Chaos Communication Congress 26 Dec. 27, 2009 to Dec. 30, 2009, Berlin, Germany

Event Page

Notes : 27th Chaos Communication Congress

Tell us about missing data
Title Speakers Summary Topic Types
Weaponizing Cultural Viruses Aaron Muszalski What does it mean to fight a culture war? How does culture propagate through a ... Security
Our Darknet And Its Bright Spots Aestetix Building a private network to connect your neighbourhood. Why we feel common solutions are terrible ... Security
Chaos-Familien-Duell Alexander Brock Zwei Chaos-Familien treten gegeneinander an, doch es kann nur eine geben. Team-Anmeldungen sind begrenzt! Meldet ... Security
Wolpertinger. Ein Verteilter Portscanner. Alteswecken Wolpertinger ist ein Portscanner. Allerdings kein gewöhnlicher Portscanner, sondern entwickelt um hunderte oder tausende von ... Security
Wikipedia - Wegen Irrelevanz Gelöscht Andreas Bogk Die Wikipedia wurde einst als Erfolgsmodell des Internets und des freien Zugangs zu Wissen gefeiert. ... Security
Ccc-Jahresrückblick Andy Müller-maguhn , Lars Weiler Auch aus dem Jahr 2009 gibt es wieder über ein wahres Mammutprogramm zu berichten. Wir ... Security
A Part Time Scientists' Perspective Of Getting To The Moon Arne Reiners We want to use the opportunity the 26C3 presents as a venue to introduce our ... Security
Photography And The Art Of Doing It Wrong Audrey At its heart, photography is a ridiculous hack to make pictures from light. In the ... Security
Das Recht Am Eigenen Bild Und Das Ende Der Street Photography Axel Schmidt Die immer stärkere Inanspruchnahme des Rechtes am eigenen Bild führt nicht nur zu einem souveräneren ... Security
Computer.Spiele.Politik. Bastian Dietz Beim Thema Computerspiele scheiden sich die Geister. Während einige beim Gedanken an spielesüchtige arbeitslose männliche ... Security
Nougatbytes - Ein Wortspiel, Bunt Und In Stereo Ben Butler Eine geekige Bilderrätselgameshow mit Publikumsbezug Anmeldung bitte unter <26c3_ichwill@laryllian.de> Security
Privacy-Enhanced Event Scheduling Benjamin Kellermann Event schedulers, well-known from groupware and social software, typically share the problem that they disclose ... Security
Exciting Tales Of Journalists Getting Spied On, Arrested And Deported Bicyclemark Stories of journalists who while doing their work and researching stories in countries throughout the ... Security
Peanut Butter And Plastic: Industrial Revolution Bre The future of manufacturing will purring next to your computer and plasticizing digital designs into ... Security
The Lost Cosmonauts Brian Dunning I'm going to talk about the benefits of applying critical thinking stories that we hear ... Security
Gsm: Srsly? Chris Paget The worlds most popular radio system has over 3 billion handsets in 212 countries and ... Security
I, Internet Christiane Ruetten The actions of a highly-networked group of individuals cannot be explained as the sum of ... Security
After The Hype Christophd While One Laptop per Child is a widely known and much discussed and often heavily ... Security
Unbild – Pictures And Non-Pictures Christoph Faulhaber Mit seinen Projekten arbeitet Christoph Faulhaber an einer Fortschreibung von Konzeptkunst, Performance und Sozialer Skulptur. ... Security
Fuzzing The Phone In Your Phone Collin Mulliner In this talk we show how to find vulnerabilities in smart phones. Not in the ... Security Fuzzing
Cybernetic Cannibalism Cristiano Marinho What is there in common between The Cannibalist Manifesto, written by the Brazilian poet Oswald ... Security
Ckan: Apt-Get For The Debian Of Data Daniel Dietrich Componentization – or the atomization of a given resource into 'packages' – has greatly contributed ... Security
Liquid Democracy Daniel Reichert Wir arbeiten an einer Umsetzung der Liquid-Democracy-Idee. Dabei ist es für uns wichtig, keine Ja/Nein-Demokratie, ... Security
Black Ops Of Pki Dan Kaminsky None Security
Wireless Power Transfer Davor Emard Wireless power is a most wanted technology. It has already been invented by Nikola Tesla ... Security Wireless
Playing With The Gsm Rf Interface Dieter Spaar This talk will show what can be done by taking control of the GSM RF ... Security
Der Hackerparagraph Beim Bundesverfassungsgericht Dominik Boecker Das Bundesverfassungsgericht hat mit seiner Entscheidung vom 18. Mai 2009 drei gegen den Hackerparagraphen (§§ ... Security
Playing With The Built City Eleanor Saitta Architecture and urban planning play a huge role in our lives, to a degree not ... Security
Homewreckery Eli Skipp Integrating technology into fiber arts continues to be an intensely popular subject – in the ... Security
Vier Fäuste Für Ein Halleluja Erdgeist Wenn die API Aushängeschild eines Softwareprojekts ist, ist es um die Open-Source-Szene schlecht bestellt. openssl, ... Security
Etsi-Vorratsdatenspeicherung 2009 Erich Möchel Die ETSI startete als Ingenieursgremium zum Festschreiben von technischen Standards und hat sich über die ... Security
Dect (Part Ii) Erik Tews After dedected.org was published on 25C3, lots has changed in DECT security. Security
Cat /Proc/Sys/Net/Ipv4/Fuckups Fabian "fabs" Yamaguchi We will be presenting a number of previously undisclosed network-related design errors, ranging from data-link-layer ... Security Infrastructure
Wofür Offenes Internet? Falk Lueke Die Diskussion um Netzneutralität steht auch in Europa auf der politischen Agenda. Doch was ist ... Security
Blackbox Jtag Reverse Engineering Felix Domke JTAG is an industry standard for accessing testmode functionality in almost any complex microchip. While ... Security
Fnord-Jahresrückblick 2009 Felix von Leitner Auch dieses Jahr werden wir Euch wieder aus den Fnords des Jahres eine beschauliche Abendveranstaltung ... Security
Reverse-Engineering Displaylink Devices Florian Echtler DisplayLink produces nice, useful USB graphics adapters. Unfortunately, they had no real Linux support. In ... Security
Defending The Poor Felix ( FX ) Lindner The talk will discuss a class of in-the-wild malware and exploits, reasons for it's success ... Security Malware
Stream: Fnord-Jahresrückblick 2009 Guide This will be a stream of the Fnord-Jahresrückblick 2009, as it will be too crowded ... Security
Privacy, Openness, Trust And Transparency On Wikipedia Haeb Wikipedia's enormous growth during this decade, which has made it a "poster child of Web ... Security
Using Openbsc For Fuzzing Of Gsm Handsets Harald Welte With the recent availability of more Free Software for GSM protocols such as OpenBSC, GSM ... Security Fuzzing
Legic Prime: Obscurity In Depth Henryk Plötz Legic Prime is an artifact from the time when proprietary cryptography in RFID was considered ... Security Cryptography
Finding The Key In The Haystack Hunz The power consumtion of a microcontroller depends on the actual data being processed. This renders ... Security
Eine Zensur Findet Statt Jens Kubieziel Der Vortrag stellt die Zensurmaßnahmen in ausgewählten Ländern der Welt vor. Wir sagen Euch, wo ... Security
Why Net Neutrality Matters? Jérémie Zimmermann Net neutrality is an essential safeguard for competition, innovation, and fundamental freedoms. The debate is ... Security
Die Verwaltung Rüstet Auf - Der Digitale Steuerbürger Kai Kobschätzki (/bengoshi) Automatisierter Kontenabruf, digitale Außenprüfung, Benford-Test, Chi-Quadrat-Test, Bußgeld für GDPdU-Verweigerer: Die Steuerverwaltung hat in den letzten ... Security
Why Germany Succeeded Where America Has Failed In Achieving Meaningful Voting Computer Changes Kathleen Wynn The decision made by the German Constitutional Court is THE definition of what election reform ... Security
Vom Kreationismus Zum Kollektivismus Kay Hamacher Das Anwachsen des Kreationismus und das Vordringen kreationistischer Thesen ist eine traurige Realität dieser Tage. ... Security
Europäische Biometriestrategien Kosmo_k Der Vortrag beschäftigt sich mit der Frage der technischen und gesellschaftlichen Implikationen von Identifizierungstechniken, die ... Security
Location Tracking Does Scale Up L. Aaron Kaplan For a long time we warned of the perils of full scale, permanent tracking of ... Security
Kunstfreiheit Statt Hackerparagraph Lexi Pimendis Wie viel Ethik steckt tatsächlich im Hacken? Sind die populären Vorurteile gegenüber Hackern berechtigt? Wir ... Security
Here Be Electric Dragons Lorenz Unnoticed by average Joe we are currently experiencing the advent of autonomous machines. This development ... Security Community Development
Fußgängernavigation Mit Augmented Reality Martin Schallaer Augmented Reality oder Erweiterte Realität (ER) beschreibt die Synthese von detailreichen realen Bilddaten mit virtuellen ... Security
Secubt Mathias Payer In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. ... Security Malware
Das Zugangserschwerungsgesetz Matthias Bäcker Das Zugangserschwerungsgesetz soll einer umfassenden polizei- und verfassungsrechtlichen Analyse und Kritik unterzogen werden. Security
Privacy &Amp; Stylometry Mike Brennan Authorship recognition based on linguistics (known as Stylometry) has contributed to literary and historical breakthroughs. ... Security Privacy
Internetsperren Mogis In dem Vortrag werden kurz die Geschichte und Argumente gegen die Sperren zusammengefasst. Es sollen ... Security
Im Herz Der Bestie Monty Cantsin Was haben Friedrich Engels und die Yes Men gemeinsam? Was ist Kommunikationsguerilla und wie unterscheidet ... Security
“Yes We Can’T!” - On Kleptography And Cryptovirology Moti Yung In this talk I will survey some of the results (with Adam Young) on Cryptovirology ... Security Cryptography Malware
Haste Ma'N Netblock? Nibbler In times of the omnipresent scare of IPv4 address shortage and price tags on Internet ... Security
Lightning Talks - Day 1 Oliver Pritzkow 4 minutes for every speaker. Learn about the good, the bad, and the ugly - ... Security
Coreboot: Adding Support For A System Near You Peter Stuge The BIOS and it's successor EFI are considered by many to be the final frontier ... Security
Sccp Hacking, Attacking The Ss7 &Amp; Sigtran Applications One Step Further And Mapping The Phone System Philippe Langlois SS7 is like TCP/IP in the 1990s. It used to be quite a secure network ... Security
Exposing Crypto Bugs Through Reverse Engineering Philippe Oechslin Breaking good crypto is hard. It takes a genius to find a flaw in AES ... Security Cryptography
Stream: Security Nightmares Public Viewing What has happened during the last year in IT-Security? Which things did develop newly? Which ... Security
How You Can Build An Eavesdropper For A Quantum Cryptosystem Qin Liu This presentation will show the first experimental implementation of an eavesdropper for quantum cryptosystem. Although ... Security Cryptography
Hacking The Universe Robert Helling String theory is our best candidate for a "Theory of Everything". In this final theory, ... Security
Ddos/Botnet Mitigation &Amp; Hosting Online Communities Rodent Many years of hosting BBS's, ISP's, websites, game servers, forums, irc networks, and online communities. ... Security
Tor And Censorship: Lessons Learned Roger Dingledine Tor was originally designed as a civil liberties tool for people in the West. But ... Security
Closing Event Ron Davidson None Security
A Hacker’S Utopia Sandro Gaycken The lecture will explore hacker ideology as a utopian idea. Drawing on utopian theory and ... Security
Milkymist Sebastien Bourdeauducq An FPGA-based open-hardware video synthesis platform. Security
Optimised To Fail Steven J. Murdoch The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with ... Security
Building A Debugger Travis Goodspeed The GoodFET is an open source tool for programming microcontrollers and memories by SPI, I2C, ... Security
Die Neokonservativen Thinktanks In Der Brd Volker Birk Putin ist ein "lupenreiner Demokrat", so Gerhard Schröder 2004 bei Beckmann. Wie sehr das dem ... Security
Advanced Microcontroller Programming Wesen A lecture showing the result of one year of intense programming with the AVR microcontroller ... Security
Wikileaks Release 1.0 Wikileaks During the last 12 months WikiLeaks representatives have been talking at numerous conferences, from technology ... Security Media