Chaotic Congress Cinema Mannheim

Aus RaumZeitLabor Wiki
         
Chaotic Congress Cinema Mannheim

Status: stable [box doku]

Beschreibung Geselliges konsumieren von 28C3 Vorträgen
Ansprechpartner  blabber, silsha
Tag und Uhrzeit  Donnerstag um 20:00 Uhr
Rhythmus  Wöchentlich
Preis  Kostenlos

Dieses Event wurde massiv von dem gleichnamigen Event des Attraktor in Hamburg inspiriert.

Chaotic Congress Cinema Mannheim

Jede Woche donnerstags findet ab 20 Uhr im RaumZeitLabor Mannheim das Chaotic Congress Cinema Mannheim (kurz: CCC Mannheim) statt. In geselliger Runde werden jeweils zwei Stunden lang Vorträge, die auf dem 28C3 aufgezeichnet wurden, vorgeführt.

Der Eintritt ist kostenlos und jeder ist willkommen. Getränke, Popcorn, Pizza und Junkfood kann käuflich erworben werden.

Der freundliche Hackerspace von nebenan freut sich auf euren Besuch!

Programmgestaltung

Die Vorträge die vorgeführt werden, werden von den Gastgebern blabber und silsha bestimmt. Aus sicherer Quelle ist aber bekannt, dass die Zwei durch gutes Zureden und/oder Matezufuhr beeinflussbar sind. Ausserdem könnt ihr euch, falls euch ein bestimmter Vortrag interessiert, als Interessent in der unteren Tabelle eintragen.

Die Chancen das diese Einträge bei der Programmgestaltung berücksichtigt werden stehen ziemlich gut.

Das Programm für Donnerstag wird jeweils über die Mailingliste bekanntgegeben.

Upcoming

Als nächstes werden folgende Mitschnitte vorgeführt.

Titel Referent Zusammenfassung Dauer Sprache

Noch nicht vorgeführte Vorträge

Titel Referent Zusammenfassung Dauer Sprache Interessenten
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles Bicyclemark 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. 01H00M00S English
A Brief History of Plutocracy Robin Upton A Brief History of Plutocracy 00H30M00S English
Almighty DNA? Susanne Schultz, Uta Wagenmann Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat 01H00M00S German
Bitcoin - An Analysis Kay Hamacher, Stefan Katzenbeisser Bitcoin - An Analysis 01H00M00S English
Black Ops of TCP/IP 2011 Dan Kaminsky Black Ops of TCP/IP 2011 01H00M00S English
BuggedPlanet Andy Müller-Maguhn BuggedPlanet- Surveillance Industry & Country's Actings 01H00M00S English
Building a Distributed Satellite Ground Station Network - A Call To Arms Andreas -horn- Hornig, hadez Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! 01H00M00S English
bup: Git for backups Zoran Zaric bup: Git for backups 00H30M00S English
Can trains be hacked? Stefan Katzenbeisser Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen 01H00M00S German
CCC Camp 2011 Video Impressions CCC Camp 2011 Video Impressions- Reviving a nice summer dream 01H00M00S English
Cellular protocol stacks for Internet Harald Welte Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified 01H00M00S English
Changing techno-optimists by shaking up the bureaucrats Brenno de Winter Changing techno-optimists by shaking up the bureaucrats 01H00M00S English
ChokePointProject - Quis custodiet ipsos custodes? Ruben Bloemgarten ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime 00H30M00S English
Closing Event Frank Rieger Closing Event 00H30M00S English
Counterlobbying EU institutions Christian Bahls - MOGiS e.V., Jérémie Zimmermann Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet 01H00M00S English
Crowdsourcing Genome Wide Association Studies Bastian Greshake, Philipp Bayer Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults 01H00M00S English
Datamining for Hackers Stefan Burschka Datamining for Hackers- Encrypted Traffic Mining 01H00M00S English
Data Mining the Israeli Census Yuval Adam Data Mining the Israeli Census- Insights into a publicly available registry 00H30M00S English
DC+, The Protocol klobs DC+, The Protocol- Technical defense against data retention law 01H00M00S English
Deceiving Authorship Detection Michael Brennan, Rachel Greenstadt Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry 01H00M00S English
Defending mobile phones Karsten Nohl, Luca Melette Defending mobile phones 01H00M00S English
Der Staatstrojaner 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation 02H15M00S German
Does Hacktivism Matter? Kai Denker Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany 01H00M00S English
Don't scan, just ask Fabian Mihailowitsch Don't scan, just ask- A new approach of identifying vulnerable web applications 00H30M00S English
Echtes Netz Falk Lüke, Markus Beckedahl Echtes Netz - Kampagne für Netzneutralität 01H00M00S German
Effective Denial of Service attacks against web application platforms zeri Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) 01H00M00S English
EU-Datenschutz und das Internet der Dinge (english translation) Andreas Krisch EU-Datenschutz und das Internet der Dinge (english translation) 01H00M00S German
Evolving custom communication protocols Wes Faler Evolving custom communication protocols- Hell Yeah, it's rocket science 01H00M00S English
Frag den Staat Stefan Wehrmeyer Frag den Staat- Praktische Informationsfreiheit 00H30M00S German
From Press Freedom to the Freedom of information Reporters Without Borders From Press Freedom to the Freedom of information- Why every citizen should be concerned 01H00M00S English
Hacker Jeopardy Ray, Stefan 'Sec' Zehl Hacker Jeopardy- Number guessing for geeks 02H00M00S German
Hacker Jeopardy Translation Hacker Jeopardy Translation 01H45M00S English
How governments have tried to block Tor Jacob Appelbaum, Roger Dingledine How governments have tried to block Tor 01H00M00S English
Implementation of MITM Attack on HDCP-Secured Links bunnie Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key 01H00M00S English
Introducing Osmo-GMR Sylvain Munaut Introducing Osmo-GMR- Building a sniffer for the GMR satphones 01H00M00S English
Jahresrückblick Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger Jahresrückblick 02H15M00S German
Lightning Talks Day 2 Nick Farr Lightning Talks Day 2 02H15M00S English
Lightning Talks Day 3 Nick Farr Lightning Talks Day 3- Pecha Kucha Round! 02H15M00S English
Lightning Talks Day 4 Nick Farr Lightning Talks Day 4 02H15M00S English
Macro dragnets: Why trawl the river when you can do the whole ocean Redbeard Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century 01H00M00S English
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies Evgeny Morozov Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies 01H00M00S English
"Neue Leichtigkeit" Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger "Neue Leichtigkeit"- when unconditional artistic freedom happens 01H30M00S German
New Ways I'm Going to Hack Your Web App Jesse Ou, Rich New Ways I'm Going to Hack Your Web App 01H00M00S English
NOC Review Kay, Will Hargrave NOC Review- NOC Review about the Camp 2011 and 28C3 00H30M00S English
Not your Grandfathers moon landing Karsten Becker, Robert Böhme Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! 01H00M00S English
NPC - Nerds Pissing Contest Benjamin Kellermann, klobs NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! 01H00M00S German
Ooops I hacked my PBX pt Ooops I hacked my PBX- Why auditing proprietary protocols matters 00H30M00S English
Open source music: Tracking 2.0 Tom Hargreaves Open source music: Tracking 2.0 00H30M00S English
Pentanews Game Show 2k11/3 Alien8, _john, klobs Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! 01H00M00S English
Post Memory Corruption Memory Analysis endrazine Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes 01H00M00S English
Privacy Invasion or Innovative Science? Conrad Lee Privacy Invasion or Innovative Science?- Academia, social media data, and privacy 01H00M00S English
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking Christian Kleineidam, MetaMind Evolution Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers 01H00M00S English
r0ket++ lilafisch, Stefan 'Sec' Zehl r0ket++- The CCC-Badge 01H00M00S English
Reverse-engineering a Qualcomm baseband Guillaume Delugré Reverse-engineering a Qualcomm baseband 01H00M00S English
Reverse Engineering USB Devices Drew Fisher Reverse Engineering USB Devices 00H30M00S English
Rootkits in your Web application Artur Janc Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. 01H00M00S English
Sachsen dreht frei Anne Roth Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können 01H00M00S German
SCADA and PLC Vulnerabilities in Correctional Facilities Teague, Tiffany Rad SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs 01H00M00S English
Security Log Visualization with a Correlation Engine Chris Kubecka Security Log Visualization with a Correlation Engine- What's inside your network? 00H30M00S English
Sovereign Keys Peter Eckersley Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC 01H00M00S English
String Oriented Programming Mathias Payer String Oriented Programming- Circumventing ASLR, DEP, and Other Guards 01H00M00S English
Taking control over the Tor network Eric Filiol, Seun Omosowon Taking control over the Tor network 01H15M00S English
The best of The oXcars Simona Xnet The best of The oXcars- the greatest free/Libre culture show of all times 01H00M00S English
The engineering part of social engineering Aluc The engineering part of social engineering- Why just lying your way in won't get you anywhere 01H00M00S English
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? Jean-Jacques Quisquater, Renaud Devaliere The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems 01H00M00S English
The movements against state-controlled Internet in Turkey Bar, seda The movements against state-controlled Internet in Turkey- A short account of its history and future challenges 01H00M00S English
The Science of Insecurity Meredith L. Patterson, Sergey The Science of Insecurity 01H00M00S English
Time is on my Side Sebastian Schinzel Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web 01H00M00S English
Towards a Single Secure European Cyberspace? Suso Baleato Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. 01H00M00S English
TRESOR: Festplatten sicher verschlüsseln tilo TRESOR: Festplatten sicher verschlüsseln 00H30M00S German
What is in a name? Christoph Engemann What is in a name?- Identity-Regimes from 1500 to the 2000s 01H00M00S English
What is WhiteIT and what does it aim for? Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. 01H00M00S English
Your Disaster/Crisis/Revolution just got Pwned Herr Urbach, willowbl00 Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response 01H00M00S English

Bereits vorgeführte Vorträge

Datum Titel Referent Zusammenfassung Dauer Sprache
23.08.2012 Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All Kay Hamacher Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All 01H00M00S English
23.08.2012 SIGINT12: Men who stare at bits nuit, Murx Men who stare at bits- Die abenteuerliche Analyse des Datenformats eines real existierenden RFID-basierten bargeldosen Bezahlsystems 00H45M00S German
26.07.2012 EU-Datenschutz und das Internet der Dinge Andreas Krisch EU-Datenschutz und das Internet der Dinge 01H00M00S German
26.07.2012 Quantum of Science Robert Helling Quantum of Science- How quantum information differs from classical 01H00M00S English
12.07.2012 Smart Hacking For Privacy Dario Carluccio, Stephan Brinkhaus Smart Hacking For Privacy 01H00M00S English
12.07.2012 Power gadgets with your own electricity Gunnar Thöle, Jörg Dürre Power gadgets with your own electricity- escape the basement and make the sun work for you 01H00M00S English
05.07.2012 Hacking MFPs Andrei Costin Hacking MFPs- Part2 - PostScript: Um, you've been hacked 01H00M00S English
05.07.2012 Print Me If You Dare Ang Cui, Jonathan Voris Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware 01H00M00S English
28.06.2012 802.11 Packets in Packets Travis Goodspeed 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 01H00M00S English
28.06.2012 Tracker fahrn Denis, Erdgeist, Cristian Yxen Tracker fahrn- We Track Harder - We Track More! Take the pain out of running a Bittorrent-Tracker! 01H00M00S German
21.06.2012 Apple vs. Google Client Platforms Bruhns, FX of Phenoelit, greg Apple vs. Google Client Platforms- How you end up being the Victim. 01H00M00S English
21.06.2012 Ein Mittelsmannangriff auf ein digitales Signiergerät Alexander Koch Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 01H00M00S German
14.06.2012 Antiforensik Martin Wundram Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors 00H30M00S German
14.06.2012 Fnord-Jahresrückblick Felix von Leitner, Frank Rieger Fnord-Jahresrückblick- von Atomendlager bis Zensus 01H00M00S German
31.05.2012 KinectFusion David Kim KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera 01H00M00S English
31.05.2012 Automatic Algorithm Invention with a GPU Wes Faler Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science 01H00M00S English
24.05.2012 The Hack will not be televised? Caspar Clemens Mierau The Hack will not be televised?- Hacker in Movies 01H00M00S English
24.05.2012 Security Nightmares Frank Rieger, Ron Security Nightmares 01H00M00S German
10.05.2012 Behind the scenes of a C64 demo Ninja / The Dreams Behind the scenes of a C64 demo 01H00M00S English
10.05.2012 The Atari 2600 Video Computer System: The Ultimate Talk Sven Oliver ('SvOlli') Moll The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs 01H00M00S English
03.05.2012 Bionic Ears Helga Velroyen Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology 01H00M00S English
03.05.2012 Datenvieh oder Daten-Fee Rene Meissner Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? 01H00M00S German
26.04.2012 Eating in the Anthropocene Cathrine Kramer, Zack Denfeld Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes 01H00M00S English
26.04.2012 Die Koalition setzt sich aber aktiv und ernsthaft dafür ein maha/Martin Haase Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik 01H00M00S German
19.04.2012 Electronic money: The road to Bitcoin and a glimpse forward Peio Popov Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better 01H00M00S English
19.04.2012 Demokratie auf Sächsisch Josephine Fischer, Tobias Naumann Demokratie auf Sächsisch 01H00M00S German
12.04.2012 The coming war on general computation Cory Doctorow The coming war on general computation- The copyright war was just the beginning 01H00M00S English
12.04.2012 Politik hacken Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation 01H00M00S German

Sonstiges

Die Vortragstabelle wurde per XSLT aus dieser Datei erstellt.