| @@ -0,0 +1,1802 @@
+BEGIN:VCALENDAR
+VERSION:2.0
+CALSCALE:GREGORIAN
+PRODID:-//Pentabarf//Schedule//EN
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5333.en.html
+DTSTART;TZID=Europe/Berlin:20121230T124500
+UID:5333@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Did you notice 262 42 in your mobile phone network search list
+ at the last CCC events? Did you and your friends buy SIM cards at the PoC a
+ nd help test the network by calling each other\, or by calling through the
+ bridge to the DECT network services? Did you ever wonder about the details
+ of this open source test network\, set up by a team of volunteers in the mi
+ ddle of the city? We would like to tell you all the details of the cell pho
+ ne network we operate at 29C3\, and show you some fancy graphs based on the
+ network activity!
+SUMMARY:29C3 GSM: Cell phone network review - 262 42 - The full spectrum
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5205.en.html
+DTSTART;TZID=Europe/Berlin:20121229T140000
+UID:5205@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:There are hundreds\, if not thousands\, of news articles and bl
+ og posts about the BlackHole Exploit Kit. Usually\, each story covers only
+ a very narrow part of the subject matter. This talk will summarize the hist
+ ory of the BlackHole Exploit Kit into one easy to follow story. There will
+ be diagrams and flow-charts for explaining code\, rather than a giant blob
+ of illegible Javascript\, PHP\, or x86 Assembly.
+SUMMARY:Analytical Summary of the BlackHole Exploit Kit - Almost Everything
+ You Ever Wanted To Know About The BlackHole Exploit Kit
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5146.en.html
+DTSTART;TZID=Europe/Berlin:20121229T160000
+UID:5146@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:There's about 100 top-level domains signed with DNSSEC and .nl
+ recently hit 1M second-level domains. At this occasion\, we take a look at
+ the goods and the bads of DNSSEC deployment\, including amplification attac
+ ks\, Zensursula-like DNS redirects\, China DNS injection and NASA key rollo
+ ver mistakes. We will find out what DNSCurve and Namecoin promise to make b
+ etter and what Zooko's triangle has all to do with this.
+SUMMARY:An Overview of Secure Name Resolution - DNSSEC\, DNSCurve and Namec
+ oin
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5237.en.html
+DTSTART;TZID=Europe/Berlin:20121229T203000
+UID:5237@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:With Visa and Mastercard pushing for EMV (http://www.emvco.com\
+ , aka “chip and pin”) rollout in the United States\, the uptake of contactl
+ ess payment and the use of mobile NFC wallets\, the chipcard security commu
+ nity will soon be getting more eyes to analyze the protocols in use with ch
+ ip and contactless credit card transactions.
+SUMMARY:A Rambling Walk Through an EMV Transaction
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5299.en.html
+DTSTART;TZID=Europe/Berlin:20121230T113000
+UID:5299@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Verfassungsschutzskandale gibt es nicht erst seit der Entdeckun
+ g des NSU vor einem Jahr. Vorgestellt werden: sie Affaire Traube\, der Schm
+ ücker-Prozess\, das Celler Loch\, die Vulkan-Affaire\, der Anschlagsversuch
+ auf das Jüdische Gemeindehaus West-Berlin\, vier Jahrzehnte Beobachtung vo
+ n Rolf Gössner. Vielleicht sind aber gar nicht die Pannen der Skandal\, son
+ dern vielmehr der ganz gewöhnliche Alltag des Verfassungsschutzes.
+SUMMARY:Best of ... Verfassungsschutz - Der Verfassungsschutz schützt die V
+ erfassung so wie Zitronenfalter Zitronen falten.
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H15M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5379.en.html
+DTSTART;TZID=Europe/Berlin:20121229T113000
+UID:5379@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Wir schauen nicht zurück im Zorn\, aber jetzt auch nicht grade
+ mit Euphorie. Im CCC-Jahresrückblick präsentieren wir Euch einige der hackt
+ ivistischen Themen des vergangenen Jahres\, an denen der CCC gearbeitet ode
+ r sich abgearbeitet hat. Diesmal mit schönen neuen Gesetzen\, Hacker-Humor\
+ , versäumten Gerichtsterminen\, bunten Blinkenlichtern und Iggy Pop. Wir ha
+ ben uns wirklich das ganze Jahr bemüht\, nur in begrenztem Umfange zu prokr
+ astinieren.
+SUMMARY:CCC-Jahresrückblick
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5319.en.html
+DTSTART;TZID=Europe/Berlin:20121228T124500
+UID:5319@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Hypertext Transfer Protocol Secure (HTTPS) has evolved into the
+ de facto standard for secure web browsing. But in the security community\,
+ it has long been known that HTTPS is fundamentally broken\, and this has b
+ een confirmed by alarming hacks and security breaches at several Certificat
+ e Authorities (CAs). To tackle the global collapse of trust in these centra
+ l mediators of HTTPS communications and to augment HTTPS security\, the EU
+ has launched a proposal for strict regulation. Will these efforts succeed?
+SUMMARY:Certificate Authority Collapse - Will the EU Succeed in Regulating
+ HTTPS?
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5263.en.html
+DTSTART;TZID=Europe/Berlin:20121230T171500
+UID:5263@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Wir brauchen ein maschinenlesbares und -schreibbares Gesetzgebu
+ ngsverfahren\, in dem jede Änderung transparent diskutiert und beschlossen
+ wird. Der Bundestag öffnet und digitalisiert sich eher langsam und widerwil
+ lig\, dennoch kann man schon heute anfangen\, die Werkzeuge der parlamentar
+ ischen Zukunft in Deutschland zu gestalten und auszuprobieren. Dazu stellen
+ wir die Projekte OffenesParlament.de und das Bundes-Git vor und zeigen\, w
+ ie es in Zukunft weitergehen könnte.
+SUMMARY:chmod o+rw bundestag - Mehr Transparenz und Teilhabe im Gesetzgebun
+ gsprozess
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5398.en.html
+DTSTART;TZID=Europe/Berlin:20121230T183000
+UID:5398@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Some facts and stats about Congress\, plus stories and legends.
+SUMMARY:Closing Event
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5221.en.html
+DTSTART;TZID=Europe/Berlin:20121227T140000
+UID:5221@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Wir sind Zeugen eines seit einigen Jahren stattfindenden Wettrü
+ stens im Cyberspace. Immer mehr Staaten bauen militärische Cyberware Einhei
+ ten auf\, die aus IT Spezialisten bestehen und dem Zweck dienen\, bestenfal
+ ls IT Systeme abzusichern oder schlechterdings Systeme von „Feinden“ anzug
+ reifen.
+SUMMARY:Cyberpeace statt Cyberwar
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5301.en.html
+DTSTART;TZID=Europe/Berlin:20121228T203000
+UID:5301@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Aside from further development of traditional forensic techniqu
+ es which involve post-mortem hard disk analysis\, in the last couple of yea
+ rs the field of computer forensics has been marked by significant developme
+ nt of live forensic techniques and tools.Memory forensics is composed of tw
+ o main activities: memory aquisition/capture and analysis. This presentatio
+ n will give an overview of the memory acquisition and analysis techniques a
+ nd tools on the Windows operating systems. The main part of the presentatio
+ n will cover current exploitation techniques and methods for defeating both
+ acquisition and analysis phase of the memory forensics\, as well as presen
+ t a new approach for hiding specific artifacts from forensic tools. Based o
+ n the covered exploitation techniques\, some suggestions and improvements o
+ f the current tools will be given.
+SUMMARY:Defeating Windows memory forensics
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5159.en.html
+DTSTART;TZID=Europe/Berlin:20121227T203000
+UID:5159@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Over the years we learned impressively how to oppose bad legisl
+ ation hurting our freedoms online. We are now facing an even bigger challen
+ ge: how to guarantee that a Free\, open\, decentralized Internet will be pr
+ otected in the long run? In 2012 The Internetz won major battles against SO
+ PA/PIPA in the US\, and against ACTA in the EU. Yet\, we know that the powe
+ rful industries and governments behind these projects will never stop. They
+ have an incentive to gain control of the Internet\, attacking fundamental
+ rights and promoting technologies like "Deep Packet Inspection"\, now being
+ deployed in each and every corner of the Net\, and used indifferently to b
+ reak Net neutrality\, to filter\, block and censor communications or to ins
+ pect citizens traffic.How to push for proposals that will ensure that the s
+ haring of knowledge and culture\, citizens freedoms\, and access to an open
+ infrastructure will be guaranteed in the future public policies? How to be
+ come as successful in proposition as we are now in opposition?(Hint: it's p
+ olitical\, stupid!)
+SUMMARY:Defend your Freedoms Online: It's Political\, Stupid! - A Positive
+ agenda against the next ACTA\, SOPA\, and such
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5401.en.html
+DTSTART;TZID=Europe/Berlin:20121228T171500
+UID:5401@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Die Debatte um die Tarifreform der GEMA war eines der großen Th
+ emen des Jahres 2012: Die Verwertungsgesellschaft geriet quer durch alle po
+ litischen Lager und gesellschaftlichen Schichten in die Kritik\, die Warnun
+ gen vor einem großen Clubsterben wurden von Tausenden auf die Straße getrag
+ en. Dies steigerte auch das Interesse an der »Cultural Commons Collecting S
+ ociety« (C3S)\, einem Graswurzelprojekt zur Gründung einer neuen\, modernen
+ und internetverstehenden Verwertungsgesellschaft\, die u. a. auch vollen S
+ upport für Creative-Commons-Lizenzen bieten soll. 2012 war daher auch ein e
+ reignisreiches Jahr für dieses Projekt\, und 2013 sollen nach Plan die Grün
+ dung als Europäische Genossenschaft und die Antragsstellung beim Deutschen
+ Patent- und Markenamt folgen.
+SUMMARY:Der Mord fällt aus - Ein Werkstattbericht der GEMA-Alternative C3S
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5382.en.html
+DTSTART;TZID=Europe/Berlin:20121227T160000
+UID:5382@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Am 6. November 2012 war der CCC vor dem Bundesverfassungsgerich
+ t zur Anhörung über die Antiterrordatei und die Grenzen polizeilicher Daten
+ verarbeitung geladen. Wir berichten über die Anhörung\, die dort vorgebrach
+ ten Argumente und die technische Konzeption der ATD. Und wir orakeln über e
+ in mögliches Urteil im nächsten Jahr.
+SUMMARY:Die Antiterrordatei
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5181.en.html
+DTSTART;TZID=Europe/Berlin:20121227T124500
+UID:5181@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In den vergangenen Jahren wurde vor allem die Sprache von Polit
+ ikern auf dem Congress beleuchtet. Aber die schwurbelnde Politiker sind noc
+ h nicht die ganze Wahrheit. Wir möchten das Ganze daher um den zweiten wich
+ tigen Mitspieler bei der Konstruktion von Realität ergänzen\, um die Presse
+ bzw. die Medien. Die Äußerungen von Politikern (zum Beispiel auf Pressekon
+ ferenzen) sollen dabei der Mediendarstellung gegenübergestellt werden. Dabe
+ i wird deutlich werden\, dass es zwischen Politikern und Medien Rückkopplun
+ gseffekte gibt.
+SUMMARY:Die Wahrheit\, was wirklich passierte und was in der Zeitung stand
+ - Wie Medien unsere Wahrnehmung beeinflussen
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H15M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5338.en.html
+DTSTART;TZID=Europe/Berlin:20121227T203000
+UID:5338@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:With the post 9/11 rise of the leviathan national security stat
+ e\, the rule of law in the United States under the Constitution is increasi
+ ngly rule by secrecy\, surveillance and executive fiat.
+SUMMARY:Enemies of the State: What Happens When Telling the Truth about Sec
+ ret US Government Power Becomes a Crime - Blowing the Whistle on Spying\, L
+ ying & Illegalities in the Digital Era
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5104.en.html
+DTSTART;TZID=Europe/Berlin:20121228T230000
+UID:5104@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This presentation will cover a demonstration of the new version
+ of the Canape protocol analysis tool being released for Ruxcon. During the
+ course of the presentation various attack scenarios against the VMWare ESX
+ i binary protocol will be demonstrated using Canape.
+SUMMARY:ESXi Beast - Exploiting VMWARE ESXi Binary Protocols Using CANAPE
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5077.en.html
+DTSTART;TZID=Europe/Berlin:20121229T131500
+UID:5077@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Recently\, several research papers in the area of computer secu
+ rity were published that may or may not be considered unethical. Looking at
+ these borderline cases is relevant as today’s research papers will influen
+ ce how young researchers conduct their research. In our talk we address var
+ ious cases and papers and highlight emerging issues for ethic committees\,
+ internal review boards (IRBs) and senior researchers to evaluate research p
+ roposals and to finally decide where they see a line that should not be cro
+ ssed.
+SUMMARY:Ethics in Security Research
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5085.en.html
+DTSTART;TZID=Europe/Berlin:20121228T113000
+UID:5085@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:We know\, that cooking is an art. Selecting the ingredients\, c
+ arefully washing\, pealingand cutting them before you put them into the rig
+ ht dish at the right time with the right heat.Watching the food change his
+ color\, form and consistency\, seasoning it to develop it'sflavors and serv
+ ing it on beautiful plates is a pleasure.For some\, but not for all.Those
+ who love cooking can spend hours at the stove andrelax while preparing deli
+ cious meals. For others cooking is pure stress. What is the difference betw
+ een orange and yellowcarrots? Did I forget something? Is the pan hot enough
+ ? Or too hot? How long after thepasta do I start cooking the steak? Will it
+ be healthy? Is it sustainable?So many questionsappear if one starts to thi
+ nk about food. The answers are complicatedand ambiguous. They require resea
+ rch and analyzing. Many have stopped thinkingabout food. They just believe
+ what is written on thepackage.I can't cookis such an easy answer. And it is
+ accepted in our society. Nobody isashamed of it. This gives more and more
+ control tomultinational corporations. Through precookedfood and shiny comme
+ rcials they calm our conscience and stimulate our laziness.The consequences
+ are dramatic!The profit-focused approach of multinationalcorporations have
+ led to things like:• Patented genetically modified seeds. Lawyers suing fa
+ rmers for copyrights.• Destruction of South-American jungle to make soya to
+ feed European cows so theymake more milk. Although a cow as never born to
+ eat proteins.• Chickens that can't stand on their own feet due to the weigh
+ t of their breasts. Theywill never see soil\, worms or even sunlight.• Oran
+ -Utangs losing their homes for palm oil• Vegetables getting grown in the de
+ sert\, wasting huge amounts of drinking water.Conclusions:• We must know mo
+ re about our food• We have to cook more ourselves• So we will recover some
+ control over what we eat
+SUMMARY:EveryCook - Cooking gets digital
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html
+DTSTART;TZID=Europe/Berlin:20121228T183000
+UID:5275@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:RSA is the dominant public-key cryptosystem on the Internet. Th
+ is talk will explain the state of the art in techniques for the attacker to
+ figure out your secret RSA keys.
+SUMMARY:FactHacks - RSA factorization in the real world
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5198.en.html
+DTSTART;TZID=Europe/Berlin:20121229T230000
+UID:5198@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Neues Jahr\, neue Fnords :-)
+SUMMARY:Fnord-Jahresrückblick - Diesmal mit noch mehr Eurozonen-Spaltung!
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5226.en.html
+DTSTART;TZID=Europe/Berlin:20121229T214500
+UID:5226@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The calypso baseband and its companion chips are used on the Mo
+ torola C123 among other and are now well known for being supported by the O
+ smocom-BB open source GSM baseband implementation. A couple years ago\, it
+ was hacked a little further by using it as a raw bits capture device allowi
+ ng the interception of GSM traffic very cheaply.
+SUMMARY:Further hacks on the Calypso platform - or how to turn a phone into
+ a BTS
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5250.en.html
+DTSTART;TZID=Europe/Berlin:20121228T001500
+UID:5250@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Beim Googlequiz treten Teams gegeneinander an\, die *ohne Inter
+ net* Aufgaben zu Googlesuchen und Suchergebnissen raten.
+SUMMARY:Googlequiz - Wie man (spaßorientiert) mehr als 5% seines Googleverm
+ ögens trainiert
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5309.en.html
+DTSTART;TZID=Europe/Berlin:20121228T230000
+UID:5309@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:Hacker Jeopardy - Zahlenraten für Geeks
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5024.en.html
+DTSTART;TZID=Europe/Berlin:20121228T203000
+UID:5024@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Hackers are a high-risk population. This talk will provide hack
+ ers with tools to reduce the risk to themselves and their communities using
+ harm reduction methodology.
+SUMMARY:Hackers As A High-Risk Population - Harm Reduction Methodology
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html
+DTSTART;TZID=Europe/Berlin:20121227T230000
+UID:5400@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco
+ NativeUnix)\, the operating system that powers all Cisco TNP IP phones. Wed
+ emonstrate the reliable exploitation of all Cisco TNP phones viamultiple vu
+ lnerabilities found in the CNU kernel. We demonstratepractical covert surve
+ illance using constant\, stealthy exfiltration ofmicrophone data via a numb
+ er of covert channels. We also demonstrate theworm-like propagation of our
+ CNU malware\, which can quickly compromiseall vulnerable Cisco phones on th
+ e network. We discuss the feasibilityof our attacks given physical access\,
+ internal network access and remoteaccess across the internet. Lastly\, we
+ built on last year's presentationby discussing the feasibility of exploitin
+ g Cisco phones fromcompromised HP printers and vice versa.
+SUMMARY:Hacking Cisco Phones - Just because you are paranoid doesn't mean y
+ our phone isn't listening to everything you say
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5179.en.html
+DTSTART;TZID=Europe/Berlin:20121229T183000
+UID:5179@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Wir sehen in der digitalen Technik großes Potential zur Demokra
+ tisierung und Befreiung der Menschen. Doch machen wir uns nichts vor. Techn
+ ik kann genausogut der Entmündigung von Menschen dienen. Je komplexer sie w
+ ird\, desto mehr sind wir von Vereinfachung abhängig und desto weniger Einf
+ luss können wir selber auf die Technik nehmen.
+SUMMARY:Hacking Philosophy - Digitale Mündigkeit\, Technikpaternalismus und
+ warum wir Netzphilosophie brauchen
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5270.en.html
+DTSTART;TZID=Europe/Berlin:20121229T001500
+UID:5270@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This is fun stuff for the late night program\, not a serious ta
+ lk.Is it possible to read sb. others mind? In the late 1920ies/early 1930ie
+ s Berlin was excited by the famous mindreader and fortune teller Erik Jan H
+ anussen who performed his strange abilities on stage. His act was so convin
+ cing that leading nazis beleaved in his powers and wanted him for advice -
+ until they decided to murder him.
+SUMMARY:Hanussen's mindreading - Experiment's of the historical psychic
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5152.en.html
+DTSTART;TZID=Europe/Berlin:20121229T214500
+UID:5152@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:At 28C3\, Klink and Waelde showed that a number of technologies
+ (PHP\, ASP.NET\,Ruby\, Java\, Python\, etc.) were vulnerable to the decade
+ -old hash-flooding DoSattacks. The vulnerability was then often fixed by ad
+ opting stronger hashfunctions and "randomizing" them.
+SUMMARY:Hash-flooding DoS reloaded: attacks and defenses
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5287.en.html
+DTSTART;TZID=Europe/Berlin:20121227T183000
+UID:5287@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:NSU-Untersuchungsausschuss in Thüringen und NSU-Untersuchungsau
+ sschuss des Bundestages\, über die Mordserie des NSU\, das System der V-Leu
+ te und die Rolle des Verfassungsschutzes.Zwölf Jahre lang konnte der „Natio
+ nalsozialistische Untergrund“ (NSU) unerkannt in Deutschland eine rassistis
+ che Mordserie an neun migrantischen Gewerbetreibenden\, zwei Bombenanschläg
+ e mit mehr als zwanzig Verletzten\, den Mord an einer jungen Polizistin sow
+ ie ein Dutzend Banküberfälle verüben.
+SUMMARY:Hinter den Kulissen: Der NSU und das V-Leute-System
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5219.en.html
+DTSTART;TZID=Europe/Berlin:20121228T203000
+UID:5219@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:An approach to the problem of fuzzing proprietary protocols wil
+ l be shown\, focusing on network protocols and native software. In the cour
+ se of this talk I will combine several methods in order to force the client
+ software to work as a “double agent” against the server.
+SUMMARY:"How I met your pointer" - Hijacking client software for fuzz and p
+ rofit
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5395.en.html
+DTSTART;TZID=Europe/Berlin:20121227T140000
+UID:5395@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Legal systems have a huge impact on what we do as hackers\, but
+ also on internet users in general. Laws can restrict our freedom to use th
+ e internet in ways we deem to be natural and it can impede the tools which
+ we hackers use on a daily basis. Which is not to say that laws cannot also
+ protect our freedom and ensure that all bits are treated equally. Most impo
+ rtantly\, these laws can be hacked and tweaked to fit our needs - like most
+ things in this world.
+SUMMARY:HOWTO Hack the law
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5368.en.html
+DTSTART;TZID=Europe/Berlin:20121229T113000
+UID:5368@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Sechs Jahre nach seinem Inkrafttreten wurde das Informationsfre
+ iheitsgesetz (IFG) des Bundes für den Deutschen Bundestag evaluiert. Auch a
+ us einzelnen Bundesländern liegen zwischenzeitlich wissenschaftlich unterma
+ uerte Erkenntnisse zum Stand oder Nichtstand der Informationsfreiheit in De
+ utschland vor.
+SUMMARY:IFG: Chance oder Bürgerbluff? - Informationsfreiheit in Deutschland
+ . Ein Sachstand.
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5397.en.html
+DTSTART;TZID=Europe/Berlin:20121227T183000
+UID:5397@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:INFECT: "Bei der Forschung an unserem neuen Killervirus hat uns
+ ere Ethikkommission penibelst darauf geachtet\, dass niemand der Forscher s
+ ich ansteckt."
+SUMMARY:INDECT\, Verhaltenserkennung & Co - automatisierte staatliche Verdä
+ chtigung
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5112.en.html
+DTSTART;TZID=Europe/Berlin:20121227T124500
+UID:5112@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This talk is aimed to give an insight into CPE WAN Management P
+ rotocol (CWMP) and its GPLv2 implementations that were developed in the pas
+ t year.
+SUMMARY:ISP's black box - provisioning behind the scenes
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5216.en.html
+DTSTART;TZID=Europe/Berlin:20121228T214500
+UID:5216@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In the last years\, mobile security and specifically GSM has be
+ en attacked in many different ways. It was demonstrated how to sniff and cr
+ ack traffic\, how to impersonate a subscriber by placing a fake call and th
+ e general security characteristics of this mobile protocol stack have been
+ evaluated.In this presentation\, we will check out a part of the protocol p
+ rocedures that hasn't been looked at yet\, specifically Mobile Terminated s
+ ervices.
+SUMMARY:Let Me Answer That for You - adventures in mobile paging
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H15M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5316.en.html
+DTSTART;TZID=Europe/Berlin:20121228T124500
+UID:5316@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:Lightning Talks 1 - 5 Minutes of Fame
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H15M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5383.en.html
+DTSTART;TZID=Europe/Berlin:20121229T124500
+UID:5383@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:Lightning Talks 2 - 5 Minutes of Fame
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT2H15M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5384.en.html
+DTSTART;TZID=Europe/Berlin:20121230T124500
+UID:5384@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:Lightning Talks 3 - 5 Minutes of Fame
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5305.en.html
+DTSTART;TZID=Europe/Berlin:20121229T171500
+UID:5305@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:We're winning! The future looks like network politics!Wait\, w
+ hat the hell are network politics and how do they work? Is that like the P
+ irate Party\, or the IETF\, or Anonymous?
+SUMMARY:Long live the protocoletariat!
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5124.en.html
+DTSTART;TZID=Europe/Berlin:20121229T183000
+UID:5124@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Security is moving deeper into hardware and so should security
+ research. This talks introduces microprobing\, an old technique for snoopin
+ g on data inside chips\, and details a low-cost probing setup.
+SUMMARY:Low-Cost Chip Microprobing
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5088.en.html
+DTSTART;TZID=Europe/Berlin:20121228T171500
+UID:5088@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:You might remember Tamagotchi virtual pets from the 1990's. The
+ se toys are still around and just as demanding as ever! This talk covers my
+ attempts to hack the latest Tamagotchis. Starting with the IR interface\,
+ and moving down into the hardware\, this presentation will discuss techniqu
+ es for reverse engineering a device with limited inputs\, computing power a
+ nd debugging capabilities.
+SUMMARY:Many Tamagotchis Were Harmed in the Making of this Presentation
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5180.en.html
+DTSTART;TZID=Europe/Berlin:20121230T160000
+UID:5180@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Autonomer Drumroboter\, robotisches Glockenspiel oder klingende
+ Installation: Musikinstrumente zu modifizieren und selbstzubauen bietet mu
+ sik- und technikaffinen Geeks die Möglichkeit\, vorgefertigten Klang-Setups
+ etwas eigenständiges entgegenzusetzen. Drumroboter und Klanginstallationen
+ üben dabei sowohl physisch als auch optisch einen besonderen Reiz aus: die
+ Quelle des Klangs wird entdeckt.
+SUMMARY:Marvin und der Blues - Wie Roboterinstrumente zum Musik machen benu
+ tzt werden können
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5282.en.html
+DTSTART;TZID=Europe/Berlin:20121228T214500
+UID:5282@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Mit RFID-Lesegeräten Menschen tracken - keine Zukunftsvision.
+SUMMARY:Meine Kleidung funkt - Tracking von Menschen durch in Kleidung inte
+ grierte RFID-Chips
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5289.en.html
+DTSTART;TZID=Europe/Berlin:20121228T113000
+UID:5289@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Meldegesetz und der erfolgreiche Protest dagegen.
+SUMMARY:Meldegesetz - Was aus dem 57-Sekunden-Gesetz wurde
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5285.en.html
+DTSTART;TZID=Europe/Berlin:20121229T214500
+UID:5285@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Unsichere Studierenden- und Mensakarten. Eine wissenschaftliche
+ Auswertung.
+SUMMARY:Men who stare at bits - RFID-Studierendenkarten mit Fehlern
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5393.en.html
+DTSTART;TZID=Europe/Berlin:20121229T203000
+UID:5393@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Contactless smartcards have become widespread for applications
+ such as ticketing\, access control\, identification and payments. Side-chan
+ nel analysis (SCA) is a powerful type of passive implementation attack that
+ enables to extract the secret keys of cryptographic devices. At the exampl
+ e of NXP's Mifare DESfire MF3ICD40 smartcards we demonstrate that SCA attac
+ ks can be applied to cryptographic RFID devices: By exploiting the electro-
+ magnetic information leakage of the cards\, its cryptographic keys are reve
+ aled.We introduce our open-source tools for analyzing contactless smartcard
+ s\, i.e.\, an ISO 14443 RFID reader (http://sourceforge.net/projects/reader
+ 14443) and the card emulator Chameleon (http://sourceforge.net/projects/cha
+ meleon14443). We then present the probably worst realization of a commercia
+ l contactless payment system ever and detail on various real-world attacks
+ on this widespread (in Germany) system\, e.g.\, how to 'milk the digital ca
+ sh cow' by modifying the credit balance and convert zeros and ones into rea
+ l money. The content of the talk is joint work with Ingo von Maurich\, Davi
+ d Oswald and Christof Paar.
+SUMMARY:Milking the Digital Cash Cow - Extracting Secret Keys of Contactles
+ s Smartcards
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5280.en.html
+DTSTART;TZID=Europe/Berlin:20121230T113000
+UID:5280@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Massive open online courses are the vogue of the season when it
+ comes to discussing the future of university-level education. But we’re on
+ ly starting to see what education at this scope means and how it can be sup
+ ported best\, in terms of both didactics and technology. This talk is an in
+ side report by two instructors who have delved into the experience of teach
+ ing large audiences online. We share the lessons that we have learned: how
+ to spark student interest\, how to put intuition before formal theories\, h
+ ow to streamline production and much more. And we point out what needs to b
+ e done to truly democratize education from the viewpoint of both the studen
+ ts and the instructors.
+SUMMARY:Millions of Lessons Learned on Electronic Napkins - On the way to f
+ ree(ing) education
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5102.en.html
+DTSTART;TZID=Europe/Berlin:20121227T171500
+UID:5102@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In den letzten Jahren haben sich netzpolitische Kräfteverhältni
+ sse auf interessante Weise verschoben. Neue Allianzen bilden sich sowohl ge
+ gen\, als auch für das freie Internet – und dennoch bleibt der Aktivismus w
+ eit hinter seinem Potential zurück.
+SUMMARY:Netzaktivsten! Ist das alles\, was wir drauf haben? - Eine subjekti
+ ve Bestandsaufnahme
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5134.en.html
+DTSTART;TZID=Europe/Berlin:20121227T214500
+UID:5134@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Human interface design for musical instruments presents unique
+ challenges and vast new possibilities. The proliferation of low cost rapid
+ -prototyping tools has put the means of fabricating instruments within reac
+ h of the performing musician. In this talk\, I'll go through the design pr
+ ocess for my main performance controller (The Mojo)\, my multiplayer instru
+ ments (aka Jamboxes) and my new RoboCaster guitar-controller.
+SUMMARY:New Human Interfaces for Music - DIY MIDI Controllers
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5404.en.html
+DTSTART;TZID=Europe/Berlin:20121230T160000
+UID:5404@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:NOC Review - NOC Review about the 29C3
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5385.en.html
+DTSTART;TZID=Europe/Berlin:20121227T113000
+UID:5385@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:On the topic of resistance.
+SUMMARY:Not my department
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5037.en.html
+DTSTART;TZID=Europe/Berlin:20121228T001500
+UID:5037@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Gut gereift und mit verbesserter Rezeptur.Aber immer noch:Zwei
+ sich auf Couchen fläzende Teams gehirnwinden\, spitzfinden und assoziieren
+ gegeneinander an\, um Bilderrätsel aus den Gefilden IT\, Netzgesellschaft u
+ nd Informatik zu entwirren.(Hashtag: #Nougatbytes)
+SUMMARY:Nougatbytes 10 - Gebilde(r)ter Hirnsalat – die rhekkcüЯ der Bilderr
+ ätsel
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5203.en.html
+DTSTART;TZID=Europe/Berlin:20121228T143000
+UID:5203@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Polish government decided in favour of open-licensed e-textbook
+ s. This is not to liking of big textbook publishers\, reaping in profits ha
+ nd over fist. While their black PR campaign focuses on technicalities\, it
+ seems obvious that their real beef is with the liberal licensing.
+SUMMARY:OMG! OER! - How big business fights open education in Poland\, and
+ how open education fights back!
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5210.en.html
+DTSTART;TZID=Europe/Berlin:20121229T140000
+UID:5210@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The Security Assertion Markup Language (SAML) is a widely adopt
+ ed language for making security statements about subjects. It is a critical
+ component for the development of federated identity deployments and Single
+ Sign-On scenarios. In order to protect integrity and authenticity of the e
+ xchanged SAML assertions\, the XML Signature standard is applied. However\,
+ the signature verification algorithm is much more complex than in traditio
+ nal signature formats like PKCS#7. The integrity protection can thus be suc
+ cessfully circumvented by application of different XML Signature specific a
+ ttacks\, under a weak adversarial model.
+SUMMARY:On Breaking SAML - Be Whoever You Want to Be
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H15M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5399.en.html
+DTSTART;TZID=Europe/Berlin:20121227T110000
+UID:5399@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:
+SUMMARY:Opening Event
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5308.en.html
+DTSTART;TZID=Europe/Berlin:20121229T160000
+UID:5308@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Was bedeutet das Zeitalter offener Designs für die Sicherheit v
+ on Schlössern? Zum Beispiel solchen\, die auf eine geringe Verbreitung eine
+ s Schlüssels setzen? Ein Beispiel sind die sogenannten Hochsicherheitsversi
+ onen von Polizeihandschellen. Der Talk zeigt was (und wie) sich in diesem B
+ ereich mit Lasercuttern und 3D Druckern erreichen lässt - sowie welche komp
+ lexeren Angriffsziele noch warten. Als Ausweg aus der Problematik kopierbar
+ er Schlüssel gelten digitale Schlösser\, aber sie kranken anders an offenen
+ Quellen: sie haben keine! Im Rahmen eines Open Source Lock Projektes haben
+ wir uns daher ein reflashbares Vorhängeschloss angesehen\, doch noch ehe w
+ ir den Programmieradapter angeschlossen hatten fanden wir eine Schwachstell
+ e der Hardware... Leider kein Einzelfall!
+SUMMARY:Open Source Schlüssel und Schlösser - Offene Quellen zum Bösen und
+ Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektronischen
+ Schlössern
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5265.en.html
+DTSTART;TZID=Europe/Berlin:20121230T171500
+UID:5265@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:x86 processors contain a surprising amount of built-in memory t
+ ranslation logic\, which is driven by various data tables with intricate en
+ try formats\, and can produce various kinds of traps and other interesting
+ computational effects. These features are mostly relics of earlier\, more c
+ ivilized times\, when Jedi Knights tried to protect the Old Republic OSes w
+ ith segmentation\, supervisor bits\, and hardware task support\, but were d
+ efeated by processor de-optimizations and performance concerns and left unu
+ sed by both Windows and UNIX systems – and explored only by hackers. For th
+ e rest of the world\, an x86 PC was a "von Neumann architecture" with most
+ of its strangeness unused.
+SUMMARY:Page Fault Liberation Army or Gained in Translation - a history of
+ creative x86 virtual memory uses
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5323.en.html
+DTSTART;TZID=Europe/Berlin:20121229T230000
+UID:5323@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Der Vortrag handelt über Getreidezüchtung. Am Beispiel von Weiz
+ en soll der langjährige Prozess beschrieben werden\, den es benötigt\, um
+ eine neue Sorte auf den Markt zu bringen. Es sollen die biologischen Grundl
+ agen sowie die benötigte Technik vorgestellt werden. Außerdem wird auf die
+ Problematik eingegangen\, die die Konzentration des Marktes auf wenige groß
+ e Konzerne mit sich bringt.
+SUMMARY:Pflanzenhacken richtig - Einblicke in die Weizenzüchtung
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5095.en.html
+DTSTART;TZID=Europe/Berlin:20121227T183000
+UID:5095@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:To date\, remote vehicle communications have provided little in
+ the way of privacy. Much information and misinformation has been spread on
+ what the system is and can do\, especially within the information security
+ community. The recent field trial in the US of a connected vehicle infrast
+ ructure raises the level of concern amongst all who are aware of existing p
+ rivacy issues.
+SUMMARY:Privacy and the Car of the Future - Considerations for the Connecte
+ d Vehicle
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5101.en.html
+DTSTART;TZID=Europe/Berlin:20121229T160000
+UID:5101@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:ACTA war das beherrschende Thema des zweiten Halbjahres. Mit AC
+ TA sollte der Weg einer Privatisierung der Rechtsdurchsetzung weiter gegang
+ en werden. Was das konkret bedeutet\, können wir bereits im Ausland sehen:
+ Netzsperren\, 3-Strikes-Systeme und eine Echtzeit-Überwachung des Datenverk
+ ehrs zur Bekämpfung von Urheberrechtsverletzungen. Existierende Modelle in
+ anderen europäischen Staaten zeigen\, dass diese Maßnahmen erhebliche grund
+ - und datenschutzrechtliche Probleme aufwerfen.
+SUMMARY:Privatisierung der Rechtsdurchsetzung - Von ACTA\, IPRED und Freund
+ en
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5266.en.html
+DTSTART;TZID=Europe/Berlin:20121230T140000
+UID:5266@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Zensur im Internet betrifft immer mehr Nutzer. Wir kennen Tools
+ wie Proxies\, VPNs oder Tor Bridges. Doch welche weiteren Werkzeuge unters
+ tützen die Nutzer vor Ort? Wo sind die Stärken und Schwächen? Der Vortrag s
+ tellt einige von diesen vor und zeigt die Stärken und Schwächen.
+SUMMARY:Proximax\, Telex\, Flashproxy oder Tor Bridges - Übersicht über akt
+ uelle Zensurumgehungssoftware
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5374.en.html
+DTSTART;TZID=Europe/Berlin:20121227T171500
+UID:5374@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION: This talk will give an overview of the ongoing work by the W3C
+ on a controversial general purpose Javascript cryptography API in context
+ of the larger desire to create trusted and encrypted cloud services with ri
+ ch web applications. Today\, cryptography is difficult to use and the Web i
+ s an insecure environment at best\, but can this situation be improved and
+ cryptography be put in the hands of ordinary developers and users? The W3C
+ specification\, currently under development\, will be described\, as well a
+ s its interaction with other parts of the emerging Web Security Model at th
+ e W3C and IETF such as Content Security Policy\, HTTP Strict Transport Secu
+ rity\, and Certificate Transparency. A number of use-cases\, ranging from d
+ ecentralized identity systems to secure cloud services for activists\, will
+ be detailed. As the specification will be under active development until a
+ utumn 2013\, feedback from the hacker community is needed!
+SUMMARY:Re-igniting the Crypto Wars on the Web
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5138.en.html
+DTSTART;TZID=Europe/Berlin:20121228T131500
+UID:5138@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In 1791\, the political reformer Jeremy Bentham theorized the P
+ anopticon\, whose design promised to allow a single Inspector to surveil (e
+ xercise "inspective force" over) large numbers of criminals or workers. In
+ recent years\, the advent of a suitable technical apparatus – CCTV\, ISP ta
+ ps (network traffic interception)\, data banks\, and so on – has extended t
+ he proposed 30m circumference of Bentham’s structure to\, and beyond\, the
+ physical boundaries of entire countries. While total surveillance is often
+ perceived as a feature of modernity\, its conceptual and epistemological fr
+ amework is rooted in the Romantic period\, moreover at a key juncture in th
+ e history of ideas concerning individual subjectivity\, rights and freedoms
+ . David Barnard-Wills refers to inspective culture as a "nexus of surveilla
+ nce\, identity and language" (2012). In this talk\, we examine this nexus i
+ n the historical period that first\, and so powerfully\, imagined the fully
+ surveilled world.
+SUMMARY:Romantic Hackers - Keats\, Wordsworth and Total Surveillance
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5402.en.html
+DTSTART;TZID=Europe/Berlin:20121229T183000
+UID:5402@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Privacy International\, Agentura.Ru\, the Russian secret servic
+ es watchdog\, and Citizen Lab have joined forces to launch a new project en
+ titled 'Russia’s Surveillance State'. The aims of the project are to undert
+ ake research and investigation into surveillance practices in Russia\, incl
+ uding the trade in and use of surveillance technologies\, and to publicise
+ research and investigative findings to improve national and international a
+ wareness of surveillance and secrecy practices in Russia. The project is m
+ ade possible with support from the Canada Centre for Global Security Studie
+ s\, Munk School of Global Affairs\, at the University of Toronto.
+SUMMARY:Russia’s Surveillance State
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5140.en.html
+DTSTART;TZID=Europe/Berlin:20121228T214500
+UID:5140@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The triple meltdown of the Fukushima Dai-Ichi nuclear power pla
+ nt in March last year and the release of radioactive material that has ensu
+ ed have left a good part of Northern Japan contaminated with unknown amount
+ of radioactivity. An outstanding lack of transparency from both the govern
+ ment and the power utility then resulted in a near total lack of informatio
+ n concerning the levels of radiation in the\, yet unknown\, contaminated ar
+ eas. As a response\, concerned citizen have started to take upon themselves
+ this challenging task. However it quickly became clear that handheld measu
+ rements wouldn't scale up to the full magnitude of the area to cover. New m
+ eans of measuring radiation accurately\, quickly and cheaply were needed.
+SUMMARY:Safecast: DIY and citizen-sensing of radiation - Empowering citizen
+ in the wake of Fukushima triple-meltdown disaster
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5059.en.html
+DTSTART;TZID=Europe/Berlin:20121227T230000
+UID:5059@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Modern civilization unconditionally depends on information syst
+ ems. It is paradoxical but true that ICS/SCADA systems are the most insecur
+ e systems in the world. From network to application\, SCADA is full of conf
+ iguration issues and vulnerabilities.
+SUMMARY:SCADA Strangelove - or: How I Learned to Start Worrying and Love Nu
+ clear Plants
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5177.en.html
+DTSTART;TZID=Europe/Berlin:20121229T113000
+UID:5177@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This talk will go into some of challenges\, solutions\, and sto
+ ries from securing a campaign for the 2012 US presidential election.
+SUMMARY:Securing the Campaign - Security and the 2012 US Presidential Elect
+ ion
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5225.en.html
+DTSTART;TZID=Europe/Berlin:20121229T203000
+UID:5225@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In this talk we will survey some 30 recent attacks on the Russi
+ an GOST block cipher.Background: GOST cipher is the official encryption sta
+ ndard of the Russian federation\, and also has special versions for the mos
+ t important Russian banks. Until 2012 there was no attack on GOST when it i
+ s used in encryption with random keys. I have developed more than 30 differ
+ ent academic attacks on GOST the fastest has complexity of 2^118 to recover
+ some but not all 256-bit keys generated at random\, which will be presente
+ d for the first time at CCC conference. It happens only once per decade tha
+ t a government standard is broken while it is still an official government
+ standard (happened for DES and AES\, no other cases known). All these are b
+ roken only in academic sense\, for GOST most recent attacks are sliding int
+ o maybe arguably practical in 30 years from now instead of 200 years... Our
+ earlier results were instrumental at ISO for rejecting GOST as an internat
+ ional encryption standard last year. Not more than 5+ block cihers have eve
+ r achieved this level of ISO standardisation in 25 years and it NEVER happe
+ nded in history of ISO that a cipher got broken during the standardization
+ process. Two main papers with 70+30 pages respectively which are http://epr
+ int.iacr.org/2011/626 and http://eprint.iacr.org/2012/138. Two other papers
+ have been already published in Cryptologia journal which specializes in se
+ rious military and government crypto. The talk will cover three main famili
+ es of attacks on GOST: high-level transformations\, low- level inversion/MI
+ TM/guess-then-software/algebraic attacks and advanced truncated differentia
+ l cryptanalysis of GOST.
+SUMMARY:Security Evaluation of Russian GOST Cipher - Survey of All Known At
+ tacks on Russian Government Encryption Standard
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5244.en.html
+DTSTART;TZID=Europe/Berlin:20121230T171500
+UID:5244@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? We
+ lche neuen Entwicklungen haben sich ergeben? Welche neuen Buzzwords und Tre
+ nds waren zu sehen?
+SUMMARY:Security Nightmares - Damit Sie auch morgen schlecht von Ihrem Comp
+ uter träumen.
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5167.en.html
+DTSTART;TZID=Europe/Berlin:20121227T160000
+UID:5167@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In The Netherlands\, this year the community-driven mobile telc
+ o Limesco has started operations. We're providing voice\, SMS and data serv
+ ices to dozens of hackers in our country.One of the founders of Limesco wil
+ l give a lecture about mobile telephony in The Netherlands\, encompassing t
+ opics like what companies are involved in the system\, how tariffs are cons
+ tructed and the role of government regulations.
+SUMMARY:Setting mobile phones free - An overview of a mobile telephony mark
+ et and how a community-driven operator is born
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5164.en.html
+DTSTART;TZID=Europe/Berlin:20121228T160000
+UID:5164@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Der Betrieb von WLAN-Funk-Netzen und auch von offenen oder frei
+ en Netzen ist heute weit verbreitet und Teil der Diskussion um die "Culture
+ s of Sharing". Der Vortrag soll die Grundlagen der Haftung für offene Netze
+ und die Entwicklung der Rechtsprechung vom Landgericht Hamburg ("gestern")
+ zum BGH-Urteil "Sommer unseres Lebens" und den Einfluss aktueller Rechtspr
+ echung des Europäischen Gerichtshofs\, des Bundesgerichtshofs und der Insta
+ nzgerichte darstellen ("heute"). Ein Ausblick auf die Folgen dieser neuen\,
+ teilweise abweichenden Rechtsprechung und auf die Gesetzesinitiativen der
+ SPD und der Linken ("morgen") soll den Vortrag abrunden.
+SUMMARY:Sharing Access – Risiken beim Betrieb offener (WLAN-)Netze - Stand
+ gestern\, heute und morgen
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5127.en.html
+DTSTART;TZID=Europe/Berlin:20121227T124500
+UID:5127@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Der Eid des Hippokrates\, der das Handeln von Ärzten ethisch le
+ iten soll\, ist zwischen 2.500 und 2.000 Jahre alt und tatsächlich wohl die
+ erste 'Datenschutz-Vorschrift' überhaupt. So heißt es: "Was ich bei der Be
+ handlung oder auch außerhalb meiner Praxis im Umgange mit Menschen sehe un
+ d höre\, das man nicht weiterreden darf\, werde ich verschweigen und als Ge
+ heimnis bewahren." [1]
+SUMMARY:Siechtum und Sterben der ärztlichen Schweigepflicht
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5121.en.html
+DTSTART;TZID=Europe/Berlin:20121229T171500
+UID:5121@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Green-IT kennen wir inzwischen zur Genüge. Computer können aber
+ nicht nur nicht "green" sein\, sondern auch unfair und unsozial\, von der
+ Rohstoffgewinnung bis zur Verschrottung. Unfair spart nämlich Geld. Der Ged
+ anke\, faire Produkte anzubieten und zu kaufen\, ist inzwischen weit verbre
+ itet\, allerdings eher bei Kaffee oder Kleidung. Ein Angebot an fairer IT f
+ ehlt. Die Industrie hat sich noch nicht auf den Weg gemacht\, faire Compute
+ r herzustellen. Wir Nutzer haben kaum die Wahl – verändern können wir aber
+ durchaus etwas. Der Vortrag erklärt\, was und wie.
+SUMMARY:Sind faire Computer möglich?
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5123.en.html
+DTSTART;TZID=Europe/Berlin:20121229T143000
+UID:5123@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The lecture would address topics related to reverse engineering
+ for mobile platforms\, especially from the Android point of view. The main
+ aspects of the presentation is a new approach to reverse engineering side
+ effects problem: some low footprint inspection techniques that grant analys
+ ts with the ability to access the program memory without altering its behav
+ ior. One technique is presented in particular - Android service injection -
+ and is demonstrated.
+SUMMARY:Small footprint inspection techniques for Android - Reverse enginee
+ ring on Android platforms
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5239.en.html
+DTSTART;TZID=Europe/Berlin:20121228T183000
+UID:5239@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This talk will give an overview on the technology\, the laws an
+ d the technical guidelines of the smartMeter roll-out in Germany.
+SUMMARY:SmartMeter - A technological overview of the German roll-out
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5336.en.html
+DTSTART;TZID=Europe/Berlin:20121230T113000
+UID:5336@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Forderungen nach einer gerechten Sprache (also einer Sprache fr
+ ei von Rassismus\, Sexismus und anderen menschenfeindlichen Ideologien) sto
+ ßen häufig auf Unverständnis und Ablehnung. Unverständnis\, weil statt der
+ sozialen Wirklichkeit die Sprache kritisiert wird\, mit der sie beschrieben
+ wird. Ablehnung\, weil Sprachkritik häufig als Sprechverbot empfunden wird
+ .
+SUMMARY:Sprache\, Ungleichheit und Unfreiheit
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5378.en.html
+DTSTART;TZID=Europe/Berlin:20121229T124500
+UID:5378@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Stabilitätsanker & Wachstumslokomotive geben als politische Met
+ aphern ungewollt Auskunft über das Ausmaß der europäischen Wirtschafts- und
+ Finanzkrise. Wie kommt so ein Begriff in Verkehr? Wer gebraucht ihn? Zu we
+ lchem Zweck? Was fördert die Analyse der Metaphern zutage?
+SUMMARY:Stabilitätsanker & Wachstumslokomotive
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5230.en.html
+DTSTART;TZID=Europe/Berlin:20121228T230000
+UID:5230@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Stylometry uses linguistic information found in a document to p
+ erform authorship recognition. In this talk\, we will present how stylometr
+ y can be used to deanonymize users in multilingual underground forums. Our
+ initial result shows that in spite of differences in languages and text len
+ gths\, regular stylometric methods perform well in identifying users in thi
+ s context. We will also present the improved version of Anonymouth\, a tool
+ to anonymize written document\, with user studies.
+SUMMARY:Stylometry and Online Underground Markets
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5390.en.html
+DTSTART;TZID=Europe/Berlin:20121228T140000
+UID:5390@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Don't call us if your campaign does not work! And worse\, every
+ one's been harassed or arrested.
+SUMMARY:Tactical Tech - Bridging the Gap
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5228.en.html
+DTSTART;TZID=Europe/Berlin:20121230T124500
+UID:5228@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The Role of Technology in Post-Revolution Tunisia & Egypt: Inte
+ rnet activists have embarked on many online projects to empower citizens wi
+ th necessary information about their elected officials.
+SUMMARY:Technology in Post-Revolution Tunisia and Egypt
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5195.en.html
+DTSTART;TZID=Europe/Berlin:20121230T160000
+UID:5195@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The Executable and Linkable Format (ELF) is omnipresent\; relat
+ ed OS and library code is run whenever processes are set up and serviced (e
+ .g.\, dynamically linked). The loader is the stage manager for every execut
+ able. Hardly anyone appreciates the work that the ELF backstage crew (inclu
+ ding the linker and the loader) puts in to make an executable run smoothly.
+SUMMARY:The Care and Feeding of Weird Machines Found in Executable Metadata
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5206.en.html
+DTSTART;TZID=Europe/Berlin:20121227T214500
+UID:5206@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In the world of digital activism\, distributed denial of servic
+ e attacks present relatively low barriers to popular participation\, have a
+ high potential for attracting large numbers of first-time and repeat parti
+ cipants\, and can attract large amounts of media attention. But though suc
+ h actions popular\, are they ethical? In this talk I will be presenting an
+ ethical framework for the analysis of activist DDOS actions. The framework
+ is grounded in a historical analysis of various activist DDOS actions\, suc
+ h as the IGC attacks in Spain in the late 90s\, Electronic Disturbance Thea
+ ter actions in the early 2000s\, and the Anonymous-led Operation Payback at
+ tacks in 2010. Each historical case study presents a unique confluence of
+ technological\, political\, legal and operational factors allowing for a fu
+ ll spectrum of ethical analysis.
+SUMMARY:The Ethics of Activist DDOS Actions - A Historical Analysis
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html
+DTSTART;TZID=Europe/Berlin:20121229T230000
+UID:5256@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Have you ever been staring for nights at binary or hexadecimal
+ data flows extracted from an USB channel? Don't you remember yourself searc
+ hing for some patterns and similarities in this fuc***g mess of zeros and o
+ nes grabbed from a binary configuration file? How long did it take you to f
+ ind an 16 bits decimal size field last time you reversed an IPC communicati
+ on protocol?Did you know you were not alone and that among them\, Rob Savoy
+ e (@ FOSDEM-08) and Drew Fisher (@ 28C3) have already reported the main dif
+ ficulties of the RE operations. Both of them called for the creation of a t
+ ool which would help experts in their work.
+SUMMARY:The future of protocol reversing and simulation applied on ZeroAcce
+ ss botnet - Mapping your enemy Botnet with Netzob
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5274.en.html
+DTSTART;TZID=Europe/Berlin:20121227T171500
+UID:5274@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:The current European data protection directive is from 1995\, w
+ hich was when the internet had not hit Brussels' decision-makers yet. Now\,
+ 17 years later\, it is being completely re-writen. Will it meet the challe
+ nges of the age of big data? Will it have any effect on non-EU data hoarder
+ s? How will it deal with user-generated consent? What is this strange new "
+ right to be forgotten"? And what about privacy by design?
+SUMMARY:The Grand EU Data Protection Reform - A latest battle report by so
+ me key actors from Brussels
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5306.en.html
+DTSTART;TZID=Europe/Berlin:20121228T171500
+UID:5306@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:At the very beginning\, Tor was just a socks proxy that protect
+ ed the origin and/or destination of your TCP flows. Now the broader Tor eco
+ system includes a diverse set of projects -- browser extensions to patch Fi
+ refox and Thunderbird's privacy issues\, Tor controller libraries to let yo
+ u interface with the Tor client in your favorite language\, network scanner
+ s to measure relay performance and look for misbehaving exit relays\, LiveC
+ Ds\, support for the way Android applications expect Tor to behave\, full-n
+ etwork simulators and testing frameworks\, plugins to make Tor's traffic lo
+ ok like Skype or other protocols\, and metrics and measurement tools to kee
+ p track of how well everything's working. Many of these tools aim to be use
+ ful beyond Tor: making them modular means they're reusable for other anonym
+ ity and security projects as well. In this talk\, Roger and Jake will walk
+ you through all the tools that make up the Tor software world\, and give yo
+ u a better understanding of which ones need love and how you can help.
+SUMMARY:The Tor software ecosystem
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5178.en.html
+DTSTART;TZID=Europe/Berlin:20121230T140000
+UID:5178@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Galaksija was to be in Yugoslavia what Commodore and Sinclair w
+ ere in the west. Whether it succeeded or not\, its deceptively simple desig
+ n can still teach us a lot of interesting tricks on how to make a usable co
+ mputer and operating system with as few transistors and bits as possible.
+SUMMARY:The ultimate Galaksija talk - Everything about a Yugoslavian microc
+ omputer halfway between a TRS-80 and a ZX 80
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 4
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5044.en.html
+DTSTART;TZID=Europe/Berlin:20121227T230000
+UID:5044@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In this year’s talk\, I tie on my 28c3 talk and present timing
+ side channels from a defending viewpoint: How can one mitigate timing side
+ channels? Aren’t random delays sufficient to prevent timing side channels i
+ n practice? What is the minimum size of random delays to be effective? Are
+ there other delay strategies besides random delays that are more effective
+ and efficient?
+SUMMARY:Time is NOT on your Side - Mitigating Timing Side Channels on the W
+ eb
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5380.en.html
+DTSTART;TZID=Europe/Berlin:20121228T140000
+UID:5380@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Wir wissen seit ein paar Jahren\, dass der Staat technisch in d
+ er Lage ist\, die Computer einiger seiner Bürger zu infiltrieren. Aber soll
+ er das auch dürfen? Was hat sich in den letzten Monaten beim Staatstrojane
+ r getan?
+SUMMARY:Trojaner-Blindflug - Spionage-Software von Staats wegen
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT0H30M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5091.en.html
+DTSTART;TZID=Europe/Berlin:20121228T124500
+UID:5091@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Hardware-basierte Festplattenvollverschlüsselungen in Form soge
+ nannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere und perf
+ ormante Alternative zu Software-basierter Verschlüsselung wie BitLocker und
+ TrueCrypt gesehen. Während der Performance-Gewinn und die Benutzerfreundli
+ chkeit von SEDs\, bspw. Intel's SSD 320 bzw. SSD 520\, außer Frage stehen\,
+ ist der Sicherheits-Gewinn deutlich geringer als bisher angenommen. Teilwe
+ ise sind Systeme die auf SEDs basieren gar schwächer als vergleichbare Syst
+ eme die auf Software-Verschlüsselung basieren.
+SUMMARY:(Un)Sicherheit Hardware-basierter Festplattenverschlüsselung
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5396.en.html
+DTSTART;TZID=Europe/Berlin:20121228T160000
+UID:5396@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Weltbilder der Informatik sind in mancher Hinsicht denen in der
+ Hacker- und Hackerinnen-Community nicht unähnlich.
+SUMMARY:Was ist\, was kann\, was soll Gender Studies Informatik?
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5160.en.html
+DTSTART;TZID=Europe/Berlin:20121228T113000
+UID:5160@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:In the Free City of Hamburg\, which is one of 16 German states\
+ , a coalition of hackers\, activists and other players of civil society hav
+ e drafted the most revolutionary Freedom of information law in the world. T
+ he law obliges the state to proactively publish all important public inform
+ ation (such as contracts\, studies\, construction permits) in an OpenData f
+ ormat on the Internet. After the start of a referendum campaign\, the law w
+ as passed unanimously by the state parliament in June 2012 to avoid a publi
+ c vote on it.
+SUMMARY:We are all lawmakers! - How to further transparency by law – the Ha
+ mburg example and beyond
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5208.en.html
+DTSTART;TZID=Europe/Berlin:20121227T160000
+UID:5208@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Accessibility of digital content is a hugely misunderstood issu
+ e. Programmers and content developers tend to view it as a distraction or a
+ special interest concern. Accessibility advocates fail to describe it in t
+ erms that would put it in the proper place for other technologists\, in par
+ ticular security practitioners.
+ We argue that if a format or a document has
+ systemic accessibility problems\, then accessibility is likely to be the l
+ east of its problems\; that accessibility only collapses first\, like a can
+ ary in a mine\, and security is next to follow. We argue that many accessib
+ ility problems\, just like many security problems\, stem from documents bei
+ ng hard to parse or containing executable content\, and that the accessibil
+ ity community is only the first to suffer\, due to not having the manpower
+ to make extremely complicated formats to almost work almost always. It's an
+ arms race tougher than the security patching cycle\, made worse by there b
+ eing no common model for what accessibility properties should look like.
+SUMMARY:What accessibility has to do with security
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 6
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5283.en.html
+DTSTART;TZID=Europe/Berlin:20121227T203000
+UID:5283@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:After the political and legislative failure of the blocking and
+ filtering proposals in Germany (#Zensursula) and the EU (Child Protection
+ Directive) several players stepped up to implement the measures that previo
+ usly have been envisioned as compulsory but now on a "self-regulatory" basi
+ s.
+SUMMARY:White IT\, Clean IT & CEO Coalition - How the government tries to e
+ ncourage privatized policy inforcement and thereby bypasses and circumvents
+ democratic processes
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5327.en.html
+DTSTART;TZID=Europe/Berlin:20121229T171500
+UID:5327@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:This action-packed lecture presents the inner workings of the a
+ uthor's from-scratch implementation of a USB Mass Storage disk in user-land
+ Python\, along with some embarrassing bugs in operating systems that suppo
+ rt such disks. The lecture concludes with an introduction to Active Antifo
+ rensics\, in which a thumbdrive's own firmware can recognize and defend its
+ elf against disk imaging and other forensic tools.
+SUMMARY:Writing a Thumbdrive from Scratch - Prototyping Active Disk Antifor
+ ensics
+STATUS:CONFIRMED
+END:VEVENT
+BEGIN:VEVENT
+DURATION:PT1H00M
+LOCATION:Saal 1
+SEQUENCE:0
+URL:http://events.ccc.de/congress/2012/Fahrplan/events/5262.en.html
+DTSTART;TZID=Europe/Berlin:20121227T140000
+UID:5262@29C3@pentabarf.org
+DTSTAMP:20121226T143018
+CATEGORIES:Lecture
+DESCRIPTION:Seit anderthalb Jahren begleitet FragDenStaat.de die deutsche I
+ nformationsfreiheit in der Praxis und dokumentiert die Korrespondenz zwisch
+ en Anfragestellenden und Behörden. Welche Informationen gibt der Staat prei
+ s\, und gegen welche Veröffentlichungen kämpft er sogar bis vor Gericht? Di
+ e interessantesten Fälle werden genauer beleuchtet und eine Bewertung zur L
+ age der staatlichen Information in Deutschland abgegeben.
+SUMMARY:Zur Lage der Information - 1.5 Jahre FragDenStaat.de
+STATUS:CONFIRMED
+END:VEVENT
+END:VCALENDAR |