Discover
Chaos Computer Club - 32C3: gated communities (mp3)

415 Episodes
Reverse
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7551.html
The traditional review event with presentations from various teams at congress. Learn how the 32C3 got Internet, video streaming, power and maybe more!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7555.html
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Trends waren zu sehen?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7546.html
A review/rant about the progress that free software wireless drivers (especially on Linux) have made over the recent years, as well as the current challenges that driver developers (and users) are facing.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7375.html
Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a third type of open data that is often overlooked- the information people and companies post about themselves. People need jobs. Companies need to hire people. Secret prisons do not build themselves.
By making it feasible for anyone to collect public data online in bulk and exploring ways to effectively use this data for concrete objectives, we can build an independent, distributed system of accountability.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7340.html
Nachdem viele Jahre vor den Angriffen auf die Wahlfreiheit von Windows-Nutzern gewarnt wurde, schalte Microsoft mit Windows 10 das Botnetz scharf.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7291.html
Technology companies now hold an unprecedented ability to shape the world around us by limiting our ability to access certain content and by crafting proprietary algorithm that bring us our daily streams of content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7286.html
Wie lassen sich Konstantenfaltung und ein Registerallokator für einen Forth-Compiler implementieren, der in einem Mikrocontroller läuft ?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7520.html
Yearly, the world is inundated with news about government data collection programs. In addition to these programs, governments collect data from third party sources to gather information about individuals. This data in conjunction with machine learning aids governments in determining where crime will be committed and who has committed a crime. Could this data serve as a method by which governments predict whether or not the individual will commit a crime? This talk will examine the use of big data in the context of predictive policing. Specifically, how does the data collected inform suspicion about a particular individual? In the context of U.S. law, can big data alone establish reasonable suspicion or should it just factor into the totality of the circumstances? How do we mitigate the biases that might exist in large data sets?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7457.html
In the dark days of October 2014 an unprecedented Ebola epidemic wrecked havoc across Sierra Leone, Liberia and Guinea. In Sierra Leone, the health system was only weeks away from total collapse due to an inability to manage or pay health workers across the country and the world braced for the unchecked spread of the disease throughout west Africa. In the face of apocalyptic scenario, a company made up of local hackers took on the unprecedented challenge of building, implementing and running a huge Management Information System and Mobile payments system to keep the health system from collapsing. This talk will show how this was achieved with Open Source Software, second hand laptops, hacked voter registration machines, second hand smartphones and some very smart and determined young people used to achieving great things with none of the resources we take for granted. We salute them.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7561.html
Since my move to China in 2012 I have actively engaged in the local art scenes of Beijing and Shanghai, focusing on collaborating with artists interested in technology and the internet. My own personal independent research of the Chinese internet and the popular Chinese social app, WeChat 微信, has contributed to an ongoing massive archive I began in 2014 called The Chinternet Archive. To date, I have over 15,000 pieces of content (and growing) documenting localized trends, memes, vernacular photography, online personas, .gif animations, videos, selfies, propaganda, retail, family/work life, and other such digital artifacts of online Chinese culture. This archive directly influenced my artistic and curatorial practice, resulting in an online art collection called Netize.net, or its Chinese name of 网友网 [wǎngyǒuwǎng] “Internet Friend Network”, which collaborates with emerging Chinese and international artists who are exploring or deconstructing East/West dichotomies, engaging in Sino-centric Web aesthetics, or investigating the East online. The goal of this talk is to explore through my Chinternet Archive and Netize.net collections, forms of creativity found in China in relationship to it’s early internet history, interactions with technology, localized networks and restrictions.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7216.html
We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7277.html
Der steigende Anteil der Erneuerbaren Energien an der Stromerzeugung und der zunehmende Handel mit Strom erhöht die Belastung der Stromnetze. Welche Auswirkungen hat das auf die Netzstabilität? Wann kommen die Stromnetze an ihre Leistungsgrenze? Wie kann ein gezielter Angriff auf das Europäische Verbundnetz aussehen? Was müsste man tun, um einen Blackout zu verursachen? Und: Wie können wir unsere Stromnetze umbauen, damit das nicht passiert?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7323.html
What to do if you are neither a hardware- nor a software expert and want to contribute in effords of openess neverseless? A short overview about what I have done so far, shown on 3 exaples: The Mooltipass, a offline password save. The Pandora/Pyra, a mini handheld, full Linux PC and its successor. Senoko, the Novena battery board. From "just" crowdfunding to producing, why it's worth to go through all the ups and downs and encourage others to do the same.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7369.html
For the past 3 years I have been delivering a custom-tailored DDoS attacks for organizations that wanted to test out their DDoS defense systems.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7523.html
„Social Media Break Up Coordinator“ is a performance art piece and lecture performed by Caroline Sinders. Inspired by Facebook’s memories algorithms faux pas, such as parents being reminded of their child’s death, or of events with an ex.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7497.html
Lightning Talks are short lectures (almost) any congress participant may give! Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7560.html
What do you want? Did you build your web/app for humans or NSA robots? Let's make it usable for human beings. I'd like to show you some basic design mistakes and how to avoid them to improve usability of your web or app. Why? Because it's worth it and I'm good in it.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7356.html
The leading social networks are the powerful new gatekeepers of the digital age. Proprietary de facto standards of the dominant companies have lead to the emergence of virtual “information silos” that can barely communicate with one another. Has Diaspora really lost the war? Or is there still a chance to succeed?
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7403.html
Governments around the world are seeking to put a stop to secure end-to-end encryption, from the UK’s Data Retention and Investigatory Powers Act, to Australia’s Defence Trade Controls Act, to India’s draft proposal to require plain text copies of all secure messages, to the United States’ Federal Bureau of Investigation’s public pressure on global companies like Apple and Google to weaken their security and provide law enforcement access to plain text content.
about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7386.html



