Discover
Chaos Computer Club - 28C3: behind enemy lines (ogg)

186 Episodes
Reverse
A review about the camp and the congress network. Network layout, planning, setup, operation and finally the teardown.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4927.en.html
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4899.en.html
Antiforensik ist ein noch eher neues Thema und bekommt zunehmend mehr Bedeutung. IT-Forensik als Mittel zur Aufklärung von Sachverhalten kann vor Gericht aber auch in internen Ermittlungen maßgeblich für Freisprüche oder Schuldsprüche sorgen. Daher ist es besonders schlimm, wenn die dazu verwendeten Programme nicht korrekt arbeiten und sogar mit präparierten antiforensischen Aktionen angegriffen werden können. Der Vortrag zeigt eine bisher unbekannte und dennoch technisch einfache Sicherheitslücke in mindestens einer weltweit verwendeten Forensik-Suite und wie diese ausgenutzt werden kann: Hinzufügen von Ermittlungsergebnissen, Löschen/Verändern von Ermittlungsergebnissen, Infektion des Auswertesystems mit Malware.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4828.en.html
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4907.en.html
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4937.en.html
All the talks i saw about SE so far just showed which good SE's the speakers are. I try to do another approach, what if i get in and don't know what to do then. The talk is about the reconn. before the assessment, the different approaches of SE. Which techniques can one use, how to do a proper intel. and what is useful. How things work and more important why. Which skill set should one have before entering a engagement. And last but not least how do one counter a SE attack.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4856.en.html
The object of the lecture is to present and discuss the chokepointproject. How it (will) attempt(s) to aggregate and visualize near-realtime global internetwork data and augment this visualisation with legislative, commercial(ownership) and circumvention information.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4760.en.html
In his now (in)famous pamphlet "Conspiracy as Governance" Julian Assange (JA) argues about the need for leaking as an efficient way to destroy "unjust" groups as the neo-feudalistic ones - luring the conspiracy theory leaning hacker community into his belief system. Eventually, JA used a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for "just" and "unjust" systems, arriving at the conclusion that "unjust" systems are hurt more and thus will be less viable, essentially being destroyed by more "just" systems. While an innovative proposal, the underlying assumptions on complexity, network theory, and especially the evolutionary perspectives were never critically assessed. Some blogs and media raised questions on details and potential threats to innocent bystanders. Still, fundamental problems with the philosophy were never addressed.
This paper argues against the general validity of such theories. In particular, we will refute some of the biologistic arguments. Theoretical biology has long ago pointed out the hidden complexity in evolutionary processes and as such the envisioned "leaking revolution" might be a limited artifact: there might even arise situations where the leaking envisioned and encouraged by Wikileaks and the like can actually strengthen some "conspiracies". 
In this paper I will describe some research questions, that should be answered before given the “leaking philosophy” an unconditioned “thumbs-up”. Empirically, for example, a potential strengthening is illustrated by the rise of a 'neo-feudalistic economy', which is linked closely to the paradigm of "intellectual property" as it is to the security-financial-political complex. The players have effectively created a closed network or a "conspiracy" and might be resilient towards Wikileaks-like attacks. The paper concludes with an alternative to that proposal; in particular, a way to deal with the 'conspiracy' that might be coined the rise of the neo-feudalistic society (which in itself is a self-sustainable, self-amplifying feedback loop, not necessarily a conscious conspiracy). 
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4741.en.html
This talk is about:
- Information freedom and the issues for the citizens
- RWB ressources: a “human network” 
- RWB needs: Get involved!
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4742.en.html
Software is becoming more and more important in organizing response to all kinds of crises, whether that means activists responding to an unjust government or aid workers helping with the aftermath of a disaster.  Security often isn't the first thing people think about in these situations -- they have work to get done, just like the rest of us, and many of these tools are built in the heat of the moment.  In a crisis, a lack of security can make a small disaster into a big one.  In this talk, we'll look at real world experiences of the security and privacy problems in the field, and how to fix them, at both large and small levels.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4707.en.html
The idea of Dining Cryptographers-Networks (DC) offers a much better anonymity compared to MIX-Networks: Defined anonymity sets, no need to trust in a central service, no possible attack for data retention.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4723.en.html
Even after years of committee review, communication protocols can certainly be hacked, sometimes highly entertainingly. What about creating a protocol the opposite way?  Start with all the hacks that can be done and search for a protocol that gets around them all.  Is it even possible? Part Time Scientists has used a GPU to help design our moon mission protocols and we'll show you the what and how.  Danger: Real code will be shown!
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4818.en.html
Quantum systems can have very different properties from their classical analogues which allows them to have states that are not only correlated but entangled. This allows for quantum computers running algorithms more powerful than those on classical computers (represented by Turing machines) and for quantum cryptography whose safety is (in principle) guaranteed by the laws of nature. 
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4648.en.html
bup is short for "backup". bup uses the file format of the distributed version control system Git. It solves Git's problems with big files. Deduplication is used to make backups space efficent (about five times smaller than rsnapshot's backups). Data is deduplicated globally across files and backups. If a small part of a big file is changed only little additional space is needed.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4587.en.html
Meet the Netherlands: a nation filled with techno-optimists protecting
our freedom by puting in place restrictions on what you can do, reducing
our privacy and have technology as a solution for anything and
everything. When you make a trip we store your details for two years,
your airplane meal selection from two years earlier is good data to test
with and when migrating the government website we keep the old website
running in an unmaintained state. If you have nothing to hide nothing
can go wrong and there is nothing you can do.
Well not quite. What would happen if you play the system? If you would
take the train and hack the card? What if you were to pick up the
resistance you face and use it in your advantage. No matter what the
costs would carry on? If you would take some data and show the failures?
Not just once but a full month long and call that month Leaktober. What
if you would publicly call the failures with our personal data?
Ultimately you make a difference. You change the law, you changes the
rules of the game and you really can raise the question if storing all
that data is really needed. Ultimately people really start to doubt if
this is the right way to go.
This is a strategic and tactical story on how you can regain some
privacy and data protection. Even though for a journalist this should be
normal work, thanks to some people these things become very personal. It
ends in criminal prosecution, legal threats, insults, a successful
counter hack and ultimately a lot of benefits. But standing up for a
cause does work as long as you focus on the stories you want to bring.
My story is about hacking the system from the inside, overcoming fear
and showing bureaucrats that hackers are people too. The talk is a
lessons learnt how a few people can change a nation with hacker beliefs
if they really want to. A guideline on how to make a difference by
hacking the system you want to change. Where you can even make huge
mistakes, but with some luck you can win a world. How you can make your
critical voice be heard. Zillions of lessons learnt.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4903.en.html
Advanced metering devices (aka smart meters) are nowadays being installed throughout electric networks in Germany, in other parts of Europe and in the United States. Due to a recent amendment especially in Germany they become more and more popular and are obligatory for new and refurbished buildings.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4754.en.html
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4898.en.html
Despite the vast new possibilities new medias offer to artists, musicians and composers, regulation authorities and governments are trimming creative minds in their freedom, introducing new laws, filters and limitations. On the example of "Europa: Neue Leichtigkeit" the immanence of unconditional artistic freedom in creativity is brought to the audience.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4832.en.html
Network printers are ubiquitous fixtures within the modern IT infrastructure. Residing within sensitive networks and lacking in security, these devices represent high-value targets that can theoretically be used not only to manipulate and exfiltrate the sensitive information such as network credentials and sensitive documents, but also as fully functional general-purpose bot-nodes which give attackers a stealthy, persistent foothold inside the victim network for further recognizance, exploitation and exfiltration. 
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4780.en.html
A man-in-the-middle attack on HDCP-secured video links is demonstrated. The attack is implemented on an embedded Linux platform, with the help of a Spartan-6 FPGA, and is capable of operating real-time on HD video links. It utilizes the HDCP master key to derive the corresponding private keys of the video source and sink through observation and computation upon the exchanged public keys. The man-in-the-middle then genlocks its raster and cipher state to the incoming video stream, enabling it to do pixel by pixel swapping of encrypted data. Since the link does no CRC or hash verification of the data, one is able to forge video using this method.
about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4686.en.html



