schedule.en.produced.ics - libical - A simple ical library.
(HTM) git clone git://r-36.net/libical
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
schedule.en.produced.ics (78013B)
---
1 BEGIN:VCALENDAR
2 VERSION:2.0
3 CALSCALE:GREGORIAN
4 PRODID:-//Pentabarf//Schedule//EN
5 BEGIN:VEVENT
6 DURATION:PT1H00M
7 LOCATION:Saal 1
8 SEQUENCE:0
9 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5333.en.html
10 DTSTART;TZID=Europe/Berlin:20121230T124500
11 UID:5333@29C3@pentabarf.org
12 DTSTAMP:20121226T143018
13 CATEGORIES:Lecture
14 DESCRIPTION:Did you notice 262 42 in your mobile phone network search lis
15 t at the last CCC events? Did you and your friends buy SIM cards at the
16 PoC and help test the network by calling each other\, or by calling thro
17 ugh the bridge to the DECT network services? Did you ever wonder about t
18 he details of this open source test network\, set up by a team of volunt
19 eers in the middle of the city? We would like to tell you all the detail
20 s of the cell phone network we operate at 29C3\, and show you some fancy
21 graphs based on the network activity!
22 SUMMARY:29C3 GSM: Cell phone network review - 262 42 - The full spectrum
23 STATUS:CONFIRMED
24 END:VEVENT
25 BEGIN:VEVENT
26 DURATION:PT1H00M
27 LOCATION:Saal 1
28 SEQUENCE:0
29 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5205.en.html
30 DTSTART;TZID=Europe/Berlin:20121229T140000
31 UID:5205@29C3@pentabarf.org
32 DTSTAMP:20121226T143018
33 CATEGORIES:Lecture
34 DESCRIPTION:There are hundreds\, if not thousands\, of news articles and
35 blog posts about the BlackHole Exploit Kit. Usually\, each story covers
36 only a very narrow part of the subject matter. This talk will summarize
37 the history of the BlackHole Exploit Kit into one easy to follow story.
38 There will be diagrams and flow-charts for explaining code\, rather than
39 a giant blob of illegible Javascript\, PHP\, or x86 Assembly.
40 SUMMARY:Analytical Summary of the BlackHole Exploit Kit - Almost Everythi
41 ng You Ever Wanted To Know About The BlackHole Exploit Kit stor!
42 STATUS:CONFIRMED
43 END:VEVENT
44 BEGIN:VEVENT
45 DURATION:PT1H00M
46 LOCATION:Saal 6
47 SEQUENCE:0
48 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5146.en.html
49 DTSTART;TZID=Europe/Berlin:20121229T160000
50 UID:5146@29C3@pentabarf.org
51 DTSTAMP:20121226T143018
52 CATEGORIES:Lecture
53 DESCRIPTION:There's about 100 top-level domains signed with DNSSEC and .n
54 l recently hit 1M second-level domains. At this occasion\, we take a loo
55 k at the goods and the bads of DNSSEC deployment\, including amplificati
56 on attacks\, Zensursula-like DNS redirects\, China DNS injection and NAS
57 A key rollover mistakes. We will find out what DNSCurve and Namecoin pro
58 mise to make better and what Zooko's triangle has all to do with this.
59 SUMMARY:An Overview of Secure Name Resolution - DNSSEC\, DNSCurve and Nam
60 ecoin
61 STATUS:CONFIRMED
62 END:VEVENT
63 BEGIN:VEVENT
64 DURATION:PT1H00M
65 LOCATION:Saal 6
66 SEQUENCE:0
67 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5237.en.html
68 DTSTART;TZID=Europe/Berlin:20121229T203000
69 UID:5237@29C3@pentabarf.org
70 DTSTAMP:20121226T143018
71 CATEGORIES:Lecture
72 DESCRIPTION:With Visa and Mastercard pushing for EMV (http://www.emvco.co
73 m\, aka “chip and pin”) rollout in the United States\, the uptake of
74 contactless payment and the use of mobile NFC wallets\, the chipcard se
75 curity community will soon be getting more eyes to analyze the protocols
76 in use with chip and contactless credit card transactions.
77 SUMMARY:A Rambling Walk Through an EMV Transaction
78 STATUS:CONFIRMED
79 END:VEVENT
80 BEGIN:VEVENT
81 DURATION:PT1H00M
82 LOCATION:Saal 1
83 SEQUENCE:0
84 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5299.en.html
85 DTSTART;TZID=Europe/Berlin:20121230T113000
86 UID:5299@29C3@pentabarf.org
87 DTSTAMP:20121226T143018
88 CATEGORIES:Lecture
89 DESCRIPTION:Verfassungsschutzskandale gibt es nicht erst seit der Entdeck
90 ung des NSU vor einem Jahr. Vorgestellt werden: sie Affaire Traube\, der
91 Schmücker-Prozess\, das Celler Loch\, die Vulkan-Affaire\, der Anschla
92 gsversuch auf das Jüdische Gemeindehaus West-Berlin\, vier Jahrzehnte B
93 eobachtung von Rolf Gössner. Vielleicht sind aber gar nicht die Pannen
94 der Skandal\, sondern vielmehr der ganz gewöhnliche Alltag des Verfassu
95 ngsschutzes.
96 SUMMARY:Best of ... Verfassungsschutz - Der Verfassungsschutz schützt di
97 e Verfassung so wie Zitronenfalter Zitronen falten. Affaire Tra!
98 STATUS:CONFIRMED
99 END:VEVENT
100 BEGIN:VEVENT
101 DURATION:PT2H15M
102 LOCATION:Saal 1
103 SEQUENCE:0
104 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5379.en.html
105 DTSTART;TZID=Europe/Berlin:20121229T113000
106 UID:5379@29C3@pentabarf.org
107 DTSTAMP:20121226T143018
108 CATEGORIES:Lecture
109 DESCRIPTION:Wir schauen nicht zurück im Zorn\, aber jetzt auch nicht gra
110 de mit Euphorie. Im CCC-Jahresrückblick präsentieren wir Euch einige d
111 er hacktivistischen Themen des vergangenen Jahres\, an denen der CCC gea
112 rbeitet oder sich abgearbeitet hat. Diesmal mit schönen neuen Gesetzen\
113 , Hacker-Humor\, versäumten Gerichtsterminen\, bunten Blinkenlichtern u
114 nd Iggy Pop. Wir haben uns wirklich das ganze Jahr bemüht\, nur in begr
115 enztem Umfange zu prokrastinieren.
116 SUMMARY:CCC-Jahresrückblick
117 STATUS:CONFIRMED
118 END:VEVENT
119 BEGIN:VEVENT
120 DURATION:PT1H00M
121 LOCATION:Saal 1
122 SEQUENCE:0
123 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5319.en.html
124 DTSTART;TZID=Europe/Berlin:20121228T124500
125 UID:5319@29C3@pentabarf.org
126 DTSTAMP:20121226T143018
127 CATEGORIES:Lecture
128 DESCRIPTION:Hypertext Transfer Protocol Secure (HTTPS) has evolved into t
129 he de facto standard for secure web browsing. But in the security commun
130 ity\, it has long been known that HTTPS is fundamentally broken\, and th
131 is has been confirmed by alarming hacks and security breaches at several
132 Certificate Authorities (CAs). To tackle the global collapse of trust i
133 n these central mediators of HTTPS communications and to augment HTTPS s
134 ecurity\, the EU has launched a proposal for strict regulation. Will the
135 se efforts succeed?
136 SUMMARY:Certificate Authority Collapse - Will the EU Succeed in Regulatin
137 g HTTPS?
138 STATUS:CONFIRMED
139 END:VEVENT
140 BEGIN:VEVENT
141 DURATION:PT1H00M
142 LOCATION:Saal 6
143 SEQUENCE:0
144 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5263.en.html
145 DTSTART;TZID=Europe/Berlin:20121230T171500
146 UID:5263@29C3@pentabarf.org
147 DTSTAMP:20121226T143018
148 CATEGORIES:Lecture
149 DESCRIPTION:Wir brauchen ein maschinenlesbares und -schreibbares Gesetzge
150 bungsverfahren\, in dem jede Änderung transparent diskutiert und beschl
151 ossen wird. Der Bundestag öffnet und digitalisiert sich eher langsam un
152 d widerwillig\, dennoch kann man schon heute anfangen\, die Werkzeuge de
153 r parlamentarischen Zukunft in Deutschland zu gestalten und auszuprobier
154 en. Dazu stellen wir die Projekte OffenesParlament.de und das Bundes-Git
155 vor und zeigen\, wie es in Zukunft weitergehen könnte.
156 SUMMARY:chmod o+rw bundestag - Mehr Transparenz und Teilhabe im Gesetzgeb
157 ungsprozess
158 STATUS:CONFIRMED
159 END:VEVENT
160 BEGIN:VEVENT
161 DURATION:PT1H00M
162 LOCATION:Saal 1
163 SEQUENCE:0
164 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5398.en.html
165 DTSTART;TZID=Europe/Berlin:20121230T183000
166 UID:5398@29C3@pentabarf.org
167 DTSTAMP:20121226T143018
168 CATEGORIES:Lecture
169 DESCRIPTION:Some facts and stats about Congress\, plus stories and legend
170 s.
171 SUMMARY:Closing Event
172 STATUS:CONFIRMED
173 END:VEVENT
174 BEGIN:VEVENT
175 DURATION:PT1H00M
176 LOCATION:Saal 6
177 SEQUENCE:0
178 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5221.en.html
179 DTSTART;TZID=Europe/Berlin:20121227T140000
180 UID:5221@29C3@pentabarf.org
181 DTSTAMP:20121226T143018
182 CATEGORIES:Lecture
183 DESCRIPTION:Wir sind Zeugen eines seit einigen Jahren stattfindenden Wett
184 rüstens im Cyberspace. Immer mehr Staaten bauen militärische Cyberware
185 Einheiten auf\, die aus IT Spezialisten bestehen und dem Zweck dienen
186 \, bestenfalls IT Systeme abzusichern oder schlechterdings Systeme von
187 „Feinden“ anzugreifen.
188 SUMMARY:Cyberpeace statt Cyberwar
189 STATUS:CONFIRMED
190 END:VEVENT
191 BEGIN:VEVENT
192 DURATION:PT1H00M
193 LOCATION:Saal 4
194 SEQUENCE:0
195 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5301.en.html
196 DTSTART;TZID=Europe/Berlin:20121228T203000
197 UID:5301@29C3@pentabarf.org
198 DTSTAMP:20121226T143018
199 CATEGORIES:Lecture
200 DESCRIPTION:Aside from further development of traditional forensic techni
201 ques which involve post-mortem hard disk analysis\, in the last couple o
202 f years the field of computer forensics has been marked by significant d
203 evelopment of live forensic techniques and tools.Memory forensics is com
204 posed of two main activities: memory aquisition/capture and analysis. Th
205 is presentation will give an overview of the memory acquisition and anal
206 ysis techniques and tools on the Windows operating systems. The main par
207 t of the presentation will cover current exploitation techniques and met
208 hods for defeating bothq acquisition and analysis phase of the memory f
209 orensics\, as well as present a new approach for hiding specific artifac
210 ts from forensic tools. Based on the covered exploitation techniques\, s
211 ome suggestions and improvements of the current tools will be given.
212 SUMMARY:Defeating Windows memory forensics
213 STATUS:CONFIRMED
214 END:VEVENT
215 BEGIN:VEVENT
216 DURATION:PT1H00M
217 LOCATION:Saal 4
218 SEQUENCE:0
219 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5159.en.html
220 DTSTART;TZID=Europe/Berlin:20121227T203000
221 UID:5159@29C3@pentabarf.org
222 DTSTAMP:20121226T143018
223 CATEGORIES:Lecture
224 DESCRIPTION:Over the years we learned impressively how to oppose bad legi
225 slation hurting our freedoms online. We are now facing an even bigger ch
226 allenge: how to guarantee that a Free\, open\, decentralized Internet wi
227 ll be protected in the long run? In 2012 The Internetz won major battles
228 against SOPA/PIPA in the US\, and against ACTA in the EU. Yet\, we know
229 that the powerful industries and governments behind these projects will
230 never stop. They have an incentive to gain control of the Internet\, at
231 tacking fundamental rights and promoting technologies like "Deep Packet
232 Inspection"\, now being deployed in each and every corner of the Net\,
233 and used indifferently to break Net neutrality\, to filter\, block and
234 censor communications or to inspect citizens traffic.How to push for pro
235 posals that will ensure that the sharing of knowledge and culture\, citi
236 zens freedoms\, and access to an open infrastructure will be guaranteed
237 in the future public policies? How to become as successful in propositio
238 n as we are now in opposition?(Hint: it's political\, stupid!)
239 SUMMARY:Defend your Freedoms Online: It's Political\, Stupid! - A Positiv
240 e agenda against the next ACTA\, SOPA\, and suchfacing an even !
241 STATUS:CONFIRMED
242 END:VEVENT
243 BEGIN:VEVENT
244 DURATION:PT1H00M
245 LOCATION:Saal 1
246 SEQUENCE:0
247 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5401.en.html
248 DTSTART;TZID=Europe/Berlin:20121228T171500
249 UID:5401@29C3@pentabarf.org
250 DTSTAMP:20121226T143018
251 CATEGORIES:Lecture
252 DESCRIPTION:Die Debatte um die Tarifreform der GEMA war eines der großen
253 Themen des Jahres 2012: Die Verwertungsgesellschaft geriet quer durch a
254 lle politischen Lager und gesellschaftlichen Schichten in die Kritik\, d
255 ie Warnungen vor einem großen Clubsterben wurden von Tausenden auf die
256 Straße getragen. Dies steigerte auch das Interesse an der »Cultural Co
257 mmons Collecting Society« (C3S)\, einem Graswurzelprojekt zur Gründung
258 einer neuen\, modernen1 und internetverstehenden Verwertungsgesellscha
259 ft\, die u. a. auch vollen Support für Creative-Commons-Lizenzen bieten
260 soll. 2012 war daher auch ein ereignisreiches Jahr für dieses Projekt\
261 , und 2013 sollen nach Plan die Gründung als Europäische Genossenschaf
262 t und die Antragsstellung beim Deutschen Patent- und Markenamt folgen.
263 SUMMARY:Der Mord fällt aus - Ein Werkstattbericht der GEMA-Alternative C
264 3S
265 STATUS:CONFIRMED
266 END:VEVENT
267 BEGIN:VEVENT
268 DURATION:PT1H00M
269 LOCATION:Saal 1
270 SEQUENCE:0
271 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5382.en.html
272 DTSTART;TZID=Europe/Berlin:20121227T160000
273 UID:5382@29C3@pentabarf.org
274 DTSTAMP:20121226T143018
275 CATEGORIES:Lecture
276 DESCRIPTION:Am 6. November 2012 war der CCC vor dem Bundesverfassungsgeri
277 cht zur Anhörung über die Antiterrordatei und die Grenzen polizeiliche
278 r Datenverarbeitung geladen. Wir berichten über die Anhörung\, die d
279 ort vorgebrachten Argumente und die technische Konzeption der ATD. Und w
280 ir orakeln über ein mögliches Urteil im nächsten Jahr.
281 SUMMARY:Die Antiterrordatei
282 STATUS:CONFIRMED
283 END:VEVENT
284 BEGIN:VEVENT
285 DURATION:PT1H00M
286 LOCATION:Saal 1
287 SEQUENCE:0
288 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5181.en.html
289 DTSTART;TZID=Europe/Berlin:20121227T124500
290 UID:5181@29C3@pentabarf.org
291 DTSTAMP:20121226T143018
292 CATEGORIES:Lecture
293 DESCRIPTION:In den vergangenen Jahren wurde vor allem die Sprache von Pol
294 itikern auf dem Congress beleuchtet. Aber die schwurbelnde Politiker sin
295 d noch nicht die ganze Wahrheit. Wir möchten das Ganze daher um den zwe
296 iten wichtigen Mitspieler bei der Konstruktion von Realität ergänzen\,
297 um die Presse bzw. die Medien. Die Äußerungen von Politikern (zum Bei
298 spiel auf Pressekonferenzen) sollen dabei der Mediendarstellung gegenüb
299 ergestellt werden. Dabe}i wird deutlich werden\, dass es zwischen Polit
300 ikern und Medien Rückkopplungseffekte gibt.
301 SUMMARY:Die Wahrheit\, was wirklich passierte und was in der Zeitung stan
302 d - Wie Medien unsere Wahrnehmung beeinflussens!
303 STATUS:CONFIRMED
304 END:VEVENT
305 BEGIN:VEVENT
306 DURATION:PT2H15M
307 LOCATION:Saal 1
308 SEQUENCE:0
309 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html
310 DTSTART;TZID=Europe/Berlin:20121227T203000
311 UID:5338@29C3@pentabarf.org
312 DTSTAMP:20121226T143018
313 CATEGORIES:Lecture
314 DESCRIPTION:With the post 9/11 rise of the leviathan national security st
315 ate\, the rule of law in the United States under the Constitution is inc
316 reasingly rule by secrecy\, surveillance and executive fiat.
317 SUMMARY:Enemies of the State: What Happens When Telling the Truth about S
318 ecret US Government Power Becomes a Crime - Blowing the Whistle on Spyin
319 g\, LngAying & Illegalities in the Digital Eraxecutive fiat.
320 STATUS:CONFIRMED
321 END:VEVENT
322 BEGIN:VEVENT
323 DURATION:PT1H00M
324 LOCATION:Saal 4
325 SEQUENCE:0
326 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5104.en.html
327 DTSTART;TZID=Europe/Berlin:20121228T230000
328 UID:5104@29C3@pentabarf.org
329 DTSTAMP:20121226T143018
330 CATEGORIES:Lecture
331 DESCRIPTION:This presentation will cover a demonstration of the new versi
332 on of the Canape protocol analysis tool being released for Ruxcon. Durin
333 g the course of the presentation various attack scenarios against the VM
334 Ware ESXi binary protocol will be demonstrated using Canape.
335 SUMMARY:ESXi Beast - Exploiting VMWARE ESXi Binary Protocols Using CANAPE
336 STATUS:CONFIRMED
337 END:VEVENT
338 BEGIN:VEVENT
339 DURATION:PT0H30M
340 LOCATION:Saal 6
341 SEQUENCE:0
342 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5077.en.html
343 DTSTART;TZID=Europe/Berlin:20121229T131500
344 UID:5077@29C3@pentabarf.org
345 DTSTAMP:20121226T143018
346 CATEGORIES:Lecture
347 DESCRIPTION:Recently\, several research papers in the area of computer se
348 curity were published that may or may not be considered unethical. Looki
349 ng at these borderline cases is relevant as today’s research papers wi
350 ll influence how young researchers conduct their research. In our talk w
351 e address various cases and papers and highlight emerging issues for eth
352 ic committees\, internal review boards (IRBs) and senior researchers to
353 evaluate research proposals and to finally decide where they see a line
354 that should not be crossed.
355 SUMMARY:Ethics in Security Research
356 STATUS:CONFIRMED
357 END:VEVENT
358 BEGIN:VEVENT
359 DURATION:PT1H00M
360 LOCATION:Saal 6
361 SEQUENCE:0
362 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5085.en.html
363 DTSTART;TZID=Europe/Berlin:20121228T113000
364 UID:5085@29C3@pentabarf.org
365 DTSTAMP:20121226T143018
366 CATEGORIES:Lecture
367 DESCRIPTION:We know\, that cooking is an art. Selecting the ingredients\,
368 carefully washing\, pealingand cutting them before you put them into th
369 e right dish at the right time with the right heat.Watching the food cha
370 nge his color\, form and consistency\, seasoning it to develop it'sflavo
371 rs and serving it on beautiful plates is a pleasure.For some\, but not
372 for all.Those who love cooking can spend hours at the stove andrelax whi
373 le preparing delicious meals. For others cooking is pure stress. What is
374 the difference between orange and yellowcarrots? Did I forget something
375 ? Is the pan hot enoughq_? Or too hot? How long after thepasta do I star
376 t cooking the steak? Will it be healthy? Is it sustainable?So many quest
377 ionsappear if one starts to think about food. The answers are complicate
378 dand ambiguous. They require research and analyzing. Many have stopped t
379 hinkingabout food. They just believe what is written on thepackage.I can
380 't cookis such an easy answer. And it is accepted in our society. Nobody
381 isashamed of it. This gives more and more control tomultinational corpo
382 rations. Through precookedfood and shiny commercials they calm our consc
383 ience and stimulate our laziness.The consequences are dramatic!The profi
384 t-focused approach of multinationalcorporations have led to things like:
385 • Patented genetically modified seeds. Lawyers suing farmers for copyr
386 ights.• Destruction of South-American jungle to make soya to feed Euro
387 pean cows so theymake more milk. Although a cow as never born to eat pro
388 teins.• Chickens that can't stand on their own feet due to the weight
389 of their breasts. Theywill never see soil\, worms or even sunlight.• O
390 ran-Utangs losing their homes for palm oil• Vegetables getting grown i
391 n the desert\, wasting huge amounts of drinking water.Conclusions:• We
392 must know more about our food• We have to cook more ourselves• So w
393 e will recover some control over what we eat
394 SUMMARY:EveryCook - Cooking gets digital
395 STATUS:CONFIRMED
396 END:VEVENT
397 BEGIN:VEVENT
398 DURATION:PT1H00M
399 LOCATION:Saal 1
400 SEQUENCE:0
401 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html
402 DTSTART;TZID=Europe/Berlin:20121228T183000
403 UID:5275@29C3@pentabarf.org
404 DTSTAMP:20121226T143018
405 CATEGORIES:Lecture
406 DESCRIPTION:RSA is the dominant public-key cryptosystem on the Internet.
407 This talk will explain the state of the art in techniques for the attack
408 er toh- figure out your secret RSA keys.d European co1
409 SUMMARY:FactHacks - RSA factorization in the real world
410 STATUS:CONFIRMED
411 END:VEVENT
412 BEGIN:VEVENT
413 DURATION:PT1H00M
414 LOCATION:Saal 1
415 SEQUENCE:0
416 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5198.en.html
417 DTSTART;TZID=Europe/Berlin:20121229T230000
418 UID:5198@29C3@pentabarf.org
419 DTSTAMP:20121226T143018
420 CATEGORIES:Lecture
421 DESCRIPTION:Neues Jahr\, neue Fnords :-)
422 SUMMARY:Fnord-Jahresrückblick - Diesmal mit noch mehr Eurozonen-Spaltung
423 !
424 STATUS:CONFIRMED
425 END:VEVENT
426 BEGIN:VEVENT
427 DURATION:PT1H00M
428 LOCATION:Saal 1
429 SEQUENCE:0
430 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5226.en.html
431 DTSTART;TZID=Europe/Berlin:20121229T214500
432 UID:5226@29C3@pentabarf.org
433 DTSTAMP:20121226T143018
434 CATEGORIES:Lecture
435 DESCRIPTION:The calypso baseband and its companion chips are used on the
436 Motorola C123 among other and are now well known for being supported by
437 the Osmocom-BB open source GSM baseband implementation. A couple years a
438 go\, it was hacked a little further by using it as a raw bits capture de
439 vice allowing the interception of GSM traffic very cheaply.
440 SUMMARY:Further hacks on the Calypso platform - or how to turn a phone in
441 to a BTSience a1
442 STATUS:CONFIRMED
443 END:VEVENT
444 BEGIN:VEVENT
445 DURATION:PT2H00M
446 LOCATION:Saal 4
447 SEQUENCE:0
448 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5250.en.html
449 DTSTART;TZID=Europe/Berlin:20121228T001500
450 UID:5250@29C3@pentabarf.org
451 DTSTAMP:20121226T143018
452 CATEGORIES:Lecture
453 DESCRIPTION:Beim Googlequiz treten Teams gegeneinander an\, die *ohne Int
454 ernet* Aufgaben zu Googlesuchen und Suchergebnissen raten.
455 SUMMARY:Googlequiz - Wie man (spaßorientiert) mehr als 5% seines Googlev
456 ermögens trainiertGooglesuchen!
457 STATUS:CONFIRMED
458 END:VEVENT
459 BEGIN:VEVENT
460 DURATION:PT2H00M
461 LOCATION:Saal 1
462 SEQUENCE:0
463 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5309.en.html
464 DTSTART;TZID=Europe/Berlin:20121228T230000
465 UID:5309@29C3@pentabarf.org
466 DTSTAMP:20121226T143018
467 CATEGORIES:Lecture
468 DESCRIPTION:
469 SUMMARY:Hacker Jeopardy - Zahlenraten für Geeks
470 STATUS:CONFIRMED
471 END:VEVENT
472 BEGIN:VEVENT
473 DURATION:PT1H00M
474 LOCATION:Saal 1
475 SEQUENCE:0
476 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5024.en.html
477 DTSTART;TZID=Europe/Berlin:20121228T203000
478 UID:5024@29C3@pentabarf.org
479 DTSTAMP:20121226T143018
480 CATEGORIES:Lecture
481 DESCRIPTION:Hackers are a high-risk population. This talk will provide ha
482 ckers with tools to reduce the risk to themselves and their communities
483 using harm reduction methodology.
484 SUMMARY:Hackers As A High-Risk Population - Harm Reduction Methodology
485 STATUS:CONFIRMED
486 END:VEVENT
487 BEGIN:VEVENT
488 DURATION:PT1H00M
489 LOCATION:Saal 1
490 SEQUENCE:0
491 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html
492 DTSTART;TZID=Europe/Berlin:20121227T230000
493 UID:5400@29C3@pentabarf.org
494 DTSTAMP:20121226T143018
495 CATEGORIES:Lecture
496 DESCRIPTION:We discuss a set of 0-day kernel vulnerabilities in CNU (Cisc
497 o NativeUnix)\, the operating system that powers all Cisco TNP IP phones
498 . Wedemonstrate the reliable exploitation of all Cisco TNP phones viamul
499 tiple vulnerabilities found in the CNU kernel. We demonstratepractical c
500 overt surveillance using constant\, stealthy exfiltration ofmicrophone d
501 ata via a number of covert channels. We also demonstrate theworm-like pr
502 opagation of our CNU malware\, which can quickly compromiseall vulnerabl
503 e Cisco phones on the network. We discuss the feasibilityof our attacks
504 given physical access\,A- internal network access and remoteaccess acros
505 s the internet. Lastly\, we built on last year's presentationby discussi
506 ng the feasibility of exploiting Cisco phones fromcompromised HP printer
507 s and vice versa.
508 SUMMARY:Hacking Cisco Phones - Just because you are paranoid doesn't mean
509 your phone isn't listening to everything you sayall Cisco TNP !
510 STATUS:CONFIRMED
511 END:VEVENT
512 BEGIN:VEVENT
513 DURATION:PT1H00M
514 LOCATION:Saal 6
515 SEQUENCE:0
516 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5179.en.html
517 DTSTART;TZID=Europe/Berlin:20121229T183000
518 UID:5179@29C3@pentabarf.org
519 DTSTAMP:20121226T143018
520 CATEGORIES:Lecture
521 DESCRIPTION:Wir sehen in der digitalen Technik großes Potential zur Demo
522 kratisierung und Befreiung der Menschen. Doch machen wir uns nichts vor.
523 Technik kann genausogut der Entmündigung von Menschen dienen. Je kompl
524 exer sie wird\, desto mehr sind wir von Vereinfachung abhängig und dest
525 o weniger Einfluss können wir selber auf die Technik nehmen.
526 SUMMARY:Hacking Philosophy - Digitale Mündigkeit\, Technikpaternalismus
527 und warum wir Netzphilosophie brauchenn. Doch m!
528 STATUS:CONFIRMED
529 END:VEVENT
530 BEGIN:VEVENT
531 DURATION:PT1H00M
532 LOCATION:Saal 4
533 SEQUENCE:0
534 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5270.en.html
535 DTSTART;TZID=Europe/Berlin:20121229T001500
536 UID:5270@29C3@pentabarf.org
537 DTSTAMP:20121226T143018
538 CATEGORIES:Lecture
539 DESCRIPTION:This is fun stuff for the late night program\, not a serious
540 talk.Is it possible to read sb. others mind? In the late 1920ies/early 1
541 930ies Berlin was excited by the famous mindreader and fortune teller Er
542 ik Jan Hanussen who performed his strange abilities on stage. His act wa
543 s so convincing that leading nazis beleaved in his powers and wanted him
544 for advice - until they decided to murder him.
545 SUMMARY:Hanussen's mindreading - Experiment's of the historical psychic
546 STATUS:CONFIRMED
547 END:VEVENT
548 BEGIN:VEVENT
549 DURATION:PT1H00M
550 LOCATION:Saal 4
551 SEQUENCE:0
552 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html
553 DTSTART;TZID=Europe/Berlin:20121229T214500
554 UID:5152@29C3@pentabarf.org
555 DTSTAMP:20121226T143018
556 CATEGORIES:Lecture
557 DESCRIPTION:At 28C3\, Klink and Waelde showed that a number of technologi
558 es (PHP\, ASP.NET\,Ruby\, Java\, Python\, etc.) were vulnerable to the d
559 ecade-old hash-flooding DoSattacks. The vulnerability was then often fix
560 ed by adopting stronger hashfunctions and "randomizing" them.
561 SUMMARY:Hash-flooding DoS reloaded: attacks and defenses
562 STATUS:CONFIRMED
563 END:VEVENT
564 BEGIN:VEVENT
565 DURATION:PT1H00M
566 LOCATION:Saal 1
567 SEQUENCE:0
568 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5287.en.html
569 DTSTART;TZID=Europe/Berlin:20121227T183000
570 UID:5287@29C3@pentabarf.org
571 DTSTAMP:20121226T143018
572 CATEGORIES:Lecture
573 DESCRIPTION:NSU-Untersuchungsausschuss in Thüringen und NSU-Untersuchung
574 sausschuss des Bundestages\, über die Mordserie des NSU\, das System de
575 r V-Leute und die Rolle des Verfassungsschutzes.Zwölf Jahre lang konn
576 te der „Natio1nalsozialistische Untergrund“ (NSU) unerkannt in Deut
577 schland eine rassistische Mordserie an neun migrantischen Gewerbetreiben
578 den\, zwei Bombenanschläge mit mehr als zwanzig Verletzten\, den Mord a
579 n einer jungen Polizistin sowie ein Dutzend Banküberfälle verüben.
580 SUMMARY:Hinter den Kulissen: Der NSU und das V-Leute-System
581 STATUS:CONFIRMED
582 END:VEVENT
583 BEGIN:VEVENT
584 DURATION:PT1H00M
585 LOCATION:Saal 6
586 SEQUENCE:0
587 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5219.en.html
588 DTSTART;TZID=Europe/Berlin:20121228T203000
589 UID:5219@29C3@pentabarf.org
590 DTSTAMP:20121226T143018
591 CATEGORIES:Lecture
592 DESCRIPTION:An approach to the problem of fuzzing proprietary protocols w
593 ill be shown\, focusing on network protocols and native software. In the
594 course of this talk I will combine several methods in order to force th
595 e client software to work as a “double agent” against the server.
596 SUMMARY:"How I met your pointer" - Hijacking client software for fuzz and
597 profitSience a1
598 STATUS:CONFIRMED
599 END:VEVENT
600 BEGIN:VEVENT
601 DURATION:PT1H00M
602 LOCATION:Saal 4
603 SEQUENCE:0
604 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5395.en.html
605 DTSTART;TZID=Europe/Berlin:20121227T140000
606 UID:5395@29C3@pentabarf.org
607 DTSTAMP:20121226T143018
608 CATEGORIES:Lecture
609 DESCRIPTION:Legal systems have a huge impact on what we do as hackers\, b
610 ut also on internet users in general. Laws can restrict our freedom to u
611 se the internet in ways we deem to be natural and it can impede the tool
612 s which we hackers use on a daily basis. Which is not to say that laws c
613 annot also protect our freedom and ensure that all bits are treated equa
614 lly. Most importantly\, these laws can be hacked and tweaked to fit our
615 needs - like most things in this world.1
616 SUMMARY:HOWTO Hack the law
617 STATUS:CONFIRMED
618 END:VEVENT
619 BEGIN:VEVENT
620 DURATION:PT1H00M
621 LOCATION:Saal 6
622 SEQUENCE:0
623 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5368.en.html
624 DTSTART;TZID=Europe/Berlin:20121229T113000
625 UID:5368@29C3@pentabarf.org
626 DTSTAMP:20121226T143018
627 CATEGORIES:Lecture
628 DESCRIPTION:Sechs Jahre nach seinem Inkrafttreten wurde das Informationsf
629 reiheitsgesetz (IFG) des Bundes für den Deutschen Bundestag evaluiert.
630 Auch aus einzelnen Bundesländern liegen zwischenzeitlich wissenschaftli
631 ch untermauerte Erkenntnisse zum Stand oder Nichtstand der Informationsf
632 reiheit in Deutschland vor.
633 SUMMARY:IFG: Chance oder Bürgerbluff? - Informationsfreiheit in Deutschl
634 and. Ein Sachstand.) des Bundes!
635 STATUS:CONFIRMED
636 END:VEVENT
637 BEGIN:VEVENT
638 DURATION:PT1H00M
639 LOCATION:Saal 6
640 SEQUENCE:0
641 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5397.en.html
642 DTSTART;TZID=Europe/Berlin:20121227T183000
643 UID:5397@29C3@pentabarf.org
644 DTSTAMP:20121226T143018
645 CATEGORIES:Lecture
646 DESCRIPTION:INFECT: "Bei der Forschung an unserem neuen Killervirus hat u
647 nsere Ethikkommission penibelst darauf geachtet\, dass niemand der Forsc
648 her sich ansteckt."
649 SUMMARY:INDECT\, Verhaltenserkennung & Co - automatisierte staatliche Ver
650 dächtigung
651 STATUS:CONFIRMED
652 END:VEVENT
653 BEGIN:VEVENT
654 DURATION:PT1H00M
655 LOCATION:Saal 6
656 SEQUENCE:0
657 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5112.en.html
658 DTSTART;TZID=Europe/Berlin:20121227T124500
659 UID:5112@29C3@pentabarf.org
660 DTSTAMP:20121226T143018
661 CATEGORIES:Lecture
662 DESCRIPTION:This talk is aimed to give an insight into CPE WAN Management
663 Protocol (CWMP) and its GPLv2 implementations that were developed in th
664 e past year.
665 SUMMARY:ISP's black box - provisioning behind the scenes
666 STATUS:CONFIRMED
667 END:VEVENT
668 BEGIN:VEVENT
669 DURATION:PT1H00M
670 LOCATION:Saal 4
671 SEQUENCE:0
672 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html
673 DTSTART;TZID=Europe/Berlin:20121228T214500
674 UID:5216@29C3@pentabarf.org
675 DTSTAMP:20121226T143018
676 CATEGORIES:Lecture
677 DESCRIPTION:In the last years\, mobile security and specifically GSM has
678 been attacked in many different ways. It was demonstrated how to sniff a
679 nd crack traffic\, how to impersonate a subscriber by placing a fake cal
680 l and the general security characteristics of this mobile protocol stack
681 have been evaluated.In this presentation\, we will check out a part of
682 the protocol procedures that hasn't been looked at yet\, specifically Mo
683 bile Terminated services.
684 SUMMARY:Let Me Answer That for You - adventures in mobile paging
685 STATUS:CONFIRMED
686 END:VEVENT
687 BEGIN:VEVENT
688 DURATION:PT2H15M
689 LOCATION:Saal 4
690 SEQUENCE:0
691 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5316.en.html
692 DTSTART;TZID=Europe/Berlin:20121228T124500
693 UID:5316@29C3@pentabarf.org
694 DTSTAMP:20121226T143018
695 CATEGORIES:Lecture
696 DESCRIPTION:
697 SUMMARY:Lightning Talks 1 - 5 Minutes of Fame
698 STATUS:CONFIRMED
699 END:VEVENT
700 BEGIN:VEVENT
701 DURATION:PT2H15M
702 LOCATION:Saal 4
703 SEQUENCE:0
704 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5383.en.html
705 DTSTART;TZID=Europe/Berlin:20121229T124500
706 UID:5383@29C3@pentabarf.org
707 DTSTAMP:20121226T143018
708 CATEGORIES:Lecture
709 DESCRIPTION:
710 SUMMARY:Lightning Talks 2 - 5 Minutes of Fame
711 STATUS:CONFIRMED
712 END:VEVENT
713 BEGIN:VEVENT
714 DURATION:PT2H15M
715 LOCATION:Saal 4
716 SEQUENCE:0
717 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5384.en.html
718 DTSTART;TZID=Europe/Berlin:20121230T124500
719 UID:5384@29C3@pentabarf.org
720 DTSTAMP:20121226T143018
721 CATEGORIES:Lecture
722 DESCRIPTION:
723 SUMMARY:Lightning Talks 3 - 5 Minutes of Fame
724 STATUS:CONFIRMED
725 END:VEVENT
726 BEGIN:VEVENT
727 DURATION:PT1H00M
728 LOCATION:Saal 6
729 SEQUENCE:0
730 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5305.en.html
731 DTSTART;TZID=Europe/Berlin:20121229T171500
732 UID:5305@29C3@pentabarf.org
733 DTSTAMP:20121226T143018
734 CATEGORIES:Lecture
735 DESCRIPTION:We're winning! The future looks like network politics!Wait\,
736 what the hell are network politics and how do they work? Is that like
737 the Pirate Party\, or the IETF\, or Anonymous?
738 SUMMARY:Long live the protocoletariat!
739 STATUS:CONFIRMED
740 END:VEVENT
741 BEGIN:VEVENT
742 DURATION:PT1H00M
743 LOCATION:Saal 4
744 SEQUENCE:0
745 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5124.en.html
746 DTSTART;TZID=Europe/Berlin:20121229T183000
747 UID:5124@29C3@pentabarf.org
748 DTSTAMP:20121226T143018
749 CATEGORIES:Lecture
750 DESCRIPTION:Security is moving deeper into hardware and so should securit
751 y research. This talks introduces microprobing\, an old technique for sn
752 ooping on data inside chips\, and details a low-cost probing setup.
753 SUMMARY:Low-Cost Chip Microprobing
754 STATUS:CONFIRMED
755 END:VEVENT
756 BEGIN:VEVENT
757 DURATION:PT1H00M
758 LOCATION:Saal 4
759 SEQUENCE:0
760 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5088.en.html
761 DTSTART;TZID=Europe/Berlin:20121228T171500
762 UID:5088@29C3@pentabarf.org
763 DTSTAMP:20121226T143018
764 CATEGORIES:Lecture
765 DESCRIPTION:You might remember Tamagotchi virtual pets from the 1990's. T
766 hese toys are still around and just as demanding as ever! This talk cove
767 rs my attempts to hack the latest Tamagotchis. Starting with the IR inte
768 rface\, and moving down into the hardware\, this presentation will discu
769 ss techniques for reverse engineering a device with limited inputs\, com
770 puting power and debugging capabilities.
771 SUMMARY:Many Tamagotchis Were Harmed in the Making of this Presentation
772 STATUS:CONFIRMED
773 END:VEVENT
774 BEGIN:VEVENT
775 DURATION:PT1H00M
776 LOCATION:Saal 1
777 SEQUENCE:0
778 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5180.en.html
779 DTSTART;TZID=Europe/Berlin:20121230T160000
780 UID:5180@29C3@pentabarf.org
781 DTSTAMP:20121226T143018
782 CATEGORIES:Lecture
783 DESCRIPTION:Autonomer Drumroboter\, robotisches Glockenspiel oder klingen
784 de Installation: Musikinstrumente zu modifizieren und selbstzubauen biet
785 et musik- und technikaffinen Geeks die Möglichkeit\, vorgefertigten Kla
786 ng-Setups etwas eigenständiges entgegenzusetzen. Drumroboter und Klangi
787 nstallationen üben dabei sowohl physisch als auch optisch einen besonde
788 ren Reiz aus: die Quelle des Klangs wird entdeckt.
789 SUMMARY:Marvin und der Blues - Wie Roboterinstrumente zum Musik machen be
790 nutzt werden können des Bundes!
791 STATUS:CONFIRMED
792 END:VEVENT
793 BEGIN:VEVENT
794 DURATION:PT1H00M
795 LOCATION:Saal 6
796 SEQUENCE:0
797 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5282.en.html
798 DTSTART;TZID=Europe/Berlin:20121228T214500
799 UID:5282@29C3@pentabarf.org
800 DTSTAMP:20121226T143018
801 CATEGORIES:Lecture
802 DESCRIPTION:Mit RFID-Lesegeräten Menschen tracken - keine Zukunftsvision
803 .
804 SUMMARY:Meine Kleidung funkt - Tracking von Menschen durch in Kleidung in
805 tegrierte RFID-Chips des Bundes!
806 STATUS:CONFIRMED
807 END:VEVENT
808 BEGIN:VEVENT
809 DURATION:PT1H00M
810 LOCATION:Saal 4
811 SEQUENCE:0
812 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5289.en.html
813 DTSTART;TZID=Europe/Berlin:20121228T113000
814 UID:5289@29C3@pentabarf.org
815 DTSTAMP:20121226T143018
816 CATEGORIES:Lecture
817 DESCRIPTION:Meldegesetz und der erfolgreiche Protest dagegen.
818 SUMMARY:Meldegesetz - Was aus dem 57-Sekunden-Gesetz wurde
819 STATUS:CONFIRMED
820 END:VEVENT
821 BEGIN:VEVENT
822 DURATION:PT1H00M
823 LOCATION:Saal 6
824 SEQUENCE:0
825 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5285.en.html
826 DTSTART;TZID=Europe/Berlin:20121229T214500
827 UID:5285@29C3@pentabarf.org
828 DTSTAMP:20121226T143018
829 CATEGORIES:Lecture
830 DESCRIPTION:Unsichere Studierenden- und Mensakarten. Eine wissenschaftlic
831 he Auswertung.
832 SUMMARY:Men who stare at bits - RFID-Studierendenkarten mit Fehlern
833 STATUS:CONFIRMED
834 END:VEVENT
835 BEGIN:VEVENT
836 DURATION:PT1H00M
837 LOCATION:Saal 1
838 SEQUENCE:0
839 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5393.en.html
840 DTSTART;TZID=Europe/Berlin:20121229T203000
841 UID:5393@29C3@pentabarf.org
842 DTSTAMP:20121226T143018
843 CATEGORIES:Lecture
844 DESCRIPTION:Contactless smartcards have become widespread for application
845 s such as ticketing\, access control\, identification and payments. Side
846 -channel analysis (SCA) is a powerful type of passive implementation att
847 ack that enables to extract the secret keys of cryptographic devices. At
848 the example of NXP's Mifare DESfire MF3ICD40 smartcards we demonstrate
849 that SCA attacks can be applied to cryptographic RFID devices: By exploi
850 ting the electro-magnetic information leakage of the cards\, its cryptog
851 raphic keys are revealed.We introduce our open-source tools for analyzin
852 g contactless smartcardqs\, i.e.\, an ISO 14443 RFID reader (http://so
853 urceforge.net/projects/reader14443) and the card emulator Chameleon (htt
854 p://sourceforge.net/projects/chameleon14443). We then present the probab
855 ly worst realization of a commercial contactless payment system ever and
856 detail on various real-world attacks on this widespread (in Germany) sy
857 stem\, e.g.\, how to 'milk the digital cash cow' by modifying the credit
858 balance and convert zeros and ones into real money. The content of the
859 talk is joint work with Ingo von Maurich\, Daviad Oswald and Christof
860 Paar.
861 SUMMARY:Milking the Digital Cash Cow - Extracting Secret Keys of Contactl
862 ess Smartcards
863 STATUS:CONFIRMED
864 END:VEVENT
865 BEGIN:VEVENT
866 DURATION:PT1H00M
867 LOCATION:Saal 6
868 SEQUENCE:0
869 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5280.en.html
870 DTSTART;TZID=Europe/Berlin:20121230T113000
871 UID:5280@29C3@pentabarf.org
872 DTSTAMP:20121226T143018
873 CATEGORIES:Lecture
874 DESCRIPTION:Massive open online courses are the vogue of the season when
875 it comes to discussing the future of university-level education. But we
876 re onQly starting to see what education at this scope means and how
877 it can be supported best\, in terms of both didactics and technology. Th
878 is talk is an inside report by two instructors who have delved into the
879 experience of teaching large audiences online. We share the lessons that
880 we have learned: how to spark student interest\, how to put intuition b
881 efore formal theories\, how to streamline production and much more. And
882 we point out what needs to be done to truly democratize education from t
883 he viewpoint of both the studenAts and the instructors.
884 SUMMARY:Millions of Lessons Learned on Electronic Napkins - On the way to
885 free(ing) educationng the futu!
886 STATUS:CONFIRMED
887 END:VEVENT
888 BEGIN:VEVENT
889 DURATION:PT1H00M
890 LOCATION:Saal 6
891 SEQUENCE:0
892 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5102.en.html
893 DTSTART;TZID=Europe/Berlin:20121227T171500
894 UID:5102@29C3@pentabarf.org
895 DTSTAMP:20121226T143018
896 CATEGORIES:Lecture
897 DESCRIPTION:In den letzten Jahren haben sich netzpolitische Kräfteverhä
898 ltnisse auf interessante Weise verschoben. Neue Allianzen bilden sich so
899 wohl geqgen\, als auch für das freie Internet – und dennoch bleibt
900 der Aktivismus weit hinter seinem Potential zurück.
901 SUMMARY:Netzaktivsten! Ist das alles\, was wir drauf haben? - Eine subjek
902 tive Bestandsaufnahmeg the futu!
903 STATUS:CONFIRMED
904 END:VEVENT
905 BEGIN:VEVENT
906 DURATION:PT1H00M
907 LOCATION:Saal 6
908 SEQUENCE:0
909 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5134.en.html
910 DTSTART;TZID=Europe/Berlin:20121227T214500
911 UID:5134@29C3@pentabarf.org
912 DTSTAMP:20121226T143018
913 CATEGORIES:Lecture
914 DESCRIPTION:Human interface design for musical instruments presents uniqu
915 e challenges and vast new possibilities. The proliferation of low cost
916 rapid-prototyping tools has put the means of fabricating instruments wit
917 hin reach of the performing musician. In this talk\, I'll go through th
918 e design process for my main performance controller (The Mojo)\, my mult
919 iplayer instruments (aka Jamboxes) and my new RoboCaster guitar-controll
920 er.
921 SUMMARY:New Human Interfaces for Music - DIY MIDI Controllers
922 STATUS:CONFIRMED
923 END:VEVENT
924 BEGIN:VEVENT
925 DURATION:PT0H30M
926 LOCATION:Saal 6
927 SEQUENCE:0
928 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5404.en.html
929 DTSTART;TZID=Europe/Berlin:20121230T160000
930 UID:5404@29C3@pentabarf.org
931 DTSTAMP:20121226T143018
932 CATEGORIES:Lecture
933 DESCRIPTION:
934 SUMMARY:NOC Review - NOC Review about the 29C3
935 STATUS:CONFIRMED
936 END:VEVENT
937 BEGIN:VEVENT
938 DURATION:PT1H00M
939 LOCATION:Saal 1
940 SEQUENCE:0
941 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5385.en.html
942 DTSTART;TZID=Europe/Berlin:20121227T113000
943 UID:5385@29C3@pentabarf.org
944 DTSTAMP:20121226T143018
945 CATEGORIES:Lecture
946 DESCRIPTION:On the topic of resistance.
947 SUMMARY:Not my department
948 STATUS:CONFIRMED
949 END:VEVENT
950 BEGIN:VEVENT
951 DURATION:PT1H00M
952 LOCATION:Saal 1
953 SEQUENCE:0
954 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5037.en.html
955 DTSTART;TZID=Europe/Berlin:20121228T001500
956 UID:5037@29C3@pentabarf.org
957 DTSTAMP:20121226T143018
958 CATEGORIES:Lecture
959 DESCRIPTION:Gut gereift und mit verbesserter Rezeptur.Aber immer noch:Zwe
960 i sich auf Couchen fläzende Teams gehirnwinden\, spitzfinden und assozi
961 ieren gegeneinander an\, um Bilderrätsel aus den Gefilden IT\, Netzgese
962 llschaft und Informatik zu entwirren.(Hashtag: #Nougatbytes)
963 SUMMARY:Nougatbytes 10 - Gebilde(r)ter Hirnsalat – die rhekkcüЯ der B
964 ilderrätselds
965 STATUS:CONFIRMED
966 END:VEVENT
967 BEGIN:VEVENT
968 DURATION:PT0H30M
969 LOCATION:Saal 6
970 SEQUENCE:0
971 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5203.en.html
972 DTSTART;TZID=Europe/Berlin:20121228T143000
973 UID:5203@29C3@pentabarf.org
974 DTSTAMP:20121226T143018
975 CATEGORIES:Lecture
976 DESCRIPTION:Polish government decided in favour of open-licensed e-textbo
977 oks. This is not to liking of big textbook publishers\, reaping in profi
978 ts hand over fist. While their black PR campaign focuses on technicaliti
979 es\, it seems obvious that their real beef is with the liberal licensing
980 .
981 SUMMARY:OMG! OER! - How big business fights open education in Poland\, an
982 d how open education fights back! textbook publ!
983 STATUS:CONFIRMED
984 END:VEVENT
985 BEGIN:VEVENT
986 DURATION:PT0H30M
987 LOCATION:Saal 6
988 SEQUENCE:0
989 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5210.en.html
990 DTSTART;TZID=Europe/Berlin:20121229T140000
991 UID:5210@29C3@pentabarf.org
992 DTSTAMP:20121226T143018
993 CATEGORIES:Lecture
994 DESCRIPTION:The Security Assertion Markup Language (SAML) is a widely ado
995 pted language for making security statements about subjects. It is a cri
996 tical component for the development of federated identity deployments an
997 d Single Sign-On scenarios. In order to protect integrity and authentici
998 ty of the exchanged SAML assertions\, the XML Signature standard is appl
999 ied. However\, the signature verification algorithm is much more complex
1000 than in traditional signature formats like PKCS#7. The integrity protec
1001 tion can thus be successfully circumvented by application of different X
1002 ML Signature specific aawttacks\, under a weak adversarial model.
1003 SUMMARY:On Breaking SAML - Be Whoever You Want to Be
1004 STATUS:CONFIRMED
1005 END:VEVENT
1006 BEGIN:VEVENT
1007 DURATION:PT0H15M
1008 LOCATION:Saal 1
1009 SEQUENCE:0
1010 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5399.en.html
1011 DTSTART;TZID=Europe/Berlin:20121227T110000
1012 UID:5399@29C3@pentabarf.org
1013 DTSTAMP:20121226T143018
1014 CATEGORIES:Lecture
1015 DESCRIPTION:
1016 SUMMARY:Opening Event
1017 STATUS:CONFIRMED
1018 END:VEVENT
1019 BEGIN:VEVENT
1020 DURATION:PT1H00M
1021 LOCATION:Saal 1
1022 SEQUENCE:0
1023 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5308.en.html
1024 DTSTART;TZID=Europe/Berlin:20121229T160000
1025 UID:5308@29C3@pentabarf.org
1026 DTSTAMP:20121226T143018
1027 CATEGORIES:Lecture
1028 DESCRIPTION:Was bedeutet das Zeitalter offener Designs für die Sicherhei
1029 t von Schlössern? Zum Beispiel solchen\, die auf eine geringe Verbreitu
1030 ng eineks Schlüssels setzen? Ein Beispiel sind die sogenannten Hochsi
1031 cherheitsversionen von Polizeihandschellen. Der Talk zeigt was (und wie)
1032 sich in diesem Bereich mit Lasercuttern und 3D Druckern erreichen läss
1033 t - sowie welche komplexeren Angriffsziele noch warten. Als Ausweg aus d
1034 er Problematik kopierbarer Schlüssel gelten digitale Schlösser\, aber
1035 sie kranken anders an offenen Quellen: sie haben keine! Im Rahmen eines
1036 Open Source Lock Projektes haben wir uns daher ein reflashbares Vorhäng
1037 eschloss angesehen\, doch noch ehe wir den Programmieradapter angeschlos
1038 sen hatten fanden wir eine SchwachstellAie der Hardware... Leider kein
1039 Einzelfall!
1040 SUMMARY:Open Source Schlüssel und Schlösser - Offene Quellen zum Bösen
1041 und Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektr
1042 onischen s SchlüsselsSchlössern
1043 STATUS:CONFIRMED
1044 END:VEVENT
1045 BEGIN:VEVENT
1046 DURATION:PT1H00M
1047 LOCATION:Saal 4
1048 SEQUENCE:0
1049 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5265.en.html
1050 DTSTART;TZID=Europe/Berlin:20121230T171500
1051 UID:5265@29C3@pentabarf.org
1052 DTSTAMP:20121226T143018
1053 CATEGORIES:Lecture
1054 DESCRIPTION:x86 processors contain a surprising amount of built-in memory
1055 translation logic\, which is driven by various data tables with intrica
1056 te entry formats\, and can produce various kinds of traps and other inte
1057 resting computational effects. These features are mostly relics of earli
1058 er\, more civilized times\, when Jedi Knights tried to protect the Old R
1059 epublic OSes with segmentation\, supervisor bits\, and hardware task sup
1060 port\, but were defeated by processor de-optimizations and performance c
1061 oncerns and left unused by both Windows and UNIX systems – and explore
1062 d only by hackers. For the rest of the world\, an x86 PC was a "von Neum
1063 ann architecture" with most of its strangeness unused.
1064 SUMMARY:Page Fault Liberation Army or Gained in Translation - a history o
1065 f creative x86 virtual memory usestextbook publ!
1066 STATUS:CONFIRMED
1067 END:VEVENT
1068 BEGIN:VEVENT
1069 DURATION:PT1H00M
1070 LOCATION:Saal 4
1071 SEQUENCE:0
1072 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5323.en.html
1073 DTSTART;TZID=Europe/Berlin:20121229T230000
1074 UID:5323@29C3@pentabarf.org
1075 DTSTAMP:20121226T143018
1076 CATEGORIES:Lecture
1077 DESCRIPTION:Der Vortrag handelt über Getreidezüchtung. Am Beispiel von
1078 Weizen soll der langjährige Prozess beschrieben werden\, den es benöti
1079 gt\, um eine neue Sorte auf den Markt zu bringen. Es sollen die biologi
1080 schen Grundlagen sowie die benötigte Technik vorgestellt werden. Außer
1081 dem wird auf die Problematik eingegangen\, die die Konzentration des Mar
1082 ktes auf wenige große Konzerne mit sich bringt.
1083 SUMMARY:Pflanzenhacken richtig - Einblicke in die Weizenzüchtung
1084 STATUS:CONFIRMED
1085 END:VEVENT
1086 BEGIN:VEVENT
1087 DURATION:PT1H00M
1088 LOCATION:Saal 4
1089 SEQUENCE:0
1090 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5095.en.html
1091 DTSTART;TZID=Europe/Berlin:20121227T183000
1092 UID:5095@29C3@pentabarf.org
1093 DTSTAMP:20121226T143018
1094 CATEGORIES:Lecture
1095 DESCRIPTION:To date\, remote vehicle communications have provided little
1096 in the way of privacy. Much information and misinformation has been spre
1097 ad on what the system is and can do\, especially within the information
1098 security community. The recent field trial in the US of a connected vehi
1099 cle infrastructure raises the level of concern amongst all who are aware
1100 of existing privacy issues.
1101 SUMMARY:Privacy and the Car of the Future - Considerations for the Connec
1102 ted Vehiclelds
1103 STATUS:CONFIRMED
1104 END:VEVENT
1105 BEGIN:VEVENT
1106 DURATION:PT1H00M
1107 LOCATION:Saal 4
1108 SEQUENCE:0
1109 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5101.en.html
1110 DTSTART;TZID=Europe/Berlin:20121229T160000
1111 UID:5101@29C3@pentabarf.org
1112 DTSTAMP:20121226T143018
1113 CATEGORIES:Lecture
1114 DESCRIPTION:ACTA war das beherrschende Thema des zweiten Halbjahres. Mit
1115 ACTA sollte der Weg einer Privatisierung der Rechtsdurchsetzung weiter g
1116 egangen werden. Was das konkret bedeutet\, können wir bereits im Auslan
1117 d sehen: Netzsperren\, 3-Strikes-Systeme und eine Echtzeit-Überwachung
1118 des Datenverkehrs zur Bekämpfung von Urheberrechtsverletzungen. Existie
1119 rende Modelle in anderen europäischen Staaten zeigen\, dass diese Maßn
1120 ahmen erhebliche grund- und datenschutzrechtliche Probleme aufwerfen.
1121 SUMMARY:Privatisierung der Rechtsdurchsetzung - Von ACTA\, IPRED und Freu
1122 ndenVehiclelds
1123 STATUS:CONFIRMED
1124 END:VEVENT
1125 BEGIN:VEVENT
1126 DURATION:PT1H00M
1127 LOCATION:Saal 1
1128 SEQUENCE:0
1129 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5266.en.html
1130 DTSTART;TZID=Europe/Berlin:20121230T140000
1131 UID:5266@29C3@pentabarf.org
1132 DTSTAMP:20121226T143018
1133 CATEGORIES:Lecture
1134 DESCRIPTION:Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Too
1135 ls wie Proxies\, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge u
1136 nterstützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? De
1137 r Vortrag stellt einige von diesen vor und zeigt die Stärken und Schwä
1138 chen.
1139 SUMMARY:Proximax\, Telex\, Flashproxy oder Tor Bridges - Übersicht über
1140 aktuelle Zensurumgehungssoftwarestextbook publ!
1141 STATUS:CONFIRMED
1142 END:VEVENT
1143 BEGIN:VEVENT
1144 DURATION:PT1H00M
1145 LOCATION:Saal 4
1146 SEQUENCE:0
1147 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5374.en.html
1148 DTSTART;TZID=Europe/Berlin:20121227T171500
1149 UID:5374@29C3@pentabarf.org
1150 DTSTAMP:20121226T143018
1151 CATEGORIES:Lecture
1152 DESCRIPTION: This talk will give an overview of the ongoing work by the W
1153 3C on a controversial general purpose Javascript cryptography API in con
1154 text of the larger desire to create trusted and encrypted cloud services
1155 with rich web applications. Today\, cryptography is difficult to use an
1156 d the Web is an insecure environment at best\, but can this situation be
1157 improved and cryptography be put in the hands of ordinary developers an
1158 d users? The W3C specification\, currently under development\, will be d
1159 escribed\, as well as its interaction with other parts of the emerging W
1160 eb Security Model at th:e W3C and IETF such as Content Security Policy
1161 \, HTTP Strict Transport Security\, and Certificate Transparency. A numb
1162 er of use-cases\, ranging from decentralized identity systems to secure
1163 cloud services for activists\, will be detailed. As the specification wi
1164 ll be under active development until autumn 2013\, feedback from the hac
1165 ker community is needed!
1166 SUMMARY:Re-igniting the Crypto Wars on the Web
1167 STATUS:CONFIRMED
1168 END:VEVENT
1169 BEGIN:VEVENT
1170 DURATION:PT0H30M
1171 LOCATION:Saal 6
1172 SEQUENCE:0
1173 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5138.en.html
1174 DTSTART;TZID=Europe/Berlin:20121228T131500
1175 UID:5138@29C3@pentabarf.org
1176 DTSTAMP:20121226T143018
1177 CATEGORIES:Lecture
1178 DESCRIPTION:In 1791\, the political reformer Jeremy Bentham theorized the
1179 Panopticon\, whose design promised to allow a single Inspector to surve
1180 il (exercise "inspective force" over) large numbers of criminals or work
1181 ers. In recent years\, the advent of a suitable technical apparatus –
1182 CCTV\, ISP taps (network traffic interception)\, data banks\, and so on
1183 – has extended the proposed 30m circumference of Bentham’s structure
1184 to\, and beyond\, the A2physical boundaries of entire countries. While
1185 total surveillance is often perceived as a feature of modernity\, its c
1186 onceptual and epistemological framework is rooted in the Romantic period
1187 \, moreover at a key juncture in the history of ideas concerning individ
1188 ual subjectivity\, rights and freedoms. David Barnard-Wills refers to in
1189 spective culture as a "nexus of surveillance\, identity and language" (2
1190 012). In this talk\, we examine this nexus in the historical period that
1191 first\, and so powerfully\, imagined the fully10 surveilled world.
1192 SUMMARY:Romantic Hackers - Keats\, Wordsworth and Total Surveillance
1193 STATUS:CONFIRMED
1194 END:VEVENT
1195 BEGIN:VEVENT
1196 DURATION:PT1H00M
1197 LOCATION:Saal 1
1198 SEQUENCE:0
1199 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5402.en.html
1200 DTSTART;TZID=Europe/Berlin:20121229T183000
1201 UID:5402@29C3@pentabarf.org
1202 DTSTAMP:20121226T143018
1203 CATEGORIES:Lecture
1204 DESCRIPTION:Privacy International\, Agentura.Ru\, the Russian secret serv
1205 ices watchdog\, and Citizen Lab have joined forces to launch a new proje
1206 ct entitled 'Russia’s Surveillance State'. The aims of the project are
1207 to undertake research and investigation into surveillance practices in
1208 Russia\, including the trade in and use of surveillance technologies\, a
1209 nd to publicise research and investigative findings to improve national
1210 and international awareness of surveillance and secrecy practices in Rus
1211 sia. The project is made possible with support from the Canada Centre f
1212 or Global Security Studies\, Munk School of Global Affairs\, at the Univ
1213 ersity of Toronto.
1214 SUMMARY:Russia’s Surveillance State
1215 STATUS:CONFIRMED
1216 END:VEVENT
1217 BEGIN:VEVENT
1218 DURATION:PT1H00M
1219 LOCATION:Saal 1
1220 SEQUENCE:0
1221 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5140.en.html
1222 DTSTART;TZID=Europe/Berlin:20121228T214500
1223 UID:5140@29C3@pentabarf.org
1224 DTSTAMP:20121226T143018
1225 CATEGORIES:Lecture
1226 DESCRIPTION:The triple meltdown of the Fukushima Dai-Ichi nuclear power p
1227 lant in March last year and the release of radioactive material that has
1228 ensued have left a good part of Northern Japan contaminated with unknow
1229 n amount of radioactivity. An outstanding lack of transparency from both
1230 the government and the power utility then resulted in a near total lack
1231 of information concerning the levels of radiation in the\, yet unknown\
1232 , contaminated areas. As a response\, concerned citizen have started to
1233 take upon themselves this challenging task. However it quickly became cl
1234 ear that handheld measu! rements wouldn't scale up to the full magnitud
1235 e of the area to cover. New means of measuring radiation accurately\, qu
1236 ickly and cheaply were needed.
1237 SUMMARY:Safecast: DIY and citizen-sensing of radiation - Empowering citiz
1238 en in the wake of Fukushima triple-meltdown disasterve material!
1239 STATUS:CONFIRMED
1240 END:VEVENT
1241 BEGIN:VEVENT
1242 DURATION:PT1H00M
1243 LOCATION:Saal 6
1244 SEQUENCE:0
1245 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5059.en.html
1246 DTSTART;TZID=Europe/Berlin:20121227T230000
1247 UID:5059@29C3@pentabarf.org
1248 DTSTAMP:20121226T143018
1249 CATEGORIES:Lecture
1250 DESCRIPTION:Modern civilization unconditionally depends on information sy
1251 stems. It is paradoxical but true that ICS/SCADA systems are the most in
1252 secure systems in the world. From network to application\, SCADA is full
1253 of configuration issues and vulnerabilities.
1254 SUMMARY:SCADA Strangelove - or: How I Learned to Start Worrying and Love
1255 Nuclear Plants
1256 STATUS:CONFIRMED
1257 END:VEVENT
1258 BEGIN:VEVENT
1259 DURATION:PT1H00M
1260 LOCATION:Saal 4
1261 SEQUENCE:0
1262 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5177.en.html
1263 DTSTART;TZID=Europe/Berlin:20121229T113000
1264 UID:5177@29C3@pentabarf.org
1265 DTSTAMP:20121226T143018
1266 CATEGORIES:Lecture
1267 DESCRIPTION:This talk will go into some of challenges\, solutions\, and s
1268 tories from securing a campaign for the 2012 US presidential election.
1269 SUMMARY:Securing the Campaign - Security and the 2012 US Presidential Ele
1270 ctionar Plants
1271 STATUS:CONFIRMED
1272 END:VEVENT
1273 BEGIN:VEVENT
1274 DURATION:PT1H00M
1275 LOCATION:Saal 4
1276 SEQUENCE:0
1277 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5225.en.html
1278 DTSTART;TZID=Europe/Berlin:20121229T203000
1279 UID:5225@29C3@pentabarf.org
1280 DTSTAMP:20121226T143018
1281 CATEGORIES:Lecture
1282 DESCRIPTION:In this talk we will survey some 30 recent attacks on the Rus
1283 sian GOST block cipher.Background: GOST cipher is the official encryptio
1284 n standard of the Russian federation\, and also has special versions for
1285 the most important Russian banks. Until 2012 there was no attack on GOS
1286 T when it is used in encryption with random keys. I have developed more
1287 than 30 different academic attacks on GOST the fastest has complexity of
1288 2^118 to recover some but not all 256-bit keys generated at random\, wh
1289 ich will be presented for the first time at CCC conference. It happens o
1290 nly once per decade tha
1291 t a government standard is broken while it is
1292 still an official government standard (happened for DES and AES\, no oth
1293 er cases known). All these are broken only in academic sense\, for GOST
1294 most recent attacks are sliding into maybe arguably practical in 30 year
1295 s from now instead of 200 years... Our earlier results were instrumental
1296 at ISO for rejecting GOST as an international encryption standard last
1297 year. Not more than 5+ block cihers have ever achieved this level of ISO
1298 standardisation in 25 years and it NEVER happeqnded in history of ISO
1299 that a cipher got broken during the standardization process. Two main p
1300 apers with 70+30 pages respectively which are http://eprint.iacr.org/201
1301 1/626 and http://eprint.iacr.org/2012/138. Two other papers have been al
1302 ready published in Cryptologia journal which specializes in serious mili
1303 tary and government crypto. The talk will cover three main families of a
1304 ttacks on GOST: high-level transformations\, low- level inversion/MITM/g
1305 uess-then-software/algebraic attacks and advanced truncated differentiaa
1306 l cryptanalysis of GOST.
1307 SUMMARY:Security Evaluation of Russian GOST Cipher - Survey of All Known
1308 Attacks on Russian Government Encryption Standard the official !
1309 STATUS:CONFIRMED
1310 END:VEVENT
1311 BEGIN:VEVENT
1312 DURATION:PT1H00M
1313 LOCATION:Saal 1
1314 SEQUENCE:0
1315 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5244.en.html
1316 DTSTART;TZID=Europe/Berlin:20121230T171500
1317 UID:5244@29C3@pentabarf.org
1318 DTSTAMP:20121226T143018
1319 CATEGORIES:Lecture
1320 DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan?
1321 Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un
1322 d Treed1nds waren zu sehen?
1323 SUMMARY:Security Nightmares - Damit Sie auch morgen schlecht von Ihrem Co
1324 mputer träumen.wicklungen habe!
1325 STATUS:CONFIRMED
1326 END:VEVENT
1327 BEGIN:VEVENT
1328 DURATION:PT1H00M
1329 LOCATION:Saal 4
1330 SEQUENCE:0
1331 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5167.en.html
1332 DTSTART;TZID=Europe/Berlin:20121227T160000
1333 UID:5167@29C3@pentabarf.org
1334 DTSTAMP:20121226T143018
1335 CATEGORIES:Lecture
1336 DESCRIPTION:In The Netherlands\, this year the community-driven mobile te
1337 lco Limesco has started operations. We're providing voice\, SMS and data
1338 services to dozens of hackers in our country.One of the founders of Lim
1339 esco will give a lecture about mobile telephony in The Netherlands\, enc
1340 ompassing topics like what companies are involved in the system\, how ta
1341 riffs are constructed and the role of government regulations.
1342 SUMMARY:Setting mobile phones free - An overview of a mobile telephony ma
1343 rket and how a community-driven operator is borning voice\, SMS!
1344 STATUS:CONFIRMED
1345 END:VEVENT
1346 BEGIN:VEVENT
1347 DURATION:PT1H00M
1348 LOCATION:Saal 6
1349 SEQUENCE:0
1350 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5164.en.html
1351 DTSTART;TZID=Europe/Berlin:20121228T160000
1352 UID:5164@29C3@pentabarf.org
1353 DTSTAMP:20121226T143018
1354 CATEGORIES:Lecture
1355 DESCRIPTION:Der Betrieb von WLAN-Funk-Netzen und auch von offenen oder fr
1356 eien Netzen ist heute weit verbreitet und Teil der Diskussion um die "Cu
1357 ltures of Sharing". Der Vortrag soll die Grundlagen der Haftung für off
1358 ene Netze und die Entwicklung der Rechtsprechung vom Landgericht Hamburg
1359 ("gestern") zum BGH-Urteil "Sommer unseres Lebens" und den Einfluss akt
1360 ueller Rechtsprqechung des Europäischen Gerichtshofs\, des Bundesgeric
1361 htshofs und der Instanzgerichte darstellen ("heute"). Ein Ausblick auf d
1362 ie Folgen dieser neuen\, teilweise abweichenden Rechtsprechung und auf d
1363 ie Gesetzesinitiativen der SPD und der Linken ("morgen") soll den Vortra
1364 g abrunden.
1365 SUMMARY:Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze - St
1366 and gestern\, heute und morgen eitet und Teil !
1367 STATUS:CONFIRMED
1368 END:VEVENT
1369 BEGIN:VEVENT
1370 DURATION:PT1H00M
1371 LOCATION:Saal 4
1372 SEQUENCE:0
1373 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5127.en.html
1374 DTSTART;TZID=Europe/Berlin:20121227T124500
1375 UID:5127@29C3@pentabarf.org
1376 DTSTAMP:20121226T143018
1377 CATEGORIES:Lecture
1378 DESCRIPTION:Der Eid des Hippokrates\, der das Handeln von Ärzten ethisch
1379 leiten soll\, ist zwischen 2.500 und 2.000 Jahre alt und tatsächlich w
1380 ohl diea erste 'Datenschutz-Vorschrift' überhaupt. So heißt es: "Was
1381 ich bei der Behandlung oder auch außerhalb meiner Praxis im Umgange mi
1382 t Menschen sehe und höre\, das man nicht weiterreden darf\, werde ich v
1383 erschweigen und als Geheimnis bewahren." [1]
1384 SUMMARY:Siechtum und Sterben der ärztlichen Schweigepflicht
1385 STATUS:CONFIRMED
1386 END:VEVENT
1387 BEGIN:VEVENT
1388 DURATION:PT1H00M
1389 LOCATION:Saal 4
1390 SEQUENCE:0
1391 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5121.en.html
1392 DTSTART;TZID=Europe/Berlin:20121229T171500
1393 UID:5121@29C3@pentabarf.org
1394 DTSTAMP:20121226T143018
1395 CATEGORIES:Lecture
1396 DESCRIPTION:Green-IT kennen wir inzwischen zur Genüge. Computer können
1397 aber nicht nur nicht "green" sein\, sondern auch unfair und unsozial\, v
1398 on der 1Rohstoffgewinnung bis zur Verschrottung. Unfair spart nämlich
1399 Geld. Der Gedanke\, faire Produkte anzubieten und zu kaufen\, ist inzwis
1400 chen weit verbreitet\, allerdings eher bei Kaffee oder Kleidung. Ein Ang
1401 ebot an fairer IT fehlt. Die Industrie hat sich noch nicht auf den Weg g
1402 emacht\, faire Computer herzustellen. Wir Nutzer haben kaum die Wahl –
1403 verändern können wir aber durchaus etwas. Der Vortrag erklärt\, was
1404 und wie.
1405 SUMMARY:Sind faire Computer möglich?
1406 STATUS:CONFIRMED
1407 END:VEVENT
1408 BEGIN:VEVENT
1409 DURATION:PT0H30M
1410 LOCATION:Saal 6
1411 SEQUENCE:0
1412 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5123.en.html
1413 DTSTART;TZID=Europe/Berlin:20121229T143000
1414 UID:5123@29C3@pentabarf.org
1415 DTSTAMP:20121226T143018
1416 CATEGORIES:Lecture
1417 DESCRIPTION:The lecture would address topics related to reverse engineeri
1418 ng for mobile platforms\, especially from the Android point of view. The
1419 main aspects of the presentation is a new approach to reverse engineeri
1420 ng side effects problem: some low footprint inspection techniques that g
1421 rant analysts with the ability to access the program memory without alte
1422 ring its behavior. One technique is presented in particular - Android se
1423 rvice injection - and is demonstrated.
1424 SUMMARY:Small footprint inspection techniques for Android - Reverse engin
1425 eering on Android platformshabe!
1426 STATUS:CONFIRMED
1427 END:VEVENT
1428 BEGIN:VEVENT
1429 DURATION:PT1H00M
1430 LOCATION:Saal 4
1431 SEQUENCE:0
1432 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5239.en.html
1433 DTSTART;TZID=Europe/Berlin:20121228T183000
1434 UID:5239@29C3@pentabarf.org
1435 DTSTAMP:20121226T143018
1436 CATEGORIES:Lecture
1437 DESCRIPTION:This talk will give an overview on the technology\, the laws
1438 and the technical guidelines of the smartMeter roll-out in Germany.
1439 SUMMARY:SmartMeter - A technological overview of the German roll-out
1440 STATUS:CONFIRMED
1441 END:VEVENT
1442 BEGIN:VEVENT
1443 DURATION:PT1H00M
1444 LOCATION:Saal 4
1445 SEQUENCE:0
1446 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5336.en.html
1447 DTSTART;TZID=Europe/Berlin:20121230T113000
1448 UID:5336@29C3@pentabarf.org
1449 DTSTAMP:20121226T143018
1450 CATEGORIES:Lecture
1451 DESCRIPTION:Forderungen nach einer gerechten Sprache (also einer Sprache
1452 frei von Rassismus\, Sexismus und anderen menschenfeindlichen Ideologien
1453 ) stoßen häufig auf Unverständnis und Ablehnung. Unverständnis\, wei
1454 l statt der sozialen Wirklichkeit die Sprache kritisiert wird\, mit der
1455 sie beschrieben wird. Ablehnung\, weil Sprachkritik häufig als Sprechve
1456 rbot empfunden wird.
1457 SUMMARY:Sprache\, Ungleichheit und Unfreiheit
1458 STATUS:CONFIRMED
1459 END:VEVENT
1460 BEGIN:VEVENT
1461 DURATION:PT0H30M
1462 LOCATION:Saal 6
1463 SEQUENCE:0
1464 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5378.en.html
1465 DTSTART;TZID=Europe/Berlin:20121229T124500
1466 UID:5378@29C3@pentabarf.org
1467 DTSTAMP:20121226T143018
1468 CATEGORIES:Lecture
1469 DESCRIPTION:Stabilitätsanker & Wachstumslokomotive geben als politische
1470 Metaphern ungewollt Auskunft über das Ausmaß der europäischen Wirtsch
1471 afts- und Finanzkrise. Wie kommt so ein Begriff in Verkehr? Wer gebrauch
1472 t ihn? Zu welchem Zweck? Was fördert die Analyse der Metaphern zutage?
1473 SUMMARY:Stabilitätsanker & Wachstumslokomotive
1474 STATUS:CONFIRMED
1475 END:VEVENT
1476 BEGIN:VEVENT
1477 DURATION:PT1H00M
1478 LOCATION:Saal 6
1479 SEQUENCE:0
1480 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5230.en.html
1481 DTSTART;TZID=Europe/Berlin:20121228T230000
1482 UID:5230@29C3@pentabarf.org
1483 DTSTAMP:20121226T143018
1484 CATEGORIES:Lecture
1485 DESCRIPTION:Stylometry uses linguistic information found in a document to
1486 perform authorship recognition. In this talk\, we will present how styl
1487 ometry can be used to deanonymize users in multilingual underground foru
1488 ms. Our initial result shows that in spite of differences in languages a
1489 nd text lengths\, regular stylometric methods perform well in identifyin
1490 g users in this context. We will also present the improved version of An
1491 onymouth\, a tool to anonymize written document\, with user studies.
1492 SUMMARY:Stylometry and Online Underground Markets
1493 STATUS:CONFIRMED
1494 END:VEVENT
1495 BEGIN:VEVENT
1496 DURATION:PT0H30M
1497 LOCATION:Saal 6
1498 SEQUENCE:0
1499 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5390.en.html
1500 DTSTART;TZID=Europe/Berlin:20121228T140000
1501 UID:5390@29C3@pentabarf.org
1502 DTSTAMP:20121226T143018
1503 CATEGORIES:Lecture
1504 DESCRIPTION:Don't call us if your campaign does not work! And worse\, eve
1505 ryone's been harassed or arrested.tet und Teil !
1506 SUMMARY:Tactical Tech - Bridging the Gap
1507 STATUS:CONFIRMED
1508 END:VEVENT
1509 BEGIN:VEVENT
1510 DURATION:PT0H30M
1511 LOCATION:Saal 6
1512 SEQUENCE:0
1513 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5228.en.html
1514 DTSTART;TZID=Europe/Berlin:20121230T124500
1515 UID:5228@29C3@pentabarf.org
1516 DTSTAMP:20121226T143018
1517 CATEGORIES:Lecture
1518 DESCRIPTION:The Role of Technology in Post-Revolution Tunisia & Egypt: In
1519 ternet activists have embarked on many online projects to empower citize
1520 ns with necessary information about their elected officials.
1521 SUMMARY:Technology in Post-Revolution Tunisia and Egypt
1522 STATUS:CONFIRMED
1523 END:VEVENT
1524 BEGIN:VEVENT
1525 DURATION:PT1H00M
1526 LOCATION:Saal 4
1527 SEQUENCE:0
1528 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5195.en.html
1529 DTSTART;TZID=Europe/Berlin:20121230T160000
1530 UID:5195@29C3@pentabarf.org
1531 DTSTAMP:20121226T143018
1532 CATEGORIES:Lecture
1533 DESCRIPTION:The Executable and Linkable Format (ELF) is omnipresent\; rel
1534 ated OS and library code is run whenever processes are set up and servic
1535 ed (e.g.\, dynamically linked). The loader is the stage manager for ever
1536 y executable. Hardly anyone appreciates the work that the ELF backstage
1537 crew (including the linker and the loader) puts in to make an executable
1538 run smoothly.
1539 SUMMARY:The Care and Feeding of Weird Machines Found in Executable Metada
1540 ta
1541 STATUS:CONFIRMED
1542 END:VEVENT
1543 BEGIN:VEVENT
1544 DURATION:PT1H00M
1545 LOCATION:Saal 4
1546 SEQUENCE:0
1547 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5206.en.html
1548 DTSTART;TZID=Europe/Berlin:20121227T214500
1549 UID:5206@29C3@pentabarf.org
1550 DTSTAMP:20121226T143018
1551 CATEGORIES:Lecture
1552 DESCRIPTION:In the world of digital activism\, distributed denial of serv
1553 ice attacks present relatively low barriers to popular participation\, h
1554 ave a high potential for attracting large numbers of first-time and repe
1555 at participants\, and can attract large amounts of media attention. But
1556 though such actions popular\, are they ethical? In this talk I will be
1557 presenting an ethical framework for the analysis of activist DDOS action
1558 s. The framework is grounded in a historical analysis of various activis
1559 t DDOS actions\, such as the IGC attacks in Spain in the late 90s\, Elec
1560 tronic Disturbance Theater actions in the early 2000s\, and the Anonym
1561 ous-led Operation Payback attacks in 2010. Each historical case study p
1562 resents a unique confluence of technological\, political\, legal and ope
1563 rational factors allowing for a full spectrum of ethical analysis.
1564 SUMMARY:The Ethics of Activist DDOS Actions - A Historical Analysis
1565 STATUS:CONFIRMED
1566 END:VEVENT
1567 BEGIN:VEVENT
1568 DURATION:PT1H00M
1569 LOCATION:Saal 6
1570 SEQUENCE:0
1571 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html
1572 DTSTART;TZID=Europe/Berlin:20121229T230000
1573 UID:5256@29C3@pentabarf.org
1574 DTSTAMP:20121226T143018
1575 CATEGORIES:Lecture
1576 DESCRIPTION:Have you ever been staring for nights at binary or hexadecima
1577 l data flows extracted from an USB channel? Don't you remember yourself
1578 searching for some patterns and similarities in this fuc***g mess of zer
1579 os and ones grabbed from a binary configuration file? How long did it ta
1580 ke you to find an 16 bits decimal size field last time you reversed an I
1581 PC communication protocol?Did you know you were not alone and that among
1582 them\, Rob Savoye (@ FOSDEM-08) and Drew Fisher (@ 28C3) have already r
1583 eported the main difficulties of the RE operations. Both of them called
1584 for the creation of a tool which would help experts in their work.
1585 SUMMARY:The future of protocol reversing and simulation applied on ZeroAc
1586 cess botnet - Mapping your enemy Botnet with Netzobou remember !
1587 STATUS:CONFIRMED
1588 END:VEVENT
1589 BEGIN:VEVENT
1590 DURATION:PT1H00M
1591 LOCATION:Saal 1
1592 SEQUENCE:0
1593 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5274.en.html
1594 DTSTART;TZID=Europe/Berlin:20121227T171500
1595 UID:5274@29C3@pentabarf.org
1596 DTSTAMP:20121226T143018
1597 CATEGORIES:Lecture
1598 DESCRIPTION:The current European data protection directive is from 1995\,
1599 which was when the internet had not hit Brussels' decision-makers yet.
1600 Now\, 17 years later\, it is being completely re-writen. Will it meet th
1601 e challenges of the age of big data? Will it have any effect on non-EU d
1602 ata hoarders? How will it deal with user-generated consent? What is this
1603 strange new "right to be forgotten"? And what about privacy by design?
1604 SUMMARY:The Grand EU Data Protection Reform - A latest battle report by
1605 some key actors from Brusselsbe!
1606 STATUS:CONFIRMED
1607 END:VEVENT
1608 BEGIN:VEVENT
1609 DURATION:PT1H00M
1610 LOCATION:Saal 6
1611 SEQUENCE:0
1612 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html
1613 DTSTART;TZID=Europe/Berlin:20121228T171500
1614 UID:5306@29C3@pentabarf.org
1615 DTSTAMP:20121226T143018
1616 CATEGORIES:Lecture
1617 DESCRIPTION:At the very beginning\, Tor was just a socks proxy that prote
1618 cted the origin and/or destination of your TCP flows. Now the broader To
1619 r ecosystem includes a diverse set of projects -- browser extensions to
1620 patch Firefox and Thunderbird's privacy issues\, Tor controller librarie
1621 s to let you interface with the Tor client in your favorite language\, n
1622 etwork scanners to measure relay performance and look for misbehaving ex
1623 it relays\, LiveCDs\, support for the way Android applications expect To
1624 r to behave\, full-network simulators and testing frameworks\, plugins t
1625 o make Tor's traffic look like Skype or other protocols\, and metrics
1626 and measurement tools to keep track of how well everything's working. Ma
1627 ny of these tools aim to be useful beyond Tor: making them modular means
1628 they're reusable for other anonymity and security projects as well. In
1629 this talk\, Roger and Jake will walk you through all the tools that make
1630 up the Tor software world\, and give you a better understanding of whic
1631 h ones need love and how you can help.
1632 SUMMARY:The Tor software ecosystem
1633 STATUS:CONFIRMED
1634 END:VEVENT
1635 BEGIN:VEVENT
1636 DURATION:PT1H00M
1637 LOCATION:Saal 6
1638 SEQUENCE:0
1639 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5178.en.html
1640 DTSTART;TZID=Europe/Berlin:20121230T140000
1641 UID:5178@29C3@pentabarf.org
1642 DTSTAMP:20121226T143018
1643 CATEGORIES:Lecture
1644 DESCRIPTION:Galaksija was to be in Yugoslavia what Commodore and Sinclair
1645 were in the west. Whether it succeeded or not\, its deceptively simple
1646 design can still teach us a lot of interesting tricks on how to make a u
1647 sable computer and operating system with as few transistors and bits as
1648 possible.
1649 SUMMARY:The ultimate Galaksija talk - Everything about a Yugoslavian micr
1650 ocomputer halfway between a TRS-80 and a ZX 80\!
1651 STATUS:CONFIRMED
1652 END:VEVENT
1653 BEGIN:VEVENT
1654 DURATION:PT1H00M
1655 LOCATION:Saal 4
1656 SEQUENCE:0
1657 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5044.en.html
1658 DTSTART;TZID=Europe/Berlin:20121227T230000
1659 UID:5044@29C3@pentabarf.org
1660 DTSTAMP:20121226T143018
1661 CATEGORIES:Lecture
1662 DESCRIPTION:In this year’s talk\, I tie on my 28c3 talk and present tim
1663 ing side channels from a defending viewpoint: How can one mitigate timin
1664 g side A{channels? Aren’t random delays sufficient to prevent timing s
1665 ide channels in practice? What is the minimum size of random delays to b
1666 e effective? Are there other delay strategies besides random delays that
1667 are more effective and efficient?
1668 SUMMARY:Time is NOT on your Side - Mitigating Timing Side Channels on the
1669 Web
1670 STATUS:CONFIRMED
1671 END:VEVENT
1672 BEGIN:VEVENT
1673 DURATION:PT1H00M
1674 LOCATION:Saal 1
1675 SEQUENCE:0
1676 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5380.en.html
1677 DTSTART;TZID=Europe/Berlin:20121228T140000
1678 UID:5380@29C3@pentabarf.org
1679 DTSTAMP:20121226T143018
1680 CATEGORIES:Lecture
1681 DESCRIPTION:Wir wissen seit ein paar Jahren\, dass der Staat technisch in
1682 der Lage ist\, die Computer einiger seiner Bürger zu infiltrieren. Abe
1683 r soll er das auch dürfen? Was hat sich in den letzten Monaten beim Sta
1684 atstrojaner getan?
1685 SUMMARY:Trojaner-Blindflug - Spionage-Software von Staats wegen
1686 STATUS:CONFIRMED
1687 END:VEVENT
1688 BEGIN:VEVENT
1689 DURATION:PT0H30M
1690 LOCATION:Saal 6
1691 SEQUENCE:0
1692 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html
1693 DTSTART;TZID=Europe/Berlin:20121228T124500
1694 UID:5091@29C3@pentabarf.org
1695 DTSTAMP:20121226T143018
1696 CATEGORIES:Lecture
1697 DESCRIPTION:Hardware-basierte Festplattenvollverschlüsselungen in Form s
1698 ogenannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere un
1699 d performante Alternative zu Software-basierter Verschlüsselung wie Bit
1700 Locker und TrueCrypt gesehen. Während der Performance-Gewinn und die Be
1701 nutzerfreundlichkeit von SEDs\, bspw. Intel's SSD 320 bzw. SSD 520\, au
1702 er Frage stehen\, ist der Sicherheits-Gewinn deutlich geringer als bish
1703 er angenommen. Teilweise sind Systeme die auf SEDs basieren gar schwäch
1704 er als vergleichbare Systeme die auf Software-Verschlüsselung basieren.
1705 SUMMARY:(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung
1706 STATUS:CONFIRMED
1707 END:VEVENT
1708 BEGIN:VEVENT
1709 DURATION:PT1H00M
1710 LOCATION:Saal 1
1711 SEQUENCE:0
1712 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5396.en.html
1713 DTSTART;TZID=Europe/Berlin:20121228T160000
1714 UID:5396@29C3@pentabarf.org
1715 DTSTAMP:20121226T143018
1716 CATEGORIES:Lecture
1717 DESCRIPTION:Weltbilder der Informatik sind in mancher Hinsicht denen in d
1718 er Hacker- und Hackerinnen-Community nicht unähnlich.
1719 SUMMARY:Was ist\, was kann\, was soll Gender Studies Informatik?
1720 STATUS:CONFIRMED
1721 END:VEVENT
1722 BEGIN:VEVENT
1723 DURATION:PT1H00M
1724 LOCATION:Saal 1
1725 SEQUENCE:0
1726 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5160.en.html
1727 DTSTART;TZID=Europe/Berlin:20121228T113000
1728 UID:5160@29C3@pentabarf.org
1729 DTSTAMP:20121226T143018
1730 CATEGORIES:Lecture
1731 DESCRIPTION:In the Free City of Hamburg\, which is one of 16 German state
1732 s\, a coalition of hackers\, activists and other players of civil societ
1733 y have drafted the most revolutionary Freedom of information law in the
1734 world. The law obliges the state to proactively publish all important pu
1735 blic information (such as contracts\, studies\, construction permits) in
1736 an OpenData format on the Internet. After the start of a referendum cam
1737 paign\, the law was passed unanimously by the state parliament in June 2
1738 012 to avoid a public vote on it.
1739 SUMMARY:We are all lawmakers! - How to further transparency by law – th
1740 e Hamburg example and beyond ac!
1741 STATUS:CONFIRMED
1742 END:VEVENT
1743 BEGIN:VEVENT
1744 DURATION:PT1H00M
1745 LOCATION:Saal 6
1746 SEQUENCE:0
1747 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5208.en.html
1748 DTSTART;TZID=Europe/Berlin:20121227T160000
1749 UID:5208@29C3@pentabarf.org
1750 DTSTAMP:20121226T143018
1751 CATEGORIES:Lecture
1752 DESCRIPTION:Accessibility of digital content is a hugely misunderstood is
1753 sue. Programmers and content developers tend to view it as a distraction
1754 or a special interest concern. Accessibility advocates fail to describe
1755 it in terms that would put it in the proper place for other technologis
1756 ts\, in particular security practitioners.
1757 We argue that if a format
1758 or a document has systemic accessibility problems\, then accessibility i
1759 s likely to be the least of its problems\; that accessibility only colla
1760 pses first\, like a canAVary in a mine\, and security is next to follow.
1761 We argue that many accessibility problems\, just like many security pro
1762 blems\, stem from documents being hard to parse or containing executable
1763 content\, and that the accessibility community is only the first to suf
1764 fer\, due to not having the manpower to make extremely complicated forma
1765 ts to almost work almost always. It's an arms race tougher than the secu
1766 rity patching cycle\, made worse by there being no common model for what
1767 accessibility properties should look like.
1768 SUMMARY:What accessibility has to do with security
1769 STATUS:CONFIRMED
1770 END:VEVENT
1771 BEGIN:VEVENT
1772 DURATION:PT1H00M
1773 LOCATION:Saal 6
1774 SEQUENCE:0
1775 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5283.en.html
1776 DTSTART;TZID=Europe/Berlin:20121227T203000
1777 UID:5283@29C3@pentabarf.org
1778 DTSTAMP:20121226T143018
1779 CATEGORIES:Lecture
1780 DESCRIPTION:After the political and legislative failure of the blocking a
1781 nd filtering proposals in Germany (#Zensursula) and the EU (Child Protec
1782 tion Directive) several players stepped up to implement the measures tha
1783 t previously have been envisioned as compulsory but now on a "self-regul
1784 atory" basis.
1785 SUMMARY:White IT\, Clean IT & CEO Coalition - How the government tries to
1786 encourage privatized policy inforcement and thereby bypasses and circum
1787 ventsDi democratic processes
1788 STATUS:CONFIRMED
1789 END:VEVENT
1790 BEGIN:VEVENT
1791 DURATION:PT1H00M
1792 LOCATION:Saal 1
1793 SEQUENCE:0
1794 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5327.en.html
1795 DTSTART;TZID=Europe/Berlin:20121229T171500
1796 UID:5327@29C3@pentabarf.org
1797 DTSTAMP:20121226T143018
1798 CATEGORIES:Lecture
1799 DESCRIPTION:This action-packed lecture presents the inner workings of the
1800 author's from-scratch implementation of a USB Mass Storage disk in user
1801 -land Python\, along with some embarrassing bugs in operating systems th
1802 at support such disks. The lecture concludes with an introduction to Ac
1803 tive Antiforensics\, in which a thumbdrive's own firmware can recognize
1804 and defend itself against disk imaging and other forensic tools.
1805 SUMMARY:Writing a Thumbdrive from Scratch - Prototyping Active Disk Antif
1806 orensics
1807 STATUS:CONFIRMED
1808 END:VEVENT
1809 BEGIN:VEVENT
1810 DURATION:PT1H00M
1811 LOCATION:Saal 1
1812 SEQUENCE:0
1813 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5262.en.html
1814 DTSTART;TZID=Europe/Berlin:20121227T140000
1815 UID:5262@29C3@pentabarf.org
1816 DTSTAMP:20121226T143018
1817 CATEGORIES:Lecture
1818 DESCRIPTION:Seit anderthalb Jahren begleitet FragDenStaat.de die deutsche
1819 Informationsfreiheit in der Praxis und dokumentiert die Korrespondenz z
1820 wischen Anfragestellenden und Behörden. Welche Informationen gibt der S
1821 taat preis\, und gegen welche Veröffentlichungen kämpft er sogar bis v
1822 or Gericht? Die interessantesten Fälle werden genauer beleuchtet und ei
1823 ne Bewertung zur Lage der staatlichen Information in Deutschland abgegeb
1824 en.
1825 SUMMARY:Zur Lage der Information - 1.5 Jahre FragDenStaat.de
1826 STATUS:CONFIRMED
1827 END:VEVENT
1828 END:VCALENDAR