENT
1698 BEGIN:VEVENT
1699 DURATION:PT1H00M
1700 LOCATION:Saal 1
1701 SEQUENCE:0
1702 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5160.en.html
1703 DTSTART;TZID=Europe/Berlin:20121228T113000
1704 UID:5160@29C3@pentabarf.org
1705 DTSTAMP:20121226T143018
1706 CATEGORIES:Lecture
1707 DESCRIPTION:In the Free City of Hamburg\, which is one of 16 German states\
1708 , a coalition of hackers\, activists and other players of civil society hav
1709 e drafted the most revolutionary Freedom of information law in the world. T
1710 he law obliges the state to proactively publish all important public inform
1711 ation (such as contracts\, studies\, construction permits) in an OpenData f
1712 ormat on the Internet. After the start of a referendum campaign\, the law w
1713 as passed unanimously by the state parliament in June 2012 to avoid a publi
1714 c vote on it.
1715 SUMMARY:We are all lawmakers! - How to further transparency by law – the Ha
1716 mburg example and beyond
1717 STATUS:CONFIRMED
1718 END:VEVENT
1719 BEGIN:VEVENT
1720 DURATION:PT1H00M
1721 LOCATION:Saal 6
1722 SEQUENCE:0
1723 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5208.en.html
1724 DTSTART;TZID=Europe/Berlin:20121227T160000
1725 UID:5208@29C3@pentabarf.org
1726 DTSTAMP:20121226T143018
1727 CATEGORIES:Lecture
1728 DESCRIPTION:Accessibility of digital content is a hugely misunderstood issu
1729 e. Programmers and content developers tend to view it as a distraction or a
1730 special interest concern. Accessibility advocates fail to describe it in t
1731 erms that would put it in the proper place for other technologists\, in par
1732 ticular security practitioners.
1733 We argue that if a format or a document has
1734 systemic accessibility problems\, then accessibility is likely to be the l
1735 east of its problems\; that accessibility only collapses first\, like a can
1736 ary in a mine\, and security is next to follow. We argue that many accessib
1737 ility problems\, just like many security problems\, stem from documents bei
1738 ng hard to parse or containing executable content\, and that the accessibil
1739 ity community is only the first to suffer\, due to not having the manpower
1740 to make extremely complicated formats to almost work almost always. It's an
1741 arms race tougher than the security patching cycle\, made worse by there b
1742 eing no common model for what accessibility properties should look like.
1743 SUMMARY:What accessibility has to do with security
1744 STATUS:CONFIRMED
1745 END:VEVENT
1746 BEGIN:VEVENT
1747 DURATION:PT1H00M
1748 LOCATION:Saal 6
1749 SEQUENCE:0
1750 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5283.en.html
1751 DTSTART;TZID=Europe/Berlin:20121227T203000
1752 UID:5283@29C3@pentabarf.org
1753 DTSTAMP:20121226T143018
1754 CATEGORIES:Lecture
1755 DESCRIPTION:After the political and legislative failure of the blocking and
1756 filtering proposals in Germany (#Zensursula) and the EU (Child Protection
1757 Directive) several players stepped up to implement the measures that previo
1758 usly have been envisioned as compulsory but now on a "self-regulatory" basi
1759 s.
1760 SUMMARY:White IT\, Clean IT & CEO Coalition - How the government tries to e
1761 ncourage privatized policy inforcement and thereby bypasses and circumvents
1762 democratic processes
1763 STATUS:CONFIRMED
1764 END:VEVENT
1765 BEGIN:VEVENT
1766 DURATION:PT1H00M
1767 LOCATION:Saal 1
1768 SEQUENCE:0
1769 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5327.en.html
1770 DTSTART;TZID=Europe/Berlin:20121229T171500
1771 UID:5327@29C3@pentabarf.org
1772 DTSTAMP:20121226T143018
1773 CATEGORIES:Lecture
1774 DESCRIPTION:This action-packed lecture presents the inner workings of the a
1775 uthor's from-scratch implementation of a USB Mass Storage disk in user-land
1776 Python\, along with some embarrassing bugs in operating systems that suppo
1777 rt such disks. The lecture concludes with an introduction to Active Antifo
1778 rensics\, in which a thumbdrive's own firmware can recognize and defend its
1779 elf against disk imaging and other forensic tools.
1780 SUMMARY:Writing a Thumbdrive from Scratch - Prototyping Active Disk Antifor
1781 ensics
1782 STATUS:CONFIRMED
1783 END:VEVENT
1784 BEGIN:VEVENT
1785 DURATION:PT1H00M
1786 LOCATION:Saal 1
1787 SEQUENCE:0
1788 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5262.en.html
1789 DTSTART;TZID=Europe/Berlin:20121227T140000
1790 UID:5262@29C3@pentabarf.org
1791 DTSTAMP:20121226T143018
1792 CATEGORIES:Lecture
1793 DESCRIPTION:Seit anderthalb Jahren begleitet FragDenStaat.de die deutsche I
1794 nformationsfreiheit in der Praxis und dokumentiert die Korrespondenz zwisch
1795 en Anfragestellenden und Behörden. Welche Informationen gibt der Staat prei
1796 s\, und gegen welche Veröffentlichungen kämpft er sogar bis vor Gericht? Di
1797 e interessantesten Fälle werden genauer beleuchtet und eine Bewertung zur L
1798 age der staatlichen Information in Deutschland abgegeben.
1799 SUMMARY:Zur Lage der Information - 1.5 Jahre FragDenStaat.de
1800 STATUS:CONFIRMED
1801 END:VEVENT
1802 END:VCALENDAR