Chaotic Congress Cinema Mannheim

Aus RaumZeitLabor Wiki
         
Chaotic Congress Cinema Mannheim

Status: upcoming [box doku]

Beschreibung Geselliges konsumieren von 28C3 Vorträgen
Ansprechpartner  Unicorn, blabber
Tag und Uhrzeit  Donnerstag um ~20:00 Uhr
Rhythmus  Wöchentlich
Preis  Kostenlos

Dieses Event wurde massiv von dem gleichnamigen Event des Attraktor in Hamburg inspiriert.

Chaotic Congress Cinema Mannheim

Jede Woche donnerstags findet gegen 20 Uhr im RaumZeitLabor Mannheim das Chaotic Congress Cinema Mannheim statt. In geselliger Runde werden jeweils zwei Vorträge die auf dem 28C3 aufgezeichnet wurden vorgeführt.

Der Eintritt ist kostenlos und jeder ist willkommen. Getränke, Popcorn, Pizza und Junkfood kann käuflich erworben werden.

Der freundliche Hackerspace von nebenan freut sich auf euren Besuch!

Programmgestaltung

Die Vorträge die vorgeführt werden, werden von den Gastgebern Unicorn und blabber bestimmt. Aus sicherer Quelle ist aber bekannt, dass die Beiden durch gutes Zureden und/oder Matezufuhr beeinflussbar sind. Ausserdem könnt ihr euch, falls euch ein bestimmter Vortrag interessiert, als Interessent in der unteren Tabelle eintragen.

Die Chancen das diese Einträge bei der Programmgestaltung berücksichtigt werden stehen ziemlich gut.

Das Programm für Donnerstag wird jeweils bei der vorangehenden Offene RaumZeitLaborierung und über die Mailingliste bekanntgegeben.

Noch nicht vorgeführte Vorträge

Titel Referent Zusammenfassung Sprache Interessenten
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles Bicyclemark 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. English
802.11 Packets in Packets Travis Goodspeed 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 English
A Brief History of Plutocracy Robin Upton A Brief History of Plutocracy English
Almighty DNA? Susanne Schultz, Uta Wagenmann Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat German
Antiforensik Martin Wundram Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors German
Apple vs. Google Client Platforms Bruhns, FX of Phenoelit, greg Apple vs. Google Client Platforms- How you end up being the Victim. English
Automatic Algorithm Invention with a GPU Wes Faler Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science English
Behind the scenes of a C64 demo Ninja / The Dreams Behind the scenes of a C64 demo English
Bionic Ears Helga Velroyen Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology English
Bitcoin - An Analysis Kay Hamacher, Stefan Katzenbeisser Bitcoin - An Analysis English
Black Ops of TCP/IP 2011 Dan Kaminsky Black Ops of TCP/IP 2011 English
BuggedPlanet Andy Müller-Maguhn BuggedPlanet- Surveillance Industry & Country's Actings English
Building a Distributed Satellite Ground Station Network - A Call To Arms Andreas -horn- Hornig, hadez Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! English
bup: Git for backups Zoran Zaric bup: Git for backups English
Can trains be hacked? Stefan Katzenbeisser Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen German
CCC Camp 2011 Video Impressions CCC Camp 2011 Video Impressions- Reviving a nice summer dream English
Cellular protocol stacks for Internet Harald Welte Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified English
Changing techno-optimists by shaking up the bureaucrats Brenno de Winter Changing techno-optimists by shaking up the bureaucrats English
ChokePointProject - Quis custodiet ipsos custodes? Ruben Bloemgarten ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime English
Closing Event Frank Rieger Closing Event English
Counterlobbying EU institutions Christian Bahls - MOGiS e.V., Jérémie Zimmermann Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet English
Crowdsourcing Genome Wide Association Studies Bastian Greshake, Philipp Bayer Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults English
Datamining for Hackers Stefan Burschka Datamining for Hackers- Encrypted Traffic Mining English
Data Mining the Israeli Census Yuval Adam Data Mining the Israeli Census- Insights into a publicly available registry English
Datenvieh oder Daten-Fee Rene Meissner Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? German
DC+, The Protocol klobs DC+, The Protocol- Technical defense against data retention law English
Deceiving Authorship Detection Michael Brennan, Rachel Greenstadt Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry English
Defending mobile phones Karsten Nohl, Luca Melette Defending mobile phones English
Demokratie auf Sächsisch Josephine Fischer, Tobias Naumann Demokratie auf Sächsisch German
Der Staatstrojaner 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation German
Die Koalition setzt sich aber aktiv und ernsthaft dafür ein maha/Martin Haase Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik German
Does Hacktivism Matter? Kai Denker Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany English
Don't scan, just ask Fabian Mihailowitsch Don't scan, just ask- A new approach of identifying vulnerable web applications English
Eating in the Anthropocene Cathrine Kramer, Zack Denfeld Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes English
Echtes Netz Falk Lüke, Markus Beckedahl Echtes Netz - Kampagne für Netzneutralität German
Effective Denial of Service attacks against web application platforms zeri Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) English
Ein Mittelsmannangriff auf ein digitales Signiergerät Alexander Koch Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 German
Electronic money: The road to Bitcoin and a glimpse forward Peio Popov Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better English
EU-Datenschutz und das Internet der Dinge Andreas Krisch EU-Datenschutz und das Internet der Dinge German
EU-Datenschutz und das Internet der Dinge (english translation) Andreas Krisch EU-Datenschutz und das Internet der Dinge (english translation) German
Evolving custom communication protocols Wes Faler Evolving custom communication protocols- Hell Yeah, it's rocket science English
Fnord-Jahresrückblick Felix von Leitner, Frank Rieger Fnord-Jahresrückblick- von Atomendlager bis Zensus German
Frag den Staat Stefan Wehrmeyer Frag den Staat- Praktische Informationsfreiheit German
From Press Freedom to the Freedom of information Reporters Without Borders From Press Freedom to the Freedom of information- Why every citizen should be concerned English
Hacker Jeopardy Ray, Stefan 'Sec' Zehl Hacker Jeopardy- Number guessing for geeks German
Hacker Jeopardy Translation Hacker Jeopardy Translation English
Hacking MFPs Andrei Costin Hacking MFPs- Part2 - PostScript: Um, you've been hacked English
How governments have tried to block Tor Jacob Appelbaum, Roger Dingledine How governments have tried to block Tor English
Implementation of MITM Attack on HDCP-Secured Links bunnie Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key English
Introducing Osmo-GMR Sylvain Munaut Introducing Osmo-GMR- Building a sniffer for the GMR satphones English
Jahresrückblick Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger Jahresrückblick German
KinectFusion David Kim KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera English
Lightning Talks Day 2 Nick Farr Lightning Talks Day 2 English
Lightning Talks Day 3 Nick Farr Lightning Talks Day 3- Pecha Kucha Round! English
Lightning Talks Day 4 Nick Farr Lightning Talks Day 4 English
Macro dragnets: Why trawl the river when you can do the whole ocean Redbeard Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century English
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies Evgeny Morozov Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies English
"Neue Leichtigkeit" Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger "Neue Leichtigkeit"- when unconditional artistic freedom happens German
New Ways I'm Going to Hack Your Web App Jesse Ou, Rich New Ways I'm Going to Hack Your Web App English
NOC Review Kay, Will Hargrave NOC Review- NOC Review about the Camp 2011 and 28C3 English
Not your Grandfathers moon landing Karsten Becker, Robert Böhme Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! English
NPC - Nerds Pissing Contest Benjamin Kellermann, klobs NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! German
Ooops I hacked my PBX pt Ooops I hacked my PBX- Why auditing proprietary protocols matters English
Open source music: Tracking 2.0 Tom Hargreaves Open source music: Tracking 2.0 English
Pentanews Game Show 2k11/3 Alien8, _john, klobs Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! English
Politik hacken Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation German
Post Memory Corruption Memory Analysis endrazine Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes English
Power gadgets with your own electricity Gunnar Thöle, Jörg Dürre Power gadgets with your own electricity- escape the basement and make the sun work for you English
Print Me If You Dare Ang Cui, Jonathan Voris Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware English
Privacy Invasion or Innovative Science? Conrad Lee Privacy Invasion or Innovative Science?- Academia, social media data, and privacy English
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking Christian Kleineidam, MetaMind Evolution Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers English
Quantum of Science Robert Helling Quantum of Science- How quantum information differs from classical English
r0ket++ lilafisch, Stefan 'Sec' Zehl r0ket++- The CCC-Badge English
Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All Kay Hamacher Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All English
Reverse-engineering a Qualcomm baseband Guillaume Delugré Reverse-engineering a Qualcomm baseband English
Reverse Engineering USB Devices Drew Fisher Reverse Engineering USB Devices English
Rootkits in your Web application Artur Janc Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. English
Sachsen dreht frei Anne Roth Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können German
SCADA and PLC Vulnerabilities in Correctional Facilities Teague, Tiffany Rad SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs English
Security Log Visualization with a Correlation Engine Chris Kubecka Security Log Visualization with a Correlation Engine- What's inside your network? English
Security Nightmares Frank Rieger, Ron Security Nightmares German
Smart Hacking For Privacy Dario Carluccio, Stephan Brinkhaus Smart Hacking For Privacy English
Sovereign Keys Peter Eckersley Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC English
String Oriented Programming Mathias Payer String Oriented Programming- Circumventing ASLR, DEP, and Other Guards English
Taking control over the Tor network Eric Filiol, Seun Omosowon Taking control over the Tor network English
The Atari 2600 Video Computer System: The Ultimate Talk Sven Oliver ('SvOlli') Moll The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs English
The best of The oXcars Simona Xnet The best of The oXcars- the greatest free/Libre culture show of all times English
The coming war on general computation Cory Doctorow The coming war on general computation- The copyright war was just the beginning English
The engineering part of social engineering Aluc The engineering part of social engineering- Why just lying your way in won't get you anywhere English
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? Jean-Jacques Quisquater, Renaud Devaliere The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems English
The Hack will not be televised? Caspar Clemens Mierau The Hack will not be televised?- Hacker in Movies English
The movements against state-controlled Internet in Turkey Bar, seda The movements against state-controlled Internet in Turkey- A short account of its history and future challenges English
The Science of Insecurity Meredith L. Patterson, Sergey The Science of Insecurity English
Time is on my Side Sebastian Schinzel Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web English
Towards a Single Secure European Cyberspace? Suso Baleato Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. English
TRESOR: Festplatten sicher verschlüsseln tilo TRESOR: Festplatten sicher verschlüsseln German
What is in a name? Christoph Engemann What is in a name?- Identity-Regimes from 1500 to the 2000s English
What is WhiteIT and what does it aim for? Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. English
Your Disaster/Crisis/Revolution just got Pwned Herr Urbach, willowbl00 Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response English

Bereits vorgeführte Vorträge

noch keine

Sonstiges

Die Vortragstabelle wurde per XSLT aus dieser Datei erstellt.