Chaotic Congress Cinema Mannheim
Chaotic Congress Cinema Mannheim Status: stable [box doku] | |
---|---|
Beschreibung | Geselliges konsumieren von 28C3 Vorträgen |
Ansprechpartner | blabber, silsha |
Tag und Uhrzeit | Donnerstag um 20:00 Uhr |
Rhythmus | Wöchentlich |
Preis | Kostenlos |
Dieses Event wurde massiv von dem gleichnamigen Event des Attraktor in Hamburg inspiriert.
Chaotic Congress Cinema Mannheim
Jede Woche donnerstags findet ab 20 Uhr im RaumZeitLabor Mannheim das Chaotic Congress Cinema Mannheim (kurz: CCC Mannheim) statt. In geselliger Runde werden jeweils zwei Stunden lang Vorträge, die auf dem 28C3 aufgezeichnet wurden, vorgeführt.
Der Eintritt ist kostenlos und jeder ist willkommen. Getränke, Popcorn, Pizza und Junkfood kann käuflich erworben werden.
Der freundliche Hackerspace von nebenan freut sich auf euren Besuch!
Programmgestaltung
Die Vorträge die vorgeführt werden, werden von den Gastgebern blabber und silsha bestimmt. Aus sicherer Quelle ist aber bekannt, dass die Zwei durch gutes Zureden und/oder Matezufuhr beeinflussbar sind. Ausserdem könnt ihr euch, falls euch ein bestimmter Vortrag interessiert, als Interessent in der unteren Tabelle eintragen.
Die Chancen das diese Einträge bei der Programmgestaltung berücksichtigt werden stehen ziemlich gut.
Das Programm für Donnerstag wird jeweils über die Mailingliste bekanntgegeben.
Upcoming
Als nächstes werden folgende Mitschnitte vorgeführt.
Titel | Referent | Zusammenfassung | Dauer | Sprache |
---|---|---|---|---|
Apple vs. Google Client Platforms | Bruhns, FX of Phenoelit, greg | Apple vs. Google Client Platforms- How you end up being the Victim. | 01H00M00S | English |
Ein Mittelsmannangriff auf ein digitales Signiergerät | Alexander Koch | Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 | 01H00M00S | German |
Noch nicht vorgeführte Vorträge
Titel | Referent | Zusammenfassung | Dauer | Sprache | Interessenten |
---|---|---|---|---|---|
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles | Bicyclemark | 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. | 01H00M00S | English | |
802.11 Packets in Packets | Travis Goodspeed | 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 | 01H00M00S | English | |
A Brief History of Plutocracy | Robin Upton | A Brief History of Plutocracy | 00H30M00S | English | |
Almighty DNA? | Susanne Schultz, Uta Wagenmann | Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat | 01H00M00S | German | |
Bitcoin - An Analysis | Kay Hamacher, Stefan Katzenbeisser | Bitcoin - An Analysis | 01H00M00S | English | |
Black Ops of TCP/IP 2011 | Dan Kaminsky | Black Ops of TCP/IP 2011 | 01H00M00S | English | |
BuggedPlanet | Andy Müller-Maguhn | BuggedPlanet- Surveillance Industry & Country's Actings | 01H00M00S | English | |
Building a Distributed Satellite Ground Station Network - A Call To Arms | Andreas -horn- Hornig, hadez | Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! | 01H00M00S | English | |
bup: Git for backups | Zoran Zaric | bup: Git for backups | 00H30M00S | English | |
Can trains be hacked? | Stefan Katzenbeisser | Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen | 01H00M00S | German | |
CCC Camp 2011 Video Impressions | CCC Camp 2011 Video Impressions- Reviving a nice summer dream | 01H00M00S | English | ||
Cellular protocol stacks for Internet | Harald Welte | Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified | 01H00M00S | English | |
Changing techno-optimists by shaking up the bureaucrats | Brenno de Winter | Changing techno-optimists by shaking up the bureaucrats | 01H00M00S | English | |
ChokePointProject - Quis custodiet ipsos custodes? | Ruben Bloemgarten | ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime | 00H30M00S | English | |
Closing Event | Frank Rieger | Closing Event | 00H30M00S | English | |
Counterlobbying EU institutions | Christian Bahls - MOGiS e.V., Jérémie Zimmermann | Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet | 01H00M00S | English | |
Crowdsourcing Genome Wide Association Studies | Bastian Greshake, Philipp Bayer | Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults | 01H00M00S | English | |
Datamining for Hackers | Stefan Burschka | Datamining for Hackers- Encrypted Traffic Mining | 01H00M00S | English | |
Data Mining the Israeli Census | Yuval Adam | Data Mining the Israeli Census- Insights into a publicly available registry | 00H30M00S | English | |
DC+, The Protocol | klobs | DC+, The Protocol- Technical defense against data retention law | 01H00M00S | English | |
Deceiving Authorship Detection | Michael Brennan, Rachel Greenstadt | Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry | 01H00M00S | English | |
Defending mobile phones | Karsten Nohl, Luca Melette | Defending mobile phones | 01H00M00S | English | |
Der Staatstrojaner | 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer | Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation | 02H15M00S | German | |
Does Hacktivism Matter? | Kai Denker | Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany | 01H00M00S | English | |
Don't scan, just ask | Fabian Mihailowitsch | Don't scan, just ask- A new approach of identifying vulnerable web applications | 00H30M00S | English | |
Echtes Netz | Falk Lüke, Markus Beckedahl | Echtes Netz - Kampagne für Netzneutralität | 01H00M00S | German | |
Effective Denial of Service attacks against web application platforms | zeri | Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) | 01H00M00S | English | |
EU-Datenschutz und das Internet der Dinge | Andreas Krisch | EU-Datenschutz und das Internet der Dinge | 01H00M00S | German | |
EU-Datenschutz und das Internet der Dinge (english translation) | Andreas Krisch | EU-Datenschutz und das Internet der Dinge (english translation) | 01H00M00S | German | |
Evolving custom communication protocols | Wes Faler | Evolving custom communication protocols- Hell Yeah, it's rocket science | 01H00M00S | English | |
Frag den Staat | Stefan Wehrmeyer | Frag den Staat- Praktische Informationsfreiheit | 00H30M00S | German | |
From Press Freedom to the Freedom of information | Reporters Without Borders | From Press Freedom to the Freedom of information- Why every citizen should be concerned | 01H00M00S | English | |
Hacker Jeopardy | Ray, Stefan 'Sec' Zehl | Hacker Jeopardy- Number guessing for geeks | 02H00M00S | German | |
Hacker Jeopardy Translation | Hacker Jeopardy Translation | 01H45M00S | English | ||
Hacking MFPs | Andrei Costin | Hacking MFPs- Part2 - PostScript: Um, you've been hacked | 01H00M00S | English | |
How governments have tried to block Tor | Jacob Appelbaum, Roger Dingledine | How governments have tried to block Tor | 01H00M00S | English | |
Implementation of MITM Attack on HDCP-Secured Links | bunnie | Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key | 01H00M00S | English | |
Introducing Osmo-GMR | Sylvain Munaut | Introducing Osmo-GMR- Building a sniffer for the GMR satphones | 01H00M00S | English | |
Jahresrückblick | Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger | Jahresrückblick | 02H15M00S | German | |
Lightning Talks Day 2 | Nick Farr | Lightning Talks Day 2 | 02H15M00S | English | |
Lightning Talks Day 3 | Nick Farr | Lightning Talks Day 3- Pecha Kucha Round! | 02H15M00S | English | |
Lightning Talks Day 4 | Nick Farr | Lightning Talks Day 4 | 02H15M00S | English | |
Macro dragnets: Why trawl the river when you can do the whole ocean | Redbeard | Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century | 01H00M00S | English | |
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | Evgeny Morozov | Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies | 01H00M00S | English | |
"Neue Leichtigkeit" | Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger | "Neue Leichtigkeit"- when unconditional artistic freedom happens | 01H30M00S | German | |
New Ways I'm Going to Hack Your Web App | Jesse Ou, Rich | New Ways I'm Going to Hack Your Web App | 01H00M00S | English | |
NOC Review | Kay, Will Hargrave | NOC Review- NOC Review about the Camp 2011 and 28C3 | 00H30M00S | English | |
Not your Grandfathers moon landing | Karsten Becker, Robert Böhme | Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! | 01H00M00S | English | |
NPC - Nerds Pissing Contest | Benjamin Kellermann, klobs | NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! | 01H00M00S | German | |
Ooops I hacked my PBX | pt | Ooops I hacked my PBX- Why auditing proprietary protocols matters | 00H30M00S | English | |
Open source music: Tracking 2.0 | Tom Hargreaves | Open source music: Tracking 2.0 | 00H30M00S | English | |
Pentanews Game Show 2k11/3 | Alien8, _john, klobs | Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! | 01H00M00S | English | |
Post Memory Corruption Memory Analysis | endrazine | Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes | 01H00M00S | English | |
Power gadgets with your own electricity | Gunnar Thöle, Jörg Dürre | Power gadgets with your own electricity- escape the basement and make the sun work for you | 01H00M00S | English | |
Print Me If You Dare | Ang Cui, Jonathan Voris | Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware | 01H00M00S | English | |
Privacy Invasion or Innovative Science? | Conrad Lee | Privacy Invasion or Innovative Science?- Academia, social media data, and privacy | 01H00M00S | English | |
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking | Christian Kleineidam, MetaMind Evolution | Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers | 01H00M00S | English | |
Quantum of Science | Robert Helling | Quantum of Science- How quantum information differs from classical | 01H00M00S | English | |
r0ket++ | lilafisch, Stefan 'Sec' Zehl | r0ket++- The CCC-Badge | 01H00M00S | English | |
Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | Kay Hamacher | Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All | 01H00M00S | English | |
Reverse-engineering a Qualcomm baseband | Guillaume Delugré | Reverse-engineering a Qualcomm baseband | 01H00M00S | English | |
Reverse Engineering USB Devices | Drew Fisher | Reverse Engineering USB Devices | 00H30M00S | English | |
Rootkits in your Web application | Artur Janc | Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. | 01H00M00S | English | |
Sachsen dreht frei | Anne Roth | Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können | 01H00M00S | German | |
SCADA and PLC Vulnerabilities in Correctional Facilities | Teague, Tiffany Rad | SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs | 01H00M00S | English | |
Security Log Visualization with a Correlation Engine | Chris Kubecka | Security Log Visualization with a Correlation Engine- What's inside your network? | 00H30M00S | English | |
Smart Hacking For Privacy | Dario Carluccio, Stephan Brinkhaus | Smart Hacking For Privacy | 01H00M00S | English | |
Sovereign Keys | Peter Eckersley | Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC | 01H00M00S | English | |
String Oriented Programming | Mathias Payer | String Oriented Programming- Circumventing ASLR, DEP, and Other Guards | 01H00M00S | English | |
Taking control over the Tor network | Eric Filiol, Seun Omosowon | Taking control over the Tor network | 01H15M00S | English | |
The best of The oXcars | Simona Xnet | The best of The oXcars- the greatest free/Libre culture show of all times | 01H00M00S | English | |
The engineering part of social engineering | Aluc | The engineering part of social engineering- Why just lying your way in won't get you anywhere | 01H00M00S | English | |
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? | Jean-Jacques Quisquater, Renaud Devaliere | The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems | 01H00M00S | English | |
The movements against state-controlled Internet in Turkey | Bar, seda | The movements against state-controlled Internet in Turkey- A short account of its history and future challenges | 01H00M00S | English | |
The Science of Insecurity | Meredith L. Patterson, Sergey | The Science of Insecurity | 01H00M00S | English | |
Time is on my Side | Sebastian Schinzel | Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web | 01H00M00S | English | |
Towards a Single Secure European Cyberspace? | Suso Baleato | Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. | 01H00M00S | English | |
TRESOR: Festplatten sicher verschlüsseln | tilo | TRESOR: Festplatten sicher verschlüsseln | 00H30M00S | German | |
What is in a name? | Christoph Engemann | What is in a name?- Identity-Regimes from 1500 to the 2000s | 01H00M00S | English | |
What is WhiteIT and what does it aim for? | Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft | What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. | 01H00M00S | English | |
Your Disaster/Crisis/Revolution just got Pwned | Herr Urbach, willowbl00 | Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response | 01H00M00S | English |
Bereits vorgeführte Vorträge
Datum | Titel | Referent | Zusammenfassung | Dauer | Sprache |
---|---|---|---|---|---|
14.06.2012 | Antiforensik | Martin Wundram | Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors | 00H30M00S | German |
14.06.2012 | Fnord-Jahresrückblick | Felix von Leitner, Frank Rieger | Fnord-Jahresrückblick- von Atomendlager bis Zensus | 01H00M00S | German |
31.05.2012 | KinectFusion | David Kim | KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera | 01H00M00S | English |
31.05.2012 | Automatic Algorithm Invention with a GPU | Wes Faler | Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science | 01H00M00S | English |
24.05.2012 | The Hack will not be televised? | Caspar Clemens Mierau | The Hack will not be televised?- Hacker in Movies | 01H00M00S | English |
24.05.2012 | Security Nightmares | Frank Rieger, Ron | Security Nightmares | 01H00M00S | German |
10.05.2012 | Behind the scenes of a C64 demo | Ninja / The Dreams | Behind the scenes of a C64 demo | 01H00M00S | English |
10.05.2012 | The Atari 2600 Video Computer System: The Ultimate Talk | Sven Oliver ('SvOlli') Moll | The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs | 01H00M00S | English |
03.05.2012 | Bionic Ears | Helga Velroyen | Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology | 01H00M00S | English |
03.05.2012 | Datenvieh oder Daten-Fee | Rene Meissner | Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? | 01H00M00S | German |
26.04.2012 | Eating in the Anthropocene | Cathrine Kramer, Zack Denfeld | Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes | 01H00M00S | English |
26.04.2012 | Die Koalition setzt sich aber aktiv und ernsthaft dafür ein | maha/Martin Haase | Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik | 01H00M00S | German |
19.04.2012 | Electronic money: The road to Bitcoin and a glimpse forward | Peio Popov | Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better | 01H00M00S | English |
19.04.2012 | Demokratie auf Sächsisch | Josephine Fischer, Tobias Naumann | Demokratie auf Sächsisch | 01H00M00S | German |
12.04.2012 | The coming war on general computation | Cory Doctorow | The coming war on general computation- The copyright war was just the beginning | 01H00M00S | English |
12.04.2012 | Politik hacken | Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger | Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation | 01H00M00S | German |
Sonstiges
Die Vortragstabelle wurde per XSLT aus dieser Datei erstellt.