Chaotic Congress Cinema Mannheim: Unterschied zwischen den Versionen

Aus RaumZeitLabor Wiki
Zur Navigation springen Zur Suche springen
Zeile 56: Zeile 56:
=== Noch nicht vorgeführte Vorträge ===
=== Noch nicht vorgeführte Vorträge ===


{| class="wikitable" valign="top"
{| class="wikitable" valign="top"
!Titel
!Titel
!Referent
!Referent
!Zusammenfassung
!Zusammenfassung
!Dauer
!Sprache
!Sprache
!Interessenten
!Interessenten
|-  
|-
| [http://events.ccc.de/congress/2011/Fahrplan/events/4816.en.html 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles]
| [http://events.ccc.de/congress/2011/Fahrplan/events/4816.en.html 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles]
| Bicyclemark
| Bicyclemark
| 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns.
| 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns.
| 01H00M00S
| English
| English
|
|
Zeile 72: Zeile 74:
| Travis Goodspeed
| Travis Goodspeed
| 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1
| 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1
| 01H00M00S
| English
| English
|
|
Zeile 78: Zeile 81:
| Robin Upton
| Robin Upton
| A Brief History of Plutocracy
| A Brief History of Plutocracy
| 00H30M00S
| English
| English
|
|
Zeile 84: Zeile 88:
| Susanne Schultz, Uta Wagenmann
| Susanne Schultz, Uta Wagenmann
| Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat
| Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat
| 01H00M00S
| German
| German
|
|
Zeile 90: Zeile 95:
| Martin Wundram
| Martin Wundram
| Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors
| Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors
| 00H30M00S
| German
| German
|
|
Zeile 96: Zeile 102:
| Bruhns, FX of Phenoelit, greg
| Bruhns, FX of Phenoelit, greg
| Apple vs. Google Client Platforms- How you end up being the Victim.
| Apple vs. Google Client Platforms- How you end up being the Victim.
| 01H00M00S
| English
| English
|
|
Zeile 102: Zeile 109:
| Wes Faler
| Wes Faler
| Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science
| Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science
| 01H00M00S
| English
| English
|
|
Zeile 108: Zeile 116:
| Ninja / The Dreams
| Ninja / The Dreams
| Behind the scenes of a C64 demo
| Behind the scenes of a C64 demo
| 01H00M00S
| English
| English
|
|
Zeile 114: Zeile 123:
| Helga Velroyen
| Helga Velroyen
| Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology
| Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology
| 01H00M00S
| English
| English
|
|
Zeile 120: Zeile 130:
| Kay Hamacher, Stefan Katzenbeisser
| Kay Hamacher, Stefan Katzenbeisser
| Bitcoin - An Analysis
| Bitcoin - An Analysis
| 01H00M00S
| English
| English
|
|
Zeile 126: Zeile 137:
| Dan Kaminsky
| Dan Kaminsky
| Black Ops of TCP/IP 2011
| Black Ops of TCP/IP 2011
| 01H00M00S
| English
| English
|
|
Zeile 132: Zeile 144:
| Andy Müller-Maguhn
| Andy Müller-Maguhn
| BuggedPlanet- Surveillance Industry & Country's Actings
| BuggedPlanet- Surveillance Industry & Country's Actings
| 01H00M00S
| English
| English
|
|
Zeile 138: Zeile 151:
| Andreas -horn- Hornig, hadez
| Andreas -horn- Hornig, hadez
| Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites.  Hackers need internet over satellites.  Satellites require ground stations.  Let's build them!
| Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites.  Hackers need internet over satellites.  Satellites require ground stations.  Let's build them!
| 01H00M00S
| English
| English
|
|
Zeile 144: Zeile 158:
| Zoran Zaric
| Zoran Zaric
| bup: Git for backups
| bup: Git for backups
| 00H30M00S
| English
| English
|
|
Zeile 150: Zeile 165:
| Stefan Katzenbeisser
| Stefan Katzenbeisser
| Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen
| Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen
| 01H00M00S
| German
| German
|
|
Zeile 156: Zeile 172:
|  
|  
| CCC Camp 2011 Video Impressions- Reviving a nice summer dream
| CCC Camp 2011 Video Impressions- Reviving a nice summer dream
| 01H00M00S
| English
| English
|
|
Zeile 162: Zeile 179:
| Harald Welte
| Harald Welte
| Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified
| Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified
| 01H00M00S
| English
| English
|
|
Zeile 168: Zeile 186:
| Brenno de Winter
| Brenno de Winter
| Changing techno-optimists by shaking up the bureaucrats
| Changing techno-optimists by shaking up the bureaucrats
| 01H00M00S
| English
| English
|
|
Zeile 174: Zeile 193:
| Ruben Bloemgarten
| Ruben Bloemgarten
| ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime
| ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime
| 00H30M00S
| English
| English
|
|
Zeile 180: Zeile 200:
| Frank Rieger
| Frank Rieger
| Closing Event
| Closing Event
| 00H30M00S
| English
| English
|
|
Zeile 186: Zeile 207:
| Christian Bahls - MOGiS e.V., Jérémie Zimmermann
| Christian Bahls - MOGiS e.V., Jérémie Zimmermann
| Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet
| Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet
| 01H00M00S
| English
| English
|
|
Zeile 192: Zeile 214:
| Bastian Greshake, Philipp Bayer
| Bastian Greshake, Philipp Bayer
| Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults
| Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults
| 01H00M00S
| English
| English
|
|
Zeile 198: Zeile 221:
| Stefan Burschka
| Stefan Burschka
| Datamining for Hackers- Encrypted Traffic Mining
| Datamining for Hackers- Encrypted Traffic Mining
| 01H00M00S
| English
| English
|
|
Zeile 204: Zeile 228:
| Yuval Adam
| Yuval Adam
| Data Mining the Israeli Census- Insights into a publicly available registry
| Data Mining the Israeli Census- Insights into a publicly available registry
| 00H30M00S
| English
| English
|
|
Zeile 210: Zeile 235:
| Rene Meissner
| Rene Meissner
| Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten?
| Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten?
| 01H00M00S
| German
| German
|
|
Zeile 216: Zeile 242:
| klobs
| klobs
| DC+, The Protocol- Technical defense against data retention law
| DC+, The Protocol- Technical defense against data retention law
| 01H00M00S
| English
| English
|
|
Zeile 222: Zeile 249:
| Michael Brennan, Rachel Greenstadt
| Michael Brennan, Rachel Greenstadt
| Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry
| Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry
| 01H00M00S
| English
| English
|
|
Zeile 228: Zeile 256:
| Karsten Nohl, Luca Melette
| Karsten Nohl, Luca Melette
| Defending mobile phones
| Defending mobile phones
| 01H00M00S
| English
| English
|
|
Zeile 234: Zeile 263:
| Josephine Fischer, Tobias Naumann
| Josephine Fischer, Tobias Naumann
| Demokratie auf Sächsisch
| Demokratie auf Sächsisch
| 01H00M00S
| German
| German
|
|
Zeile 240: Zeile 270:
| 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer
| 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer
| Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation
| Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation
| 02H15M00S
| German
| German
|
|
Zeile 246: Zeile 277:
| maha/Martin Haase
| maha/Martin Haase
| Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik
| Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik
| 01H00M00S
| German
| German
|
|
Zeile 252: Zeile 284:
| Kai Denker
| Kai Denker
| Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany
| Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany
| 01H00M00S
| English
| English
|
|
Zeile 258: Zeile 291:
| Fabian Mihailowitsch
| Fabian Mihailowitsch
| Don't scan, just ask- A new approach of identifying vulnerable web applications
| Don't scan, just ask- A new approach of identifying vulnerable web applications
| 00H30M00S
| English
| English
|
|
Zeile 264: Zeile 298:
| Cathrine Kramer, Zack Denfeld
| Cathrine Kramer, Zack Denfeld
| Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
| Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
| 01H00M00S
| English
| English
|
|
Zeile 270: Zeile 305:
| Falk Lüke, Markus Beckedahl
| Falk Lüke, Markus Beckedahl
| Echtes Netz - Kampagne für Netzneutralität
| Echtes Netz - Kampagne für Netzneutralität
| 01H00M00S
| German
| German
|
|
Zeile 276: Zeile 312:
| Alexander alech Klink, Julian | zeri
| Alexander alech Klink, Julian | zeri
| Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage)
| Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage)
| 01H00M00S
| English
| English
|
|
Zeile 282: Zeile 319:
| Alexander Koch
| Alexander Koch
| Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011
| Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011
| 01H00M00S
| German
| German
|
|
Zeile 288: Zeile 326:
| Peio Popov
| Peio Popov
| Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better
| Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better
| 01H00M00S
| English
| English
|
|
Zeile 294: Zeile 333:
| Andreas Krisch
| Andreas Krisch
| EU-Datenschutz und das Internet der Dinge
| EU-Datenschutz und das Internet der Dinge
| 01H00M00S
| German
| German
|
|
Zeile 300: Zeile 340:
| Andreas Krisch
| Andreas Krisch
| EU-Datenschutz und das Internet der Dinge (english translation)
| EU-Datenschutz und das Internet der Dinge (english translation)
| 01H00M00S
| German
| German
|
|
Zeile 306: Zeile 347:
| Wes Faler
| Wes Faler
| Evolving custom communication protocols- Hell Yeah, it's rocket science
| Evolving custom communication protocols- Hell Yeah, it's rocket science
| 01H00M00S
| English
| English
|
|
Zeile 312: Zeile 354:
| Felix von Leitner, Frank Rieger
| Felix von Leitner, Frank Rieger
| Fnord-Jahresrückblick- von Atomendlager bis Zensus
| Fnord-Jahresrückblick- von Atomendlager bis Zensus
| 01H00M00S
| German
| German
|
|
Zeile 318: Zeile 361:
| Stefan Wehrmeyer
| Stefan Wehrmeyer
| Frag den Staat- Praktische Informationsfreiheit
| Frag den Staat- Praktische Informationsfreiheit
| 00H30M00S
| German
| German
|
|
Zeile 324: Zeile 368:
| Reporters Without Borders
| Reporters Without Borders
| From Press Freedom to the Freedom of information- Why every citizen should be concerned
| From Press Freedom to the Freedom of information- Why every citizen should be concerned
| 01H00M00S
| English
| English
|
|
Zeile 330: Zeile 375:
| Ray, Stefan 'Sec' Zehl
| Ray, Stefan 'Sec' Zehl
| Hacker Jeopardy- Number guessing for geeks
| Hacker Jeopardy- Number guessing for geeks
| 02H00M00S
| German
| German
|
|
Zeile 336: Zeile 382:
|  
|  
| Hacker Jeopardy Translation
| Hacker Jeopardy Translation
| 01H45M00S
| English
| English
|
|
Zeile 342: Zeile 389:
| Andrei Costin
| Andrei Costin
| Hacking MFPs- Part2 - PostScript: Um, you've been hacked
| Hacking MFPs- Part2 - PostScript: Um, you've been hacked
| 01H00M00S
| English
| English
|
|
Zeile 348: Zeile 396:
| Jacob Appelbaum, Roger Dingledine
| Jacob Appelbaum, Roger Dingledine
| How governments have tried to block Tor
| How governments have tried to block Tor
| 01H00M00S
| English
| English
|
|
Zeile 354: Zeile 403:
| bunnie
| bunnie
| Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key
| Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key
| 01H00M00S
| English
| English
|
|
Zeile 360: Zeile 410:
| Sylvain Munaut
| Sylvain Munaut
| Introducing Osmo-GMR- Building a sniffer for the GMR satphones
| Introducing Osmo-GMR- Building a sniffer for the GMR satphones
| 01H00M00S
| English
| English
|
|
Zeile 366: Zeile 417:
| Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger
| Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger
| Jahresrückblick
| Jahresrückblick
| 02H15M00S
| German
| German
|
|
Zeile 372: Zeile 424:
| David Kim
| David Kim
| KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera
| KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera
| 01H00M00S
| English
| English
|
|
Zeile 378: Zeile 431:
| Nick Farr
| Nick Farr
| Lightning Talks Day 2
| Lightning Talks Day 2
| 02H15M00S
| English
| English
|
|
Zeile 384: Zeile 438:
| Nick Farr
| Nick Farr
| Lightning Talks Day 3- Pecha Kucha Round!
| Lightning Talks Day 3- Pecha Kucha Round!
| 02H15M00S
| English
| English
|
|
Zeile 390: Zeile 445:
| Nick Farr
| Nick Farr
| Lightning Talks Day 4
| Lightning Talks Day 4
| 02H15M00S
| English
| English
|
|
Zeile 396: Zeile 452:
| Redbeard
| Redbeard
| Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century
| Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century
| 01H00M00S
| English
| English
|
|
Zeile 402: Zeile 459:
| Evgeny Morozov
| Evgeny Morozov
| Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies
| Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies
| 01H00M00S
| English
| English
|
|
Zeile 408: Zeile 466:
| Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger
| Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger
| "Neue Leichtigkeit"- when unconditional artistic freedom happens
| "Neue Leichtigkeit"- when unconditional artistic freedom happens
| 01H30M00S
| German
| German
|
|
Zeile 414: Zeile 473:
| Jesse Ou, Rich
| Jesse Ou, Rich
| New Ways I'm Going to Hack Your Web App
| New Ways I'm Going to Hack Your Web App
| 01H00M00S
| English
| English
|
|
Zeile 420: Zeile 480:
| Kay, Will Hargrave
| Kay, Will Hargrave
| NOC Review- NOC Review about the Camp 2011 and 28C3
| NOC Review- NOC Review about the Camp 2011 and 28C3
| 00H30M00S
| English
| English
|
|
Zeile 426: Zeile 487:
| Karsten Becker, Robert Böhme
| Karsten Becker, Robert Böhme
| Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626!
| Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626!
| 01H00M00S
| English
| English
|
|
Zeile 432: Zeile 494:
| Benjamin Kellermann, klobs
| Benjamin Kellermann, klobs
| NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt!
| NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt!
| 01H00M00S
| German
| German
|
|
Zeile 438: Zeile 501:
| pt
| pt
| Ooops I hacked my PBX- Why auditing proprietary protocols matters
| Ooops I hacked my PBX- Why auditing proprietary protocols matters
| 00H30M00S
| English
| English
|
|
Zeile 444: Zeile 508:
| Tom Hargreaves
| Tom Hargreaves
| Open source music: Tracking 2.0
| Open source music: Tracking 2.0
| 00H30M00S
| English
| English
|
|
Zeile 450: Zeile 515:
| Alien8, _john, klobs
| Alien8, _john, klobs
| Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year!
| Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year!
| 01H00M00S
| English
| English
|
|-
| [http://events.ccc.de/congress/2011/Fahrplan/events/4804.en.html Politik hacken]
| Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger
| Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation
| 01H00M00S
| German
|
|
|-
|-
Zeile 456: Zeile 529:
| endrazine
| endrazine
| Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes
| Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes
| 01H00M00S
| English
| English
|
|
Zeile 462: Zeile 536:
| Gunnar Thöle, Jörg Dürre
| Gunnar Thöle, Jörg Dürre
| Power gadgets with your own electricity- escape the basement and make the sun work for you
| Power gadgets with your own electricity- escape the basement and make the sun work for you
| 01H00M00S
| English
| English
|
|
Zeile 468: Zeile 543:
| Ang Cui, Jonathan Voris
| Ang Cui, Jonathan Voris
| Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware
| Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware
| 01H00M00S
| English
| English
|
|
Zeile 474: Zeile 550:
| Conrad Lee
| Conrad Lee
| Privacy Invasion or Innovative Science?- Academia, social media data, and privacy
| Privacy Invasion or Innovative Science?- Academia, social media data, and privacy
| 01H00M00S
| English
| English
|
|
Zeile 480: Zeile 557:
| Christian Kleineidam, MetaMind Evolution
| Christian Kleineidam, MetaMind Evolution
| Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers
| Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers
| 01H00M00S
| English
| English
|
|
Zeile 486: Zeile 564:
| Robert Helling
| Robert Helling
| Quantum of Science- How quantum information differs from classical
| Quantum of Science- How quantum information differs from classical
| 01H00M00S
| English
| English
|
|
Zeile 492: Zeile 571:
| lilafisch, Stefan 'Sec' Zehl
| lilafisch, Stefan 'Sec' Zehl
| r0ket++- The CCC-Badge
| r0ket++- The CCC-Badge
| 01H00M00S
| English
| English
|
|
Zeile 498: Zeile 578:
| Kay Hamacher
| Kay Hamacher
| Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All
| Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All
| 01H00M00S
| English
| English
|
|
Zeile 504: Zeile 585:
| Guillaume Delugré
| Guillaume Delugré
| Reverse-engineering a Qualcomm baseband
| Reverse-engineering a Qualcomm baseband
| 01H00M00S
| English
| English
|
|
Zeile 510: Zeile 592:
| Drew Fisher
| Drew Fisher
| Reverse Engineering USB Devices
| Reverse Engineering USB Devices
| 00H30M00S
| English
| English
|
|
Zeile 516: Zeile 599:
| Artur Janc
| Artur Janc
| Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.
| Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.
| 01H00M00S
| English
| English
|
|
Zeile 522: Zeile 606:
| Anne Roth
| Anne Roth
| Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können
| Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können
| 01H00M00S
| German
| German
|
|
Zeile 528: Zeile 613:
| Teague, Tiffany Rad
| Teague, Tiffany Rad
| SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs
| SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs
| 01H00M00S
| English
| English
|
|
Zeile 534: Zeile 620:
| Chris Kubecka
| Chris Kubecka
| Security Log Visualization with a Correlation Engine- What's inside your network?
| Security Log Visualization with a Correlation Engine- What's inside your network?
| 00H30M00S
| English
| English
|
|
Zeile 540: Zeile 627:
| Frank Rieger, Ron
| Frank Rieger, Ron
| Security Nightmares
| Security Nightmares
| 01H00M00S
| German
| German
|
|
Zeile 546: Zeile 634:
| Dario Carluccio, Stephan Brinkhaus
| Dario Carluccio, Stephan Brinkhaus
| Smart Hacking For Privacy
| Smart Hacking For Privacy
| 01H00M00S
| English
| English
|
|
Zeile 552: Zeile 641:
| Peter Eckersley
| Peter Eckersley
| Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC
| Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC
| 01H00M00S
| English
| English
|
|
Zeile 558: Zeile 648:
| Mathias Payer
| Mathias Payer
| String Oriented Programming- Circumventing ASLR, DEP, and Other Guards
| String Oriented Programming- Circumventing ASLR, DEP, and Other Guards
| 01H00M00S
| English
| English
|
|
Zeile 564: Zeile 655:
| Eric Filiol, Seun Omosowon
| Eric Filiol, Seun Omosowon
| Taking control over the Tor network
| Taking control over the Tor network
| 01H15M00S
| English
| English
|
|
Zeile 570: Zeile 662:
| Sven Oliver ('SvOlli') Moll
| Sven Oliver ('SvOlli') Moll
| The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs
| The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs
| 01H00M00S
| English
| English
|
|
Zeile 576: Zeile 669:
| Simona Xnet
| Simona Xnet
| The best of The oXcars- the greatest free/Libre culture show of all times
| The best of The oXcars- the greatest free/Libre culture show of all times
| 01H00M00S
| English
|
|-
| [http://events.ccc.de/congress/2011/Fahrplan/events/4848.en.html The coming war on general computation]
| Cory Doctorow
| The coming war on general computation- The copyright war was just the beginning
| 01H00M00S
| English
| English
|
|
Zeile 582: Zeile 683:
| Aluc
| Aluc
| The engineering part of social engineering- Why just lying your way in won't get you anywhere
| The engineering part of social engineering- Why just lying your way in won't get you anywhere
| 01H00M00S
| English
| English
|
|
Zeile 588: Zeile 690:
| Jean-Jacques Quisquater, Renaud Devaliere
| Jean-Jacques Quisquater, Renaud Devaliere
| The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic  vs Discrete Logarithm, Integer factorization, Conjectured hard problems
| The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic  vs Discrete Logarithm, Integer factorization, Conjectured hard problems
| 01H00M00S
| English
| English
|
|
Zeile 594: Zeile 697:
| Caspar Clemens Mierau
| Caspar Clemens Mierau
| The Hack will not be televised?- Hacker in Movies
| The Hack will not be televised?- Hacker in Movies
| 01H00M00S
| English
| English
|
|
Zeile 600: Zeile 704:
| Bar, seda
| Bar, seda
| The movements against state-controlled Internet in Turkey- A short account of its history and future challenges
| The movements against state-controlled Internet in Turkey- A short account of its history and future challenges
| 01H00M00S
| English
| English
|
|
Zeile 606: Zeile 711:
| Meredith L. Patterson, Sergey
| Meredith L. Patterson, Sergey
| The Science of Insecurity
| The Science of Insecurity
| 01H00M00S
| English
| English
|
|
Zeile 612: Zeile 718:
| Sebastian Schinzel
| Sebastian Schinzel
| Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web
| Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web
| 01H00M00S
| English
| English
|
|
Zeile 618: Zeile 725:
| Suso Baleato
| Suso Baleato
| Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do..
| Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do..
| 01H00M00S
| English
| English
|
|
Zeile 624: Zeile 732:
| tilo
| tilo
| TRESOR: Festplatten sicher verschlüsseln
| TRESOR: Festplatten sicher verschlüsseln
| 00H30M00S
| German
| German
|
|
Zeile 630: Zeile 739:
| Christoph Engemann
| Christoph Engemann
| What is in a name?- Identity-Regimes from 1500 to the 2000s
| What is in a name?- Identity-Regimes from 1500 to the 2000s
| 01H00M00S
| English
| English
|
|
Zeile 636: Zeile 746:
| Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft
| Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft
| What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances.
| What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances.
| 01H00M00S
| English
| English
|
|
Zeile 642: Zeile 753:
| Herr Urbach, willowbl00
| Herr Urbach, willowbl00
| Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response
| Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response
| 01H00M00S
| English
| English
|
|

Version vom 10. April 2012, 05:20 Uhr

         
Chaotic Congress Cinema Mannheim

Status: upcoming [box doku]

Beschreibung Geselliges konsumieren von 28C3 Vorträgen
Ansprechpartner  Unicorn, blabber, silsha
Tag und Uhrzeit  Donnerstag um ~20:00 Uhr
Rhythmus  Wöchentlich
Preis  Kostenlos

Dieses Event wurde massiv von dem gleichnamigen Event des Attraktor in Hamburg inspiriert.

Chaotic Congress Cinema Mannheim

Jede Woche donnerstags findet gegen 20 Uhr im RaumZeitLabor Mannheim das Chaotic Congress Cinema Mannheim (kurz: CCC Mannheim) statt. In geselliger Runde werden jeweils zwei Vorträge, die auf dem 28C3 aufgezeichnet wurden, vorgeführt.

Der Eintritt ist kostenlos und jeder ist willkommen. Getränke, Popcorn, Pizza und Junkfood kann käuflich erworben werden.

Der freundliche Hackerspace von nebenan freut sich auf euren Besuch!

Programmgestaltung

Die Vorträge die vorgeführt werden, werden von den Gastgebern Unicorn, blabber und silsha bestimmt. Aus sicherer Quelle ist aber bekannt, dass die Beiden durch gutes Zureden und/oder Matezufuhr beeinflussbar sind. Ausserdem könnt ihr euch, falls euch ein bestimmter Vortrag interessiert, als Interessent in der unteren Tabelle eintragen.

Die Chancen das diese Einträge bei der Programmgestaltung berücksichtigt werden stehen ziemlich gut.

Das Programm für Donnerstag wird jeweils bei der vorangehenden Offene RaumZeitLaborierung und über die Mailingliste bekanntgegeben.

Upcoming

Als nächstes werden folgende Mitschnitte vorgeführt.

Titel Referent Zusammenfassung Sprache
Politik hacken Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation German
The coming war on general computation Cory Doctorow The coming war on general computation- The copyright war was just the beginning English

Noch nicht vorgeführte Vorträge

Titel Referent Zusammenfassung Dauer Sprache Interessenten
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles Bicyclemark 7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles- Lessons learned from producing a weekly independent podcast on international conflicts and concerns. 01H00M00S English
802.11 Packets in Packets Travis Goodspeed 802.11 Packets in Packets- A Standard-Compliant Exploit of Layer 1 01H00M00S English
A Brief History of Plutocracy Robin Upton A Brief History of Plutocracy 00H30M00S English
Almighty DNA? Susanne Schultz, Uta Wagenmann Almighty DNA?- Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat 01H00M00S German
Antiforensik Martin Wundram Antiforensik- Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors 00H30M00S German
Apple vs. Google Client Platforms Bruhns, FX of Phenoelit, greg Apple vs. Google Client Platforms- How you end up being the Victim. 01H00M00S English
Automatic Algorithm Invention with a GPU Wes Faler Automatic Algorithm Invention with a GPU- Hell Yeah, it's rocket science 01H00M00S English
Behind the scenes of a C64 demo Ninja / The Dreams Behind the scenes of a C64 demo 01H00M00S English
Bionic Ears Helga Velroyen Bionic Ears- Introduction into State-of-the-Art Hearing Aid Technology 01H00M00S English
Bitcoin - An Analysis Kay Hamacher, Stefan Katzenbeisser Bitcoin - An Analysis 01H00M00S English
Black Ops of TCP/IP 2011 Dan Kaminsky Black Ops of TCP/IP 2011 01H00M00S English
BuggedPlanet Andy Müller-Maguhn BuggedPlanet- Surveillance Industry & Country's Actings 01H00M00S English
Building a Distributed Satellite Ground Station Network - A Call To Arms Andreas -horn- Hornig, hadez Building a Distributed Satellite Ground Station Network - A Call To Arms- Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them! 01H00M00S English
bup: Git for backups Zoran Zaric bup: Git for backups 00H30M00S English
Can trains be hacked? Stefan Katzenbeisser Can trains be hacked?- Die Technik der Eisenbahnsicherungsanlagen 01H00M00S German
CCC Camp 2011 Video Impressions CCC Camp 2011 Video Impressions- Reviving a nice summer dream 01H00M00S English
Cellular protocol stacks for Internet Harald Welte Cellular protocol stacks for Internet- GPRS, EDGE, UMTS, HSPA demystified 01H00M00S English
Changing techno-optimists by shaking up the bureaucrats Brenno de Winter Changing techno-optimists by shaking up the bureaucrats 01H00M00S English
ChokePointProject - Quis custodiet ipsos custodes? Ruben Bloemgarten ChokePointProject - Quis custodiet ipsos custodes?- Aggregating and Visualizing (lack of) Transparancy Data in near-realtime 00H30M00S English
Closing Event Frank Rieger Closing Event 00H30M00S English
Counterlobbying EU institutions Christian Bahls - MOGiS e.V., Jérémie Zimmermann Counterlobbying EU institutions- How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet 01H00M00S English
Crowdsourcing Genome Wide Association Studies Bastian Greshake, Philipp Bayer Crowdsourcing Genome Wide Association Studies- Freeing Genetic Data from Corporate Vaults 01H00M00S English
Datamining for Hackers Stefan Burschka Datamining for Hackers- Encrypted Traffic Mining 01H00M00S English
Data Mining the Israeli Census Yuval Adam Data Mining the Israeli Census- Insights into a publicly available registry 00H30M00S English
Datenvieh oder Daten-Fee Rene Meissner Datenvieh oder Daten-Fee- Welchen Wert haben Trackingdaten? 01H00M00S German
DC+, The Protocol klobs DC+, The Protocol- Technical defense against data retention law 01H00M00S English
Deceiving Authorship Detection Michael Brennan, Rachel Greenstadt Deceiving Authorship Detection- Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry 01H00M00S English
Defending mobile phones Karsten Nohl, Luca Melette Defending mobile phones 01H00M00S English
Demokratie auf Sächsisch Josephine Fischer, Tobias Naumann Demokratie auf Sächsisch 01H00M00S German
Der Staatstrojaner 0zapfths, Constanze Kurz, Frank Rieger, Ulf Buermeyer Der Staatstrojaner- Vom braunen Briefumschlag bis zur Publikation 02H15M00S German
Die Koalition setzt sich aber aktiv und ernsthaft dafür ein maha/Martin Haase Die Koalition setzt sich aber aktiv und ernsthaft dafür ein- Sprachlicher Nebel in der Politik 01H00M00S German
Does Hacktivism Matter? Kai Denker Does Hacktivism Matter?- How the Btx hack changed computer law-making in Germany 01H00M00S English
Don't scan, just ask Fabian Mihailowitsch Don't scan, just ask- A new approach of identifying vulnerable web applications 00H30M00S English
Eating in the Anthropocene Cathrine Kramer, Zack Denfeld Eating in the Anthropocene- Transgenic Fish, Mutagenic Grapefruits and Space Potatoes 01H00M00S English
Echtes Netz Falk Lüke, Markus Beckedahl Echtes Netz - Kampagne für Netzneutralität 01H00M00S German
Effective Denial of Service attacks against web application platforms zeri Effective Denial of Service attacks against web application platforms- We are the 99% (CPU usage) 01H00M00S English
Ein Mittelsmannangriff auf ein digitales Signiergerät Alexander Koch Ein Mittelsmannangriff auf ein digitales Signiergerät- Bachelorarbeit Informatik Uni Kiel SS 2011 01H00M00S German
Electronic money: The road to Bitcoin and a glimpse forward Peio Popov Electronic money: The road to Bitcoin and a glimpse forward- How the e-money systems can be made better 01H00M00S English
EU-Datenschutz und das Internet der Dinge Andreas Krisch EU-Datenschutz und das Internet der Dinge 01H00M00S German
EU-Datenschutz und das Internet der Dinge (english translation) Andreas Krisch EU-Datenschutz und das Internet der Dinge (english translation) 01H00M00S German
Evolving custom communication protocols Wes Faler Evolving custom communication protocols- Hell Yeah, it's rocket science 01H00M00S English
Fnord-Jahresrückblick Felix von Leitner, Frank Rieger Fnord-Jahresrückblick- von Atomendlager bis Zensus 01H00M00S German
Frag den Staat Stefan Wehrmeyer Frag den Staat- Praktische Informationsfreiheit 00H30M00S German
From Press Freedom to the Freedom of information Reporters Without Borders From Press Freedom to the Freedom of information- Why every citizen should be concerned 01H00M00S English
Hacker Jeopardy Ray, Stefan 'Sec' Zehl Hacker Jeopardy- Number guessing for geeks 02H00M00S German
Hacker Jeopardy Translation Hacker Jeopardy Translation 01H45M00S English
Hacking MFPs Andrei Costin Hacking MFPs- Part2 - PostScript: Um, you've been hacked 01H00M00S English
How governments have tried to block Tor Jacob Appelbaum, Roger Dingledine How governments have tried to block Tor 01H00M00S English
Implementation of MITM Attack on HDCP-Secured Links bunnie Implementation of MITM Attack on HDCP-Secured Links- A non-copyright circumventing application of the HDCP master key 01H00M00S English
Introducing Osmo-GMR Sylvain Munaut Introducing Osmo-GMR- Building a sniffer for the GMR satphones 01H00M00S English
Jahresrückblick Andreas Bogk, Constanze Kurz, Erdgeist, Frank Rieger Jahresrückblick 02H15M00S German
KinectFusion David Kim KinectFusion- Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera 01H00M00S English
Lightning Talks Day 2 Nick Farr Lightning Talks Day 2 02H15M00S English
Lightning Talks Day 3 Nick Farr Lightning Talks Day 3- Pecha Kucha Round! 02H15M00S English
Lightning Talks Day 4 Nick Farr Lightning Talks Day 4 02H15M00S English
Macro dragnets: Why trawl the river when you can do the whole ocean Redbeard Macro dragnets: Why trawl the river when you can do the whole ocean- What happens when data collection goes awry in the 21st century 01H00M00S English
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies Evgeny Morozov Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies 01H00M00S English
"Neue Leichtigkeit" Alex Antener, Amelie Boehm, Andrin Uetz, Jonas Bischof, ruedi tobler, Samuel Weniger "Neue Leichtigkeit"- when unconditional artistic freedom happens 01H30M00S German
New Ways I'm Going to Hack Your Web App Jesse Ou, Rich New Ways I'm Going to Hack Your Web App 01H00M00S English
NOC Review Kay, Will Hargrave NOC Review- NOC Review about the Camp 2011 and 28C3 00H30M00S English
Not your Grandfathers moon landing Karsten Becker, Robert Böhme Not your Grandfathers moon landing- Hell yeah, it's Rocket Science 3.1415926535897932384626! 01H00M00S English
NPC - Nerds Pissing Contest Benjamin Kellermann, klobs NPC - Nerds Pissing Contest- Mein Ruby ist besser als dein urxvt! 01H00M00S German
Ooops I hacked my PBX pt Ooops I hacked my PBX- Why auditing proprietary protocols matters 00H30M00S English
Open source music: Tracking 2.0 Tom Hargreaves Open source music: Tracking 2.0 00H30M00S English
Pentanews Game Show 2k11/3 Alien8, _john, klobs Pentanews Game Show 2k11/3- 42 new questions, new jokers, same concept, more fun than last year! 01H00M00S English
Politik hacken Alexander Müller, Bärwulf Kannitschreiber, Montserrat Graupenschläger Politik hacken- Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation 01H00M00S German
Post Memory Corruption Memory Analysis endrazine Post Memory Corruption Memory Analysis- Automating exploitation of invalid memory writes 01H00M00S English
Power gadgets with your own electricity Gunnar Thöle, Jörg Dürre Power gadgets with your own electricity- escape the basement and make the sun work for you 01H00M00S English
Print Me If You Dare Ang Cui, Jonathan Voris Print Me If You Dare- Firmware Modification Attacks and the Rise of Printer Malware 01H00M00S English
Privacy Invasion or Innovative Science? Conrad Lee Privacy Invasion or Innovative Science?- Academia, social media data, and privacy 01H00M00S English
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking Christian Kleineidam, MetaMind Evolution Quantified-Self and OpenBCI Neurofeedback Mind-Hacking- Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers 01H00M00S English
Quantum of Science Robert Helling Quantum of Science- How quantum information differs from classical 01H00M00S English
r0ket++ lilafisch, Stefan 'Sec' Zehl r0ket++- The CCC-Badge 01H00M00S English
Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All Kay Hamacher Resilience Towards Leaking or Why Julian Assange Might Be Wrong After All 01H00M00S English
Reverse-engineering a Qualcomm baseband Guillaume Delugré Reverse-engineering a Qualcomm baseband 01H00M00S English
Reverse Engineering USB Devices Drew Fisher Reverse Engineering USB Devices 00H30M00S English
Rootkits in your Web application Artur Janc Rootkits in your Web application- Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks. 01H00M00S English
Sachsen dreht frei Anne Roth Sachsen dreht frei- On- und Offline-Überwachung: Weil sie es können 01H00M00S German
SCADA and PLC Vulnerabilities in Correctional Facilities Teague, Tiffany Rad SCADA and PLC Vulnerabilities in Correctional Facilities- Tiffany Rad, Teague Newman, John Strauchs 01H00M00S English
Security Log Visualization with a Correlation Engine Chris Kubecka Security Log Visualization with a Correlation Engine- What's inside your network? 00H30M00S English
Security Nightmares Frank Rieger, Ron Security Nightmares 01H00M00S German
Smart Hacking For Privacy Dario Carluccio, Stephan Brinkhaus Smart Hacking For Privacy 01H00M00S English
Sovereign Keys Peter Eckersley Sovereign Keys- A proposal for fixing attacks on CAs and DNSSEC 01H00M00S English
String Oriented Programming Mathias Payer String Oriented Programming- Circumventing ASLR, DEP, and Other Guards 01H00M00S English
Taking control over the Tor network Eric Filiol, Seun Omosowon Taking control over the Tor network 01H15M00S English
The Atari 2600 Video Computer System: The Ultimate Talk Sven Oliver ('SvOlli') Moll The Atari 2600 Video Computer System: The Ultimate Talk- The history, the hardware and how to write programs 01H00M00S English
The best of The oXcars Simona Xnet The best of The oXcars- the greatest free/Libre culture show of all times 01H00M00S English
The coming war on general computation Cory Doctorow The coming war on general computation- The copyright war was just the beginning 01H00M00S English
The engineering part of social engineering Aluc The engineering part of social engineering- Why just lying your way in won't get you anywhere 01H00M00S English
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? Jean-Jacques Quisquater, Renaud Devaliere The future of cryptology: which 3 letters algorithm(s) could be our Titanic?- RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems 01H00M00S English
The Hack will not be televised? Caspar Clemens Mierau The Hack will not be televised?- Hacker in Movies 01H00M00S English
The movements against state-controlled Internet in Turkey Bar, seda The movements against state-controlled Internet in Turkey- A short account of its history and future challenges 01H00M00S English
The Science of Insecurity Meredith L. Patterson, Sergey The Science of Insecurity 01H00M00S English
Time is on my Side Sebastian Schinzel Time is on my Side- Exploiting Timing Side Channel Vulnerabilities on the Web 01H00M00S English
Towards a Single Secure European Cyberspace? Suso Baleato Towards a Single Secure European Cyberspace?- What the European Union wants. What the hackerdom can do.. 01H00M00S English
TRESOR: Festplatten sicher verschlüsseln tilo TRESOR: Festplatten sicher verschlüsseln 00H30M00S German
What is in a name? Christoph Engemann What is in a name?- Identity-Regimes from 1500 to the 2000s 01H00M00S English
What is WhiteIT and what does it aim for? Christian Bahls -- MOGiS e.V. - Eine Stimme der Vernunft What is WhiteIT and what does it aim for?- Why you probably want to be concerned about it and similiar alliances. 01H00M00S English
Your Disaster/Crisis/Revolution just got Pwned Herr Urbach, willowbl00 Your Disaster/Crisis/Revolution just got Pwned- Telecomix and Geeks without Bounds on Security and Crisis Response 01H00M00S English

Bereits vorgeführte Vorträge

noch keine

Sonstiges

Die Vortragstabelle wurde per XSLT aus dieser Datei erstellt.