schedule.en.produced.ics (78013B)
1 BEGIN:VCALENDAR 2 VERSION:2.0 3 CALSCALE:GREGORIAN 4 PRODID:-//Pentabarf//Schedule//EN 5 BEGIN:VEVENT 6 DURATION:PT1H00M 7 LOCATION:Saal 1 8 SEQUENCE:0 9 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5333.en.html 10 DTSTART;TZID=Europe/Berlin:20121230T124500 11 UID:5333@29C3@pentabarf.org 12 DTSTAMP:20121226T143018 13 CATEGORIES:Lecture 14 DESCRIPTION:Did you notice 262 42 in your mobile phone network search lis 15 t at the last CCC events? Did you and your friends buy SIM cards at the 16 PoC and help test the network by calling each other\, or by calling thro 17 ugh the bridge to the DECT network services? Did you ever wonder about t 18 he details of this open source test network\, set up by a team of volunt 19 eers in the middle of the city? We would like to tell you all the detail 20 s of the cell phone network we operate at 29C3\, and show you some fancy 21 graphs based on the network activity! 22 SUMMARY:29C3 GSM: Cell phone network review - 262 42 - The full spectrum 23 STATUS:CONFIRMED 24 END:VEVENT 25 BEGIN:VEVENT 26 DURATION:PT1H00M 27 LOCATION:Saal 1 28 SEQUENCE:0 29 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5205.en.html 30 DTSTART;TZID=Europe/Berlin:20121229T140000 31 UID:5205@29C3@pentabarf.org 32 DTSTAMP:20121226T143018 33 CATEGORIES:Lecture 34 DESCRIPTION:There are hundreds\, if not thousands\, of news articles and 35 blog posts about the BlackHole Exploit Kit. Usually\, each story covers 36 only a very narrow part of the subject matter. This talk will summarize 37 the history of the BlackHole Exploit Kit into one easy to follow story. 38 There will be diagrams and flow-charts for explaining code\, rather than 39 a giant blob of illegible Javascript\, PHP\, or x86 Assembly. 40 SUMMARY:Analytical Summary of the BlackHole Exploit Kit - Almost Everythi 41 ng You Ever Wanted To Know About The BlackHole Exploit Kit stor! 42 STATUS:CONFIRMED 43 END:VEVENT 44 BEGIN:VEVENT 45 DURATION:PT1H00M 46 LOCATION:Saal 6 47 SEQUENCE:0 48 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5146.en.html 49 DTSTART;TZID=Europe/Berlin:20121229T160000 50 UID:5146@29C3@pentabarf.org 51 DTSTAMP:20121226T143018 52 CATEGORIES:Lecture 53 DESCRIPTION:There's about 100 top-level domains signed with DNSSEC and .n 54 l recently hit 1M second-level domains. At this occasion\, we take a loo 55 k at the goods and the bads of DNSSEC deployment\, including amplificati 56 on attacks\, Zensursula-like DNS redirects\, China DNS injection and NAS 57 A key rollover mistakes. We will find out what DNSCurve and Namecoin pro 58 mise to make better and what Zooko's triangle has all to do with this. 59 SUMMARY:An Overview of Secure Name Resolution - DNSSEC\, DNSCurve and Nam 60 ecoin 61 STATUS:CONFIRMED 62 END:VEVENT 63 BEGIN:VEVENT 64 DURATION:PT1H00M 65 LOCATION:Saal 6 66 SEQUENCE:0 67 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5237.en.html 68 DTSTART;TZID=Europe/Berlin:20121229T203000 69 UID:5237@29C3@pentabarf.org 70 DTSTAMP:20121226T143018 71 CATEGORIES:Lecture 72 DESCRIPTION:With Visa and Mastercard pushing for EMV (http://www.emvco.co 73 m\, aka “chip and pin”) rollout in the United States\, the uptake of 74 contactless payment and the use of mobile NFC wallets\, the chipcard se 75 curity community will soon be getting more eyes to analyze the protocols 76 in use with chip and contactless credit card transactions. 77 SUMMARY:A Rambling Walk Through an EMV Transaction 78 STATUS:CONFIRMED 79 END:VEVENT 80 BEGIN:VEVENT 81 DURATION:PT1H00M 82 LOCATION:Saal 1 83 SEQUENCE:0 84 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5299.en.html 85 DTSTART;TZID=Europe/Berlin:20121230T113000 86 UID:5299@29C3@pentabarf.org 87 DTSTAMP:20121226T143018 88 CATEGORIES:Lecture 89 DESCRIPTION:Verfassungsschutzskandale gibt es nicht erst seit der Entdeck 90 ung des NSU vor einem Jahr. Vorgestellt werden: sie Affaire Traube\, der 91 Schmücker-Prozess\, das Celler Loch\, die Vulkan-Affaire\, der Anschla 92 gsversuch auf das Jüdische Gemeindehaus West-Berlin\, vier Jahrzehnte B 93 eobachtung von Rolf Gössner. Vielleicht sind aber gar nicht die Pannen 94 der Skandal\, sondern vielmehr der ganz gewöhnliche Alltag des Verfassu 95 ngsschutzes. 96 SUMMARY:Best of ... Verfassungsschutz - Der Verfassungsschutz schützt di 97 e Verfassung so wie Zitronenfalter Zitronen falten. Affaire Tra! 98 STATUS:CONFIRMED 99 END:VEVENT 100 BEGIN:VEVENT 101 DURATION:PT2H15M 102 LOCATION:Saal 1 103 SEQUENCE:0 104 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5379.en.html 105 DTSTART;TZID=Europe/Berlin:20121229T113000 106 UID:5379@29C3@pentabarf.org 107 DTSTAMP:20121226T143018 108 CATEGORIES:Lecture 109 DESCRIPTION:Wir schauen nicht zurück im Zorn\, aber jetzt auch nicht gra 110 de mit Euphorie. Im CCC-Jahresrückblick präsentieren wir Euch einige d 111 er hacktivistischen Themen des vergangenen Jahres\, an denen der CCC gea 112 rbeitet oder sich abgearbeitet hat. Diesmal mit schönen neuen Gesetzen\ 113 , Hacker-Humor\, versäumten Gerichtsterminen\, bunten Blinkenlichtern u 114 nd Iggy Pop. Wir haben uns wirklich das ganze Jahr bemüht\, nur in begr 115 enztem Umfange zu prokrastinieren. 116 SUMMARY:CCC-Jahresrückblick 117 STATUS:CONFIRMED 118 END:VEVENT 119 BEGIN:VEVENT 120 DURATION:PT1H00M 121 LOCATION:Saal 1 122 SEQUENCE:0 123 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5319.en.html 124 DTSTART;TZID=Europe/Berlin:20121228T124500 125 UID:5319@29C3@pentabarf.org 126 DTSTAMP:20121226T143018 127 CATEGORIES:Lecture 128 DESCRIPTION:Hypertext Transfer Protocol Secure (HTTPS) has evolved into t 129 he de facto standard for secure web browsing. But in the security commun 130 ity\, it has long been known that HTTPS is fundamentally broken\, and th 131 is has been confirmed by alarming hacks and security breaches at several 132 Certificate Authorities (CAs). To tackle the global collapse of trust i 133 n these central mediators of HTTPS communications and to augment HTTPS s 134 ecurity\, the EU has launched a proposal for strict regulation. Will the 135 se efforts succeed? 136 SUMMARY:Certificate Authority Collapse - Will the EU Succeed in Regulatin 137 g HTTPS? 138 STATUS:CONFIRMED 139 END:VEVENT 140 BEGIN:VEVENT 141 DURATION:PT1H00M 142 LOCATION:Saal 6 143 SEQUENCE:0 144 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5263.en.html 145 DTSTART;TZID=Europe/Berlin:20121230T171500 146 UID:5263@29C3@pentabarf.org 147 DTSTAMP:20121226T143018 148 CATEGORIES:Lecture 149 DESCRIPTION:Wir brauchen ein maschinenlesbares und -schreibbares Gesetzge 150 bungsverfahren\, in dem jede Änderung transparent diskutiert und beschl 151 ossen wird. Der Bundestag öffnet und digitalisiert sich eher langsam un 152 d widerwillig\, dennoch kann man schon heute anfangen\, die Werkzeuge de 153 r parlamentarischen Zukunft in Deutschland zu gestalten und auszuprobier 154 en. Dazu stellen wir die Projekte OffenesParlament.de und das Bundes-Git 155 vor und zeigen\, wie es in Zukunft weitergehen könnte. 156 SUMMARY:chmod o+rw bundestag - Mehr Transparenz und Teilhabe im Gesetzgeb 157 ungsprozess 158 STATUS:CONFIRMED 159 END:VEVENT 160 BEGIN:VEVENT 161 DURATION:PT1H00M 162 LOCATION:Saal 1 163 SEQUENCE:0 164 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5398.en.html 165 DTSTART;TZID=Europe/Berlin:20121230T183000 166 UID:5398@29C3@pentabarf.org 167 DTSTAMP:20121226T143018 168 CATEGORIES:Lecture 169 DESCRIPTION:Some facts and stats about Congress\, plus stories and legend 170 s. 171 SUMMARY:Closing Event 172 STATUS:CONFIRMED 173 END:VEVENT 174 BEGIN:VEVENT 175 DURATION:PT1H00M 176 LOCATION:Saal 6 177 SEQUENCE:0 178 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5221.en.html 179 DTSTART;TZID=Europe/Berlin:20121227T140000 180 UID:5221@29C3@pentabarf.org 181 DTSTAMP:20121226T143018 182 CATEGORIES:Lecture 183 DESCRIPTION:Wir sind Zeugen eines seit einigen Jahren stattfindenden Wett 184 rüstens im Cyberspace. Immer mehr Staaten bauen militärische Cyberware 185 Einheiten auf\, die aus IT Spezialisten bestehen und dem Zweck dienen 186 \, bestenfalls IT Systeme abzusichern oder schlechterdings Systeme von 187 „Feinden“ anzugreifen. 188 SUMMARY:Cyberpeace statt Cyberwar 189 STATUS:CONFIRMED 190 END:VEVENT 191 BEGIN:VEVENT 192 DURATION:PT1H00M 193 LOCATION:Saal 4 194 SEQUENCE:0 195 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5301.en.html 196 DTSTART;TZID=Europe/Berlin:20121228T203000 197 UID:5301@29C3@pentabarf.org 198 DTSTAMP:20121226T143018 199 CATEGORIES:Lecture 200 DESCRIPTION:Aside from further development of traditional forensic techni 201 ques which involve post-mortem hard disk analysis\, in the last couple o 202 f years the field of computer forensics has been marked by significant d 203 evelopment of live forensic techniques and tools.Memory forensics is com 204 posed of two main activities: memory aquisition/capture and analysis. Th 205 is presentation will give an overview of the memory acquisition and anal 206 ysis techniques and tools on the Windows operating systems. The main par 207 t of the presentation will cover current exploitation techniques and met 208 hods for defeating bothq acquisition and analysis phase of the memory f 209 orensics\, as well as present a new approach for hiding specific artifac 210 ts from forensic tools. Based on the covered exploitation techniques\, s 211 ome suggestions and improvements of the current tools will be given. 212 SUMMARY:Defeating Windows memory forensics 213 STATUS:CONFIRMED 214 END:VEVENT 215 BEGIN:VEVENT 216 DURATION:PT1H00M 217 LOCATION:Saal 4 218 SEQUENCE:0 219 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5159.en.html 220 DTSTART;TZID=Europe/Berlin:20121227T203000 221 UID:5159@29C3@pentabarf.org 222 DTSTAMP:20121226T143018 223 CATEGORIES:Lecture 224 DESCRIPTION:Over the years we learned impressively how to oppose bad legi 225 slation hurting our freedoms online. We are now facing an even bigger ch 226 allenge: how to guarantee that a Free\, open\, decentralized Internet wi 227 ll be protected in the long run? In 2012 The Internetz won major battles 228 against SOPA/PIPA in the US\, and against ACTA in the EU. Yet\, we know 229 that the powerful industries and governments behind these projects will 230 never stop. They have an incentive to gain control of the Internet\, at 231 tacking fundamental rights and promoting technologies like "Deep Packet 232 Inspection"\, now being deployed in each and every corner of the Net\, 233 and used indifferently to break Net neutrality\, to filter\, block and 234 censor communications or to inspect citizens traffic.How to push for pro 235 posals that will ensure that the sharing of knowledge and culture\, citi 236 zens freedoms\, and access to an open infrastructure will be guaranteed 237 in the future public policies? How to become as successful in propositio 238 n as we are now in opposition?(Hint: it's political\, stupid!) 239 SUMMARY:Defend your Freedoms Online: It's Political\, Stupid! - A Positiv 240 e agenda against the next ACTA\, SOPA\, and suchfacing an even ! 241 STATUS:CONFIRMED 242 END:VEVENT 243 BEGIN:VEVENT 244 DURATION:PT1H00M 245 LOCATION:Saal 1 246 SEQUENCE:0 247 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5401.en.html 248 DTSTART;TZID=Europe/Berlin:20121228T171500 249 UID:5401@29C3@pentabarf.org 250 DTSTAMP:20121226T143018 251 CATEGORIES:Lecture 252 DESCRIPTION:Die Debatte um die Tarifreform der GEMA war eines der großen 253 Themen des Jahres 2012: Die Verwertungsgesellschaft geriet quer durch a 254 lle politischen Lager und gesellschaftlichen Schichten in die Kritik\, d 255 ie Warnungen vor einem großen Clubsterben wurden von Tausenden auf die 256 Straße getragen. Dies steigerte auch das Interesse an der »Cultural Co 257 mmons Collecting Society« (C3S)\, einem Graswurzelprojekt zur Gründung 258 einer neuen\, modernen1 und internetverstehenden Verwertungsgesellscha 259 ft\, die u. a. auch vollen Support für Creative-Commons-Lizenzen bieten 260 soll. 2012 war daher auch ein ereignisreiches Jahr für dieses Projekt\ 261 , und 2013 sollen nach Plan die Gründung als Europäische Genossenschaf 262 t und die Antragsstellung beim Deutschen Patent- und Markenamt folgen. 263 SUMMARY:Der Mord fällt aus - Ein Werkstattbericht der GEMA-Alternative C 264 3S 265 STATUS:CONFIRMED 266 END:VEVENT 267 BEGIN:VEVENT 268 DURATION:PT1H00M 269 LOCATION:Saal 1 270 SEQUENCE:0 271 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5382.en.html 272 DTSTART;TZID=Europe/Berlin:20121227T160000 273 UID:5382@29C3@pentabarf.org 274 DTSTAMP:20121226T143018 275 CATEGORIES:Lecture 276 DESCRIPTION:Am 6. November 2012 war der CCC vor dem Bundesverfassungsgeri 277 cht zur Anhörung über die Antiterrordatei und die Grenzen polizeiliche 278 r Datenverarbeitung geladen. Wir berichten über die Anhörung\, die d 279 ort vorgebrachten Argumente und die technische Konzeption der ATD. Und w 280 ir orakeln über ein mögliches Urteil im nächsten Jahr. 281 SUMMARY:Die Antiterrordatei 282 STATUS:CONFIRMED 283 END:VEVENT 284 BEGIN:VEVENT 285 DURATION:PT1H00M 286 LOCATION:Saal 1 287 SEQUENCE:0 288 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5181.en.html 289 DTSTART;TZID=Europe/Berlin:20121227T124500 290 UID:5181@29C3@pentabarf.org 291 DTSTAMP:20121226T143018 292 CATEGORIES:Lecture 293 DESCRIPTION:In den vergangenen Jahren wurde vor allem die Sprache von Pol 294 itikern auf dem Congress beleuchtet. Aber die schwurbelnde Politiker sin 295 d noch nicht die ganze Wahrheit. Wir möchten das Ganze daher um den zwe 296 iten wichtigen Mitspieler bei der Konstruktion von Realität ergänzen\, 297 um die Presse bzw. die Medien. Die Äußerungen von Politikern (zum Bei 298 spiel auf Pressekonferenzen) sollen dabei der Mediendarstellung gegenüb 299 ergestellt werden. Dabe}i wird deutlich werden\, dass es zwischen Polit 300 ikern und Medien Rückkopplungseffekte gibt. 301 SUMMARY:Die Wahrheit\, was wirklich passierte und was in der Zeitung stan 302 d - Wie Medien unsere Wahrnehmung beeinflussens! 303 STATUS:CONFIRMED 304 END:VEVENT 305 BEGIN:VEVENT 306 DURATION:PT2H15M 307 LOCATION:Saal 1 308 SEQUENCE:0 309 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html 310 DTSTART;TZID=Europe/Berlin:20121227T203000 311 UID:5338@29C3@pentabarf.org 312 DTSTAMP:20121226T143018 313 CATEGORIES:Lecture 314 DESCRIPTION:With the post 9/11 rise of the leviathan national security st 315 ate\, the rule of law in the United States under the Constitution is inc 316 reasingly rule by secrecy\, surveillance and executive fiat. 317 SUMMARY:Enemies of the State: What Happens When Telling the Truth about S 318 ecret US Government Power Becomes a Crime - Blowing the Whistle on Spyin 319 g\, LngAying & Illegalities in the Digital Eraxecutive fiat. 320 STATUS:CONFIRMED 321 END:VEVENT 322 BEGIN:VEVENT 323 DURATION:PT1H00M 324 LOCATION:Saal 4 325 SEQUENCE:0 326 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5104.en.html 327 DTSTART;TZID=Europe/Berlin:20121228T230000 328 UID:5104@29C3@pentabarf.org 329 DTSTAMP:20121226T143018 330 CATEGORIES:Lecture 331 DESCRIPTION:This presentation will cover a demonstration of the new versi 332 on of the Canape protocol analysis tool being released for Ruxcon. Durin 333 g the course of the presentation various attack scenarios against the VM 334 Ware ESXi binary protocol will be demonstrated using Canape. 335 SUMMARY:ESXi Beast - Exploiting VMWARE ESXi Binary Protocols Using CANAPE 336 STATUS:CONFIRMED 337 END:VEVENT 338 BEGIN:VEVENT 339 DURATION:PT0H30M 340 LOCATION:Saal 6 341 SEQUENCE:0 342 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5077.en.html 343 DTSTART;TZID=Europe/Berlin:20121229T131500 344 UID:5077@29C3@pentabarf.org 345 DTSTAMP:20121226T143018 346 CATEGORIES:Lecture 347 DESCRIPTION:Recently\, several research papers in the area of computer se 348 curity were published that may or may not be considered unethical. Looki 349 ng at these borderline cases is relevant as today’s research papers wi 350 ll influence how young researchers conduct their research. In our talk w 351 e address various cases and papers and highlight emerging issues for eth 352 ic committees\, internal review boards (IRBs) and senior researchers to 353 evaluate research proposals and to finally decide where they see a line 354 that should not be crossed. 355 SUMMARY:Ethics in Security Research 356 STATUS:CONFIRMED 357 END:VEVENT 358 BEGIN:VEVENT 359 DURATION:PT1H00M 360 LOCATION:Saal 6 361 SEQUENCE:0 362 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5085.en.html 363 DTSTART;TZID=Europe/Berlin:20121228T113000 364 UID:5085@29C3@pentabarf.org 365 DTSTAMP:20121226T143018 366 CATEGORIES:Lecture 367 DESCRIPTION:We know\, that cooking is an art. Selecting the ingredients\, 368 carefully washing\, pealingand cutting them before you put them into th 369 e right dish at the right time with the right heat.Watching the food cha 370 nge his color\, form and consistency\, seasoning it to develop it'sflavo 371 rs and serving it on beautiful plates is a pleasure.For some\, but not 372 for all.Those who love cooking can spend hours at the stove andrelax whi 373 le preparing delicious meals. For others cooking is pure stress. What is 374 the difference between orange and yellowcarrots? Did I forget something 375 ? Is the pan hot enoughq_? Or too hot? How long after thepasta do I star 376 t cooking the steak? Will it be healthy? Is it sustainable?So many quest 377 ionsappear if one starts to think about food. The answers are complicate 378 dand ambiguous. They require research and analyzing. Many have stopped t 379 hinkingabout food. They just believe what is written on thepackage.I can 380 't cookis such an easy answer. And it is accepted in our society. Nobody 381 isashamed of it. This gives more and more control tomultinational corpo 382 rations. Through precookedfood and shiny commercials they calm our consc 383 ience and stimulate our laziness.The consequences are dramatic!The profi 384 t-focused approach of multinationalcorporations have led to things like: 385 • Patented genetically modified seeds. Lawyers suing farmers for copyr 386 ights.• Destruction of South-American jungle to make soya to feed Euro 387 pean cows so theymake more milk. Although a cow as never born to eat pro 388 teins.• Chickens that can't stand on their own feet due to the weight 389 of their breasts. Theywill never see soil\, worms or even sunlight.• O 390 ran-Utangs losing their homes for palm oil• Vegetables getting grown i 391 n the desert\, wasting huge amounts of drinking water.Conclusions:• We 392 must know more about our food• We have to cook more ourselves• So w 393 e will recover some control over what we eat 394 SUMMARY:EveryCook - Cooking gets digital 395 STATUS:CONFIRMED 396 END:VEVENT 397 BEGIN:VEVENT 398 DURATION:PT1H00M 399 LOCATION:Saal 1 400 SEQUENCE:0 401 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html 402 DTSTART;TZID=Europe/Berlin:20121228T183000 403 UID:5275@29C3@pentabarf.org 404 DTSTAMP:20121226T143018 405 CATEGORIES:Lecture 406 DESCRIPTION:RSA is the dominant public-key cryptosystem on the Internet. 407 This talk will explain the state of the art in techniques for the attack 408 er toh- figure out your secret RSA keys.d European co1 409 SUMMARY:FactHacks - RSA factorization in the real world 410 STATUS:CONFIRMED 411 END:VEVENT 412 BEGIN:VEVENT 413 DURATION:PT1H00M 414 LOCATION:Saal 1 415 SEQUENCE:0 416 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5198.en.html 417 DTSTART;TZID=Europe/Berlin:20121229T230000 418 UID:5198@29C3@pentabarf.org 419 DTSTAMP:20121226T143018 420 CATEGORIES:Lecture 421 DESCRIPTION:Neues Jahr\, neue Fnords :-) 422 SUMMARY:Fnord-Jahresrückblick - Diesmal mit noch mehr Eurozonen-Spaltung 423 ! 424 STATUS:CONFIRMED 425 END:VEVENT 426 BEGIN:VEVENT 427 DURATION:PT1H00M 428 LOCATION:Saal 1 429 SEQUENCE:0 430 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5226.en.html 431 DTSTART;TZID=Europe/Berlin:20121229T214500 432 UID:5226@29C3@pentabarf.org 433 DTSTAMP:20121226T143018 434 CATEGORIES:Lecture 435 DESCRIPTION:The calypso baseband and its companion chips are used on the 436 Motorola C123 among other and are now well known for being supported by 437 the Osmocom-BB open source GSM baseband implementation. A couple years a 438 go\, it was hacked a little further by using it as a raw bits capture de 439 vice allowing the interception of GSM traffic very cheaply. 440 SUMMARY:Further hacks on the Calypso platform - or how to turn a phone in 441 to a BTSience a1 442 STATUS:CONFIRMED 443 END:VEVENT 444 BEGIN:VEVENT 445 DURATION:PT2H00M 446 LOCATION:Saal 4 447 SEQUENCE:0 448 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5250.en.html 449 DTSTART;TZID=Europe/Berlin:20121228T001500 450 UID:5250@29C3@pentabarf.org 451 DTSTAMP:20121226T143018 452 CATEGORIES:Lecture 453 DESCRIPTION:Beim Googlequiz treten Teams gegeneinander an\, die *ohne Int 454 ernet* Aufgaben zu Googlesuchen und Suchergebnissen raten. 455 SUMMARY:Googlequiz - Wie man (spaßorientiert) mehr als 5% seines Googlev 456 ermögens trainiertGooglesuchen! 457 STATUS:CONFIRMED 458 END:VEVENT 459 BEGIN:VEVENT 460 DURATION:PT2H00M 461 LOCATION:Saal 1 462 SEQUENCE:0 463 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5309.en.html 464 DTSTART;TZID=Europe/Berlin:20121228T230000 465 UID:5309@29C3@pentabarf.org 466 DTSTAMP:20121226T143018 467 CATEGORIES:Lecture 468 DESCRIPTION: 469 SUMMARY:Hacker Jeopardy - Zahlenraten für Geeks 470 STATUS:CONFIRMED 471 END:VEVENT 472 BEGIN:VEVENT 473 DURATION:PT1H00M 474 LOCATION:Saal 1 475 SEQUENCE:0 476 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5024.en.html 477 DTSTART;TZID=Europe/Berlin:20121228T203000 478 UID:5024@29C3@pentabarf.org 479 DTSTAMP:20121226T143018 480 CATEGORIES:Lecture 481 DESCRIPTION:Hackers are a high-risk population. This talk will provide ha 482 ckers with tools to reduce the risk to themselves and their communities 483 using harm reduction methodology. 484 SUMMARY:Hackers As A High-Risk Population - Harm Reduction Methodology 485 STATUS:CONFIRMED 486 END:VEVENT 487 BEGIN:VEVENT 488 DURATION:PT1H00M 489 LOCATION:Saal 1 490 SEQUENCE:0 491 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html 492 DTSTART;TZID=Europe/Berlin:20121227T230000 493 UID:5400@29C3@pentabarf.org 494 DTSTAMP:20121226T143018 495 CATEGORIES:Lecture 496 DESCRIPTION:We discuss a set of 0-day kernel vulnerabilities in CNU (Cisc 497 o NativeUnix)\, the operating system that powers all Cisco TNP IP phones 498 . Wedemonstrate the reliable exploitation of all Cisco TNP phones viamul 499 tiple vulnerabilities found in the CNU kernel. We demonstratepractical c 500 overt surveillance using constant\, stealthy exfiltration ofmicrophone d 501 ata via a number of covert channels. We also demonstrate theworm-like pr 502 opagation of our CNU malware\, which can quickly compromiseall vulnerabl 503 e Cisco phones on the network. We discuss the feasibilityof our attacks 504 given physical access\,A- internal network access and remoteaccess acros 505 s the internet. Lastly\, we built on last year's presentationby discussi 506 ng the feasibility of exploiting Cisco phones fromcompromised HP printer 507 s and vice versa. 508 SUMMARY:Hacking Cisco Phones - Just because you are paranoid doesn't mean 509 your phone isn't listening to everything you sayall Cisco TNP ! 510 STATUS:CONFIRMED 511 END:VEVENT 512 BEGIN:VEVENT 513 DURATION:PT1H00M 514 LOCATION:Saal 6 515 SEQUENCE:0 516 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5179.en.html 517 DTSTART;TZID=Europe/Berlin:20121229T183000 518 UID:5179@29C3@pentabarf.org 519 DTSTAMP:20121226T143018 520 CATEGORIES:Lecture 521 DESCRIPTION:Wir sehen in der digitalen Technik großes Potential zur Demo 522 kratisierung und Befreiung der Menschen. Doch machen wir uns nichts vor. 523 Technik kann genausogut der Entmündigung von Menschen dienen. Je kompl 524 exer sie wird\, desto mehr sind wir von Vereinfachung abhängig und dest 525 o weniger Einfluss können wir selber auf die Technik nehmen. 526 SUMMARY:Hacking Philosophy - Digitale Mündigkeit\, Technikpaternalismus 527 und warum wir Netzphilosophie brauchenn. Doch m! 528 STATUS:CONFIRMED 529 END:VEVENT 530 BEGIN:VEVENT 531 DURATION:PT1H00M 532 LOCATION:Saal 4 533 SEQUENCE:0 534 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5270.en.html 535 DTSTART;TZID=Europe/Berlin:20121229T001500 536 UID:5270@29C3@pentabarf.org 537 DTSTAMP:20121226T143018 538 CATEGORIES:Lecture 539 DESCRIPTION:This is fun stuff for the late night program\, not a serious 540 talk.Is it possible to read sb. others mind? In the late 1920ies/early 1 541 930ies Berlin was excited by the famous mindreader and fortune teller Er 542 ik Jan Hanussen who performed his strange abilities on stage. His act wa 543 s so convincing that leading nazis beleaved in his powers and wanted him 544 for advice - until they decided to murder him. 545 SUMMARY:Hanussen's mindreading - Experiment's of the historical psychic 546 STATUS:CONFIRMED 547 END:VEVENT 548 BEGIN:VEVENT 549 DURATION:PT1H00M 550 LOCATION:Saal 4 551 SEQUENCE:0 552 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html 553 DTSTART;TZID=Europe/Berlin:20121229T214500 554 UID:5152@29C3@pentabarf.org 555 DTSTAMP:20121226T143018 556 CATEGORIES:Lecture 557 DESCRIPTION:At 28C3\, Klink and Waelde showed that a number of technologi 558 es (PHP\, ASP.NET\,Ruby\, Java\, Python\, etc.) were vulnerable to the d 559 ecade-old hash-flooding DoSattacks. The vulnerability was then often fix 560 ed by adopting stronger hashfunctions and "randomizing" them. 561 SUMMARY:Hash-flooding DoS reloaded: attacks and defenses 562 STATUS:CONFIRMED 563 END:VEVENT 564 BEGIN:VEVENT 565 DURATION:PT1H00M 566 LOCATION:Saal 1 567 SEQUENCE:0 568 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5287.en.html 569 DTSTART;TZID=Europe/Berlin:20121227T183000 570 UID:5287@29C3@pentabarf.org 571 DTSTAMP:20121226T143018 572 CATEGORIES:Lecture 573 DESCRIPTION:NSU-Untersuchungsausschuss in Thüringen und NSU-Untersuchung 574 sausschuss des Bundestages\, über die Mordserie des NSU\, das System de 575 r V-Leute und die Rolle des Verfassungsschutzes.Zwölf Jahre lang konn 576 te der „Natio1nalsozialistische Untergrund“ (NSU) unerkannt in Deut 577 schland eine rassistische Mordserie an neun migrantischen Gewerbetreiben 578 den\, zwei Bombenanschläge mit mehr als zwanzig Verletzten\, den Mord a 579 n einer jungen Polizistin sowie ein Dutzend Banküberfälle verüben. 580 SUMMARY:Hinter den Kulissen: Der NSU und das V-Leute-System 581 STATUS:CONFIRMED 582 END:VEVENT 583 BEGIN:VEVENT 584 DURATION:PT1H00M 585 LOCATION:Saal 6 586 SEQUENCE:0 587 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5219.en.html 588 DTSTART;TZID=Europe/Berlin:20121228T203000 589 UID:5219@29C3@pentabarf.org 590 DTSTAMP:20121226T143018 591 CATEGORIES:Lecture 592 DESCRIPTION:An approach to the problem of fuzzing proprietary protocols w 593 ill be shown\, focusing on network protocols and native software. In the 594 course of this talk I will combine several methods in order to force th 595 e client software to work as a “double agent” against the server. 596 SUMMARY:"How I met your pointer" - Hijacking client software for fuzz and 597 profitSience a1 598 STATUS:CONFIRMED 599 END:VEVENT 600 BEGIN:VEVENT 601 DURATION:PT1H00M 602 LOCATION:Saal 4 603 SEQUENCE:0 604 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5395.en.html 605 DTSTART;TZID=Europe/Berlin:20121227T140000 606 UID:5395@29C3@pentabarf.org 607 DTSTAMP:20121226T143018 608 CATEGORIES:Lecture 609 DESCRIPTION:Legal systems have a huge impact on what we do as hackers\, b 610 ut also on internet users in general. Laws can restrict our freedom to u 611 se the internet in ways we deem to be natural and it can impede the tool 612 s which we hackers use on a daily basis. Which is not to say that laws c 613 annot also protect our freedom and ensure that all bits are treated equa 614 lly. Most importantly\, these laws can be hacked and tweaked to fit our 615 needs - like most things in this world.1 616 SUMMARY:HOWTO Hack the law 617 STATUS:CONFIRMED 618 END:VEVENT 619 BEGIN:VEVENT 620 DURATION:PT1H00M 621 LOCATION:Saal 6 622 SEQUENCE:0 623 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5368.en.html 624 DTSTART;TZID=Europe/Berlin:20121229T113000 625 UID:5368@29C3@pentabarf.org 626 DTSTAMP:20121226T143018 627 CATEGORIES:Lecture 628 DESCRIPTION:Sechs Jahre nach seinem Inkrafttreten wurde das Informationsf 629 reiheitsgesetz (IFG) des Bundes für den Deutschen Bundestag evaluiert. 630 Auch aus einzelnen Bundesländern liegen zwischenzeitlich wissenschaftli 631 ch untermauerte Erkenntnisse zum Stand oder Nichtstand der Informationsf 632 reiheit in Deutschland vor. 633 SUMMARY:IFG: Chance oder Bürgerbluff? - Informationsfreiheit in Deutschl 634 and. Ein Sachstand.) des Bundes! 635 STATUS:CONFIRMED 636 END:VEVENT 637 BEGIN:VEVENT 638 DURATION:PT1H00M 639 LOCATION:Saal 6 640 SEQUENCE:0 641 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5397.en.html 642 DTSTART;TZID=Europe/Berlin:20121227T183000 643 UID:5397@29C3@pentabarf.org 644 DTSTAMP:20121226T143018 645 CATEGORIES:Lecture 646 DESCRIPTION:INFECT: "Bei der Forschung an unserem neuen Killervirus hat u 647 nsere Ethikkommission penibelst darauf geachtet\, dass niemand der Forsc 648 her sich ansteckt." 649 SUMMARY:INDECT\, Verhaltenserkennung & Co - automatisierte staatliche Ver 650 dächtigung 651 STATUS:CONFIRMED 652 END:VEVENT 653 BEGIN:VEVENT 654 DURATION:PT1H00M 655 LOCATION:Saal 6 656 SEQUENCE:0 657 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5112.en.html 658 DTSTART;TZID=Europe/Berlin:20121227T124500 659 UID:5112@29C3@pentabarf.org 660 DTSTAMP:20121226T143018 661 CATEGORIES:Lecture 662 DESCRIPTION:This talk is aimed to give an insight into CPE WAN Management 663 Protocol (CWMP) and its GPLv2 implementations that were developed in th 664 e past year. 665 SUMMARY:ISP's black box - provisioning behind the scenes 666 STATUS:CONFIRMED 667 END:VEVENT 668 BEGIN:VEVENT 669 DURATION:PT1H00M 670 LOCATION:Saal 4 671 SEQUENCE:0 672 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html 673 DTSTART;TZID=Europe/Berlin:20121228T214500 674 UID:5216@29C3@pentabarf.org 675 DTSTAMP:20121226T143018 676 CATEGORIES:Lecture 677 DESCRIPTION:In the last years\, mobile security and specifically GSM has 678 been attacked in many different ways. It was demonstrated how to sniff a 679 nd crack traffic\, how to impersonate a subscriber by placing a fake cal 680 l and the general security characteristics of this mobile protocol stack 681 have been evaluated.In this presentation\, we will check out a part of 682 the protocol procedures that hasn't been looked at yet\, specifically Mo 683 bile Terminated services. 684 SUMMARY:Let Me Answer That for You - adventures in mobile paging 685 STATUS:CONFIRMED 686 END:VEVENT 687 BEGIN:VEVENT 688 DURATION:PT2H15M 689 LOCATION:Saal 4 690 SEQUENCE:0 691 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5316.en.html 692 DTSTART;TZID=Europe/Berlin:20121228T124500 693 UID:5316@29C3@pentabarf.org 694 DTSTAMP:20121226T143018 695 CATEGORIES:Lecture 696 DESCRIPTION: 697 SUMMARY:Lightning Talks 1 - 5 Minutes of Fame 698 STATUS:CONFIRMED 699 END:VEVENT 700 BEGIN:VEVENT 701 DURATION:PT2H15M 702 LOCATION:Saal 4 703 SEQUENCE:0 704 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5383.en.html 705 DTSTART;TZID=Europe/Berlin:20121229T124500 706 UID:5383@29C3@pentabarf.org 707 DTSTAMP:20121226T143018 708 CATEGORIES:Lecture 709 DESCRIPTION: 710 SUMMARY:Lightning Talks 2 - 5 Minutes of Fame 711 STATUS:CONFIRMED 712 END:VEVENT 713 BEGIN:VEVENT 714 DURATION:PT2H15M 715 LOCATION:Saal 4 716 SEQUENCE:0 717 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5384.en.html 718 DTSTART;TZID=Europe/Berlin:20121230T124500 719 UID:5384@29C3@pentabarf.org 720 DTSTAMP:20121226T143018 721 CATEGORIES:Lecture 722 DESCRIPTION: 723 SUMMARY:Lightning Talks 3 - 5 Minutes of Fame 724 STATUS:CONFIRMED 725 END:VEVENT 726 BEGIN:VEVENT 727 DURATION:PT1H00M 728 LOCATION:Saal 6 729 SEQUENCE:0 730 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5305.en.html 731 DTSTART;TZID=Europe/Berlin:20121229T171500 732 UID:5305@29C3@pentabarf.org 733 DTSTAMP:20121226T143018 734 CATEGORIES:Lecture 735 DESCRIPTION:We're winning! The future looks like network politics!Wait\, 736 what the hell are network politics and how do they work? Is that like 737 the Pirate Party\, or the IETF\, or Anonymous? 738 SUMMARY:Long live the protocoletariat! 739 STATUS:CONFIRMED 740 END:VEVENT 741 BEGIN:VEVENT 742 DURATION:PT1H00M 743 LOCATION:Saal 4 744 SEQUENCE:0 745 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5124.en.html 746 DTSTART;TZID=Europe/Berlin:20121229T183000 747 UID:5124@29C3@pentabarf.org 748 DTSTAMP:20121226T143018 749 CATEGORIES:Lecture 750 DESCRIPTION:Security is moving deeper into hardware and so should securit 751 y research. This talks introduces microprobing\, an old technique for sn 752 ooping on data inside chips\, and details a low-cost probing setup. 753 SUMMARY:Low-Cost Chip Microprobing 754 STATUS:CONFIRMED 755 END:VEVENT 756 BEGIN:VEVENT 757 DURATION:PT1H00M 758 LOCATION:Saal 4 759 SEQUENCE:0 760 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5088.en.html 761 DTSTART;TZID=Europe/Berlin:20121228T171500 762 UID:5088@29C3@pentabarf.org 763 DTSTAMP:20121226T143018 764 CATEGORIES:Lecture 765 DESCRIPTION:You might remember Tamagotchi virtual pets from the 1990's. T 766 hese toys are still around and just as demanding as ever! This talk cove 767 rs my attempts to hack the latest Tamagotchis. Starting with the IR inte 768 rface\, and moving down into the hardware\, this presentation will discu 769 ss techniques for reverse engineering a device with limited inputs\, com 770 puting power and debugging capabilities. 771 SUMMARY:Many Tamagotchis Were Harmed in the Making of this Presentation 772 STATUS:CONFIRMED 773 END:VEVENT 774 BEGIN:VEVENT 775 DURATION:PT1H00M 776 LOCATION:Saal 1 777 SEQUENCE:0 778 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5180.en.html 779 DTSTART;TZID=Europe/Berlin:20121230T160000 780 UID:5180@29C3@pentabarf.org 781 DTSTAMP:20121226T143018 782 CATEGORIES:Lecture 783 DESCRIPTION:Autonomer Drumroboter\, robotisches Glockenspiel oder klingen 784 de Installation: Musikinstrumente zu modifizieren und selbstzubauen biet 785 et musik- und technikaffinen Geeks die Möglichkeit\, vorgefertigten Kla 786 ng-Setups etwas eigenständiges entgegenzusetzen. Drumroboter und Klangi 787 nstallationen üben dabei sowohl physisch als auch optisch einen besonde 788 ren Reiz aus: die Quelle des Klangs wird entdeckt. 789 SUMMARY:Marvin und der Blues - Wie Roboterinstrumente zum Musik machen be 790 nutzt werden können des Bundes! 791 STATUS:CONFIRMED 792 END:VEVENT 793 BEGIN:VEVENT 794 DURATION:PT1H00M 795 LOCATION:Saal 6 796 SEQUENCE:0 797 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5282.en.html 798 DTSTART;TZID=Europe/Berlin:20121228T214500 799 UID:5282@29C3@pentabarf.org 800 DTSTAMP:20121226T143018 801 CATEGORIES:Lecture 802 DESCRIPTION:Mit RFID-Lesegeräten Menschen tracken - keine Zukunftsvision 803 . 804 SUMMARY:Meine Kleidung funkt - Tracking von Menschen durch in Kleidung in 805 tegrierte RFID-Chips des Bundes! 806 STATUS:CONFIRMED 807 END:VEVENT 808 BEGIN:VEVENT 809 DURATION:PT1H00M 810 LOCATION:Saal 4 811 SEQUENCE:0 812 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5289.en.html 813 DTSTART;TZID=Europe/Berlin:20121228T113000 814 UID:5289@29C3@pentabarf.org 815 DTSTAMP:20121226T143018 816 CATEGORIES:Lecture 817 DESCRIPTION:Meldegesetz und der erfolgreiche Protest dagegen. 818 SUMMARY:Meldegesetz - Was aus dem 57-Sekunden-Gesetz wurde 819 STATUS:CONFIRMED 820 END:VEVENT 821 BEGIN:VEVENT 822 DURATION:PT1H00M 823 LOCATION:Saal 6 824 SEQUENCE:0 825 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5285.en.html 826 DTSTART;TZID=Europe/Berlin:20121229T214500 827 UID:5285@29C3@pentabarf.org 828 DTSTAMP:20121226T143018 829 CATEGORIES:Lecture 830 DESCRIPTION:Unsichere Studierenden- und Mensakarten. Eine wissenschaftlic 831 he Auswertung. 832 SUMMARY:Men who stare at bits - RFID-Studierendenkarten mit Fehlern 833 STATUS:CONFIRMED 834 END:VEVENT 835 BEGIN:VEVENT 836 DURATION:PT1H00M 837 LOCATION:Saal 1 838 SEQUENCE:0 839 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5393.en.html 840 DTSTART;TZID=Europe/Berlin:20121229T203000 841 UID:5393@29C3@pentabarf.org 842 DTSTAMP:20121226T143018 843 CATEGORIES:Lecture 844 DESCRIPTION:Contactless smartcards have become widespread for application 845 s such as ticketing\, access control\, identification and payments. Side 846 -channel analysis (SCA) is a powerful type of passive implementation att 847 ack that enables to extract the secret keys of cryptographic devices. At 848 the example of NXP's Mifare DESfire MF3ICD40 smartcards we demonstrate 849 that SCA attacks can be applied to cryptographic RFID devices: By exploi 850 ting the electro-magnetic information leakage of the cards\, its cryptog 851 raphic keys are revealed.We introduce our open-source tools for analyzin 852 g contactless smartcardqs\, i.e.\, an ISO 14443 RFID reader (http://so 853 urceforge.net/projects/reader14443) and the card emulator Chameleon (htt 854 p://sourceforge.net/projects/chameleon14443). We then present the probab 855 ly worst realization of a commercial contactless payment system ever and 856 detail on various real-world attacks on this widespread (in Germany) sy 857 stem\, e.g.\, how to 'milk the digital cash cow' by modifying the credit 858 balance and convert zeros and ones into real money. The content of the 859 talk is joint work with Ingo von Maurich\, Daviad Oswald and Christof 860 Paar. 861 SUMMARY:Milking the Digital Cash Cow - Extracting Secret Keys of Contactl 862 ess Smartcards 863 STATUS:CONFIRMED 864 END:VEVENT 865 BEGIN:VEVENT 866 DURATION:PT1H00M 867 LOCATION:Saal 6 868 SEQUENCE:0 869 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5280.en.html 870 DTSTART;TZID=Europe/Berlin:20121230T113000 871 UID:5280@29C3@pentabarf.org 872 DTSTAMP:20121226T143018 873 CATEGORIES:Lecture 874 DESCRIPTION:Massive open online courses are the vogue of the season when 875 it comes to discussing the future of university-level education. But we 876 re onQly starting to see what education at this scope means and how 877 it can be supported best\, in terms of both didactics and technology. Th 878 is talk is an inside report by two instructors who have delved into the 879 experience of teaching large audiences online. We share the lessons that 880 we have learned: how to spark student interest\, how to put intuition b 881 efore formal theories\, how to streamline production and much more. And 882 we point out what needs to be done to truly democratize education from t 883 he viewpoint of both the studenAts and the instructors. 884 SUMMARY:Millions of Lessons Learned on Electronic Napkins - On the way to 885 free(ing) educationng the futu! 886 STATUS:CONFIRMED 887 END:VEVENT 888 BEGIN:VEVENT 889 DURATION:PT1H00M 890 LOCATION:Saal 6 891 SEQUENCE:0 892 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5102.en.html 893 DTSTART;TZID=Europe/Berlin:20121227T171500 894 UID:5102@29C3@pentabarf.org 895 DTSTAMP:20121226T143018 896 CATEGORIES:Lecture 897 DESCRIPTION:In den letzten Jahren haben sich netzpolitische Kräfteverhä 898 ltnisse auf interessante Weise verschoben. Neue Allianzen bilden sich so 899 wohl geqgen\, als auch für das freie Internet – und dennoch bleibt 900 der Aktivismus weit hinter seinem Potential zurück. 901 SUMMARY:Netzaktivsten! Ist das alles\, was wir drauf haben? - Eine subjek 902 tive Bestandsaufnahmeg the futu! 903 STATUS:CONFIRMED 904 END:VEVENT 905 BEGIN:VEVENT 906 DURATION:PT1H00M 907 LOCATION:Saal 6 908 SEQUENCE:0 909 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5134.en.html 910 DTSTART;TZID=Europe/Berlin:20121227T214500 911 UID:5134@29C3@pentabarf.org 912 DTSTAMP:20121226T143018 913 CATEGORIES:Lecture 914 DESCRIPTION:Human interface design for musical instruments presents uniqu 915 e challenges and vast new possibilities. The proliferation of low cost 916 rapid-prototyping tools has put the means of fabricating instruments wit 917 hin reach of the performing musician. In this talk\, I'll go through th 918 e design process for my main performance controller (The Mojo)\, my mult 919 iplayer instruments (aka Jamboxes) and my new RoboCaster guitar-controll 920 er. 921 SUMMARY:New Human Interfaces for Music - DIY MIDI Controllers 922 STATUS:CONFIRMED 923 END:VEVENT 924 BEGIN:VEVENT 925 DURATION:PT0H30M 926 LOCATION:Saal 6 927 SEQUENCE:0 928 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5404.en.html 929 DTSTART;TZID=Europe/Berlin:20121230T160000 930 UID:5404@29C3@pentabarf.org 931 DTSTAMP:20121226T143018 932 CATEGORIES:Lecture 933 DESCRIPTION: 934 SUMMARY:NOC Review - NOC Review about the 29C3 935 STATUS:CONFIRMED 936 END:VEVENT 937 BEGIN:VEVENT 938 DURATION:PT1H00M 939 LOCATION:Saal 1 940 SEQUENCE:0 941 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5385.en.html 942 DTSTART;TZID=Europe/Berlin:20121227T113000 943 UID:5385@29C3@pentabarf.org 944 DTSTAMP:20121226T143018 945 CATEGORIES:Lecture 946 DESCRIPTION:On the topic of resistance. 947 SUMMARY:Not my department 948 STATUS:CONFIRMED 949 END:VEVENT 950 BEGIN:VEVENT 951 DURATION:PT1H00M 952 LOCATION:Saal 1 953 SEQUENCE:0 954 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5037.en.html 955 DTSTART;TZID=Europe/Berlin:20121228T001500 956 UID:5037@29C3@pentabarf.org 957 DTSTAMP:20121226T143018 958 CATEGORIES:Lecture 959 DESCRIPTION:Gut gereift und mit verbesserter Rezeptur.Aber immer noch:Zwe 960 i sich auf Couchen fläzende Teams gehirnwinden\, spitzfinden und assozi 961 ieren gegeneinander an\, um Bilderrätsel aus den Gefilden IT\, Netzgese 962 llschaft und Informatik zu entwirren.(Hashtag: #Nougatbytes) 963 SUMMARY:Nougatbytes 10 - Gebilde(r)ter Hirnsalat – die rhekkcüЯ der B 964 ilderrätselds 965 STATUS:CONFIRMED 966 END:VEVENT 967 BEGIN:VEVENT 968 DURATION:PT0H30M 969 LOCATION:Saal 6 970 SEQUENCE:0 971 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5203.en.html 972 DTSTART;TZID=Europe/Berlin:20121228T143000 973 UID:5203@29C3@pentabarf.org 974 DTSTAMP:20121226T143018 975 CATEGORIES:Lecture 976 DESCRIPTION:Polish government decided in favour of open-licensed e-textbo 977 oks. This is not to liking of big textbook publishers\, reaping in profi 978 ts hand over fist. While their black PR campaign focuses on technicaliti 979 es\, it seems obvious that their real beef is with the liberal licensing 980 . 981 SUMMARY:OMG! OER! - How big business fights open education in Poland\, an 982 d how open education fights back! textbook publ! 983 STATUS:CONFIRMED 984 END:VEVENT 985 BEGIN:VEVENT 986 DURATION:PT0H30M 987 LOCATION:Saal 6 988 SEQUENCE:0 989 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5210.en.html 990 DTSTART;TZID=Europe/Berlin:20121229T140000 991 UID:5210@29C3@pentabarf.org 992 DTSTAMP:20121226T143018 993 CATEGORIES:Lecture 994 DESCRIPTION:The Security Assertion Markup Language (SAML) is a widely ado 995 pted language for making security statements about subjects. It is a cri 996 tical component for the development of federated identity deployments an 997 d Single Sign-On scenarios. In order to protect integrity and authentici 998 ty of the exchanged SAML assertions\, the XML Signature standard is appl 999 ied. However\, the signature verification algorithm is much more complex 1000 than in traditional signature formats like PKCS#7. The integrity protec 1001 tion can thus be successfully circumvented by application of different X 1002 ML Signature specific aawttacks\, under a weak adversarial model. 1003 SUMMARY:On Breaking SAML - Be Whoever You Want to Be 1004 STATUS:CONFIRMED 1005 END:VEVENT 1006 BEGIN:VEVENT 1007 DURATION:PT0H15M 1008 LOCATION:Saal 1 1009 SEQUENCE:0 1010 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5399.en.html 1011 DTSTART;TZID=Europe/Berlin:20121227T110000 1012 UID:5399@29C3@pentabarf.org 1013 DTSTAMP:20121226T143018 1014 CATEGORIES:Lecture 1015 DESCRIPTION: 1016 SUMMARY:Opening Event 1017 STATUS:CONFIRMED 1018 END:VEVENT 1019 BEGIN:VEVENT 1020 DURATION:PT1H00M 1021 LOCATION:Saal 1 1022 SEQUENCE:0 1023 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5308.en.html 1024 DTSTART;TZID=Europe/Berlin:20121229T160000 1025 UID:5308@29C3@pentabarf.org 1026 DTSTAMP:20121226T143018 1027 CATEGORIES:Lecture 1028 DESCRIPTION:Was bedeutet das Zeitalter offener Designs für die Sicherhei 1029 t von Schlössern? Zum Beispiel solchen\, die auf eine geringe Verbreitu 1030 ng eineks Schlüssels setzen? Ein Beispiel sind die sogenannten Hochsi 1031 cherheitsversionen von Polizeihandschellen. Der Talk zeigt was (und wie) 1032 sich in diesem Bereich mit Lasercuttern und 3D Druckern erreichen läss 1033 t - sowie welche komplexeren Angriffsziele noch warten. Als Ausweg aus d 1034 er Problematik kopierbarer Schlüssel gelten digitale Schlösser\, aber 1035 sie kranken anders an offenen Quellen: sie haben keine! Im Rahmen eines 1036 Open Source Lock Projektes haben wir uns daher ein reflashbares Vorhäng 1037 eschloss angesehen\, doch noch ehe wir den Programmieradapter angeschlos 1038 sen hatten fanden wir eine SchwachstellAie der Hardware... Leider kein 1039 Einzelfall! 1040 SUMMARY:Open Source Schlüssel und Schlösser - Offene Quellen zum Bösen 1041 und Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektr 1042 onischen s SchlüsselsSchlössern 1043 STATUS:CONFIRMED 1044 END:VEVENT 1045 BEGIN:VEVENT 1046 DURATION:PT1H00M 1047 LOCATION:Saal 4 1048 SEQUENCE:0 1049 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5265.en.html 1050 DTSTART;TZID=Europe/Berlin:20121230T171500 1051 UID:5265@29C3@pentabarf.org 1052 DTSTAMP:20121226T143018 1053 CATEGORIES:Lecture 1054 DESCRIPTION:x86 processors contain a surprising amount of built-in memory 1055 translation logic\, which is driven by various data tables with intrica 1056 te entry formats\, and can produce various kinds of traps and other inte 1057 resting computational effects. These features are mostly relics of earli 1058 er\, more civilized times\, when Jedi Knights tried to protect the Old R 1059 epublic OSes with segmentation\, supervisor bits\, and hardware task sup 1060 port\, but were defeated by processor de-optimizations and performance c 1061 oncerns and left unused by both Windows and UNIX systems – and explore 1062 d only by hackers. For the rest of the world\, an x86 PC was a "von Neum 1063 ann architecture" with most of its strangeness unused. 1064 SUMMARY:Page Fault Liberation Army or Gained in Translation - a history o 1065 f creative x86 virtual memory usestextbook publ! 1066 STATUS:CONFIRMED 1067 END:VEVENT 1068 BEGIN:VEVENT 1069 DURATION:PT1H00M 1070 LOCATION:Saal 4 1071 SEQUENCE:0 1072 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5323.en.html 1073 DTSTART;TZID=Europe/Berlin:20121229T230000 1074 UID:5323@29C3@pentabarf.org 1075 DTSTAMP:20121226T143018 1076 CATEGORIES:Lecture 1077 DESCRIPTION:Der Vortrag handelt über Getreidezüchtung. Am Beispiel von 1078 Weizen soll der langjährige Prozess beschrieben werden\, den es benöti 1079 gt\, um eine neue Sorte auf den Markt zu bringen. Es sollen die biologi 1080 schen Grundlagen sowie die benötigte Technik vorgestellt werden. Außer 1081 dem wird auf die Problematik eingegangen\, die die Konzentration des Mar 1082 ktes auf wenige große Konzerne mit sich bringt. 1083 SUMMARY:Pflanzenhacken richtig - Einblicke in die Weizenzüchtung 1084 STATUS:CONFIRMED 1085 END:VEVENT 1086 BEGIN:VEVENT 1087 DURATION:PT1H00M 1088 LOCATION:Saal 4 1089 SEQUENCE:0 1090 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5095.en.html 1091 DTSTART;TZID=Europe/Berlin:20121227T183000 1092 UID:5095@29C3@pentabarf.org 1093 DTSTAMP:20121226T143018 1094 CATEGORIES:Lecture 1095 DESCRIPTION:To date\, remote vehicle communications have provided little 1096 in the way of privacy. Much information and misinformation has been spre 1097 ad on what the system is and can do\, especially within the information 1098 security community. The recent field trial in the US of a connected vehi 1099 cle infrastructure raises the level of concern amongst all who are aware 1100 of existing privacy issues. 1101 SUMMARY:Privacy and the Car of the Future - Considerations for the Connec 1102 ted Vehiclelds 1103 STATUS:CONFIRMED 1104 END:VEVENT 1105 BEGIN:VEVENT 1106 DURATION:PT1H00M 1107 LOCATION:Saal 4 1108 SEQUENCE:0 1109 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5101.en.html 1110 DTSTART;TZID=Europe/Berlin:20121229T160000 1111 UID:5101@29C3@pentabarf.org 1112 DTSTAMP:20121226T143018 1113 CATEGORIES:Lecture 1114 DESCRIPTION:ACTA war das beherrschende Thema des zweiten Halbjahres. Mit 1115 ACTA sollte der Weg einer Privatisierung der Rechtsdurchsetzung weiter g 1116 egangen werden. Was das konkret bedeutet\, können wir bereits im Auslan 1117 d sehen: Netzsperren\, 3-Strikes-Systeme und eine Echtzeit-Überwachung 1118 des Datenverkehrs zur Bekämpfung von Urheberrechtsverletzungen. Existie 1119 rende Modelle in anderen europäischen Staaten zeigen\, dass diese Maßn 1120 ahmen erhebliche grund- und datenschutzrechtliche Probleme aufwerfen. 1121 SUMMARY:Privatisierung der Rechtsdurchsetzung - Von ACTA\, IPRED und Freu 1122 ndenVehiclelds 1123 STATUS:CONFIRMED 1124 END:VEVENT 1125 BEGIN:VEVENT 1126 DURATION:PT1H00M 1127 LOCATION:Saal 1 1128 SEQUENCE:0 1129 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5266.en.html 1130 DTSTART;TZID=Europe/Berlin:20121230T140000 1131 UID:5266@29C3@pentabarf.org 1132 DTSTAMP:20121226T143018 1133 CATEGORIES:Lecture 1134 DESCRIPTION:Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Too 1135 ls wie Proxies\, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge u 1136 nterstützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? De 1137 r Vortrag stellt einige von diesen vor und zeigt die Stärken und Schwä 1138 chen. 1139 SUMMARY:Proximax\, Telex\, Flashproxy oder Tor Bridges - Übersicht über 1140 aktuelle Zensurumgehungssoftwarestextbook publ! 1141 STATUS:CONFIRMED 1142 END:VEVENT 1143 BEGIN:VEVENT 1144 DURATION:PT1H00M 1145 LOCATION:Saal 4 1146 SEQUENCE:0 1147 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5374.en.html 1148 DTSTART;TZID=Europe/Berlin:20121227T171500 1149 UID:5374@29C3@pentabarf.org 1150 DTSTAMP:20121226T143018 1151 CATEGORIES:Lecture 1152 DESCRIPTION: This talk will give an overview of the ongoing work by the W 1153 3C on a controversial general purpose Javascript cryptography API in con 1154 text of the larger desire to create trusted and encrypted cloud services 1155 with rich web applications. Today\, cryptography is difficult to use an 1156 d the Web is an insecure environment at best\, but can this situation be 1157 improved and cryptography be put in the hands of ordinary developers an 1158 d users? The W3C specification\, currently under development\, will be d 1159 escribed\, as well as its interaction with other parts of the emerging W 1160 eb Security Model at th:e W3C and IETF such as Content Security Policy 1161 \, HTTP Strict Transport Security\, and Certificate Transparency. A numb 1162 er of use-cases\, ranging from decentralized identity systems to secure 1163 cloud services for activists\, will be detailed. As the specification wi 1164 ll be under active development until autumn 2013\, feedback from the hac 1165 ker community is needed! 1166 SUMMARY:Re-igniting the Crypto Wars on the Web 1167 STATUS:CONFIRMED 1168 END:VEVENT 1169 BEGIN:VEVENT 1170 DURATION:PT0H30M 1171 LOCATION:Saal 6 1172 SEQUENCE:0 1173 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5138.en.html 1174 DTSTART;TZID=Europe/Berlin:20121228T131500 1175 UID:5138@29C3@pentabarf.org 1176 DTSTAMP:20121226T143018 1177 CATEGORIES:Lecture 1178 DESCRIPTION:In 1791\, the political reformer Jeremy Bentham theorized the 1179 Panopticon\, whose design promised to allow a single Inspector to surve 1180 il (exercise "inspective force" over) large numbers of criminals or work 1181 ers. In recent years\, the advent of a suitable technical apparatus – 1182 CCTV\, ISP taps (network traffic interception)\, data banks\, and so on 1183 – has extended the proposed 30m circumference of Bentham’s structure 1184 to\, and beyond\, the A2physical boundaries of entire countries. While 1185 total surveillance is often perceived as a feature of modernity\, its c 1186 onceptual and epistemological framework is rooted in the Romantic period 1187 \, moreover at a key juncture in the history of ideas concerning individ 1188 ual subjectivity\, rights and freedoms. David Barnard-Wills refers to in 1189 spective culture as a "nexus of surveillance\, identity and language" (2 1190 012). In this talk\, we examine this nexus in the historical period that 1191 first\, and so powerfully\, imagined the fully10 surveilled world. 1192 SUMMARY:Romantic Hackers - Keats\, Wordsworth and Total Surveillance 1193 STATUS:CONFIRMED 1194 END:VEVENT 1195 BEGIN:VEVENT 1196 DURATION:PT1H00M 1197 LOCATION:Saal 1 1198 SEQUENCE:0 1199 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5402.en.html 1200 DTSTART;TZID=Europe/Berlin:20121229T183000 1201 UID:5402@29C3@pentabarf.org 1202 DTSTAMP:20121226T143018 1203 CATEGORIES:Lecture 1204 DESCRIPTION:Privacy International\, Agentura.Ru\, the Russian secret serv 1205 ices watchdog\, and Citizen Lab have joined forces to launch a new proje 1206 ct entitled 'Russia’s Surveillance State'. The aims of the project are 1207 to undertake research and investigation into surveillance practices in 1208 Russia\, including the trade in and use of surveillance technologies\, a 1209 nd to publicise research and investigative findings to improve national 1210 and international awareness of surveillance and secrecy practices in Rus 1211 sia. The project is made possible with support from the Canada Centre f 1212 or Global Security Studies\, Munk School of Global Affairs\, at the Univ 1213 ersity of Toronto. 1214 SUMMARY:Russia’s Surveillance State 1215 STATUS:CONFIRMED 1216 END:VEVENT 1217 BEGIN:VEVENT 1218 DURATION:PT1H00M 1219 LOCATION:Saal 1 1220 SEQUENCE:0 1221 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5140.en.html 1222 DTSTART;TZID=Europe/Berlin:20121228T214500 1223 UID:5140@29C3@pentabarf.org 1224 DTSTAMP:20121226T143018 1225 CATEGORIES:Lecture 1226 DESCRIPTION:The triple meltdown of the Fukushima Dai-Ichi nuclear power p 1227 lant in March last year and the release of radioactive material that has 1228 ensued have left a good part of Northern Japan contaminated with unknow 1229 n amount of radioactivity. An outstanding lack of transparency from both 1230 the government and the power utility then resulted in a near total lack 1231 of information concerning the levels of radiation in the\, yet unknown\ 1232 , contaminated areas. As a response\, concerned citizen have started to 1233 take upon themselves this challenging task. However it quickly became cl 1234 ear that handheld measu! rements wouldn't scale up to the full magnitud 1235 e of the area to cover. New means of measuring radiation accurately\, qu 1236 ickly and cheaply were needed. 1237 SUMMARY:Safecast: DIY and citizen-sensing of radiation - Empowering citiz 1238 en in the wake of Fukushima triple-meltdown disasterve material! 1239 STATUS:CONFIRMED 1240 END:VEVENT 1241 BEGIN:VEVENT 1242 DURATION:PT1H00M 1243 LOCATION:Saal 6 1244 SEQUENCE:0 1245 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5059.en.html 1246 DTSTART;TZID=Europe/Berlin:20121227T230000 1247 UID:5059@29C3@pentabarf.org 1248 DTSTAMP:20121226T143018 1249 CATEGORIES:Lecture 1250 DESCRIPTION:Modern civilization unconditionally depends on information sy 1251 stems. It is paradoxical but true that ICS/SCADA systems are the most in 1252 secure systems in the world. From network to application\, SCADA is full 1253 of configuration issues and vulnerabilities. 1254 SUMMARY:SCADA Strangelove - or: How I Learned to Start Worrying and Love 1255 Nuclear Plants 1256 STATUS:CONFIRMED 1257 END:VEVENT 1258 BEGIN:VEVENT 1259 DURATION:PT1H00M 1260 LOCATION:Saal 4 1261 SEQUENCE:0 1262 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5177.en.html 1263 DTSTART;TZID=Europe/Berlin:20121229T113000 1264 UID:5177@29C3@pentabarf.org 1265 DTSTAMP:20121226T143018 1266 CATEGORIES:Lecture 1267 DESCRIPTION:This talk will go into some of challenges\, solutions\, and s 1268 tories from securing a campaign for the 2012 US presidential election. 1269 SUMMARY:Securing the Campaign - Security and the 2012 US Presidential Ele 1270 ctionar Plants 1271 STATUS:CONFIRMED 1272 END:VEVENT 1273 BEGIN:VEVENT 1274 DURATION:PT1H00M 1275 LOCATION:Saal 4 1276 SEQUENCE:0 1277 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5225.en.html 1278 DTSTART;TZID=Europe/Berlin:20121229T203000 1279 UID:5225@29C3@pentabarf.org 1280 DTSTAMP:20121226T143018 1281 CATEGORIES:Lecture 1282 DESCRIPTION:In this talk we will survey some 30 recent attacks on the Rus 1283 sian GOST block cipher.Background: GOST cipher is the official encryptio 1284 n standard of the Russian federation\, and also has special versions for 1285 the most important Russian banks. Until 2012 there was no attack on GOS 1286 T when it is used in encryption with random keys. I have developed more 1287 than 30 different academic attacks on GOST the fastest has complexity of 1288 2^118 to recover some but not all 256-bit keys generated at random\, wh 1289 ich will be presented for the first time at CCC conference. It happens o 1290 nly once per decade tha 1291 t a government standard is broken while it is 1292 still an official government standard (happened for DES and AES\, no oth 1293 er cases known). All these are broken only in academic sense\, for GOST 1294 most recent attacks are sliding into maybe arguably practical in 30 year 1295 s from now instead of 200 years... Our earlier results were instrumental 1296 at ISO for rejecting GOST as an international encryption standard last 1297 year. Not more than 5+ block cihers have ever achieved this level of ISO 1298 standardisation in 25 years and it NEVER happeqnded in history of ISO 1299 that a cipher got broken during the standardization process. Two main p 1300 apers with 70+30 pages respectively which are http://eprint.iacr.org/201 1301 1/626 and http://eprint.iacr.org/2012/138. Two other papers have been al 1302 ready published in Cryptologia journal which specializes in serious mili 1303 tary and government crypto. The talk will cover three main families of a 1304 ttacks on GOST: high-level transformations\, low- level inversion/MITM/g 1305 uess-then-software/algebraic attacks and advanced truncated differentiaa 1306 l cryptanalysis of GOST. 1307 SUMMARY:Security Evaluation of Russian GOST Cipher - Survey of All Known 1308 Attacks on Russian Government Encryption Standard the official ! 1309 STATUS:CONFIRMED 1310 END:VEVENT 1311 BEGIN:VEVENT 1312 DURATION:PT1H00M 1313 LOCATION:Saal 1 1314 SEQUENCE:0 1315 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5244.en.html 1316 DTSTART;TZID=Europe/Berlin:20121230T171500 1317 UID:5244@29C3@pentabarf.org 1318 DTSTAMP:20121226T143018 1319 CATEGORIES:Lecture 1320 DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? 1321 Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords un 1322 d Treed1nds waren zu sehen? 1323 SUMMARY:Security Nightmares - Damit Sie auch morgen schlecht von Ihrem Co 1324 mputer träumen.wicklungen habe! 1325 STATUS:CONFIRMED 1326 END:VEVENT 1327 BEGIN:VEVENT 1328 DURATION:PT1H00M 1329 LOCATION:Saal 4 1330 SEQUENCE:0 1331 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5167.en.html 1332 DTSTART;TZID=Europe/Berlin:20121227T160000 1333 UID:5167@29C3@pentabarf.org 1334 DTSTAMP:20121226T143018 1335 CATEGORIES:Lecture 1336 DESCRIPTION:In The Netherlands\, this year the community-driven mobile te 1337 lco Limesco has started operations. We're providing voice\, SMS and data 1338 services to dozens of hackers in our country.One of the founders of Lim 1339 esco will give a lecture about mobile telephony in The Netherlands\, enc 1340 ompassing topics like what companies are involved in the system\, how ta 1341 riffs are constructed and the role of government regulations. 1342 SUMMARY:Setting mobile phones free - An overview of a mobile telephony ma 1343 rket and how a community-driven operator is borning voice\, SMS! 1344 STATUS:CONFIRMED 1345 END:VEVENT 1346 BEGIN:VEVENT 1347 DURATION:PT1H00M 1348 LOCATION:Saal 6 1349 SEQUENCE:0 1350 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5164.en.html 1351 DTSTART;TZID=Europe/Berlin:20121228T160000 1352 UID:5164@29C3@pentabarf.org 1353 DTSTAMP:20121226T143018 1354 CATEGORIES:Lecture 1355 DESCRIPTION:Der Betrieb von WLAN-Funk-Netzen und auch von offenen oder fr 1356 eien Netzen ist heute weit verbreitet und Teil der Diskussion um die "Cu 1357 ltures of Sharing". Der Vortrag soll die Grundlagen der Haftung für off 1358 ene Netze und die Entwicklung der Rechtsprechung vom Landgericht Hamburg 1359 ("gestern") zum BGH-Urteil "Sommer unseres Lebens" und den Einfluss akt 1360 ueller Rechtsprqechung des Europäischen Gerichtshofs\, des Bundesgeric 1361 htshofs und der Instanzgerichte darstellen ("heute"). Ein Ausblick auf d 1362 ie Folgen dieser neuen\, teilweise abweichenden Rechtsprechung und auf d 1363 ie Gesetzesinitiativen der SPD und der Linken ("morgen") soll den Vortra 1364 g abrunden. 1365 SUMMARY:Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze - St 1366 and gestern\, heute und morgen eitet und Teil ! 1367 STATUS:CONFIRMED 1368 END:VEVENT 1369 BEGIN:VEVENT 1370 DURATION:PT1H00M 1371 LOCATION:Saal 4 1372 SEQUENCE:0 1373 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5127.en.html 1374 DTSTART;TZID=Europe/Berlin:20121227T124500 1375 UID:5127@29C3@pentabarf.org 1376 DTSTAMP:20121226T143018 1377 CATEGORIES:Lecture 1378 DESCRIPTION:Der Eid des Hippokrates\, der das Handeln von Ärzten ethisch 1379 leiten soll\, ist zwischen 2.500 und 2.000 Jahre alt und tatsächlich w 1380 ohl diea erste 'Datenschutz-Vorschrift' überhaupt. So heißt es: "Was 1381 ich bei der Behandlung oder auch außerhalb meiner Praxis im Umgange mi 1382 t Menschen sehe und höre\, das man nicht weiterreden darf\, werde ich v 1383 erschweigen und als Geheimnis bewahren." [1] 1384 SUMMARY:Siechtum und Sterben der ärztlichen Schweigepflicht 1385 STATUS:CONFIRMED 1386 END:VEVENT 1387 BEGIN:VEVENT 1388 DURATION:PT1H00M 1389 LOCATION:Saal 4 1390 SEQUENCE:0 1391 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5121.en.html 1392 DTSTART;TZID=Europe/Berlin:20121229T171500 1393 UID:5121@29C3@pentabarf.org 1394 DTSTAMP:20121226T143018 1395 CATEGORIES:Lecture 1396 DESCRIPTION:Green-IT kennen wir inzwischen zur Genüge. Computer können 1397 aber nicht nur nicht "green" sein\, sondern auch unfair und unsozial\, v 1398 on der 1Rohstoffgewinnung bis zur Verschrottung. Unfair spart nämlich 1399 Geld. Der Gedanke\, faire Produkte anzubieten und zu kaufen\, ist inzwis 1400 chen weit verbreitet\, allerdings eher bei Kaffee oder Kleidung. Ein Ang 1401 ebot an fairer IT fehlt. Die Industrie hat sich noch nicht auf den Weg g 1402 emacht\, faire Computer herzustellen. Wir Nutzer haben kaum die Wahl – 1403 verändern können wir aber durchaus etwas. Der Vortrag erklärt\, was 1404 und wie. 1405 SUMMARY:Sind faire Computer möglich? 1406 STATUS:CONFIRMED 1407 END:VEVENT 1408 BEGIN:VEVENT 1409 DURATION:PT0H30M 1410 LOCATION:Saal 6 1411 SEQUENCE:0 1412 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5123.en.html 1413 DTSTART;TZID=Europe/Berlin:20121229T143000 1414 UID:5123@29C3@pentabarf.org 1415 DTSTAMP:20121226T143018 1416 CATEGORIES:Lecture 1417 DESCRIPTION:The lecture would address topics related to reverse engineeri 1418 ng for mobile platforms\, especially from the Android point of view. The 1419 main aspects of the presentation is a new approach to reverse engineeri 1420 ng side effects problem: some low footprint inspection techniques that g 1421 rant analysts with the ability to access the program memory without alte 1422 ring its behavior. One technique is presented in particular - Android se 1423 rvice injection - and is demonstrated. 1424 SUMMARY:Small footprint inspection techniques for Android - Reverse engin 1425 eering on Android platformshabe! 1426 STATUS:CONFIRMED 1427 END:VEVENT 1428 BEGIN:VEVENT 1429 DURATION:PT1H00M 1430 LOCATION:Saal 4 1431 SEQUENCE:0 1432 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5239.en.html 1433 DTSTART;TZID=Europe/Berlin:20121228T183000 1434 UID:5239@29C3@pentabarf.org 1435 DTSTAMP:20121226T143018 1436 CATEGORIES:Lecture 1437 DESCRIPTION:This talk will give an overview on the technology\, the laws 1438 and the technical guidelines of the smartMeter roll-out in Germany. 1439 SUMMARY:SmartMeter - A technological overview of the German roll-out 1440 STATUS:CONFIRMED 1441 END:VEVENT 1442 BEGIN:VEVENT 1443 DURATION:PT1H00M 1444 LOCATION:Saal 4 1445 SEQUENCE:0 1446 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5336.en.html 1447 DTSTART;TZID=Europe/Berlin:20121230T113000 1448 UID:5336@29C3@pentabarf.org 1449 DTSTAMP:20121226T143018 1450 CATEGORIES:Lecture 1451 DESCRIPTION:Forderungen nach einer gerechten Sprache (also einer Sprache 1452 frei von Rassismus\, Sexismus und anderen menschenfeindlichen Ideologien 1453 ) stoßen häufig auf Unverständnis und Ablehnung. Unverständnis\, wei 1454 l statt der sozialen Wirklichkeit die Sprache kritisiert wird\, mit der 1455 sie beschrieben wird. Ablehnung\, weil Sprachkritik häufig als Sprechve 1456 rbot empfunden wird. 1457 SUMMARY:Sprache\, Ungleichheit und Unfreiheit 1458 STATUS:CONFIRMED 1459 END:VEVENT 1460 BEGIN:VEVENT 1461 DURATION:PT0H30M 1462 LOCATION:Saal 6 1463 SEQUENCE:0 1464 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5378.en.html 1465 DTSTART;TZID=Europe/Berlin:20121229T124500 1466 UID:5378@29C3@pentabarf.org 1467 DTSTAMP:20121226T143018 1468 CATEGORIES:Lecture 1469 DESCRIPTION:Stabilitätsanker & Wachstumslokomotive geben als politische 1470 Metaphern ungewollt Auskunft über das Ausmaß der europäischen Wirtsch 1471 afts- und Finanzkrise. Wie kommt so ein Begriff in Verkehr? Wer gebrauch 1472 t ihn? Zu welchem Zweck? Was fördert die Analyse der Metaphern zutage? 1473 SUMMARY:Stabilitätsanker & Wachstumslokomotive 1474 STATUS:CONFIRMED 1475 END:VEVENT 1476 BEGIN:VEVENT 1477 DURATION:PT1H00M 1478 LOCATION:Saal 6 1479 SEQUENCE:0 1480 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5230.en.html 1481 DTSTART;TZID=Europe/Berlin:20121228T230000 1482 UID:5230@29C3@pentabarf.org 1483 DTSTAMP:20121226T143018 1484 CATEGORIES:Lecture 1485 DESCRIPTION:Stylometry uses linguistic information found in a document to 1486 perform authorship recognition. In this talk\, we will present how styl 1487 ometry can be used to deanonymize users in multilingual underground foru 1488 ms. Our initial result shows that in spite of differences in languages a 1489 nd text lengths\, regular stylometric methods perform well in identifyin 1490 g users in this context. We will also present the improved version of An 1491 onymouth\, a tool to anonymize written document\, with user studies. 1492 SUMMARY:Stylometry and Online Underground Markets 1493 STATUS:CONFIRMED 1494 END:VEVENT 1495 BEGIN:VEVENT 1496 DURATION:PT0H30M 1497 LOCATION:Saal 6 1498 SEQUENCE:0 1499 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5390.en.html 1500 DTSTART;TZID=Europe/Berlin:20121228T140000 1501 UID:5390@29C3@pentabarf.org 1502 DTSTAMP:20121226T143018 1503 CATEGORIES:Lecture 1504 DESCRIPTION:Don't call us if your campaign does not work! And worse\, eve 1505 ryone's been harassed or arrested.tet und Teil ! 1506 SUMMARY:Tactical Tech - Bridging the Gap 1507 STATUS:CONFIRMED 1508 END:VEVENT 1509 BEGIN:VEVENT 1510 DURATION:PT0H30M 1511 LOCATION:Saal 6 1512 SEQUENCE:0 1513 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5228.en.html 1514 DTSTART;TZID=Europe/Berlin:20121230T124500 1515 UID:5228@29C3@pentabarf.org 1516 DTSTAMP:20121226T143018 1517 CATEGORIES:Lecture 1518 DESCRIPTION:The Role of Technology in Post-Revolution Tunisia & Egypt: In 1519 ternet activists have embarked on many online projects to empower citize 1520 ns with necessary information about their elected officials. 1521 SUMMARY:Technology in Post-Revolution Tunisia and Egypt 1522 STATUS:CONFIRMED 1523 END:VEVENT 1524 BEGIN:VEVENT 1525 DURATION:PT1H00M 1526 LOCATION:Saal 4 1527 SEQUENCE:0 1528 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5195.en.html 1529 DTSTART;TZID=Europe/Berlin:20121230T160000 1530 UID:5195@29C3@pentabarf.org 1531 DTSTAMP:20121226T143018 1532 CATEGORIES:Lecture 1533 DESCRIPTION:The Executable and Linkable Format (ELF) is omnipresent\; rel 1534 ated OS and library code is run whenever processes are set up and servic 1535 ed (e.g.\, dynamically linked). The loader is the stage manager for ever 1536 y executable. Hardly anyone appreciates the work that the ELF backstage 1537 crew (including the linker and the loader) puts in to make an executable 1538 run smoothly. 1539 SUMMARY:The Care and Feeding of Weird Machines Found in Executable Metada 1540 ta 1541 STATUS:CONFIRMED 1542 END:VEVENT 1543 BEGIN:VEVENT 1544 DURATION:PT1H00M 1545 LOCATION:Saal 4 1546 SEQUENCE:0 1547 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5206.en.html 1548 DTSTART;TZID=Europe/Berlin:20121227T214500 1549 UID:5206@29C3@pentabarf.org 1550 DTSTAMP:20121226T143018 1551 CATEGORIES:Lecture 1552 DESCRIPTION:In the world of digital activism\, distributed denial of serv 1553 ice attacks present relatively low barriers to popular participation\, h 1554 ave a high potential for attracting large numbers of first-time and repe 1555 at participants\, and can attract large amounts of media attention. But 1556 though such actions popular\, are they ethical? In this talk I will be 1557 presenting an ethical framework for the analysis of activist DDOS action 1558 s. The framework is grounded in a historical analysis of various activis 1559 t DDOS actions\, such as the IGC attacks in Spain in the late 90s\, Elec 1560 tronic Disturbance Theater actions in the early 2000s\, and the Anonym 1561 ous-led Operation Payback attacks in 2010. Each historical case study p 1562 resents a unique confluence of technological\, political\, legal and ope 1563 rational factors allowing for a full spectrum of ethical analysis. 1564 SUMMARY:The Ethics of Activist DDOS Actions - A Historical Analysis 1565 STATUS:CONFIRMED 1566 END:VEVENT 1567 BEGIN:VEVENT 1568 DURATION:PT1H00M 1569 LOCATION:Saal 6 1570 SEQUENCE:0 1571 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html 1572 DTSTART;TZID=Europe/Berlin:20121229T230000 1573 UID:5256@29C3@pentabarf.org 1574 DTSTAMP:20121226T143018 1575 CATEGORIES:Lecture 1576 DESCRIPTION:Have you ever been staring for nights at binary or hexadecima 1577 l data flows extracted from an USB channel? Don't you remember yourself 1578 searching for some patterns and similarities in this fuc***g mess of zer 1579 os and ones grabbed from a binary configuration file? How long did it ta 1580 ke you to find an 16 bits decimal size field last time you reversed an I 1581 PC communication protocol?Did you know you were not alone and that among 1582 them\, Rob Savoye (@ FOSDEM-08) and Drew Fisher (@ 28C3) have already r 1583 eported the main difficulties of the RE operations. Both of them called 1584 for the creation of a tool which would help experts in their work. 1585 SUMMARY:The future of protocol reversing and simulation applied on ZeroAc 1586 cess botnet - Mapping your enemy Botnet with Netzobou remember ! 1587 STATUS:CONFIRMED 1588 END:VEVENT 1589 BEGIN:VEVENT 1590 DURATION:PT1H00M 1591 LOCATION:Saal 1 1592 SEQUENCE:0 1593 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5274.en.html 1594 DTSTART;TZID=Europe/Berlin:20121227T171500 1595 UID:5274@29C3@pentabarf.org 1596 DTSTAMP:20121226T143018 1597 CATEGORIES:Lecture 1598 DESCRIPTION:The current European data protection directive is from 1995\, 1599 which was when the internet had not hit Brussels' decision-makers yet. 1600 Now\, 17 years later\, it is being completely re-writen. Will it meet th 1601 e challenges of the age of big data? Will it have any effect on non-EU d 1602 ata hoarders? How will it deal with user-generated consent? What is this 1603 strange new "right to be forgotten"? And what about privacy by design? 1604 SUMMARY:The Grand EU Data Protection Reform - A latest battle report by 1605 some key actors from Brusselsbe! 1606 STATUS:CONFIRMED 1607 END:VEVENT 1608 BEGIN:VEVENT 1609 DURATION:PT1H00M 1610 LOCATION:Saal 6 1611 SEQUENCE:0 1612 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html 1613 DTSTART;TZID=Europe/Berlin:20121228T171500 1614 UID:5306@29C3@pentabarf.org 1615 DTSTAMP:20121226T143018 1616 CATEGORIES:Lecture 1617 DESCRIPTION:At the very beginning\, Tor was just a socks proxy that prote 1618 cted the origin and/or destination of your TCP flows. Now the broader To 1619 r ecosystem includes a diverse set of projects -- browser extensions to 1620 patch Firefox and Thunderbird's privacy issues\, Tor controller librarie 1621 s to let you interface with the Tor client in your favorite language\, n 1622 etwork scanners to measure relay performance and look for misbehaving ex 1623 it relays\, LiveCDs\, support for the way Android applications expect To 1624 r to behave\, full-network simulators and testing frameworks\, plugins t 1625 o make Tor's traffic look like Skype or other protocols\, and metrics 1626 and measurement tools to keep track of how well everything's working. Ma 1627 ny of these tools aim to be useful beyond Tor: making them modular means 1628 they're reusable for other anonymity and security projects as well. In 1629 this talk\, Roger and Jake will walk you through all the tools that make 1630 up the Tor software world\, and give you a better understanding of whic 1631 h ones need love and how you can help. 1632 SUMMARY:The Tor software ecosystem 1633 STATUS:CONFIRMED 1634 END:VEVENT 1635 BEGIN:VEVENT 1636 DURATION:PT1H00M 1637 LOCATION:Saal 6 1638 SEQUENCE:0 1639 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5178.en.html 1640 DTSTART;TZID=Europe/Berlin:20121230T140000 1641 UID:5178@29C3@pentabarf.org 1642 DTSTAMP:20121226T143018 1643 CATEGORIES:Lecture 1644 DESCRIPTION:Galaksija was to be in Yugoslavia what Commodore and Sinclair 1645 were in the west. Whether it succeeded or not\, its deceptively simple 1646 design can still teach us a lot of interesting tricks on how to make a u 1647 sable computer and operating system with as few transistors and bits as 1648 possible. 1649 SUMMARY:The ultimate Galaksija talk - Everything about a Yugoslavian micr 1650 ocomputer halfway between a TRS-80 and a ZX 80\! 1651 STATUS:CONFIRMED 1652 END:VEVENT 1653 BEGIN:VEVENT 1654 DURATION:PT1H00M 1655 LOCATION:Saal 4 1656 SEQUENCE:0 1657 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5044.en.html 1658 DTSTART;TZID=Europe/Berlin:20121227T230000 1659 UID:5044@29C3@pentabarf.org 1660 DTSTAMP:20121226T143018 1661 CATEGORIES:Lecture 1662 DESCRIPTION:In this year’s talk\, I tie on my 28c3 talk and present tim 1663 ing side channels from a defending viewpoint: How can one mitigate timin 1664 g side A{channels? Aren’t random delays sufficient to prevent timing s 1665 ide channels in practice? What is the minimum size of random delays to b 1666 e effective? Are there other delay strategies besides random delays that 1667 are more effective and efficient? 1668 SUMMARY:Time is NOT on your Side - Mitigating Timing Side Channels on the 1669 Web 1670 STATUS:CONFIRMED 1671 END:VEVENT 1672 BEGIN:VEVENT 1673 DURATION:PT1H00M 1674 LOCATION:Saal 1 1675 SEQUENCE:0 1676 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5380.en.html 1677 DTSTART;TZID=Europe/Berlin:20121228T140000 1678 UID:5380@29C3@pentabarf.org 1679 DTSTAMP:20121226T143018 1680 CATEGORIES:Lecture 1681 DESCRIPTION:Wir wissen seit ein paar Jahren\, dass der Staat technisch in 1682 der Lage ist\, die Computer einiger seiner Bürger zu infiltrieren. Abe 1683 r soll er das auch dürfen? Was hat sich in den letzten Monaten beim Sta 1684 atstrojaner getan? 1685 SUMMARY:Trojaner-Blindflug - Spionage-Software von Staats wegen 1686 STATUS:CONFIRMED 1687 END:VEVENT 1688 BEGIN:VEVENT 1689 DURATION:PT0H30M 1690 LOCATION:Saal 6 1691 SEQUENCE:0 1692 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html 1693 DTSTART;TZID=Europe/Berlin:20121228T124500 1694 UID:5091@29C3@pentabarf.org 1695 DTSTAMP:20121226T143018 1696 CATEGORIES:Lecture 1697 DESCRIPTION:Hardware-basierte Festplattenvollverschlüsselungen in Form s 1698 ogenannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere un 1699 d performante Alternative zu Software-basierter Verschlüsselung wie Bit 1700 Locker und TrueCrypt gesehen. Während der Performance-Gewinn und die Be 1701 nutzerfreundlichkeit von SEDs\, bspw. Intel's SSD 320 bzw. SSD 520\, au 1702 er Frage stehen\, ist der Sicherheits-Gewinn deutlich geringer als bish 1703 er angenommen. Teilweise sind Systeme die auf SEDs basieren gar schwäch 1704 er als vergleichbare Systeme die auf Software-Verschlüsselung basieren. 1705 SUMMARY:(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung 1706 STATUS:CONFIRMED 1707 END:VEVENT 1708 BEGIN:VEVENT 1709 DURATION:PT1H00M 1710 LOCATION:Saal 1 1711 SEQUENCE:0 1712 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5396.en.html 1713 DTSTART;TZID=Europe/Berlin:20121228T160000 1714 UID:5396@29C3@pentabarf.org 1715 DTSTAMP:20121226T143018 1716 CATEGORIES:Lecture 1717 DESCRIPTION:Weltbilder der Informatik sind in mancher Hinsicht denen in d 1718 er Hacker- und Hackerinnen-Community nicht unähnlich. 1719 SUMMARY:Was ist\, was kann\, was soll Gender Studies Informatik? 1720 STATUS:CONFIRMED 1721 END:VEVENT 1722 BEGIN:VEVENT 1723 DURATION:PT1H00M 1724 LOCATION:Saal 1 1725 SEQUENCE:0 1726 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5160.en.html 1727 DTSTART;TZID=Europe/Berlin:20121228T113000 1728 UID:5160@29C3@pentabarf.org 1729 DTSTAMP:20121226T143018 1730 CATEGORIES:Lecture 1731 DESCRIPTION:In the Free City of Hamburg\, which is one of 16 German state 1732 s\, a coalition of hackers\, activists and other players of civil societ 1733 y have drafted the most revolutionary Freedom of information law in the 1734 world. The law obliges the state to proactively publish all important pu 1735 blic information (such as contracts\, studies\, construction permits) in 1736 an OpenData format on the Internet. After the start of a referendum cam 1737 paign\, the law was passed unanimously by the state parliament in June 2 1738 012 to avoid a public vote on it. 1739 SUMMARY:We are all lawmakers! - How to further transparency by law – th 1740 e Hamburg example and beyond ac! 1741 STATUS:CONFIRMED 1742 END:VEVENT 1743 BEGIN:VEVENT 1744 DURATION:PT1H00M 1745 LOCATION:Saal 6 1746 SEQUENCE:0 1747 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5208.en.html 1748 DTSTART;TZID=Europe/Berlin:20121227T160000 1749 UID:5208@29C3@pentabarf.org 1750 DTSTAMP:20121226T143018 1751 CATEGORIES:Lecture 1752 DESCRIPTION:Accessibility of digital content is a hugely misunderstood is 1753 sue. Programmers and content developers tend to view it as a distraction 1754 or a special interest concern. Accessibility advocates fail to describe 1755 it in terms that would put it in the proper place for other technologis 1756 ts\, in particular security practitioners. 1757 We argue that if a format 1758 or a document has systemic accessibility problems\, then accessibility i 1759 s likely to be the least of its problems\; that accessibility only colla 1760 pses first\, like a canAVary in a mine\, and security is next to follow. 1761 We argue that many accessibility problems\, just like many security pro 1762 blems\, stem from documents being hard to parse or containing executable 1763 content\, and that the accessibility community is only the first to suf 1764 fer\, due to not having the manpower to make extremely complicated forma 1765 ts to almost work almost always. It's an arms race tougher than the secu 1766 rity patching cycle\, made worse by there being no common model for what 1767 accessibility properties should look like. 1768 SUMMARY:What accessibility has to do with security 1769 STATUS:CONFIRMED 1770 END:VEVENT 1771 BEGIN:VEVENT 1772 DURATION:PT1H00M 1773 LOCATION:Saal 6 1774 SEQUENCE:0 1775 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5283.en.html 1776 DTSTART;TZID=Europe/Berlin:20121227T203000 1777 UID:5283@29C3@pentabarf.org 1778 DTSTAMP:20121226T143018 1779 CATEGORIES:Lecture 1780 DESCRIPTION:After the political and legislative failure of the blocking a 1781 nd filtering proposals in Germany (#Zensursula) and the EU (Child Protec 1782 tion Directive) several players stepped up to implement the measures tha 1783 t previously have been envisioned as compulsory but now on a "self-regul 1784 atory" basis. 1785 SUMMARY:White IT\, Clean IT & CEO Coalition - How the government tries to 1786 encourage privatized policy inforcement and thereby bypasses and circum 1787 ventsDi democratic processes 1788 STATUS:CONFIRMED 1789 END:VEVENT 1790 BEGIN:VEVENT 1791 DURATION:PT1H00M 1792 LOCATION:Saal 1 1793 SEQUENCE:0 1794 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5327.en.html 1795 DTSTART;TZID=Europe/Berlin:20121229T171500 1796 UID:5327@29C3@pentabarf.org 1797 DTSTAMP:20121226T143018 1798 CATEGORIES:Lecture 1799 DESCRIPTION:This action-packed lecture presents the inner workings of the 1800 author's from-scratch implementation of a USB Mass Storage disk in user 1801 -land Python\, along with some embarrassing bugs in operating systems th 1802 at support such disks. The lecture concludes with an introduction to Ac 1803 tive Antiforensics\, in which a thumbdrive's own firmware can recognize 1804 and defend itself against disk imaging and other forensic tools. 1805 SUMMARY:Writing a Thumbdrive from Scratch - Prototyping Active Disk Antif 1806 orensics 1807 STATUS:CONFIRMED 1808 END:VEVENT 1809 BEGIN:VEVENT 1810 DURATION:PT1H00M 1811 LOCATION:Saal 1 1812 SEQUENCE:0 1813 URL:http://events.ccc.de/congress/2012/Fahrplan/events/5262.en.html 1814 DTSTART;TZID=Europe/Berlin:20121227T140000 1815 UID:5262@29C3@pentabarf.org 1816 DTSTAMP:20121226T143018 1817 CATEGORIES:Lecture 1818 DESCRIPTION:Seit anderthalb Jahren begleitet FragDenStaat.de die deutsche 1819 Informationsfreiheit in der Praxis und dokumentiert die Korrespondenz z 1820 wischen Anfragestellenden und Behörden. Welche Informationen gibt der S 1821 taat preis\, und gegen welche Veröffentlichungen kämpft er sogar bis v 1822 or Gericht? Die interessantesten Fälle werden genauer beleuchtet und ei 1823 ne Bewertung zur Lage der staatlichen Information in Deutschland abgegeb 1824 en. 1825 SUMMARY:Zur Lage der Information - 1.5 Jahre FragDenStaat.de 1826 STATUS:CONFIRMED 1827 END:VEVENT 1828 END:VCALENDAR