schedule.en.ics (77649B)
1 BEGIN:VCALENDAR 2 VERSION:2.0 3 CALSCALE:GREGORIAN 4 PRODID:-//Pentabarf//Schedule//EN 5 BEGIN:VEVENT 6 DURATION:PT1H00M 7 LOCATION:Saal 1 8 SEQUENCE:0 9 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5333.en.html 10 DTSTART;TZID=Europe/Berlin:20121230T124500 11 UID:5333@29C3@pentabarf.org 12 DTSTAMP:20121226T143018 13 CATEGORIES:Lecture 14 DESCRIPTION:Did you notice 262 42 in your mobile phone network search list 15 at the last CCC events? Did you and your friends buy SIM cards at the PoC a 16 nd help test the network by calling each other\, or by calling through the 17 bridge to the DECT network services? Did you ever wonder about the details 18 of this open source test network\, set up by a team of volunteers in the mi 19 ddle of the city? We would like to tell you all the details of the cell pho 20 ne network we operate at 29C3\, and show you some fancy graphs based on the 21 network activity! 22 SUMMARY:29C3 GSM: Cell phone network review - 262 42 - The full spectrum 23 STATUS:CONFIRMED 24 END:VEVENT 25 BEGIN:VEVENT 26 DURATION:PT1H00M 27 LOCATION:Saal 1 28 SEQUENCE:0 29 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5205.en.html 30 DTSTART;TZID=Europe/Berlin:20121229T140000 31 UID:5205@29C3@pentabarf.org 32 DTSTAMP:20121226T143018 33 CATEGORIES:Lecture 34 DESCRIPTION:There are hundreds\, if not thousands\, of news articles and bl 35 og posts about the BlackHole Exploit Kit. Usually\, each story covers only 36 a very narrow part of the subject matter. This talk will summarize the hist 37 ory of the BlackHole Exploit Kit into one easy to follow story. There will 38 be diagrams and flow-charts for explaining code\, rather than a giant blob 39 of illegible Javascript\, PHP\, or x86 Assembly. 40 SUMMARY:Analytical Summary of the BlackHole Exploit Kit - Almost Everything 41 You Ever Wanted To Know About The BlackHole Exploit Kit 42 STATUS:CONFIRMED 43 END:VEVENT 44 BEGIN:VEVENT 45 DURATION:PT1H00M 46 LOCATION:Saal 6 47 SEQUENCE:0 48 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5146.en.html 49 DTSTART;TZID=Europe/Berlin:20121229T160000 50 UID:5146@29C3@pentabarf.org 51 DTSTAMP:20121226T143018 52 CATEGORIES:Lecture 53 DESCRIPTION:There's about 100 top-level domains signed with DNSSEC and .nl 54 recently hit 1M second-level domains. At this occasion\, we take a look at 55 the goods and the bads of DNSSEC deployment\, including amplification attac 56 ks\, Zensursula-like DNS redirects\, China DNS injection and NASA key rollo 57 ver mistakes. We will find out what DNSCurve and Namecoin promise to make b 58 etter and what Zooko's triangle has all to do with this. 59 SUMMARY:An Overview of Secure Name Resolution - DNSSEC\, DNSCurve and Namec 60 oin 61 STATUS:CONFIRMED 62 END:VEVENT 63 BEGIN:VEVENT 64 DURATION:PT1H00M 65 LOCATION:Saal 6 66 SEQUENCE:0 67 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5237.en.html 68 DTSTART;TZID=Europe/Berlin:20121229T203000 69 UID:5237@29C3@pentabarf.org 70 DTSTAMP:20121226T143018 71 CATEGORIES:Lecture 72 DESCRIPTION:With Visa and Mastercard pushing for EMV (http://www.emvco.com\ 73 , aka “chip and pin”) rollout in the United States\, the uptake of contactl 74 ess payment and the use of mobile NFC wallets\, the chipcard security commu 75 nity will soon be getting more eyes to analyze the protocols in use with ch 76 ip and contactless credit card transactions. 77 SUMMARY:A Rambling Walk Through an EMV Transaction 78 STATUS:CONFIRMED 79 END:VEVENT 80 BEGIN:VEVENT 81 DURATION:PT1H00M 82 LOCATION:Saal 1 83 SEQUENCE:0 84 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5299.en.html 85 DTSTART;TZID=Europe/Berlin:20121230T113000 86 UID:5299@29C3@pentabarf.org 87 DTSTAMP:20121226T143018 88 CATEGORIES:Lecture 89 DESCRIPTION:Verfassungsschutzskandale gibt es nicht erst seit der Entdeckun 90 g des NSU vor einem Jahr. Vorgestellt werden: sie Affaire Traube\, der Schm 91 ücker-Prozess\, das Celler Loch\, die Vulkan-Affaire\, der Anschlagsversuch 92 auf das Jüdische Gemeindehaus West-Berlin\, vier Jahrzehnte Beobachtung vo 93 n Rolf Gössner. Vielleicht sind aber gar nicht die Pannen der Skandal\, son 94 dern vielmehr der ganz gewöhnliche Alltag des Verfassungsschutzes. 95 SUMMARY:Best of ... Verfassungsschutz - Der Verfassungsschutz schützt die V 96 erfassung so wie Zitronenfalter Zitronen falten. 97 STATUS:CONFIRMED 98 END:VEVENT 99 BEGIN:VEVENT 100 DURATION:PT2H15M 101 LOCATION:Saal 1 102 SEQUENCE:0 103 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5379.en.html 104 DTSTART;TZID=Europe/Berlin:20121229T113000 105 UID:5379@29C3@pentabarf.org 106 DTSTAMP:20121226T143018 107 CATEGORIES:Lecture 108 DESCRIPTION:Wir schauen nicht zurück im Zorn\, aber jetzt auch nicht grade 109 mit Euphorie. Im CCC-Jahresrückblick präsentieren wir Euch einige der hackt 110 ivistischen Themen des vergangenen Jahres\, an denen der CCC gearbeitet ode 111 r sich abgearbeitet hat. Diesmal mit schönen neuen Gesetzen\, Hacker-Humor\ 112 , versäumten Gerichtsterminen\, bunten Blinkenlichtern und Iggy Pop. Wir ha 113 ben uns wirklich das ganze Jahr bemüht\, nur in begrenztem Umfange zu prokr 114 astinieren. 115 SUMMARY:CCC-Jahresrückblick 116 STATUS:CONFIRMED 117 END:VEVENT 118 BEGIN:VEVENT 119 DURATION:PT1H00M 120 LOCATION:Saal 1 121 SEQUENCE:0 122 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5319.en.html 123 DTSTART;TZID=Europe/Berlin:20121228T124500 124 UID:5319@29C3@pentabarf.org 125 DTSTAMP:20121226T143018 126 CATEGORIES:Lecture 127 DESCRIPTION:Hypertext Transfer Protocol Secure (HTTPS) has evolved into the 128 de facto standard for secure web browsing. But in the security community\, 129 it has long been known that HTTPS is fundamentally broken\, and this has b 130 een confirmed by alarming hacks and security breaches at several Certificat 131 e Authorities (CAs). To tackle the global collapse of trust in these centra 132 l mediators of HTTPS communications and to augment HTTPS security\, the EU 133 has launched a proposal for strict regulation. Will these efforts succeed? 134 SUMMARY:Certificate Authority Collapse - Will the EU Succeed in Regulating 135 HTTPS? 136 STATUS:CONFIRMED 137 END:VEVENT 138 BEGIN:VEVENT 139 DURATION:PT1H00M 140 LOCATION:Saal 6 141 SEQUENCE:0 142 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5263.en.html 143 DTSTART;TZID=Europe/Berlin:20121230T171500 144 UID:5263@29C3@pentabarf.org 145 DTSTAMP:20121226T143018 146 CATEGORIES:Lecture 147 DESCRIPTION:Wir brauchen ein maschinenlesbares und -schreibbares Gesetzgebu 148 ngsverfahren\, in dem jede Änderung transparent diskutiert und beschlossen 149 wird. Der Bundestag öffnet und digitalisiert sich eher langsam und widerwil 150 lig\, dennoch kann man schon heute anfangen\, die Werkzeuge der parlamentar 151 ischen Zukunft in Deutschland zu gestalten und auszuprobieren. Dazu stellen 152 wir die Projekte OffenesParlament.de und das Bundes-Git vor und zeigen\, w 153 ie es in Zukunft weitergehen könnte. 154 SUMMARY:chmod o+rw bundestag - Mehr Transparenz und Teilhabe im Gesetzgebun 155 gsprozess 156 STATUS:CONFIRMED 157 END:VEVENT 158 BEGIN:VEVENT 159 DURATION:PT1H00M 160 LOCATION:Saal 1 161 SEQUENCE:0 162 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5398.en.html 163 DTSTART;TZID=Europe/Berlin:20121230T183000 164 UID:5398@29C3@pentabarf.org 165 DTSTAMP:20121226T143018 166 CATEGORIES:Lecture 167 DESCRIPTION:Some facts and stats about Congress\, plus stories and legends. 168 SUMMARY:Closing Event 169 STATUS:CONFIRMED 170 END:VEVENT 171 BEGIN:VEVENT 172 DURATION:PT1H00M 173 LOCATION:Saal 6 174 SEQUENCE:0 175 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5221.en.html 176 DTSTART;TZID=Europe/Berlin:20121227T140000 177 UID:5221@29C3@pentabarf.org 178 DTSTAMP:20121226T143018 179 CATEGORIES:Lecture 180 DESCRIPTION:Wir sind Zeugen eines seit einigen Jahren stattfindenden Wettrü 181 stens im Cyberspace. Immer mehr Staaten bauen militärische Cyberware Einhei 182 ten auf\, die aus IT Spezialisten bestehen und dem Zweck dienen\, bestenfal 183 ls IT Systeme abzusichern oder schlechterdings Systeme von „Feinden“ anzug 184 reifen. 185 SUMMARY:Cyberpeace statt Cyberwar 186 STATUS:CONFIRMED 187 END:VEVENT 188 BEGIN:VEVENT 189 DURATION:PT1H00M 190 LOCATION:Saal 4 191 SEQUENCE:0 192 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5301.en.html 193 DTSTART;TZID=Europe/Berlin:20121228T203000 194 UID:5301@29C3@pentabarf.org 195 DTSTAMP:20121226T143018 196 CATEGORIES:Lecture 197 DESCRIPTION:Aside from further development of traditional forensic techniqu 198 es which involve post-mortem hard disk analysis\, in the last couple of yea 199 rs the field of computer forensics has been marked by significant developme 200 nt of live forensic techniques and tools.Memory forensics is composed of tw 201 o main activities: memory aquisition/capture and analysis. This presentatio 202 n will give an overview of the memory acquisition and analysis techniques a 203 nd tools on the Windows operating systems. The main part of the presentatio 204 n will cover current exploitation techniques and methods for defeating both 205 acquisition and analysis phase of the memory forensics\, as well as presen 206 t a new approach for hiding specific artifacts from forensic tools. Based o 207 n the covered exploitation techniques\, some suggestions and improvements o 208 f the current tools will be given. 209 SUMMARY:Defeating Windows memory forensics 210 STATUS:CONFIRMED 211 END:VEVENT 212 BEGIN:VEVENT 213 DURATION:PT1H00M 214 LOCATION:Saal 4 215 SEQUENCE:0 216 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5159.en.html 217 DTSTART;TZID=Europe/Berlin:20121227T203000 218 UID:5159@29C3@pentabarf.org 219 DTSTAMP:20121226T143018 220 CATEGORIES:Lecture 221 DESCRIPTION:Over the years we learned impressively how to oppose bad legisl 222 ation hurting our freedoms online. We are now facing an even bigger challen 223 ge: how to guarantee that a Free\, open\, decentralized Internet will be pr 224 otected in the long run? In 2012 The Internetz won major battles against SO 225 PA/PIPA in the US\, and against ACTA in the EU. Yet\, we know that the powe 226 rful industries and governments behind these projects will never stop. They 227 have an incentive to gain control of the Internet\, attacking fundamental 228 rights and promoting technologies like "Deep Packet Inspection"\, now being 229 deployed in each and every corner of the Net\, and used indifferently to b 230 reak Net neutrality\, to filter\, block and censor communications or to ins 231 pect citizens traffic.How to push for proposals that will ensure that the s 232 haring of knowledge and culture\, citizens freedoms\, and access to an open 233 infrastructure will be guaranteed in the future public policies? How to be 234 come as successful in proposition as we are now in opposition?(Hint: it's p 235 olitical\, stupid!) 236 SUMMARY:Defend your Freedoms Online: It's Political\, Stupid! - A Positive 237 agenda against the next ACTA\, SOPA\, and such 238 STATUS:CONFIRMED 239 END:VEVENT 240 BEGIN:VEVENT 241 DURATION:PT1H00M 242 LOCATION:Saal 1 243 SEQUENCE:0 244 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5401.en.html 245 DTSTART;TZID=Europe/Berlin:20121228T171500 246 UID:5401@29C3@pentabarf.org 247 DTSTAMP:20121226T143018 248 CATEGORIES:Lecture 249 DESCRIPTION:Die Debatte um die Tarifreform der GEMA war eines der großen Th 250 emen des Jahres 2012: Die Verwertungsgesellschaft geriet quer durch alle po 251 litischen Lager und gesellschaftlichen Schichten in die Kritik\, die Warnun 252 gen vor einem großen Clubsterben wurden von Tausenden auf die Straße getrag 253 en. Dies steigerte auch das Interesse an der »Cultural Commons Collecting S 254 ociety« (C3S)\, einem Graswurzelprojekt zur Gründung einer neuen\, modernen 255 und internetverstehenden Verwertungsgesellschaft\, die u. a. auch vollen S 256 upport für Creative-Commons-Lizenzen bieten soll. 2012 war daher auch ein e 257 reignisreiches Jahr für dieses Projekt\, und 2013 sollen nach Plan die Grün 258 dung als Europäische Genossenschaft und die Antragsstellung beim Deutschen 259 Patent- und Markenamt folgen. 260 SUMMARY:Der Mord fällt aus - Ein Werkstattbericht der GEMA-Alternative C3S 261 STATUS:CONFIRMED 262 END:VEVENT 263 BEGIN:VEVENT 264 DURATION:PT1H00M 265 LOCATION:Saal 1 266 SEQUENCE:0 267 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5382.en.html 268 DTSTART;TZID=Europe/Berlin:20121227T160000 269 UID:5382@29C3@pentabarf.org 270 DTSTAMP:20121226T143018 271 CATEGORIES:Lecture 272 DESCRIPTION:Am 6. November 2012 war der CCC vor dem Bundesverfassungsgerich 273 t zur Anhörung über die Antiterrordatei und die Grenzen polizeilicher Daten 274 verarbeitung geladen. Wir berichten über die Anhörung\, die dort vorgebrach 275 ten Argumente und die technische Konzeption der ATD. Und wir orakeln über e 276 in mögliches Urteil im nächsten Jahr. 277 SUMMARY:Die Antiterrordatei 278 STATUS:CONFIRMED 279 END:VEVENT 280 BEGIN:VEVENT 281 DURATION:PT1H00M 282 LOCATION:Saal 1 283 SEQUENCE:0 284 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5181.en.html 285 DTSTART;TZID=Europe/Berlin:20121227T124500 286 UID:5181@29C3@pentabarf.org 287 DTSTAMP:20121226T143018 288 CATEGORIES:Lecture 289 DESCRIPTION:In den vergangenen Jahren wurde vor allem die Sprache von Polit 290 ikern auf dem Congress beleuchtet. Aber die schwurbelnde Politiker sind noc 291 h nicht die ganze Wahrheit. Wir möchten das Ganze daher um den zweiten wich 292 tigen Mitspieler bei der Konstruktion von Realität ergänzen\, um die Presse 293 bzw. die Medien. Die Äußerungen von Politikern (zum Beispiel auf Pressekon 294 ferenzen) sollen dabei der Mediendarstellung gegenübergestellt werden. Dabe 295 i wird deutlich werden\, dass es zwischen Politikern und Medien Rückkopplun 296 gseffekte gibt. 297 SUMMARY:Die Wahrheit\, was wirklich passierte und was in der Zeitung stand 298 - Wie Medien unsere Wahrnehmung beeinflussen 299 STATUS:CONFIRMED 300 END:VEVENT 301 BEGIN:VEVENT 302 DURATION:PT2H15M 303 LOCATION:Saal 1 304 SEQUENCE:0 305 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html 306 DTSTART;TZID=Europe/Berlin:20121227T203000 307 UID:5338@29C3@pentabarf.org 308 DTSTAMP:20121226T143018 309 CATEGORIES:Lecture 310 DESCRIPTION:With the post 9/11 rise of the leviathan national security stat 311 e\, the rule of law in the United States under the Constitution is increasi 312 ngly rule by secrecy\, surveillance and executive fiat. 313 SUMMARY:Enemies of the State: What Happens When Telling the Truth about Sec 314 ret US Government Power Becomes a Crime - Blowing the Whistle on Spying\, L 315 ying & Illegalities in the Digital Era 316 STATUS:CONFIRMED 317 END:VEVENT 318 BEGIN:VEVENT 319 DURATION:PT1H00M 320 LOCATION:Saal 4 321 SEQUENCE:0 322 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5104.en.html 323 DTSTART;TZID=Europe/Berlin:20121228T230000 324 UID:5104@29C3@pentabarf.org 325 DTSTAMP:20121226T143018 326 CATEGORIES:Lecture 327 DESCRIPTION:This presentation will cover a demonstration of the new version 328 of the Canape protocol analysis tool being released for Ruxcon. During the 329 course of the presentation various attack scenarios against the VMWare ESX 330 i binary protocol will be demonstrated using Canape. 331 SUMMARY:ESXi Beast - Exploiting VMWARE ESXi Binary Protocols Using CANAPE 332 STATUS:CONFIRMED 333 END:VEVENT 334 BEGIN:VEVENT 335 DURATION:PT0H30M 336 LOCATION:Saal 6 337 SEQUENCE:0 338 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5077.en.html 339 DTSTART;TZID=Europe/Berlin:20121229T131500 340 UID:5077@29C3@pentabarf.org 341 DTSTAMP:20121226T143018 342 CATEGORIES:Lecture 343 DESCRIPTION:Recently\, several research papers in the area of computer secu 344 rity were published that may or may not be considered unethical. Looking at 345 these borderline cases is relevant as today’s research papers will influen 346 ce how young researchers conduct their research. In our talk we address var 347 ious cases and papers and highlight emerging issues for ethic committees\, 348 internal review boards (IRBs) and senior researchers to evaluate research p 349 roposals and to finally decide where they see a line that should not be cro 350 ssed. 351 SUMMARY:Ethics in Security Research 352 STATUS:CONFIRMED 353 END:VEVENT 354 BEGIN:VEVENT 355 DURATION:PT1H00M 356 LOCATION:Saal 6 357 SEQUENCE:0 358 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5085.en.html 359 DTSTART;TZID=Europe/Berlin:20121228T113000 360 UID:5085@29C3@pentabarf.org 361 DTSTAMP:20121226T143018 362 CATEGORIES:Lecture 363 DESCRIPTION:We know\, that cooking is an art. Selecting the ingredients\, c 364 arefully washing\, pealingand cutting them before you put them into the rig 365 ht dish at the right time with the right heat.Watching the food change his 366 color\, form and consistency\, seasoning it to develop it'sflavors and serv 367 ing it on beautiful plates is a pleasure.For some\, but not for all.Those 368 who love cooking can spend hours at the stove andrelax while preparing deli 369 cious meals. For others cooking is pure stress. What is the difference betw 370 een orange and yellowcarrots? Did I forget something? Is the pan hot enough 371 ? Or too hot? How long after thepasta do I start cooking the steak? Will it 372 be healthy? Is it sustainable?So many questionsappear if one starts to thi 373 nk about food. The answers are complicatedand ambiguous. They require resea 374 rch and analyzing. Many have stopped thinkingabout food. They just believe 375 what is written on thepackage.I can't cookis such an easy answer. And it is 376 accepted in our society. Nobody isashamed of it. This gives more and more 377 control tomultinational corporations. Through precookedfood and shiny comme 378 rcials they calm our conscience and stimulate our laziness.The consequences 379 are dramatic!The profit-focused approach of multinationalcorporations have 380 led to things like:• Patented genetically modified seeds. Lawyers suing fa 381 rmers for copyrights.• Destruction of South-American jungle to make soya to 382 feed European cows so theymake more milk. Although a cow as never born to 383 eat proteins.• Chickens that can't stand on their own feet due to the weigh 384 t of their breasts. Theywill never see soil\, worms or even sunlight.• Oran 385 -Utangs losing their homes for palm oil• Vegetables getting grown in the de 386 sert\, wasting huge amounts of drinking water.Conclusions:• We must know mo 387 re about our food• We have to cook more ourselves• So we will recover some 388 control over what we eat 389 SUMMARY:EveryCook - Cooking gets digital 390 STATUS:CONFIRMED 391 END:VEVENT 392 BEGIN:VEVENT 393 DURATION:PT1H00M 394 LOCATION:Saal 1 395 SEQUENCE:0 396 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html 397 DTSTART;TZID=Europe/Berlin:20121228T183000 398 UID:5275@29C3@pentabarf.org 399 DTSTAMP:20121226T143018 400 CATEGORIES:Lecture 401 DESCRIPTION:RSA is the dominant public-key cryptosystem on the Internet. Th 402 is talk will explain the state of the art in techniques for the attacker to 403 figure out your secret RSA keys. 404 SUMMARY:FactHacks - RSA factorization in the real world 405 STATUS:CONFIRMED 406 END:VEVENT 407 BEGIN:VEVENT 408 DURATION:PT1H00M 409 LOCATION:Saal 1 410 SEQUENCE:0 411 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5198.en.html 412 DTSTART;TZID=Europe/Berlin:20121229T230000 413 UID:5198@29C3@pentabarf.org 414 DTSTAMP:20121226T143018 415 CATEGORIES:Lecture 416 DESCRIPTION:Neues Jahr\, neue Fnords :-) 417 SUMMARY:Fnord-Jahresrückblick - Diesmal mit noch mehr Eurozonen-Spaltung! 418 STATUS:CONFIRMED 419 END:VEVENT 420 BEGIN:VEVENT 421 DURATION:PT1H00M 422 LOCATION:Saal 1 423 SEQUENCE:0 424 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5226.en.html 425 DTSTART;TZID=Europe/Berlin:20121229T214500 426 UID:5226@29C3@pentabarf.org 427 DTSTAMP:20121226T143018 428 CATEGORIES:Lecture 429 DESCRIPTION:The calypso baseband and its companion chips are used on the Mo 430 torola C123 among other and are now well known for being supported by the O 431 smocom-BB open source GSM baseband implementation. A couple years ago\, it 432 was hacked a little further by using it as a raw bits capture device allowi 433 ng the interception of GSM traffic very cheaply. 434 SUMMARY:Further hacks on the Calypso platform - or how to turn a phone into 435 a BTS 436 STATUS:CONFIRMED 437 END:VEVENT 438 BEGIN:VEVENT 439 DURATION:PT2H00M 440 LOCATION:Saal 4 441 SEQUENCE:0 442 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5250.en.html 443 DTSTART;TZID=Europe/Berlin:20121228T001500 444 UID:5250@29C3@pentabarf.org 445 DTSTAMP:20121226T143018 446 CATEGORIES:Lecture 447 DESCRIPTION:Beim Googlequiz treten Teams gegeneinander an\, die *ohne Inter 448 net* Aufgaben zu Googlesuchen und Suchergebnissen raten. 449 SUMMARY:Googlequiz - Wie man (spaßorientiert) mehr als 5% seines Googleverm 450 ögens trainiert 451 STATUS:CONFIRMED 452 END:VEVENT 453 BEGIN:VEVENT 454 DURATION:PT2H00M 455 LOCATION:Saal 1 456 SEQUENCE:0 457 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5309.en.html 458 DTSTART;TZID=Europe/Berlin:20121228T230000 459 UID:5309@29C3@pentabarf.org 460 DTSTAMP:20121226T143018 461 CATEGORIES:Lecture 462 DESCRIPTION: 463 SUMMARY:Hacker Jeopardy - Zahlenraten für Geeks 464 STATUS:CONFIRMED 465 END:VEVENT 466 BEGIN:VEVENT 467 DURATION:PT1H00M 468 LOCATION:Saal 1 469 SEQUENCE:0 470 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5024.en.html 471 DTSTART;TZID=Europe/Berlin:20121228T203000 472 UID:5024@29C3@pentabarf.org 473 DTSTAMP:20121226T143018 474 CATEGORIES:Lecture 475 DESCRIPTION:Hackers are a high-risk population. This talk will provide hack 476 ers with tools to reduce the risk to themselves and their communities using 477 harm reduction methodology. 478 SUMMARY:Hackers As A High-Risk Population - Harm Reduction Methodology 479 STATUS:CONFIRMED 480 END:VEVENT 481 BEGIN:VEVENT 482 DURATION:PT1H00M 483 LOCATION:Saal 1 484 SEQUENCE:0 485 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html 486 DTSTART;TZID=Europe/Berlin:20121227T230000 487 UID:5400@29C3@pentabarf.org 488 DTSTAMP:20121226T143018 489 CATEGORIES:Lecture 490 DESCRIPTION:We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco 491 NativeUnix)\, the operating system that powers all Cisco TNP IP phones. Wed 492 emonstrate the reliable exploitation of all Cisco TNP phones viamultiple vu 493 lnerabilities found in the CNU kernel. We demonstratepractical covert surve 494 illance using constant\, stealthy exfiltration ofmicrophone data via a numb 495 er of covert channels. We also demonstrate theworm-like propagation of our 496 CNU malware\, which can quickly compromiseall vulnerable Cisco phones on th 497 e network. We discuss the feasibilityof our attacks given physical access\, 498 internal network access and remoteaccess across the internet. Lastly\, we 499 built on last year's presentationby discussing the feasibility of exploitin 500 g Cisco phones fromcompromised HP printers and vice versa. 501 SUMMARY:Hacking Cisco Phones - Just because you are paranoid doesn't mean y 502 our phone isn't listening to everything you say 503 STATUS:CONFIRMED 504 END:VEVENT 505 BEGIN:VEVENT 506 DURATION:PT1H00M 507 LOCATION:Saal 6 508 SEQUENCE:0 509 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5179.en.html 510 DTSTART;TZID=Europe/Berlin:20121229T183000 511 UID:5179@29C3@pentabarf.org 512 DTSTAMP:20121226T143018 513 CATEGORIES:Lecture 514 DESCRIPTION:Wir sehen in der digitalen Technik großes Potential zur Demokra 515 tisierung und Befreiung der Menschen. Doch machen wir uns nichts vor. Techn 516 ik kann genausogut der Entmündigung von Menschen dienen. Je komplexer sie w 517 ird\, desto mehr sind wir von Vereinfachung abhängig und desto weniger Einf 518 luss können wir selber auf die Technik nehmen. 519 SUMMARY:Hacking Philosophy - Digitale Mündigkeit\, Technikpaternalismus und 520 warum wir Netzphilosophie brauchen 521 STATUS:CONFIRMED 522 END:VEVENT 523 BEGIN:VEVENT 524 DURATION:PT1H00M 525 LOCATION:Saal 4 526 SEQUENCE:0 527 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5270.en.html 528 DTSTART;TZID=Europe/Berlin:20121229T001500 529 UID:5270@29C3@pentabarf.org 530 DTSTAMP:20121226T143018 531 CATEGORIES:Lecture 532 DESCRIPTION:This is fun stuff for the late night program\, not a serious ta 533 lk.Is it possible to read sb. others mind? In the late 1920ies/early 1930ie 534 s Berlin was excited by the famous mindreader and fortune teller Erik Jan H 535 anussen who performed his strange abilities on stage. His act was so convin 536 cing that leading nazis beleaved in his powers and wanted him for advice - 537 until they decided to murder him. 538 SUMMARY:Hanussen's mindreading - Experiment's of the historical psychic 539 STATUS:CONFIRMED 540 END:VEVENT 541 BEGIN:VEVENT 542 DURATION:PT1H00M 543 LOCATION:Saal 4 544 SEQUENCE:0 545 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html 546 DTSTART;TZID=Europe/Berlin:20121229T214500 547 UID:5152@29C3@pentabarf.org 548 DTSTAMP:20121226T143018 549 CATEGORIES:Lecture 550 DESCRIPTION:At 28C3\, Klink and Waelde showed that a number of technologies 551 (PHP\, ASP.NET\,Ruby\, Java\, Python\, etc.) were vulnerable to the decade 552 -old hash-flooding DoSattacks. The vulnerability was then often fixed by ad 553 opting stronger hashfunctions and "randomizing" them. 554 SUMMARY:Hash-flooding DoS reloaded: attacks and defenses 555 STATUS:CONFIRMED 556 END:VEVENT 557 BEGIN:VEVENT 558 DURATION:PT1H00M 559 LOCATION:Saal 1 560 SEQUENCE:0 561 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5287.en.html 562 DTSTART;TZID=Europe/Berlin:20121227T183000 563 UID:5287@29C3@pentabarf.org 564 DTSTAMP:20121226T143018 565 CATEGORIES:Lecture 566 DESCRIPTION:NSU-Untersuchungsausschuss in Thüringen und NSU-Untersuchungsau 567 sschuss des Bundestages\, über die Mordserie des NSU\, das System der V-Leu 568 te und die Rolle des Verfassungsschutzes.Zwölf Jahre lang konnte der „Natio 569 nalsozialistische Untergrund“ (NSU) unerkannt in Deutschland eine rassistis 570 che Mordserie an neun migrantischen Gewerbetreibenden\, zwei Bombenanschläg 571 e mit mehr als zwanzig Verletzten\, den Mord an einer jungen Polizistin sow 572 ie ein Dutzend Banküberfälle verüben. 573 SUMMARY:Hinter den Kulissen: Der NSU und das V-Leute-System 574 STATUS:CONFIRMED 575 END:VEVENT 576 BEGIN:VEVENT 577 DURATION:PT1H00M 578 LOCATION:Saal 6 579 SEQUENCE:0 580 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5219.en.html 581 DTSTART;TZID=Europe/Berlin:20121228T203000 582 UID:5219@29C3@pentabarf.org 583 DTSTAMP:20121226T143018 584 CATEGORIES:Lecture 585 DESCRIPTION:An approach to the problem of fuzzing proprietary protocols wil 586 l be shown\, focusing on network protocols and native software. In the cour 587 se of this talk I will combine several methods in order to force the client 588 software to work as a “double agent” against the server. 589 SUMMARY:"How I met your pointer" - Hijacking client software for fuzz and p 590 rofit 591 STATUS:CONFIRMED 592 END:VEVENT 593 BEGIN:VEVENT 594 DURATION:PT1H00M 595 LOCATION:Saal 4 596 SEQUENCE:0 597 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5395.en.html 598 DTSTART;TZID=Europe/Berlin:20121227T140000 599 UID:5395@29C3@pentabarf.org 600 DTSTAMP:20121226T143018 601 CATEGORIES:Lecture 602 DESCRIPTION:Legal systems have a huge impact on what we do as hackers\, but 603 also on internet users in general. Laws can restrict our freedom to use th 604 e internet in ways we deem to be natural and it can impede the tools which 605 we hackers use on a daily basis. Which is not to say that laws cannot also 606 protect our freedom and ensure that all bits are treated equally. Most impo 607 rtantly\, these laws can be hacked and tweaked to fit our needs - like most 608 things in this world. 609 SUMMARY:HOWTO Hack the law 610 STATUS:CONFIRMED 611 END:VEVENT 612 BEGIN:VEVENT 613 DURATION:PT1H00M 614 LOCATION:Saal 6 615 SEQUENCE:0 616 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5368.en.html 617 DTSTART;TZID=Europe/Berlin:20121229T113000 618 UID:5368@29C3@pentabarf.org 619 DTSTAMP:20121226T143018 620 CATEGORIES:Lecture 621 DESCRIPTION:Sechs Jahre nach seinem Inkrafttreten wurde das Informationsfre 622 iheitsgesetz (IFG) des Bundes für den Deutschen Bundestag evaluiert. Auch a 623 us einzelnen Bundesländern liegen zwischenzeitlich wissenschaftlich unterma 624 uerte Erkenntnisse zum Stand oder Nichtstand der Informationsfreiheit in De 625 utschland vor. 626 SUMMARY:IFG: Chance oder Bürgerbluff? - Informationsfreiheit in Deutschland 627 . Ein Sachstand. 628 STATUS:CONFIRMED 629 END:VEVENT 630 BEGIN:VEVENT 631 DURATION:PT1H00M 632 LOCATION:Saal 6 633 SEQUENCE:0 634 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5397.en.html 635 DTSTART;TZID=Europe/Berlin:20121227T183000 636 UID:5397@29C3@pentabarf.org 637 DTSTAMP:20121226T143018 638 CATEGORIES:Lecture 639 DESCRIPTION:INFECT: "Bei der Forschung an unserem neuen Killervirus hat uns 640 ere Ethikkommission penibelst darauf geachtet\, dass niemand der Forscher s 641 ich ansteckt." 642 SUMMARY:INDECT\, Verhaltenserkennung & Co - automatisierte staatliche Verdä 643 chtigung 644 STATUS:CONFIRMED 645 END:VEVENT 646 BEGIN:VEVENT 647 DURATION:PT1H00M 648 LOCATION:Saal 6 649 SEQUENCE:0 650 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5112.en.html 651 DTSTART;TZID=Europe/Berlin:20121227T124500 652 UID:5112@29C3@pentabarf.org 653 DTSTAMP:20121226T143018 654 CATEGORIES:Lecture 655 DESCRIPTION:This talk is aimed to give an insight into CPE WAN Management P 656 rotocol (CWMP) and its GPLv2 implementations that were developed in the pas 657 t year. 658 SUMMARY:ISP's black box - provisioning behind the scenes 659 STATUS:CONFIRMED 660 END:VEVENT 661 BEGIN:VEVENT 662 DURATION:PT1H00M 663 LOCATION:Saal 4 664 SEQUENCE:0 665 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html 666 DTSTART;TZID=Europe/Berlin:20121228T214500 667 UID:5216@29C3@pentabarf.org 668 DTSTAMP:20121226T143018 669 CATEGORIES:Lecture 670 DESCRIPTION:In the last years\, mobile security and specifically GSM has be 671 en attacked in many different ways. It was demonstrated how to sniff and cr 672 ack traffic\, how to impersonate a subscriber by placing a fake call and th 673 e general security characteristics of this mobile protocol stack have been 674 evaluated.In this presentation\, we will check out a part of the protocol p 675 rocedures that hasn't been looked at yet\, specifically Mobile Terminated s 676 ervices. 677 SUMMARY:Let Me Answer That for You - adventures in mobile paging 678 STATUS:CONFIRMED 679 END:VEVENT 680 BEGIN:VEVENT 681 DURATION:PT2H15M 682 LOCATION:Saal 4 683 SEQUENCE:0 684 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5316.en.html 685 DTSTART;TZID=Europe/Berlin:20121228T124500 686 UID:5316@29C3@pentabarf.org 687 DTSTAMP:20121226T143018 688 CATEGORIES:Lecture 689 DESCRIPTION: 690 SUMMARY:Lightning Talks 1 - 5 Minutes of Fame 691 STATUS:CONFIRMED 692 END:VEVENT 693 BEGIN:VEVENT 694 DURATION:PT2H15M 695 LOCATION:Saal 4 696 SEQUENCE:0 697 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5383.en.html 698 DTSTART;TZID=Europe/Berlin:20121229T124500 699 UID:5383@29C3@pentabarf.org 700 DTSTAMP:20121226T143018 701 CATEGORIES:Lecture 702 DESCRIPTION: 703 SUMMARY:Lightning Talks 2 - 5 Minutes of Fame 704 STATUS:CONFIRMED 705 END:VEVENT 706 BEGIN:VEVENT 707 DURATION:PT2H15M 708 LOCATION:Saal 4 709 SEQUENCE:0 710 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5384.en.html 711 DTSTART;TZID=Europe/Berlin:20121230T124500 712 UID:5384@29C3@pentabarf.org 713 DTSTAMP:20121226T143018 714 CATEGORIES:Lecture 715 DESCRIPTION: 716 SUMMARY:Lightning Talks 3 - 5 Minutes of Fame 717 STATUS:CONFIRMED 718 END:VEVENT 719 BEGIN:VEVENT 720 DURATION:PT1H00M 721 LOCATION:Saal 6 722 SEQUENCE:0 723 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5305.en.html 724 DTSTART;TZID=Europe/Berlin:20121229T171500 725 UID:5305@29C3@pentabarf.org 726 DTSTAMP:20121226T143018 727 CATEGORIES:Lecture 728 DESCRIPTION:We're winning! The future looks like network politics!Wait\, w 729 hat the hell are network politics and how do they work? Is that like the P 730 irate Party\, or the IETF\, or Anonymous? 731 SUMMARY:Long live the protocoletariat! 732 STATUS:CONFIRMED 733 END:VEVENT 734 BEGIN:VEVENT 735 DURATION:PT1H00M 736 LOCATION:Saal 4 737 SEQUENCE:0 738 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5124.en.html 739 DTSTART;TZID=Europe/Berlin:20121229T183000 740 UID:5124@29C3@pentabarf.org 741 DTSTAMP:20121226T143018 742 CATEGORIES:Lecture 743 DESCRIPTION:Security is moving deeper into hardware and so should security 744 research. This talks introduces microprobing\, an old technique for snoopin 745 g on data inside chips\, and details a low-cost probing setup. 746 SUMMARY:Low-Cost Chip Microprobing 747 STATUS:CONFIRMED 748 END:VEVENT 749 BEGIN:VEVENT 750 DURATION:PT1H00M 751 LOCATION:Saal 4 752 SEQUENCE:0 753 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5088.en.html 754 DTSTART;TZID=Europe/Berlin:20121228T171500 755 UID:5088@29C3@pentabarf.org 756 DTSTAMP:20121226T143018 757 CATEGORIES:Lecture 758 DESCRIPTION:You might remember Tamagotchi virtual pets from the 1990's. The 759 se toys are still around and just as demanding as ever! This talk covers my 760 attempts to hack the latest Tamagotchis. Starting with the IR interface\, 761 and moving down into the hardware\, this presentation will discuss techniqu 762 es for reverse engineering a device with limited inputs\, computing power a 763 nd debugging capabilities. 764 SUMMARY:Many Tamagotchis Were Harmed in the Making of this Presentation 765 STATUS:CONFIRMED 766 END:VEVENT 767 BEGIN:VEVENT 768 DURATION:PT1H00M 769 LOCATION:Saal 1 770 SEQUENCE:0 771 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5180.en.html 772 DTSTART;TZID=Europe/Berlin:20121230T160000 773 UID:5180@29C3@pentabarf.org 774 DTSTAMP:20121226T143018 775 CATEGORIES:Lecture 776 DESCRIPTION:Autonomer Drumroboter\, robotisches Glockenspiel oder klingende 777 Installation: Musikinstrumente zu modifizieren und selbstzubauen bietet mu 778 sik- und technikaffinen Geeks die Möglichkeit\, vorgefertigten Klang-Setups 779 etwas eigenständiges entgegenzusetzen. Drumroboter und Klanginstallationen 780 üben dabei sowohl physisch als auch optisch einen besonderen Reiz aus: die 781 Quelle des Klangs wird entdeckt. 782 SUMMARY:Marvin und der Blues - Wie Roboterinstrumente zum Musik machen benu 783 tzt werden können 784 STATUS:CONFIRMED 785 END:VEVENT 786 BEGIN:VEVENT 787 DURATION:PT1H00M 788 LOCATION:Saal 6 789 SEQUENCE:0 790 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5282.en.html 791 DTSTART;TZID=Europe/Berlin:20121228T214500 792 UID:5282@29C3@pentabarf.org 793 DTSTAMP:20121226T143018 794 CATEGORIES:Lecture 795 DESCRIPTION:Mit RFID-Lesegeräten Menschen tracken - keine Zukunftsvision. 796 SUMMARY:Meine Kleidung funkt - Tracking von Menschen durch in Kleidung inte 797 grierte RFID-Chips 798 STATUS:CONFIRMED 799 END:VEVENT 800 BEGIN:VEVENT 801 DURATION:PT1H00M 802 LOCATION:Saal 4 803 SEQUENCE:0 804 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5289.en.html 805 DTSTART;TZID=Europe/Berlin:20121228T113000 806 UID:5289@29C3@pentabarf.org 807 DTSTAMP:20121226T143018 808 CATEGORIES:Lecture 809 DESCRIPTION:Meldegesetz und der erfolgreiche Protest dagegen. 810 SUMMARY:Meldegesetz - Was aus dem 57-Sekunden-Gesetz wurde 811 STATUS:CONFIRMED 812 END:VEVENT 813 BEGIN:VEVENT 814 DURATION:PT1H00M 815 LOCATION:Saal 6 816 SEQUENCE:0 817 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5285.en.html 818 DTSTART;TZID=Europe/Berlin:20121229T214500 819 UID:5285@29C3@pentabarf.org 820 DTSTAMP:20121226T143018 821 CATEGORIES:Lecture 822 DESCRIPTION:Unsichere Studierenden- und Mensakarten. Eine wissenschaftliche 823 Auswertung. 824 SUMMARY:Men who stare at bits - RFID-Studierendenkarten mit Fehlern 825 STATUS:CONFIRMED 826 END:VEVENT 827 BEGIN:VEVENT 828 DURATION:PT1H00M 829 LOCATION:Saal 1 830 SEQUENCE:0 831 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5393.en.html 832 DTSTART;TZID=Europe/Berlin:20121229T203000 833 UID:5393@29C3@pentabarf.org 834 DTSTAMP:20121226T143018 835 CATEGORIES:Lecture 836 DESCRIPTION:Contactless smartcards have become widespread for applications 837 such as ticketing\, access control\, identification and payments. Side-chan 838 nel analysis (SCA) is a powerful type of passive implementation attack that 839 enables to extract the secret keys of cryptographic devices. At the exampl 840 e of NXP's Mifare DESfire MF3ICD40 smartcards we demonstrate that SCA attac 841 ks can be applied to cryptographic RFID devices: By exploiting the electro- 842 magnetic information leakage of the cards\, its cryptographic keys are reve 843 aled.We introduce our open-source tools for analyzing contactless smartcard 844 s\, i.e.\, an ISO 14443 RFID reader (http://sourceforge.net/projects/reader 845 14443) and the card emulator Chameleon (http://sourceforge.net/projects/cha 846 meleon14443). We then present the probably worst realization of a commercia 847 l contactless payment system ever and detail on various real-world attacks 848 on this widespread (in Germany) system\, e.g.\, how to 'milk the digital ca 849 sh cow' by modifying the credit balance and convert zeros and ones into rea 850 l money. The content of the talk is joint work with Ingo von Maurich\, Davi 851 d Oswald and Christof Paar. 852 SUMMARY:Milking the Digital Cash Cow - Extracting Secret Keys of Contactles 853 s Smartcards 854 STATUS:CONFIRMED 855 END:VEVENT 856 BEGIN:VEVENT 857 DURATION:PT1H00M 858 LOCATION:Saal 6 859 SEQUENCE:0 860 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5280.en.html 861 DTSTART;TZID=Europe/Berlin:20121230T113000 862 UID:5280@29C3@pentabarf.org 863 DTSTAMP:20121226T143018 864 CATEGORIES:Lecture 865 DESCRIPTION:Massive open online courses are the vogue of the season when it 866 comes to discussing the future of university-level education. But we’re on 867 ly starting to see what education at this scope means and how it can be sup 868 ported best\, in terms of both didactics and technology. This talk is an in 869 side report by two instructors who have delved into the experience of teach 870 ing large audiences online. We share the lessons that we have learned: how 871 to spark student interest\, how to put intuition before formal theories\, h 872 ow to streamline production and much more. And we point out what needs to b 873 e done to truly democratize education from the viewpoint of both the studen 874 ts and the instructors. 875 SUMMARY:Millions of Lessons Learned on Electronic Napkins - On the way to f 876 ree(ing) education 877 STATUS:CONFIRMED 878 END:VEVENT 879 BEGIN:VEVENT 880 DURATION:PT1H00M 881 LOCATION:Saal 6 882 SEQUENCE:0 883 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5102.en.html 884 DTSTART;TZID=Europe/Berlin:20121227T171500 885 UID:5102@29C3@pentabarf.org 886 DTSTAMP:20121226T143018 887 CATEGORIES:Lecture 888 DESCRIPTION:In den letzten Jahren haben sich netzpolitische Kräfteverhältni 889 sse auf interessante Weise verschoben. Neue Allianzen bilden sich sowohl ge 890 gen\, als auch für das freie Internet – und dennoch bleibt der Aktivismus w 891 eit hinter seinem Potential zurück. 892 SUMMARY:Netzaktivsten! Ist das alles\, was wir drauf haben? - Eine subjekti 893 ve Bestandsaufnahme 894 STATUS:CONFIRMED 895 END:VEVENT 896 BEGIN:VEVENT 897 DURATION:PT1H00M 898 LOCATION:Saal 6 899 SEQUENCE:0 900 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5134.en.html 901 DTSTART;TZID=Europe/Berlin:20121227T214500 902 UID:5134@29C3@pentabarf.org 903 DTSTAMP:20121226T143018 904 CATEGORIES:Lecture 905 DESCRIPTION:Human interface design for musical instruments presents unique 906 challenges and vast new possibilities. The proliferation of low cost rapid 907 -prototyping tools has put the means of fabricating instruments within reac 908 h of the performing musician. In this talk\, I'll go through the design pr 909 ocess for my main performance controller (The Mojo)\, my multiplayer instru 910 ments (aka Jamboxes) and my new RoboCaster guitar-controller. 911 SUMMARY:New Human Interfaces for Music - DIY MIDI Controllers 912 STATUS:CONFIRMED 913 END:VEVENT 914 BEGIN:VEVENT 915 DURATION:PT0H30M 916 LOCATION:Saal 6 917 SEQUENCE:0 918 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5404.en.html 919 DTSTART;TZID=Europe/Berlin:20121230T160000 920 UID:5404@29C3@pentabarf.org 921 DTSTAMP:20121226T143018 922 CATEGORIES:Lecture 923 DESCRIPTION: 924 SUMMARY:NOC Review - NOC Review about the 29C3 925 STATUS:CONFIRMED 926 END:VEVENT 927 BEGIN:VEVENT 928 DURATION:PT1H00M 929 LOCATION:Saal 1 930 SEQUENCE:0 931 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5385.en.html 932 DTSTART;TZID=Europe/Berlin:20121227T113000 933 UID:5385@29C3@pentabarf.org 934 DTSTAMP:20121226T143018 935 CATEGORIES:Lecture 936 DESCRIPTION:On the topic of resistance. 937 SUMMARY:Not my department 938 STATUS:CONFIRMED 939 END:VEVENT 940 BEGIN:VEVENT 941 DURATION:PT1H00M 942 LOCATION:Saal 1 943 SEQUENCE:0 944 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5037.en.html 945 DTSTART;TZID=Europe/Berlin:20121228T001500 946 UID:5037@29C3@pentabarf.org 947 DTSTAMP:20121226T143018 948 CATEGORIES:Lecture 949 DESCRIPTION:Gut gereift und mit verbesserter Rezeptur.Aber immer noch:Zwei 950 sich auf Couchen fläzende Teams gehirnwinden\, spitzfinden und assoziieren 951 gegeneinander an\, um Bilderrätsel aus den Gefilden IT\, Netzgesellschaft u 952 nd Informatik zu entwirren.(Hashtag: #Nougatbytes) 953 SUMMARY:Nougatbytes 10 - Gebilde(r)ter Hirnsalat – die rhekkcüЯ der Bilderr 954 ätsel 955 STATUS:CONFIRMED 956 END:VEVENT 957 BEGIN:VEVENT 958 DURATION:PT0H30M 959 LOCATION:Saal 6 960 SEQUENCE:0 961 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5203.en.html 962 DTSTART;TZID=Europe/Berlin:20121228T143000 963 UID:5203@29C3@pentabarf.org 964 DTSTAMP:20121226T143018 965 CATEGORIES:Lecture 966 DESCRIPTION:Polish government decided in favour of open-licensed e-textbook 967 s. This is not to liking of big textbook publishers\, reaping in profits ha 968 nd over fist. While their black PR campaign focuses on technicalities\, it 969 seems obvious that their real beef is with the liberal licensing. 970 SUMMARY:OMG! OER! - How big business fights open education in Poland\, and 971 how open education fights back! 972 STATUS:CONFIRMED 973 END:VEVENT 974 BEGIN:VEVENT 975 DURATION:PT0H30M 976 LOCATION:Saal 6 977 SEQUENCE:0 978 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5210.en.html 979 DTSTART;TZID=Europe/Berlin:20121229T140000 980 UID:5210@29C3@pentabarf.org 981 DTSTAMP:20121226T143018 982 CATEGORIES:Lecture 983 DESCRIPTION:The Security Assertion Markup Language (SAML) is a widely adopt 984 ed language for making security statements about subjects. It is a critical 985 component for the development of federated identity deployments and Single 986 Sign-On scenarios. In order to protect integrity and authenticity of the e 987 xchanged SAML assertions\, the XML Signature standard is applied. However\, 988 the signature verification algorithm is much more complex than in traditio 989 nal signature formats like PKCS#7. The integrity protection can thus be suc 990 cessfully circumvented by application of different XML Signature specific a 991 ttacks\, under a weak adversarial model. 992 SUMMARY:On Breaking SAML - Be Whoever You Want to Be 993 STATUS:CONFIRMED 994 END:VEVENT 995 BEGIN:VEVENT 996 DURATION:PT0H15M 997 LOCATION:Saal 1 998 SEQUENCE:0 999 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5399.en.html 1000 DTSTART;TZID=Europe/Berlin:20121227T110000 1001 UID:5399@29C3@pentabarf.org 1002 DTSTAMP:20121226T143018 1003 CATEGORIES:Lecture 1004 DESCRIPTION: 1005 SUMMARY:Opening Event 1006 STATUS:CONFIRMED 1007 END:VEVENT 1008 BEGIN:VEVENT 1009 DURATION:PT1H00M 1010 LOCATION:Saal 1 1011 SEQUENCE:0 1012 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5308.en.html 1013 DTSTART;TZID=Europe/Berlin:20121229T160000 1014 UID:5308@29C3@pentabarf.org 1015 DTSTAMP:20121226T143018 1016 CATEGORIES:Lecture 1017 DESCRIPTION:Was bedeutet das Zeitalter offener Designs für die Sicherheit v 1018 on Schlössern? Zum Beispiel solchen\, die auf eine geringe Verbreitung eine 1019 s Schlüssels setzen? Ein Beispiel sind die sogenannten Hochsicherheitsversi 1020 onen von Polizeihandschellen. Der Talk zeigt was (und wie) sich in diesem B 1021 ereich mit Lasercuttern und 3D Druckern erreichen lässt - sowie welche komp 1022 lexeren Angriffsziele noch warten. Als Ausweg aus der Problematik kopierbar 1023 er Schlüssel gelten digitale Schlösser\, aber sie kranken anders an offenen 1024 Quellen: sie haben keine! Im Rahmen eines Open Source Lock Projektes haben 1025 wir uns daher ein reflashbares Vorhängeschloss angesehen\, doch noch ehe w 1026 ir den Programmieradapter angeschlossen hatten fanden wir eine Schwachstell 1027 e der Hardware... Leider kein Einzelfall! 1028 SUMMARY:Open Source Schlüssel und Schlösser - Offene Quellen zum Bösen und 1029 Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektronischen 1030 Schlössern 1031 STATUS:CONFIRMED 1032 END:VEVENT 1033 BEGIN:VEVENT 1034 DURATION:PT1H00M 1035 LOCATION:Saal 4 1036 SEQUENCE:0 1037 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5265.en.html 1038 DTSTART;TZID=Europe/Berlin:20121230T171500 1039 UID:5265@29C3@pentabarf.org 1040 DTSTAMP:20121226T143018 1041 CATEGORIES:Lecture 1042 DESCRIPTION:x86 processors contain a surprising amount of built-in memory t 1043 ranslation logic\, which is driven by various data tables with intricate en 1044 try formats\, and can produce various kinds of traps and other interesting 1045 computational effects. These features are mostly relics of earlier\, more c 1046 ivilized times\, when Jedi Knights tried to protect the Old Republic OSes w 1047 ith segmentation\, supervisor bits\, and hardware task support\, but were d 1048 efeated by processor de-optimizations and performance concerns and left unu 1049 sed by both Windows and UNIX systems – and explored only by hackers. For th 1050 e rest of the world\, an x86 PC was a "von Neumann architecture" with most 1051 of its strangeness unused. 1052 SUMMARY:Page Fault Liberation Army or Gained in Translation - a history of 1053 creative x86 virtual memory uses 1054 STATUS:CONFIRMED 1055 END:VEVENT 1056 BEGIN:VEVENT 1057 DURATION:PT1H00M 1058 LOCATION:Saal 4 1059 SEQUENCE:0 1060 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5323.en.html 1061 DTSTART;TZID=Europe/Berlin:20121229T230000 1062 UID:5323@29C3@pentabarf.org 1063 DTSTAMP:20121226T143018 1064 CATEGORIES:Lecture 1065 DESCRIPTION:Der Vortrag handelt über Getreidezüchtung. Am Beispiel von Weiz 1066 en soll der langjährige Prozess beschrieben werden\, den es benötigt\, um 1067 eine neue Sorte auf den Markt zu bringen. Es sollen die biologischen Grundl 1068 agen sowie die benötigte Technik vorgestellt werden. Außerdem wird auf die 1069 Problematik eingegangen\, die die Konzentration des Marktes auf wenige groß 1070 e Konzerne mit sich bringt. 1071 SUMMARY:Pflanzenhacken richtig - Einblicke in die Weizenzüchtung 1072 STATUS:CONFIRMED 1073 END:VEVENT 1074 BEGIN:VEVENT 1075 DURATION:PT1H00M 1076 LOCATION:Saal 4 1077 SEQUENCE:0 1078 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5095.en.html 1079 DTSTART;TZID=Europe/Berlin:20121227T183000 1080 UID:5095@29C3@pentabarf.org 1081 DTSTAMP:20121226T143018 1082 CATEGORIES:Lecture 1083 DESCRIPTION:To date\, remote vehicle communications have provided little in 1084 the way of privacy. Much information and misinformation has been spread on 1085 what the system is and can do\, especially within the information security 1086 community. The recent field trial in the US of a connected vehicle infrast 1087 ructure raises the level of concern amongst all who are aware of existing p 1088 rivacy issues. 1089 SUMMARY:Privacy and the Car of the Future - Considerations for the Connecte 1090 d Vehicle 1091 STATUS:CONFIRMED 1092 END:VEVENT 1093 BEGIN:VEVENT 1094 DURATION:PT1H00M 1095 LOCATION:Saal 4 1096 SEQUENCE:0 1097 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5101.en.html 1098 DTSTART;TZID=Europe/Berlin:20121229T160000 1099 UID:5101@29C3@pentabarf.org 1100 DTSTAMP:20121226T143018 1101 CATEGORIES:Lecture 1102 DESCRIPTION:ACTA war das beherrschende Thema des zweiten Halbjahres. Mit AC 1103 TA sollte der Weg einer Privatisierung der Rechtsdurchsetzung weiter gegang 1104 en werden. Was das konkret bedeutet\, können wir bereits im Ausland sehen: 1105 Netzsperren\, 3-Strikes-Systeme und eine Echtzeit-Überwachung des Datenverk 1106 ehrs zur Bekämpfung von Urheberrechtsverletzungen. Existierende Modelle in 1107 anderen europäischen Staaten zeigen\, dass diese Maßnahmen erhebliche grund 1108 - und datenschutzrechtliche Probleme aufwerfen. 1109 SUMMARY:Privatisierung der Rechtsdurchsetzung - Von ACTA\, IPRED und Freund 1110 en 1111 STATUS:CONFIRMED 1112 END:VEVENT 1113 BEGIN:VEVENT 1114 DURATION:PT1H00M 1115 LOCATION:Saal 1 1116 SEQUENCE:0 1117 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5266.en.html 1118 DTSTART;TZID=Europe/Berlin:20121230T140000 1119 UID:5266@29C3@pentabarf.org 1120 DTSTAMP:20121226T143018 1121 CATEGORIES:Lecture 1122 DESCRIPTION:Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Tools 1123 wie Proxies\, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge unters 1124 tützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? Der Vortrag s 1125 tellt einige von diesen vor und zeigt die Stärken und Schwächen. 1126 SUMMARY:Proximax\, Telex\, Flashproxy oder Tor Bridges - Übersicht über akt 1127 uelle Zensurumgehungssoftware 1128 STATUS:CONFIRMED 1129 END:VEVENT 1130 BEGIN:VEVENT 1131 DURATION:PT1H00M 1132 LOCATION:Saal 4 1133 SEQUENCE:0 1134 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5374.en.html 1135 DTSTART;TZID=Europe/Berlin:20121227T171500 1136 UID:5374@29C3@pentabarf.org 1137 DTSTAMP:20121226T143018 1138 CATEGORIES:Lecture 1139 DESCRIPTION: This talk will give an overview of the ongoing work by the W3C 1140 on a controversial general purpose Javascript cryptography API in context 1141 of the larger desire to create trusted and encrypted cloud services with ri 1142 ch web applications. Today\, cryptography is difficult to use and the Web i 1143 s an insecure environment at best\, but can this situation be improved and 1144 cryptography be put in the hands of ordinary developers and users? The W3C 1145 specification\, currently under development\, will be described\, as well a 1146 s its interaction with other parts of the emerging Web Security Model at th 1147 e W3C and IETF such as Content Security Policy\, HTTP Strict Transport Secu 1148 rity\, and Certificate Transparency. A number of use-cases\, ranging from d 1149 ecentralized identity systems to secure cloud services for activists\, will 1150 be detailed. As the specification will be under active development until a 1151 utumn 2013\, feedback from the hacker community is needed! 1152 SUMMARY:Re-igniting the Crypto Wars on the Web 1153 STATUS:CONFIRMED 1154 END:VEVENT 1155 BEGIN:VEVENT 1156 DURATION:PT0H30M 1157 LOCATION:Saal 6 1158 SEQUENCE:0 1159 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5138.en.html 1160 DTSTART;TZID=Europe/Berlin:20121228T131500 1161 UID:5138@29C3@pentabarf.org 1162 DTSTAMP:20121226T143018 1163 CATEGORIES:Lecture 1164 DESCRIPTION:In 1791\, the political reformer Jeremy Bentham theorized the P 1165 anopticon\, whose design promised to allow a single Inspector to surveil (e 1166 xercise "inspective force" over) large numbers of criminals or workers. In 1167 recent years\, the advent of a suitable technical apparatus – CCTV\, ISP ta 1168 ps (network traffic interception)\, data banks\, and so on – has extended t 1169 he proposed 30m circumference of Bentham’s structure to\, and beyond\, the 1170 physical boundaries of entire countries. While total surveillance is often 1171 perceived as a feature of modernity\, its conceptual and epistemological fr 1172 amework is rooted in the Romantic period\, moreover at a key juncture in th 1173 e history of ideas concerning individual subjectivity\, rights and freedoms 1174 . David Barnard-Wills refers to inspective culture as a "nexus of surveilla 1175 nce\, identity and language" (2012). In this talk\, we examine this nexus i 1176 n the historical period that first\, and so powerfully\, imagined the fully 1177 surveilled world. 1178 SUMMARY:Romantic Hackers - Keats\, Wordsworth and Total Surveillance 1179 STATUS:CONFIRMED 1180 END:VEVENT 1181 BEGIN:VEVENT 1182 DURATION:PT1H00M 1183 LOCATION:Saal 1 1184 SEQUENCE:0 1185 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5402.en.html 1186 DTSTART;TZID=Europe/Berlin:20121229T183000 1187 UID:5402@29C3@pentabarf.org 1188 DTSTAMP:20121226T143018 1189 CATEGORIES:Lecture 1190 DESCRIPTION:Privacy International\, Agentura.Ru\, the Russian secret servic 1191 es watchdog\, and Citizen Lab have joined forces to launch a new project en 1192 titled 'Russia’s Surveillance State'. The aims of the project are to undert 1193 ake research and investigation into surveillance practices in Russia\, incl 1194 uding the trade in and use of surveillance technologies\, and to publicise 1195 research and investigative findings to improve national and international a 1196 wareness of surveillance and secrecy practices in Russia. The project is m 1197 ade possible with support from the Canada Centre for Global Security Studie 1198 s\, Munk School of Global Affairs\, at the University of Toronto. 1199 SUMMARY:Russia’s Surveillance State 1200 STATUS:CONFIRMED 1201 END:VEVENT 1202 BEGIN:VEVENT 1203 DURATION:PT1H00M 1204 LOCATION:Saal 1 1205 SEQUENCE:0 1206 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5140.en.html 1207 DTSTART;TZID=Europe/Berlin:20121228T214500 1208 UID:5140@29C3@pentabarf.org 1209 DTSTAMP:20121226T143018 1210 CATEGORIES:Lecture 1211 DESCRIPTION:The triple meltdown of the Fukushima Dai-Ichi nuclear power pla 1212 nt in March last year and the release of radioactive material that has ensu 1213 ed have left a good part of Northern Japan contaminated with unknown amount 1214 of radioactivity. An outstanding lack of transparency from both the govern 1215 ment and the power utility then resulted in a near total lack of informatio 1216 n concerning the levels of radiation in the\, yet unknown\, contaminated ar 1217 eas. As a response\, concerned citizen have started to take upon themselves 1218 this challenging task. However it quickly became clear that handheld measu 1219 rements wouldn't scale up to the full magnitude of the area to cover. New m 1220 eans of measuring radiation accurately\, quickly and cheaply were needed. 1221 SUMMARY:Safecast: DIY and citizen-sensing of radiation - Empowering citizen 1222 in the wake of Fukushima triple-meltdown disaster 1223 STATUS:CONFIRMED 1224 END:VEVENT 1225 BEGIN:VEVENT 1226 DURATION:PT1H00M 1227 LOCATION:Saal 6 1228 SEQUENCE:0 1229 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5059.en.html 1230 DTSTART;TZID=Europe/Berlin:20121227T230000 1231 UID:5059@29C3@pentabarf.org 1232 DTSTAMP:20121226T143018 1233 CATEGORIES:Lecture 1234 DESCRIPTION:Modern civilization unconditionally depends on information syst 1235 ems. It is paradoxical but true that ICS/SCADA systems are the most insecur 1236 e systems in the world. From network to application\, SCADA is full of conf 1237 iguration issues and vulnerabilities. 1238 SUMMARY:SCADA Strangelove - or: How I Learned to Start Worrying and Love Nu 1239 clear Plants 1240 STATUS:CONFIRMED 1241 END:VEVENT 1242 BEGIN:VEVENT 1243 DURATION:PT1H00M 1244 LOCATION:Saal 4 1245 SEQUENCE:0 1246 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5177.en.html 1247 DTSTART;TZID=Europe/Berlin:20121229T113000 1248 UID:5177@29C3@pentabarf.org 1249 DTSTAMP:20121226T143018 1250 CATEGORIES:Lecture 1251 DESCRIPTION:This talk will go into some of challenges\, solutions\, and sto 1252 ries from securing a campaign for the 2012 US presidential election. 1253 SUMMARY:Securing the Campaign - Security and the 2012 US Presidential Elect 1254 ion 1255 STATUS:CONFIRMED 1256 END:VEVENT 1257 BEGIN:VEVENT 1258 DURATION:PT1H00M 1259 LOCATION:Saal 4 1260 SEQUENCE:0 1261 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5225.en.html 1262 DTSTART;TZID=Europe/Berlin:20121229T203000 1263 UID:5225@29C3@pentabarf.org 1264 DTSTAMP:20121226T143018 1265 CATEGORIES:Lecture 1266 DESCRIPTION:In this talk we will survey some 30 recent attacks on the Russi 1267 an GOST block cipher.Background: GOST cipher is the official encryption sta 1268 ndard of the Russian federation\, and also has special versions for the mos 1269 t important Russian banks. Until 2012 there was no attack on GOST when it i 1270 s used in encryption with random keys. I have developed more than 30 differ 1271 ent academic attacks on GOST the fastest has complexity of 2^118 to recover 1272 some but not all 256-bit keys generated at random\, which will be presente 1273 d for the first time at CCC conference. It happens only once per decade tha 1274 t a government standard is broken while it is still an official government 1275 standard (happened for DES and AES\, no other cases known). All these are b 1276 roken only in academic sense\, for GOST most recent attacks are sliding int 1277 o maybe arguably practical in 30 years from now instead of 200 years... Our 1278 earlier results were instrumental at ISO for rejecting GOST as an internat 1279 ional encryption standard last year. Not more than 5+ block cihers have eve 1280 r achieved this level of ISO standardisation in 25 years and it NEVER happe 1281 nded in history of ISO that a cipher got broken during the standardization 1282 process. Two main papers with 70+30 pages respectively which are http://epr 1283 int.iacr.org/2011/626 and http://eprint.iacr.org/2012/138. Two other papers 1284 have been already published in Cryptologia journal which specializes in se 1285 rious military and government crypto. The talk will cover three main famili 1286 es of attacks on GOST: high-level transformations\, low- level inversion/MI 1287 TM/guess-then-software/algebraic attacks and advanced truncated differentia 1288 l cryptanalysis of GOST. 1289 SUMMARY:Security Evaluation of Russian GOST Cipher - Survey of All Known At 1290 tacks on Russian Government Encryption Standard 1291 STATUS:CONFIRMED 1292 END:VEVENT 1293 BEGIN:VEVENT 1294 DURATION:PT1H00M 1295 LOCATION:Saal 1 1296 SEQUENCE:0 1297 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5244.en.html 1298 DTSTART;TZID=Europe/Berlin:20121230T171500 1299 UID:5244@29C3@pentabarf.org 1300 DTSTAMP:20121226T143018 1301 CATEGORIES:Lecture 1302 DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? We 1303 lche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Tre 1304 nds waren zu sehen? 1305 SUMMARY:Security Nightmares - Damit Sie auch morgen schlecht von Ihrem Comp 1306 uter träumen. 1307 STATUS:CONFIRMED 1308 END:VEVENT 1309 BEGIN:VEVENT 1310 DURATION:PT1H00M 1311 LOCATION:Saal 4 1312 SEQUENCE:0 1313 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5167.en.html 1314 DTSTART;TZID=Europe/Berlin:20121227T160000 1315 UID:5167@29C3@pentabarf.org 1316 DTSTAMP:20121226T143018 1317 CATEGORIES:Lecture 1318 DESCRIPTION:In The Netherlands\, this year the community-driven mobile telc 1319 o Limesco has started operations. We're providing voice\, SMS and data serv 1320 ices to dozens of hackers in our country.One of the founders of Limesco wil 1321 l give a lecture about mobile telephony in The Netherlands\, encompassing t 1322 opics like what companies are involved in the system\, how tariffs are cons 1323 tructed and the role of government regulations. 1324 SUMMARY:Setting mobile phones free - An overview of a mobile telephony mark 1325 et and how a community-driven operator is born 1326 STATUS:CONFIRMED 1327 END:VEVENT 1328 BEGIN:VEVENT 1329 DURATION:PT1H00M 1330 LOCATION:Saal 6 1331 SEQUENCE:0 1332 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5164.en.html 1333 DTSTART;TZID=Europe/Berlin:20121228T160000 1334 UID:5164@29C3@pentabarf.org 1335 DTSTAMP:20121226T143018 1336 CATEGORIES:Lecture 1337 DESCRIPTION:Der Betrieb von WLAN-Funk-Netzen und auch von offenen oder frei 1338 en Netzen ist heute weit verbreitet und Teil der Diskussion um die "Culture 1339 s of Sharing". Der Vortrag soll die Grundlagen der Haftung für offene Netze 1340 und die Entwicklung der Rechtsprechung vom Landgericht Hamburg ("gestern") 1341 zum BGH-Urteil "Sommer unseres Lebens" und den Einfluss aktueller Rechtspr 1342 echung des Europäischen Gerichtshofs\, des Bundesgerichtshofs und der Insta 1343 nzgerichte darstellen ("heute"). Ein Ausblick auf die Folgen dieser neuen\, 1344 teilweise abweichenden Rechtsprechung und auf die Gesetzesinitiativen der 1345 SPD und der Linken ("morgen") soll den Vortrag abrunden. 1346 SUMMARY:Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze - Stand 1347 gestern\, heute und morgen 1348 STATUS:CONFIRMED 1349 END:VEVENT 1350 BEGIN:VEVENT 1351 DURATION:PT1H00M 1352 LOCATION:Saal 4 1353 SEQUENCE:0 1354 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5127.en.html 1355 DTSTART;TZID=Europe/Berlin:20121227T124500 1356 UID:5127@29C3@pentabarf.org 1357 DTSTAMP:20121226T143018 1358 CATEGORIES:Lecture 1359 DESCRIPTION:Der Eid des Hippokrates\, der das Handeln von Ärzten ethisch le 1360 iten soll\, ist zwischen 2.500 und 2.000 Jahre alt und tatsächlich wohl die 1361 erste 'Datenschutz-Vorschrift' überhaupt. So heißt es: "Was ich bei der Be 1362 handlung oder auch außerhalb meiner Praxis im Umgange mit Menschen sehe un 1363 d höre\, das man nicht weiterreden darf\, werde ich verschweigen und als Ge 1364 heimnis bewahren." [1] 1365 SUMMARY:Siechtum und Sterben der ärztlichen Schweigepflicht 1366 STATUS:CONFIRMED 1367 END:VEVENT 1368 BEGIN:VEVENT 1369 DURATION:PT1H00M 1370 LOCATION:Saal 4 1371 SEQUENCE:0 1372 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5121.en.html 1373 DTSTART;TZID=Europe/Berlin:20121229T171500 1374 UID:5121@29C3@pentabarf.org 1375 DTSTAMP:20121226T143018 1376 CATEGORIES:Lecture 1377 DESCRIPTION:Green-IT kennen wir inzwischen zur Genüge. Computer können aber 1378 nicht nur nicht "green" sein\, sondern auch unfair und unsozial\, von der 1379 Rohstoffgewinnung bis zur Verschrottung. Unfair spart nämlich Geld. Der Ged 1380 anke\, faire Produkte anzubieten und zu kaufen\, ist inzwischen weit verbre 1381 itet\, allerdings eher bei Kaffee oder Kleidung. Ein Angebot an fairer IT f 1382 ehlt. Die Industrie hat sich noch nicht auf den Weg gemacht\, faire Compute 1383 r herzustellen. Wir Nutzer haben kaum die Wahl – verändern können wir aber 1384 durchaus etwas. Der Vortrag erklärt\, was und wie. 1385 SUMMARY:Sind faire Computer möglich? 1386 STATUS:CONFIRMED 1387 END:VEVENT 1388 BEGIN:VEVENT 1389 DURATION:PT0H30M 1390 LOCATION:Saal 6 1391 SEQUENCE:0 1392 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5123.en.html 1393 DTSTART;TZID=Europe/Berlin:20121229T143000 1394 UID:5123@29C3@pentabarf.org 1395 DTSTAMP:20121226T143018 1396 CATEGORIES:Lecture 1397 DESCRIPTION:The lecture would address topics related to reverse engineering 1398 for mobile platforms\, especially from the Android point of view. The main 1399 aspects of the presentation is a new approach to reverse engineering side 1400 effects problem: some low footprint inspection techniques that grant analys 1401 ts with the ability to access the program memory without altering its behav 1402 ior. One technique is presented in particular - Android service injection - 1403 and is demonstrated. 1404 SUMMARY:Small footprint inspection techniques for Android - Reverse enginee 1405 ring on Android platforms 1406 STATUS:CONFIRMED 1407 END:VEVENT 1408 BEGIN:VEVENT 1409 DURATION:PT1H00M 1410 LOCATION:Saal 4 1411 SEQUENCE:0 1412 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5239.en.html 1413 DTSTART;TZID=Europe/Berlin:20121228T183000 1414 UID:5239@29C3@pentabarf.org 1415 DTSTAMP:20121226T143018 1416 CATEGORIES:Lecture 1417 DESCRIPTION:This talk will give an overview on the technology\, the laws an 1418 d the technical guidelines of the smartMeter roll-out in Germany. 1419 SUMMARY:SmartMeter - A technological overview of the German roll-out 1420 STATUS:CONFIRMED 1421 END:VEVENT 1422 BEGIN:VEVENT 1423 DURATION:PT1H00M 1424 LOCATION:Saal 4 1425 SEQUENCE:0 1426 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5336.en.html 1427 DTSTART;TZID=Europe/Berlin:20121230T113000 1428 UID:5336@29C3@pentabarf.org 1429 DTSTAMP:20121226T143018 1430 CATEGORIES:Lecture 1431 DESCRIPTION:Forderungen nach einer gerechten Sprache (also einer Sprache fr 1432 ei von Rassismus\, Sexismus und anderen menschenfeindlichen Ideologien) sto 1433 ßen häufig auf Unverständnis und Ablehnung. Unverständnis\, weil statt der 1434 sozialen Wirklichkeit die Sprache kritisiert wird\, mit der sie beschrieben 1435 wird. Ablehnung\, weil Sprachkritik häufig als Sprechverbot empfunden wird 1436 . 1437 SUMMARY:Sprache\, Ungleichheit und Unfreiheit 1438 STATUS:CONFIRMED 1439 END:VEVENT 1440 BEGIN:VEVENT 1441 DURATION:PT0H30M 1442 LOCATION:Saal 6 1443 SEQUENCE:0 1444 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5378.en.html 1445 DTSTART;TZID=Europe/Berlin:20121229T124500 1446 UID:5378@29C3@pentabarf.org 1447 DTSTAMP:20121226T143018 1448 CATEGORIES:Lecture 1449 DESCRIPTION:Stabilitätsanker & Wachstumslokomotive geben als politische Met 1450 aphern ungewollt Auskunft über das Ausmaß der europäischen Wirtschafts- und 1451 Finanzkrise. Wie kommt so ein Begriff in Verkehr? Wer gebraucht ihn? Zu we 1452 lchem Zweck? Was fördert die Analyse der Metaphern zutage? 1453 SUMMARY:Stabilitätsanker & Wachstumslokomotive 1454 STATUS:CONFIRMED 1455 END:VEVENT 1456 BEGIN:VEVENT 1457 DURATION:PT1H00M 1458 LOCATION:Saal 6 1459 SEQUENCE:0 1460 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5230.en.html 1461 DTSTART;TZID=Europe/Berlin:20121228T230000 1462 UID:5230@29C3@pentabarf.org 1463 DTSTAMP:20121226T143018 1464 CATEGORIES:Lecture 1465 DESCRIPTION:Stylometry uses linguistic information found in a document to p 1466 erform authorship recognition. In this talk\, we will present how stylometr 1467 y can be used to deanonymize users in multilingual underground forums. Our 1468 initial result shows that in spite of differences in languages and text len 1469 gths\, regular stylometric methods perform well in identifying users in thi 1470 s context. We will also present the improved version of Anonymouth\, a tool 1471 to anonymize written document\, with user studies. 1472 SUMMARY:Stylometry and Online Underground Markets 1473 STATUS:CONFIRMED 1474 END:VEVENT 1475 BEGIN:VEVENT 1476 DURATION:PT0H30M 1477 LOCATION:Saal 6 1478 SEQUENCE:0 1479 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5390.en.html 1480 DTSTART;TZID=Europe/Berlin:20121228T140000 1481 UID:5390@29C3@pentabarf.org 1482 DTSTAMP:20121226T143018 1483 CATEGORIES:Lecture 1484 DESCRIPTION:Don't call us if your campaign does not work! And worse\, every 1485 one's been harassed or arrested. 1486 SUMMARY:Tactical Tech - Bridging the Gap 1487 STATUS:CONFIRMED 1488 END:VEVENT 1489 BEGIN:VEVENT 1490 DURATION:PT0H30M 1491 LOCATION:Saal 6 1492 SEQUENCE:0 1493 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5228.en.html 1494 DTSTART;TZID=Europe/Berlin:20121230T124500 1495 UID:5228@29C3@pentabarf.org 1496 DTSTAMP:20121226T143018 1497 CATEGORIES:Lecture 1498 DESCRIPTION:The Role of Technology in Post-Revolution Tunisia & Egypt: Inte 1499 rnet activists have embarked on many online projects to empower citizens wi 1500 th necessary information about their elected officials. 1501 SUMMARY:Technology in Post-Revolution Tunisia and Egypt 1502 STATUS:CONFIRMED 1503 END:VEVENT 1504 BEGIN:VEVENT 1505 DURATION:PT1H00M 1506 LOCATION:Saal 4 1507 SEQUENCE:0 1508 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5195.en.html 1509 DTSTART;TZID=Europe/Berlin:20121230T160000 1510 UID:5195@29C3@pentabarf.org 1511 DTSTAMP:20121226T143018 1512 CATEGORIES:Lecture 1513 DESCRIPTION:The Executable and Linkable Format (ELF) is omnipresent\; relat 1514 ed OS and library code is run whenever processes are set up and serviced (e 1515 .g.\, dynamically linked). The loader is the stage manager for every execut 1516 able. Hardly anyone appreciates the work that the ELF backstage crew (inclu 1517 ding the linker and the loader) puts in to make an executable run smoothly. 1518 SUMMARY:The Care and Feeding of Weird Machines Found in Executable Metadata 1519 STATUS:CONFIRMED 1520 END:VEVENT 1521 BEGIN:VEVENT 1522 DURATION:PT1H00M 1523 LOCATION:Saal 4 1524 SEQUENCE:0 1525 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5206.en.html 1526 DTSTART;TZID=Europe/Berlin:20121227T214500 1527 UID:5206@29C3@pentabarf.org 1528 DTSTAMP:20121226T143018 1529 CATEGORIES:Lecture 1530 DESCRIPTION:In the world of digital activism\, distributed denial of servic 1531 e attacks present relatively low barriers to popular participation\, have a 1532 high potential for attracting large numbers of first-time and repeat parti 1533 cipants\, and can attract large amounts of media attention. But though suc 1534 h actions popular\, are they ethical? In this talk I will be presenting an 1535 ethical framework for the analysis of activist DDOS actions. The framework 1536 is grounded in a historical analysis of various activist DDOS actions\, suc 1537 h as the IGC attacks in Spain in the late 90s\, Electronic Disturbance Thea 1538 ter actions in the early 2000s\, and the Anonymous-led Operation Payback at 1539 tacks in 2010. Each historical case study presents a unique confluence of 1540 technological\, political\, legal and operational factors allowing for a fu 1541 ll spectrum of ethical analysis. 1542 SUMMARY:The Ethics of Activist DDOS Actions - A Historical Analysis 1543 STATUS:CONFIRMED 1544 END:VEVENT 1545 BEGIN:VEVENT 1546 DURATION:PT1H00M 1547 LOCATION:Saal 6 1548 SEQUENCE:0 1549 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html 1550 DTSTART;TZID=Europe/Berlin:20121229T230000 1551 UID:5256@29C3@pentabarf.org 1552 DTSTAMP:20121226T143018 1553 CATEGORIES:Lecture 1554 DESCRIPTION:Have you ever been staring for nights at binary or hexadecimal 1555 data flows extracted from an USB channel? Don't you remember yourself searc 1556 hing for some patterns and similarities in this fuc***g mess of zeros and o 1557 nes grabbed from a binary configuration file? How long did it take you to f 1558 ind an 16 bits decimal size field last time you reversed an IPC communicati 1559 on protocol?Did you know you were not alone and that among them\, Rob Savoy 1560 e (@ FOSDEM-08) and Drew Fisher (@ 28C3) have already reported the main dif 1561 ficulties of the RE operations. Both of them called for the creation of a t 1562 ool which would help experts in their work. 1563 SUMMARY:The future of protocol reversing and simulation applied on ZeroAcce 1564 ss botnet - Mapping your enemy Botnet with Netzob 1565 STATUS:CONFIRMED 1566 END:VEVENT 1567 BEGIN:VEVENT 1568 DURATION:PT1H00M 1569 LOCATION:Saal 1 1570 SEQUENCE:0 1571 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5274.en.html 1572 DTSTART;TZID=Europe/Berlin:20121227T171500 1573 UID:5274@29C3@pentabarf.org 1574 DTSTAMP:20121226T143018 1575 CATEGORIES:Lecture 1576 DESCRIPTION:The current European data protection directive is from 1995\, w 1577 hich was when the internet had not hit Brussels' decision-makers yet. Now\, 1578 17 years later\, it is being completely re-writen. Will it meet the challe 1579 nges of the age of big data? Will it have any effect on non-EU data hoarder 1580 s? How will it deal with user-generated consent? What is this strange new " 1581 right to be forgotten"? And what about privacy by design? 1582 SUMMARY:The Grand EU Data Protection Reform - A latest battle report by so 1583 me key actors from Brussels 1584 STATUS:CONFIRMED 1585 END:VEVENT 1586 BEGIN:VEVENT 1587 DURATION:PT1H00M 1588 LOCATION:Saal 6 1589 SEQUENCE:0 1590 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html 1591 DTSTART;TZID=Europe/Berlin:20121228T171500 1592 UID:5306@29C3@pentabarf.org 1593 DTSTAMP:20121226T143018 1594 CATEGORIES:Lecture 1595 DESCRIPTION:At the very beginning\, Tor was just a socks proxy that protect 1596 ed the origin and/or destination of your TCP flows. Now the broader Tor eco 1597 system includes a diverse set of projects -- browser extensions to patch Fi 1598 refox and Thunderbird's privacy issues\, Tor controller libraries to let yo 1599 u interface with the Tor client in your favorite language\, network scanner 1600 s to measure relay performance and look for misbehaving exit relays\, LiveC 1601 Ds\, support for the way Android applications expect Tor to behave\, full-n 1602 etwork simulators and testing frameworks\, plugins to make Tor's traffic lo 1603 ok like Skype or other protocols\, and metrics and measurement tools to kee 1604 p track of how well everything's working. Many of these tools aim to be use 1605 ful beyond Tor: making them modular means they're reusable for other anonym 1606 ity and security projects as well. In this talk\, Roger and Jake will walk 1607 you through all the tools that make up the Tor software world\, and give yo 1608 u a better understanding of which ones need love and how you can help. 1609 SUMMARY:The Tor software ecosystem 1610 STATUS:CONFIRMED 1611 END:VEVENT 1612 BEGIN:VEVENT 1613 DURATION:PT1H00M 1614 LOCATION:Saal 6 1615 SEQUENCE:0 1616 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5178.en.html 1617 DTSTART;TZID=Europe/Berlin:20121230T140000 1618 UID:5178@29C3@pentabarf.org 1619 DTSTAMP:20121226T143018 1620 CATEGORIES:Lecture 1621 DESCRIPTION:Galaksija was to be in Yugoslavia what Commodore and Sinclair w 1622 ere in the west. Whether it succeeded or not\, its deceptively simple desig 1623 n can still teach us a lot of interesting tricks on how to make a usable co 1624 mputer and operating system with as few transistors and bits as possible. 1625 SUMMARY:The ultimate Galaksija talk - Everything about a Yugoslavian microc 1626 omputer halfway between a TRS-80 and a ZX 80 1627 STATUS:CONFIRMED 1628 END:VEVENT 1629 BEGIN:VEVENT 1630 DURATION:PT1H00M 1631 LOCATION:Saal 4 1632 SEQUENCE:0 1633 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5044.en.html 1634 DTSTART;TZID=Europe/Berlin:20121227T230000 1635 UID:5044@29C3@pentabarf.org 1636 DTSTAMP:20121226T143018 1637 CATEGORIES:Lecture 1638 DESCRIPTION:In this year’s talk\, I tie on my 28c3 talk and present timing 1639 side channels from a defending viewpoint: How can one mitigate timing side 1640 channels? Aren’t random delays sufficient to prevent timing side channels i 1641 n practice? What is the minimum size of random delays to be effective? Are 1642 there other delay strategies besides random delays that are more effective 1643 and efficient? 1644 SUMMARY:Time is NOT on your Side - Mitigating Timing Side Channels on the W 1645 eb 1646 STATUS:CONFIRMED 1647 END:VEVENT 1648 BEGIN:VEVENT 1649 DURATION:PT1H00M 1650 LOCATION:Saal 1 1651 SEQUENCE:0 1652 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5380.en.html 1653 DTSTART;TZID=Europe/Berlin:20121228T140000 1654 UID:5380@29C3@pentabarf.org 1655 DTSTAMP:20121226T143018 1656 CATEGORIES:Lecture 1657 DESCRIPTION:Wir wissen seit ein paar Jahren\, dass der Staat technisch in d 1658 er Lage ist\, die Computer einiger seiner Bürger zu infiltrieren. Aber soll 1659 er das auch dürfen? Was hat sich in den letzten Monaten beim Staatstrojane 1660 r getan? 1661 SUMMARY:Trojaner-Blindflug - Spionage-Software von Staats wegen 1662 STATUS:CONFIRMED 1663 END:VEVENT 1664 BEGIN:VEVENT 1665 DURATION:PT0H30M 1666 LOCATION:Saal 6 1667 SEQUENCE:0 1668 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html 1669 DTSTART;TZID=Europe/Berlin:20121228T124500 1670 UID:5091@29C3@pentabarf.org 1671 DTSTAMP:20121226T143018 1672 CATEGORIES:Lecture 1673 DESCRIPTION:Hardware-basierte Festplattenvollverschlüsselungen in Form soge 1674 nannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere und perf 1675 ormante Alternative zu Software-basierter Verschlüsselung wie BitLocker und 1676 TrueCrypt gesehen. Während der Performance-Gewinn und die Benutzerfreundli 1677 chkeit von SEDs\, bspw. Intel's SSD 320 bzw. SSD 520\, außer Frage stehen\, 1678 ist der Sicherheits-Gewinn deutlich geringer als bisher angenommen. Teilwe 1679 ise sind Systeme die auf SEDs basieren gar schwächer als vergleichbare Syst 1680 eme die auf Software-Verschlüsselung basieren. 1681 SUMMARY:(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung 1682 STATUS:CONFIRMED 1683 END:VEVENT 1684 BEGIN:VEVENT 1685 DURATION:PT1H00M 1686 LOCATION:Saal 1 1687 SEQUENCE:0 1688 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5396.en.html 1689 DTSTART;TZID=Europe/Berlin:20121228T160000 1690 UID:5396@29C3@pentabarf.org 1691 DTSTAMP:20121226T143018 1692 CATEGORIES:Lecture 1693 DESCRIPTION:Weltbilder der Informatik sind in mancher Hinsicht denen in der 1694 Hacker- und Hackerinnen-Community nicht unähnlich. 1695 SUMMARY:Was ist\, was kann\, was soll Gender Studies Informatik? 1696 STATUS:CONFIRMED 1697 END:VEVENT 1698 BEGIN:VEVENT 1699 DURATION:PT1H00M 1700 LOCATION:Saal 1 1701 SEQUENCE:0 1702 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5160.en.html 1703 DTSTART;TZID=Europe/Berlin:20121228T113000 1704 UID:5160@29C3@pentabarf.org 1705 DTSTAMP:20121226T143018 1706 CATEGORIES:Lecture 1707 DESCRIPTION:In the Free City of Hamburg\, which is one of 16 German states\ 1708 , a coalition of hackers\, activists and other players of civil society hav 1709 e drafted the most revolutionary Freedom of information law in the world. T 1710 he law obliges the state to proactively publish all important public inform 1711 ation (such as contracts\, studies\, construction permits) in an OpenData f 1712 ormat on the Internet. After the start of a referendum campaign\, the law w 1713 as passed unanimously by the state parliament in June 2012 to avoid a publi 1714 c vote on it. 1715 SUMMARY:We are all lawmakers! - How to further transparency by law – the Ha 1716 mburg example and beyond 1717 STATUS:CONFIRMED 1718 END:VEVENT 1719 BEGIN:VEVENT 1720 DURATION:PT1H00M 1721 LOCATION:Saal 6 1722 SEQUENCE:0 1723 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5208.en.html 1724 DTSTART;TZID=Europe/Berlin:20121227T160000 1725 UID:5208@29C3@pentabarf.org 1726 DTSTAMP:20121226T143018 1727 CATEGORIES:Lecture 1728 DESCRIPTION:Accessibility of digital content is a hugely misunderstood issu 1729 e. Programmers and content developers tend to view it as a distraction or a 1730 special interest concern. Accessibility advocates fail to describe it in t 1731 erms that would put it in the proper place for other technologists\, in par 1732 ticular security practitioners. 1733 We argue that if a format or a document has 1734 systemic accessibility problems\, then accessibility is likely to be the l 1735 east of its problems\; that accessibility only collapses first\, like a can 1736 ary in a mine\, and security is next to follow. We argue that many accessib 1737 ility problems\, just like many security problems\, stem from documents bei 1738 ng hard to parse or containing executable content\, and that the accessibil 1739 ity community is only the first to suffer\, due to not having the manpower 1740 to make extremely complicated formats to almost work almost always. It's an 1741 arms race tougher than the security patching cycle\, made worse by there b 1742 eing no common model for what accessibility properties should look like. 1743 SUMMARY:What accessibility has to do with security 1744 STATUS:CONFIRMED 1745 END:VEVENT 1746 BEGIN:VEVENT 1747 DURATION:PT1H00M 1748 LOCATION:Saal 6 1749 SEQUENCE:0 1750 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5283.en.html 1751 DTSTART;TZID=Europe/Berlin:20121227T203000 1752 UID:5283@29C3@pentabarf.org 1753 DTSTAMP:20121226T143018 1754 CATEGORIES:Lecture 1755 DESCRIPTION:After the political and legislative failure of the blocking and 1756 filtering proposals in Germany (#Zensursula) and the EU (Child Protection 1757 Directive) several players stepped up to implement the measures that previo 1758 usly have been envisioned as compulsory but now on a "self-regulatory" basi 1759 s. 1760 SUMMARY:White IT\, Clean IT & CEO Coalition - How the government tries to e 1761 ncourage privatized policy inforcement and thereby bypasses and circumvents 1762 democratic processes 1763 STATUS:CONFIRMED 1764 END:VEVENT 1765 BEGIN:VEVENT 1766 DURATION:PT1H00M 1767 LOCATION:Saal 1 1768 SEQUENCE:0 1769 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5327.en.html 1770 DTSTART;TZID=Europe/Berlin:20121229T171500 1771 UID:5327@29C3@pentabarf.org 1772 DTSTAMP:20121226T143018 1773 CATEGORIES:Lecture 1774 DESCRIPTION:This action-packed lecture presents the inner workings of the a 1775 uthor's from-scratch implementation of a USB Mass Storage disk in user-land 1776 Python\, along with some embarrassing bugs in operating systems that suppo 1777 rt such disks. The lecture concludes with an introduction to Active Antifo 1778 rensics\, in which a thumbdrive's own firmware can recognize and defend its 1779 elf against disk imaging and other forensic tools. 1780 SUMMARY:Writing a Thumbdrive from Scratch - Prototyping Active Disk Antifor 1781 ensics 1782 STATUS:CONFIRMED 1783 END:VEVENT 1784 BEGIN:VEVENT 1785 DURATION:PT1H00M 1786 LOCATION:Saal 1 1787 SEQUENCE:0 1788 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5262.en.html 1789 DTSTART;TZID=Europe/Berlin:20121227T140000 1790 UID:5262@29C3@pentabarf.org 1791 DTSTAMP:20121226T143018 1792 CATEGORIES:Lecture 1793 DESCRIPTION:Seit anderthalb Jahren begleitet FragDenStaat.de die deutsche I 1794 nformationsfreiheit in der Praxis und dokumentiert die Korrespondenz zwisch 1795 en Anfragestellenden und Behörden. Welche Informationen gibt der Staat prei 1796 s\, und gegen welche Veröffentlichungen kämpft er sogar bis vor Gericht? Di 1797 e interessantesten Fälle werden genauer beleuchtet und eine Bewertung zur L 1798 age der staatlichen Information in Deutschland abgegeben. 1799 SUMMARY:Zur Lage der Information - 1.5 Jahre FragDenStaat.de 1800 STATUS:CONFIRMED 1801 END:VEVENT 1802 END:VCALENDAR